Computer
Computer
CONTENTS
History of Computer ....................................................................................................................................................................................................................................................................................... 2
Generations of Computer ................................................................................................................................................................................................................................................................. 4
Types of Computer ............................................................................................................................................................................................................................................................................ 4
Input Devices ...................................................................................................................................................................................................................................................................................... 8
Output Devices ................................................................................................................................................................................................................................................................................. 10
Software & Operating System ..................................................................................................................................................................................................................................................................... 17
Software ............................................................................................................................................................................................................................................................................................ 18
System Software ............................................................................................................................................................................................................................................................................... 18
Programming languages: ....................................................................................................................................................................................................................................................................... 18
Application Software ....................................................................................................................................................................................................................................................................... 19
Operating System ............................................................................................................................................................................................................................................................................ 20
Type of Operating System ..................................................................................................................................................................................................................................................................... 22
Some Abbreviations......................................................................................................................................................................................................................................................................... 24
MS – Office .................................................................................................................................................................................................................................................................................................... 27
MS-Word .......................................................................................................................................................................................................................................................................................... 27
Shortcut Keys in MS-Word ............................................................................................................................................................................................................................................................ 31
MS-Excel........................................................................................................................................................................................................................................................................................... 36
Some Important Functions used in MS-Excel: .................................................................................................................................................................................................................................... 39
Shortcut Keys for MS-Excel ........................................................................................................................................................................................................................................................... 44
Ms Powerpoint ................................................................................................................................................................................................................................................................................. 51
Shortcut Keys for Power Point ............................................................................................................................................................................................................................................................. 52
Internet & E-Mail ......................................................................................................................................................................................................................................................................................... 54
Some Protocols:................................................................................................................................................................................................................................................................................ 55
Web Browsers .................................................................................................................................................................................................................................................................................. 56
Search Engine .................................................................................................................................................................................................................................................................................. 57
Features of e-mail ............................................................................................................................................................................................................................................................................ 60
E-Banking ......................................................................................................................................................................................................................................................................................... 61
Networking & Cyber Security ..................................................................................................................................................................................................................................................................... 64
Types Of Networks .......................................................................................................................................................................................................................................................................... 65
Types of Data Communication ....................................................................................................................................................................................................................................................... 67
Network Topology ........................................................................................................................................................................................................................................................................... 68
Hacking, Hacker and Cracker .............................................................................................................................................................................................................................................................. 75
Data Representation ..................................................................................................................................................................................................................................................................................... 79
Types of Number System ................................................................................................................................................................................................................................................................ 79
Conversion between the Number Systems .................................................................................................................................................................................................................................... 80
Computer Codes............................................................................................................................................................................................................................................................................................ 81
Logic Gates ....................................................................................................................................................................................................................................................................................... 82
OSI Model ...................................................................................................................................................................................................................................................................................................... 84
Development of Computer ........................................................................................................................................................................................................................................................................... 90
M.S. Office ..................................................................................................................................................................................................................................................................................................... 93
M.S. Window ................................................................................................................................................................................................................................................................................................. 94
M.S. Office-365 .............................................................................................................................................................................................................................................................................................. 95
Abbreviations .............................................................................................................................................................................................................................................................................................. 107
Page | 1
Course Enquiry
Index: Computer PYQ
Click on the Exam name for Questions
Class – 1
History of Computer
Computer
1. An electronic device that consists of hardware and software.
2. Hardware components describe the physical parts of the
computer.
3. Software controls hardware and run the operating system,
different programs and applications.
4. A computer system comprises a CPU, memory, input/output
devices and storage devices. Radhika Goel Mam
(SSC CGL Selected)
History
1. It started with the birth of abacus, a wooden rack holding
two horizontal wires with beads strung on them.
2. In 1642, first mechanical computer was developed
by Blaise Pascal in 1642
3. In 1833, Charles Babbage conceived an automatic calculator
or computer which is why he is called as the Father of computer. ABACUS
4. In 1890, Punched cards (Tabulating machine) were used by Herman Hollerith and James
Powers. These could read the information that had been punched into the cards
automatically without human help.
Page | 2
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
5. Punch cards using computers (Turing machine) was created by IBM (International
Business Machines). These were electromechanical devices. These could add, multiply and
sort.
6. In 1945, ENIAC (Electronic Numerical Integrator and Computer), a high speed electronic
computer was developed by John P. Eckert, John W. Mauchly and their associated at
Moore school of Electrical Engineering of University. It was formally introduced in 1946.
§ It occupied entire 30 by 30 feet room.
§ Was about 1000 times faster than previous computers and used 18,000 vacuum
tubes.
7. In 1950, magnetic core memory and transistor circuit element of digital computerswere
used.
8. In 1980s, manufacturing of semi-conductor chips was done.
SEMI-CONDUCTOR CHIP
Facts:
1. First computer programme was developed by Lady Ada Augusta, a student of Babbage.
2. December 2 is observed as Computer Literacy Day.
3. First computer made in India was Siddharth, which was manufactured by Electronics
Corporation of India.
Page | 3
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
4. First computer in India was installed in the Main Post Office in Bengaluru.
5. First super computer of the world is CDC 6600 released in 1964.
Generations of Computer
Generation Period Main components Examples
I 1940-56 Electronic valve EDSAC, EDVAC,
vacuum tube UNIVAC
II 1957-63 Transistor IBM-700,1401,
1620 CDC-1604,
3600, ATLAS,
ICL-1901
III 1965-71 Integrated circuit IBM-360, 370,
NCR- 395, CDC-
1700, ICI-2903
IV 1971-Present Large integrated APPLE, DCM
circuit
V ------ Optical fibre,
Artificial
Intelligence
Types of Computer
Ø On the basis of data handling capabilities, there are three types of computers:
§ Analog computer
§ Digital computer
§ Hybrid computer
Ø On the basis of computing power and speed there are following types of computer:
§ Personal computer
§ Workstation
§ Minicomputer
§ Main frame
§ Super computer
Page | 4
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
1. Analog Computer
• These involve data that continually changes and does not have discrete values. Eg: Mercury
thermometer, Speedometer
2. Digital Computer
• These accept the raw data as input, done in binary numbers (0 and 1). Eg: Laptop, Desktops,
Smart phones etc.
3. Hybrid Computers
• These have features of both digital and analog computers. These can process both discrete and
continuous data.
• Eg: processors used in petrol pumps ( as they calculate both quantity and price).
4. Personal Computer or Microcomputer
• Based on microprocessor technology enabling manufacturers to put an entire CPU on a single
chip. Eg: Laptop or notebook computer
5. Workstation
Page | 5
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Computer that is used explicitly for engineering applications like CAD/CAM, software
development, desktop publishing.
6. Mini Computer
Page | 6
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Control unit
• CU controls sequential instruction execution, interprets instructions and guides data flow
through computer’s memory, ALU and input or output devices.
Page | 7
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Registers
• Storage locations that hold instructions or data while CPU is using them.
Input/Output
• Input enables us to enter data into a computer. Eg: Keyboard and Mouse
• Output enables the computer to show the results. Eg: Printer, Monitor, Speakers etc.
• Input-output devices are also called peripheral devices.
• These are also called interface as they translate information for man and machine.
Input Devices
Ø OMR (Optical Mark Recognition) is an input device capable of reading specially prepared
forms which have a provision for black marks in a specific positions.
Ø MICR (Magnetic Ink Character Recognition) is an input device used by the banks.
Ø BCR (Bar code reader) is able to scan and decode barcodes.
Ø QR (Quick response) contains a matrix of code.
Keyboards
Consists of following keys:
• Alphabetical keys (A-Z, a-z), Number keys (0-9), Function keys (F1 to F12), modifier keys
(Ctrl, Alt, Shift), Toggle keys (Caps lock, Num-lock, Scroll lock) etc.
• There are 104 keys in standard keyboards, and 17 keys in number pad.
Mouses
• There are two types of mouses: Optical mouse and mechanical mouse
Track ball
• Pointing device that can be used instead of mouse
Page | 8
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Light pen
• Used for digital signature. It can work with any CRT based monitor.
Stylus
• Pen shaped input device that is used to draw or write on the screen of a graphic tablet.
Page | 9
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Output Devices
Monitor
• Known as standard output device.
It is of the following types:
1. CRT (cathode ray tube)
2. TFT (thin film transistor)
3. LCD (Liquid crystal display)
4. LED (Light emitting diode)
• On the basis of colours, monitors can be divided into monochrome monitors and colour
monitors.
Printers
Impact printers
• Use hammer and ribbon on the paper directly.
• Ex: Daisy wheel, Dot matrix, Line printers
• This mechanism is known as electromechanical
mechanism. They are of two types:
• Character printers
• prints only one character at a time
• relatively slower speed.
• Eg: Dot Matrix printers
• Line printers
• Prints one entire line of text at a time.
Non-impact printers
• Does not use hammer and ribbon for printing.
• Also does not strike the paper directly.
• Eg: Inkjet, Laser, thermal printers etc.
Printers generally come in three popular versions:
Ø Dot matrix printers
Ø Ink-jet printers
Ø Laser printers
Page | 10
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Dot Matrix Printer Inkjet Printer Laser Printer
Prints characters in the form Prints fully formed characters. Prints fully formed characters.
of dots.
Speed: 200-540 characters per Speed: 4-8 pages per minute. Speed: 4-20 pages per minute.
second.
Not very expensive Moderately priced. Expensive.
Plotters
• Used to produce high quality, accurate and bigger drawings.
• Used in CAD, CAM applications such as house maps, banners, hoardings, car parts etc.
Computer Memory
• It is used to store data and instruction. It is three types:
1. Cache Memory
2. Primary or Main Memory
3. Secondary Memory
Cache Memory
1. Very high speed semiconductor memory.
2. Acts as a buffer between CPU and the main memory.
3. Used to hold those parts of data and program which are most frequently used by CPU.
4. Much faster than main memory and consumes less access time than main memory.
5. Stores data for temporary use.
6. Its very expensive.
Page | 12
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
8. CD is an optical medium and it is read by using a laser beam
9. DVD is also an optical medium.
10. Eg:
a. Floppy discs (1.44 mb)
b. CDs (700mb)
c. DVDs (4.7 GB)
d. Memory cards
e. USB sticks
11. SASD- Sequential Access Storage Device
12. BRD-
a. Blue Ray disc
b. 25 GB in single layered
c. 50 GB in double layered
13. HVD
a. Holographic Disc
b. TB for users
c. 6 TB for scientists.
Flash Memory
• Electronic, non-volatile memory, pen-drive and memory card
Virtual memory
• To lead an application, storage borrowed from the hard-disk is called the virtual memory.
Units of memory
• A computer system uses binary numbers to store and process data.
• The binary digits 0 and 1 are basic units of memory and are called bits.
• Bits group together to form words.
• A4-bit word is called nibble and 8-bit word is called a byte.
Further
• BB (Bronto Byte) 1 BB= 1024 YB
Page | 13
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 14
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Ports
• Connection point acts as an interface between the computer and external devices like printers,
modems etc.
There are two types of ports:
1. Internal Port: It connects the system’s motherboard
to internal devices like hard disk, CD drive, internal
Bluetooth, etc.
2. External Port: It connects the system’s motherboard
to external devices like a mouse, printer, USB, etc.
Facts:
1. Hardware comprises of the physical units of a computer system.
2. Software is a set of programs.
3. Data are raw facts and figures.
4. Operating system is an interface between the user and the computer hardware.
5. Some popular operating systems are DOS, UNIX, Windows, LINUX, Mac OS etc.
6. Database is a collection of interrelated data.
7. MS Access is a powerful program to create and manage our databases.
Windows explorer
• New name = File explorer
• Divided into two parts.
• Left side displays disk drives and folders in hierarchical order.
• Right side displays the contents of the folder.
Keyboard Shortcuts
± Ctrl + A Select all
± Ctrl + B Bold
± Ctrl + C Copy
± Ctrl + E Centre Alignment
± Ctrl + I Italics
± Ctrl + J Justified Alignment
± Ctrl + L Left Alignment
± Ctrl + N New blank document
Page | 16
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
± Ctrl + O Open existing document
± F12 Save as
± Ctrl + R Right Alignment
± Alt + Tab Switch to next opened program
± Ctrl + Y Redo
± Ctrl + Z Undo
± Ctrl + W Close file
± Ctrl + X Cut
± Ctrl + V Paste
± Ctrl + S Save
± F7 Spell Check
± F2 Edit/Rename
± Ctrl + Home Go to the beginning of the file
± Ctrl + End Go to the end of the file
± Alt + Shift+ Tab Switch to previous opened program
± Alt + F4 Close window/ Shut down
± Ctrl + U Underline
± Ctrl + P Print
± Ctrl + K Hyperlink
Glossary
ENIAC = Electronic Numerical Integrator and Computer
EDVAC = Electronic discrete Variable automatic computer
EDSAC = Electronic Delay storage Automatic computer
UNIVAC = Universal Automatic Computer
Class – 2
Software & Operating System
Data: Raw information
Information: Meaningful data or processed data
Programs: collection of instructions or commands
Page | 17
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Software: collection of programs to perform some specific tasks. There are two types of Software:
1. System software
2. Application software
Software
• Comprises the instructions and data to be processed using the computer hardware.
• Examples are operating systems like UBUNTU or Windows 7/10
• It is of three types:
• System software
• Programming software (Languages)
• Application software
Soft copy
• Document or image stored on the hard disk or pen drive is referred to as a soft copy.
Hard copy
• Printed document or image is referred to as hard copy.
System Software
• Provides the basic functionality to operate a computer by interacting directly with its
constituent hardware
• Provides services directly to the end user
• Examples: Operating system, drive drivers, system utilities or utility software BIOS etc.
Utility software
• Software used for maintenance and configuration of the computer system.
• These enhance the performance of the system and devices.
• Eg: anti-virus, disk cleaner, formatting tool etc.
Programming languages:
• Each language in which computer programs are written has its own grammar called its
syntax.
• Two major categories of computer programming languages are low-level languages and
high-level languages.
Page | 18
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Low-level languages are machine dependent languages and include machine language (1GL)
and assembly language (2GL).
• High level languages are machine independent and are simpler to write code into. But these
languages are not directly understood by the computer. Hence translators are needed to
translate them into machine language. Eg: C, C++, JAVA, Python, FORTRAN etc.
Translator
1. Program written in assembly or high level language are called source code.
2. Three types of translators are assembler, compiler and interpreter.
3. Assembler convert code written in assembly language to machine language.
4. Compiler converts the source code (high level language) into machine code.
5. Interpreter translates one line at a time instead of the whole program at one go.
Application Software
• Designed and developed for the users to perform some specific tasks like writing a letter,
listening to music or seeing any video.
• These are of two types:
• General purpose software
• Customised software
Word processors
• MS-Word, Word pad, Word star, Corel Word Perfect, Google docs.
Database software
• MS access, file maker, dBase, Clipper, MySQL, FoxPro
Web browser
• Google chrome, Mozilla Firefox, Internet explorer, opera
Multimedia software
• Adobe photoshop, Picasa, VLC media player, windows media player
Mailing software
• MS outlook
Presentation software
• MS Power point
Spreadsheet software
• MS Excel, Lotus 123
Firmware
Page | 19
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Permanent software which is embedded in the system’s read only memory. Eg: BIOS
Freeware
• Softwares that are freely available for use but source code may not be available.
• Eg: Skype, adobe reader etc.
General Purpose software
• Adobe photoshop, Mozilla web browser, spreadsheet tool Calc etc.
Customised software
• RBE website, school management software etc.
Free and Open Source software
• Also known as FOSS software.
• Software and source codes that are free to the public with an aim to develop and improve
further with each other’s help.
• Eg: Ubuntu, Mozilla firefox, libreoffice, python etc.
Proprietary software
• When software has to be purchased from the vendor who has the copyright of the software,
then it is proprietary software.
• Eg: Microsoft windows, tally, quick heal
Operating System
• Operating system
• Considered as the resource manager which manages all the resources of the computer i.e.
hardware (CPU, RAM, Input Output) and application Softwares also.
• Eg: Windows, Linux, Android, Macintosh etc.
Functions of OS
• Process management.
• Messaging service
• Device management
• Error detection
• Memory management
• Security
• File management
• Command interpretation
Page | 20
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
OS User Interface
1. Command-based interface
• User gives commands to perform different tasks like creating, opening, editing or deleting a
file. Primary input device is keyboard. Eg: MS-DOS and UNIX
2. Graphical User Interface
• Programs and instructions are run in the form of icon, menus and other visual options.
Input devices include mouse and keyboard. Eg: Microsoft Windows, Ubuntu, Fedora,
Macintosh etc.
3. Touch based interface
• Eg: Smart phones, tablets, pcs etc. Eg: Android and iOS, Windows 8.1 and 10 etc.
4. Voice based interface
• Voice based commands are used to make a computer work in a desired way.
• Eg: iOS (Siri), Android (OK GOOGLE), Microsoft windows 10 (Cortana) etc.
• When two or more systems are connected to each other and one can open files which are not
present in their system but in other devices connected in the network.
• Also known as distributed operating system
• Failure of one system does not affect the other systems connected in the network
6. Embedded operating system
• These operating systems are built into larger systems.
• They generally are limited to single specific functions like an ATM
7. Network operating system
• They have one main server which is connected to other client servers
• All the management of files, processing of data, access to sharing files, etc. are performed
over this small network
• It is also a secure operating system for working with multiple users
8. Mobile operating system
• These are designed so that they can help a small device like a smartphone work efficiently.
WIN: Windows
Windows - Shortcut
Win Keys + Print Screen For capture screen shot.
Win Keys + Pause break For open system configuration.
Win Keys + E For open my computer.
Win Keys + L For switch user mode.
Win Keys + M Minimize all active windows.
Win Keys + D Show the Desktop.
Win Keys + No. 1,2,3,4,5 Show the active window One by One.
Win Keys + R (Run) Open Run Dialogue Box.
Alt + Space + X For Maximize window.
Alt + Space + R For restore down window.
Alt + Space + N For Minimize window.
Alt + Tab For show the screen.
Alt + F4 For Close the software / System shut down.
WINDOWS:
• Wide interactive network development for office work solution
• Inbuilt web browser: Internet explorer
• Microsoft explorer is browser for windows 10
Page | 23
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 24
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 25
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 26
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 3
MS – Office
MS-Office
• Family of client software, server software and services designed by Microsoft.
• Current version of MS-Office: Microsoft Office 2019
MS-Word
• Word processing program developed by Microsoft corporation.
• Native file formats are denoted by .doc, .docx, . docm
• Allows users to type and save documents.
Title bar
• Bar at the top of the window bearing the name of the window.
FILE
• File contains New, Open, Save, Save as, Print, Share, Export, Close, Account, Feedback and
options
Tabs of MS- Word
HOME:
Clipboard, Font, Paragraph, Styles and Editing
• Default font = Calibri
• Default font size = 11 points
• Maximum font size = 72 points (automatically) and 1638 (manually)
• Minimum font size = 8 points (automatically) and 1 (manually)
• We can also change the alignments in home like left aligned (Ctrl+L), centre aligned
(Ctrl+E), right aligned (Ctrl+R) and Justify (Ctrl+J)
INSERT:
Pages, Tables, Illustrations, Add-ins, Media, Links, comments, Header and Footer, Text, Symbols,
Hyperlink, drop cap
• Header and Footer Displays information such as title and page number of the document,
time, date etc.
• Hyperlink (Ctrl+K) is a word, phrase or image that you can click on to jump to a new
document or a new section within the current document.
Page | 28
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Drop Cap: A drop cap is a large capital letter at the beginning of a text block that has the
depth of two or more lines of regular text.
DESIGN:
Document formatting, Page background, Watermark etc.
• Watermark is a Faded background image that displays behind the text in a document.
LAYOUT:
Page setup, Paragraph, Arrange
• In page setup, we can have two orientations: Portrait and Land scape.
• We can also increase or decrease indents in page layout section.
• We can add column breaks in page layout section.
Page | 29
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Mailings: Create, Start Mail merge, Write and insert fields, Preview results, finish
Mail Marge:
• It allows us to create letters, mailing labels and envelopes by linking a main document to a
set of data or data source.
• The main document is linked to the data source by common fields of data, called merge
fields.
Review:
• Spelling and grammar, research, thesaurus, translate, change, compare, protect document.
• Thesaurus is used for finding the synonym for a word in the sentence.
View:
• View, Page Movement, Show, Zoom, Window, Macros
• Macros is a series of commands or shortcuts and recordings that is recorded so that it can
be played back at a later time.
Page | 30
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Ctrl + V Paste
• Ctrl + F Find box
• Ctrl + I Make the text Italic
• Ctrl + B Make the text bold
• Ctrl + U Make the text underlined
• Ctrl + S Save the document
• Ctrl + P Opens the print window
• Ctrl + Z Undo last action
• Ctrl + Y Redo the last action performed
• CTRL + D Displays the font dialogue box.
• CTRL + E Centre alignment.
• CTRL + G Displays the go to dialog box.
• CTRL + H Displays the replace dialogue box.
• CTRL + J Full justification.
• CTRL + K Create hyperlink.
• CTRL + L Left alignment.
• CTRL + M Increase indent.
• CTRL + Q Remove indent.
• CTRL + R Right alignment.
• CTRL + T Increase hanging indent.
• CTRL + W Close document.
• CTRL + \ (Back slash) Expand / collapse sub document.
• CTRL +] Increase the font size by 1 point.
• CTRL + [ Decrease the font size by 1 point.
• CTRL + 1 One line spacing.
• CTRL + 2 Two line spacing.
• CTRL + 5 1.5 Line spacing.
• CTRL + 0 Add & remove before paragraph space.
• CTRL + F1 Hide or show the ribbon.
• CTRL + F2 Show print preview.
• CTRL + F4 Closes the active document window.
Page | 32
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 33
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 34
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 35
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Q15. Shading option in Ms-Word 365 is used for ________. --> Changing the color behind the
selected text
Q16. Which statement(s) about Quick Access Toolbar in MS-Word 2010 is/are incorrect?
P: The Quick Access Toolbar has Save, Undo, and Redo buttons by default.
Q: The Quick Access Toolbar has Cut, Undo, and Redo button by default.
R: You can place more buttons on the Quick Access Toolbar.
S: There is no option on Quick Access toolbar for “show below the Ribbon”.
Ans: Only Q and S
Q17. Which of the following font effects is not available in the MS-Word 2010 font dialog box?
(a) Double Strikethrough (b) Superscript
(c) Small Cap (d) Equalize Character Height
Ans: d
Q18. Which buttons are present in the Quick Access Toolbar by default in MS-Word 2010? -->
Save, Undo, Redo
Q19. Which keyboard shortcut is used to close a MS-Word 365 document? --> Alt + F4
Q20. In Ms-Word 365, Ctrl + E is the keyboard shortcut to ______. --> Centre align the selected
text
Q21. Consider the following statements regarding line spacing of a paragraph in MS-Word 2010:
P: Line spacing determines the amount of vertical space between lines of text in a paragraph.
Q: Line spacing determines the amount of diagonal space between lines of text in a paragraph
Which of the following statement(s) is/are correct? --> Only P
Q22. Which shortcut key is used to move the cursor one word to the left in MS-Word 365? --> Ctrl
+ Left arrow Key
MS-Excel
• Spreadsheet application developed by Microsoft corporation.
• It can perform calculation, graphics, pivot tables and has a micro programming language
called visual basic for application.
• Intersection of a row and a column is called a cell. The cell in which we are currently
working is called active cell.
Page | 36
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Worksheet
• Worksheet is a collection of cells where we keep and manipulate data. Worksheets will
begin with row number 1 and column number A.
• In MS-Excel 2010, the maximum size of a worksheet is 1,048,576 rows by 16,384 columns.
• We can rename the worksheets by right clicking on the sheet tab and choose rename.
• We can also add new worksheet by the shortcut Alt+Shift+F1 or Shift + F11
Page | 37
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Workbook
• Collection of worksheets is called workbook.
Cell References in Excel
Absolute Reference
• It does not change when the formula is copied.
• In an absolute cell reference, a dollar sign precedes both the column and row number.
Page | 38
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Mixed Reference
• In this the column can be absolute and the row can be relative or vice-versa.
• Dollar sign is placed in front of the just the column or row number as per requirements.
Tabs in MS-EXCEL:
Tabs: File, Home, Insert, Page layout, Formula, Data, Review, and View
HOME: Clipboard, Font, Alignment, Number, Style, Cells, Editing
INSERT: Tables, Illustrations (Pictures, online pictures), add-ins (charts, 3 D maps), spark lines
(line, column, win/loss), Filters etc.
Formulas: Insert function, function library, defined names: formula auditing, calculation
Some Important Functions used in MS-Excel:
1. LOWER
• Converts all characters in a supplied text string to lower case.
2. UPPER
• Converts all characters in a supplied text string to upper case.
Page | 39
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
3. CONCATENATE
• Joins together two or more text strings.
4. LEFT
• Returns a specified number of characters from the start of a supplied text string.
5. RIGHT
• Returns a specified number of characters from the end of a supplied text string.
6. TIME
• Returns a time, from a user-supplied hour, minute and second.
7. NOW
• Returns the current date and time.
8. TODAY
• Returns todays date.
9. SUM
• Returns the sum of a supplied list of numbers.
10. MAX
• Returns the largest value from a list of supplied numbers.
11. MIN
• Returns smallest value from a list of supplied numbers.
12. COUNTIF
• Returns the number of cells (of a supplied range), that satisfy a given criteria.
13. AND
• Tests a number of user-defined conditions and returns TRUE if all the conditions evaluate
to true or false otherwise.
14. OR
• Tests a number of user-defined conditions and returns TRUE if any of the conditions
evaluate to true or false.
Page | 40
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
15. NOT
• Returns a logical value that is the opposite of a user supplied logical value or expression i.e.
returns FALSE if the supplied argument is TRUE and vice-versa.
16. SQRT
• Returns the positive square root of a given number.
17. POWER
• Returns the power of a number raised to second number.
18. FLOOR
• Rounds the value down towards zero and always returns a numeric value.
19. CEILING
• If the formula reads =CEILING (7, 5) it will return the value of 10. The function will round
off number 7 to the nearest multiple of 5(10).
20. IF
• Tests a user defined condition and returns one result if the condition is true, and another
result if the condition is false.
21. ABS
• Returns the absolute value of a supplied number
22. Product
• Returns the product of a supplied list of numbers
23. Mod
• Returns the remainder from a division between two supplied numbers
24. Sumif
• Adds the cells in a supplied range, that satisfy a given criteria
25. Count
• Returns the number of numerical values in a supplied set of cells or values
26. Average
• Returns the Average value from a list of supplied numbers
Page | 41
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 43
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
44. The remove duplicate function is found in the ribbon under the Data tab.
45. ROUND function is used to round off the digits to a particular significant value.
ROUND (5.23692,4) = 5.2369
46. EVEN function is used to find the nearest even digit. (Greater one)
EVEN (11) = 12
EVEN (-9) = -10
47. ODD function is used to find the nearest odd digit. (Greater one) ODD (8) = 9
48. 48. To find total Cells = Row × Columns
Example : Total cells in the range A4:C10= Rows×Columns = [(10-4)+1] ×3= 21
49. The limit of font size in MS-Excel is 8-72 and its manual limit is 1-409.
50. The alphabet data is entered on the left side by default whereas the numerical data is
entered on the right side in MS-Excel.
51. Shortcut keys:
• Date= Ctrl + ;
• Time= Ctrl + Shift + ;
52. Minimum worksheets in a workbook = 3 and maximum worksheets = 255
53. By default the size and the font in MS-Excel are set to be 11 and Calibri.
Shortcut Keys for MS-Excel
• F1 Displays the Office Assistant or (Help > Microsoft Excel Help).
• F2 Edits the active cell, putting the cursor at the end.
• F3 Displays the (Insert > Name > Paste) dialog box.
• F4 Repeats the last worksheet action (Edit > Repeat).
• F5 Displays the (Edit > Go To) dialog box.
• F6 Moves to the next pane in a workbook (if the window is split).
• F7 Displays the (Tools > Spelling) dialog box.
• F8 Toggles whether to extend a selection with the arrow keys.
• F9 Calculates All the worksheets in All the open workbooks.
• F10 Toggles the activation of the Menu Bar.
• F11 Displays the (Insert > Chart) dialog box.
Page | 44
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 45
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 46
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 47
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Ctrl + \ Selects the cells in a selected row that do not match the value in the
active cell.
• Ctrl + Shift + \ Selects the cells in a selected column that do not match the value in the
active cell.
• Ctrl + / Selects the array containing the active cell.
• Alt + ; Selects the visible cells in the current selection.
• Ctrl + * Selects the current region (using the * on the number keyboard).
• Ctrl + [ Selects all the cells that are directly referred to by the formula in the
active cell.
• Ctrl + Shift + [ Selects all the cells that are directly (or indirectly) referred to by the
formula in the active cell.
• Ctrl + ] Selects all the cells that directly refer to the active cell (dependents).
• Ctrl + Shift + ] Selects all the cells that directly (or indirectly) refer to the active cell.
• Ctrl + Shift + Arrow Key Extends the selection to the next cell adjacent to a
blank cell in that direction.
• Ctrl + Shift + Page Down Selects the active worksheet and the one after it.
• Ctrl + Shift + Page Up Selects the active worksheet and the one before it.
• Ctrl + Shift + Spacebar Selects all the objects on the worksheet when an object is
selected.
• Ctrl + Spacebar Selects the current column.
• Shift + Arrow keys Selects the active cell and the cell in the given direction.
• Shift + Backspace Selects the active cell when multiple cells are selected.
• Shift + Spacebar Selects the current row.
• Ctrl + Shift + End Extends the selection to the last used cell on worksheet.
• Ctrl + Shift + Home Extends the selection to the beginning of the worksheet.
• Shift + Arrow Keys Extends the selection by one cell in that direction.
• Shift + Home Extends the selection to the first column.
• Shift + Page Down Extends the selection down one screen.
• Shift + Page Up Extends the selection up one screen.
• End + Shift + Arrow Keys Extends the selection to the next non-blank cell in that direction.
• End + Shift + End Extends the selection to the last cell in the current row*.
Page | 48
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• End + Shift + Home Extends the selection to last used cell on the worksheet.
• Alt + ' Displays the Style dialog box.
• Ctrl + Shift + ( ' or ) Applies the Time format "HH:MM" to the selection.
• Ctrl + Shift + (5 or %) Applies the Percentage format "0%" to the selection.
• Ctrl + Shift + (# or ~) Applies the General format to the selection.
• Ctrl + (# or ~) Applies the Custom Date format "DD-MM-YY" to the selection.
• Ctrl + Shift + (7 or &) Applies the outline border to the selection.
• Ctrl + Shift + (- or _ ) Removes all the borders from the selection.
• Ctrl + Tab Moves to the next open workbook or window.
• Alt + Tab Moves to the next application open on your computer.
• Alt + Shift + Tab Moves to the previous application open on your computer.
• End + Arrow Keys Moves to the next non empty cell in that direction.
• End + Enter Moves to the last cell in the current row that is not blank.
• End + Home Moves to the last used cell on the active worksheet*.
• End + Home Moves to the last used cell on the active worksheet*.
• Page Down Moves to the next screen of rows down.
• Page Up Moves to the previous screen of rows up.
• Shift + Enter Moves to the cell directly above (opposite direction to Enter).
• Shift + Tab Moves to the cell directly to the left (opposite direction to Tab).
• Alt + Page Down Moves you one screen of columns to the right.
• Alt + Page Up Moves you one screen of columns to the left.
• Ctrl + Home Moves to cell "A1" on the active sheet.
• Ctrl + End Moves to the last used cell on the active worksheet*.
• Ctrl + Up Arrow Moves to the first row in the current region.
• Ctrl + Down Arrow Moves to the last row in the current region.
• Ctrl + Left Arrow Moves to the first column in the current region.
• Ctrl + Right Arrow Moves to the last column in the current region.
• Ctrl + Page Up Moves to the previous worksheet in the workbook.
• Ctrl + Page Down Moves to the next worksheet in the workbook.
• Ctrl + Shift + Tab Moves to the previous open workbook or window.
• Scroll Lock + Arrow Keys Moves the workbook or window one cell the corresponding
direction.
Page | 49
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Scroll Lock + End Moves to the last cell in the current window.
• Scroll Lock + Home Moves to the first cell in the current window.
• Scroll Lock + Page Down Moves you down one screen (current selection unchanged.
• Scroll Lock + Page Up Moves you up one screen (current selection unchanged).
• Ctrl + . Moves clockwise to the next corner within a selection.
• Shift + Tab Moves from right to left within a selection (opposite direction to
Tab).
• Alt + Ctrl + Left Arrow Moves to the left between non adjacent cells in a selection.
• Alt + Ctrl + Right Arrow Moves to the right between non adjacent cells in a selection.
• = Starts a Formula.
• Ctrl + ` Toggles between the value layer and the formula layer.
• Ctrl + Insert Copies the current selection to the clipboard.
• Ctrl + Shift + ( Unhide any hidden rows within the selection.
• Ctrl + Shift + ) Unhide any hidden columns within the selection.
• Ctrl + Shift + \ Select unequal cells.
• Alt Toggles the activation of the old Menu Bar.
• Alt + Shift + Left Arrow Displays the (Data > Group and Outline > Ungroup) dialog box.
• Alt + Shift + Right Arrow Displays the (Data > Group and Outline > Group) dialog box.
• Alt + Spacebar Activates the Control Box in the top left corner.
Page | 50
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
P: It search for a specified item in a range of cells. And then returns the relative position of that
item in the range.
Q: The MATCH function syntax is MATCH(lookup_value, lookup_array, [match_type])
R: All the arguments in MATHC() function are required.
Which of the following statement(s) is/are true
Ans: Only P and Q
Q6. Which of the following shortcut key is used to quickly create a new, blank workbook in MS-
Excel 2010? --> Ctrl + N
Q7. What will the function given below return in MS-Excel 2010?
=MATCH(12,{10,13,30,40,60},1) --> Ans: 1
Q8. Which of the following shortcut key is used to select all cells of the current row in MS-Excel
2010 worksheet? --> Shift + Spacebar
Q9. Which of the following shortcut is used in to close an open workbook in MS-Excel 365? -->
Ctrl + W
Q10. Which of the following shortcut key is used to make the contents of a cell underlined in MS-
Excel 365? --> Ctrl + 4
Q11. Which of the following shortcut key is used to repeat the last command or action, if possible,
in MS-Excel 365? --> Ctrl + Y
Q12. Which of the following shortcut key is used to start a new line in the same cell in MS-Excel
365? --> Alt + Enter
Q13. Which of the following shortcut key is used to make the contents of a cell italic in MS-Excel
365? --> Ctrl + 3
Q14. In MS-Excel 365 which of the following shortcut is used to copy the contents and format of
the topmost cell of a selected range into the cells below? --> Ctrl + D
Q15. Which keyboard shortcut in Microsoft Excel 2016 should you use to insert a new worksheet
for Windows 10 operating system?--> Shift + F11
Q16. What is the keyboard shortcut to add a new row above a given row in Microsoft Excel?--> Alt
+I+R
Ms Powerpoint
• Presentation software program of Microsoft Office package.
Page | 51
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Uses a graphical approach to present in the form of slide shows that accompany the oral
delivery of the topic.
Tabs: File, Home, Insert, Design, Transition, Animation, Slideshow, Review and View
FILE: We can open, save, share, export, print and manage our presentation.
Home: Clipboard, Slides, Font, Paragraph, Drawing and Editing
• Slides group contains commands to insert new slide, choose slide layout, reset the positions
and formatting the slide.
INSERT: We can add pictures, shapes, charts, links, text boxes, video in the slides.
DESIGN: We can add theme or colour scheme, or format the slide background.
TRANSITIONS: Set up how your slides change from one to the next on the transitions tab.
ANIMATION: Used to choreograph the movements of things on the slides.
SLIDE SHOW: Sets up the way that we want to show our presentation to others.
REVIEW: Lets you to add comments, run spell- check, or compare the presentation with another
and language translation features also.
VIEW: Allows us to look at our presentation in different ways.
• View names are Normal, outline view, slide sorter, note page, etc.
Shortcut Keys for Power Point
• Ctrl + N Create a new presentation
Page | 52
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 53
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 4
Internet & E-Mail
Internet
• Used to identify services provided through the internet, such as websites, email services and
more.
• There are two types of domains:
Ø Top level domain
Ø Sub domain
• Top domains are standard URLs like
abcd.com
• Sub domains are unique URLs that live
on our purchased domain as an extension
in front of our regular domain like
support.abcd.com
Page | 54
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Lists of domains
.com commercial organizations
.org non-profit organizations
.info information service providers
.edu educational institutions
.gov government websites
.def defence sites
.co.in commercial in India
.net network centres
.mil Military of defence
Facts:
1. The electronic pages seen on the internet are called Web pages
2. Many web pages linked with each other combine to form a Website.
3. Webpage can be written in the language which is known as HTML (Hyper text markup
language).
4. A protocol called HTTP (Hyper text transfer protocol) is used to transmit and receive the
web pages.
URL
Page | 55
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Telnet Terminal network, For remote login over a TCP/IP connection
TCP/IP Transmission control protocol/internet protocol is a set of two protocols. TCP
controls the flow of data. IP identifies and reach the target computer on the
network.
UDP
User Datagram Packet transfers data between two computers. It is an
SLIP unreliable protocol, offering no guarantee for data delivery.
SMTP Serial Line Internet Protocol
PPP Simple Mail transfer protocol
WWW Point to point protocol
SNMP World Wide web
POP Simple Network Management Protocol
DNS Post Office Protocol
WAP Domain Name system/ Server
IMAP Wireless Application Protocol
Internet Message Access Protocol
Facts:
• Protocols used for mail delivery are POP, IMAP, SMTP (for sending mail messages)
• IMAP allows a client e-mail program to access remote message, stores as if they were local.
• POP is used for transferring messages from an e-mail server to an e-mail client.
• IMAP or POP3 let the user to save messages in a server mailbox and download them
periodically from the server.
• IMAP or POP3 are used for receiving mails.
Web Browsers
• Application software that is needed to view web pages.
• Mosaic was the first web browser developed by National Centre for Supercomputing
Application (NCSA).
• Eg: opera, Mozilla Firefox, google chrome, safari etc.
Page | 56
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Mozilla firefox is an open source web browser, which is available free of cost. It does not
require any license fee.
Page | 57
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Router is also attached to access the network. Router is used to connect two different
networks.
• Modem connects your home network to your internet service provider and a router lets all
our wired and wireless devices use our internet connection at once and allows them to talk
to one another directly.
Downloading
• Transmission of a file or data from one computer to another over a network, usually from a
larger server to a user server.
• It refers to the general transfer of data or to transferring a specific file.
• Download manager is used which manages the downloading of files from the internet which
may be built into a web browser or as a usually more sophisticated program.
Uploading
• An e-mail address consists of two main parts, the username and the domain server name
with the symbol @ in between. Eg: [email protected]
• Email management involves the systematic control of the quality and quantity of electronic
messages that are sent from within, and received by an organization.
• Emails allows users to send information in letter format.
• These include text, documents and multimedia like photos and videos.
How to compose an email
Ø Go to G-mail.
Ø At the top left, click on compose
Ø In the “To” field, add recipients.
Ø Add a subject
Ø Write your message.
Ø At the bottom of the page, click send.
BCC and CC
• Bcc means blind carbon copy
• CC means carbon copy
• Through BCC and CC we can include more people as recipients in an email.
• CC is used when you want to send content to a particular recipient (for whom it is meant to
be) but you want to make other recipients also aware of that content.
• The only difference between CC and BCC is that we can see the list of recipients when CC is
used while we shall not be able to see that someone else has been sent a copy of the email in
case of BCC.
Page | 59
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Features of e-mail
Inbox
• Where we see the E-mail we receive.
• Emails are listed with the name of the sender, the
subject of the message and the date received.
Signature
• We can choose to create a signature that will appear at the end of every email we send. It
includes a name and contact information like a phone number, website or professional title.
Attachments
• It is a file (like an image or document) that is send along with an email message.
Page | 60
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Navigation menu
• It includes our contact lists, calendar and more.
Drafts
• These are the messages that we have composed but not sent.
• When composing a message, we can choose to save our message as a draft and finish it later.
Spam
• We are likely to receive junk or spam emails in our inbox which may carry virus or scams.
• These emails will usually filter as suspicious emails in our spam folder.
Trash
• We can delete any email from our inbox by moving it to trash which can be retrieved for a
short time.
• Emails will be permanently deleted after a certain amount of time in the trash.
Archive
• This removes email from the inbox but does not delete them.
Forward
• Whenever we want to share an email we received, we can use the forward command to send
the message to another person.
Reply
• On receiving an email, we can click on reply to respond to the message.
Reply all
• When we receive emails addressed to us and several other recipients, then we if we want to
reply to everyone included in the original email, we use reply all command.
E-Banking
• Product designed for the purposes of online banking that enables you to have easy and safe
access to your bank account.
• Major types of e-banking includes online internet banking, mobile banking, automated
teller machine (ATM), debit and credit cards.
• Different types of online financial transactions are:
Page | 61
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Page | 62
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• IMPS offers an instant, 24X7, interbank electronic fund transfer service through mobile
phones. IMPS is an emphatic tool to transfer money instantly within banks across India
through mobile, internet and ATM which is not only safe but also economical both in
financial and non-financial perspectives.
• Immediate Payment Service
Class – 5
Networking & Cyber Security
Intranet
• Private network accessible only to an organization’s staff.
• Multiple PCs are connected to each other but they are not available to the world outside.
• In Intranet, own instant messengers can be used as similar to yahoo messenger/ Gtalk over
the internet.
Data Communication
• Exchange of data between two or more devices.
• It depends on four characteristics:
Delivery - The system must deliver data to the correct destination.
Accuracy - The system must deliver the data accurately.
Timeliness - The system must deliver data in a timely manner.
Jitter - Jitter refers to the variation in the packet arrival time.
• Sender, Receiver,
• Transmission medium,
• Message and Protocol
Signals
• To be transmitted, data must be transformed to electromagnetic signals.
• Data can be analogue or digital.
• Analog data refers to information that is continuous. Ex: Human Voice, Analog clock.
• Digital data refers to information that has discrete state. Ex: Digital clock, Computer.
Computer Network
• Allows computers to exchange data, information and share resources.
• Connections between computer (nodes) are established using either cable media or wireless
media.
Types Of Networks
• Mainly there three networks in networking (LAN, MAN, WAN)
Page | 65
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
LAN (Local area network)
• A LAN is a group of computer and devices which are connected in a limited area such as
school, home, and office building. Ethernet, bus network are the most common examples of
LAN.
MAN (Metropolitan area network)
• MAN is consisting of a computer network across an entire city. The size of the Metropolitan
area network is larger than LANs and smaller than WANs, but covers the larger area of a
city or town. Eg: Cable TV is an example of MAN.
WAN (Wide Area Network)
• A WAN can cover large geographical area such as country, continent or even a whole
world. Internet connection is an example of WAN.
Page | 66
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
SAN (Storage Area Network)
• SAN is a specialized, high-speed network that provides block-level network access to
storage.
VPN (virtual private network)
• VPN extends a private network across a public network, such as the Internet. It enables
users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network.
Types of connection
• Point-to-point connection – In which a dedicated link is provided between two devices.
• Multipoint connection – In which more than two devices share a single link.
• One way or unidirectional communication between two devices in which one device is
sender and the other one is receiver.
• Eg: Data sent through a keyboard or speaker
Page | 67
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
directions but not at the same time.
• Eg: Walkie-talkie
3. Full Duplex Communication
• Two way or bidirectional communication in which both the devices can send and receive
data simultaneously.
VoIP:
• Communication methodology designed to deliver both voice and multimedia
communications over Internet protocol.
VoLTE
• Voice over Long term evolution is a standard for high speed wireless communication for
mobile phones, including IoT and wearables.
Network Topology
• Arrangement of the various elements (links,
• nodes, etc.) of a computer network.
• Two basic categories of network topologies
• are: Physical topologies and Logical topologies.
• Various types of topologies are: Bus, ring, star,
• mesh and tree.
1. Bus topology
• Also called as a linear bus topology.
• All computers are connected to a central cable with Multipoint connection. Break in the
cable cause whole network failure.
• Transmission speed is slow in bus topology.
• Terminators are used at the end of central cable.
Page | 68
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
2. Ring topology
• The structure of the network is formed similar to as of a “Ring”.
• Nodes are connected in a circular manner to each other.
• Transmission speed is slow.
• In order for all computers to communicate with each other, all computers must be
turned on.
• Link is unidirectional.
3. Star topology
• All the nodes/devices are connected to a centralized device known as HUB in the
structure
• Easily add and/or remove devices.
• Problem identification is easy in star topology.
• Data communication is fast due to the HUB/Switch connectivity.
• If central device fails, entire network will shut down.
4. Mesh Topology
• Each node provides an individual link to another node.
• It means, every node in the entire network is directly connected to every other node in
the network making it the most complex topology among all the other topologies.
• Data communication speed is fast in mesh topology.
• Any fault in the network doesn’t affect the entire network.
• Most expensive topology due to the amount of cables.
• To build a fully connected mesh topology of n nodes, number of wires required will be
𝒏(𝒏#𝟏)
𝟐
Page | 69
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
5. Tree topology
• Tree topology is a combination of bus and star topology.
• Tree topology is made by connecting various star topologies via central bus backbone
cable.
• It is also known a expended star topology.
• If central backbone cable or root devices gets a problem then the whole network stops
functioning.
6. Hybrid topology
Hybrid topology uses a combination of any two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies.
Cloud computing
• Computer based services are delivered over Internet or cloud and it is accessible to the user
from anywhere using any device.
• Eg: when we store our pictures and files as backup on internet.
Page | 70
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Network Devices
1. Modem
• Stands for modulator- demodulator.
• Modem converts the digital signal from the computer into an analogue signal that can travel
through the telephone lines. And vice-versa
2. Ethernet Card
• Also known as network interface card
• Network adaptor used to set up a wired network.
• Ethernet cards can support data transfer between 10 Mbps
and 1 Gbps. Each NIC has a MAC address which helps in
uniquely identifying the computer on the network.
3. Repeater
• Signals lose their strength beyond this limit and become
weak. In such conditions, originalsignals need to be
regenerated.
• Repeater works with signals on the cables to which it is
connected.
4. Hub
• Acts as a connector of several computers.
• Data arriving on any of the lines are sent out on all the others.
• If data from two devices come at the same time, they will collide.
Page | 71
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
5. Switch
• Connects multiple computers or communicating devices.
• When data arrives, the switch extracts the destination address from the data packet and
looks it up in a table to see where to send the packet.
• It sends signals to only selected devices instead of sending to all and thus reducing the
network traffic.
• Also known as intelligent hub.
6. Router
• Connects a LAN to the internet.
• It can analyse the data being carried over a network, decide and alter how it is packaged
and send it to another network of a different type.
• For example, Data has been divided into packets of a certain size. Suppose, these packets
are to be carried over a different type of network which cannot handle bigger packets, in
such a case, the data is to be repackaged as smaller packets and then sent over the network
by a router.
7. Gateway
• Combination of software and hardware.
• Used to connect different types of two or more networks having different protocols, services
and environments.
• Serves as the entry and exit point of a network, as all data coming in or going out of a
network must first pass through the gateway in order to use routing paths.
• If a node from one network wants to communicate with a node of a foreign network, it will
pass the data packet to the gateway, which then routes it to the destination using the best
possible route.
Page | 72
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
8. Bridge
• It works on data link layer of OSI Model. It is used to connect same or similar types of two
or more networks. It is also used to divide a big network into two or more small networks.
Mac Address
• Stands for media access control
• Physical address of the system
• Engraved on NIC at the time of manufacturing and is
permanent.
• It is a 12 digit hexadecimal number (48 bits in length)
• Eg: 07:01:02:22:3C:4D
• The first 6 digits represents manufacturer’s ID and later 6 digits represent serial number
assigned to the card.
IP address
• Known as internet protocol address.
• Used to uniquely identify a system in a network.
• It is a logical address of our system.
• IPV4 is a 32 bit numeric address written as 4 numbers and
numbers can be between 0 and 255. Eg: 192:168:0:178
• IPV6 is 128 bit address consisting of 16 bytes.
Malware
• Malware is stands for malicious software. It is small program that can come in our system
form anywhere and then infects or harms our system. Virus, Worm, Trojan horse, Spyware,
Adware, Rootkit, Key loggers, Logic bomb, Ransomware.
Page | 73
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
VIRUS (Vital Information resource under siege)
• A virus is a program that replicates its own code by attaching itself to other executable files
in such a way that the virus code is executed when the infected executable file is executed.
Almost all viruses are attached to an executable file, which means the virus may exist on a
system but will not be active or able to spread until a user runs or opens the malicious host
file or program.
• Types of viruses are File Virus, Macro Virus, Multipartite Virus, Boot sector Virus/Master
Boot Record Virus, Stealth Virus, Cavity (Space Filler) Virus, Tunnelling Virus,
Polymorphic Virus, Cluster Virus.
Spyware: Is a type of malware that is installed on a user's computer to collect personal information
or monitor internet browsing activities.
• Records and sends the collected information to an external entity without the consent or
knowledge of the user.
• These usually tracks internet usage and sells them to advertisers.
Page | 74
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Rootkit: is an application that hides its own presence or presence of other malwares on the
computer, using some of the lower layers of the operating system (API function redirection, using
of undocumented OS functions, etc.), which makes them almost undetectable by common anti-
malware software.
Adware: is software that contains advertisements embedded in the application. Adware is
considered a legitimate alternative offered to consumers who do not wish to pay for software.
Keylogger: A keylogger is a type of surveillance software that has the capability to record every
keystroke you make to a log file, usually encrypted. A key logger recorder can record instant
messages, e-mail, and any information you type at any time using your keyboard.
Logic Bomb: A logic bomb is a piece of code inserted into an operating system or software
application that implements a malicious function after a certain amount of time, or specific
conditions are met.
Ransomware: It is a type of malicious software designed to block access to a computer system until
a sum of money is paid.
• Blocks the user to access their own data and threatens to publish them online and demands
ransom payment against the same.
Types of Hacking
1. Ethical hacking (Legal hacking)
2. Non-ethical hacking (Illegal)
Types of Hackers
Page | 75
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• They are actually security experts. Organisations hire ethical or white hat hackers to check
and fix their systems for potential security threats and loopholes.
3. Grey Hat hackers (Combination of both white and black hat hackers)
• They hack systems by exploiting its vulnerabilities, but they don’t do so for monetary or
political gains. The grey hats take system security as a challenge and just hack systems for
the fun of it.
Phishing
• Phishing is an unlawful activity where fake websites or emails
that look original or authentic are presented to the user to
fraudulently collect sensitive and personal details, particularly
usernames, passwords, banking and credit card details.
• They will often use logo’s of the original, making them
difficult to detect from the real! Phishing attempts through
phone calls or text messages are also common these days.
Packet Sniffing
• Packet sniffing is the act of capturing packets of data flowing across a computer network.
The software or device used to do this is called a packet sniffer.
Spoofing
• A spoofing attack is when an attacker or malicious program successfully acts on another
person’s (or program’s) behalf by impersonating data. Some common types of spoofing
attacks include ARP spoofing, DNS spoofing and IP address spoofing. These types of
spoofing attacks are typically used to attack networks, spread malware and to access
confidential information and data.
Page | 76
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Snooping
• Snooping refer to listening to a conversation. For example, if you login to a website that uses
no encryption, your username and password can be sniffed off the network by someone who
can capture the network traffic between you and the web site.
Firewall
• A computer firewall is a software program that prevents unauthorized access to or from a
private network. Firewalls are tools that can be used to enhance the security of computers
connected to a network, such as LAN or the Internet.
• It can be implemented in software, hardware or both.
Page | 78
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Q11. Which of the following is a small piece of software that uses computer networks and security
holes to replicate itself? --> Worm
Q12. A ______ is a computer programme which can self-replicate and propagate over the network
with or without human intervention and has malicious intent. --> Worm
Q13. Which of the following ports is used to connect a computer to a wired network? --> Ethernet
port
Q14. A device or program that enables a computer to transmit data over telephone or cable lines is
called: --> Modem
Class – 6
Data Representation
Number System
Ø It is a technique to represent numbers in the computer system architecture.
Types of Number System
Binary Number System:
• It contains only two unique digits 0’s and 1’s
• It is also known as Base 2 system.
For example. (10101)2
Ø Step 2 Note the quotient and remainder. Digits of remainder will be from 0 to 7.
Ø Step 3 If quotient # 0, then again divide the quotient by 8 and go back to step 2.
Ø Step 4 If quotient = 0 or less than 8 then stop the process.
Ø Step 5 Write each remainder from left to right starting from MSD (Most Significant Digit)
to LSD (Least Significant Digit)
Octal to Decimal
Ø Step 1 Multiply each digit of octal number with powers of 8.
Ø Step 2 These powers should be positive for integral part and negative for fractional part
Ø Step 3 Add the all multiplying digits.
Decimal to Hexadecimal
Ø Step 1 (Divide the given number by 16.
Ø Step 2 Note the quotient and remainder. Digits of remainder will be 0 to 9 or A to F.
Ø Step 3 If quotient #0, then again divide the quotient by 16 and go back to step 2.
Ø Step 4 if quotient = 0 or less than 16, then stop the process.
Ø Step 5 Write each remainder from left to right starting from MSD (Most Significant Digit)
to LSD (Least Significant Digit)
Hexadecimal to Decimal
Ø Step 1 Multiply each digit of hexadecimal number with powers of 16.
Ø Step 2 These powers should be positive for integral part and negative for fractional part.
Ø Step 3 Add the all multiplying digits
Octal to Hexadecimal
Ø Step 1 Convert each digit of octal number to binary number.
Ø Step 2 Again, convert each binary digit to hexadecimal number.
Hexadecimal to Octal
Ø Step 1 Convert each digit of the hexadecimal number to binary number.
Ø Step 2 Again, convert each binary digit to octal number.
Class – 7
Computer Codes
Computer Codes
Page | 81
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Binary Coded Decimal (BCD)
• This system was developed by IBM. It is a number system where four bits are used to
represent each decimal digits.
• BCD is a method of using binary digits to represent the decimal digits (0-9). In BCD system,
there is no limit on size of a number.)
American Standard Code for Information Interchange (ASCII)
• Basically, ASCII codes are of two types, which are as follows
1. ASCI-7 It is a 7-bit standard ASCII code. It allows 27 = 128 (from 0 to 127) unique
symbols or characters.
2. ASCII-8 It is an extended version of ASCI-7. It is an 8-bit code, allows 28 = 256 (0 to 255)
unique symbols or characters.
Extended Binary Coded Decimal Interchange (EBCDIC)
• In EBCDIC, characters are represented by eight bits. These codes store information which
is readable by other computers. It allows 28 = 256 combination of bits.
Logic Gates
• It is a basic building block of a digital circuit that has
two inputs and one output. The relationship between
the input and the output are based on a certain logic.
These gates are implemented using electronic switches
like transistors, diodes.
OR Gate
• This is represented by (+), i.e. (A+ B) It returns True if any one of the conditions or inputs is
True and if both conditions are False, then it returns False.
Page | 82
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
NOR Gate:
• It is inverse of the OR gate. This gate is designed by combining the OR and NOT gates.
Note: NAND and NOR gates are also called universal gates.
Exclusive - OR or XOR Gate
• It performs based on the operation of OR gate.
• It returns True only if one condition is true from both the conditions otherwise it returns
False.
Page | 83
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 8
OSI Model
OSI MODEL OSI (Open system interconnection) model
Ø OSI stands for Open Systems Interconnection. Open stands to say non-proprietary. It is a 7-
layer architecture with each layer having specific functionality to perform. All these 7 layers
work collaboratively to transmit the data from one person to another across the globe. The
OSI reference model was developed by ISO – ‘International Organization for
Standardization ‘, in the year 1984. The OSI model provides a theoretical foundation for
understanding network communication.
It is a seven layered Model.
Page | 84
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Functions of Layers
Physical layer
Ø It is responsible for the actual physical connection between the devices. The physical layer
contains information in the form of bits. It is responsible for transmitting individual bits
from one node to the next.
Ø Hub, Repeater, Modem, and Cables are Physical Layer devices
Ø Function of physical layer
1. Bit synchronization
2. Bit rate control
3. Physical topologies
4. Transmission mode
Page | 86
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
• Connectionless Service
1. Connection-Oriented Service: It is a three-phase process that
Includes:
• Connection Establishment
• Data Transfer
• Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to the source
after a packet or group of packets is received. This type of transmission is reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type of
transmission, the receiver does not acknowledge receipt of a packet. This approach allows for
much faster communication between devices.
Session layer
Ø This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.
Ø Device or Protocol Use : NetBIOS, PPTP.
Functions of the Session Layer
1. Session Establishment, Maintenance, and Termination
2. Synchronization
3. Dialog Controller
Presentation layer
Ø The presentation layer is also called the Translation layer . The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network.
Ø Device or Protocol used:
Ø JPEG, MPEG, GIF
Functions of the Presentation Layer
1. Translation
2. Encryption/ Decryption
3. Compression
Page | 87
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Application Layer
Ø It provides a user interface or platform to transmit or receive the date. Eg: web browser,
skype, messenger. This layer also serves as a window for the application services to access
the network and for displaying the received information to the user.
Ø Functions of the Application Layer
1. Network Virtual Terminal (NVT)
2. File transfer access and management (FTAM)
3. Mail Services
4. Directory services.
Protocols and standards work on OSI Layers
Page | 88
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Authentication and Ensures
security.
4 Transport Take Service from Network Segment Firewall
Layer Layer and provide it to the
Application Layer.
3 Network Layer Transmission of data from Packet Router
one host to another, located
in different networks.
2 Data Link Node to Node Delivery of Frame Switch , Bridge
Layer Message.
1 Physical Layer Establishing Physical Bits Hub , Repeater , Modem ,
Connections between Cables
Devices.
TCP/IP model
Ø TCP/IP protocol (Transfer Control Protocol/Internet Protocol ) was created by U.S.
Department of Defense’s Advanced Research Projects Agency (ARPA) in 1970s.
Ø Some key differences between the OSI model and the TCP/IP Model are:
v TCP/IP model consists of 4 layers but OSI model has 7 layers. Layers 5,6,7 of the OSI
model are combined into the Application Layer of TCP/IP model and OSI layers 1 and 2
are combined into Network Access Layers of TCP/IP protocol.
Page | 89
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 9
Development of Computer
1. Param Ganga
a. First made in India Peta scale super computer
b. Deployed at IIT Roorkee in March 2022
c. Supercomputing capacity of 1.66 Petaflops
2. Param Pravega
a. Commissioned under National Supercomputing Mission NSM
b. Installed at IISC Bengaluru
c. Supercomputing capacity of 3.3 petaflops
3. Param Sidhi
a. High performance computing- Artificial Intelligence (HPC-AI) supercomputer
b. Developed by Department of Science and Technology DST, M/o Electronics & Information
Technology under NSM
c. Param Sidhi –AI(63rd) and Mihir (146th ) have made it to the top 500 list of world’s most
powerful supercomputers.
4. Cray –I
a. Developed by Cray Company in 1976
5. PARAM 8000
a. Developed in India by C-DAC company in 1991 in Pune.
b. India’s first supercomputer.
c. First giga scale supercomputer of India.
6. PARAM 10000
a. Indian super computer developed by C-DAC company in 1998.
b. 100 gigaflop supercomputer.
7. PARAM Padma
a. First teraflop supercomputer in 2002.
Page | 90
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
b. India’s First supercomputer to enter top 500 list of supercomputers of the world (ranked
171)
8. Param Yuva
a. A 54 teraflop supercomputer in 2008
b. Ranked 69 in Nov 2008.
9. Param Yuva II
a. 529 teraflop supercomputer in 2013 (ranked 69)
10. Param Biochrome
a. HPC (High performance computing) cluster for Bio-informatics applications.
b. Capacity of 5 teraflops.
11. Param Bio-blaze
a. Supercomputing power of 10.65 TF
b. Launched in 2014
12. SEAC
a. First generation of computer
b. Standards Eastern Automatic Computer or Standards Electronic Automatic Computer
c. Built in 1950 by U.S. National Bureau of Standards (NBS)
13. SMPS
a. Switched Mode Power Supply
b. It is and electrical circuit and is mainly used in computers.
14. HTML
a. Hyper Text Markup Language
b. Invented by Tim Berners Lee in 1990
15. Sun Microsystems
a. American computers later acquired by Oracle.
b. Founded by Vinod Khosla
16. Apple Inc.
a. Formerly known as Apple Computer Company
b. Founded by Steve Jobs, Steve Wozniac and Ronald Wayne in 1976.
Page | 91
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
c. Headquartered in Cupertino, California, USA.
d. First apple computer- APPLE I
e. Introduced iPad as a multimedia device in 2010.
17. Alan Turing
a. Father of modern computers
b. Formed the concept of the algorithms and computations with the Turing machine.
18. Microsoft
a. Co-founded by Paul Allen and Bill Gates in 1975.
19. Pen drive was invented by IBM in 1998
20. ENIAC
a. Electronic Numerical Integrator and Computer
b. Invented by John William Mauchly and J. Presper Eckert.
c. I digital General purpose electronic computer of world.
d. Completed at Moore School of Electronic at University of Pennsylvania in 1946.
21. The first newspaper that became available on the Internet- The Hindu
22. EKA
a. Asia’s first supercomputer.
b. Built by Computational Research Laboratories and Hewlett-Packard.
c. Designed by Tata Institute of fundamental research.
23. Father of Indian Supercomputers- Vijay Pandurang Bhatkar (founder executive director of C-
DAC).
24. GOOGLE
a. Founders- Sergey Brin and Larry Page
b. Headquartered in Mountain View, California, US.
25. Inventor of Bluetooth – Jaap Hartsen
26. First world programmer- Ms. Ada Lovelace
27. PRATYUSH
a. India’s fastest and first petaflops super computer inaurgurated in Indian Institutes of
Tropical Meteorology in Pune.
b. First petaflops ever built in India.
Page | 92
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
28. First pair of headphone was developed by Nathaniel Baldwin in 1910.
29. Douglas Engelbart discovered the mouse of the computer.
Class – 10
M.S. Office
Maximum size of Worksheet-
Ø 1,048,576 rows
Ø 16,384 columns
Cell References in Excel
Class – 11
M.S. Window
Ø Window logo key + L = Lock PC
Ø Ctrl + K = Insert a Hyperlink
Ø Window logo key + K = Open connect quick action
Ø Ctrl + L = Left align
Ø Alt + S = Open Slide Show in Power Point
Ø Ctrl + S = To save file
Ø Ctrl + tab = To switch b/w open tabs in browser
Ø Alt + tab = To switch b/w open application
Ø Window logo key + H = Open dictation toolbar
Ø Window logo key + D = Display & hide the desktop
Ø Ctrl + D = Bookmark
Ø Ctrl + H = Replace
Page | 94
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 12
M.S. Office-365
Ø Microsoft 365 (previously known as Office 365), which has been available since 2011, differs
from that old-fashioned bundle in two respects: First, it's sold as a subscription (billed
monthly or yearly), Second, it combines a suite of online services, including business-class
email, cloud file storage, and secure communication tools along with the traditional desktop
apps.
Ø Microsoft 365 is available in Family and Personal editions (previously known as Office 365
Home and Personal, respectively) that are intended for use by families, students, and
individuals for personal, non-commercial use.
Ø Contains a word processor (Word), a spreadsheet programme (Excel) and a presentation
programme (Power point), an email client (outlook), a database management system
(access) and a desktop publishing app (publisher).
Ø Microsoft Word is a word processing application for editing documents.
Ø Microsoft Excel is a spreadsheet editor.
Ø Microsoft PowerPoint is a presentation program.
Ø Microsoft OneNote is a notetaking program that gathers handwritten or typed notes,
drawings, screen clippings and audio commentaries. Notes can be shared with other
OneNote users over the Internet or a network.
Page | 95
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Ø Microsoft Outlook is a personal information manager (PIM) that includes an e-mail client,
calendar, task manager and address book.
Ø Microsoft Publisher is a desktop publishing app for Windows mostly used for designing
brochures, labels, calendars, greeting cards, business cards, newsletters, web sites, and
postcards.
Ø Microsoft Access is a database management system for Windows that combines
the relational Access Database Engine (formerly Jet Database Engine) with a graphical user
interface and software development tools. Microsoft Access stores data in its own format
based on the Access Database Engine. It can also import or link directly to data stored in
other applications and databases.
Frequently used shortcuts
Ø This table shows the most frequently used shortcuts in Microsoft Word.
To do this Press
Open a document. Ctrl+O
Create a new document. Ctrl+N
Save the document. Ctrl+S
Close the document. Ctrl+W
Cut the selected content to the Clipboard. Ctrl+X
Copy the selected content to the Clipboard. Ctrl+C
Paste the contents of the Clipboard. Ctrl+V
Select all document content. Ctrl+A
Apply bold formatting to text. Ctrl+B
Apply italic formatting to text. Ctrl+I
Apply underline formatting to text. Ctrl+U
Decrease the font size by 1 point. Ctrl+Left bracket ([)
Increase the font size by 1 point. Ctrl+Right bracket (])
Center the text. Ctrl+E
Align the text to the left. Ctrl+L
Align the text to the right. Ctrl+R
Cancel a command. Esc
Undo the previous action. Ctrl+Z
Redo the previous action, if possible. Ctrl+Y
Adjust the zoom magnification. Alt+W, Q, then use the Tab
key in the Zoom dialog box
to go to the value you want.
Page | 96
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Split the document window. Ctrl+Alt+S
Remove the document window split. Alt+Shift+C or Ctrl+Alt+S
Page | 97
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Preview and print documents
To do this Press
Print the document. Ctrl+P
Switch to print preview. Ctrl+Alt+I
Move around the preview page when zoomed in. Arrow keys
Move by one preview page when zoomed out. Page up or Page down
Move to the first preview page when zoomed out. Ctrl+Home
Move to the last preview page when zoomed out. Ctrl+End
Format characters
To do this Press
Display the Font dialog box. Ctrl+D or Ctrl+Shift+F
Increase the font size. Ctrl+Shift+Right angle bracket (>)
Decrease the font size. Ctrl+Shift+Left angle bracket (<)
Page | 98
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Increase the font size by 1 point. Ctrl+Right bracket (])
Decrease the font size by 1 point. Ctrl+Left bracket ([)
To do this Press
Insert a hyperlink. Ctrl+K
Go back one page. Alt+Left arrow key
Go forward one page. Alt+Right arrow key
Refresh the page. F9
To do this Press
Switch to the Read Mode view. Alt+W, F
Switch to the Print Layout view. Ctrl+Alt+P
Switch to the Outline view. Ctrl+Alt+O
Switch to the Draft view. Ctrl+Alt+N
To do this Press
Move to the beginning of the document. Home
Move to the end of the document. End
Go to a specific page. Type the page number, then
press Enter
Exit Read Mode. Esc
Page | 99
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
F2 § F2 alone: moves the selected text or graphic. Use the arrow keys to place the
cursor where you want to move the text or graphic, and then press Enter to
move, or press Esc to cancel.
§ Shift+F2: copies the selected text or graphic. Use the arrow keys to place the
cursor where you want to copy the text or graphic, and then press Enter to
copy, or press Esc to cancel.
§ Ctrl+F2: displays the print preview area on the Print tab in the Backstage
view.
§ Alt+Shift+F2: saves the document.
§ Ctrl+Alt+F2: displays the Open dialog box.
F3 § Shift+F3: switches the selected text between upper case, lower case, and title
case.
§ Ctrl+F3: cuts the selected content to the Spike. You can cut multiple texts
and graphics to the Spike, and paste them as a group to another location.
§ Ctrl+Shift+F3: pastes the contents of the Spike.
§ Alt+F3: creates a new Building Block.
F6 § F6 alone: switch between the document, task pane, status bar, and ribbon. In
a document that has been split, F6 includes the split panes when switching
between panes and the task pane.
§ Shift+F6: switches between the document, ribbon, status bar, and task pane.
§ Ctrl+F6: switches to the next document window when more than one
document is open.
§ Ctrl+Shift+F6: switches to the previous document window when more than
one document is open.
§ Alt+F6: moves from an open dialog box back to the document, for dialog
boxes that support this behavior.
Page | 100
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
F7 § F7 alone: displays the Editor task pane to check spelling and grammar in the
document or the selected text.
§ Shift+F7: displays the Thesaurus task pane.
§ Ctrl+Shift+F7: updates the linked information in a Word source document.
§ Alt+F7: finds the next spelling or grammatical error.
§ Alt+Shift+F7: displays the Translator task pane.
Move to the Tell me or Search field on the ribbon and type a Alt+Q, then enter
search term for assistance or Help content. the search term.
Open the File menu. Alt+F
Open the Home tab and format text and numbers and use the Alt+H
Find tool.
Page | 102
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Open the Insert tab and insert PivotTables, charts, add-ins, Alt+N
Sparklines, pictures, shapes, headers, or text boxes.
Open the Page Layout tab and work with themes, page setup, Alt+P
scale, and alignment.
Open the Formulas tab and insert, trace, and customize Alt+M
functions and calculations.
Open the Data tab and connect to, sort, filter, analyze, and Alt+A
work with data.
Open the Review tab and check spelling, add notes and Alt+R
threaded comments, and protect sheets and workbooks.
Open the View tab and preview page breaks and layouts, show Alt+W
and hide gridlines and headings, set zoom magnification,
manage windows and panes, and view macros.
Page | 104
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
region and its summary rows. Press a third time to
select the entire worksheet.
Select the current region around the active cell. Ctrl+Shift+Asterisk sign (*)
Select the first command on the menu when a Home
menu or submenu is visible.
Repeat the last command or action, if possible. Ctrl+Y
Undo the last action. Ctrl+Z
Key Description
F1 § F1 alone: displays the Excel Help task pane.
§ Ctrl+F1: displays or hides the ribbon.
§ Alt+F1: creates an embedded chart of the data in the current range.
§ Alt+Shift+F1: inserts a new worksheet.
§ Ctrl+Shift+F1: toggles full screen mode
F2 § F2 alone: edit the active cell and put the insertion point at the end of its contents.
Or, if editing is turned off for the cell, move the insertion point into the formula
bar. If editing a formula, toggle Point mode off or on so you can use the arrow keys
to create a reference.
§ Shift+F2: adds or edits a cell note.
§ Ctrl+F2: displays the print preview area on the Print tab in the Backstage view.
F3 § F3 alone: displays the Paste Name dialog box. Available only if names have been
defined in the workbook.
§ Shift+F3: displays the Insert Function dialog box.
When a cell reference or range is selected in a formula, F4 cycles through all the
various combinations of absolute and relative references.
F6 § F6 alone: switches between the worksheet, ribbon, task pane, and Zoom controls.
In a worksheet that has been split, F6 includes the split panes when switching
between panes and the ribbon area.
§ Shift+F6: switches between the worksheet, Zoom controls, task pane, and ribbon.
Page | 105
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
§ Ctrl+F6: switches between two Excel windows.
§ Ctrl+Shift+F6: switches between all Excel windows.
F7 § F7 alone: Opens the Spelling dialog box to check spelling in the active worksheet or
selected range.
§ Ctrl+F7: performs the Move command on the workbook window when it is not
maximized. Use the arrow keys to move the window, and when finished press
Enter, or Esc to cancel.
F8 § F8 alone: turns extend mode on or off. In extend mode, Extended Selection appears
in the status line, and the arrow keys extend the selection.
§ Shift+F8: enables you to add a non-adjacent cell or range to a selection of cells by
using the arrow keys.
§ Ctrl+F8: performs the Size command when a workbook is not maximized.
§ Alt+F8: displays the Macro dialog box to create, run, edit, or delete a macro.
F10 § F10 alone: turns key tips on or off. (Pressing Alt does the same thing.)
§ Shift+F10: displays the context menu for a selected item.
§ Alt+Shift+F10: displays the menu or message for an Error Checking button.
§ Ctrl+F10: maximizes or restores the selected workbook window.
F11 § F11 alone: creates a chart of the data in the current range in a
separate Chart sheet.
§ Shift+F11: inserts a new worksheet.
§ Alt+F11: opens the Microsoft Visual Basic For Applications Editor, in which you
can create a macro by using Visual Basic for Applications (VBA).
Page | 106
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Class – 13
Abbreviations
MICR
Page | 107
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Ø Developed for high bandwidth applications for various types of contemporary memories
such as SDRAM.
CDMA
Page | 108
Course Enquiry
Join RBE OFFICER BATCH for All subjects complete preparation
Ø Two main technologies, liquid crystals and organic light emitting diode are mainly used.
DNS
Ø Virtual reality.
Ø A three dimensional computer generated situation that simulates the real world.
PDF
Ø Method for handling data structure where the first elements is processed last and the last
element is processed first.
Ø Web pages are shaped by HTML and attraction with the use of CSS.
CSS
Page | 112
Course Enquiry