0% found this document useful (0 votes)
30 views22 pages

Computer Capsule Ibps Po 2014

The document is a comprehensive guide prepared by Career Power Institute for the IBPS PO Exam 2014, covering essential computer concepts, components, and terminology. It details the structure and functions of computers, including hardware, software, data representation, and various generations of computers. Additionally, it explains input and output devices, memory types, and programming languages relevant to the exam.

Uploaded by

Gaurav Satiwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views22 pages

Computer Capsule Ibps Po 2014

The document is a comprehensive guide prepared by Career Power Institute for the IBPS PO Exam 2014, covering essential computer concepts, components, and terminology. It details the structure and functions of computers, including hardware, software, data representation, and various generations of computers. Additionally, it explains input and output devices, memory types, and programming languages relevant to the exam.

Uploaded by

Gaurav Satiwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

COMPUTER CAPSULE - IBPS PO 2014

.
This Computer Capsule has been prepared by Career Power Institute Delhi (Formerly Known as Bank
Power). This document consists of all important notes for IBPS PO Exam 2014.

INTRODUCTION  A general purpose computer has four main


 A Computer is a general purpose device that can components: the arithmetic logic unit (ALU), the
be programmed to carry out a set of arithmetic or control unit, the memory, and the input and
logical operations automatically. Since a sequence output devices (collectively termed I/O).
of operations can be readily changed, the  The data that is fed into a computer processor
computer can solve more than one kind of received into the computer by a keyboard or other
problem. sources is called Input.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
 A computer is an electronic device that accepts
data from the user (input), processes the data by
performing calculations and operations on it and
generates the desired Output.
 The device which is used with a computer to
display or store data is called Peripherals.
 The mechanical, magnetic, electronic and
electrical components that comprises a computer
system such as the Central Processing Unit (CPU),
monitor, keyboard, etc. is known as Hardware.
 A set of instructions that tells the computer about
the tasks to be performed and how these tasks are
to performed, is known as Software.
 An unprocessed collection or representation of
raw facts represented in a manner suitable for
communication, interpretation or processing by
humans or by automatic means, is known as Data.
 The result of processing, manipulating and
organising data in a way that adds to the
knowledge of the person receiving it, is known as
Information.
 The smallest unit of information, a computer can
understand and process, is known as Bit.
 The primary goal of computer is to process
information that it receives and output the results.
The process of control and alter information is
known as. Processing.
 Which number system computer used to store
data and perform calculation?
RAM is referred to as volatile memory and is lost
Binary Number System.
when the power is turned off.
 Computer Speed, Accuracy, Diligence, Storage
It allows reading and writing.
Capability, Automation, Remembrance Power
The two main types of RAM are static RAM and
and Versatility are the main Characteristics of
dynamic RAM.
Computer.
 SRAM retains data as long as power is provided
 Self Intelligence, Decision-Making power,
to the memory chip and need not be refreshed
Learning power, Self care, Feelings are the
periodically. SRAM stands for Static Random
Limitations of Computer.
Access Memory.
 A mainframe computer is a much larger
 The data on DRAM continues to move in and out
computer that typically fills a room and may cost
of the memory as long as power is available and
many hundreds or thousands of times as much as
must be continually refreshed to maintain the
a personal computer. They are designed to
data. DRAM stands for Dynamic Random Access
perform large numbers of calculations for
Memory.
governments and large enterprises.
 Primary memory is computer memory that a
 Read-only memory (ROM) is a storage medium
processor or computer accesses first or directly.
used in computers and other electronic devices.
For example: RAM, and Cache Memory.
Data stored in ROM can only be modified slowly
or with difficulty, or not at all.  Secondary memory (or secondary storage) is
ROM is non-volatile and the contents are retained the slowest and cheapest form of memory. It
even after the power is switched off. cannot be processed directly by the CPU.
It only allows reading. Secondary memory devices include magnetic
The types of ROM include PROM, EPROM and disks like hard drives and floppy disks, optical
EEPROM. disks such as CDs and CDROMs, and magnetic
tapes, which were the first forms of secondary
memory.
 Random Access Memory (RAM), allows the
computer to store data for immediate for  Virtual memory is memory on the hard disk that
immediate manipulation and to keep track of the CPU uses as an extended RAM.
what is currently being processed.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
 Installation is the process of copying software  Programming Language: The language in which
programs from secondary storage media to the the programmer write the instructions to train
hard disk. and work with computers.
 A central computer that holds collections of data Ex: C, C++, Java, SQL etc.
and programs for many PCs, workstations and
other computers is a Server.
 Programmer: The person who write programs /
instructions.

Binary Number System


DATA REPRESENTATION  Name the most significant bit, which represent 1
 Memory Units: and 0 for a positive number and negative number,
respectively.
4 bit = 1 nibble Sign Bit
8 bit = 1 byte  Which coding scheme represents data in a binary
1024 B = 1 KB (Kilo Byte) form in the computer system? ASCII, EBCDIC and
1024 KB = 1 MB (Mega Byte) Unicode are the most commonly used codes
1024 MB = 1 GB (Giga Byte) under this scheme.
1024 GB = 1 TB (Tera Byte) Binary Coding Scheme
1024 TB = 1 PB (Peta Byte)  EBCDIC is a 8-Bit code with 256 different
1024 PB = 1 XB (Exa Byte) representations of characters. It is mainly used in
1024 XB = 1 ZB (Zeta Byte) mainframe computers.
1024 ZB = 1 YB (Yota Byte)
bit < Byte < KB < MB < GB < TB < PB < XB < ZB < YB
 bit (b)
 Byte (B)
 Mbps – mega bits per sec.
 MBps – mega Bytes per sec.
 The information you put into the computer is
called Data
 Information of a computer is stored as Digital EBCDIC stands for
Data Extended Binary Coded Decimal Interchange
 A number system defines a set of values that is Code
used to represent Quantity  In the Hexadecimal Number System each number
represents a power of 16. To represent the decimal
 In which number system, the modern computers numbers, this system uses numbers from 0 to 9
are operated? and characters from A to F to represent numbers

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


10-15, respectively. It is commonly used as a information? Universal Automatic Computer
shortcut notation for groups of four binary digits (UNIVAC) (1951)
 BCD is a method that represents the decimal digits  First Generation (1940-1956) Vacuum Tubes:
with the help of binary digits. It takes advantage The first computers used vacuum tubes for
that one decimal numeral can be represented by 4- circuitry and magnetic drums for memory, and
bit pattern. BCD stands for Binary Coded Decimal were often enormous, taking up entire rooms.
 This coding system is used to represent the interval The UNIVAC and ENIAC computers are examples
storage area of the computers. In this system, every of first-generation computing devices.
character is represented by a combination of bits. In first generation of computer, this operating
Binary Coding System system allowed only one program to run at a time
 The Base or Radix of the decimal number system is and a number of input jobs are grouped for
10 processing. It is known as Batch Processing.
 The arithmetic operations (addition, subtraction,  Second Generation (1956-1963) Transistors:
multiplication and division) performed on the Transistors replaced vacuum tubes and ushered in
binary numbers is called Binary Arithmetic the second generation of computers.
 What is the standard code the computer industry  Third Generation (1964-1971) Integrated
created to represent characters? American Circuits:
Standard Code for Information Interchange The development of the integrated circuit was the
(ASCII) hallmark of the third generation of computers.
ASCII is a code used for standardizing the storage Transistors were miniaturized and placed on
and transfer of information amongst various silicon chips, called semiconductors, which
computing devices. drastically increased the speed and efficiency of
 It is required for representing more than 64 computers.
characters. At present, the mostly used coding  Fourth Generation (1971-Present)
systems are ASCII and EBCDIC Microprocessors:
 Which code is also known as Reflected Code? The microprocessor brought the fourth generation
Gray Code of computers, as thousands of integrated circuits
 The 7-bit ASCII code is widely used for Two (0 or were built onto a single silicon chip.
1) What in the first generation filled an entire room
 In the binary language, each letter of the alphabet, could now fit in the palm of the hand
each number and each special character is made Fourth generation computers also saw the
up of a unique combination of Eight Bits. development of GUIs, the mouse and handheld
devices
 Fifth Generation (Present and Beyond)
Decimal, Binary, Octal and Hexadecimal Artificial Intelligence:
Equivalents Fifth generation computing devices, based on
artificial intelligence, are still in development,
Decimal Binary Octal Hexadecimal
though there are some applications, such as voice
0 0000 000 0
recognition, that are being used today.
1 0001 001 1  In 1981 IBM introduced its first computer for the
2 0010 002 2 home user, and in 1984 Apple introduced the
3 0011 003 3 Macintosh.
4 0100 004 4
5 0101 005 5 COMPUTER ORGANISATION
6 0110 006 6  An Arithmetic Logic Unit (ALU) is a digital circuit
7 0111 007 7 that performs integer arithmetic and logical
8 1000 010 8 operations. The ALU is a fundamental building
9 1001 011 9 block of the central processing unit of a computer.
10 1010 012 A  Control Unit is responsible for controlling the
11 1011 013 B overall operations of computer. It coordinates the
12 1100 014 C sequence of execution of instructions and controls
13 1101 015 D the overall functioning of the computer.
14 1110 016 E  The first computer architecture was introduced by
15 1111 017 F John Von Neumann (1970)
 Personal computers use a number of chips
mounted on a main circuit board called
GENERATIONS OF COMPUTER Motherboard.
 Which was the first general purpose computer,  The CPU is fabricated as a single Integrated Circuit
designed to handle both numeric and textual (IC) chip. It is also known as the Microprocessor.

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 Multiprocessing is the use of two or more central  MICR reads the characters by examining their
processing units (CPUs) within a single computer shapes in a matrix form and the information is
system. The term also refers to the ability of a then passed `on to the computer. MICR stands for
system to support more than one processor Magnetic Ink Character Reader.
and/or the ability to allocate tasks between them. It provides a high level of security and is therefore
 The organisation and interconnection of the used by the banking industry for faster processing
various components of a computer system is of the cheques
known as Computer Architecture.  It is a machine readable code, which is
 A CPU can directly understand the Machine represented by parallel vertical lines with varying
Language. widths. For reading these bar-coded data, a device
is used, which is known as a Bar Code Reader
INPUT & OUTPUT DEVICES (BCR)
 An input device is any peripheral (piece of  Optical Character Recognition (OCR) is used to
computer hardware equipment) used to provide scan the document containing text.
data and control signals to a computer. They are It is the mechanical or electronic conversion of
the devices that feed data into a computer. scanned or photographed images of typewritten
Examples of input devices include keyboards, or printed text into machine-encoded/computer-
mouse, scanners, digital cameras and joysticks. readable text.
 The keys include the letter keys (0, 1, 2, ..., 9; A, B,  A keyboard is a typewriter-style device, which
Z), which are generally laid out in the same style uses an arrangement of buttons or keys, to act as
as in typewriters are known as Alphanumeric mechanical levers or electronic switches.
Keys. Most of the commonly available personal
 'Caps lock' and 'Num lock' keys are called as computers have a keyboard, popularly known as
Toggle Keys because when pressed, they change Qwerty.
their status from one state to another.  The keys labelled Fl to F12 on the keyboard are
 Numeric Keypad is a keypad located on the right called Function Keys.
hand side of the keyboard. It consists of digits and  An output device is any piece of computer
mathematical operators. hardware equipment used to communicate the
 A Modifier key is a special key (or combination) results of data processing carried out by an
on a computer keyboard that temporarily information processing system (such as a
modifies the normal action of another key when computer) which converts the electronically
pressed together. By themselves, modifier keys g
usually do nothing; that is, pressing any of the e
Shift, Alt, or Ctrl keys alone does not (generally) n
trigger any action from the computer. e
 A Mouse is the most popular input device which is r
used today for interactive processing and for the a
one line entry of data for batch processing. t
 Drag and Drop refers to the action of clicking and e
holding down the mouse button, while moving the d
mouse and then releasing the mouse button.
The first computer mouse was invented by i
Douglas Engelbart. n
 Joystick is the device that moves in all directions f
and controls the movement of a pointer. o
 A Touch Screen is a type of display screen device r
that is placed on the computer monitor to allow m
direct selection or activation of the computer a
when the user touches the screen. t
i
 Light Pen is the pen shaped device, which can
o
sense light and is used to point at spots on a video
n
screen.
 A technology enables a high-speed reading of large
i
quantities of data and transferring these data to
n
the computer without using a keyboard. It is
t
referred as Optical Mark Reader (OMR).
o
It uses a beam of light that is reflected on the
paper with marks, to capture presence and
h
absence of marks.
u

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


man-readable form loss event. It contains a copy of every program
 The printed form of output is referred as Hard data and system file on a computer.
Copy.  An Operating System controls the way in which
 The form of output displayed on the screen is the computer system functions and provides a
referred as Soft Copy. means by which users can interact with the
 The device that prints information from the computer.
computer onto the paper is Printer.  Loading of the Operating System is known as
 Pages Per Minute (PPM) is the unit used to count Booting. Restarting a computer that is already on,
the speed of the printer. is referred to as Warm Booting.
 On the basis of technology, printers are  Basic Input – Output System (BIOS) is the part
categorised into Impact and Non- Impact of operating system that manages the essential
Printers. peripherals such as the keyboard, screen, disk
 Impact printers create an image by using some drives and parallel and serial ports.
mechanism to physically press an inked ribbon  An Integrated Software is a single application
against the page, causing the ink to be deposited that combines major features of several types of
on the page in the shape desired. application.
Examples of Impact Printers are Character  An Application Software is the program that
Printers and Dot Matrix Printers. makes the computer useful to the users.
 Non – Impact Printers do not touch the paper  Computer hardware is the collection of physical
when creating an image. elements that constitutes a computer system.
Examples of Non - Impact Printers are Inkjet  Computer hardware refers to the physical parts
printers, Laser printers, Solid ink printers, Dye- or components of a computer such as the monitor,
sublimation, Thermal wax printers, Thermal auto mouse, keyboard, computer data storage, hard
chrome printers. drive disk (HDD), system unit (graphic cards,
 A pen based output device, attached to a computer sound cards, memory, motherboard and chips),
for making vector graphics, that is, images created etc. all of which are physical objects that can be
by a series of many straight lines is known as touched.
Plotters.  The motherboard is the main component of
 The number of pixels displayed on a screen is computer. It is a large rectangular board with
known as Resolution. integrated circuitry that connects the other parts
 A Monitor is a TV-like display attached to the of the computer including the CPU, the RAM, the
computer on which the output can be displayed disk drives(CD, DVD, hard disk, or any others) as
and viewed. It can either be a monochrome well as any peripherals connected via the ports or
display or a colour display. the expansion slots.
 Here are some common individual computer
HARDWARE AND SOFTWARE BASICS hardware components that you'll often find inside
 The set of instructions, which control the a modern computer case:
sequence of operations, are known as Program. It  Motherboard
is a sequence of instructions, written to perform a  Central Processing Unit (CPU)
specified task with a computer.  Random Access Memory (RAM)
 A Software instructs the computer what to do and  Power Supply
how to do it. It is a set of instructions that tells the  Video Card
computer about the tasks to be performed and how  Hard Drive (HDD)
these tasks are to performed.  Solid-State Drive (SSD)
 One or more defects or problems that prevent the  Optical Drive (e.g. BD/DVD/CD drive)
software from working as intended of working at Card Reader (SD/SDHC, CF, etc)
all are called Bug.  Here are some common hardware that you might
 Software that contributes to the control and find connected to the outside of a computer:
performance of the computer system and permits  Monitor
the user to use the system more conveniently is  Keyboard
termed as System Software.  Mouse
 Antivirus Software is used to scan the hard disk  Battery Backup (UPS)
to remove the virus from them.  Printer
 The assembly language program is translated into  Speaker
machine code by a separate program known as an  Here are some less common computer hardware,
Assembler. (either because these pieces are now usually
 A Backup, or the process of backing up, refers to integrated into other devices or because they've
the copying and archiving of computer data so it been replaced with newer technology):
may be used to restore the original after a data  Sound Card

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 Network Interface Card (NIC)  It is a network of networks that consists of
 Expansion Card (Firewire, USB, millions of private, public, academic, business, and
Thunderbolt, etc.) government networks, of local to global scope,
 Hard Drive Controller Card that are linked by a broad array of electronic,
 Analog Modem wireless, and optical networking technologies.
 Scanner  The World Wide Web (abbreviated as WWW or
 Floppy Disk Drive W3, commonly known as the Web) is a system of
 Joystick interlinked hypertext documents that are accessed
 Webcam via the Internet.
 Microphone  A Website, is a set of related web pages served
 Tape Drive from a single web domain.
 Zip Drive  A Home page, index page, or main page is a
 The following hardware are referred to as page on a website. A home page usually refers to:
network hardware and various pieces are often  The initial or main web page of a website,
part of a home or business network: sometimes called the "front page" (by
 Digital Modem (e.g. Cable Modem, DSL analogy with newspapers).
Modem, etc.)  The first page that appears upon opening
 Router a web browser program, which is also
 Network Switch sometimes called the start page. This
'start page' can be a website or it can be a
 Access Point
page with various browser functions such
 Repeater
as the visual display of websites that are
 Bridge often visited in the web browser.
 Print Server
 The web page or local file that
 Firewall automatically loads when a web browser
starts or when the browser's "home"
INTERNET button is pressed; this is also called a
 The Internet is a global system of interconnected "home page". The user can specify the URL
computer networks that use the standard Internet of the page to be loaded, or alternatively
protocol suite (TCP/IP) to link several billion choose e.g. to re-load the most recent web
devices worldwide. page browsed.
 A personal web page, for example at a web
hosting service or a university web site,
that typically is stored in the home
directory of the user.
 A Hyperlink is a reference to data that the reader
can directly follow either by clicking or by
hovering or that is followed automatically
 A web browser (commonly referred to as a
browser) is a software application for retrieving,
presenting and traversing information resources
on the World Wide Web.
 The Uniform Resource Locator, abbreviated as
URL is a specific character string that constitutes a
reference to a resource. In most web browsers, the
URL of a web page is displayed on top inside an
address bar.
An example of a typical URL would be
"http://www.bankersadda.com".
 Downloading means to receive data to a local
system from a remote system, or to initiate such a
data transfer
 Uploading refers to the sending of data from a
local system to a remote system such as a server
or another client with the intent that the remote
system should store a copy of the data being
transferred
 An Internet Protocol address (also known as an
IP address) is a numerical label assigned to each

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


device (e.g., computer, printer) participating in a only receive the data. For eg. Radio
computer network. broadcasting, television broadcasting etc.
It acts as an identifier for a computer. It is a  Half duplex: In this communication is
unique address for every computer. bidirectional. Either of the devices can act
 An email attachment is a computer file sent along as transmitter or receiver but only one
with an email message. One or more files can be device can transmit the data at one time.
attached to any email message, and be sent along For eg. Walkie talkie.
with it to the recipient.  Full Duplex: Here also communication is
 Hotmail was co - founded by an Indian American in both directions and both the devices
entrepreneur Sabeer Bhatia along with Jack Smith can simultaneously transmit the data. For
in July of 1996 eg. Telephone conversation.
 CC (Carbon Copy) in e – mail indicates those who  Different types of network are: LAN, MAN and
are to receive a copy of a message addressed WAN.
primarily to another. The list of CCed recipients is  A LAN (local area network) is a group of
visible to all other recipients of the message. computers and network devices connected
 An additional BCC (blind carbon copy) field is together, usually within the same building. By
available for hidden notification; recipients listed definition, the connections must be high speed
in the BCC field receive a copy of the message, but and relatively inexpensive (e.g., token ring or
are not shown on any other recipient's copy Ethernet).
(including other BCC recipients)  A MAN (metropolitan area network) is a larger
 The Drafts folder retains copies of messages that network that usually spans several buildings in
you have started but are not yet ready to send.
 The first email was sent by Ray Tomlinson to
himself in 1971.

Domain Types
Type Description
the same city or town.
Com Commercial and for profit
 A WAN (wide area network), in comparison to a
organizations
MAN, is not restricted to a geographical location,
Edu Education Provider, college, although it might be confined within the bounds
Universities of a state or country. A WAN connects several
Gov Federal Government Agencies LANs, and may be limited to an enterprise (a
Mil US military sites corporation or an organization) or accessible to
Net Internet infrastructure and service the public. The technology is high speed and
providers relatively expensive. The Internet is an example of
Org Miscellaneous and non-profit a worldwide public WAN.
organizations
 Now let’s have a look at some basic differences
between these three...
DATA COMMUNICATION
& Area:
NETWORKING LAN: Covers small area.
 Data Communication deals with the WAN: Covers large geographical area
transmission of digital data from one device to MAN: Covers larger than LAN but smaller than
another. Data is transferred through a pathway WAN
called as communication channel which can be
physical wire connecting the devices or may be Error Rates:
unguided media like laser, microwave etc. LAN: Lowest
 A communication channel has a source or WAN: Highest
transmitter at one side and a designation or MAN: Moderate
receiver at another side of the network. The
source of data origination is single but there may Transmission speed:
be multiple receivers. LAN: High Speed
A communication channel is of 3 types: WAN: Low Speed
 Simplex: In this, communication is MAN: Moderate speed
unidirectional i.e. one of the two devices
can transmit the data and the other can Cost:
LAN: Uses inexpensive equipment

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


WAN: Uses most expensive equipment  Not meant to be used as a stand-alone
(Connecting systems via internet) solution in a large building
MAN: Uses moderately expensive equipment  It is slow when more devices are added into
(Connecting two systems in different buildings) the network
 If a main cable is damaged then network will
 The Open Systems Interconnection model (OSI) fail or be split into two networks
is a conceptual model that characterizes and
standardizes the internal functions of a BUS TOPOLOGY
communication system by partitioning it into
abstraction layers. The model is a product of the
Open Systems Interconnection project at the
International Organization for
Standardization (ISO).
Seven layers of OSI Model are:
 Application Layer
 Presentation Layer
 Session Layer
 Transport Layer  Star Topologies are one of the most common
 Network Layer computer network topologies. In its simplest
 Data link Layer form, a star network consists of one central
 Physical Layer switch, hub or computer, which acts as a conduit
to transmit messages. This consists of a central
 Network topology is the arrangement of the node, to which all other nodes are connected; this
various elements (links, nodes, etc.) of a computer central node provides a common connection point
network. There are two basic categories of for all nodes through a hub. In star topology, every
network topologies: node (computer workstation or any other
 Physical topologies and logical topologies. peripheral) is connected to a central node called a
Physical topology is the placement of the various hub or switch.
components of a network, including device Star Topology
location and cable installation, while logical
topology illustrates how data flows within a
network, regardless of its physical design.
Various types of topologies are:
 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology
 Bus Topology is a network topology in which
nodes are connected in a daisy chain by a linear
sequence of buses.
The bus can only transmit data in one direction,
and if any network segment is severed, all Advantages:
network transmission ceases.  Better performance: Star topology
Advantages: prevents the passing of data packets
 Easy to connect a computer or peripheral through an excessive number of nodes. At
to a linear bus most, 3 devices and 2 links are involved in
 Requires less cable length than a star any communication between any two
topology devices.
 It works well for small networks.  Isolation of devices: Each device is
Disadvantages: inherently isolated by the link that
 Entire network shuts down if there is a connects it to the hub. This makes the
break in the main cable isolation of individual devices
 Terminators are required at both ends of straightforward and amounts to
the backbone cable disconnecting each device from the others.
 Difficult to identify the problem if the This isolation also prevents any non-
entire network shuts down centralized failure from affecting the
network.

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 Benefits from centralization: As the  Moving, adding and changing the devices
central hub is the bottleneck, increasing its can affect the network
capacity, or connecting additional devices  Communication delay is directly
to it, increases the size of the network very proportional to number of nodes in the
easily. Centralization also allows the network
inspection of traffic through the network.  Bandwidth is shared on all links between
This facilitates analysis of the traffic and devices
detection of suspicious behavior.  More difficult to configure than a Star: node
 Easy to detect faults and to remove parts. adjunction = Ring shutdown and
 No disruptions to the network when reconfiguration
connecting or removing devices.
 Installation and configuration is easy since Ring Topology
every one device only requires a link and
one input/output port to connect it to any
other device(s).
Disadvantages:
 Reliance on central device: Star Topology
relies on the central device (the switch, hub
or computer) and if this device fails the
whole network will fail in turn.
 Higher costs: The need for a central device
increases costs compared to the bus and
ring topologies. The star topology also
requires more cable when using Ethernet
cables than ring and bus topologies.
 Limited capacity for nodes: As this type  Mesh Topology is a network topology in which
of network needs all connections to go each node (called a mesh node) relays data for the
through a central device the amount of network. All nodes cooperate in the distribution
nodes in a network is limited by this factor of data in the network.
whereas bus and ring topologies are not.
limited in such a way. Mesh Topology
 Ring Topology is a network topology in which
each node connects to exactly two other nodes,
forming a single continuous pathway for signals
through each node - a ring.
Data travel from node to node, with each node
along the way handling every packet.
Advantages:
 Very orderly network where every device
has access to the token and the
opportunity to transmit
 Performs better than a bus topology
under heavy network load
 Does not require a central node to
manage the connectivity between the
computers
 Due to the point to point line
configuration of devices with a device on
either side (each device is connected to Advantages:
its immediate neighbor), it is quite easy  Data can be transmitted from different
to install and reconfigure since adding or devices simultaneously. This topology can
removing a device requires moving just withstand high traffic.
two connections.  Even if one of the components fails there is
 Point to point line configuration makes it always an alternative present. So data transfer
easy to identify and isolate faults. doesn’t get affected.
Disadvantages:  Expansion and modification in topology can
 One malfunctioning workstation can create be done without disrupting other nodes.
problems for the entire network. This can Disadvantages:
be solved by using a dual ring or a switch  There are high chances of redundancy in
that closes off the break. many of the network connections.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
 Overall cost of this network is way too high as
compared to other network topologies.  Hybrid, as the name suggests, is mixture of two
 Set-up and maintenance of this topology is different things. Similarly in Hybrid Topology,
very difficult. Even administration of the we integrate two or more different topologies to
network is tough. form a resultant topology which has good points
 Tree Topology integrates the characteristics of (as well as weaknesses) of all the constituent
Star and Bus Topology. Earlier we saw how in basic topologies rather than having characteristics
Physical Star network Topology, computers of one specific topology. This combination of
(nodes) are connected by each other through topologies is done according to the requirements
central hub. And we also saw in Bus Topology, of the organization.
work station devices are connected by the For example, if there exists a ring topology in one
common cable called Bus. After understanding office department while a bus topology in another
these two network configurations, we can department, connecting these two will result in
understand tree topology better. In Tree Hybrid topology. Remember connecting two
Topology, a number of Star networks are similar topologies cannot be termed as Hybrid
connected using Bus. This main cable seems like a topology. Star-Ring and Star-Bus networks are
main stem of a tree, and other star networks as most common examples of hybrid network
the branches. It is also called Expanded Star Advantages:
Topology.  Reliable: Unlike other networks, fault detection
Advantages: and troubleshooting is easy in this type of
 It is an extension of Star and bus Topologies, topology. The part in which fault is detected can be
so in networks where these topologies can't isolated from the rest of network and required
be implemented individually for reasons corrective measures can be taken, WITHOUT
related to scalability, tree topology is the best affecting the functioning of rest of the network.
alternative.  Scalable: It’s easy to increase the size of network
 Expansion of Network is possible and easy. by adding new components, without disturbing
 Here, we divide the whole network into existing architecture.
segments (star networks), which can be easily  Flexible: Hybrid Network can be designed
managed and maintained. according to the requirements of the organization
 Error detection and correction is easy. and by optimizing the available resources. Special
 Each segment is provided with dedicated care can be given to nodes where traffic is high as
point-to-point wiring to the central hub. well as where chances of fault are high.
 If one segment is damaged, other segments  Effective: Hybrid topology is the combination of
are not affected. two or more topologies, so we can design it in such
Disadvantages: a way that strengths of constituent topologies are
 Because of its basic structure, tree topology, maximized while there weaknesses are
relies heavily on the main bus cable, if it neutralized. For example we saw Ring Topology
breaks whole network is crippled. has good data reliability (achieved by use of
 As more and more nodes and segments are tokens) and Star topology has high tolerance
added, the maintenance becomes difficult. capability (as each node is not directly connected
 Scalability of the network depends on the type to other but through central device), so these two
of cable used. can be used effectively in hybrid star-ring topology.
Disadvantages:
Tree Topology  Complexity of Design: One of the biggest
drawback of hybrid topology is its design. It’s not
easy to design this type of architecture and it’s a
tough job for designers. Configuration and
installation process needs to be very efficient.
 Costly Hub: The hubs used to connect two distinct
networks, are very expensive. These hubs are
different from usual hubs as they need to be
intelligent enough to work with different
architectures and should be function even if a part
of network is down.
 Costly Infrastructure: As hybrid architectures are
usually larger in scale, they require a lot of cables,
cooling systems, sophisticate network devices, etc.

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


Hybrid Topology data over that path. It is of 2 types: static (manual
configuration of routing table is needed) and
dynamic (automatically discovers paths).
Gateway: It operates in all the layers of the
network architecture. It can be used to connect
two different networks having different
architectures, environment and even models. It
converts the data packets in form that is suitable
to the destination application. The two different
networks may differ in types of communication
protocols they use, language, data formats etc.
Bridge: They are used two connect two LANs
with the same standard but using different types
of cables. It provides an intelligent connection by
allowing only desired messages to cross the
bridge thus improving performance. It uses
physical addresses of the packets for this decision.
 Internetworking Devices It works on Data Link Layer of the OSI model. A
These are used to connect different devices in the bridge uses Spanning tree Algorithm for data
network or to connect two or more different transmission so as to avoid loops in the network.
networks.  An Internet Protocol address (IP address) is a
Following devices are used for interconnection: numerical label assigned to each device (e.g.,
 Modem computer, printer) participating in a computer
 Hub network that uses the Internet Protocol for
 Switch communication.
 Repeater  IP addresses are binary numbers, but they are
 Router usually stored in text files and displayed in
 Gateway human-readable notations, such as 172.16.254.1
 Bridge (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for
IPv6).
Modem: Modem stands for Modulator-
Demodulator. It is used to connect computers for
communication via telephone lines. INFORMATION SECURITY
Hub: It works at the Physical layer. It just acts  A Computer Virus is a computer program or code
like a connector of several computers i.e. simply that can replicate itself and spread from one
connects all the devices on its ports together. It computer system to another system.
broadcasts all the data packets arriving at it with A computer virus has the capacity to corrupt or to
no filtering capacity. delete data on your computer and it can utilize an
Switch: It works at the Data Link Layer. It is e-mail program to spread the virus to other
used for dividing a network into segments called computer systems.
subnets. It provides filtering of data packets and In the worst case scenario, it can even delete
prevents network traffic also. everything on your hard disk.
Repeater: It operates at the Physical Layer. It is The purpose of it is to disrupt the operation of the
used to amplify a signal that has lost its original computer or the program.
strength so as to enable them to travel long  Some examples of Computer Virus are Trojan
distances. It can only join the networks that viruses. stealth viruses, worms, malware
transmit similar data packets. It does not have (malicious software), Disk Killer, Stone virus,
filtering capacity i.e. all data including noise is Sunday, Cascade, Nuclear, Word Concept, etc.
amplified and passed on in the network so don’t  Malware, short for malicious software, is any
help in reducing network traffic. software used to disrupt computer operation,
Router: It works at the Network Layer and is
used to connect different networks that have
different architectures and protocols. It sends the
data packets to desired destination by choosing
the best path available thus reducing network
traffic. It routes the data packets using the routing
table that contains all the Information regarding
all known network addresses, possible paths and
gather sensitive information, or gain access to
cost of transmission over them. Availability of
private computer systems. It can appear in the
path and cost of transmission decide sending of
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
form of executable code, scripts, active content,  A Cursor is an indicator used to show the position
and other software. on a computer monitor or other display device
 Antivirus Software is used to scan the hard disk that will respond to input from a text input or
to remove the virus from them. pointing device.
Some of the famous anti – viruses available are
Avast!, Norton, Avira, Kaspersky, AVG, etc. Basic Keys
 The Creeper virus was the first virus detected on Common Tasks
ARPANET, in the early 1970s. Ctrl + Shift + Create a non breaking space
 A person who* uses his or her expertise to gain Spacebar
access to other people’s computers to get Ctrl + B Make letters bold
information illegally or do damage is a Hacker. Ctrl + I Make letters italic
 Authorization is the function of specifying access Ctrl + U Make letters underline
rights to resources related to information security Ctrl + Shift+ < Decrease font size one value
and computer security in general and to access Ctrl + Shift + Increase the font size one
control in particular. More formally, "to authorize" > value
is to define an access policy. Ctrl + [ Increase the font size by 1
 Authentication is the act of confirming the truth point
of an attribute of a single piece of data or entity. It Ctrl + ] Decrease the font size by 1
might involve confirming the identity of a person point
by validating their identity documents, verifying Ctrl + Remove paragraph or
the validity of a website with a digital certificate, Spacebar character formatting.
tracing the age of an artifact by carbon dating, or Ctrl + C Copy the selected text or
ensuring that a product is what its packaging and object
labelling claim to be. In other words, Ctrl + X Cut the selected text or
Authentication often involves verifying the object
validity of at least one form of identification. Ctrl + V Paste text or an object
 Phishing is the attempt to acquire sensitive Ctrl + Alt + V Paste special
information such as usernames, passwords, and Ctrl + Shift + Paste formatting only
credit card details (and sometimes, indirectly, V
money) by masquerading as a trustworthy entity Ctrl + Z Undo the last action
in an electronic communication. Ctrl + Y Redo the last action
 A Spoofing attack is a situation in which one
person or program successfully represents oneself  To create a document, we use New command at
as another by falsifying data and thereby gaining the menu.
an illegitimate advantage.  Save as is used to save a document for the first
 Browser Sniffing is a set of techniques used in time. It is also used to change the destination of
websites and web applications in order to the saved file in the computer.
determine the web browser that a visitor is using,  Print Preview is used to see the document before
and to serve browser-appropriate content to the the printout is taken.
visitor.  Cut and Paste options are used to move the data
from one part of the document to another.
MICROSOFT OFFICE
 Microsoft Office is an office suite of desktop Control Keys + Function keys
applications, servers and services for the Ctrl+F2 Choose the print preview
Microsoft Windows and OS X operating systems. command (Microsoft office Button)
It was first announced by Bill Gates of Microsoft Ctrl+F3 Cut on the spike
on August 1, 1988 at COMDEX in Las Vegas.
 MS office primarily includes Word, Excel, Ctrl+F4 Close the window
PowerPoint, Access and Outlook. Ctrl+F6 Go to the next window
It also includes OneNote, Groove, InfoPath and Ctrl+F9 Insert an empty field
Publisher.
Ctrl+F10 Maximise the document window
MS WORD Ctrl+F11 Lock a field
 Microsoft Word is a word processor developed by Ctrl+F12 Choose the Open command
Microsoft. (Microsoft Office Button)
 It is used for creating, editing, formatting, storing,
retrieving and printing of a text document.
 Portrait and Landscape options are available in
 Microsoft Word's native file formats are denoted
Orientation category of Page Setup.
either by a .doc or .docx file extension.

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 Alignment refers to the position of text between  Microsoft Excel's native file formats are denoted
the margins. either by a .xls or .xlsx file extension.
 Auto complete is a feature in word that  A Worksheet is made of columns and rows,
automatically completes the spelling of days of the wherein columns run Vertically and rows run
week and months of the year that have more than Horizontally.
five letters in their names.  Up to Excel 2003, the standard amount of columns
has been 256 and 65,536 rows.
Function Keys  Excel 2007 onwards, the maximum number of
F1 Get help or visit Microsoft office rows per worksheet increased to 1,048,576 and
Online. the number of columns increased to 16,384.
F2 Move text or graphic.  Microsoft Excel has the basic features of all
F4 Repeat the last action spreadsheets, using a grid of cells arranged in
numbered rows and letter-named columns to
F5 Choose the Go To command (Home
tab). organize data manipulations like arithmetic
operations
F6 Go to the nest pane or frame.
 The letter and number of the intersecting column
F7 Choose the spelling command
and row is the Cell Address.
(Review tab)
 Short cut key to insert a new worksheet in MS-
F8 Extend a selection Excel is ALT + Shift + F1 + or F11.
F9 Update the selected fields  Sheet tab is the tab at the bottom of the
F10 Show key tips worksheet window that displays the name of the
F11 Go to the nest field worksheet.
F12 Choose the Save As command  A Microsoft office document that contains one or
(Microsoft Office Button). more worksheets is known as a Workbook.

 Header and Footer option is used to display Shortcut Keys of MS-Excel


information such as title and page number of the Key Description
document. F2 Edit the selected cell
 The bar at the top of the window that bears the F5 Go to a specific cell
name of the window, is known as Title Bar. F7 Spell check selected text and/or
 A screen element of MS Word that is usually document
located below the title bar that provides F11 Create chart
categorised option, is called Menu Bar. Ctrl + Enter the current time
 Auto Correct in word automatically corrects Shift + ;
certain spelling, typing, capitalisation or grammar Ctrl + ; Enter the current date
errors. Shift + F3 Open the Excel formula window
 Thesaurus is used for finding a synonym for a Shift + F5 Bring up search box.
word in the document. Ctrl + A Select all contents of the
 WordArt enables drawing text in a Microsoft worksheet
Word document such as a title, watermark, or Ctrl + B Bold highlighted selection
other text, with graphical effects such as skewing, Ctrl + I Italic highlighted selection
shadowing, rotating, stretching in a variety of Ctrl + U Underline highlighted selection
shapes and colors and even including three- Ctrl + P Bring up the print dialog box to
dimensional effects. begin printing
 Word has extensive lists of bullets and Ctrl + Z Undo last action
numbering features used for tables, lists, pages, Ctrl + F9 Minimise current workbook
chapters, headers, footnotes, and tables of content. Ctrl + F10 Maximise currently selected
workbook
MS EXCEL Ctrl + F6 Switch between open
 Microsoft Excel is a spreadsheet application workbooks/window
developed by Microsoft for Microsoft Windows Ctrl + Move between Excel worksheet in
and Mac OS. page up the same Excel document.
 It features calculation, graphing tools, pivot tables, Ctrl + Move between Excel worksheets
and a macro programming language called Visual Page in the same Excel document
Basic for Applications. Down
 The intersection of a row and column is called a Ctrl + Move between two or more open
Cell. Tab Excel files
 The cell in which we are currently working is Alt + = Create a formula to sum all of the
known as Active Cell. above cells
Ctrl + ’ Insert the value of the above cell
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
into cell currently selected. View Level … Defined by User
Ctrl + Move to next section to text
Arrow
key
Ctrl + Select entire column
Space
Shift + Select entire row
Space

MICROSOFT POWERPOINT

 Microsoft PowerPoint is a slide show


presentation program developed by Microsoft.
 PowerPoint presentations consist of a number of  Data model: A data model is a plan for building a
individual pages or "slides". database. The model represents data
 Microsoft PowerPoint's native file formats are conceptually, the way the user sees it, rather than
denoted either by a .ppt or .pptx file extension. how computers store it. Data models focus on
 PowerPoint provides three types of movements: required data elements and associations.
 Entrance, emphasis, and exit of elements 1. Entity – Relationship Model
on a slide itself are controlled by what 2. Relational Model
PowerPoint calls Custom Animations.  Entity: A thing (animate or inanimate) of
 Transitions, on the other hand, are independent physical or conceptual existence and
movements between slides. These can be distinguishable. In the University database
animated in a variety of ways. context, an individual student, faculty member, a
 Custom animation can be used to create class room, a course are entities.
small story boards by animating pictures
to enter, exit or move.  Attributes
Each entity is described by a set of
DATABASE MANAGEMENT SYSTEM attributes/properties.

DBMS is the acronym of Data Base Management Types of Attributes


System. DBMS is a collection of interrelated data  Simple Attributes: having atomic or
and a set of programs to access this data in a indivisible values: Dept – a string Phone
convenient and efficient way. It controls the Number – an eight digit number.
organization, storage, retrieval, security and  Composite Attributes: having several
integrity of data in a database. components in the value. Example:
Architecture of DBMS Qualification with components (Degree
The generalized architecture of DBMS is called Name, Year, University Name)
ANSI/ SPARC model. The architecture is divided  Derived Attributes: Attribute value is
into three levels: dependent on some other attribute.
1. External view or user view/View Level Example: Age depends on Date of Birth. So
It is the highest level of data abstraction. This age is a derived attribute.
includes only those portions of database of  Single-valued: having only one value rather
concern to a user or Application program. Each than a set of values. For instance, Place of
user has a different external view and it is Birth-single string value.
described by means of a scheme called external
 Multi-valued: having a set of values rather
schema.
than a single value, for instance, Courses
2. Conceptual view/Logical Level
Enrolled attribute for student Email
All the database entities and the relationship
Address attribute for student Previous
among them are included. One conceptual view
Degree attribute for student.
represents the entire database called conceptual
schema.
3. Internal view/Physical Level
It is the lowest level of abstraction, closest to the
physical storage method. It describes how the
data is stored, what is the structure of data
storage and the method of accessing these data. It
is represented by internal schema.

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 Attributes can be: simple single-valued,
simple multi-valued, composite single-
valued or composite multi-valued.

NOTE:
Diagrammatic Notation for Entities
entity – rectangle
attribute – ellipse connected to rectangle
multi-valued attribute – double ellipse
composite attribute- ellipse connected to ellipse

Keys in DBMS:
 A super key of an entity set is a set of one or more
attributes whose values uniquely determine each
entity.
 A candidate key of an entity set is a set of fields
from which primary key can be selected. It is an
attribute or a set of attributes that can act as a
primary key for a table to uniquely identify each
record in a table.
Although several candidate keys may exist, one of
the candidate keys is selected to be the primary
key.
 Primary key is a candidate key that is most
appropriate to become main key of the table. It is
a key that uniquely identifies each record in the
table.

LOGIC GATES

 A logic gate is an elementary building block of a


digital circuit. Most logic gates have two inputs
and one output. At any given moment, every
terminal is in one of the two binary conditions
low (0) or high (1)
 There are seven basic logic gates:
 AND
 OR
 XOR SOME IMPORTANT ABBREVIATIONS
 NOT
 NAND A
 NOR  Al – Artificial intelligence
 XNOR  ALGOL – Algorithimic Language
 ARP – Address resolution Protocol
 ASCII – American Standard Code for Information
Interchange

B
 BINAC - Binary Automatic Computer
 BCC – Blind Carbon Copy
 Bin – Binary
 BASIC - Beginner’s All-purpose Symbolic
Instruction Code
 BIOS – Basic Input Output System
 Bit – Binary Digit
 BSNL – Bharat Sanchar Nigam Limited

C
 CC – Carbon Copy

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in


 CAD – Computer Aided Design  IBM - International Business Machine
 COBOL – Common Business Oriented Language  IM - Instant Message
 CD – Compact Disc  IMAP - Internet Message Access Protocol
 CRT – Cathode Ray Tube  ISP - Internet Service Provider
 CDR – Compact Disc Recordable
 CDROM – Compact Disc Read Only Memory J
 CDRW – Compact Disc Rewritable  JPEG - Joint Photographic Experts Group
 CDR/W – Compact Disk Read/Write
K
D  Kb - Kilobit
 DBA – Data Base Administrator  KB - Kilobyte
 DBMS – Data Base Management System  KHz - Kilohertz
 DNS – Domain Name System  Kbps - Kilobit Per Second
 DPI – Dots Per Inch
 DRAM – Dynamic Random Access Memory
 DVD – Digital Video Disc/Digital Versatile Disc
 DVDR – DVD Recordable
 DVDROM – DVD Read Only Memory
 DVDRW – DVD Rewritable
 DVR – Digital Video Recorder
 DOS – Disk Operating System

E
 EBCDIC – Extended Binary Coded Decimal
Interchange Code
 e-Commerce – Electronic Commerce
 EDP – Electronic Data Processing
 EEPROM – Electronically Erasable Programmable
Read Only Memory
 ELM/e-Mail – Electronic Mail
 ENIAC - Electronic Numerical Integrator and
Computer
 EOF - End Of File
 EPROM - Erasable Programmable Read Only
Memory
 EXE - Executable

F
 FAX - Far Away Xerox/ facsimile
 FDC - Floppy Disk Controller
 FDD - Floppy Disk Drive
 FORTRAN - Formula Translation
 FS - File System
 FTP - File Transfer Protocol L
 LCD – Liquid Crystal Display
G
 LED – Light Emitting Diode
 Gb - Gigabit
 LPI – Lines Per Inch
 GB - Gigabyte
 LIS – Large Scale Integration
 GIF - Graphics Interchange Format
 GSM - Global System for Mobile Communication M
 Mb – Megabit
H
 MB – Megabyte
 HDD - Hard Disk Drive
 MPEG – Moving Picture Experts Group
 HP - Hewlett Packard
 MMS – Multimedia Message Service
 HTML - Hyper Text Markup Language
 MICR – Magnetic Ink Character reader
 HTTP - Hyper Text Transfer Protocol
 MIPS – Million Instructions Per Second
I
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
N
 NIC – Network Interface Card S
 NOS – Network Operating System  SMTP – Simple Mail Transfer Protocol
 SQL – Structured Query Language
 SRAM – Synchronous Random Access Memory
O  SNMP – Simple Network Management Protocol
 OMR – Optical Mark Reader  SIM – Subscriber Identification Module
 OOP – Object Oriented Programming
 OSS – Open Source Software T
 TCP – Transmission Control Protocol
P  TB – Tera Bytes
 PAN – Personal Area Network
 PC – Personal Computer U
 PDA - Personal Digital Assistant  UPS – Uninterrupted Power Supply
 PDF – Portable Document Format  URI – Uniform Resource Identifier
 URL – Uniform Resource Locator
 USB - Uniform Serial Bus
 ULSI - Ultra Large Scale Integration
 UNIVAC - Universal Automatic Computer

V
 VAR – Variable
 VGA – Video Graphics Array
 VSNL – Videsh Sanchar Nigam Limited
 VDU – Visual Display Unit

W
 Wi-Fi – Wireless Fidelity
 WLAN – Wireless Local Area Network
 WPA – Wi-Fi Protected Access
 WWW – World Wide Web
 WORM – Write Once Read Memory

X
 XHTML – eXtensible Hyper text Markup Language
 XML - eXtensible Markup language

Z
 ZB – Zeta Byte

GLOSSARY
A
 Access time - The amount of time it takes for
requested information to be delivered from disks
 POS – Point Of Sale and memory.
 PNG - Portable Network Graphics  Antivirus software - A program designed to look
 PPM – Pages Per Minute for and destroy viruses that may infect the memory
 PPP – Point-to-Point Protocol of a computer or files stored on a computer.
 PROM – Programmable Read Only Memory  Artificial intelligence (AI) - Computer systems
 PSTN – Public Switched Telephone Network that attempt to imitate human processes for
 POST – Power On Self Test analyzing and solving problems.
 PING – Packet Internet Gopher  Accumulator - A local storage area called a
Register, in which the result of an arithmetic or
R logic operation is formed.
 RAM – Random Access Memory
B
 RDBMS – Relational Data Base Management
 BIT - It is basic unit of computers. It has two values
System
1 & 0 only.
 RIP – Routing Information Protocol
 BYTE - Combination of 8 Bits.
 RTF – Rich Text Format
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
 Basic Input Output System (BIOS) - Also known persons from accessing certain parts of a program,
as ROM BIOS. It provides a abstraction layer for the database, or network.
hardware, i.e., a consistent way for application  Flash Memory - It is a type of non-volatile
programs and operating system to interact with computer storage chip that can be electrically
input/output devices. erased and reprogrammed. It was developed by
 Bug - A software bug is an error, flaw, failure, or EEPROM.
fault in a computer program or system produces an
incorrect or unexpected result.
 Bus - A pathway along which electronic signals G
travel between the components of a computer  Gateway - A machine that links two networks
system. using different protocols.
 Gigabyte - A measurement of the storage capacity
C of a device. One gigabyte represents 1024
 Cookie - A packet of information that travels megabytes.
between a browser and the web server.  Google – search engine on the web.
 Crash - Your computer or application no longer  Gopher - A protocol used for locating and
works correctly and so you “loose” all the work
you’ve done since the last time you saved.
 Command - An instruction that causes a program
or computer to perform a function.
 Cache - It is a memory storage area that keeps
frequent use data readily available to the computer
so that the computer does not retrieve them from
slow storage devices.
 Clock Speed - The speed of computer is measured transferring information on the internet. It is an
in clock speed. High clock speed is synonymous internet search tool that allows users to access
with high processing capability. It is measured in textual information.
Megahertz (MHz).  GUI - Graphical User Interface uses icons and
 Column - A vertical block of cells in a table or menus to carry out commands such as opening
spreadsheet. files, delete files, move files etc..
 Graphic Interchange Format (GIF) - A simple file
D format for pictures and photographs, that are
 Delete - To remove an item of data from a file or to compressed so that they can be sent quickly.
remove a file from the disk.
 Debugging - Locating and eliminating defects in a H
program.  Hard copy - Text or graphics printed on paper;
 Desktop - The electronic work area on a display also called a printout.
screen.  Hard disk - A rigid type of magnetic medium that
 Dots Per Inch (DPI) - It is defined as the measure can store large amounts of information.
of the resolution of a printer and scanner, or  Hyperlink - An image or portion of text on a
monitor. webpage which is linked to another webpage.
 Domain Name - A unique name that identifies a  Hub - A network device that connects multiple
particular website and represents the name of the computers on a LAN so that they can communicate
server where the web pages reside. with another network and the internet.
 Header - Repetitive information that appears at
E the top (the head) of every page of a document.
 Edit - To make certain changes in existing data.  Hypertext transfer protocol (HTTP) - The
 Ethernet Card - A network adapter that enables a protocol used on the World Wide Web that permits
computer to connect to an ethernet. Web clients (Web browsers) to communicate with
Web servers
F
 Fax - A shortened form of the word facsimile. A I
copy of a document transmitted electronically from  Icons - In a graphical user interface (GUI), a small,
one machine to another. pictorial, on screen representation of an object,
 File transfer protocol (FTP) - A set of guidelines such as a document, program, folder or disk drive.
or standards that establish the format in which  Instant messaging (IM) - A chat program that lets
files can be transmitted from one computer to people communicate over the Internet in real time.
another.  Internet protocol (IP) address - A unique set of
 Firewall - A security system usually consisting of numbers that identifies a computer over a
hardware and software that prevents unauthorized network.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
 Internet service provider (ISP) - An organization M
that provides access to the Internet for a fee.  Macro virus - A type of virus that attaches itself to
documents or word processing templates.
 Intranet - A private network established by an  Malware - Software that disrupts normal
organization for the exclusive use of its employees. computer functions or sends a user’s personal data
Firewalls prevent outsiders from gaining access to without the user’s authorization.
an organization’s intranet  Memory - The part of a computer that stores
information.
J  Memory Cell - A circuit in memory that represents
 JPEG - Joint Photographic Experts Group. A format a single bit of information.
for storing complex graphics in compressed form.  Mass Storage - Storage systems that provide
 Justification - Aligning lines of text at the left access to hundreds of billions of bytes of stored
margin, the right margin, both margins, or the data. They are often referred to as Archival Storage
centre. Text aligned at both margins is considered because of the very large volumes of historical or
fully justified. backup data they can store.
 MIPS - An acronym derived from millions of
K instructions per second. Used to measure the speed
 Keyboard - The device used to enter information of a processor.
 Morphing - The transformation of one image into
another image.
 Mobile Commerce (m-Commerce) - A form of e-
commerce that has the ability to conduct monetary
transactions via a mobile device such as a cell
phone.
 Mozilla - a web browser and successor to Netscape
Communicator.
 Multitasking - The ability of a computer to execute
more than one program at a time.

N
 NIBBLE - Combination of four bits.
 Network - A system of interconnected computers.
They are of three types i. e. LAN, MAN, WAN.
 Network Interface Card (NIC) - This is a part of
the computer that allows it to talk to other
computers via a network protocol like TCP/IP.
 Node - A computer which is attached to the
network. Each node has its own address on the
network so that it can be uniquely identified and
can communicate with other nodes on the same or
different network.
into a computer. O
 Kilobyte - A measurement of the storage capacity  Offline - Refers to the state in which a computer is
temporarily or permanently unable to
of a device. One kilobyte represents 1024 bytes.
communicate with another computer.
L  Online - Refers to the state in which a computer is
 LAN - A local area network (LAN) is a computer ready to communicate with other computers.
network that interconnects computers within a  Open source software - Software that makes the
limited area such as a home, school, computer underlying source code available to all users at no
laboratory, or office building, using network media. charge.
 Laptop computer - A portable computer. Also  Operating system (OS) - Software that manages
known as a notebook computer. the internal functions and controls the operations
 Landscape Orientation – The positioning of the of a computer.
page so that the information is printed across the P
long dimension of the page.  Palmtop computer - A portable computer smaller
 Liveware - It is a term to describe the human than a notebook (or laptop) computer that fits on
system, opposed to hardware or software in a the palm of your hand. Also called a handheld
computer.
computer.
 Password - A user’s secret identification code,
required to access stored material. A procedure
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
intended to prevent information from being  Scanner - An input device that can copy a printed
accessed by unauthorized persons. page into a computer’s memory, thus doing away
 Piracy - The illegal copying of software or other with the need to type the copy.
creative works.  Screen saver - A program that changes the screen
 Peripherals - A connectable device that has an display while the user is away from the computer.
auxiliary function outside the permanent system  Server - A computer that manages a shared
configuration such as plotters, printers and graphic resource and provides a set of shared user services
displays. to the clients.
 Phishing - A type of computer fraud that tries to  Search Engine - Software that searches, gathers
trick users into revealing their passwords and and identifies information from a database based
other confidential information. on an index, keywords or titles.
 Pixel - A smallest picture element of a digital  Spam - Unwanted repetitious messages, such as
image. The smaller the pixels, the higher the
resolution.
 Port - An electrical connection on the computer
into which a cable can be plugged so that the
computer can communicate with other devices
such as printer or modem.
 Protocol - A set of rules and regulations that
coordinates the exchange of information over the
network. unsolicited bulk e-mail.
 Portrait orientation - Positioning paper so that  Soft copy - Information shown on the display
information is printed across the short dimension screen.
of the paper.  Sort - To arrange fields, records, or files in a
Q predetermined sequence.
 Query - An alternate pipe form of operating  Surfing the Net - Browsing through various Web
system, which handles data in the form of sites on the Internet in search of interesting things.
messages rather than bytes.
 Qwerty - It is one of the standard computer T
keyboard, with the character Q, W, E, R, T, Y on the  Trash - Place where you put files and folders that
top row of letters on the keyboard. you want to delete or get rid of.
R  Topology - The structure of the network, including
 Response time - The time a computer takes to physical connections such as wiring schemes and
execute a command. logical interactions between network devices.
 Retrieve - To call up information from memory or  Track - A ring on a disk where data can be written.
storage so that it can be processed in some way.  Telnet - A protocol for remote computing on the
 Record - A collection of all the information internet that allows a computer to act as a remote
pertaining to a particular subject. terminal on another machine, anywhere on the
 Row - A horizontal block of cells in a table or internet.
spreadsheet.  Touchpad - The device on a laptop computer that
 Resolution - Measurement of the degree of takes the place of a mouse.
sharpness of a displayed image. It is defined as  Touch screen technology - The technology that
number of pixels per square inch on a computer permits a user to perform a function simply by
generated display. touching the screen on an appropriate spot.
 Register - A temporary storage unit for quick, U
direct accessibility of a small amount of data for  Uninterrupted Power Supply (UPS) - A Battery
processing. powered backup system that provides enough
S electricity to a computer during a power outage so
 Save As – Give the file a name and/or store the file that a user can save files before shutting down the
in a certain place. computer.
 Save - Tell the computer to create a file on disk  Universal Serial Bus (USB) - A common standard
that has the information you’ve put into the for connecting multiple peripherals to a computer
document. as needed.
 Scroll bar - Allows you to move around through  Upload - To transfer information from a client
your document. computer to a host computer.
 Shut down - To quit all applications and turn off V
the computer.  Virus - A piece of computer code designed as a
 Spam - unwanted repetitious messages, such as prank or malicious act to spread from one
unsolicited bulk e-mail. computer to another by attaching itself to other
programs.
www.bankersadda.com | www.careerpower.in | www.careeradda.co.in
W  Wi-Fi (Wireless fidelity) - A process that permits
 WAP - Wireless Application Protocol is a high-speed wireless transmission of data.
specification for a set of communication protocol  Word processing - The electronic process of
used to allow wireless devices to access the creating, formatting, editing, proofreading, and
internet and other utilities. printing documents.
 Web browser - Software that permits a user with  Workstation - A desktop computer that runs
a click of a mouse to locate, display, and download applications and serves as an access point in a local
text, video, audio, and graphics stored in a host area network.
computer on the Web. Z
The most common Web browsers now in use are  Zombie - A computer that has been hijacked by a
Internet Explorer, Google Chrome and Mozilla cracker without the owner’s knowledge and used
Firefox. to perform malicious tasks on the Internet.
 Web site - One or more related pages created by
an individual or an organization and posted on the
World Wide Web.

BankersAdda wishes you all a very Best of Luck..!!

www.bankersadda.com | www.careerpower.in | www.careeradda.co.in

You might also like