0% found this document useful (0 votes)
32 views

Computer Simplicrack

The document outlines the structure and requirements for the Computer Knowledge Module for CGL/CHSL Tier 2 exams, detailing the exam format, question types, and marking scheme. It includes a comprehensive overview of computer basics, including hardware and software components, input/output devices, and classifications of computers. Additionally, it specifies the minimum qualifying marks for different candidate categories and provides an outline of topics covered in the Computer Proficiency test.

Uploaded by

Mehul Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Computer Simplicrack

The document outlines the structure and requirements for the Computer Knowledge Module for CGL/CHSL Tier 2 exams, detailing the exam format, question types, and marking scheme. It includes a comprehensive overview of computer basics, including hardware and software components, input/output devices, and classifications of computers. Additionally, it specifies the minimum qualifying marks for different candidate categories and provides an outline of topics covered in the Computer Proficiency test.

Uploaded by

Mehul Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 201

K

AC
R
COMPUTER

IC
PL
Knowledge Module
M
SI
For CGL / CHSL TIER 2
By Ishendu
K
AC
R
Marks per Time
Exam Type Questions Total Marks

IC
Question (per module)
CGL 20 3 60 15 minutes

PL
CHSL 15 3 45 15 minutes
M
SI
13.8.9 There will be negative marking of 1 mark for each wrong
answer in Section-I, Section-II and Module-I of Section-III of Paper-I

K
and of 0.50 marks for each wrong answer in Paper-II and Paper-III.

AC
13.8.10 Module-I of Section-III of Paper-I i.e. Computer Knowledge
Test is mandatory but qualifying in nature. However, while shortlisting
the candidates for the posts where Computer Proficiency is prescribed
viz. Assistant Section Officer in CSS, MEA & AFHQ, Assistant in

R
Serious Fraud Investigation Office (SFIO) under the Ministry of
Corporate Affairs, Assistant (GSI) in the Ministry of Mines, Assistant
in Indian Meteorological Department (Ministry of Earth Sciences),

IC
Inspector (CGST &Central Excise), Inspector (Preventive Officer),
Inspector (Examiner) & Executive Assistant in CBIC and Postal
Assistant/ Sorting Assistant in Department of Post etc., higher

PL
qualifying standards will be set in comparison to other posts.

16 Mode of Selection:
M 16.1 Minimum qualifying marks in Tier-I, Section-I, Section-II
& Module-I of Section-III of Paper-I of Tier-II, Paper-II &
SI
Paper-III of Tier-II Examination are as follows:
16.1.1 UR : 30%
16.1.2 OBC/ EWS : 25%
16.1.3 All other categories : 20%

Information Taken from Combined Graduate Level Examination, 2023 Notification dated 03-04-2023)
Module-I of Section-III of Paper-I (Computer Proficiency)
Chapters Topics
1.Organization of a computer

K
2.Central Processing Unit (CPU)

AC
3.Input/ output devices
4.Computer memory
Computer Basics 5.Memory organization
6.Back- up devices

R
7.PORTs

IC
8.Windows Explorer
9.Keyboard shortcuts

PL
Windows Operating system including basics of
Software
Microsoft Office like MS word, MS Excel and Power Point etc
1.Web Browsing & Searching
Working with Internet and e-mails
M 2.Downloading & Uploading
3.Managing an E-mail Account
SI
4.e-Banking
1.Networking devices and protocols
Basics of networking and cyber security 2.Network and information security threats (like hacking, virus, worms,
Trojan etc.) and preventive measures
SI
M
PL
IC
R
AC
K
K
AC
What is a Computer?

R
A computer is an electronic device that can be programmed to accept

IC
data (input), process it and generate result (output).
A computer along with additional hardware and software together is

PL
called a computer system.

M
SI
A computer has mainly two main parts:

K
1. Hardware

AC
2. Software

R
Hardware

IC
Hardware refers to the physical parts of a computer that you can touch and see.
Examples :

PL
•Monitor: The screen you look at.
•Keyboard: The keys you press to type.
M
•Mouse: The device you move to control the cursor.
SI
Software
Software is a set of instructions that tells the hardware

K
what to do.

AC
It’s like the brain’s thoughts and commands.
Examples include:
•Operating System: Like Windows, macOS, or Linux,

R
which manage all other programs.

IC
•Applications: Programs like Microsoft Word, games, or
web browsers.

PL
Firmware
M
Firmware is a special type of software that is embedded into the hardware itself. It provides
low-level control for the device’s specific hardware. Examples include:
SI
•BIOS: The basic software that starts up your computer.
•Embedded Software: Found in devices like printers, routers, or even your TV.
In simple terms:
•Hardware is the body.

K
•Software is the Soul.

AC
•Firmware is the instinct that helps the body function properly.

R
IC
PL
M
SI
K
AC
Classification of
Computer

R
Based on Based on Based on

IC
Size Work Purpose

PL
General Special
Micro Mini Mainframe Super Analog Digital Hybrid
computer computer computer computer Computer Computer Computer Purpose Purpose
Computer Computer

M
SI
1. Microcomputer Based on Type of Data Processing
•Small, affordable computers designed for individual use. 5. Analog Computer
•Examples: Desktops, laptops, smartphones. •Processes continuous data (e.g., temperature, pressure).

K
•Uses: Personal tasks, entertainment, basic computing •Used for simulations, real-time systems where data is not in
needs. discrete form. E.g. Speedometer

AC
2. Minicomputer 6. Digital Computer
•Mid-sized computers, more powerful than microcomputers •Processes data in binary form (0s and 1s).
but less than mainframes. •Most common type of computer today, used for almost all
•Support multiple users simultaneously. modern computing tasks.

R
•Uses: Business applications, small organizational tasks. 7. Hybrid Computer
•First minicomputer : PDP -8 •Combines features of both analog and digital computers.

IC
3. Mainframe Computer •Uses: Medical devices like ECG machines, industrial
•Large, powerful systems capable of handling and automation.

PL
processing large amounts of data.
(that is why called ‘Big Iron’) Based on Purpose
•Used by large organizations for critical applications like 8. General Purpose Computer
•Designed to perform a variety of tasks, from simple to complex.
bulk data processing.
•Examples: Banks, insurance companies. M •Examples: Personal computers, laptops.
9. Special Purpose Computer
SI
4. Supercomputer
•The fastest and most powerful computers available, used •Built for specific tasks and applications.
for highly complex calculations. •Examples: ATMs, gaming consoles, industrial control systems.
•Uses: Weather forecasting, scientific simulations,
cryptography.
India's first supercomputer :PARAM 8000 (CDAC), World First CRAY 1
Computer Basics

K
AC
R
IC
Organisation of a computer

PL
M
SI
1.Input: The process of entering data and programs into
Computer Organisation
the computer system.
A computer is organized into three basic units:

K
2.Memory Unit: Used to store data and instructions.
1. The input/output unit

AC
3.Control Unit (CU): This unit supervises the processes of
2. The memory unit
input, output, processing, and storage. It decides when to
3. The central processing unit
start and stop receiving data, where to store it, and

R
manages the step-by-step processing of all operations

IC
within the computer.
Memory
unit 4.Arithmetic Logic Unit (ALU): Performs major operations

PL
such as addition, subtraction, multiplication, division, logic,
Input Control Output
unit unit and comparison.
unit
M 5.Output: Produces results from the data to provide useful
SI
Arithmetic information.
Logic unit
central processing unit
The ALU and the CU together form the Central Processing
Unit (CPU), often referred to as the brain of the computer
system.
K
AC
In Short :
•CPU is the brain that thinks and makes decisions.

R
IC
•Memory Unit is the desk where current work is kept.
•I/O Unit is the communication tools that let you interact with the

PL
computer
M
SI
K
• Registers: Small, fast storage locations within the CPU used

AC
to hold data temporarily during processing.

R
IC
• Microchips: The CPU is made up of microchips called

PL
integrated circuits (ICs), which are composed of
semiconductor materials. M
•Types: Modern CPUs are also known as microprocessors
SI
Input-Output Devices
I/O devices are essential for communication between the user and the computer. Peripheral devices, which

K
include input and output devices, are attached externally to the computer. These devices allow data to enter and

AC
leave the computer system.

Input Devices

R
Input devices allow users to provide data to the computer. They convert human-readable data into a form that

IC
computers can process.
•Keyboard: The most common input device used for typing

PL
text. Standard keyboards contain between 101-110 keys.

Alphanumeric Keys: Letters (A-Z), numbers (0-9), and symbols.


M
Function Keys: Located at the top (F1–F12), these keys perform specific tasks based on the software or operating system.
SI
Control Keys: Include keys like Ctrl, Alt, and Shift to modify the function of other keys.
Navigation Keys: Used for moving the cursor (e.g., arrow keys, Home, End, Page Up, Page Down).
Numeric Keypad: Located on the right side, used for entering numbers quickly.
Special Keys: Esc, Enter, Spacebar, Backspace, Delete, Tab, and Caps Lock.
Keyboard Layouts
•QWERTY: Most common layout named after the first six letters on the top row.

K
•AZERTY: Mainly used in French-speaking countries.
•DVORAK: Designed to increase typing speed and reduce finger movement.

AC
•Mouse: A hand-held device that controls the cursor on the screen. It
enables users to click, drag, and point to objects.

R
IC
•Trackball: A stationary device with a rotating ball. The user
moves the ball manually with their fingers to move the cursor.

PL
•Joystick: A stick-based input device, mainly used in gaming
for controlling movement. M
SI
•Digitizing Tablet: Used in computer-aided design (CAD). A
stylus or electronic pen is used to draw on the tablet, which is
converted into digital data.
•Light Pen: A pen-like device with a photocell that allows
the user to point and interact directly with the screen.

K
AC
•Touch Screen: A clear glass panel placed over a monitor
screen, allowing the user to interact with the computer by
touching the screen directly. Common in ATMs and

R
smartphones.

IC
•Audio Input Devices: Use microphones to capture

PL
sound. The microphone converts analog sound signals
into digital form via a sound card. Speech recognition
systems convert spoken words into text. M
SI
•Video Input Devices: Cameras such as webcams and
digital cameras are used to capture images and videos,
feeding visual data into the computer.
•Scanner: A device that scans printed documents or images
into digital format. Scanners come in hand-held and flatbed

K
versions. Used to input text, images, or forms into the computer.

AC
•OCR (Optical Character Recognition): Scans printed text,
recognizes it, and converts it into editable text (ASCII) format

R
using OCR software.

IC
•MICR (Magnetic Ink Character Recognition): Commonly

PL
used in banks to read the magnetic-encoded numbers at the
bottom of cheques.

M
SI
•OMR (Optical Mark Recognition): Detects marks on forms,

K
used for reading answers in multiple-choice exams and surveys.

AC
•Barcode Reader: Reads machine-readable barcodes,

R
converting the patterns of vertical lines into digital data. Used in

IC
retail stores, libraries, etc.

PL
M
SI
•Output Devices

K
Output devices display or present data to the user after it has been processed by the computer.

AC
•Printer: Converts digital information into printed form.
•Impact Printers: Physically strike the paper to produce text or images. Examples include:

R
•Dot Matrix Printer: Prints one character at a time. Common for bulk printing like invoices and

IC
receipts.
•Daisy Wheel Printer: Produces high-quality text but is slower. Suitable for documents requiring

PL
precision text.
•Drum Printer: Fast and prints entire lines at once. Used for high-volume printing but with lower print
quality.
M
SI

Dot Matrix Printer Daisy Wheel Printer Drum Printer


•Non-Impact Printers: Do not physically strike the paper. They use modern printing technologies:

•Ink-Jet Printer: Sprays tiny droplets of ink onto

K
paper to create text and graphics. Known for high

AC
resolution and color printing.

R
•Laser Printer: Uses a laser beam and toner to

IC
produce high-quality, fast prints. It processes the
entire page before printing and is ideal for

PL
professional and office use.

M
•Plotter: A specialized output device that produces large-
SI
scale drawings such as maps, blueprints, and engineering
designs. Often used for architectural plans and technical
illustrations.
•Monitor: Displays output in visual form. The clarity of the image depends on screen resolution (measured in
pixels), dot pitch (distance between pixels), and refresh rate (how often the screen is updated).

K
AC
•CRT (Cathode Ray Tube) Monitor
•Bulky, heavy, high power use, obsolete.

R
•LCD (Liquid Crystal Display) Monitor
•Thin, light, energy-efficient, sharp images.

IC
•LED (Light Emitting Diode) Monitor

PL
•Slim, bright, efficient, better color/contrast.
•OLED (Organic Light Emitting Diode) Monitor
•Thin, flexible, top contrast, expensive.
M
SI
•Screen Projector: Projects the computer’s display onto a larger surface, commonly used in presentations,
meetings, and classrooms.
•Audio Output Devices: Include speakers and headphones.
These devices convert digital audio data into audible sound.

K
Used for music, videos, and system sounds.

AC
•Input-Output (I/O) Devices

R
Some devices can perform both input and output functions, facilitating the exchange of data.

IC
•Hard Disk Drive (HDD): Used for both input (data reading) and output (data
writing). It stores operating systems, software, and user files.

PL
•Floppy Disk Drive: Now obsolete, but used to read and write data to floppy
disks. M
SI
•Optical Disk Drive: Reads and writes data on CDs, DVDs, and Blu-ray discs.
These are used for storing large amounts of data, such as software and
multimedia.
Input Devices Output Devices Input/Output Devices
•Keyboard •Monitor •Hard Disk Drive (HDD)

K
•Mouse •Visual Display Terminal (VDT) •Floppy Disk Drive
•Printer •USB Drive

AC
•Digitizing Tablet
•Plotter •CD Drive
•Trackball
•Computer Output on Microfilm (COM) •DVD Drive
•Joystick •Video Output System
•Touchscreen

R
•Audio Response System
•Light Pen

IC
•Speech Recognition System
•Digital Camera
•Scanner

PL
•Magnetic Ink Character Recognition
(MICR)
•Optical Character Recognition (OCR)
•Optical Mark Recognition (OMR)
•Barcode Reader
M
SI
K
AC
Memory
unit

R
Input Control Output
unit unit

IC
unit

Arithmatic

PL
Logic unit

M Registers
SI
Central processing Unit
the brain of the computer
Key Components:

K
•Control Unit (CU): Directs the operation of the processor.
•Arithmetic Logic Unit (ALU): Performs mathematical and logical operations.

AC
•Registers: Small, fast storage areas within the CPU.

R
Additional Key Components:

IC
Cache is fast memory on or near the CPU chip that speeds up data access. It
acts as a buffer between the CPU and RAM. When the CPU needs data, it

PL
checks the cache first. If the data is found, it's a "hit"; if not, it's a "miss".
Cache performance is measured by the hit ratio, calculated as hits divided by
total (hits + misses). M Types-
SI
L1 (Level 1) cache
L2 (Level 2) cache
L3 (Level 3) cache
Registers: These are small, fast types of memory built into the CPU for immediate data needs.
A small element built into the processor that holds specific pieces of information, such as instructions or data

K
storage addresses. Registers can hold 8, 16, 32, or 64 bits of data.
Modern PCs have 32-bit or 64-bit registers.

AC
Fastest Access: Registers are the fastest than cache memory and RAM they are situated within the CPU.
Registers are often referred to as the CPU’s working memory.

R
IC
Low Latency: Because register are an inherent part of every CPU, the data can be accessed with a delay of
zero.

PL
Example: Similar to post-its on your monitor for quick reminders.

Commonly used types of registers-


AC (Accumulator)
AR (Address Register)
M
SI
DR (Data Register)
IR (Index Registers)
PC (Program Counter)
MDR ( Memory Data Register)
MBR ( Memory Buffer Register)
Clock: The CPU’s clock synchronizes its activities by sending regular electrical pulses. Clock speed,
measured in Hertz (Hz) or megahertz (MHz), determines how fast these pulses are.

K
•Example: Think of it as the heart of the CPU, sending rhythmic pulses that keep everything

AC
operating in unison.

Instruction Register and Pointer: The instruction pointer indicates the

R
next instruction for the CPU.

IC
Once an instruction is executed, the next one is loaded into the
instruction register.

PL
•Example: Follows steps in a recipe, showing which step is next.

M
Buses: Buses transfer data between different computer components.
SI
Their width indicates how many bits can be transferred simultaneously, crucial for linking the CPU
with memory and other parts.
•Example: Like highways connecting different parts of a city.
How Fast is the CPU?
•Clock Speed: Measured in gigahertz (GHz) – higher GHz means faster

K
processing. A CPU’s performance is measured by the number of instructions

AC
it executes in a second, i.e., MIPS or BIPS.
•Cores: More cores mean the CPU can handle multiple tasks at once.

R
Cores: These are the physical components of a CPU that perform task.

IC
Think of them as the actual workers in a factory. More cores mean more

PL
workers to handle different tasks simultaneously.
Threads: These are virtual components that split each physical core into
smaller units. Each core can handle up to 2 threads, so a dual-
core CPU will have 4 threads, and an eight-
M
SI
core CPU will have 16 threads. Threads are like giving each worker (core)
two hands to work faster and multitask more efficiently.
So, cores are the physical parts, and threads are the virtual parts that help
those cores work even better.
Components Inside a Computer Cabinet

Motherboard, Ports, and Interfaces

K
1. Motherboard Components:

AC
1. Form Factor: Refers to the motherboard’s geometry, dimensions, arrangement, and electrical
requirements.
2. Chipset: Controls most of the computer’s resources.

R
3. Processor Socket: The type of socket where the processor is installed.
4. SATA (Serial ATA): Interface used to connect storage devices like hard drives and SSDs.

IC
5. PCIe (Peripheral Component Interconnect Express): Expansion interface for high-speed components
like graphics cards, SSDs, and network cards.

PL
BIOS and CMOS on the Motherboard:
M
1. BIOS (Basic Input/Output System): Stored in ROM, it acts as an interface between the operating system
and the motherboard.
SI
2. CMOS (Complementary Metal-Oxide Semiconductor): Stores the system time, date, and essential
settings in its memory chip.
1. Even when the computer is powered off, the CMOS chip stays active using power from a small button
battery.
SI
M
PL
IC
R
AC
K
SI
M
PL
IC
R
AC
K
K
AC
History of CPU

R
IC
From Room-Sized Giants to Pocket Powerhouses

PL
M
SI
ENIAC (Electronic Numerical Integrator and Computer)

K
Developed: 1945-1946

AC
ENIAC was one of the earliest general-purpose computers.
It used thousands of vacuum tubes and could perform complex calculations.

R
It was a massive machine, taking up an entire room.
Its first assignment was running calculations related to the building of a new

IC
weapon—the hydrogen bomb, which carried an explosive impact a thousand
times stronger than atomic bombs.

PL
UNIVAC I (Universal Automatic Computer I)
Developed: 1951 M
SI
UNIVAC I was the first commercially produced computer in the United States.
Designed by the same team behind ENIAC, it was used primarily for business
applications and was a significant step towards modern computing.
Transistors

K
Invented: 1947

AC
Transistors replaced vacuum tubes in the late 1950s. They were smaller,
more reliable, consumed less power, and could perform operations much
faster.

R
This led to the development of second-generation computers.

IC
Microprocessor

PL
Developed: 1971

M
The microprocessor, or CPU, integrated the functions of a computer's central
processing unit onto a single chip.
SI
This innovation paved the way for personal computers and modern
computing devices.

The Intel 4004 was the first commercially produced microprocessor. It


was a 4-bit CPU and marked the beginning of the microprocessor era,
paving the way for modern computing.
1st Generation (1940s-1950s): Generation of the processor
Used vacuum tubes (e.g., ENIAC).

K
2nd Generation (1950s-1960s):

AC
Replaced vacuum tubes with transistors.
Smaller, more reliable CPUs.

R
3rd Generation (1960s-1970s):

IC
Introduced integrated circuits (ICs).
Multiple transistors on a single chip.

PL
4th Generation (1970s-present): Trick to Remember

Emergence of microprocessors (e.g., Intel 4004). Very Technological Inventions Make Magic
M
Everything integrated onto a single chip.
1. Vacuum Tubes
2. Transistors
SI
3. Integrated Circuits
5th Generation and beyond (1980s-present): 4. Microprocessors
Multi-core processors. 5. Multi-core Processors

Enhanced power efficiency and advanced features like AI.


K
AC
R
Computer Memory

IC
PL
M
SI
Computer memory

K
AC
Primary Secondary
memory memory

ROM

R
Compact Magnetic
RAM (Non- HDD SSD Floppy Disk
Disk Tape
Volatile)

IC
SRAM DRAM PROM EPROM

PL
DDR
SDRAM RDRAM
SDRAM
M
SI
DDR 1 DDR 2 DDR 3 DDR4 DDR5
1. Primary Memory
Primary memory, also called main memory, directly interacts with the CPU and

K
temporarily holds data for processing. It is volatile, meaning data is lost when power is

AC
turned off.
Primary memory is classified into two main types: RAM and ROM
•Random Access Memory (RAM): Also known as read/write memory, RAM allows the

R
CPU to read and write data. It temporarily stores input data, output data, and
intermediate results.

IC
Types of RAM :

PL
•DRAM: Dynamic RAM, is made of capacitors and transistors, and must be refreshed
M
every 10~100 ms. It is slower and cheaper than SRAM.
•SRAM: Static RAM, has a six transistor circuit in each cell and retains data, until
SI
powered off. Constructed using flip-flops
SDRAM syncs with the system's clock, boosting data transfer efficiency.
DDR (Double Data Rate) SDRAM, an advanced version, transfers data twice per

K
clock cycle, with multiple generations like DDR1 to DDR5 enhancing performance

AC
GDDR (Graphics DDR) is tailored for GPUs, offering high-
speed data transfer for graphics-heavy tasks like gaming.

R
IC
NVDIMM (Non-volatile dual in-line memory module)
combines RAM speed with storage persistence, retaining data even when the

PL
system is off. Perfect for critical applications needing constant memory.

M
SI
Read-Only Memory (ROM): ROM is non-volatile and retains its contents even when the

K
power is off. Data can only be written to ROM once.

AC
There are three main types of ROM:
1.Programmable ROM (PROM): A non-volatile memory that can be programmed once and

R
cannot be reprogrammed. PROM is commonly found in devices like video game consoles

IC
and medical implants.

PL
2.Erasable Programmable ROM (EPROM): Similar to PROM, but EPROM can be erased using
ultraviolet light and rewritten.
M
3.Electrically Erasable Programmable ROM (EEPROM): EEPROM can be electrically erased
SI
and reprogrammed, making it the most flexible type of ROM. It is commonly used to store
the BIOS (Basic Input/Output System).
•Solid State Drives (SSD): Solid State Drive.
•Faster than HDDs, no moving parts (flash memory-
based), silent, more shock-resistant.

K
•Working: Uses NAND flash memory to store data. Each

AC
storage block can be accessed directly without
mechanical movement.

•NAND Flash Technology: A type of non-volatile

R
memory used in SSDs, which stores data in memory

IC
cells. These cells are stacked in layers to increase
capacity without increasing physical size.

PL
•Advantages: Faster read/write speeds, lower power
consumption, more durable due to no moving parts.
•Types:
M
•SATA SSD: Connects via SATA (Serial Advanced
SI
Technology Attachment) interface, lower speed
compared to NVMe SSD.
•Use : Quick access for frequently used files,
operating systems, and software. Ideal for
performance-focused storage.
2. Secondary Memory (Storage)
Secondary memory stores large amounts of data permanently and is non-volatile

K
AC
R
Secondary Storage
Devices

IC
Sequential Direct

PL
Access Access
Devices Devices

Magnetic
Tape
Magnetic
Disk
M Optical Disk
Magneto-
Optical Disk
Memory
Stick
SI
Floppy Compact Digital
Zip Disk HDD Blue Ray Versatile
Disk Disk Disk
Secondary Memory

Stores large amounts of data for extended periods. Non-volatile (retains data when powered off).

K
•Types of Devices: Magnetic tape, magnetic disks, optical disks, magneto-optical disks, HDD,

AC
SSD, and NVMe.
•The information stored in storage devices can be accessed in two ways—
•Sequential Access: Data accessed in a specific order (e.g., magnetic tape).

R
•Direct Access: Data accessed directly at any location (e.g., magnetic disks, SSDs, NVMe).

IC
PL
•Magnetic Tape:
•Features: Inexpensive, durable, used for backups,
M
slow, and not suitable for frequent updates.
•Working: Divided into tracks and frames; stores
SI
data in blocks with inter-record gaps (IRG).
•Use : Archiving and transferring data.
•Magnetic Disk:
•Features: Cheap, fast, suitable for frequent access,

K
large capacity, reliable.
•Working: Divided into tracks and sectors; data

AC
accessed via a read/write head.

•Types:

R
•Floppy Disk (FD): Portable but low capacity and

IC
slow.
•Hard Disk Drive (HDD): High capacity (up to
multiple terabytes), fixed storage. Data is written on

PL
spinning platters and accessed via read/write heads.
•Access Speed: Moderate, typically measured
in milliseconds (9–14 ms).
M
•Use : General-purpose storage for large files
like operating systems, applications, and media.
SI
•Storage Capacity: Measured in gigabytes (GB) or
terabytes (TB).
•NVMe (Non-Volatile Memory Express):

K
Non-Volatile Memory Express.
•Features: Fastest storage type, significantly

AC
outperforms both HDDs and SATA SSDs.

•Working: Uses NAND flash memory and connects

R
directly to the CPU through the PCIe (Peripheral
Component Interconnect Express) interface,

IC
bypassing the traditional SATA bottleneck.

PL
•Advantages: Ultra-fast data transfer speeds
(multiple GB/s), reduced latency, optimized for
multitasking and heavy workloads like video editing,
gaming, and data analysis. M
SI
•Use : High-performance systems, gaming PCs, and
workstations handling large data sets and tasks
requiring fast storage.
Optical Disks:
•CD-ROM: Compact Disk-Read Only Memory. Read-
only, stores data using pits and lands; durable and high

K
density.

AC
•DVD-ROM: Digital Versatile Disk-Read Only Memory.
•Stores up to 17 GB, used for video and data storage,
with higher density than CDs.

R
•Recordable Optical Disks:

IC
•CD-R: Compact Disk-Recordable. Write once, used
for backups and archives.

PL
•CD-RW: Compact Disk-ReWritable. Allows data to
be rewritten, but not compatible with all CD drives.
•DVD-R: Digital Versatile Disk-Recordable. Write
M
once, high capacity for data storage.
•Blue Ray :Blu-ray is an optical disc format for
SI
storing high-definition video and large amounts of
data. A single-layer Blu-ray disc holds 25 GB, while
a dual-layer one holds 50 GB.
K
AC
•Disk Formatting:
•FAT (File Allocation Table): Assigns locations and
tracks sectors on disks.

R
•Boot Sector, FAT, Root Directory, and Data Area

IC
are key regions created during formatting.

•NTFS (New Technology File System): Used in

PL
modern systems (e.g., Windows XP, 2000) for better
security and performance.
M
SI
MEMORY REPRESENTATION

K
The computer memory stores different kinds of data like input data, output data, intermediate

AC
results, etc., and the instructions.
Binary digit or bit is the basic unit of memory. A bit is a single binary digit, i.e., 0 or 1.

R
A bit is the smallest unit of representation of data in a computer.

IC
However, the data is handled by the computer as a combination of bits. A group of 8 bits form a
byte.

PL
One byte is the smallest unit of data that is handled by the computer. One byte can store 28,
i.e., 256 different combinations of bits, and thus can be used to represent 256 different symbols.
M
In a byte, the different combinations of bits fall in the range 00000000 to 11111111.
SI
A group of bytes can be further combined to form a word. A word can be a group of 2, 4 or 8 bytes.
bits make bytes, bytes make words.
K
AC
Basic Units of Memory Measurement •A bit (Binary Digit ) is the smallest unit of memory. (b)
•1 Bit = Binary Digit (0 or 1) •A byte can represent 256 distinct values (0–255). (B)
•4 Bits = 1 Nibble •Geopbyte is the largest known memory unit.

R
•8 Bits = 1 Byte = 2 Nibbles
Term Abbreviation Approximate Size
•1024 Bytes = 1 KB (Kilobyte)

IC
•1024 KB = 1 MB (Megabyte) Byte B 23 bits (b)

•1024 MB = 1 GB (Gigabyte) Kilobyte KB 210 bytes

PL
•1024 GB = 1 TB (Terabyte) Megabyte MB 220 bytes

•1024 TB = 1 PB (Petabyte) Gigabyte GB 230 bytes

•1024 PB = 1 EB (Exabyte) Terabyte TB 240 bytes

•1024 EB = 1 ZB (Zettabyte)
•1024 ZB = 1 YB (Yottabyte)
M Petabyte
Exabyte
PB
EB
250 bytes
260 bytes
SI
•1024 YB = 1 Brontobyte Zettabyte ZB 270 bytes

•1024 Brontobytes = 1 Geopbyte Yottabyte YB 280 bytes


Virtual Memory

K
When the RAM runs out of space, the system moves data not immediately

AC
needed from RAM to a space called the swap or page file on the hard drive.
This frees up RAM for other tasks. When that data is needed again,
it's swapped back into RAM.

R
This way, programs can run as if there is unlimited memory available,
making multitasking smoother and more efficient.

IC
PL
M
SI
Buffer:
•Purpose: Smooth data transfer between

K
devices/components.

AC
•Usage: Often used in I/O operations
Buffer Data (e.g., streaming video).
CPU
•Storage Duration: Temporary, just for the data

R
transfer.
•Location: Generally in RAM.

IC
Data
Cache

PL
Cache:
•Purpose: Speed up data retrieval by storing
frequently accessed data.
M •Usage: Web browser caches, CPU caches.
•Storage Duration: Can be longer,
SI
as long as the data remains relevant.
•Location: Can be in RAM or on disk.
K
AC
R
IC
Back- up devices

PL
M
SI
Tape Drives
Advantages:
• Reliable for long-term storage (data readable even after decades).

K
• Can be stored offsite for protection against hardware failure, theft, or
disasters.

AC
Disadvantages:
• Slow, expensive, and uses sequential access, making file retrieval
time-consuming.

R
• Primarily used for archiving data that is rarely accessed.

IC
Optical Discs (CDs, DVDs, Blu-ray)
•Advantages:

PL
• Inexpensive and portable.
• Minimal wear during reading/writing due to laser technology.
• Commonly used for system backup and recovery.
•Disadvantages: M
• Prone to damage (scratches) that can render data unreadable.
SI
• Requires compatible hardware for reading/writing, which may not be
available on modern devices.
SD Cards

K
•Pros: Small, portable, easy to use.
•Cons: Expensive, easily damaged, limited storage.

AC
USB Flash Drives

R
•Pros: Portable, plug-and-play, easy file transfer.
•Cons: Can spread viruses, lacks security.

IC
External Hard Drives (HDD and SSD)

PL
•HDD (Hard Disk Drive):
• Advantages: Large storage capacity, cost-effective for
high-volume backups.
M
• Disadvantages: Susceptible to physical damage,
crashes, and lacks password protection (but Vaults are
SI
used these days.)
•SSD (Solid-State Drive):Advantages: Faster, more durable, and
reliable than HDDs.
•Disadvantages: Higher cost, especially for larger storage
capacities, although prices are decreasing.
Network Attached Storage (NAS) Drives
•Advantages:
• Centralized storage accessible by multiple devices over a network.

K
• Ideal for file sharing and backups for small businesses and home

AC
users.
• Provides remote access to data from different locations.
•Disadvantages:
• Performance may slow when copying large files over the network.

R
• Dependent on the quality and reliability of its firmware, which may
have bugs in older versions.

IC
Cloud Storage Services
•Advantages:

PL
• Accessible from anywhere with an Internet connection.
• Offers scalable storage space at affordable prices, reducing the need for
physical storage.
M
• Easy to integrate with other applications for seamless backup and file
sharing.
SI
•Disadvantages:
• Bandwidth limitations can affect performance and increase costs if
usage exceeds the service plan.
• Data transmission speeds depend on network conditions, which may
slow down the backup or retrieval process.
Additional Solutions:
•Hybrid Backup Solutions: A combination of local (e.g., external hard drive) and cloud-

K
based backups provides a robust and flexible approach to data protection.

AC
R
•Encryption: For sensitive information, encrypting backups (especially on external drives

IC
and cloud services) helps protect against unauthorized access.

PL
M
SI
K
AC
R
IC
PORTS

PL
Ports on a computer are essential interfaces that allow for
communication between the computer and other devices.

M
SI
Power – Desktop
Computers require a grounded (three prong) power outlet for

K
proper operation.

AC
USB
•Universal Serial Bus (USB): A versatile interface on modern computers.

R
•Connects devices like mice, keyboards, printers, scanners, cameras, and external hard drives.
•Speed : USB 1.0, 2.0, and 3.0.

IC
•Connector Types: USB A, USB B, Mini-A, Mini-B, Micro-A, and Micro-B.

PL
USB Type-C
USB Type-C is a new port designed to use a reversible connector. It supersedes previous
USB connectors.
M
SI
Network/Ethernet (RJ-45)
•The port used for networking on most modern computers.
•Also called Ethernet port, RJ-45 jack, network port, or Cat5 port.
•Primarily connects to Ethernet networks using category-5 twisted pair cables that plug into
RJ-45 jacks.
Sound
Sound ports in computers can be used for headphones, speakers, or
microphones. These ports are often color-coded and marked with icons

K
that represent their use.

AC
VGA

R
•Video Graphics Array (VGA) port, the main PC-video interface since 1990.
•Largely superseded by DVI, HDMI, and DisplayPort as of 2024.

IC
PL
DVI
The DVI (Digital Visual Interface) port is used for video on newer monitors.
M
There are multiple versions of DVI that have a slightly different form or pin
layout.
SI
HDMI
High-Definition Multimedia Interface
First included in computers like Alienware and Mac mini.
Supports both video and audio input.
Thunderbolt
•Brand name for a hardware interface connecting external peripherals to a

K
computer.
•Created by Intel in collaboration with Apple.

AC
•Originally marketed as Light Peak.
•First sold as part of an end-user product on February 24, 2011.

R
Historical/Older Computer Ports

IC
Parallel
•Also known as a DB-25 port.

PL
•Mainly for connecting printers and scanners, often referred to as the "printer
port."
•Being phased out; most printers now use USB ports for interfacing.
M
SI
Serial
•Also known as a DB-9 port.
•Used in the 1980s for various peripheral devices.
•Primarily connected mice, joysticks, and modems.
•Nearly phased out
PS/2

K
•Developed by IBM to connect keyboards and mice.

AC
•Color Coding: Typically has two ports: purple for the keyboard and green for the mouse.
•Standard for about 15 years, now being replaced by USB ports.

R
Firewire (IEEE 1394)
•Developed by Apple Computers in 1995.

IC
•"Firewire" is a trademarked term; other companies use the same technology under
different names.
•Initially faster than USB 1.0, with speeds comparable to USB 2.0.

PL
•Never achieved the popularity of USB; dropped by Apple for iPods but still used in
their computers.

M
SI
Modem (RJ-11)
•Primary method for accessing dial-up networks in the 1980s and 1990s.
•Many modern computers no longer include modems due to the shift to broadband
(cable and DSL) networks.
SI
M
PL
PYQs

IC
R
AC
K
Which of the following is an input device? Which of the following is NOT an output device?
A) Speaker A) Monitor

K
B) Monitor B) Barcode reader
C) Plotter
C) Printer

AC
D) Dot matrix printer
D) Keyboard
B) Barcode reader
Keyboard

R
IC
PL
Which backup device provides a convenient Neeti wants to use an input device that works by sensing
way to create system images and complete the user’s finger movement and downward pressure.
backups, but may require a lengthy Which among the following should she use?
restoration process?
A) Network-attached storage (NAS)
M A) Touchpad
B) Scanner
C) Light pen
SI
B) Solid-state drive (SSD) D) Keyboard
C) DVD-RW disc
D) Tape Drive A) Touchpad
D) Tape Drive
Rishu wants to input data to the computer by What is an output device that transform the signal from the
pressing keys. Which input device should he computer's sound card into audio?

K
use? A) Speaker
B) Graphics card
A) Keyboard

AC
C) Plotter
B) Scanner D) Monitor
C) Joystick
D) Light Pen

R
Speaker
Keyboard

IC
PL
Which of the following is an output device? Pick the odd one out in Central Processing Unit (CPU) of a
A) OCR device computer.
B) MICR (Magnetic Ink Character Recognition A) Output Unit
(MICR))
C) Scanner
M B) ALU and Control Unit both
C) Control Unit
D) ALU (Arithmetic Logic Unit)
SI
D) Projector

Projector Output Unit


Speed of ______ printer is measured in Which among the following is incorrect about Laser Printers?
characters per second (CPS) . A) Fast speed

K
A) Ink-Jet B) Can print multiple copies at a time
C) Supports multiple fonts and sizes
B) Dot Matrix

AC
D) Uses laser lights for producing dots to form characters on a
C) Line page
D) Laser

R
Can print multiple copies at a time
Dot Matrix

IC
PL
Video Graphics Array connectors are those _____________is a high-speed device used in CPU that is
which connect the monitor to a computer’s utilised to store data temporarily during processing.
video card and has holes. A) Auxiliary Memory
A) 18
B) 12
M B) Arithmetic and Logic Unit (ALU)
C) Registers
D) Control Unit
SI
C) 15
D) 10
C) Registers
15
Which among the following statements is Which among the following ports is also known as Line Printer
incorrect? Port?

K
A) Cache memory stores data in permanent use. A) Parallel
B) Video Graphic Array
B) Cache memory is faster than main memory.

AC
C) High Definition Media Interface
C) Cache memory keeps the programs that can D) Display
be run in a short amount of time.
D) The size of cache is usually small.

R
Parallel
A) Cache memory stores data in permanent use.

IC
Which among the following statements is incorrect about
Central Processing Unit?
A) Control Unit controls the order in which instructions

PL
Which among the following devices is also
enter and leave the processor and how the instructions
known as Visual Display Unit (VDU)?
are executed.
A) Printer B) Arithmetic Logic Unit is also known as the mathematical
B) Track Ball
C) Monitor
M brain of a computer.
C) Control Unit directs and manages operation sequences.
SI
D) Scanner D) Arithmetic Logic Unit is responsible for taking the input,
converting it into a signal, and storing it for further
processing.
C) Monitor D is incorrect.
________is a reading device that reads printed Which among the following statements is incorrect?
text by scanning it character by character. A) Magnetic tape drivers are not suitable for storage of data

K
A) Digitizer that need to be accessed randomly.
B) There is no addressing in the magnetic tapes.
B) Magnetic Ink Card Reader (MICR)

AC
C) A magnetic tape consists of vertical columns called frames.
C) Optical Character Reader (OCR) D) Magnetic tape consists of horizontal rows called channels or
D) Track Ball tracks.

R
Magnetic tape drivers are not suitable for storage of data
C) Optical Character Reader (OCR) that need to be accessed randomly.

IC
PL
Which among the following type of computer Which among the following statements is incorrect for
is also known as notebook? input devices?
A) Multi Core A) Input devices accepts user data.
B) Laptop Computer
C) Work Station
M B) Input devices are also called as peripheral device.
C) Optical Mark Reader is an input device.
D) Input devices helps computer in receiving data.
SI
D) Micro Computer

Input devices are also called as peripheral device.


Laptop Computer
Which among the following ports is also called
as mouse port?

K
A) High Definition Media Interface
B) Firewire

AC
C) PS/2
D) Video Graphic Array

R
PS/2

IC
PL
SSDs are solid-state storage devices based
on______ memory technology.
A) magnetic
B) NAND flash
C) optical
M
SI
D) laser

NAND flash
K
AC
R
Software

IC
PL
Windows Operating system including basics of
Microsoft Office like MS word, MS Excel and Power Point etc

M
SI
A computer has mainly two main parts:

K
1. Hardware

AC
2. Software

R
Software

IC
Software is a set of instructions that tells the hardware
what to do.

PL
It’s like the brain’s thoughts and commands.
Examples include:
M
•Operating System: Like Windows, macOS, or Linux,
which manage all other programs.
SI
•Applications: Programs like Microsoft Word, games, or
web browsers.
TYPES OF SOFTWARE
Software can be broadly classified in two categories:

K
1. System Software, and
2. Application Software.

AC
System Software:

R
Users
Enables the basic operation of a computer and is essential

IC
for its functioning. Application
•Interaction: Connects hardware and application software. Software

PL
System
Software

Application Software:
M
Allows users to perform specific tasks like word processing
SI
or gaming. Hardware

•Interaction: Interfaces with system software and users.


Software hierarchy
System Software
Key Functions:
•Provides basic functionality for the computer.

K
•Controls and manages hardware components.

AC
•Acts as an interface between users, application software, and hardware.

Categories of System Software:

R
1.Management and Functionality Software:

IC
Manages computer components like the processor, input/output devices, and provides services requested
by application software. Examples include:

PL
1. Operating Systems
2. Device Drivers
3. System Utilities

2.Development Software:
M
SI
Supports the development and execution of application software by providing necessary tools, such as:
1. Programming Language Software
2. Translators
3. Loaders and Linkers
Operating
System

K
For computer Device

AC
management Drivers

System

R
Utilites

IC
System Programming
Software Languages

PL
Translator
For Software
M developing
software
SI
Linker

Loader
Operating System (OS)

K
Functions:
•Provides an environment for users and applications to work.

AC
•Manages resources like CPU, memory, file storage, and I/O
devices.
•Controls program execution to prevent errors.

R
•Offers a user-friendly interface through commands or a
graphical interface.

IC
Examples of Operating Systems:

PL
•MS-DOS, Windows 7, Windows XP, Linux, UNIX, Mac OS X
Snow Leopard

M
SI
Device Driver
A device driver serves as a bridge between hardware and

K
software, translating commands from the software into a
format that the hardware can understand.

AC
Installation: For a device to work properly, its
corresponding device driver must be installed. Modern

R
operating systems often come with preinstalled drivers for
commonly used devices (e.g., mouse, keyboard, webcam),

IC
enabling plug and play functionality

PL
M
SI
System Utilities
System utility software helps maintain and optimize the computer, supporting
programs and data management. Some utilities come embedded with the

K
operating system, while others can be installed later.

AC
Examples of System Utilities:

•Anti-virus Utility: Scans for and removes malware

R
(e.g., Norton, McAfee, Windows Defender[ Microsoft own]).
•Data Compression Utility: Compresses files to save space (e.g., WinRAR, 7-Zip).

IC
•Cryptographic Utility: Encrypts and decrypts files for security
(e.g., BitLocker).
•Disk Compression Utility: Increases disk capacity by compressing its contents

PL
(e.g., DriveSpace, NTFS compression).
•Disk Partitioning: Divides a physical drive into logical sections
(e.g., Disk Management in Windows, GParted).
M
•Disk Cleaners: Identifies and helps remove unnecessary files
(e.g., Windows Disk Cleanup).
SI
•Backup Utility: Creates data backups and restores them when needed
(e.g. Windows Backup).
• System Profiling Utility: Provides detailed hardware and software information
(e.g., CPU-Z, Speccy,).
•Network Managers: Monitors and manages network traffic
(e.g., Wireshark, SolarWinds Network Performance Monitor).
Programming Languages
Programming languages are used to write programs that control
computer behavior and express algorithms. They must be

K
understood by both the programmer and the computer.

AC
Types of Programming Languages:

1.Machine Language:

R
Binary code (0s and 1s) understood by the computer but
difficult for humans. (Low level)

IC
2.Assembly Language:
Easier than machine language, using symbolic names instead of

PL
numbers.
(Low level)

3.High-Level Language:
M
User-friendly languages like COBOL, BASIC, FORTRAN, C, C++, Java,
SI
but need to be converted into machine language using a compiler
or interpreter
Usage:
•Low-level languages (machine and assembly languages) are used to write system software.
•High-level languages are commonly used for developing application software.
Generations of Programming Languages
1.First Generation:
Machine Language (Binary code: 0s and 1s).

K
2.Second Generation:

AC
Assembly Language (Uses symbolic names).
3.Third Generation:
High-Level Languages (e.g., C, COBOL, Fortran,

R
Pascal, C++, Java, ActiveX).
4.Fourth Generation:

IC
Advanced High-Level Languages (e.g., .NET: VB.NET,
C#.NET, Scripting languages like JavaScript, Microsoft
FrontPage).

PL
5.Fifth Generation:
Logic Programming Languages (e.g., LISP, Prolog).

Translator Software
M Linker and Loader
SI
1.Assembler: Converts assembly language to machine •Linker: Combines object files into a single
code. executable.
2.Compiler: Translates the entire high-level program to •Loader: Loads the executable into memory
machine code at once. for execution.
3.Interpreter: Converts and executes high-level
programs line by line.
High-Level Languages and Their Application Areas
Language Year Developer Application Area Remarks /Full form
FORTRAN 1957 IBM Programmers Calculation FORmula TRANslation

K
ALGOL 1958 European & American Scientists Scientific purposes ALGOrithmic Language

AC
LISP 1958 John McCarthy (MIT) Artificial Intelligence LISt Processing

Business Management, String COmmon Business-Oriented


COBOL 1959 Grace Hopper
Oriented Language

R
John G. Kemeny & Thomas E. Beginner's All-purpose
BASIC 1964 Educational Programming
Kurtz Symbolic Instruction Code

IC
Named after the
Pascal 1970 Niklaus Wirth Education
mathematician Blaise Pascal

PL
C 1972 Dennis Ritchie (Bell Labs) System Programming Just “C”

An extension of the C
C++ 1985 Bjarne Stroustrup (Bell Labs) System Object Programming language, often described as

Python 1991
M Guido Van Rossum
Multimedia, Mobile Apps,
Image Processing
“C with classes”
Named after Monty Python,
not the snake!
SI
James Gosling (Sun
Java 1995 Internet-Oriented Programming Named after Java coffee
Microsystems)
Originally named Mocha, then
Games, Animated 2D/3D
JavaScript 1995 Brendan Eich LiveScript, before becoming
Graphics
JavaScript
Application Software
Application software helps users perform specific tasks and can be a single program
or a set of programs (software package).

K
Examples of Application Software:

AC
•Word Processing: For creating documents (e.g., MS Word).
•Image Processing: For editing graphics (e.g., Adobe Photoshop).

R
•Accounting Software: For managing financial data (e.g., Tally).

IC
•Spreadsheet Software: For organizing data in tables (e.g., MS Excel).
•Presentation Software: For creating slide presentations (e.g., MS PowerPoint).

PL
•Office Suite: Combines word processor, spreadsheet, and presentation tools
Database Management
(e.g., MS Office, Google Docs).
M
•CAD/CAM Software: For design and architecture (e.g., AutoCAD).
System (DBMS)
A DBMS refers to the software
SI
that is responsible
•Geographic Information Systems (GIS): For mapping and analyzing location data for sorting, maintaining and
utilising a database.
(e.g., ArcGIS).
Eg. MySQL, OpenOffice.org
•Web Browsers: For accessing the internet (e.g., Chrome, Internet Explorer).
Software Acquisition

K
Software can be obtained through various methods:
Retail Software:

AC
Off-the-shelf, includes manuals (e.g., Microsoft Windows).
OEM Software:
Bundled with hardware at a lower price, lacks manuals (e.g., Windows on Dell computers).

R
Demo Software:

IC
Limited features for trial; purchase required for full version.
Shareware:
Free trial for a set period; must be purchased afterward.

PL
Freeware:
Free for personal use; may need a license for commercial use, cannot be modified.
Public Domain Software:
M
Free software without copyright; source code can be modified.
Open-Source Software:
SI
Source code available for customization; has usage restrictions (e.g., Linux, Apache, Firefox).
OPERATING SYSTEM
The OS is system software that controls hardware and coordinates its use among different applications and

K
users. It serves as an intermediary between the user and the computer hardware.

AC
Examples of Operating Systems:
•MS-DOS, Windows 7, Windows XP, Linux, UNIX, Mac OS X Snow Leopard.
Multiuser:
Types of Operating Systems (OS)

R
Multiple users access the system simultaneously.
Example: Linux, UNIX, latest Windows.

IC
Single User, Single Task:
One user, one task at a time. Multiprocessing:

PL
Example: MS-DOS. Uses multiple processors for parallel tasks.
Example: Linux, UNIX, latest Windows.
Single User, Multitasking: Real-Time:
M
One user, multiple tasks simultaneously.
Example: Windows 95, latest Windows.
Responds to inputs within a fixed time frame
(time critical).
SI
(For example, the user can listen to music Example: LynxOS.
on the computer while writing an article (used in medical systems, industrial controls).
using a word processor software. ) Embedded:
Optimized for specific devices with minimal resources.
Example: OS in microwaves, washing machines.
User Interface
•The main goal of an operating system is to provide a user-
friendly environment for easy access to applications and

K
hardware.

AC
•Users interact with the computer through two types of
interfaces:

R
• Command Line Interface (CLI):
• Interaction through text commands entered via

IC
keyboard.
• Users need to remember commands for tasks like

PL
copying, deleting, or opening files.
• Examples: MS-DOS, Linux shell.

• Graphical User Interface (GUI):


M
SI
• Uses icons, menus, windows, and a pointer for
interaction, eliminating the need to learn commands.
• Instructions are given by moving the pointer with a
mouse.
MS-DOS

K
•MS-DOS was the first widely installed operating system for PCs in

AC
the 1980s.
•MS-DOS uses a Command Line Interface (CLI), where users

R
must type and remember commands.
•It is a single-user, single-tasking OS, allowing one task at a

IC
time without built-in networking support.

PL
•MS-DOS is a 16-bit OS, capable of processing 16 bits of data at
a time, and cannot fully utilize 32-bit processors..
To open the command prompt in Windows:
M
•<Start> → <Run> → Type "cmd" → <Enter>, or
SI
•<Start> → <All programs> → <Accessories> → <Command
Prompt>
•1985: Windows 1.0: First version, not commercially successful.
•1990: Windows 3.0: Improved graphical interface,

K
commercially successful.

AC
•1995: Windows 95: First 32-bit OS; faced compatibility issues.
•1998: Windows 98: Integrated web browser, added

R
security vulnerabilities.
•2001: Windows XP: Merged compatibility with stability.

IC
•2008: Windows Vista: Introduced 3D features.

PL
•2009: Windows 7: Added touch, speech, and other
new features.
M
•2012: Windows 8: Replaced Start Menu with Start Screen.
SI
•2015: Windows 10: Combined elements from
Windows 7 and 8.
•2021: Windows 11: Redesigned Start Menu,
Improved multitasking.
Linux OS
Overview: Linux is a Unix-like OS with a shell user interface.

K
Development: Created by Linus Torvalds in 1991, it's free and open-

AC
source.
Vendors: Popular distributions include Ubuntu, Fedora, Debian, and Red

R
Hat.

IC
Mascot: Tux the penguin.
User Interface: Command line and graphical environments (GUIs) like

PL
GNOME and KDE.
Capabilities: Multitasking, multi-user support, available in 32-bit and 64-
bit versions. M
SI
Reliability: Renowned for its reliability, security, and low cost.
Availability: Distributions are readily available for free or with support
services.
Keyboard Shortcuts

K
General Shortcuts •Copy: Ctrl + C
•Help Window: F1 •Cut: Ctrl + X

AC
•Refresh: F5 •Paste: Ctrl + V
•Task Manager: Ctrl + Shift + Esc •Rename File: F2
•Run Dialog: Windows + R

R
•Delete Without Recycle Bin: Shift + Delete
•File Explorer: Windows + E •Shortcut Menu: Shift + F10

IC
•Lock Computer: Windows + L Function Key Shortcuts
•Show Desktop: Windows + D •Refresh Page: F5

PL
Application Shortcuts •Address Bar (Browsers): F6
•Switch Applications: Alt + Tab •Developer Tools (Browsers): F12

•Print Dialog: Ctrl + P


M
•Move Between Applications: Alt + Esc •Next Open Program: Alt + Tab
•Maximize Window: F11
SI
•Close Document: Ctrl + F4 •Show Desktop: Windows + D
•Close Application: Alt + F4
Windows Explorer

K
Windows Explorer, also known as File Explorer
in Windows 10 and later versions, is a file

AC
management application that allows users to
browse, manage, and organize files and
folders on their computers. It provides an

R
interface for accessing local storage, external
drives, and network locations.

IC
Basic Navigation
1.Navigation Pane: Located on the left side, it provides

PL
quick access to folders, drives, and libraries.
1. Quick Access: Shows frequently accessed folders
and recently used files.
M
2. This PC: Displays all connected drives and devices.
SI
3. Address Bar: Displays the current folder path. You can click any part of the path to navigate directly to
that folder.
4. Main Window: Displays the contents of the selected folder. You can view files in various layouts:
1. Icons, 2. List and 3. Details
Opening Windows Explorer
Using the Ribbon
•Method 1: Press Windows + E on your keyboard. •The Ribbon at the top provides various options for managing
•Method 2: Click the File Explorer icon on the files and folders, including:

K
taskbar. • Home: Basic file operations (New Folder, Cut, Copy,
•Method 3: Right-click the Start Menu button and Paste).

AC
select File Explorer. • Share: Options for sharing files via email or network.
• View: Customization options for how files and folders
are displayed.

R
Viewing Options

IC
1.Change View: Use the View tab on
the ribbon to switch between

PL
different layouts (e.g., Large icons,
Small icons, List, Details).

2.Sort and Group: In Details view, you


can sort files by name, date modified,
M
SI
type, or size by clicking the column
headers. You can group files by similar
criteria in the same tab
Advanced Features

K
Libraries
•Libraries are virtual folders that aggregate content

AC
from multiple locations. They can be accessed from
the navigation pane under Libraries.

R
File Properties
Right-click a file or folder and select

IC
Properties.

PL
View information such as size, location, created
and modified dates, and attributes.

Folder Options M
Access additional settings by clicking on the View
SI
tab and selecting Options:
Show hidden files and folders.
Change how file extensions are displayed.
K
AC
R
Purpose: A suite of software for office tasks.

IC
Developed by: Microsoft in 1988.
Main Packages:

PL
• MS-Word: Word processing.
• MS-Excel: Spreadsheet.

M • MS-PowerPoint: Presentation.
• MS-Access: Database management.
SI
• MS-Outlook: E-mail client.
Tool Name Shortcut Keys Apply Style Ctrl + Shift + S MS-Word Keyboard
New Document Ctrl + N Shortcuts
Change Font Ctrl + Shift + F
Open Document Ctrl + O / Ctrl + F12

K
Change Font Size Ctrl + Shift + P
Save Document Ctrl + S / Shift + F12
Bold Ctrl + B

AC
Save As F12
Select All Ctrl + A Italic Ctrl + I
Print Ctrl + P / Ctrl + Shift + F12 Underline Ctrl + U
Align Left Ctrl + L

R
Print Preview Ctrl + F2
Center Ctrl + E
Spelling Check F7
Align Right Ctrl + R

IC
Cut Ctrl + X
Copy Ctrl + C Justify Ctrl + J
Paste Ctrl + V / Shift + Insert Increase Line

PL
Ctrl + 5
Format Painter Ctrl + Shift + C Spacing
Undo Ctrl + Z •First Release: MS-Word was released in 1983 as Multi-Tool
Redo Ctrl + Y Word for Xenix.
Help
Find
F1M
Ctrl + F
•Default Alignment: Paragraphs are left-aligned by default.
•AutoCorrect: Fixes common typing, spelling, and grammar
SI
Insert Link Ctrl + K errors automatically.
Delete Right Ctrl + Del
•File Extensions: Saves files as .doc (older) or .docx (newer)
Delete Left Ctrl + Backspace
•Cloud Storage: Supports OneDrive and SharePoint for online
Insert Date Alt + Shift + D
document access.
Insert Time Alt + Shift + T
Word Processing Software
Purpose: Used for creating, editing, formatting, and printing text-based documents

K
Document Types: Posters, reports, letters, brochures, web pages, newsletters, and long

AC
documents with indexes and links.
•Popular Software:

R
• DOS-based: WordStar, Easy Word, WordPerfect

IC
• Other Systems: AppleWorks (Windows/Mac), Applix Word (Linux), Notepad (Windows),
Star Office Writer, Libre Office

PL
• Online Tools: Google Docs, ZohoWriter, PDSText (Indian languages), Sun OpenOffice
•MS-Word: A popular Windows-based word processor, part of the MS-Office suite
(which includes MS-Excel, MS-PowerPoint,
M
SI
MS-Access). It offers a user-friendly GUI with
various formatting tools.
Microsoft Word

K
Components of MS-Word
1.Title Bar: Displays application and file name, includes

AC
Key Features of MS-Word
minimize, restore, and close buttons. •Text Editing: Cut, copy, paste, modify text.
2.Standard Toolbar: Common operations like open, print, •Format Text: Apply bold, italic, underline.

R
save. •Indentation: Adjust distance between text and

IC
3.Ribbon: Contains tabs (Home, Insert, Page Layout, etc.) margins.

PL
with organized commands. •Page Orientation: Portrait or landscape layout.
4.Ruler: Helps with text alignment and setting margins. •Find & Replace: Locate and replace text easily.

M
5.Status Bar: Shows information like page number, line
number, etc.
•Spell Check: Detects spelling errors.
•Thesaurus: Provides synonyms for words.
SI
6.Work Area: Rectangular area for typing text. •Bullets and Numbering: Organize lists and tables.
7.Cursor: Marks the point of text insertion. •Graphics: Insert images and objects.
•Save Document: Ctrl + S saves the document.
SI
M
PL
IC
R
AC
K
•Office Logo Button (Top-left corner) (Now replaced with FILE):
•Contains task buttons like New, Open, Save, Save As, Print, and Close.

K
•Includes a list of recent documents.

AC
•Some commands have expandable menus for additional options.

•Quick Access Toolbar (Right of Office Logo Button):

R
•Provides shortcuts to frequently used tools like Save, Undo, and Repeat.

IC
•Can be customized by selecting the desired buttons from the "Customize
Quick Access Toolbar" option.

PL
Ribbon: Located across the top of the screen, it replaces
traditional toolbars and menus. The Ribbon consists of:
M
•Tabs (e.g., Home, Insert, Page Layout): Contain buttons for
editing text, layout, and other tools.
SI
•Groups: Each Tab is divided into Groups (e.g., Home Tab
has Clipboard, Font, Paragraph, Styles, and Editing).
•Icons: Each group contains icons for commands. Hovering
over an icon shows its function.
Microsoft Word
Microsoft Word (MS Word) is a powerful word processor developed by Microsoft, offering numerous tools for
document creation, editing, and formatting. This guide explains the features, tabs, common shortcuts, and default

K
settings of MS Word.

AC
Microsoft Word File Name Extensions
1. Early Versions
• .DOC: Introduced in 1983 as the primary format for Word documents.

R
2. Word 97 and Beyond
• .DOC: Continued as the main format, adding features like tables.

IC
3. Word 2007 and Office Open XML
• .DOCX: Became the new standard, based on XML for better management.
.DOCM: Macro-enabled format.

PL

• .DOTX: Template format based on .DOCX.


• .DOTM: Macro-enabled template.
4. Recent Formats


M
.RTF: Rich Text Format for compatibility.
.ODT: Open Document Text for open-source applications.
SI
.PDF: Format for sharing documents
1. Home Tab
The Home tab includes essential formatting and editing tools.

K
• Clipboard: Cut, copy, and paste text.

AC
• Font: Adjust font type (default: Calibri), size (default: 11 pt), color, and other styles
(bold, italics, underline, etc.).
• Paragraph: Align text (left alignment by default), line spacing (default: 1.15 lines),

R
indentation, bullets, and numbering.

IC
• Styles: Use predefined styles (e.g., Normal, Heading 1) to quickly apply formatting.
• Editing: Find, Replace, and Select options.

PL
Key Feature: Format Painter
• Format Painter: Copies formatting from one part of the document to another.
Shortcut: Ctrl + Shift + C to copy the format and Ctrl + Shift + V to paste the
o

format. M
SI
2. Insert Tab
The Insert tab allows users to add different elements to the document.

K
• Pages: Insert a new blank page, cover page, or page break.

AC
• Tables: Create and customize tables.
• Illustrations: Insert pictures, shapes, icons, and SmartArt.
• Links: Add hyperlinks, bookmarks, and cross-references.

R
• Text: Insert text boxes, WordArt, and drop caps.

IC
• Symbols: Add symbols and special characters.
Key Feature: SmartArt

PL
• SmartArt: Visual representations for diagrams and process flows. It is
useful for creating organizational charts, processes, or cycle diagrams with
built-in formatting options.
M
SI
3. Design Tab
The Design tab offers tools to enhance the visual appeal of documents.

K
• Themes: Apply themes for fonts, colors, and effects.

AC
• Document Formatting: Choose from different pre-set formatting options.
• Watermark: Add a watermark to the background (e.g., Confidential).
• Page Color: Change the background color of the page.

R
• Page Borders: Add borders around the entire page.

IC
Key Feature: Theme Effects
• Theme Effects: Adjust the overall look of shapes, charts, and diagrams in

PL
the document to match a selected theme.

M
SI
4. Layout Tab
The Layout tab is used to set the page’s physical layout.

K
• Margins: Adjust page margins.

AC
• Orientation: Set the page orientation to Portrait or Landscape.
• Size: Select the paper size.
Columns: Split text into multiple columns.

R

• Breaks: Insert page, section, or column breaks.

IC
Key Feature: Align Objects
• Align Objects: Use alignment tools to position images, text boxes, and other objects

PL
relative to the page or each other.

M
SI
5. References Tab
The References tab is essential for managing academic and professional references.

K
• Table of Contents: Automatically generate and update a table of contents.

AC
• Footnotes: Add and manage footnotes and endnotes.
• Citations & Bibliography: Insert citations and create bibliographies.
Captions: Add captions to images and tables.

R

• Index: Generate an index for the document’s key terms.

IC
Key Feature: Cross-reference
• Cross-reference: Link text to headings, footnotes, tables, figures, or other items in the

PL
document for easy navigation.

M
SI
6. Mailings Tab
The Mailings tab is used for mail merges and label creation.

K
• Envelopes: Design and print envelopes.

AC
• Labels: Create and print labels.
• Mail Merge: Automate the process of sending personalized letters or emails to multiple
recipients.

R
• Recipient List: Manage lists of recipients for mail merges.

IC
Key Feature: Mail Merge
• Mail Merge Wizard: Guides users through the process of merging data from a

PL
spreadsheet into a Word document for personalized mass communication.

M
SI
7. Review Tab
The Review tab is focused on document proofing and collaboration.

K
• Spelling & Grammar: Check for spelling and grammar errors.

AC
• Thesaurus: Find synonyms and related words.
• Track Changes: Enable tracking of all edits made to the document.
Comments: Add and manage comments for review.

R

• Compare: Compare two versions of a document to track changes between them.

IC
Key Feature: Track Changes
Track Changes: Allows you to see who made what changes in the document, making it

PL
easier to collaborate and revise

M
SI
8. View Tab

K
The View tab controls how the document is displayed.
• Read Mode: Optimizes the document for reading.

AC
• Print Layout: Displays the document as it would appear on paper.
• Zoom: Adjust the view size of the document.

R
• Ruler: Show or hide the ruler.
• Gridlines: Display gridlines for better alignment of text and objects.

IC
Key Feature: Split Window
Split Window: View two different sections of the same document

PL

simultaneously, which is useful for comparing or editing distant sections.

M
SI
Text Formatting Shortcuts
9. File Tab • Ctrl + B: Bold selected text
The File tab is used for managing documents. • Ctrl + I: Italicize selected text

K
• New: Create a new document. • Ctrl + U: Underline selected text

AC
• Open: Open an existing document. • Ctrl + Shift + D: Double underline
• Save and Save As: Save the current document.
• Ctrl + Shift + A: Change selected text to all caps
• Print: Print the document.
• Ctrl + Shift + K: Change selected text to small
• Export: Export the document to PDF or other

R
caps
formats.
• Ctrl + Shift + >: Increase font size

IC
Options: Customize Word settings and preferences
• Ctrl + Shift + <: Decrease font size
General Shortcuts Paragraph Formatting

PL
Shortcuts Editing Shortcuts
• Ctrl + N: New document
Ctrl + F: Open the Find dialog box
• Ctrl + E: Center align the paragraph
• Ctrl + O: Open an existing document Ctrl + H: Open the Find and Replace
• Ctrl + L: Left align the paragraph dialog box
• Ctrl + S: Save the current document


Ctrl + P: Print the document
Ctrl + W: Close the document
M •


Ctrl + R: Right align the paragraph
Ctrl + J: Justify the paragraph
Ctrl + K: Insert a hyperlink
Ctrl + A: Select all content
SI
• Ctrl + M: Increase paragraph indent Ctrl + Shift + C: Copy formatting
• Ctrl + Z: Undo the last action (format painter)
• Ctrl + Shift + M: Decrease
• Ctrl + Y: Redo the last undone action Ctrl + Shift + V: Paste formatting
paragraph indent
• Ctrl + C: Copy selected text or item Ctrl + Backspace: Delete the previous
• Ctrl + 1: Single line spacing word
• Ctrl + X: Cut selected text or item
• Ctrl + 2: Double line spacing Ctrl + Delete: Delete the next word
• Ctrl + V: Paste the copied or cut content Ctrl + 5: 1.5 line spacing
• F4: Repeat the last action you performed.
Special Shortcuts
• Alt + F4: Close Microsoft Word.
Ctrl + Enter: Insert a page break
• F5 – Find and Replace

K
Alt + Shift + D: Insert the current date
• F5: Open the Find and Replace dialog (Go To tab).
Alt + Shift + T: Insert the current time

AC
• Ctrl + F5: Restore the document window size.
Alt + Ctrl + S: Split the document window • F6 – Cycle Through Panes
F7: Spell check • F6: Move between document, task pane, status bar, and Ribbon.
Shift + F7: Open the Thesaurus • Shift + F6: Move in reverse through these areas.

R
• F7 – Spell Check

IC
Function Keys in Microsoft Word • F7: Open the Spelling and Grammar check.
• F1 – Help and Support • Shift + F7: Open the Thesaurus.
• Shift + F1: Reveal formatting in the document. • F8 – Extend Selection

PL
• Ctrl + F1: Show or hide the Ribbon. • F8: Extend text selection (press multiple times to expand selection).
• F2 – Move Text • Shift + F8: Reduce the size of the selection.
• F2: Move selected text or objects. • Ctrl + F8: Resize the document window.
• Ctrl + F2: Open the Print Preview window.
F3 – AutoText
M •


F9 – Update Fields
F9: Update selected fields in the document.
SI

• F3: Insert an AutoText entry (after typing the entry's name). • Shift + F9: Toggle the display of a field’s code and result.
• Shift + F3: Change the case of selected text (toggle between • Alt + F9: Show or hide all field codes.
UPPERCASE, lowercase, and Capitalize Each Word). • F10 – Activate the Menu Bar
• F4 – Repeat Last Action • F10: Activate the menu bar.
• Shift + F10: Open the context menu (same as right-click).
• Ctrl + F10: Maximize or restore the document window.

K
• F11 – Next Field
• F11: Move to the next field in the document.

AC
• Shift + F11: Move to the previous field.
• Ctrl + F11: Lock a field.
• Ctrl + Shift + F11: Unlock a field.

R
• F12 – Save/Save As

IC
• F12: Open the Save As dialog.
• Shift + F12: Save the document (same as Ctrl + S).

PL
• Ctrl + F12: Open a document.

M
SI
SI
M
PL
IC
MS EXCEL

R
AC
K
K
AC
Introduction to Microsoft Excel
Microsoft Excel is a robust spreadsheet application developed by Microsoft as part of the
Microsoft Office suite. It is widely utilized for:

R
•Data Entry & Management: Efficiently inputting and organizing large datasets.

IC
•Calculation & Analysis: Performing complex calculations using formulas and functions.

PL
•Data Visualization: Creating charts and graphs for clear data representation.
•Data Manipulation: Using features like PivotTables to analyze large amounts of data.
M
•Automation: Automating tasks through macros and VBA (Visual Basic for Applications).
SI
SI
M
PL
IC
R
AC
K
Excel Workbook and Worksheet Basics
Workbook Structure

K
•Workbook: The Excel file that contains one or more worksheets. Each workbook can store a variety of

AC
data types, including numbers, text, and formulas.

Worksheet Details
•Worksheet: A single sheet in a workbook containing cells arranged in a grid.

R
• Maximum Size: As of Excel 2010 and later, each worksheet can contain up to 1,048,576 rows and

IC
16,384 (XFD) columns.

Cell Fundamentals

PL
•Cell: The basic unit for data entry, identified by its column letter and row number (e.g., A1).
•Default : Column width: 8.43 characters, Row height: 15 points, FONT : Calibri (11 Point)
•Active Cell: The currently selected cell where data can be entered.

Sheet Tabs
M
SI
•Sheet Tabs: Located at the bottom of the workbook. You can:
• Rename sheets by right-clicking the tab and selecting "Rename."
• Add, delete, or move sheets within the workbook.
Default Values
•Default Font: Calibri, 11-point size.

K
•Default Cell Format: General (numbers are treated as general numbers until formatted).
•Default Row Height: 15 points (20 pixels).

AC
•Default Column Width: 8.43 characters (64 pixels).
•Default File Format (Excel 2007 and later): .xlsx

R
IC
Tabs and Ribbons in Excel
Microsoft Excel is organized into different tabs, each containing groups
of commands organized on the ribbon.

PL
File Tab New: Create a new workbook.
•Open: Access existing workbooks.
•Save/Save As: Save changes or save the workbook in different formats.
M
•Print: Print settings and print preview options.
•Export: Save workbooks as PDF or other formats.
SI
•Options: Access settings to customize Excel preferences.
Home Tab
Contains fundamental tools for formatting and editing.

K
•Clipboard:
• Cut: Move data from one location to another.

AC
• Copy: Duplicate data for pasting.
• Paste: Insert copied or cut data.
• Format Painter: Quickly copy formatting from one cell to another.

R
•Font:

IC
• Change font style, size, and color.
• Apply bold, italic, or underline effects.
•Alignment:

PL
• Align text (left, center, right).
• Merge cells and wrap text for better readability.
•Number:
M
• Format cells for currency, percentage, date, and more.
•Styles:
SI
• Apply predefined Cell Styles to highlight key data.
• Use Conditional Formatting to
visually analyze data based on certain conditions.
•Cells:
• Insert or delete rows/columns.
• Adjust cell sizes (height/width).

K
•Editing:
• AutoSum: Quickly sum a range of cells.

AC
• Sort and filter data to view relevant information.
Insert Tab
Used to add various elements to the worksheet.

R
•Tables:
• Insert an Excel Table for data organization and easy filtering.

IC
•Illustrations:
• Add Pictures, Shapes, Icons, and SmartArt.

PL
•Charts:
• Create charts (bar, line, pie) for data visualization.
•Sparklines:
M
• Insert mini-charts within cells to show trends.
•Text:
SI
• Include Text Boxes, Headers, and Footers.
K
AC
Page Layout Tab
Control the appearance of your worksheet when printed.

R
•Themes:
• Apply different themes to change fonts and colors across the workbook.

IC
•Page Setup:
• Set Margins, Orientation, and Page Size for printing.

PL
•Sheet Options:
• Control the visibility of Gridlines and Headings in printed documents.
Formulas Tab
M
Contains tools for managing formulas and functions.
•Function Library:
SI
• Access functions categorized by type (e.g., financial, statistical, text).
•Defined Names:
• Name ranges to simplify formula references.
•Formula Auditing:
• Trace and debug formulas using tools like Trace Precedents.
K
AC
Data Tab
Manage data and perform analyses. •Data Tools:
•Get External Data: • Use Text to Columns to split cell contents.
• Import data from various sources (text files, databases). •What-If Analysis:

R
•Sort & Filter: • Tools like Goal Seek and Scenario Manager for hypothetical
• Sort data in ascending or descending order. scenarios.

IC
PL
M
SI
Review Tab •Comments:
Tools for proofreading and collaborating. • Add and manage comments for collaborative feedback.
•Proofing: •Protection:
• Check spelling and use the thesaurus. • Protect sheets or workbooks from unauthorized changes.
View Tab •Show:
Manage how your worksheet is displayed. • Toggle visibility of Ruler, Gridlines, and Formula
•Workbook Views: Bar.

K
• Switch between Normal, Page Layout, •Zoom:
and Page Break Preview. • Adjust the zoom level to focus on specific data

AC
areas.

R
IC
PL
Key Excel Functions and Formulas
Basic Functions
M
SUM: =SUM(A1:A10) - Calculates the total of a range.
SI
AVERAGE: =AVERAGE(B1:B10) - Computes the average of a range.
COUNT: =COUNT(C1:C10) - Counts numeric entries in a range.
MAX: =MAX(D1:D10) - Finds the highest value in a range.
MIN: =MIN(E1:E10) - Finds the lowest value in a range.
Logical Functions

K
IF: =IF(F1>100, "Above Average", "Below Average") - Checks a condition and returns results based on

AC
TRUE/FALSE.
AND: =AND(G1>50, G1<100) - Checks multiple conditions and returns TRUE if all are met.

R
OR: =OR(H1="Yes", H1="Maybe") - Returns TRUE if at least one condition is met.

IC
NOT: =NOT(I1=100) - Returns the opposite of a condition.

PL
Lookup & Reference Functions
VLOOKUP: =VLOOKUP(J1, K1:L10, 2, FALSE) - Searches for a value in the first column and returns a
M
corresponding value from another column.
SI
HLOOKUP: =HLOOKUP(M1, N1:O10, 2, FALSE) - Similar to VLOOKUP but searches horizontally.
INDEX: =INDEX(P1:P10, 5) - Returns the value at the 5th (Specified) position in a range.
MATCH: =MATCH(Q1, R1:R10, 0) - Returns the relative position of a specified value in a range.
Text Functions
CONCATENATE: =CONCATENATE(S1, " ", T1) - Joins text strings together.

K
LEFT: =LEFT(U1, 5) - Extracts the first 5 characters from a string.

AC
RIGHT: =RIGHT(V1, 3) - Extracts the last 3 characters from a string.
MID: =MID(W1, 3, 2) - Extracts 2 characters from the string starting at the 3rd character.

R
TRIM: =TRIM(X1) - Removes extra spaces from text.

IC
Date & Time Functions

PL
TODAY: =TODAY() - Returns the current date.

M
NOW: =NOW() - Returns the current date and time.
DAY: =DAY(Y1) - Extracts the day from a date.
SI
MONTH: =MONTH(Z1) - Extracts the month from a date.
YEAR: =YEAR(AA1) - Extracts the year from a date.
Data Analysis Tools
PivotTables

K
•Creating a PivotTable: Select your data range, go to the Insert tab, and choose PivotTable.
•Using PivotTables: Drag fields to the Rows, Columns, Values, and Filters areas to analyze your data.

AC
PivotCharts
•What is a PivotChart?: A graphical representation of PivotTable data.

R
•Creating a PivotChart: Select your PivotTable, then go to the Insert tab and select PivotChart.

IC
Macros and VBA
•What are Macros?: Recorded sequences of actions to automate repetitive tasks.
•Creating a Macro:

PL
• Go to the View tab and select Macros.
• Click Record Macro and perform the actions you want to automate.
• Stop recording to save the macro.
M
•Using VBA: Use the Visual Basic editor to write custom scripts for advanced automation.
SI
What-If Analysis
•Goal Seek: Find input values required to achieve specific results.
•Scenario Manager: Compare different scenarios by changing multiple input values.
•Data Tables: Analyze how changes in one or two variables impact results.
Keyboard Shortcuts for Excel Selection Shortcuts
•Ctrl + A: Select the entire worksheet.

K
•Shift + Arrow Keys: Extend the selection by one cell.
General Shortcuts

AC
•Ctrl + Shift + Arrow Key: Extend the selection to the last non-
•Ctrl + N: Create a new workbook. empty cell in the direction of the arrow.
•Ctrl + O: Open an existing workbook. •Ctrl + Space: Select the entire column.
•Ctrl + S: Save the active workbook. •Shift + Space: Select the entire row.

R
•Ctrl + P: Print the active workbook.
•Ctrl + W: Close the current workbook. Editing Shortcuts

IC
•Ctrl + Q: Quick Analysis options. •F2: Edit the active cell.
•Ctrl + F4: Close Excel. •Ctrl + Z: Undo the last action.
•Ctrl + Y: Redo the last action.

PL
Navigation Shortcuts •Ctrl + C: Copy selected cells.
•Arrow Keys: Move one cell in the direction of the •Ctrl + X: Cut selected cells.
arrow. •Ctrl + V: Paste copied or cut cells.

•Home: Move to the beginning of the row.


M
•Ctrl + Arrow Key: Move to the edge of data regions. •Ctrl + Alt + V: Paste Special options.
•Delete: Clear the contents of the selected cells.
SI
•Ctrl + Home: Move to the beginning of the worksheet. •Ctrl + D: Fill down (copy the contents of the top cell to the
•Ctrl + End: Move to the last cell with content. cells below).
•Page Up / Page Down: Move one screen up or down. •Ctrl + R: Fill right (copy the contents of the left cell to the cells
•Alt + Page Up / Page Down: Move one screen to the to the right).
left or right.
K
Formatting Shortcuts Worksheet Shortcuts

AC
•Ctrl + B: Apply or remove bold formatting. •Ctrl + Page Up / Page Down: Move to the previous or next
•Ctrl + I: Apply or remove italic formatting. worksheet.
•Ctrl + U: Apply or remove underline formatting. •Shift + F11: Insert a new worksheet.
•Alt + H, H: Open the Fill Color menu. •Ctrl + Shift + N: Create a new folder in the Open dialog.

R
•Alt + H, F, C: Open the Font Color menu. •Ctrl + Shift + K: Insert a hyperlink.
•Ctrl + 1: Open the Format Cells dialog box.

IC
•Ctrl + Shift + $: Apply currency format. Viewing Shortcuts
•Ctrl + Shift + %: Apply percentage format. •Ctrl + F1: Show or hide the ribbon.

PL
•Ctrl + Shift + #: Apply date format. •Alt + W, F, F: Freeze panes.
•Alt + W, S: Split the window.
Formula Shortcuts •Ctrl + Shift + L: Toggle filters on and off.
•=: Start a formula.
M
•F4: Toggle between relative and absolute references in a
formula.
Miscellaneous Shortcuts
•F1: Open Help.
SI
•Ctrl + ` (backtick): Show or hide formulas. •F12: Open the Save As dialog box.
•Alt + =: Insert the AutoSum formula. •Ctrl + Shift + U: Expand or collapse the formula bar.
K
AC
R
IC
MS Powerpoint

PL
M
SI
K
AC
Microsoft PowerPoint:

R
•Microsoft PowerPoint is a widely used presentation software that is
part of the Microsoft Office Suite.

IC
•It is designed to create dynamic presentations through a graphical

PL
slide-based approach, often used to support oral presentations.

M
PowerPoint presentations use two main file extensions:
.ppt: Default format for versions prior to 2007, a binary file.
SI
.pptx: Default format from 2007 onwards, an XML-based file that reduces size
and offers better recovery options.
PowerPoint Tabs and their Functions:
File Tab:

K
Manage all presentation files from this tab.

AC
Key functions: Open, Save, Share, Export, Print, and manage presentation settings.

Home Tab:
Contains the essential tools for editing and managing slides and text.

R
Key groups:
Clipboard: Cut, copy, and paste commands.

IC
Slides: Add new slides, change layouts, and reset formatting.
Font & Paragraph: Text formatting (font style, size, color) and paragraph alignment, bullets, and

PL
lists.
Drawing: Shapes, lines, and other drawing tools.
Editing: Find, replace, and selection tools.
M
SI
K
AC
R
IC
SIMPLICRACK

PL
M
SI
Insert Tab:
Add various elements to your slides, such as tables, pictures, shapes, icons, and videos.

K
Can also add hyperlinks, headers/footers, and equations.

AC
R
IC
Design Tab:
Customize the look and feel of your presentation.

PL
Key functions: Apply themes, choose color schemes, and format slide backgrounds.

M
SI
Transitions Tab:
Define how slides transition from one to the next.
Choose from a variety of visual effects, such as fading, sliding, and more.

K
Set timing and duration for transitions.

AC
R
Animations Tab:
Add movement to text, images, or objects on your slides.

IC
Key feature: The Animation Pane allows you to choreograph the timing and sequence of animations.

PL
M
SI
Slide Show Tab:
Controls how the presentation is delivered
to an audience.
Key features: Start slideshow, rehearse
timings, and set up custom slide shows.
Review Tab:
Tools for reviewing and proofreading your presentation.
Key features: Spell check, comments, compare presentations, and translate text.

K
AC
R
IC
Slide Sorter: Displays all slides for easy rearrangement.
View Tab:
Notes Page: Add speaker notes.

PL
Change how you view your presentation. Reading View: Full-screen view for reviewing the
Key views: presentation.
Normal: Default view for editing. Slide Master : allows you to control the look and feel of

presentation.
M
Outline: Text-based outline of your the entire presentation by setting up default layouts and
styles for slides.
SI
Shortcut Keys for Power Point
• Ctrl + N Create a new presentation

K
• Ctrl + O Open an existing presentation

AC
• Ctrl+ S Save a presentation
• Ctrl+ F4 Close a presentation

R
• Ctrl + Q Save and close a presentation

IC
• Ctrl + Z Undo an action
• Ctrl + Y Redo an action

PL
• Ctrl + F2 Print preview view
• F7 Check spelling
M
• Ctrl + F Find and replace in a presentation
SI
• Esc End the slideshow
• F5 Start the presentation form the beginning
K
AC
Software

R
IC
PYQs

PL
M
SI
Which of the following is an example of Application software includes a variety of programs that are
application software? designed to meet the information

K
processing needs of _______________.
A) A web browser
A) programmers
B) A programming language

AC
B) team leaders
C) An operating system C) customers
D) A word processor D) end users

R
D) end users
D) A word processor

IC
PL
Which of the following is an example of Which of the following is NOT an application software?
A) Education software
system software?
B) Personal assistance software
A) Windows operating system C) Entertainment software
B) Adobe Photoshop
C) Microsoft Word
M D) Programming language translator software
SI
D) Google Chrome
D) Programming language translator software

A) Windows operating system


__________displays a list of utility configure the Which of the following is a computer-based application for
computer system and install software and the exchange of messages between users?

K
A) Mozilla
hardware.
B) Bing
A) Run

AC
C) Chrome
B) Help and Support D) Email
C) Control Panel
D) Taskbar

R
D) Email
C) Control Panel

IC
PL
Which of the following is not a LibreOffice What is the category of software that enables word
processing, database management, graphic
Software Suite program?
manipulation and spreadsheet creation?
A) LibreOffice Calc A) Structure
B) LibreOffice Impress
C) LibreOffice Writer
M B) Application
C) Framework
SI
D) LibreOffice Excel D) System

D) LibreOffice Excel B) Application


Which of the following is a system software? Which of the following statements is correct about the Linux
A) MS-Office operating system?

K
A) It is product of Oracle Incorporation.
B) Printer driver
B) It is a multi-tasking operating system.
C) Adobe Reader

AC
C) It was developed by Dennis Ritchie.
D) Web browser D) It is a single user operating system.

B) Printer driver

R
B) It is a multi-tasking operating system.

IC
PL
Which of the following statements is correct Which of the following operating systems uses a Graphical
User Interface?
about the Windows operating system?
A) MS-DOS
A) Windows NT was developed by Oracle and B) Windows Server Core
marketed by Microsoft.
B) Windows NT was released in 1987.
M C) Microsoft Windows XP
D) Linux Mint
SI
C) Windows 10 was released in 2010.
D) Windows NT supports preemptive
multitasking.
C) Microsoft Windows XP
D) Windows NT supports preemptive multitasking.
Which of the following is the most recent Identify whether the given statements are true or false.
version of the Windows operating system (i) The Windows OS provides a Graphical User Interface (GUI)

K
and multitasking capability to users.
released in the year
(ii) The Windows operating system was developed by Google.
2021?

AC
A) (i)- False, (ii)-True
A) Windows 11 B) (i)- False, (ii)- False
B) Windows 8 C) (i)-True, (ii)- False
C) Windows 10 D) (i)-True, (ii)-True

R
D) Windows 7

IC
C) (i)-True, (ii)- False
A) Windows 11

PL
WinZip and WinRAR are which type of utility Which keyboard shortcut can be used to Print the
software? Microsoft Word document?
A) Ctrl + P
A) Disk defragmenter
B) Ctrl + S
B) File compression tools
C) Free up disk management tools
M C) Ctrl + V
D) Ctrl + Z
SI
D) Disk cleanup tools

B) File compression tools


A) Ctrl + P
Which of the following is used to remove What is the keyboard shortcut to edit the contents of a cell in
formatting from a selected paragraph in many Microsoft Excel?

K
A) F2
word processing programs?
B) Alt + E
A) Clear Formatting

AC
C) Shift + Enter
B) Delete Paragraph D) Ctrl + S
C) Format Painter
D) Remove Paragraph A) F2

R
IC
A) Clear Formatting

PL
Which of the following options is used to Which of the following is the correct option for using
check the spelling and grammar in a 'justify' alignment to a paragraph in a document?
A) Aligns text only to the left
Microsoft Word
B) Aligns text only to the right
document?
A) Review tab
M C) Aligns text to both left and right edges
D) Align text in the center
SI
B) Home tab
C) Insert tab
D) Format tab
C) Aligns text to both left and right edges
A) Review tab
What are 'Bullets' in Microsoft Word? What does the CONCATENATE function do in Microsoft Excel?
A) Characters used for decoration A) Combines text from multiple cells into one cell

K
B) Splits text into separate cells
B) Small dots, squares, dashes, or graphics
C) Converts text to uppercase
preceding text

AC
D) Finds the average of a range of cells
C) Large circles indicating importance
D) Highlighted text
A) Combines text from multiple cells into one cell

R
B) Small dots, squares, dashes, or graphics
preceding text

IC
PL
Which of the following is a shortcut key to In the context of a Microsoft Excel sheet, what does the
undo the last action in many word term 'workbook' mean?
A single sheet within a file
processors?
B) The entire Microsoft Excel file
A) Ctrl + Z
B) Ctrl + X
M C) A formula used in calculations
D) A chart or graph
SI
C) Ctrl + C
D) Ctrl + V

B) The entire Microsoft Excel file


A) Ctrl + Z
The default width of a column in MS-Excel is: In MS Word, which feature allows you to create different
A) 7 characters headers and footers for odd and even pages in a

K
document?
B) 9 characters
A) Different First Page
C) 8 characters

AC
B) Page Breaks
D) 6 characters C) Different Odd & Even Pages
D) Section Breaks

R
C) 8 characters
C) Different Odd & Even Pages

IC
PL
In MS Word, which option allows you to What will happen when you select the cell contents of a
align text in a way that it appears vertically particular row in MS-Excel and then click the Delete
button?
at the bottom of a cell or
A) Entries in all the selected cells will be deleted
text box?
A) Distributed Alignment
M B) Only first three cells will be deleted
C) Entire row will be deleted
SI
B) Justify Alignment D) First five cell entries will be deleted
C) Center Alignment
D) Bottom Alignment
A) Entries in all the selected cells will be deleted
D) Bottom Alignment
What takes place when you click the Save In Microsoft PowerPoint, what is the shortcut key
button or press Ctrl + S in Microsoft Word? combination to insert a new slide in a presentation?

K
A) Ctrl + N
A) The document is copied to the clipboard.
B) Ctrl + D
B) The document is printed.

AC
C) Ctrl + I
C) The document is closed. D) Ctrl + M
D) The document is saved in a disk file.

R
D) The document is saved in a disk file. D) Ctrl + M

IC
How can you insert a blank row at the top of a
worksheet?

PL
We can add a table in an MS Word document from which
A) Right-click on the row number and select Insert. of the following tabs?
B) Drag the mouse on the row border to select the row and A) View Tab
B) Home Tab
M
click Insert in the Cells group on the Home tab.
C) Click on the row number and press the Insert key on the
keyboard.
C) Design Tab
D) Insert Tab
SI
D) Click on the row number and press the Delete key on the
keyboard

B) Drag the mouse on the row border to select the row


and click Insert in the Cells group on the Home tab. D) Insert Tab
In MS-Word, a number printed above the base In Microsoft Excel, which chart type is best suited for
line is called ___________. comparing proportions or percentages of a whole?

K
A) Pie Chart
A) superscript
B) Bar Chart
B) strikethrough

AC
C) Scatter Chart
C) above BL D) Line Chart
D) subscript

R
A) superscript A) Pie Chart

IC
Which of the following is the default

PL
The moderate margin of a page in MS Word can be
alignment of text in a Microsoft Word applied to the page from which of the following?
document? A) Page Layout Tab
A) Center B) Design Tab
B)
C)
Left
Justified
M C) Review tab
D) View Tab
SI
D) Right

B) Left
A) Page Layout Tab
Where is the Save button in Microsoft Word? Which feature in MS Word allows you to see a document's
A) Top left corner of a Word window layout and formatting as it will appear when

K
printed?
B) Bottom right corner of a Word window
A) Draft View
C) Bottom left corner of a Word window

AC
B) Screen View
D) Top right corner of a Word window C) Print Preview
D) Reading Vi

R
A) Top left corner of a Word window C) Print Preview

IC
Which of the following occupies less memory

PL
In a spread sheet, page orientation is changed through
when saving an MS-Word file? ___________.
A) .docm
A) page setup dialog box
B) .docc
B) format dialogue box
C) .doc
D) .docx M C) print dialog box
D) paper dialog box
SI
A) page setup dialog box
D) .docx
Which of the following steps is used to format a How can we add text to a slide in MS-PowerPoint?
cell in an MS Excel Spreadsheet? A) Note box

K
B) Dialogue box
A) Menu > Select cell > Format
C) Notes page
B) Select cell > Right click > Format cell

AC
D) Textbox
C) Select cell > View > Format cell
D) View > Select cell > Format

R
Select cell > Right click > Format cell D) Textbox

IC
Which of the following is NOT an alignment

PL
In Microsoft Word, which option allows you to exclude
option for text in a cell? specific sections or types of text from the spelling and
A) Center
grammar check?
B) Right
A) spell check
C) Justified
D) Left M B) AutoCorrect
C) Exclusion Dictionary
SI
D) Thesaurus

C) Exclusion Dictionary
C) Justified
Rows in MS-Excel are identified by How can we add text to a slide in MS-PowerPoint?
A) letters A) Note box

K
B) Dialogue box
B) numbers with letters
C) Notes page
C) numbers

AC
D) Textbox
D) timings

R
C) numbers D) Textbox

IC
Which MS Excel function can be used to sum

PL
In Microsoft Word, which option allows you to exclude
up the numbers entered in a group of cells? specific sections or types of text from the spelling and
A) COUNT
grammar check?
B) AVERAGE
A) spell check
C) MAX
D) SUM M B) AutoCorrect
C) Exclusion Dictionary
SI
D) Thesaurus

C) Exclusion Dictionary
D) SUM
• Web Browsing & Searching
• Downloading & Uploading

K
• Managing an E-mail Account
• e-Banking

AC
R
IC
PL
M
SI
Working with Internet and
e-mails
K
AC
R
IC
Web Browsing & Searching

PL
M
SI
K
AC
Web Browsers

R
A web browser is a software application

IC
that allows users to access and interact
with content on the World Wide Web.

PL
By entering a URL in the browser’s
address bar, users can retrieve web
M
pages containing text, images, videos,
and other multimedia.
SI
Popular Web Browsers
Over the years, various web browsers have been developed. Some of the most

K
popular ones today include:

AC
Browser Vendor
Google Chrome Google

R
Mozilla Firefox Mozilla Foundation

IC
Safari Apple

PL
Microsoft Edge Microsoft
Opera Opera Software
M
Microsoft Edge has replaced Internet Explorer as the default browser for Windows and is based on the
SI
Chromium engine, offering fast performance, enhanced security, and deep integration with Windows
services.
K
History of Web Browsers

AC
•1990: The first web browser, WorldWideWeb, was developed by Tim Berners-Lee.
•1993: Mosaic, one of the earliest graphical browsers, was released, paving the way for web

R
usage.

IC
•1994: Netscape Navigator became popular due to its user-friendly interface.

PL
•2000s: Microsoft’s Internet Explorer dominated the market until the rise of Google Chrome
in 2008.
M
•Modern Era: Browsers like Chrome, Safari, Microsoft Edge, and Firefox lead the market with
SI
fast performance and enhanced security features.
Web Browsing Process

Input from the User

K
Users input a website's address (URL) into the browser's address

AC
bar or click on a link.

Request and Response


Request: The browser sends a request to the server for the specific

R
web page content.

IC
Response: The server sends back a response containing the data
needed to construct the web page.

PL
Deconstructing the Response
The server's reply includes multiple files:
HTML: Outlines the structure of the web page.
M
CSS: Enhances the aesthetics (styling) of the page.
JavaScript: Adds dynamic functionality and interactivity.
SI
Rendering
The browser assembles the final web page based on the HTML, CSS,
and JavaScript within seconds.
Managing Data
Cookies: Browsers store information like login status and
preferences for websites you visit.

K
Cache: Frequently accessed files are stored to improve loading
speed.

AC
Security
Encryption Protocols: Browsers use HTTPS to ensure secure data

R
exchange.
Warning Systems: Alerts users about potentially malicious websites

IC
to enhance safety.

Components of a Web Browser

PL
•Controller/Dispatcher: Manages user input from devices like the keyboard and mouse, sending commands to other
components.
•Interpreter: Processes web content, interpreting HTML, CSS, and JavaScript.
M
•Client Programs: Handle specific protocols, such as:
• HTTP (Hypertext Transfer Protocol) for webpage requests.
SI
• HTTPS for secure communication.
• FTP (File Transfer Protocol) for file transfers.
• SMTP/POP (Simple Mail Transfer Protocol, and POP stands for Post Office Protocol) for email services.
Keyboard Shortcuts in Web Browsers
•Ctrl + T (Cmd + T on Mac): Open a new tab.

K
•Ctrl + W (Cmd + W on Mac): Close the current tab.

AC
•Ctrl + Shift + T: Reopen the last closed tab.
•Ctrl + L: Focus on the address bar.

R
•Ctrl + D: Bookmark the current page.

IC
•F5 or Ctrl + R: Refresh the current page. Search Engines
•Ctrl + F: Find text on the current page.

PL
Web Searching
•Search Engines: Web browsers typically integrate with search engines such as Google, Bing (default in Edge),
M
or DuckDuckGo, allowing users to search the web directly from the address bar.
SI
•Advanced Search Techniques: Use operators like:
• "": Search for exact phrases.
• -: Exclude certain words.
• site:: Limit search results to a specific website.
Browser Security
Modern browsers focus heavily on security by providing:

K
•Automatic updates: To protect against vulnerabilities.

AC
•Incognito/Private Mode: Does not save browsing history or cookies.
•Blockers for ads and pop-ups: To prevent malicious content.

R
•Edge's Security Features: Includes built-in anti-phishing protection, tracking prevention, and

IC
sandboxing for better privacy and security.

PL
Evolution of Browsing Interfaces
•Text-Based Browsers: Early browsers, such as Lynx, were text-only.
M
•Graphical Browsers: With the development of Mosaic and Netscape, graphical interfaces became the
SI
norm.
•Voice and Gesture Control: Modern browsers like Microsoft Edge and Google Chrome are evolving
with voice-based search and even gesture control to enhance user interaction
Downloading Uploading
Copying files from the web server to the local

K
Procedure Copying data from the local device to the web server
machine

AC
Memory Usag
Required on the user's device Required on the web server
e

Accessibility Admin-exclusive file and document access Public file access

R
Transfer Speed High Low

IC
Data Flow From web server to user's device From user's device to web server

PL
M
SI
K
AC
R
IC
Managing an E-mail Account

PL
M
SI
How Email Works
Components

K
Email Client: Software/app (e.g., Outlook, Gmail) for composing and managing emails.
Email Server: Stores and manages email accounts and messages.

AC
Protocols
SMTP (Simple Mail Transfer Protocol): Used for sending emails from the client to the server and between servers.

R
IMAP (Internet Message Access Protocol): Allows access to emails on the server without downloading; supports
multiple devices.

IC
POP3 (Post Office Protocol): Downloads emails to the client, often removing them from the server.

Sending an Email

PL
Compose an email in the client and specify recipient details.
The client connects to the SMTP server and sends the email using TCP/IP.
The SMTP server forwards the email to the recipient's email server.
Receiving an Email
M
The recipient's server stores the email in the user's mailbox.
SI
The recipient accesses the email via IMAP or POP3.
IMAP keeps the email on the server, while POP3 downloads it.
Security
TLS (Transport Layer Security): Encrypts emails during transmission.
Digital Signatures and Email Encryption: Ensures authenticity and privacy.
EMAIL: A method of exchanging digital messages over the
internet.

K
Email Components

AC
Subject Line: Brief summary of the email content.

R
Recipient(s): To, CC (carbon copy), and BCC (blind carbon
copy) fields.

IC
Body: Main content of the email, including greetings,
message, and closing.

PL
Attachments: Files added to the email for sharing.

Email Providers
M
Popular Providers: Gmail, Outlook, Yahoo Mail, Apple Mail,
etc.
SI
Organizing Emails
•Folders/Labels: Create folders or labels to categorize

K
emails (e.g., Work, Personal, Important).

AC
•Starred/Flagged Emails: Mark important emails for easy
retrieval.
•Archiving: Move old emails out of the inbox to reduce

R
clutter without deleting them.

IC
PL
Email Security
•Strong Passwords: Use complex passwords and
change them regularly.
M
•Two-Factor Authentication (2FA): Adds an extra layer
of security.
SI
•Phishing Awareness: Be cautious of suspicious emails
and links.
Keyboard Shortcuts Gmail Interface Overview
•Inbox: Main area for incoming emails, organized by conversation threads.
Gmail Keyboard Shortcuts

K
•Labels: Organize emails using customizable labels (similar to folders).
Compose New Email: C

AC
•Categories: Automatically sorts emails into Primary, Social, Promotions, Updates,
Reply to Email: R
and Forums.
Reply All: A
•Search Bar: Powerful search tool to find emails by keywords, sender, date, etc.

R
Forward Email: F

IC
Search Emails: /
Archive Email: E

PL
Delete Email: #
Mark as Spam: !
Outlook:
New Email: Ctrl + N
M
SI
Reply: Ctrl + R
Forward: Ctrl + F
Search: Ctrl + E
e-Banking

K
Security Mechanisms

AC
•SSL/TLS (Secure Sockets Layer / Transport Layer Security): Protocols for encrypting data transmitted over the internet.
•Two-Factor Authentication (2FA): Security measure requiring two forms of verification to access accounts.
•Encryption: The process of converting data into a coded format to prevent unauthorized access.

R
User Authentication

IC
•Multi-Factor Authentication (MFA): Security system requiring multiple verification methods.
•Username/Password: Basic credentials for accessing e-Banking accounts.

PL
Transaction Types
•NEFT (National Electronic Funds Transfer): Electronic funds transfer system for transferring money between banks.
M
•RTGS (Real-Time Gross Settlement): System for real-time transfer of funds on a gross basis.
SI
•IMPS (Immediate Payment Service): Instant payment system enabling money transfers 24/7.
•Gateway :

Payment Gateway: Service that authorizes credit card payments for e-commerce.
Which of the following is the maximum file size that can be attached to an email
message in Gmail?

K
A) 100 MB B) 200 MB C) 50 MB D) 25 MB

AC
D) 25 MB

R
What should you click to choose the date for sorting in Gmail?

IC
A) The calendar icon B) The ‘1 Day’ dropdown menu C) The ‘Date within’ field D) The
filter icon

PL
C) The ‘Date within’ field

M
When the sender and receiver of an email are on the same system, we need only
user agents.
SI
A) four B) three C) Two D) six

C) Two
Which of the following is NOT an example of web browser?
A) Apple Safari B) Google Chrome C) Facebook D) Opera

K
AC
C) Facebook

R
Which of the following is an example of GUI-based user agent in email?

IC
A) Mail B) Pine C) Netscape D) Elm

PL
C) Netscape

M
Which of the following is used to view pages and navigate the World Wide Web?
A) Web Browser B) Joystick C) Hyperlink D) World Wide Web
SI

A) Web Browser
Which of the following is keyboard shortcut to reload the current page in Google
search engine?

K
A) F3 B) F7 C) F1 D) F5

AC
D) F5

R
Which of the following is NOT an example of e-mail service provider?

IC
I. Outlook II. Gmail III. Yandex

PL
A) I and III B) Only I C)All are e-mail service providers D) Only III
C)All are e-mail service providers
M
Some cookies are automatically recreated after a user has deleted them. These are
called as __________ cookies.
SI
A) Zombie B) session C) persistent D) third party

A) Zombie
Which of the following option can be pressed to create a new email message in
Gmail?

K
A)Compose B) Drafts C) Settings D) Outbound

AC
A)Compose

R
In web browser, which of the following is responsible for displaying the web pages?

IC
A) Rendering engine B) Server C) Page engine D) Search Engine

PL
A) Rendering engine

M
Which among the following keyboard shortcuts is used to bookmark the current
webpage on the web browser?
SI
A) Ctrl+D B) Ctrl+I C) Ctrl+B D) Ctrl +N

A) Ctrl+D
_________was the first browser to display images inline with text instead of
displaying images in a separate window.

K
A) Mozilla B) Opera C) Lynx D) Mosiac

AC
D) Mosiac

R
Which of the following is a web browser created and developed by Microsoft?

IC
A) Opera B) Edge C) Brave D) Chrome

PL
Edge

M
Which one of the following folders is used to store deleted emails?
SI
A) Inbox B) spam C) trash D) draft

A) trash
1.Networking devices and protocols

K
2.Network and information security threats (like hacking,

AC
virus, worms, Trojan etc.) and preventive measures

R
IC
PL
M
SI
Basics of networking and
cyber security
What is Communication?

K
•Communication refers to the process of sharing information between two or more entities.

AC
It involves a sender, receiver, and a medium through which information is transmitted.
•In data communication, data is transmitted between computing devices (e.g., computers,

R
smartphones).

IC
Components of Communication

PL
1.Sender: The device or person sending the data.
2.Receiver: The device or person receiving the data.
3.Message: The actual data being transmitted (e.g., text,
images). M
4.Medium: The path through which the data travels (e.g.,
SI
cable, airwaves).
5.Protocol: The rules governing the communication (e.g.,
TCP/IP for internet communication).
Types of Signals Signal Conversion
Data can be transmitted in two primary signal formats: •Modulation: Converting digital signals into analog signals

K
1.Analog Signal: Continuous signal that varies in (used in radio and TV broadcasting).

AC
amplitude or frequency (e.g., radio waves, sound waves). •Demodulation: Converting analog signals back into digital

1. Example: Traditional telephones use analog signals.

R
•Modem: A device that performs modulation and
signals.
demodulation (used for internet access over telephone

IC
2.Digital Signal: Discrete signals representing binary data
lines).
(0s and 1s).

PL
1. Example: Computers, digital telephones, and
modern communication systems use digital
signals.
M
SI
Types of Data Communication Channels

K
Data communication channels determine how data is transmitted between two
devices:

AC
a. Simplex Channel
•Data flows in one direction only.

R
•Example: Keyboard to computer, TV broadcasting.

IC
b. Half-Duplex Channel
•Data flows in both directions, but only one direction at a time.

PL
•Example: Walkie-talkies, CB radios.
c. Full-Duplex Channel
M
•Data can flow in both directions simultaneously.
SI
•Example: Telephone conversations, Internet connections.
Transmission Modes
The way data is transmitted between devices can be categorized as:

K
1.Serial Transmission: Data is transmitted one bit at a time over a
single channel.

AC
Example: USB communication.
Data Transmission Modes
•Synchronous Transmission: Data is sent in a continuous stream

R
with the sender and receiver synchronized by a clock signal. It is

IC
used in high-speed communications.
•Asynchronous Transmission: Data is sent one byte at a time with
start and stop bits. It is used in simple, low-speed communications

PL
like serial ports.
•Isochronous Transmission: Data is sent at regular intervals to
ensure that time-sensitive data (like audio/video) is transmitted
smoothly. M
SI
2. Parallel Transmission: Multiple bits are transmitted
simultaneously over multiple channels.
1. Example: Inside the computer (data is transferred
between CPU and memory).
Guided Media (Wired Transmission)
Data travels through a physical medium, such as cables:

K
1.Twisted Pair Cable:

AC
1. Consists of two insulated copper wires twisted together to reduce interference.
2. Commonly used in telephone networks and LANs.

R
IC
2.Co-axial Cable:
1. Consists of a central conductor, insulating layer,

PL
metallic shield, and plastic covering.

M
2. Used for cable television and broadband internet.
3.Fibre Optic Cable:
SI
1. Made of glass or plastic fibers, and data is transmitted as light signals.
2. High-speed transmission over long distances with minimal signal loss.
3. Example: Used in high-speed internet connections and telecommunication networks.
Unguided Media (Wireless Transmission)

K
Data is transmitted without physical conductors. Transmission occurs

AC
through the air using electromagnetic waves:
1.Radio Waves:

R
1. Used for wireless communication such as Wi-Fi, radio, and

IC
television.
2. Can cover long distances.

PL
2.Microwaves:
1. High-frequency radio waves that require line-of-sight
communication.
M
SI
2. Used for satellite and mobile phone communication.
3.Infrared:
1. Used for short-range communication (e.g., TV remote controls).
Network Devices

K
Device Function
Converts digital signals to analog and vice versa, used for

AC
Modem
internet access over phone lines.
Directs data between different networks, helps devices
Router
connect to the internet.

R
Connects multiple devices within a LAN and manages data
Switch

IC
traffic.
Broadcasts data to all devices in a network (less efficient
Hub
than a switch).

PL
Connects two different LANs and filters traffic between
Bridge
them.
Repeater M
Amplifies signals to extend the range of a network.
Connects networks with different protocols, translating
SI
Gateway
data formats as needed.
Allows wireless devices to connect to a wired network
Access Point
using Wi-Fi.
Types of Computer Networks

K
Computer networks can be categorized based on their size and coverage area:
1.LAN (Local Area Network):

AC
1. Connects devices within a small area like a building or campus.
2. Example: School or office network.

R
2.WAN (Wide Area Network):

IC
1. Connects multiple LANs over large geographical areas.
2. Example: The internet is the largest WAN.

PL
3.MAN (Metropolitan Area Network):
1. Covers a city or large town.

M
2. Example: City-wide Wi-Fi networks or cable TV networks.
4.PAN (Personal Area Network):
SI
1. Connects devices within a very small area (e.g., Bluetooth devices like smartphones,
headsets).
Network Topologies

K
The arrangement of devices in a network is called network topology:

AC
Bus Topology: All devices are connected to a single cable. If the cable
fails, the network fails.

R
Star Topology: All devices connect to a central hub. If the hub fails, the
entire network goes down.

IC
Ring Topology: Devices are connected in a circle. Data travels in one

PL
direction, but failure of one device can disrupt the whole network.
Mesh Topology: Every device is connected to every other device.
M
It is reliable but expensive to implement.
SI
Hybrid Topology: A combination of different topologies, used to
combine the benefits of multiple layouts.
OSI Model (Open Systems Interconnection Model)
The OSI model is a conceptual framework used to understand network

K
interactions in seven layers:
1.Physical Layer: Deals with the physical connection (cables, switches)

AC
and transmission of binary data.
2.Data Link Layer: Ensures error-free transmission by using MAC

R
addresses.

IC
3.Network Layer: Manages the routing of data (IP addresses) between
devices on different networks.

PL
4.Transport Layer: Ensures complete data transfer between devices
(TCP/UDP protocols).

M
5.Session Layer: Manages communication sessions between devices.
6.Presentation Layer: Formats and encrypts/decrypts data.
SI
7.Application Layer: The layer where network applications (like
browsers) interact with the network.

Trick : All People Should Try New Dominos Pizza


SI
M
PL
IC
R
AC
K
OSI Layer Description Protocols
The foundation of the OSI model, handling the physical connection Ethernet, USB,
1. Physical Layer

K
between devices, including cables, switches, and the electrical signals Bluetooth

AC
Responsible for node-to
node data transfer, error detection, and correction.
2. Data Link Layer MAC, Ethernet, PPP
It ensures that data is correctly sent from one device to another on
the same network.

R
Manages logical addressing and routing, ensuring that data packets
3. Network Layer IP, ICMP, ARP
are sent across networks and reach the correct destination.

IC
Ensures reliable data transfer, flow control, and error recovery
4. Transport Layer between host systems. It makes sure that data arrives in order TCP, UDP

PL
and without errors.
Establishes, maintains, and terminates sessions between two
5. Session Layer communicating devices. It also handles session checkpointing and NetBIOS, PPTP, RPC
recovery. M
Translates data between the application layer and the network
SI
6. Presentation Layer JPEG, SSL/TLS, GIF
format. It handles data encryption, compression, and conversion.
Provides network services directly to end-
7. Application Layer users, including email, file transfer, and web browsing. It’s the layer HTTP, FTP, SMTP
closest to the user.
Few Application layer Protocols

1.HTTP (Hypertext Transfer Protocol): Used for transferring web pages on the internet.

K
2.HTTPS (Hypertext Transfer Protocol Secure): Secure version of HTTP, encrypting data for secure communication.

AC
3.FTP (File Transfer Protocol): Used for transferring files between a client and server.
4.SMTP (Simple Mail Transfer Protocol): Used for sending emails.

R
5.IMAP (Internet Message Access Protocol): Used for retrieving and storing emails.

IC
6.POP3 (Post Office Protocol 3): Another protocol for retrieving emails from a server.
7.DNS (Domain Name System): Translates domain names into IP addresses.

PL
8.TELNET: Allows remote login to another computer over a network.
9.SSH (Secure Shell): Provides secure remote login and other secure network services.

M
10.SNMP (Simple Network Management Protocol): Used for network management and monitoring.
11.LDAP (Lightweight Directory Access Protocol): Used for accessing and maintaining distributed directory information
SI
services over an IP network.
Few Presentation layer Protocol File Extentions

1. .jpg / .jpeg (Joint Photographic Experts Group): Used for compressed image files.

K
2. .png (Portable Network Graphics): Image format supporting lossless compression.

AC
3. .gif (Graphics Interchange Format): Supports both static and animated images.
4. .mp4 (MPEG-4 ): Multimedia format for video files.

R
5. .pdf (Portable Document Format): Ensures documents are presented consistently across different systems.

IC
6. .xml (Extensible Markup Language): Encodes documents in a human-readable and machine-readable format.
7. .json (JavaScript Object Notation): Transmits data in web applications.

PL
8. .ssl / .tls (Secure Sockets Layer / Transport Layer Security): Protocols for encrypting data.

Few Transport layer Protocols

M
• TCP (Transmission Control Protocol): Reliable, ensures data reaches the destination in order, connection-
SI
based. Think of it as a tracked package delivery.
• UDP (User Datagram Protocol): Faster, no guarantee of delivery or order, connectionless. Like sending a postcard.
• IP (Internet Protocol): Addresses and routes data packets to their destination. It’s the system that makes sure the
package or postcard gets to the right address.
Models of Computer Networking

K
1.Peer-to-Peer (P2P) Network:

AC
1. Relies on connected devices sharing resources without a
central server.

R
2. Used for sharing digital content like audio, video, and data.

IC
3. Each computer can act as both server and client.
2.Client-Server Network:

PL
1. Separates roles, with clients requesting services and
servers providing them.
M
2. Scalable architecture, where one server supports multiple
SI
clients.
3. Clients actively initiate requests, while servers passively
respond.
K
Terms Related to Computer Networks

AC
Multiplexing:
A technique used for transmitting multiple signals over a common medium.

R
Allows multiple channels for data communication over a single path.

IC
Packet Switching:
A method of digital communication where all transmitted data, regardless of type or structure, is

PL
divided into packets.
Suitable for efficient and reliable data transmission over a network.
M
Public Switched Telephone Network (PSTN):
SI
Traditional telephone network, requiring a modem for data communication.
Also used in FAX machines.
Integrated Services Digital Network (ISDN):
Provides voice, video, and data services.

K
Uses digital transmission, supporting both circuit switching and packet switching.
Ethernet:

AC
A widely used LAN technology, using bus topology.
Operates at 10 Mbps, using a 48-bit address.

R
Fast Ethernet operates at 100 Mbps.

IC
Token:
A small message or signal passed between stations in certain types of network protocols.

PL
Bandwidth:
Determines the data transfer rate.

M
Measured in Cycles Per Second (CPS) or Hertz (Hz).
Throughput:
SI
The actual amount of data transmitted between two computers.
Measured in bits per second (bps), with higher units such as Gbps (Giga bits per second) for faster
transmission.
K
AC
R
Network and information security threats

IC
(like hacking, virus, worms, Trojan etc.)

PL
and preventive measures
M
SI
Sources of Cyber Attacks

K
Downloadable Programs: Files such as games or screensavers can carry viruses.

AC
Always scan programs before downloading.
Cracked Software: Illegal software often contains viruses that are difficult to detect and remove.
Email Attachments: Viruses can be embedded in email attachments, especially from unknown senders.

R
Booting from Unknown CDs: Leaving a CD in the drive can cause it to automatically boot, increasing virus risks.

IC
Malware (Malicious Software)

PL
Virus
Definition: A self-replicating program that attaches itself to clean files.
M
Function: Spreads throughout a computer, corrupting files and systems.
SI
Worm
Definition: A standalone malware that does not need to attach to a program.
Function: Spreads through networks, causing damage and consuming bandwidth.
Trojan Horse
Definition: Malicious (Non-Replicating) software that disguises itself as legitimate software.
Function: Creates backdoors in security, allowing other malicious entities to access the system.

K
Spyware

AC
Definition: Software that secretly monitors user activity.
Function: Collects personal information without consent, often leading to privacy breaches.

Adware

R
Definition: Software that automatically displays or downloads advertising material.
Function: Can be intrusive and annoying while users are online.

IC
Ransomware
Definition: Malware that encrypts a user's files or locks them out of their system.

PL
Function: Demands a ransom for access to the encrypted files.

Rootkit
M
Definition: A set of tools that hides the presence of other malware on the system.
Function: Makes it difficult to detect and remove the hidden malware.
SI
Keylogger
Definition: Software that records keystrokes.
Function: Captures sensitive information such as passwords and credit card numbers.
Bots
Definition: Malicious software that infects a device and connects back to a central server.
Function: Forms a network called a botnet, which can be used for large-scale attacks, such as distributed denial-

K
of-service (DDoS) attacks.

AC
Backdoor
Definition: A method that bypasses normal authentication mechanisms.
Function: Provides unauthorized access to a system, often used by hackers to remotely control the affected

R
machine.

IC
Rogue Security Software
Definition: Fraudulent software that misleads users into believing their system is infected.
Function: Prompts users to pay for fake malware removal tools, exploiting their fears.

PL
Browser Hijacker
Definition: Malware that modifies browser settings.
M
Function: Redirects users to unwanted websites, usually to increase ad revenue for the attacker.
SI
Scareware
Definition: Software designed to frighten users into taking action.
Function: Displays alarming messages to coerce users into purchasing unnecessary and potentially harmful
software.
Other Threats to Computer Security

K
Spoofing: An attacker masquerades as another user by faking an IP address or other credentials to gain

AC
unauthorized access to systems or data.
Salami Attack: Small amounts of data or money are taken from multiple sources, adding up to significant

R
losses over time.

IC
Hacking: Unauthorized access to a computer system, often to steal, modify, or delete data.
Cracking: Breaking into a system with malicious intent, often to steal sensitive information or cause

PL
damage.
Phishing: Fraudulent attempts to acquire sensitive information by pretending to be a trustworthy source,
M
often through emails or fake websites.
SI
Spam: The use of email or messaging systems to send unsolicited bulk messages.
Adware: Automatically displays advertisements, often without user consent. It can also slow down system
performance.
Terms Related to Security

K
Eavesdropping: The unauthorized interception of private Encryption: Convert sensitive data into an

AC
communications, such as phone calls or emails. unreadable format to protect it from unauthorized
access during transmission.
Masquerading: When an attacker impersonates an

R
Multi-factor Authentication (MFA): Use more than
authorized user to gain access to systems or data.
one verification method (e.g., password + fingerprint)

IC
Patches: Updates provided by software vendors to fix
to secure access.
security vulnerabilities or bugs in the software.

PL
Logic Bomb: Malicious code that is triggered by specific
conditions, causing damage to the system.
M
Proxy Server: Acts as an intermediary between a user and
SI
the internet, often used to hide the user's real IP address
and prevent direct attacks.
Solutions to Computer Security Threats
Anti-virus Software: Programs designed to detect and remove malware. Popular antivirus software includes:

K
Avast, AVG, Norton, Kaspersky, McAfee, Quick Heal

AC
Digital Certificate: An electronic document used to verify the identity of the sender in digital communications and to
secure information exchange.

R
Digital Signature: An electronic form of a signature that verifies the authenticity and integrity of digital documents and
messages.

IC
Firewall: A hardware or software-based security system that filters incoming and outgoing network traffic, blocking

PL
unauthorized access while permitting authorized communications.
Passwords: Used to authenticate user access to systems. Passwords should be complex, combining letters, numbers, and
special characters.
M
Weak Passwords: Easily guessed, such as birthdays or common words.
SI
Strong Passwords: Include a combination of uppercase, lowercase, numbers, and symbols.
File Access Permissions: Assign specific read, write, or execute permissions to users based on their role and need to
access certain files.
Which of the following is a popular cloud storage service on the internet?

K
A) Microsoft Word B) Google Drive C) Adobe Photoshop D) Internet Explorer

AC
B) Google Drive

R
Which of the following types of firewall operates at the Network layer to examine

IC
incoming and outgoing packets?
A) Packet filtering B) Circuit — level gateway c) Network filtering D) Application — level

PL
gateway
Packet filtering
M
A/An is an organisation that connects its subscriber’s computer using modem to the
SI
Internet.
A) Web Server B) Web Browser C) Uniform Resource Locator D) Internet Service
Provider
D) Internet Service Provider
Which networking device operates at Layer 2 of the OSI model and forwards data

K
based on MAC addresses?

AC
A) Firewall B) Router C) Hub D) Switch
D) Switch

R
IC
A ______ is an electronic device that receives a weak signal and regenerates it.
A) switch B) router C) hub D) repeater

PL
D) repeater
M
In which of the following modes of data transmission, can the data flow in both
SI
directions but in only one direction at a time?
A) Quarter-duplex B) Simplex C) Half-duplex D) Full-duplex

C) Half-duplex
______ is the physical network of computers all over the world.

K
A) Laptop B) Internet C) Web browser D) Server

AC
B) Internet

R
___________is a passage to connect two networks that may work on different

IC
networking models.

PL
A) Router B) Hub C) Gateway D) Switch
D) Gateway
M
While ____________, data transfers from the customers’ machine to the server.
SI
A) forwarding B) downloading C) browsing D)uploading

D) uploading
Which of the following Internet protocol specifies how data is exchanged over the Internet and how

K
it should be broken into IP packets?

AC
A) TCP B) HTTP C) PPP D) SMTP
A) TCP

R
A ________ is a networking device that filters network traffic while connecting multiple computers or

IC
communicating devices.
A) Hub B) Bridge C)Gateway D) Switch

PL
D) Switch
M
______are a set of wires, which carries a group of bits in parallel and has an associated control
SI
scheme. It provides a communication path between two or more devices of a computer system.
A) Buses B) Control Unit C) Cache D) Register

A) Buses
Which kind of computer security requires verifying the genuineness of the individuals or

K
organisations that want to access a system?

AC
A) Non-repudiation B) Availability C) Authentication D) Confidentiality

C) Authentication

R
What function does the public key serve in digital signature verification?

IC
A) To ensure confidentiality during transmission B) To encrypt the digital signature
C) To decrypt the digital signature D) To calculate the hash value of the message or file content

PL
C) To decrypt the digital signature
M
Which of the following is NOT a layer of the Internet Protocol Suite (TCP/IP)?
SI
A) Transport layer B) Physical layer C) Application layer D) Network layer

B) Physical layer
What is a ‘Firewall’ in the context of network security?
A) A hardware device used to boost network performance.

K
B) A type of malware that spreads through email attachments.

AC
C) security mechanism that filters and controls network traffic.
D) A software application for managing files and folders.

R
C) security mechanism that filters and controls network traffic.

IC
What is a ‘Trojan’ in the context of network security?
A) A type of firewall that protects against viruses and malware.

PL
B) Malicious software disguised as legitimate software to gain unauthorised access.
C) A program that monitors network traffic for security breaches.
D) A protocol used for secure communication between devices on a network.

A)
M
Malicious software disguised as legitimate software to gain unauthorised access.
SI
_______________is a type of malware that is often disguised as legitimate software.

A) Keylogger B) Ransomware C) Trojan D) Rootkit


C) Trojan
Which among the following statements is incorrect?
A) Some Trojans create backdoors to give malicious users access to the system.

K
B) Trojan spreads through user interaction such as opening an email attachment or downloading and executing a

AC
file from the Internet.
C) Trojan looks like a legitimate software
D) Trojan Self Replicates and infects other files.

R
D) Trojan Self Replicates and infects other files.

IC
PL
Once _______________ has infected a substantial number of computer systems, it generates revenue either by
displaying advertisements or using “pay per click” mechanism to charge its clients against the number of clicks on
their displayed ads. M
SI
A) worms B) Spyware C) virus D) adware

D) adware
____________viruses are embedded in a system’s memory so it can be reactivated if the original
virus is deleted.

K
A) Resident B) Rootkit C) File D) Polymorphic

AC
A) Resident

R
A ____________ can either be malware or hardware. The main purpose of this malware is to record the keys
pressed by a user on the keyboard.

IC
A) Worm B) Keyloggers C) Trojan D) Roolkit

PL
Keyloggers

M
A _________is a contagious program or code that attaches itself to another piece of software, and then reproduces
itself when that software is run.
SI
A) adware B) virus C) Trojan D) Spyware

virus
Crypto Locker is a form of which of the following?

K
A) Ransomware B) Worms C) Spyware D) Adware

AC
Ransomware

R
IC
Best of Luck for your Exams!

PL
M
SI

You might also like