English Computer Book
English Computer Book
KNOWLEDGE
X-EEED Publication
INDEX
Abacus China 16th First mechanical calculating device Used for addition and
century It used set of beads for representing unit. subtraction operation.
A horizontal rod represent the one, tens, Calculation of square roots
hundred, etc. can also be performed.
Napier's John Napier 1617 Three dimensional structure. Perform multiplication on
Bones Holding numbers 0 to 9 only. numbers.
Represent graphical structure of Technology used for
calculating result. calculation called
Rabdologia
Operation performed on
the embedded rods.
Pascaline Blaise Pascal 1642 First mechanical adding machine. Perform addition and
It was structured like rectangular box, subtraction of two numbers.
with eight disc (represent number of Mainly designed with regard
units) to the pressure of liquid.
The term carry was introduced in this
period.
(1)
Card of Joseph Jacquard 1801 First mechanical loom. Simplified the process of
Holes for Mainly weaved a silk based pattern. Textiles.
Weaving Used punched card for the sequence of
Pattern operation.
Analytical Charles 1834-71 To program the machine, it used two- Generally used for basic
Engine Babbage punchcard. arithmetic operations.
First general-purpose computer. It was a decimal machine
Stored program in the form of 'pegs' also used sign and magnitude for
called barrels. representation of a number.
Tabulating Herman 1880 It used Punched cards with round holes. It was the first
Machine Hollerith Read one card at a time. electromechanical machine,
which was designed to
process the data for census in
1890.
MARK-I Howard Aiken 1944 Consists of interlocking panels of small Mainly used in the war effort
glass, counters, switches and control during world War-ll.
circuits. Magnetic drums are used for
Data can be entered manually. storage.
EDSAC John Von 1946-52 It was first computer which provided First computer program was
Neumann storage capacity. run on machine.
Capable of storing instructions and data in Used mercury delay lines for
memory. memory and vacuum tubes for
Also calculate table of squares and a list logic.
of prime numbers.
UNIVAC Eckert and JW 1951 First general-purpose electronic computer Used magnetic tapes as input
Mauchly with large amount of input and output. and output.
Performed both numeric and textual
information.
IBM-650 IBM Company 1954 Provided input/output units converting Payroll processing
Computer alphabetical and special characters to two- Oil refinery design
digit decimal code. Market research analysis
(2)
Generation of Computer
A generation refers to the state of improvement in the development of system. Computers are built of Electromechanical, before
generation. Each generation of computer is characterized by a major technological development that fundamentally changed the way,
computers operate.
Generation Year Switching Storage Speed Operating Language Characteristic Application
Device Device System
First 1940-56 Vacuum Magnetic 333 Batch Machine Fastest Used for
tubes drums micro operating language computing scientific
second system (Binary device. purpose e.g.,
number 0s Generate ENIAC,
and 1s) large amount UNIVAC.
of heat.
Non-portable.
Second 1956-63 Transistors Magnetic 10 Micro Time- Assembly More reliable Used for
core second sharing language, and less comme
technology system, high level prone to rcial
Multitasking language hardware product
OS failure. ion
Portable and e.g.,
generate less PDP-8,
amount of IBM-
heat. 1401
Third 1964-71 Integrated Magnetic 100 nano Real-time High level Consumed Database
Circuits core as seconds system language less power. management
(ICs) primary (FORTRA Highly system
storage N, COBOL) sophisticated e.g., NCR-
medium ALGOL technology 395, B6500
required.
Fourth 1971- Large Scale Semi 10 pico Time PASCAL, More reliable Distributed
Present Integrated conductor second sharing ADA, and portable. system, e.g.,
(LSI) memory, network, COBOL-74 This intel 4004
circuit Winchester GUI FORTRAN generation chip,
microproces disk interface. IV leads to better Macintosh.
sor communicati
on and
resource
sharing.
Fifth Present Super large ____ ____ _____ _____ Parallel Artificial
and Scale processing intelligence
Beyond Integrated Intel core e.g., Robotics
(SLSI) microprocess
chips or is
implemented.
Enables mega
chips
(3)
Important Points Binary number system was suggested by john von Neumann
Charles Babbage is called the father of computer. Microprocessor is the main concept behind fourth
Alan Turing is known as the father of modern computer. generation of computer.
The First computer architecture was introduced by john Von In 1971, Ted Hoff invented Intel 4004 chip which was the
Neumann in 1948. world's first single chip microprocessor.
EDVAC was the first electronic computer constructed at the Transistors were invented by Bell laboratory of America in
moore school of Engineering (USA). 1953 and were made up of semiconductors like germanium
ENIAC was the world's first successful electronic computer and silicon.
which was developed by the two scientists namely J P Eckert In 1958. Jack St. Clair kilby and Robert Noyce invented the
and J W Mauchy. It was the beginning of first generation first IC. IC. was made up of silicon material and consists of
computer. thousands of transistors on single chip.
Classification of Computer
Computer are mainly classified as two types
(4)
PARAM was the first supercomputer developed in India in 4. Versatility Computers can do different types of work
1990. It is a series of gigaflops, assembled by C-DAC in simultaneously. They can perform multiple tasks at a same
pune. time.
PARAM YUVA II is the latest machine in the series of 5. Plug and play Computers has the ability to automatically
PARAM made by C-DAC (pune) in india. It performs at a configure a new hardware and software component.
peak of 524 teraflops. It has been ranked 33rd in the list of 6. Diligency Unlike human beings, a computer is free from
Top 500 supercomputers in world. monotony, tiredness, lack of concentration etc and can work for
Tianhe-2 is the world's fastest supercomputer launched by hours without creating any errors.
China at NUDT university in 2013. It is based on Rylin linux 7. Secrecy leakage of information is reduced by creating login
operating system with 33.86 petaflops. system with password protection e.g., ATM counter, E-mail
Based on Working of System etc.
On the basis of work, computers are categorised as follows Applications of Computer
Analog Computer Now-a-days computers have been employed in almost all the
Analog computer are the job-oriented computers. They carry aspects of professional and personal life.
out arithmetic and logical operations by manipulating and Some of the areas where computers are being used are
processing of data. e.g., speedometers, seismograph, etc. Education
Analog computer can perform several mathematical operations Computers have proved to be excellent teachers. Educational
simultaneously. It uses continuous variables for mathematical institutes are using computers in many ways like tele-education,
operations and utilises mechanical or electrical energy. virtual classroom, online classes, etc.
Digital Computer Science
Digital computers work by calculating the binary digits. A Scientists have long been users of it. A new adventure among
digital computer, not only performs mathematical problems, but scientists is the idea of a collaboratory, an internet based
also combines the bytes to produce desired graphics, sound. e.g., collaborative laboratory, in which researchers all over the world
desktop (PC). can work easily together even at a distance.
Hybrid Computer Industry
Hybrid computers are the combinations of analog and digital Computers are used here to control manufacturing system and
computers. Machines used in hospitals like ECG and DIALYSIS continuous running of the machinery.
are the commonly used hybrid computers. Parameters like temperature, pressure, volume are monitored and
Quantum computers was first introduced by Richard Feynman. It controlled by computers. Robotics, developed with the help of
uses quantum mechanical phenomena. It is the fastest computer computers plays a very crucial role here.
imitating Brain working. Recreation and Entertainment-
Based on Purpose Our entertainment and pleasure-time have also been affected by
computerisation.
On the basis of purpose, computers are categorised as follows
Government-
1. General Purpose Computer
Various departments of the Government use computer for their
General purpose computers are those computers, which are
planning, control and law enforcement activities.
used to solve variety of problems by changing the program or
instructions. e.g., to make small database calculations, Health
Computer plays a very crucial role in this area. Activities like
accounting, etc.
scanning, X-ray, tele-medicine, patient monitoring, patient records,
2. Special Purpose Computer
diagnosis, etc are performed with the help of computers.
Special purpose computer are those computers which are used
to solve a single and dedicated type of problem. e.g., automatic Multimedia
Multimedia is the field concerned with the computer controlled
aircraft landing, multimedia computer, etc.
integration of text, graphics, drawings, animation, audio and any
Features of Computer
other media where each type of information can be represented,
The key features of computer are
stored, transmitted and processed digitally.
1. Speed The computer can process data very fast at the rate of
millions of instructions per second. Banks
Computers can be used in the bank to keep the records of
customer's a accounts.
2. Accuracy Computers provide a high degree of accuracy. They
respond to the user as per the input instructions. Introduction to Computer
Military Personnel They also make use of computers for their
3. Storage Capacity Computers are capable to store huge amount
crucial tasks like determining the weather, computing the
of data which depends on the capacity of hard disk.
trajectories of missiles, etc.
(5)
Business Using a wide range of business software a company's marketing division can produce sales forecasts and devise new strategies.
E-Commerce Traditionally, commerce is seen as the exchange or buying and selling of goods and services, which involves exchange of
money and sometimes transportation of goods. Electronic commerce that takes place between businesses is referred to as business-to-
business or B2B.
Publication Computers have made publication process an easy one. Without computers, the different parts of a publication-text,
illustrations and graphics-must be created individually, then cut out and pasted down to form a page layout.
(6)
In computer science, computer architecture is a set of AND, OR, etc). Logical unit performs comparison of numbers,
disciplines that describes the part of computer system and their letters and special characters. ALU uses registers to hold the data
relations. Computer architecture deals with the functional that is being processed.
behaviour of a computer system as viewed by a programmer. It can Registers
also be described as the logical structure of the system unit that Registers are special purpose and high speed temporary
housed electronic components. The computer architecture forms the memory units. Registers are not referenced by their address, but are
back bone for building successful computer systems. directly accessed and manipulated by the CPU during execution.
Components of a Computer Essentially, they hold the information that the CPU is currently
working on. Registers store data, instructions, address and
A computer consists of three main components intermediate results of processing
(i) Input/Output (I/O) Unit The number and sizes of registers vary from processor to
(ii) Central Processing Unit (CPU) processor.
(iii) Memory Unit Control Unit (CU)
Control unit coordinates with the input and output devices of
a computer. It directs the computer to carry out stored program
instructions by communicating with the ALU and the registers. It
organises the processing of data and instructions.
To maintain the proper sequence of processing data, the control unit
uses clock inputs. The basic function of control unit is to fetch the
instruction stored in the main memory, identify the operations and
Computer Architecture the devices involved in it and accordingly generate control signals.
Input Unit Microprocessor
The computer accepts coded information through input unit The microprocessor is the
by the user. It is a device that is used to give required information controlling element in a computer system
to the computer. e.g., keyboard, mouse, etc. and is sometimes referred to as the chip.
Output Unit Micro- processor is the main hardware
The output unit sends the processed results to the user. It is that drives
mainly used to display the desired result to the user as perinput the computer.
instruction e.g., video monitor, printer and plotter, etc. It is a large Printed Circuit Board (PCB), which is used in all
Central Processing Unit (CPU) electronic systems such as computer. Calculator, Digital System,
The central processing unit consists of set of registers, etc. The speed of CPU depends upon the type of microprocessor
arithmetic and control circuits, which together interpret and execute used.
instructions in assembly language. Intel 4004 was the first micro-processor to contain all of the
The primary functions of the CPU are components of a CPU on a single chip with a 4-bit bus width.
1. The CPU transfers instructions and input data from main Some of the popular microprocessors are intel, Dual core,
memory to registers i.e., internal memory. Pentium IV. etc.
Memory Unit
2. The CPU executes the instructions in the stored sequence.
Memory is that part of the computer, which holds data
3. When necessary, CPU transfer output data from registers to
and instructions. Memory is an integral component of the CPU. The
main memory. memory unit consists of
Central Processing Unit (CPU) is often called the brain of Primary memory and secondary memory.
computer. The CPU is fabricated as a single Integrated Circuit (IC) Primary Memory
chip and is also known as Microprocessor. A CPU controls all the Primary memory or main memory of the computer is
internal and external devices and performs arithmetic and logic used to store the data and instructions during execution of the
operations. instructions. The Primary memory is of two types; Random Access
The CPU consists of three main sub-systems; Arithmetic Logic Memory (RAM) and Read only Memory (ROM).
Unit (ALU), Control Unit (CU) and registers. Random Access Memory (RAM)
Arithmetic Logic Unit (ALU) It directly provides the required information to the
processor. RAM is a volatile memory. It provides temporary
The arithmetic logic unit contains the electronic circuitry that
storage for data and instructions. Ram is classified into two
executes all arithmetic and logical operations on the available data. categories
It is used to perform all arithmetic calculations (addition, sub- 1. Static Random Access Memory (SRAM).
traction, multiplication and division) and logical calculation (<,>=, 2. Dynamic Random Access Memory (DRAM).
(7)
Read Only Memory (ROM) Motherboard
It is used for storing standard processing programs that
permanently reside in the computer. Generally, designers program The main circuit board contained in any computer is called
ROM chips at the time of manufacturing circuits. ROM is a non- a motherboard. It is also known as the mainboard or logic board
volatile memory. It can only be read not written. or system board or planar board. the biggest piece of silicon
ROM is classified into three categories housed in the system unit of a computer is motherboard. All the
1. Programmable ROM (PROM) other electronic devices and circuits of computer system are
2. Erasable Programmable ROM (EPROM) attached to this board like CPU, ROM.
3. Electrically Erasable Programmable ROM (EEPROM) RAM expansion slots. PCI slots and USB ports. It also includes
controllers for devices like the hard drive. DVD drive, keyboard
Secondary Memory
and mouse.
Secondary memory, also known as secondary storage or auxiliary
In other words, motherboard makes everything in a computer work
memory, is used for storing data and instructions permanently e.g.,
together.
hard disks, CDs, DVDs, etc.
Important Points Instruction Cycle
Buffer is a temporary storage where register holds the data The instruction cycle
for further execution represents the sequence of
Accumulator is a register in a CPU in which intermediate events that takes place as an
arithmetic and logic results are stored. instruction is read from
Reduced instruction set computer (RISC) and memory and executed.
Complex Instruction Set Computer (CISC) are the two A simple instruction cycle
kinds of microprocessors classified on the basis of instruction consists of the following
set. steps
The performance of Computer is affected by the size of Fetching the instruction from the memory.
registers, size of RAM, speed of system clock and size of Decoding the instruction for operation.
cache memory. Executing the instruction.
The Speed of processor is measured in millions of cycles per Storing in memory.
second or megahertz (MHz). Instruction Format
Computer understands instructions only in terms of 0s and
Interconnection of Units 1s, which is called the machine language. A computer program is a
CPU sends data, instructions and information to the set of instructions that describe the steps to be performed for
components inside the computer as well as to the peripherals and carrying out a computational task. The processor must have two
devices attached to it. Bus is a set of electronic signal pathways that inputs; instructions and data.
allows information and signals to travel between components inside The instructions tell the processor what actions are needed to be
performed on the data. An instruction is divided into two parts;
or outside of a computer.
operation (op-code) and operand.
The features and functionality of a bus are as follows
The op-code represents action that the processor must execute and
A bus is a set of wires used for interconnection, where each
the operand defines the parameters of the action and depends on the
wire can carry one bit of data. operation.
A computer bus can be divided into two types; internal bus Important Points
and external bus. Machine cycle is defined by the time. It takes to fetch two
The internal bus connects components inside the motherboard operands from registers. It performs the ALU operation and
like, CPU and system memory. It is also called the system stores the result in a register.
bus. Pipelining improves execution speed by putting the execution
The external bus connects the different external devices; steps of several instructions into parallel. It is also called
peripherals, expansion slots, I/O ports and drive connections instruction prefetch.
to the rest of computer. It is also referred to as the expansion Sockets are the connecting points of chip on the motherboard.
bus. Generally. word computer refers to the central processing unit
The command to access the memory or the I/O device is plus external memory.
carried by the control bus. Load instruction is used for loading data into CPU
accumulator register from memory.
The address of I/O device or memory is carried by the
The box that comes along with your desktop computer in
address bus. The data to be transferred is carried by the data
which all the electronic components of your computer are
bus.
contained is called system unit.
(8)
A computer interacts with the external environment via the 4. Cursor control keys include four direc-tional (left or right up
Input-Output (I/O) devices attached to it. Input device is used for or down) arrow keys that are arranged in inverted T formation
providing data and instructions to the computer. After processing between the alphanumeric and numeric keypad.
the input data, computer provides output to the user via the output Above the arrow keys there are four more keys to control the
devices. The I/O devices that are attached, externally to the cursor. These are
computer machine are also called peripheral devices. Home It is used to return the cursor to the beginning of
the line or the beginning of a document.
Input Device End It moves the cursor to the end of the line.
An input device can be defined as an electro mechanical Page Up When it is pressed, the page view will be
device that allows the user to feed data into the computer for moved up one page and cursor goes to the back page.
analysis and storage and to give commands to the computer. The Page Down When it is pressed, the Page view will be
data is entered into the main-memory through the input devices. moved down one page and cursor goes to the next page.
They accept instructions from the user and convert the accepted 5. Other keys A keyboard contains some other keys such as
instructions into the machine language. Some of the commonly Control key (Ctrl) It performs a special operation with
used input devices are described below. the combination of other keys.
Keyboard Enter It is used to finish an entry and begin the new
A keyboard is one of the most common input device. The entry in a document.
user can type text and command using this keyboard. The layout of Shift Some keys on the keyboard like numeric keys have
the keyboard was borrowed from the regular typewriter with some a symbol printed on their upper portion. Shift key is used
additional keys. Keyboard is used to enter data or information, to print these symbols. There are two shift keys on a
which may be in numeric form or alphabets form, in a computer keyboard.
system. Escape (Esc) It allows a user to cancel or abort
operations, which are executing at present. It opens start
When key is pressed, keyboard interacts with a keyboard controller
menu with the combination of Ctrl key.
and keyboard buffer. keyboard controller stores the code of pressed
Back Space It is used to erase anything typed.
key in keyboard buffer. There are different types of keyboard such
Delete It is used to erase information from the computer's
as QWERTY, DVORAK and AZERTY.
memory and characters on the screen.
Caps lock It is used to type the alphabet in capital letters.
It enables or disables all the letters from being typed in
capital letters. When this key is enable, the alphabet
would be in capital letters and when it is disabled, the
alphabet would be in small letters.
Num Lock It is used to enable and disable the numeric
keypad.
Window Key It is used to open the start button.
Spacebar Key It provides a space between two words. It
is the longest key on keyboard.
Tab Key It is used to move the cursor over to the right to
a pre-set point. In word document, tab is used to indent a
paragraph.
Important Points
Types of Keys on Keyboard Enter key is an alternative to press OK button.
The keys are categorised under the following groups Shift key is used in combination with other keys, so this is
1. Alphanumeric keys include the letter keys (A, B, C, ........Z) also called combination key.
and number keys (0, 1, 2, 3,........9). Caps lock and num lock keys are called as 'toggle keys'
2. Numeric keys are located at the right hand side of the because when pressed, they toggle or change their status from
keyboard. They consist of digits and mathematical operators. one state to another.
3. Function keys are the programmable keys i.e., the programs Numeric keypad is used only, when the num lock key is in
can assign some specific actions. They are numbered from active State.
(F1, F2, F3,......F12).
(9)
Pointing Devices Light Pen
A pointing device is used to communicate with the Light pen is a handheld electro-
computer by pointing to the locations on the monitor. Movements optical pointing device, which is used for
of the pointing device are echoed on the screen by movements of making drawings graphics and for menu
selec tion. The pen contains a photocell in
the Pointer. device are echoed on the screen by movements of the
a small tube. It senses the light from the
pointer. Some commonly used pointing devices are mouse, track
screen when it becomes
ball, joystick, light pen, touch screen etc.
closer and generates a pulse. It is used
Mouse especially in Personal Digital Assistants (PDA). It is very useful in
Mouse is a small handheld device having two or three identifying a specific location on the screen. However, it does not
buttons on its upper side and also has a small wheel between the provide any information when it held over a blank part of the
buttons. It is a pointing device which provides a means to input data screen.
and commands in graphic form by selecting through moving an Touchscreen
arrow called pointer on monitor. Touchscreen is an input device
The mouse may be used to position the cursor on screen, move an that accepts input when the user places
object by dragging or select an object by clicking. Different types a fingertip on the computer screen.
of mouse are mechanical mouse, optical mouse, laser mouse and Touch screens have an infrared beam
wireless mouse. that cris-cross the surface of screen.
The ability to interact directly with a
display typically indicates the presence
of a touch screen.
Touch screen generally used in
applications like ATM, hospitals, airline reservation, supermarkets
and so on.
There are four actions of mouse Digitizers and Graphic Tablets
Click It selects an item on the screen. Graphic tablets have special
Double Click It is used to open a document or program. commands to convert drawings, photos,
Right Click It displays a list of commands on the screen. Right etc to digital signal.
clicking is used to access the properties of selected object. It allows artists to create handmade
Drag and Drop It is used to move an item on the screen. images and graphical images with motion
Trackball and action.
Trackball is another pointing Bar code Reader
device which is an alternative to a It is an input device used for
mouse. It is also used to control reading printed bar codes (Universal
cursor movements and the actions on a Product Code) availa ble on product to be
computer screen. It is generally built in sold. A bar code reader emits a beam of
light which reflects off the bar code image.
laptop, since there is no space for the
A light sensitive detector in the barcode
mouse to move on the laptop.
reader identifies the bar code image by
It is used on CAD, CAM workstations and sometimes seen on
computerised special purpose works workstations such as radar recognising special bars at both the ends of
consoles in an air-traffic control room and sonar equipment on a the image. Once code is identified it is converted into a numeric
ship or submarine. code. A perfect example of a barcode reader, use in a super market
Joystick where barcode scanner reads the price of a product.
It is a device that moves in all Software like wasp, Barcode Pro are used for scanning and printing
directions and controls the movement barcodes.
of the cursor. Joysticks are used in
flight simulators, CAD/ CAM system
etc.
A joystick is similar to a mouse except
that the movement of cursor on screen
stops working as soon as user stop
moving the mouse. But with a joystick, the pointer continues
moving in the previously pointing direction. A barcode is a machine readable representation of information in
the form of stripes of dark and light ink.
(10)
Optical Mark Reader (OMR) Smart Card Reader
OMR is the process of detecting the presence of intended Smart card reader is a device which is
marked responses. OMR is mainly used to detect marks on a paper. used to access the microprocessor of a
It uses a beam of light that is reflected on the paper with marks, to smart card.
capture presence and absence of data (marks). There are two kinds of smart cards;
The OMR reader interprets the pattern of marks into a data record
Memory cards and Microprocessor
and sends this to the computer for storage, analysis and reporting.
cards. Memory cards are the cards
OMR is widely used to read answer of objective type tests, voting
which contain only non-volatile memory storage components and
applications and other evaluation studies.
some specific security logic.
Microprocessor cards contain volatile memory and microprocessor
components. The cards is made-up of plastic generally PVC. Smart
cards are used in large companies and organisations for stronger
security authentication.
Biometric Sensor
Biometric sensor is a device which
recognises physical or behavioural
traits of the individual. Biometric
sensors are mainly used for the
security purpose and for marking
Magnetic Ink Character attendance of employees/students in organisations/institutions. As
Recognition (MICR) biometric sensors are working with
MICR reads the characters by examining their shapes in a accuracy so these are widely used in security purpose also.
matrix form and the information is then passed on to the computer. Scanner
The characters are printed using a special ink, which contains iron
Scanner is used to convert the data
particles that can be magnetised. It is generally used in banks to
and image on paper into the digital
process the cheques for recognising the magnetic encoding
form. It is an optical input device and
numbers printed at the bottom of cheque.
uses light as an input source to
convert an image into an electronic
form that can be stored on the
computer.
Scanner can be used for storing the documents in their original
form that can be modified and manipulated on.
The most common types of scanners are:
1. Hand-held Scanners They are very small which can be held
in a hand. These are less expensive and less wide. Hence, in order
to scan a single page image, multiple passes are required. But their
Optical Character Reader (OCR) handiness is a major advantage of handheld scanner.
2. Flatbed Scanners They are large and more expensive
OCR is a technique for the scanning of a printed page,
translating it and then using the OCR software to recognise the scanners that creates higher quality image.
image as ASCII text that is editable. It translates the array of dots These scanners have a flat surface on which the printed image to be
into text that the computer can interpret as words and letters. OCR scanned, is placed. (Similar to the way a page is placed on a
is widely used technique for acquiring the textual data from image. photocopier). Flatbed scanners can scan a page in a single pass.
It is used in many applications such as telephone bills, electricity
3. Drum Scanners They are medium- size scanners with a
bills, insurance premium, etc.
It uses letters or special characters that are especially shaped to be rolling drum. The sheet is fed through the scanners so that the drum
easy for the machines to read. The normal speed of OCR is 1500 to rolls over the entire sheet to be scanned (Just as the sheets are fed
3000 characters second. in a fax machine).
(11)
Microphone (MIC) Monitor
We can send input to the computer through a special manual input Monitor is also known by Visual Display Unit (VDU). The monitor
device called Microphone or is provided along with the computer to view the display result. A
mic. A mic converts the monitor is of kinds; monochrome display monitor is of two kinds;
received sound into computer's monochrome display monitor and Colour display monitor.
format, which is called
A monochrome display monitor uses only one colour to display text
Digitised Sound or Audio.
To convert a voice into digital and colour display monitor can display 256 colours at a time. An
form, you need an additional image on the monitor is created by a configuration of dots, also
hardware knows as Sound known as pixels.
Card. Sound is used most The clarity of image depends on three factors
often in multimedia, where we can make our presentations more (i) Resolution of Screen Resolution refers to the number of
attractive using recorded narration, music or sound effects. A pixels in horizontal and vertical direction. The resolution of
Microphone can be attached to a computer to record sound. monitor is higher when the pixels are closer together.
Now-a-days microphones are also being used with speech (ii) Dot Pitch It refers to the diagonal distance between two
recognition software. This means that we do not have to type, coloured pixels. The smaller the dot pitch, the better the
rather just have to speak and the spoken words appear in our
resolution.
document.
(iii) Refresh Rate It is the number by which per second. The
Webcam (Web Camara) higher the refresh rate, the more solid the image looks on
Webcam is a video capturing device. Webcam is a digital camera
attached to computers and can be used for video conferencing or the screen.
online chatting etc. A camera connected to a computer allows The popular type of monitors are
anyone, those are connected to the internet, to view either a still 1. Cathode Ray Tube (CRT)
picture or motion video of a user or other object. It is a typical rectangular shaped
monitor that you see on a desktop
computer. The CRT works in a same way
as a television. It works by moving an
electron beam back and forth across the
back of the screen. A screen covered with
a fine layer of phosphorescent elements,
called phosphores.
2. LCD (Liquid Crystal Display)
Now-a-days, webcams are either embedded into the display with These screens are used in laptops
laptop computers or connected via USB or firewire port or wi-fi to and notebook sized PCs. A special type of
the computer. liquid is sandwiched between two plates It
Important Points is a thin, flat and light weight screen made
Mouse was invented by Dauglas Engelbert at Stanford up of any number of colour or
Research Centre in 1963. monochrome pixels arranged in front of a
Optical mouse was introduced by Microsoft in 1999. It uses a light source.
light beam to detect the movement. 3. LED (Liquid/Light Emitted
A joystick allows movements in all directions ( 360 ). Diode)
Scanner Stores images in both gray scale and colour mode. LED is an electronic device that emits
Drag and drop refers to the action of clicking and holding light when electrical current is passed
down the mouse button while moving the mouse and realing through it. LEDs usually produces red
it. light, but today's LEDs can produce RGB
OCR technology is being developed for greater accurate (Red, Green and Blue) light, and white
recognition and is known as Intelligent Character light as well.
Recognition (ICR).
Output Devices 4. 3-D Monitors
An output device is any piece of computer hardware equipment 3-D Monitor is a television that conveys
used to communicate the results of data processing carried out by depth perception to the viewer. 3-D
an information processing to the outside world. The output may be describes an image that provides the
viewed on a computer monitor, heard through speakers, printed on perception of length. When 3-D images are
printers, etc. made interactive then user feel involved
The output produced by the output devices can be of the following with the scene and this experience is called
forms. Virtual reality.
(12)
TFT (Thin Film Transistor) 4. Drum Printer An old line printer technology that uses
TFT and Active-Matrix LCD (AMLCD) is a liquid crystal formed character images around a cylindrical drum as its
Display (LCD). With active-matrix displays. Each pixel is printing mechanism.
controlled by one to four transistors that can make the screen faster.
brighter, more colourful than passive-matrix and capable of being
viewed at different angles. Because of this improved technology,
active-matrix screens are often more expensive but better quality
than a passive matrix display.
When the desired character for the selected position rotated
Printers around the hammer line, the hammer hit the paper from behind and
A Printer Prints information and data from the computer onto pushed it into the ribbon and onto the character.
a paper. It can print documents in colour as well as in black and Non-Impact Printers
white. The quality of a printer is determined by the clarity of a A non-impact Printer use electrostatic chemicals and ink-jet
print. Printers are divided into two basic categories; impact and technologies. They do not hit or impact a ribbon to print. It can
produce high quality graphics and often a wide variety of fonts than
non-impact printers.
impact printers.
The speed of a printer is measured in Characters Per Second (CPS), There are following types of non-impact printer
Lines Per Minute (LPM) and pages Per Minute (PPM). The faster 1. Inkjet Printer An inkjet printer is a printer that places
the printing, the more expensive the printer. extremely small droplets of ink onto paper to create an image.
Printer resolution is a numerical measure of print quality that is
measured in Dots Per lnch (DPI).
Impact printers
This type of printer strikes paper and ribbon together to form
a character, like a typewriter. Impact printer can print a character or
an entire line at a time. They uses pins or hammers that pressed an It sprays ink onto paper to form characters. It prints high quality
inked ribbon against the paper. They are less expensive, fast and text and graphics.
2. Thermal Printer It uses heat on chemically treated paper to
can make multiple copies with multipart paper.
form characters. Fax machines that use rolls of paper are also
There are three types of impact printer of thermal printers type. It is relatively slow, expensive and
1. Dot Matrix It forms characters requires special paper.
using rows of pins which impact the 3. Laser Printer A laser printer provides the highest quality text
and images for personal computer. They can print in different
ribbon on top of the paper therefore also
fonts that is, type styles and sizes.
called pin printers.
Dot matrix printers Print one
character at a time. It prints characters and
images as a pattern of dots.
These printers are slow, noisy and are not commonly used for
personal computers anymore. Many dot matrix printers are bi-
directional, that is they can print the characters from either
direction, i.e., left or right. Laser printer uses laser beam on to photo-sensitive surface for
2. Daisy Wheel In daisy wheel printers, characters are fully printing. The laser printer can print 5-24 pages of text per minute
formed on the petals, like typewriter keys. Daisy wheel and their resolution ranges from 400 to 1200 dpi. It prints high
quality graphics. It is more expensive than impact printers.
printers produce high resolution output and are more reliable
4. Electromagnetic Printer Electrographic or electro-
than dot matrix. photographic printers are very fast printers and they fall under the
3. Line Printer It is a high-speed category of page printers.
printer capable of Printing an entire line They can produce documents at a speed of over 20000 lines per
of text at once instead of one or more minute i.e., more than 250 pages per minute. The electrographic
characters at a time. These are impact technology have developed from the paper copier technology.
5. Electrostatic Printer Electrostatic printers are generally used
shaped character printers which print one
for large format Printing. They are favoured by large printing shops
line at a time. Print quality of line printer
because of their ability to print fast, making low cost.
is not high.
(13)
Plotter It is an output device, which is used to project information from a
A plotter is an output device that uses a pen, pencil, marker or computer onto a large screen, so it can be viewed by a large group
other writing tool for making vector graphics. A plotter is a of people simultaneously.
special kind of output channel, like a printer, that produces images Projectors are widely used for classroom training or conference
on paper, They are mainly used to produce large drawings or holes with a large audience. It provides a temporary output display.
images such as construction plans, blueprints for mechanical
There are mainly two types of projectors
objects, AUTOCAD, CAD/CAM etc.
1. LCD Projector It contains three separate LCD glass panels,
one each for red, green, and blue components of the image signal
being fed into the projector.
2. DLP Projector It stands for digital light processing. It uses a
chip that has thousands of tiny mirrors, each representing a single
pixel. It is widely used to handle video images.
The refresh rate of monitor is measured in Hertz (Hz).
Plotters usually come in two designs
1. Flat Bed Plotter These plotters are of small size to be kept on Input / Output (I/O) Ports
table with restriction of paper size. The peripheral devices can be connected to computer in several
2. Drum Plotter These plotters are of big size using rolls of ways. Input / Output ports are the external interfaces that are used
paper of unlimited length.
to connect input and output devices like printer, modem and
Speaker joystick to computer. The I/O devices are connected to the
computer via the serial and parallel ports, Universal Serial Bus
(USB), firewire ports, etc.
1. Parallel Port
A parallel port is an interface for connecting eight or more data
wires. The data flows through the eight wires simultaneously.
They can transmit eight bits of data in parallel. As result,
It is an output device that receives sound in the form of electric parallel ports provide high speed data transmission Parallel port
current. It needs a sound card connected to a CPU, that generates is used to connect printer to the computer.
sound via a card. These are used for listening music, for being 2. Serial Port
audible in seminars during presentations, etc. Computer speakers A serial port transmits one bit of data through a single wire.
are the speakers which are attached internally or externally to a Since, data is transmitted serially as single bits. Serial ports
computer system.
provide slow speed data transmission. Serial port is used to
Headphones connect external modems, plotters, barcode reader, etc.
3. Universal Serial Bus (USB)
It is a common and popular external port available with
computers. Normally, two to four USB ports are provided on a
PC. USB also has the plug and play feature, which allows
devices ready to be run. A single USB port can support
connection of upto 127 devices.
Headphones are a pair of small loudspeakers or less 4. Firewire
commonly a single speaker, held close to a user's ears and It is used to connect audio and video multimedia devices like
connected to a signal source such as an audio amplifier, radio CD video camera. It is an expensive technology used for large data
player or portable media player. They are also known as stereo
movement. Hard disk drive and new DVD drives connect
phones, headsets or cans.
through firewire. It has data transfer rate of upto 400 MB/sec.
Projector
(14)
The computer memory is one of the most important elements Access Time The access time is the time required between the
in a computer system. It stores data and instructions required desired modes for a read or write operation till the data is made
during the processing of data and output results. Storage may be available or written at the desired location.
required for a limited period of time, instantly or for an extended Physical Characteristics In this respect, the devices can be
period of time. Computer memory refers to the electronic holding categorised into four main categories electronic, magnetic,
place for instructions and data where the processor can read mechanical and optical.
quickly. Permanence of Storage Its permanence is high for future use in
Memory Hierarchy magnetic materials.
The memory is characterised on the basis of two key factors; Primary Memory (Main Memory)
capacity and access time. The lesser the access time, the faster is The memory unit that communicates directly with the CPU is
speed of memory. called main memory. The primary memory allows the computer to
The computer uses a hierarchy of memory that is organised in a store data for immediate manipulation and to keep track of what is
manner to enable the fastest speed and largest capacity of memory currently being processed. It is volatile in nature, it means that
as shown in figure. when the power is turned off, the contents of the primary memory
are lost forever.
Primary memory further classified in two categories
CPU
1. Random Access Memory (RAM)
It is also known as read/write memory, that allows CPU to read as
Register well as write data and instructions into it.
RAM is used for the temporary storage of input data, output data
and intermediate results. RAM is a microchip implemented using
Cache semiconductors.
There are two categories of RAM
Main Memory (i) Dynamic RAM (DRAM) It is made up of memory cells where
each cell is composed of one capacitor and one transistor. DRAM
must be refreshed continually to store information. The refresh
Magnetic Disk operation occurs automatically thousands of times per second.
DRAM is slower, less-expensive and occupies less space on the
computer's motherboard.
Magnetic Tape
(ii) Static RAM (SRAM) It retains the data as long as power is
provided to the memory chip. It needs not be 'refreshed'
Memory Hierarchy
periodically. SRAM uses multiple transistors for each memory cell.
Types of Memory It does not use capacitor. SRAM is often used as cache memory
In general, the memory is classified into two categories due to its high speed. SRAM is more expensive than DRAM.
1. Primary memory or Main memory Extended Data Output Dynamic RAM (EDODRAM)
2. Secondary memory or Auxiliary memory It is a type of RAM chip it is used to improve the time to read
Parameters of Memory content from memory and enhance the method of access.
The following terms are most commonly used for identifying
Cache Memory
comparative behaviour of various memory devices and
Cache memory is a storage buffer that stores the data that is used
technologies
more often. Temporarily and makes them available to CPU at a fast
Storage Capacity It is representative of the size of the memory.
rate. The data and instructions that are required during the
The capacity of internal memory and main memory can be
processing of data are brought from the secondary storage devices
expressed in terms of number of words or bytes.
Access Modes A memory is comprised of various memory and stored in the RAM. for processing, it is required that the data
locations. The information from these memory locations can be and instructions are accessed from the RAM and stored in the
accessed randomly. Sequentially and directly. registers.
(15)
Cache memory is a very high speed memory placed in between Solid State Disks Pen/Flash Drive
RAM and CPU. Cache memory increases the speed of Hard Disk Drive (HDD)
processing. It is a non-volatile, random access digital data storage device. It is a
Cache memory is very expensive, so it is smaller in size. data storage device used for storing and retrieving digital
information using rotating disks (platters) coated with magnetic
Generally. Computers have cache memory of size 256 KB to 2 MB.
material. All programs of a computer are installed in hard disk.
2. Read Only Memory (ROM)
It is also known as non-volatile memory or permanent storage. It
does not lose its content when the power is switched off. ROM has
only read capability, no write capability, ROM can have data and
instructions written to it only one time. Once a ROM chip is
programmed at the time of manufacturing, it cannot be
reprogrammed or rewritten.
There are three categories of ROM
(i) Programmable ROM (PROM) It is also non-volatile in
nature. Once a PROM has been programmed, its contents can never It consists of a spindle that hold non-magnetic flat circular disks,
be changed. It is a one-time programmable device. PROMs are called Platters, which hold the recorded data. Each platter requires
manufactured blank and can be programmed at buffer, final test or two read/write heads, that is used to write and real the information
in system. These types of memories are found in video game from a platter. All the red/write heads are attached to a single
consoles, mobile phones, implantable medical devices and high access arm so that they cannot move independently.
definition multimedia interfaces. PROM was invented by Wen The information is recorded in bands; each band of information is
Tsing chow in 1956. called a track. Each platter has the same number of tracks and a
(ii) Erasable Programmable ROM (EPROM) track location that cuts across all platters is called a cylinder. The
It is similar to PROM, but it can be erased by exposure to strong track are divided into pie-shaped sections known as sectors.
ultraviolet light, then rewritten. So, it is also known as Ultraviolet Floppy Disk
Erasable Programmable ROM (UVEPROM). It is used to store data but it can store small amount of data and it is
EPROM was invented by Dov Frobman of Intel in 1971. slower to access than hard disks. It is round in shape and a thin
(iii) Electrically Erasable Programmable ROM (EEPROM) plastic disk coated with iron oxide. Data is retrieving or recorded
It is similar to EPROM, but it can be erased electrically, then on the surface of the disk through a slot on the envelope. Floppy
rewritten electrically and the burning process is reversible by disks is removable from the drive. Floppy disk is available in three
exposure to electric pulses. 1 1
Important Points sizes; 8 inch, 5 inch and 3 inch.
Flash memory is a kind of semiconductor-based non-volatile 4 2
rewritable memory, used in digital camera, mobile phone, 1
5 inch floppy disk has a capacity of 1.2 MB.
printer, etc. 4
Virtual memory is a technique that allows the execution of 1
processes that are not completely in main memory. One major 3 inch floppy disk has a capacity of 1.44 MB
advantage of this scheme is that programs can be larger than 4
main memory. This technique frees programmers from the Compact Disk (CD)
concerns of memory storage limitations. It is the most popular and the least expensive type of optical disk. A
Buffer is a temporary physical storage used to hold data CD is capable of being used as a data storage device along with
during execution of process from one place to another. storing of digital audio. The files are stored on this particular
contiguous sectors.
Secondary Memory (Auxiliary Memory/Storage Devices)
CDs are categorised into three main types
The secondary memory stores much larger amounts of data and
1. CD-ROM (Compact Disk-Read Only Memory)
information for extended periods of time. Data in secondary
memory cannot be processed directly by the CPU, it must first be It is designed to store computer data in the form of text and
copied into primary storage i.e., RAM. Secondary storage is used to graphics, as well as hi-fi stereo sound. It is capable of storing large
store data and programs when they are not being processed. It is amounts of data-up to 1GB, although the most common storage
capacity is 700 MB.
also non-volatile in nature. Due to this, the data remain in the
Data is recorded permanently on the surface of the optical disk
secondary storage as long as it is not overwritten or deleted by the
user. It is a permanent storage i.e., device. through the use of laser. The recorded content cannot be changed or
Secondary memory devices include erased by users. It is also called WORM (Write Once Read Many)
disk.
Magnetic Disks Hard Disk Drive
2. CD-R (Compact Disk-Recordable)
Floppy Disk
Data can be written on these disks only once. The data once stored
Memory Stick
Optical Disks CD in these disks cannot be erased.
DVD
Blue-ray Disk
(16)
3. CD-RW (Compact Disk-Rewritable) It is an erasable disk.
CD_RW is used to write data multiple times on a disk by the use of
format feature.
Digital Video Disk (DVD)
DVD is also known as Super Density Disk (SD). A DVD is an
optical disk storage media manufactured by Philips, Sony, Toshiba
and panasonic in 1995.
DVDs offer higher storage capacity than Compact disks while Today, flash drives are available in various storage capacities as
having the same dimensions. 256MB, 512MB, 1GB, 4GB, 16GB upto 64GB. They are widely
used as an easy and small medium to transfer and store the
Depending upon the disk type, DVD can store several Gigabytes of
information from their computer.
data (4.7GB-17.08 GB). DVDs are primarily used to store music or
6 movies and can be played back on your television or the Memory Stick
computer too. They are not rewritable media. It is a USB-based flash memory drive. A family of flash memory
DVDs come in three varieties cards from sony designed for digital storage in cameras,
camcorders and other handheld devices. Capacity of memory stick
1. DVD-ROM
varies from 4 MB to 256 GB.
(Digital Video Disk-Read Only Memory)
2. DVD-R (DVD-Recordable)
3. DVD-RW (DVD-rewritable)
Blue-ray Disk
Blue-ray disk (official abbreviation BD) is an optical disk
storage medium designed to recapture the data normally in DVD
format. Blue-ray disks contain 25GB (23.31GB) per layer space.
The name Blue-ray disk refers to the blue laser used to read the
disk, which allows information to be stored at a greater density than
the longer-wavelength red used in DVDs. Magnetic Tape
Magnetic tapes are made of a plastic film-type material coated
with magnetic materials to store data permanently. Data can be read
as well as recorded. It is usually 12.5 mm to 25 mm wide and 500
m to 1200 m long. These can store data in a sequential manner.
The data stored in magnetic tape is in the form of tiny segments of
magnetised and demagnetised portion on the surface of the
material. Magnetic tapes are durable, can be written, erased and re-
written. Magnetic types hold the maximum data, which can be
accessed sequentially.
Types of Magnetic Tape
Blue-ray can hold almost 5 times more data than a single layer There are mainly two tape of magnetic tape as Tape Reel and Tape
DVD. Cassette. Each of the type has its own requirements. The older
The variations in the formats are as follows systems designed for networks use reel-to-reel tapes. Newer
systems use cassettes holding more data than that of the huge reels.
1. BD-ROM (Red only) for pre-recorded content
Important Points
2. BD-R (Recordable) for PC data storage
The rate at which data is written to disk or read from disk is
3. BD-RW (Rewritable) for PC data storage
called data transfer rate.
4. D-RE (Rewritable) for HDTV recording
Track It records data bits as tiny magnetic spots.
Pen/Thumb Drive Sector It holds a block of data that is read or written at one
Pen drive is also known as flash drive. A flash drive is a data time.
storage device that consists of flash memory (key memory) with a Root directory, is the main folder of disk. It contains
portable USB (Universal Serial Bus) interface. USB flash drives are information about all folders on the disk.
typically removable, rewritable and much smaller than a floppy Hard disk is a fixed Disk i.e., cannot be removed from the
disk. A USB flash drive is same as the size of thumb that plugs into drive.
a USB port on the computer.
(17)
Secondary Memory Device and their 1024 PB = 1 EB (Exa Byte)
1024 EB = 1ZB (Zetta Byte)
storage Method and Capacity 1024 ZB = 1 YB (Yotta Byte)
Storage Method Capacity 1024 YB = 1 (Bronto Byte)
Secondary Memory
1024 Brontobyte = 1 (Geop Byte)
Device
Bit is the smallest memory measurement unit.
Magnetic 1.2 MB
Floppy Disk (5.25 Geop Byte is the highest memory measurement unit.
inch)
Floppy Disk (3.5inch) Magnetic 1.44 MB
Memory Measurement
When you use a RAM, ROM, Floppy disk or hard disk, the data is
measured using some unit. In computer terminology, they are called
Nibble. Bit, Byte, Kilobyte, Megabyte, Gigabyte, etc.
Bit it stands for a Binary Digit which is either o or1.
Byte (B) A byte is approximately one character (letter 'a' number '1'
symbol '?' etc...) Also, a group of 8 bits is called a byte.
Nibble 4 bits make one nibble.
Kilobyte (KB) In memory, a group of 1024 bytes is called a
kilobyte.
Megabyte (MB) IN memory, a group of 1024 kilobytes is called a
megabyte. It is sometimes used, less precisely, to mean 1bytes or
1000 KB.
Gigabyte (GB) In memory, a group of 1024 megabytes is called a
gigabyte. It is sometimes used, less precisely, to mean 1 billion
bytes or 1000 MB. Now, a number of companies manufacture
memory chips in terms of megabyte such as 64 MB, 128 MB, 1.2
GB etc.
Terabyte (TB) A terabyte, exactly 2 40 bytes ( 210 GB), is
approximately a trillion ( 1012 ) bytes.
Petabyte (PB) One petabyte of information equal to 1000 terabytes
or 1015 bytes.
Exabyte (EB) One exabyte of information equal to 1000 petabytes
or 1018 bytes.
Zettabyte (ZB) One zettabyte of information equal to 1000
exabytes or 10 21 bytes.
Units of computer memory measurements
1 Bit = Binary Digit
8 Bits = 1 Byte = 2 Nibble
1024 Bytes = 1 KB (Kilo Byte)
1024 KB = 1 MB (Mega Byte)
1024 MB = 1 GB (Giga Byte)
1024 GB = 1TB (Tera Byte)
1024 TB = 1 PB (Peta Byte)
(18)
As we know that computer understands the binary language 4. Hexadecimal Number System
(0s and 1s) for the data representation. All kinds of data, i.e.,
It provides us with a shorthand method of working with binary
alphabets, numbers symbols, sound data or video are represented in
numbers. There are 16 unique digits available in this system. These
terms of 0s and 1s. There are two basic types of data, which are
stored and processed by computers, namely characters and are 0 to 9 and A to F, where A denotes 10, B denotes 11....... F
numbers. The characters include letters and special symbols while denotes 15. It is also known as Base 16 system or simply Hex. So,
numbers include digits from 0 to 9. each position of the hexadecimal number represents a successive
Number System power of 16.
A number systems defines a set of values that is used to represent A list of the first several powers of 16 is
quantity. Digital computers internally use the binary number system
16 161 16, 162 256,
to represent data and perform arithmetic calculations.
Types of Number System 163 4096, 164 65536
The number system generally used by a computer are as follows
1. Binary Number System Representation of Hexadecimal Number
The binary number system is very efficient for computers, but not Decimal Hexadecimal Binary Digits
for humans. It contains two unique digits 0s and 1s. It is also known
0 0 0000
as Base 2 system.
The binary numbers 0 and 1 called a bit. The computer always 1 1 0001
calculates input in binary form e.g., (10101) 2 2 0010
Here, 2 represents base of binary number. 2
A list of the first several power of 2 is 3 3 0011
2 1, 21 2, 22 4, 23 8, 24 16, 25 32 4 4 0100
26 64, 27 128, 28 256, 29 512, 5 5 0101
210 1024, 211 2048 6 6 0110
7 7 0111
Gottfried Wilhelm leibniz developed the binary system. 8 1000
2. Decimal Number System 8
It consists of ten digits from 0 to 9. These digits can be used to 9 9 1001
represent any numeric value. It is also known as Base 10 system or A 1010
10
positional number system.
11 B 1011
3. Octal Number System
It consists of 8 digits from 0 to 7. It is also known as Base 8 system. 12 C 1100
Each position of the octal number represents a successive power of D 1101
eight. 13
A list of the first several powers of 8 is 14 E 1110
8 8, 82 64, 83 512, 84 4096, 15 F 1111
85 32768
Conversion between the Number System
Representation of Octal Numbers in Binary Different types of conversion between the number system are
Octal Binary Digits discussed below.
000 Decimal to Binary
0
Step1 Divide the given number by 2.
1 001
Step 2 Note the quotient and remainder.
2 010
Remainder should be 0 or 1.
3 011 Step 3 If quotient 0, then divide the quotient by 2 and again
4 100 back to step 2. If quotient = 0, then stop the process.
101 Step 4 First remainder is called as Least Significant Bit (LSB)
5
and last remainder is called as Most significant Bit
6 110
(MSB).
7 111 Step 5 Arrange all remainders from MSB or LSB.
(19)
Example (43)10 (?)2
Remainder
2 43 1 LSB
2 21 1
2 10 0 Example (11110101111011)2 (?)16
2 5 1
Then, (11110101111011)2 (3D7 B)16
2 2 0
2 1 1 MSB Hexadecimal to Binary
0 For this type of conversion, convert each hexadecimal digit to 4 bit
Then, binary equivalent.
(43)10 (101011) 2
Binary to Decimal
Step 1 Multiply the all binary digits by powers of 2. Example (BA81)16 (?)2
Step 2 The power for integral part will be positive and for Decimal to Octal
fractional part will be negative.
Step 1 Divide the given number by 8.
Step 3 add the all multiplying digits.
Step 2 Note the quotient and remainder. Digits of remainder will
Example (1101.10) 2 (?)10
be o to 7.
(1101.10)2 1 2 1 2 0 2 1 2
3 2 1 Step 3 If quotient 0, then again divide the quotient by 8 and go
back to step 2.
1 21 0 22
Step 4 If quotient - 0, then stop the process.
8 4 0 1 0.5 0 13.5 Step 5 Write each remainder from left to right starting from
Then, (1101.10)2 (13.5)10 MSD.
Binary to Octal Example (98647)10 (?)8
Step 1 Make the group three bits from right to left. 8 97647 7 LSD
Step 2 Now, convert each group to decimal number 8 12205 5
Example (110110100) 2 (?)8 8 1525 5
8 190 6
8 23 7
8 2 2 MSD
Then, 0
(110110100)2 (664)8
Then, (98647)10 (276557)8
Octal to Binary
Convert every digit of the number from octal to binary in the group
Octal to Decimal
Step 1 Multiply each digit of octal number with power of 8.
of three bits. Step 2 These powers should be positive for integral part and
Example (1034.5)8 (?)2 negative for fractional part.
Step 3 Add the all multiplying digits.
Example (327.4)8 (?)10
(327.4)8 3 82 2 81 7 8o 4 81
4
3 64 2 8 7 1
Then, (1034.5)8 (001000011100.101)2 8
192 167 0.5 215.5
Binary to Hexadecimal
Step 1 Start making the group of four bits each from right to left Then, (327.4)8 (215.5)10
from the given binary number Decimal to Hexadecimal
Step 1 Dividen the given number by 16.
Step 2 Now, each group will be converted to decimal number. Step 2 Note the quotient and remainder . Digits of remainder will
be 0 to 9 or A to F.
(20)
Step 3 If quotient 0, then again divide the quotient by 16 and go Then, (AC2D)16 (126055)8
back to step 2.
Step 4 If quotient = 0 or less than 16, then stop the process. Computer Codes
Step 5 Write each remainder from left to right starting from In computer, any characters like alphabet, diagram any special
MSD.
character is represented by collection of 1 and o in a unique coded
Example (929987)10 (?)16
16 929987 3 LSD pattern computers, the code is made up of fixed size groups of
16 58124 12 C binary positions.
16 3632 0 The binary coding schemes that are most commonly used are as
16 227 3 follows.
16 14 14 MSD
0 Binary Coded Decimal (BCD)
Binary coded decimal is a number system where four bits are used
Then, (929987)10 (E30C)16 to represent each decimal digits. BCD is a method of using binary
Hexadecimal to Decimal digits to represent the decimal digits (0-9). In BCD system, there is
Step 1 Multiply each digit of hexadecimal number with power of no limit on size of a number.
16. American Standard Code for Information
Step 2 These power should be positive for integral part and
negative for fractional part. Interchange (ASCII)
Step 3 Add the all multiplying digits. ASCII characters are represented by seven bits. There are standard
Example (BC9.8)16 (?)10 character codes used to store data so that it may be used by other
(BC9.8)16 software programs. The standard ASCII codes defines 128
B 162 C 161 9 16o 8 161 character codes (from 0 to 127). Basically, ASCII codes are of two
8 types ASCII-7 and ASCII-8.
11 256 12 16 9 1 ASCII-7, is a 7bit standard ASCII code. It allows 2 7 = 128
16
2816 192 9 0.5 3017.5 unique symbols.
Then, (BC9.8)16 (3017.5)10 ASCII-8, is a extended versions of ASCII-7. It is an 8-bits
code, allows 28 = 256 unique symbols of character.
Octal to Hexadecimal
Step 1 Convert the each digit of Octal number to binary number. Binary Coded Decimal (BCD)
Step 2 Again, convert each binary digit to hexadecimal number. In EBCDIC, characters are represented by eight bits. These codes
Example (7632)8 (?)16 store information which is readable by other computers. It allows
28 = 256 combinations of bits.
Important Points
BCD system was developed by IBM corporation.
UNICODE, uses 16-bits to represent a symbol in the data.
It represents any non- English character, scientific symbol
in any language like Chineses, Japanese.
Sign bit is the most significant bit i.e., used to represent
Then, (7632)8 (F9A)16 the sign of a number that could be either + ve or - ve.
The negative numbers in a binary system can be
Hexadecimal to Octal represented using 1's complement, 2's complement or
Step 1 Convert the each digit of hexadecimal number to binary signed magnitude representations.
number.
Step 2 Again, convert each binary digit to octal number.
Example (AC2D)16 (?)8
(21)
A computer system consists of hardware, the electronic resources and provides various support services. Some common
devices capable of computing and manipulating information, and examples of system management programs are operating system,
software that carries out predefined instructions to complete a device driver and system utilities.
given task. The combination of physical equipment (hardware) and Operating System
logical instructions (software) gives power and versatility to the It consists of programs, which controls, coordinates and supervises
modern computing systems. the activities of the various components of a computer system. Its
Software function is to provide link between the computer hardware and the
user.
Software is a collection of computer programs and related
It performs all internal management functions (disk access, memory
data that provide the instructions for telling a computer what to do
management, task scheduling and user interfacing) and ensures
and how to do it. A software is a interface between user and
systematic functioning of a computer system. It provides an
computer. It is a set of instructions, programs that are used to give
environment to run the programs. e.g., MS-DOS, Window
command to hardware. It is responsible for controlling, integrating
XP/2000/98, Unix Linux, etc.
and managing the hardware components of a computer system and
The operating system performs the following functions
for accomplishing specific tasks.
(i) It recognises input from keyboard, sends output to the
Types of Software
display screen.
Software can be divided into two major categories.
(ii) It makes sure that programs running at the same time do
1. System software 2. Application software
not interfere with each other.
(iii) It is also reponsible for security, ensuring that
unauthorized users do not access the system.
BIOS
The Basic input/Output system (BIOS) is commonly known as
System BIOS. The BIOS controls various electronic components
within the main computer system. The initial function of the BIOS
is to initialize system devices such as the RAM. hard disk,
CD/DVD drive, Video display card and other hardwares. The BIOS
sets the machine hardware into a known state that helps the
operating system to configure the hardware components. This
process is known as Booting Up.
Device Drivers
A software, which is written with the objective of making a device
functional when it is connected to the computer is called device
System Software driver. It is a system software that acts like an interface between the
System software consists of several programs, which are device and the user. Every device, whether it is a printer, monitor,
directly responsible for controlling, integrating and managing the mouse or keyboard has a driver program associated with if for its
individual hardware components of a computer system. proper functioning.
It also provides the interface between the user and component of Device drivers are a set of instructions that introduce our PC to
the computer. The purpose of system software is to insulate the a hardware device.
applications programmer as much as possible from the detail of the Device drivers are not independent programs, they assists and
particular complex computer being used. are assisted by the operating system for the proper functioning.
Depending on the functionality, the system software can be further System Utilities
divided into two major categories; system management program These programs perform tasks related to the maintenance of
and developing software. the computer system. These are the packages which are loaded into
1. System Management Program computer during time of installation of operating system. They are
It includes an integrated system of programs, which manages the used to support, enhance, expand and secure existing programs and
data in the computer system.
operations of the processor, controls input/output, manages storage
System utility mainly consists of the following functions
(22)
(i) Disk Compression It increases the amount of information A programming language is a primary interface of a programmer
that can be stored on a hard disk by compressing all information with a computer. A programming language is an artificial language
stored on a hard disk. This utility works automatically and the user to express computation that can be performed by a computer.
does not need to be aware of its existence. Each language has its own syntax i.e., the set of specific rules and
(ii) Disk Fragmenters It detects computer files whose expresses the logical steps of an algorithm. Programming languages
contents are broken across several locations on the hard disk and are divided into two categories; Low Level Language (LLL) and
moves the fragments to one location to increase efficiency. It can High Level Language (HLL).
be used to rearrange files and unused space on your hard disk. (i) Low Level Language(LLL) Low level language is
(iii) Backup Utilities It can make a copy of all information divided into two parts
stored on a disk and restore either the entire disk or selected files. (a) Machine Language It is sometimes, referred to as
(iv) Disk Cleaners It is used to find files that have not been machine code or object code. It is a collection of binary digits or
used for a long time. This utility also serves to increase the speed of bits that computer reads and interprets.
a slow computer. (b) Assembly Language It is used to interface with computer
(v) Anti-virus It is the utility which is used to scan computer hardware. It uses instructed commands as substitutions for numbers
for viruses and prevent the computer system files from being allowing human to read the code more easily than binary. It uses
corrupt. english-like representation to write a program.
2. Developing Software Medium Level Language
It is a software which provides service required for the It serves as the bridge between raw hardware and programming
development and execution of application software. The layer of a computer system. It is designed to improve the translated
programming languages, language translator, loader, linker are code before it is executed by the processor
required for the application software development. (ii) High Level Language (HLL) It is machine independent
Programming Languages language and uses translator. It is also called source code. Some
commonly used high level languages are C, BASIC, FORTRAN,
PASCAL, etc.
Some high level languages and their application areas:-
Language Year Developer Application Nature
LISP (List Processing) 1958 John McCarthy at the Artificial intelligence Compiled and
Massachusetts Institute interpreted
of Technology (MIT)
Pascal 1970 Niklaus wirth Education Compiled
(23)
Language Translator ii Presentation Software
Presentation is the practice of showing and explaining the
A language translator helps in converting programming languages
contents of a topic to an audience or learner visually. People, in a
to machine language. The translated program is called the object
variety of settings and situations, use presentation software to make
code. There are three different kinds of language translator their presentations more interesting and professional. e.g.,
(i) Assembler It is used to convert the assembly language into marketing managers use presentation graphics to present new
machine language (i.e., 0 or 1). This language consists of marketing strategies to their superiors. Sales people use this
mnemonic codes which are difficult to learn and is machine software to demonstrate products and encourage customers to make
dependent. purchases. Students use it to create high quality class presentations.
e.g., Microsoft power point, Corel, Corel Presentations, Lotus
(ii) Compiler It is used to convert the source code (written in
Freelance Graphics etc.
high level language) into machine language. Compiler eads
whole source code at a time and trap the errors and inform to iii Electronic Spreadsheets
programmer. For each high level language, the machine Spreadsheet applications (sometimes referred to simply as
requires a separate compiler. spreadsheets ) are the computer programs that accepts data in a
(iii) Interpreter This language processor converts a high level tabular form and allow you to create and manipulate spreadsheets
electronically. In Spreadsheet Applications, each value exists in a
language program into machine language by converting it
cell. You can define what type of data is in each cell and how
line-by-line. If there is any error in any line during execution,
different cells depend on one another. The relationship between
it will report it at the same time and cannot resume until the cells are called Formulas and the names of the cells are called
error is rectified. Labels. e.g., Microsoft Excel, Corel Quattro Pro, Lotus 1-2-3 etc.
Linker iv Database Management System (DBMS)
A linker is a system program that links together several object A DBMS (Database Management System) refers to the software
modules and libraries to form a single and coherent program that is responsible for sorting, maintaining utilizing a database. It
(executable). The main purpose of linker is used to determine the enables a user to define, create and maintain the database and
memory locations that code from each module will occupy and provide controlled access on it. A database is a collection of
relates its instruction by adjusting absolute references. integrated data stored together to serve multiple applications.
Loader Database management system provide several additional features
as,
Loader is a kind of system software, which is responsible for
loading and relocation of the executable program in the main (a) Remove data redundancy
memory. It is a part of operating system that brings an executable (b) Elimination of data inconsistency
file residing on disk into memory and starts its execution process. (c) Data sharing
Application Software (d) Data integration
Application software is a computer software designed to help (e) Data security
the user to perform singular or multiple tasks. It is a set of e.g., Microsoft Access, Corel Paradox, Lotus Approach etc.
instructions or program designed for specific uses or applications, V. Desktop Publishing Software
that enable the user to interact with a computer. Application
Desktop publishing software is a tool for graphic designers
software are also called the end-user programs. These programs do
and non-designers to create visual communications for professional
the real work for users. or desktop printing as well as for online or on screen electronic
There are two types application software publishing.
1. General Purpose Software Complete Desktop Publishing (DTP) involves the combination of
General purpose softwares are designed to perform general tasks. type setting (choosing fonts and the text layout), graphic design,
page layout (how it all fits on the page) and printing the document.
i. Word Processing Software e.g., Quark Express, Adobe Page Maker, 3B2, Corel Draw, Corel
A word processor is a software program capable of creating, Venture Illustrator etc.
storing and printing of documents. Word processors have the ability vi. Graphics Software
to create a document and make changes anywhere in the document. Graphics software or image editing software is an application
This document can also be saved for modification later on or be program or collection of programs that enables a person to
opened on any other computer using the same word processor. manipulate visual images on a computer system. Most graphics
Today, the word processor is one of the most frequently used software have the ability to import and export one or more graphics
programs or online services used on a computer system. e.g., file formats. Typical graphics software enables data to be plotted as
Microsoft Word, Wordperfect (Windows only), Apple Works (Mac line chart, bar chart and pie chart. e.g., Adobe Photoshop, Pizap,
only), Open Office.org etc. Microsoft Publishes etc.
(25)
vii. Multimedia Software vi Accounting Software
Multimedia includes a combination of text, audio, still Accounting software is an application software that records
images, animation, video or interactivity content forms. The term is and processes accounting transactions within functional modules
used in contrast to media which uses only rudimentary computer such as accounts payable, accounts receivable, payroll and trial
display such as text only or traditional forms of printed or hand balance. It works as an accounting information system.
produced material. There are several types of accounting software as follows
2. Specific Purpose Software (a) Accounts Payable Software
Specific purpose software are designed to perform specific (b) Bank Reconciliation Software
tasks. This type of application software generally has one purpose
(c) Budget Management Software, etc.
to execute.
vii HR Management System
Some of the specific purpose application software are described
below It refers to the system and processes at the intersection between
human resource management (HRM) and information technology.
1. Inventory Management System and Purchasing System The function of HR department is generally administrative and
and Purchasing System common to all organisations. e.g., Effective Staff, Cezanne HR etc.
It is an attempt to balance inventory needs and requirement to viii. Attendance System
minimize total cost, resulting from obtaining and holding an
inventory. Inventory is a list goods and materials availabe in a Attendance system is an application software designed to track
stock. Inventory management system is generally used in and optimize the presence of a person/student in an organisation or
departmental stores or in an organisation to keep the records of the school. Now-a-days, attendance system can be integrated with
stock of all the physical resources. customer's existing time/attendance recording devices like
Biometrics/ Access cards Attendance management can be done in
Modern inventory management systems must have the ability to two ways
track sales and available inventory, communicate with suppliers in
near real-time, recieve and incorporate other data, such as sessional (a) Biometric Integration
demand. (b) Manually Attendance Integration
ii. Payroll Managements System ix. Billing System
Payroll management system is used by all modern It refers to the software that is used to perform the billing process.
organisations to encompass every employee of the organisation It handles the tracking of labled products and services delivered to a
who receives a regular wage or other compensation. All different customer or set of customers. e.g., Billing Manager, Billing
payment methods are calculated by the payroll software and the Tracker, KBilling etc.
appropriate paychecks are issued. Important Points
iii Hotel Management System Visual Basic is an interpreted language.
Hotel management system refers to the management Firmware it is a combination of software and hardware. e.g.,
techniques used in the hotel sector. These can include hotel ROMs, PROMs and EPROMs.
administration, accounts, billing, marketing, housekeeping, front Freeware It is commonly used for copyrighted software that is
office or front desk. given away for free by its owner.
Pseudocode It is not a programming language. but simply an
iv Reservation System informal way of describing a program. It does not follow any
A reservation system or central reservation system (CRS) is a syntax strictly. In other words, we can say that pseudocode is
computerized system used to store and retrieve information and an outline of a program, written in a form that can easily be
conduct transactions related to air travel, hotels, car rental, or other converted into real programming statements.
activities. It is an application software which is commonly seen at Control structures It is a statement or block of statements in a
railway reservation offices, this software helps the concerned programming language that determines the control flow or
department to automatically check the availability of the seats or sequence of execution of other instructions or statements.
berths of any train and any particular date with incomparable speed. Looping Looping is a control structure which is used in a
program to execute a particular set of statements repeatedly.
v. Report Card Generator
It is an application software which is commonly used in
schools by the examination department to prepare and generate the
report cards of the students. It performs all possible mathematical
calculations and checks whether a student can be promoted to the
next class or not. It can also be used to calculate the classwise
ranking of a student.
(26)
Operating system is the first and foremost system software that computer (PC) is single user OS. They are designed to manage one
manages the hardware and application software's. e.g., compiler, task at a time.
linker, DBMS, etc. An operating system performs basic tasks such
e.g., MS-DOS, WINDOWS 9X.
as controlling input and output devices, processing of instructions,
controlling and allocating memory, managing files. It mainly Multi-User Operating System
provides an environment to run the software and serves services to This operating system allows multiple users to access a computer
computer hardware. system concurrently. It is used in computer networks that allow
Definition of Operating System (OS) same data and applications to be accessed by multiple users at the
same time.
An operating system consists of a set of programs, which controls,
coordinates and supervises the activities of the various components e.g., UNIX, LINUX, WINDOWS 2000/7
of a computer system. UNIX was originally developed by ken Thompson in 1969.
In other words, ''An operating system is a program which acts as an It was the first operating system written in C language.
interface between a user and hardware''. e.g., UNIX, MS-DOS,
Multi-Tasking Operating System
WINDOWS 98/2000/XP.
In Multi-tasking operating system, more than one processes can be
The interface enables a user to utilise hardware resources very
efficiently. Operating system is an organised collection or executed concurrently. It also allows the user to switch between the
intergrated set of specialised programs that controls the overall running applications.
operations of a computer. It is a program that must be on any e.g., LINUX, UNIX, WINDOWS 95.
computer for proper booting.
Multi-tasking OS can be classified as
Objectives of OS
Preemptive Multi-Tasking OS
Generally. operating system accomplish three major goals
Preemptive multi-tasking is a type of multi-tasking that allows that
To Hide Details of Hardware by creating abstraction computer programs to share operating system and underlying
Here, abstraction term refers to the software that hides lower level hardware resources, It divides their overall operating and
details and provides a set of higher level functions. computing time between processes , and the switching of resources
Booting between different processes occurs through predefined criteria.
Booting is a boot strapping process which starts the operating e.g., OS/2, window 95/NT.
system when a computer is switched on and the operating
system gets loaded from hard disk to main memory. Cooperative Multi-Tasking OS
There are two types of booting It is the simplest from of multi-tasking. In it, each program can
Cold Booting When a computer is turned on after it, has been control the CPU for as long as it need it. If a program is not using
completely shutdown. the CPU, however it can allow another Program to use it
Warm Booting When a computer is restarted by pressing the temporarily.
combination of Ctr + Alt + Del key or by restart button.
e.g., Mac OS, MS Window 3-x, etc
To Allocate Resources to Processes Real Time Operating System (RTOS)
An operating system is mainly responsible for controlling the
The main objective of real time operating system is their quick and
resources as per process requirement.
predictable response to events than any other operating system.
Provide a Pleasant and Effective User Interface Real time operating systems are designed to respond to an event
As we know, operating system acts like a interface between user within a predetermined time. It must have preemptive kernels to
and hardware that encompass activities of multiple processes on execute a program.
networks of computers.
The processing is done with a time constraint. They are often used
Types of Operating System in applications such as flight reservation system, military
There are different types of operating systems available, which applications, etc. These types of operating system increase the
require different types of hardware to run on. availability and reliability of the system.
The operating systems are classified as e.g., Lynx OS, HP-RT.
Single User Operating System There are two types of real time operating system
Single user operating system is a type of operating system which
allows only one user at a time. Operating system for personal
(27)
1. Hard Real Time OS Hard RTOS is referred to as an 2. Symbian
operating system that can absolutely guarantee a maximum It is the OS developed and sold by Symbian Ltd. Symbian is an
time for the operations, it performs. open-source mobile OS designed for smart phones. It has been used
2. Soft Real Time OS Soft RTOS is referred to as an operating by many major handset manufacturers including Motorola, Nokia,
system that cannot absolutely guarantee a maximum time for Samsung, Sony, etc.
the operations, it performs. 3. iOS
It is the popular mobile operating system developed by Apple
Embedded Operating System
incorporation. This operating system is commonly used in Apple
An embedded operating system refers to the operating system iPhone, iPod Touch, ipad and second-generation Apple TV.
that is self contained in the device and resident in the Read Only 4. BlackBerry
Memory (ROM) This is the most secure operating system used in leading smart
These are able to operate with a limited number of resources, These phones developed by blackberry company. It also supports WAP
are very compact and extremely efficient by design. They are used 1.2. The latest version of blackberry operating system is
in appliances like microwaves, washing machines, traffic control Blackberry 10.
system, etc.
Multi-Programming Operating System
e.g., WINDOWS CE, Minix-3, etc. In multi-programming OS, more than one program reside
Batch Processing Operating System in the main memory. When one job is unable to execute because of
I/O operation, it switches to another program and allows that
In batch processing operating system, a number of jobs are program to run.
put together and executed as a group. This operating system is
responsible for scheduling the jobs according to priority and the Time Sharing Operating System
resource required. It is the type of OS which do not interact with In time sharing, a small amount of the time is allocated for
the computer directly. the processing simultaneously. e.g., Mac OS. The time sharing
The batch processing system works in two steps operating system allows multiple programs to simultaneously share
the computer resources. Time sharing operating system provides
The first step deals with the storage of processes in the form scheduling to each process to be run on.
of a batch (collection) is known as accumulation of jobs.
The jobs are processed in a sequential manner within the Server-Site Operating System
batch. This working stage is known as periodical Server-Site Operating Systems are also known as Network
processing of jobs. Operating systems (NOS). It is a complete set of files, tasks and job
e.g., UNIX management.
Distributed Batch Operating System It enables the usage of Overlays (Tags) that perform functions and
Distributed means data can be stored and processed on make websites dynamic in nature.
multiple locations. Distributed OS use multiple central processor to Some of the server site operating systems are
serve multiple real-time applications. A distributed OS manages a 1. Linux
group of independent computers and makes them appear to be a It is an open source computer operating
single computer. Data processing jobs are distributed among the system designed primarily for the PC but also
processors according to their efficiency. The processors available for a wide range of other systems.
communicate with each other through various communication lines One of the most valued advantage of linux
(such as high-speed buses or telephone lines). over the other platforms lies within the high security levels it
Mobile Operating System ensures (It is virus free operating system). Linux is a clone of
A mobile Os is an OS that operates on Smart Phones, UNIX.
Tablets and Digital Mobile devices. 2. UNIX
A mobile OS controls a mobile device and its design supports It is an operating system which was first
wireless communication and different types of mobile applications. developed in the 1960s. UNIX systems have
It has built-in support for mobile multimedia formats. Graphical User Interface (GUI) similar to
Mobile operating system be classified as different Microsoft Windows which provides
1. Android an easy to use platform.
Android was introduced by Google in 2007. Android is an OS It supports fully multi-tasking with protected memory which means
based on Linux. It is basically designed for touch screen mobile multiple users can run multiple programs at the same time without
devices like Tablets, smart phones, etc. The latest version of interfering with each other or crashing the system.
Android is Kitkat launched in January, 2014.
(28)
3. Solaris 1. Speed
It is a UNIX operating system The speed of different I/O devices are generally different
originally developed by sun Microsystems from one another. e.g., the speed of a printer is very fast as
in 1993. compared to keyboard which is based on OS processing.
It is a standard UNIX operating system 2. Unit of Transfer
Data can be transferred in the form of units such as characters,
with excellent performance, system management and network
words. bytes, blocks or records from one component to another and
functions. Solaris 11 OS is the latest version with some extra
it is maintained by an operating system.
features like software packaging, network virtualization, server 3. Data Representation
virtualization, storage, security of hardware. Data can be represented in different forms on different I/O
Functions of Operating System devices. OS manages the data representation of I/O devices. Some
Operating system is a large and complex software consisting devices use ASCII codes whereas others use BCD or EBCDIC
codes.
of several components. It is responsible for managing all the
4. Sharing
resources attached to a computer system. A device can be either a shareable device or non-shareable
Following functions are provided by an operating system to the device. OS works as an interface between the devices and
convenience of users application programs and decides which device shares their task
Process Management via which application program. e.g., disk drives (floppies, hard
disks) and magnetic drums are shareable devices because they can
'A process is a program under execution'. It is the task which
handle successive requests from different programs or processes.
is currently being executed by the processor (CPU). The operating Card readers and keyboards are the examples of non-shareable
system handles the creation and deletion of processes and also devices.
manages the scheduling and synchronisation of process. 5. Buffering
Process management is the important part of an operating system Buffering is a technique of storing data in memory area called
which enables the activities of planning, monitoring and buffers while data is being transferred between two devices or
performance of a process. between a device and an application program which is switched by
A process would require certain system resources such as processor OS permission.
time, main memory, files, I/O devices, etc. These all activities are It can be done because of three reasons as follows
handled by the operating system as a process manager. (i) It manages the speed mismatch between the sender and the
reciever.
Memory Management (ii) It maintains a balance between the devices.
Memory management of an operating system takes care of (iii) It supports copy semantics for an I/O application.
allocation and de-allocation of main memory to various processes. 6. Spooling
Managing the primary memory, sharing and minimising memory Spooling is the process of sending data to a spool (or buffers or
temporary storage area) of the computer's memory. OS maintains
access time are the basic goals of the memory management. It also the spooling of data by adding an address location with every
keeps track of memory usage. The performance of memory element in the memory.
management is crucial for the performance of entire system. spooling is useful because different devices access data at different
File Management rates. The most common type of spooling is print spooling in
which print jobs are sent to a print buffer before being transmitted
File management module of operating system manages files to the printer.
held on various storage devices as well as transfers file from one Storage Management
storage device to another. The file management includes creating It is the process which describes the technologies and processes
and deleting both files and directories, allocating space for files, used by an organisation to improve the performance of their data
keeping back-up, securing, easy access to files. resources. The data or files will be stored into the computers in
such a way that an authorised user can easily access and use it. It is
Input/Output Management a wide process which includes virtualization, replication, security,
The Input/Output management module of the OS coordinates compression of data, traffic analysis, etc. Storage management can
and assigns different input and output devices, namely terminals, help to improve the data center's performance.
printers, disk drives, tape drives etc. It controls all I/O devices, User Interface
keeps track of I/O requests, issues commands to these devices and An operating system provides an interface between the computer
takes measures which would ensure that data is transmitted user and the hardware. The user interface is one of the most
efficiently and correctly to and from I/O devices. important parts of any operating system because it allows users to
easily access and communicate with applications and the hardware.
It hides the complexity of interfacing to devices from user program The user can interact with the computer by using mainly two kinds
and the user. of interfaces.
I/O management includes following features
(29)
Character User Interface (CUI) (CU) Structure of DOS
A character User interface (CUI) or Command-Line Interface
(CLI), is a mechanism of interacting with a computer system or There are four essential programs associated with the control of
software by typing commands to perform specific tasks. Programs computer and the way it interacts with them.
with character user interface are generally easier to automate via 1. The Boot Record It includes loading the operating system into
scripting. CUI only use text types one after another just as main memory. It is the main program of MS-DOS.
commands used in MS-DOS.
Ms-Dos The basic Input/Output System (BIOS.SYS) It provides an
interface between the hardware and programs.
(Microsoft-Disk Operating System)
The DOS OS was developed by Microsoft in 1980 for micro 3. The MSDOS. SYS Program It is a collection of program
computers. MS-DOS was the first operating system that ran on PC routines and data tables that provides high level programs such
developed by IBM corporation in 1981. as application programs.
DOS is a single user operating system. It is the only
4. The Command. COM Program
operating system, which can be loaded in the main memory
of the computer using a single disk. It provides a standard set of commands that gives users access
Some Important Terms to file management, configuration and miscellaneous functions.
Kernel It is the core of the operating system it supports the
process by providing a path to the peripheral devices. It plays Internal Commands
a vital role in modern OS. There are two kinds of DOS commands, Internal and External.
Shell It is the program which interprets commands given by Internal commands are automatically loaded into main memory
the user. when the booting process gets completed.
System Calls It provides an interface between process and the
e.g., DATE, TIME, VER, VOL, DIR, COPY, etc.
operating system.
System Programs They are bundles of useful system calls. Command Description
Fork It is a system call of operating system. It is used to
create a new process. ASSOC Change file extension associations
Thread Thread is a task that runs with other tasks CALL Call one batch program from another
concurrently within the same process. It is also known as
lightweight process. The single thread allows the process to CD Change directory- move to a specific
perform only one task at a time. In a multi-tasking operating folder
system. a process may contain several threads, running at the
CLS Clear the screen
same time within the same process.
Deadlock A process which is not executing due to any COPY Copy one or more files to another
waiting event. location
Multiprocessing This is the capability of a computer under
DATE Display or set the date
which two or more programs can be simultaneously
processed by the use of multiple CPU's. This is also called DEL Delete one or more files
parallel processing.
It does not prefer virtual memory for data storage. DIR Display a list of files and folders
(30)
IF Conditionally perform a command Command Description
$t 12:20:06:92 Display current time label Change the lable of a disk drive
$d tue 09-07-2007 Display current date MEM.EXE Display the amount of used and free
memory on the computer,
$v msdos version Show dos version
6.2 number MODE.COM Configure a printer, serial port, or
display adapter sets the keyboard
$g > Greater than sign repeat rate redirects printer output from
(allow direct output) a parallel port to a serial port, prepare,
select, refresh or display the numbers
$l < Less than sign of the character sets (code pages) for
parallel printers or the key-board and
External Command screen and display the status of all the
External commands require external files to be loaded in the devices installed on the computer.
computer to run.
MOVE.EXE move files and renames folders.
e.g., checking disk, comparing disk, formatting, etc.
SCANDISK.EXE The real-mode version of scan Disk.
External Commands of DOS
(31)
START. EXE Enable you to set various parameters management, multitasking and support for various peripheral
for running windows programs from devices.
the DOS prompt. BOSS (Bharat Operating System Solutions)
BOSS GNU/Linux developed by C-DAC (Centre for
SYS. COM Create a bootable disk by copying
Development of Advanced Computing) derived from Debian
Window 98's system files and
for enhancing the use of Free/Open source software
COMMAND. COM to the disk.
throughout the India.
XCOPY.EXE The extended copy command. Apple Macintosh
XCOPY32.EXE (Windows 95 and window 98 only) Most recent versions of OS are based on Unix because it has a
The 32-bit version of XCOPY good graphical interface. So, it is both stable (does not crash
often or have as many software problems as other systems
Configuration of DOS may have) and easy to learn. One drawback of this system is
that it can only be run on Apple produced products.
Config. Sys, Auto exec. Bat provide the environment, to computer,
to set commands.
Extensions Meaning
.EXE Executable files
(32)
Microsoft windows stands for 'Microsoft-wide Interactive It supports Graphical User Interface (GUI) operating system.
Network Development for Office Work Solution.' Microsoft It supports FAT32 file system, multi-display, Web TV and the
windows is a series of graphical interface operating system Internet Explorer.
developed, marked and sold by Microsoft. It enables you to work Windows 98
with a wide variety of programs on your computer, often It was developed in 1998. This was produced
simultaneously. in two main versions. The first Window 98
Windows version was plagued with programming errors but
the Windows 98 Second Edition came out later was much better
Windows is an operating system program that communicates with many errors resolved.
your instructions to the actual computer hardware and displays the Features
results. Windows is a rectangular area which provides an It supports Internet Explorer 4.01.
environment to run many programs. It is based on Graphical User
It has Intel 80486DX2/66 MHz or a compatible CPU with a
Interface (GUI).
Math coprocessor (Pentium Processor recommended).
It consists of Windows 98 was the first operating system to use the Windows
Windows Explorer It is a tool that allows you to browse, view, Driver Model (WDM).
copy and delete files. It acts as a file manager that provides detailed It includes a FAT32 converter utility for converting FAT16
information about your files, folders and drives. drives of FAT32 without formatting the partition.
Active Window It refers to the abject that is being currently It also supports many peripherals devices (MX, USB DVD).
used or display on the desktop. Windows ME (Millennium Edition)
An upgraded version from Windows 98,
Upgradation It is the process of enhancing the features of any
launched in 2000, but it has been historically
object. It changes or replaces the characteristics of any windows to
plagued with programming errors which
any other advanced version of windows.
may be frustrating for home users.
Versions Of Ms-Windows Features
It is designed for single CPU or SMP
Windows NT (New Technology)
32-Bit Intel X86 computer.
A version of Windows introduced in 1993 It supports 8 or more CPU (the maximum 32 CPU)
and made specifically for businesses offering The minimum internal storage is 64MB and maximum 4GB.
better control over workstation capabilities to It introduced the Multilingual User Interface (MUI).
help network administrators.
Windows XP (eXperience)
Features Windows XP is an OS produced by Microsoft for use on
It is based on High Level Language. personal computers. Microsoft released Windows XP on 25th
It is able to run on DOS, Window 3 and Win 32 applications. October, 2001.
It has a 32-bit Windows applications. Some version of Windows XP are
It uses preemptive multitasking. 1. Windows XP Home edition is a version made for home
It provides higher stability and security. users.
2. Windows XP Professional is made for business users.
Windows 95
Features
Windows 95 is a graphical user interface
It has various users with independent profiles.
based operating system. It was released on 24th
It has 3.75 GB free space on the disk and that the total size of
August, 1995 by Microsoft.
the disk is 19.5 GB.
Features
At least 64 megabytes (MB) of RAM internal storage.
It is a mixed of 16-bit/32-bit Windows operating system.
It is a consumer-oriented.
(33)
It provides 1.5 gigabytes (GB) of available space on the hard WIN.IN is used to stores all the setting of windows.
disk. To restart the computer, Ctrl+Alt+Del key is used.
It includes video adapter and monitor with super UGA To shut down the computer, we need to click start and
(800600) or higher resolution. then select shut down key.
It supports sound card, CD-ROM, DVD-ROM drive, speakers Windows 8.1 is the updated version of windows 8.
or headphones.
Structure of Window
Windows Vista
It is an operating system by Microsoft for
use on personal computers, including home and
business desktops, laptops, tablet PCs and
media center PCs. It was released worldwide on 30th, January,
2007.
Features
It can be installed Pentium 4, higher, 512 MB RAM, 32 MB
video card and 40 GB hard disk.
It enhanceds the features of visual style.
Windows 7
Window 7 is an Os released by Microsoft Desktop
on 22nd July, 2009. It is an upgrade of When we turn on the computer then the first screen, which
Windows XP and Vista. It does not include will be display on the computer is known as desktop.
some standard applications like Windows Movie Maker, Windows
The background image of desktop is called as wallpaper. A small
Mail, etc.
arrow or blinking symbol, moving on the desktop, is called as
Features
cursor.
It supports 64-Bit processor.
Desktop contains start menu, task bar, icons, gadgets, etc. Some
It provides touch, speech, handwriting recognition.
important components of desktop are organised as.
It supports a playback of media in MP4, MOV.
It includes Windows Bio- metric Framework. Icons
It provides multiple firewall.
A small image of a program, shown on the desktop with
Windows 8 program name is known as icon. Icons are small pictures that
It is a part of Windows NT represent files, folders, programs and other items. Icons contain the
family as personal OS developed by program that is selected.
Microsoft and released on 1st August, 2012.
Users can open these programs by double click on the icons. If
Features
you move an icon on your desktop, this is called 'dragging' and
It is a 64-bit logical CPU.
after releasing it, it will be called 'dropping.'
It supports 64 TB Dynamic Virtual Disk.
It provides 3D Graphic supports and Internet Explorer-10. Some of the icons displayed on desktop are as follows
It enhanceds feature of NTML-5 is assumed. 1. My Computer It is the most important icon on the desktop,
It is a based on Microsoft's 'Metro design language'. which contains icons of document folders, hard disk's partition,
It supports new emerging technology like USB 3.0, cloud each removable disk drive. e.g., floppy disk, CD, DVD etc. It
computing. also allows the users to access drives, printers removable disk
Important Points or other system applications. It is the main part of our windows
The term Windows was introduced by Microsoft company where all the programs and software backup is stored.
in 1983. 2. Recycle Bin It is also a form of icon on the desktop, which
Object Linking and Embedding contains deleted file, folders or shortcuts. It we delete a file or
(OLE) It provides a compare documents combining folder then it goes to recycle bin. From recycle bin, we can
information from several different application programs restore the deleted file or folders on proper place. It is like a
such as graphs, charts, music, video, clipart etc. dustbin of the computer.
(34)
Once the recycle bin is empty then we won't be able to restore 1. File Menu like new, open, close, save as, send and print, etc.
those files and folder again. 2. Edit Menu like undo, cut, copy, paste, clear, etc.
3. Shortcut It is an icon on the desktop that provides a user with 3. View Menu consists of normal, toolbar, print layout, etc.
immediate access to a program or file. 4. Insert Menu contains options like header, footer, etc.
5. Help Menu for tutorials or helpful informations.
4. My Document This folder contains all your files which you
have created and saved in it. This folder contains all types of Gadgets
file format word processor, spreadsheet, power point, image, Windows contains mini-programs called gadgets which offer
etc. information at a glance and provide easy access to frequently used
It can open in three ways tools. Some of the gadgets that come in Window 7 are calendar,
clock, weather, feed headlines, slide show and picture puzzle.
By clicking on start button and then select My Document.
By clicking on My Computer and then select My Dialogue Box
Document. When we perform certain operation on your document and
By creating shortcut on desktop. click on the close button without save your document then box will
5. My Network Places It consists of all network
appear on the screen. Generally, dialogue box contains message,
connections, which make possible to connect the computer
close button, yes button, no button and cancel button. It is mainly
from internet.
used to suggest that what to do next.
Task Bar The three buttons are associated with most windows opened
Initially, the long horizontal box at the bottom of our desktop is
in your operating systems at the top right corner. They are as
known as task bar. When we open a program or any window, then
follows
the button of that program will be displayed on the task bar.
Close Button
Generally, task bar consists of three parts
At the right edge of the title bar, there is a square containing a
1. Start Button When we click on the start button then the start
menu will appear.
X called the close button. It helps to terminate the running
2. Middle Section It contains the button of programs or program.
documents which are currently being used by the user. Minimise
3. Notification Area It is on the right end of the task bar, consists It reduces to window to a button on the task bar. It helps to
of clock-date and time, icons of certain programs, computer shrink the window.
setting, sound and icons of removable disk i.e., pen drive. Maximise
Start Menu It enlarges the window to occupy the whole desktop. It
The start menu is the main gateway of our computer's program expand the size of window fit to the desktop.
such as file, folder and settings. Start menu also contains most The three buttons are associated with most windows opened
recently opened program. in your operating system at the top right corner. They are as
Start menu have following options follows.
1. Programs It contains a list of installed programs. When we
Main Programs Inside the Windows
installed any software it automatically shows in this menu.
1. Notepad
2. Favourites It is a collection of book marked web pages.
It is a text editor program. It is most commonly used for the
3. Document It shows a list of most recently opened documents.
edit or view text files. The file format of notepad files is .txt
4. Setting It includes control panel, printers, taskbar, etc.
5. Find It searches for specific files or folders. (text document).
Log off Provide a password to protect from unauthorised To open
access. Click on start menu All programs Accessories Notepad
7 Turn off (Shut down) To shut down or restart the system. 2. Wordpad
End menu is also access from start menu. It is an another text editor program including some few features
Menu Bar such as complex formatting, pictures, etc. The extension of
Each window contains its own menu which performs specific wordpad file is . rtf (rich text format).
actions when they have been selected. To open
The menu bar consists of several options Click on start menu All programs Accessories Wordpad
(35)
3. Paint Videos Library It is used to organise and arrange your
It is a drawing program, used to create drawing or edit digital videos, such as clips, recording etc. By default it is stored
pictures (images). The extension of paint file is .png (png in My Videos folder.
image). Important Points
To open Standby It drops the computer into a very low power
Click on start menu All programs Accessories Paint mode.
4. Calculator Hibernate It is a feature of computer operating systems
It performs addition, subtraction, multiplication, division, etc. where the contents of RAM are written to non-volatile
To open storage such as hard disk before powering of the
Click on start menu All programs Accessories calculator computer.
5. Media player
Windows media player is an easy-to-use interface to play
digital media files, organise digital media collection, burn CDs,
etc,
6. Game
Windows have some games like Chess titans, Hearts, Freecell,
Mahjong titans, Purble place, Solitaire, Spider solitaire, etc.
To open
Click on start menu All programs Games
Files
Files are the collection of data stored on auxiliary storage
medium. In windows, files are the basic unit to store data. The
name given to a file or document by the user is called file name.
Filename is used to identify the type of file format. All files are
represented by the file extension.
ZIP File ZIP stands for Zone information protocol This is an
application that allows for the compression of application files.
Executable File When a file contains Instruction that can be
carried out by the computer. It is often called an executable file.
Extension of executable file is .exe.
Folders
It is a container you can use to store files. Folders can also store
other folder i.e., sub-folders. You can create any number of sub-
folders and each can hold any number of files and additional sub-
folders.
You can have libraries to access your files and folders and arrange
them in different ways
Document Library It is used to organise and arrange
word processing documents, spreads-heets presentation
and other text related files. It is used to store in My
Document folder.
Pictures Library It is used to organise and arrange your
digital pictures. By default it is saved in the Pictures
folders.
Music Library It is used to organise and arrange your
digital music, such as songs etc. By default it is saved to
the Music Library folder.
(36)
Microsoft Office was developed by Microsoft Inc in 1980s. It Insert tab consists of pages (cover page, blank page,
is a collection of software, based on specific purpose and mainly page break), illustrations (picture, clip art, shapes, smart
used in office work. You can start any software of MS office by art, chart), links (hyperlink), header and footer, page
using the start button. number, text (text box, date and time, object).
There are five packages of MS Office Page layout tab consists of themes, page set-up, page
1. MS Word (Word Processing Software) set-up background, paragraph.
2. MS Excel (Tabular Data Formatting Software) Review tab consists of spelling and grammar, thesaurus,
3. MS Powerpoint (Presentation Software) translate, compare and protect document.
4. MS Access (Database Management Software) View tab consists of print layout, full screen layout,
5. MS Outlook (E-mail Client) macros, split etc.
Microsoft Word Ruler It appears on the top of the document window. It allows to
MS-Word is a word processing application and is one of the format the horizontal or vertical alignment of text in a document.
most important and widely used application found on computer. There are two types of rulers
Word processing software is mainly used for the creation of text Horizontal ruler indicates the width of the document
based documents. It provides tools for composing, editing, and is used to set left and right margin.
formatting and printing of documents smaller than 45K. The Vertical ruler indicates the height of the document and
document can be a poster, report, letter, brochure, web page, is used to set top and bottom margins.
newsletter, etc. Status Bar It displays the information such as page number,
e.g., Wordstar, Easy word, Notepad for Windows. current page, current template, column number and line number etc.
Start Ms-Word Work Area It is the rectangular area of the document window, you
use to type the text. It is also called as workspace.
To start MS-Word software, we need to
Cursor It is also called insertion pointer. It denotes the place where
Click Start All Programs Microsoft Office Microsoft
text, graphics or any other item would be placed when you type,
Office Word
overwrite or insert them.
Components of Microsoft Word
Title Bar It shows the name of the application and name of
the file. It consists of three buttons i.e.,
Minimise (reduces the window but word still active)
Restore (brings word window to the maximum original
size)
Close button (bring us out of word)
Standard Tool Bar It displays the symbol for the common
operation like open, print, save etc.
Formatting Tool Bar It displays the options which can be used to
format our document like font type, size of the font, bold/underline,
italicised, bullets alingment of the text etc.
Ribbon It is a set of tools and commands across the top of the
screen. It consists of a panel of commands which are organised into Shortcut Keys of MS-Word and their Descriptions
a set of tabs. Standard Toolbar
Tabs On the ribbon, it contains the buttons needed to edit Tool Name Shortcut Description
characters, text and layout. Ctrl + N Creates a new
New
Home tab consists of clipboard (cut, copy, paste), font document.
(size, colour, bold, italic/underline), paragraph
Ctrl + O or Ctrl + Opens an existing
(bullets/numbering, indent), styles, editing (find and Open
F12 document.
replace).
Alt + Ctrl + F2 Opens new document.
Ctrl + Shift +F6 Opens to another open
(37)
Microsoft word of cursor.
document. Ctrl + Backspace Deletes word to left of
Save Ctrl + S or Shift + Save the active cursor.
F12 document. Ctrl + End Moves the cursor to the
F12 Save as end of the document.
Ctrl + A Selects all contents of Ctrl + Home Moves the cursor to the
the page. beginning of the
Print Ctrl + P or Ctrl + Prints the active document.
Shift +12 document. Alt + Shift + D Insert the current date.
Print Preview Ctrl + F2 Displays full pages as Alt + Shift + T Insert the current time.
they are printed.
F7 Checks the spelling in Formatting Toolbar
Spelling
the active document. Tool Name Shortcut Description
F5 Open the find. replaced Style Ctrl + Shift + S Applies a style or
and go to window. records a style by
example.
Cut Ctrl + X Cuts the selection and Font Ctrl + Shift + F Changes the font of the
puts it on the clipboard. selection (like
Ctrl + C Copies the selection appearance and shape
Copy of letters, numbers to
and puts on the
special characters).
clipboard.
Font Size Ctrl + Shift + P Changes the font size
Paste Ctrl + V or Shift + Inserts the clipboard of the selections.
Insert contents at the Bold Ctrl + B Makes the selection
insertion point. bold.
Ctrl + Shift + C Copies the formatting Italic Ctrl + l Makes the selection
Format Painter italic.
of the selection to a
Underline Ctrl + U Formats the Selection
specified location.
with continuous
Undo Ctrl + Z Reverse certain
underline.
commands. Aligned Left Ctrl + L Aligns the paragraph at
Redo Ctrl + Z Reverse the action of right indent. (By
the Undo button. default)
Centre Ctrl + E Centres the paragraphs
Help Ctrl + Z Provides the help for
between the indents.
working on MS word. Aligned Right Ctrl + R Aligns the paragraph at
Ctrl + F Opens find box. right indent.
Ctrl + K Inserts link. Justify Ctrl + J Aligns the paragraph at
both right and left
Ctrl + Shift + * Views or hide non-
indent.
printing characters. Numbering Ctrl + J Creates a numbered list
Ctrl + <left arrow> Moves one word to the based on the current
left. defaults.
Bullets Ctrl + J Creates a bulleted list
Ctrl + <right Moves one word to the
based on the current
arrow> right. defaults.
Ctrl + <up arrow> Moves to the beginning Decrease Indent Paragraph Decreases or promotes
of the line or Indentation the selection of one
paragraph. level.
Increase Indent Paragraph Increases indent or
Ctrl + < down Moves to the end of the Indentation denotes the selection of
arrow> paragraph. one level.
Ctrl + Del Deletes word to right Borders Paragraph Shows or hide the
Indentation border.
(38)
Highlight Paragraph Highlights a selected To save a document, user has three common ways
Indentation piece of text in the 1. To click on save option from file menu.
chosen colour. 2. Select save button from standard toolbar.
Font colour Paragraph Selects and applies 3. Pressing Ctrl + S key.
Indentation font colour. Horizontal and Vertical Scroll Bars It enables one to move up
and down or left and right across the window. The horizontal scroll
Features of Microsoft Word bar is located above the status bar to back and forth the document.
MS-Word is the most popular word processing application The vertical scroll bar is located along the right side of the screen to
due to move up and down the document.
its user-friendly features as described below Page-Break It is a group of insert tab, where it define the page
Text Editing breaks in the document as per our choice and helps the printings of
It provides tremendous flexibility in terms of editing, adding the document accordingly.
and deleting text, modification of text content i.e., cut, copy and Auto-Spell-Check It is a toll in a word document which is used to
paste. remove spelling and grammatical mistakes in a document. If any
When, we cut any text in our document, then it will save in mistake is found then it also suggests corrections.
hard drive temporarily, till we paste it on any other place. Important Points
Format Text Ms-Word First released in 1983 under the name multi-Toll
It offers to modify the text in any of the available hundreds of word for Xenix System.
text designs, format text in various styles such as bold, italicised, Default name of new MS-Word is Document-1
underline etc. File format of MS-Word is .doc and docx.
Indentation In MS-Word, a default alignment for paragraph is centred.
It denotes the distance text boundaries and page margins. It
offers three types of indentation- positive, hanging and negative
Microsoft Excel
indent. An electronic spreadsheet is used for analysing, sharing and
Page Orientation managing information for accounting purpose performing
It facilitates selection of typed text printed or visible in mathematical calculations, budgeting, billing, etc. A spreadsheet is
horizontal view or vertical view on a specified size of the page. a matrix of rows and columns similar to an accounting ledger. The
Word offers portrait- vertically oriented and landscape- horizontally spreadsheet program also provides tools for creating graphs,
oriented. inserting pictures and chart, analysing the data etc.
Find and Replace Microsoft-Excel (MS-Excel), Coral Quattro pro, Snowball,
This feature allows flexibility and comfort to the user to Lotus-1-2-3, Apple Numbers are some of the spreadsheet software.
replace a text with a substituted text at all places. Start MS-Excel
Spell-Check MS-Excel is a fully menu-driven software and the commands
This facilitates automatic and manual checking of spelling are available as icons in various tabs and groups. To start MS-Excel
mistakes and also suggests a few possible alternate options for software, we need to
incorrect spelt words. Click Start All programs Microsoft Office Microsoft
Thesaurus Office Excel
It contains a comprehensive dictionary and thesaurus feature
offers synonym options for a word.
Bullets and Numbering
A list of bullets and numbering features used for tables, lists,
pages and tables of content. Bullets are arranged in unordered lists
and numbering are arranged in ordered lists.
Mail-Merge
Word provides a mail-merge of addresses of a large number
of recipients with a common text document.
Graphics
It provides the facility of incorporating drawings in the
documents which enhances their usefulness
Object Linking and Embedding (OLE)
It is a Program integration technology that is used to share
information between programs through objects. Objects save
entities like charts, equations, video clips, audio clips, pictures etc.
Save a Document When we create a new document, it will be
saved into the hard drive.
(39)
Basics of Spreadsheet Function Library It contains a library of functions (e.g.,
MS-Excel allows creation of spreadsheets. The basic terms of mathematical, logical, trigonometric etc), such as AND, IF
spreadsheet are LOOKUP, AVG, DATE etc.
A spreadsheet is a software tool that lets one enter, calculate, Formula Addressing The formula can have relative addressing,
manipulate and analyse set of numbers. The intersection of absolute addressing and mixed addressing.
each row and column is called cell. A cell is an individual Relative addressing to repeat the same formula for many
container for data. It may hold difficult cells, use the copy and paste command.
(a) Numbers (Constants) Absolute address to keep a certain position that is not
(b) Formulas (Mathematical equations) and relative to the new cell location use absolute positioning.
(c) Text (Labels) Mixed address is used to keep some part relative and
An array of cells is called a sheet or worksheet. A worksheet some absolute.
holds information presented in tabular row and column The Macros It is used to define a sequence of actions to perform
format with text that labels the data. on a document or multiple documents that can be executed again
A workbook is a document that contains one or more and again.
worksheet. Charts
A row is given a number that identifies it, starts from 1, 2, 3, Charts are the graphical and pictorial representation of worksheet
4, 5, ........ so on. data.
A column is given a letter that identifies it, starts from A ......
A chart consists of following components
Z, AA .......... AZ, BA, BB ........ BZ so on. X-Axis is a horizontal axis known as category axis.
A cell pointer is a cell-boundary that specifies which cell is Y-Axis is a vertical axis known as values axis.
active at that moment.
Data series is the set of values you want to plot in the chart. \
A formula is an equation that calculates the value to be
displayed. A formula must begin with equal to (=) sign. Components of a Chart
A cell address is used to specified the intersecting of row and
Chart Area This is the total region surrounding the chart.
column of the letter and number on worksheet.
Plot Area The area where data is plotted. The plot area is bounded
Components of Microsoft Excel by axes in a 2D- Chart whereas in 3D-Chart it is bounded by walls
The office Logo Button It is at the top left corner contains many and floor.
commands for the document such as New, Open, Save, as, Print Chart Title The descriptive text aimed at helping user identify the
and Close. chart.
The Ribbon It consists of a panel of commands which are Axis Title These are the titles given to three axis i.e., X, Y, Z.
organised into a set of tabs. Legend The legend helps to identify various plotted data series.
Tabs It contains the command such as Home, Insert, Page Gridlines These are horizontal and vertical lines which inserted in
Layout, Formulas, Data Review, View etc as well as any additional the chart to enhance its readability.
command that you may need. Data Label It provides additional information about a data marker.
Status Bar It displays information about the currently active Types of Charts
worksheet. It includes page number, view shortcuts, zoom slider, 1. Area Chart An area chart emphasises the magnitude of change
etc. over time.
Formula Bar It is located beneath the Ribbon. It is used to enter 2. Column Chart A column chart shows data changes over a
and edit worksheet data. It includes period of time of illustrates comparisons among items.
Name box displays the all reference or column and row 3. Bar Chart Bar chart illustrates comparisons among individual
location of the active cell. items. Categories are organised vertically and values
Functions are predefined formulas that perform horizontally.
calculations by using specific values, called arguments. 4. Line Chart Line chart shows trends in data at equal intervals.
Clipboard A clipboard group contains the cut, copy and paste It is useful for depicting the change in a value over period of
commands. time.
Alignment It is used to change alignment of the text in the cells- 5. Pie Chart Pie chart shows the proportional size of items that
vertical, horizontal alignment, indentation, wrap the text, shrink it
make up only one data series to the sum of the items.
to fit within the cell and merge multiple cells.
6. XY (Scatter) Chart XY chart shows the relationships among
Tables It is used to define a range of cell as a table for easy
the numeric values in several data series or plots two groups of
filtering and storing and create a pivote table or chart to arrange and
numbers as series of XY coordinates.
summarise the data.
(40)
Important Points Excel files.
Each new workbook created in Excel has three worksheets Create a formula to sum all of the
Alt + =
by default. above cells
Active cell a cell in which you are currently working.
Insert the value of the above cell
File Format or extension or Excel is .xlsx or .xls. Ctrl + '
into cell currently selected
Illustration group allows insertion of pictures, clip art, shapes
and smart art. Ctrl + Shift + ! Format number in comma format.
$ Sign locks the cells location to a fixed position. Stacked Format number in currency format.
Ctrl + Shift + $
Bar Column, shows the relationship of individual items to
Ctrl + Shift + # Format number in date format.
the whole.
Scatter Compares pairs of values. Ctrl + Shift + % Format number in percentage
Charts wizard. used to create charts in MS-Excel. format.
Embedded chart is a chart that is drawn on an existing sheet. Format number in time format.
Ctrl + Shift + @
Shortcut Keys of Ms-Excel and their Descriptions
Ctrl + Arrow key Move to next section of text.
Shortcut keys Description
Ctrl + Space Select entire column
F2 Edit the selected cell.
Shift + Space Select entire row
F5 Go to a specific cell. e.g., C6
Ctrl + Page Move between Excel worksheets in 3. Reports Allow printing of data, based on queries or tables
the same Excel document. created by the user
(41)
4. Forms Make it easy to enter data in the tables. A Form is Data Type Field length or Field size
an interface for adding and editing data. Text 0-255 characters
Start MS-Access
Memo 0-65535 characters
To start the MS-Access software, we need to
Click Start All programs Microsoft Office Microsoft Number 1, 2, 4 or 8 bytes
Office Access 2007 Date/Time 8 bytes
Currency 8 bytes
Auto Number 4 bytes
Yes/No 1 bit (0 or 1)
OLE object upto 1 GB
Hyperlink Each part contains 2048
characters
Field Length Field refers length or width to the maximum number
of characters that a field can contain.
Primary Key A field which is used to uniquely identify the records
in a table. The primary key cannot contain null value.
Validation Rule It is a condition that must be met before the data is
accepted into the database.
MS-Access View
Components of MS-Access You can create a table by two most popular ways
MS-Access stores data in its own format based on the Access Jet
Database View It shows the data in the database and also allows
Database Engine. Access supports some object-oriented techniques.
Templates It is a complete tracking application, forms, reports, you to enter and edit the data but not allow to change the database.
queries, macros and relationships. Design View It allows you to create or change the table and also set
MS-Access includes a collection of database templates, which are the keys.
described as
Filtering Data It enables to display only those records in a table
Assets it is used to create an assets database to keep track
that meet a specified filter criterion.
of assets, including assets details and owners.
Contacts It is used to create a contact database to manage Relationship It is an association between access tables or quarries
information about people. that use related fields. It is a link between tables and enables us to
Events It is used to create an events database for tracking accessed data from both tables simultaneously.
upcoming meeting, dealings etc.
Relationship can be divided in three categories;
Faculty It is used to create a faculty database to keep track
of information about contacts and education history. One-to-one, one-to-many and many-to-many.
Marketing Projects It is used to create a marketing Attributes Attributes can be defined as the characteristics of an
Projects database to track time-sensitive deliverable and entity to identify it uniquely. Such as student's attributes are
vemlor status for project. his Roll-No, Section, Name etc.
Students It is used to create students database to keep
information about your students including contacts, about Important Points
their guardians. File format of MS-Access is .accdb.
Elements of MS-Access Memo It allows long blocks of text, that use text formatting.
OLE Object It is an acronym for object linking embedding. It
In MS-Access, database holds five major elements for every can store objects such as a vide clip, a picture, word document
database operation
etc.
Field Name It is a label provided for a field that specifies the type Each character requires one byte for its storage.
of information contained in a particular field. Validation Text It appears if a validation rule is not satisfied.
Field Type/Data Type It specifies the type of data stored in the The Required field property Makes data entry compulsory
field such as textual data and numerical data or combination of so that the field cannot be left blank.
both. The default size of data type is 50 in MS-Access.
(42)
Shortcut Keys of MS-Access and their Common Tasks
Descriptions Working with database object Description
Shortcut Keys
Shortcut Keys Description Bold letters
Ctrl + B
Cltr + N Create a new database
Ctrl + I Italicise letters
Ctrl + O Open an existing database
Ctrl + U Underline letters
Alt + N Create a new database object
Alt + O Open database object Ctrl + F Find text
Ctrl + S Save a database object Ctrl + H Replace text
Ctrl + P Print the current or selected Refresh
object F5
Ctrl + C Copy the selected object F2 Rename
Ctrl + X Cut the selected object Select All
Ctrl + A
Ctrl + V Paste object Redo Last Action
Ctrl + Y
Delete Delete an object
Ctrl + Z Undo Last Action
Working with Tables Ctrl + W Close the active window
Shortcut Keys Description Open Microsoft Access help
Ctrl + Plus Sign (+) Add a new record F1
Ctrl + semicolon (;) Insert the current date Ctrl + Shift + A Sort Selected data in ascending
Ctrl + Shift + Colon (:) Insert the current time order
Ctrl + alt + Spacebar Insert the default value for a Sort selected data in
field Ctrl + Shift + Z
descending order
Ctrl + Apostrophe (') Insert the value from the
same field in the previous F7 Check spelling
record
Ctrl + A Select all records Microsoft PowerPoint
Ctrl + Minus sign (-) Delete the current record The application software that can create professional looking visual
Esc Undo changes made to the aids is called presentation graphics software. The Presentation
current field software is used for creation of the slides and to display the
Esc, Esc Undo changes made to the information in the form of presentation of slides.
current record
A presentation software provides tools like editor that allows
Navigation in a Table insertion and formatting of text and methods for inserting and
manipulating graphics images along with sound and visuals effect.
Shortcut keys Description
Tab Next field Start MS-PowerPoint
Shift + tab Previous field The MS-PowerPoint software for the windows operating system is
Page down Next screen installed on the computer.
To start the MS-PowerPoint software, we need to
Page up Previous screen
Click Start All programs Microsoft Office Microsoft
Ctrl + First record
Office PowerPoint
Ctrl + Last record
Next record Components of PowerPoint
Previous record Master It contains formatting and design elements common to
every slide in the presentation.
Design View Template It contains slide default setting for colours, fonts, bullet
Shortcut Keys Description types and graphics.
Transitions These are the effects that take place when you advance
Alt + D Open a database object in design
from one slide to the next.
view
Animations These are the sound and the movements that appear
Alt + Enter Display a property sheet in when a slide comes on the screen.
design view Title A descriptive heading identifying a slide.
Alt + V + P Open property sheet for the Subtitle A descriptive message or brief description of the slide
selected object in design view data. Subtitle emphasises the slide's central idea.
(43)
Drawing Objects Drawing objects include auto-shape (group of Esc End the slide show
ready-made shapes), curves, lines wordart etc. Select all items on the page
Ctrl + A
Clipart and Pictures Pictures and graphics available in the MS- or the active text box
Office suite.
Ctrl + B Applies bold to the selected
PowerPoint Views text
Normal It displays three panes that show the outline, the slide and
Ctrl + D Duplicates the selected object
an area into which you can enter speaker's notes.
Outline It displays only the text of the presentation in outline form, Ctrl + F Opens the find dialog box
allowing you to work easily with the context. Ctrl + G Opens the grids and guides
Notes Pages It is available from view menu. It enters and edits dialog box
speaker's notes for the presenter. Opens the replace dialog box
Ctrl + H
Slide Pane It is the work area where most of the editing is done.
Ctrl + I Applies italics to the selected
Media Clips These group is used to insert movie from a file, a CD
or clipboard. text
Header and Footers In MS-PowerPoint, header and footer are the Ctrl + M Inserts a new slide
part of insert tab. Header and footer is used to give the important Ctrl + N Opens a new blank
information about the slides. Header is applied on the top of the presentations
page and footer is applied on the bottom of the page. Header and Opens the open dialog box
Ctrl + O
footer are always applied on each slide.
Slide It shows the slide and its contents. PowerPoint has many Ctrl + T Opens the font dialog box
types of slides with different style and format. Some of them Ctrl + U Applies underlining to the
are selected text
Title slide Title and content Ctrl + V Paste
Section header Two contents Closes the presentation
Ctrl + W
Comparison Title only
Ctrl + Y Repeats the last command
Blank Content with Caption
entered
Picture with caption
Slide Sorter It displays the entire set of slides on screen, so that Home Move cursor to beginning of
you can check the order and completeness of the presentation current line of text
and also enable to view thumbnails of each slide. End Moves cursor to end of
Slide Show It displays the presentation on slide at a time in current line of text
sequence as an automatic slide show. Moves cursor in beginning of
Ctrl + Home
Important Points presentations
File format for the documents created is .pptx or .ppt..
Trigger is defined as an object or item that performs on the Ctrl + End Moves cursor to end of
slide when we click the mouse. presentation
The MS-PowerPoint can maximum zoom to 400% only. Shift + Click Select more than one slide in
In MS-PowerPoint, we can add many types of Image and a
sound Format such as .gif, bmp. .gif, .bmp, .png, .jpg, .giv, Each side presentation
.wav, .mid etc.
Shift + F1 Help
Shortcut Keys of Microsoft
PowerPoint and their Descriptions Microsoft Outlook
F5 View the slide show It is an E-mail client and personal and personal information
Selects all text from the manager that is available as a part of Microsoft Office suite.
Shift + Ctrl +
cursor to the Windows mobile devices are the version of MS Outlook, enables
start of the active text box users to synch-ronise their E-mails data to their smart phones.
Home
It can work with Microsoft exchange server and Microsoft share
Shift + Ctrl + Selects all text from the
cursor to the point server for multiple users in an organisation such as shared
mailboxes, calendars, exchange public folders, share point lists and
End end of the active text box
meeting schedules.
Spacebar or Click the mouse Move to next slide or next
animation
S Stop the show press S again
to restart the show
(44)
A database is a collection of logically related information in Field
an organised way so that it can be easily accessed, managed and A field is an area (within the record) reserved for a specific
updated. Some other operations can also be performed on database piece of data. e.g., customer number, customer name, street
such as adding, updating and deleting data. A database could be address, city, state phone number, current address etc. Field of a
simple as a single text file with a list of names or it could be table is also known as column.
complex as a large bunch of text files including some data. Record
In database, data can be entered through input devices such as A record is the collection of data items of all the fields
keyboard, mouse, touch screen, etc. some examples of database are pertaining to one entity i.e., a person, company, transition etc.
telephone directory, railway timetable, books catalogue, equipment Record of a table is also known as row or a tuple and the number
inventory, etc. of records in a relation is called the cardinality of that relation.
Fundamentals of Database Queries
For defining database, two terms, which are used frequently Queries are basically questions based on the data available in
with database , should be known. a database. A query consists of specifications indicating which
Data These are raw and unorganised facts that need to be processed field, records, and summaries a user want to fetch from a database.
such as digital representation of text, numbers, graphical image or Queries allow you to extract data based on the criteria you define.
sound. e.g., a student's test score is one piece of data. Forms
Information When data is processed, organised structured or Although you can enter and modify data in datasheet view of
presented in a given context to make it useful or meaningful, it is tables but you neither control the user's action very well nor you
called information. e.g., the class's average score is the information can do much to facilitate the data-entry process. To overcome this
that can be concluded from the given data. problem, forms are introduced.
Data refer to the values physically recorded in the database whereas Like tables, forms can be used to view and edit your data. However,
information refers to the conclusion or meaning drawn out of it. forms are typically used to view the data in an underlying table one
Types of Database record at a time.
Databases are of three types, namely For example, a user can create a data entry form that looks exactly
1. Network Database In this type of database, data is like a paper form. People generally prefer to enter data into a well-
represented as collection of records and relationships among designed form, rather than a table
data are represented as links. Reports
2. Hierarchical Database In this type of database, data is When you want to print those records which are fetched from
organised in the form of trees with nodes. Nodes are your database, design a report. Access even has a wizard to help
connected via links. produce mailing labels.
3. Relational Database Relational database is also known as Elements of Database
structured database in which data is stored in the from of
A database consists of several different elements. The conceptual
tables. Where, columns defines the type of data stored in the
view of database represents various piece of data and their
table and rows defines the information about the data.
relationship at a very high level of abstraction. The entities,
Components of a Database attributes, relationship are the basic concepts of database.
Entity
A database consists of several different components. Each
It is an object that has its existence in the real world. It
component listed, is called an object. Within the file, you can
includes all those things about which the data are collected.
divide your data into separate storage containers called tables;
"Entities are represented in rectangles."
view, add and update table data by using online forms; find and
e.g., customer buys goods, it means customer and goods are
retrieve the data you want by using queries and analyse or print
entities.
data in a specific layout by using reports.
Attributes
Database components are described below
It describes the characteristics or properties of entity. In
Table tables, attributes are represented by columns. "Attributes are drawn
Tables are the building blocks or relation of any relational in elliptical shapes."
database model where all the actual data is defined and entered. e.g., ITEM entity may contain code and price.
Tables consist of cells at the intersection of records (rows) and field Entity Set
(columns). Different types of operations are done on the tables such It is a set of entities of the same type that share the same
as storing, filtering, filtering, retrieving and editing of data. properties or attributes.
e.g., Students is an entity set of all student entities in the database
(45)
Relationship It is an association among several entities. A Data models It is a collection of conceptual tools for
relationship describes how two or more entities are related to each describing data. data relationships, data semantics etc. They
other. It is represented by diamond shape. are generally divided in three data models: relational, network
E-R Diagram It represents the entities contained in the database. It and hierarchical model.
is a diagrammatically representation of entities and relationship
between them. Advantages of DBMS
There are following advantages of DBMS
Database Management System (DBMS) Reduction in Data Redundancy The duplication of data refers to
A DBMS is a collection of interrelated data and a set of programs data redundancy. DBMS cannot make separate copies of the same
to retrieve data from a database. It is an organized collection of data. All the data is kept at a place and different applications refers
data viewed as a whole, instead of a group of separate unrelated to data from centrally controlled system.
files. The Primary goal of DBMS is to provide an environment that Better Interaction with Users In DBMS, the availability of up-to-
is both convienent and efficient for user to store and retrieve date information improves the data to be access or respond as per
database information. e.g., Mysql, ORACLE, FoxPro, dBASE, user requests.
SyBase, MS Access. Improvement in Data Security DBMS can allow the means of
The purpose of database management system (DBMS) is to bridge access to the database through the authorised channels. To ensure
the gap between information and data. security, DBMS provides security tools i.e., username and
The basic processes that are supported by DBMS are password.
1. Specification of data types, structures and constraints to be Maintenance of Data Integrity Data integrity ensures that the data
considered in an application. of database is accurate. In DBMS, data is centralised and used by
2. Storing the data. many users at a time, it is essential of enforce integrity controls.
3. Manipulation of the database. Ease of Application Development The application programmer
4. Querying the database to retrieve desired information. needs to develop the application programs according to the user's
5. Updating the content of the database. need. The other issues like concurrent access, security, data
dBASE lll Plus is a DBMS software which is widely used in integrity, etc, are handled by database itself. This makes the
scientific applications. application development an easier task.
Architecture of DBMS Backup and Recovery The DBMS provides backup and recovery
The architecture of a database system provides a general framework subsystem that is responsible to recover data from hardware and
for database system. This means that the system does not provide software failures.
all the details of the data, rather it hides the details of how the data
are stored and maintained. Disadvantages of DBMS
The architecture is divided into three levels. As there are many advantage but DBMS also have some
1. Physical Level It is the lowest level of data abstraction that minor disadvantages.
deals with the physical representation of the database on the These disadvantages are listed here
computer. It is also known as internal level. It defines how the
Cost of Hardware and Software A processor with high speed of
data are actually stored and organised on the storage medium.
data processing and memory of large size is required to run the
2. Logical Level It is the overall view of the database and
DBMS software. It means that you have to upgrade the hardware
includes all the information that is going to be represented in
used for file based system. Similarly database software is also very
the database. It describes what type of data is stored in the
costly.
database, the relationship among the data without effecting to
Complexity The provision of the functionality that is expected
the physical level.
It is also known as conceptual level. from a good DBMS makes the DBMS an extremely complex piece
3. View Level This is the highest level of data abstraction which of software. Failure to understand the system can lead to bad
describes the interaction between the user and the system. It design decisions, which can have serious consequences for an
permits the users to access data in a way that is customised
organisation.
according to their needs, so that the same data can be seen by
different users in different ways at the same time. Cost of Staff Training Mostly DBMS are often complex systems
Important Points so the training for user to use the database is required. The
Database Administrator (DBA) It is an information organisation has to pay a lot of amount for the training of staff to
technology expert or a well-trained, computer literate, who is run the DBMS.
responsible for the technical operations of a database or an Appointing Technical Staff The trained technical persons such as
organisation . It coordinates all the activities of the database database administrator and application programmers, etc are
system. required to handle the database. You have to pay a lot of amount to
Data Abstraction It is a process where the system does not these persons. Therefore the system cost increases.
disclose all the details of data. Rather it hides certain details of Database Failures In most of the organisations, all data is
how the data is stored and maintained in database architecture. integrated into a single database. If database is corrupted due to
Front Ends It refers to the client end i.e., the end at which
power failure or it is corrupted on the storage media, then our
request is made.
valuable data may be lost or whole system stops.
(46)
Application of DBMS Alternate key From the set of candidate keys after selecting
one of the keys as primary key, all other remaining keys are known
There are many different types of DBMSs ranging from small
as alternate keys.
systems that are run on personal computers to huge systems that
run on mainframes. Foreign Key
Some applications of DBMS are A foreign key is a non-key attribute whose value is derived
1. Banking For customer information, accounts, loans and other from the primary key of the same or some another table. The
banking transactions. relationship between two tables is established with the help of
2. Airlines For reservation and schedule information. foreign key. A table may have multiple foreign keys and each
3. Universities For student information, course registration, foreign key can have a different referenced table. Foreign keys
play as essential role in database design, when tables are broken
grades, etc.
apart then foreign keys make it possible for them to be
4. Credit Card Transaction For purchase of credit cards and
reconstructed.
generation of monthly statements.
Important Points
5. Telecommunication For keeping records of calls made, Dr EF Codd represented 12 rules for Relational Database
generating monthly bill, etc. Management System (RDBMS) in 1970.
6. Finance For storing information about holdings, sales and Strong Entity Set It has a primary key or can be easily
purchase of financial statements. disguishable each attributes.
7. Sales For customer, product and purchase information. Weak Entity Set It does not possess sufficient attributes to
8. Manufacturing For management of supply chain. form a primary key.
9. Human Resource For recording information about Unique Key It is used to uniquely define the attribute of each
employees, salaries, tax, benefits, etc. row.
Relational Database Management Some database Related Terms
System (RDBMS) Schema It is a logical structure of the database.
RDBMS is a type of database management system that stores Instances These are the actual data contained in the database at a
data in the form of relations (tables). The relational database particular point of tine.
represents the database as a collection of simple two-dimensional Data Manipulation Language (DML) It enables users to access or
tables called relations. An important feature of relational database manipulate data.
system is that a single database can be spread across several tables. Data Definition Language (DLL) It specifies database schema.
e.g., Base, Oracle, DB2, SAP Sybase, Informix etc. Data Mining It combines efficient implementation techniques that
Keys enable them to be sued in extremely large database.
Key is one of the important concepts of database. A key is
defined as the column or set of columns in a table, used to identify
either row of data in a table or establish relationship with another
table. It is also referred as super key, arranging the records either in
ascending or descending order.
If a table has id, name and address as the column names then
each one is known as the key for that table. The keys are also used
to uniquely identify each record in the database table.
Types of Keys
There are mainly three types of keys which are described below
Primary Key
It is a set of one more attributes that can uniquely identify
tuples within the relation. It identifies unique records within a
table. The primary key should be chosen in such a way i.e., its
value must not be changed. There should not be duplicacy in the
record of primary key. Primary key can be atomic or composite.
The field chosen as primary key, cannot accept null value.
Candidate Key
The set of all attributes which can uniquely identify each tuple
of a relation, are known as candidate keys Each table many have
one or more candidate keys and one of them will become the
primary key. The candidate key of a relation is always a minimal
key.
(47)
The term communication means sending or receiving Transmission media can be divided into two broad categories;
information. When we communicate, we share information or data. guided and unguided media.
This sharing can be local or remote access. A communication Guided Media or Wired Technologies
system can be defined as the collection of hardware and software
The data signal in guided medium is bound by the cabling system
that facilitates intersystem exchange of information between
that guide the data signal along a specific path. It consists of a cable
different devices.
composed of metals like copper, tin or silver.
Data Communication Basically, they are divided into three categories
Data communication is the exchange of data between two 1. Ethernet Cable or Twisted Pair
devices using some form of transmission media. It includes the In this pair, wires are twisted together, which are
transfer of data or information and the method of preservation of surrounded by an insulating material and an outer layer
data during the transfer process. called jacket. A twisted pair consists of two conductors
This transmission of data is done between a centralised computer (copper).
and remote terminals or between two or more computer centres One of the wires is used to carry signals to the receiver and
over established communication links. the other is used only as a ground reference. It is used as a
Data is transferred from one place to another in the form of signals short distance communication e.g., Local area network use
There are three types of signals twisted pair cable
1. Digital Signal In digital signal, data is transmitted in the
electronic form of data i.e., binary digits (0 or 1)
2. Analog Signal In analog signal, data is transmitted in the
form of radio waves like in telephones line.
3. Hybrid Signal Hybrid signals have properties of both analog
signal and digital signal.
Types of Communication Channel
The communication channel refers to the direction of signal flow
between two linked devices.
Advantages of ethernet cable are
There are mainly three types of transmission of data
(i) Simple in its structure
1. Simplex Channel
(ii) Physically flexible
In this channel, the flow of data is always in one direction,
(iii) Can be easily connected
with no capability to support response in other direction. This
(iv) Has low weight
communication is unidirectional. Only one of the
(v) Low in cost
communicating devices transmits information and the other
Disadvantages of ethernet cable are
can only receive it. e.g., Radio, Television, keyboard, etc.
(i) Due to high attenuation signals cannot be transported
2. Half Duplex Channel
over a long distance without using repeaters.
In this channel, the data can flow in both directions, but not
(ii) Due to low bandwidth, it is unsuitable for broad band
at a same time. When one device transmits information, then
application.
other can only receive at that point of time. e.g., Walkie
(iii) Data rates supported are 1 Mbps to 10 Mbps.
Talkie.
2. Coaxial Cable
3. Full Duplex Channel
It carries the signal of higher frequency data communication
In this channel, the flow of data is in both directions at a time
through the network. It consists of a solid wire core surrounded by
i.e., both stations can transmit and receive information
foil shields or conducting braid or wire mesh, each separated by
simultaneously. e.g., Wireless handset (mobile phone).
some insulator. It has a single inner conductor that transmits
Communication Media electric signals and the outer conductor acts as a ground and is
Communication media of a network refer to the wrapped in a sheath of teflon or PVC. Coaxial cable is commonly
transmission media or the connecting media used in the network. used in transporting multi-channel television signals in cities.
It can be broadly defined as anything that can carry information e.g. cable TV network
from a source to destination. it refers to the physical media through
which communication signals can be transmitted from one point to
another.
(48)
(ii) Because of noise immunity, these are virtually impossible to
tap.
(iii) Optical cables are expensive to install but last longer than
copper cables.
(iv) Optical fibres require more protection around the cable
compared to copper cables.
(v) Installation problem. Fibre optic cables are quite fragile and
may need special care to make them sufficiently robust for
an office environment.
Advantages of coaxial cable are Unguided Media or Wireless Technologies
(i) Transmission quality of coaxial cable is better than
It is the transfer of information over a distance without the use
twisted pair cable.
of enhanced electrical conductors or wires. When the computers in
(ii) Can be successfully used for shared cable network.
a network are interconnected and data is transmitted through waves,
(iii) Can transmit several channels simultaneously, so can be
then they are said to be connected through unguided media.
used for broad band transmission.
Some commonly used unguided media of transmission are–
Disadvantages of coaxial cable are
(i) It is expensive compared to twisted pair cable. 1. Radiowave Transmission
(ii) These are not compatible with twisted pair cable. When two terminals communicate by using radio frequencies
3. Fiber-Optic Cable then such type of communication is known as radiowave
It is made up of glass plastic and transmits signals in the form transmission. This transmission is also known as Radio Frequency
of light from a source at one end to another end. At the source, (RF) transmission.
there are either Light Emitting Diodes (LEDs) or Laser Diodes These are omnidirectional Radiowaves, particularly those waves
(LDs), which modulate the data into light beam using frequency that propagate in the sky mode, can travel long distances. Each
modulation techniques. computer attaches to an antenna that can both send and receive
An optical fibers consists of a very narrow strand of glass called the radio transmission.
core. The surrounding core is a concentric layer of glass called the Radiowave transmission setup has two parts
cladding. Cladding is covered by a protective coating of plastic, Transmitter The devices which transmit signals, are termed as
known as jacket. transmitter.
Optical fibers allow transmission over longer distance at higher Receiver The devices which received signals are termed as
bandwidth which is not affected by electromagnetic field. The
receiver.
speed of optical fiber is hundred of times faster than coaxial cables.
Advantages of radiowaves are
e.g., Wavelength Division Multiplexing (WDM) and SONET
(i) Cheaper than wired network.
network.
(ii) Provides mobility
(iii) Easy to use over difficult terrain.
Disadvantages of radiowaves are
(i) Insecure communication, can be easily taped.
(ii) It is affected by the weather conditions such as rain,
storms, thunder, etc.
Microwave Transmission
Microwaves are electromagnetic waves having frequencies
advantages of optical fibre are range from 0.3 to 300 GHz. Microwaves are unidirectional.
(i) It is immune to electrical and magnetic fields. So, the data Microwaves have a higher frequency than that or radiowaves.
does not get disturbed and pure data is retrived on the other Microwave is one of the fastest media for data transmission over
end. communication channel. They can be aimed at a single direction
(ii) Highly suitable for harsh industrial environment. instead of broadcasting in all direction.
(iii) It Guarantees secure transmission and has a very high Microwave antenna placed on the top of buildings. It consists of
transmission capacity. It can be used for broadband stations approx 30 miles apart. It is used in cellular network and
transmission, where several channels are handled in television broadcasting.
parallel. advantages of microwaves are
Disadvantage of optical fibre are (i) Cheaper than digging trenches for laying cables and using
(i) Connecting two fibres or a light source to a fibre is difficult. repeaters
(49)
(ii) Using microwave, communication is possible even in difficult (i) Battery consumption, as it is the most common mode of data
terrains. transfer these days, so it is left enabled in the devices, which
Disadvantages of microwaves are consumes more battery. It can be remedied by disabling
(i) Insecure communications, as the taping of microwaves is easy. Bluetooth after use.
(ii) It is affected by the weather conditions such as rain, thunder, (ii) Bluetooth Internet is very slow, so it is suggested not to go
storm etc. for bluetooth internet.
(iii) Cost of maintenance, implementation and design is high. Important Points
3. Satellite Communication Bandwidth Determines the data transfer rate. It is measured
The communication across longer distances can be provided in cycle per second (cps) or Hertz (Hz).
by combining radio frequency transmission with satellites. It works Throughput Is the amount of data that is actually transmitted
over a long distance and fast communication. Satellite between the two computers. It is specified in bits per second
communication amplifies signal received from one Earth station (bps)/ Giga bits per second (Gbps) is the fastest speed unit
and again, retransmits to another Earth station, which can be per data transmission.
located many thousands of miles away. It is used for Baud is used to measure the speed of signalling and data
communications to ship, vehicles, planes and handheld terminals. transfer.
Advantages of satellite communication are Broadband refers to a data line that will allow large amounts
(i) It covers a vast range of area. of data to be transferred very quickly. Fibre optics,
(ii) The wired communications is almost impossible and too microwave and coaxial cable are used for broadband
costly to use across the continents where the satellite communication.
communication proves to be the best alternative. Gauge, is used to measure the thickness of wire.
(iii) It is very useful in television transmission. Computer Network
Disadvantages of satellite communication are
(i) It is very costly. SO,. it is preferred to use personal or low A computer network is a collection of two or more computers,
which are connected together to share information and resources. It
budget communication.
is a combination of hardware and software that allows
(ii) There is atmospheric loss of transmitted signals.
communication between and computers over a network. the
4. Infrared Wave Transmission computers may be connected via any data communication link, like
Infrared waves are the high frequency waves used for short- wires, cables, satellite links and other communication media.
range communication. These waves do not pass through the ARPANET stands for 'Advanced Research Project
solid-objects. They are mainly used in TV remote, wireless Agency Network; It was the first network
speakers. developed by Robert Kahn and Vinton Cart in 1969.
Advantages of infrared waves are Benefits of Networking
(i) Power consumption is less. Computer network is very useful in modern environment. Some of
(ii) Circuitry cost is less. the benefits of network are discussed here under
(iii) Circuitry is simple. 1. File Sharing Networking of computer helps the
Disadvantages of infrared waves are users to share data files.
(i) Line of sight, need to be in a straight line for 2. Hardware Sharing Users can share devices such as
communication. printers. scanners, CD-ROM drives, hard drives, etc.
(ii) Limited in a short range.
3. Application Sharing Applications can be shared over the
(iii) Can be blocked by common materials like, walls, people,
network and this allows implementation of client/server
plants, etc.
applications.
5. Bluetooth 4. User Communication This allows users to
It is a wireless technology used for exchanging data over short communicate using E-mail, newsgroups, video conferencing
distances to create a Personal Area Network (PAN) or piconet within the network.
invented by Errreiscon in 1994.
Advantages of Bluetooth are
Types of Computer Network
Computer network is broadly classified into three types
(i) We are able to share data without any cord.
(ii) We are able to share data without disclosing out private data. 1. Local Area Network (LAN)
(iii) We can use Bluetooth on many different devices as it is mostly LAN is a small and single-site network. A LAN connects
in all devices such as laptops, cell phones, music player, hand network devices over a relatively short distance. It is system in
which computers are interconnected and the geographical area such
sets printers and a lot more other-products.
as home, office, buildings, school may be within a building to 1
Disadvantage of Bluetooth are
km.
(50)
All the terminals are connected to a main computer called File Server, Is a type of computer used on network that
server. On most LANs, cables are used to connect the computers. provides access to files. It allows users to share programs and
LANs are typically owned, controlled and managed by a single data over LAN network.
person or organisation. They also use certain specific connectivity Protocols, are the set of rules used by a network for
technologies, primarily Ethernet and Token Ring. communication. It is mainly used to connect all the computers
Data transfer rate in LAN is of the order 10 to 100 mega bits to the network.
per second. (Mbps). LAN provides a sharing of peripherals in an
efficient or effective way. Network Devices
Wireless LAN Network devices are required to amplify the signal to restore
A wireless LAN or WLAN is a wireless Local Area network the original strength of signal and to provide an interface to connect
that uses radio waves as its carrier. The last link with the users is multiple computers in a network. There are many types of network
wireless, to give a network connection to all users in the devices used in networking.
surrounding area. Some of them are described below
Wi -Fi Wireless - Fidelity) is used for creating wireless LANs and 1. Repeater
also for providing wireless internet access. It communicates A Repeater is a device that operates only on the physical layer
through radiowaves over network. of OSI model. Repeaters have two ports and can connect two
2. Wide Area Network (WAN) segments of a LAN. It amplifies the feable signals when they
A WAN is a geographically dispersed collection of LANs. A are transported over a long distance so that the signal can be
WAN like the internet spans most of the world. A network device as strong as the original signal. level.
called a router connects LANs to a WAN. 2. Hub
These kinds of networks use telephone lines, satellite links Hub is like a repeater with multiple ports used to connect the
and other long-range communication technologies to connect. In IP network channels. It acts as a centralised connection to
networking, the router maintains both a LAN address and a WAN several computers with the central node or server. When a
address. hub receives a packet of data at one of its ports from a
Like the internet, most WANs are not owned by any one network channel.
organisation, but rather exist under collective or distributed 3. Gateway
ownership and management. A gateway is an interconnecting device, which joins two
WANs use technology like ATM. Frame Relay and X .25 for different network protocols together. They are also known as
connectivity. protocol converters. It accepts packet formated for one
3. Metropolitan Area Network (MAN) protocol and converts the formated packet into another
It is a data network designed for a town or city. It connects an protocol.
area larger than a LAN, but smaller than a WAN, such as a They gateway is a node in a network which serves as a proxy
city, with dedicated or high performance hardware. server and a firewall system and prevents the unauthorised
Its main purpose is to share hardware and software resources access.
by the various users. Cable TV network is an example of It holds the information from a website temporarily, so that
metropolitan area network. The computers in a MAN are the repeated access to same website or web page could be
connected using coaxial cables or fibre optic cables. directed to the proxy server instead of actual web server. Thus
4. Personal Area Network (PAN) helps in reducing the traffic load.
PAN refers to a small network of communication. These are 4. Switch
used in a few limited range, which is in reachability of It is a small hardware device that joins multiple computers
individual person. Few examples of PAN are Bluetooth, together within one LAN. Switches work on the data link
wireless USB, Z-wave and Zing Bee. layer of the OSI model. It helps to reduce overall network
5. Virtual Private Network (VPN) traffic.
A Virtual Private Network (VPN) is a technology that is Switch forwards a data packet to a specific route by
gaining popularity among large organizations that use the establishing a temporary connection between the source and
global Internet for both intra-and inter-organization the destination. There is a vast difference between switch and
communication, but require Privacy in their intra-organization a hub. A hub forwards each incoming packet (data) to all the
communication VPN is a network that is private but virtual. It hub ports, while a switch forward each incoming packet to the
is private because it guarantees privacy inside the specified recipient.
organization. It is virtual because it does not use real private 5. Bridge
WANs; the network is physically public but virtually private. Bridges serve a similar function as switches. A bridge filters
Important Points data traffic at a network boundary. Bridges reduce the amount
Server, is a system that responds to requests across a of traffic on a LAN by dividing it into two segments.
computer network to provide a network service. It can be run Traditional bridges support one network boundary, whereas
on a dedicated computer. It is one of the most powerful and switches usually offer four or more hardware ports. Switches
typical computer. are sometimes called multiport bridges.
6. Router
(51)
Router is a hardware device which is designed to take formatting) layer i.e., encryption or
incoming packets, analyze the packets, moving the packets to decryption.
another network, converting the packets to another network To manage and synchronise
Session Layer (establish and
interface, dropping the packets, directing packets to the conversation between two
maintain connection
appropriate locations etc. system. It controls logging
7. Modem
on and off, user
Modem is a device that converts digital signal to analog signal
identification, billing and
(modulator) at the sender's site and converts back analog
session management.
signal to digital signal (demodulator) at the receiver's end, in
order to make communication possible via telephone lines. A Transport Layer It decides whether
MODEM is always placed between a telephone line and a (Transmission control transmission should be
computer. protocol (TCP) accurate parallel or single path,
8. RJ 11 Connector data) multiplexing, splitting or
RJ 11 connector is the typical connector used on two pair. segmenting the data, to
Four wire handset wiring. RJ means 'Registered' Jack', the break data into smaller units
physical connector interface that is most often utilised for for efficient handling,
handset wire terminals. RJ 11 connector wiring comes in two packet filtering.
standard assortments-UTP or Unshielded Twisted Pair and
Network layer (Internet Routing of the signals,
flat-satin cable or the untwisted. RJ11 connectors are used to
terminate phone lines, and are typically deployed with single Protocol (IP) routers divide the outgoing message
line POTS (Plain Old Telephone service) telephone jacks. into packets, to act as
9. RJ11 Connector network controller for
RJ45 stands for Registered Jack-45. It is an eight wire routing data.
connector. RJ45 connector is used to connect computers onto Data link layer Media Synchronisation, error
a Local Area Network (LAN) It is commonly used in Access Control (MAC) detection and correction. To
telephony applications and networking. It is also used for switches assemble outgoing messages
serial connections. into frames
10. Ethernet Card
Physical Layer Make and break
An Ethernet card is a kind of network adapter. These adapters
[signals-cables or operate] connections, define voltages
support the Ethernet standard for high-speed network
connections via cables. Ethernet cards are sometimes known and data rates, convert data
as Network Interface Cards (NICs). Ethernet cards are bits into electrical signal.
available in several different standard packages called form Decide whether
factors. transmission is simplex, half
Newer Ethernet cards installed inside desktop computers use duplex of full duplex.
the PCI standard and are usually installed by the
In OSI model physical layer is the lowest layer which is
manufacturer. Ethernet Cards may operate at different
network speeds depending on the protocol standard they implemented on both hardware and software and application layer
support. is the highest layer.
OSI Model Network Topology
Open System Interconnection (OSI) is a standard reference
The term 'topology' refers to the way a network is laid out,
model for communication between two end users in a
network. In 1983, small The International Standards either physically or logically. Topology can be referred as the
Organisation (ISO) published a document called Basic geometric arrangement of a computer system. Each computer
Reference Model for Open System Interconnection, Which system in a topology is known as node. Network topology is
visualises network protocols as a seven layered model. determined only by the configuration of connections between
It is a layered framework for the design of network system nodes. In a fully connected network with n nodes, there are
nn 1 / 2 direct links.
that allows communication between all types of computer
system. It is mainly consists of seven layers across a network
as shown in table. The most commonly used topology are described below.
Seven layers of ISO Model and their Functions Bus Topology
Name of the Layer Functions A bus topology is such that there is a single line to which all
Application Layer (User- Retransferring files of nodes are connected. It is usually used when a network installation
Interface) information, login, password is small, simple or temporary. In bus topology, all the network
checking, packet filtering,
components are connected with a same (single) line. Ethernet is
etc.
commonly well protocol in networks connected by bus topology.
Presentation Layer (Data It works as a translating
(52)
Star Topology
In this network topology, the peripheral nodes are connected
to a central node, which rebroadcasts all transmissions received
from any peripheral node to all peripheral nodes across the
network, including the originating node. A star network can be
expanded by placing another star hub.
If the central hub fails, then whole network fails. The protocols
used in star topology are Ethernet, Token Ring and Local Talk.
Advantages of bus topology are
(i) All the nodes are connected directly, so very short cable
length is required.
(ii) The architecture is very simple and linear.
(iii) Bus topology can be extended easily on either sides.
(iv) The cabling cost of bus topology is less and requires the
least amount of cable to connect computers.
Disadvantages of bus topology are
(i) Diagnosis of fault is difficult. It is difficult to find the
problem, if any of the node is facing problem in data
Advantages of star topology are
communication.
(i) Installation of star topology is very easy as all the nodes are
(ii) In case of any fault in data transmission, fault isolation is
directly connected to the central node or server.
very difficult. We have to check the entire network to (ii) Easy to detect faults and remove it.
find the fault. (iii) Failure of single system will not bring down the entire
(iii) Becomes slow with increase in number of nodes. network.
(iv) The entire network shuts down if there is an error occurs (iv) Allows several types of cable in same network.
in the main cable. Disadvantages of star topology are
Ring Or Circular Topology (i) Requires more cable length than bus topology.
(ii) If hub or server fails, the entire network will be disabled.
Ring topology is used in high- (iii) Difficult to expand, as the new node has to connect all the way
performance network where large to central node.
bandwidth is necessary. The protocols
used to implement ring topology are
Mesh Topology
It is also known as completely interconnected topology. In mesh
Taken Ring and Fibar Distributed
topology, every node has a dedicated point to point link to every
Data Interface (FDDI). In ring other node. It provides a Provides a bi-directional link between
topology, data is transmitted in form each possible node. This type of network topology contains atleast
of Token over a network. After two nodes with two or more paths between them. Mesh topology is
passing through each node, the data robust because the failure of any one computer does not bring
returns to the sending node. down the entire network.
Advantages of ring or circular topology are
(i) Short cable length is required.
(ii) Suitable for optical fibre as the data flow in one direction.
Disadvantages of ring or circular topology are
(i) In ring topology, each node is connected in a circular way with
its two neighbouring nodes. So when there is transmission
problem anywhere in the network, entire network stops
functioning.
(ii) Fault diagnosis is very difficult in a network formed using ring
topology.
Advantages of mesh topology are
(iii) In ring topology. every node has exactly two branches
(i) Excellent for long distance networking.
connected to it, the ring is broken and cannot work if one of (ii) Communication possible through the alternate route. if one
the notes on the ring fails. path is busy.
(iv) Failure of single computer affects the whole network. Disadvantage of mesh topology are
(v) Adding or removing the computers disturbs whole network Long wire/cable length, hence increase in the cost of installation
activity. and maintenance.
(53)
Tree Topology Network Related Terms
This is a network topology in which nodes are arranged as a Multiplexing It is a technique used for transmitting signals
tree. The function of the central node in this topology may be simultaneously over a common medium. It involves single
distributed. A tree topology is an extension and variation of star path and multiple channels for data communication.
topology. Its basic structure is like an inverted tree, where the root Code Division Multiple Access (CDMA) it is a channel
acts as a server. It allows more devices to be attached to a single access method used by various radio communication
hub. technologies. CDMA employs spread spectrum technology
and a special coding scheme. Where each transmitter is
assigned a code to allow multiple users to be multiplexed over
the same physical channel.
Time Division Multiple Access (TDMA) It is based on the
Time Division Multiplexing (TDM) scheme. which provides
different time slots to different data streams in a cyclically
repetitive frame structure. It allows several users to share the
same frequency channel by dividing the signal into different
time slots.
It is used in the digital 2G cellular systems GSM. Personal
Digital Cellular (PDC) and iDEN and in the Digital Enhanced
Advantages of tree topology are
Cordless Telecommunications (DECT) standard for portable
(i) The tree topology simulates hierarchical flow of data. So, it is
phones.
suitable for applications where hierarchical flow of data and
Packet Switching It refers to method of digital networking
control is required.
communication that combined all transmitted data regardless
(ii) We can easily extend the network. of content. type or structure into suitable sized blocks, known
Disadvantages of tree topology are as packets. Each packet has header information about the
(i) Long cables are required. source. destination, packet numbering., etc.
(ii) There are dependencies on root node. Public Switched Telephone Network (PSTN) It is designed
(iii) If the central hub fails, the entire system breaks down. for telephone. which requires modem for data communication.
Models of Computer Networking it used for FAX machine also
There are mainly two models of computer networking Integrated Services Digital Network (ISDN) it is used for
voice. video and data services. It uses digital transmission and
Client-Server Network combines both circuit and packet switching.
The model of interaction between two application programs in Value Added Network (VAN) It Provides Electronic Data
which a program at one end (client) requests a service from a interchange (EDI) facility. Exchange of information like
program at the other end (server). invoices. sale purchase order. etc is done.
It is a network architecture which separates the client from the Network interface Card (NIC) it is a computer hardware
server. It is scalable architecture, where one computer works as component that connects a computer to a computer network. It
server and others as client. provides a physical access to a networking medium
Here, client acts as the active device and server behaves as Wireless Local Loop (WLL) It is a wireless communication
passively. link in which a user connects with network through radio-
frequency. It is also known as a fixed wireless connections.
WLL is based on CDMA technology.
Ethernet It is a widely used technology employing a bus
technology. It was published by IEEE 802.3 in 1985. An
ethernet LAN consists of a single coaxial cable called Ether. It
operates at 10 mbps and provides a 48-bits address. Fast
Peer-to-Peer Network ethernet operates at 100 mbps. The latest version of giga
It is also known as P2P network. This computer network relies on ethernet operates as 1000 Mbps or 1 Gpbs.
computing power at the edges of a connection rather than in the OSI model is a conceptual model, the practical model is
network itself. It is used for sharing content like audio, video, data TCP/IP. TCP/IP model consists only 5 layers.
or anything in digital format. In P2P connection, a couple of
computers is connected via a Universal Serial Bus to transfer files.
In peer-to-peer networking, each or every computer may be worked
as server or client.
(54)
The internet has gained popularity and emerged as an network. The goal of this project was to connect computers at
important and efficient means of communication. The idea of different universities and U.S. defence.
introducing the internet was to allow millions of people to share In mid 80's another federal agency, the National Science
information and ideas, sound, video clips using their computers Foundation , created a new high capacity network called NSFnet,
across the world. The internet is a worldwide network of network which was more capable than ARPANET.
computers those are able to exchange information with each other. The only drawback of NSFnet was that it allowed only the
It consists of thousands of separately administered network of academic research on its network and not any kind of private
various size and types. business on it. So, private organisations and people started working
to build their own networks, which were later interconnected with
Internet ARPANET and NSFnet to form the Internet.
Internet stands for International Network, which began in Advantages of the Internet
1950's by Vint Curf known as the Father of the Internet. The term 1. Greater access to information reduces research times.
internet is derived from two words-Interconnections and networks, 2. Allows you to easily communicate with other people.
also referred to as 'Net', 3. Global reach enables one to connect anyone on the
Internet is a network of networks' that consists millions of private Internet.
and public network of local to global scope, Basically, network is a 4. Publishing documents on the Internet saves paper.
group of two or more computer system linked together. 5. A valuable resource for companies to advertise and
conduct business.
Disadvantages of the internet
1. Cyber frauds may take place involving Credit/Debit card
numbers and details.
2. Unsuitable and undesirable material available that
sometimes are used by notorious people such as
terrorists.
3. It is a major source of computer viruses.
4. Much of the information is not checked and may be
incorrect or irrelevant.
5. Messages sent across the Internet can be easily
Uses and Working of Internet intercepted and are open to abuse by others.
Internet has been the most useful technology of the modern time Important Points
which helps us not only in our daily lives but also our personal and
Internet It is a private network for internet tools, but
professional lives developments. Internet helps us in
available within an organisation. In large organisation,
communication, information, business, social networking,
internet allows an easy access to corporate information for
shopping, entertainment, job searching, and E-commerce.
employees.
The computers on the Internet are connected to each other through
Extranet It is a private network that uses the Internet protocol
the small networks. These networks connected through the
and the public telecommunication system to security share
gateways to the Internet backbone. The data move around the
part of a business information.
Internet is controlled by protocols. Under TCP/IP Protocol
A gateway is a device that helps to connect networks which is
(Transmission Control Protocol/Internet protocol), a file is broken
using different protocol.
into smaller parts by the file server called Packets. All computers
An Internet backbone is a point where one or more networks
on the Internet, communicate with one another using TCP/IP,
are connected.
which is a basic protocol of the Internet.
History of Internet Internet Connections
In 1969, the university of California at Los Angeles, The University Bandwidth and cost are the two factors that help you in which
of Utah were connected as the beginning of the ARPANET Internet connection is to use. The speed of Internet access depends
(Advanced Research Projects Agency Network) using 50 kbits on the bandwidth.
circuits. It was the world's first operational packet switching Some of the Internet connections available for Internet access are
(55)
1. Dial-Up connection 3. Wireless Connection
A Dial-up is a method of connecting to the Internet using and Wireless broadband connects a home or business to the
existing telephone. Dial-up connection uses the telephone line to Internet using a radio link between the customer's location and the
connect to the Internet. The modem connects the computer through service provider's facility. Wireless broadband can be mobile or
the standard phone lines, which serve as the data transfer medium. fixed. Unlike DSL and cable, wireless broadband requires neither a
When a user initiates a dial-up connection, the modem dials a modem nor cables and as a result it can be easily established in
phone number of an Internet Service Provider (ISP) that is
areas, where it is not feasible to deploy DSL or cable.
designated to receive dial-up calls. The ISP then establishes the
Some ways to connect the Internet wirelessly are
connection, which usually takes about ten seconds and is
accompanied by several beeping and buzzing sounds. Wireless Fidelity (Wi-Fi)
ISP refers to the company that provides Internet connections It is a universal wireless networking technology that utilises
to the users, Some popular ISP's, are Airtel, MTNL, vodafone, etc. radio frequencies to transfer data. Wi-Fi allows high speed Internet
A Modem Changes the digital data from your computer into analog connections without the use of cables or wires.
data, a format that can be carried by telephone lines. Modem stands Wi-Fi network can be designed for private access within a home or
for Modulator and Demodulator. business or be used for public Internet access at 'hot spots' such as
2. Broadband Connection restaurants, coffee shops, hotels, airports, convention centers and
The term broadband commonly refers to high speed Internet city parks.
access that is always on and faster than the traditional dial-up
access
Worldwide Interoperability
It uses a telephone line to connect to the Internet. Broadband access for Microwave Access (WiMAX)
allows users to connect to the Internet at greater speed than a WiMAX is one of the hottest broadband wireless technologies
standard 256 KB modem or dial-up access. around today. WiMAX systems are expected to deliver broadband
Broadband includes several high speed transmission technologies access services to residential and enterprise customers in an
such as economical way.
Digital Subscriber Line (DSL) It is based on wireless MAX technology. WiMAX would operate
Digital Subscriber Line (DSL) is a popular broadband similar to Wi-Fi but at higher speed, over greater distances and for
connection. It provides Internet access by transmitting digital data a greater number of users. WiMAX has the ability to provide
over the wires of a local telephone network. DSL is the most
service even in areas that are difficult for wired infrastructure to
common type of broadband service. DSL uses the existing copper
each and the ability to overcome the physical limitations of
telephone lines.
A special modem is necessary in order to be able to use a DSL traditional wired infrastructure.
service over a standard phone line. The name Wi-MAX was created by the Wi-MAX forum.
Faster forms of DSL typically available to businesses include which was established in June 2001.
(a) High data rate Digital Subscriber Line (HDSL) Mobile Wireless Broadband Services
(b) Very High data rate Digital Subscriber Line (VHDSL)
Cable Modem Mobile wireless broadband services are also becoming
Cable modem service enables cable operators to provide available from mobile telephone service providers and others.
broadband using the same coaxial cables that deliver pictures and These services are generally appropriate for mobile customer and
sound to your TV set. Most cable modems are external devices that require a special PC card with a built-in antenna that plugs into a
have two connections, one to the cable wall outlet, the other to a user's laptop computer. Generally they provide lower speeds in
computer. They provide transmission speed of 1.5 Mbps or more. range of several hundred kbps.
Fibre Satellite
Fibre optic technology converts electrical signals carrying
Satellites which orbiting the earth provide necessary links for
data to light and sends the light through transparent glass fibres of
about the diameters of a human hair. Fibre transmits data at speed telephone and television service. They can also provide links for
far exceeding current DSL or cable modem speeds, typically by broadband. Satellite broadband is another form of wireless
tens or even hundreds of Mbps. broadband and is also useful for serving remote or sparsely
Broadband Over Power Line (BPL) populated areas.
BPL is the delivery of broadband over the existing low and Integrated Services Digital
medium voltage electric power distribution network. BPL speed are
comparable to DSL and cable modem speeds. BPL can be provided
Network (ISDN)
to homes using existing electrical connections and outlets. It is a digital telephone service that can transmit voice data
BPL is good for areas, where there are no other broadband and control information over an existing single telephone line. It
connection, but power infrastructure exists. For example, rural was the first high speed alternative to regular analysis phone
areas. modems. It is widely for business purpose.
(56)
Interconnecting Protocols For example, when you enter a URL in your browser, this actually
sends an HTTP command to the web server directing it to fetch and
A protocol is a set of rules that govern data communications. transmit the requested web page, the other main standard that
A Protocol defines what is communicated, how it is communicated controls how the world wide web works is HTML, which covers
and when it is communicated. Generally some of the protocols used how web pages are formatted and displayed.
to communicate via an Internet are HTTP is called a stateless protocol because each command is
Transmission Control executed independently, without any knowledge of the commands
that came before it.
Protocol/Internet Protocol (TCP/IP)
The internet protocol suits are the set of communication Hyper Text Markup Language (HTML)
protocol used for the Internet. It is commonly known as TCP/IP. HTML is used for designing web pages. A markup language
TCP/IP provides end-to-end connectivity specifying how data is a set of markup (angular bracket, <>) tags which tells the web
should be formatted, addressed, transmitted, routed and received at browser how to display a web page's words and image for the user.
the derivation. The TCP/IP protocol has two parts TCP and IP. Each individual markup code is referred to as an element or tag.
The text placed between a pair of angular brackets defines an
Transmission Control Protocol (TCP) HTML element. To create an HTML document text erditor is
It provides reliable transport service i.e., it ensures that required in a system.
message sent from sender to receiver are properly routed. It Telent Protocol
converts message into a set of packets at the source which are then Telnet is a program that runs on the computer and connects
reassembled back into message at the destination. PC to a server on the network and the protocol used on the Internet
TCP is also called connection-oriented protocol. It provides or Local Area Network (LAN). Telnet session will started by
acknowledgment to the sender. entering valid username and password.
Internet Protocol (IP) It is a network protocol to provide bidirectional text-oriented
communication on the Local Area Network (LAN) using virtual
It allows different computers to communicate by creating a connection.
network of networks. IP handles the dispatch of packets over the Telnet protocol is applied on the TCP/IP connection to send data
network. It maintains the addressing of packets with multiple (ASCII) coded format) from one place to another
standards. Each IP packet must contain the source and the Telent allows users to access remote based computer system
destination address. or any other system.
File Transfer Protocol (FTP) Usenet Protocol
FTP can transfer files between any computers that have an
The use net service allows a group of Internet users to
Internet connection and also works between computers using exchange their views/ideas and information on some common topic
totally different operation system. that is of interest to all the members belonging to that same group.
FTP is a protocol through which Internet users can upload files Several such group exist on the Internet are called newsgroups.
from their computers to a website or download files from a website Usenet has no central server or administration.
to their PC.
FTP is the easiest way to transfer files between computers via the Point-to-Point Protocol (PPP)
Internet and utilizes TCP (Transmission Control Protocol)/ IP PPP is a dial account which puts your computer directly on
(Internet Protocol) systems to perform uploading and downloading the Internet. A modem is required for such connection which
tasks. FTP lets people and applications exchange and share data transmits the data 9600 bits per second.
within their offices and across the Internet. Hyperlinks & Hypertext
Some examples of FTP software are FileZilla, Kasablanca, gFTP,
Hyperlink is a powerful tool which is used to send the reader
konqueror etc.
or surfer to another web page without having to open a new tab on
Objectives of FTP are the search engine. It is simply called a Link and is a reference in a
1. To promote sharing of files (computer programs and/or data). hypertext document to another document or to another place on the
2. To encourage indirect or implicit (via programs) use of remote same text. Hyperlinks help to create links between the various web
computers. pages. For creating hyperlinks we need to have a hypertext.
3. To shield a user from variations in file storage systems among HyperText is the text that appears on the page. on which we can
hosts. click and reach to another page with which it is linked. It is the
4. To transfer data reliably and effciently. concept that has made www a more flexible and easy to use
system. HyperText is also a combination of hyperlinks and
Hyper Text Transfer Protocol (HTTP) multimedia.
HTTP defines how message are formatted and transmitted and
what actions should be taken by the web servers and browsers in Wireless Application Protocol (WAP)
response to various commands. A WAP browser is a commonly used web browser for small
mobile devices such as cell phones.
(57)
Voice over Internet Protocol (VoIP) Websites and web pages are written in a coding language that
makes it possible to add pictures, people's reading experience more
It allows delivery of voice communication over IP networks. exciting. The very first page of a website is called home page of
E.g., IP calls. that website.
World Wide Web (WWW) For example, http://www. carwale. com is a website
while http://www. carwale.com/new/ is a webpage
WWW was introduced on 13th March 1989. The word wide
web is a system of Internet servers that supports hypertext and Web Browser
multimedia to access several Internet Protocols on a single Web browser is a software application that is used to locate,
interface. The world wide web is often abbreviated as the web or retrieve and also display content on the world wide web, including
WWW. The world wide web is a way of exchanging information web pages. web browsers are programs used to explore the
between computers on the Internet, try to tie them together into a Internet.
vast collection of interactive multimedia resources. We can install more than one web browser on a single computer.
The world wide web (The web) is only a portion of what makes up The user can navigate through files, folders and websites with the
the Internet, but it is the fastest growing part of the Internet. The help of a browser. There are two types of web browsers.
web lets people, organisations and companies publish information
for other people to see. Text Web Browser
WWW Attributes A web browser that display only text-based information is known
as text web browser, for example, Lynx, which provides access to
The following are the various attributes of www the Internet is the text mode only.
User-friendly
The www resource works smoothly with most web browsers, Graphical Web Browser
such as Internet Explorer, Firefox etc. A web browser that support both text and graphic information
Multimedia Documents known as graphical web browser, The major graphical web
www allows users to create and display web pages that browsers are Internet Explorer, Firefox, Netscape, Safari, Google
contains various graphics, audio, video, animation and text. Chorme and Opera.
Interactive The first graphical web browser was NCSA Mosaic
www provides interactivity using Hyperlinks and input boxes
(i.e., textboxes and checkboxes). Some Popular
Frames
www supports frames that allows users to display more than Graphical Web Browsers
one independent section on a single web page. Netscape
Web Page It is one of the original web browsers. Netscape comprises the
The backbone of the world wide web is made of files, called major portion of the browser market. Netscape was introduced in
pages or web pages, containing information and links to resources - 1994.
both text and multimedia - throughout the Internet. It is created
using HTML (HyperText Markup Language). The web is a
collection of large number of computer documents or web pages
that are stored on computers around the world and are connected to
one another using hyperlinks. These web pages can be seen by
anyone thrughtheir computer's web browser.
The main or first page of a website is known as home page.
Internet Explorer (IE)
It is a product of Microsoft. This is the most commonly used
browser in the universe. This was introduced in 1995 along
with Window 95 launch and it has passed Netscape popularity
in 1998.
Website
A group of web pages that follow the same theme and are
connected together with hyperlinks is called a website. In other
term, ''A website is a collection of digital documents, primarily
HTML files, that are linked together and that exist on the web
under the same domain''.
(58)
FireFox Apache HTTP Server
It is a new browser derived from Mozilla. It was released in It is development by Apache Software foundation. The Apache
2004 and has grown to be the second most popular browser HTTP server is the most popular web hosting server in the world.
on the Internet. This open source software can be installed on virtually all operating
system including Window, Linux, Mac OSX, Unix etc. At present,
60% of server machines run on the apache web server.
Internet Information Services (IIS)
Internet Information Services (IIS) is a product of Microsoft and is
Google Chrome considered to be a very high-performance web hosting server. It is
This web browser was developed by Google. Its beta and easily administrable and integrated with the windows platforms.
commercial versions were released in September 2008 for Lighttpd
Microsoft Window. This is a free web hosting server distributed under the BSD license.
The Lighttpd is considered fast, reliable, secure, and power
efficient CPU. Lighttpd web servers are compatible with Windows,
Linux, Mac OS X, Unix and Solaris operating systems.
Sun Java System Web Server
It is developed by Sun Microsystems. It is not an open source
Safari server. It supports Windows, Linux, and Unix. This web hosting
It is a web browser developed by Apple Incorporation and included server is suitable for medium and large website hosting.
in Mac OS X. It was first released as a public beta in January 2003. Jigsaw Server
Safari provides good support for latest technologies like XHTML, This is a free open source server for website hosting that comes
CSS2 etc. straight from the world wide web Consortium (W3C). The Jigsaw
web hosting server is written in Java. It supports different platforms
like Linux, Mac OS X, windows Unix, freeBSD etc.
Web Address and URL
A web address identifies the location of a specific web page on the
Internet, such as http://www.learnyoga.com. On the web, web
addresses are called URLs. URL stands for Uniform resource
Locator, It is the web address for a website or a web page.
The URL specifies the Internet address of a file stored on a host
computer connected to the Internet. The URL contains the name of
the protocol to be used to access the file resource, a domain name
Opera that identifies a specific computer on the Internet and a pathname,
It is smaller and faster than most other browsers, yet it is full with hierarchical description that specifies the location of a file in
featured. It is the third most popular mobile web browser in that computer.
November 2013. It includes tabbed browsing, page zooming, Tim Berners lee created the first URL in 1991 to allow the
mouse gestures features. publishing of hyperlinks on the world wide web.
Web Server Each URL has several parts which can be demonstrated using
the address
A web server is a computer program that serves requested HTML
'http://www.google.com/services/index.htm'
pages or files. A web client is the requesting program associated
'http://This part of the address indicates that it is a web page.
with user. The web browser is a client that request HTML files
it also identifies the protocol or type of server.
from web servers. The server computer will deliver those web
www. This indicates that the web page is a part of the world
pages to the computers that request them and may also do other
wide web. Many websites do not use WWW but are still part
processing with the web pages, such as calculation and entries into
of the web.
databases.
google.com This part of the address is the domain name and
Every web server that is connected to the Internet is given a unique
indicates the unique address of a website. The domain name
address i.e., IP address made up of a series of four numbers
between 0 to 256 separated by periods. also often indicates what the site is about.
For example, 68. 178. 157. 132 or 68. 122. 35. 127. For example, www.dog.com is a website about dogs.
Web server software generally requires fairly robust operating /services/ the '/' symbol indicates you have moved into a
system like Unix, Window NT. Every website need to be stored on specific directory in the website. Directories are like the
a computer called the web server from which it can be accessed. folders on your computer and help to organise web pages in
Currently. there are five major web servers commonly used for website.
hosting websites given below.
(59)
index.htm A word with or 'htm' following It indicates the compare it with a journal, except it is written online and for
name of the specific page along with the path of a web page everyone to see.
in the website. A typical blog combines text, image, and links to other blogs,
Domain Name web pages and other media related to its topic. Most blogs,
are primarily textual, although some focus on art,
Domain is a group of network resources assigned to a group of
photographs, videos, music and audio.
users. A domain name is a way to indentify and locate computers
In education, blogs can be used as instructional resources. These
connected to the Internet. A domain name must be unique. It
blogs are referred to as edublogs. The entries of blog is also known
always have two or more parts, separated by periods (dots).
as posts.
For example, google.com, yahoo.com etc.
Newsgroups
Domain Abbreviation An area on a computer network especially the Internet, devoted to
Domains are organised by the type of organisations and by country. the discussion of a specified topic is known as Newsgroup. Online
A three-letter abbreviation indicating the organization and usually discussion group that allows interaction through electronic bulletin
two-letter abbreviation indicating the country name. board system and chat sessions.
Most common domain abbreviations for organization are Newsgroups are organized into subject hierarchies, with the first
letters of the newsgroup name indicating the major subject category
info Informational organisation and sub-categories represented by a subtopic name.
com Commercial Users post messages to a news server which sends them to a bunch
gov Government of other participating servers. Then other users can access the
edu Education newsgroup and read the postings.
mil military Search Engine
net Network resources A search engine is a website that provides the required data on
org Usually Non-profit organisation specific topics. Search engines turn the web into a powerful tool for
Some domain abbreviations for country are finding information on any topic. When you type any term in
In india search bar, then the search engine will look for matching websites
au Australia from all over the web.
Fr France Many search engines also have directories or lists of topics that are
nz New Zealand orgainsed into categories. Browsing these directories, is also a very
uk United Kingdom efficient way to find information on a given topic.
Domain Name System (DNS) Here are some of the most popular search engines
Google http://www.google.com
The Domain Name System stores and associates many types
Altavista http:/www.altavista.com
of information with domain names, but most importantly, it
Yahoo http://www.yahoo.com
translates domain names (computers host name) to IP addresses. It
Hotbot http://www.hotbot.com
also lists mail exchange servers accepting E-mail for each domain.
Lycos http://www.lycos.com
DNS is an essential component of contemporary Internet use. The
Excite http://www.excite.com
naming scheme by which servers are identified is known as the
WebCrawler http://www.webcrawler.com
domain name system. Another method of addressing servers is
based on numbers. Services of Internet
For example, 204.157.54.9 Such addresses are called IP addresses. An Internet user can access to a wide variety of services such
IP Address as electronic mail, file transfer, interest group membership,
multimedia displays, real-time broadcasting, shopping etc. Some of
IP addresses are in aaa.aaa.aaa.aaa. format. where each aaa is
the important services provided by the Internet are briefed in the
a number from o to 255. The length of IP address is 4 bytes. IP
following sections.
addresses identify the host computers so that packets of information
reach the correct computer. The current version of IP i.e., IPV4 has Downloading and Uploading
size 32 bits. Answer version IP i.e., IPV6 having size 128 bits is Files from/to Sites
soon going to replace IPV4. Downloading is the transmission of a file from server or
The IP address has the following characteristics in common remote computer system to user's computer. From the Internet
IP addresses are unique. user's point of view downloading a file means is to request it from
No two machines can have the same IP number. server computer and to receive it.
IP addresses are also global and standardised. Downloading images, articles and applications from the Internet
All machines connected to the Internet agree to use the same has become a snap with 'Click Here' links on web pages.
scheme for establishing an address. Uploading is the transmission of a file from local system to a server
Blogs or remote computer. From an Internet user's point-of-view,
A Blog is a website or web page in which an individual records uploading is sending a file to a computer that is set up to receive it.
opinions, links to other sites, on regular basis. Many people The uploaded files are then stored on the website's servers and can
(60)
be seen by anyone who has the Internet connection and it is includes multiple people at each location. Each user or group of
necessary to use the right software for viewing it. The FTP is users who are participating in a video conference typically must
widely used for downloading and uploading files. have a computer, a camera, a microphone, a video screen and a
Chat sound system. Basically, this is a system that allows you to conduct
Chatting is the online textual or multimedia conversation. It is meetings or trainings in different places simultaneously. So, this
widely interactive text-based communication process that takes technology is especially popular in the field of business because it
place over the Internet. Chat with people using the Internet is allows meetings or conferences to be held without the need for all
somewhat similar to using the telephone for the same purpose, the participants to travel to a single location, so it saves time and
Chatting i.e., a virtual means of communication that involves the money.
sending and receiving of messages, share audio and video between E-learning (Electronic Learning)
users located in any part of the world. E-learning refers to electronic mode of delivering learning,
In chatting, you type a message in your chat box, which is training or educational program to users. It si the mode of acquiring
immediately received by the recipient, then the recipient type a knowledge by means of the Internet and computer based training
message in response to your message which is instantly received by programs The modules of e-learning are designed to provide not
you. There are numerous chat programs that you can download, only adequate and relevant informational but also make learning
including Yahoo! messenger, windows live messenger and skype highly engaging and interactive. Broadly e-learning is synonymous
(all three of these can also do voice and video chat). with computer-based instruction (CBI), computer-based training
E-mail (Electronic mail) (CBT), Internet-based training (IBT), web-based training (WBT)
E-mail is an electronic version of sending and receiving letter. and online education.
Electronic mail lets you send and receive messages in electronic E-Banking (Electronic Banking)
form. The short form of Electronic mail is E-mail. The person who E-banking is defined as the automated delivery of new and
communicates with you could be any other user on the internet; traditional banking products and services directly to customers
someone using the computer system as you or other computer through electronic, interactive communication channels. E-banking
system thousands of miles away. The E-mail is transmitted between is also known as Internet Banking or Online Banking.
computer system, which exchanges messages or pass them onto E-Banking means any user with a personal computer and a browser
other sites according to certain Internet protocols or rules for can get connected to his bank's website to perform any of the virtual
exchanging E-mail. banking functions. All the services that the bank has permitted on
To use E-mail, a user must have an E-mail address. The E- the Internet are displayed in menu. It allow customers to access
mail address contains all information required to send or receive a account specific information and possibly conduct transactions from
message from anywhere in the world. Storage area for email a remote location such as at home or at the workplace.
messages is called mail box. E-banking can be broadly classified into the following two
E-mail Address consists of two parts separated by @ symbol - the categories
first part is user name and the second part is host name (domain) Transactional
name). However, spaces are not allowed within the e-mail address. It involves performing financial transactions such as paying bill,
e.g., [email protected] account transaction etc.
Here, arihantbooks is a username and gamil.com is a host computer Non-transactional
name.
It involves viewing bank statements. Service provided by the E-
Sometimes you will see some unsolicited commercial email banking are
message in your in your mailbox and those are called spam. 1. Bill payment service
2. Fund transfer
3. Credit card customers
4. Railway reservation
5. Investing through internet banking
6. Recharging your prepaid phone
7. Shopping
Video Conferencing E-Shopping (Electronic Shopping)
Video conferencing is a E-shopping or online shopping is the process of buying goods
communication technology that and services from
integrates video and audio to merchants who sell on the
connect users anywhere in the internet.
world as if they were in the Consumers buy a variety of
same room.
items from online stores. In
This term usually refers to
fact, people can purchase
communication between three or more users who are in at least two
just about anything from
locations, rather than one-to-one communication and it often
companies that provide
(61)
their products online. Books, clothing, household appliances, toys, M-Commerce
hardware, software and health insura nce are just some of the
(Mobile Commerce)
hundreds of products, consumers can buy from an online store. The
M-Commerce provides the application for buying and selling
main components of E-shopping are
goods or services through wireless Internet enabled handheld
1. Product
2. Selling place devices. It involves new technologies, services and business
3. Accessibility to people models.
4. Placement of orders Mobile commerce was originally started from 1997 by Kevin
5. Mode of payment duffey.
6. Delivery mechanism
Some E-shopping sites are Naaptol, Flipkart, yebhi, HomeShop 18 Important Points
etc.
When a search engine returns the links to web pages
E-Reservation corresponding to the keywords entered is called a hit
(Electronic Reservation) otherwise called a miss.
E-reservation means making a A Spider or crawler is a software that works inside a search
reservation for a service via Internet. You engine and can look into the website for the searched or
need not personally go to an office or a required keywords and then returns the links of those
counter to book/reserve railway, airways websites which contain the required keywords as the search
tickets, hotel rooms, hotel rooms, touristy result.
packages etc. With the webmall interface emails are accessible from
Social Networking anywhere in the world.
Social networking is the grouping of individuals into specific Rich Text Formatting helps the sender (of email) format the
groups, like small rural contents of his/her email message by applying font, Size,
communities or a bold, italic, etc.
neighbourhood subdivision, if Cookie A cookie is a small message given to a web browser
you will A social networking by a web server. It stores information about the user's web
service is an online service, activity.
platform or site that focuses
on facilitating the building of
social networks or social
relations among people.
The most popular sites are currently Facebook, Myspace and orkut
etc.
These websites provide users with simple tools to create a custom
profile with text and pictures. A typical profile includes basic
information about the user, atleast one photo and possibly a blog or
other comments published by the user.
Advanced profiles may include videos, photo albums, online
applications (in Facebook) or custom layouts (in My Space). After
creating a profile , users can add friends, send messages to other
user and leave comments directly on friends' profiles.
Facebook was developed by Mark Zurkerberg.
E-Commerce
(Electronic Commerce)
E-commerce includes sharing business information,
maintaining business relationships and conducting business
transactions by means of telecommunication networks or process
of trading goods over the Internet. Electronic Data Interchange
(EDI) is the electronic transfer of a business transaction between
sender or receiver computer.
E-trading is the process of trading the goods and items over
the internet.
(62)
The computers are being used frequently in our daily life and 7. Privacy It ensures that individual has the right to use the
it has proven importance in each and every field. We do all types information and allows another to use that information.
of work which may be simple and some may be confidential and 8. Steganography It is an art of hiding the existance of a
secret, so we expect our system to keep them personal and secure, message. It aids confidentiality and integrity of the data.
otherwise it may get misused by anybody or may be attacked by 9. Cryptography It is the science of writing information in a
viruses. 'hidden' or 'secret' form and is an ancient art. It protects the
Computer Security data in transmit and also the data stored on the disk.
Computer security is also known as cyber security or IT Some terms commonly used in cryptography are
security. Computer security is a branch of information technology Plain Text It is the original message that is an input.
known as information security, which is intended to protect Cipher It is a bit-by-bit or character-by-character
computers. It is the protection of computing systems and the data transformation without regard to the meaning of the message.
that they store or access. Cipher Text It is the coded message or the encrypted data.
Methods to Provide Protection Encryption It is the process of converting plain text to cipher
There are four primary methods to provide protection text, using an encryption algorithm.
1. System Access Control It ensures that unauthorized users Decryption It is the reverse of encryption i.e., converting
do not get into the system by encouraging authorized users to be cipher text to plain text.
security conscious. Transport Layer
For example, by changing their passwords on a regular basis. Security (TLS) Protocol
2. Data Access Control It monitors who can access what It is a cryptographic protocol which provides secure http
data, and for what purpose. Your system might support mandatory connection, enabling two parties to communicate with
access controls with these. The system determines access rules privacy and data integrity.
based on the security levels of the people, the files, and the other Sources of Attack
objects in your system.
' The most potent and vulnerable threat of computer users is
3. System and Security Administration It performs virus attacks. A computer virus is a small software program that
offline procedures that makes or breaks secure system.
spreads from one computer to another and that interferes with
4. System Design It takes advantage of basic hardware and computer operation.
software security characteristics. It is imperative for every computer user to be aware about the
For example, using a system architecture that's able to segment software and programs that can help to protect the personal
memory, thus isolating privileged processes from no privileged
computers from attacks.
processes.
The sources of attack can be
Components of computer Security Downloadable Programs
Computer security is associated with many core areas. Basic Downloadable files are one of the best possible sources of
components of computer security system are virus. Any type of executable file like games, screen saver are one
1. Confidentiality It ensures that data is not accessed by any of the major sources. If you want to download program from the
unauthorized person. internet then it is necessary to scan every program before
2. Integrity It ensures that information is not altered by any downloading them.
unauthorized person in such a way that it is not detectable by
Cracked Software
authorized users.
These software are another source of virus attacks. Such
3. Authentication It ensures that users are the persons they
cracked forms of illegal files contain virus and bugs that are
claim to be.
difficult to detect as well as to remove. Hence, it is always a
4. Access Control It ensures that users access only those
preferable option download software from the appropriate source.
resources that they are allowed to access.
5. Non-Repudiation It ensures that originators of message E-mail Attachments
cannot deny they are not sender of the message. These attachments are the most common source of viruses.
You must handle e-mail attachments with extreme care, especially
6. Availability It ensures that systems work promptly and
if the e-mail comes from an unknown sender.
service is not denied to authorized users.
(63)
Internet (Best Possible Source of Viruses) 4. Boot Sector Virus It is also called Master Boot Sector
Majority of all computer users are unaware as when viruses Virus or Master Boot Record Virus. This type of virus
attack computer systems. Almost all computer users click or affects the boot sector of a hard disk.
download everything that comes their way and hence unknowingly e.g., Poly boot.B, Anti EXE etc.
invites the possibility of virus attacks. 5. Macros Virus It infects files that are created using certain
Booting from Unknown CD applications or programs that contain macros, like .doc, .XIs,
.pps etc. e.g., melissa. A etc.
When the computer system is not working, it is a good
6. File System Virus It is also called Cluster Virus of Directory
practice to remove the CD. If you do not remove the CD, it may
Virus. It infects the directory of your computer by changing
start to boot automatically from the disc which enhances the
the path that indicates the location of a file.
possibility of virus attacks.
e.g., Dir-2 Virus etc.
Malware: 7. Polymorphic Virus It encrypts or encodes itself in an
Threats to Computer Security encrypted way, every time it infects a system. This virus then
Computer systems are vulnerable to many threat that can goes on to create a large number of copies.
inflict various types of damage resulting in significant losses. A e.g., Elkern, Tuareg etc.
threat is a potential violation of security and when threat gets 8. FAT Virus It is used to store all the information about the
executed, it becomes an attack. Those who execute such threats are location of files, unusable space etc.
known as attackers. e.g., Link virus etc.
Malware stands for malicious software. It is a broad term that 9. Multipartite Virus It may spread in multiple ways such as
refers to a variety of malicious programs that are used to damage the operating system installed or the existance of certain files.
computer system, gather sensitive information, or gain access to e.g., Flip etc.
private computer systems. 10. Web Scripting Virus Many websites execute complex code
Malware is an unwanted software that any unauthorized person in order to provide interesting content. These sites are
wants to run on your computer. These are known as security sometimes created with purposely infected code.
threats. It includes computer viruses, worms, trojan horses, e.g., J.S. Fortnight etc.
rootkits, spyware adware etc. Some common viruses are tabulated below
Some of them are described below Year Name
Virus 1971 Creeper
Virus stands for vital information resource under siege. 1982 Elk Cloner
Computer Viruses or perverse software are small programs that 1988 The Morris Internet worm
can negatively affect the computer. It obtains control of a PC and 1990 Melissa
directs it to perform unusual and often destructive actions. Viruses 2000 I Love You
are copied itself and attached itself to other programs which further 2001 Code Red
spread the infection. The virus can affect or attack any part of the 2003 SQL Slammer
computer software such as the boot block, operating system, 2003 Blaster
system areas, files and application programs. 2004 Sasser
Type of Virus 2010 Stuxnet
Some common types of viruses are 2011 Trojan
1. Resident Virus It fixes themselves into the system's memory 2012 Rootkit
and get activated whenever the OS runs and infects all the 2014 Generic PUP
files that are then opened. It hides in the RAM and stays there 2014 Net Worm
even after the malicious code is executed. e.g., Randex, Meve
etc. Effect of Virus
2. Direct Action Virus It comes into action when the file There are many different effects that viruses can have on your
containing the virus is executed. It infects files in the folder computer, depending on the types of virus. Some viruses can
that are specified in the AUTOEXEC. BAT file path. Monitor what you are doing.
e.g., Vienna Slow down your computers performance.
3. Overwrite Virus It deletes the information contained in the download illegal files onto your computer without you being
files that it infects, rendering them partially or totally useless, able to delete them.
once they have been infected. Destroy all data on your local disk.
e.g., Way. Trj. Reboot, Trivial.88-D etc. generate IP address randomly and sends those IP address
automatically.
affect on computer network and the connection to Internet.
(64)
steal confidential information like password, account Spawn pop-up windows.
number, credit card information by random e-mailing. Send your targeted e-mail.
increase or decrease memory size. Redirect your web browser to phishing pages.
display different types of error messages. Report your personal information to distant servers.
decrease partition size. Can alter your computer settings (like web browser, home
page settings or the placement of your desktop icons).
alter PC settings.
Can affect the performance of your computer system.
display arrays of annoying advertising.
e.g., Cool Web Search, FinFisher, Zango, Zlob Trojan,
extend boot times. Keyloggers etc .
create more than one partition.
Symptoms of a Malware Attack
cause computer to make strange noises, make music, clicking There is a list of symptoms of malware attack which indicates that
noises or beeps. your system is infected with a computer malware.
damage data files. Some primary symptoms are
make disc unreadable. Odd messages are displaying on the screen.
cause damage they were not designed to. Some files are missing.
Worms System runs slower.
PC crashes and restarts again and again.
A computer worm is a standalone malware computer
Drives are not accessible.
program that replicates itself in order to spread to other computers.
Antivirus software will not run or installed.
Often, it uses a computer network to spread itself, relying on
Unexpected sound or music plays.
security failures on the target computer to access it. Unlike a
The mouse pointer changes its graphic.
computer virus, it does not need to attach itself to an existing
System receives strange e-mails containing odd attachments
program. or viruses.
Worms almost always cause atleast some harm to the PC starts performing functions like opening or closing
network, even if only by consuming bandwidth, whereas viruses window, running programs on its own.
almost always corrupt or modify files on a targeted computer.
Worms are hard to detect because they are invisible files. Some Other Threats
e.g., Bagle, I love you, Morris Nimda etc. There are some other threats which are described below.
Trojan Spoofing
A Trojan, or Trojan Horse, is a non-self-replicating type of Spoofing is the technique to access the unauthorised data
malware which appears to perform a desirable function but instead without concerning to the authorised user. It access the resources
facilitates unauthorized access to the user's computer system. over the network. It is also known as 'Masquerade'.
IP spoofing is a process or technique to enter in another computer
The term is derived from the Trojan Horse story in Greek
by accessing its IP address. It pretend to be a legitimate user and
mythology because Trojan Horses employ a form of ''social access to its computer via a network.
engineering'' presenting themselves as harmless, useful gifts, in
order to persuade victims to install them on their computers.
Salami Technique
It diverts small amounts of money from a large number of
Trojan do not attempt to inject themselves into other files like a accounts maintained by the system.
computer virus. Trojan Horses may steal information, or harm
their host computer systems. Trojan may use drive-by downloads
Hacking
Hacking is the act of intruding into someone else's computer
or install via online games or Internet-driven applications in order or network. Hacking may result in a Denial of Service (DOS)
to reach target computers. Unlike viruses, Trojan horses do not attack. It Prevents authorised users from accessing the resources of
replicate themselves. the computer. A hacker is someone, who does hacking process.
e.g., Beast, Sub7.Zenus, ZeroAccess Rootkit etc. Cracking
Spyware It is the act of breaking into computers. It is a popular,
Spyware is a program which is installed on a computer growing subject on the internet. Cracking tools are widely
system to spy on the system owner's activity and collects all the distributed on the internet. They include password crackers,
information which is misused afterwards. It tracks the user's trojans, viruses, war-dialers, etc.
behaviour and reports back to a central source. Phishing
These are used for either legal or illegal purpose. Spyware can It is characterised by attempting to fraudulently acquire
transmit personal information to another person's computer over sensitive information such as passwords, credit cards details, etc by
the internet. masquerading as a trustworthy person. Phishing messages usually
Spyware can harm you in many ways such as take the form of fake notifications from banks providers, e-pay
Steal your passwords. systems and other organisation. It is a type of internet fraud that
Observe your browsing choices. seeks to acquire a user's credentials by deception.
(65)
Spam Digital Certificate
It is the abuse of messaging systems to send unsolicited bulk
Digital certificate is the attachment to an electronic message
messages in the form of E-mails. it is a subset of electronic spam
used for security purposes.
involving nearly identical messages sent to numerous recipients by The common use of a digital certificate is to verify that a user
E-mails. sending a message is who he or she claims to be, and to provide
Adware the receiver with the means to encode a reply. IT provides a means
It is any software package which automatically renders of proving your identity in electronic transactions. The digital
advertisements in order to generate revence for its author. The term certificate contains information about whom the certificate was
is sometimes used to refer the software that displays unwanted issued to, as well as the certifying authority that issued it.
advertisements. Digital Signature
Rootkits It is an electronic form of a signature that can be used to
Rootkits is a type of malware that is designed to gain authenticate the identity of the sender of a message or the signer of
administrative level control over a computer system without being a document, and also ensure that the original content of the
detected. Rootkits can change how the operating system functions message or document that has been sent is unchanged.
and in some cases, can temper with the antivirus program and Digital signatures are easily transportable and cannot be imitated
render it infective. Rootkits are also difficult to remove, in some by easily transportable and cannot be imitated by someone else.
cases, require a complete re-installation of the operating system. Also, the signer of a document cannot later disown it by claiming
Important Points that the signature was forged.
Brain was the first PC boot sector virus created in 1986. Firewall
Creeper was the first computer virus created in 1971. A firewall can either be software-based or hardware-based
Parasitic virus attaches themselves to programs, also known and is used to help in keeping a network secure.
as executables. The word parasites is used because a virus Its primary objective is to control the incoming and outgoing
attaches to files or boot sectors and replicates itself, thus network traffic by analyzing the data packets and determining
continuing to spread. It is detection designed as hide from whether it should be allowed through or not, based on a
antivirus. predetermined rule set.
Payloads is code in the worm designed to do more than A network's firewall builds a bridge between an internal network
spread the worm. Bomb virus has a delayed payload. that is assumed to be secure and trusted, and another network,
Logic Bomb is a malicious program intentionally inserted usually an external (inter) network, such as the Internet, that is not
into a software system and is timed to cause harm at a certain assumed to be secure and trusted. A firewall also includes or works
point in time but is inactive until that point. Unlike viruses, it with a proxy server that makes network requests on behalf of
does not replicate itself. workstation users.
There are two forms of firewalls
Solutions to Computer Security Threats Hardware (External) Firewall
To safe the computer system from unauthorized access and It provides protection to a local network. It is physical device
threats, it is necessary to design some safeguards that handles these that sits between the computer and the Internet. Hardware firewall
threats efficiently. requires quite a bit of work to fully configure.
Some safeguards (or solutions) to protect a computer system from These may range from a simple router to a proxy server that directs
accidental access, are described below all traffic to a server elsewhere on the Internet before sending or
Antivirus Software taking data from a computer or a network.
Antivirus software is a application software that are designed Software (Internet) Firewall
to prevent, search for, detect and remove viruses and malicious Software firewalls installed directly into the computer as
software like worms, trojans, adware and more. programs. Once installed, these firewalls activate themselves and
It consists of computer programs that attempt to identify threats set up with relative ease.
and eliminate computer viruses and other malware. There are four general techniques for access control
1. Service Control It determines the types of Internet
services that can be accessed, inbound or outbound.
Some popular Antivirus 2. Direction Control It determines the direction in which
Avast AVG particular service requests are allowed to flow.
K7 Kaspersky 3. User Control It controls access to a service according to
Trend Micro Quick Heal which user is attempting to access it.
Symantec Norton 4. Behaviour Control It controls how particular services
McAfree are used.
(66)
Password 2. Write Permission
A password is a secret word or a string of characters used for If you have write permission of a file, you can modify or
user authentication to prove identity or access approval to gain remove the contents of a file. In case of directory, you can
access to resource, which should be kept secret from those who are add or delete files to the contents of the directory.
not allowed to get access. 3. Execute Permission
In modern times, user names and passwords are commonly used If you have execute permission of a file, you can only
by people during a log in process that controls access to protected execute a file.
computer operating systems, mobile phones, ATMs etc. In case of directory, you must have execute access to the bin
A password is typically somewhere between 4 to 16 characters, directory in order to execute it or cd command.
depending on how the computer system is set up. Intrusion-Detection System
When a password is entered, the computer system is careful not to This system monitors real-time network traffic for malicious
display the characters on the display screen, is case others might activity and sends alarms for network traffic that meets certain
see it. attack patterns or signatures.
Secure Socket Layer (SSL)
It is an algorithm that provides application-independent security
and privacy over the internet. SSL allows both server
authentication (mandatory) and client authentication (optional).
IP Security Protocol
This security protocol suite is used to provide privacy and
There are two common modes of password as follows authentication services at the internet layer. IP security allows
1. Weak Password Easily remember just like names, birth authentication, encryption and compression of IP traffic.
dates, phone number etc.
2. Strong Password Difficult to break and a combination Some Security Related Terms
of alphabets and symbols. Eavesdropping The attacker monitors transmissions for
Some basic guidelines on setting a password are message content.
Do choose a password with atleast 8 characters containing Masquerading The attacker impersonates an authorised user
both Alpha and Numeric characters. and thereby gain certain unauthorised privilege.
Do not use your computer account name, or the reverse of it, Replay The attacker monitors transmission and retransmits
as the password. messages as the legitimate user. retransmits messages as the
Do not write down your password. Do not store any legitimate user.
password in any system including your own PC. Pretty Good Privacy (PGP) It is a software that encrypts
Change your password periodically. your E-mails as well as digitally 'signs' it
Hack Bot This is a host exploration tool, simple vulnerability
Avoid using the same password for multiple accounts.
Scanner and banner logger.
Always verify a user's identity before resetting a password. Patches It is a piece of software designed to fix problems
Do not use persons, places or things that can be identified with a computer program or its supporting data. This includes
with you. fixing security vulnerabilities and other bugs and improving
Always logout or lock your terminal before leaving it. the usability and performance.
Choose password that are easy to remember but are difficult Logic Bomb It is a piece of code intentionally inserted into a
for an attacker to guess. computer's memory that will set off a malicious function
Avoid using dictionary words, including foreign language, when specified conditions are met. They are also called slag
slong, jargon and proper names. code and does not replicate itself.
Time bomb It is a piece of software that is used to the
File Access Permission explode at a particular time.
Most current file systems have methods of assigning Application Gateway This applies security mechanisms to
specific application such as File Transfer Protocol (FTP) and
permission or access rights to specific users and group of users.
Telnet Services.
These systems control the ability of the users to view or make
Proxy Server A proxy server can act as a firewall by
changes to the contents of the file system. File access permission responding to input packets in the manner of a application
refer to privileges that allow a user to read, write or execute a file. while blocking other packets. It hides the true network
There are three specific permissions as follows addresses and used to intercept all messages entering and
1. Read Permission leaving the network.
If you have read permission of a file, you can see the
contents. In case of directory access means that the user can
read the contents.
(67)
10. BASIC is _______ language.
1. _______ can combine object modules from multiple files.
(A) A procedural (B) An object oriented
(A) Linker (B) Loader
(C) Both (a) and (b) (D) Calculating device
(C) Interpreter (D) Complier
(E) None of these (E) None of the above
2. What is a notation for writing programs, which are 11. A (n) _______ language reflects the way people think
specifications of a computation or algorithm? mathematically.
(A) Cross-platform programming
(A) An operating system (B) 3GL business programming
(B) Hardware (C) Event-driven programming
(C) Web Browser (D) Functional programming
(D) A programming language (E) None of the above
12. Language used in a computer that is similar to the
(E) None of these languages of human and is easy to understand, is referred
3. _______ is a cross between human language and a as -
programming language. (A) Source code (B) Machine language
(A) Pseudocode (B) Java (C) High level language (D) Object code
(C) The java virtual machine (D) The complier (E) None of these
(E) None of the above 13. What is the expand from of „FORTRAN‟ ?
4. Which of the following is/are called low level language(s)? (A) Formation Transfer (B) Formula Translation
(A) Machine language (B) Assembly language (C) Fortune Translation (D) Formula Trans network
(C) Both (a) and (b) (D) Either (a) and (b) (E) None of these
(E) None of these 14. The errors that can be pointed out by the complier are
5. __________ is a process used by large retailers to study known as -
trends. (A) Syntax errors (B) Semantic errors
(A) Data mining (B) Data selection (C) Logical errors (D) Internal errors
(C) POS (D) Data conversion (E) None of these
(E) None of these 15. A complier translates high level programs into low level
6. COBOL, FORTRAN, and C are _______ programming programs, which is called as _______.
language. (A) Object code (B) Source code
(A) Procedure-oriented (B) Object oriented (C) Complied code (D) Beta code
(C) Font oriented (D) Visual Basic (E) None of these
(E) None of these 16. In DOS, which of the following command is used to delete
7. What do you call the translator which takes assembly all the files as well as sub-directories of a directory?
language program as input & produce machine language
(A) DELETE (B) DEL
code as output?
(A) Complier (B) Interpreter (C) DELTREE (D) MOVE
(C) Debugger (D) Assembler (E) None of these
(E) None of these 17. What is/are the feature(s) of a Multi-processor?
8. „Java‟ is a programming language developed by _______.
(A) James Gosling (B) Jack Simplot (A) It increases reliability
(C) Jory Hamington (D) John Nauchly (B) It distributes tasks
(E) None of these (C) It saves money compared to multiple single system
9. What is an interpreter? (D) All of the above
(A) In interpreter does the conversion line by line as the
program is run (E) None of the above
(B) An interpreter is the representation of the system being 18. __________ is not the category of operating system‟s task.
designed (A) Virus protection (B) Processor management
(C) An interpreter is a general purpose language providing (C) Memory management (D) File management
very efficient execution
(D) An interpreter is a decoder which provides very (E) Device management
efficient execution
(E) None of these
(68)
19. A thread shares its resources with: 28. __________ is the operating system that reads and reacts in
(A) other threads that belong to the same process terms of actual time.
(B) other process similar to the one that the thread belongs (A) Real time system (B) Batch system
to
(C) Quick response system (D) Time sharing system
(C) other threads that belong to similar processes
(D) All of the above (E) None of these
(E) None of the above 29. What happens when you boot up a PC?
20. Multi-programming systems- (A) Portions of the operating system are copied from disk
(A) execute each job faster into memory
(B) execute more jobs at the same time (B) Portions of the operating system are copied from
(C) are used only on large mainframe computers memory onto disk
(D) are easier to develop than single programming systems
(C) Portions of the operating system are compiled
(E) All of the above
21. Which of the following controls the manner of interaction (D) Portions of the operating system are emulated
between the user and the operating system? (E) None of the above
30. The simultaneous processing of two or more programs by
(A) User interface (B) Language translator multiple processors is called-
(C) Platform (D) Screen saver (A) Multi-programming (B) Multi-tasking
(E) None of the above (C) Time-sharing (D) Multi-processing
(E) None of these
22. The blocks of code, included in the operating system, that
31. Digital computers use a ________ system to encode data
software applications interact with are known as:
and programs.
(A) Application Programming Interfaces (APIs).
(A) Semiconductor (B) Decimal
(B) complimentary Metal-Oxide Conductors (CMOS).
(C) Binary (D) RAM
(C) Device drivers.
(E) ROM
(D) Bootstrap loaders. 32. A main characteristic of computer system is ______, that
(E) None of these can perform different types of tasks at the same time.
23. __________ is called as program in execution. (A) Diligence (B) Versatility
(A) instruction (B) procedure (C) Accuracy (D) Speed
(C) function (D) process (E) No IQ
(E) All of these 33. Something which has easily-understood instructions is said
24. Embedded operating system used: to be:
(A) On a PDA (A) Information (B) Word processing
(B) On a desktop operating system
(C) Icon (D) User friendly
(C) On a networked PC
(D) On a network server (E) None of these
(E) On a mainframe 34. Which among the following term is related to the collection
25. Linux is a type of software- of links throughout the Internet that creates an
(A) shareware (B) commercial interconnected network?
(C) proprietary (D) open source (A) WWW (B) Web
(E) Both (a) and (d) (C) World Wide Web (D) All of the above options
26. The capability of the operating system is to enable two or
(E) Wide Area Web
more than two programs to execute simultaneously in a
single computer system by a single processor is 35. Commands at the top of a screen such as File-Edit, Format
__________. and Tools to operate and change things are incorporated in
____________.
(A) multi-processing (B) multi-tasking
(A) Menu bar (B) Tool bar
(C) multi-programming (D) multi-execution
(C) User friendly (D) Word processor
(E) None of these
(E) None of these
27. The type of operating system you use depends on your
36. The first electronic digital computer contained _______?
computer __________.
(A) Electronic valves (B) Neural Networks
(A) I/O device (B) platform
(C) Fuzzy Logic (D) Semiconductor memory
(C) browser (D) Both (a) and (b)
(E) None of these
(E) None of these
(69)
37. A set of instructions telling the computer what to do is 46. Which generation of computer is still under development
called- phase?
(A) Mentor (B) Instructor (A) Fourth Generation (B) Fifth Generation
(C) Compiler (D) Program (C) Third Generation (D) Seventh Generation
(E) Debugger (E) Second Generation
38. Which of the following kind of devices allow the user to 47. The properly arranged data is called_________.
add components and capabilities to a computer system? (A) Field (B) Words
(A) System boards (B) Storage devices (C) Information (D) Metadata
(C) Input devices (D) Output devices (E) Memory
(E) Expansion slots
39. _____ is a Windows utility program that located and 48. What is the difference between memory and storage?
eliminates unnecessary fragments and rearranges filed and (A) Memory is Temporary and storage is permanent
unused to disk space to optimize operations.
(B) Memory is Permanent and storage is temporary
(A) Backup (B) Disk cleanup (C) Memory is Slow and storage is fast
(C) Disk defragmenter (D) Restore (D) Both (b) and (c)
(E) Disk restorer (E) All of above
40. Which of the following extension refers to System files? 49. Analog computers work on the supply of ___________.
(A) .COM (B) .EXE (A) Continuous electrical pulses
(C) .SYS (D) .PRG (B) Input of varying voltage
(E) None of these (C) Magnetic strength
41. The term „time sharing‟ has been replaced by: (D) Digital inputs
(A) multi-tasking system (E) None of the above
(B) multi-programming system
(C) multi-processing system 50. The central processing unit (CPU) consists of:
(D) multi-execution system (A) User, Input, Secondary storage
(E) None of the above (B) Control unit, Primary storage, and Secondary storage
42. Press __________ to open „Find‟ dialog box. (C) Control unit, Processing, and Secondary storage
(A) Ctrl + F (B) Alt + F
(D) Control unit, Arithmetic-logic unit and Primary
(C) Tab + F (D) Ctrl + Alt + F
storage
(E) None of these
43. What is an intranet? (E) Internet, Arithmetic-logic unit, Input
(A) A LAN of an organization 51. Which type of error in an algorithm that causes incorrect
(B) A wide Area Network connecting all branches of an results?
organization (A) Logical error (B) Syntax error
(C) A corporate computer network (C) Machine Error (D) Compiler error
(D) A network connecting all computers of an organization
(E) None of these
and using the internet protocol
(E) None of these 52. What is a collection of data that is stored electronically as
44. Specialized program(s) designed to allow particular input a series of records in a table?
or output device(s) to communicate with the rest of the (A) Outlook (B) Presentation
computer system is called _______. (C) Database (D) Web page
(A) Computer (B) Device drivers (E) None of the above
(C) Interpreters (D) Operating system
53. What is a network of geographically distant computers and
(E) None of these
terminals called?
45. Which of the following scrambles a message by applying a
secret code? (A) Integrated Services Digital Network (ISDN)
(A) Encryption (B) Audits (B) Metropolitan area network (MAN)
(C) UPS (D) Firewalls (C) Wide area network (WAN)
(E) None of the above (D) Local area network (LAN)
(E) None of these
(70)
54. Which of the following runs on a user's local computer and 64. The general term peripheral equipment is used for ---------
is used to request and display Web pages? (A) Any device that attached to a computer system
(A) FTP (B) Web browser (B) Large scale computer system
(C) Web server (D) HTML (C) A program collection (D) Other office equipment
(E) None of these (E) None of these
55. Which type of computer is used to analyze vast quantities 65. Which device can understand the difference between data
of scientific data and display underlying patterns?
and rograms?
(A) Mainframe (B) Server (A) Input device (B) Output device
(C) Supercomputer (D) Minicomputer (C) Memory (D) Processor
(E) None of these (E) None of these
56. Which process checks to ensure the components of the 66. The simultaneous execution of two or more instructions is
computer are operating and connected properly? called ……………
(A) Booting (B) Processing (A) Sequential access (B) Reduced instruction set
(C) Saving (D) Editing (C) Multiprocessing (D) disk mirroring
(E) None of these
(E) None of these
67. The standard protocol of the Internet is
57. What kind of programming language is Java? (A) TCP/IP (B) Java
(A) Object-oriented programming language (C) HTML (D) Flash
(B) Relational programming language (E) None of these
68. Which of the following term is associated with Internet/E-
(C) Sixth-generation programming language
mail
(D) Database management programming language (A) Plotter (B) Slide presentation
(E) None of these (C) Bookmark (D) Pie chart
58. A set of instruction telling the computer what to do is (E) Microsoft Excel
called? 69. The IP address 135.0.10.27 belongs to address class
(A) Mentor (B) instructor (A) A (B) B
(C) C (D) D
(C) compiler (D) program
(E) None of these
(E) debugger 70. Which of the following describes programs that can run
59. When you save a Microsoft Access project, what file independently, travel from system to system and disrupt
format do you use? computer communication?
(A) .adp (B) .Xml (A) Trojans (B) Viruses
(C) .mbd (D) All of these (C) Worm (D) Droppers
(E) All of these
(E) None of these
71. The first Computer Virus is __________.
60. The software that secretly collects information about the (A) Creeper (B) Sasser
web client's internet habits? (C) Blaster (D) All of the above
(A) Detect ware (B) Spam (E) None of these
(C) Spyware (D) Pharming 72. McAfee is an example of __________.
(E) All of these (A) Virus (B) Antivirus
61. Windows operating system was developed by: (C) Word Processing Software (D) Photo Editing Software
(A) Apple Inc. (B) Microsoft
(E) None of these
(C) Wipro (D) IBM
73. LISP is suitable for _______ operations.
(E) Sun Enterprises
(A) Numeric (B) Arithmetic
62. Windows 98 (codename : Memphis) was developed in-
(C) Both (a) and (b) (D) Character
(A) 1989 (B) 1998
(E) None of these
(C) 2005 (D) 2006
74. _______ is a mathematically oriented high level language
(E) 2007
63. __________ is when the more power-hungry components, frequently used in time sharing.
such as the monitor and hard drive, are put on idle. (A) ASCII (B) ANSI
(A) Hibernation (B) Powerdown (C) ADA (D) APL
(C) Standby mode (D)The shutdown procedure
(E) None of these
(E)None of the above
(71)
75. What is the full form of APL? 84. ________ is a useful tool which allows you to create a
(A) A Programming Language huge number of documents by merging the main document
with the data source.
(B) Procedure Language
(A) Mail Merge (B) Track Change
(C) Array Programming Language (C) Page Margin (D) Orientation
(D) Array Programming Level 85. (E) None of these
(E) None of the above 86. Comments appear on the document margins in which
shape?
76. By default, word 2010 saves a document with the
(A) Square Shape (B) Round shape
_________ extension.
(C) Balloon shape (D) Triangular shape
(A) .docx (B) .doc
(E) None of these
(C) docs (D) ppt
87. Which of the following is not an in-built software
(E) None of these
application found in MS windows?
77. The default extension of Power point 2010 is-
(A) Paint (B) CD Player
(A) .ppt (B) .pdf (C) Disk Defragmentor (D) Volume Control
(C) .pptx (D) .pps (E) MS Word
(E) None of these 88. What does the CTRL+A shortcut keys combination allow
you to do in MS-Word?
78. ________ is not an arithmetic operator in MS Excel.
(A) Bold highlighted selection
(A) + (Plus) (B) * (Asterisk) (B) Open the print window
(C) % (Percent) (D) = (Equals) (C) Select all contents of the page
(E) None of these (D) Copy selected area
(E) Underline highlighted selection
79. Which of the following is an example of a system
software?
89. What is a standard file format for text files?
(A) Windows 7 (B) MS Word 2010
(A) JPEG (.jpg) (B) Bitmap (.bmp)
(C) MS Power Point 2010 (D) Open Office Writer
(C) Word (.doc) (D) Text (.txt)#
(E) None of these
(E) .xls
80. The key combination of „Ctrl + Right Arrow‟ is used to
90. You cannot save an Excel file in a/an _____ format.
_______ in MS Word.
(A) Move the cursor one word to the right (A) PDF (B) PSD
(B) Move the cursor to the end of the line (C) TXT (D) XML
(C) Move to cursor to the end of the document (E) None of these
(D) Move the cursor one paragraph down 91. The _______ appears automatically when you select text in
(E) None of these an Office suite program, such as word, Excel or
81. Which of the following is referred to as an entry in Excel PowerPoint.
that contains alphabets or non-numeric characters? (A) Mini toolbar (B) Key Tip
(A) Label (B) Value
(C) Screen Tip (D) Live Preview
(C) Formula (D) Function
(E) None of these
(E) None of these
82. In MS Excel, which of the following types of selection is 92. Which of the following is refers to a small, single-site
applied when the data present in cells is selected network?
randomly? (A) LAN (B) DNS
(A) Continuous (B) Spontaneous (C) USB (D) RAM
(C) In-continuous (D) Non-continuous (E) None of these
(E) None of these 93. A ______ often simply referred to as a network, is a
83. Which of the following happens when CTRL + V is collection of hardware components and computers
pressed together? interconnected by communication channels that allow
(A) The item that you have selected is pasted to the sharing of resources and information.
clipboard (A) Computer network (B) Router
(B) The item that you have selected is pasted from the (C) Modem (D) WWW
clipboard to the document
(E) None of these
(C) The capital letter V is typed one the document
(D) You drawing will be distributed vertically on the page
(E) None of these
(72)
94. A _____ is a system of digital message formats and rules 103. What is the meaning of Bandwidth in Network?
for exchanging those messages in or between computing (A) Transmission capacity of a communication channels
systems and in telecommunications. (B) Connected Computers in the Network
(A) Communication protocol (B) Router (C) Class of IP used in Network
(C) Modem (D) DNS (D) All of above
(E) None of these (E) None of above
95. Which is commonly used protocol for exchanging files 104. Which of the following TCP/IP protocol is used for
over any network that supports the TCP/IP protocol. transferring electronic mail messages from one machine to
another?
(A) FTP (B) TCP
(A) FTP (B) SNMP
(C) SMTP (D) HTTP (C) SMTP (D) RPC
(E) None of these (E) None of these
96. LAN card is also known as ______. 105. What is the default subnet mask for a class C network?
(A) CIN (B) INC (A) 127.0.0.1 (B) 255.0.0.0
(C) NIC (D) ICN (C) 255.255.0.0 (D) 255.255.255.0
(E) None of these (E) None of these
97. Which of the following protocols uses both TCP and UDP? 106. Hubs are present in the network-
(A) FTP (B) SMTP (A) To diagnose line failures, measure and manage
(B) Traffic flow and simplify reconfiguring of LANs
(C) Telnet (D) DNS
(C) To interconnect the LAN with WANs
(E) None of the above
(D) To check the network
98. A ______ is a data communications network that covers a
(E) None of these
relatively broad geographic area and that often uses
107. A mistake in an algorithm that causes incorrect results is
transmission facilities provide by common carries, such as
called a________.
telephone companies. (A) logical error (B) syntax error
(A) WAN (B) LAN (C) procedural error (D) compiler error
(C) MAIN (D) SAN (E) machine error
(E) None of these 108. Vendor created program modifications are called-
(A) bugs (B) antiviruses
99. If you use either Telnet of FTP, which is the highest layer (C) holes (D) fixes
you are using to transmit data? (E) overlaps
(A) Presentation (B) Application 109. The two major categories of software include-
(C) Session (D) Transport (A) operating system and utility
(E) None of these (B) personal productivity and system
(C) system software and application software
100. Frames from one LAN can be transmitted to another LAN
via the device- (D) system software and utility software
(E) None of the above
(A) Router (B) Bridge
110. What is also known as service program? (this type of
(C) Repeater (D) Modem program perform(s) specific tasks related to managing
(E) None of these computer resources)
101. Router operates in which layer of the OSI model? (A) Operating system (B) Language translator
(A) Physical layer (B) Data link layer (C) Utility program (D) Device driver
(C) Network layer (D) All of these (E) All of these
111. “GUI” stands for-
(E) None of these
(A) Graphical Universal Interface
102. End-to-end connectivity is provided from host-to-host in -
(B) Graphical User Interface
(A) Network layer (B) Session layer
(C) Graphical Uninstall/install
(C) Data line layer (D) Transport layer
(D) General Utility Interface
(E) None of these
(E) None of the above
(73)
112. A (n) __________ backup contains a copy of every 121. What kind of software would you most likely use to keep
program, data and system file on a computer. track of a billing account?
(A) restoration (B) bootstrap (A) word processing (B) electronic publishing
(C) differential (D) full (C) spreadsheet (D) DBMS
(E) None of the above (E) None of these
113. Which of the following Windows utility feature will erase 122. Which of the following places the common data elements
unwanted files? in order from smallest to largest?
(A) Disk clean-up (B) Scanning (A) Character, File, Record, Field, Database, File
(C) Backup or restore wizard (D) Disk defragmenter (B) Character, Record, Field, Database, File
(E) None of these (C) Character, Field, Record, File, Database
114. Which of the following software is/are allow users to (D) Bit, Byte, Character, Record, Field, File, Database
perform calculation on rows and columns of data? (E) None of these
(A) Word processing 123. The analytical engine developed during first generation of
(B) Presentation graphics computers used __________ as a memory unit.
(A) RAM (B) Floppies
(C) Electronic spreadsheet (C) Cards (D) Counter wheels
(D) Database management system (E) None of these
(E) None of the above 124. Which device is used to backup the data?
(A) Floppy Disk (B) Tape
115. Programs designed specifically to address general purpose
(C) Network Drive. (D) All of the above
applications and special purpose applications are called-
(E) None of these
(A) Operating system 125. Which of the following is used to hold ROM, RAM, CPU
(B) System software and expansion cards?
(C) Application software (A) Computer bus (B) Motherboard
(C) Cache memory (D) All of these
(D) Management information system (E) None of these
(E) None of the above 126. A half byte is known as_____.
116. Which of the following(s) is/are the characteristics of (A) data (B) bit
system software? (C) half byte (D) nibble
(A) Provides a programming environment (E) None of these
(B) Part of object oriented programming language 127. __________ is the permanent memory built into your
(C) Performs the tasks related to the execution of an computer called.
application program (A) ROM (B) CPU
(D) Both (a) and (c) (C) DVD-ROM (D) RAM
(E) None of the above (E) None of these
117. The __________ contains specific rules and words that 128. Main memory works in conjunction with __________.
express the logical steps of an algorithm.
(A) syntax (B) programming language (A) RAM (B) CPU
(C) programming structure (D) logic chart (C) Graphics card (D) LAN
(E) None of these (E) None of these
118. __________ runs on computer hardware and serve as 129. Magnetic tape is not practical for applications where data
platform for other software to run on. must be quickly recalled because tape is __________.
(A) VLC (B) Java
(A) A random-access medium
(C) Operating system (D) All of these
(B) A sequential-access medium
(E) None of these
(C) A read-only medium
119. Which of the following(s) is/are example(s) of Operating
(D) An expensive storage medium
systems?
(A) Linux (B) Unix (E) None of these
(C) Windows XP (D) Mac OS 130. SRAM stands for-
(E) All of these (A) Special Random Access Memory
120. What is used to support, enhance, expand and secure
(B) Supreme Random Access Memory
existing programs and data in the computer system?
(C) Static Random Access Memory
(A) Java (B) Operating system
(D) Stable Random Access Memory
(C) Web Browser (D) System utility
(E) None of these
(E) None of these
(74)
131. What is the main advantage of magnetic core memory over 140. Dedicated Computer means_____.
semiconductor RAM memory? (A) Doesn‟t have OS
(A) More compact and smaller (B) Used by single person
(C) Assigned to one and only one task
(B) More economical
(D) All of above
(C) A bit does not have to write after reading (E) None of these
(D) Non-volatile 141. A Pixel is __________.
(E) None of these (A) A computer program that draws picture
132. 11. Permanent instructions that the computer uses when it (B) A picture stored in secondary memory
is turned on and that cannot be changed by other (C) The smallest resolvable part of a picture
instructions are contained in- (D) None of these
(A) ROM (B) RAM (E) All of the above
(C) ALU (D) CPU 142. In Computer terminology „CAD‟ is stands for____.
(E) DRAM (A) Computer and Design
133. Virtual memory is_______. (B) Computer Algorithm in Design
(C) Computer Aided Design
(A) memory on the hard disk that the CPU uses an
(D) Computer and Device
extended RAM
(E) None of the above
(B) in RAM
(C) only necessary if you do not have any RAM in your 143. What is Unicode?
computer (A) Standard Font
(D) a backup device for floppy disk (B) Software
(E) None of the above
134. Flash memory is also called as __________. (C) Character Encoding System
(A) Flash RAM (B) Flash ROM (D) keyboard Layout
(C) Flash DRAM (D) Flash DROM (E) None of the above
(E) None of these
144. Which of the following is available in the form of a PC
135. USB stands for-
now?
(A) Uniform Service Bus (B) Universal Serial Bus
(C) Universal Sector Buffer (D) Universe Service Bus (A) Mainframe (B) Micro computer
(E) None of these (C) Mini computer (D) Both (b) and (c)
136. A Winchester disk is a_________. (E) None of the above
(A) disk stack (B) removable disk
(C) flexible disk (D) All of these
(E) None of these 145. Which of the following is generally costlier?
137. Portable computer also known as laptop computer (A) Server (B) Notebook computer
weighing between 4 and 10 pounds is called -
(C) Personal computer (D) Laptop computer
(A) general-purpose application
(E) Mainframe
(B) internet
146. __________ processing is used in mainframe computer.
(C) scanner
(A) Batch (B) Parallel
(D) printer
(C) Serial (D)Toggle
(E) notebook computer
(E)None of these
138. The main distinguishing feature of fifth generation digital
147. __________ are specially designed computer that perform
computer will be -
complex calculations extremely rapidly.
(A) liberal and microprocessors (A) Servers (B) Super computers
(B) artificial intelligence (C) Laptops (D) Mainframes
(C) extremely low cost (E) None of the above
(D) versatility 148. A single bus structure is primarily found in_______.
(A) mainframes
(E) None of the above (B) super computers
139. A personal computer design to meet the computing needs (C) high performance machines
of a(n)_________. (D) mini and micro computer
(A) individual (B) department (E)None of the above
(C) company (D) city
(E) None of these
(75)
149. Which of the following computer is used in the weather 159. Programs designed to perform specific tasks related to
forecasting? managing computer resources are called_____.
(A) Super computers (B) Mainframe computers (A) Operating system (B) Helper software
(C) Mini computers (D) Micro computers
(C) System software (D) Application software
(E) None of these
150. Modern computers in compared to earlier computers (E) Utility software
are_______. 160. _____ is a Windows utility program that located and
(A) faster and larger (B) less reliable eliminates unnecessary fragments and rearranges filed and
(C) larger and stronger (D) slower but more reliable unused to disk space to optimise operations.
(E) faster and smaller (A) Backup (B) Disk cleanup
151. PARAM is an example of_____. (C) Disk defragmenter (D) Restore
(A) super computer (B) laptop (E) Disk restorer
(C) PC (D) PDA 161. Which command is used to set a name to a disk in DOS?
(E) None of these (A) VOLUME (B) VOL
152. If you wish to extend the length of the network without (C) LABEL (D) DISKLABEL
having the signal degrade, you would use a _____. (E) None of these
(A) Repeater (B) Router 162. Software that is actively utilised by end-users (like word or
(C) Gateway (D) Switch powerpoint) is called
(E) None of these (A) Actionware (B) Operating system
153. What is a Firewall in Computer Network? (C) System software (D) Driver
(A) The physical boundary of Network (E) Application software
(B) An operating System of Computer Network 163. Distributed processing involves
(C) A system designed to prevent unauthorized access (A) Solving computer component problems from a
(D) A web browsing Software different computer
(E) None of these (B) Solving computing problems by breaking them into
smaller parts that are separately processed by different
154. The process of trading goods over the internet is known as computers
_________.
(C) Allowing users to share files on a network
(A) E-selling-n-buying
(D) Allowing users to access network resources away from
(B) E-trading (C) E-finance the office
(D) E-salesmanship (E) E-commerce (E) None of the above
155. C was developed by ______. 164. What is an intranet?
(A)Ada Byron (B) Bill Gates (A) A LAN of an organization
(C) Blaise Pascale (D) Dennis Ritchie (B) A wide Area Network connecting all branches of an
(E) None of these organization
156. Which of the following is a programming language? (C) A corporate computer network
(A) Lotus (B) Pascal (D) A network connecting all computers of an organization
and using the internet protocol
(C) MS-Excel (D) Netscape
(E) None of these
(E) None of these
165. Specialised program(s) designed to allow particular input
157. The term is used to describe the intangible instructions that or output device(s) to communication with the rest of the
tell the computer what to do is known as_______. computer system is called _______.
(A) Hardware (B) Software (A) Computer (B) Device drivers
(C) Storage (D) Input/output (C) Interpreters (D) Operating system
(E) None of these (E) None of these
158. A set of instructions telling the computer what to do is 166. Which of the following scrambles a message by applying a
called______. secret code?
(A) Mentor (B) Instructor (A) Encryption (B) Audits
(C) Complier (D) Program (C) UPS (D) Firewalls
(E) Debugger (E) None of the above
(76)
167. Video processor consist of ______ and _____ which store 176. Which bus is used to connect the monitor to the CPU?
and process images. (A) PCI bus (B) KISS bus
(A) CPU and VGA (B) CPU and memory (C) HACK bus (D) SCSI bus
(C) VGA and memory (D) VGI and DVI (E) Monitor bus
(E) VGA and VGI 177. A physical connection between the microprocessor
168. The hard drive is normally located__________. memory and other parts of the micro computer is known
as______.
(A) next to the printer
(A) path (B) address bus
(B) plugged into the back of the computer
(C) route (D) All of these
(C) underneath the monitor
(E) None of these
(D) on top of the CD-ROM
178. The name of the location of a particular piece of data is
(E) inside the system base unit
its_______.
169. A temporary storage area, attached to the CPU, for I/O
(A) address (B) memory name
operations is a __________.
(C) storage (D) data location
(A) buffer (B) chip
(E) None of these
(C) register (D) core
179. __________ are used to quickly accept, store and transfer
(E) cache data and instructions that are being used immediately by
170. Which of the following is related to „register‟? the CPU.
(A) Digital circuit (B) Combinational circuit (A) Registers (B) Caches
(C) Arithmetic circuit (D) Sequential circuit (C) RAMs (D) Graphics
(E) None of these (E) None of these
171. Front-end processor is a __________ designed specifically 180. The microprocessor is the brain of the computer and is also
to handle and communication processing task. called a______.
(A) ALU (B) Program (A) microchip (B) macrochip
(C) Computer (D) register (C) macroprocessor (D) calculator
(E) None of these (E) None of these
172. The time a device takes to locate data and instructions and 181. FORTRAN is useful in __________ sector.
make them available as output to users is known as_____. (A) Business purpose (B) Earthquake Analysis
(A) clock speed (B) a processing cycle (C) Scientific purpose (D) Office management
(C) CPU speed (D) access time (E) Census analysis
(E) None of these 182. Which one of the following is not a data processing
173. A group of wires running parallel to each other in between functions of a computer?
two connected computer parts and which transfers (A) Gathering data
information is called a______. (B) Processing data into information
(A) track (B) bus (C) Analyzing the data or information
(C) cable (D) bundle (D) Storing the data or information
(E) None of these (E) None of these
174. The ALU makes use of __________ to store the 183. The organization and interconnection of the various
intermediate results. components of a computer system is___.
(A) accumulators (B) heap (A) architecture (B) networks
(C) None of these (D) registers (C) graphics (D) designing
(E) stack (E) None of these
175. Who co-ordinate the sequencing of events within the 184. __________ is defined as the science of selecting and
central processor of a computer? interconnecting hardware components to create computers
that meets functional, performance and cost goals.
(A) Logic unit (B) Arithmetic unit
(A) Computer (B) Calculator
(C) Register (D) Control unit
(C) Calculating machine (D) Computer architecture
(E) None of these
(E) None of these
(77)
185. The brain of any computer system is__ 194. The clock rate of a processor is measured in_____.
(A) ALU (B) memory (A) Milliseconds (B) Micro hertz
(C) CPU (D) control unit (C) Megabytes or Gigabytes (D) Nanoseconds
(E) None of these (E) Megahertz or Gigahertz
186. The ALU performs __________ operation. 195. The central processing unit is an example of-
(A) ASCII (B) Logarithm (A) peripheral (B) an output unit
(C) Algorithm (D) Arithmetic (C) software (D) a program
(E) None of these
(E) hardware
187. The main job of a CPU is to_____.
196. All the logic and mathematical calculations done by the
(A) carry out program instructions computer happen in/on the-
(B) store data/information for further use (A) system board (B) central control unit
(C) process data and information
(C) central processing unit (D) motherboard
(D) Both (a) and (c)
(E) memory
(E) None of these
197. Which is the first Mechanical calculator?
188. The three main parts of the processor are_______.
(A) Abacus (B) Napier‟s Bones
(A) ALU, Control Unit and Registers
(C) Pascaline (D) Stepped Reckoner
(B) ALU, Control Unit and RAM
(E) None of these
(C) Cache, Control Unit and Register
(D) Control Unit, Registers and RAM 198. Which of the following device used „set of beads‟ to
represent the unit of data?
(E) RAM, ROM and CD-ROM
(A) ENIAC (B) EDVAC
189. Motherboard is also known as_____.
(C) Abacus (D) MARK - I
(A) Electronic Board (EB)
(B) Simulating Board (SB) (E) None of these
(C) Printed Circuit Board (PCB) 199. Rabdologia was the technology used for calculation
purpose introduced in___ .
(D) Combined Device Board (CDB)
(E) Controller Board (CB) (A) 1617 (B) 1801
190. The hardware in which data may be stored for a computer (C) 1824 (D) 1901
system is called- (E) 1917
(A) registers (B) bus 200. Pascaline is also known as-
(C) control unit (D) memory (A) mechanical machine (B) adding machine
(E) chip (C) division machine (D) difference machine
191. Which of the following units of measurement used with (E) None of these
computer system?
201. Which was the computer designed by Babbage?
(A) Byte (B) Kilobyte
(A) Analytical engine (B) Arithmetic machine
(C) Megabyte (D) Gigabyte
(C) Donald knuth (D) All of the above
(E) All of these
(E) None of these
192. Data processing cycle contains______.
(A) input cycle and output cycle 202. Computer‟s basic architecture was developed by____
(B) input cycle, output cycle and processing cycle (A) Charles Babbage (B) Blaise Pascal
(C) output cycle and processing cycle (C) Steve Newton (D) John Von Neumann
(D) data mining and refining cycle (E) Henery Johns
(E) None of the above 203. __________ is the father of punched card.
193. Transformation of input into output is performed by____. (A) Herman Hollerith (B) Joanthan lva
(A) peripherals (B) memory (C) Charles Babbage (D) Blaise Pascal
(C) storage (D) input-output unit (E) None of these
(E) CPU
(78)
204. The person contributing the idea of stored program 214. __________ is when the more power-hungry components,
was____ such as the monitor and hard drive, are put in idle.
(A) John Neumann (B) Howard Aiken (A) Hibernation (B) Powerdown
(C) Standby mode (D) The shutdown procedure
(C) Dennis Ritchie (D) Charles Babbage (E) None of the above
(E) Denial Thomas 215. Various applications and documents are represented on the
205. Who has made transistors? Windows desktop by __________.
(A) John William (B) Walter Hang (A) symbols (B) labels
(C) graphs (D) icons
(C) John Miton (D) John Bardeen
(E) None of these
(E) None of these 216. A small arrow or blinking symbol on desktop is called
206. Name the first general purpose electronic computer. _____ .
(A) EDVAC (B) ADVAC (A) mouse (B) logo
(C) hand (D) cursor
(C) Mac (D) IBM-PC
(E) palm
(E) ENIAC 217. Help menu is available at which button?
207. IBM-PC is an example of - (A) End (B) Start
(A) First generation computer (C) Turn Off (D) Restart
(E) Reboot
(B) Second generation computer
218. Date and time are available on the desktop at -
(C) Third generation computer
(A) keyboard (B) recycle bin
(D) Fourth generation computer
(C) my computer (D) task bar
(E) None of these
(E) None of these
208. Pascaline was invented by __________.
219. Which of the following is referred as Background of
(A) Charles Babbage (B) Blaise Pascal screen?
(C) Ada Byron (D) Herman Hollerith (A) application (B) desktop
(E) None of these (C) window (D) frame
209. The IC chip used in computer, is generally made up of (E) None of these
which among the following?
220. Menu is a part of the________.
(A) Silver (B) Gold
(A) hardware (B) user interface
(C) Chromite (D) Silicon
(C) status bar (D) monitor
(E) Iron
(E) None of these
210. This type of computer(s) is/are the least powerful, yet the
221. The recycle bin stores deleted items until________ .
most widely used and fastest-growing computer.
(A) another user logs on (B) the computer is shutdown
(A) Mainframe computers (B) Super computers
(C) the end of the day (D) you empty it
(C) Micro computers (D) All of these
(E) None of the above
(E) None of these
222. __________ shows the files, folders and drives on your
211. A micro computer is a small, relatively inexpensive
computers and make it easy to navigate from one location
computer with a microprocessor. Which is the first micro
to another within the file hierarchy.
computer?
(A) Microsoft Internet Explorer
(A) Z2 (B) Tital-1
(B) Windows Explorer
(C) MARK-B (D) Altair
(C) My Computer
(E) None of these
(D) Folders Manager
212. Windows operating system was developed by:
(A) Apple Inc. (B) Microsoft (E) None of these
(C) Wipro (D) IBM 223. To restart the computer, the following combination of key
(E) Sun Enterprises is used.
213. Windows 98 (codenamed : Memphis) was developed in- (A) Del + Ctrl (B) Backspace + Ctrl
(A) 1989 (B) 1998 (C) Esc + Ctrl (D) Insert + Esc
(C) 2005 (D) 2006 (E) Ctrl + Alt + Del
(E) 2007
(79)
224. „.txt‟ files can be made in __________. 234. Which of the following kind of devices allow the user to
(A) Notepad (B) Windows Media Player add components and capabilities to a computer system?
(C) WordPad (D) Both (a) and (c) (A) System boards (B) Storage devices
(E) None of the above
(C) Input devices (D) Output devices
225. Which of the following is the first step in sizing a window?
(A) Point to the title bar (E) Expansion slots
(B) Pull down the view menu to display the toolbar 235. EPROM is generally erased by using ________.
(C) Point to any corner or border (A) ultraviolet rays (B) infrared rays
(D) Pull down the view menu and change to large icons
(C) 12V electrical pulse (D) 24V electrical pulse
(E) None of the above
226. A __________ is a collection of information saved as a (E) None of the above
unit. 236. Which of the following extension refers to System files?
(A) folder (B) file (A) COM (B) EXE
(C) path (D) file extension
(C) SYS (D) PRG
(E) None of these
227. _______ are specially designed computer chips that reside (E) None of these
in other devices. Such as your car or your electronic 237. The term „time sharing‟ has been replaced by:
thermostat. (A) multi-tasking system
(A) Severs (B) Embedded computers (B) multi-programming system
(C) Robotic Computers (D) Mainframe (C) multi-processing system
(E) None of these (D) multi-execution system
228. Primary Memory stores: (E) None of the above
(A) Result (B) Data 238. Press __________ to open „Find‟ dialog box.
(C) Programs (D) All of these (A) Ctrl + F (B) Alt + F
(E) None of these (C) Tab + F (D) Ctrl + Alt + F
229. What is the term used for measurement of how fast data (E) None of these
moves from one place to another? 239. How can you access the font size tool on font dialog box in
(A) data per unit (B) bits per second MS Word?
(C) bits per hour (D) ratio per bit (A) Ctrl + S (B) Ctrl + Shift + S
(E) None of the above (C) Ctrl + P (D) Ctrl + Shift + P
230. Which among the following term is related to the collection (E) Alt + P
of links throughout the Internet that creates an 240. Which of the following terms is related to Internet
interconnected network? connectivity?
(A) WWW (B) Web (A) IP (B) TCP
(C) World Wide Web (D) All of the above options (C) Gopher (D) Both (a) and (b)
(E) Wide Area Web (E) All of the above
231. Pascaline is among which of the type of machine? 241. What is Visual FOXPRO?
(A) Mechanical machine (B) Arithmetic machine (A) RDMBS (B) DBMS
(C) Division machine (D) Difference machine (C) Programming Language (D) All of the above
(E) None of the above (E) None of these
232. The first electronic digital computer contained _______? 242. What is the main folder on a storage device called?
(A) Electronic valves (B) Neural Networks (A) Platform (B) Interface
(C) Fuzzy Logic (D) Semiconductor memory (C) Root directory (D) Homepage
(E) None of these (E) None of these
233. Which of the following is a term for the process of trading 243. Caps lock, num-lock are known as…
goods over the Internet?
(A) Modifier key (B) Toggle key
(A) e-selling-n-buying (B) e-trading
(C) Function key (D) Numeric key
(C) e-finance (D) e-salesmanship
(E) None of these
(E) e-commerce
(80)
244. The smallest unit of information a computer can understand 253. What is required when more than one person uses a central
and process is known as a___________ computer at the same time?
(A) digit (B) kilo byte (A) Light pen (B) Mouse
(C) Bit (D) Byte (C) Digitizer (D) Terminal
(E) None of these (E) None of these
245. The general term peripheral equipment is used for ---------- 254. A high quality CAD system uses which of the following
(A) Any device that attached to a computer system for printing drawing and graphs.
(B) Large scale computer system (A) Dot matrix printer (B) Digital plotter
(C) A program collection (C) Line printer (D) All of the above
(D) Other office equipment (E) None of these
(E) None of these 255. …………… terminal (cash register) are often connected to
246. Which device can understand the difference between data complex inventory and sales computer system.
and programs? (A) data (B) Point of sale (pos)
(A) Input device (B) Output device (C) Sales (D) Query
(C) Memory (D) Processor
(E) None of these
(E) None of these
256. What do we call a storage device where the access time is
247. The simultaneous execution of two or more instructions is efficiently independent of the location of the data?
called ……………
(A) direct access storage device
(A) Sequential access (B) Reduced instruction set
(B) Secondary storage device
(C) Multiprocessing (D) disk mirroring
(C) Primary storage device
(E) None
(D) gateway device
248. The Width of a processor‟s data path is measured in bits.
Which of the following are common data paths? (E) None of these
(A) 8 bits (B) 12 bits 257. VIRUS stands for___.
(C) 16 bits (D) 32 bits (A) Vital Information Resources Under Siege
(E) None of these (B) Viral Important Record User Searched
249. Which of the type of memory for information that does not (C) Very Interchanged Result Until Source
change on your computer? (D) Very Intelligent Resources Under Search
(A) RAM (B) ROM (E) None of these
(C) ERAM (D) RW/RAM 258. To protect yourself from computer hacker, you should turn
(E) None of these on a __________.
250. Before a disk can be used to store data. It must be (A) Firewall (B) Script
…………… (C) VLC (D) AUP
(A) Formatted (B) Reformatted (E) Antivirus
259. A virus that migrates freely within a large population of
(C) Addressed (D) Readdressed
unauthorized email user is called a __________.
(E) None of the above
(A) worm (B) flame war
251. The original ASCII code used …………… bits of each
byte, reserving that last bit for error checking (C) macro (D) plagiarism
(A) 5 (B) 6 (E) None of these
(C) 7 (D) 8 260. A __________ is one of thousands of programs that can
(E) None of these invade computer and perform a variety of functions ranging
from annoying (e.g., popping up messages as a joke) to
252. Which company is the biggest player in the microprocessor
dangerous (e.g., deleting files or destroying your hard
industry?
disk).
(A) Motorola (B) IBM
(A) MS Access (B)MS Word
(C) Intel (D) AMD
(C) Antivirus (D) Computer Virus
(E) None of these
(E) None of these
(81)
261. What is short name for malicious software (i.e. software 270. In digital signature, the private key is used for __________
designed to disrupt computer operation, gather sensitive and the public key for __________.
information, or gain unauthorized access to computer (A) encryption, decryption (B) decryption, encryption
systems)?
(C) plaintext, ciphertext (D) ciphertext, plaintext
(A) Moleculewar (B) Malisoft
(E) None of these
(C) Malairasoft (D) Malware
271. Which of the following would most likely not be a
(E) None of these
symptom of a virus?
262. __________ means to prove/verify the identity of the entity
that tries to access the system‟s resources. (A) Existing program files and icons disappear
(A) Entity authentication (B) Message authentication (B) The CD-ROM stops functioning
(C) Password authentication (D) All of the above (C) The web browser opens to an unusual home page
(E) None of these (D) Odd message or images are displayed on the screen
263. What is the name of the viruses that fool a user into (E) None of these
downloading and/or executing them by pretending to be 272. COBOL is widely used in _______ applications.
useful applications?
(A) Commercial (B) Scientific
(A) Cracker (B) Worm
(C) Space (D) Mathematical
(C) Trojan horses (D) Keylogger
(E) None of these
(E) None of these
273. Which of the following programming language is used for
264. Which of the following is/are threat(s) for electronic
creating special programs like applets?
payment system?
(A) Trojan horse (B) Computer virus (A) Java (B) Cable
(C) Computer worms (D) All of the above (C) Domain name (D) Net
(E) None of these (E) COBOL
265. Which of the following virus overtake computer system,
when it boots and destroy information? 274. C, C++, Java, BASIC and COBOL are examples of
_______ languages.
(A) Trojan (B) System infectors
(C) Stealth virus (D) Boot infectors (A) Low level programming (B) High level programming
(E) None of these (C) System programming (D) Computer
266. Which of the following describes programs that can run (E) None of these
independently travel from system to system and disrupt 275. FORTRAN was introduced in the year:
computer communication? (A) 1945 (B) 1949
(A) Trojans (B) Viruses
(C) Worm (D) Droppers (C) 1950 (D) 1957
(E) All of these (E) 1959
267. The first Computer Virus is __________. 276. COBOL was introduced in the year _______ by US
(A) Creeper (B) Sasser Government.
(D) Blaster (D) All of the above (A) 1957 (B) 1959
(E) None of these (C) 1960 (D) 1971
268. McAfee is an example of __________. (E) None of these
(A) Virus 277. 4GL (4th Generation Language) is ____________ .
(B) Antivirus (A) Non-procedural language (B) Procedural language
(C) Word Processing Software (C) Structure language (D) All of the above
(D) Photo Editing Software
(E) None of these
(E) None of these
278. _______ converts assembly language program to object
269. __________ are attempt by individuals to obtain program.
confidential information from you by falsifying their
identity. (A) Complier (B) Assembler
(A) Phishing trips (B) Computer viruses (C) RAM (D) Linker
(C) Spyware scams (D) Viruses (E) None of these
(E) Phishing scams
(82)
279. Which of the following languages is suited to a structured 288. Disadvantage of DBMS is/are:
program? (A) Integrity (B) Complexity
(A) PL/1 (B) FORTRAN (C) Data sharing (D) Security
(C) BASIC (D) PASCAL (E) Recovery
(E) None of these 289. A database management system _____
280. Which of the following statement closely associates with a (A) Allows simultaneous access to multiple files
Complier? (B) Can do more than a record management system
(A) Translator to convert source program into object code (C) Is a collection of programs for managing data in a
(B) Name given to the computer operator single file
(C) Part of the digital machine to store information (D) Both (a) and (b)
(D) Operator of Boolean Algebra (E) None of the above
(E) Part of arithmetic logic unit 290. A ______ consists of a collection of interrelated data and a
281. Which of the following translator is slow in execution? collection of programs to access that data.
(A) Interpreter (B) Complier (A) Database (B) Schema
(C) Assembler (D) All of these (C) DBMS (D) DBA
(E) None of these (E) None of these
282. Which among the following is/are interpreted language? 291. The most popular commercial DBMS is________ .
(A) C (B) C++ (A) Microsoft SOL Server (B) Microsoft Access
(C) Java (D) Visual basic (C) MySQL (D) Oracle
(E) Both (c) and (d) (E) None of the above
283. Which of the following is pure object-oriented language? 292. It is better to use files than a DBMS when there is/are -
(A) Stringent real time requirements
(A) C (B) C++
(B) Complex relationship among data
(C) Java (D) All of these
(C) Multiple users wish to access the data
(E) None of these
(D) All of the above
284. LISP is suitable for _______ operations.
(E) None of the above
(A) Numeric (B) Arithmetic
293. Redundancy is dangerous as it is a potential threat to data
(C) Both (a) and (b) (D) Character
____
(E) None of these (A) Integrity (B) Consistency
285. _______ is a mathematically oriented high level language (C) Sufficiency (D) Both (a) and (c)
frequently used in time sharing. (E) None of these
(A) ASCII (B) ANSI 294. A relationship database consists of a collection of -
(C) ADA (D) APL (A) Tables (B) Fields
(C) Records (D) Keys
(E) None of these
(E) None of these
286. What is the full form of APL?
295. A ______ in a table represents a relationship among a set
(A) A Programming Language
of values.
(B) Procedure Language (A) Column (B) Key
(C) Array Programming Language (C) Row (D) Entry
(D) Array Programming Level (E) None of these
296. The term ______ is used to refer to a row.
(E) None of these
(A) Attribute (B) Tuple
287. Which of the following is/are the primary feature(s) of
DBMS? (C) Field (D) Instance
(A) To provide an environment that is congenial to user (E) None of these
297. Which language can be used by a user to request the
(B) To store the information
information from a database?
(C) To retrieve information
(A) Query (B) Relational
(D) All of the above
(C) Structural (D) Complier
(E) None of the above
(E) None of these
(83)
298. In E-R diagram, derived attribute(s) is/are represented by - 308. __________ appear at the bottom of the Excel Window.
(A) Ellipse (B) Dashed ellipse (A) Work sheet tabs (B) Name box
(C) Rectangle (D) Triangle (C) Formula bar (D) Title bar
(E) None of these (E) None of these
299. In E-R diagram, generalization is represented by - 309. In MS excel __________ are numbered from 1 to onwards
(A) Ellipse (B) Dashed ellipse and __________ are numbered from A to onwards.
(C) Rectangle (D) Triangle (A) Columns, rows (B) Rows, slides
(E) None of these (C) Slides, rows (D) Rows, columns
300. In E-R diagram, relationship is represented by (E) None of these
(A) Ellipse shaped (B) Dashed ellipse shaped 310. What is the default column width of MS Excel?
(C) Rectangle shaped (D) Diamond shaped (A) 5.5 (B) 2.98
(E) None of these (C) 8.43 (D) 6.49
(E) None of these
301. Which of the following hardware component is/are the
most important for the operation of database management 311. To insert a new slide go to __________ tab, in the Slides
system? group, and then click New Slide.
(A) High resolution video display (A) Home (B) View
(B) Printer (C) Animations (D) Slide show
(C) High speed, large capacity disk (E) None of these
(D) Plotter 312. Which among the following are two kind of sound effects
(E) Mouse files that can be added to the presentation in Microsoft
PowerPoint?
302. You can Select all the text in MS Word document by which
of the following shortcut key combination? (A) .wav files and .mid files (B) .wav files and .gif files
(A) Ctrl + S (B) Ctrl + 1 (C) .wav files and .jpg files (D) .jpg files and .gif files
(C) Shift + A (D) Ctrl + A (E) None of these
(E) None of these 313. Times new Roman, Cambria, Arial are the example of
303. MS Word is __________ software. __________.
(A) Font face (B) Themes
(A) System (B) Application
(C) SmartArt (D) Clipart
(C) Programming (D) Compiler (E) None of these
(E) None of these 314. In MS Access a __________ is the collection of data items
304. The shortcut key to paste selected text/picture in MS Word of all the fields pertaining to one entity.
is ____. (A) field (B) record
(A) Ctrl + X (B) Ctrl + C (C) form (D) report
(C) Ctrl + V (D) Ctrl + Z (E) None of these
(E) None of these 315. A table of how many columns at max can you insert in a
305. Print preview is usefull for which of the following action? word document?
(A) colour the document (B) save the document (A) 55 (B) 42
(C) delete the document (D) copy the document (C) 32 (D) 63
(E) As you wish
(E) view how the document will appear when printed
316. In MS Access a __________ name must be unique within a
306. To indent the first paragraph of your report, you should database.
which among the following key? (A) Field (B) Record
(A) Space bar (B) Return key (C) Table (D) Character
(C) Tab key (D) Shift key (E) None of these
(E) None of these 317. _____ devices convert human understandable data and
programs into a form that the computer can process.
307. In Excel, the contents of the active cell are displayed in the
________. (A) Printing (B) Output
(A) footer bar (B) tool bar (C) Solid state (D) Monitor
(C) task bar (D) menu bar (E) Input
(E) formula bar
(84)
318. We can enter text to be computer by _____. 328. Through _____ information travels between components
(A) Scanner (B) Printer on the motherboard.
(C) Router (D) Keyboard (A) CMOS (B) Peripherals
(E) None of these
(C) Bus (D) Flash memory
319. We can quickly move a cursor by using which of the
following device? (E) None of these
(A) Keyboard (B) Monitor 329. RAM is also called as _____.
(C) Mouse (D) Printer (A) Virtual memory (B) Volatile memory
(E) None of these
(C) Non-volatile memory (D) Cache memory
320. Which of the following is not an input device?
(E) None of the above
(A) Mouse (B) Monitor
330. Which of the following is the largest measurement of
(C) Keyboard (D) Microphone
RAM?
(E) None of these
(A) Terabyte (B) Byte
321. Ctrl, Shift and Alt are called _____ keys.
(C) Megabyte (D) Gigabyte
(A) Modifier (B) Function
(E) Megahertz
(C) Alphanumeric (D) Adjustment
331. EEPROM stands for-
(E) None of these
(A) Electrically Erasable Programmable Read Only
322. Which among the following is a button that makes Memory
characters either upper a lower case and numbers to
(B) Electrically Erasable Permanent Resident Of Memory
symbols?
(C) Especially Erasable Programmable Read Only Memory
(A) Monitor (B) Shift key
(D) Encoded Erasable Programmable Read Only Memory
(C) Icon (D) Mouse
(E) None of the above
(E) None of these
332. C was developed by __________.
323. A US standard keyboard follows _______.
(A) Ada Byron (B) Biil Gates
(A) QWERTY model (B) 104-model
(C) Blaise Pascale (D) Dennis Ritchie
(C) 108-model (D) All of these
(E) None of these
(E) None of these
333. JAVA is a __________.
324. Why is the Caps lock key referred to as a toggle key?
(A) Hardware (B) Type of a printer
(A) Because the function goes back and forth every time it
is pressed (C) Type of a monitor (D) Programming language
(B) Because it cannot be used for entering numbers (E) None of these
(C) Because it cannot be used to delete 334. Which language can easily interact with the hardware?
(D) Because it cannot be used to insert (A) Low level language (B) High level language
(E) None of the above (C) Middle level language (D) All of these
325. When a key is pressed, a keyboard interacts with: (E) None of these
(A) Keyboard controller (B) Keyboard buffer 335. COBOL stands for
(C) Mouse ball (D) Both (a) and (b) (A) Central binary oriented language
(E) None of these (B) Central business oriented language
326. The internal memory consists of ______. (C) Common business oriented language
(A) Primary memory (B) Cache memory (D) Common binary oriented language
(C) CPU registers (D) All of the above (E) None of these
(E) None of the above 336. Smart card is:
327. Which of the following refers to the memory in computer? (A) special purpose cards
(A) VGA (B) CPU (B) microprocessor cards
(C) RAM (D) All of these (C) processing unit contains memory for storing data
(E) None of these (D) processing unit for software handling
(E) None of these
(85)
337. 1GL refers to 346. A (n) __________ language reflects the way people think
(A) First generation logarithm mathematically.
(B) First generation logic (A) cross-platform programming
(B) 3GL business programming
(C) First generation light-computer
(C) event-driven programming
(D) First generation programming language
(D) functional programming
(E) None of these
(E) None of the above
338. The first computers were programmed using
347. Which physical layer devices can be used to enlarge the
(A) assembly language (B) machine language area covered by a single LAN segment?
(C) source code (D) object code 1.Switch 2.NIC
3.Hub 4.Repeater
(E) None of these 5.RJ45 transceiver
339. C++, Java, and PHP are __________ programming (A) 1 only (B) 1 and 3
language. (C) 3 and 4 (D) 5 only
(A) Procedure-oriented (B) Object oriented (E) None of these
(C) Font oriented (D) Visual Basic 348. Which of the following describe router functions?
(E) None of these (A) Packet switching
340. Which of the following is a programming language? (B) Packet filtering
(A) Lotus (B) Pascal (C) Internetwork communication
(C) MS-Excel (D) Netscape (D) Path selection
(E) None of these (E) All of the above
341. FORTRAN programming language is more suitable for 349. A __________ is a computer network that usually spans a
city or a large campus.
__________.
(A) LAN (B) DAN
(A) Business Applications (B) Marketing Applications
(C) MAN (E) WAN
(C) Scientific Applications (D) None of the above
(E) None of these
(E) None of these
350. What does MAN stands for?
342. Java was introduced by (A) Micro area network
(A) Sun Microsystem (B) IBM (B) Metropolitan area network
(C) Intel (D) Microsoft (C) Macro area network
343. Which programming language are classified as low level (D) Mix area network
languages? (E) None of these
(A) Basic, COBOL, FORTRAN 351. How long is an IPv6 address?
(B) Prolog 2, Expert Systems (A) 32 bits (B) 128 bytes
(C) Knowledge based Systems (C) 64 bits (D) 128 bits
(D) Assembly Languages (E) None of these
(E) None of these 352. What does P2P stands for?
344. A program written in machine language is called (A) Peer to Peer (B) Peek to peek
(C) Past to past (D) Pair to pair
(A) assembler (B) object code
(E) All of these
(C) computer (D) machine
353. By an intranet we mean:
(E) None of these
(A) a LAN of an organization
345. Computer instructions written in English words instead of
(B) a Wide Area Network connecting all branches of an
binary code is called as organization
(A) mnemonic code (B) symbolic code (C) a corporate computer network
(C) gray code (D) opcode (D) a network connecting all computers of an organization
(E) None of these and using the internet protocol
(E) None of these
(86)
354. What does LAN stands for? 363. The process of trading goods over the internet is known as
(A) Lane Area Network (B) Local Army Network _________.
(A) E-selling-n-buying (B) E-trading
(C) Local Area Network (D) Local Area Networking
(C) E-finance (D) E-salesmanship
(E) None of these (E) E-commerce
355. If you wish to extend the length of the network 364. Which of the following is the fastest media of data
withouthaving the signal degrade, you would use a transfer?
__________. (A) Co-axial Cable (B) Untwisted Wire
(A) repeater (B) router (C) Telephone Lines (D) Fiber Optic
(C) gateway (D) switch (E) None of these
365. LANs can be connected by which of the following devices
(E) None of these
which operate on the data link layer?
356. LANs can be connected by devices called ______ which (A) Hub (B) Bridges
operate on the data link layer. (C) HDLC (D) Tunnel
(A) hub (B) bridges (E) None of these
(C) HDLC (D) tunnel 366. What was the first machine to successfully perform long
(E) None of these services of arithmetic and logical operations?
(A) MARK-I (B) ENIAC
357. Encryption and Decryption are the functions of
(C) EDSAC (D) UNIVAC
__________ layer.
(E) Z1
(A) transport (B) session 367. What is a motion path?
(C) application (D) physical (A) A type of animation entrance effect
(E) presentation (B) A method of advancing slides
358. IP addresses are converted to ____________.
(C) A method of moving items on a slide
(A) a binary string
(D) All of the above
(B) alphanumeric string
(E) None of these
(C) a hierarchy of domain names
368. What is the overall term for creating, editing, formatting,
(D) a hexadecimal string storing, retrieving and printing a text document?
(E) None of the above (A) Word processing (B) Spreadsheet design
359. The layer layer closest to transmission medium. (C) Web design (D) Database management
(A) transport (B) network (E) Presentation generation
369. The primary output device for computers is a __________.
(C) data link (D) physical
(A) Video monitor (B) Printer
(E) None of these (C) Keyboard (D) Mouse
360. What is a Firewall in Computer Network? (E) None of these
(A) The physical boundary of Network 370. What is JDBC?
(A) Utility Software
(B) An operating System of Computer Network
(B) Application Software
(C) A system designed to prevent unauthorized access (C) Application Programming Interface (API)
(D) A web browsing Software (D) Programming Language
(E) None of these (E) None of the above
361. Which of the following is the fastest media of data 371. Which among the following is a Super computer series
transfer? developed by Indian scientists?
(A) Co-axial Cable (B) Untwisted Wire (A) Param (B) Super30l
(C) Telephone Lines (D) Fiber Optic (C) Compaq Presario (D) Cray YMP
(E) None of these (E) Blue Gene
362. The device that can both feed data into and accept data 372. Which of the following is a programming language?
from a computer is called _________. (A) Lotus (B) Pascal
(A) ALU (B) CPU (C) MS-Excel (D) Netscape
(C) input-output device (D) All of these (E) None of these
(E) None of these
(87)
373. What is the term used for measurement of how fast data 382. Which type of system can learn and adjust to new
moves from one place to another? circumstances by themselves?
(A) data per unit (B) bits per second (A) Database management system
(C) bits per hour (D) ratio per bit (B) Expert systems
(E) None of the above (C) Geographical systems
(D) Neural networks
374. __________ has the shortest access times. (E) File based systems
(A) Cache Memory (B) Virtual Memory 383. WORM stands for?
(A) Write Once Read Many
(C) Secondary Memory (D) All of the above
(B) Wanted Once Read Memory
(E) None of these
(C) Wanted Original Read Memory
375. Which of the following is any malicious computer program
which is used to hack into a computer by misleading users (D) Write Original Read Memory
of its true intent? (E) None of the above
(A) Worm (B) Spyware 384. Who among the following is inventor of transistors?
(C) Trojan horse (D) Keylogger (A) Walter Houser Brattain (B) John William
(E) VGA file (C) John Bardeen (D) Charles Babbage
376. Which among the following was the first graphical web
(E) Both (a) and (c)
browser?
(A) Mosaic (B) WAIS 385. What is the short cut key to open Font dialog box in MS
(C) CERN (D) Gopher Word?
(E) None of the above (A) Ctrl + F (B) Alt + Ctrl + F
377. Which of the following is the correct option that allows (C) Ctrl + D (D) Ctrl + Shift + D
users to bring together copies of workbooks that other (E) Alt + F4
users have worked on independently in MS Excel?
386. The ______ button on the Quick Access Toolbar allows
(A) Copying (B) Merging
you to cancel your recent commands or activities.
(C) Pasting (D) Compiling
(E)None of these (A) Search (B) Cut
378. EBCDIC stands for? (C) Undo (D) Redo
(A) Extended Binary Coded Decimal Interchange Code (E) Shift
(B) Enlarged Binary Code Digital Interchange Code 387. What is a cursor?
(C) Extended Bilingual Coded Decimal Interchange Code (A) It is an indicator
(B) It shows the position on a computer monitor
(D) Encoded Bilingual Coded Division Interchange Code
(C) Cursor is Latin for „runner.
(E) None of the above is correct
(D) Both (a) and (b)
379. __________ ports connect special types of music
instruments to sound cards. (E) All of the above
388. What is included in an e-mail address?
(A) MIDI (B) CPU
(A) Domain name followed by user‟s name
(C) USB (D) BUS
(B) User‟s name followed by domain name
(E) OCR
(C) User‟s name followed by postal address
380. Which program, installed on the user‟s computer help him
to communicate or send request on the network? (D) User‟s name followed by street address
(E) None of these
(A) Paint (B) File Manager
389. Which among the following operation relates to a set of
(C) Browser (D) Word
computers connected to a LAN?
(E) None of the above
(A) They can process faster
381. A collection of unprocessed items is ________. (B) Main purpose is to go on line
(A) information (B) data (C) They can now share information and/or share
(C) memory (D) reports peripheral equipment
(E) None of these (D) Sole purpose of sending/receiving E-mail
(E) They can only manage ROM
(88)
390. Personal computers used a number of chips mounted on a 399. Mozilla Firefox is a _____.
main circuit board. What is the common name for such (A) Spreadsheet
boards?
(B) Word processing software
(A) Daughterboard (B) Motherboard
(C) Father board (D) Childboard (C) Web browser
(E) Newboard (D) Programming software
391. How many types of digits do a binary number comprises (E) None of these
of? 400. _____ is usually recorded and played, displayed, or
(A) One (B) Two accessed by information content processing devices, which
(C) Three (D) Five as computerized and electronic devices, but can also be part
(E) None of the above of live performance.
392. _____ is a set of computer programs used on a computer to (A) Virus (B) BIOS software
help perform tasks. (C) Multimedia (D) C++
(A) An instruction (B) Memory
(E) None of these
(C) A processor (D) Software
401. Which of the following appropriately relates with starting
(E) None of these
up an operating system?
393. Which of the following is an example of computer
software? (A) Starting (B) Entering
(A) Laser printer (B) MySQL (C) Formatting (D) Booting
(C) Joystick (D) All of these (E) None of these
(E) None of these 402. In MS-DOS 6.22, which part identifies that product
394. Internet Explorer is a(n) _____. uniquely?
(A) System software (B) Application software (A) MS (B) DOS
(C) Programming software (D) All of these (C) Ms - DOS (D) 6.22
(E) None of these (E) None of these
395. Operating system is a(n) _____.
403. DOS stands for _____.
(A) Application software (B) System software
(A) Disk Orientation system (B) Disk Operating Signal
(C) Programmable software (D) All of these
(C) Disk Operating System (D) Disk Orientaional Signal
(E) None of these
396. _____ is the set of programs that enables your computer‟s (E) None of these
hardware devices and application software to work 404. _____ is a set of programs that are hardcoded on a chip to
together. load into ROM at startup.
(A) Word processing software (A) BIOS (B) BOIS
(B) Utility software (C) BSIO (D) BSSO
(C) System software
(E) None of these
(D) Programming software
405. The ability of an operating system to run more than one
(E) None of these
application at a time is called _________.
397. What is the full form of DTP in Computers?
(A) Multi-tasking
(A) Desktop Product
(B) Object-oriented programming
(B) Dynamic Technology Product
(C) Desktop Publishing (C) Multi-user computing
(D) Desktop Phishing (D) Real-Time
(E) None of these (E) None of the above
398. Which of the following is an example of application 406. Which one of the following(s) is/are/ real time operating
software? system?
(A) Microsoft Windows (B) Linux (A) VxWorks (B) Windows CE
(C) Mac OSX (D) MS Word 2007 (C) RTLinux (D) All of these
(E) None of these
(E) None of these
(89)
407. The word “Computer” comes from the word “compute”, 417. The first electro-mechanical computer MARK-1 invented
which means ______. was by ______.
(A) To assume (B) To input (A) Charles Pascal (B) John W Mauchly
(C) To combine (D) To calculate (C)Howard Aiken (D) Clifford Berry
(E) Steve Wozniak
(E) To add
418. What was the first electronic computer in the world?
408. Who is the father of computers? (A) ENIAC (B) EDSAC
(A) Ada Byron (B) Charles Babbage (C) EDVAC (D) UNIVAC
(C) Blaise Pascal (D) Herman Hollerith (E) Z1
419. Which of the following is the full-form of ENIAC?
(E) None of these
(A) Electronic Numerical Integrator and Computer
409. Who is the chief of Microsoft?
(B) Electrical Numerical Integer and Calculator
(A) Babbage (B) Bill Gates
(C) Electrical Numerical Integer and Computation
(C) Bill Clinton (D) Bush
(D) Efficient Numerical Integrator and Computer
(E) None of these
(E) Electronic numbers Integer and Calculator
410. An electronic device, operating under the control of
instruction that can accept and process the data, produce 420. The first computer was programmed using ___________.
output and store the results for future use is called (A) Assembly language (B) Machine language
_________. (C) Source code (D) Object code
(A) Input (B) Computer (E) ASCII code
(C) Software (D) Hardware 421. In which generation did multi-programming start?
(E) None of these (A) First generation (B) Second generation
411. Computer gathers data, which means that they allow users (C) Third generation (D) Fourth generation
to __________ data.
(E) None of these
(A) Present (B) Input
(C) Output (D) Delete 422. Microsoft Office is a __________.
(E) None of these (A) Shareware (B) Public-domain software
412. The smallest unit of information, a computer can (C) Open source software (D) An application suit
understand and process is known as ________.
(E) Firmware
(A) Digit (B) Byte
(C) Megabyte (D) Bit 423. Which term is not related with font?
(E) None of these (A) Font face (B) Font size
413. Computers use the number system to store data and (C) Font color (D) Font grammar
perform calculations. (E) None of these
(A) Binary (B) Decimal
(C) Octal (D) Hexadecimal 424. The valid format of MS Word is __________.
(E) None of these (A) .jpeg (B) .png
414. What does a computer system includes? (C) .doc (D) .exe
(E) None of these
(A) Hardware (B) Software
425. Which of the following option may be used to change
(C) Peripheral devices (D) All of these
page-size and margins?
(E) None of these
(A) Page Layout (B) View
415. Which of the following device used „set of beads‟ to (C) Tools (D) Data
represent the unit of data? (E) None of these
(A) ENIAC (B) EDVAC 426. To justify the selected text, the shortcut key is __________.
(C) Abacus (D) MARK-I (A) Ctrl + 1 (B) Ctrl + J
(E) None of these (C) Ctrl + U (D) Ctrl + Alt + K
416. Antikythera mechanism was mainly used to perform which (E) None of these
computation? 427. Workbook is a collection of __________ in MS Excel?
(A) Astronomical calculation (B) Logarithm (A) page set-up (B) buttons
(C) Trigonometry (D) Time calculation (C) diagrams (D) charts
(E) All of these
(E) worksheets
(90)
428. In order to move from one worksheet to another in MS- 438. The device that can both feed data into and accept data
Excel workbook. One should click ___________. from a computer is called _________.
(A) active cell (B) scroll bar (A) ALU (B) CPU
(C) input-output device (D) All of these
(C) sheet tab (D) tab button (E) None of these
(E) None of these 439. The insert, cap lock and num lock are all examples of
429. In a spreadsheet, a __________ is a number you will use in __________ keys.
a calculation. (A) Control (B) Function
(A) label (B) cell (C) Toggle (D) Shortcut
(C) field (D) value (E) None of these
(E) None of these 440. Speed of line printer is specified in terms of __________.
430. In Power Point, which of the following will not advance (A) Line per minute (B) Character per minute
the slides in a slide show view?
(C) Dot per minute (D) All of these
(A) Esc key (B) The spacebar (E) None of these
(C) The Enter key (D) The mouse button
441. Which of the following devices can be used to directly
(E) None of these
input printed text?
431. In Microsoft PowerPoint, two kinds of sound effects files
(A) DPI (B) OCR
that can be added to the presentation are
(C) OMR (D) MICR
(A) .wav files and .mid files (B) wav files and .gif files
(C) wav files and .jpg files (D) jpg files and .gif files (E) None of the above
(E) None of the above 442. Which of the following groups consist of only input
devices?
432. Which PowerPoint view displays each slide of the
presentation as a thumbnail and is useful for rearranging (A) Mouse, Keyboard, Monitor
slides? (B) Mouse, Keyboard, Scanner
(A) Slide Sorter (B) Slide Show (C) Mouse, Keyboard, Printer
(C) Slide Master (D) Notes Page (D) Mouse, Keyboard, Loudspeaker
(E) Slide Design (E) None of these
433. If you want to insert a chart to your slide then go to
443. Which of the following is a term related with printer?
__________.
(A) Insert – Chart (B) Home – Chart (A) DVD (B) Cartridge
(C) Format – Chart (D) Table – Chart (C) Hard-disk (D) Keyboard
(E) None of these (E) None of these
434. Which of the following is not a type of Microsoft access 444. Keyboard is used:
database object? (A) for inputting text and numbers and send commands to
(A) Table (B) Worksheets the computer
(C) Modules (D) Macros (B) to create new keys to use with your computer
(E) None of these (C) to open the computer
435. Row in an Access table is also known as __________. (D) to create pictures and images and send them to your
(A) field (B) record computer
(E) None of the above
(C) data (D) type
445. __________ is also known as inkless printer.
(E) None of these (A) Thermal printer (B) Inkjet printer
436. Queries in Access can be used as __________. (C) OCR (D) Dot Matrix printer
(A) View, change and analyse data in different ways (E) None of these
(B) A source of records for forms and reports 446. A __________ represents approximately one billion
(C) to access internet memory location.
(D) Both a and b (A) kilobyte (B) megabyte
(E) None of these (C) gigabyte (D) terabyte
(E) None of these
437. A (n) __________ device is any hardware component that
447. The analytical engine developed during first generation of
allows you to enter data and instruction into a computer.
computers used __________ as a memory unit.
(A) interaction (B) input (A) RAM (B) Floppies
(C) communications (D) output (C) Cards (D) Counter wheels
(E) terminal (E) None of these
(91)
448. Which of the following places the common data elements in 458. __________ is a web server that collects data from other
order from smallest to largest? web servers and puts it into a database (much like an
(A) Character, File, Record, Field, Database, File index), it provides links to pages that contain the object of
(B) Character, Record, Field, Database, File your search.
(C) Character, Field, Record, File, Database (A) Search Engine (B) Browser
(D) Bit, Byte, Character, Record, Field, File, Database
(C) FTP (D) HTTP
(E) None of the above
449. What does DRAM stands for? (E) None of these
(A) Digital Random Access Memory 459. ARPANET stands for __________.
(B) Dynamic Random Access Memory (A) Advanced Research Projects Accountancy Network
(C) Dividing Random Access Memory (B) Advanced Research Protects Agency Newark
(D) Dynamic Recording Access Memory (C) Advanced Reharse Projects Agency Network
(E) None of these (D) Advanced Research Projects Agency Network
450. __________ has the shortest access times. (E) None of these
(A) Cache Memory (B) Virtual Memory 460. Which of the following is not an example of web-browser?
(C) Secondary Memory (D) All of the above (A) Mozilla Firefox (B) Google Chrome
(E) None of these (C) Internet Explorer (D)Safari
451. EPROM is generally erased by using ______. (E) Avast
(A) ultraviolet rays (B) infrared rays 461. Smart card is:
(C) 12V electrical pulse (D) 24V electrical pulse (A) special purpose cards
(E) None of these (B) microprocessor cards
452. Which among the following was the first network with (C) processing unit contains memory for storing data
which the idea of internet began?
(D) processing unit for software handling
(A) RAPANET (B) PARANET
(E) None of these
(C) ARPANET (D) APARANET
462. When a real time telephone call between people is made
(E) None of these over the Internet using computers, it is called
453. The coding language used to create documents for use on ___________.
the Internet is __________. (A) a chat session (B) an E-mail
(A) HTML (B) HSMT (C) an instant message (D) Internet telephony
(C) HLTM (D) All of these (E) None of these
(E) None of these 463. ISDN stands for
454. In www.google.com, www stands for (A) Integrated Services Digital Network
(A) Web World Wide (B) World Wide Web (B) Integrated Services Data Network
(C) Wide World Web (D) Worlds Wide Weblinks (C) Integrated Security Digital Network
(E) None of these (D)Integrated Security Data Network
455. __________ is the basic communication language or (E) None of these
protocol of the Internet.
464. What is an E-mail?
(A) TCTP/ITP (B) TCDP/IEP
(A) An Internet standard, which allow users to upload and
(C) TCP/IP (D) TCMP/IKP download files
(E) None of these (B) An online area on which a user can converse in written
456. Which of the following is related with 192.9.200.155? form about any special subject
(A) Hardware address (B) Monitor address (C) Transmission of files and messages through computer
(C) IP address (D) All of these network
(E) None of these (D) A real time typed conversion
(E) None of these
457. Generally to copy data from a remote compute/internet to a
465. Which of the following cannot be a part of an E-mail
local computer is called __________.
address?
(A) Upload (B) Editing
(A) Period (-) (B) At sign (@)
(C) Download (D) E-mail
(C) Space ( ) (D) Underscore ()
(E) None of these
(E) None of these
(92)
466. „Buy now-pay now‟ is commonly used for ___________. 477. Two or more computers connected to each other of sharing
(A) visa cards (B) vault cards information form a..........
(C) credit cards (D) E-purse (A) Server (B) Router
(E) debit cards (C) Network (D) Tunnel
467. Which of the following are components of Central (E) Pipeline
Processing Unit (CPU) ? 478. Computers that are portable and convenient for users who
(A) Arithmetic logic unit, Mouse travel are known as..........
(B) Arithmetic logic unit, Control unit (A) Super computers (B) Laptops
(C) Arithmetic logic unit, Integrated Circuits (C) Mini computers (D) File servers
(D) Control Unit, Monitor (E) None of the above
(E) None of the above 479. Office LANs that are spread geographically apart on a large
468. When you cut or copy information it gets place in the scale can be connected using a corporate
________. (A) CAN (B) LAN
(A) Clipart (B) Clipboard (C) DAN (D) WAN
(C) Motherboard (D) Both (a) and (b)
(E) TAN
(E) None of the Above
480. The code for a Web page is written using--------
469. Which among following is odd one ? (A) A fifth generation language
(A) RAM (B) ROM (B) Win Zip
(C) Cache (D) Hard Disk (C) Peripherals
(E) All of the above (D) Hypertext Markup Language
470. A(n) ______ program is one that is ready to run and does
(E) URL
not need to be altered in any way.
481. The most frequently used instructions of a computer
(A) Interpreter (B) High-level
(C) Compiler (D) COBOL program are likely to be fetched from-----
(E) Executable (A) the hard disk (B) cache memory
471. A _____ is a large and expensive computer capable of (C) RAM (D) registers
simultaneously processing data for hundreds or thousands
(E) None of the above
of users.
(A) handheld computer (B) mainframe computer 482. Which among the following was the first computer which
(C) personal computer (D) tablet used to store its program?
(E) None of the Above (A) UNIVAC (B) EDSAC
472. What is LINUX ? (C) EDVAC (D) ABC
(A) Malware (B) Operating System (E) Z1
(C) Application Program (D) Firmware 483. Who among the following was the inventor of Analytical
(E) None of the Above Engine?
473. Which among following is not an input device? (A) Charles Babbage (B) Blaise Pascal
(A) Mouse (B) Scanner (C) Ada Byron (D) Herman Hollerith
(C) Keyboard (D) Printer (E)None of these
(E) None of the Above 484. In __________ computers, computation is carried out with
474. Where are saved files stored in computer? physical quantities such as voltage, length, current,
(A) RAM (B) Hard disk temperature, etc.
(C) Cache (D) Any of the above
(A) digital (B) analog
(E) None of the Above
(C) hybrid (D) micro computer
475. Which program is run by BIOS to check hardware
components are working properly while computer is turned (E) mainframe computer
ON? 485. Keyboard is used ___________.
(A) for inputting text and numbers and sends commands to
(A) POST (B) DMOS
the computer
(C) CMOS (D) RIP (B) to create new keys to use with your computer
(E) None of the Above (C) to open the computer
476. 1 Mega Byte is equal to..........? (D) to create pictures and images and send them to your
(A) 1024 Bytes (B) 1024 Bits computer
(E) None of the above
(C) 1024 Giga Bits (D) 1024 Kilo Bytes
(E) None of the Above
(93)
486. Commands at the top of a screen such as File-Edit, Format 496. To switch the slide orientation between portrait and
and Tools to operate and change things are incorporated in landscape – Click __________ and select Portrait or
________. Landscape as your requirement.
(A) Menu bar (B) Tool bar (A) Slide page (B) Slide Orientation
(C) Slide theme (D) Slide number
(C) User friendly (D) Word processor
(E) None of these
(E) None of these
497. What do you mean by Jacquard loom?
487. Auxiliary memory is also called _______________.
(A) A bird found in Japan
(A) Primary memory (B) Third memory (B) A weaving machine used punched cards
(C) Extra memory (D) Secondary memory (C) The first computer controlled loom
(E) None of the above (D) A machine for writing match tables
488. The startup routine runs, when machine boots up is known (E) None of the above
as _____________. 498. What is the sequence of events that occurs in the computer
(A) POST (B) BOOT up when it is interpreting and executing an instruction known
(C) Operating Routine (D) I/O operation as?
(E) None of these (A) Execution cycle (B) Instruction cycle
489. Which among the following is the shortcut key (C) Working cycle (D) Machine cycle
combination to copy formatting from text? (E) None of the above
(A) Alt + Shift + C (B) Tab + Shift + C 499. Specialised program(s) designed to allow particular input
(C) Ctrl + Shift + C (D) F1 + Shift + C or output device(s) to communication with the rest of the
(E) None of these computer system is called _______.
490. The key F12 opens a ______. (A) Computer (B) Device drivers
(A) SaveAs dialog box (B) Open dialog box (C) Interpreters (D) Operating system
(C) Save dialog box (D) Close dialog box (E) None of these
(E)None of these 500. The Internet is a system of ______.
491. The operation of combining two cells into a single cell in
(A) Bugs (B) Interconnected networks
Excel is referred to as ________.
(C) System software (D) Operating systems
(A) join cells (B) merge cells
(C) merge table (D) join table (E) None of the above
(E) None of the above 501. Setting fonts for the text in your document is an example
492. What is the default the cell content alignment in Excel? of:
(A) left aligned (A) Formatting (B) Formulas
(B) centrally aligned (C) Tracking changes (D) Tools
(C) text left aligned and numbers right aligned (E) None of the above
(D) text right aligned and numbers left aligned 502. What is Window Explorer?
(E) None of the above (A) Personal Computer (B) Network
493. Which of the following characteristics is used to compute (C) Drive (D) File Manager
dynamically the results from Excel data?
(E) Web browser
(A) Go to (B) Table
503. What does JAR stand for?
(C) Chart (D) Diagram
(E) Formula and Function (A) JQuerry Application Rapid-development
494. =Sum (S3 : S10) is an example of a (B) Java Application Resolution
(C) Java Archive
(A) function (B) formula
(D) JQuerry Application Resolution
(C) cell address (D) value
(E) None of the above
(E) None of these 504. Linux is a_____.
495. Which among the following is the short cut key for (A) Utility program for peer-to-peer file sharing
slideshow? (B) Real-time operating system
(A) F4 (B) F5
(C) Network operating system
(C) F6 (D) F7
(E) None of these (D) PDA platform
(E) None of the above
(94)
505. What is the new default font used in MS Word document? 513. Which of the following is true about Assembly language?
(A) Times New Roman (B) Arial (A) It is a Machine Language
(C) Algerian (D) Preeti (B) It is a High-level programming language
(E) Calibri (C) It is a low-level programming language
506. Distributed processing involves (D) It is a language for assembling computers
(A) Solving computer component problems from a (E) None of the above
different computer 514. Which operating system is defined as self-contained in
device and resident in ROM?
(B) Solving computing problems by breaking them into
smaller parts that are separately processed by different (A) Multiprocessing OS (B) Batch Processing OS
computers (C) Multi-threading OS (D) Embedded OS
(C) Allowing users to share files on a network (E) Real Time OS
(D) Allowing users to access network resources away from 515. What is an ad hoc query?
the office (A) Pre-planned question
(E) None of the above (B) Pre-scheduled question
507. What is that computer program called which translates one (C) Spur-of-the-moment question
program instruction at a time into machine language? (D) Question that will not return any results
(A) Compiler (B) CPU (E) None of the above
(C) Compiler (D) Simulator 516. A _________ is used to direct and dispatch data packets
between different networks.
(E) Interpreter
(A) Connection (B) Bridge
508. What is another name for additive manufacturing?
(C) Gateway (D) Hub
(A) 3-D printing (B) 2-D printing
(E) Router
(C) CPU Assembly (D) Memory management 517. Dr. E.F. Codd represented ______ rules that a database
(E) Network interconnection must obey if it has to be considered truly relational.
509. What is decorative text called, that you can add to a (A) 10 (B) 8
document? (C) 12 (D) 6
(A) Table (B) Symbol (E) 5
(C) WordArt (D) Image 518. Example of telecommunication device is a ________ .
(E) None of the above (A) modem (B) printer
510. If a word is typed that is not in MS Word's dictionary, a (C) keyboard (D) scanner
wavy underline appears below the word. What is the color (E) mouse
of the underline that appears in this situation? 519. What is „Trend Micro‟?
(A) Blue (B) Red (A) virus program (B) anti-virus software
(C) Green (D) Black (C) just a program (D) All of these
(E) Pink (E) None of the above
511. A type of instruction that can produce several lines of 520. Storage of instructions in computer memory to enables it to
machine language code is called a ______. perform a variety of tasks in sequence or intermittently.
Who introduced the idea of stored program concepts?
(A) Mnemonic (B) Address
(A) Charles Babbage (B) Dennis Ritchie
(C) Macro (D) Assemble
(C) Howard Aiken (D) John Neumann
(E) None of these
(E) Anna Lovelace
512. Which key should you use to indent the first paragraph of
521. off and back on again, causing an initial boot of the
your report?
machine?
(A) tab key (B) return key (A) Toggle (B) Cold booting
(C) space bar (D) shift key (C) Warm booting (D) Logging off
(E) None of the above (E) None of the above
(95)
522. Main memory works in conjunction with _________. 531. What is the base or radix of the decimal number system?
(A) special function cards (B) RAM (A) 2 (B) 8
(C) CPU (D) Intel (C) 10 (D) 16
(E) All of the above (E) 20
523. A(n) ________ allows you to access your e-mail from 532. The term is used to describe the intangible instructions that
anywhere.
tell the computer what to do is known as
(A) Forum (B) Webmail interface
(A) Hardware (B) Software
(C) Message Board (D) Weblog
(C) Storage (D) Input/output
(E) EEPROM
(E) None of these
524. Which of the following is true about relational database?
(A) It is a collection where data can be arranged in only 533. A set of instructions telling the computer what to do is
rows called
(B) It is a collection where data can be arranged in only (A) Mentor (B) Instructor
columns (C) Complier (D) Program
(C) It is a collection of data arranged in rows and columns (E) Debugger
(D) All of the above 534. Programs designed to perform specific tasks related to
(E) None of the above managing computer resources are called
525. Which of the following is a folder that retains copies of (A) Operating system (B) Helper software
messages have started but are not yet send to the recipient?
(C) System software (D) Application software
(A) Inbox (B) Outbox
(E) Utility software
(C) CC (D) Sent Items
(E) Drafts 535. _____ is a Windows utility program that located and
eliminates unnecessary fragments and rearranges filed and
526. Which of the following is required to communicate
between two computers? unused to disk space to optimise operations.
(A) communications software (A) Backup (B) Disk cleanup
(B) communications hardware (C) Disk defragmenter (D) Restore
(C) protocol (E) Disk restorer
(D) access to transmission medium 536. Which command is used to set a name to a disk in DOS?
(E) All of the above (A) VOLUME (B) VOL
527. These are the specially designed computer chips reside (C) LABEL (D) DISKLABEL
inside other drives, such as your car or your electronic
(E) None of these
thermostat.
(A) Server (B) Workstation computer 537. Which of the following operating does not implement
multitasking truly?
(C) Embedded computer (D) Mainframe computer
(E) None of these (A) Windows 98 (B) Windows NT
528. Today‟s RAM‟s common form is built with (C) Windows XP (D) MS DOS
(A) Transistors (B) Vacuum tubes (E) None of these
(C) Semiconductor‟s ICs (D) Superconductor‟s ICs 538. What is the meaning of .EXE?
(E) None of the above (A) Command File (B) Express File
529. A string of eight and 1s is called a: (C) Executable Files (D) System File
(A) Megabyte (B) Kilobyte (E) None of these
(C) Gigabyte (D) Byte 539. CUI stands for
(E) None of these (A) Character Using Interface
530. There are ______ unique digits available in Hexadecimal
(B) Character Unique Interchange
number system.
(A) 16 (B) 17 (C) Chrome User Interface
(C) 18 (D) 19 (D) Character User Interface
(E) 20 (E) None of these
(96)
540. To „maximize‟ a window means to 550. Which among the following term is used for those
(A) Fill it to capacity hardware devices that are not part of the main computer
system and are often added later to the system?
(B) Expand it to fit the desktop
(A) clip art (B) highlight
(C) Put only like files inside
(C) execute (D) peripheral
(D) Drag it to the Recycle Bin
(E) None of these
(E) None of the these
551. What is Direct X?
541. Which of the following types of menu shows the further
sub-choices? (A) Operating system
(A) Reverse (B) Template (B) Software that drives graphics hardware
(C) Scrolled (D) Rapped (C) Web browser
(E) Pull-down (D) Word processing software
542. What is JDBC? (E) None of these
(A) Utility Software 552. Which of the following was used to program the first
(B) Application Software computer?
(C) Application Programming Interface (API) (A) Assembly language (B) Machine language
(D) Programming Language (C) Source code (D) Object code
(E) None of the above
543. Which of the following is/are modifier keys in a computer? (E) ASCII code
(A) Ctrl (B) Alt 553. Which of the following menu types is also called a drop-
(C) Shift (D) Both (b) and (c) down menu?
(E) All of the above (A) fly-but (B) cascading
544. What is the term used for measurement of how fast data (C) pop-down (D) pull-down
moves from one place to another? (E) go-up
(A) data per unit (B) bits per second 554. Which among the following is a Super computer series
(C) bits per hour (D) ratio per bit developed by Indian scientists?
(E) None of the above (A) Param (B) Super30l
545. Which among the following term is related to the collection (C) Compaq Presario (D) Cray YMP
of links throughout the Internet that creates an
interconnected network? (E) Blue Gene
(A) WWW (B) Web 555. Write through technique is used in which memory for
(C) World Wide Web (D) All of the above options updating the data.
(E) Wide Area Web (A) Virtual memory (B) Main memory
546. Pascaline is among which of the type of machine? (C) Auxiliary memory (D) Cache memory
(A) Mechanical machine (B) Arithmetic machine (E) None of the above
(C) Division machine (D) Difference machine
(E) None of the above 556. What type of monitoring file is commonly used on and
547. The first electronic digital computer contained_________? accepted from Internet sites?
(A) Electronic valves (B) Neural Networks (A) Smartware (B) Phishes
(C) Fuzzy Logic (D) Semiconductor memory (C) Cookies (D) Trojans
(E) None of these (E) None of the above
548. Which of the following is a term for the process
of trading goods over the Internet? 557. _______ are specially designed computer chips that reside
other devices. Such as your car or your car or your
(A) e-selling-n-buying (B) e-trading electronic thermostat.
(C) e-finance (D) e-salesmanship
(E) e-commerce (A) Severs (B) Embedded computers
549. What does a Bug mean? (C) Robotic Computers (D) Mainframe
(A) Logical error in a program (E) None of these
(B) Syntax error in a program 558. Primary Memory stores:
(C) Run time error (A) Result (B) Data
(D) Both (a) and (b) (C) Programs (D) All of these
(E) None of the above
(E) None of these
(97)
559. Non-physical components of the computer are referred to 568. Which of the following is correct acronym of VGA?
as _______. (A) Video Graphics Adapter (B) Visual Graphics Array
(A) CPU (B) Software (B) Volatile Graphics Array (D) Video Graphics Array
(C) Hardware (D) Program (E) None of the above
(E) None of these 569. How can you access the font size tool on font dialog box in
560. What was the first fully electronic general purpose MS Word?
computer in the world? (A) Ctrl + S (B) Ctrl + Shift + S
(A) ENIAC (B) EDSAC (C) Ctrl + P (D) Ctrl + Shift + P
(C) EDVAC (D) UNIVAX (E) Alt + P
(E) Z1 570. Which of the following terms is related to Internet
561. A type of instruction that can produce several lines of connectivity?
machine language code is called a ______. (A) IP (B) TCP
(A) Mnemonic (B) Address (C) Gopher (D) Both (a) and (b)
(C) Macro (D) Assemble (E) All of the above
(E) None of these 571. What is Visual FOXPRO?
562. What is the sequence of events that occurs in the computer (A) RDMBS (B) DBMS
when it is interpreting and executing an instruction known (C) Programming Language (D) All of the above
as? (E) None of these
(A) Execution cycle (B) Instruction cycle 572. CPU is the ______ of computer.
(C) Working cycle (D) Machine cycle (A) Brain (B) Eye
(E) None of the above (C) Ear (D) All above these
563. A graphical input device that can generate digital signals (E) None of these
that represent the movement of a pen is known as
573. IBM-PC is an example of
(A) Light pen (B) Data tablet
(A) First generation computer
(C) Touch Panel (D) Mouse
(B) Second generation computer
(E) None of these
(C) Third generation computer
564. An input device that reads printed text employing optical
(D) Fourth generation computer
character pattern matching, is known as _________.
(E) None of these
(A) Scanner (B) Magnetic disk
574. Today‟s RAM‟s common form is built with
(C) Mouse (D) Magnetic tape
(A) Transistors (B) Vacuum tubes
(E) None of these
(C) Semiconductor‟s ICs (D) Superconductor‟s ICs
565. How many types of semiconductor memory does a
computer have? (E) None of the above
(A) Four (B) Eight 575. The name for the way that computers manipulate data into
information is called:
(C) One (D) Two
(A) Programming (B) Storing
(E) Five
(C) Organizing (D) Processing
566. Which among the following is a component of ROM?
(E) None of these
(A) Magnetic cores (B) Micro-Processors
576. _____ are classified on the basis of number of transistor.
(C) Photoelectric cells (D) Floppy disks
(A) RAM (B) CPU
(E) None of these
(C) SMPS (D) IC
567. What is an Offline device?
(E) None of these
(A) A device which is not connected to CPU
577. A ______ is the enclosure that contains the main
(B) A device which is connected to CPU components of a computer.
(C) A direct access storage device (A) System unit (B) UPS
(D) A system software (C) SMPS (D) Keyboard
(E) All of the above (E) None of these
(98)
578. PCs are considered fourth-generation and contain 588. A main characteristic of computer system is ______, that
(A) Information (B) Data can perform different types of tasks at the same time.
(C) Vacuum tubes (D) Microprocessors (A) Diligence (B) Versatility
(E) Transistors (C) Accuracy (D) Speed
579. The CPU, also called the _____ when talking about PCs (E) No IQ
does the vast majority of the processing for a computer. 589. Something which has easily-understood instructions is said
(A) Macro-processor (B) RAM to be:
(C) Memory System (D) Microprocessor (A) Information (B) Word processing
(E) None of these (C) Icon (D) User friendly
580. The insert, cap lock and num lock are all examples of
(E) None of these
______ keys.
590. Information that comes from external source and fed into
(A) Control (B) Function
computer software is called _______.
(C) Toggle (D) Shortcut
(A) Output (B) Input
(E) None of these
(C) Throughout (D) Reports
581. Which of the following devices can be used to directly
input printed text? (E) None of these
(A) DPI (B) OCR 591. The control unit initiates a series of sequential steps of
(C) OMR (D) MICR __________.
(A) Macro instruction (B) Minicode
(E) None of the above
(C) micro operations (D) Micro circuit
582. ______ printer generates character from a grid.
(E) None of these
(A) Laser (B) Inkjet 592. Which of the following is a term related with scanner?
(C) Dot matrix (D) All of these (A) Laser (B) TWAIN
(E) None of these
(C) Cartridge (D) Media
583. The OMR is able to evaluable only those documents which
(E) None of these
are printed within ______ position.
(A) Marked (B) Magnetic 593. A bit refers to
(C) Special (D) Specific (A) A farm of storage
(E) None of these (B) A value equal to a kilobyte
584. The terminal device that functions as a cash register, (C) A value equal to a megabyte
computer terminal and OCR reader is the
(D) The smallest unit of digital information
(A) Data collection terminal (B) OCR register terminal
(E) The same things as a pixel
(C) Video display terminal (D) POS terminal
594. Which of the following component is a part of RAM?
(E) None of the above
(A) Magnetic cores (B) Micro-Processors
585. What are the two types of output devices?
(C) Photoelectric cells (D) Floppy disks
(A) Monitor and printer
(B) Storage disk (floppy, CD) (E) Mouse
(C) Keyboard and Mouse 595. Which among the following is a software that uses a
pattern-matching technique to examine all files on a disk
(D) Windows 2000, Windows NT
looking for harmful code?
(E) None of the above
(A) Operating system (B) Backup software
586. A gigabyte is equal to -
(C) Utility programs (D) Driver imaging
(A) 1024 bytes (B) Million megabytes
(E) Antivirus Software
(C) Thousand kilobytes (D) 1024 megabytes
(E) None of these 596. The software that is used to create text based documents is
referred as-
587. Digital computers use a ________ system to encode data
and programs. (A) DBMS (B) Suits
(A) Semiconductor (B) Decimal (C) Spreadsheets (D) Presentation software
(C) Binary (D) RAM (E) Word processor
(E) ROM
(99)
597. ______ is a set of keywords, symbols and a system of 606. _____ is a program which make easy to use a computer.
rules for constructing statements by which human can (A) Operating system (B) Application
communicate the instructions to be executed by a
(C) Utility (D) Network
computer.
(E) None of these
(A) A computer program (B) A programming language
(C) An assemble (D) Syntax 607. Which disk is used to cold boot a PC?
(E) None of these (A) Setup disk (B) System disk
598. ______ controls the way in which the computer system (C) Diagnostic Disk (D) Program disk
functions and provides a means by which users can interact (E) None of the above
with computer.
608. Which of the following is the smallest computer?
(A) The platform (B) The operating system
(A) Notebook (B) Laptop
(C) Application software (D) The motherboard
(C) Desktop (D) Workstation
(E) None of the above
599. Which of the following is a requisite to „boot‟, the system? (E) None of these
(A) Complier (B) Loader 609. Cache memory acts between ___________ .
(C) Operating system (D) Assembler (A) CPU and RAM (B) RAM and ROM
(E) None of these (C) CPU and hard disk (D) All of these
600. Which of the following is/are file extension(s) in DOS? (E) None of these
(A) EXE (B) BAT 610. Which of the following describe router functions?
(C) COM (D) All of these (A) Packet switching
(E) None of these (B) Packet filtering
601. A ______ is an icon on the desktop that provides a user (C) Internetwork communication
with immediate access to a program of file.
(D) Path selection
(A) Kernel (B) Buffer
(D) All of the above
(C) Shortcut (D) Spooler
(E) None of these 611. Write through technique is used in which memory for
updating the data.
602. Pascaline is among which of the type of machine?
(A) Virtual memory (B) Main memory
(A) Mechanical machine (B) Arithmetic machine
(C) Division machine (D) Difference machine (C) Auxiliary memory (D) Cache memory
(E) None of the above (E) None of the above
603. What do you mean by Jacquard loom? 612. Software that is actively utilised by end-users (like word or
(A) A bird found in Japan powerpoint) is called
(B) A weaving machine used punched cards (A) Actionware (B) Operating system
(C) The first computer controlled loom (C) System software (D) Driver
(D) A machine for writing match tables (E) Application software
(E) None of the above 613. Distributed processing involves
604. BIOS stands for (A) Solving computer component problems from a
(A) Basic Input Output Service different computer
(B) Basic Inner Output System (B) Solving computing problems by breaking them into
(C) Better Input Output Service smaller parts that are separately processed by different
(D) Better Input Output System computers
(E) Basic Input Output System (C) Allowing users to share files on a network
605. Who is the inventor of Tabulating Machine? (D) Allowing users to access network resources away from
(A) Charles Babbage (B) Blaise Pascal the office
(C) Ada Byron (D) Herman Hollerith (E) None of the above
(E) None of these
(100)
614. What is an intranet? 623. What is Linux?
(A) A LAN of an organization (A) Input Device (B) Operating system
(B) A wide Area Network connecting all branches of an (C) Storage Device (D) Output Device
organization (E) Processor
(C) A corporate computer network 624. Which of the following is the default page setup orientation
(D) A network connecting all computers of an organization for notes pages, outlines and handouts?
and using the internet protocol (A) Hyphenation (B) Landscape
(E) None of these (C) Portrait (D) Footer
615. Specialised program(s) designed to allow particular input (E) Header
or output device(s) to communication with the rest of the
625. Which among the following was the first graphical web
computer system is called _______.
browser?
(A) Computer (B) Device drivers
(A) Mosaic (B) WAIS
(C) Interpreters (D) Operating system
(C) CERN (D) Gopher
(E) None of these
(E) None of the above
616. Which of the following scrambles a message by applying a
626. What is a half byte also called as?
secret code?
(A) Nibble (B) Bit
(A) Encryption (B) Audits
(C) Bits (D) Data
(C) UPS (D) Firewalls
(E) Information
(E) None of the above
627. What is that computer program called which translates one
617. Which of the following terms is associated with Internet?
program instruction at a time into machine language?
(A) Plotter (B) Slide presentation (A) Compiler (B) CPU
(C) Bookmark (D) Pie Chart (C) Compiler (C) Simulator
(E) Microsoft Excel (E) Interpreter
628. Which key is used to delete one character at a time to the
618. Which of the following is the name of an application
left?
similar to MS Office?
(A) DEL (B) CAPS LOCK
(A) Libre Office (B) Open Office
(C) Neo Office (D) Free Office (C) CTRL (D) SHIFT
(E) All of the above (E) BACK SPACE
619. Codes consisting of varying widths and spacing of parallel 629. If you change Windows 98 to Windows XP, you are
lines, which may be optically read, is known as _____. actually performing _________.
(A) mnemonic (B) Bar code
(A) Upstart (B) Patch
(C) Decoder (D) All of the above
(E) None of the above (C) downgrade (D) Upgrade
620. ER Diagram in DBMS is a graphical method used to (E) None of the above
represent _________. 630. Which feature helps to search the text through reference
(A) Primary Key and Candidate key material such as dictionaries, encyclopedias and translation
(B) Entity classes and their relationships services?
(C) Entity class and relationship to foreign key only
(A) Translation (B) Research
(D) Objects and methods with functions
(C) Find (D) Font
(E) Foreign Key and Integrity Constrains
(E) Table
621. What is a bootstrap?
631. Whose function is to convert computer generated result
(A) A memory device
into human acceptable form?
(B) A device to support the computer
(A) Mouse (B) Input Interface
(C) An error correction technique
(C) ALU (D) Output Interface
(D) A small initialization program to start up a computer
(E) Memory
(E) None of the above
632. The IP address 130.0.11.10 belongs to which class?
622. Hybrid computer used the combined feature of _________
and _________ machine. (A) Class z (B) Class B
(A) analogue, digital (B) super, sub (C) Class c (D) Class D
(C) client, server (D) warehouse, mining (E) Class F
(E) RAM, ROM
(101)
633. The CPU in a computer is an example of ______. 643. In hexadecimal number system F denotes, _____ in
(A) Hardware (B) Software decimal.
(C) Input Device (D) A program (A) 11 (B) 15
(E) An Instruction (C) 10 (D) 6
634. Which button makes alphabets/letters in uppercase and (E) 66
lowercase and numbers to symbols? 644. What is an operating system?
(A) Caps Lock (B) Num Lock (A) A System software (B) An Application Software
(C) Shift (D) Tab (C) A messaging app (D) A Communication portal
(E) Esc (E) A Network
635. RAM is a part of _________. 645. Which of the following is not permitted in an e-mail
address?
(A) Internet (B) Keyboard
(A) Period (.)
(C) System unit (D) Monitor
(B) Underscore (_)
(E) None of the above
(C) Lowercase alphabets (a-z)
636. Which of the following is not a valid memory unit?
(D) Uppercase alphabets (A-Z)
(A) ILB (B) KB
(E) Space ( )
(C) YB (D) PB
646. Avast is an example of ________.
(E) Byte
(A) Virus (B) Antivirus
637. What is the software frequently utilized by end users called
(C) Worm (D) Messaging app
(like Word, PowerPoint)?
(E) Photo Editor
(A) System Software (B) System Appliances
647. How many rows are there in latest version of MS Excel?
(C) Application Software (D) Operating System
(A) 65536 (B) 16,384
(E) None of the above
(C) 1,048,576 (D) 1,050,000
638. To protect your system from computer hackers you must
turn on a(n) _______. (E) 2,001,000
648. What is the maximum zoom percentage in Microsoft
(A) USP (B) VLC
PowerPoint?
(C) Another system (D) Script
(A) 100% (B) 200%
(E) Firewall
(C) 400% (D) 500%
639. Which of the following is not an example of a Web
(E) None of these
Browser?
649. Which among the following option does DBMS helps to
(A) Outlook (B) Internet Explorer achieve?
(C) Safari (D) Chrome (A) Data independence
(D) Firefox (B) More redundancy
640. XML stand for? (C) Centralised manner to control of data
(A) Extra Markup Language (D) Both (a) and (c)
(B) Extensible Markup Language (E) None of the above
(C) Excellent Markup Language 650. What is Telnet?
(D) Xerox Markup Language (A) Network or Telephones (B) Television Network
(E) Xenome Markup Language (C) Remote Login (D) All of these
(E) None of these
641. What is a joy stick primarily in computers used for? 651. What does the computer Motherboard contain that houses
(A) Editing Text (B) Processing Input setting configurations and is powered by the onboard
(C) Printing (D) Computer gaming battery?
(A) CMOS (B) RAM
(E) All of the above
(C) DRAM (D) CPU
642. What is a half byte also called as? (E) None of these
(A) Nibble (B) Bit 652. Which of the following is a machine independent program?
(C) Bits (D) Data (A) High level language (B) Low level language
(C) Assembly language (D) Machine language
(E) Information (E) None of these
(102)
653. A Data Base Administrator (DBA) is a ______. 663. Which among the following organisation developed a
(A) Program (B) Person SAGA-220 super computer in 2011?
(C) Application (D) Operating system (A) ISRO (B) NASA
(E) None of these (C) C-DAC (D) BARC
(E) None of these
654. ClipArt is a feature that can be used: 664. In MS-DOS 6.22, which part identifies the product
(A) To place ClipArt in your presentation in slide uniquely?
(B) To scan your presentation for incorrect spelling of (A) MS (B) DOS
words on each slide (C) Ms - DOS (D) 6.22
(E) None of these
(C) To scan your presentation for incorrect spelling in
665. Copy and X Copy are same in the sense __________.
WordArt objects
(A) Both are internal command of DOS
(D) All of the above
(B) Both are external commands of DOS
(E) None of the above
(C) Both can be used to copy file or group of files
655. In Excel, charts are created using which option?
(D) Both a and b
(A) Chart Wizad (B) Pivot Table
(E)None of these
(C) Pie chart (D) Bar chart
666. Which of the following are valid minimum & maximum
(E) None of these
zoom sizes in MS word?
656. Which programming languages are classified as low level (A) 0,100 (B) 0,1000
languages?
(A) Basic, COBOL, FORTRAN (C) 10,500 (D) 10,100
(B) Prolog 2, Expert Systems (E) None of these
(C) Knowledge based Systems 667. Each time you turn on your computer, it will check on the
(D) Assembly Languages control file.
(E) None of these (A) Cammand.com, io.sys, msdos.sys
657. Which of the following option depicts the type of result (B) Command.com. io.sys
whose value is either TRUE or FALSE? (C) Command.com, date.com, dir.com
(A) Logical (B) Arithmetic (D) Chkdsk.exe
(C) Algorithm (D) Logarithm (E) None of these
(E) None of these 668. Which one of the following allows a user at one site to
658. What is the first process launched by the Linux kernel? establish a connection to another site and then pass
(A) Batch process (B) Boot process keystrokes from local host to remote host?
(C) Init process (D) Zombie process (A) HTTP (B) FTP
(E) None of these (C) Telnet (D) POP3
659. Which of the following is not aggregate function? (E) None of these
(A) MIN (B) MAX 669. Which of the following is the fastest type of computer?
(C) AVG (D) COUNT (A) Laptop (B) Notebook
(E) None of these (C) Personal computer (D) Workstation
660. The default and maximum size of text filed in Access is (E) Supercomputer
______. 670. Which among the following is a text margin treatment in
(A) 266 characters & 6400 characters which all lines begin hard against the left-hand margin but
(B) 288 characters & 6880 characters are allowed to end short of the right-hand margin?
(C) 299 characters & 6499 characters (A) Gutter Margin (B) Word wrap
(D) 50 and 255 characters (C) Right justified (D) Left justified
(E) None of these (E) Ragged right
661. Which of the following file format can be added to a 671. Which command should be used to display all files within
PowerPoint show? the specified subordinate directory of the subdirectory?
(A) .jpg (B) .gif (A) Dir/pathname (B) Dir/pathname/pathname
(C) Dir/ch (D) Dir/pathname/filename
(C) .wav (D) All of these
(E) None of these
(E) None of these
672. Which of the following key combination can be used to
662. ............................
print a document?
(A) Mini computer (B) Super computer
(C) Micro computer (D) Mainframe computer (A) Ctrl + P (B) Tab + P
(E) None of these (C) Alt + P (D) Windows logo key + P
(E) None of these
(103)
673. Which of the following key combination can be used to 685. Storage of instructions in computer memory to enables it
open task manager? to perform a variety of tasks in sequence or intermittently.
(A) Ctrl + Shift + Tab (B) Ctrl + Shift + ESC Who introduced the idea of stored program concepts?
(C) Ctrl + Shift + O (D) Ctrl + Shift + T (A) Charles Babbage (B) Dennis Ritchie
(E) None of these (C) Howard Aiken (D) John Neumann
674. Smart Art is the feature of ________. (E) Anna Lovelace
(A) Photoshop (B) Tally 686. Table of contents can be prepared by using :
(C) MS Word 2007 (D) Corel Draw (A) macros
(E) None of these
(B) headings as H1, H2, H3 and more in the document
675. Portrait and Landscape are type of _____.
(A) Page orientation (B) Paper Size (C) by table of contents in tools menu
(C) Page Layout (D) All of the above (D) (b) and (c)
(E) None of these (E) By File menu
676. Operating system is also known as:
687. Which of the following is the feature that keeps track of the
(A) Database (B) System software
right margin?
(C) Hardware (D) Printer
(E) None of these (A) Find and replace (B) Word-wrap
677. Which bar is usually located below the Title Bar that (C) Right justified (D) Left justified
provides categorized options? (E) Ragged right
(A) Menu Bar (B) Toolbar
688. To move data from one part of the document to another,
(C) Status bar (D) Scroll Bar
which of the following is used?
(E) None of the above
678. Which among the following term is used for: Unauthorized (A) Cut and Insert (B) Copy and Paste
copying of software to be used for personal gain instead of (C) Copy and Delete (D) Copy and Undo
personal backups? (E) Cut and Paste
(A) program thievery (B) data snatching
689. Term referring to a person who uses his or her expertise to
(C) software piracy (D) program looting
gain access to other people‟s computers to get information
(E) data looting
illegally or do damage?
679. In first generation of computers, they used ______.
(A) batch processing (B) multithreading (A) hacker (B) analyst
(C) multiprogramming (D) networking (C) instant messenger (D) programmer
(E) All of the above (E) spammer
680. A/(n) ___________ is an object embedded in a web page
690. To allow someone else schedule your meetings and
or email, which unobtrusively (usually invisibly) allows
appointments, ______ feature of Outlook is used.
checking that a user has accessed the content.
(A) Monthly calendar (B) Event manager
(A) email (B) virus
(C) Appointments (D) Delegate Access
(C) web beacon (D) spam
(E) None of these
(E) firewall
691. Which of the following is the valid subnet mask for class B
681. Which of the following terms is related to Internet
IP Address?
connectivity?
(A) 251.254.25.5 (B) 255.255.0.0
(A) IP (B) TCP
(C) 155.151.12.9 (D) 255.0.0.0
(C) Gopher (D) Both (a) and (b)
(E) 255.255.255.0
(E) All of the above
692. In DHCP, C stands for?
682. Which of the following is not example of Utility Software?
(A) Backup software (B) Antivirus software (A) Centralised (B) Centered
(C) Disk tools (D) Media Players (C) Cut (D) Common
(E) None of the above (E) Control
683. Example of telecommunication device is a ________ .
693. Which type of operation in the given options can be
(A) modem (B) printer
performed a CD-RW?
(C) keyboard (D) scanner
(E) mouse (A) read and write information
684. What is „Trend Micro‟? (B) read, write and rewrite information
(A) virus program (B) anti-virus software (C) only write information
(C) just a program (D) All of these
(D) only read information
(E) None of the above
(E) None of these
(104)
694. By firmware we understand _______. 702. E-R modeling technique uses which approach?
(A) physical equipment used in a computer system (A) top-down approach
(B) a set of instructions that causes a computer to perform (B) bottom-up approach
one or more tasks. (C) left-right approach
(C) the people involved in the computing process. (D) Both top-down and bottom-up
(D) a set of programs that is pre-installed into the read only (E) None of these
memory of a computer during the time of
703. Which among the following options is the application that
manufacturing
combines text, sound, graphics, motion video, and/ or
(E) None of these animation?
695. What is an ad hoc query? (A) Multimedia (B) Minimedias
(A) Pre-planned question (C) Videoscapes (D) Motionware
(B) Pre-scheduled question (E) Maxomedia
(C) Spur-of-the-moment question 704. Which of the following is true about relational database?
(D) Question that will not return any results (A) It is a collection where data can be arranged in only
(E) None of these rows
696. A _________ is used to direct and dispatch data packets (B) It is a collection where data can be arranged in only
between different networks. columns
(A) Connection (B) Bridge (C) It is a collection of data arranged in rows and columns
(C) Gateway (D) Hub (D) All of the above
(E) Router (E) None of the above
697. Dr. E.F. Codd represented ______ rules that a database 705. Which of the following is a folder that retains copies of
must obey if it has to be considered truly relational. messages have started but are not yet send to the recipient?
(A) 10 (B) 8 (A) Inbox (B) Outbox
(C) 12 (D) 6 (C) CC (D) Sent Items
(E) 5 (E) Drafts
698. Which of the following is a software used for Remote 706. Which of the following is required to communicate
Connection? between two computers?
(A) TeamViewer (B) Picasa (A) communications software
(C) Prisma (D) Safari (B) communications hardware
(E) Intel Connect (C) protocol
699. HTML tags are the hidden keywords within a web page (D) access to transmission medium
that define how the browser must format and display the (E) All of the above
content. Which type of brackets makes an HTML tag? 707. Which key should you use to indent the first paragraph of
(A) Flower brackets { } (B) Angular brackets < > your report?
(C) Parentheses ( ) (D) Square brackets [ ] (A) tab key (B) return key
(C) space bar (D) shift key
(E) Inverted Comma " "
(E) None of these
700. The primary purpose of software is to turn data into 708. Which of the following is true about Assembly language?
_______. (A) It is a Machine Language
(A) memory (B) information (B) It is a High-level programming language
(C) programs (D) objects (C) It is a low-level programming language
(D) It is a language for assembling computers
(E) internet
(E) None of these
701. Which action is performed to change written work already 709. Which operating system is defined as self-contained in
done? device and resident in ROM?
(A) save (B) edit (A) Multiprocessing OS (B) Batch Processing OS
(C) file (D) close (C) Multi-threading OS (D) Embedded OS
(E) Real Time OS
(E) clear
(105)
710. Which among the following is the reboot where the power 720. A _________ typically connects personal computers within
to the system is physically turned off and back on again, a very limited geographical area, usually within a single
causing an initial boot of the machine? building.
(A) Toggle (B) Cold booting (A) LAN (B) FAN
(C) Warm booting (D) Logging off (C) TAN (D) WAN
(E) None of these (E) WWW
711. Main memory works in conjunction with _________. 721. Oracle is an example of __________ application software.
(A) special function cards (A) database (B) word processing
(B) RAM (C) CPU (C) project management (D) presentation graphics
(D) Intel (E) All of the above (E) desktop
712. A (n) ________ allows you to access your e-mail from
anywhere.
(A) Forum (B) Webmail interface
(C) Message Board (D) Weblog
(E) EEPROM
713. Which of the following options is used to display
information such as title, page number of the document?
(A) Insert Table (B) Header and Footer
(C) Thesaurus (D) Spelling and Grammar
(E) Auto correct
714. Which icon represents an e-mail message that has not been
read?
(A) Question Mark (B) Red envelope
(C) Highlighted envelope (D) Flashing letter
(E) Closed envelope
715. Which among the given options is computer peripheral that
is tangible?
(A) menu (B) Print
(C) Software (D) Hardware
(E) None of these
716. Through ______ an administrator or another user can
access someone else‟s computer remotely.
(A) Administrator (B) Web server
(C) Web application (D) HTTP
(E) Telnet
717. Which among the following is a language used in a
computer that is very similar to, the language of humans
and is easy to understand?
(A) Source Code (B) Machine Language
(C) High Level Language (D) Object Code
(E) Assembly language
718. The Internet allows you to:
(A) send electronic mail
(B) view web pages
(C) connect to servers all around the world
(D) All of the above
(E) None of these
719. Which of the following can be used to protect sensitive
data from prying eyes?
(A) Encryption (B) Passwords
(C) File locks (D) File permissions
(E) None of these
(106)
ANSWER SHEET
1-A 46-B 91-A 136-E 181-C 226-B 271-A 316-E 361-A 406-D 451-C 496-B 541-C 586-C 631-B 676-D
2-D 47-C 92-A 137-B 182-A 227-D 272-A 317-D 362-B 407-B 452-A 497-B 542-E 587-B 632-A 677-C
3-A 48-A 93-A 138-A 183-D 228-B 273-B 318-C 363-D 408-B 453-B 498-B 543-B 588-D 633-C 678-A
4-C 49-B 94-A 139-C 184-C 229-D 274-D 319-B 364-B 409-B 454-C 499-B 544-D 589-B 634-C 679-C
5-A 50-D 95-C 140-C 185-D 230-B 275-B 320-A 365-A 410-B 455-C 500-A 545-B 590-C 635-A 680-E
6-A 51-A 96-D 141-C 186-D 231-A 276-A 321-B 366-C 411-D 456-C 501-D 546-A 591-A 636-C 681-D
7-D 52-C 97-A 142-C 187-A 232-E 277-B 322-A 367-A 412-A 457-A 502-C 547-E 592-D 637-E 682-A
8-A 53-C 98-B 143-B 188-C 233-E 278-D 323-A 368-A 413-D 458-D 503-B 548-A 593-A 638-A 683-B
9-A 54-B 99-B 144-E 189-D 234-A 279-A 324-D 369-C 414-C 459-E 504-E 549-D 594-E 639-B 684-D
10-A 55-C 100-C 145-A 190-E 235-C 280-A 325-D 370-A 415-A 460-B 505-B 550-B 595-E 640-D 685-B
11-D 56-A 101-D 146-B 191-B 236-A 281-E 326-C 371-B 416-C 461-D 506-E 551-B 596-B 641-A 686-C
12-C 57-A 102-A 147-D 192-E 237-A 282-C 327-C 372-B 417-A 462-A 507-A 552-D 597-B 642-B 687-E
13-B 58-D 103-C 148-A 193-E 238-D 283-C 328-B 373-A 418-A 463-C 508-C 553-A 598-C 643-A 688-A
14-A 59-A 104-D 149-E 194-E 239-E 284-D 329-D 374-C 419-B 464-C 509-B 554-D 599-D 644-E 689-D
15-A 60-C 105-B 150-A 195-C 240-C 285-A 330-A 375-A 420-C 465-A 510-C 555-C 600-C 645-B 690-B
16-C 61-B 106-A 151-A 196-A 241-C 286-D 331-D 376-B 421-D 466-B 511-A 556-B 601-B 646-C 691-E
17-D 62-B 107-D 152-C 197-C 242-B 287-B 332-D 377-A 422-D 467-B 512-C 557-D 602-B 647-C 692-B
18-A 63-C 108-C 153-E 198-A 243-C 288-D 333-A 378-A 423-C 468-D 513-D 558-B 603-E 648-D 693-D
19-A 64-A 109-C 154-D 199-D 244-A 289-C 334-C 379-C 424-A 469-A 514-C 559-A 504-D 649-C 694-C
20-D 65-D 110-B 155-B 200-D 245-D 290-D 335-B 380-B 425-B 470-B 515-E 560-C 605-A 650-A 695-E
21-A 66-C 111-D 156-B 201-B 246-C 291-C 336-D 381-D 426-E 471-B 516-C 561-B 606-B 651-A 696-C
22-A 67-A 112-A 157-D 202-D 247-A 292-B 337-B 382-A 427-C 472-D 517-A 562-A 607-A 652-B 697-A
23-D 68-C 113-C 158-D 203-E 248-B 293-A 338-B 383-E 428-D 473-B 518-B 563-A 608-A 653-A 698-B
24-A 69-B 114-C 159-C 204-A 249-A 294-C 339-B 384-C 429-A 474-A 519-D 564-D 609-E 654-A 699-B
25-D 70-C 115-C 160-C 205-C 250-D 295-B 340-C 385-C 430-A 475-D 520-B 565-A 610-D 655-D 700-B
26-C 71-A 116-B 161-E 206-A 251-C 296-A 341-A 386-E 431-A 476-C 521-C 566-A 611-E 656-A 701-A
27-B 72-B 117-C 162-B 207-D 252-D 297-B 342-D 387-B 432-A 477-B 522-B 567-D 612-B 657-C 702-A
28-A 73-C 118-E 163-D 208-B 253-B 298-D 343-B 388-C 433-B 478-D 523-C 568-D 613-D 658-E 703-C
29-A 74-D 119-D 164-B 209-A 254-B 299-D 344-B 389-B 434-B 479-D 524-E 569-E 614-B 659-D 704-E
30-D 75-A 120-C 165-A 210-A 255-A 300-C 345-D 390-B 435-D 480-B 525-E 570-C 615-A 660-D 705-E
31-C 76-A 121-C 166-C 211-B 256-A 301-D 346-C 391-D 436-B 481-B 526-C 571-A 616-C 661-B 706-A
32-B 77-C 122-D 167-E 212-B 257-A 302-B 347-E 392-B 437-C 482-A 527-C 572-D 617-E 662-A 707-C
33-D 78-D 123-D 168-A 213-C 258-C 303-C 348-C 393-B 438-C 483-B 528-D 573-C 618-B 663-D 708-D
34-D 79-A 124-B 169-D 214-D 259-D 304-E 349-B 394-B 439-B 484-A 529-A 574-D 619-B 664-C 709-B
35-A 80-A 125-D 170-C 215-D 260-D 305-C 350-D 395-B 440-B 485-A 530-C 575-D 620-D 665-C 710-C
36-A 81-A 126-A 171-B 216-B 261-A 306-E 351-A 396-C 441-B 486-D 531-B 576-A 621-A 666-A 711-B
37-D 82-D 127-B 172-B 217-D 262-C 307-A 352-D 397-D 442-B 487-B 532-D 577-D 622-B 667-C 712-B
38-E 83-A 128-B 173-A 218-B 263-D 308-D 353-C 398-C 443-A 488-C 533-D 578-D 623-B 668-E 713-E
39-C 84-A 129-C 174-D 219-B 264-C 309-C 354-A 399-C 444-A 489-A 534-C 579-C 624-A 669-E 714-D
40-C 85-C 130-D 175-D 220-D 265-C 310-A 355-B 400-D 445-C 490-B 535-C 580-B 625-A 670-B 715-E
41-A 86-E 131-A 176-B 221-C 266-A 311-A 356-E 401-D 446-D 491-C 536-D 581-C 626-E 671-A 716-C
42-A 87-* 132-A 177-A 222-E 267-B 312-A 357-C 402-C 447-C 492-E 537-C 582-A 527-E 672-B 717-D
43-D 88-C 133-A 178-A 223-D 268-E 313-B 358-D 403-A 448-B 493-B 538-D 583-D 628-D 673-C 718-D
44-B 89-B 134-B 179-A 224-C 269-A 314-D 359-C 404-A 449-A 494-B 539-B 584-A 629-B 674-A 719-A
45-A 90-A 135-A 180-C 225-B 270-B 315-C 360-D 405-D 450-A 495-B 540-E 585-D 630-D 675-B 720-A
(107)