Computer Knowledge Notes Oliveboard Converted
Computer Knowledge Notes Oliveboard Converted
in
Table of Contents
Introduction to Computers ................................................................................ 4
Characteristics of Computers .......................................................................... 4
History of Computers ...................................................................................... 4
SPECIAL EDITION Generation of Computers ................................................................................ 5
Types of Computers ........................................................................................ 6
Fundamentals of Computer ............................................................................. 7
COMPUTER
Basic Computer Organization and Data processing Cycle................................... 9
Primary Memory.............................................................................................. 9
Secondary Memory ........................................................................................ 10
Computer Peripheral........................................................................................ 12
Input Devices ................................................................................................ 12
KNOWLEDGE
Output Devices .............................................................................................. 13
Operating System ............................................................................................ 16
Layered Structure of Operating System ........................................................ 16
Functions of Operating systems .................................................................... 16
Types of Operating Systems .......................................................................... 17
Other Terms related to Operating System ..................................................... 18
COMPLETE PDF Software .......................................................................................................... 19
System Software ........................................................................................... 19
Application Software ..................................................................................... 19
Computer Languages ....................................................................................... 20
Low-Level languages..................................................................................... 20
High-Level languages .................................................................................... 21
Object-Oriented Programming ...................................................................... 21
Other related terms....................................................................................... 22
Memory Storage Units ..................................................................................... 22
Number System ............................................................................................... 23
Logic Gates ...................................................................................................... 24
Database Management System ........................................................................ 26
Architecture (Levels of Data Abstraction in DBMS) ....................................... 26
Keys in DBMS ................................................................................................ 27
Microsoft Office ............................................................................................... 27
Microsoft Word.............................................................................................. 27
Microsoft Excel .............................................................................................. 30
Microsoft PowerPoint .................................................................................... 33
File Extension .................................................................................................. 37
Computer Network .......................................................................................... 38
The five components of a computer network are: ......................................... 38
Types of Computer Network .......................................................................... 38
FOR Network Architecture .................................................................................... 39
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Electronic Numerical Integrator and Calculator – ENIAC Fifth Generation Computers – (1980 - Present)
ENIAC was the first electronic computer used for general purposes, such as solving numerical problems. The fifth-generation computers use ultra large scale integrated (ULSI) chips that contain millions of
It was invented by J. Presper Eckert and John Mauchly. components on a single chip. They are in the developmental stage which is based on the artificial
Electronic Discrete Variable Automatic Computer – EDVAC intelligence. These computers can also respond to natural language input. Biochips will be used as
memory devices and KIPS (Knowledge-based Information Processing System) architecture will be used.
EDVAC was the successor of ENIAC. In this computer, Binary numbers were used for arithmetic
operations and the internal storage of instructions were also written in digital forms. Examples – Robots, Supercomputers.
Electronic Delay Storage Automatic Calculator – EDSAC Types of Computers
EDSAC was the first practical general-purpose stored-program electronic computer. It was built Based on Operation
according to the von Neumann machine principles. ➢ Analog Computer - An Analog computer stores data continuously in the form of physical
Universal Automatic Computer - UNIVAC quantities and perform calculations with the help of measures. It produces output in the form of
UNIVAC was the first commercially available computer. It was made by the Eckert-Mauchly Computer a graph. They are used in the calculation of physical variables such as voltage, pressure,
Company. It represents the birth of the modern computers. temperature, speed, etc.
Micro Processor – INTEL 4004 ➢ Digital Computer - A Digital computer is the most commonly used type of computer and is
working with data represented in digital form, usually binary 0s and 1s. It can perform faster
In 1969, Intel Corporation designed the first general-purpose programmable processor INTEL 4004. It and give more accurate results. They are extensively used for solving complex problems in the
was a set of four chips known as the MCS-4. It included a central processing unit chip (the 4004) as field of engineering & technology, design, research and data processing.
well as a supporting read-only memory chip for the custom applications programs, a random-access
memory (RAM) chip for processing data, and a shift-register chip for the input/output (I/O) port. ➢ Hybrid Computer – A Hybrid computer is a combined feature of Analog and Digital computers. In
large industries and businesses, a hybrid computer can be used for logical operations as well as
Quick Revision efficient processing of differential equations.
Particulars Name of Person/System Based on Configuration
➢ Micro Computer – Microcomputers are small, inexpensive computer for personal use. They are
Father of Computer Charles Babbage
popularly used at homes for playing games and surfing the Internet.
Father of Modern Computer Science Alan Tuning ➢ Mini Computer - Minicomputers possess most of the features and capabilities of a large computer
but are smaller in physical size. They are used as small or mid-range operating business and
First Non-programmable Electronic Digital Atanasoff Berry Computer (ABC)
scientific applications.
Computer
➢ Mainframe Computer – Mainframe computers are expensive and large size computers and they
First General Purpose Electronic Digital Electronic Numerical Integrator and Calculator are capable of supporting hundreds of users simultaneously. They are used for specific large-
Computer (ENIAC) scale applications.
First Micro Processor INTEL 4004 ➢ Super Computer - Supercomputers are powerful, expensive and the fastest computers. They
have architectural and operational principles from parallel and grid processing for performing
First Commercially Available Computer Universal Automatic Computer billions and trillions of calculations per second. They are used for applications that require large
Generation of Computers amounts of mathematical computations like weather forecasting, fluid dynamics, graphic design
etc.
First Generation Computers– (1946-1959)
India launched ‘Mihir’ supercomputer recently to improve India’s weather forecasting.
The first-generation computers were used vacuum tubes as the electronic components. They occupied a
very large space and performed computations in milliseconds. Machine languages are used. Particulars Name of the Computer
Examples – EDSAC, EDVAC, UNIVAC, IBM-701, IBM-650. First Super Computer in the world Cray CDC 6600
Second Generation Computers – (1959-1965)
Fastest Super Computer in the world Summit by the USA
The second-generation computers replaced Vacuum Tubes with Transistors. They used assembly
languages and batch processing operating system. Magnetic cores and magnetic tapes were used as First Super Computer of India PARAM 8000
storage. Fastest Super Computer in India Pratyush
Examples – IBM-1620, IBM -7094, CDC-1604, CDC-3600.
Based on Utility
Third Generation Computers – (1965-1971)
➢ General Purpose Computer - A general purpose computer can perform an extensive variety of
The third-generation computers replaced transistors with integrated circuits (ICs). They performed
operations. It can store and execute different programs in its internal storage. All mainframes,
computation in Nanoseconds. It used high-level languages like FORTRAN, COBOL, PASCAL, ALGO-68, servers, laptop and desktop computers, smartphones and tablets are general-purpose devices.
BASIC was used. In this generation, remote processing, time-sharing, multi-programming operating
system were used. ➢ Special Purpose Computer - Special purpose computers are designed to solve specific problems.
The instructions are pre-programmed permanently in the computer. It completely controlled by
Examples - IBM-360 series, Honeywell-6000 series, PDP, IBM-370/168.
automated manufacturing processes. Example – Aircraft control system, Electronic voting
Fourth Generation Computers – (1971-1980) machines etc.
The fourth-generation computers are used Very Large Scale Integrated (VLSI) circuits. Semi-conductor Based on Mode of Use
devices are used as primary memory. Magnetic disks are used as secondary storage. Problem-oriented
➢ Palmtop Computer – Palmtop computers are small which can fit in the palm of a hand. The
fourth generation languages (4GL) are used. Multi-processing and multiprogramming operating systems electronic pen is used to give an input. They have small disk storage and can be connected to a
are used. wireless network.
Example – Apple series – I & II, IBM 4341, DEC 10, STAR 1000, PUP 11.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
➢ Laptop Computer – Laptop computers are portable with less weight. It can be transported easily 6. Name the program a personal computer’s microprocessor uses to get the computer system started
and used in temporary space such as Airplane, Meetings etc. They are designed for low power after you turn it on? (RBI Asst. Mains)
consumption and have an attached keyboard and a touchpad. (1) Vertical Programme (2) BIOS Programme (3) Horizontal Programme
➢ Personal Computer (PC) - A personal computer is a cost-effective computer that is designed for a (4) Application software (5) None of these
single end-user. PC is dependent on microprocessor technology, which allows PC makers to set
the entire central processing unit (CPU) on a single chip.
Answer keys
➢ Workstation - Workstation (WS) is faster than Personal Computer. It is designed for a user or
group of users with better multitasking capability, additional Random-Access Memory, Higher-
speed graphics adapters and drive capacity. 1. (5) 2. (4) 3. (3) 4. (2) 5. (3) 6. (2)
➢ Client and Server – The server is a device that manages the sharing of network resources to the
users. An Application server, File server, Virtual server, Mail server are some types of server. A Solutions
client is the receiving end of the service which made by the server. It requests the server and
gains access with the server.
1. Cold boot is the process of starting a computer from shutdown or a powerless state and setting it to
Fundamentals of Computer normal working condition. A cold boot refers to the general process of starting the hardware
A computer system has four basic components. components of a computer, laptop or server to the point that its operating system and all start up
Parts of a computer system applications and services are launched. Cold boot is also known as hard boot, cold start or dead start.
➢ Hardware - It represents the physical and tangible components of the computer (keyboard,
mouse, monitor etc.) 2. BIOS looks for the system files during a boot process. The BIOS is special software that interfaces
➢ Software – It is a set of electronic instructions called programs that make the computer perform the major hardware components of your computer with the operating system. It is usually stored on a
tasks. Flash memory chip on the motherboard, but sometimes the chip is another type of ROM.
➢ Data – It is a set of facts, which the computer stores and reads in the form of numbers.
➢ Users - Users are the people who make use of a computer to obtain certain results/ outcomes. 3. A device driver or hardware driver is a group of files that enable one or more hardware devices to
Mother Board – It is the main printed circuit board of a computer that carries the central processing unit communicate with the computer's operating system. Without drivers, the computer would not be able to
(CPU) chip, Read Only Memory (ROM), Random Access Memory (RAM) and the basic input output send and receive data correctly to hardware devices, such as a printer.
system (BIOS) chip. If problems or conflicts are encountered with a driver, the computer manufacturer or hardware
manufacturer releases a driver update to fix the problems.
1. Which of the following refers to the process of starting a computer from a powerless state and setting
it up to normal working condition? (NABARD) 4. Supercomputers are sometimes called number crunchier. They can do a great deal of arithmetic very
(1) Cold Boot (2) Cold Start (3) Hard Start quickly, have a great deal of high-speed storage (main memory) and have very fast internal
communications.
(4) Hard Boot (5) All of the above
The term number crunchier is sometimes applied to programs. For example, statistical programs are
number crunchers because their main task is to perform mathematical calculations.
2. Which of the following looks for system files during a boot process? (UIICL Assistant)
(1) CPU (2) Monitor (3) Keyboard 5. The Indian Space Research Organisation (ISRO) has built India's fastest supercomputer in terms of
(4) BIOS (5) Interrupt Handlers theoretical peak performance —220 trillion floating point operations per second (FLOPS).
K. Radhakrishnan, ISRO Chairman, inaugurated the supercomputer, SAGA-220, at the newly
3. Specialised program(s) designed to allow input or output device(s) to communicate with the rest of established supercomputing facility, named after Satish Dhawan, of the Vikram Sarabhai Space Centre.
the computer system is called _______.(RBI Asst. Mains)
(1) Utility Software’s (2) Operating system (3) Device Driver 6. BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get
(4) Language Translator (5) BIOS the computer system started after you turn it on. It also manages data flow between the computer's
operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and
printer.
4. Which among the following type of computers is also known informally as Number crunchier? (RBI
Asst. Mains)
(1) Minicomputer (2) Supercomputer (3) Micro computer
(4) Mainframe computer (5) Hybrid computer
5. Which among the following organisation developed a SAGA-220 supercomputer in 2011? (RBI Asst.
Mains)
(1) NASA (2) DRDO (3) ISRO
(4) JAXA (5) ICMR
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Basic Computer Organization and Data processing Cycle Dynamic Random-Access Memory (DRAM) – Dynamic memory must be constantly refreshed, or it loses
its contents. This type of memory is more economical.
The Basic Diagram of the Computer consists of Input Unit, Output Unit and Central Processing Unit.
Static Random-Access Memory – SRAM is faster and less volatile than DRAM but requires more power
and is more expensive. It does not need to be refreshed like a DRAM.
Synchronous Dynamic Random-Access Memory - A type of DRAM that can run at much higher clock
speeds.
ROM (Read Only Memory) - ROM stores data permanently on personal computers (PCs) and other
electronic devices. It performs major input/output tasks and holds programs or software instructions. It
is non-volatile.
MROM (Masked ROM) - The very first ROMs were hard-wired devices that contained a pre-programmed
set of data or instructions. These kinds of ROMs are known as masked ROMs which are inexpensive.
PROM (Programmable Read Only Memory) - PROM can be modified only once by a user. The user can
buy a blank PROM and enter the desired contents using a PROM program.
EPROM (Erasable and Programmable Read Only Memory) - The EPROM can be erased by exposing it to
ultra-violet light. EPROMs have a Quartz window in the package to expose the chip to UV light. They
were widely used as the BIOS (Basic Input Output System) chips in computer motherboards.
EEPROM (Electrically Erasable and Programmable Read Only Memory) - The EEPROM is programmed
and erased electrically. It can be erased and reprogrammed about ten thousand times. Both erasing
and programming take about 4 to 10 milliseconds. They were also used as BIOS chips.
Secondary Memory
Secondary memory stores data on a long-term basis. It cannot be processed directly by the CPU. It
must first be copied into primary storage. Secondary memory devices include magnetic disks like hard
drives and floppy disks, optical disks such as CDs and CDROMs, and magnetic tapes, USB Flash drives.
Hard drive – It is a non-removable storage device containing magnetic disks or platters rotating at high
speeds. The hard drives store data in segments of concentric circles. It may spin at 5,400 to 15,000
RPM.
Floppy Disk - Floppy disk is composed of a thin, flexible magnetic disk sealed in a square plastic carrier.
Input Unit Floppy disks were widely used to distribute software, transfer files, and create backup copies of data. To
The input unit is used for giving instructions and data by using input devices. It converts these read and write data from a floppy disk, a computer system must have a floppy disk drive (FDD).
instructions and data to the computer acceptable format and it supplies the converted instructions and Compact Disc (CD) - A compact disc is a portable storage medium that can be used to record, store
data to the computer system for further processing. data in digital form. They are fragile and prone to scratches.
Central Processing Unit Compact disc read-only memory (CD-ROM) - It is a storage device that can be read but can’t change or
The central processing unit (CPU) performs most of the processing inside a computer. CPUs have been delete it.
constructed on a single integrated circuit called a microprocessor. It consists of the control unit, the Digital Video Disc (DVD) - A device currently used to store data in large amounts and accepts high
Arithmetic Logic Unit (ALU), and the memory unit. definition material. A two-layered DVD can hold approximately 17 gigabytes of video, sound, or other
(1) Control Unit data.
The control unit manages the computer's various components. It reads and interprets (decodes) Blue-ray Disc – The upgraded version of CD and DVD discs and drives are the Blu-ray discs. It is
the program instructions, transforming them into control signals that activate other parts of the commonly known as BD-ROM. The Maximum capacity of BD disc is 25GB if single layer and 50 GB if
computer. dual layer.
(2) Arithmetic Logic Unit Holographic Versatile Disc (HVD) – It is a holographic storage format and has a maximum capacity of
The ALU can perform arithmetic and logical operations. The set of arithmetic operations that an 3.9 terabytes.
ALU supports to addition, subtraction and more complex mathematical operations. Logic Flash Drives – Flash drives are small, ultra-portable storage device. They connect to computers and
operations involve Boolean logic like AND, OR, XOR, and NOT. These can be useful for creating other devices via a built-in USB plug. They are often referred to as pen drives, thumb drives, or jump
complicated conditional statements. drives. Mostly they have a storage capacity from 8 GB to 64 GB.
(3) Memory Unit Zip Disks – An advanced version of the floppy disk is known as Zip Disks. It was developed by Iomega.
Computer main memory consists of primary and secondary memory. Zip disks are available in 100 and 250-MB and 750 MB capacities and they are used to store, share and
back up large amounts of data.
Primary Memory
Cache Memory - It is a very high-speed semiconductor memory which can speed up the CPU. It acts as
Primary memory holds only those data and instructions on which computer is currently working. It has
a buffer between the CPU and main memory. Example: Registers
limited capacity and data is lost when power is switched off. It is generally made up of the
semiconductor device. It is a volatile memory. The two types of primary memory are Random Access Virtual Memory - Virtual memory permits software to use additional memory by utilizing the hard disk
Memory (RAM) & Read Only Memory (ROM). drive (HDD) as temporary storage.
RAM (Random Access Memory) - RAM is the internal memory of the CPU for storing data, program and
result of the program. It is read/write memory which stores data till the machine is working. Some
types of RAMs are Dynamic RAM (DRAM), Static RAM (SRAM) and Synchronous Dynamic RAM (SDRAM),
etc.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
1. Which of the following is the responsibility of a logical unit in CPU?(NABARD) Computer Peripheral
(1) To perform complex Mathematical Problems. (2) To provide output in the monitor. A peripheral device links to a computer system to enhance the functionality of the computer. It is not
(3) To Compare numbers. (4) To process the input information. part of the core computer architecture. Input devices, output devices, and storage devices are the types
of peripheral devices.
(5) To channelize the flow of information.
Input Devices
Input devices serve as a link between a user and the computer. It allows users to feed instructions and
2. Which of the following refers to a standard interface for connecting a motherboard to storage devices
data to computers for processing, display, storage and/or transmission. Some input devices are:
such as hard drives and CD ROM/DVD drives? (NABARD)
1. Keyboard – It is used to enter data into the computer in both alpha and numeric forms.
(1) USB (2) IDE (3) HWA (4) PCS (5) DTR
Some important keys in a keyboard are:
(i) Toggle Keys - It is used to change the input mode of a group of keys on a keyboard. Caps Lock,
3. Which of the following is NOT true about RAM? (UIICL Assistant)
Num Lock, Scroll Lock are toggle keys.
(1) RAM scores certain fixed routines such as the boot – up routines.
➢ Caps Lock – Capitalizes all letters.
(2) RAM is volatile which means when the computer is switched off, the contents are lost.
➢ Num Lock – Makes sure numbers are inputs from the keypad.
(3) The contents cannot be changed or deleted.
➢ Scroll Lock - Allows the arrow keys to scroll through the contents of a window.
(4) Both (1) and (3)
(ii) Modifier Keys - It is a special key (key combination) that temporarily modifies the normal action
(5) All the above statements are wrong. of another key when pressed together. Shift, Alt, Ctrl, Fn are modifier keys.
➢ Shift - used for capitalizing letters and entering different types of symbols.
4. Which of the following is a part of primary storage that holds a software programme and small ➢ Function (Fn) - Other functions such as brightness and volume control.
amounts of data when they are brought from secondary storage? ( RRB PO)
➢ Control (Ctrl) - used for entering keyboard shortcuts, such as Ctrl+S, Ctrl+P etc.
(1) ROM (2) Register (3) Cache (4) RAM (5) CPU
➢ Alt - used in combination with the numeric keys and the Control key for entering keyboard
shortcuts.
5. The storage area for the next likely data or instruction to be processed preventing bottleneck and (iii) Function Keys - A key on a computer keyboard, distinct from the main alphanumeric keys, to
slowing of the system is known as _________.(RRB PO) which software can assign a function. F1 - F12 keys are known as function keys and each key
(1) Cache (2) Cookies (3) Register (4) CPU (5) RAM performs a different function. It may be used as single key commands (e.g., F5) or combined
with one or more modifier keys (e.g., Alt+F4).
Answer keys (iv) Escape Key – It is located in the upper left corner of a computer keyboard. It is often used to
quit, cancel, or abort a process which is running on a computer.
2. Mouse - It is a pointing and cursor-control device. A round ball at its base senses the movement
1. (3) 2. (2) 3. (4) 4. (4) 5. (1)
of a mouse and sends corresponding signals to CPU when the mouse buttons are pressed. A
mouse has two or three buttons called Left, Right, and Middle button.
Solutions 3. Joy Stick – It is used to move the cursor position on a monitor screen. It is mainly used in
Computer Aided Design (CAD) and playing games on the computer. It can also be helpful as an
1. To compare numbers is the responsibility of the logical unit in the CPU of a computer. input device for people with movement disabilities.
4. Track Ball – It is mostly used in notebooks or laptops. It is a ball which is half inserted and by
moving fingers on the ball, the pointer can be moved.
2. Integrated Drive Electronics (IDE) is a standard interface for connecting a motherboard to storage
devices such as hard drives and CD-ROM/DVD drives. IDE is also known as Advanced Technology 5. Scanner – It captures images from printed material and converts it into a digital format that can
Attachment (ATA) or intelligent drive electronics (IDE). be stored within the PC. Flatbed Scanners, Hand Scanners, Sheetfed Scanner are some types of
scanner.
6. Barcode Reader – It is an electronic device for reading printed barcodes. A light sensor in the
3. RAM – Random Access Memory
barcode reader can read the barcode and translates optical impulses into electrical impulses to
The main function of RAM is to store the currently active programs and their data. store the data into the computer. It is an important tool for warehouse management and
RAM is volatile which means when the computer is switched off, the contents are lost. operations.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
7. Magnetic Ink Character Recognition (MICR) – It is a character recognition system that uses Inkjet Printers - Inkjet printers work by spraying ink on a sheet of paper. The type of ink used in an
special ink and characters. It is used to verify the legitimacy or originality of paper documents, inkjet printer is wet.
especially cheques. Information can be encoded in the magnetic characters. It provides a secure, (iii) Other Types
high-speed method of scanning and processing information
Solid Ink Printer - It is a type of colour printer. It works by melting the solid ink that applies the images
8. Optical Character Recognition (OCR) - It is a technology that recognizes text within a digital to the paper. It is non-toxic and convenient to handle.
image. It converts the document to an editable text file.
LED Printer - This type of printer uses a light emitting diode instead of a laser. It starts by creating a
9. Optical Mark Recognition (OMR) – It is an electronic method that scans the document and reads line-by-line image of the page.
the data from the marked fields and results can be transmitted into the computer.
3. Plotters - A plotter is an output device used to produce hard copies of large graphs and designs
10. Digitizer – It allows users to draw and manipulate graphics on the screen. It is also known as a on paper, such as construction drawings, architectural plans, and business charts. Drum plotters
graphics tablet. These kinds of tablets typically designed for CAD/CAM professionals. and Flatbed plotters are the types of plotters.
11. Touch Screen - It is a computer display screen that serves as an input device. A touchscreen can (i) Drum plotter – It is a pen plotter that wraps the paper around a drum with a pin feed
be touched by a finger or stylus. Touchscreen records the event and sends it to a controller for attachment. The drum then rotates the paper as pens move across it and draw the image. It is
processing. used to produce continuous output, such as plotting of earthquake activity. It is also known as
12. Microphone – Microphone translates sound vibrations in the air into electronic signals. It enables Roller Plotter.
many types of audio recording devices for purposes including communications, music and speech (ii) Flatbed plotter - It plots on paper that is spread and fixed over a rectangular flatbed table. It is
recording. used in the design of cars, ships, aircrafts, buildings, highways etc. It is also known as Table
13. Web Camera – It captures and stores images in digital form. The stored images can be can be Plotter.
archived on a photographic compact disc or external hard disk. 4. Speaker - Speakers are one of the output devices used with computers. They are transducers
14. Light Pen - It is a light-sensitive input device, used to select text, draw pictures and interact with that convert electromagnetic waves into sound waves.
user interface elements on a computer screen or monitor. 5. Digital Projectors – Projector is a device that connects with a computer and projects the output
Output Devices onto a white screen or wall.
The Output devices are used to send data from a computer to another device. Examples are monitors,
projectors, speakers, plotters, and printers etc. 1. Which of the following is a computer hardware? (UIICL Assistant)
1. Monitors – Monitors are the main output device of a computer. It forms images from tiny dots (1) MS Windows (2) MacOS (3) Ubuntu
that are arranged in a rectangular form. The sharpness of the image depends on the number of (4) Printer (5) Unix
pixels. There are two kinds of viewing screens used for monitors.
(i) Cathode-Ray Tube (CRT) - The CRT display is made up of small picture elements called pixels.
CRT tube creates an image on the screen using a beam of electrons. 2. Keyboards convert characters to _______ code. (UIICL Assistant)
(ii) Flat- Panel Display - The flat-panel display refers to a class of video devices that have reduced (1) ASCII (2) EBCDIC (3) AMIS
volume, weight and power requirement in comparison to the CRT. (4) ISO Latin (5) Binary Format
(iii) Liquid Crystal Display (LCD) Monitor - LCD monitors use compact fluorescent tubes to illuminate
and brighten the image on the screen and produce good image quality, resolution and contrast 3. Which of the following refers to the time the alphanumeric key is to be held before the keyboard will
levels. repeat itself? (RRB PO)
(iv) Light Emitting Diode (LED) Monitor - LED monitors use new backlighting technology to improve (1) Repeat Rate (2) Keyboard Rate (3) Alphanumeric Rate
picture quality. The LED monitor is more lifelike and accurate due to the improved contrast ratios (4) Key Rate (5) Relay Rate
and colour saturation over LCD.
(v) Organic Light Emitting Diode (OLED) Monitor – This type of monitor made up of some organic
material (containing carbon, like wood, plastic or polymers) that is used to convert the electric 4. Which of the following is a power protection device that includes a battery providing power for a
current into light. They are directly used to produce the correct colour and there is no need for short period of time? (RRB PO)
backlight which saves power and space. (1) ESD (2) EMI (3) SPIKE
2. Printers – Printers are output devices that prints information in the form of text/images on a (4) UPS (5) Surge Suppressor
paper. Impact Printers and Non-impact printers are the two types of printers.
(i) Impact Printers - The impact printers print the characters by striking them on the ribbon which is 5. What is the name of the temporary data storage area between a peripheral device and CPU which
then pressed on the paper. Examples: Dot-Matrix Printers, Line Printers, Daisy wheel printer, compensates for the difference between their speeds? ( RRB PO)
Drum printer, Chain printer, Band printer. (1) Backing Storage (2) Buffer (3) Main Storage
Dot-Matrix Printers – It prints characters as a combination of dots. They have a matrix of pins on the (4) Temporary Storage (5) Permanent Storage
print head of the printer which form the character. They generally have 9-24 pins. Their speed is
measured in cps (Character per second).
Line Printers - A line printer is an impact printer which can print one line of text at a time. It is also 6. Which of the following printers cannot print graphics? (NABARD)
known as a bar printer. (1) Ink Jet Printer (2) Laser Printer (3) Daisy Wheel Printer
(ii) Non-Impact Printers - Non-impact printers print the characters on the paper without using (4) Both (1) & (2) (5) All of the above
ribbon. These printers print a complete page at a time, so they are also called as page printers.
Examples - Laser Printers, Inkjet Printers etc.
Laser Printers - A laser printer is a popular type of personal computer printer that uses a non-impact
photocopier technology. The type of ink used in a laser printer is dry. It gives high-quality output. The
resolution of laser printers is measured in dpi (dots-per-inch).
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
7. Which among the following options specifies this action: Holding the mouse button down while Operating System
moving an object of text? (RBI Asst. Mains)
An Operating System (OS) is a program that acts as an interface between a computer user and
(1) Highlighting (2) Dropping (3) Moving computer hardware. It performs all the basic tasks and controls the peripheral devices such as disk
(4) Dragging (5) Clicking drives and printers.
Examples – Linux (Ubuntu), Windows (Windows XP, Windows 7, Windows 8, Windows 8.1, Windows
Answer keys 10), iOS, Chrome OS, DOS etc.
Apple’s latest operating system, macOS Mojave, version 10.14.
1. (4) 2. (1) 3. (1) 4. (4) 5. (2) 6. (3) 7. (4) Layered Structure of Operating System
Solutions
1. Computer "Hardware" refers the physical parts of the computer, and "software" refers to the code
that runs on the computer. Printer is a hardware.
3. After you press and hold down a key on the keyboard, the key starts repeating itself. The speed at
which it repeats is the repeat rate, which can be fast or slow.
4. UPS helps protect against potential electrical power problems by supplying a consistent level of
electrical power to a computer or other device. The battery is constantly recharging while the UPS is in
use. The UPS provides a consistent quality of power when brownouts and blackouts occur. Many UPS
devices can communicate directly with the computer operating system. This communication allows the
UPS to safely shut down the computer and save data prior to the UPS losing all electrical power.
5. Buffer is the temporary data storage area between a peripheral device and the CPU which Functions of Operating systems
compensates for the difference between their speeds. The operating system is the manager of all system resources. The functions of operating systems are:
In computer science, a data buffer (or just buffer) is a region of a physical memory storage used to ➢ Memory Management
temporarily store data while it is being moved from one place to another. Typically, the data is stored in ➢ Process Management
a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an ➢ Device Management
output device (such as speakers). However, a buffer may be used when moving data between
processes within a computer. This is comparable to buffers in telecommunication. ➢ File Management
➢ Storage Management
6. Daisy-wheel printers cannot print graphics, and in general they are noisy and slow, printing from 10 ➢ Security
to about 75 characters per second. As the price of laser and ink-jet printers has declined, and the ➢ Job Accounting
quality of dot-matrix printers has improved, daisy-wheel printers have become obsolete. ➢ Controls system performance
➢ Error detecting aids
7. Dragging the mouse refers to moving its position while holding the mouse button depressed. ➢ Coordination between other software and users
Dragging is used in the Plot window to move text items and to move the plot itself within the Plot Memory Management - Memory management is the process of controlling and coordinating computer
window. To drag an object across a display screen, we usually select the object with a mouse button memory, conveying memory blocks to various running programs to enhance overall system
and then move the mouse while keeping the mouse button pressed down. performance.
Process Management – Process Management allocates the processor (CPU) to a process and de-
allocates the processor when a process is no longer essential. It can save the tracks of the processor
and the status of the process.
Device Management – Device Management keeps track of all devices. This is called the Input/output
controller and it decides which process gets the device, when, and for how long.
File Management – File Management allocates and de-allocates the resources. It keeps track of
information, location, uses, status etc. The collective facilities are known as a file system.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Storage Management – Storage Management provides secondary storage to backup main memory. It Example – Windows 95, Windows XP etc
can store all data and program permanently. Disk scheduling, Storage allocation, Free space Real-Time Operating System – It is a data processing system in which the time interval required to
management are the activities in Storage Management. process and respond to inputs is small. It is always online whereas online system need not be real time.
Security – Security controls the unauthorized access of programs, processes and data resources by They are used in scientific experiments, medical imaging systems, industrial control systems, weapon
means of passwords etc. It can be used to ensure that the files, memory segment, and other resources systems, robots, air traffic control systems, etc.
can be operated only by authorized users. Examples – VRTX, RT Linux, Lynx etc
Job Accounting – It keeps track of time and resources used by various users and processes. There are two types of real-time operating systems.
Control System Performance – Control System records delays between the request for a service and ✓ Hard real-time systems - In this system, the critical tasks complete on time. Secondary storage
from the system. is limited, and the data is stored in ROM. Virtual memory is almost never found.
Error Detecting Aids – Error detecting Aids ensure the consistent delivery of data across the network. Examples – Industrial control applications, Robots, etc
Production of dumps, traces, error messages and other debugging etc are techniques that enable
✓ Soft real-time systems - In this system, the time constraint is less strict. A critical real-time task
reliable delivery of digital data over unreliable communication channels.
gets priority and retains the priority until it completes. It has limited utility.
Coordination between other software and users - Operating System Coordinates and assigns compilers,
Examples – Multimedia, Virtual reality, Advanced Scientific Projects like undersea exploration
interpreters, assemblers and other software to the various users of the computer systems.
and planetary rovers, etc.
Types of Operating Systems Advantages
➢ Batch Operating System ✓ It can be used in an embedded system
➢ Multi-Programming Operating System ✓ Error-free
➢ Timesharing/Multitasking Operating System ✓ Better memory allocation
➢ Distributed Operating System Disadvantages
➢ Real-Time Operating System ✓ Algorithm is complex
➢ Single-user operating System Android - Android is the name of the operating system used on many smartphones and tablets. It is
Batch Operating System - The users of the batch operating system do not interact with the computer owned and maintained by Google. The recent version of Android is Android 11.
directly. Each user prepares his job on an off-line device like punch cards and submits it to the
Other Terms related to Operating System
computer operator.
Booting - When the computer starts, the operating system is first loaded (as it is essential for running
Disadvantages
all other programs), this process is known as booting.
✓ Lack of interaction between the user and the job
Cold Boot – Turn ON the computer from an OFF position is called Cold Booting.
✓ The speed of the process is slow. Hence Output is time taking
Warm Boot - A computer system starts up/reset from a complete powerless state is called Warm
✓ The CPU is in idle condition Booting.
Multiprogramming Operating System – The users of multiprogramming operating system can execute Firmware - Firmware is a software program that is written to a hardware device. It allows the hardware
several programs simultaneously. The CPU keeps on processing. The processes which are running exist to be updated. The contents are saved when a hardware device is turned off or loses its external power
in main memory at a time. source.
Disadvantages Middleware - Middleware is a software layer situated between applications and operating systems. It
✓ The waiting time for the job is high enables communication and data management for distributed applications.
✓ Complicated schedule handling
Timesharing / Multitasking Operating System - Time-sharing or multitasking is a logical extension of 1. The feature that opens a window on your desktop where you can browse for file stored on your
multiprogramming. It is a technique which enables many people, located at various terminals, to use a computer is called as _________.(RRB PO)
computer system at the same time. The CPU executes multiple programs by switching among the (1) Device Manager (2) File Explorer (3) Web Browser
programs. Unix is an example of timesharing OS.
(4) Utility Software (5) None of the above
Disadvantages
✓ Less Reliability
2. In MS-DOS 6.22, which part identifies the product uniquely? (RBI Asst. Mains)
✓ Problem of Data Communication
(1) MS (2) DOS (3) MS-DOS
Distributed Operating System – Distributed Operating System allows multiple users on different
(4) None of these (5) 6.22
computers or terminals to access a single system with one Operating System on it. The processors
communicate with one another through various communication lines. These are referred to as loosely
coupled systems. 3. Each time you turn on your computer, it will check on the ______ control file. (RBI Asst. Mains)
Advantages (1) Command.com (2) io.sys (3) msdos.sys
✓ Potential Operation (4) Both A & B (5) All the above
✓ Better service to the customers.
✓ The load on the host computer is reduced Answer keys
✓ Delays in data processing are reduced
Single User Operating System – This type of operating system supports a single user at any given time. 1. (2) 2. (5) 3. (5)
Single keyboard and Single monitor are used for interaction. Several programs can also run by a single
user in this operating system.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Solutions Specialized application software - Specialized application software is designed for a specific task rather
for a wide application area. Graphics programs, audio and video editors, multimedia creation programs,
web authoring, and virtual reality programs are common types of specialized software.
1. File Explorer is a file browser found in every version of Microsoft Windows since Windows 95. It is
used to navigate and manage the drives, folders, and files on your computer. The image below shows
File Explorer in Windows 10. 1. Bookmarks can be managed using _______.( RRB PO)
(1) Bookmarks Manager (2) Extensions Manager (3) Cast
2. MS stands for Microsoft, DOS is the name of operating system Disk Operating System, 6.22 is the (4) Find (5) Downloads Manager
version number that identifies the product. Microsoft DOS 6.22 was the last standalone version from
Microsoft. It was also the last from Microsoft to run on an 8088, 8086, or 286.
2. Which among the following options is the line that describes the contents of the message while
sending an e-mail? (RBI Asst. Mains)
3. command.com, io.sys and msdos.sys are the essential system files of MS-Dos. Loading these files (1) Subject (2) Cc (3) Bcc
from disk into memory is known as booting. Booting is the process of preparing your computer to work.
(4) To (5) None of these
IO.SYS is a hidden executable binary file or hidden system file which processes instructions when the
operating system is booted.
Answer keys
Software
1. (1) 2. (1)
The software is a group of instructions that instructing a computer to do specific tasks. It enables the
user to interact with a computer. System Software and Application Software are two types of software.
System Software Solutions
It serves as an interface between a computer user, computer hardware and application software. It is
also known as background software. Four types of system software are the following. 1. Bookmarks Manager can manage bookmarks. Bookmark manager software saves and organizes web
✓ Operating System content and websites so users can refer to it later. Bookmark managers will either work alongside, or
inside of, a web browser, allowing users to save web content and return to it later without opening
✓ Utility Programs
another application.
✓ Device drivers
✓ Language translators.
2. Subject is a description of the topic of the message and displays in most email systems that list email
Operating System - Operating system (OS) is the program that acts as an interface between the user messages individually. When entering the subject line be sure to include important information such as
and computer hardware and application software. After the boot program, OS manages all the other what the email is about. If we are too vague or don't include any subject line at all, message could be
programs in a computer. Examples - Linux, Unix, Microsoft Windows XP etc. mistaken for spam and deleted without ever being read.
Utility Programs - Utility Programs help to manage, maintain and control computer resources. They are
also known as service programs. Examples of utility programs are antivirus software, backup software,
disk defragment, backup, disk clean etc. Computer Languages
Device Drivers - A device driver is designed to enable interaction with hardware devices. It controls a The different kinds of languages have been developed to perform various types of work on the
device that is attached to your computer. Printers, Displays, CD-ROM readers, Disk drives etc are the computer. The two major types of programming languages are Low-Level Languages and High-Level
examples of the device driver. Languages.
Language Translator – Language Translator translates the high-level language program (input) into an Low-Level languages
equivalent machine language program (output). It also detects and reports the error during translation. It is a programming language that deals with a computer's hardware and its configuration. It is very
Assembler, Compiler, Interpreter are types of a Language Translator. close to the computer’s native language. It is further divided into Machine and Assembly languages.
Assembler – It converts assembly language program into machine language. Machine Language – It consists of binary digits or bits. It can directly understand by the computer and
Compiler – It converts the program in a high-level language into low-level language and reports all the does not need a translator program. It is also called the machine code. It is efficient but difficult to
errors of the program along with the line numbers. C, C++ use compilers. learn.
Interpreter – It converts the programs in a high-level language to low-level language. It translates line Advantages
by line and reports the error once after completing the translation process. It gives better error ➢ Programs run fast.
diagnostics than a compiler. Python, BASIC, and Ruby use interpreters. ➢ No translation program is required.
Application Software Disadvantages
Application software is a program or group of programs designed for end users. It enables the user to ➢ Difficult to program
complete tasks, such as creating documents, spreadsheets, databases, and publications, doing online ➢ Debugging is also an issue
research, sending email, designing graphics etc. There are two types of application software.
Assembly Language – A combination of letters and numbers forms the Assembly Language and a
✓ Basic application software translator program is required to translate to the machine language. The operation codes and operands
✓ Specialized application software are given in the form of alphanumeric symbols which are known as mnemonic codes and can combine
Basic application software - Basic application software is also known as general purpose applications in a maximum of five-letter combinations e.g. ADD for addition, SUB for subtraction etc. This is also
and productivity applications. These programs are widely used in every discipline and occupation. Word known as Symbolic Programming Language.
processors, spreadsheets, database management systems, and presentation graphics are the common
types of basic application software. Example - Microsoft office 2016.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
21
Zettabyte (ZB) 1024 ES/ 10 bytes 12 1100 14 C
Yottabyte (YB) 1024 ZB/ 1024 bytes 13 1101 15 D
Bit – Binary Digit has the logical representation of 0 and 1. 14 1110 16 E
Nibble 4 Bits 15 1111 17 F
Byte 8 Bits 16 10000 20 G
KB (Kilobyte) 1024 Bits
MB (Megabyte) 1024 KB Logic Gates
GB (Gigabyte) 1024 MB These are the building blocks of any digital circuit that implement Boolean logic processes. It has only
one output. Arrays of logic gates are used in digital integrated circuits (ICs). The basic logic gates and
TB (Terabyte) 1024 GB their functioning (truth table) are mentioned in the following figure.
PB (Petabyte) 1024 TB AND Gate
EB (Exabyte) 1024 PB
1. Which of the following arrangements is correctly places in ascending order? (UIICL Assistant)
(a) KB < MB < GB < TB (b) Byte < MB < EB < PB (c) Nibble < KB < MB < PB
(1) Only (a) (2) Only (b) (3) Only (c)
(4) Both (a) & (b) (5) Both (a) & (c) It is a digital logic gate with two or more inputs and one output which performs logical conjunction.
A B AB
Answer keys
0 0 0
1. (5)
0 1 0
Solutions
1 0 0
1. Bit < Nibble < Byte < KB < MB < GB < TB < PB < EB < ZB < YB 1 1 1
OR Gate
Number System
The Number system is a technique to represent and work with numbers. The most widely adopted
number system is the Decimal number system which has 10 digits (0-9). Binary number system (0,1),
Octal number system (0-7) and Hexadecimal number system (0-9, A, B, C, D, E, F, G) are other
number systems.
The number of digits in a system is called ‘radix’ or ‘base’. The base of decimal, binary, octal
hexadecimal system is 10, 2, 8 and 16 respectively. It is a logic gate that produces inclusive disjunction. It is used in Boolean algebra and electronic circuits
Comparison of Decimal, Binary, Octal and Hexadecimal system. like transistor-transistor logic, and complementary metal-oxide semiconductors etc.
Decimal Binary Octal Hexadecimal A B A+B
0 0000 0 0 0 0 0
1 0001 1 1 0 1 1
2 0010 2 2 1 0 1
3 0011 3 3 1 1 1
4 0100 4 4 NOT Gate
5 0101 5 5 NOT gate is a single input gate. It performs the inversion of given input. So, it is called Inverter.
6 0110 6 6
7 0111 7 7
8 1000 10 8
A
9 1001 11 9
0 1
10 1010 12 A
1 0
11 1011 13 B
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
XNOR Gate
NAND Gate
It is the combination of AND & NOT gates. It is the opposite of AND logic gate.
It is a combination of the Exclusive-OR gate and the NOT gate. The EXOR gate has a high output only
when an odd number of inputs are high.
A B
A B 0 0 1
0 0 1 0 1 0
0 1 1 1 0 0
1 0 1 1 1 1
1 1 0
NOR Gate
Database Management System
A database management system (DBMS) is a computer program designed for creating and managing
the database. It provides a systematic way to run operations like creating, storing, retrieving, deleting
data from the database. It serves as an interface between the database and end users. It also provides
protection and security to the databases.
MySQL, Oracle, SQL Server, IBM DB2, PostgreSQL, Amazon Simple DB (cloud-based) are some
popularly used DBMS.
It is the combination of NOT & OR gates. ‘neither this nor that’ is the principle of NOR gate. Advantages of DBMS
XOR gate is a special type of gate. It is used in the half adder, full adder and subtractor and controlled
inverter circuit. It is also used in the computers for implementing the binary addition.
A B A⊕B
0 0 0
0 1 1
1 0 1
1 1 0
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Physical Level/Internal Level - It is the lowest level of abstraction. It describes how the data is Home Tab
physically stored in detail. B+ tree, Hash file organization methods are used in this level. The Home tab is the default tab in Microsoft Word, Microsoft Excel, Microsoft PowerPoint and other
Logical Level/Conceptual Level - It is the next level of abstraction and describes what data is stored and Microsoft Office products. It allows changing document settings, such as the font properties by using
what is the relationship among that data. At the logical level, each record is described by a type and the control groups on the tab. The control groups and keys are
interrelationship of these record types. Database administrators work at this level of abstraction. The ✓ Clipboard Group (Copy (only one item at a time), Paste, Cut, Format Painter)
changes which are done at this level will not affect the external or physical levels of data.
✓ Font Group (Font style, colour & size, Bold, Underline, Strikethrough)
View Level/External Level - It is the highest level of abstraction and is viewed by the user in terms of
✓ Paragraph Group (Bullets & Numbering, Alignment, Shading, Borders, Line spacing)
tables and relations. It describes only a part of the entire database and hides the details of the logical
level. ✓ Style Group (Listed Styles)
✓ Editing Group (Find, Replace etc).
Keys in DBMS Insert Tab
A key is a field in the database table which is used to retrieve and sort rows in the table. Keys are used The Insert Tab is used to insert different features such as tables, pictures, clip art, shapes, charts, page
to speeding up the data accessing and creating links between different tables. numbers, word art, headers, and footers etc into a document. The availed groups and keys under this
tab are:
Super Key - It is a set of one or more attributes whose values uniquely determine each entity in the
database table. It is a subset of a candidate key. ✓ Pages Group (Cover page, Blank page, Page break)
Candidate Key - It is a set of columns in the table from which primary key can be selected to identify ✓ Tables Group (Tables)
each record. Every database table may have one or more candidate keys. ✓ Illustrations Group (Pictures, Shapes, Smart Art etc)
Primary Key - It is a special key that uniquely identifies each record in the table. It has a unique value ✓ Media and Links Group (Hyperlink, Bookmark etc)
for each row of data and it cannot contain null values. ✓ Header and Footer Group (Page number, Header, Footer)
Composite Key - It is a combination of more than one column in the table that can be used to uniquely ✓ Text Group (Text Box, Word Art etc)
identify each record. It is also known as a Compound key. ✓ Symbol Group (Equation, Symbol)
Alternate Key - All keys except primary key are known as Alternate. Alternate keys are also called Design Tab
Secondary Keys.
Design Tab includes Themes (to change colours, fonts and effects for the document all at once), The
Foreign Key - Foreign key points to the primary key of another table. It acts as a reference between Style Set gallery (to change the styles), Paragraph Spacing, Effects, The Page Background group
tables. It can accept the null and duplicate value. (watermark, page colour, page borders) buttons to format the document.
Layout Tab
Microsoft Office The Layout Tab holds the buttons which are used to arrange document pages. The control groups and
It is an office suite of inter-related desktop applications, servers and services for the Windows operating keys under layout tabs are:
systems introduced by Microsoft in 1989. Some important application software of the MS Office is MS ✓ Page Setup Group (Margins, Orientation, Breaks, Line numbers, Hyphenation, Size of the page,
Word, MS Excel, MS Power-point, MS Access, MS OneNote, MS Outlook etc. Columns)
Microsoft Word ✓ Paragraph Group (Paragraph Indentation, Spacing)
Microsoft Word is a word processing program that was first made public by Microsoft. It is one of the ✓ Arrange Group (Align, wrap text, Rotate etc)
most widely used word processors available for Macs and PCs. It offers a variety of features such as References Tab
creating, editing and formatting etc. Some other features include spell check, mail merge and link
References Tab allows to now create a table of contents, footnotes, citations, cross-references. The
embedding. Another feature is word wrapping, which means that the processor automatically adjusts all
availed control groups and keys in this tab are:
text within the specified margins. ‘.doc and .docx’ are the file extension of MS word.
✓ Table of Contents Group (Customize table of contents)
Title Bar
✓ Footnotes Group (Insert footnotes)
The title bar is located at the top of a window that displays the name of the window or document being
used. ✓ Research Group (Smart outlook of the text)
Quick Access Tool Bar ✓ Citations & Bibliography Group (Inserting and choosing a style of citation, Bibliography)
The quick access toolbar is a small and customizable toolbar at the top of the document window. It ✓ Captions group (cross reference, insert a table of figures, Insert Caption)
contains a set of commands that are independent of the tab on the ribbon that is currently displayed. It ✓ Index Group (Insert Index, Mark entry)
usually contains buttons to save, undo, redo and print. ✓ Table of Authorities group (Mark Citation, Insert Table of Authorities)
Ribbon Mailings Tab
The Ribbon is a cluster of toolbars in Microsoft Office which are used for writing, designing, formatting Mail Merging is an ideal task in MS word by using Mailings Tab. Mail merge is used to create form letters
and reviewing different styles, adaptations, add-ins, themes etc. Every tab in the top of a given word or address labels, certificates with unique names, and more. The following group buttons are available
file window displays the Ribbon toolbar. in Mailings Tab.
The following are the specifications of MS office 2016 version. ✓ Create Group (Envelops, Labels)
File Menu ✓ Start Mail Merge Group (Start Mail Merge, Selection of Recipients, Edit Recipient List)
The File menu is a section on the Office ribbon that gives access to file functions such as Open, Save, ✓ Write & Insert Fields Group (Highlighting the fields, Address Block, Greeting Line etc)
Close, Properties, and Recent file options. Type of file (i.e. Text file, Word file, HTML file, etc.), file
✓ Preview Results Group (Check for errors, Find Recipient)
name, size of the file, file location, security on the file, time and date of creation, modification of the file
can also be accessed by anyone. ✓ Finish Group (Finish & Group)
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
✓ Clipboard Group (Paste, Cut, Copy, Format Painter) ✓ Forecast Group (What-If Analysis, Forecast Sheet)
✓ Font Group (Bold, Italic, Underline, Font Style, Colour & Size {decrease and increase}, Fill ✓ Outline Group (Group, Ungroup, Subtotal)
colour, Borders) Review Tab
✓ Alignment Group (Alignment {Top, Middle, Bottom, Left, Right, Centre}, Orientation, wrap text, It contains the editing feature, comments, track changes and workbook protection options. It makes to
Merger& Centre, Indent decrease & increase) share the data easily with the proper information and ensuring the security of data.
✓ Number Group (General, Accounting Number Format, Percent style, Comma style, Increase and ✓ Proofing Group (Spell Check, Thesaurus)
decrease decimal)
✓ Language Group (Translate)
✓ Styles Group (Conditional Formatting, Format as Table, Cell Styles)
✓ Comments Group (Comment – New, Delete, Previous, Next, Hide/Show)
✓ Cells Group (Insert cells, Delete cells, Format cells)
✓ Protect Group (Protect Sheet, Protect Workbook, Allow Edit Ranges, Unshared workbook)
✓ Editing Group (AutoSum, Fill, Clear the format, Sort& Filter, Find & Select)
✓ Ink Group (Start Inking, Hide Ink)
Insert Tab
View Tab
Insert Tab is used to insert the picture, charts, filter, hyperlink etc. Alt+N is the shortcut Key to open
View tab helps to change the view of an Excel sheet and make it easy to view the data. This tab is
Insert Tab. The Insert Tab groups and keys are:
useful for preparing the workbook for printing. The groups and keys under this tab are
✓ Tables Group (Pivot Table, Recommended Pivot Tables, Table)
✓ Workbook Views Group (Normal, Page Break Preview, Page Layout & Custom View)
✓ Illustrations Group (Pictures, Online pictures, Icons, Shapes, Smart Art Graphic, 3D models,
✓ Zoom Group (Zoom {range – 10% to 400%}, Zoom to selection)
Screenshot)
✓ Window Group (New Window, Arrange All, Freeze Panes, View side by side, Synchronous
✓ Add-ins Group (Store, Insert Add-ins)
Scrolling, Reset Window, Show/Hide, Switch Windows)
✓ Charts Group (Recommended charts, Maps, Pivot Chart Charts*)
✓ Macros Group (Macros)
✓ Tours Groups (3D Maps)
Help Tab
✓ Sparklines Group (Line, Column, Win/Loss)
The user can get help using this tab, by pressing F1 Key.
✓ Filters Group (Slicer, Timeline)
✓ Help & Support Group (Help, Contact Support, Feedback, Show Training, What’s New)
✓ Links Group (Hyperlink)
✓ Community Group (Community, Blog Site, Suggest a Feature)
✓ Text Group (TextBox, Header & Footer), WordArt, Signature line, Object)
Other Terms
✓ Symbols Group (Equation and Symbol)
Workbook – It is an Excel file which contains worksheets of rows and columns.
*Charts – There are eight types of charts. Colum or Bar Chart, Hierarchy Chart, Line or Area Chart,
Worksheet – A single document or sheet in a workbook which is used to store and work with data. It
Combo Chart, Statistic Chart, Bubble Chart, Pie Chart, Waterfall, Funnel, Stock, Surface or Radar Chart.
consists of rows and columns. In Excel 2016, Default worksheet in a workbook is one.
Page Layout Tab
Row & Column Headings – It indicates the number of rows (Left of the worksheet) and alphabet of
The features under this tab used to change the look of a workbook. The groups under this tab are: column (Top of the worksheet). The total number of rows is 1,048,576 and columns is 16,384 in the
✓ Themes Group (Themes, Colours, Fonts, Effects) new version of Excel sheet. Column width is 255 characters and row height is 409 points.
✓ Page Setup Group (Margins, Orientation, Size, Print Area, Breaks, Background, Print Titles) Cell – Cell is a box which is the intersection of a row and column in a worksheet. It is the smallest block
✓ Scale to fit Group (Page scale, Width and Height) of the spreadsheet. The cell in which the user working is known as Active Cell. The maximum number of
line feeds per cell is 253 in the new version of Excel.
✓ Sheet Options Group (Gridlines, Headings)
Cell Address – The location of a cell is known as Cell Address. Example: C10 (Column: Row)
✓ Arrange Group (Bring Forward, Send Backward, Align, Group, Rotate, Selection Pane)
Autofill – Autofill fills the values in the cell according to a given pattern. (i.e. Months & Days, Even
Formulas Tab
Numbers, Odd Numbers, tens, etc) This is done through the Fill Handle.
Formulas Tab is used to make dynamic reports by using functions. In excel, 461 functions are availed
Formula – It is an expression which calculates the value of a cell. It always starts with a ‘=’.
from Office 2003 to 2013. Formulas Tab is divided into four groups.
Formula Bar – It is located just below the ribbon. It shows the contents of the active cell and allows to
✓ Function Library (Insert Function, AutoSum, Financial & Logical Function, Date &Time, Math&
create and view formulas.
Trig, Lookup &Reference, Text, More functions {Statistical, Engineering, Cube etc})
Pivot Table – Pivot Table is an interactive report creation system. It is used to reorganize and
✓ Defined Names group (Name Manager, Define Name, Use in Formula, Create from selection)
summarize the data.
✓ Formula Auditing (Trace Precedents & Dependents, Error Checking, Evaluate Formula, Watch
Flash Fill – Flash Fill is used to identify the patterns in existing data. It copies only required data from
window)
one column to another.
✓ Calculation Group (Calculate sheet, options)
Freeze Panes – It is used to freeze rows/columns in place and making it visible when scrolling. Example
Data Tab – Header row visible
Data tab is used for importing a large amount of data. Importing Data can be done by connecting with Macro – It is a sequence of instructions that replace a repetitive series of keyboard and mouse actions
the server, automatically from the web, MS Access etc. It makes easy to read vast data. to execute. It is used in MS Word and MS Excel.
✓ Get & Transform Data Group (Get Data, From Text/CSV, Web, Table/Range, Existing Status Bar – It is the Bar below the worksheet names that has a few buttons and indicators.
Connections)
Wrap Text –When text exceeds a column width/Height, wrap text automatically adjust the height/width
✓ Queries & Connection Group (Refresh All, Properties, Edit Links, Queries, Connections) of a cell to make all text visible.
✓ Sort & Filter Group (Sort, Filter, Reapply, Clear, Advanced) Sparklines –They are graphs that can fit into one cell and gives the information about the data.
✓ Data Tools Group (Text to columns, Flash Fill, Remove Duplicates, Data Validation, Consolidate,
Manage Data Mode, Relationships)
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
✓ Paragraph Group (Bulleting, Numbering, Align Text, Text direction, Convert to SmartArt) ✓ Ink Group (Start inking, Hide ink)
✓ Drawing Group (Shapes, Arrange, Quick Styles, Shape Fill, Shape Outline, Shape Effects) ✓ OneNote Group (Linked Notes)
Insert Tab View tab is used to access the various presentation views, to show and hide the ruler and grid lines, and
more.
It is used to add features such as tables, pictures, clip art, shapes, charts, word art, or headers, and
footers into a presentation. The groups and buttons in this tab are: ✓ Presentation Views Group (Normal, Outline view, Slide Sorter, Notes Page, Reading view)
✓ Slides Group (New Slide) ✓ Masters View Group (Slide Master, Handout Master, Notes Master)
✓ Tables Group (Draw/Add Table) ✓ Show Group (Ruler, Gridlines, Guides, Notes)
✓ Images Group (Pictures, Online Pictures, Screenshot, Photo Album) ✓ Zoom Group (Zoom {10% to 400%}, Fit to the window)
✓ Illustrations Group (Shapes, Icons, 3D models, Smart Art, Chart) ✓ Colour/Grayscale Group (Colour, Grayscale, Black &White)
✓ Add-ins Group (Store, Add-ins) ✓ Window Group (New window, Arrange All, Cascade, Move Split)
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
✓ Macros Group (Macros) 2. Which of the following shortcut keys is used to ‘Find and Replace’ text in a word document? (RRB
Other Terms Assistant)
Presentation – A Presentation is a collection of individual slides that contain information on a topic with (1) CTRL + G (2) CTRL + H (3) CTRL + I
audio, visual features. It makes an interaction between a speaker and an audience. (4) CTRL + F (5) CTRL + K
Design Template - A PowerPoint template is a pattern of a slide whose format and colour scheme is
used as the basis for other presentations. It can contain layouts, theme colours, theme fonts, theme 3. Which of the following is NOT true about hyperlink in MS Word? (NABARD)
effects, background styles, and even content.
(1) Hyperlinks can only be used to create a link for an existing webpage and not to an existing file on
Master Slide – A slide that controls the properties such as theme, layout, background, colour, fonts, and your computer.
positioning of all other slides in a presentation.
(2) It can be made using the INSERT Tab in a Word Document.
Normal View - Normal view is used for creating, editing and viewing presentation slides. It contains all
(3) The shortcut command to create a hyperlink in a word document is CTRL + K.
three view panes such as Slides, Outline and Notes.
(4) The option ‘Place in This Document’ is used to refer to a link in the current document.
Greyscale - Grayscale is a variety of shades of grey (Black and white combination) without apparent
colour. (5) Apart from hyperlinks in text, one can also create links in images.
Notes Pane - It is used to add notes and graphics that apply to the current slide in the presentation. It
is also used to print the notes. 4. Which of the following is the shortcut key for paste? (RRB PO)
Slides Pane – Slide Pane displays the slides thumbnails. It allows the user to view and edit the slides. (1) Ctrl + V (2) Ctrl + A (3) Ctrl + C
Outline Pane – Outline Pane displays the text from the slides. (4) Ctrl + P (5) Ctrl + K
Slide Show View – It is used to display the presentation. It is the way to preview the presentation.
Slide Sorter View – It shows all the slides in a presentation as thumbnails. It is used to reorganize, 5. Setting fonts for the text in your document is an example of _____.(RBI Asst. Mains)
insert, delete and copy the presentation slides. (1) Reviewing (2) Designing (3) Inserting
Slide Timing – It is the time period that a slide seems on the screen. (4) Formatting (5) Viewing
Task Pane – It allows to access commands like getting started, PowerPoint help, slide, new presentation
etc related to a specific task.
6. Copy and X Copy are same in the sense __________.(RBI Asst. Mains)
AutoContent Wizard - A wizard helps to create a presentation. It helps with a general structure and
(1) Both can be used to copy file or group of files (2) Both are external commands of windows
suggested topics based on the user’s view regarding the presentation output.
(3) Both are internal command of DOS (4) Both are commands of Apple OS
Shortcut Keys
(5) Both external command of DOS
Keys Description Keys Description
Alt + W, Q Change the zoom Alt + N, X Insert textbox 7. Which of the following are valid minimum & maximum zoom sizes in MS word? (RBI Asst. Mains)
Alt + H, F and S Change the font size Alt + N, W Insert word art (1) 20, 600 (2) 30, 300 (3) 100, 400
(4) 10, 500 (5) 50, 800
Alt + H, S and H Insert a shape Alt + F10 Maximize window
Alt + G, H Select a theme Ctrl + D Duplicate Slide
8. Which of the following is displayed by MS Excel when the column is not big enough to display the
Alt + H, L Select a slide layout Ctrl + Shift + F Change Font Style information? (NABARD)
Alt + N, P Insert a picture Shift + F3 Toggle cases (1) $$$$ (2) #### (3) &&&&
(4) **** (5) >>>>>
Alt + H Home Tab Ctrl + Shift + Z Normal/Plain Text
Alt + N Insert Tab Shift + F6 Move anticlockwise among pane Answer keys
Alt + S, B Start Slideshow Shift + F10 Display context menu
Alt + F, X Close PowerPoint Ctrl + F5 Restore window to previous size 1. (3) 2. (2) 3. (1) 4. (1) 5. (4) 6. (1) 7. (4) 8. (2)
1. Which of the following menu types is also called a drop-down menu? (RBI Asst. Mains) 2. If you want to find and replace text in a Word document, use the key combo Ctrl + H. That will bring
(1) Fly-down (2) Pop-down (3) Pull-down up the “Find and Replace” dialog box. Then simply type in the word or words you are looking for and
(4) Drag-down (5) Push-down what to replace it with. Then click the “Replace All” button.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
3. Hyperlinks can be used to create links for existing webpages as well as files on one’s computer, to e- .png Portable Network Graphic image .php PHP Source file code
mail addresses and to specific locations to a document.
.gif Graphical Interchange Format image .ps PostScript file
4. Ctrl + V is used to Paste all that we have copied. It could be text, file, image or folder. A very useful .psd Adobe Photoshop Document image .max 3ds Max Scene File
feature to bring everything together. If we would like to paste plain simple text, without original .jpg/.jpeg JPEG image .jsp Java Server Page file
formatting just add Shift to it. i.e. Ctrl + Shift + V.
.sys Windows system file .cfg Configuration file
5. Formatting text in Microsoft Word involves tasks like bolding the text, italicising it, and changing the
font and size. The commands to perform all of these formatting tasks are found on the Home tab in the Computer Network
Font group. Alternatively, we can use the keyboard shortcuts for those commands. Bold: CTRL+ B,
Italic: CTRL + I, Underline: CTRL + U A computer network or data network is a telecommunications network which allows computers to
exchange data using a data link. The connections between nodes (computers on networks called nodes)
are established using either cable media or wireless media. Vint Cerf and Bob Kahn are known as
6. Copy and X Copy can be used to copy file or group of files. By using COPY keyword, we can copy the fathers of the Internet.
files and folder from source to destination easily. X Copy command is an advanced version of the copy
The five components of a computer network are:
command. It is used for moving files, directories, and even entire drives from one location to another.
✓ Sender (Device)
✓ Sender Equipment (Encoder)
7. It is in the settings menu where there is the maximum and minimum zoom level. We cannot really
shut it off but can minimize and maximize the resolution of your browser it uses. minimum & maximum ✓ Communication Channel (Cables, Wireless)
zoom sizes in MS word are 10 & 500%. ✓ Receiver Equipment (Decoder)
✓ Receiver (Device)
8. Excel spreadsheets display a series of number or pound signs like ##### in a cell when the column Sender - Sender is a device that sends a message which can consist of text, numbers, pictures etc. It is
is not big enough to display the information. It also happens if you have a cell formatted to display also called source or transmitter.
something different than what you need the spreadsheet to show. Sender Equipment - The encoder is a device that converts digital signals in a form that can pass
through a transmission medium.
File Extension Communication Channel - It is the physical path that connects the sender and the receiver. It is used to
transmit data. It is also called Medium. The channel can be a copper wire, a fiber optic cable,
A file extension is a suffix at the end of a filename that specifies what type of file it is. It helps the
microwaves etc
operating system to understand the characteristics of the file.
Receiving Equipment - The decoder is a device that converts the encoded signals into digital form. The
Example – filename.docx is the name of the document. ‘.docx’ is the file extension.
receiver can understand the digital form of message.
List of File Extension
Receiver – Receiver is a device that receives the message. It is also called a sink. It must be capable of
File Meaning File Meaning accepting the message.
Extension Extension Types of Computer Network
.apk Android Package file .bin Binary file The Network allows computers to connect and share resources with other devices through a medium.
.txt Plain text file .py Python file Based on the area coverage, there are three types of computer networks.
✓ LAN – Local Area Network
.wks / .wps Microsoft Works Word Processor .wsf Windows Script file
Document file ✓ MAN – Metropolitan Area Network
✓ WAN – Wide Area Network
.ods OpenOffice Calc spreadsheet file .exe Executable file
Local Area Network
.xlr Microsoft Works spreadsheet file .com MS-DOS command file LAN is a computer network covering a small geographical area and is privately owned. The
.xls Microsoft Excel File .mp3 MP3 audio file Communication medium used for LAN has twisted pair cables and coaxial cables. LAN offers high-speed
communications data rates up to 1000 Mbps. The fault tolerance of a LAN is more, and congestion is
.xlsx MS Excel Open XML spreadsheet file .wma Windows media audio file less in this network. LAN can be used for an office building, home, hospital, schools, etc.
.pptx PowerPoint Open XML presentation .wpl Windows Media Player Metropolitan Area Network
Playlist MAN covers a large geographical area than LAN. It is designed for customers who need a high-speed
.ppt PowerPoint presentation .mpg/.mpeg MPEG Video file connectivity and it is usually owned by large organizations to interconnect its various branches across a
city. The fault tolerance of a MAN is less and congestion in the network is more. Modem and Wire/Cable
.db/.dbf Database file .avi Audio Video Interleave file are used as transmission devices. It may serve as an Internet Service Provider (ISP).
.sql SQL Database file .flv Adobe Flash video file Wide Area Network
.tar Linux / Unix tarball file archive .mp4 MPEG-4 video file WAN covers the large geographical area and it might be restricted within the bounds of a state or
country. It could be a connection of LAN connecting to other LAN through telephone lines and radio
.bak Backup file .odt Open office writer doc file waves. The technology is high speed and relatively expensive.
.tmp Temporary file .pdf PDF file The Speed of WAN ranges from few kilobits per second (Kbps) to megabits per second (Mbps). Public
packet networks, Large corporate networks, Military networks, Banking networks, Stock brokerage
.htm/.html HTML/Hypertext Markup Language file .js JavaScript file networks, and Airline reservation networks are constructed by WAN.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
In Tree Topology network, two or more-star networks connected with a root node and all other nodes
are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have In Mesh Topology, every node carries traffic only between the two nodes it connects (point-to-point
three levels to the hierarchy. This type of topology used in Wide Area Network. Tree topology is valued connection). Mesh has n(n-1)/2 physical channels to link n devices.
for its scalability and accessibility for troubleshooting.
Example - Each telephone regional office needs to be connected to every other regional office.
Star Topology
There are two techniques to transmit data over the Mesh topology. They are Routing, Flooding.
✓ Routing – The nodes have a routing logic to direct the data to reach the designation using the
shortest distance.
✓ Flooding – The data is transmitted to all the nodes in the network, hence no routing is required.
Types of Mesh Topology
Partial Mesh Topology - In this topology, some of the nodes are connected to all nodes and some nodes
are connected only to some nodes.
Full Mesh Topology - Every node is connected to each other.
Hybrid Topology
In a star topology, all the nodes are connected to a single hub through a cable. This hub is the central
node. The data can send from one node to another through the hub. Hub acts as a repeater for data
flow. It can be used with twisted pair, Optical Fibre or coaxial cable.
It is a group of two or more topologies. It is a scalable topology and it can be expanded easily. It is
reliable.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Logical/Signal Topology ➢ Media Access Control (MAC) – It is responsible to the physical address of the sender and/or
Logical Topology denotes how the signals transmitted from node to node across the system. Broadcast receiver in the header of each frame. CSMA/CD, Ethernet are used as protocol.
and Token Passing are the two types of Logical topology. ➢ Logical Link Control (LLC) – It is responsible for frame management, error checking, and flow
✓ In Broadcast, there is no need for instructions. Ethernet is working in Broadcast transmission. control of data.
✓ In Token Passing, electronic token is passed to each node. When a token is received by the Network Layer
node, the node can send data on the network. Token Ring and Fibre Distributed Data Interface This network provides the shortest path for transmitting data for network communication to avoid
(FDDI) are using Token Passing. Arc net is token passing on a bus topology. congestion. Data is transmitted in the form of packets through the logical network path. The IP address
of the sender/receiver is placed in the header. Routers are used as networking devices. The IPX and
TCP/IP are the implemented protocols on this layer. Routing and Logical Addressing are the functions of
1. Bluetooth is an example of which of the following Networks? (NABARD)
this layer.
(1) MAN (2) PAN (3) WPAN
✓ Routing – Finding the shortest path for data transmission.
(4) Both (1) & (2) (5) Both (1) & (3)
✓ Logical Addressing – Placing the IP address of the sender/receiver in the header.
Physical Layer, Data Link Layer, and Network Layer are also known as Hardware Layer.
2. Each telephone regional office needs to be connected to every other regional office. This is an
Transport Layer
example of which of the following topology? (RRB PO)
This layer is called as Heart of OSI model. It is responsible for end-to-end network communication, flow
(1) Bus Topology (2) Tree Topology (3) Star Topology
control of data, error recovery and reliability and quality of data. The data in the transport layer is
(4) Ring Topology (5) Mesh Topology referred to as Segments. It is operated by the Operating System. SPX, TCP/IP’s, DNS are examples of
implemented protocols on this layer.
Answer keys Session Layer
This layer is responsible for the establishment of the connection, maintenance of sessions,
1. (2) 2. (5) synchronization and ensures security. It allows adding checkpoints (synchronization points) into the
data to identify the error. This layer is the network dialog controller which allows two systems into the
dialog in either half duplex or full duplex mode. RPC, PPTP, SCP, SDP are some protocols of this layer.
Solutions
Presentation Layer
This layer performs encryption and decryption of data. It gives the data in a readable format from an
1. A Personal Area Network or PAN is a computer Network that enables communication between application layer perspective. It reduces the number of bits that need to be transmitted on the network.
computer devices near a person. PANs can be wired, such as USB or FireWire or they can be wireless It offers liberty from compatibility troubles. It is called the Translation layer and Syntax layer.
such as Infrared, ZigBee, Bluetooth and Ultrawideband or UWB. The range of a PAN typically is a few
Example - ASCII code to EBCDIC coded text file.
metres.
Application Layer
Examples of Wireless PAN or WPAN devices include cell phones, wireless keyboards, wireless mice,
printers, bar code scanners and game consoles. This layer focuses on process-to-process communication across an IP network and provides a firm
communication interface and end-user services. It supports services such as electronic mail, remote file
access, and transfer, shared database management, Web chat and surfing, Directory services and
2. In Mesh Topology, every node has carries traffic only between the two nodes it connects (point-to- Network Virtual Terminal. HTTP, FTP, Telnet, SMTP, and DNS have used protocols of this layer. It is also
point connection). Mesh has n(n-1)/2 physical channels to link n devices. called as Desktop Layer.
There are two techniques to transmit data over the Mesh topology. They are Routing, Flooding. Example Session Layer, Presentation Layer, and Application layer are also known as Upper Layers or Software
of Mesh Topology - Each telephone regional office needs to be connected to every other regional office. Layers.
Transport Layer – It is like as transport layer in the OSI model. Two end-to-end transport protocols are Internet
used. Transmission Control Protocol (TCP) and Use Datagram Protocol (UDP).
It is the global computer network providing a variety of information and communication facilities,
Application Layer – It contains high-level protocols. TELNET, FTP, SMTP, DNS, HTTP, NNTP, DHCP are consisting of interconnected networks using standardized communication protocols (TCP/ IP).
used.
ARPANET was the world's first fully operational packet switching computer network, developed by the
Data Transmission Modes Advanced Research Projects Agency of the U.S. Department of Defense in 1969. It connected with only
Data Transmission modes refer to the way of transferring the information or data between two four computers. ARPANET adopted TCP/IP in 1983 and the “network of networks” became the modern
connected devices. Three types of transmission modes are: Internet.
✓ Simplex Mode World Wide Web - WWW is one of the services interconnected over the internet. It is a collection of all
✓ Half Duplex Mode information, resources, pictures, sounds, multimedia on the internet which is formatted in HTML and
accessed through HTTP.
✓ Full Duplex Mode
Web Server – A web server stores, processes and delivers web pages to the users. The
Simplex Mode – In this type, the data can be transferred in only one direction. The only one can intercommunication between users and servers is done using Hypertext Transfer Protocol (HTTP).
transmit and the other can receive the data.
Web Page – It is a document was written in HTML that can be accessed through the internet by using
Example – Keyboard (Input) and Monitor (output), Loud Speaker, Television, Fire alarm system etc. the web browser. It is identified by Uniform Resource Locator.
Half Duplex Mode – In this type, the data can be transferred in both directions, but not at the same Web Browser - It is a software application that allows users to access the websites. Internet Explorer,
time. Example – Walkie-talkie Google Chrome, Opera, Mozilla Firefox, UC Browser, Apple Safari are some examples of a web browser.
Full Duplex Mode – In this type, the data can be transferred in both direction on the same transmission Home Page – Homepage is the default page of the website.
path. Two lines are used for sending and receiving the data.
Hypertext Mark-up Language (HTML) – HTML is used to create web pages that are displayed on the
Example – Telephone network Internet.
Data Transmission Media Hypertext Transfer Protocol (HTTP) - This protocol is used to transfer data over the web. It runs on top
Data or information is transferred to one place from another through the physical/wireless media which of the TCP/IP set of protocols. It uses a server-client model.
is known as Transmission Media. Guided Media and Unguided Media are two types of Transmission Transmission Control Protocol/Internet Protocol (TCP/IP) – It is a set of communication protocols which
Media. is used to access the internet. TCP/IP was developed by Bob Kahn and Vint Cerf in 1978.
Guided Media/Bounded Media Internet Host – Host is a computer or application which is used to transfer the data on the internet.
The signals are transmitted through the narrow path which made by physical links. Twisted Pair cable, Each host has a unique IP address called Hostname.
Coaxial Cable and Fibre-Optic Cable are the types of Bounded Media. Twisted-pair and coaxial cable Internet Protocol Address (IP Address) – It is a logical numeric address that is used to identify the host
accept signals in the form of electric current. Optical fibre accepts signals in the form of light. over the internet network.
Unguided/Unbounded Media ✓ The stable version of IP – IPv4 (32 bits). It is written in decimal and separated by periods.
The signals are transmitted without using any cables. This type of transmission is known as wireless ✓ Latest Version of IP – IPv6 (128 bits). It is written in Hexadecimal and separated by colons.
communication. Radio waves, Infrared, Micro waves are some popular type of unbound transmission
Uniform Resource Locator (URL) - A uniform resource locator (URL) is used to locate the address of a
media.
resource and protocol.
✓ Microwave – Mobile phone, Satellite networks, Wireless LANs.
Domain Name - A domain name serves as an address which is used to access the website. It can be
✓ Radio Wave – Radio, Television and Paging system universally understood by Web servers and online organizations.
✓ Infrared – Short range communication (TV remote control, IRD port etc) Top Level Domains are following.
Network Devices
Domain Name Description
Hub - Hub is a networking device which connects multiple network hosts. It is used to transfer data.
The hub sends data packets (frames) to all devices on a network. Active Hub (Repeaters) and Passive .com Commercial
Hub are two categories of Hub. .net Network-oriented
Switch - Switch is a small hardware device that works at the layer of LAN (Local Area Network). It
receives incoming data packets, filters the packet and sends only to the interface of the intended .org Non-Profit Organization
receiver. It maintains a CAM (Content Addressable Memory) table and has own system configuration .edu Education
and memory. CAM table is also known as forwarding table or forwarding information base (FIB).
.gov Government
Modem (Modulator-Demodulator) - It is a hardware component that allows a computer to connect to
the Internet. It converts analog signal to digital signal. .mil Military
Router – It is a hardware device which is responsible for routing traffic from one to another network. It .int International Treaties
is designed to receive, convert and move packets to another network.
Domain Name System (DNS) – DNS translates domain names into IP addresses. It has a large database
Bridge – Bridge is a network device that connects a local area network to another local area network
of domain names and its IP addresses.
that uses the same protocol.
Uploading – It refers to the transmission of data or files from the computer to the internet server.
Gateway - A gateway is a network node that connects two dissimilar networks using different protocols
Uploaded file can be retrieved by anyone.
together.
Downloading – It is the process of copying files from the internet to the user’s computer.
Repeater – It is an electronic device that magnifies the signal it receives. It is implemented in computer
networks to expand the coverage area of the network. It is also known as signal boosters. Email - Electronic mail is the transmission of messages over the internet. In an email, the user can
attach documents, pictures, videos etc.
Firewall - A firewall is a network security system that monitors and controls overall incoming and
outgoing network traffic based on advanced and a defined set of security rules. Carbon copy (CC) – It is used to share e-mail with one or more recipients. Both the main recipients and
other (CC) recipients can see all the mail addresses.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
Blind Carbon Copy (BCC) – In this, the recipients of the message and other recipients (BCC) cannot see Computer Hacking
the persons who all receive the e-mail.
Hacking is an attempt to exploit a computer system or a private network inside a computer. It is the
unauthorized access to or control over computer network security systems for some illicit purpose.
1. Which of the following is NOT an Internet Browser? (RRB Assistant) Viruses, Keyloggers, Rootkit, Spoofing attack, Packet Sniffer, Trojan horse, Password cracking are
(1) Safari (2) Opera (3) Chromium various of techniques for hacking.
(4) Ruby (5) Brave Computer Virus - A computer virus is a malicious software program loaded onto a user’s computer
without the user’s knowledge and performs malicious actions. Stuxnet, Petya, Wanna cry, Code red,
Melissa, Sasser, Zeus, Mydoom, Crypto Locker, Flashback are some example of Viruses.
2. The Internet is a system of ______.(RBI Asst. Mains)
The Elk Cloner virus was the first self-replicating computer program to spread on a large scale. It was
(1) Computer Networks (2) Data Buses (3) Servers created by a 15-year-old Rich Skrenta in 1982. Ryuk, Troldesh are ransomware family of newly
(4) WAN wires (5) None of these discovered viruses.
Computer Worm - A computer worm is a malicious, self-replicating software program (malware) which
3. What is Window Explorer? (RBI Asst. Mains) affects the functions of software and hardware programs. Stuxnet is the most famous computer worm.
(1) Web Browser (2) File Manager (3) OOPS Program Ransomware - Ransomware is a type of malware program that infects and takes control of a system. It
infects a computer with the intention of extorting money from its owner.
(4) Operating System (5) Computer Instruction
Botnet – Botnet is a set of networks connected computers/devices that are used for malicious purposes.
Each computer in a botnet is called Bot. It is also known as Zombie.
Answer keys
Trojan horse – It is a type of malware that presents itself as legitimate software. It may perform actions
on a computer that is genuine but will install malware actions.
1. (4) 2. (1) 3. (2) Keylogger - A keylogger is a type of malware that stores all keystrokes of a computer. It can record all
sorts of personal information, such as usernames, passwords, credit card numbers, and personal
Solutions documents such as emails and reports.
Rootkit - A rootkit is a secret computer program designed to provide continued access to a computer
while actively hiding its presence. Rootkits are associated with malware such as Trojans, worms,
1. Alternatively referred to as a web browser or Internet browser, a browser is a software program to
viruses.
present and explore content on the World Wide Web. These pieces of content, including pictures,
videos, and web pages, are connected using hyperlinks and classified with URIs (Uniform Resource Spyware - Spyware is a software that is installed on a computing device without the end user's
Identifiers). Ruby is an interpreted, high-level, general-purpose programming language. It was knowledge. It steals internet usage data and sensitive information such as usernames and passwords,
designed and developed in the mid-1990s by Yukihiro "Matz" Matsumoto in Japan. activating the microphone or camera on a computer to record physical activity.
Adware - Adware is unwanted software designed to display advertisements on the computer screen to
generate income. This type of ads cannot be removed easily.
2. The Internet, sometimes called simply "the Net," is a worldwide system of computer networks- a
network of networks in which users at any one computer can, if they have permission, get information Phishing – Phishing is a cyber-attack that used to steal user data, including login credentials and credit
from any other computer. card numbers. They use email as a weapon and trick the email recipient into believing that the message
is received from real companies such as banks, Amazon etc to harvest the recipient’s details. Email
It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969
Phishing, Spear Phishing (targets special person/organization) are techniques of Phishing.
and was first known as the ARPAnet. The original aim was to create a network that would allow users of
a research computer at one university to "talk to" research computers at other universities. Smurfing - It is a type of denial-of-service attack that relies on flooding a network with a large volume
of traffic through the manipulation of IP addresses in that network. This type of attack can result in a
high volume of excess activity, which can overwhelm a server or IT setup.
3. Windows Explorer is the file manager used by Windows 95 and later versions. It allows users to
manage files, folders and network connections, as well as search for files and related components.
1. ______ is a type of denial-of-service attack that relies on flooding a network with a large volume of
Windows Explorer has also grown to support new features unrelated to file management such as playing
traffic through the manipulation of IP addresses in that network. (RRB PO)
audio and videos and launching programs, etc. The desktop and the taskbar also form part of Windows
Explorer. (1) Phishing (2) Hacking (3) Smurfing
(4) Churning (5) Twisting
Answer key
1. (3)
Solution
1. In an IT context, smurfing is a type of denial-of-service attack that relies on flooding a network with
a large volume of traffic through the manipulation of IP addresses in that network. This type of attack
can result in a high volume of excess activity, which can overwhelm a server or IT setup.
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in www.oliveboard.in
www.oliveboard.in
Solutions
1. SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication guidelines that allow
software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. It is a
program used for sending messages to other computer users based on e-mail addresses.
2. JAR stands for "Java ARchive". A JAR file is a zip-file which contains a couple of class files and a text
file containing some meta information. JAR files can be used to bundle a Java library containing many
classes into a single file or to bundle a Java application into a so-called executable JAR file.
www.OliveBoard.in
www.oliveboard.in