Computer Capsule Ibps Po 2014
Computer Capsule Ibps Po 2014
.
This Computer Capsule has been prepared by Career Power Institute Delhi (Formerly Known as Bank
Power). This document consists of all important notes for IBPS PO Exam 2014.
Domain Types
Type Description
the same city or town.
Com Commercial and for profit
A WAN (wide area network), in comparison to a
organizations
MAN, is not restricted to a geographical location,
Edu Education Provider, college, although it might be confined within the bounds
Universities of a state or country. A WAN connects several
Gov Federal Government Agencies LANs, and may be limited to an enterprise (a
Mil US military sites corporation or an organization) or accessible to
Net Internet infrastructure and service the public. The technology is high speed and
providers relatively expensive. The Internet is an example of
Org Miscellaneous and non-profit a worldwide public WAN.
organizations
Now let’s have a look at some basic differences
between these three...
DATA COMMUNICATION
& Area:
NETWORKING LAN: Covers small area.
Data Communication deals with the WAN: Covers large geographical area
transmission of digital data from one device to MAN: Covers larger than LAN but smaller than
another. Data is transferred through a pathway WAN
called as communication channel which can be
physical wire connecting the devices or may be Error Rates:
unguided media like laser, microwave etc. LAN: Lowest
A communication channel has a source or WAN: Highest
transmitter at one side and a designation or MAN: Moderate
receiver at another side of the network. The
source of data origination is single but there may Transmission speed:
be multiple receivers. LAN: High Speed
A communication channel is of 3 types: WAN: Low Speed
Simplex: In this, communication is MAN: Moderate speed
unidirectional i.e. one of the two devices
can transmit the data and the other can Cost:
LAN: Uses inexpensive equipment
MICROSOFT POWERPOINT
NOTE:
Diagrammatic Notation for Entities
entity – rectangle
attribute – ellipse connected to rectangle
multi-valued attribute – double ellipse
composite attribute- ellipse connected to ellipse
Keys in DBMS:
A super key of an entity set is a set of one or more
attributes whose values uniquely determine each
entity.
A candidate key of an entity set is a set of fields
from which primary key can be selected. It is an
attribute or a set of attributes that can act as a
primary key for a table to uniquely identify each
record in a table.
Although several candidate keys may exist, one of
the candidate keys is selected to be the primary
key.
Primary key is a candidate key that is most
appropriate to become main key of the table. It is
a key that uniquely identifies each record in the
table.
LOGIC GATES
B
BINAC - Binary Automatic Computer
BCC – Blind Carbon Copy
Bin – Binary
BASIC - Beginner’s All-purpose Symbolic
Instruction Code
BIOS – Basic Input Output System
Bit – Binary Digit
BSNL – Bharat Sanchar Nigam Limited
C
CC – Carbon Copy
E
EBCDIC – Extended Binary Coded Decimal
Interchange Code
e-Commerce – Electronic Commerce
EDP – Electronic Data Processing
EEPROM – Electronically Erasable Programmable
Read Only Memory
ELM/e-Mail – Electronic Mail
ENIAC - Electronic Numerical Integrator and
Computer
EOF - End Of File
EPROM - Erasable Programmable Read Only
Memory
EXE - Executable
F
FAX - Far Away Xerox/ facsimile
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FORTRAN - Formula Translation
FS - File System
FTP - File Transfer Protocol L
LCD – Liquid Crystal Display
G
LED – Light Emitting Diode
Gb - Gigabit
LPI – Lines Per Inch
GB - Gigabyte
LIS – Large Scale Integration
GIF - Graphics Interchange Format
GSM - Global System for Mobile Communication M
Mb – Megabit
H
MB – Megabyte
HDD - Hard Disk Drive
MPEG – Moving Picture Experts Group
HP - Hewlett Packard
MMS – Multimedia Message Service
HTML - Hyper Text Markup Language
MICR – Magnetic Ink Character reader
HTTP - Hyper Text Transfer Protocol
MIPS – Million Instructions Per Second
I
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
N
NIC – Network Interface Card S
NOS – Network Operating System SMTP – Simple Mail Transfer Protocol
SQL – Structured Query Language
SRAM – Synchronous Random Access Memory
O SNMP – Simple Network Management Protocol
OMR – Optical Mark Reader SIM – Subscriber Identification Module
OOP – Object Oriented Programming
OSS – Open Source Software T
TCP – Transmission Control Protocol
P TB – Tera Bytes
PAN – Personal Area Network
PC – Personal Computer U
PDA - Personal Digital Assistant UPS – Uninterrupted Power Supply
PDF – Portable Document Format URI – Uniform Resource Identifier
URL – Uniform Resource Locator
USB - Uniform Serial Bus
ULSI - Ultra Large Scale Integration
UNIVAC - Universal Automatic Computer
V
VAR – Variable
VGA – Video Graphics Array
VSNL – Videsh Sanchar Nigam Limited
VDU – Visual Display Unit
W
Wi-Fi – Wireless Fidelity
WLAN – Wireless Local Area Network
WPA – Wi-Fi Protected Access
WWW – World Wide Web
WORM – Write Once Read Memory
X
XHTML – eXtensible Hyper text Markup Language
XML - eXtensible Markup language
Z
ZB – Zeta Byte
GLOSSARY
A
Access time - The amount of time it takes for
requested information to be delivered from disks
POS – Point Of Sale and memory.
PNG - Portable Network Graphics Antivirus software - A program designed to look
PPM – Pages Per Minute for and destroy viruses that may infect the memory
PPP – Point-to-Point Protocol of a computer or files stored on a computer.
PROM – Programmable Read Only Memory Artificial intelligence (AI) - Computer systems
PSTN – Public Switched Telephone Network that attempt to imitate human processes for
POST – Power On Self Test analyzing and solving problems.
PING – Packet Internet Gopher Accumulator - A local storage area called a
Register, in which the result of an arithmetic or
R logic operation is formed.
RAM – Random Access Memory
B
RDBMS – Relational Data Base Management
BIT - It is basic unit of computers. It has two values
System
1 & 0 only.
RIP – Routing Information Protocol
BYTE - Combination of 8 Bits.
RTF – Rich Text Format
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
Basic Input Output System (BIOS) - Also known persons from accessing certain parts of a program,
as ROM BIOS. It provides a abstraction layer for the database, or network.
hardware, i.e., a consistent way for application Flash Memory - It is a type of non-volatile
programs and operating system to interact with computer storage chip that can be electrically
input/output devices. erased and reprogrammed. It was developed by
Bug - A software bug is an error, flaw, failure, or EEPROM.
fault in a computer program or system produces an
incorrect or unexpected result.
Bus - A pathway along which electronic signals G
travel between the components of a computer Gateway - A machine that links two networks
system. using different protocols.
Gigabyte - A measurement of the storage capacity
C of a device. One gigabyte represents 1024
Cookie - A packet of information that travels megabytes.
between a browser and the web server. Google – search engine on the web.
Crash - Your computer or application no longer Gopher - A protocol used for locating and
works correctly and so you “loose” all the work
you’ve done since the last time you saved.
Command - An instruction that causes a program
or computer to perform a function.
Cache - It is a memory storage area that keeps
frequent use data readily available to the computer
so that the computer does not retrieve them from
slow storage devices.
Clock Speed - The speed of computer is measured transferring information on the internet. It is an
in clock speed. High clock speed is synonymous internet search tool that allows users to access
with high processing capability. It is measured in textual information.
Megahertz (MHz). GUI - Graphical User Interface uses icons and
Column - A vertical block of cells in a table or menus to carry out commands such as opening
spreadsheet. files, delete files, move files etc..
Graphic Interchange Format (GIF) - A simple file
D format for pictures and photographs, that are
Delete - To remove an item of data from a file or to compressed so that they can be sent quickly.
remove a file from the disk.
Debugging - Locating and eliminating defects in a H
program. Hard copy - Text or graphics printed on paper;
Desktop - The electronic work area on a display also called a printout.
screen. Hard disk - A rigid type of magnetic medium that
Dots Per Inch (DPI) - It is defined as the measure can store large amounts of information.
of the resolution of a printer and scanner, or Hyperlink - An image or portion of text on a
monitor. webpage which is linked to another webpage.
Domain Name - A unique name that identifies a Hub - A network device that connects multiple
particular website and represents the name of the computers on a LAN so that they can communicate
server where the web pages reside. with another network and the internet.
Header - Repetitive information that appears at
E the top (the head) of every page of a document.
Edit - To make certain changes in existing data. Hypertext transfer protocol (HTTP) - The
Ethernet Card - A network adapter that enables a protocol used on the World Wide Web that permits
computer to connect to an ethernet. Web clients (Web browsers) to communicate with
Web servers
F
Fax - A shortened form of the word facsimile. A I
copy of a document transmitted electronically from Icons - In a graphical user interface (GUI), a small,
one machine to another. pictorial, on screen representation of an object,
File transfer protocol (FTP) - A set of guidelines such as a document, program, folder or disk drive.
or standards that establish the format in which Instant messaging (IM) - A chat program that lets
files can be transmitted from one computer to people communicate over the Internet in real time.
another. Internet protocol (IP) address - A unique set of
Firewall - A security system usually consisting of numbers that identifies a computer over a
hardware and software that prevents unauthorized network.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
Internet service provider (ISP) - An organization M
that provides access to the Internet for a fee. Macro virus - A type of virus that attaches itself to
documents or word processing templates.
Intranet - A private network established by an Malware - Software that disrupts normal
organization for the exclusive use of its employees. computer functions or sends a user’s personal data
Firewalls prevent outsiders from gaining access to without the user’s authorization.
an organization’s intranet Memory - The part of a computer that stores
information.
J Memory Cell - A circuit in memory that represents
JPEG - Joint Photographic Experts Group. A format a single bit of information.
for storing complex graphics in compressed form. Mass Storage - Storage systems that provide
Justification - Aligning lines of text at the left access to hundreds of billions of bytes of stored
margin, the right margin, both margins, or the data. They are often referred to as Archival Storage
centre. Text aligned at both margins is considered because of the very large volumes of historical or
fully justified. backup data they can store.
MIPS - An acronym derived from millions of
K instructions per second. Used to measure the speed
Keyboard - The device used to enter information of a processor.
Morphing - The transformation of one image into
another image.
Mobile Commerce (m-Commerce) - A form of e-
commerce that has the ability to conduct monetary
transactions via a mobile device such as a cell
phone.
Mozilla - a web browser and successor to Netscape
Communicator.
Multitasking - The ability of a computer to execute
more than one program at a time.
N
NIBBLE - Combination of four bits.
Network - A system of interconnected computers.
They are of three types i. e. LAN, MAN, WAN.
Network Interface Card (NIC) - This is a part of
the computer that allows it to talk to other
computers via a network protocol like TCP/IP.
Node - A computer which is attached to the
network. Each node has its own address on the
network so that it can be uniquely identified and
can communicate with other nodes on the same or
different network.
into a computer. O
Kilobyte - A measurement of the storage capacity Offline - Refers to the state in which a computer is
temporarily or permanently unable to
of a device. One kilobyte represents 1024 bytes.
communicate with another computer.
L Online - Refers to the state in which a computer is
LAN - A local area network (LAN) is a computer ready to communicate with other computers.
network that interconnects computers within a Open source software - Software that makes the
limited area such as a home, school, computer underlying source code available to all users at no
laboratory, or office building, using network media. charge.
Laptop computer - A portable computer. Also Operating system (OS) - Software that manages
known as a notebook computer. the internal functions and controls the operations
Landscape Orientation – The positioning of the of a computer.
page so that the information is printed across the P
long dimension of the page. Palmtop computer - A portable computer smaller
Liveware - It is a term to describe the human than a notebook (or laptop) computer that fits on
system, opposed to hardware or software in a the palm of your hand. Also called a handheld
computer.
computer.
Password - A user’s secret identification code,
required to access stored material. A procedure
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
intended to prevent information from being Scanner - An input device that can copy a printed
accessed by unauthorized persons. page into a computer’s memory, thus doing away
Piracy - The illegal copying of software or other with the need to type the copy.
creative works. Screen saver - A program that changes the screen
Peripherals - A connectable device that has an display while the user is away from the computer.
auxiliary function outside the permanent system Server - A computer that manages a shared
configuration such as plotters, printers and graphic resource and provides a set of shared user services
displays. to the clients.
Phishing - A type of computer fraud that tries to Search Engine - Software that searches, gathers
trick users into revealing their passwords and and identifies information from a database based
other confidential information. on an index, keywords or titles.
Pixel - A smallest picture element of a digital Spam - Unwanted repetitious messages, such as
image. The smaller the pixels, the higher the
resolution.
Port - An electrical connection on the computer
into which a cable can be plugged so that the
computer can communicate with other devices
such as printer or modem.
Protocol - A set of rules and regulations that
coordinates the exchange of information over the
network. unsolicited bulk e-mail.
Portrait orientation - Positioning paper so that Soft copy - Information shown on the display
information is printed across the short dimension screen.
of the paper. Sort - To arrange fields, records, or files in a
Q predetermined sequence.
Query - An alternate pipe form of operating Surfing the Net - Browsing through various Web
system, which handles data in the form of sites on the Internet in search of interesting things.
messages rather than bytes.
Qwerty - It is one of the standard computer T
keyboard, with the character Q, W, E, R, T, Y on the Trash - Place where you put files and folders that
top row of letters on the keyboard. you want to delete or get rid of.
R Topology - The structure of the network, including
Response time - The time a computer takes to physical connections such as wiring schemes and
execute a command. logical interactions between network devices.
Retrieve - To call up information from memory or Track - A ring on a disk where data can be written.
storage so that it can be processed in some way. Telnet - A protocol for remote computing on the
Record - A collection of all the information internet that allows a computer to act as a remote
pertaining to a particular subject. terminal on another machine, anywhere on the
Row - A horizontal block of cells in a table or internet.
spreadsheet. Touchpad - The device on a laptop computer that
Resolution - Measurement of the degree of takes the place of a mouse.
sharpness of a displayed image. It is defined as Touch screen technology - The technology that
number of pixels per square inch on a computer permits a user to perform a function simply by
generated display. touching the screen on an appropriate spot.
Register - A temporary storage unit for quick, U
direct accessibility of a small amount of data for Uninterrupted Power Supply (UPS) - A Battery
processing. powered backup system that provides enough
S electricity to a computer during a power outage so
Save As – Give the file a name and/or store the file that a user can save files before shutting down the
in a certain place. computer.
Save - Tell the computer to create a file on disk Universal Serial Bus (USB) - A common standard
that has the information you’ve put into the for connecting multiple peripherals to a computer
document. as needed.
Scroll bar - Allows you to move around through Upload - To transfer information from a client
your document. computer to a host computer.
Shut down - To quit all applications and turn off V
the computer. Virus - A piece of computer code designed as a
Spam - unwanted repetitious messages, such as prank or malicious act to spread from one
unsolicited bulk e-mail. computer to another by attaching itself to other
programs.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
W Wi-Fi (Wireless fidelity) - A process that permits
WAP - Wireless Application Protocol is a high-speed wireless transmission of data.
specification for a set of communication protocol Word processing - The electronic process of
used to allow wireless devices to access the creating, formatting, editing, proofreading, and
internet and other utilities. printing documents.
Web browser - Software that permits a user with Workstation - A desktop computer that runs
a click of a mouse to locate, display, and download applications and serves as an access point in a local
text, video, audio, and graphics stored in a host area network.
computer on the Web. Z
The most common Web browsers now in use are Zombie - A computer that has been hijacked by a
Internet Explorer, Google Chrome and Mozilla cracker without the owner’s knowledge and used
Firefox. to perform malicious tasks on the Internet.
Web site - One or more related pages created by
an individual or an organization and posted on the
World Wide Web.