Computer Book
Computer Book
com
1. AI – Artificial intelligence
m
2. ALGOL – Algorithmic Language
co
3. ARP – Address resolution Protocol
e.
5. ASCII – American Standard Code for Information Interchange
7.
8.
AAC - Advanced Audio Coding
m
ATA – Advanced Technology Attachment ABR – Average Bit rate
ro
9. AMOLED – Active-Matrix Organic Light-Emitting Diode
ch
m
25. BMP – Bitmap
co
27. BBP – Base band Processor
e.
29. BGP - Border Gateway Protocol
30.
31.
BIPS - Billion Instruction Per Second
45. COMPUTER- Common Operating Machine Purposely Used for Technological and Educational
Research.
m
47. CNM- Circulatory Network Mode
co
49. DBMS – Data Base Management System
e.
51. DPI – Dots Per Inch
53.
m
DVD – Digital Video Disc/Digital Versatile Disc
ro
54. DVDR – Digital Versatile Disc Recordable
m
71. FAX - Far Away Xerox/ facsimile
co
73. FDD - Floppy Disk Drive
e.
75. FS - File System
76.
77.
FTP - File Transfer Protocol
82. Gb - Gigabit
83. GB - Gigabyte
w
m
95. INTEL - Integrated Electronics
co
97. IC- Integrated Circuit
e.
99. IMAP- Internet Message Access Protocol
100.
101.
IVR- Interactive Voice Response
m
ICANN - Internet Corporation of Assign Names & Numbers
ro
102. ISDN - Integrated Servers Digital Network
105. Kb - Kilobit
.jk
106. KB - Kilobyte
112. Mb – Megabit
113. MB – Megabyte
m
119. MIDI - Musical Instrument Digital Interface
co
121. Mbps- megabits per second
e.
123. MODEM- Modulator Demodulator
124.
125.
NAT - Network Address Translation
m
143. PCB -Printer Circuit Board
co
145. PHP- Hypertext Preprocessor
e.
147. ROM -Read Only Memory
148.
149. m
RDBMS – Relational Data Base Management System
m
167. UPS – Uninterrupted Power Supply
co
169. URL – Uniform Resource Locator
e.
171. ULSI - Ultra Large Scale Integration
172.
173.
UNIVAC - Universal Automatic Computer
m
UMTS - Universal Mobile Telecommunication System.
ro
174. UDP -User Datagram Protocol
m
191. WMV - Windows Media Video
co
193. XHTML – eXtensible Hypertext Markup Language
e.
195. ZB – ZettaByte
m
ro
ch
.jk
w
w
w
m
co
e.
m
ro
ch
.jk
w
w
w
11 www.jkchrome.com www.jkchrome.com www.jkchrome.com
was on. He wanted a character that would not, under any conceivable circumstances, be found in
the user’s name. He looked down at the keyboard and chose the @ sign among various
punctuation marks available on his Model 33 teletype keyboard, without an idea that he was
creating an icon for the internet world. A general format for an e-mail address is:
username@computer_name. The part before the @ sign is the local part of the address, the user
name of the recipient, and the part after the @ sign is the domain part which is a host computer
name.
The `@’ symbol indicates that the user can be reached on the Internet by giving the email
address(also called the User’s Uniform Resource Locator (URL)).
m
In 1973, the Transmission Control Protocol/Internet Protocol (TCP/IP) was designed and
in 1983 it became the standard for communicating between computers over the Internet.
In 1976, US Presidential candidate Jimmy Carter and running mate Walter Mondale used
email to plan campaign events. In the same year, Queen Elizabeth sent her first email,
co
becoming the first state leader to do so. In 1982, the term “Internet” was used for the first
time.
Files on Internet
e.
The internet is a collection of a large number of client-server based systems. So all files and other
resources on it are stored on secondary storage devices of the respective servers. Servers of
m
websites are termed as web servers. When we type in a URL of a website in the address bar of
browser, it makes a connection to that web server which in turn fetches the data from the
secondary storage device (such as the hard disk) that they must be using and returns it to the
respective browser. The same holds true for any other resource (image, MP3 file, zipped file, etc.)
ro
that you access on the internet.
Common methods of Internet access in homes include dial-up, landline broadband (over coaxial
ch
cable, fiber optic or copper wires), Wi-Fi, satellite and 3G/4G technology cell phones. Public places to
use the Internet include libraries and Internet cafes, where computers with Internet connections are
available. There are also Internet access points in many public places such as airport halls and coffee
shops, in some cases just for brief use while standing. Various terms are used, such as “public Internet
.jk
kiosk”, “public access terminal”, and “Web payphone”. Many hotels now also have public terminals,
though these are usually fee-based. These terminals are widely accessed for various usage like ticket
booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and
therefore can do so to the Internet itself. (wiki)
w
Buffering in internet
w
Buffering is a situation which occurs when a streaming media player is saving portions of a
streaming media file to local storage for playback. Most streaming media players buffer a small
percentage of a streaming media presentation before beginning to play it. Buffering also may
w
occur in the middle of a presentation when available bandwidth does not match the presentation’s
required bandwidth.
A search engine does not search the entire Internet, but databases of Web pages. When a designer
contacts a search engine for the addition of his website in the database, a program called Spider
visits the site, reads the pages, indexes the contents and follows links to move on. Search engines
like Google use algorithms to find pages with matter relevant to the keywords entered by the user.
12 www.jkchrome.com www.jkchrome.com www.jkchrome.com
If the title or headings of the page contain the keywords, then it gets higher preference. Google
also uses a patented algorithm called PageRank system that ranks a website based on how many
sites have links to it and their ranks as well.
A network has 5 basic components viz. clients, servers, channels, interface devices and operating
systems.
A brief intro:
m
1. Servers: Servers or Host computers are are powerful computers that store data or
applications and connect to resources that are shared by the users of a network.
2. Clients: Client is the computer used by the users of the network to access the servers and
co
shared resources (such as hard disks and printers). So, a personal computer is a client.
3. Channels: The technical name of channels is network circuit. It is the pathway over which
information travels between the different computers (clients and servers) that comprise
the network.
4. Interface devices: The devices that connect clients and servers (and sometimes other
e.
networks) to the channel are called interface devices. The common examples are modems
and network interface cards.
5. Operating systems: This is the Network Software. It serves purpose that the operating
m
system serves in a stand-alone computer.
Channel Dimensions
ro
There are a number of varieties of the types, speeds and capabilities of network channels. These
may be Transmission medium such as wireless or wire line, Transmission rate or bandwidth,
Transmission directional capability and the Type of the Signal.
ch
Transmission medium is the physical medium of the channel, which can be either wire
line or wireless. The wire line is called the guided media or line based media. The wire
line are of several kinds such as twisted pair wire, coaxial cable and fiber optic cable. The
.jk
wireless media there is no physical wire along which information travels and the
information is transmitted without wires from one transmission station to the next.
Common examples are radio, mobile networks, microwave and satellite.
Transmission rate or bandwidth shows how fast information can be transmitted over
w
that information can be transmitted only in one direction, Half-duplex means that
information can be transmitted in both directions, but only in one direction at a time. Full-
duplex means that Information can be transmitted in both directions simultaneously.
w
Signal type can be analog and digital. Analog signals are ‘continuous’ (they take on a wide
range of values) and digital signals are ‘discrete’, and binary (take on only two values). So,
Digital signals are more suitable for computer networks because, computers represent all
information in binary.
Network Protocols
A protocol is more like a language that can be shared by many people. If all the people would like
to use the same language, the protocol becomes a standard. The same is applicable with networks.
13 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Most networks have one feature in common that they transmit information by breaking the
original information into a set of messages (called packets), transmitting these packets
sequentially, and then reassembling these packets back into the original information.
Each packet is a string of bits. But these packets sometimes have to travel a long way, over a
bunch of different networks, there are typically lots of computers sending and receiving
information over the same network, and the information getting sent can often get altered during
transmission (this is called a transmission error). In order to make sure that the original
information gets transmitted correctly, to the right place, computer networks use a set of rules,
called networking protocols.
m
Thus, a data communication protocol is a set of rules that must be followed for two electronic
devices to communicate with each other. These rules cover:
co
Syntax: Data format and coding
Semantics: Control information and error handling
Timing: Special matching and sequence
e.
1. Network layer tasks
2. Data-link layer tasks
m
The rules associated with each category are called network layer protocols and data-link layer
protocols. Network-layer protocols
ro
Network-layer protocols are also known as Layer-3 protocols. These rules specify how a network
does the following three tasks:
ch
1. Packetizing: breaking up the information into packets, and reassembling the packets at
the receiving end.
2. Addressing: Determining which computer and network the packets are headed to.
3. Routing: Determining the best way for the packets to get to where they are headed.
.jk
The Data-link layer protocols are also known as Layer-2 protocols. These rules specify how a
network does the following three tasks:
w
3. Channel access: Controlling when a particular client or server accesses the channel.
Ethernet is the most common example of Layer-2 protocol. The token ring protocol, developed by
IBM is another example. The networks that we connect to from home using a telephone line
typically use one of two data link protocols: SLIP or PPP.
The facilities on most LANs are very powerful. Most organizations do not wish to have small
isolated islands of computing facilities confined to the buildings. They want to extend facilities
over a wider area so that groups can work without having to be located together. Two or more
LANs can be connected with specialized devices called Routers and bridges. Bridge connects LANs
of the same type but, router is a more intelligent component that can interconnect many different
types of computer network. Then, we can have Backbone Networks, which are high-bandwidth
channels that typically connect LANs with each other, and are often referred to as backbones.
Local Area Networks (LANs) is confined to a fairly small geographic area. The clients and servers
m
on a LAN are connected to the same channel, and are typically in the same building or in
neighboring buildings. The Metropolitan Area Networks (MANs) spans a wider area than LAN and
Wide Area Networks (WANs) spread over a large geographic area, such as a country or a state.
co
How does a firewall work?
e.
the LAN’s gateway to the Internet. The firewall keeps track of every file entering or leaving the
local area network in order to detect the source of viruses and other problems that might enter
the network.
Computer Networking began at the same time as computers themselves. In 1940 George
Stibitz and Samuel Williams, at AT&T’s Bell Laboratories, developed their Complex
Number Generator, one of the earliest digital computers and then, they made it possible
for users to operate the computer remotely from teletype machines on three different
w
floors in their Manhattan building. They also developed a system to allow users to
communicate with the machine even more remotely, via telex machines. This was the
beginning of the Networking era.
w
In 1964, Drs John Kemeny and Tom Kurtz of Dartmouth College in New Hampshire
developed not only the simplified BASIC programming language (Beginners All-purpose
Symbolic Instruction Code) but also a system called time sharing, which allowed many
w
students to use a single computer at what seemed like the same time, from a large number
of teleprinter terminals spread around the campus and elsewhere.
However, networking is said to have started in 1976, when researchers Dr Robert
Metcalfe and Dr David Boggs of the Xerox Palo Alto Research Center (PARC) presented
details of a Local Computer Networking System which allowed data to be transferred
between a number of computers and printers, at 2.94Mb/s (megabits per second), which
was considered to be a very high speed. They dubbed the new networking system
Ethernet.
15 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Xerox Corporation was granted a patent for Ethernet in 1977. Then in 1979 Xerox
teamed up with Digital Equipment Corporation and Intel to define the first official
standard specification for Ethernet. This Ethernet Version 1.0 was capable of transferring
data at 10Mb/s over fairly thick (10mm diameter) 50W coaxial cable. It was called Thick
Ethernet’ or ’10Base5′. The meaning of 10Base5 is that it allowed a 10Mb/s data rate, it
used baseband transmission rather than a modulated high-frequency carrier, and would
give reliable data communication over cable lengths up to 500 meters.
A few years later, the 802.3 working group of the IEEE (Institution of Electrical and
Electronics Engineers) released its first industry standard for Ethernet, giving it the name
IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access
Method and Physical Layer Specifications. This was the refined version of DEC-Intel-Xerox
m
Thick Ethernet.
In 1985, the IEEE working group came out with ‘thin’ Ethernet, also known as
‘cheapernet’ or 10Base2′. This specified the use of thinner (5mm diameter) 50W coaxial
cable, which still allowed 10 Mb/s baseband transmissions as before, but with a maximum
co
cable length of 185 meters.
It was followed by IEEE 802.3i or 10BaseT’Ethernet standard, released in 1990. 10BaseT
opened the door to much cheaper networking because it allowed 10 Mb/s transmissions
over the low cost 100W unshielded twisted-pair or ‘UTP’ Category 3 cabling which had by
e.
then become widely used for telephone wiring in buildings.
In 1995 IEEE working group released the 802.3u standard. This became known as
‘100BaseT’ or ‘Fast Ethernet, which had 10 times the speed of 10BaseT.
In 1997 came IEEE 802.3x, which defined full duplex or simultaneous two-way data
m
communication over either 10BaseT or 100BaseT. Before this development, Ethernet
allowed only half duplex or ‘one way at a time’ communication .
In 1998 and 1999, the IEEE working group released four different implementations of the
ro
802.3z ‘Gigabit Ethernet’ standard, achieving 1Gb/s transmission or another 10-times
increase in data transfer rates.
Please note that out of above, 10BaseT and 100BaseT, turn out to be very suitable and
cost-effective for both home and small office networking and are widely used today.
ch
Linux is an open source operating system developed by Linus Torvalds as a version of UNIX that
.jk
could run on a home computer. Linux is considered to be a faster, safer operating system. He
patented Linux in 1991, and then made the system and its code available to others, free of charge,
over the Internet. He licensed the system in such a way that anyone can copy and use it, but any
improved versions a user creates must be made available to others under the same term, so this
w
was under the GNU GPL. This was more than enough to make the computer programmers from all
over the world to flock and make additions and advance.
w
Application software
w
m
Programming languages use in linux Operating system
co
PHP — scripting language suited for the websites
e.
WordPress — blog software
MediaWiki — wiki server software, the software that runs Wikipedia
Joomla – a website software
MongoDB — document-oriented, non-relational database
Drupal — content management system
m
Moodle — course management system or virtual learning environment
The DOS and Windows are the proprietary software of Microsoft. Then, we have thousands of
Open source software (OSS). The OSS has its underlying’sourcecode’ made available under a
license, so that the developers and users are allowed to adapt and improve it. Most popular
licensing system is GNU General Public License (GNU GPl, or GPL). Under GNU GPL, the licensees
.jk
may not ‘close’ versions. The licensee may modify copy and redistribute anyderivative version,
under the same GPl license. The licensee can either charge a fee for this service or work free of
charge. Please note that Open source doesn’t just mean access to the source code. The distribution
terms of open-source software must comply with the following criteria:
w
1. Free Redistribution: No restriction on any party from selling or giving away the software
as a component of an aggregate software distribution containing programs from several
w
different sources.
2. Source Code: The program must include source code, and must allow distribution in
source code as well as compiled form.
w
3. Derived Works: The license must allow modifications and derived works, and must allow
them to be distributed under the same terms as the license of the original software.
4. Integrity of The Author’s Source Code: The license may restrict source-code from being
distributed in modified form only if the license allows the distribution of “patch files” with
the source code for the purpose of modifying the program at build time. The license must
explicitly permit distribution of software built from modified source code. The license
may require derived works to carry a different name or version number from the original
software.
17 www.jkchrome.com www.jkchrome.com www.jkchrome.com
5. No Discrimination Against Persons or Groups: The license must not discriminate against
any person or group of persons.
6. No Discrimination Against Fields of Endeavor: The license must not restrict anyone from
making use of the program in a specific field of endeavor. For example, it may not restrict
the program from being used in a business, or from being used for genetic research.
7. Distribution of License: The rights attached to the program must apply to all to whom the
program is redistributed without the need for execution of an additional license by those
parties.
8. License Must Not Be Specific to a Product: The rights attached to the program must not
depend on the program’s being part of a particular software distribution.
9. License Must Not Restrict Other Software: The license must not place restrictions on other
m
software that is distributed along with the licensed software.
10. License Must Be Technology-Neutral: No provision of the license may be predicated on
any individual technology or style of interface.
co
DOS and WINDOWS
DOS stands for disk operating system. The most prevalent from of DOS was manufactured by
Microsoft. The last version of DOS to be marketed separately was 6.22 and was used in
e.
conjunction with windows 3.11 windows 95 includes DOS. The main difference between windows
and DOS is the ability to “multitask” or use two or more programs or data files simultaneously. In
these programmes we have directories or folders that work like a filling cabinet. They help keep
m
our hard disk organized by keeping system files together or program files together and separate
from data files. Some types of files include executable or from data files. Some types of files
include executable or program files (file names end in .exe) dynamic link libraries (.dll) which are
called upon by programs to do routines, and initialization files (.ini) which are used by certain
ro
programs to store startup settings.
The earliest avtar of Microsoft Windows was Interface Manager, which was being developed in
ch
September 1981. The first ever version of Windows operating system was announced on
November 10, 1983. It was an extension of MS DOS, and sported a graphic user interface.
Windows 1.0 was finally released into market in November, 1985.
Software
.jk
The computer programme which contains the instructions to make the hardware work are called
software. There are two primary software categories viz. Operating Systems or System Software
and Application Software.
w
Operating System handles the essential task such as maintaining file system and coordination of
w
data and memory with CPU, external devices and output devices. Operating System is needed to
give a platform for the applications to run. Thus, we can say that Operating Systems would control
the execution of instructions in the CPU of the computer, but it is the applications that perform
w
specific tasks of interest to end users. For example Windows is an operating system and Microsoft
Word is an application.
Then we have network software, which enable groups of computers to communicate, and
language software which provides programmers with the tools they need to write programs. They
are neither system nor application software but have the elements of both of them. Then we have
Proprietary software, sharewares and freeware. The Proprietary software is the so-called
packaged software which are developed and sold primarily online or offline via computer shops.
The freeware and public-domain software are made available without cost. The sharewares are
18 www.jkchrome.com www.jkchrome.com www.jkchrome.com
also freeware but carries a small fee for those who wish to use it. Shareware may be proprietary
software that is provided to users without payment on a trial basis and is often limited by any
combination of functionality, availability, or convenience.
Software testing is to test a software or software code to find bugs and errors. There are basically
of two types: alpha testing and beta testing. The first is done at the developer end, while the
second is at the user end. A beta tester is the customer itself and notes down defects and reports
them to the developer. The user/ customer is called a ‘beta tester’ because he is the second one to
carry out the testing. The term is derived from the fact that beta comes after alpha in the Greek
m
alphabet.
co
Ada Lovelace wrote a rudimentary programme for the analytical machine designed by Charles
Babbage in 1827, but the machine never became operational. In 1949, the language short code
appeared. It was the first computer language for electronic devices and required the programmer
to change its statements into 0s and 1s by hand.
e.
Working of Touchscreen Monitors
m
In Touchscreen Monitors, we can use our finger on the computer screen to navigate through the
contents. This type of screens is most commonly visible in Public Information Kiosks and ATMs.
The touch screen has 3 main components as follows:
ro
A Touch sensor: It’s a textured coating across the glass face. This coating is sensitive to
pressure and registers the location of the user’s finger when it touches the screen.
A controller: It is a small PC card that connects the touch sensor to the PC. It takes
ch
information from the touch sensor and translates it into information that PC can
understand.
A Software driver: Software Driver is a software update for the PC system that allows the
touchscreen and computer to work together. It tells the computer’s operating system how
.jk
to interpret the touch event information that is sent from the controller.
Please note that the touch screen monitor is an input device and it needs to be combined with a
display and a PC to make a complete touch input system.
w
1. Resistive : The resistive system consists of a normal glass panel that is covered with a
conductive and a resistive metallic layer. These layers are held apart by spacers, and a
scratch-resistant layer is placed on top of the whole set up. An electrical current runs
w
through the two layers while the monitor is operational. When a user touches the screen,
the two layers make contact in that spot. The change in electrical field is noted and
coordinates of the point of contact are calculated. Once the coordinates are known, a
special driver translates the touch into something that the operating system can
understand, much as a computer mouse driver translates a mouse’s movements into a
click or drag.
2. Capacitive: In the capacitive system, a layer that stores electrical charge is placed on the
glass panel of the monitor. When a user touches the monitor with his or her finger, some
of the charge is transferred to the user, so the charge on the capacitive layer decreases.
19 www.jkchrome.com www.jkchrome.com www.jkchrome.com
This decrease is measured in circuits located at each corner of the monitor. The computer
calculates, from the relative differences in charge at each corner, exactly where the touch
event took place and then relays that information to the touch screen driver software. One
advantage of the capacitive system is that it transmits almost 90 per cent of the light from
the monitor, whereas the resistive system only transmits about 75 per cent. This gives the
capacitive system a much clearer picture than the resistive system.
3. Surface acoustic wave: The surface acoustic wave system uses two transducers (one
receiving and one sending) placed along the x and y axes of the monitor’s glass plate. Also
placed on the glass are reflectors — they reflect an electrical signal sent from one
transducer to the other. The receiving transducer is able to tell if the wave has been
disturbed by a touch event at any instant, and can locate it accordingly. The wave setup
m
has no metallic layers on the screen, allowing for 100-percent light throughput and
perfect image clarity. This makes the surface acoustic wave system best for displaying
detailed graphics (both other systems have significant degradation in clarity).
co
Another area in which the systems differ is which stimuli will register as a touch event. A resistive
system registers a touch as long as the two layers make contact, which means that it doesn’t
matter if you touch it with your finger or a rubber ball. A capacitive system, on the other hand,
must have a conductive input, usually your finger, in order to register a touch. The surface
e.
acoustic wave system works much like the resistive system, allowing a touch with almost any
object — except hard and small objects like a pen tip.
Monitor
m
Monitor or visual display unit is the most common output device of a computer. It comprises a
ro
display device, circuitry, and an enclosure. The display device in modern monitors is typically a
thin film transistor liquid crystal display (TFT-LCD) thin panel, while older monitors use a
cathode ray tube about as deep as the screen size. The primitive monitors used the Cathode Ray
ch
A cable connects the monitor to a video adapter (video card) that is installed in an expansion slot
on the computer’s motherboard. This system converts signals into text and pictures and displays
them on Monitor. The computer sends a single to the video adapter, telling it what character,
.jk
image, or graphic to display. The video adapter converts that signal to a set of instructions that tell
the display device (monitor) how to the image on the screen.
Cathode Ray Tube (CRT) was invented by German physicist Karl Ferdinand Braun in 1897. It is
the device that was long used in most computer displays, video monitors, televisions radar
w
displays and oscilloscopes. The CRT has undergone numerous development until the advent of
plasma screens, LCD , TVs, DLP, OLED displays, and other technologies. Technically, CRT has an
electronic vacuum tube employing a focused beam of electrons.
Pixels
That most common type of graphics monitors employing a cathode ray tube are the raster-scan
display based on television technology. In such a system, the Electron beam is swept across the
screen, one row at a time from top to bottom. As this beam moves across each row, the beam
intensity is turned on and off. This would create a pattern of illuminated spots.
20 www.jkchrome.com www.jkchrome.com www.jkchrome.com
There is a memory area called refresh buffer or frame buffer where the picture definition is
stored. This memory area holds the set of intensity values for all the screen points. These stored
intensity values are then retrieved from the refresh buffer and “painted” on the screen one row
(scan line) at a time. Such each screen point is referred to as a ‘pixel’ or pel (shortened forms of
picture elements). The capability of a raster-scan system to store intensity information for each
pixel makes it well suited for the realistic display of scenes containing subtle shading and colour
patterns.
m
Liquid Crystal Display television (LCD TV) is television that uses LCD technology for its visual
output. The technology used is generally TFT. TFT refers to a Thin Film Transistor, which is a
special kind of field effect transistor made by depositing thin films for the metallic contacts,
semiconductor active layer, and dielectric layer. The channel region of a TFT is a thin film that is
co
deposited onto a substrate (often glass, since the primary application of TFT is in liquid crystal
displays).
LCD panels are made of two layers of transparent material, which are polarized, and are “glued”
e.
together. One of the layers is coated with a special polymer that holds the individual liquid
crystals. Current is then passed through individual crystals, which allow the crystals to pass or
block light to create images. LCD crystals do not produce their own light, so an external light
m
source, such as florescent bulb is needed for the image created by the LCD to become visible to the
viewer. Thus, LCDs use a strong backlight as the light source and control how much of this
light is allowed to reach the pixels by selectively allowing the light to reach each pixel. LCDs
achieve this by taking advantage of a key property of ‘twisted’ liquid crystal molecules, which have
ro
the ability to naturally block polarized light but then let it through by degrees when a small
electric field is applied. LCD cells are accurately controlled and arranged in a flat matrix of rows
and columns.
ch
We have read above that LCD crystals do not produce their own light, so an external light source,
.jk
such as florescent bulb is needed for the image created by the LCD to become visible to the viewer.
The Plasma television technology is absolutely different from this. The Plasma Display Panel is
based loosely on the fluorescent light bulb. The display itself consists of very microscopic cells and
within each cell two glass panels are separated by a narrow gap in which neon-xenon gas is
injected and sealed in plasma form. Gas is electrically charged at specific intervals and then strikes
w
red, green, and blue phosphors, thus creating a television image. Each group of red, green, and
blue phosphors is called a pixel (picture element).
w
Due to presence of its own source of light, PDP suffers from the issues such as heat generation
and screen-burn of static images.
w
Screensavers are designed to prevent phosphor burn-in on CRT and plasma computer monitors
by blanking the screen or filling it with moving images or patterns when the computer is not in
use are programs that display images when the computer is idle for a specified time. In early CRT
monitors when the same image would be displayed for a long time, the phosphors used to make
the pixels in the display glow at a constant rate for so long a period that they would discolor the
glass surface of the CRT.
21 www.jkchrome.com www.jkchrome.com www.jkchrome.com
But now, the advances in display technology and energy-saver monitors have solved this problem.
So now we use screensavers for entertainment or security and they are perceived as works of art
and used to prevent others from viewing confidential data when the user is away.
Thus, we note that Plasma display panel (PDP) is an emissive flat panel display where visible light
is created by phosphors exited by a plasma discharge between two flat panels of glass. The gas
discharge contains no mercury (contrary to the backlights of an active matrix LCD), an
insert mixture of noble gases (neon and xenon) is used instead.
m
A dead pixel is a defective pixel that remains unlit on an LCD screen, monitor, camera, charge-
coupled device or CMOS sensor. A permanently lit pixel is a hot pixel, and a pixel that stays on a
solid colour is a stuck pixel. Dead pixels can also occur in clusters and these are particularly
co
annoying and in most cases these can be sent back to the manufacturer. The majority of dead
pixels are only noticeable on a solid colour background, for example through the use of the “Dead
Pixel Checkers” which consist of four-five solid-colour images.
EFT monitors
e.
All types of monitors are a strain on our eyes. EFT, or Eye Fresh Technology, monitors have a vital
coating on the rear that emits anions and far-infrared rays that serve to make the environment
m
fresh and ease the strain on the eyes and relax the eyes and body
Blu-ray Disc Association (BOA). Blu-ray Disc association is a group of world’s leading consumer
electronics, personal computer and media companies. The format also has support from all
Hollywood studios and countless smaller studios as a successor to today’s Digital Visual Disk
format. It was initially launched as “Blu-ray Disc founder group” in 2002 by MIT and nine leading
.jk
electronic companies: Sony, Panasonic, Pioneer, Philips, Thomson, LG Electronics, Hitachi, Sharp,
and Samsung.
We have studied above that Digital Visual Disk uses 650 nm (red) wavelength laser diode light as
opposed to 780 nm for Compact Disk (infra red). Blu-ray Disc uses a wavelength of 405 nm, that is
w
coming in the violet (blue) region of electromagnetic spectrum and that is why this term is used J
Blu Ray disc was developed for the following purposes:
w
So, the Blu Ray Disk offers more than five times the storage capacity of traditional Digital Visual
Disk’s and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. The benefit of
using a blue violet laser (405nm) is that it has a shorter wavelength than a red laser (650nm),
which makes it possible to focus the laser spot with even greater precision, leading to the packing
of data more tightly and stored in less space. The dimension of the Blu Ray disc is same as that of a
22 www.jkchrome.com www.jkchrome.com www.jkchrome.com
But the HD Digital Visual Disk was also developed as an answer to the Blu ray Discs. This would
also succeed the normal Digital Visual Disk. The HD Digital Visual Disk as well as Blu Ray Disc
have a single-layer capacity of 15 GB and a dual-layer capacity of 30 GB, while the the HD Digital
Visual Disk-Random Access Memory has a single-layer capacity of 20 GB and a dual-layer capacity
of 40 GB. The data layer of HD Digital Visual Disk is 0.6 mm below the surface physically
protecting the data layer from damage.
m
Digital Video Disc or Digital Versatile Disc (DVD) is also an optical storage device that looks the
same as a compact disc but is able to hold about 15 times as much information and transfer it to
the computer about 20 times as fast as a CDROM. The CD and DVD have the same dimensions.
co
DVDs come in two formats: the DVD-Video and the DVD-ROM (DVD Read Only Memory) format.
The DVD-Video format is used for home movie entertainment through a DVD player.
e.
Please note that DVD uses 650 nm (red) wavelength laser diode light as opposed to 780 nm for CD
(infra red). This permits a smaller pit to be etched on the media surface compared to CDs (0.74
m
µm for DVD versus 1.6 µm for CD), allowing in part for DVD’s increased storage capacity. Further,
the Blu-ray Disc, the successor to the DVD format, uses a wavelength of 405 nm, and one dual-
layer disc has a 50 GB storage capacity. So basically, it is the laser optics that matters in storage
ro
capacities of various kinds of Discs.
Compact Disc (CD) is made of several layers of a type of plastic usually Polycarbonates. The outer
layers are protection layers, which simply absorb scratches so that the inner layer holding data
remains intact. The inner data layer has small tracks which spiral out from the centre of the disc
towards the ends. These tracks ate such tightly wound that the entire length of the track if
.jk
Data is written to the CD-ROM by burning microscopic pits into the reflective surface of the disk
with a powerful laser. These spiral tracks have flat reflective areas and non-reflective bumps. A
w
flat reflective area represents a binary 1, while a non-reflective bump represents a binary 0. The
data is stored in a spiral pattern that originates from the centre of the disc and spirals out toward
the outer edge.
w
Data is read from a CD-ROM with a low power laser contained in the drive that reflects infrared
light off of the reflective surface of the disk and back to a photo detector. The pits in the reflective
w
layer of the disk scatter light, while the land portions of the disk reflect the laser light to the photo
detector. The photo detector then converts these light and dark spots to electrical impulses
corresponding bits. Electronics and software interpret this data and accurately access the
information contained on the CD-ROM. A standard 74 min. CD contains 333,000 blocks and each
block is 2,352 bytes.
Thus, with proper devices and software, one can record and read the data from a CD ROM. It’s
worth note that CDROM is manufactured with an organic dye layer that is permanently changes by
23 www.jkchrome.com www.jkchrome.com www.jkchrome.com
the laser of the recorder in a pattern that represents the bits and bytes of the data. These are
called Write once discs. On the other hand, CD-RW (CD-read/write) are discs, which can be erased
and re-recorded with data.
Please note that underside of the CD-ROM disk is coated with a very thin layer of aluminum that
reflects light
The hard disk is an internal storage device which holds programs and data used by a computer. It
consists of magnetic platters with read/write heads that float above the platters to record and
m
play back data. In many respects, it is similar to a phonograph turntable. It is susceptible to strong
jarring, which could cause the heads to physically damage the disk. The disk is enclosing in an
airtight casing to keep it dust-free. HDD is a is a non-volatile, random access digital data storage
co
device, which was first introduced by IBM in 1956.
The Microsoft Operating Systems allow a drive letter assignment such as C Drive, D Drive, E Drive
etc. . This is the process of assigning alphabetical identifiers to physical or logical disk drives or
partitions (drive volumes) in the root file system namespace.
e.
Why there is no B drive?
m
It’s not that computers don’t have B drives. We should be aware that the primitive personal
computers didn’t have hard discs. They were equipped with two floppy drives called drives A and
B. Later, a hard disk was introduced and was labeled as the C drive. Other drives like the CD drive,
ro
DVD drive, flash drive and others were labeled D, E, F,G, H etc.
The basic question here arrives that how does computer write information to the hard disk.
Please note that unlike a cassette, a computer writes information to the hard disk in a sequential
ch
manner. This means that one file’s a data may be scattered around the disk. When files are
deleted, or even edited, blank spaces may appear around the disk.
Yes. We use usually two kinds of Hard Disks today. IDE (Integrated Drive Electronics) and SCSI
(Small Computer System Interface) hard drives. The IDE drives are used in PCs and SCSI in
servers. Motherboards usually come with two embedded IDE ports. Each port can have two
w
devices connected to it on the same data cable for a total of four devices. CD and DVD units are
also connected to the IDE ports and counted as one of those four devices. Once we have four
devices, then we can add a PCI IDE controller to have more ports to add devices. SCSI hard drives
w
are connected to a PCI SCSI controller that will be able to accept seven devices for standard SCSI
and 15 for the newer, wide SCSI.
w
The area within a computer system where data can be left on a longer term basis while it is not
needed for processing is called “Data storage” . The mass storage devices include the diskettes,
Hard Drives, Optical Disks and Magnetic Tapes. Diskette is a small, removable, flexible plastic disk
covered with a thin layer of a magnetisable substance, onto which digital data can be recorded and
stored. They are called Floppy Disks and now they are outdated. The Hard Drive is the storage
area within the computer itself, where gigabytes of space are available to store bits of information.
24 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Then, we have the Optical Disks, which is a storage device that uses reflecting surfaces and laser
technology to read and write data on a disk, so also known as Laser Disk. CD-ROM’s are the most
popular type of optical storage. CD-ROM stands for Compact Disc Read Only Memory. A computer
CD-ROM disk, like its audio counterpart, contains data that has been stamped on the disk surface
as a series of pits. To read the data on a CD-ROM an optical read head distinguishes the patterns of
pits that represent bytes. CD-ROM disks provide tremendous storage capacity. CD-ROMs usually
come with data already written onto them. These days most applications software is provided on
CD-ROM.
Computer Mouse
m
A mouse is a handheld device for moving the pointer around the screen. It is a primary component
of the windows GUI (Graphical User Interface) environment. The use of the mouse in windows
allows the user to point at and clicks on various icons for programs and data files rather than
having to type in commands to copy files, open programs, etc. as in the older DOS.
co
Mouse is invention of Douglas Carl Engelbart. Douglas Carl Engelbart is an American inventor
and early computer pioneer and internet pioneer, best known for inventing the Computer Mouse.
e.
Apart from the mouse, his team also developed the hypertext, networked computers, and
precursors to GUIs.
m
A typical Mouse consists of two buttons, each of which functions differently in windows. A single
click of the left button on an icon selects the item, a double click (clicking twice in rapid
succession) button will open a pop-up menu offering choices relative to the item clicked. The
ro
primitive mouse did not contain the roller. Now the intelliMouse includes a roller between the two
buttons for easy scrolling up and down, specially while visiting websites. The early mouse
contained the touchpad’s, large and small trackballs, and graphics tablets.
ch
Here we should note that almost all functions that we do with a mouse can be replaced with
keyboard commands. The keyboard equivalents are visible in the menus in most programmes.
The standard microcomputer keyboard consists of 104 keys arranged in the standard typewriter
or QWERTY layout. A separate numeric keypad is at the right side of the keyboard and can be
toggled on or off by pressing the “num lock” key. This numeric keypad may not be found in small
w
QWERTY comes from the first six letters in the top row. It was invented by C L Sholes in 1872.
w
Here we can note that the primary device for the PC is a keyboard and mouse, while all Game
console systems come with game pads used to control movement within the game. Technically, a
computer game can be thought of as one composed of a computer-controlled virtual universe. A
video game is a computer game where a video display is the primary feedback, which is displayed
on a television screen. It is the console system that takes advantage of the plug-and-play feature
— there is no need to install the software or get different graphic cards, faster processors or CPU
chips.
25 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Flash Memory
Flash memory is a form of non-volatile computer memory that can be electrically erased and
reprogrammed. Flash memory applications include digital audio players, digital cameras and
mobile phones. Flash memory is also used is USB flash drives (Thumb drives, handy drive), which
are used for general storage and transfer of data between computers. It has also gained some
popularity in the gaming market, where it is often of EEPROM or battery-powered SRAM for game
save data.
m
Synchronous dynamic random access memory (SDRAM) is DRAM that is synchronized with the
system bus. DRAM has an asynchronous interface, which means that it responds as quickly as
possible to changes in control inputs. SDRAM has a synchronous interface, meaning that it waits
co
for a clock signal before responding to control inputs and is therefore synchronized with the
computer’s system bus. The clock is used to drive an internal finite state machine that pipelines
incoming instructions. This allows the chip to have a more complex pattern of operation than an
asynchronous DRAM, enabling higher speeds.
e.
Double data rate (DDR) SDRAM was a later development of SDRAM, used in PC memory beginning
in 2000. DDR2 SDRAM was originally seen as a minor enhancement (Based upon the industry
standard single-core CPU) on DDR SDRAM that mainly afforded higher clock speeds and
m
somewhat deeper pipelining. However, with the introduction and rapid acceptance of the multi-
core CPU in 2006, it is generally expected in the industry that DDR2 will revolutionize the existing
physical DDR-SDRAM standard. Further, with the development and anticipated introduction of
DDR3 in 2007, it is anticipated DDR3 will rapidly replace the more limited DDR and Newer DDR2.
ro
SRAM v/s DRAM v/s VRAM
ch
Dynamic Random Access Memory (DRAM) is a type of random access memory that stores each bit
of data in a separate capacitor within an integrated circuit. Since real capacitors leak charge, the
information eventually fades unless the capacitor charge is refreshed periodically. Because of this
refresh requirement, it is a dynamic memory as opposed to SRAM and other static memory. Its
.jk
advantage over SRAM is its structural simplicity; only one transistor and a capacitor are required
per bit, compared to six transistors in SRAM.
This allows DRAM to reach very high density. Since DRAM loses its data when the power supply is
w
removed, it is in the class of volatile memory devices. VRAM is a dual-ported version of DRAM
formerly used in graphics adaptors. It is now almost obsolete, having been superseded by SDRAM
and SGRAM. VRAM has two paths (or ports) to its memory array that can be used simultaneously.
w
RAM is also volatile, losing the stored information in an event of power loss, and quite expensive.
ROM is not volatile, but is not suited to storage of large quantities of data because it is expensive
to produce. Primary Storage is also known as internal memory. It is the computer memory that is
accessible to the CPU of a computer without the use of computer’s input/output channels. Primary
storage is used to store that is likely to be in active use. Primary storage is typically very fast, as in
the case of RAM. But, ROM must also be completely erased before it not impossible. Therefore,
separate secondary storage, or external memory, is usually required for long-term persistent
storage. Primary storage may include several types of storage, such as main storage, cache
memory, and special registers, all of which can be directly accessed randomly, that is, accessing
26 www.jkchrome.com www.jkchrome.com www.jkchrome.com
any location in storage at any moment takes the same amount of time.
Read-only memory (ROM) is a class of storage media used in computers and other electronic
devices. It’s easily cannot be written to, its main use lie in the distribution of software. Some ROMs
can be erased and re-programmed multiple times, although they are still referred to as ” read
only” because the reprogramming process involves relatively infrequent, complete erasure and
reprogramming, not the frequent, bit-or word at a time updating that is possible with RAM.
Random access memory (RAM) is a type of data store used in computers that allows the stored
m
data to be accessed in any order-that is, at random, not just in sequence. Generally RAM in a
computer is considered main memory or primary storage; the working area and data. This type of
RAM is usually in the form of integrated circuits (ICs). These are commonly called memory sticks
co
or RAM sticks because they are manufactured as small circuit boards with plastic packaging
personal computers have slots for adding and replacing memory sticks. Most RAM can be both
written to and read from, so “RAM” can both written to and read from, so “RAM” is often used
interchangeably with “read-write memory”. In this sense , RAM is he “opposite” of ROM, but in a
more true sense, of sequential access.
e.
PROM, FPROM and ROM
m
A programmable read-only memory (PROM) or field programmable read-only memory
(FPROM) is a form of digital memory where the setting of each bit is locked by a fuse or
antifuse. Such PROMs are used to store programs permanently. They are most commonly
ro
seen in computer games or such products as electronic dictionaries, where PROMs for
different languages can be substituted. Common PROM comes with all bites reading as 1.
Burning a fuse during programming causes its bit to read as 0. The memory can be
programmed just once after manufacturing by “blowing” the fuses (using a PROM blower),
ch
RAM is an acronym for random access memory, a type of computer memory that can be
accessed randomly. that is, any byte of memory can be accessed without touching the preceding
bytes.A Computer Memory refers to the temporary internal storage areas within a computer. The
w
term memory is usually used as shorthand for ‘physical memory’, which refers to the actual chips
capable of holding data. Some computers also use ‘virtual memory’, which expands physical
memory onto a hard drive.
w
The main type of memory and the most familiar to users is random access memory (RAM).
Random Access Memory is the same as main memory. A computer can both write data into
Random Access Memory and read data from Random Access Memory.
Any time we turn on a computer, a set of operating instructions is copied from the hard disk into
Random Access Memory. These instructions, which help control basic computer functions, remain
in RAM until the computer is turned off. Most Random Access Memory is volatile, which means
that it requires a steady flow of electricity to maintain its contents. As soon as the power is turned
27 www.jkchrome.com www.jkchrome.com www.jkchrome.com
off, whatever data was in RAM disappears. The contents of RAM are necessary for the computer to
process data. The results of the processing are kept temporarily in RAM until they are needed
again or until they are saved onto the hard disk or other storage device.
Storage capacity of Random Access Memory is measured in megabytes (MB) and Giga Bytes (GBs).
A 64 MB Random Access Memory means that it can hold 64 million bytes of data (a standard A4
page of text typically holds about 2,048 bytes or characters of text). Other types of memory
include.
m
The term byte initially meant the smallest addressable unit of memory. In the past, 5-,6-,7-,8-, and
9-bit bytes have all been individual bits (bit-addressed machine) or that could only address 16-or
32-bit quantities (bit-addressed machine).The term byte was usually not used at all in connection
co
with bit- and word-addressed machines. However, term octet always refers to an 8-bit quantity.
Today, it mostly used in the field of computer networking, where computers with different bytes
widths might have to communicate.
A nibble is a four-bit aggregation, or half an octet. As a nibble contains 4 bits, there are sixteen
e.
(24) possible values, so a nibble corresponds to a single hexadecimal digit (thus, it is often
referred to as a “hex digit” or “hexit”
This means that the number 10010111 is 8 bits long. Thus Bit is used as a variable or computed
quantity that can have only two possible values. These two values are often interpreted as binary
ch
digits and are usually denoted by the Arabic numerical digits 0 and 1. Binary digits are almost
always used as the basic unit of information storage and communication in digital computing and
digital information theory. The bit is also a unit of measurement, the information capacity of one
binary digit.
.jk
There are several units of information which are defined as multiples of bits, such as byte (8
bits), kilobit (either 1000 or 210 = 1024 bits).
w
A kilobyte is a unit of information or computer storage equal to either 1024 or 100 bytes. It
commonly abbreviate as Kb, KB or Kbyte. The term “kilobyte” was first used to refer to a value of
1024 bytes (210), because the binary nature of digital computers lends itself to quantities that are
w
powers of two, and 210 is roughly one thousand. This misuse of the SI prefixes spread from the
slang of computer professionals into the mainstream lexicon, creating much confusion, between
the Kilo and Kilobyte.
w
A megabyte is a unit of information or computer storage equal to approximately one million bytes.
It is commonly abbreviated MB. Mb is used for megabits. A gigabyte (derived from the SI prefix
giga)is a unit of information or computer storage equal to one billion (that is, a thousand
million)bytes.
1,073,741,824 bytes, equal to 10243, or 230 bytes. This is the definition used for computer
memory sizes, and most often used in computer engineering, computer science, and most aspects
28 www.jkchrome.com www.jkchrome.com www.jkchrome.com
of computer operating systems. The IEC recommends that this unit should instead be called a
gibibyte (abbreviated GiB), as it conflicts with SI units for bus speeds and the lik
m
Metal Oxide Transmitter Circuits. CMOS memory draws very little current (Nano-amps).
Values stored in it can be maintained for very a long period of time while the computer is
off with a rechargeable lithium battery. The CMOS memory is used to store system
configuration information, such as disk drive parameters, memory configuration and
co
setup program.
CMOS memory is used by the basic input output system (BIOS), a program permanently
stored in the flash memory as disk drive parameters, memory configuration, and the date-
time, some of which we enter in the CMOs setup program. CMOS setup is part of the BIOS
e.
program.
The CMOS memory is usually located with the real-time clock in the motherhood chipset
or in a separate real-time clock chip. It is located in the chipset on most recent
motherboards. m
What is difference between Cold Boot and Warm Boot?
ro
We actually perform a Cold Boot every time we turn on the power switch of our computer. To
“boot” the computer means to start it up and reset the memory and BIOS. Sometimes, the
programme running hangs and we press the ctrl-alt-delete keys simultaneously. This is called
ch
Warm Boot. So, when a computer stops responding because of memory problems or the “blue
screen of death” appears, we need to do a warm boot. The latest operating system Windows 7
responds with task manager when we press the ctrl-alt-delete keys simultaneously. We can
choose the not responding programmes to close and continue. However, if the warm boot fails to
restart the computer, we need to resort to a cold boot by shutting off the power switch, waiting
.jk
BIOS refers to basic input/output system (BIOS). BIOS software is built into the PC, and
is the first code run by a PC when powered on, and that is why it is called boot firmware.
w
while it goes through a self-check of the system components. If we want to change any of
the setup options, such as setting a password for the system, changing the sequence for
booting up the computer., or reconfiguring any other hardware, we need to press the F2
or any other key recommended by the hardware provider to access the keyBIOS settings.
The BIOS includes very basic information about the hardware to get the computer started
before the operating system software takes over. Once the operating system takes over,
more detailed information about the hardware is loaded into the computer’s RAM and
windows starts up.
29 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Thus, primary function of the BIOS is to set up the hardware and load and start an
operating system. When the PC starts up, the first job for the BIOS is to initialize and
identify system devices such as the video display card, keyboard and mouse, hard disk
drive, optical disc drive and other hardware. The BIOS then locates software held on a
peripheral device (‘boot device’), such as a hard disk or a CD/DVD, and loads and executes
that software, giving it control of the PC. This process is known as booting. Booting is
synonymous with a booting up, which is short for bootstrapping.
Computer Port
A hardware computer port is a physical interface between a computer and other computers or
m
devices. A software computer port is a virtual data connection between computer programs
possibly through a computer network.
co
The Hardware ports come in different sizes such as round, rectangular, square, trapezoidal etc.
They can be serial ports or parallel ports. The difference between them is in sending and receiving
bits. Serial ports send and receive one bit at a time via a single wire pair (Ground and +/-) Parallel
ports send multiple bits at the same time over several sets of wires. A parallel port is also referred
to as the printer port since that is usually the device that plugs into it. Many other peripherals
e.
have been created to use the parallel port including external CD-ROM drives and ZIP drives. While
plugging these devices into the parallel port makes them extremely easy to set up.
m
A COM Port stands for communications port and is also referred to as a serial port. Most intial
computers have at least four COM ports internally which modems or other internal peripherals se.
every computer has at least one and usually two external COM ports for physically attaching
external peripheral devices, such as external modems, scanners, and digital cameras.
ro
USB stands for universal serial Bus and is a common component on new computers. The port
looks like a flat slot and there are usually two of them together. More than 120 devices in new
ch
computer peripherals (digital cameras, scanners, speakers) come with USB adapters that allow
the user to plug the unit into the computer and use it immediately without having to install
expansion cards inside the computer and make manual adjustments to the computer settings.
These are also called Plug-and-play ports. They are such that once they are in used; the connected
.jk
devices start handshaking automatically. USB Ports are typical examples of the plug-and-play. For
Example, in a USB port, you can plug a USB Drive, USB Mouse, USB Keyboard etc. and the devices
are detected automatically.
w
A motherboard is the major, underlying circuit board of a computer. The CPU, RAM and
w
various disk or optical drives are all plugged into interfaces on it. A video interface and
sound card can also be built-in or added, and additional connections are used by
peripherals and various devices.
w
The Central Processing Unit is housed in the motherboard, which connections that allow
the various components to communicate with each other. The motherboard must have a
socket for at least one Central Processing Unit chip, and sockets for typically 2 or 4
memory “sticks”. The back panel has plugs for keyboard, mouse, Universal Serial Bus
(USB), Ethernet, and external disks. Motherboards have integrated video and audio. It also
has many slots and connectors
The motherboard is the main circuit board of the computer and as such acts as the
“circulation system” of the computer. All signals used by the computer are processed by
30 www.jkchrome.com www.jkchrome.com www.jkchrome.com
the motherboard. Memory chips, the central processor, expansion boards and cables to
disk drives all attach to the motherboard.
A motherboard is very much like a city with many apartments, hotels etc. each using
power from a common electrical system. Multiple lane highways of various widths
transport data between the buildings. Thus, a motherboard is the data and power
infrastructure for the entire computer. It’s a Printed Circuit Board (PCB) that contains and
controls the components that are responsible for processing data. The major components
of a motherboard include the Central Processing Unit (CPU), memory and basic
controllers for the system.
m
A general purpose computer has four main sections: the arithmetic and logic unit (ALU), the
control unit, the memory, and the input and output devices (collectively termed I/O). These parts
are interconnected by busses, often made of groups of wires. The control unit, ALU, registers, and
co
basic I/O (and often other hardware closely linked with these) is collectively known as a Central
Processing Unit (CPU).
Primitive CPUs were comprised of many separate components but since the mid-1970s CPUs have
e.
typically been constructed on a single integrated circuit called a microprocessor. CPU plays a role
analogous to the brain in the computer.
m
The CPU can be a single chip or a series of chips that perform arithmetic and logical calculations
and that time and control the operations of the other elements of the system. It was the
contribution of the miniaturization and integration techniques that made possible the
development of the microprocessor. A Microprocessor is a CPU chip that incorporates additional
ro
circuitry and memory. Typical CPU chips and microprocessors are composed of four functional
sections:
ch
1. Arithmetic/logic unit (ALU): gives the chip its calculating ability and permits
arithmetical and logical operations
2. Registers: The registers are temporary storage areas that hold data, keep track of
instructions and hold the location and results of these operations.
.jk
3. Control section: The control section times and regulates the operations of the entire
computer system; its instruction decoder reads the patterns of data in a designated
register and tmnslates the pattern into an activity, such as adding or comparing; and its
interrupt unit indicates the order in which individual operations use the CPU and
regulates the amount of CPU time that each operation may consume.
w
4. An internal bus: It’s a network of communication lines that connect the internal elements
of the processor and also leads to external connectors that link the processor to the other
elements of the computer system.
w
1. Control bus consisting of a line that senses input signals and another line that generates
control signals from within the CPU
2. Address bus that is one-way line from the processor that handles the localion of data in
memory addresses
3. Database, which is a two-way transfer line that both reads data from memory and writes
new data into memory.
Development of multi-core processors is one of the latest trends in the computer industry,
because single core processors rapidly reach the physical limits of possible complexity and speed.
A multi-core microprocessor is one that combines two or more independent processors into a
single package, generally in a single integrated circuit (lC). A Dual Core is device that contains two
independent microprocessors and a Quad-core device contains four microprocessors. Multi-core
processor has enhanced performance, reduced power consumption, and more efficient
simultaneous processing of multiple tasks.
CPU Cache
A CPU cache is a cache used by the central processing unit of a computer to reduce the average
m
time to access memory. The cache is a smaller, faster memory which stores copies of the data from
the most frequently used main memory locations. As long as most memory accesses are to cached
memory locations, the average latency of memory accesses will be closer to the cache latency than
to the latency of main memory.
co
Parts of a Computer
e.
1. It responds to a specific set of instructions in a well-defined manner.
2. It can execute and prerecorded list of instructions.
m
All general-purpose computers need the following hardware components.
ro
Memory: Memory enables the computers to store, at least temporarily, data and
programs.
Mass storage device: Allows a computer to permanently retain large amounts of data.
Common classic mass storage devices include disk drives and tape drives. The latest being
ch
are of several types now a days and a printer, or other device that lets us see what the
computer has accomplished.
Central processing unit (CPU): This can be called the heart or brain of the computer
which actually executes the instructions.
w
However, they can be divided into several categories on the basis of cost and performance. We can
classify the computers by their size and powers, though there is considerable overlap. On this
w
To work on a computer, we need an operating system. Operating system (OS) provides a set of
functions needed and used by most applications, and provides the necessary linkages to control a
computer’s hardware.
The first computers did not have the operating systems and each program would have to have
drivers for the video card, memory card, and other peripherals used. So, the evolution of the
computer applications and their complexity led to the OS necessities. Operating System has the
job of managing the computer hardware resources, and providing common services for execution
of various application software. The operating system is the most important type of system
32 www.jkchrome.com www.jkchrome.com www.jkchrome.com
software in a computer system. Without an operating system, a user cannot run an application
program on their computer, unless the application program is self booting.
In a large electronic circuit, there may be very large number of components and as a result
the discrete assembly will occupy a very large space.
They are formed by soldering which causes a problem of reliability.
They were interesting economically because which they cost little more systems to be
manufacture using smaller circuit boards, less assembly work, and a number of other b.
Next development was of LSI. The development of LSI was driven by economic factors and
m
each chip comprised tens of thousands of transistors. It was in 1970s, when LSI started
getting manufactured in huge quantities.
The first integrated circuits contained only a few transistors and so were called “small-
scale integration (SSI). They used circuits containing transistors numbering in the tens.
co
They were very crucial in development of early computers. SSI was followed by
introduction of the devices which contained hundreds of transistors on each chip, and so
were called “medium-scale integration (MSI).
Microprocessor chips produced in 1994 contained more than three million transistors.
e.
ULSI refer to “ultra-large scale integration” and correspond to more than 1 million of
transistors. However there is no qualitative leap between VLSI and ULSI, hence normally
in technical texts the “VLSI” term cover ULSI.
m
LSI was followed by VLSI where “very large-scale integration”(VLSI), with hundreds of
thousands of transistors, and beyond were used and still being developed. It was for the
first time that a CPU was fabricated on a single integrated circuit, to create a
microprocessor. In 1986, with the introduction of first one megabit RAM chips, more than
ro
one million transistors were integrated.
Integrated Circuits
ch
A monolithic integrated circuit (IC) also known as microchip, silicon chip, computer chip or chip is
basicaly a miniaturized electronic circuit that consists of mainly of semiconductor devices, as well
as passive components. This circuit is manufactured in the surface of a thin substrate of
semiconductor material. A hybrid integrated circuit is a miniaturized electronic circuit
.jk
The integrated circuit was first conceived by a radar scientist, Geoffrey W.A. Dummer (born
w
1909), working for the royal radar establishment of the British ministry of defense, and published
in Washington, D.C. on may 7, 1952. Dummer unsuccessfully attempted to build such a circuit in
1956.
w
The first integrated circuits were manufactured independently by two scientists; jack Kilby of
w
Texas instruments filed a patent for a “solid circuit” made of germanium on February 6,1959.
Kilby received patent 3261081, and U.S. patent 3434015. Robert Noyce of Fairchild
semiconductor was awarded a patent for a more complex “Unitary circuit” made of silicon on
April 25, 1961. Noyce credited Kurt lehovec isolation caused by the action of a biased p-n junction
(the diode) as a key concept behind the IC.
Integrated circuits can be classified into analog, digital and mixed signal. Digital integrated circuits
can contain anything from one to millions of logic gates, Flip-flops, multiplexers, and other circuits
in a few square millimeters. The small size of these circuits allows high speed, low power
33 www.jkchrome.com www.jkchrome.com www.jkchrome.com
dissipation, and reduced manufacturing cost compared with board-level integration. These digital
ICs, typically microprocessors, DSPs, and micro controllers work using binary mathematics to
process “zero” signals.
Analog ICs, such as sensors, power management circuits, and operational amplifiers, work by
processing continuous signals. They perform functions like amplification, active filtering,
demodulation, mixing, etc. analog ICs ease the burden on circuit designers by having expertly
designed analog circuits available instead of designing a difficult analog circuit from scratch.
ICs can also combine analog and digital circuits on a single chip to create functions such as A/D
converters and D/A converters. Such circuits offer smaller size and lower cost, but must carefully
m
account for signal interference.
Beginning of Computing
co
Introduction
We all know that a computer is an electric device and a programmable machine. The English
mathematician, philosopher, inventor and mechanical engineer Charles Babbage (1791-1871) is
known for originating the concept of a programmable computer and that is why he is called the
e.
“father of the computer”.
Babbage was the first person who invented first mechanical computer that eventually led to more
m
complex computers. He devised a plan for a stored-program mechanical computer, using data
modeled after the punched card templates in industrial (jacquard) looms.
ro
The first electronic digital computer was the ABC unit by John V. Atanasoff and Clifford Berry in
1940 at Iowa State University. Several of its ideas were incorporated into the ENIAC (Electronic
Numerical Integrator And Computer) which ran from 1945-1955 and is considered the first
functionally useful electronic digital computer.
ch
Universal Automatic Computer (UNIVAC) was innovated in 1940s that led to the first
commercially successful computer.
One of the earliest personal computers was the Intellect 4 by Intel, using their first commercially
.jk
produced microprocessor –the four-bit 4004. The Altair built by MITS was another first
commercially successful personal computer. Bill gates and Paul Allen wrote Microsoft’s (then
known as Microsoft) first software product for-“BASIC for the Altair”.
w
Then in 1983, came the TRS-80 that was Tandy Corporation’s desktop microcomputer model line,
which became famous as one of the trendiest home computers. Its TRS-80 Model 100 was an
early portable computer introduced in 1983. It was one of the first notebook-style computers, or a
w
prototype of a laptop, featuring a keyboard and LCD display, battery powered, in a package
roughly the size and shape of notepad or large book. This model running on 4 AA batteries very
soon got popular with newspaper reporters. Now writing stories from field was possible provided
w
A brain computer interface refers to the exchange of data between the human mind and a
computer. It has for long been the subject of study wherein brain signals can be used to operate a
computer and no longer the stock stuff of science fiction where a person thinks of a command and
the computer executes it. Earlier, implanted electrodes were used for this purpose. However, with
recent advances in non-invasive technology, even these are not required and scientists are
34 www.jkchrome.com www.jkchrome.com www.jkchrome.com
working at using brain activity for computer operation. It would be particularly useful for the
disabled.
The functioning of computers is primarily based on one thing that is their ability to determine
whether a switch (gate) is open or closed. It can recognize whether it is on or off. But, it’s the
speed of this act which makes them so efficient. The speed which is now measured in megahertz
and giga hertz trillions of cycles per second in the super computers. So, the data held in a
computer in binary form, using the digits 0 and 1. By counting, comparing and manipulating these
two digits in their various combinations according to a set of instructions held in its memory,
computer is able to perform a variety of tasks.
m
What is utility computing?
Utility computing is a service provisioning model in which a service provider makes computing
co
resources and infrastructure management available to the customer as needed, and charges them
for specific usage rather than a flat rate. Like other types of on-demand computing (such as grid
computing), the utility model seeks to maximise the efficient use of resources and/ or minimize
associated costs.
e.
m
{Part – II}
ro
ch
.jk
w
w
w
Computer Awareness Digest for IBPS PO & Clerk Exams
35 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per the set of
instructions (known as programs) given on a set of data (input) to generate desired information (output ).
m
the computer perform tasks.
Hardware
Input Devices Processing Devices Output Devices Storage Devices
co
Keyboard Mother board Monitor Magnetic Disk
Microphone Processor Printer Optical Disk
Mouse RAM Speaker Flash Memory
Web camera ROM Magnetic Tape
e.
Touch Screen SMPS
Light Pen
Speed
Accuracy
Storage and Retrieval
m
The following features characterize this electronic machine:
Reliability
Flexibility
Low cost
ro
Repeated Processing Capabilities
Software
ch
1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types of data
processing operations, stores data, intermediate results and instructions (program).It controls the operation of all parts
of computer.
w
36 www.jkchrome.com www.jkchrome.com www.jkchrome.com
m
[A] CPU itself has following three components:
ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves mathematical calculation
or decision/logic, it passes the control to the second component, i.e., the arithmetic logic unit (ALU). The ALU includes a
co
group of registers - memory locations built directly into the CPU - that are used to hold data that are being processed by
the current instruction.
Registers: The register is the smallest high-speed storage area in the CPU. All data must be represented in a register
before it can be processed.
e.
Control Unit: This unit controls the operations of all parts of computer but does not carry out any actual data processing
operations
switch off the computer or if there is a power failure. (SDRAM): A type of DRAM that can run at much
Hence a backup uninterruptible power system (UPS) higher clock speeds.
is often used with computers. RAM is small, both in Read Only Memory (ROM): The memory from which
terms of its physical size and in the amount of data it we can only read but can not write on it . This type of
can hold. memory is non-volatile. The information is stored
.jk
There are mainly three types of RAM available: permanently in such memories during manufacture. A
Dynamic Random Access Memory (DRAM): A type ROM, stores such instructions that are required to
of physical memory used in most personal computers. start a computer. This operation is referred to as
The term dynamic indicates that the memory must be bootstrap.
w
MROM (Masked ROM): The very first ROMs EPROM (Erasable and Programmable Read
w
were hard-wired devices that contained a pre- Only Memory): The EPROM can be erased by
programmed set of data or instructions. These exposing it to ultra-violet light for a duration of up
kinds of ROMs are known as masked ROMs which to 40 minutes. Usually, an EPROM eraser achieves
are inexpensive. this function.
PROM (Programmable Read only Memory): EEPROM (Electrically Erasable and
PROM is read-only memory that can be modified Programmable Read Only Memory): The
only once by a user. The user buys a blank PROM EEPROM is programmed and erased electrically.
and enters the desired contents using a PROM It can be erased and reprogrammed about ten
program thousand times. Both erasing and programming
take about 4 to 10 ms (milli second).
37 www.jkchrome.com www.jkchrome.com www.jkchrome.com
m
co
e.
m
ro
ch
.jk
w
w
w
38 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Scanner- A scanner allows you to scan printed them into a machine readable code and stores the
material and convert it into a file format that may text on the system memory.
be used within the PC. Bar Code Reader- A device used for reading bar
Digitizer- It converts analog information into coded data (data in form of light and dark lines).
digital form. Bar coded data is generally used in labeling goods,
Microphone-Microphone is an input device to numbering the books.
input sound that is then stored in digital form. Optical Mark Reader (OMR)- A special type of
Magnetic Ink Card Reader (MICR)-MICR input optical scanner used to recognize the type of
device is generally used in banks because of a mark made by pen or pencil.
large number of check to be processed every day.
Optical Character Reader (OCR)- OCR scans
text optically character by character, converts
m
2. Output Devices: (How it shows you what it is doing) Output devices translate the computer's output into the form
understandable by users.
Monitors: Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms
co
images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon
the number of pixels.
There are two kinds of viewing screen used for monitors.
Cathode-Ray Tube (CRT): The CRT display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity, or resolution
e.
Flat- Panel Display: The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT.
Printer: Printer is an output device, which is used to print information on paper.
the paper. m
Impact Printers: The impact printers print the characters by striking them on the ribbon which is then pressed on
Non-Impact Printers: Non-impact printers print the characters without using ribbon. These printers print a
complete page at a time so they are also called as Page Printers. Laser Printers, Inkjet Printers.
ro
Note:
Data: Data can be defined as a representation of facts, concepts or instructions in a formalized manner which should
be suitable for communication, interpretation, or processing by human or electronic machine.
ch
Information:- Information is organized or classified data which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
Data Processing Cycle: Data processing is the re-structuring or re-ordering of data by people or machine to
increase their usefulness and add values for particular purpose. Data processing consists of basic steps input,
processing and output.
.jk
Processing - In this step input data is changed to produce data in a more useful form. For example, paychecks may
be calculated from the time cards, or a summary of sales for the month may be calculated from the sales orders.
Output - The result of the proceeding processing step are collected. The particular form of the output data depends
w
on the use of the data. For example, output data may be pay-checks for employees.
Language Processors:
w
Assembler: This language processor converts the program written in assembly language into machine language.
Interpreter: This language processor converts a HLL(High Level Language) program into machine language by
converting and executing it line by line.
Compiler:-It also converts the HLL program into machine language but the conversion manner is different. It converts
the entire HLL program in one go, and reports all the errors of the program along with the line numbers.
39 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Classification of Computers:
m
4 Main Frame It is a multi-user computer system which is capable of supporting hundreds of
users simultaneously. Software technology is different from minicomputer.
5 Supercomputer It is an extremely fast computer which can execute hundreds of millions of
instructions per second.
co
Following are the main memory storage units:
e.
1 Bit(Binary A binary digit is logical 0 and 1 representing a passive or an active state of a
Digit) component in an electric circuit.
2 Nibble A group of 4 bits is called nibble.
3
4
Byte
Word
m
A group of 8 bits is called byte. A byte is the smallest unit which can represent a
data item or a character. (1 byte = 8 bits)
A computer word, like a byte, is a group of fixed number of bits processed as a unit
which varies from computer to computer but is fixed for each computer. The length
ro
of a computer word is called word-size or word length and it may be as small as 8
bits or may be as long as 96 bits. A computer stores the information in the form of
computer words.
ch
2 Megabyte(MB) 1 MB = 1024 KB
3 GigaByte (GB) 1 GB = 1024 MB
4 TeraByte (TB 1 TB = 1024 GB
5. PetaByte (PB) 1 PB = 1024 TB
w
Software
w
Software: software represents the set of programs that govern the operation of a computer system and make the hardware
run. There are two types of software
w
System Software: The system software is collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself. System software are generally prepared by computer manufactures.
System software serves as the interface between hardware and the end users. Examples: Operating System, Compilers,
Interpreter, Assembler etc.
Application Software: It is the set of programs necessary to carry out operations for a specified application.
40 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Application software can subdivide into three categories:
(A) Packages:-
Packages
Word Processing A package that process textual matter and creates
organized and flawless documents.
Spreadsheets An electronic spreadsheet is a program that
accepts data in a tabular form and allow users to
manipulate , calculate, analyze data in the desired
manner.
Database Management Systems DBMS is a package that can handle and manage
bulk of stored data.
m
Desktop Publishing Software Handles page layout by combining the functions of
a traditional typesetter and a layout artist.
Graphics, Multimedia and Presentation Application software that manipulates images is
co
applications known as Graphics software.
(B) Utilities: Utilities are those application programs that assists the computer by performing housekeeping functions like
backing up disk or scanning viruses etc.
e.
Utilities
Text Editor Program is used for creating, editing text files.
Backup Utility Program facilities the backing-up of disk.
Compression Utility
Disk Defragmentor
m Large files can be compressed so that it takes less
storage area.
It speeds up disk access by rearranging the files
ro
and free space on your computer.
Antivirus Software It scans yours disk for viruses and removes them if
any virus is found.
ch
(C) Customized Software: This type of software is tailor-made software according to a user’s requirements.
Boot: When computer starts, the operating system is first Motherboard: The motherboard serves as a single
w
loaded (as it is essential for running all other programs), platform to connect all of the parts of a computer
this process is known as booting. together. A motherboard connects CPU, memory, hard
Cold Boot: -When you turn the computer ON from an OFF drives, optical drives, video card, sound card, and other
position. ports and expansion cards directly or via cables. It can be
Warm Boot: - When you reset the computer that is considered as the backbone of a computer.
already ON.
41 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Software categories
Freeware: Software which is completely costless .The producers of this software are either public institutions such as
universities or developers who do it for personal interest or advertisement or private company who do it for dumping
reasons.
Shareware: Software which is initially costless but after a certain period the user is asked to pay a fee or delete it. Or
software which has two versions a free one, but incomplete or with advertisement banners and a complete advertisement
free one for which the user must pay. The most common example is WinZip compression program.
Commercial: Software for which the user has to pay a license to use it .Common examples are Microsoft Windows operating
system and Microsoft word.
Private: Software uniquely built, under payment for a specific customer to fit his need. Only the customer may use it.
Open Source: Software may be modified by anyone, sometimes under certain restrictions. Open source software is also
freeware.
m
Proprietary: Software is distributed with the explicit with the explicit legal warning not to modify it and technically locked
to prevent other developers to see or modify its source.
co
Number System
When we type some letters or words, the computer translates them in numbers as computers can understand only numbers.
A computer can understand positional number system where there are only a few symbols called digits and these symbols
e.
represent different values depending on the position they occupy in the number.
represents a 0 power of the base (2). Last position in a binary number represents a x power of the base (2).
3. Octal Number System: Uses eight digits, 0,1,2,3,4,5,6,7, also called base 8 number system, Each position in an octal
number represents a 0 power of the base (8).
4. Hexadecimal Number System: Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. Letters represents numbers
starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15. Also called base 16 number system .Each position in a
.jk
DBMS: DBMS is the acronym of Data Base Management System. DBMS is a collection of interrelated data and a set of
programs to access this data in a convenient and efficient way. It controls the organization, storage, retrieval, security and
w
database of concern to a user or Application program. Each user has a different external view and it is described by
means of a scheme called external schema.
2. Conceptual view/Logical Level: All the database entities and the relationship among them are included. One
conceptual view represents the entire database called conceptualschema.
3. Internal view/Physical Level: It is the lowest level of abstraction, closest to the physical storage method. It describes
how the data is stored, what is the structure of data storage and the method of accessing these data. It is represented by
internal schema.
42 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Keys in DBMS:
m
Super key of an entity set is a set of one or more attributes whose values uniquely determine each entity.
Candidate key of an entity set is a set of fields from which primary key can be selected. It is an attribute or a set of
attributes that can act as a primary key for a table to uniquely identify each record in a table.
Primary key is a candidate key that is most appropriate to become main key of the table. It is a key that uniquely
co
identifies each record in the table
LOGIC GATES
Logic gate: is an elementary building block of a digital circuit. Most logic gates have two inputs and one output.
e.
At any given moment, every terminal is in one of the two binary conditions low (0) or high (1). There are seven basic logic
gates: AND, OR, XOR, NOT, NAND, NOR, XNOR
Networking
m
Network: Computer Networks means interconnected set of autonomous system that permits distributed processing to
information.
ro
Five components:
Sender Computer Receiver Equipment(Modem)
Sender equipment (Modem) Receiver Computer
Communication Channel ( Telephone Cables)
ch
is relatively smaller and privately owned network Wide Area Network (WAN): A wide Area
with the maximum span of 10 km. Network (WAN) is a group Communication
Metropolitan Area Network (MAN) : MAN is Technology ,provides no limit of distance.
defined for less than 50 Km and provides regional
w
Types of Network
w
1. Point to Point Network: When a packet is sent from one router to another intermediate routers, the entire packet is
stored at each intermediate router, stored there till the output line is free and then forwarded. A subnet using this
principle is called point to point or packet switched network.
w
2. Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the machines on
the network.
43 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Open Systems Interconnection model (OSI)
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal
functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International Organization for Standardization (ISO).
m
Session Layer: The session layer controls the dialogues (connections) between computers. It establishes,
manages and terminates the connections between the local and remote application.
Transport Layer: The transport layer provides the functional and procedural means of transferring variable-
co
length data sequences from a source to a destination host via one or more networks, while maintaining the
quality of service functions.
Network Layer: The network layer provides the functional and procedural means of transferring variable
length data sequences from one node to another connected to the same network.
e.
Data link Layer: The data link layer provides node-to-node data transfer -- a link between two directly
connected nodes. It detects and possibly corrects errors that may occur in the physical layer.
Physical Layer: It defines the electrical and physical specifications of the data connection. It defines the
m
relationship between a device and a physical transmissionmedium.
Transmission Media
ro
Network Cables: Network cables are used to located at gateways, the places where two or
connect computers. The most commonly used more networks connect.
cable is Category 5 cable RJ-45. Internal Network Cards: Network card is a
ch
printers, scanners etc. can be connected and then computers have network card pre-installed.
this body will manage or distribute network Network cards are of two types: Internal and
traffic External Network Cards.
Repeaters: A repeater is an electronic device
w
An Operating system is a program, which acts as an interface between a user and the hardware.
m
Device Management -- keeps track of all devices. System acknowledges the same, does the
This is also called I/O controller that decides corresponding action and informs the operation
which process gets the device, when, and for how by a display screen.
co
much time. Error-detecting aids -- Production of dumps,
File Management -- allocates and de-allocates traces, error messages and other debugging and
the resources and decides who gets the resources. error-detecting methods.
Security -- prevents unauthorized access to Coordination between other software and
programs and data by means of passwords and users -- Coordination and assignment of
e.
similar other techniques. compilers, interpreters, assemblers and other
Job accounting -- keeps track of time and software to the various users of the computer
resources used by various jobs and/or users. systems.
m
MS - Window
ro
MS-Windows is a GUI based operating system. In Windows Operating system multiple applications can be simultaneously
run in different windows.
In MS-Windows, the screen upon which icons, Toolbar: A set of button you click to perform
ch
The taskbar is a bar, which is usually located at To find files or folders, Start---Find---Files or
the bottom of the screen. Folder commands are clicked.
My computer is helpful for viewing the contents To create a shortcut to a file, firstly select the file
of a single folder or drive. or folder, whose shortcut is to be created. Then
w
Windows Explorer is another way of seeing drag the file icon through right mouse button to
what is on your computer. Windows Explorer desired location where shortcut to be placed, and
shows the computer’s contents as a hierarchy. then select create shortcut(s).
w
File: A program or document stored on a disk. To shut down the computer, Start—Shut Down
commands are clicked.
w
MS-Word
A word processor is a package that processes The word processor automatically fits the typed
textual matter and creates organized and flawless text within the specified left and right margins.
documents. This feature is called word wrapping.
The world processor offers very useful features Margins can be four type viz. left, right, top and
like speed, powerful editing and formatting bottom.
features, permanent storage, Graphics, object The distance between text boundaries and page
linking and embedding, spell check and mail margins is called indent. The indent can be
merge etc. positive, negative or hanging indent.
The text layout
45 www.jkchrome.com www.jkchrome.com www.jkchrome.com
In Word, paragraphs can be formatted through The Autocorrect feature of Word converts
Paragraph option of Format menu and the shorthand into longer strings. You can create your
borders can be applied through Borders and own Autocorrect entries by clicking to
shading option of Format menu. Autocorrect command to Tools menu.
The page formatting in Word can be controlled Tables can be inserted in a Word document
through Page Setup … option of File menu. The through Table button of Standard toolbar and can
header and footer can be created and formatted be manipulated through the table drop menu.
using Header and Footer option of the view menu. In MS-Word, the mail merge involves two files –
In word, the document can either be printed Main document and data source file to produce
through print button of standard toolbar or the merged document. The main document and
through the Print.. option of File menu. The help data source can handled through Mail Merge
is available in Word through the Help menu. option of Tools menu.
In word, spelling and grammar can be checked
m
either through the spelling and Grammar option
of Tools menu.
co
Shortcuts
Shortcut Description
Ctrl+W Close the active window / document
Ctrl+Z Undo an action
e.
Ctrl+Y Redo the last action or repeat an action
Ctrl+S Save a document
Ctrl+P Print a document
Ctrl+K
Alt+Right.
Ctrl+C
Insert a hyperlink.
m
Arrow Go forward one page.
Copy selected text or graphics to the Office Clipboard.
ro
Ctrl+V Paste the most recent addition to the Office Clipboard.
Ctrl+Shift+A Format all letters as capitals.
Ctrl+B Applies or removes bold formatting.
ch
Excel Book.xls
PowerPoint Presentation.ppt
Database Db1.mdb
Executable Game.exe
46 www.jkchrome.com www.jkchrome.com www.jkchrome.com
MS-EXCEL
A spreadsheet is a software tool that lets one To open a workbook use File—Open command.
enter, calculate, manipulate and analyze set of To insert cells, rows or columns in worksheet, use
numbers. Insert---Cells----, Insert-----Rows or Insert-----
A Worksheet is a grid of cells made up of Column command respectively.
horizontal rows and vertical columns. General arrangement of data is known as
A workbook is a group of worksheets. formatting.
Three types of data can be entered in a worksheet Formatting does not affect the actual cell value
(i) number (ii) Text (iii) Formulas. only the appearance change.
Cell can be referenced in three ways (i) relative Formatting is performed in MS Excel through
(ii) absolute (iii) mixed options available in Format menu.
m
A cell can be edited either by overwriting or Charts are the pictorial repres ntation of
by partially modifying the cell contents. worksheet data.
A range can selected using mouse or keyboard. Various chart types in MS- Excel are area chart,
co
A range can be either through copy and paste column chart, ba chart, line chart, pie chart,
operations or by dragging the fill handle. XY(Scatter) char
A range can be moved either through cut and Chart in MS-Excel sa ed in two ways : (i)
paste operations or by dragging the range border. embedded chart (ii) chart sheet
A range can be cleared through Edit--Clear Embed ed chart is a chart object that is placed on
e.
command. a w rksheet and saved with that work sheet.
To erase everything from a worksheet ,select all Chart sheet is a sheet in workbook that contains
the cells in the worksheet and then use Edit— only a chart.
Clear—All.
To save a workbook use File- Save command. m
Powe poin
Charts are created using chart wizard.
ro
The application software that can create menu’s Apply Design Template option or ever
professional looking visual aids is called from the shortcut menu.
ch
these methods:(i) Auto content Wizard (ii) Header and Footer information can be viewed and
Design Templa es (ii ) Sample Presentation changed by clicking at View---Header and Footer
and (iv) Blank Presentation option.
w
A new side can be added by either clicking at The slide ---shorter view in useful for viewing the
Common Tasks options of Formatting toolbar slides in miniature forms and for rearranging
and then selecting New Slide option, by clicking at them.
w
Insert menu’s New Slide option. Movies (Vedio) & Sound can be inserted by using
A presentation in PowerPoint can viewed in any Insert—Movies & Sounds command.
of these views: Normal, Outline, Slide, Slide While creating slide shows you can add
Sorter, Slide Show and Notes Page View. transitions to slides by using Slide Show --- Slide
To apply new design to slides, click either at Transition command.
Apply Design Template option of Common Tasks To add animation, you can use Slide Show-----
options of Formatting toolbar, or at Format Custom Animation commands.
47 www.jkchrome.com www.jkchrome.com www.jkchrome.com
48 www.jkchrome.com www.jkchrome.com www.jkchrome.com
An additional BCC (blind carbon copy) field is available for hidden notification; recipients listed in the BCC field receive
a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients).
The Drafts folder retains copies of messages that you have started but are not yet ready to send.
Hotmail, a free e-mail service provided by Microsoft which was established in 1995 was co - founded by an Indian
American entrepreneur Sabeer Bhatia along with Jack Smith in July of 1996.
An Internet Protocol address (also known as an IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network. It acts as an identifier for a computer. It is a unique address for
every computer.
Top-level domain: Each part of a domain name contains certain information. The first field is the host name, identifying
a single computer or organization. The last field is the top-level domain, describing the type of organization and
occasionally country of origin associated with the address. For e.g. - .com – Commercial, .edu – Educational
m
Toggle keys- toggle the input from a group of keys on a keyboard between two different input modes.
Caps Lock Scroll Lock
co
Num Lock Insert
Modifier Keys - In computing, a modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. Fore.g.-
e.
Shift Ctrl
Alt Fn
m
Function keys – A function key is a key on a computer or terminal keyboard which can be programmed so as to cause an
operating system command interpreter or application program to perform certain actions, a form of soft key. For e.g. - F1
through F12 keys are known as function keys. Each keys perform different functions.
ro
Computer Viruses:
ch
A virus is a parasitic program that infects another legitimat program, which is sometimes called the host. To infect the host
program, the virus modifies the host so that it cont ins a copy of the virus.
Boot sector viruses: A boot sector viru nfects the boot record of a hard disk. The virus allows the actual boot sector
data to be read as through a normal st rt-up were occurring.
.jk
Cluster viruses: If any program is run fr m the infected disk, the program causes the virus also to run . This technique
creates the illusion that the irus has infected every program on thedisk.
Worms: A worm is a pr gram wh se purpose is to duplicate itself.
w
Bombs: This type of virus hid s on the user’s disk and waits for a specific event to occur before running.
Trojan Horses: A T ojan Horses is a malicious program that appears to be friendly. Because Trojan Horses do not
make duplicat s of themselves on the victim’s disk. They are not technically viruses.
w
Stealth Viruses These viruses take up residence in the computer’s memory, making them hard to detect.
Micro Viruses: A macro virus is designed to infect a specific type of document file, such as Microsoft Word or Microsoft
w
Excel files. Th se types of documents can include macros, which are small programs that execute commands.
Abort: To stop a program or function before it has ANSI: American National Standards Institute, a
finished. powerful industry association of USA, promoting
Algorithm: A set of instructions that provides a Programming language standards.
solution to a given problem. Antivirus: Program A utility that searches a hard disk
Animation: A simulation of movement created by for viruses and removes any, that is found.
displaying a series of pictures, or frames. For example, Architecture: A design. It can refer to either
cartoons on television. hardware or software or to a combination of
49 www.jkchrome.com www.jkchrome.com www.jkchrome.com
hardware and software. The architecture of a system applications; together with expanded memory, it
defines its broad outlines. helps PCs to address increased amounts of data in
ASCII: American Standard Code for Information Inter memory.
change. This is a seven/eight bit code widely used in Fax/Facsimile: A way of transmitting copies of
computers for the transfer of data. documents over telephone lines. Fax is short for
Bandwidth: The amount of data that can be Facsimile.
transmitted in a fixed amount of time. It is usually Gigabyte: Abbreviated as GB, is equal to 1024 MB.
expressed in bits per second (bps) or bytes per GUI Graphical User Interface. A user interface that
second. works visually and is based on the selection of actions
Bit: The smallest unit of information in computer using a mouse or a similar pointing device to click on
system. Bit is short for binary digit; either a "1” or a icons or to pick options from menus; see also icon.
"0". Hertz: A unit of frequency that mea s Cycl s per
Boot: The process of getting the computer started. Second.
m
Byte: A byte is made up of 8 bits. The amount of High Density: The amount of info mation a disk can
memory it takes to store a single character. hold. High Density disks hold more information than
Cache: A separate area of Primary Memory (RAM) Double Density disks.
co
where the computer stores a copy of frequently used Hypertext: A method of presenting information so
information for quick access. This is meant to speed the user can view it i a non-sequential way,
up the operation of the hard disk. regardless of how the topics were originally arranged.
CD-ROM: Compact Disk-Read Only Memory. This is a It has now evolved as a flexible software technology
permanent storage device used to store large to create el ctroni books provides fast and flexible
e.
quantities of information that need not be changed. access search c iteria and provides quick access to
CGA: Color Graphics Adapter. Low-resolution screen information in large documents.
(640x200 pixels) with color capability. HTML Hyper Text Markup Language. A markup or
Character: A number, letter, symbol, or punctuation
mark.
Chip: A small piece of silicon containing thousands or
millions of electrical elements. Also called an
m structuring language used to describe Web and
Intra et documents. It is used to define structure,
appearance and placement of HTML elements
including, fonts, graphics, text, hypertext links to
ro
Integrated Circuit (IC). other sites and many more details.
Compatible: The ability of one device or program to IBM: International Business Machines, a USA based
work with another device or program. For example, a multinational Company.
ch
printer and a computer are said to be compatible if Icon: A graphical screen element that executes one or
they can be connected to each other. more commands when selected with a mouse or other
Conventional Memory: The first 640K of lectronic pointing device
Memory (RAM) in a computer used to ru OS a d IDE: Integrated Device Electronics, a standard used
applications. for connecting hard drive to a computer. IDE hard
.jk
Debug: In computer related systems, fixing software drives are very common and relatively inexpensive.
related problem is known as deb gging Intel: The manufacturer of the most popular
Digitize To scan a piece of ar w rk in very fine detail microprocessors or CPUs.
and store it in a form that omputer understands. Intelligent: Printer Printer combining laser,
w
DOS: It stands for Disk Operating System. It is a single computer and photocopying technology.
user operating system. Internet: The world's largest computer network that
DVD: Digital Versatile Disc or Digital Video Disc links many of the scientific, research and educational
w
Dynamic: Refers to act ons that take place at the computers as well as commercial networks. The
moment they are needed rather than in advance. internet uses TCP/IP protocols, and computers on
EDP: Elec ronic Data Processing. Internet can run on any operating system, like, several
w
E-Mail: Electronic Mail. A facility to send electronic variations of UNIX, Windows NT, and VMS etc.
messages to another person on a computer network. Intranet: In the most general sense, a private
End-User: The end user is the individual who uses corporate network that uses Internet technology
the product after it has been fully developed and based software and TCP/IP protocol standards. Many
marketed. companies use intranets for tasks as simple as
EPROM: Erasable Programmable Read Only Memory. distributing a company letter and for tasks as complex
A type of ROM that can be programmed or as posting and updating technical support bulletins to
reprogrammed usually by exposing a normally service personnel worldwide. An intranet does not
covered sector to UV-Light. always include permanent connection to Internet.
Extended Memory: Memory in addition to Kilobyte (K, KB) Approximately one thousand
conventional memory used to run and manage characters; actually 1024bytes.
50 www.jkchrome.com www.jkchrome.com www.jkchrome.com
LAN An acronym for local area network. A system of Pentium: The fifth generation of microprocessors.
PCs that are located relatively near to each other and The Pentium is 2 to 3 times faster than the 80486, the
connected by wire so that individual users can fourth generation of microprocessors.
cooperatively process information and share Peripheral: Any piece of hardware attached to the
resources; see also WAN. outside of a computer. Examples are printers and
Laptop Computer: A portable computer, small modems.
enough to be held on a lap,but slightly larger than a Pixel: Short for "Picture Element". A Pixel is the
notebook computer. smallest dot the computer can control on the screen.
LED: Light Emitting Diode. An electronic device that Portable computer: A small computer that usually
lights up when electricity is passed through it. runs on batteries. In the categories of portable
Light Pen: An input device that allows a user to write computers are laptop, notebook, sub-no ebook and
on or point to a special pad or the screen of a pen- palmtop.
based computer, such as a PDA. Protocol: In networking and communications, the
m
Macintosh: A PC based on a Motorola microprocessor formal specification that defines the procedures to
employing GUI. Apple Macintosh has been in use since follow when transmitting and re eiving data. Protocol
late eighties. defines the format, timing, sequence and error
co
Macro: A symbol, name, or key that represents a list checking used on the network.
of commands, actions or keystrokes. Resolution: The size and q antity of dots that make
Math co-processor: Part of the microprocessor; a up a printed page, scree or scanned image.
companion chip designed to perform complex Runtime: Error An error that occurs during the
calculations. execution of a pro ram.
e.
Megabyte (M, MB): Approximately one million Scanne : An nput device used to copy a printed
characters; actually 1,048,576 bytes. A measure of document into a computer’s memory in digital form,
memory or storage. w thou requiring manual keying.
Megahertz (MHz): A measure of processing speed.
The higher the value, the faster a computer can work.
Microprocessor: A single chip containing all the
elements of a computer's CPU.
m SCSI: Small Computer System Interface. A standard
f r connecting a hard drive to a computer.
Serial Port: An outlet on a computer used to attach a
device, such as a modem. A serial port sends data
ro
MIPS: Million Instructions Per Seconds, a unit for (bits) down the wire one at a time (in a series).
measuring the speed of a computer. Service Pack: It is an update to a software version
Mother Board: The main circuit board of a compute that fixes an existing problem, such as a bug or
ch
which carries electrical signals to and from various provides enhancements to the product that will
parts of the computer. appear in the next version of the product.
Multimedia: A computer system that com ines text, TCP/IP: Transmission Control Protocol / Internet
graphics, animation, music, voice and vid media; Protocol is a set of communication protocols that
may include stereo speakers as an output d vice. encompass media access, packet transport, session
.jk
Multiprocessing: It refers to a computer system’s communications, file transfer, e-mail, and terminal
ability to support more than one process at the same emulation. TCP/IP is supported by a large number of
time. It is also called multitasking H/W and S/W vendors and is available on many
Nibble: Half a byte i.e. 4bits computer systems, from PCs to mainframes.
w
Non-Volatile Memory: This is data storage that does Troubleshoot: To isolate the source of a problem and
not lose its contents n power off; for example, ROM. fix it. In case of computer systems, troubleshoot is
Notebook Computer: A portable computer, usually used when the problem is hardware related.
w
approximately 8½ by 11 inches, that fits inside a UNIX: A multi user operating system.
briefcase. Upgrade: A new version of a software or hardware
Numeric keypad: The part of a keyboard that looks product designed to replace an older version of the
w
Some expected and important questions of Computer Awareness for upcoming examinations
Computer Questions
m
stored temporarily before being copied to another 6. Which of these is a not a computer manufacturer?
location is called clipboard. Copying data saves in A. IBM B. Apple
clipboard. C. Microsoft D. Sun
co
2. Vacuum Tube is the invention ……generation. E. None of these
A. 1st generation B. 2nd gen Ans: (C) Microsoft manufactures a variety of
C. 4th gen D. 5th gen software programs and its Operating System
E. None of these Windows is one of the most popular Operating
e.
Ans: (A) In first Generation (1940-1956), the first Sys ms round. It however does not manufacture
computers used vacuum tubes for circuitry and c mputers.
magnetic drums for memory and were often 7 Which of the following is not an input device?
enormous, taking up entire rooms.
3. The computer size was very large in .
A. First Generation B. Second Generation
m A. OCR
B. Optical scanners
C. Voice recognition device
ro
C. Third Generation D. Fourth Generation D. COM (Computer Output to Microfilm)
C. None of these E. None of these
Ans: (A) First generation computers used 1000s Ans: (D) An input device is a peripheral used to
ch
of vacuum tubes that required lot of space made provide data and control signals to an information
them gigantic in size. Single transistor ould processing system such as a computer or
replace 1000 vacuum tubes and a single C chip information appliance. Examples of input devices
replaced 1000s of transistors mad computers include keyboards, mice, Optical scanners,
.jk
smaller and more speedy. digital cameras, Voice recognition device, OCR
4. is responsible for overall control and o- and joysticks.
ordination of instruction execu i n. 8. Who among the following is the odd one ?
A. CPU B. ALU A. Mouse B. Scanner
w
Ans: (D) The contro unit (CU) is a component of a Ans: (C) Except Printer (Output device) all are
computer cen ral processing unit (CPU) that examples of input devices (keyboards, mouse,
directs oper tion of the processor. It tells the scanners).
w
10. Which is not a storage device? 15. An image editing software in which we can draw
A. Printer B. CD and edit images is?
C. Hard disk D. Floppy Disk A. PageMaker B. MS-Paint
E. DVD C. Coral Draw D. Photo Image
Ans (A) Storage device is a piece of computer E. Front page
equipment on which information can be stored. But Ans: (C) Corel Draw is a vector graphics editor. A
Printer is the External device that communicates vector graphics editor is a computer program that
with another digital device to print what a user allows users to compose and edit ve tor graphics
sees on a screen. images interactively on a compu er.
11. technologies is used by banks for faster 16. In DOS, Which of the following command is used to
m
processing of large volumes of cheques. delete all the files as well as sub directories of a
A. OCR B. OMR directory?
C. MICR D. Bar code
co
A. Delete B Del
E. None of these C. Deltree D. Move
Ans: (C) Magnetic Ink Character Recognition E. None of
Code is a character-recognition technology used Ans: (C) De tree command is used to delete all the
e.
mainly by the banking industry to ease the files as ell as sub-directories of a directory.
processing and clearance of cheques and other 17. Physical components that make up your computer
documents. ar known as .
12. Who invented Analytical engine?
A. Blaise Pascal
C. Charles Babbage
B. George Bool
D. Dr. Herman Hollerith
m A. Software
C Hardware
E. None of these
B. Operating Systems
D. Web Browsers
ro
E. None of these Ans: (C) The most common hardware components
Ans (C) The Analytical Engine was a proposed are Monitor, Keyboard, Mouse, CPU etc.
mechanical general-purpose computer designed 18. In MS- Word WYSIWYG stands for ?
ch
by English mathematician and computer pioneer A. Preview B. What you see is what you get
Charles Babbage. C. What you see is where you get
13. Memory which forgets everything when you switch D. Print E. None of these
off the power is known as . Ans: (B) WYSIWYG is an acronym for "What you
.jk
21. A terabyte comprises . phone calls from any corner of the Globe, where
A. 1025 byte B. 1024 byte you get the subscriber's Network.
C. 1024 bits D. 1024 gigabyte 26. Who among the following has coined The term
E. None of these ‘Multimedia‘ ?
Ans (D) A terabyte (TB) is a measure of computer A. Bob Goldstein B. Tay Vaughan
storage capacity approximately 1,024 gigabytes C. NASA D. Mc Graw Hills
(GB). E. None of these
22. What does MICR stand for? Ans (A) The term multimedia was c ined by singer
A. Magnetic Ink character Register and artist Bob Goldstein to promote the July 1966
B. Magnetic Ink Code Reader opening of his "LightWorks t L'Oursin" show at
m
C. Magnetic Ink Code Register Southampton, Long Island.
D. Magnetic Ink character Recognition 27. What is GIS stands for
E. Magnetic Ink cases Reader A. Geological Information System
co
Ans: (D) Magnetic Ink Character Recognition B. Genetics Information Systems
(MICR) is a character-recognition technology used C. Geographic Information Systems
mainly by the banking industry to ease the D. Gene Info mati n systems
e.
processing and clearance of cheques and other E. None of the e
documents. Ans (C) A geographic information system (GIS) is
23. Virtual memory is ? a system designed to capture, store, manipulate,
A. Memory on the hard disk that the CPU uses an
extended RAM
B. Access the page table
m 28 A
analyze, manage, and present all types of spatial or
geographical data.
is a software program used to view Web
ro
C. CPU generates a physical address pages.
D. Automatic storage allocation A. Site B. Host
E. None of these C. Link D. Browser
ch
random access memory (RAM) to disk storage. video and other files.
24. In DVD, V stands for . 29. Micro-programming introduced by ?
A. Video B. Versatile A. John Mauchley B. Maurice Wilkies
C. Both A and B D V latile C. William Shockley D. Blaise pascal
w
disc) is a digi al optical disc storage format, the concept of microprogramming from the
invented a d d veloped by Philips, Sony, Toshiba realization that the Central Processing Unit of a
and Panasonic in 1995. computer could be controlled by a miniature,
w
25. What is the f ll form of SIM? highly specialised computer program in high-
A. Station Identity Module speed ROM.
B. System Identity Module 30. On color monitor each pixel is composed of .
C. Subscriber Identity Module A. two mini dots B. five mini dots
D. Subscriber Trunk Dialling C. six mini dots D. three mini dots
E. None of these E. None of these
Ans (C) A Subscriber Identity Module card is a
portable memory chip,that enables you to make
54 www.jkchrome.com www.jkchrome.com www.jkchrome.com
Ans (D) On color monitors, each pixel is actually 35. You can use to copy selected text and to
composed of three dots a red, a blue and a green paste it in a document.
one. A. ctrl+c, ctrl+ v B. ctrl+ c, ctrl+p
31. Numbers and formulae entered in a cell are called C. ctrl+ s, ctrl+z D. shift+ c, alt+ p
. E. ctrl+d , ctrl+a
A. Labels B. Numeric entries Ans (A) We can use ctrl+c to copy selected text and
C. Intersection D. Text ctrl+v to paste it to the document.
E. Fellers 36. A red wavy line under a word indicates that the
Ans (B) When entering numbers in a cell the word .
spreadsheet interprets the data as being numbers, A. Is too long for the line of text
m
which makes the use of mathematical formulas on B. Is not in the dictiona y fil and therefore might be
the data possible.By default the data recognized as spelt incorrectly
co
being numbers will be right justified in the cell. C. Is not appropriate for that particular sentence
32. Fax machines are used to send documents through D. Is a verb
a? E. None of these
A. Telephone line B. Modems Ans (B) MS word can check the text for
e.
C. Co-axial wire D. All of these correctness and allows you to make amends. If
E. None of these there is a spelling mistake, the word gets
Ans (A) Fax is the telephonic transmission of underlined with a red color line indicating the
scanned printed material normally to a telephone
number connected to a printer or other output
device.
m error.
37. Windows xp, windows 7, windows 8.1 are known as
what?
ro
33. Date and time are available on the desktop A. Processors B. Domain names
at . C. Modems D. Operating system
A. Keyboard B. Recycle bin E. None of these
ch
applications are running on the devic as well as 38. is when the more power-hungry components,
provide links or shortcuts to o her programs or such as the monitor and the hard drive are put in
places, such a start menu, notif cation area and idle.
clock. A. Hibernation B. Power down
w
34. To save an existing file with new name at a new C. Standby mode D. The shutdown
location we should u e command. procedure
w
Ans (C) Choosing "Save As" brings up a prompt to mode. A computer in standby mode requires a
save your work as a file with a different name. Just small amount of current called a "trickle charge"
be sure to rename the file something new when that keeps the current state of running software
you choose "Save As" or you will overwrite the saved in the computer's RAM.
current saved version.
55 www.jkchrome.com www.jkchrome.com www.jkchrome.com
39. Video–conferencing requires a microphone, 44. What does the computer abbreviation MB used for?
speakers and a attached to your computer. A. Mega Bit B. Million Bytes
A. Mouse B. Keyboard C. Mega Bytes D. Million Bit
C. Video camera D. Scanner E. Micro Bytes
E. Light pen Ans (C) The megabyte is a multiple of the unit
Ans (C) Video-conferencing is a set of byte for digital information. Its recommended unit
telecommunication technologies which allow two symbol is MB.
or more locations to communicate by simultaneous 45. What is the base of hexadecimal number system?
two-way video and audio transmissions. For a A. 2 B. 8
videoconferencing system video camera, C. 16 D. 10
m
computer monitor, television, projector is E. None of these
required. Ans (C) The hexadecimal numeral system, is a
co
40. Which of the following is an operating system? numeral system made up f 16 symbols (base 16).
A. Linux B. Debugger 46. RTGS stand for .
C. Mozilla D. Google chrome A. Real Time Gross Settlement
E. Intel 8085 B. Real Time General Settlement
e.
Ans (A) Linux is a Unix-like computer operating C. Run Time G oss Settlement
system assembled under the model of free and D Regular Time General Settlement
open-source software development and E. None of these
distribution.
41. What is Dr. Watson?
A. IT Expert B. Application Debugger
m Ans (A) Real-time gross settlement (RTGS)
systems are specialist funds transfer systems
where transfer of money or securities takes place
ro
C. Surgeon D. Operating system from one bank to another on a "real time" and on
E. None "gross" basis.
Ans (B) Dr. Watson is an application debugger 47. What is the name given to the temporary storage
ch
included with the Microsoft Windows opera ing area that a web browser uses to store pages and
system. graphics that it has recently opened?
42. Which of the following cables can transm t data at A. Niche B. Webspace
high speeds? C. Cache D. Cellar
.jk
glass threads, each of which is capable of 48. Oracle is an example of application software.
transmitting messages modulated onto light A. Database B. Word processing
w
second most widely used RDBMS and the most 55. Verification of a Login name and password is known
widely used open-source RDBMS. as .
50. Primary key is a ? A. Configuration B. Accessibility
A. Common key B. Unique key C. Authentication D. Logging in
C. Input key D. Output key E. None of these
E. None of these Ans (C) Authentication is the process of
Ans (B) A primary key is a key in a relational identifying an individual, usually based on a login
database that is unique for each record. It is a name and password.
unique identifier, such as a driver license number, 56. Which of the following can be us d to select the
telephone number or vehicle identification entire document?
m
number (VIN). A relational database must always A. Ctrl+A B. Alt+F5
have one and only one primary key. C. Shift+A D. Ctr +K
E. Ctrl+H
co
51. Which of the following computer language is a
mathematically oriented languages used for Ans (A) For sele ting entire document we use
scientific problems? Ctrl+ A.
A. FORTRAN B. COBOL 57. Which f the following will you require to hear
e.
C. LISP D. PROLOG music on your computer?
E. APPLE A Vid o Card B. Sound Card
Ans (A) FORTRAN is used for scientific & C. Mouse D. Joy Stick
Engineering while COBOL is oriented language
commercial and PROLOG is a general purpose logic
programming language associated with artificial
m E. None of these
Ans (B) A sound card is used to generate sound
and provides audio output to external devices like
ro
intelligence and computationallinguistics. speakers and headphones.
52. Which of the following is NOT a computer 58. What is the meaning of OSI, in terms of computers?
programming language? A. Open Software Interrelation
ch
programming languages while Microsoft is an Ans (C) The Open Systems Interconnection (OSI)
application software. model is a conceptual model that characterizes and
53. Which of the following is n t an operating system? standardizes the communication functions of
A. DOS B UNIX computing system without regard of their
w
60. Which of the following is not a method of accessing 65. You must install a (n) on a network if you
the web? want to share a broadband Internet connection.
A. modem B. ISDN A. router B. modem
C. DSL D. CPU C. node D. cable
E. None of these E. None of these
Ans (D) CPU (central Processing Unit) is a part of Ans (A) A router is a device that forwards data
the computer. All the others can be used to access packets along networks. A router is connected to at
the net. least two networks.Routers are l cat d at gateways,
61. Yahoo (www.yahoo.com) is a . the places where two or more ne works connect.
A. Website for Consumers 66. To reload a web page, press the
m
button.
B. Portal A. Redo B. Reload
C. Organization that allocates web addresses C. Restore D. Ctr
D. Super Computer E. Refresh
co
E. None of these Ans (E) In general refresh is another way of saying
Ans (B) Yahoo is one of the largest portals in the reload or updating what is being displayed in web
world. A portal is a website intended to be a page.
e.
starting point for exploring and searching the 67. mo se uses laser rays for the movement of
www. curser
62. Time during which a job is processed by the A. Mechanical mouse B. Optical mouse
computer is .
A. Execution Time
C. Real Time
B. Delay Time
D. Waiting Time
m C. Magnetic mouse
E None of these
D. Normal mouse
63. Internet Explorer is a . 68. Full form of PSU which is an internal component
A. Web Browser B. Graphing Package used to supply the power.
C. News Reader D. Any person brow ing the net A. Power supply unit
E. None of these B. Permanent supply unit
.jk
Ans (A) Internet Explorer (IE) is the most C. Placement supply unit
common web browsers . Web Browser is a D. Programmable supply unit
program that you use to su f the internet. E. None of these
64. USB in data cables stands for? Ans (A) A power supply unit (PSU) converts mains
w
A. Unicode smart Bus B. Universal structural Bus AC to low-voltage regulated DC power for the
C. Unicode Serial Bus D. Universal serial Bus internal components of a computer. Modern
w
70. Blaise Pascal has introduced ? Ans (A) An HTTP cookie is a small piece of data
A. Adding machine B. Abacus sent from a website and stored in a user's web
C. Calculator D. difference engine browser while the user is browsing that website.
76. The specifies the operation to be performed
E. None of these
and the operands provide the data on which the
Ans (A) In 1642, Balise Pascal has introduced an
operation is to be performed:
adding machine that could perform additions and
A. source code B. opcode
subtractions directly and multiplication and
C. object code D. program code
divisions by repetition.
E. None of these
71. Sending an e-mail is similar to .
Ans (B) An opcode is the p tion of a machine
A. Petering an event B. Narrating a store
m
language instruction that specifies the operation
C. Writing a letter D. Creating a drawing
to be performed. Beside the opcode itself,
E. None of these
instructions usually sp cify the data they will
co
Ans (C) Creating and sending an e-mail message
process, in form of operands.
is in many ways similar to writing a letter without
77. Which of the following is Open Source Software?
a stamp.
A. Windows B. Linux
72. You can use the bar to type a URL and display
C. IOS D. Adobe Photoshop
e.
a webpage or type a keyword to display a list of
E None of these
related webpages.
Ans (B) Linux is a Unix-like computer operating
A. Menu B. Title
syst m (OS) assembled under the model of free
C. Search
E. Address
D. Web
numbers. The elements of records may also be 86. What is an e-mail attachment?
called fields or members. A. A receipt sent by the recipient
81. A is a grid with labeled columns and rows. B. A separate document from another program sent
A. Dialog box B. Worksheet along with an e-mail message
C. Clipboard D. Toolbar C. A malicious parasite that feeds off of you
E. None of these messages and destroys the contents
Ans (B) An Excel worksheet is a single spreadsheet D. A list of CC and BCC recipients
that contains cells organized by rows and columns. E. None of these
82. An example of a telecommunication device is Ans (B) An email attachment is computer file
a . sent along with an email m ssage One or more
m
A. Keyboard B. Mouse files can be attached to any mail message and be
C. Modem D. Printer sent along with it to th recip ent.
E. Scanner
co
87. The prog am compresses large files into a
Ans (C) Modem is one that turns the digital data of smaller file.
a computer into modulated electrical signal for A. WinZip B. WinShrink
transmission over telephone lines and C. WinStyle D. Microsoft
e.
demodulated by another modem at the receiver E. None of above
side to recover the digital data. Ans (A) WinZip is a program that lets you archive
83. Programs that automatically submit your search and compress files so that you can store or
request to several search engines simultaneously
are called .
A. Metasearch engines B. Webcrawlers
m distribute them more efficiently.
88. The folder retains copies of message that
you have started but are not yet ready to send.
ro
C. Spiders D. Hits A. Inbox B. Outbox
E. None of these C. Drafts D. Sent Items
Ans (A) Metasearch engine is a search tool that E. Address Book
ch
uses another search engine's data to produce their Ans (C) A draft is simply an email message you
own results from the Internet. haven’t yet sent. It’s not the same thing as an email
84. What kind of Protocol is used to provide nternet waiting to be sent.
access from mobile? 89. Which is not an internet protocol?
.jk
technical standard fo accessing information over communications protocol in the Internet protocol
a mobile wireless network. suite for relaying datagrams across network
w
85. What is the slowest transmission medium? boundaries. Some protocols are TCP, IP, UDP, POP,
A. Twisted pair wire B. Coaxial cable SMTP, HTTP, FTP.
C. Fib r optic c ble D. All of above 90. What kind of server converts IP addresses to
w
91. POST stands for . 96. Each on a menu performs a specific action.
A. Power On Selfie Test A. Client B. Server
B. Power One Self-Test C. Node D. Command
C. Power On Self-Test E. None of these
D. Power On Self-Testing Ans (D) Command is a directive to a computer
E. None of these program acting as an interpreter of some kind in
Ans (C) The first thing that the BIOS does when it order to perform a specific task.
boots the PC is to perform what is called the Power- 97. An e-mail address typically consists f a user ID
On Self-Test. The POST is a built-in diagnostic followed by the sign and the ame of the e-mail
program that checks your hardware to ensure that server that manages the user s elect onic post office
m
everything is present and functioning properly, box.
before the BIOS begins the actual boot. A. @ B. #
C. & D *
co
92. Which of the following is a network in which
computers are located physically close together, E. None of these
often in the same building? Ans (A) An e-mail address typically consists of a
A. LAN B. WAN user ID followed by @ sign and the name of the e-
e.
C. RAM D. ROM mail se ver that manages the user’s electronic post
E. None of these o fice ox.
Ans (A) A local area network (LAN) is a computer 98. are devices used to transmit data over
network that interconnects computers within a
limited area such as a residence, school, laboratory,
or office building.
m telecommunications lines.
A Drives
C. Modems
B. Drives bays
D. Platform
ro
93. Programs such as Mozilla Firefox that serve as E. None of these
navigable windows into the Web are called . Ans (C) A modem is a device that modulates
A. Internet B. Data card signals to encode digital information and
ch
Ans (C) Boot means start (a computer) and put it office and educational slide shows.
into a stat of r adiness for operation. 100. The information stored in the catalog is
95. You click at B to make the text . called .
w