Computer RRB
Computer RRB
1. Supercomputers
•Definition: The most powerful computers in terms Of performance and data processing
speed.
•Characteristics:
2. Mainframe Computers
•Definition: Large and powerful systems primarily used by Large organizations for
critical applications, bulk data Processing such as census, industry and consumer
statistics, Enterprise resource planning, and transaction processing.
•Characteristics:
• Designed to process large volumes of data very quickly And are known for their
reliability and uptime.
• Can support multiple operating systems and operate as A number of virtual machines.
•Characteristics:
• Used in manufacturing processes, file management, and other tasks that require less
power than mainframe processing.
• Versatile in application with varied processing power suitable for home and office use.
•Subcategories:
•Examples: Apple Macintosh, Dell PCs, Apple iPad, Samsung Galaxy smartphones.
5. Workstations
•Characteristics:
• Used for applications requiring more processing power than standard PCs, such as 3D
graphics, computer-aided design (CAD), and software development.
6. Servers
•Definition: A computer that provides data to other computers. It may serve data to
systems on a local area network (LAN) or a wide area network (WAN) over the internet.
•Characteristics:
• Usually have high-powered central processors, lots of memory, and large hard drives.
7. Embedded Systems
•Characteristics:
8. Wearable Computers
•Characteristics:
• They are designed for user convenience as they can be worn hands-free.
•Examples: Smartwatches like the Apple Watch, fitness trackers like the Fitbit.
9. Tablet PCs
•Characteristics:
10. Smartphones
•Characteristics:
• Combines features of a personal computer operating system with other features useful
for mobile or handheld use.
• Typically combines the features of a cell phone with those of other popular mobile
devices.
Computer Hardware
Computer hardware refers to the physical parts of a computer system. These are the
tangible components that you can see and touch. Here are the key components:
•Role: It's the brain of the computer where most calculations take place.
•Components: Consists of the control unit, arithmetic logic unit (ALU), and cache
memory.
2. Motherboard
•Role: The main printed circuit board (PCB) that holds crucial components and provides
connectors for other peripherals.
•Components: CPU socket, memory slots, firmware chips, expansion slots, power
connectors, etc.
3. Memory
•Primary Memory (RAM): Random Access Memory is volatile memory that stores data
temporarily for quick access by the CPU.
•Secondary Memory: Includes non-volatile storage such as hard disk drives (HDDs),
solid-state drives (SSDs), and optical drives (CD/DVD/Blu-ray).
4. Input Devices
•Examples: Keyboard, mouse, scanner, webcam, microphone. These devices are used
to input data and commands into the computer.
5. Output Devices
6. Storage Devices
•Types: Internal (like HDDs and SSDs), external storage (like USB flash drives, external
HDDs), and optical media (like CDs and DVDs).
7. Power Supply
•Role: Converts electrical power from an outlet into a usable form for the computer to
operate all its components.
8. Cooling Systems
•Purpose: Maintains an optimum operating temperature for the hardware, using heat
sinks and fans.
9. Networking Devices
•Components: Includes modems, routers, network cards, which allow computers to
connect to the Internet and other computers.
Computer Software
Software refers to the set of instructions that tells the hardware what to do. It is not
tangible and consists of programs, scripts, and other forms of data. There are two
primary types of software:
1. System Software
2. Application Software
1. System Software
•Drivers: Specialized programs that allow particular hardware to communicate with the
operating system.
2. Application Software
•Specialized Applications: Tailored for specific tasks, such as AutoCAD for engineering
designs, Adobe Photoshop for image editing.
•Databases: Software to manage data and databases, like MySQL, Oracle, Microsoft
SQL Server.
•Web Browsers: Applications to access and view websites, such as Google Chrome,
Mozilla Firefox.
•Technology: Relied on vacuum tubes for circuitry and magnetic drums for memory.
•Characteristics: Large, expensive, consumed a lot of power, and produced a lot of heat.
•Key Machines:
• ENIAC (Electronic Numerical Integrator and Computer): One of the first electronic
general-purpose computers.
•Technology: Transistors replaced vacuum tubes, leading to smaller, more reliable, and
energy-efficient computers.
•Characteristics: Still large by today's standards but a significant improvement over the
first generation.
•Key Machines:
•Technology: Integrated circuits (ICs) packed hundreds of transistors onto a single chip,
significantly reducing size and cost.
•Characteristics: Computers became more compact, reliable, and efficient. They started
becoming accessible to businesses for processing data.
•Key Machines:
• IBM System/360: A family of mainframe computer systems that were widely used in
both commercial and scientific applications.
•Programming: Saw the rise of more sophisticated operating systems and programming
languages, facilitating the development of software applications.
•Characteristics: This generation marked the beginning of the personal computer (PC)
era. Computers became small and affordable enough for individuals and small
businesses.
•Key Machines:
• Apple II: One of the first highly successful mass-produced personal computers.
•Key Developments:
• Quantum Computing: Computers that use quantum bits (qubits) are under
development, promising to revolutionize computing by performing complex calculations
at unprecedented speeds.
•Programming: Continues to evolve with AI, machine learning, and natural language
processing, making computers smarter and more integrated into human tasks.
TYPES OF MEMORY
In computing, memory refers to the devices used to store data for use in a computer.
The term "memory" is often synonymous with the term "primary storage" or "main
memory," and it can be broadly classified into several types:
● Volatile Memory: Loses its content when the power is turned off.
● Function: It is used by the CPU to read and write data that is being actively used.
● Types:
1. Static RAM (SRAM): Faster, more expensive, and uses less power than
DRAM; does not need to be refreshed frequently.
2. Dynamic RAM (DRAM): Slower, cheaper, and more power-consuming than
SRAM; needs to be refreshed thousands of times per second.
● Non-Volatile Memory: Does not lose its content when the power is turned off.
● Function: Stores critical boot-up instructions and system firmware.
● Types:
1. Programmable ROM (PROM): Can be programmed once after
manufacturing.
2. Erasable Programmable ROM (EPROM): Can be erased by exposure to
strong ultraviolet light and then reprogrammed.
3. Electrically Erasable Programmable ROM (EEPROM): Can be erased with
an electrical charge and is used in flash memory.
Cache Memory:
● Volatile Memory: Fast small-sized type of volatile computer memory that provides
high-speed data access to a processor and stores frequently used computer
programs, applications, and data.
● Function: Acts as a buffer between the CPU and the main memory, used for
storing temporary data that is likely to be used again.
Registers:
● Function: Small, fastest type of memory that is built into the CPU (processor)
itself. Registers are used to hold instructions, counters, or data that the processor
is currently processing.
● Function: Stores data magnetically, used for storing large amounts of data over
the long term.
● Characteristic: Slower than primary memory but offers much larger storage
capacity.
● Function: Uses lasers to read and write data to optical discs – primarily used for
distribution of media and software.
Flash Memory:
Magnetic Tape:
Memory Hierarchy
•CPU Registers
•Cache Memory
•Flash Memory
•Hard Drive
•Optical Storage
•Magnetic Tape
Storage Devices
These devices include any hardware capable of storing information either temporarily or
permanently.
•Solid-State Drives: Use NAND-based flash memory, which retains data without power.
•USB Flash Drives: Portable flash memory devices with a USB interface for easy data
transfer between computers.
•Memory Cards: Compact, small flash memory devices used in cameras, smartphones,
and other portable devices (e.g., SD cards, microSD cards).
•Optical Media: Discs like CDs, DVDs, and Blu-rays are used for data storage and
multimedia playback.
•Magnetic Tapes: An older form of storage medium that is used for backup and archival
data.
•Network-attached Storage (NAS): Dedicated file storage that enables multiple users
and heterogeneous client devices to retrieve data from centralized disk capacity.
Measurement Units
Here is how digital information is measured, from the smallest unit to the largest:
ASCII is a 7-bit code, meaning that 128 characters (27) are defined. The set includes
control characters (with no written symbol) which control actions such as line feed (LF)
or carriage return (CR), and printable characters, including digits, uppercase and
lowercase letters, and punctuation symbols.Here's a brief overview of some common
ASCII codes:
•Control Characters (0–31 & 127): These are non-printable characters that control
various functions such as signaling the end of a line of text (CR, LF), signaling the end
of transmission (EOT), or acting as a placeholder in text (NUL).
•Printable Characters (32–126): These are characters that represent letters, digits,
punctuation marks, and a few miscellaneous symbols. Character 32 is the space
character.
•Space: 32
•Punctuation Marks: For example, period (.) is 46, comma (,) is 44, semicolon (;) is 59,
and so on.
1. Which of the following is the correct formula to add the values in cells A1 and A2 In
MS Excel? Ans: =A1+A2
2. Which function is used to calculate the average of a range of values in MS Excel?
Ans: AVERAGE
3. What is the shortcut key to open the 'Find and Replace' dialog box in MS Excel?
Ans: Ctrl + F
4. Which feature allows you to fill data in a column or row based on existing patterns in
MS Excel? Ana: AutoFill
5. What does the 'VLOOKUP' function do in MS Excel? Ans: Looks up a value in a
vertical column.
6. Which function is used to count the number of cells that contain numbers in MS
Excel? Ans: COUNT
7. How can you insert a new worksheet in an MS Excel workbook? Ans: Shift + F11
8. What does the 'Ctrl + ;' (semicolon) shortcut do in MS Excel? Ans: Insert current
date.
9. Which chart type is best for showing trends over time in MS Excel? Ans: Line Chart
10. In MS Excel, what is the purpose of the 'Freeze Panes' feature? Ans: To lock rows
and columns so they stay visible while you scroll.
11. Which function returns the largest value in a set of values in MS Excel? Ans: MAX
12. What does the 'IF' function do in MS Excel? Ans: Checks whether a condition is met
and returns one value if true and another value if false.
13. Which feature allows you to quickly apply a predefined set of formatting options in
MS Excel? Ans: Cell Styles
14. How do you start a formula in MS Excel? Ans: With an equals sign (=)
15. What is the purpose of the 'PMT' function in MS Excel? Ans:Calculates the payment
for a loan based on constant payments and a constant interest rate.
16. In MS Excel, which symbol is used to anchor a cell reference in a formula, making it
absolute? Ans: $
17. What is the use of the 'Concatenate' function in MS Excel? Ans: Combines multiple
text strings into one text string.
18. How can you remove duplicate values from a range in MS Excel? Ans: Data >
Remove Duplicates.
19. Which feature in MS Excel allows you to summarize data by creating pivot tables?
Ans: PivotTable.
20. What is the purpose of the 'Ctrl + Shift + L' shortcut in MS Excel? Ans: Apply or
remove filters.
21. Which of the following is used to switch between open programs? Ans: Alt+tab
22. Which of the following keeps a list of web pages you have visited during the current
session? Ans: History
23. Which of the following line describes the contents of the message, When sending an
e-mail? Ans: Subject.
24. To move to the beginning of a line of text, press the __________ key. Ans: Home.
25. Which of the following is used to enter the current time in ms-excel? Ans:
Ctrl+Shift+;
26. Each box in a spreadsheet is called a ________. Ans: Cell
27. A key that will erase information from the computer’s memory and characters on the
screen: Ans: Delete Key.
28. The software that is used to create text based documents is referred as : Word
Processor.
29. Every computer connected to an internet Must have a distinct____. Ans: IP address.
30. Full form of SDRM _ Synchronous Dynamic random access Memory.
31. OSI model has how many layers? Ans: Seven Layers.
32. What is a simulated experience Generated by computer called; like Visiting the outer
space or stepping on moon ? Ans: Virtual Reality
33. What is the technology used to read pencil or pen marks on a multiple-choice
answer sheet called? Ans: OMR - Optical Mark Recognition.
34. MICR - Magnetic Ink Character Recognition.
35. OCR - Optical Character Recognition.
36. CPU – Control Processing Unit.
37. ALU – Arithmetic Logic Unit.
38. To allow someone else to schedule your meetings and appointments, ______
feature of Outlook is used. Ans: Delegate Access
39. Which of the following option depicts the type of result whose value is either TRUE
or FALSE? Ans: Logical
40. Which of the following records the name and exact location of every file on a disk?
Ans: File Allocation Table
41. The ability to recover and read deleted or damaged files from a criminal’s computer
is an example of law enforcement’s speciality called _________.
Computer forensics is a discipline that comes under the digital forensic sciences. This
branch deals with the evidence that is stored digitally. It involves extraction of data that
is stored in the electronic devices recovered during the investigation of a criminal case
by the police and other relevant authorities.
42. In the Network Layer, Data is transferred in the form of _________ through the
logical network path.
Ans: Packets
Data is transferred in the form of Packets via logical network paths in an ordered format
controlled by the network layer. The network layer is the third level of the Open Systems
Interconnection Model (OSI Model) and the layer that provides data routing paths for
network communication.Network layer protocols exist in every host or router. The router
examines the header fields of all the IP packets that pass through it.
43. LISA is one of the first commercial computers to have a Graphical User Interface
(GUI). It was developed by which among the following?
Ans: Apple
Lisa is a desktop computer developed by Apple. It is one of the first personal computers
to offer a graphical user interface (GUI) in a machine aimed at individual business
users. Locally Integrated Software Architecture is an acronym of LISA.
44. Which of the following is the type of software that controls the internal operations in
the computer and
45. controls how the computer works with all its parts?
An operating system (OS) is a program or software that manages and coordinates the
functions of all the components of a computer. It also acts as an interface between the
user and the hardware of a computer.
46. ______is a memory management technique in which each job is divided into several
segments of different sizes, one for each module that contains pieces that perform
related functions.
Ans: Segmentation
47. Different components on the motherboard of a PC unit are linked together by sets of
parallel electrical conducting lines. What are these lines called?
Ans: Buses
A Bus is a common pathway through which information flows from one computer
component to another. This pathway is used for communication purpose and it is
established between two or more computer components.
48. Which among the following is an important circuitry in a computer system that directs
the operation of the processor?
The Control Unit (CU) is digital circuitry contained within the processor that coordinates
the sequence of data movements into, out of, and between a processor's many
sub-units.
49. ______ terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
Ans: Point-of-sale (POS)
The POS terminal is basically an electronic cash register & is used for realizing a retail
transaction using a small hardware connected to the customer’s electronic payment
portals.
50. What is the term used for an application which combines the features of more than
different applications?
Integrated software is the application which is a complete package in itself. These are
basically packed with different software which has a similar functionality. For instance,
MS office has similar software as integrated software.
51. Which of the following is a virus that inserts itself into a system’s memory, then takes
a number of actions when an infected file is executed?
A ‘Resident Virus’ is a computer virus that stores itself within memory allowing it to infect
other files even when the originally infected program has been terminated.
52. A device that not only provides surge protection, but also furnishes the computer
with battery backup power during a power outage is ______.
Ans: UPS
53. The Delete key, Num Lock key, and Caps Lock key are considered___________
keys because their function changes each time you press them.
Ans: Toggle
The Delete key, Num Lock key, and Caps Lock key are considered Toggle key keys
because their function changes each time you press them.
54. The principle that Internet service providers should enable access to all content and
applications equally regardless of the source is known as?
Net neutrality is the principle that Internet service providers and governments regulating
most of the Internet must treat all data on the Internet the same, and not discriminate or
charge differentially by user, content, website, platform, application, type of attached
equipment, or method of communication.
55. Which among the following was the first general purpose electronic computer?
Ans: ENIAC
ENIAC (Electronic Numerical Integrator and Computer) was the first electronic
general-purpose computer. It was Turing-complete, digital, and capable of being
reprogrammed to solve "a large class of numerical problems".
56. What is the term given to software that has so many features that it requires
considerable disk space and memory resources to run?
Ans: Bloatware
57. Which of the following referred as the overall design, construction, organization, and
interconnection of the various components of a computer system?
Ans: ISDN
59. API is a code that allows two software programs to communicate with each other.
What does ‘A’ mean in API?
Ans: Application
Application Program Interface is an abbreviation of API. It is a code that allows two
software programs to communicate with each other. An API defines the correct way for
a developer to request services from an operating system (OS) or other application and
expose data within different contexts and across multiple channels.
60. ______ is a superset of keywords, symbols and a system of rules for constructing
statements by which human can communicate the instructions to be executed by a
computer.
61. A device that receives a signal and retransmits it at a higher level or higher power,
so that the signal can be transmitted for larger distances is called as
________________.
Ans: Repeater
62. _______ is a Windows utility program that locates and eliminates unnecessary
fragments and rearranges files and unused disk space to optimize operations.
63. If internet services are provided by transmitting data over the wires of telephone
network, which of the following is used?
65. The language used in a computer that is similar to the language of humans and is
easy to understand is referred to as _______.
66. ____________allows us to use your finger, eye, or voice print to secure our
information resources.
Ams: Biometrics
Biometrics allows us to use your finger, eye, or voice print to secure our information
resources. It is the measurement and statistical analysis of people's physical and
behavioral characteristics. It is mainly used for identification and access control, or for
identifying individuals that are under surveillance. Biometric identifiers are the
distinctive, measurable characteristics used to label and describe individuals. Biometric
identifiers are often categorized as physiological versus behavioral characteristics.
Physiological characteristics are related to the shape of the body.
67. The process that checks all the components of the computer working properly is
known as________.
Ans: Booting
Booting refers to the process that checks whether all the components of the computer
are working properly and all are connected properly or not.
68. Which one is a high speed memory used to hold instructions temporarily during
Processing?
It is high speed memory used to hold instructions temporarily during processing. When
CPU requires a data it first search it in cache memory. If it is present there it uses it and
is called cache hit, but if it is not present it goes to the main memory and fetch data from
main memory to the cache memory. This is done because cache memory is faster than
main memory.
69. The Software tools that enable a user to interact with a computer for specific
purposes are known as ______________.
Ans: Applications
The Software tools that enable a user to interact with a computer for specific purposes
are known as Application.