0% found this document useful (0 votes)
35 views24 pages

03 - Computer Fundamental (Section-B)

The document discusses the history and types of computers. It explains that Charles Babbage invented the first computer and outlines the evolution from first to fourth generation computers, describing their basic components and capabilities. It also defines different types of computers like microcomputers, mainframes, and supercomputers based on their size, speed and intended uses.

Uploaded by

rajindere saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views24 pages

03 - Computer Fundamental (Section-B)

The document discusses the history and types of computers. It explains that Charles Babbage invented the first computer and outlines the evolution from first to fourth generation computers, describing their basic components and capabilities. It also defines different types of computers like microcomputers, mainframes, and supercomputers based on their size, speed and intended uses.

Uploaded by

rajindere saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Computer fundamental Subjective Questions Answers

Q1. What is Computer? Explain the Basic part of computer.


A computer is a programmable electronic device that accepts raw data as input and processes it with
a set of instructions (a program) to produce the result as output. It renders output just after
performing mathematical and logical operations and can save the output for future use. It can
process numerical as well as non-numerical calculations. The term "computer" is derived from the
Latin word "computer" which means to calculate.
The basic parts without which a computer cannot work are as follows:
• Processor: It executes instructions from software and hardware.
• Memory: It is the primary memory for data transfer between the CPU and storage.
• Motherboard: It is the part that connects all other parts or components of a computer.
• Storage Device: It permanently stores the data, e.g., hard drive.
• Input Device: It allows you to communicate with the computer or to input data, e.g., a keyboard.
• Output Device: It enables you to see the output, e.g., monitor.

tk
8R
−2
on
tr
ar
H

Q2. Explain the types of computers in Details?


Computers are divided into different types based on different criteria. Based on the size, a computer
can be divided into five types:
1. Micro Computer
2. Mini Computer
3. Mainframe Computer
4. Super Computer
5. Workstations
1. Micro Computer:
It is a single-user computer which has less speed and storage capacity than the other types. It uses a
microprocessor as a CPU. The first microcomputer was built with 8-bit microprocessor chips. The common
examples of microcomputers include laptops, desktop computers, personal digital assistant (PDA), tablets,
and smartphones. Microcomputers are generally designed and developed for general usage like browsing,
searching for information, internet, MS Office, social media, etc.
2. Mini Computer:
Mini-computers are also known as "Midrange Computers." They are not designed for a single. They are
multi-user computers designed to support multiple users simultaneously. So, they are generally used by
small businesses and firms. Individual departments of a company use these computers for specific purposes.
For example, the admission department of a university can use a Mini-computer for monitoring the
admission process.
3. Mainframe Computer:
It is also a multi-user computer capable of supporting thousands of users simultaneously. They are used by
large firms and government organizations to run their business operations as they can store and process
large amounts of data. For example, Banks, universities, and insurance companies use mainframe
computers to store the data of their customers, students, and policyholders, respectively.
4. Super Computer:
Super-computers are the fastest and most expensive computers among all types of computers. They have
huge storage capacities and computing speeds and thus can perform millions of instructions per second.
The super-computers are task-specific and thus used for specialized applications such as large-scale
numerical problems in scientific and engineering disciplines including applications in electronics,
petroleum engineering, weather forecasting, medicine, space research and more. For example, NASA uses

tk
supercomputers for launching space satellites and monitoring and controlling them for space exploration.
5. Work stations:
8R
It is a single-user computer. Although it is like a personal computer, it has a more powerful microprocessor
and a higher-quality monitor than a microcomputer. In terms of storage capacity and speed, it comes
between a personal computer and minicomputer. Work stations are generally used for specialized
applications such as desktop publishing, software development, and engineering designs.
−2

Q3. Explain the Benefits of Using a computer?


• Increases your productivity: A computer increases your productivity. For example, after having a
on

basic understanding of a word processor, you can create, edit, store, and print the documents easily
and quickly.
• Connects to the Internet: It connects you to the internet that allows you to send emails, browse
tr

content, gain information, use social media platforms, and more. By connecting to the internet, you
can also connect to your long-distance friends and family members.
ar

• Storage: A computer allows you to store a large amount of information, e.g., you can store your
projects, eBooks, documents, movies, pictures, songs, and more.
H

• Organized Data and Information: It not only allows you to store data but also enables you to
organize your data. For example, you can create different folders to store different data and
information and thus can search for information easily and quickly.
• Improves your abilities: It helps write good English if you are not good at spelling and grammar.
Similarly, if you are not good at math, and don't have a great memory, you can use a computer to
perform calculations and store the results.
• Assist the physically challenged: It can be used to help the physically challenged, e.g., Stephen
Hawking, who was not able to speak used computer to speak. It also can be used to help blind
people by installing special software to read what is on the screen.
• Keeps you entertained: You can use the computer to listen to songs, watch movies, play games
and more.
• The computer has become a part of our life. There are plenty of things that we do in a day are
dependent on a computer. Some of the common examples are as follows:
• ATM: While withdrawing cash from an ATM, you are using a computer that enables the ATM to
take instructions and dispense cash accordingly.
• Digital currency: A computer keeps a record of your transactions and balance in your account and
the money deposited in your account in a bank is stored as a digital record or digital currency.
• Trading: Stock markets use computers for day to day trading. There are many advanced
algorithms based on computers that handle trading without involving humans.
• Smartphone: The smartphone that we use throughout the day for calling, texting, browsing is itself
a computer.
Q4. Explain the History of Computer?
Charles Babbage is said to be the "father of computers", since it was, he who had first conceived
the idea of the basic design of a computer. With his “need” to develop a device that can carry out
calculations with absolute precision and eliminate miscalculations in course-plotting and
engineering, he offered the world the design for his first computer called the Difference Engine.
The gradual developments of computers over the years
Computers have faced “technical evolution” over the entire course of their years. With the
advancement in scientific knowledge and improved technical progress, computers are growing
“smarter” day-by-day. Science has been able to spearhead the improvement that has allowed
computers to advance.
Now, future computers can make their "own decisions" with better artificial intelligence.
First Generation ENIAC (1940-1956)
• The ENIAC or Electronic Numerator Integrator and Calculator computers were fragile.
• These first-generation machines used vacuum tubes, generated much heat, and consumed vast
amounts of electricity.
• The massive heat generation would attract insects (or “bugs”) into it that would cause an error in
the calculations.
• Thus, came the word “bugs” in computers to indicate a malfunctioning machine.

tk
• ENIAC devices could decrypt messages and calculate ballistic targeting.
Second Generation Machines (1957-1963)
8R
• The second-generation computers were composed of transistors whose major
manufacturing came from the USA (Santa Clara Valley).
• The use of silicon in transistors made the name of the location "Silicon Valley".
−2
• They were comparatively accurate, although these second-generation
computers carried out calculations at a rate of 5000 additions/second.
on

• However, increasing the performance capacity of these machines required the


addition of more transistors.
• Thus, these machines kept demanding more and more extra machine parts.
tr

Third Generation Machines (1964-1971)


ar

• The use of multiple transistors into a single chip brought forth Integrated
Circuits, the backbone of third-generation computers.
H

• According to Moore's Law, every two years, the expenditure of the IC would
reduce by half, as twice the number of transistors can be fitted into ICs.
• The closure of circuits in an IC reduced the flow-time of electricity, leading to its
swift calculation capabilities.
• But air conditions were mandatory for its proper functioning.
Fourth Generation Devices (1972-Present)
• The invention of stamp-size chips, called microprocessors, has paved the way for fourth-
generation computers.
• The tiny microprocessor carries all the necessary components to run the machine.
• One of the oldest firms still involved in the development of integrated electronics is Intel.
• These machines were known as microcomputers due to their reduced size in comparison
to the earlier ones.
• One of the most renowned fourth-generation personal computers, under the public
spotlight during that time, was the Apple II from Apple Computers.
Fifth Generation Computers (Future Computers)
• The fifth-generation computers might carry decision-making capabilities.
• Through the use of advanced artificial intelligence and improved neural networks, they
can "learn" and "adapt".
• The smallest fifth-generation computer, with the size of a rice grain, can quantify
temperature in cell clusters.
• These future computers carry limitless real-life applications and might be difficult to
control due to their capabilities at interpreting information and making decisions.

Q5. Explain the Early Computing Devices?


People used sticks, stones, and bones as counting tools before computers were invented.
More computing devices were produced as technology advanced and the human intellect
improved over time. Let us look at a few of the early-age computing devices used by
mankind.
Abacus-Abacus was invented by the Chinese around 4000 years ago. It’s a wooden rack with
metal rods with beads attached to them. The abacus operator moves the beads according to
certain guidelines to complete arithmetic computations.
Napier’s Bone-John Napier devised Napier’s Bones, a manually operated calculating
apparatus. For calculating, this instrument used 9 separate ivory strips (bones) marked with
numerals to multiply and divide. It was also the first machine to calculate using the decimal
point system.
Pascaline-Pascaline was invented in 1642 by Biaise Pascal, a French mathematician and

tk
philosopher. It is thought to be the first mechanical and automated calculator. It was a wooden
box with gears and wheels inside.
Stepped Reckoner or Leibniz wheel-In 1673, a German mathematician-philosopher named
8R
Gottfried Wilhelm Leibniz improved on Pascal’s invention to create this apparatus. It was a
digital mechanical calculator known as the stepped reckoner because it used fluted drums
instead of gears.
−2
Difference Engine-In the early 1820s, Charles Babbage created the Difference Engine. It was
a mechanical computer that could do basic computations. It was a steam-powered calculating
machine used to solve numerical tables such as logarithmic tables.
on

Analytical Engine -Charles Babbage created another calculating machine, the Analytical
Engine, in 1830. It was a mechanical computer that took input from punch cards. It was
capable of solving any mathematical problem and storing data in an indefinite memory.
tr

Tabulating machine -An American Statistician – Herman Hollerith invented this machine in the
year 1890. Tabulating Machine was a punch card-based mechanical tabulator. It could
ar

compute statistics and record or sort data or information. Hollerith began manufacturing these
machines in his company, which ultimately became International Business Machines (IBM) in
H

1924.
Differential Analyzer -whenever Bush introduced the first electrical computer, the Differential
Analyzer, in 1930. This machine is made up of vacuum tubes that switch electrical impulses
in order to do calculations. It was capable of performing 25 calculations in a matter of minutes.
Mark I-Howard Aiken planned to build a machine in 1937 that could conduct massive
calculations or calculations using enormous numbers. The Mark I computer was constructed
in 1944 as a collaboration between IBM and Harvard.

Q5. Explain the computer Hardware & Software?


Hardware and software form the main parts of any computing device. The physical parts of
the computer make up the hardware, while the apps or programs is the software of any
computing device. Hardware is often referred to as the machinery of the computer.
Hardware is the ‘soul’ of the computer. It is the physical entity. Moreover, not every part of
the computer hardware is visible to us. In fact, many hardware parts are internal. For example,
hardware components such as motherboard, RAM and CPU are internal. Other examples of
hardware include output devices such as printer and monitor. Input devices such as the
keyboard and mouse. Also, secondary storage devices such as CD, DVD, hard disk, etc. are
all hardware components of a computer.
Software is the applications and programs of a computer. It is a set of instructions to perform
the tasks. These instructions are given by a software developer. They are written in a way that
a computer can understand it. Furthermore, if you design a program for a Linux operating
system, it will only work for Linux systems. In short, a software designed for a particular
hardware is not compatible with other hardware. For example, if we design software for
Windows 7 then there might be a compatibility issue if we use it for Windows 10.
Q6. Explain the computer Input and Output Devices?
Input Device Definition: A piece of equipment/hardware which helps us enter data into a
computer is called an input device. For example, keyboard, mouse, etc.
List of Input Devices
Given below is the list of the most common input devices along with brief information about
each of them.
Keyboard
• A simple device comprising keys and each key denotes either an alphabet, number or
number commands which can be given to a computer for various actions to be performed
• It has a modified version of typewriter keys
• The keyboard is an essential input device and computer and laptops both use keyboards
to give commands to the computer
Mouse
• It is also known as a pointing device

tk
• Using mouse, we can directly click on the various icons present on the system and open
up various files and programs
8R
• A mouse comprises 3 buttons on the top and one trackball at the bottom which helps in
selecting and moving the mouse around, respectively
• In case of laptops, the touchpad is given as a replacement of the mouse which helps in
−2
the movement of the mouse pointer
Joy Stick
• It is a device which comprises a stick which is attached at an angle to the base so that it
on

can be moved and controlled


• Mostly used to control the movement in video games
• Apart from a computer system, a joystick is also used in the cockpit of an aeroplane,
tr

wheelchairs, cranes, trucks, etc. to operate them well


Light Pen
ar

• It is a wand-like looking device which can directly be moved over the device’s screen
• It is light-sensitive
• Used in conjunction with computer’s cathode ray tube
H

Microphone
• Using a microphone, sound can be stored in a device in its digital form
• It converts sound into an electrical signal
• To record or reproduce a sound created using a microphone, it needs to be connected
with an amplifier
Scanner
• This device can scan images or text and convert it into a digital signal
• When we place any piece of a document on a scanner, it converts it into a digital signal
and displays it on the computer screen
Barcode Reader
• It is a kind of an optical scanner
• It can read bar codes
• A source of light is passed through a bar code, and its aspects and details are displayed
on the screen
Output Device Definition: A piece of equipment/hardware which gives out the result of the
entered input, once it is processed (i.e. converts data from machine language to a human-
understandable language), is called an output device. For example, printer, monitor, etc.
Q7. Explain the computer memory and types of memory?
Computer memory refers to different types of data storage technologies used by the computer.
A computer system is made up of a combination of types of computer memory. It is electronic
that holds a place for instruction and data that a computer needs to reach quickly. Computer
memory is the collection of storage units that store binary information in bits. Storage word
length may vary in 8, 16, or 32 bits.
Types of Memory in Computer
Let us now discuss the classification of various types of memories in computers. Broadly,
memory is segregated into Primary, Secondary, Cache and Register. Further classification is
between primary and secondary memory.
1. Primary Memory
Also known as main memory in computer, it communicates directly with the CPU, Cache and
Auxiliary memory. This type of computer memory keeps data and programs when the process
is active to use them.
When a program or the data is activated for execution, the processor loads instructions from
the secondary memory into the main memory and then starts execution. It is a volatile memory
due to which any unsaved data is lost when a power cut occurs. Primary memory is of two
types: RAM and ROM.
1.1 RAM
RAM is hardware that temporarily stores data and programs. It is the faster part of the main

tk
memory which can be directly accessed by the CPU. It reads and writes programs until the
computer is switched on. RAM is of two types: DRAM and SRAM.
8R
1. DRAM full form is Dynamic Random-Access Memory. It is a type of RAM that is used for
dynamic data storage. Every cell in DRAM consists of one-bit information. A cell is
composed of a transistor and a capacitor. This capacitor and transistor are extremely small
in size. The capacitor needs a continuous refresh to retain information since it is volatile.
−2
2. SRAM full form is Static Random-Access Memory. This type of RAM stores static data in
memory which remains active until there is a power supply. Same sized SRAM chip holds
less data than DRAM. Unlike DRAM, it does not require a continuous refresh.
on

1.2 ROM-Read-Only Memory (ROM) is a permanent storage type. This is a type of read-only
memory that only reads the stored information, but it does not have the capability to modify or
write. Since it is a non-volatile type of memory in computer, the information stays even after a
tr

power cut or when the system has been shut down. ROM is of the following five types:
MROM: It is the oldest ROM whose data is pre-configured via integrated circuit manufacture
ar

during the time of manufacturing. Due to this pre-configuration, the user cannot change the
instruction stored within the MROM chip.
H

PROM: It is a digital ROM which only once allows writing any information or program. This is
done using a special PROM programmer or burner device.
Flash ROM: This type of ROM can be programmed or written in smaller units called sector or
block. It is used for transferring data between computer and digital devices.
EPROM: In this type of ROM, data can be erased as well as reprogrammed only once. It can
store data for a minimum of 10-20 years. To erase and reprogram EPROM, the user needs to
pass UV light for 40 minutes. Post this, the data can be recreated.
EEPROM: The full form of EEPROM is Electrically Erasable and Programmable Read Only
Memory. It is an electrically erasable and programmable ROM. This allows data to be erased
using a high-voltage electrical charge. After this, it can be reprogrammed up to thousands of
times.
2. Secondary Memory
It is a permanent type of memory in computer that holds a large amount of data. This is
an external memory that represents different storage media on which data and programs can
be saved for long term. It is not directly accessible by the CPU and is available as external
devices such as CDs, DVDs and USBs. They are cheaper than primary memory but slower
than primary memory.
Hard disk: It is a type of permanent computer memory that stores programs, files and data. It
is stored on the motherboard of the computer that does not lose data even when there is a
power outage or when the system has been switched off.
Compact Disc (CD): It is an optical disk storage device that stores different types of data,
such as audio, video, files, and other information. CD uses light to read and write data from
CDs.
Pen Drive: This portable device is a type of secondary memory in computer that is used for
permanently storing data. It is also known as a USB flash drive that stores and transfers.

tk
List of Output Device
The commonly used output devices have been listed below with a brief summary of what their
function is and how they can be used. 8R
Monitor-The device which displays all the icons, text, images, etc. over a screen is called
the Monitor
• When we ask the computer to perform an action, the result of that action is displayed on
−2
the monitor
• Various types of monitors have also been developed over the years
on

Printer-A device which makes a copy of the pictorial or textual content, usually over a
paper is called a printer
• For example, an author types the entire book on his/her computer and later gets a print
tr

out of it, which is in the form of paper and is later published


• Multiple types of printers are also available in the market, which can serve different
ar

purposes
Speakers-A device through which we can listen to a sound as an outcome of what we
command a computer to do is called a speaker
H

• Speakers are attached with a computer system and also are a hardware device which
can be attached separately
• With the advancement in technology, speakers are now available which are wireless and
can be connected using Bluetooth or other applications
Projector-An optical device which presents an image or moving images onto a projection
screen is called a projector
• Most commonly these projectors are used in auditoriums and movie theatres for the
display of the videos or lighting
• If a projector is connected to a computer, then the image/video displayed on the screen is
the same as the one displayed on the computer screen
Headphones-They perform the same function as a speaker, the only difference is the
frequency of sound
• Using speakers, the sound can be heard over a larger area and using headphones, the
sound is only audible to the person using them
• Also known as earphones or headset
3. Cache Memory
This small-sized chip-based memory in computer lies between the main memory and CPU. It
is very close to the chip of CPU. The aim of this type of computer memory is to enhance the
performance of the CPU. It is a high-performance and temporary type of memory that reduces
the access time of data from main memory. Every instruction and data that is often used by
the CPU is stored within Cache memory.
Q7. Explain BIOS, POST and Cold Start & Hot Start In computer?
BIOS: BIOS is a program, stands for basic input/output system, which is stored in non-
volatile memory like ROM (Read Only Memory) or flash memory that allows you to set up and
access your computer system. The main function of BIOS is to set up hardware and start an OS,
and it contains generic code that is needed to control display screens, the keyboard, and other
functions. The BIOS is built-in software that manages the hard drives and cannot live on one.
Users can perform different functions by using the BIOS user interface, which is discussed below:
• Users can perform hardware configuration
• They can select boot drives
• They can set the system clock
• The BIOS allows users to enable and disable certain system components
• To BIOS user interface function, it provides set password prompts for secured access
POST(Power-on self-test) is a test the computer must complete to verify all hardware is working
properly before starting the remainder of the boot process. The POST process checks computer
hardware, like RAM (random access memory), hard drive, CD-ROM drive, keyboard, etc., to
ensure everything is working correctly.
If all hardware passes the POST, the computer continues the boot up process and may generate

tk
a single beep sound. If POST is unsuccessful, it generates a beep code to indicate the error
encountered, and the computer will not boot up. All POST errors relate to hardware issues with
one of the components in the computer.
Why is a POST necessary? 8R
If a computer were not to run through a POST and verify all required hardware is working, it would
cause other problems with the computer. For example, if the computer had RAM problems, all
−2
other software could have problems, and you wouldn't know it was due to the RAM. Verifying the
necessary hardware passes tests ensures your computer runs more stable.
Cold Start: Cold start refers to starting the CPU from power off, Current configuration is discarded
on

and program processing begins again with the initial values. Warm Start: Warm start refers to
restarting the CPU without turning the power off, Program processing starts once again where
Retentive data is retained.
tr

Warm Start(HOT): When a computer is hanging and not working properly, you can restart it so
that it can function normally again. Warm boot does not turn off and does not erase data when
ar

powered on. It makes a big difference when paired with a cold boot. Before putting the system to
use, it performs a self-diagnosis, also known as a POST, and loads all necessary drivers.
H

Warm start refers to restarting the CPU without turning the power off, Program processing starts
once again where Retentive data is retained.

Q8. What is an Operating System? Name the types of Operating System?


An operating system is a set of programs that enables a user to operate and interact with a
computer. Examples of operating systems are Linux distributions, windows, mac os, FreeBSD,
etc. There are many types of operating systems. In this article, we will discuss various
classifications of operating systems.
Operating systems based on their use cases are categorized as being of the following types:
1. Batch OS 6. Embedded OS
2. Time-Sharing OS 7. Multiprogramming OS
3. Distributed OS 8. Multiprocessing OS
4. Network OS 9. Desktop OS
5. Real-Time OS 10. Mobile OS

Types of Operating System


Batch Operating Systems-A batch operating system grabs all programs and data in the batch form
and then processes them. The main aim of using a batch processing system is to decrease the
setup time while submitting similar jobs to the CPU
Time-sharing Operating Systems-Time-sharing is a logical extension of multiprogramming. The
CPU executes multiple jobs by switching, among them, but the switches occur so frequently that
the users can interact with each program while it is running.
Distributed operating system-A distributed operating system allows the distribution of entire
systems on the couples of center processors, and it serves on multiple real-time products as well
as multiple users
Network operating systems-Network Operating System is an operating system that has special
functions for connecting computers and devices into a local-area network or Inter-network. Some
popular network operating systems are Windows NT/2000, Novell Netware, Linux, UNIX, Sun
Solaris, and IBM OS/2. The network operating system which was first developed is Novell
Netware, in 1983.
Real-time Operating Systems-A real-time operating system (RTOS) is an operating system that
runs multi-threaded applications and can meet real-time deadlines. Most RTOSes include a
scheduler, resource management, and device drivers. Note that when we talk about “deadlines”,
we do not necessarily mean “fast”. Instead, meaning we can determine when certain tasks will
execute before runtime.
Embedded Operating Systems-An embedded operating system is a specialized OS for embedded

tk
systems. It aims to perform with certainty specific tasks regularly that help the device operate. An
embedded operating system often has limited features and functions. The OS may perform only
a single action that allows the device to work
8R
Multiprogramming Operating System-A multiprogramming operating system runs multiple
programs on a single processor computer. If a program waits for an I/O transfer, the other
programs are ready to use the CPU. As a result, various jobs may share CPU time. However, the
−2
execution of their jobs is not defined to be in the same period. A multiprogramming OS is of the
following two types:
1. Multitasking OS: Enables execution of multiple programs at the same time. The operating
on

system accomplishes this by swapping each program in and out of memory one at a time.
When a program is switched out of memory, it is temporarily saved on disk until it is
required again.
tr

2. Multiuser Operating System: This allows many users to share processing time on a
powerful central computer from different terminals. The operating system accomplishes
ar

this by rapidly switching between terminals, each of which receives a limited amount of
processor time on the central computer.
H

Multiprocessor Operating System-Multiprocessor operating system utilizes multiple processors,


which are connected with physical memory, computer buses, clocks, and peripheral devices
(touchpad, joystick, etc). The main objective of using a multiprocessor OS is to consume high
computing power and increase the execution speed of the system.
Following are four major components, used in the Multiprocessor Operating System:
1. CPU – capable to access memories as well as controlling the entire I/O tasks.
2. Input Output Processor – I/P processor can access direct memories, and every I/O processors have
to be responsible for controlling all input and output tasks.
3. Input/Output Devices – These devices are used for inserting the input commands, and producing
output after processing.
4. Memory Unit – Multiprocessor system uses the two types of memory modules - shared memory
and distributed shared memory.
Desktop Operating System
The control program which operates in the machine of a user is referred to as a desktop system.
It is also called a Client Operating System. The client can be said as a computer in a network
where the user performs some task or activity over the network. Such operating systems do not
have complete control over the resources but use the network to access them.
Mobile Operating System-A mobile operating system is an operating system that helps run
application software on mobile devices. It is the same kind of software as the famous computer
operating systems Linux and Windows, but they are light and simple to some extent. The
operating systems found on smartphones include Symbian OS, IOS, BlackBerryOS, Windows
Mobile, Palm WebOS, Android, and Maemo.
Q9. Difference between 64-bit OS vs 32-bit OS?
A 64-bit processor-is more capable than a 32-bit processor because it can handle more data at
once. It can store more computational values, including memory addresses, which means it can
access over 4 billion times the physical memory of a 32-bit processor-A key difference is, 32-bit
processors are perfectly capable of handling a limited amount of RAM (in Windows, 4GB or less),
and 64-bit processors utilize relatively more. A major difference between 32-bit processors and
64-bit processors is the number of computations per second they perform, which affects the speed
at which they can complete tasks.
Q10. What are the difference between File and Folder?
A file is the common storage unit in a computer, and all programs and data are "written" into a
file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is
filled. A folder can also contain other folders, and there can be many levels of folders within
folders. Folders within a folder are technically known as "subfolders," but this distinction is often
disregarded.
Folders provide a method for organizing files much like a manila file folder contains paper
documents in a file cabinet. In fact, files that contain text are often called documents.
Folders are also called "directories," and they are created on the hard drive (HD) or solid state

tk
drive (SSD) when the operating system and applications are installed. Files are always stored in
folders. In fact, even the computer's desktop is a special kind of folder that displays its contents
across the screen (see desktop).
Q11. Explain types of Network Topologies with diagram?
8R
Network topologies describe the methods in which all the elements of a network are mapped. The
−2
topology term refers to both the physical and logical layout of a network.
Types of Networking Topologies
1.Bus Topology 2.Ring Topology
on

3.Star Topology 4.Mesh Topology


5.Tree Topology 6.Hybrid Topology
tr
ar
H

Point to Point (P2P)-Point-to-point topology is the easiest of all the network topologies. In this
method, the network consists of a direct link between two computers.
Bus Topology- Bus topology uses a single cable which connects all the included nodes. The main
cable acts as a spine for the entire network. One of the computers in the network acts as the
computer server. When it has two endpoints, it is known as a linear bus topology.
Ring Topology- In a ring network, every device has exactly two neighbouring devices for
communication purpose. It is called a ring topology as its formation is like a ring. In this
topology, every computer is connected to another computer. Here, the last node is combined
with a first one.
This topology uses token to pass the information from one computer to another. In this topology,
all the messages travel through a ring in the same direction.
Star topology- In the star topology, all the computers connect with the help of a hub. This cable is
called a central node, and all other nodes are connected using this central node. It is most popular
on LAN networks as they are inexpensive and easy to install.
Mesh Topology-The mesh topology has a unique network design in which each computer on the
network connects to every other. It is develops a P2P (point-to-point) connection between all the
devices of the network. It offers a high level of redundancy, so even if one network cable fails, still
data has an alternative path to reach its destination.
Tree topologies- have a root node, and all other nodes are connected which form a hierarchy. So
it is also known as hierarchical topology. This topology integrates various star topologies together
in a single bus, so it is known as a Star Bus topology. Tree topology is a very common network
which is similar to a bus and star topology.
Hybrid topology-combines two or more topologies. You can see in the above architecture in such
a manner that the resulting network does not exhibit one of the standard topologies.
For example, as you can see in the above image that in an office in one department, Star and
P2P topology is used. A hybrid topology is always produced when two different basic network
topologies are connected.

Q12. What is an Internet? Explain the privacy and other issues related to Internet and also
write safety measures for the same.
Internet is a global network that connects billions of computers across the world with each other
and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions

tk
of computer users worldwide. It is set up by using cables such as optical fibres and other wireless
and networking technologies. At present, internet is the fastest mean of sending or exchanging
8R
information and data between computers across the world.
Internet is called a network as it creates a network by connecting computers and servers across
the world using routers, switches and telephone lines, and other communication devices and
−2
channels. So, it can be considered a global network of physical cables such as copper telephone
wires, fiber optic cables, tv cables, etc. Furthermore, even wireless connections like 3G, 4G, or
Wi-Fi make use of these cables to access the Internet.
on

Internet privacy-commonly referred to as online privacy, is a subset of data privacy and a


fundamental human right. Basically, it refers to the personal privacy that you’re entitled to when
you display, store, or provide information regarding yourself on the Internet.
tr

Common Internet Privacy Issues


ar

1 Tracking-When you browse the Internet, you may have noticed those pesky ads following you
where you go based on your earlier web searches or visits to websites. Well, that’s because
websites, advertisers, etc. track your movements.
H

2 Surveillance-Some governments spy on their citizens online to supposedly assist law


enforcement agencies. For instance, the UK’s Investigatory Powers Act authorizes mass
surveillance and allows the government to monitor the Internet usage of its citizens legally.
3 Theft-A staggering 49 million Americans were affected by identity theft in 2021, according to
Fortunly. Cybercriminals use malware, spyware, and phishing techniques to break into your online
accounts or devices and steal your personal information to engage in identity theft activities.
4 online habits that impact your privacy-You’ve heard time and time again that online privacy
and security is important, but do you actually do something about it? Most of us practice bad
Internet hygiene and don’t even realize it, so don’t forget to avoid doing the following:
5 Using the Same Credentials for Multiple Accounts-Sure, it’s easy to remember and get
things done online when you use the same credentials across your accounts. But if a
cybercriminal can gain access to your one accounts, they’ll most likely get into the other ones as
well.
6 Staying Logged in to Websites-Not logging out of websites and having them remember your
credentials is indeed convenient. However, it also leaves your online accounts and personal
information vulnerable to anyone who uses or hacks into your device.
7 Using Services without Reading their Terms & Conditions-Never click “agree” until you
understand what you’re getting yourself into. You wouldn’t want to legally grant companies and
service providers access to all kinds of data. Then sell this information to the highest bidder!
8 Opening Suspicious Attachments or Downloading Malicious Files-It would help if you were
careful when opening attachments in emails or social media as they could contain malware and
viruses. Similarly, it always downloads files from trusted sources because it may result in virus
infection.

Q13. Explain LAN, WAN and MAN?


A network allows various computers to communicate with other computers by connecting via a
medium. There are three major types of a computer network-namely WAN, MAN, and LAN-
designed for operating in an area that they cover. In this article, we will discuss the primary
difference between LAN, MAN, and WAN. But before we do that, we will look into each of them
individually.
All three of these are similar yet different in various aspects- the significant difference being their
geographical locations coverage. WAN covers the largest area, MAN comprises more area than
LAN, and LAN only covers a small area
Local Area Network-It is an abbreviation for Local Area Network. It connects various network
devices They use a private addressing scheme- that the TCP/IP protocol defines. The private

tk
addresses of every computer are unique in relation to one another. At every LAN’s boundary, you
will find routers that connect them all to a larger WAN.
8R
Metropolitan Area Network. It covers a smaller area than that of WAN and a larger area as
compared to a LAN. A MAN basically connects two devices (or more) that reside apart but in the
same or different cities. It may also serve as an Internet Service Provider (ISP), and it basically
−2
covers a larger geographical area. Customers who need a better speed and higher-quality
connectivity opt for MAN. They are very hard to maintain and design, and their speeds range in
terms of Megabytes Per Second (Mbps).
on

Wide Area Network. It basically extends over large areas, but it might stay confined within a state
or a country’s boundaries. A connection of various LANs may also constitute a WAN. They may
connect to each other using radio waves and telephone lines. A WAN typically may stay limited
tr

to any enterprise (an organization or a corporation) or may even be accessible to the general
public. It comes with a technology that is very expensive and relatively high-speed.
ar

Q14. Difference Between Physical Layout and Logical Layout of Network?


H

Physical Topology
A Physical topology explains about how network devices are physically connected or how devices
are actually plugged into each other, for example cables, wireless connectivity and more.
It is a diagram which shows the structure of how devices are connected physically inside a
network. It refers to how a network looks and functions.
Types
The types of physical topology are as follows −
• Linear Bus topology − A single wire cable that connects to all network nodes directly.
• Star topology − It is a single access point topology; it means all nodes are connected directly at
one point.
• Tree topology − It is the combination of star and bus topologies. It has multiple access points that
are connected to bus topology while others are connected to their respective access points.
Logical Topology
It tells about a network that should be configured for the transfer of information. This is different
from physical topology as it does not explain the physical wiring of a network, but instead, it
describes the flow of data, information, and back, from one system to another and the routes it
takes.
Some examples of Logical topology are as follows −
• Logical Star Topology − Uses logical bus topology to transfer data among devices.
• Logical Ring Topology − One node is allowed to transfer data in a network at a time. This is
implemented by using a token system so that only one is allowed at a time.
Q15. Write A short note a) on E-Governance b) On Digital Finance Services
E-governance, meaning ‘electronic governance’ is using information and communication
technologies (ICTs) (such as Wide Area Networks, the Internet, and mobile computing) at various
levels of the government and the public sector and beyond, for the purpose of enhancing
governance. “Make all Government services accessible to the common man in his locality,
through common service delivery outlets, and ensure efficiency, transparency, and reliability of
such services at affordable costs to realise the basic needs of the common man”
The application of ICT to transform the efficiency, effectiveness, transparency and accountability
of exchange of information and transaction:
1. between Governments,
2. between Government agencies,
3. between Government and Citizens, and
4. between Government and businesses
Government to Government (G2G)-Information is exchanged within the government i.e., either, between
the central government, state government and local governments or between different branches of the
same government.

tk
Government to Citizen (G2C)-The citizens have a platform through which they can interact with the
government and get access to the variety of public services offered by the Government.
8R
Government to Businesses (G2B)-The businesses are able to interact with the government seamlessly
with respect to the services of the government offered to businesses.
−2
Government to Employees (G2E)-The interaction between the government and its employees occurs in
an efficient and speedy manner.
on

Q16. What is a utility program? List out some of the commonly tasks performed by utility
programs.?
To run any software and work on different programs, on a computer system, one needs the operating
tr

system to work smoothly. Utility programs, as the name suggests not only help in executing various crucial
tasks for the operating system but also help in overall maintenance of the system.
ar

Utility program is a system application that executes a specific task, generally pertaining to optimal
maintenance or operation of the system resources. Operating systems such as Windows, macOS and Linux
H

come with their own set of utility programs to maintain and execute different utility functions such as
formatting, compressing, scanning, exploring and much more.
Functions of Utility Programs?
• System Utilities
• File Management Utilities
• Storage Device Management Utilities
• Miscellaneous Utilities
System Utilities-Some of the system utility programs are memory manager, antivirus and firewall, registry
checker and cleaner, package installer and explorer. Also, with the help of such system utility program in
computer, users can execute functions that are crucial for smooth running of an operating system.
File Management Utilities-File management utilities include tools such as data archivers, software backup
tools, file compression tools and managers. With the help of these, users can manage their data in the
form of files and folders. These utilities help users to sort out, store and categorise files according to the
requirement.
Storage Device Management Utilities-Storage device management utility programs provide solutions for
enhancing disk capacity, such as disk clean-up, partition management, formatting, disk space allocation,
defragmentation, etc. With the help of this system utility software, users can compartmentalize systems
and external drives for efficient management of programs and files that are stored within.
Miscellaneous Utilities-Apart from these three utility program categories, there are various other
programs that help in managing business operations. Some of these programs include data generators,
HTML checkers and hex editors, to name a few.

Q17. Explain the followings- Taskbar, Status bar, ICON, Desktop, File Manager, Recycle
bin and Control Panel?
Taskbar- The Taskbar is a user interface component in the Microsoft Windows operating system that
allows quick access to open apps, files, and system settings. It is typically located at the bottom of the
screen and provides quick access to important features such as the Start menu, the system tray, and the
task manager. To start applications, switch between open applications and access system settings, and
users can use the Taskbar. Additionally, the Taskbar can be altered to fit the user's requirements and
preferences. For example, the size and placement of the icons can be changed, and new icons for
commonly used programs can be added.
Status bar- A horizontal line of information displayed at the bottom or top of an application window. A
status bar is located at the bottom of Internet browser windows and many application windows and
displays the current state of the web page or application being displayed. It reports information about the

tk
current state of the program or the data contents in the window. For example, the status bar in an
Explorer window shows how many files a folder contains and how much disk space they take up. When a
8R
file is highlighted, details about the file are displayed.
ICON- Icon is a small graphical representation of a program or file. When we double-click an icon, the
associated file or program will be opened. For example, if we were to double-click on the My Computer
−2
icon, it would open Windows Explorer. Icons are a component of GUI operating systems, including Apple
macOS X and Microsoft Windows. Icons help users quickly identify the type of file represented by the
icon. (System icon, Desktop Icon, Programme & File Shortcut Icon)
on

Desktop- The desktop is a basic element of a personal computer that represents different types of
objects, including project folders, reference sources, drawing tools, documents, writing tools, phone
tr

books, telephones. It is the primary user interface of a computer that might be found on top of a
physical desk. The desktop display is that the default display and displayed once the startup process is
ar

complete at the time of booting the system. The icons of files and folders that you store to the desktop
are displayed on the desktop, as well as the desktop wallpaper. In Windows operating system, it
H

includes a taskbar located at the base of the display screen.


File Manager- A file manager is an application that helps you manage files and folders on that device
as well as attached disks and even networked storage. File manager applications let you copy, view, edit,
delete, or move files and folders.
• You can Access Start Menu: Select Start, type File Explorer, and select the File Explorer
desktop app.
• Run Command: Select Start, type Run, and select the Run desktop app. In the Run app, type
Explorer and select OK.
• Start Right-Click: Right-click Start and select File Explorer.

Recycle bin- In Windows, the Recycle Bin is a system icon. Folders and files are not permanently erased
when we remove them. Instead, they are relocated to the Recycle Bin from their original position. This
allows us to retrieve files and directories that we may have erased by accident.
In every version of Microsoft Windows since Windows 95, the Recycle Bin is an area where deleted files
or folders are temporarily saved. Users can retrieve files that have been deleted in Windows by using
the Recycle Bin. It’s on my computer’s desktop.
Control Panel- The Control Panel is a component of Microsoft Windows that provides the ability to
view and change system settings. It consists of a set of applets that include adding or removing
hardware and software, controlling user accounts, changing accessibility options, and accessing
networking settings.
Control Panel categories
• Appearance and Personalization • Network and Internet
• Clock, Language, and Region • Programs
• Ease of Access • System and Security
• Hardware and Sound • User Accounts

Q18. Difference Between E-mail and G-mail, Google and Google Chrome
An email is an electronic medium of exchanging and transmitting digital files and messages through the
internet- by using various electronic devices like smartphones, tablets, desktops, laptops, etc. A user can
operate Email across the Internet. Email is a technique used for exchanging digital data over a network of
communication like the Internet. It is a type of electronic communication that contains data in the form of
media files, graphics, texts, and documents.
Gmail is a widely used, most popular email service that Google offers. It is one of the various Email-services
that is web-based that helps a user exchange digital information/messages/files over the Internet. It works

tk
on several platforms like Windows, Androids, etc. Google developed the Gmail platform. It is an Email
client that allows its users to receive and send Emails. It is also free to use and has limited support for data.
8R
Google- Google is a company that was started in 1998. It was created by Larry Page and Sergey Brin. In its
initial days, it was just a search engine. There were already a few search engines back in those days (such as
Altavista). But Google turned out to be the simplest and easiest to use, which made the company popular
−2
really quickly.
Chrome- Google Chrome is a web browser developed by Google. Its first version was launched in 2008.
Back in those days, Chrome could be used only on MS Windows. However, it can now be used on Linux,
on

Mac, Android, and iOS as well. It’s the default inbuilt browser in Android.

Q18. Difference Between RAM and ROM?


tr

The major differences between RAM and ROM are:


ar

RAM ROM
Definition of RAM is Random Access
Definition of ROM is Read-only Memory
H

Memory
Random Access Memory (RAM) is
ROM is cheaper when compared to RAM.
expensive when compared to ROM
The speed of Random-Access Memory The speed of Read-only Memory (ROM) is slower when
(RAM) is higher when compared to ROM compared to RAM.
Random Access Memory (RAM) has a
ROM has a lower capacity compared to RAM
higher capacity when compared to ROM
Data in RAM can be modified, erased, or Data in ROM can only be read, it cannot be modified or
read. erased.
The data stored in RAM is used by the
Central Processing Unit (CPU) to process The data stored in ROM is used to bootstrap the computer.
current instructions
If the Central Processing Unit (CPU) needs to access the data
Data stored on RAM can be accessed by the on ROM, first the data must be transferred to RAM, and then
Central Processing Unit. the Central Processing Unit (CPU) will be able to access the
data.
Data present in Read-Only Memory (ROM) is not volatile, it
Data of RAM is very volatile, it will exist as
is permanent. Data will remain unchanged even when there is
long as there is no interruption in power.
a disruption in the power supply.

Q19. Explain the following-format painter, heading Style, Alignments, Clipboard?


Format Painter- The Format Painter tool is used to copy and paste character and paragraph formats to
existing text. This tool, used in conjunction with styles, can make organizing and reformatting documents
easier and more efficient.
Heading Style- The simplest way to add headings is with heading styles. Using heading styles means you
can also quickly build a table of contents, reorganize your document, and reformat its design without
having to manually change each heading's text.
Alignments- Alignment determines the appearance and orientation of the edges of the paragraph: left-
aligned, right-aligned, centered, or justified text. You can quickly format the paragraphs in your document
to the alignment you want. In your document, select the paragraphs you want to align.
Clipboard- The Clipboard is a holding place on your computer where you can temporarily store data (text,
pictures, and so on). When you copy something, your selection is held on the Clipboard, where it remains
until you copy something else or shut down your computer.
Paste Special- When you copy text that has different formatting into an Office program, the program,

tk
such as PowerPoint or Word, automatically reformats that text to match the text of the destination.
However, you can use Paste Special to maintain the original formatting or paste it as a link or a picture, for
example. 8R
Q19. What is the use of Find and Replace in Ms Word?
−2
Find and Replace helps you to find words or formats in a document and can let you replace all instances of a
word or format. This is particularly handy in long documents. To use Find and Replace, use the shortcut
Ctrl+H or navigate to Editing in the Home tab of the ribbon, then choose Replace.
on

Type what you want to find in the Find what field, and the replacement in the Replace with field. (Note that
you can move the Find and Replace dialog box by clicking the title bar and dragging it elsewhere so you can
tr

see what was behind it.)


ar

Find Next highlights the first occurrence of the Find word. Clicking Find Next again will highlight the
second occurrence, clicking Find Next again will highlight the next occurrence, and so on.
H

Q20. Difference Between page break and section break?


PAGE BREAK
• It simply separates content between pages. A page break starts a new page.
• After the page break, the following text will always start at the beginning of the page.
• Of this type there are three kinds: simple page breaks, column page breaks, and text wrapping page
breaks.
SECTION BREAK
• It splits your document into sections.
• Each section can have its own header/footer formatting.
• Of this type there are four kinds: next page section breaks, continuous section breaks, even page
section breaks, and odd page section breaks.

Q21. Explain following?


Hyperlink- The hyperlink can be text or graphics. By using hyperlinks, you can provide information to your
readers without repeating the same information on different pages. To add links that jump from one part
of a document to another part of the same document, mark the destination and then add a link to it.
Bookmark- A bookmark in Word works like a bookmark you might place in a book: it marks a place that
you want to find again easily. You can enter as many bookmarks as you want in your document or Outlook
message, and you can give each one a unique name so they're easy to identify.
Cross-reference- A cross-reference allows you to link to other parts of the same document. For example,
you might use a cross-reference to link to a chart or graphic that appears elsewhere in the document. The
cross-reference appears as a link that takes the reader to the referenced item.
Comment- Comments can be added to a document that do not change the document. You can insert a
comment inside balloons that will appear in the document margins. They can also be hidden until you want
to edit your paper.
Quick Part- Quick Parts is a Microsoft Word feature that allows you to create a library of content. You can
access Quick Parts at any time and store frequently used text blocks or images, which you can easily insert
into your documents.
WordArt- WordArt is a gallery of text styles that you can add to your publications to create decorative
effects, such as shadowed or mirrored (reflected) text. You can use WordArt to add special text effects to
your document. For example, you can stretch a title, skew text, make text fit a pre-set shape, or apply a
gradient fill.
Object- An object is a combination of data and the application needed to modify that data. You can thus
embed objects in or link them to documents created with a different application. For instance, an Excel
spreadsheet can be embedded within a Microsoft

tk
Header-footer- The header is a section of the document that appears in the top margin, while the footer
is a section of the document that appears in the bottom margin. Headers and footers generally contain
8R
additional information such as page numbers, dates, an author's name, and footnotes, which can help
keep longer documents organized and make them easier to read. Text entered in the header or footer will
appear on each page of the document.
−2
Page Orientation- Word offers two-page orientation options: landscape and portrait. Compare our
example below to see how orientation can affect the appearance and spacing of text and images.
Landscape means the page is oriented horizontally. Portrait means the page is oriented vertically.
on

Margin- A margin is the empty space between a document's contents and the edges of the page. Word's
default margins are 1 inch on each side of the page, but you can change the margins to accommodate the
needs of your document.
tr

Mark entry- Mark Entry is used to mark entries of some word in the whole or some part of document,
which later is used to build Index by the Office word, like we see at the end of reference books. Mark
ar

Citation is used to mark entries of references, which are later in the document displayed as Bibliography
Mark citation- Mark Entry is used to mark entries of some word in the whole or some part of document,
H

which later is used to build Index by the Office word, like we see at the end of reference books. Mark
Citation is used to mark entries of references, which are later in the document displayed as Bibliography.
Both of these tools are very use full when you are writing a huge report or thesis and need Indexing and
Bibliography done by Office Word.
Q22. Write the step to send a mail to multiple employees through mail merge?
Mail Merge is most often used to print or email form letters to multiple recipients. Using Mail
Merge, you can easily customize form letters for individual recipients. Mail merge is also used to create
envelopes or labels in bulk.
This feature works the same in all modern versions of Microsoft Word: 2010, 2013, and 2016.
1. In a blank Microsoft Word document, click on the Mailings tab, and in the Start Mail Merge group,
click Start Mail Merge.
2. Click Step-by-Step Mail Merge Wizard.
3. Select your document type. In this demo we will select Letters. Click Next: Starting document.
4. Select the starting document. In this demo we will use the current (blank) document. Select Use the
current document and then click Next: Select recipients.
o Note that selecting Start from existing document (which we are not doing in this demo)
changes the view and gives you the option to choose your document. After you choose it, the
Mail Merge Wizard reverts to Use the current document.
5. Select recipients. In this demo we will create a new list, so select Type a new list and then click
Create.
o Create a list by adding data in the New Address List dialog box and clicking OK.
o Save the list.
o Note that now that a list has been created, the Mail Merge Wizard reverts to Use an existing
list and you have the option to edit the recipient list.
o Selecting Edit recipient list opens up the Mail Merge Recipients dialog box, where you can
edit the list and select or unselect records. Click OK to accept the list as is.
o Click Next: Write your letter.
6. Write the letter and add custom fields.
o Click Address block to add the recipients' addresses at the top of the document.
o In the Insert Address Block dialog box, check or uncheck boxes and select options on the left
until the address appears the way you want it to.
o Note that you can use Match Fields to correct any problems. Clicking Match Fields opens up
the Match Fields dialog box, in which you can associate the fields from your list with the fields
required by the wizard.
7. Press Enter on your keyboard and click Greeting line... to enter a greeting.
8. In the Insert Greeting Line dialog box, choose the greeting line format by clicking the drop-down
arrows and selecting the options of your choice, and then click OK.
9. Note that the address block and greeting line are surrounded by chevrons (« »). Write a short letter and
click Next: Preview your letters.

tk
o Preview your letter and click Next: Complete the merge.
o Click Print to print your letters or edit individual letters to further personalize some or all of the
letters. 8R
Q23. Explain the following? A) Track Changing B) Compare Document C) Restrict editing.
−2
A) Track Changing
On the Review tab, select Track Changes.
o When Track Changes is on, the section is highlighted. Deletions are marked with a
on

strikethrough, and additions are marked with an underline. Different authors' changes are
indicated with different colors.
o When Track Changes is off, the section is not highlighted. Word stops marking changes, but
the colored underlines and strikethroughs are still in the document.
tr

B) Compare Document
ar

To compare documents in Word, first open the two documents to compare in Microsoft Word.
Then click the “Review” tab in the Ribbon. Then click the “Compare” drop-down button in the
“Compare” button group. Then select the “Compare…” command from the button’s drop-down
H

menu to open the “Compare Documents” dialog box.


C) Restrict editing.
If you don't want content reviewers to accidentally modify your document, you can make the
document read only before sending it for review. Another method is to restrict formatting and
editing. Making your document a read-only file means that the document can be read or copied
but not modified. If one of the reviewers tries to make changes to a read-only file, the changes
can be saved only by giving the document a new name or saved to a new location.
Q24. Explain the following- A) Read Mode B) Web Layout C) Outline D) Draft
A) Read Mode- If you're reading a document, not writing or major editing, click or tap View >
Read Mode to hide the writing tools and menus and to leave more room for the pages themselves.
Read Mode automatically fits the page layout to your device, using columns and larger font sizes,
both of which you can adjust.
B) Web Layout- Web Layout view is designed to allow you to easily see how your documents will
look if used in an online environment. There is not much more to say about this viewing mode; it
is provided for those who intend on publishing their Word documents online.
C) Outline- When you're working with a long document, the Outline view helps you arrange your
text. It creates an outline based on the styles you use, so it's easy to see and organize all your
headings and subheadings.
Click the View tab. Click the Outline button in the Views group.
The Outline view breaks the document down so that each heading and paragraph is represented by
a single line. Any text formatted with a Heading style will automatically be set at the specified
outline level, but you can adjust a line’s outline level manually using the tools on the Outlining tab
that appears in Outline view.
D) Draft- Draft mode was used to show the user what the print job would look like (while saving
some ink/toner) before printing the final copy. The print quality or draft mode was configured
through the printer properties menu. Today, many word processors include a draft mode that
removes a document's formatting
Q25. What is Data Consolidation in Excel?
Excel can automatically summarize or consolidate information from multiple worksheets into a single,
master worksheet using the Consolidate feature. For example, if you have sales data for multiple sales
agents on different worksheets, Excel can total them for you on another worksheet.
Excel can consolidate information in a couple different ways: by position or by category.
• Consolidate by position: Used when data in all the worksheets is arranged in exactly the same order
and location.
• Consolidate by category: Used when the worksheets have the same row and column labels, but the
rows and columns aren’t arranged in the same order on all the worksheets. Excel uses the labels to
match the data. You’ll have to make sure the label spelling and capitalization are identical on each of the

tk
worksheets you want to consolidate by category.
Q26. Explain any five functions of MS Excel?
8R
MS Excel is a commonly used Microsoft Office application. It is a spreadsheet program which is used to
save and analyse numerical data. A function in Excel is a preset formula, that helps perform mathematical,
statistical and logical operations. Once you are familiar with the function you want to use, all you have to
−2
do is enter an equal sign (=) in the cell, followed by the name of the function and the cell range it applies
to.
AutoSum; LOOKUP function; IF function;
on

VLOOKUP function; HLOOKUP function; MATCH function;


CHOOSE function; DATE function; DAYS function;
FIND & FINDB functions; Max, Min function
tr

INDEX function;
ar

Q27. Explain the following….


Paste Special- Do you know apart from only copy and pasting the whole content with formatting in
H

Excel, we can paste a certain attribute such as Value only, Column Width, Formula only, formatting or
comment in Excel.
Paste specials give you an opportunity to choose what we want to paste in cells. When standard copy/paste
do not give appropriate results, Excel’s Paste special give a wide range of options in which we choose
specials elements and mathematical elements.
For Example, if we do any calculation in to the cells and wanted to paste only it’s value in the same cell
or somewhere in another sheet or we want to paste only the column width or paste only comments or
wants to transpose the data or we can create a link between cells or between the sheets etc.
Merge & Centre- Excel has a unique button called “Merge & Center,” which is used to merge two or
more different cells. When data is inserted into any merged cells, it is in the center position; thus, the
name “Merge & Center.” On re-clicking on the button, it unmerges the cells. The value in the cell merged
is located on the initial first cell in the worksheet.
Conditional formatting- Conditional formatting makes it easy to highlight certain values or make
particular cells easy to identify. This changes the appearance of a cell range based on a condition (or
criteria). You can use conditional formatting to highlight cells that contain values which meet a certain
condition.
Pivotable-You can use a PivotTable to summarize, analyse, explore, and present summary data. Pivot
Charts complement PivotTables by adding visualizations to the summary data in a PivotTable, and allow
you to easily see comparisons, patterns, and trends. Both PivotTables and Pivot Charts enable you to make
informed decisions about critical data in your enterprise. You can also connect to external data sources
such as SQL
Print Area & Print title- On the worksheet, select the cells that you want to define as the print area.
Tip: To set multiple print areas, hold down the Ctrl key and click the areas you want to print. Each print
area prints on its own page. On the Page Layout tab, in the Page Setup group, click Print Area, and then
click Set Print Area.
If you want to print a sheet that will have many printed pages, you can set options to print the sheet's
headings or titles on every page.
Name Manager-On the Formulas tab, in the Defined Names group, click Name Manager. In the Name
Manager dialog box, double-click the name you want to edit, or, click the name that you want to change,
and then click Edit. In the Edit Name dialog box, in the Name box, type the new name for the reference.
Watch Window-Watch Window in Excel is used to watch for the changes in the formulas we use while
working with a large amount of data and formulas. They are available from the “Formulas” tab in the
“Formula Auditing” section. When we click on the “Watch Window,” a wizard box appears. It allows us
to select the cell for which the values need to be monitored or watched.
Advanced Filter- You can use the Advanced Filter to create more powerful filters, such as filtering for
unique records and using operators such as OR. Tea is in the Product name column twice. To filter so that
tea displays only once, on the DATA tab, click Advanced. In the Advanced Filter dialog box, click the
List range.
Data Validation- Data validation means checking the accuracy and quality of source data before using,

tk
importing or otherwise processing data. Different types of validation can be performed depending on
destination constraints or objectives. Data validation is a form of data cleansing.
What if Analysis- What-If Analysis is the process of changing the values in cells to see how those changes
8R
will affect the outcome of formulas on the worksheet. Three kinds of What-If Analysis tools come with
Excel: Scenarios, Goal Seek, and Data Tables. Scenarios and Data tables take sets of input values and
determine possible results.
−2
Subtotal- The SUBTOTAL Function [1]in Excel allows users to create groups and then perform various
other Excel functions such as SUM, COUNT, AVERAGE, PRODUCT, MAX, etc. Thus, the SUBTOTAL
function in Excel helps in analysing the data provided
on

Thesaurus- Using the thesaurus, you can look up synonyms (different words with the same meaning) and
antonyms (words with the opposite meaning).
Page Break Preview- It breaks and shows you the data to be printed on a single and each page to the end
tr

of your data. Excel page break splits the data based on multiple settings like page margin, scale, the size
of the page, etc. Page Break view shows the dotted lines to see where the data gets split to the next page.
ar

Custom View- You can use a custom view to save specific display settings (such as hidden rows and
columns, cell selections, filter settings, and window settings) and print settings (such as page settings,
H

margins, headers and footers, and sheet settings) for a worksheet so that you can quickly apply these
settings to that worksheet.
Freeze Pane- To keep an area of a worksheet visible while you scroll to another area of the worksheet,
go to the View tab, where you can Freeze Panes to lock specific rows and columns in place, or you can
Split panes to create separate windows of the same worksheet.
Q28. Explain any five functions of developer tab in Excel?
Developer Tab in Excel is used to access functions and tools to create the macros. If the Developer tab
is unavailable in the menu bar, enable the File menu Option. Add the Developer tab from recommended
commands to the Customized commands list from the Customize Ribbon tab. Once we do that, we can
see the Developer menu tab in the Menu bar, which mainly has Visual Basic, Macros, Add-Ins, and
Controls. We can use Visual Basic to write a macro code.
The developer tab in Excel helps create a macro, import and export XML files, or insert a form or active
controls. The developer tab in Excel will not be visible unless you activate it from the options menu. To
start the Developer tab in Excel.
Q29. Difference Between Action and Hyperlink in PowerPoint?
Hyperlink-By utilizing hyperlinks, users can quickly access specific content without having to
continuously scroll or search for it. As for action buttons, they provide an attractive call-to-action option
which can be used to quickly direct users to the desired page or action Finally, Professional PowerPoint
Design can be greatly enhanced by making use of hyperlinks and action buttons. Hyperlinks help users
quickly access the exact information they need.
Action Button-An action button is an object on a slide that performs an action when clicked or pointed
to, such as jumping to another slide or playing a sound. Action buttons are most commonly used for self-
running presentations—for example, presentations that are presented at a booth or kiosk
Q30. Explain any five views of PowerPoint?
1. PowerPoint Normal view: This is the view that your presentation opens up in as soon as you create a
new presentation. The advantage of this view is that in this view, editing the slides is very easy. Adding
pictures, formatting data, adding tables and graphs, etc., are some other tasks that are available in this
view. Basically, all operations are very accessible in this view.
2. PowerPoint Outline view: This view shows the outline of each slide in the left pane.
The outline of each slide contains the slide title along with the content in the slide. In this view, one can
see the overview of the content in every slide in the presentation.
3. PowerPoint Slide sorter view: To have a look at all slides in one window, the best view option is slide
sorter. The advantage of this view is that the user can sort (as the name suggests) the slides and rearrange
them as required. We can delete the slides with ease in this view.
4. PowerPoint Notes Page view: In this view, each slide is presented as a part of a page that also contains
the slides notes at the bottom. The advantage of this view is that the user can see the slide content as well
as the slide notes for each slide. This view can also be imported as a document for the user’s reference.

tk
5. PowerPoint Reading View: In the reading view, the user can see each slide as it would be presented to
the audience. This view allows the user to preview their slideshow.
8R
6. PowerPoint Slide Show View: It automatically switches to full screen mode and you can no longer edit
the presentation.
Q31. What is the use of Photo Album in PowerPoint?
−2
Slideshows are great for more than just business-related presentations. You can use Microsoft
PowerPoint to create a photo album and add music or visual effects for a memorable show. For personal
presentations of special occasions like weddings and anniversaries or even slideshows for
on

organizations where the main focus is pictures, let’s look at how to create a photo album in PowerPoint.
A PowerPoint photo album is a presentation that you can create to display your personal or business
photographs. You can either download PowerPoint Photo Album Templates from Office.com, or you
tr

can create your own


ar

Q32. Difference Between Transition and Animation?


Animation in Digital Presentation Transition in Digital Presentation
H

It refers to the movement of presentation elements The typical movements that occur when you
like text, images, charts, and more along either slide navigate from one slide to the next in a slide show
direction. are known as transitions.
Animations give the appearance of movement or A Transition effect causes a change from one slide to
continuous change. the next.
Use animation to provide feedback, highlight a
connection, draw attention to a change, or visually It adds to the presentation’s appeal.
delineate a task.
The visual impact that occurs when you shift from
It can also be used to predict how an activity will
one slide to the next during a presentation is known
turn out.
as transition.

Q33. Explain -Rehearse timing & Custom slide Show?


Rehearse timing- You can rehearse your presentation to make sure that it fits within a certain time frame.
While you rehearse, use the Slide Timing feature to record the time that you need to present each slide,
and then use the recorded times to advance the slides automatically when you give your presentation to
your actual audience.
Custom Slide Show- You might think of it as a playlist. PowerPoint calls this a custom show. When you
create a custom show in PowerPoint, you can adapt a presentation for different audiences. Use a custom
show to present only certain slides from your presentation, or to create a hyperlink to a group of slides in
your presentation.
Q34. Explain- Cascade Window and Split window in Power Point?
Cascade Windows: Cascades all open presentations so that they overlap. Move Split: Moves the splitters
that separate each section of the presentation window.
New Window: Opens a new window containing a view of the current presentation. Arrange All: Tiles all
open presentations side- by-side in the program window.
Q35. Difference Between MS Outlook and Other Mail Program (Gmail, yahoo, etc.)?
Outlook vs. Gmail at a glance
There's a better way to tame your inbox
Automate your inbox
• Outlook: Best for Office 365 users who prefer enhanced organization and want as much free storage
as possible.
• Gmail: Best for Google Workspace users looking for advanced spam protection and a simple
interface.
Outlook Gmail
Outlook integrates with Microsoft Office Gmail integrates with Google Workspace;
Integrations
365; limited number of add-ins available thousands of add-ons available

tk
Intuitive, modern look with ads nicely tucked
Free plan has a cluttered interface with
away under separate tabs; Smart Compose
Interface and distracting ads; easy to send emails, but
ease of use the search feature makes it difficult to
find past emails in the inbox
8R
makes it easy to craft emails, while the search
feature makes it easy to find past emails in the
inbox
−2
15 GB of free storage shared across Gmail,
Storage 15 GB of free storage for Outlook
Google Drive, and Google Photos
Two-factor authentication, encryption, Two-factor authentication, encryption, robust
on

Security spam filters, safe links, confidential spam filters, safe browsing, confidential mode,
mode, and more and more
Uses Folders and
tr

Organization Uses Labels to organize inbox


Categories to organize inbox
ar

Q36. What are the main functions performed by the CPU? Explain in brief.
The CPU, or central processing unit, is both the heart and brains of every computer. Many of us do
H

not know how important this unit is to the performance of a computer.


The four primary functions of a processor are fetch, decode, execute and write back. Fetch- is the
operation which receives instructions from program memory from a systems RAM. Execute- is
where the operation is performed. Each part of the CPU that is needed is activated to carry out the
instructions.
The Four Primary Functions of the CPU
The CPU processes instructions it receives in the process of decoding data. In processing this data,
the CPU performs four basic steps:
1. Fetch: Each instruction is stored in memory and has its own address. The processor takes this
address number from the program counter, which is responsible for tracking which instructions the
CPU should execute next.
2. Decode: All programs to be executed are translated into assembly instructions. Assembly code must
be decoded into binary instructions, which are understandable to your CPU. This step is called
decoding.
3. Execute: While executing instructions, the CPU can do one of three things: Do calculations with its
ALU, move data from one memory location to another, or jump to a different address.
4. Store: The CPU must give feedback after executing an instruction, and the output data is written to
the memory.
Q37. What Define the following- Protocol?
b. URL- A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the
Internet. It is also referred to as a web address. A URL is nothing more than the address of a given
unique resource on the Web. In theory, each valid URL points to a unique resource.
c. Telnet- Telnet is a network protocol used to virtually access a computer and to provide a two-way,
collaborative and text-based communication channel between two machines. It follows a user
command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol for creating
remote sessions.
d. www- The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public
websites or pages that users can access on their local computers and other devices through the
internet. These pages and documents are interconnected by means of hyperlinks that users click on for
information.
e. HTTP- HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text,
images, sound, video and other multimedia files -- over the web. As soon as a user opens their web
browser, they are indirectly using HTTP.
f. IP Address- What is an IP address (Internet Protocol address)? An Internet Protocol (IP) address is a
unique numerical identifier for every device or network that connects to the internet. Typically
assigned by an internet service provider (ISP), an IP address is an online device address used for
communicating across the internet.

tk
Q38.Explain the following-
a. Multiprogramming-is a form of parallel processing in which several programs run at the same
8R
time on a uniprocessor system. However, because there is only one processor, there is no true
simultaneous execution of different programs.
b. Multiprocessing-is the utilization of two or more central processing units (CPUs) in a single
−2
computer system. Its definition can vary depending on the context, but generally it refers to a
system's ability to support multiple CPUs and its capacity to distribute work among them.
c. Multithreading- Multiprocessing uses two or more CPUs to increase computing power, whereas
on

multithreading uses a single process with multiple code segments to increase computing power.
Multithreading focuses on generating computing threads from a single process, whereas
tr

multiprocessing increases computing power by adding CPUs.

Q39.What is the Master slide? How it is different from other slide?


ar

A slide master is the top slide in a hierarchy of slides that stores information about the theme and
slide layouts of a presentation, including the background, color, fonts, effects, placeholder sizes, and
H

positioning. To create a master slide: On the View tab, click Slide Master.
To view a Slide Master, click View at the top of PowerPoint and then click the Slide Master icon.
Once in the Slide Master view, you can edit the Slide Master by clicking the top slide and choosing
the theme, font, color, or other settings for the presentation. If there are any slides you do not want in
your presentation, highlight the slide and press delete.

Q40.Explain the Difference between-


a) Application software and System software- System software is used for operating computer
hardware. Application software is used by user to perform specific task. 2. System software’s are
installed on the computer when operating system is installed. Application software’s are installed
according to user's requirements.
b) Primary Memory and Secondary Memory- Primary memory is the main memory of the
computer which can be directly accessed by the central processing unit, whereas secondary memory
refers to the external storage device which can be used to store data or information permanently
3. Binary number system, Convert 11011111001 to its equivalent decimal number
The binary number system, also called the base-2 number system, is a method of representing
numbers that counts by using combinations of only two numerals: zero (0) and one (1). Computers
use the binary number system to manipulate and store all of their data including numbers, words,
videos, graphics, and music.
Q41. What is primary key?
A primary key is a field or set of fields with values that are unique throughout a table. Values of the
key can be used to refer
to entire records, because each record has a different value for the key
Q42. What is the use of anchor tag in HTML? Explain with the help of suitable example?
An anchor tag is an HTML tag. It is used to define the beginning and end of a hypertext link. Search
engines use the tag to
determine the subject matter of the destination URL. Users click on the anchor text to reach the link
target.

tk
8R
−2
on
tr
ar
H

You might also like