0% found this document useful (0 votes)
174 views24 pages

Computer Notes by JKSSB Study Fast

Uploaded by

hoesussanah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views24 pages

Computer Notes by JKSSB Study Fast

Uploaded by

hoesussanah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

JKSSB Study Fast (Iqbal Sir)

st
Fa
y
ud
St
B
SS
JK
JKSSB Study Fast (Iqbal Sir)

Computer
Important Points
 Computer - Latin word - Computare -means to Calculate.
 Father of Computer - Charles Babbage.
 Father of Modern Computer - Alan Turing.
 First Computer of India - Sidhartha.
 First Super computer of india - PARAM-8000.
 First Super computer of World - Cray-1.
Generation of Computer
1. First Generation - Vacuum Tube -John Ambrose Fleming
2. Second Generation - Transistor - William Shockley, John Bardeen and Walter Brattain
3. Third Generation - Integrated Circuit (IC) - Robert Noyce & Jack Kilby
4. Fourth Generation - VLSI Microprocessor - st
Federico Faggin, Ted Hoff etc.
Fa
5. Fifth Generation - ULSI Microprocessor. - Artificial Intelligence - John McCarthy
y
ud

Features of Computer :- The key features of computer are as follows


St

1. Speed :- The computer can process data very fast at the rate of millions of instructions per
B

second (MIPS). The speed of a supercomputer is measured in floating-point operations per


SS

second (FLOPS)
JK

2. Versatility :- Computers can do types of work simultaneously. They can perform multiple
tasks at the same time.

3. Diligence :- Unlike human beings, a Computer is free from monotony, tiredness, lack of
concentration, etc. and can work for hours without creating any errors.

4. Reliability :- Computers are more reliable than human beings. Computers always produce
exact results. The possibility of errors occur only if the input is wrong, i.e. the computers never
make mistakes of their own accord.
Computer Architecture/ Components Computer :-
It was introduced in 1970 by Von Nauman. Input - Processing - Output - Storage { IPOS}
CPU (Central Processing Unit) :- Also known as Brain of computer. CPU have three parts as below:
1. ALU (Arthematic Logic Unit). 2. Control Unit. 3. Register.
1. ALU (Arithmetic logic unit):- Consists of two subsections namely:
• Arithmetic section :- Performs arithmetic operations like addition, substraction, multiplication, and
division.
• Logic Section: Performs logic operations such as comparing, selecting, matching, and merging of data.
JKSSB Study Fast (Iqbal Sir)

2. Control Unit (CU) :- CU coordinates with the input and output devices of a computer. It directs
the computer to carry out stored program instructions by communicating with the ALU and
Register . It organises the processing of data and instructions.The basic function control unit is
to fetch the instruction stored in the main memory, identify the operations and the devices
involved in it and accordingly generate control signals.
3. Registers :- These are used to quickly accept, store and transfer the data and instructions
that are being used immediately by the CPU.These rigisters are top of the memory
hierarchy.(Fastest Memory).

Computer Memory
Memory is primarily of three types −
1. Primary Memory/Main Memory. . 2. Secondary Memory. 3. Cache Memory
1. Primary Memory (Main Memory) :-

Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off (Volatile Memory).

st
It is generally made up of semiconductor device. The data and instruction required to be
Fa
processed resides in the main memory. It is divided into two subcategories RAM and ROM.
y
ud

A. RAM (Random Access Memory) :- RAM is Volatile Memory (temporary storage). It is also
St

known as read/write memory that allows CPU to read as well as write data and instructions into it.
B

There are two categories of RAM :


SS
JK

(a) Dynamic RAM (DRAM):- It is made up of memory cells where each cell is composed of one
capacitor and one transistor. DRAM must be refreshed continually to store information. DRAM
is slower, less expensive and occupies less space on the computer's motherboard.

(b) Static RAM (SRAM):- It retains the data as long as power is provided to the memory chip. It
need not be refreshed periodically. SRAM uses multiple transistors for each memory cell. It
does not use capacitor. SRAM is often used as cache memory due to its high speed. SRAM is more
expensive than DRAM.

B. ROM (Read Only Memory) :- It is non-volatile memory or permanent storage. It does not lose
its content when the power is switched OFF. ROM has only read capability, no write capability.
There are three categories of ROM as follow

(a) Programmable ROM (PROM):- Once a PROM has been programmed, its contents can never
be changed.

(b) Erasable Programmable ROM (EPROM) :- It can be erased by exposure to strong ultraviolet
light, then rewritten.
JKSSB Study Fast (Iqbal Sir)

(c) Electrically Erasable Programmable ROM (EEPROM) :- It can be erased electrically. Itis now
commonly used for holding BIOS.

2. Secondary Memory :- This type of memory is also known as external memory or non-
volatile. It is slower than the main memory. These are used for storing data/information
permanently. CPU directly does not access these memories, instead they are accessed via
input-output routines. The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it. For example, disk, CD-ROM, DVD, etc.

Types of Secondary Memory

1. Magnetics Memory:- Magnetic tapes, Magnetic Disks, Hard Disk, Floppy Disks.

2. Optical Memory:- Optical Disks like CD, DVD, CD-ROM, DVD-ROM, CD-RW(CD- Rewritable), CD-
R (CD-Recordable) WORM (Write Once Read Many), Blue-ray Disks.

3. Solid State Storage : Pendrive (Flash drive), memory cards.


st
Fa
3. Cache Memory :- It is a very high speed semiconductor memory which can speed up the CPU.
y

It acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
ud

and program which are most frequently used by the CPU. The parts of data and programs are
St

transferred from the disk to cache memory by the operating system, from where the CPU can
B
SS

access them.
JK

Memory Units
Memory Units Size Size

Bit 0 &1 -

Nibble 4 Bits -

Byte 8 bits -

KB (Kilobyte) 1024 bytes 1 Thousand Bytes

MB (Megabyte) 1024 KB Million Bytes

GB (Gigabyte) 1014 MB Billion Bytes

Terabyte 1024 GB Trillion bytes

So on............
JKSSB Study Fast (Iqbal Sir)

Input Devices
 Keyboard  Microphone
 Mouse  Magnetic Ink Card Reader(MICR)
 Joy Stick
st
 Optical Character Reader(OCR)
Fa
 Light pen  Bar Code Reader
y
ud

 Track Ball  Optical Mark Reader(OMR)


St

 Scanner  Quick response (QR)


B

 Graphic Tablet
SS

Keyboard :- Discovered by Christopher Lantham Sholes.


JK

QWERTY key Layout [Total-104 keys] :- Consists of the following Keys:

 Alphabetical keys (A-Z, a-z), Number keys (0-9), Function keys (F1 to F12),

 Modifier keys (Ctrl, Alt, Shift),

 Toggle keys (Caps lock, Num-lock, Scroll lock) etc.

 Concept Keyboard - Food Restaurant & Numeric keyboard - ATM

 Escape key: (Esc]: It allows users to cancel or about operation.

 Backspace key: Used to Erase anything typed.(Or Delete one letter left side)

 Delete key: Used to Erase information from computer Memory & from Screen. (Or Delete one
letter on the right side)

Mouse :- Discovered by Douglas Engelbert. It is a Pointing device. Two types of mouses are Optical
mouse and mechanical mouse.

Left Click:- Left mouse button is used for object Selecting & double clicking

Right click: Used to open the pop-up menu.


JKSSB Study Fast (Iqbal Sir)
Graphic tablet : A flat rectangular pad which can be drawn on with a special pen called Stylus. Whatever
is drawn on it seen on •Computer Screen. It mainly used for CAD (computer aided design)

Joystick: It is a pointing device like Mouse & trackball. It is a popular device for gaming. Uses in Video
games, Aeroplane Stimulators, Industrial Machinery [Cranes]

Track ball: It is similar to mouse but a ball is on top of this.

Scanners :- Used to convert images or text on paper into a digital Format that can be used by the
computer: Types of Scanners :- • Flatbed , Handheld, Sheet-fed Scanners.

Barcode Reader :- [Point of Sale] (POS). :- is able to scan and decode barcodes.

OMR (Optical Mark Reader):- It is used to detect marks on paper.

MICR (Magnetic Ink Character Recognition) : It examines character Shape in the matrix form. Characters
are printed using special Ink, which Contains Iron particles that can be magnetised. Used in "Bank
Cheques".

OCR (Optical Character Recognition) :- It is a technique for scanning of printed pages, translating it than
using OCR software to recognise the image as ASCII [American Standard Code for Information
Interchange) text that is editable. Used for acquiring textual data from image.
st
Fa
QR (Quick response) :- contains a matrix of code
y

• Other input Devices: Webcam, Biometric Sensor, Touch Screen, Microphone.


ud
St

Output Devices
B
SS

 Monitor. Both Input-Output Devices:


JK

 Printer.  Modems
 Projector.  Network cards
 Plotter  Touch screen
 Headphones.  Headsets
 Speakers.  Facsimile (FAX)
 GPS  Audio cards/sound cards.

Monitor :- (Visual Display Unit- VDU) :- A monitor is of two kinds monochrome


display (only one color) and another & colour display monitor (can display 254
colours). The image is created by a configuration of dots also k/as "Pixels".

Types of Monitor :

1. Cathode Ray Tube : It is a Rectangular shaped monitor . CRT has Vacuum tubes.

2. Liquid Crystal Display (LCD) :- These are laptops and notepad sized PC's (Non-Emission displays)
JKSSB Study Fast (Iqbal Sir)
3. Light Emitted Diode (LED): It emits light when electric current is passed (Emission Display)

4. Thin Film Transister (TFT): It is an active-matrix LCD.

Printers :- Speed measures in Characters per second, Lines per second, Pages per second. • Resolution
of Printer-measures in -Dots Per Inch (DPI).

Types of Printers:

1. Impact Printers: It strikes paper & ribbon together to form a character. It is like a typewriter. It uses
pins or hammers that press an Inked ribbon against the paper. There are 4-types.

a) Dot Matrix Printer (Pin Printer): It forms characters using rows of pins. It can print one character at a
time.

b) Daisy wheel Printer : Here characters are fully formed on Petals (like Typewritten)

c) Line Printer: Capable of Printing an entire line of text at once.

d) Drum Printer: An old line printer technology.

2. Non-Import Printer :- They don't hit a ribbon to print. They use electrostatic & Chemical inkjet
technology. It is of 4 types:
st
Fa
a) Laser Printer, b) Inkjet Printer , c) Thermal Printer, d) Electromagnetic.
y
ud

Plotters :- These are used to print out huge graphs, designs, and other types of paper-based documents,
such as engineering drawings, business charts, construction maps, and architectural blueprints.
St
B
SS
JK

Computer Ports :-

1. Parallel Port :- It is an interface for connecting eight or more data wires. The data flows
through the eight wires simultaneously. They can transmit eight bits of data in parallel. As
result, parallel ports provide high speed data transmission. Parallel port is used to connect
printer to the computer.

2. Serial Port :- It transmits one bit of data through a single wire. Since, data is transmitted
serially as single bit. It provides slow speed data transmission. It is used to connect external
modems, plotters, barcode reader, etc.
JKSSB Study Fast (Iqbal Sir)

3. Universal Serial Bus (USB):- It is a common and popular external port available with
computers. Normally, two to four USB ports are provided on a PC. USB also has the plug and
play feature, which allows devices ready to be run.
4. Firewire:- Fastest Speed. (Peer to peer protocol)
5. PS/2 (Personal system/2):- Connects Mouse/Keyboard.

Computer Software
Sytem Software Application Software
A.System Management Program:- A.General Purpose
 Operating System  Word Processor
 Device Drivers  MS Excel (Spreadsheet)
 System Utility.  MS PowerPoint (Presentation
Software) etc.
B.System Development Program:-
B.Special Purpose
 Programing languages
 Reservation System
 Language Translators
 Attendence System
 Linker & Loader.
 st
Billing Systemetc
Fa
y

Operating System :- It consists of programs which control, cordinate and supervise the activities of
ud

various components of Computer.


St

• It provides the interface b/w Hardware & User. Eg. MS.DOS, Windows XP/2000/98, Unix, Linux. etc.
B
SS

• Linux is an open-source operating system. Linux was created in 1991 by Linus Torvalds.
JK

• BIOS (Basic Input/output system) - Important for booting. It lies in EEPROM (ROM)

• Cold Booting :- If the computer is in "off state" and we boot by switching on.

• Warm Booting: If computer is on & we restart it.

Device Drivers:- Making device functional, it act like interface between Device &

User. Important for working of peripheral devices (monitor, keyboard etc.)


Language Translator :-
1. Assembler :- Convert Assembly language into Machine Language.
2. Compilor :- Convert High level language into Machine language ( at Once ).
3. Interpreter :- Convert High level language into Machine language (Line by Line)
Programming Languages :-
 FORTRAN [Formula Translation] - IBM
 ALGOL [Algorithmic language] - European Scientists
 LISP [List Processing] - John McCarthy
 COBOL [Common Business Oriented Lang.]. - Grace Hopper
JKSSB Study Fast (Iqbal Sir)
 PROLOG [Programming Logic] - by Alain Colmerauer - Used for Artificial Intelligence.
 BASIC [Beginners's All Purpose Symbolic Instruction Code] - Kemney
 PASCAL [Programming Language] - Niklaus Wirth
 C - Dennis Ritchie
 C++ - Bjarne Strouptrup
Linker & Loader : The Linker is used during the compilation process to link object files into a single
executable file, while the Loader is used at runtime to load the executable file into memory and prepare
it for execution.

Open Source Technology 🔍 Father = Richard Stalman . 🔍 Pioneer = Linus Torvalds.


1. Open Source Software:- Software whose Source Code is Freely available to modify & distribute among
others.

2. Closed Source Software :- (Properiaty Software) :- Software that holds the source code safe &
encrypted. Users can't modify or delete part of the code.

• Free Software Foundation (Non-profit organization): Founded by - Richard Stallman (1985).


st
Fa
• Open Source Initiative (1998): Started by- Raymond & Bruce.
y
ud

Popular Open Source Softwares :-


St

 Linux - Operating System.  Android - Mobile OS.


B
SS

 Word Press - for creating websites.  Freemind


JK

 Mozilla Firefox - Browser.  Blender


 Zozilla Thunderbird - E-mail  Handbrake
 Filezila  Magento
 Python - OS Language  Ubunto
 Apache- Web server.  Open office
 Pidgin - Message Tool.  LibreOffice

Debugging :- is the process of finding and correcting errors or defects (Bug) in software or systems to
prevent improper operation.

Computer Error

1. Synthetic Error:- It occurs when we Violate any grammatical rule of programming Language.

2. Logical Error:- It occurs in the Output of Programs. Its presence leads to undesired/ incorrect Output.

3. Runtime Error:- It occurs due to some illigal Operation performed in the program

Deadlock :- is a situation where a computer process waits for a resource which is being held by another
process or a situation in which two programs sharing the same resource are preventing each other from
JKSSB Study Fast (Iqbal Sir)
accessing the resource. • The minimum number of threads or processes for a deadlock situation is 2.
The OS detects the deadlocks with the help of the Resource Allocation graph. • Deadlock detection is
supported only in Windows XP and later versions of windows.

M.S. Word {Word processing software }


How to Start M.S.Word:- 1. Start Menu - All Program - MS Office - MS Word

MS Word File Extensions - .docx


Typing Mistakes
1. Green wavy underline:- Grammatical Error.
2. Red wavy underline :- Misspell.
3. Blue wavy underline :- Wrong word used but spelled right.
Important Shortcut Keys

 Ctrl+A = All Select  Ctrl+V = Paste


st
Fa
 Ctrl+B = Bold  Ctrl+W = Close
y

 Ctrl+C = Copy  Ctrl+X = Cut


ud

 Ctrl+I = Italic  Ctrl+Y = Redo


St
B

 Ctrl+K = Hyperlink  Ctrl+Z = Undo


SS

 Ctrl+N = New Document Text Alignment


JK

 Ctrl+O = Open  Ctrl+L = Align Text Left


 Ctrl+P = Print  Ctrl+R = Align Text To Right
 Ctrl+S = Save  Ctrl+E = Align Text To Center
 Ctrl+U = Underline  Ctrl+J = Justify

 Copyright © - Ctrl + Alt + C Function Keys


 Rupee symbol - Ctrl + Alt + 4 (or Ctrl+Alt+R)  F1 - Help
 Superscript - Ctrl + Shift + +  F2 - Rename
 Subscript - Ctrl + =  F3 - Find file and folder
 Current Time = Ctrl + Shift + semi-colon (;)  F4 - Shut down/Close
 Current Date = Ctrl + semi-colon (;)  F5 - Refresh
 For Screenshot = Windows key + Print Screen  F6 - Highlight web address
key.
 F7 - Spell/Grammar Check
 Increase the font size by 1 point = Ctrl + ]
 F8 - Boot Manu
JKSSB Study Fast (Iqbal Sir)
 Decrease the font size by 1 point -- Ctrl + [  F9 - Remove Selected Items
 Delete permanently text, file etc - Shift + Delete  F10 - Action Menu
 Reboot/Restart Ctrl + Alt + Del  F11 - Full screen mode
 Save - F12 , Ctrl+S or Shift + F12  F12 - Save as
 Print Preview - Ctrl + F2
 Ctrl+Tab: Switch between different open
presentations

MS Word Terminologies :-

Thesaurus- A feature that provides synonyms or alternative words for chosen words.

Page Break:- The spot in a document where one page ends and the other starts.

Indentation :- It denotes the distance text boundaries and page margins. It offers three types of
indentation: positive, hanging and negative indent.

Page Orientation :- Two types of page orientation


st
Fa
1. Portrait - vertically oriented and
y
ud

2. Landscape - horizontally oriented.


St
B

Gutter Margin:- (Binding Area) A gutter margin adds extra space to the side, top margin, or
SS

inside margins of a document you plan to bind.


JK

Drop Cap :- A drop cap (dropped capital) is a large capital letter used as a decorative element at
the beginning of a paragraph or section. The size of a drop Caps by default 3 lines and
Maximum 10 lines.

Footer- A feature that allows the text/graphics that are marked on every page or segment,
regularly at the bottom yet can be anywhere on a page.

Header- A feature that allows text/graphics that are imprinted on every page/section, usually at
the top yet can be anywhere on a page.

Endnotes- Notes or references that resemble at the end of the document.

Footnotes- Comments or references that appear at the bottom of each page.

Indent- A feature that allows setting a temporary left or right margin for paragraph line.

Font Size: Range Max. - Min. 8 - 72 (by default - 11)


JKSSB Study Fast (Iqbal Sir)

MS Excel :- Spreadsheet
 Workbook: Collection of worksheets (By Default: 3 worksheet in a Work book)

 Cell:- Intersection of Row & Column.

 Action Cell : (Current/Working Cell) (cell currently selected)

 Columns = Letters (ABC....) &. Rows = Number (123.....)

 Total No. Rows = 1048576 &Total No. Of Columns = 16,384.

 Wrap text: If a line of text is too long, click Wrap Text to make it all visible

 By default alignment in MS Excel :-

 Text = left aligned & Numbers = right aligned.

 Macro :- is a set of automated instructions that perform a specific repeated task in Excel. Visual
st
Fa
Basic for Applications (VBA) is a programming language used to create macros.
y

 Formula ( = is equal to sign is used)


ud
St

 Function:- Predefined formula in MS Excel is called Functions. There are 5 types of functions in
B

MS Excel eg.
SS
JK

=SUM (A1:A4)
=AVERAGE (B2:B17)
=COUNT (A2:A18)
=MAX (B8:B14)
=MIN (A1:A17)
• Charts and Graphs: Users can create visually appealing charts and graphs from their data to illustrate
trends, comparisons, and patterns. Excel offers various chart types, including bar charts, line charts, pie
charts, and more.
Types
1. Relative - A1
2. Absolute - $A$1
3. Mixed - $A1 or A$1
Shortcut Keys

F2 - Edit the selected cell Shift+F5. - Bring up search box

F5 - Go to a specific cell Ctrl+5. - Strike through highlighted selection


JKSSB Study Fast (Iqbal Sir)

F7 - Spell check selected Ctrl + F9 - Minimize current workbook

F11 - Create chart Ctrl + F10 - Maximize currently selected workbook

Ctrl + Space - Select the entire column Alt+ Shift+ F1 - Insert the new worksheet

Shift + Space - Select the entire row Shift + F3 - Open the excel formula

Ctrl + 0 - Hides the selected columns

Ctrl + 9 - Hides the selected Row

Computer Terminology
Hardware :- The physical components of the computer system, such as the hard drive, disc drives, and
modem.

Software :- The programs or instructions that tell the computer what to do, such as word processors,
spreadsheets, and databases.

st
Piracy :- The illegal copying of software or other creative works.
Fa
Pixels :- An acronym derived from .picture element. The smallest element (a dot) on a display screen
y
ud

Spam :- Irrelevant or unsolicited messages sent over Internet, typically to large numbers of users, for the
St

purpose of advertising. phishing spreading malwares, etc


B
SS

Soft copy :- An electronic copy of data, such as a file viewed on a computer screen or sent as an email
attachment. Soft copies can be text files, images, or videos.
JK

Hard copy :- A physical copy of data, such as a printed document or a file stored on a thumb drive. Hard
copies are also known as printouts

Template :- A pre-established format for a document, stored in a computer.

Accumulator :- A local storage area called a register, in which the result of an arithmetic or logic operation is
formed It contains a single data register.

Application Software :- Application software is a subclass of computer software that employs the
capabilities of a computer directly to a task that the user wishes to perform. e.g., word document,
spreadsheet, etc.

Artificial Intelligence :- Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are being used today.

ASCII :- (American Standard Code for Information Interchange) is a character set and a character encoding
based on the Roman alphabet as used in Modern English and other Western European languages.

Bar Code :- A bar code is a machine-readable representation of information in a visual format on a surface.
The first bar code system was developed by Norman Joseph Woodland and Bernard Silver in 1952.

Basic Input/Output System (BIOS) :- It is also known as ROM BIOS. It provides an abstraction layer for the
JKSSB Study Fast (Iqbal Sir)
hardware, i.e., a consistent way for application programs and operating system to intract with input/output
devices.

Booting :- Booting is a bootstrapping process which starts the operating system when a computer is
switched on

Bit :- A bit is the most basic information unit used in computing and information theory.

Browser :- A special software that enables users to read/view web pages and jump from one web page to
another.

Bug :- A software bug is an error, flaw, failure, or fault in a computer program or system that produces an
incorrect or unexpected result.

Bus :- A circuit that provides a communication path between two or more devices of a digital computer
system.

Cookie :- A packet of information that travels between a browser and the web server

Encryption :- In cryptography, encryption is the process of encoding messages (or information) in such a
way that hackers cannot read it, but authorised users can access it.

st
Firewall :- A security system usually consisting of hardware and software that prevents unauthorised
Fa
persons from accessing certain parts of a programme database or network .
y

Firmware :- Firmware is a technology which has the combination of both hardware and software . It
ud

provides necessary instructions for how the device communicates with others computer hardware .
St

Icon :- A symbol (such as picture or a folder) that represents a certain function on your computer. When the
B
SS

user clicks on the icon, the appropriate function is executed.


JK

Machine Language :- The language of computer also called binary language. Instructions in this language
are written as a sequence of O's and l's.

Macro :- A script that operates a series of commands to perform a function. It is set up to automate
repetitive tasks.

Patch :- A small program that improves ,,i piece of software or corrects an error in

Peripheral : Peripherals device refer to the hardware devices external to a computer.

Computer Abbreviations DNS - Domain Name System

URL Uniform Resource Locator DPI - Dots Per Inch

WWW World Wide Web FTP - File Transfer Protocol

USB Universal Serial Bus FLOPS - Floating Point Operations Per Second

VIRUS Vital Information Resource Under Siege GIF - Graphic Interchangeable Format.

TCP Transmission Control Protocol GUI - Graphical User Interface

UPS Uninterruptible Power Supply ARPANET - Advanced Research Projects Agency


Network
SMPS Switched Mode Power Supply
BCD - Binary Coded Decimal
CRT Cathode Ray Tube
CD - Compact Disk
JKSSB Study Fast (Iqbal Sir)
PNG. Portable Network Graphics DVD - Digital Versatile Disk
CAD Computer-Aided Design DOS - Disk Operating System
HTTPS HyperText Transfer Protocol Secure DNS - Domain Name System
HTML - Hyper Text Markup Language ISP - Internet Service Provider
DHTML - Dynamics Hyper Text Markup IP - Internet Protocol
Language
JPEG. - Joint Photographic Expert Group
ASCII - American Standard Code for
Information Interchange LCD - Liquid Crystal Display
CC. - Carbon Copy LED - Light Emitting Diode
BCC - Blind Carbon Copy

MS PowerPoint :- Presentation Software.


Terms in PowerPoint

1. AutoContent Wizard:- Quickest way to Creat PowerPoint Presentation.

2. Template:- (Presentation design) A file which contains readymade styles.


st
Fa
3. Slide Transition: A special effect used to introduce slide in a slide show. It is how one slide removed
from the screen and the next slide is displayed during a presentation.
y
ud

4. Animation :- Special effects used in Slide.


St

5. Rehersal :- Custom Timing for slide in a presentation.


B
SS

6. Default Page Orientation in MS PowerPoint - Landscape


JK

7. Motion Path:- Method of moving objects/items on Slide.

8. OLE = Object Linking and Embedding.

Types of Views

1. Normal View :- This is the default view in PowerPoint and this is primarily used to create and edit
slides. You can create/ delete/ edit/ rearrange slides, add/ remove/ modify content and manipulate
sections from this view.

2. Outline view :: to create an outline or story board for your presentation. It displays only the text on
your slides, not pictures or other graphical items

3. Slide Sorter View :- all the slides in your presentation in horizontally sequenced, thumbnails. Slide
show view is helpful if you need to reorganize your slides.

4. Slides Show :-Use Slide Show view to deliver your presentation to your audience. Slide Show view
occupies the full computer screen, exactly the way your presentation will look on a big screen when your
audience sees it.
JKSSB Study Fast (Iqbal Sir)
5. Print Preview :- Print preview is a feature that displays on the screen what a hard copy would look like
when printed. Background colour or effects applied to a document is not visible in Print Preview. (Ctrl +
F2 )

Image File Extensions


1. GIF (gif)- Graphic Interchange Format
2. JPEG (.jpeg/.jpg): Joint Photographic Expert Group.
3. BMP (.bmp):- Bitmap image file.
4. PNG (.png) Portable Network
Audio/Music File Extensions
1. WAV (.wav) :- Wave form audio file 2. MIDI (•midi or •mid ) Musical Instrument Digital.
Shortcut Keys
 F5. - View the Slide Show.
 Ctrl+M - New Blank Slide
 Ctrl + N - New Blank Presentation
st
Fa
 S - Stop the slide show press S again to restart the slide show.
y

 Esc - End the slide show.


ud

 Placeholder: The term “placeholder” is used to identify the containers on a slide which are shown
St

with a dotted external border. Placeholders are specifically used to position different types of
content on the slide and are preformatted for you to provide consistent formatting between each
B

slide.
SS
JK

Outline pane: The Outline pane appears at the left, showing only the text in your presentation.

Slide pane: Slide pane contains the current slide in your presentation. You can use the vertical scroll bar
to view other slides in the presentation. Notes pane is located below the slide pane and is used to type
reference notes.

Microsoft Access
A database is a collection of logically related and similar data. Database stores similar kind of data for a
specific purpose that is organised in such a manner that any information can be retrieved from it, when
needed. Microsoft Access is an application which allows the creating of databases. Microsoft Access is
a Relational Database Management System (RDBMS).

• Column = Field / Attributes & Rows = records/Tuples.


PDF (Portable Document Format}• Developed by: Adobe (in 1990s)
• Adobe Acrobat Reader is a OSS for reading PDFs. It is free and available for Windows, macOS, iOS &
Android.
• In 1991 - Adobe co founder Dr. John Warnock the paper to digital Revolution" Project.
with the idea is called Camelot Project • Latest Version is " Acrobat (version 15.0).• By 1992 - Camelot
had developed into PDF. • Before 2008 PDF was a Proprietary Format controlled by Adobe but after
1,july 2008 it became Open Standard.
Internet (I nternational Network/Network of Networks)

 Father of Internet- Vint Curf.

 First Network - ARPANET (Advanced Reasearch Project Agency Network) (1969).

 Every Computer on internet is identified by a unique IP address.

• IP Address:- It is a unique set of four numbers (0-256) Like -{110.22.33.112}.

IP address is of two types 1. IPV4 = 32 bits & 2. IPV6 =128 bits

• Uniform Resource Locator (URL) :- URL is the address of a document you'll find on the WWW. • The
elements in a URL:

Protocol://server's address/filename

Example: https://www.google.com.index.html

Internet Protocols

TCP/IP (Transmission Control Protocol/ Internet Protocol) PPP (Point-to-Point Protocol)

HTTP (Hyper Text Transfer Protocol)


st FTP (File Transfer Protocol)
Fa
HTTPS (HyperText Transfer Protocol Secure) SFTP (Secure File Transfer Protocol)
y
ud

TELNET (Terminal Network-Remote) ICMP :- Internet Control Message Protocol


St

SMTP (Simple Mail Transfer Protocol) UDP : User Datagram Protocol.


B
SS

POP3(Post Office Protocol 3) IMAP : Internet Messaging Access


JK

Protocol

Domain Names

 .in - stands for India (country name)  .net - network organisations

 .gov - indicates government agencies  .edu - educational organisations

 .org - non-profit organisations  .mil - military or defence

 .com - commercial organisations

WWW (World wide Web) by- Tim Berner's Lee (1989).The World Wide Web is a system of interlinked
hypertext documents accessed via the Internet. With a web browser one can view web pages that may
contain text, images, videos, and other multimedia and navigate between them via hyperlinks.

• Web Browsers :- Firefox, Google Chrome, Microsoft edge, Apple saffari, Opera, Brave ,Vivaldi etc.

• Search Engines :- Google, AltaVista, Yahoo, Hotbot, Lycos, Excite, WebCrawler etc.

Types of Communication

1. Simplex Channel :- In this channel, the flow of data is always in one direction, with no capability to
support response in other direction. This communication is unidirectional. Only one of the
communicating devices and the other can only e.g. Radio, Television, information etc.

2. Half Duplex channel:- In this channel, the data can flow in directions, but not at a same time. Wh one
device transmits other can only receive at informatioir) that point of time. e.g. Walkie Talkie.

3. Full Duplex Channel :- In this channel, the flow of data is in both directions at a time, i.e. both stations
can transmit and receive information simultaneously. e.g. Wireless handset (mobile phone).

Networking Devices

Modem: Modem stands for Modulator- Demodulator. It is used to connect computers for
communication via telephone lines. It converts Analog signal into Digital and vice versa.

Hub: It just acts like a connector of several computers i.e. simply connects all the devices on its ports
together. It broadcasts all the data packets arriving at it.

Switch: It is used for dividing a network into segments called subnets. It provides filtering of data
packets and prevents network traffic also.
st
Fa
Repeater: It is used to amplify (multiply) a signal that has lost its original strength so as to enable them
y

to travel long distances.


ud

Router: It is used to connect different networks that have different architectures and protocols. It sends
St

the data packets to desired destination by choosing the best path available thus reducing network
B

traffic. It routes the data packets using the routing table that contains all the Information regarding all
SS

known network addresses, possible paths and cost of transmission over them.
JK

Gateway: It can be used to connect two different networks having different architectures, environment
and even models. It converts the data packets in form that is suitable to the destination application. The
two different networks may differ in types of communication protocols they use, language, data formats
etc.

Bridge: They are used two connect two LANs with the same standard but using different types of cables.
It provides an intelligent connection by allowing only desired messages to cross the bridge thus
improving performance.
Network Topology

Topology is the geometric arrangement of a computer system. Each computer system in a topology is
known as a node. Network topology is determined only by the configuration of connections between
nodes.

1. Bus Topology: A bus topology is such that there is a single line to which all nodes are connected and
the nodes connect only to this bus.

2. Mesh Topology: This type of network topology contains at least two nodes with two or more paths
between them.

3. Ring Topology: In this network topology, every node has exactly two branches connected to it. The
ring is broken and cannot work if one of the nodes on the ring fails.

4. Star Topology: In this network topology, the peripheral nodes are connected to a central node, which
rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network,
including the originating node.

5. Tree Topology: This is a network topology in which nodes' are arranged as a tree. The function of the
central node in this topology may be distributed.

st
Fa
y
ud
St
B
SS
JK

Types of Network :
 PAN - Personal Area Network eg. Bluetooth
 LAN - Local Area Network eg. Ethernet, Wifi.
 MAN - Metropolitan Area Network eg. Cable tv network
 WAN - Wide Area Network. Eg. Internet.
 VPN = Virtual Private Network
 WLAN = Wireless Local Area Network
 SAN = Storage Area Network
Types of Internet Connection

1. Dial-Up Connection

A dial-up connection is established between your computer and the ISP server using a modem. A dial-up
Connection is a cheap and traditional connection that is not preferred these days as this type of
connection is very slow.

2. Broadband Connection

Broadband refers to high-speed internet access that is faster than traditional dial-up access. It is
provided through either cable or telephone composition. It does not require any telephone connection
that’s why here we can use telephone and internet connection simultaneously. In this connection, more
than one person can access the internet connection simultaneously.

It is a wide bandwidth data transmission that transports several signals and traffic types. In this
st
connection, the medium used is coaxial cable, optical fiber cable, radio, or twisted pair cable.
Fa
3. DSL (Digital Subscriber Line)
y
ud

DSL stands for Digital Subscriber Line. It provides an internet connection through the telephone
St

line(network). DSL is a form of broadband communication that is always on, there is no need to dial a
B

phone number to connect. DSL connection uses a router to transport data and the speed of this
SS

connection range between 128k to 8Mbps depending on the service offered. A DSL connection can
JK

translate data at 5 million bytes per second, or 5mbps.

E-mail :- :-Ray Tomlinson 1971 (1st message sent by him was QWERTYUIOP.

[email protected] eg. [email protected]

E-mail supports-

 POP3 (Post office protocol 3) for recieving mails.

 SMTP (Simple Mail Transfer Protocol) For sending mails/messages.

 IMAP (Internet Messaging Access Protocol). - for. Storing messages.

 Outlook Express - E-mail Internet Explorer.

What is Switching?

In computer networking, Switching is the process of transferring data packets from one device to
another in a network, or from one network to another, using specific devices called switches

Types of Switching :- There are three types of switching methods:

1. Message Switching
2. Circuit Switching

3. Packet Switching

1. Message Switching: This is an older switching technique that has become obsolete. In message
switching technique, the entire data block/message is forwarded across the entire network thus, making
it highly inefficient.

2. Circuit Switching: In this type of switching, a connection is established between the source and
destination beforehand. This connection receives the complete bandwidth of the network until the data
is transferred completely.

This approach is better than message switching as it does not involve sending data to the entire
network, instead of its destination only.

3. Packet Switching: This technique requires the data to be broken down into smaller components, data
frames, or packets. These data frames are then transferred to their destinations according to the
available resources in the network at a particular time.

This switching type is used in modern computers and even the Internet. Here, each data frame contains
additional information about the destination and other information required for proper transfer through
network components.

Terms Related to Network


st
Multiplexing :- It is a technique used for transmitting signals simultaneously over a common medium. It
Fa
involves single path and multiple channels for data communication.
y
ud

Code Division Multiple Access (CDMA) It is a channel access method used by various radio
St

communication technologies. CDMA employs spread spectrum technology and a special coding
scheme, where each transmitter is assigned a code to allow multiple users to be multiplexed over the
B
SS

same physical channel.


JK

Public Switched Telephone Network (PSTN) It is designed for telephone, which requires modem for data
communication. It is used for FAX machine also.

Integrated Services Digital Network (ISDN) It is used for voice, video and data services. It uses digital
transmission and combines both circuit and packet switching.

Ethernet :- It is a widely used technology employing a bus technology. An ethernet LAN consists of a
single co-axial cable called Ether. It operates at 10 Mbps and provides a 48-bits address. Fast ethernet
operates at 100 Mbps.

Token :- It is a small message used to pass between one station to another

HyperText Markup Language (HTML) :- It is used for designing Web pages.

DHTML :- or Dynamic HTML, is a web-development technique combining HTML, CSS, and JavaScript to
create dynamic, interactive web pages and complex web applications.

Telnet Protocol :- Telnet is a text-based network protocol that facilitates remote computer access

Cookie :- is a small message given to a Web browser by a Web server. It stores information about the
user's Web activity.

Bookmarks :- are links to Web pages that make it easily to get back to your favourite places.
VOLTE :- Voice over Long-Term Evolution is an LTE high-speed wireless communication

VoIP :- Voice over Internet Protocol makes communication more accessible and affordable. Common
examples of VoIP apps include Skype, WhatsApp, Viber, Google Hangouts, Facebook Messenge

OSI Model :- OSI = Open Systems Interconnection. The OSI reference model was developed by ISO –
‘International Organization for Standardization‘, in 1984. it works on 7 layers.

Malware :- Malicious Software st


Fa
Trojan Horse: It is non-self replicating" type of Malware which faciliate unathorised access to user's
y
ud

computer. [By Falsifying). eg. Beart, Sub 7 Zeus.


St

Spyware: It is a program which is installed on a Computer to spy on the system owner's activities &
B

collects all the information eg keylogger.


SS

Virus : A virus is a malicious executable code attached to another executable file that can be harmless
JK

or can modify or delete data. When the computer program runs attached with a virus it performs some
action such as deleting a file from the computer system. Viruses can’t be controlled by remote

Worms (Write Once Read Many) By Robert Morris . It is a "standalone Malware" that can automatically
propagate or self-replicate without human interaction, enabling its spread to other computers across a
network. It causes slow down the computer system.

Ransomware: It holds computer system captive while demanding Ransom.

Adware: Advertising-supported Software es pop-up adds.

Phishing :- Acquired Sensitive information such a Passward, Creadit card et by falsifying

Spooking :- Access the unathorised data

Salami Technique :- Small amount money from large No. of accounts. es. Rs.1. from.

Hacking :- Introducing into seone's else's computer / Network.

Spam: Unsolicited bulk Messages in the form of E-mail [Junk e-mail ].


Types of Malware?

Type. What It Does

 Ransomware- Disables victim's access to data until ransom is paid

 Spyware. Collects user activity data without their knowledge

 Adware. Serves unwanted advertisements

 Trojans. Disguises itself as desirable code

 Worms. Spreads through a network by replicating itself

 Rootkits. Gives hackers remote control of a victim's device

 Keyloggers. Monitors users' keystrokes

VIRUS:- A computer virus is a type of program that, when executed, replicates itself by modifying other
computer programs and inserting its own code.

VIRUS = Vital Information Resources Under Siege.

First ever Virus is Creeper (1971) by Bob Thomas.

First PC Book Sector Virus Brain (1986) developed by Amjad Farooq Alvi from Pakistan & First Indian
Virus is also Brain. st
Fa
y

Elk Cloner 1982 for the Apple II Systems was created by Richard Skrenta.
ud
St

Types of computer viruses:


B

Boot Sector Virus :- It affects the boot sector. This virus enters ,the system when computers are booted
SS

from floppy disks. Nowadays, these viruses can even penetrate in forms of physical media such as
JK

external hard drives or USBs. Brain is the first PC Boot sect Post

Direct Action Virus :- When a virus connects itself directly to a .exe or .com file and penetrates the
device while its execution is named a Direct Action Virus. It is also known as a Non-Resident Virus as it
does not install itself.

Resident Virus :- Unlike Direct Action Virus this type of virus installs itself in the primary memory of the
computer and then infects other files and programs. A resident virus can affect anytime when an
operating system loads; heading towards file and program corruption. These viruses are hidden in the
memory and are hard to find and removed from the system.

Multipartite Virus :- It can infect and spread in various ways. It can infect multiple parts of the system
including program files, memory files, and boot sector.

Overwrite Virus. :- One of the most damaging viruses, the overwrite virus can fully remove the existing
program and substitute it with the malicious code by overwriting it. These types of viruses generally
spread through emails and are difficult to trace, to remove the virus one needs to delete the infected file.

Polymorphic Virus :- A polymorphic virus is difficult to track or remove as these viruses alter their code
each time an infected file is executed. Spread through spam and infected websites.

Spacefiller virus :- As the name implies, this type of virus fills in the empty spaces of a file with viruses
without affecting the size of the file such that the user cannot detect it easily. It is also recognized as a
"cavity virus".

Macro Virus :- It infects files that are created using certain applications or programs that contain
macros, e.g. Melissa.A

Year Name of Virus

 1971 Creeper  2000. I Love You  2010. Stuxnet

 1982 Elk Cloner  2001 Code Red  2011 Trojan

 1986. Brain.  2003 SQL  2012 Rootkit


Slammer
 1988 Morris  2014. Generic
Internet Worm  2003 Blaster PUP

 1999 Melissa  2004 Sasser  2014 Net Worm

Time Bomb Vs Logic Bomb?

✓ Time Bomb: It is a virus program that performs an activity on a particular date.

✓ Logical Bomb: It is a destructive program that performs an activity when a certain action has occurred.

🔍 A Logic bomb can have various triggers, such as specific events or user actions, while a time bomb relies
st
solely on the passage of time to activate and execute its payload
Fa
IT Act 2000 :- Notified on 17 October 2000 & Enacted 9 June 2000. Introduced by = Pramod Mahaja. Dealing
y

With = Cybercrime & E-Commerce.


ud
St

 IT Act - 2000 have Chapter 13, Sections 90


B

 IT Amendment Act = 2008.


SS
JK

Anti-virus:-It is a program /utility software, which protect your PC/Laptops from Malwares. First Antivirus -
Reaper was designed by Bob Thomas to delete Creeper.

Popular Anti Viruses:-It is a utility software which protects your PC/Laptops from Malwares.

 AvastAVG  QuickHeal  K7  Kaspersky.

 MacAfee.  Norton.  Bitdefender  Trend Micro

Firewall :- It can either be software based or hardware based and is used to help in keeping a network
secure.

 Its primary objective is to control the incoming and outgoing network traffic by analyzing the
data packets and determining whether it should be allowed through or not, based on a
predetermined rule set.

 A network's firewall builds a bridge between an internal network that is assumed to be secure
and trusted, and another network, usually an external (inter) network, such as the Internet, that is
not assumed to be secure and trusted.

 A firewall also includes or works with a proxy server that makes network requests on behalf of
workstation users.

Software Piracy :- means copying of data or computer software without the owner's permission.

You might also like