Computer 1687864801
Computer 1687864801
The word Computer in earlier times meant a person who logicaloperations; it can accept data, store data, retrieve
performed calculations or computations. With years its data, process data and produce output.
definition changed to a machine that performs Charles Babbage was known as father of computer. He
calculations. It can perform all type of mathematical and invented two machines in 1822 introduced Difference
Engine and in 1834, introduced Analytical engine
Generation of Computer
Subject 1st generation 2nd generation 3rd generation 4th generation 5th generation
Period 1940-1956 1956-1963 1964-1971 1971-present present & beyond
Circuitry Vacuum tube Transistor Integrated chips Microprocessor ULSI (Ultra Large
(IC) (VLSI) Scale Integration)
technology
Memory Capacity 20 KB 128KB 1MB Semiconductor type VLSI and ULSI
and very high
Processing Speed 300 IPS inst. Per 300 IPS 1MIPS(1 Faster than 3rd Very fast
sec. million inst. Per generation
sec.)
Programming Assembly High level C,C++ C,C++,Java All the Higher
Language Language language level languages,
(FORTRAN, Neural networks,
COBOL, ALGOL)
Example of UNIVAC, EDVAC IBM 1401, IBM IBM 360 series, Pentium series Artificial
computers 7094, CDC 3600,D 1900 series Multimedia, Intelligence,
UNIVAC 1108 Stimulation Robotics
2
Types of computer
Analog computer introduced by Lord Kelvin. Numerical Super computer can be used for complex type of
data are represented by measurable physical variables application
such as electrical voltage. A thermometer is a simple i.e. specific research, weather forecasting, Weapon
analog computer. designing etc. CDC 6600 was the first successful
Digital computer that accepts and process data in the form
supercomputer.
of numbers and all the character are converted into binary
code. Sunway TaihuLight of China is the fastest supercomputer in
Hybrid computer used the combined feature of analog and the world.
digital machine. you can see hybrid computer in geological PARAM-8000 India’s first Super Computer developed by C-
departments. DAC Pune in 1998.
Microcomputer these are small relatively inexpensive Shasra T is considered as India’s fastest super computer,
computer designed for personal and office use. It has
lowest manufactured by Indian Institute of Science.
storing and processing speed. These can be laptop or
desktop. Servers are dedicated computers that serve the needs or
Minicomputer powerful as compare to microcomputer it request of other programs or computer.
has higher memory provide faster operating speeds and Workstations serve usually one user only.
large storage capacities than microcomputers. It can be Information appliances are computers specially designed to
used as a server and capable of supporting from 2 to 200 perform a specific "user-friendly" function—such as
users. playing music, photography.
Mainframe computer it has very high memory and An embedded system is a computer system with a
processing speed and used as a server (can support dedicated function within a larger system.
thousands of users)
3
The central processing unit (CPU) is the brain of your The data that is fed into a computer processor, received
computer. It handles all the instructions you give your into the computer by a keyboard or other sources is called
computer. The control unit (CU) is a component of a Input. Examples of input devices include keyboards,
computer's central processing unit (CPU) that directs mouse, scanners, digital cameras and joysticks.
operation of the processor. It tells the computer's memory, A keyboard is a typewriter-style device, which uses an
arithmetic/logic unit and input and output devices how to arrangement of buttons or keys, to act as mechanical
respond to a program's instructions. levers or electronic switches. Most of the commonly
An arithmetic logic unit (ALU) is a digital circuit used to available personal computers have a keyboard, popularly
perform arithmetic and logic operations. It represents the known as Qwerty.
fundamental building block of the central processing unit
(CPU) of a computer. Function Keys F1-F2
Instruction Execution: the program which is to be executed Toggle Keys Caps Lock, Num Lock,
is a set of instruction which are stored in memory. The CPU
Modifier Keys Shift, Alt, Ctrl, Fn
executes the instructions of program to complete a task
and this execution takes place inside the CPU with the Alphanumeric Keys A-Z, 0-9
help of
registers ALU (arithmetic logic unit) and CU(control unit). 'Caps lock' and 'Num lock' keys are called as Toggle Keys
When the processor executes instructions, data is because when pressed, they change their status from one
temporarily stored in small local memory location and state to another.
these are called registers. Numeric Keypad is a keypad located on the right hand side
Accumulator Register:- which stores the immediate result of the keyboard. It consists of digits and mathematical
of arithmetic and logical operations. operators.
Memory address register (MAR) :- which contain the A Modifier key is a special key (or combination) on a
address of memory location to which data is to be stored. computer keyboard that temporarily modifies the normal
Program counter :- which contain the address of the next action of another key when pressed together. By
instruction to process. themselves, modifier keys usually do nothing; that is,
Instruction register:- which contain the current instruction pressing any of the Shift, Alt, or Ctrl keys alone does not
being processed (generally) trigger any action from the computer.
A Mouse is the most popular input device which is used
today for interactive processing and for the one line entry
of data for batch processing. The first computer mouse
was invented by Douglas Engelbart.
Drag and Drop refers to the action of clicking and holding
down the mouse button, while moving the mouse and then
releasing the mouse button.
Joystick is the device that moves in all directions and
controls the movement of a pointer.
A Touch Screen is a type of display screen device that is
placed on the computer monitor to allow direct selection
or activation of the computer when the user touches the
screen. It acts as both input and output device.
Light Pen is the pen shaped device, which can sense light
and is used to point at spots on a video screen.
A technology enables a high-speed reading of large
quantities of data and transferring these data to the
computer without using a keyboard. It is referred as Optical
Mark Reader (OMR). It uses a beam of light that is reflected
on the paper with marks, to capture presence and absence
of marks.
MICR reads the characters by examining their shapes in a
matrix form and the information is then passed `on to the
computer. MICR stands for Magnetic Ink Character Reader. It
provides a high level of security and is therefore used by
the banking industry for faster processing of the cheque.
4
Bar Code is a machine readable code, which is represented II) Laser printers:- Laser printers use buffers that store
by parallel vertical lines with varying widths. For reading an entire page at a time. When a whole page is loaded,
these bar-coded data, a device is used, which is known as it will be printed.
a Bar Code Reader (BCR)
Optical Character Recognition (OCR) is used to scan the III) Thermal printer:- is a digital printing process which
document containing text. It is the mechanical or electronic produces a printed image by selectively heating
conversion of scanned or photographed images of coated thermo chromic paper, or thermal paper as it is
typewritten or printed text into machine- commonly known, when the paper passes over the
encoded/computer-readable text. thermal print head.
A point of sale terminal (POS terminal) is an electronic
device used to process card payments at retail locations. A plotter is an output device that interprets commands
The device that prints information from the computer from a computer to make line drawings on paper with one
onto the paper is Printer. or more automated pens. Unlike a regular printer, the
The printed form of output is referred as Hard Copy. The plotter can draw continuous point-to-point lines directly
form of output displayed on the screen is referred as Soft from vector graphics files or commands.
Copy.
Pages per Minute (PPM) is the unit used to count the speed An uninterruptible power supply (UPS) is a device that
of the printer. allows a computer to keep running for at least a short time
On the basis of technology, printers are categorized into when the primary power source is lost.
Impact and Non- Impact Printers.
A Monitor is a TV-like display attached to the computer on
Impact printers create an image by using some mechanism
which the output can be displayed and viewed. It can either
to physically press an inked ribbon against the page,
be a monochrome display or a color display. The number
causing the ink to be deposited on the page in the shape
desired. of pixels displayed on a screen is known as Resolution.
I) Dot matrix :- The dot-matrix printer uses print heads
containing from 9 to 24 pins. These pins produce A set of instructions that tells the computer about the tasks
patterns of dots on the paper to form the individual to be performed and how these tasks are to performed, is
characters known as Software.
II) Daisy wheel:- A hammer strikes a “petal” containing a The set of instructions, which control the sequence of
character against the ribbon, and the character prints operations, are known as Program. It is a sequence of
on the paper. Its speed is slow typically 25-55 instructions, written to perform a specified task with a
characters per second. computer.
5
System software is a program which is created for the process to reside in primary simultaneously.
system and to make the system user friendly such as Multiprogramming system are multitasking multiuser
operating system or is a type of computer program that is and multiprocessing operating system.
designed to run a computer's hardware and application 3) Single user : It is designed for single user and a single
programs. person use it at a time i.e. DOS window’s 95 etc.
Utility software designed to help analyze, configure, 4) Distributed operating system : It is the one which
optimize or maintain a computer such antivirus software. manages a collection of independent computers and
Operating system is a set of programs that help in makes them appear to the user of the system as a single
controlling and managing the hardware and the software computer. 5)Real Time Operating System (RTOS) : It is
resources of a computer system. Main functions of
a computing environment that reacts to input within a
operating system are:-
specific time period. It is used at those Places in which
-Process management
we Requires higher and Timely Response.
-Memory management
-File management 6) Time Sharing System: A time sharing system allows the
-Security many users to simultaneously share the computer
-Command and interpretation resources. Since each action or command in a time-
-Resource allocation shared system take a very small fraction of time, only a
little CPU time is needed for each user.
Types of OS. 7) Mobile OS: Windows 10 Mobile is the latest name for
1) Batch operating system: Here data and program that
Microsoft's phone and tablet operating system.
need to be processed are bundled and collected as a
Google's latest’s version of its android OS is Nougat and
batch and executed together.
2) Multiprogramming operating system : It allows the
iOS i.e. iPhone Operating System's latest version is iOS
instruction and data from two or more separate 10
Computer Languages
Low level language: these are coded in a form which is easy PASCAL: it is developed as a teaching tool for programming
to understand by the processor. concepts.
Machine language: it is also a type of low level language Simula was the first object-oriented programming language.
these can be develop in binary language (0 and 1) . Java, Python, C++, Visual Basic .NET and Ruby are the most
popular Object Oriented Programming languages. The Java
Assembly language: it is also a type of low level language programming language is designed especially for use in
and using the human readable instruction of the CPU. It is distributed applications on corporate networks and the
written as ‘MOV A.’ Internet. Ruby is used in many Web applications. Curl,
Smalltalk, Delphi and Eiffel are also examples of object-
High level language programmer can write code in simple
oriented programming languages.
easy language, it is user friendly . E.g. C, JAVA
C language: it is a middle level programming language and convert program into a machine language so translator do
also known as procedural language this work.
C++ is high level language that uses the OOPS concept.
Loader: It loads the code which is translated by translator
Fortran: it is known as formula translation. It is used for into the main memory and makes it ready to execute.
scientific application
Linker is used to combine all the object files and convert
COBOL (Common Business Oriented Language ): used for them into a final executable program.
record keeping and data management in business
organizations. Interpreter converts high level language program into
machine language. It is very slow because it convert
BASIC (Beginner’s All Purpose Symbolic Instruction program line by line.
Code): first language designed for non-professional
programmers. Compiler: It also translates the program from high level
6
language to machine language. It is very fast because it into the main memory and makes it ready to execute.
converts the whole program into machine language.
Linker is used to combine all the object files and convert
Assembler: It is used for converting the code of low level them into a final executable program.
language (assembly language) into machine level
Interpreter converts high level language program into
language. machine language. It is very slow because it convert program
line by line.
Language processor (Translator): Programmers write
their program in one of the high level language because it is Compiler: It also translates the program from high level
much easy to code in these language but computer does not language to machine language. It is very fast because it
understand any of these language so it is necessary to converts the whole program into machine language.
convert program into a machine language so translator do
this work. Assembler: It is used for converting the code of low
level language (assembly language) into machine level
Loader: It loads the code which is translated by translator language.
MEMORY MANAGEMENT
8 bit 1 byte
1024 Byte 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)
7
A group of 4 bits is called a nibble. A byte is also known as often used as CPU Cache memory. SRAM stands for Static
an Octet. Random Access Memory.
Primary Storage (memory), also known as main storage The data on DRAM continues to move in and out of the
and it is the area in a computer in which data is stored for memory as long as power is available and must be
quick access by the computer's processor. The terms continually refreshed to maintain the data. DRAM stands for
random access memory (RAM) and memory are often as Dynamic Random Access Memory.
synonyms for primary or main storage. Primary storage is Virtual memory is memory on the hard disk that the CPU
volatile and can be contrasted with non-volatile secondary uses as an extended RAM.
storage, also known as auxiliary storage.
Cache memory is a smaller, faster memory which stores
copies of the data from frequently used main memory
locations. A CPU cache is a hardware cache used by the
central processing unit (CPU) of a computer to reduce the
average time to access data from the main memory.
Secondary memory is where programs and data are kept
on a long-term basis. Common secondary storage devices
are the hard disk and optical disks. The hard disk has
enormous storage capacity compared to main memory. The
hard disk is usually contained inside the case of a computer.
Read-only memory (ROM) is a storage medium used in
computers and other electronic devices. Data stored in
ROM can only be modified slowly or with difficulty, or not at
all. Access Storage Cost per bit of
ROM is non-volatile and the contents are retained even Time Capacity storage
after the power is switched off. Primary Faster Smaller High
It only allows reading. memory
The types of ROM include PROM, EPROM and EEPROM. Secondary Slower Higher Low
PROM - (programmable read-only memory) is a memory memory
chip on which data can be written only once. Memory can also be categorized on the basis of their
The difference between a PROM and a ROM (read-only material:
memory) is that a PROM is manufactured as blank memory, Semiconductor memory:-such as RAM, ROM, EPROM, and flash
whereas a ROM is programmed during the manufacturing memory.
process. To write data onto a PROM chip, you need a special Magnetic memory:-such as hard disk, floppy disk and
device called a PROM programmer or PROM burner. magnetic tapes.
EPROM - (erasable programmable read-only memory) is a Optical memory:-such as computer disk, DVD and blue-ray
special type of PROM that can be erased by exposing it to disk.
ultraviolet light. A bus, in computing, is a set of physical connections (cables,
EEPROM - (electrically erasable programmable read-only printed circuits, etc.) which can be shared by multiple
memory). EEPROM is a special type of PROM that can be hardware components in order to communicate with one
erased by exposing it to an electrical charge. another.
Random Access Memory (RAM), allows the computer to The address bus (sometimes called the memory bus)
store data for immediate manipulation and to keep track transports memory addresses which the processor wants
of what is currently being processed. to access in order to read or write data. It is a
RAM is referred to as volatile memory and is lost when the unidirectional bus.
power is turned off. The data bus transfers instructions coming from or going to
It also known as read/write memory as information can be the processor. It is a bidirectional bus.
read from and written onto it.
The two main types of RAM are Static RAM and Dynamic The control bus (or command bus) transports orders and
RAM. synchonisation signals coming from the control unit and
SRAM retains data as long as power is provided to the travelling to all other hardware components. It is a
memory chip and need not be refreshed periodically. It is bidirectional bus, as it also transmits response signals
from the hardware.
8
Number System
The radix or base is the number of unique digits, including 1=0001, A= 1010, 2=0010;
zero, used to represent numbers in a positional numeral Hence (1𝐴2)16 = (000110100010)2
system. For example, for the decimal system the radix is Decimal to Binary: (75)10 =(? )2
ten, because it uses the ten digits from 0 through 9. And Divide 75 by 2 (and write down its remainder).
that of Binary is base 2. Hence (75)10 =(101011)2
Number System
Computer Network
Different types of network are: LAN, MAN and WAN. A personal area network (PAN) is a computer network
A LAN (local area network) is a group of computers and used for data transmission amongst devices such as
network devices connected together, usually within the computers, telephones, tablets and personal digital
same building. By definition, the connections must be high assistants.
speed and relatively inexpensive (e.g., token ring or Campus Area Network or corporate area network is a
Ethernet). computer network made up of an interconnection of local
A MAN (metropolitan area network) is a larger network area networks (LANs) within a limited geographical area.
that usually spans several buildings in the same city or town. A Storage Area Network (SAN) is a specialized, high-speed
A WAN (wide area network), in comparison to a MAN, is network that provides block-level network access to
not restricted to a geographical location, although it might be storage. A virtual private network (VPN) extends a private
confined within the bounds of a state or country. A WAN network across a public network, such as the Internet. It
connects several LANs, and may be limited to an enterprise enables users to send and receive data across shared or
(a corporation or an organization) or accessible to the public networks as if their computing devices were directly
public. The technology is high speed and relatively connected to the private network.
expensive. The Internet is an example of a worldwide public
WAN.
9
Networking Devices Data Communication deals with the transmission of digital
data from one device to another. Data is transferred through
Modem: Modem stands for Modulator-Demodulator. It is
a pathway called as communication channel which can be
used to connect computers for communication via
physical wire connecting the devices or may be unguided
telephone lines.
media like laser, microwave etc.
Hub: It works at the Physical layer. It just acts like a
A communication channel has a source or transmitter at one
connector of several computers i.e. simply connects all the
devices on its ports together. It broadcasts all the data side and a designation or receiver at another side of the
packets arriving at it with no filtering capacity. network. The source of data origination is single but there
Switch: It works at the Data Link Layer. It is used for may be multiple receivers. A communication channel is of 3
dividing a network into segments called subnets. It types:
provides filtering of data packets and prevents network Simplex: This, communication is unidirectional i.e. one of
traffic also. the two devices can transmit the data and the other can only
Repeater: It operates at the Physical Layer. It is used to receive the data. For e.g. Radio broadcasting, television
amplify a signal that has lost its original strength so as to broadcasting etc.
enable them to travel long distances. Half duplex: This communication is bidirectional. Either of
the devices can act as transmitter or receiver but only one
Router: It works at the Network Layer and is used to
device can transmit the data at one time. For e.g. Walkie-
connect different networks that have different
Talkie.
architectures and protocols. It sends the data packets to
desired destination by choosing the best path available thus Full Duplex: Here the communication is in both directions
reducing network traffic. and both the devices can simultaneously transmit the data.
For e.g. Telephone conversation.
Gateway: It operates in all the layers of the network
architecture. It can be used to connect two different The Open Systems Interconnection model (OSI) is a
networks having different architectures, environment and conceptual model that characterizes and standardizes the
even models. internal functions of a communication system by
partitioning it into abstraction layers. The model is a
Bridge: They are used two connect two LANs with the same
product of the Open Systems Interconnection project at the
standard but using different types of cables. It provides an
International Organization for Standardization (ISO).
intelligent connection by allowing only desired messages
to cross the bridge thus improving performance. It uses
physical addresses of the packets for this decision.
7 APPLICATION LAYER Data
IPv4 - 32 bits numeric address
(Network Process to Application)
IPv6 - 128 bits hexadecimal address
6 PRESENTATION LAYER Data
IPv6 does not use broadcast messages and has three types
(Data Representation & Encryption)
of addresses, which are categorized as :
Unicast addresses. A packet is delivered to one interface. 5 SESSION LAYER Data
Multicast addresses. A packet is delivered to multiple (Inter-host Communication)
interfaces. 4 TRANSPORT LAYER Segments
(End-to-end connections & reliability)
Anycast addresses. A packet is delivered to the nearest of
3 NETWORK LAYER Packets
multiple interfaces (in terms of routing distance).
(Path Determination and IP)
With an IPv4 IP address, there are five classes of available IP
2 DATA LINK LAYER Frames
ranges: Class A, Class B, Class C, Class D and Class E, while
(Physical Addressing)
only A, B, and C are commonly used. Each class allows for a
particular range of valid IP addresses. Class D is reserved for 1 PHYSICAL LAYER Bits
(Media, Signal and Binary
multicast groups and Class E is reserved for future use, or
Research and Development Purposes.
10
Hybrid topology uses a combination of any two or more A private cloud is infrastructure operated solely for a single
topologies in such a way that the resulting network does organization, whether managed internally or by a third
not exhibit one of the standard topologies. party, and hosted either internally or externally.
Cloud computing is a type of Internet-based computing that A hybrid cloud uses a private cloud foundation combined
provides shared computer processing resources and data with the strategic integration and use of public cloud
to computers and other devices on demand. services.
Public clouds are owned and operated by companies that Google Drive is a personal cloud storage service from Google
offer rapid access over a public network to affordable which gives every user 15 GB of Drive storage space.
computing resources. OneDrive is Microsoft's service for hosting files in the "cloud
computing". OneDrive offers 5GB of storage space for free.
Internet
The Internet is a global system of interconnected computer ARPANET adopted TCP/IP in 1983, and from there
networks that use the standard Internet protocol suite researchers began to assemble the “network of networks”
(TCP/IP) to link several billion devices worldwide. that became the modern Internet.
It is a network of networks that consists of millions of The World Wide Web (abbreviated as WWW or W3,
private, public, academic, business, and government commonly known as the Web) is a system of interlinked
networks, of local to global scope, that are linked by a broad hypertext documents that are accessed via the Internet.
array of electronic, wireless, and optical networking A Website is a set of related web pages served from a single
technologies. web domain.
11
A Home page, index page, or main page is a page on a acts as an identifier for a computer. It is a unique address for
website. A home page usually refers to: every computer.
• The initial or main web page of a website, sometimes Domain names are used to identify one or more IP
called the "front page" (by analogy with newspapers). addresses.
• The first page that appears upon opening a web
browser program, which is also sometimes called the The universal resource locator, or URL, is an entire set of
start page. This 'start page' can be a website or it can directions, and it contains extremely detailed information.
be a page with various browser functions such as the The domain name is one of the pieces inside of a URL.
visual display of websites that are often visited in the
web browser.
• The web page or local file that automatically loads when
a web browser starts or when the browser's "home"
button is pressed; this is also called a "home page". The
user can specify the URL of the page to be loaded, or
alternatively choose e.g. to re-load the most recent web
page browsed.
• A personal web page, for example at a web hosting
service or a university web site that typically is stored
in the home directory of the user.
An email attachment is a computer file sent along with an
A Hyperlink is a reference to data that the reader can email message. One or more files can be attached to any
directly follow either by clicking or by hovering or that is email message, and be sent along with it to the recipient.
followed automatically
A web browser (commonly referred to as a browser) is a Hotmail was co-founded by an Indian American
software application for retrieving, presenting and entrepreneur Sabeer Bhatia along with Jack Smith in July of
traversing information resources on the World Wide Web. 1996
Some of the famous browsers are Safari, Chrome, Firefox,
Bolt, UC Browser and Internet Explorer CC (Carbon Copy) in e – mail indicates those who are to
The Uniform Resource Locator, abbreviated as URL is a receive a copy of a message addressed primarily to
specific character string that constitutes a reference to a another
resource. In most web browsers, the URL of a web page is
displayed on top inside an address bar. The list of CC recipients is visible to all other recipients of the
(i) An example of a typical URL would be message.
"http://www.bankersadda.com".
Here the domain name is ‘bankersadda.com’ An additional BCC (blind carbon copy) field is available for
Downloading means to receive data to a local system from a hidden notification; recipients listed in the BCC field
remote system or to initiate such a data transfer receive a copy of the message, but are not shown on any
other recipient's copy (including other BCC recipients)
Uploading refers to the sending of data from a local system
to a remote system such as a server or another client with The Drafts folder retains copies of messages that you have
started but are not yet ready to send.
the intent that the remote system should store a copy of the
data being transferred The first email was sent by Ray Tomlinson to himself in
1971.
An Internet Protocol address (also known as an IP
address) is a numerical label assigned to each device (e.g., Internet Explorer was deprecated in Windows 10, with
computer, printer) participating in a computer network. It Microsoft Edge replacing it as the default web browser.
12
Computer Security
A Computer Virus is a computer program or code that can A person who uses his or her expertise to gain access to
replicate itself and spread from one computer system to other people’s computers to get information illegally or do
another system. A computer virus has the capacity to damage is a Hacker.
corrupt or to delete data on your computer and it can Authorization is the function of specifying access rights to
utilize an e- mail program to spread the virus to other resources related to information security and computer
computer systems security in general and to access control in particular. More
.In the worst case scenario, it can even delete everything formally, "to authorize" is to define an access policy.
on your hard disk .The purpose of it is to disrupt the
operation of the computer or the program. Authentication is the act of confirming the truth of an
attribute of a single piece of data or entity. It might involve
Some examples of Computer Virus are Trojan viruses. confirming the identity of a person by validating their
Stealth viruses, worms, malware (malicious software), Disk identity documents, verifying the validity of a website with
Killer, Stone virus, Sunday, Cascade, Nuclear, Word Concept, a digital certificate, tracing the age of an artifact by carbon
dating, or ensuring that a product is what its packaging and
etc.
labeling claim to be. In other words, Authentication often
involves verifying the validity of at least one form of
Malware, short for malicious software, is any software identification.
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems. It Phishing is the attempt to acquire sensitive information
can appear in the form of executable code, scripts, active such as usernames, passwords, and credit card details
content, and other software. (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Antivirus Software is used to scan the hard disk to remove A Spoofing attack is a situation in which one person or
program successfully represents oneself as another by
the virus from them. Some of the famous anti – viruses
falsifying data and thereby gaining an illegitimate
available are Avast, Norton, Avira, Kaspersky, AVG, etc.
advantage.
Microsoft Office
Microsoft Office is an office suite of desktop applications, SOME NEW FEATURES INTRODUCED IN OFFICE 2016
servers and services for the Microsoft Windows and Mac FOR WINDOWS OS
operating systems. It includes Microsoft Word, Excel, Share: In Word 2016 for Windows, it is easier than ever to
PowerPoint, Outlook, OneNote, Access and Publisher. share your documents. When you share your files by using
Note: Microsoft Windows Vista was an windows OS for PC OneDrive or SharePoint Online for Office 365, you can
not Office Suit. invite people to the document directly from within Word,
or send a PDF or Word file as an email attachment. This
Office 365 is a subscription service that includes the most feature of share is also available for Excel and PowerPoint
recent version of Office, which currently is Office 2016. It 2016.
comes with the applications you’re familiar with, like
Word, PowerPoint, and Excel, plus extra online storage, Tell Me: This is a text field where you can enter words and
ongoing tech support. phrases about what you want to do next and quickly get to
those features you want to use or actions you want to
Note- Microsoft Azure is a growing collection of integrated perform. You can also use Tell Me to find help about what
cloud services which developers and IT professionals use you're looking for, or to use Smart Lookup to research or
to build, deploy and manage applications through our define the term you entered.
global network of data centres. It provides software as a Smart Lookup: Bing search incorporated with applications
service (SaaS), platform as a service (PaaS) and New Charts introduced in Excel 2016 : New Chart types
infrastructure as a service (IaaS) and supports many and templates are introduced in Excel 2016 such as
different programming languages, tools and frameworks. treemap, sunburst chart (also known as a ring chart),
Microsoft Azure was earlier known as Windows Azure. waterfall chart, box plot and histogram, and financial and
calendar templates.
13
Skype and OneDrive Integration : One of the new features There is also an option to search for more templates. These
added to Word, Excel, and PowerPoint is the ability to use templates can help you get the desired layout where a
Skype for Business to collaborate and communicate while sample data will already be there. You may edit and enter
working on documents. User can IM or video-call someone data as you may like.
with Skype from the new Share pane built into the new
Office applications. OneDrive integration supports cloud MS Word 2016 Ribbons:
storage file hosting service that supports access of office Quick Access Toolbar
document from anywhere on any device. By default, on top is the Quick access toolbar which has 3
Some other features: default options available: Save, Undo Typing and Repeat
New animations in PowerPoint (such as the Morph Typing. After this there is a drop-down menu for
transition), the ability to insert online video in OneNote, customizing the quick access toolbar. This toolbar is totally
and a data loss prevention feature in Word, Excel, and customizable; you can position it below the tabs and
PowerPoint. commands or add more items to it.
New recent-documents feature in Outlook 2016 shows you
the documents you've recently worked on in the Office To add or remove a command from the quick access
apps, so you don't have to hunt for them on your PC. toolbar: When you find a favorite command, right-click it,
Enterprise Data Protection: To manage and prevent data and then click Add to Quick Access Toolbar.
loss at enterprise level, MS Office 2016 comes paced with
inbuilt security feature that provide an ease for system Remove a command by right-clicking it on the Quick Access
admin to enforce policies for content authoring and Toolbar, and then clicking Remove from Quick Access
document sharing. Toolbar.
14
MS WORD 2016 SHORT CUT KEYS Cut to the Spike. (Spike is a feature Ctrl+F3
Frequently used short cut keys that allows you to collect groups of
To do this Press text from different locations and
Go to "Tell me what you want to paste them in another location).
Alt+Q
do"
Open Ctrl+O Find, replace and go to specific items in the document
Save Ctrl+S To do this Press
Close Ctrl+W Open the search box in the
Ctrl+F
Navigation task pane.
Cut Ctrl+X
Replace text, specific formatting,
Copy Ctrl+C Ctrl+H
and special items.
Paste Ctrl+V Go to a page, bookmark, footnote,
Select all Ctrl+A table, comment, graphic, or other Ctrl+G
Bold Ctrl+B location.
Italic Ctrl+I Switch between the last four
Alt+Ctrl+Z
Underline Ctrl+U places that you have edited.
Decrease font size 1 point Ctrl+[
Work with documents in different views
Increase font size 1 point Ctrl+]
To do this Press
Centre text Ctrl+E
Switch to Read Mode view Alt+W, F
Left align text Ctrl+L
Switch to Print Layout view. Alt+Ctrl+P
Right align text Ctrl+R
Switch to Outline view. Alt+Ctrl+O
Justify align text Ctrl+J
Switch to Draft view. Alt+Ctrl+N
Cancel Esc
Undo Ctrl+Z Change Paragraph Alignment
Re-do Ctrl+Y To do this Press
Alt+W, Q, then tab Remove a paragraph indent from Ctrl+Shift+M
in Zoom dialog the left.
Zoom
box to the value Create a hanging indent. Ctrl+T
you want.
Reduce a hanging indent. Ctrl+Shift+T
Copy formatting from text. Ctrl+Shift+C
Remove paragraph formatting. Ctrl+Q
Apply copied formatting to text. Ctrl+Shift+V
Insert Special Characters
Create and edit documents
To insert this Press
To do this Press
A field Ctrl+F9
Split the document window. Alt+Ctrl+S
A line break Shift+Enter
Remove the document window Alt+Shift+C or
split. Alt+Ctrl+S A page break Ctrl+Enter
Save a document. Ctrl+S A column break Ctrl+Shift+Enter
Alt+Ctrl+Minus Sign (on the
An em dash
Delete text and graphics numeric keypad)
To do this Press Ctrl+Minus Sign (on the
An en dash
numeric keypad)
Delete one character to the left. Backspace
An optional hyphen Ctrl+Hyphen
Delete one word to the left. Ctrl+Backspace
A nonbreaking
Delete one character to the right. Delete Ctrl+Shift+Hyphen
hyphen
Delete one word to the right. Ctrl+Delete A nonbreaking
Cut selected text to the Office Ctrl+X Ctrl+Shift+Spacebar
space
Clipboard. The copyright
Undo the last action. Ctrl+Z Alt+Ctrl+C
symbol
15
The registered color to create a visually appeasing and overall look of the
Alt+Ctrl+R
trademark symbol slide.
The trademark Variants - The current theme or style can be customized
Alt+Ctrl+T
symbol using various color schemes through variants.
An ellipsis Alt+Ctrl+Period Customize- This group contains commands to change slide
A single opening Ctrl+`(single quotation mark), size and Format Background.
quotation mark `(single quotation mark) Designer- For instant slide makeovers.
A single closing Ctrl+' (single quotation mark),
quotation mark ' (single quotation mark) 4. Transitions
Double opening Ctrl+` (single quotation mark), Set up how your slides change from one to the next on the
quotation marks Shift+' (single quotation mark) Transitions Tab. Find a gallery of the possible transitions
Double closing Ctrl+' (single quotation mark), in the Transition to This Slide group – click More Button at
quotation marks Shift+' (single quotation mark) the side of the gallery to see all of them.
Enter (after you type the first
5. Animations
few characters of the AutoText
An AutoText entry User may use the Animations tab to choreograph the
entry name and when the
movement of things on his slides. Note that you can see
ScreenTip appears)
many possible animations in the gallery in the Animation
group, and see more of them by clicking
MS POWERPOINT 2016:
More Button. Apart from adding animation you can also
PowerPoint is a slideshow presentation program that's
customize its duration and timing as you need by using
part of the Microsoft office suite of tools. PowerPoint slides
advanced animation and timing group of commands.
can be plain with only text, or they can include pictures and
even animation, including moving text and images. Text
6. Slide Show
can be formatted in the same way as text can be formatted
On the Slide Show tab, set up the way that you want to
in Microsoft Word, including color, size, and font type.
show your presentation to others.
In PowerPoint 2016 there are 9 tabs followed by a new
7. Review
feature of “Tell me what you want to do” arranged in a
The Review tab lets you add comments, run spell-check, or
horizontal fashion. The tabs are as follows: File, Home,
compare one presentation with another (such as an earlier
Insert, design, Transition, Animation, Slide Show, Review,
version).
and View.
8. View
1. Home Views allow you to look at your presentation in different
The home tab in PowerPoint has following groups: ways, depending on where you are in the creation or
Clipboard, Slides, Font, Paragraph, drawing and Editing. delivery process.
The Clipboard, Editing and Font commands are same as
that in Word 2016. The Slides group contains commands to 9. File
insert new slide, choose slide layout, reset the positions At one end of the ribbon is the File tab, which you use for
and formatting of the slide placeholders and option to the behind-the-scenes stuff you do with a file, such as
organize your slides into sections. opening, saving, sharing, exporting, printing and managing
your presentation. Click the File tab to open a new view
2. Insert called the Backstage.
Click Insert to add something to a slide. This includes
pictures, shapes, charts, links, text boxes, video and more. 10. Tools tabs
The Insert Tab has following groups of commands: Slides, When you click some parts of your slides, such as pictures,
Tables, Images, Illustrations, Add-ins, Links, Comments, shapes, SmartArt or text boxes, you might see a colourful
Text, Symbols and Media. new tab appear.
For example, the Drawing Tools tab appears when you
3. Design click a shape or text box. When you click a picture, the
On the Design tab, you can add a theme or color scheme, or Picture Tools tab appears. Other such tabs include
format the slide background. The design tab has following SmartArt Tools, Chart Tools, Table Tools and Video Tools.
categories or groups of commands: These tabs disappear or change when you click something
Themes- Each theme has its own unique set of font, effect, else in your presentation.
16
Terms related to PowerPoint columns and rows. You can have up to 256 columns and
Slide Show : Each page of a PowerPoint presentation is 65,536 rows per worksheet.
called a slide. The default orientation of the slide is in
landscape layout Feature Maximum limit
Design Template : A design template acts as a coordinated 1,048,576 rows by 16,384
packaged deal. It is created so that even though different Worksheet size
columns
slide types can have different layouts and graphics, the Column width 255 characters
whole presentation goes together as an attractive package.
Row height 409 points
Slide Master : When you want all your slides to contain the
1,026 horizontal and
same fonts and images (such as logos), you can make those Page breaks
vertical
changes in one place—the Slide Master, and they'll be
Total number of
applied to all your slides. To open Slide Master view, on the
characters that a cell 32,767 characters
View tab, select Slide Master:
can contain
Characters in a
MS POWERPOINT 2016 SHORT CUT KEYS 255
header or footer
Frequently used shortcuts
The following table itemizes the most frequently used Maximum number
253
shortcuts in PowerPoint. of line feeds per cell
To do this Press Limited by available
Sheets in a
memory (default is 1
Make selected text bold. Ctrl+B workbook
sheet)
Change the font size for selected Alt+H, F, and
Unique cell
text. then S 64,000
formats/cell styles
Change the zoom for the slide. Alt+W, Q
1,024 global fonts available
Cut selected text, object, or slide. Ctrl+X Unique font types
for use; 512 per workbook
Copy selected text, object, or Ctrl+C
Hyperlinks in a
slide. 66,530 hyperlinks
worksheet
Paste cut or copied text, object, or Ctrl+V
slide. Panes in a window 4
Undo the last action. Ctrl+Z Zoom range 10 percent to 400 percent
Save the presentation. Ctrl+S Fields in a data form 32
Insert a picture. Alt+N, P
Insert a shape. Alt+H, S, and Workbook and Worksheet
then H An Excel worksheet is a single spreadsheet that contains
Select a theme. Alt+G, H cells organized by rows and columns. A worksheet begins
Select a slide layout. Alt+H, L with row number 1 and column A. Each cell can contain a
Go to the next slide. Page Down number, text or formula. Excel Workbook comprises
Go to the previous slide. Page Up number of worksheets. Many new sheets can be added to a
Go to the Home tab. Alt+H workbook using adding worksheet command which is
Move to the Insert tab. Alt+N present at the bottom.
Start the slide show. Alt+S,B
Formula and Function
End the slide show. Esc
Formulas enable you to enter calculations in a worksheet.
Close PowerPoint. Alt+F, X
Using Excel for calculations gives you the ability to change
the data (or values) of the cells, and have the program
MS EXCEL 2016
automatically update the recalculate the value of the
Microsoft Excel is a spreadsheet developed by Microsoft.
output based on the new numbers.
Spreadsheets allow you to keep track of data, create charts
based from data, and perform complex calculations. Just
Here are some most frequently used functions in Excel:
like a book ledger, spreadsheets store information in
17
Function Description Tabs in MS Excel 2016
SUM Use this function to add the values in The ribbon in Excel and other Office Suite’s Application has
function cells. Tabs. In Excel 2016 there are 8 tabs followed by a new
IF function Use this function to return one value if feature of “Tell me what you want to do” arranged in a
a condition is true and another value if horizontal fashion. The tabs are as follows: File, Home,
it's false. Insert, Page Layout, Formulas, Data, Review, and View.
LOOKUP Use this function when you need to Following are the groups of Commands available under
function look in a single row or column and find tabs of Excel 2016:
a value from the same position in a Home: Clipboard, Font, Alignment, Number, Style (for
second row or column. Conditional Formatting of table), Cells (to insert, delete and
MATCH Use this function to search for an item format cells), Editing (AutoSum, Sort & Filter, Find &
function in a range of cells, and then return the Select)
relative position of that item in the Insert: Tables (Pivot Table, and Tables); Illustrations
range. For example, if the range A1:A3 (Pictures, Online Picture, shapes and Icon); Add-ins;
contains the values 5, 7, and 38, then Charts; Tours (3D Map); Sparklines (Line, Column,
the formula =MATCH(7,A1:A3,0) Win/Loss); Filters; Links; Text; Symbols
returns the number 2, because 7 is the Page Layout: Themes; Page Setup (Margin, orientation,
second item in the range. page size, print area, breaks, background and print titles);
CHOOSE Use this function to select one of up to Scale to fit; Sheet Options (Gridline, headings); Arrange
function 254 values based on the index number. Formulas: Insert Function; Function Library; Defined
For example, if value1 through value7 Names; Formula Auditing; Calculation
are the days of the week, CHOOSE Data: Get external Data; Get & Transform (New query,
returns one of the days when a show queries, from table, recent sources); Connections;
number between 1 and 7 is used as Sort and Filter; Data Tools; Forecast (what-if analysis,
index_num. forecast sheet); Outline
DATE Use this function to return the Review: Proofing (Spelling, Thesaurus); Accessibility;
function sequential serial number that Insights-smart lookup; Comments; Changes (Protect sheet,
represents a particular date. This protect workbook, share workbook, allow users to edit
function is most useful in situations ranges, track changes)
where the year, month, and day are View: Workbook Views (Normal, Page Break Preview, Page
supplied by formulas or cell Layout, Custom Views); Show (gridlines, ruler. formula
references. For example, you might bar, headings); Zoom; Window; Macros
have a worksheet that contains dates
in a format that Excel does not EXCEL 2016 SHORT CUT KEYS
recognize, such as YYYYMMDD.
Use the DATEDIF function to calculate Frequently used shortcuts Keys
the number of days, months, or years To do this Press
between two dates. Close a spreadsheet Ctrl+W
DAYS Use this function to return the number Open a spreadsheet Ctrl+O
function of days between two dates. Go to the Home tab Alt+H
FIND, FINDB FIND and FINDB locate one text string Save a spreadsheet Ctrl+S
functions within a second text string. They
Copy Ctrl+C
return the number of the starting
position of the first text string from the Paste Ctrl+V
first character of the second text Undo Ctrl+Z
string. Remove cell contents Delete key
Choose a fill color Alt+H, H
Freeze Panes in Excel Cut Ctrl+X
If you wish to see a particular area of a worksheet visible Go to Insert tab Alt+N
or multiple rows and columns while you scroll to another
Bold Ctrl+B
area of the worksheet, you can use Freeze Panes (available
under view tab). Center align cell contents Alt+H, A, then C
Go to Page Layout tab Alt+P
18
Go to Data tab Alt+A Move to the previous sheet in a
Ctrl+Page Up
Go to View tab Alt+W workbook.
Open context menu Shift+F10, or Move one cell to the right in a
Context key worksheet. Or, in a protected
Tab
Add borders Alt+H, B worksheet, move between
Delete column Alt+H,D, then C unlocked cells.
Go to Formula tab Alt+M
Format in cells: keyboard shortcuts
Hide the selected rows Ctrl+9
To do this Press
Hide the selected columns Ctrl+0
Open the Format Cells dialog
Ctrl+1
box.
Format in cells: keyboard shortcuts
To do this Press Format fonts in the Format Cells Ctrl+Shift+F or
Move to the previous cell in a dialog box. Ctrl+Shift+P
worksheet or the previous Shift+Tab Edit the active cell and put the
option in a dialog box. insertion point at the end of its
Move one cell up in a contents. Or, if editing is turned
Up Arrow key off for the cell, move the
worksheet.
Move one cell down in a Down Arrow insertion point into the formula F2
worksheet. key bar. If editing a formula, toggle
Move one cell left in a Point mode off or on so you can
Left Arrow key
worksheet. use arrow keys to create a
Move one cell right in a Right Arrow reference.
worksheet. key Add or edit a cell comment. Shift+F2
Move to the edge of the current Ctrl+arrow
Open the Insert dialog to insert Ctrl+Shift+Plu
data region in a worksheet. key
blank cells. s (+)
Enter End mode, move to the
next nonblank cell in the same Open the Delete dialog box to
Ctrl+Minus (-)
column or row as the active End, arrow delete selected cells.
cell, and turn off End mode. If key Ctrl+Shift+col
Enter the current time.
the cells are blank, move to the on (:)
last cell in the row or column. Ctrl+semi-
Enter the current date.
Move to the last cell on a colon (;)
worksheet, to the lowest used Switch between displaying cell
Ctrl+End Ctrl+grave
row of the rightmost used values or formulas in the
accent (`)
column. worksheet.
Extend the selection of cells to Copy a formula from the cell
the last used cell on the Ctrl+apostrop
Ctrl+Shift+End above the active cell into the cell
worksheet (lower-right he (')
or the Formula Bar.
corner).
Move the selected cells. Ctrl+X
Move to the cell in the upper-
Home+Scroll
left corner of the window when Copy the selected cells. Ctrl+C
Lock
Scroll Lock is turned on. Paste content at the insertion
Move to the beginning of a Ctrl+V
Ctrl+Home point, replacing any selection.
worksheet. Open the Paste Special dialog
Move one screen down in a Ctrl+Alt+V
Page Down box.
worksheet.
Italicize text or remove italic Ctrl+I or
Move to the next sheet in a Ctrl+Page
formatting. Ctrl+3
workbook. Down
Bold text or remove bold Ctrl+B or
Move one screen to the right in Alt+Page
a worksheet. Down formatting. Ctrl+2
Move one screen up in a Underline text or remove Ctrl+U or
Page Up underline. Ctrl+4
worksheet.
Move one screen to the left in a Apply or remove strikethrough
Alt+Page Up Ctrl+5
worksheet. formatting.
19
To do this Press patterns in adjacent columns
and fill the current column
Switch between hiding objects,
Cycle through all combinations
displaying objects, and
Ctrl+6 of absolute and relative
displaying placeholders for F4
objects. references in a formula if a cell
Apply an outline border to the Ctrl+Shift+am reference or range is selected.
selected cells. persand (&) Insert a function. Shift+F3
Remove the outline border from Ctrl+Shift+und Create a chart of the data in the
the selected cells. erline (_) current range in a separate F11
Display or hide the outline Chart sheet.
Ctrl+8
symbols. Define a name to use in
Alt+M, M, D
references.
Work with data, functions, and the formula bar: keyboard Paste a name from the Paste
shortcuts Name dialog box (if names
F3
To do this Press have been defined in the
Select an entire PivotTable Ctrl + Shift + workbook.
report. asterisk (*) Move to the first field in the
Enter
Edit the active cell and put the next record of a data form.
insertion point at the end of its Create, run, edit, or delete a
Alt+F8
contents. Or, if editing is macro.
turned off for the cell, move the
insertion point into the F2 FILE EXTENSIONS:
formula bar. If editing a
formula, toggle Point mode off Word
or on so you can use arrow XML file type Extension
keys to create a reference. Document .docx
Expand or collapse the formula Macro-enabled document .docm
Ctrl+Shift+U
bar.
Template .dotx
Cancel an entry in the cell or
Esc Macro-enabled template .dotm
Formula Bar.
Complete an entry in the
formula bar and select the cell Enter Excel
below. XML file type Extension
Move the cursor to the end of Workbook .xlsx
the text when in the formula Ctrl+End Macro-enabled workbook .xlsm
bar. Template .xltx
Select all text in the formula Macro-enabled template .xltm
bar from the cursor position to Ctrl+Shift+End Non-XML binary workbook .xlsb
the end. Macro-enabled add-in .xlam
Calculate all worksheets in all
F9
open workbooks. PowerPoint
Calculate the active worksheet. Shift+F9 XML file type Extension
Display the Function Presentation .pptx
Arguments dialog box when Macro-enabled presentation .pptm
the insertion point is to the Ctrl+A
Template .potx
right of a function name in a
formula. Macro-enabled template .potm
Insert argument names and Macro-enabled add-in .ppam
parentheses when the Show .ppsx
Ctrl+Shift+A Macro-enabled show .ppsm
insertion point is to the right of
a function name in a formula. Slide .sldx
Invoke Flash Fill to Macro-enabled slide .sldm
Ctrl+E
automatically recognize Office theme .thmx
20
DATABASE MANAGEMENT SYSTEM
DBMS is the acronym of Data Base Management System. • Entity – Relationship Model
DBMS is a collection of interrelated data and a set of • Relational Model
programs to access this data in a convenient and efficient
way. It controls the organization, storage, retrieval, Entity: A thing (animate or inanimate) of independent
security and integrity of data in a database. physical or conceptual existence and distinguishable. In
the University database context, an individual student,
Types of Database Model: Network Database Model, faculty member, a class room, are entities.
Hierarchical Database model, Relational Database Model and Attributes: Each entity is described by a set of
Object-Oriented Database Model. attributes/properties.
SQL (Structured Query Language) is a database computer
Architecture of DBMS-The generalized architecture of language designed for the retrieval and management of
DBMS is called ANSI/ SPARC model. The architecture is data in relational database.
divided into three levels: Constrains: In SQL, we have the following constraints-
• External view or user view/View Level- It is the NOT NULL - Indicates that a column cannot store NULL value
highest level of data abstraction. This includes only UNIQUE - Ensures that each row for a column must have a
those portions of database of concern to a user or unique value
Application program. Each user has a different CHECK - Ensures that the value in a column meets a specific
external view and it is described by means of a scheme condition
called external schema. DEFAULT - Specifies a default value for a column
• Conceptual view/Logical Level- All the database Primary Key uniquely identifies a record in a table.
entities and the relationship among them are included. A candidate key is a single field or the least combination of
One conceptual view represents the entire database fields that uniquely identifies each record in the table.
called conceptual schema. A foreign key is generally a primary key from one table that
• Internal view/Physical Level- It is the lowest level of appears as a field in another.
abstraction, closest to the physical storage method. It DDL: Data Definition Language is used for specifying the
describes how the data is stored, what is the structure database schema. It contains commands to create tables,
of data storage and the method of accessing these data. alter the structure, delete tables or rename tables. E.g.
It is represented by internal schema. Create DML: Data Manipulation Language is used for
accessing and manipulating data in a database. E.g. Select,
Data model: A data model is a plan for building a database. Update
The model represents data conceptually, the way the user DCL: Data Control Language is used for granting and
sees it, rather than how computers store it. Data models revoking user access on a database.
focus on required data elements and associations.
21
SIP Session Initiation Protocol WIFI Wireless fidelity
DHCP Dynamic Host Configuration Protocol WIMAX Worldwide Interoperability for Microwave
IMAP4 Internet Message Access Protocol Version Access
4 ADSL Asymmetric Digital Subscriber Line
RARP Reverse Address Resolution Protocol API Application Program Interface
SSH Secure Shell ARP Address Resolution Protocol
MIME Multipurpose Internet Mail Extension RARP Reverse ARP
SMIME Secure MIME ICANN Internet Corporation of Assign Names &
ALGOL Algorithmic Language Numbers
ANSI American National Standard Institute DPI Dots Per Inch
ATM Asynchronous Transfer Mode
AS Autonomous System
BASIC Beginners All PurposeSymbolic
Instruction Code
BIOS Basic input Output System DSL Digital Subscriber Line
BPS bit Per Second FAT File Allocation Table
DNS Domain Name Server MANET Mobile Ad-Hoc Network
EDI Electronic Data Interchange MIPS Million Instruction Per Second
URL Uniform Resource Locator BIPS Billion Instruction Per Second
GIF Graphics Interchange Format TIPS Trillion Instruction Per Second
ASCII American Standard Code for Information NAT Network Address Translation
Interchange IEEE Institute of Electrical and Electronic Engineer
ASP Active Server Pages IMAP Internet Message Access Protocol
BCC Blind Carbon Copy ISDN Integrated Servers Digital Network
CC Carbon copy ISO International Standard Organization/
CAD Computer Aided Design International Org for Standardization
CDMA Code Division Multiple Access DHTML Dynamic Hyper Text Markup Language
GSM Global System for Mobile Communication CMOS MACMedia Access Control
Complementary Metal
Oxide Semi-Conductor
CMYK Cyan Magenta Yellow Block
GPS Global Positioning System
GUI Graphical User Interface
HDMI High Definition Multimedia Interface
GIGO Garbage in Garbage Out
LIFO Last In First Out
FIFO First In First Out
PING Packet Internet Gopher
HDD Hard Disc Drive
NIC Network Interface Controller/Cord
HDTV High Definition Television
ISP Internet Service Provider
JPEG Joint Picture Expert Group
LCD Liquid Crystal Display
LED Light Emitting Diode
CAN Campus Area Network PCB Printer Circuit Board
PAN Personal Area Network SRAM Static RAM
SAN Storage Area Network DRAM Dynamic RAM
CNM Circulatory Network Mode PROM Programmable ROM
IPV4 Internet Protocol Version 4 EPROM Electrically PROM
IPV6 Internet Protocol Version 6 EEPROM Electrically Erasable PROM
DBMS Data Base Management System HDD Hard Disc Drive
MODEM Modulator Demodulator FDD Floppy Disc Drive
22
RAM Random Access Memory CD Compact Disc
ROM Read Only Memory DVD Digital Video/Versatile Disc
SMPS Switch Mode Power Supply BRD Blu Ray Disc
OMR Optical Mark Reader / Recognition HVD Holographic Versatile Disc
OCR Optical Character Reader / Recognition ACID Atomicity Consistency Isolation Durability
BCR Bar Code Reader WYSIWYG What you see is what you get
MICR Magnetic Ink Character Reader /
Recognition
GLOSSARY
• Access time - The amount of time it takes for requested D
information to be delivered from disks and memory. • Delete - To remove an item of data from a file or to
• Antivirus software - A program designed to look for remove a file from the disk.
and destroy viruses that may infect the memory of a • Debugging - Locating and eliminating defects in a
computer or files stored on a computer. program.
• Artificial intelligence (AI) - Computer systems that • Desktop - The electronic work area on a display screen.
attempt to imitate human processes for analyzing and • Dots Per Inch (DPI) - It is defined as the measure of the
solving problems. resolution of a printer and scanner, or monitor.
• Accumulator - A local storage area called a Register, in • Domain Name - A unique name that identifies a
which the result of an arithmetic or logic operation is particular website and represents the name of the
formed. server where the web pages reside.
B E
• BIT - It is basic unit of computers. It has two values 1 & 0 • Edit - To make certain changes in existing data.
only. • Ethernet Card - A network adapter that enables a
• BYTE - Combination of 8 Bits. computer to connect to an Ethernet.
• Basic Input Output System (BIOS) - Also known as
ROM BIOS. It provides an abstraction layer for the F
hardware, i.e., a consistent way for application • Fax - A shortened form of the word facsimile. A copy of a
programs and operating system to interact with document transmitted electronically from one
input/output devices. machine to another.
• Bug - A software bug is an error, flaw, failure, or fault in • File transfer protocol (FTP) - A set of guidelines or
a computer program or system produces an incorrect standards that establish the format in which files can be
or unexpected result. transmitted from one computer to another.
• Bus - A pathway along which electronic signals travel • Firewall - A security system usually consisting of
between the components of a computer system. hardware and software that prevents unauthorized
C persons from accessing certain parts of a program,
• Cookie - A packet of information that travels between a database, or network.
browser and the web server. • Flash Memory - It is a type of non-volatile computer
• Crash - Your computer or application no longer works storage chip that can be electrically erased and
correctly and so you “loose” all the work you’ve done reprogrammed. It was developed by EEPROM.
since the last time you saved. G
• Command - An instruction that causes a program or • Gateway - A machine that links two networks using
computer to perform a function. different protocols.
• Cache - It is a memory storage area that keeps frequent • Gigabyte - A measurement of the storage capacity of a
use data readily available to the computer so that the device. One gigabyte represents 1024 megabytes.
computer does not retrieve them from slow storage • Google – search engine on the web.
devices. • Gopher - A protocol used for locating and transferring
Clock Speed - The speed of computer is information on the internet. It is an internet search tool
measuredclock speed. High clock speed is synonymous that allows users to access textual information.
with high processing capability. It is measured in • GUI - Graphical User Interface uses icons and menus to
Megahertz (MHz). carry out commands such as opening files, delete files,
• Column - A vertical block of cells in a table or move files etc..
spreadsheet.
23
• Graphic Interchange Format (GIF) - A simple file • Landscape Orientation – The positioning of the page so
format for pictures and photographs that are that the information is printed across the long
compressed so that they can be sent quickly. dimension of the page.
H • Liveware - It is a term to describe the human system,
• Hard copy - Text or graphics printed on paper; also opposed to hardware or software in a computer.
called a printout. M
• Hard disk - A rigid type of magnetic medium that can • Macro virus - A type of virus that attaches itself to
store large amounts of information. documents or word processing templates.
• Hyperlink - An image or portion of text on a webpage • Malware - Software that disrupts normal computer
which is linked to another webpage. functions or sends a user’s personal data without the
• Hub-A network device that connects multiple user’s authorization.
computers on a LAN so that they can communicate • Memory - The part of a computer that stores
with another network and the internet. information.
• Header - Repetitive information that appears at the top • Memory Cell - A circuit in memory that represents a
(the head) of every page of a document. single bit of information.
• Hypertext transfer protocol (HTTP) - The protocol • Mass Storage - Storage systems that provide access to
used on the World Wide Web that permits Web clients hundreds of billions of bytes of stored data. They are
(Web browsers) to communicate with Web servers often referred to as Archival Storage because of the
I very large volumes of historical or backup data they can
• Icons-In a graphical user interface (GUI), a small, store.
pictorial, on screen representation of an object, such as • MIPS - An acronym derived from millions of instructions
a document, program, folder or disk drive. per second. Used to measure the speed of a processor.
• Instant messaging (IM) - A chat program that lets • Morphing - The transformation of one image into
people communicate over the Internet in real time. another image.
• Internet protocol (IP) address - A unique set of • Mobile Commerce (m-Commerce) - A form of e-
numbers that identifies a computer over a network. commerce that has the ability to conduct monetary
• Internet service provider (ISP) - An organization that transactions via a mobile device such as a cell phone.
provides access to the Internet for a fee. • Mozilla - a web browser and successor to Netscape
• Intranet - A private network established by an Communicator.
organization for the exclusive use of its employees. • Multitasking - The ability of a computer to execute
Firewalls prevent outsiders from gaining access to an more than one program at a time.
organization’s intranet N
J • NIBBLE - Combination of four bits.
• JPEG - Joint Photographic Experts Group. A format for • Network - A system of interconnected computers. They
storing complex graphics in compressed form. are of three types i. e. LAN, MAN, WAN.
• Justification - Aligning lines of text at the left margin, • Network Interface Card (NIC) - This is a part of the
the right margin, both margins, and the centre. Text computer that allows it to talk to other computers via
aligned at both margins is considered fully justified. a network protocol like TCP/IP.
• Node - A computer which is attached to the network.
K Each node has its own address on the network so that
• Keyboard - The device used to enter information into a it can be uniquely identified and can communicate with
computer. other nodes on the same or different network.
• Kilobyte - A measurement of the storage capacity of a O
device. One kilobyte represents 1024 bytes. • Offline - Refers to the state in which a computer is
temporarily or permanently unable to communicate
L with another computer.
LAN - A local area network (LAN) is a computer network that • Online - Refers to the state in which a computer is ready
interconnects computers within a limited area such as a to communicate with other computers.
home, school, computer laboratory, or office building, • Open source software - Software that makes the
using network media. underlying source code available to all users at no
• Laptop computer - A portable computer. Also known as a charge.
notebook computer.
24
• Operating system (OS) - Software that manages the Q
internal functions and controls the operations of a
computer. • Query - An alternate pipe form of operating system,
P hich handles data in the form of messages rather than
• Palmtop computer - A portable computer smaller than a bytes.
notebook (or laptop) computer that fits on the palm of • Qwerty - It is one of the standard computer keyboard,
your hand. Also called a handheld computer. with the character Q, W, E, R, T, Y on the top row of
• Password - A user’s secret identification code, required letters on the keyboard.
to access stored material. A procedure intended to
prevent information from being accessed by R
unauthorized persons. • Response time - The time a computer takes to execute a
• Piracy - The illegal copying of software or other creative command.
works. • Retrieve - To call up information from memory or
• Peripherals - A connectable device that has an auxiliary storage so that it can be processed in some way.
function outside the permanent system configuration • Record - A collection of all the information pertaining to
such as plotters, printers and graphic displays. a particular subject.
• Phishing - A type of computer fraud that tries to trick • Row - A horizontal block of cells in a table or
users into revealing their passwords and other spreadsheet.
confidential information. • Resolution - Measurement of the degree of sharpness of
• Pixel - A smallest picture element of a digital image. The a displayed image. It is defined as number of pixels per
smaller the pixels, the higher the resolution. square inch on a computer generated display.
• Port - An electrical connection on the computer into • Register - A temporary storage unit for quick, direct
which a cable can be plugged so that the computer can accessibility of a small amount of data for processing.
communicate with other devices such as printer or S
modem. • Save As – Give the file a name and/or store the file in a
• Protocol - A set of rules and regulations that certain place.
coordinates the exchange of information over the • Save - Tell the computer to create a file on disk that has
network. the information you’ve put into the document.
• Portrait orientation - Positioning paper so that • Scroll bar - Allows you to move around through your
information is printed across the short dimension of the document.
paper.
• Shut down - To quit all applications and turn off the T
computer. • Trash - Place where you put files and folders that you
• Spam - unwanted repetitious messages, such as want to delete or get rid of.
unsolicited bulk e-mail. • Topology - The structure of the network, including
• Scanner - An input device that can copy a printed page physical connections such as wiring schemes and
into a computer’s memory, thus doing away with the logical interactions between network devices.
need to type the copy. • Track - A ring on a disk where data can be written.
• Screen saver - A program that changes the screen • Telnet - A protocol for remote computing on the
display while the user is away from the computer. internet that allows a computer to act as a remote
• Server - A computer that manages a shared resource terminal on another machine, anywhere on the internet.
and provides a set of shared user services to the clients. • Touchpad - The device on a laptop computer that takes
• Search Engine - Software that searches, gathers and the place of a mouse.
identifies information from a database based on an • Touch screen technology - The technology that permits a
index, keywords or titles. user to perform a function simply by touching the
• Spam - Unwanted repetitious messages, such as screen on an appropriate spot.
unsolicited bulk e-mail. U
• Soft copy - Information shown on the display screen.
• Sort - To arrange fields, records, or files in a • Uninterrupted Power Supply (UPS) - A Battery
predetermined sequence. powered backup system that provides enough
• Surfing the Net - Browsing through various Web sites electricity to a computer during a power outage so that
on the Internet in search of interesting things. a user can save files before shutting down the
computer.
25
• Universal Serial Bus (USB) - A common standard for The most common Web browsers now in use are
connecting multiple peripherals to a computer as Internet Explorer, Google Chrome and Mozilla Firefox.
needed. • Web site - One or more related pages created by an
• Upload - To transfer information from a client computer individual or an organization and posted on the World
to a host computer. Wide Web.
V • Wi-Fi (Wireless fidelity) - A process that permits high-
• Virus - A piece of computer code designed as a prank or speed wireless transmission of data.
malicious act to spread from one computer to another • Word processing - The electronic process of creating,
by attaching itself to other programs. formatting, editing, proofreading, and printing
W documents.
• WAP - Wireless Application Protocol is a specification • Workstation - A desktop computer that runs
for a set of communication protocol used to allow applications and serves as an access point in a local area
wireless devices to access the internet and other network.
utilities. Z
• Web browser - Software that permits a user with a click • Zombie - A computer that has been hijacked by a
of a mouse to locate, display, and download text, video, cracker without the owner’s knowledge and used to
audio, and graphics stored in a host computer on the perform malicious tasks on the Internet.
Web.
PROGRAMMING LANGUAGE
PROGRAMMING LANGUAGE contains a short description of the process step.
Programming Language are coded language are Different flow chart symbols have different
coded language used by programmer to write meanings. The most common flow chart symbols
instructions that a computer can understand to are:
what the Programmer want. • Terminator: An oval flow chart shape
indicating the start or end of the process.
Following are the major categories of Programming • Process: A rectangular flow chart shape
Languages − indicating a normal process flow step.
• Machine Language
• Decision: A diamond flow chart shape
• Assembly Language
indication a branch in the process flow.
• High Level Language
• Connector: A small, labeled, circular flow chart
• System Language
shape used to indicate a jump in the process
• Scripting Language
flow. (Shown as the circle with the letter "A",
below.)
Pseudo code -
• Data: A parallelogram that indicates data input
Pseudo code is a simple way of writing programing or output (I/O) for a process.
code in english. • Document: Used to indicate a document or
For example – Task – Add two Numbers --- report (see image in sample flow chart below).
• Start
• Get two numbers What is Algorithm
• Add them
• Print the answer An algorithm is a well-defined procedure that
• End allows a computer to solve a problem. Another way
to describe an algorithm is a sequence of
Flow chart unambiguous instructions. ... In fact, it is difficult to
A flow chart is a graphical or symbolic think of a task performed by your computer that
representation of a process. Each step in the does not use algorithms.
process is represented by a different symbol and
26
Sequence of program – more or less independent of a particular type of
computer. It is independent programming
• Algorithm
language. It is third Generation programming
• Flowchart
language. The program is written in high level is
• Program (source code)
called source code. FORTAIN was first high level
• Compiling language.
• Object code
What is syntax - way to write any instruction in
any programming language with the help of some
special symbols and character.
➢ FORTRAN
Full form Formula Translation. It was first high-
level language. It was introduced by John Backus in
1957. It is used for scientist and engineers.
• Machine language
➢ ALGOL
Machine language is written in binary language. It
ALGOL is short for algorithmic language. It is an
is consists of 0s and 1s. Machine language is
early high-level computer programming language
dependent programming language. It is first
devised to carry out scientific calculations. ALGOL
generation programming language. It does not
was used as the standard method for creating
require translator. Machine Language is easy to
algorithms. First appeared in 1958. ALGOL
understand for computer but difficult to
language designed by: Friedrich L. Bauer, Hermann
programmer.
Bottenbruch
The program is written in machine is called object
code. ➢ COBOL
It has two part – The name COBOL stands for Common Business-
Opcode – Operation code – an opcode is a single Oriented Language. COBOL is a programming
instruction that can be executed by the CPU. language that was developed in the year 1959. It
Operand (address part) – operands are was one of the first computer programming
manipulated by opcode languages used for commercial. It was introduced
• Assembly Language - by Grace Hopper.
Assembly language used mnemonic code in place of
➢ BASIC(Beginner's All-purpose Symbolic
binary language. It is second generation
programming language. An assembly language is a Instruction Code)
low-level programming language designed for a BASIC. Stands for "Beginner's All-purpose Symbolic
specific type of processor. Assembly languages Instruction Code”. BASIC is a computer
generally lack high-level conveniences such as programming language that was developed in the
variables and functions. mid-1960s to provide a way for students to write
• High level Language - simple computer programs. In 1964, John G.
A high-level language (HLL) is a programming Kemeny and Thomas E. Kurtz designed the original
language such as C, FORTRAN, or Pascal that BASIC language at Dartmouth College.
enables a programmer to write programs that are
27
➢ Pascal ➢ PERL(Practical Extraction and Reporting
Pascal is an imperative and procedural Language)
programming language, designed by Niklaus Wirth Perl is a general-purpose programming language
as .... Apollo Computer used Pascal as the systems originally developed for text manipulation and now
programming language for its operating systems used for a wide range of tasks including system
beginning in 1980. It is named in honor of the
administration, web development, network
French mathematician, philosopher and physicist
Blaise Pascal. programming, GUI development, and more. Perl
was originally developed by Larry Wall in 1987.
➢ C Language Stand for "Practical Extraction and Reporting
C is a general-purpose, procedural computer
Language
programming language supporting structured
programming, lexical variable scope, and recursion, ➢ Python
while a static type system prevents unintended Python is a general purpose and high level
operations. C was developed at Bell Labs by Dennis programming language. You can use Python for
Ritchie for the Unix Operating System in the early
developing desktop GUI applications, websites and
1970s. It is also called middle level language.
web applications. It is introduced by Guido van
➢ C++ Language Rossum.
C++ is a High-level programming language
developed by Bjarne Stroustrup starting in 1979 at ➢ C# Language
Bell Labs. C++ runs on a variety of platforms, such C# can be used to create almost anything but is
as Windows, Mac OS, and the various versions of particularly strong at building Windows desktop
UNIX. This C++ tutorial adopts a simple and applications and games. C# can also be used to
develop web applications and has become
practical approach to describe the concepts of C++
increasingly popular for mobile development too. It
for beginners to advanced software engineers. C++
is developed by Microsoft. C# is an object-oriented
fully supports object-oriented programming,
programming language used with XML-based Web
including the four pillars of object-oriented
services on the .NET platform and designed for
development.
improving productivity in the development of Web
➢ JAVA applications.
Java is a programming language and a platform.
Scripting Language
Java is a high level, robust, object-oriented and
secure programming language. Java is introduced Scripting languages are server-side scripting
by James Gosling. Java is used many application like languages that manipulate the data, usually in a
………. database, on the server. Scripting languages came
1. Desktop Applications such as acrobat reader, about largely because of the development of the
media player, antivirus, etc. Internet as a communications tool.
2. Web Applications such as irctc.co.in, Html, Xml, JavaScript, ASP, JSP, PHP, Perl, Tcl and
javatpoint.com, etc. Python are examples of scripting languages.
3. Enterprise Applications such as banking Language Translator –
applications.
Language translator is a program which is used to
4. Mobile
translate instructions that are written in the source
5. Embedded System code to object code i.e. from high-level language or
6. Smart Card assembly language into machine language.
7. Robotics There are 3 different types of translators as
8. Games, etc.
28
1. Assembler- Assembler are used to convert 3. Interpreter- An interpreter translates high-level
assembly language code into machine code. instructions into an intermediate form, which it
Assembler convert mnemonic code in to object then executes. It reads the program line by line. In
code. contrast, a compiler translates high-level
2. Compiler- Compiler translate high level instructions directly into machine language.
language in machine language. It read the entire
Compiled programs generally run faster than
program. It finds the syntax error. Error in a
interpreted programs.
program is called bug. Compiler convert source
code into object code.
29
18. How can you disable extended selection mode? 30. In Excel, the contents of the active cell are displayed in the
(a) Press F8 again to disable ________.
(b) Press Del to disable (a) footer bar (b) tool bar (c) task bar
(c) Press Esc to disable (d) menu bar (e) formula bar
(d) Press Enter to disable 31. __________ appear at the bottom of the Excel Window.
(e) It cannot be disables (a) Work sheet tabs
19. What does EXT indicator on status bar of MS Word (b) Name box
indicate? (c) Formula bar
(a) It indicates whether the external text is pasted on (d) Title bar
document or not (e) None of these
(b) It indicates whether extended add-ons are 32. In MS excel ________ are numbered from 1 to onwards and
installed on MS Word or not __________ are numbered from A to onwards.
(c) It indicates whether Extended Selection mode is (a) Columns, rows(b) Rows, slides (c) Slides, rows
turned on or off (d) Rows, columns (e) None of these
(d) Both (a) and (b) 33. What is the default column width of MS Excel?
(e) None of these (a) 5.5 (b) 2.98 (c) 8.43
20. What is the maximum number of lines you can set for a (d) 6.49 (e) None of these
drop cap? 34. To insert a new slide go to __________ tab, in the Slides group,
(a) 3 (b) 10 (c) 15 click New Slide.
(d) 20 (e) 50 (a) Home (b) View (c) Animations
21. What is the default number of lines to drop for drop cap? (d) Slide show (e) None of these
(a) 3 (b) 10 (c) 15 35. Times new Roman, Cambria, Arial are the example
(d) 20 (e) 7 of__________.
22. What is the shortcut key you can press to create a (a) Font face (b) Themes (c) SmartArt
copyright symbol? (d) Clipart (e) None of these
(a) Alt+Ctrl+C (b) Alt + C (c) Ctrl + C 36. In Access a __________ is the collection of data items of all the
(d) Ctrl + Shift + C (e) None of these fields pertaining to one entity.
23. How many columns can you insert in a word (a) field (b) record (c) form
document in maximum? (d) report (e) None of these
(a) 35 (b) 63 (c) 55 37. A table of how many columns can you insert in a word
(d) 65 (e) 60 document in maximum.
24. What is the smallest and largest font size available in Font (a) 55 (b) 42 (c) 32
Size tool on formatting toolbar? (d) 63 (e) As you wish
(a) 8 and 72 (b) 8 and 64 (c) 12 and 72 38. In MS Access a __________ name must be unique within a database.
(d) 10 and 40 (e) None of these (a) Field (b) Record (c) Table
25. Select all the text in MS Word document by: (d) Character (e) None of these
(a) Ctrl + S (b) Ctrl + 1 (c) Shift + A 39. The minimum number of rows and columns in MS Word
(d) Ctrl + A (e) None of these document is
26. MS Word is __________ software. (a) 1 and 1 (b) 2 and 1 (c) 2 and 2
(a) System (b) Application (c) Programming (d) 3 and 3 (e) None of these
(d) Compiler (e) None of these 40. Thesaurus tool in MS Word is used for
27. The shortcut key for paste selected text/picture in MS (a) Spelling suggestions
Word is __________. (b) Grammar options
(a) Ctrl + X (b) Ctrl + C (c) Ctrl + V (c) Synonyms and Antonyms words
(d) Ctrl + Z (e) None of these (d) All of the above
28. Using Print Preview is useful. When you want to (e) None of these
(a) colour the document 41. Why Drop Caps are used in document?
(b) save the document (a) To drop all the capital letters
(c) delete the document (b) To automatically begin each paragraph with
(d) copy the document capital letter
(e) view how the document will appear when printed (c) To begin a paragraph with a large dropped initial
29. To indent the first paragraph of your report, you should capital letter
use this key. (d)To drop the numbers
(a) Space bar (b) Return key (c) Tab key (e) None of these
(d) Shift key (e) None of these
30
42. A bookmark is an item or location in document that you 49. If you want to convert a symbol or several lines of text
identify as a name for future reference. Which of the into an AutoCorrect entry, you should:
following task is accomplished by using bookmarks? (a) Insert the symbol or type the text in a Word
(a) To add anchors in web page document first. Then, select the text or symbol and go
(b) To mark the ending of a paragraph of document to the AutoCorrect dialog box.
(c) To quickly jump to specific location in document (b) Click the Tools menu and choose AutoCorrect
(d) To add hyperlinks in webpage Options. Then, click the Insert menu and choose
(e) None of these Symbol (or click the Format menu and choose
43. A word processor would most likely be used to do Paragraph) to add the symbol or paragraph to
(a) Keep an account of money spent AutoCorrect.
(b) Do a computer search in media center (c) AutoCorrect can only accommodate one line of text.
(c) Maintain an inventory It is not possible to convert a symbol or multiple
(d) Type a biography lines of text into an AutoCorrect entry.
(e) Maintain records of database (d) Insert the symbol or type the text in a Word
44. Which of the following is not valid version of MS Office? document first. Then, select the text or symbol and
(a) Office XP (b) Office Vista (c) Office 2007 click the Edit menu followed by Paste Special.
(d) Office 2010 (e) None of these Select New AutoCorrect Entry and then click OK.
45. You cannot close MS Word application by (e) None of the above
(a) Choosing File menu then Exit submenu 50. AutoCorrect was originally designed to replace_________
(b) Press Alt+F4 words as you type.
(c) Click X button on title bar (a) Short, repetitive
(d) From File menu choose Close submenu (b) Grammatically incorrect
(e) None of these (c) Misspelled words
46. The key F12 in MS Word opens a (d) Incorrect Image
(a) Save As dialog box (e) None of the above
(b) Open dialog box 51. Which of the following is the second step in creating a
(c) Save dialog box macro?
(d) Close dialog box (a) Start recording
(e) Opens help menu (b) Using your mouse or keyboard, perform the task
47. What is the short cut key to open the Open dialog box? you want to automate
(a) F12 (b) Shift F12 (c) Alt + F1 (c) Assign a keyboard shortcut to the macro
(d) Ctrl + F12 (e) None of these (d) Give the macro a name
48. Which of the following symbol sets would be most likely (e) None of these
to contain a mathematical symbol such as a degree sign, 52. If you will be displaying or printing your document on
greater than or equal to, or a Greek letter? another computer, you’ll want to make sure and select the
(a) Wingdings (b) Wingdings 3 (c) Webdings _____________ option under the ‘Save’ tab.
(d) Symbol (e) Arial (a) Embed Fonts
49. When assigning a shortcut key to a symbol, you should (b) Embed True Type Fonts
always try to select a key or key combination that is: (c) Save True Type Fonts
(a) Unassigned (d) Save Fonts
(b) Located on the ten-key pad section of your keyboard. (e) Font Face
(c) Assigned to another task. 53. In Word, the mailing list is known as the ____________.
(d) From the same font family as the symbol. (a) Data sheet (b) Source (c) Data source
(e) None of these (d) Sheet (e) Hyperlink
48. Suppose you wanted to create an AutoCorrect entry 54. To delete 3-D rotation from the shape, point to 3-D
that would type the words ‘We regret to inform you Rotation, and then click _____.
that your submission has been declined’ of the (a) Non Rotation (b) Not Rotation (c) None Rotation
following choices, which would be the best name you (d) No Rotation (e) None of these
could assign to this entry? (a) Unassigned
(a) Regret 55. In Microsoft Office Power-Point 2007, a_____ is a
connection from one slide to another slide in the same
(b) Subdual
presentation or to a slide in another presentation, an e-
(c) We regret to inform you that your submission has
mail address, a Web page, or a file.
been declined
(a) Hyphenation (b) Header (c) Footer
(d) 11
(d) Hyperlink (e) None of these
(e) None of these
31
56. In PowerPoint, which of the following is the default page 59. In the Form Wizard dialog box, the fields from the
setup orientation for notes pages, outlines and handouts? selected table are displayed in which list box?
(a) Vertical (b) Landscape (c) Portrait (a) All fields
(d) All of these (e) None of these (b) All Records
57. In slide layout panel, how many layouts are available for (c) Available Records
(d) Available Fields
next layout by default?
(e) None of these
(a) 4 (b) 7 (c) 12
60. Which control does access use to link data access page
(d) 15 (e) None of these components to access data?
58. In Access, this operation copies a backup file from the (a) Microsoft Office Data Source Control
storage medium back onto the computer : (b) Microsoft Dynamic Data Control
(a) Restore (b) Recreate (c) Copy (c) Microsoft Data Connection Control
(d) Structure (e) None of these (d) Microsoft Default Connection Control
(e) None of the above
32
(d) All of the above (d) Format (e) Clean disk
(e) None of the above 25. Which computer bus connects the main memory to
13. What type of web technology creates an online the memory controller in computer systems?
community where people can make statements and others (a) Data Bus (b) Memory Bus
can read and respond to those statements? (c) I/O Bus (d) Both (b) and (c)
(a) I-Journal (b) Podcast (c) ASP (e) None of these
(d) Blog (e) None of these 26. and are the two types
14. What is a common medium used for thieves to steal of computer memory.
others' identities? (a) RAM and CPU (b) ROM and CPU
(a) Telephone (b) Pick pocketing (c) RAM and ROM (d) RAM and BIOS
(c) Burglary (d) Email (e) BIOS and ROM
(e) None of the above 27. What is the full from of CRT?
15. Application software? (a) Cathode Ray Tube
(a) Is used to control the operating system (b) Computer Resolution and Transparency
(b) Is designed to help programmers (c) Cathode Resolution and Transparency
(c) Performs specific task for computer users (d) Computer RAM Trash
(d) Is used for making design only (e) None of these
(e) All of the above 28. Which among the following is not hardware?
16. A set of instruction telling the computer what to do is (a) Motherboard (b) Operating system
called? (c) CPU (d) Keyboard
(a) Mentor (b) instructor (c) compiler (e) Hard disk drive
(d) program (e) debugger 29. Which of the following is software?
17. A __________ is anything that can cause harm. (a) Motherboard
(a) vulnerability (b) redundancy (c) Spam (b) CPU
(d) threat (e) None of the above (c) Microsoft Windows
18. A __________ is a small program embedded inside of a GIF image. (d) RAM
(a) web bug (b) cookie (c) spyware application (e) All of these
(d) spam (e) None of the above 30. In computing, a is a directive to a computer
19. When you save an Microsoft Access project, what file program order to perform a specific task.
format do you use? (a) Hard boot (b) Hibernation (c) Command
(a) .adp (b) .Xml (c) .mbd (d) Warm boot (e) Format
(d) All of these (e) None of the above 31. Which of the following is/are modifier keys in a
20. To select a column the easiest method is to? computer?
(a) double click any cell in the column (a) Ctrl (b) Alt (c) Shift
(b) drag from the top cell in the column to the last cell in (d) Both 2 and 3 (e) All of the above
the column 32. Which among the following is associated with
(c) click the column heading Internet Mail?
(d) click the row heading (a) Inbox (b) Server (c) Trash
(e) None of the above (d) Drop Box (e) One Drive
21. 30,000 bytes is equal to 33. What is a cursor?
(a) 30 KB (b) 3 MB (c) 3 GB (a) It is an indicator
(d) 3 TB (e) None of these (b) It shows the position on a computer monitor
22. Terminal is a: (c) Cursor is Latin for ‘runner.
(a) device to give power supply to computer (d) Both 1 and 2
(b) Point at which data enters or leaves the computer (e) All of the above
(c) The last instruction in a program 34. Which among the following is not legitimate type of
(d) any input /output device computer virus??
(e) None of these (a) Boot Virus (b) File infector Virus
23. Which part of a computer cannot be touched? (c) Resident Virus (d) Hangout Virus
(a) Mouse (b) Monitor (c) Hardware (e) Macro Virus
(d) Software (e) None of these 35. 30,000 bytes is equal to
24. Manipulation of data in computer is called (a) 30 KB (b) 3 MB (c) 3 GB
(a) Boot (b) Processing (c) Simplification (d) 3 TB (e) None of these
33
36. The main folder on a storage device is called (c) a protocol that handles error and control messages
(a) Platform (b) Interface (c) Root Directory (d) both (a) and (b) (e) None of these
(d) Device Driver (e) None of these 49. What is Loading Operating System into main memory
37. ISDN stands for called?
(a) Integral Service Dynamic Network (a) Printing (b) Saving (c) Storing
(b) International Subscriber Dialup Network (d) Staring (e) Booting
(c) International Service Digital Network 50. What is a group of computers and associated devices that
(d) Integrated Service Digital Network share a common communications line or wireless link
(e) None of these to a server within a small geographic area are called?
38. Which technology is used by cell phones to access the (a) LAN (b) WAN (c) MAN
internet? (d) both (a) and (b) (e) None of these
(a) Cloud computing (b) Neural Networks 51. _____________ is created when two tables are joined on attributes
(c) XML language (d) micro browser software that are neither primary keys nor foreign keys.
(e) None of the above (a) Relation (b) Cardinality (c) Spurious tuple
39. Which of the following scrambles a message by (d) Candidate Key (e) None of the above
applying a secret code? 52. What does SQL stand for?
(a) Audits (b) Encryption (c) UPS (a) Structured Query Language
(d) Firewalls (e) Encapsulation (b) Structered Questioning Logicstics
40. What type of monitoring file is commonly used on and (c) Simplfied Query Logic
accepted from Internet sites? (d) Simple Questioning Language
(a) Smartware (b) Phishes (c) Cookies (e) Structured Query Logic
(d) Trojans (e) None of the above 53. From where to where is a multicast message sent?
41. The software that secretly collects information about (a) From one source to one destination
the web client's internet habits? (b) From multiple source to multiple destination
(a) Detectware (b) Spam (c) Spyware (c) From multiple sources to one destination
(d) Pharming (e) All of the above (d) From one source to multiple destinations
42. Which register is used as a working area in CPU ? (e) None of the above
(a) Program counter (b) Instruction registers 54. Using the direct broadcast address,
(c) Instruction decoder (a) a host sends a packet to all other host on the
(d) Parity generator (e)Accumulator network.
43. Which of the following is the valid subnet mask for class B (b) a router sends a packet to all other hosts on the
IP Address? network.
(a) 251.254.25.5 (b) 255.255.0.0 (c) a host sends a packet to a specific host on the
(c) 155.151.12.9 (d) 255.0.0.0 network.
(e) 255.255.255.0 (d) a host sends a packet to all routers on the network.
44. Repeaters function in which layer? (e) none of the above
(a) Physical layer (b) Data link layer 55. In computing, a WYSIWYG editor is a system. What does
(c) Network layer (d) Both (a) and (b) WYSIWYG stands for?
(e) Session layer (a) what you see is what you get
45. Name the input device from the given options, that (b) when you see is where you get
cannot be used to work in MS Office ? (c) when you see is what you get
(a) Scanner (b) Mouse (c) Keyboard (d) where you see is when you get
(d) Joy stick (e) All of the above (e) None of the above
46. Select the odd one out : 56. What is the Global Access shortcut key for Opening a
(a) Interpreter (b) operating system new database in MS Access?
(c) Compiler (d) Assembler (a) Cntrl+A (b) Cntrl+F (c) Cntrl+S
(e) both (a) and (d) (d) Cntrl+O (e) Cntrl+N
47. Name the first widespread computer virus for MS- DOS? 57. What is the latest version of MS Office available?
(a) Brain (b) Handshake (c) Code Red (a) Office 2016 (b) Office 10 (c) Office 300
(d) Melissa (e) Sasser (d) Office 250 (e) None of the above
48. What is ICMP (Internet Control Message Protocol)? 58. Which of the following is an operating system?
(a) a protocol that manages memory (a) Compiler (b) Plotter (c) Mac
(b) a protocol used to monitor computers (d) Both 1 and 2 (e) All of the above
34
59. Which of the following is the name of an application similar 72. 72. What is Adwords ?
to MS Office? (a) Advertising Service by Microsoft
(a) Libre Office (c) Open Office (c) Neo Office (b) Advanced Search Engine
(d) Free Office (e) All of the above (c) Advertising Service by Google
60. What is the full form of UNIVAC? (d) Automatic words Search Engine by Yahoo
(a) Universal Automatic Computer (e) Advertising Service by Yahoo
(b) Universal Array Computer 73. 73. Given the following
(c) Unique Automatic Computer URL - http://www.example.com:80/
(d) Unvalued Automatic Computer path/to/myfile.html, here , 'www.example.com', ':80' stand
(e) None of these for _____ and______ respectively.
61. The process of converting analog signals into digital signals (a) IP and source
so they can be processed by a receiving computer is (b) Domain Name and Port
referred to as (c) File name and Path
(a) Modulation (b) Demodulation (d) Path and Port
(c) Synchronizing (d) Digitizing (e) Transmission (e) IP and Locator
62. Which of the following memory has stored data in large 74. Which of the following is a recent version of operating
number? systems?
(a) RAM (b) ROM (c) Cache memory (a) Windows XP
(d) Hard Disk (e) None of these (b) Windows 7 Basic
63. Generally, web address is located by (c) Windows 8
(a) Hyperlink (b) HTTP (c) URL (d) Windows 10
(d) Locator (e) Browser (e) Windows 2013
64. Which of the following is more than TB ? 75. What is the full form of SMTP?
(a) MB (b) KB (c) PB (a) Swift Mail Transmission Program
(d) Bit (e) Bytes (b) Simple Mail Transfer Protocol
65. A web address is a unique name at identifies a specific (c) Swift Mail Transfer Program
_______ on the internet. (d) Spam Mail Trash Program
(a) URL (b) HTML (c) CSS (e) None of these
(d) Website (e) None of these 76. A high speed device used in CPU for temporary
66. If you wish to extend the length of the network storage during processing is called
without having the signal degrade, you would use a (a) Register (b) Bus (c) Compiler
(a) Gateway (b) Router (c) Modem (d) Translator (e) Bus
(d) Repeater (e) Resonator 77. Which of the following is used for establishing
67. The ______ button on the Quick Access Toolbar allows you to connection to other document or locations within a
cancel your recent commands or activities. website?
(a) Search (b) Cut (c) Undo (a) Hyperlink (b) Web link (c) CSS
(d) Redo (e) None of these (d) Java query (e) HTML Link
68. Which of the following is not a binary number? 78. When a computer is turned on, where does it get the first
(a) 110010 (b) 201020 (c) 101010 instructions that it loads into RAM?
(d) 100001 (e) 1011101 (a) From RAM
69. Which of the following is a base of hexadecimal (b) From ROM
number? (c) From the Hard Disk
(a) 8 (b) 2 (c) 10 (d) From a CD
(d) 16 (e) 24 (e) None of these
70. A web address is a unique name at identifies a specific 79. ___________is designed to communicate instructions to a machine,
_______ on the internet. particularly a computer. It can be used to create programs
(a) URL (b) HTML (c) CSS to control the behavior of a machine or to express
(d) Website (e) None of these algorithms.
71. What do you call the programs that are used to find out (a) PROM
possible faults and their causes? (b) Programming language
(a) Operating system extensions (b) Cookies (c) Microcontrollers
(c) Diagnostic software (d) Boot diskettes (d) EPROM
(e) None of the above (e) None of the above
35
80. Which of the following groups contains all graphical file start? (a) % (b) + (c) -
extensions? (d) = (e) @
(a) JPG, GIF, BMP (b) GIF, TCF, WMF 91. Which IEEE standard used to define the specification
(c) TCP, JPG, BMP (d) ADP, GIF, PPT for a wireless LAN?
(e) JPG, CPX, GCM (a) IEEE 802.5 (b) IEEE 802.3 (c) IEEE 802.11
81. What type of technology allows you to verbally speak (d) IEEE 802.4 (e) IEEE 802.6
with someone over the Internet? 92. Which of the following data functions would you use
(a) Wiki (b) Social network to hide all rows in a worksheet except those that meet
(c) E-phone (d) VoIP (e) Blog some criteria you specify?
82. In PowerPoint, what is the function of Alt+N in (a) Sort
navigating the ribbon with only the keyboard? (b) Query
(a) Open the Transitions tab (c) Custom Filter
(b) Open the Home tab (d) Conditional Formatting
(c) Open the Insert tab (e) Conditional specification
(d) Open the Review tab 93. How many layers are in the TCP/IP model?
(e) Open the Tell me box (a) 4 layers (b) 6 layers (c) 5 layers
83. What is it called when you are rerouted from your (d) 7 layers (e) 3 layers
requested internet site to another, undesired site? 94. Which of the following is a video format?
(a) Phishing (b) Pharming (c) Redirecting (a) JPEG (b) GIF (c) FLV
(d) Hijacking (e) Trojan (d) PNG (e) BMP
84. The coding language used to create documents for use 95. Commands at the top of a screen such as File-Edit,
on the Internet is . Format and Tools to operate and change things are
(a) HTML (b) HSMT (c) HLTM incorporated in .
(d) All of these (e) HTTP (a) Menu bar (b) Tool bar (c) User friendly
85. The technique in which an attacker convinces an (d) Word processor (e) Graphics
authorized user to pass classified information to an 96. The basic input/output system (BIOS) is stored in:
unauthorized person is called . (a) RAM (b) ROM (c) ALU
(a) dumpster diving (b) reverse social engineering (d) Peripherals (e) DRAM
(c) shoulder surfing (d) social engineering 97. Which of the following diagrams graphically
(e) Cracking represents an inter-relationship among entities in a
86. In which generation did multi-programming start? database?
(a) First generation (a) Entity-relationship diagram
(b) Second generation (b) Data flow diagram
(c) Third generation (c) Control flow diagram
(d) Fourth generation (d) Sequence diagram
(e) Fifth generation (e) Data relationship diagram
87. FORTRAN is a programming language. It is more suitable 98. Which of the following device enabling data transfer
for which purpose? between two different networks?
(a) business applications (a) Bridge (b) Router (c) Gateway
(b) marketing applications (d) Repeater (e) Modem
(c) scientific applications 99. Which of the following number system has base-8?
(d) statically calculative applications (a) Unary number system
(e) Commercial application (b) Binary number system
88. Speed of supercomputer measured in: (c) Octal number system
(a) Kbps (b) Mbps (c) FLOPS (d) Hexadecimal Number System
(d) MIPS (e) CPS (e) Decimal number system
89. Which of the following is used to open file menu 100. What is a note or an annotation that an author or
options in current program? reviewer adds to a document?
(a) Ctrl+F (b) Shift+F (c) Alt+F (a) Comment (b) Caption (c) Footer
(d) Alt+Ctrl+F (e) Tab+F (d) Header (e) Underline
90. By which of the following symbol all Excel formula
36
Answer Key
37
S64. Ans.(c) S77. Ans.(a) S90. Ans.(d)
S65. Ans.(d) S78. Ans.(b) S91. Ans.(c)
S66. Ans.(d) S79. Ans.(b) S92. Ans.(c)
S67. Ans.(c) S80. Ans.(a) S93. Ans.(a)
S68. Ans.(b) S81. Ans.(d) S94. Ans.(c)
S69. Ans.(d) S82. Ans.(c) S95. Ans.(a)
S70. Ans.(d) S83. Ans.(b) S96. Ans.(b)
S71. Ans.(c) S84. Ans.(a) S97. Ans.(a)
S72. Ans.(c) S85. Ans.(d) S98. Ans.(c)
S73. Ans.(b) S86. Ans.(c) S99. Ans.(c)
S74. Ans.(d) S87. Ans.(c) S100. Ans.(a)
S75. Ans.(b) S88. Ans.(c)
S76. Ans.(a) S89. Ans.(c)
38