grade up computer capsule.pdf

April 2, 2018 | Author: manoj kumar | Category: Read Only Memory, Computer Data Storage, Osi Model, Random Access Memory, Computer Network


Comments



Description

www.gradestack.com/blogs Now get GK updates, quizzes and notifications on mobile www.gradestack.com/blogs Computer Tornado for IBPS PO 2016 Mains Exam Dear readers, This Digest is a complete docket of important fundamentals and basics of Computer Application. The Computer Awareness Digest is relevant for all Banking and Insurance exams like - IBPS PO, IBPS Clerk, RBI Assistant, IBPS RRB, RBI Assistant 2016 exam. Basics & Fundamentals of Computer Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per the set of instructions (known as programs) given on a set of data (input) to generate desired information (output ). A complete computer system consists of four parts:  Hardware: Hardware represents the physical and  User: The computer operators are known as users. tangible components of the computer.  Data: Consists of raw facts, which the computer  Software: Software is a set of electronic instructions stores and reads in the form of numbers. consisting of complex codes (Programs) that make the computer perform tasks. Hardware Input Devices Processing Devices Output Devices Storage Devices Keyboard Mother board Monitor Magnetic Disk Microphone Processor Printer Optical Disk Mouse RAM Speaker Flash Memory Web camera ROM Magnetic Tape Touch Screen SMPS Light Pen The following features characterize this electronic machine:  Speed  Reliability  Accuracy  Flexibility  Storage and Retrieval  Low cost  Repeated Processing Capabilities Software Utility Software Application Software System Software (OS) Utility Text Single user Multi User Tools Customized Graphics DOS Unix Software Multimedia Mac-OS Windows Server Language Windows xp,7,8.1 Accounting Computer hardware consists of the following components: 1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types of data processing operations, stores data, intermediate results and instructions (program).It controls the operation of all parts of computer. Now get GK updates, quizzes and notifications on mobile constantly refreshed2 (reenergized) or it loses its contents. data is erased.  Registers: The register is the smallest high-speed storage area in the CPU.. The data until the machine is working.that are used to hold data that are being processed by the current instruction. Now get GK updates. this function. memory is non-volatile. It is read/write memory which stores but requires more power and is more expensive. Usually. This type of can hold. The information is stored There are mainly three types of RAM available: permanently in such memories during manufacture.e.gradestack. it passes the control to the second component. both in  Read Only Memory (ROM): The memory from which terms of its physical size and in the amount of data it we can only read but can not write on it . i. quizzes and notifications on mobile .  Control Unit: This unit controls the operations of all parts of computer but does not carry out any actual data processing operations [B] Primary memory consists of mainly two types of memories:  Random Access Memory (RAM): RAM is the internal  Static Random Access Memory (SRAM): A type of memory of the CPU for storing data. As soon as the term static is derived from the fact that it does not machine is switched off. Both erasing and programming take about 4 to 10 ms (milli second). The ALU includes a group of registers . an EPROM eraser achieves are inexpensive.www. need to be refreshed like DRAM. This operation is referred to as The term dynamic indicates that the memory must be bootstrap. RAM is small. i.memory locations built directly into the CPU . All data must be represented in a register before it can be processed.e. and enters the desired contents using a PROM It can be erased and reprogrammed about ten program thousand times. (SDRAM): A type of DRAM that can run at much Hence a backup uninterruptible power system (UPS) higher clock speeds. Only Memory): The EPROM can be erased by programmed set of data or instructions. These exposing it to ultra-violet light for a duration of up kinds of ROMs are known as masked ROMs which to 40 minutes.  PROM (Programmable Read only Memory):  EEPROM (Electrically Erasable and PROM is read-only memory that can be modified Programmable Read Only Memory): The only once by a user. This type of memory is more economical.com/blogs Fig: The relationship between different hardware components [A] CPU itself has following three components:  ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves mathematical calculation or decision/logic. program and memory that is faster and less volatile than DRAM. stores such instructions that are required to of physical memory used in most personal computers. There are mainly three types of ROM available:  MROM (Masked ROM): The very first ROMs  EPROM (Erasable and Programmable Read were hard-wired devices that contained a pre. is often used with computers. the arithmetic logic unit (ALU). start a computer.  RAM is volatile. data stored in it is lost when we  Synchronous Dynamic Random Access Memory switch off the computer or if there is a power failure. program result. The user buys a blank PROM EEPROM is programmed and erased electrically. A  Dynamic Random Access Memory (DRAM): A type ROM. Secondary Storage (External Storage Devices) : Floppy diskettes. These are used for storing data/Information permanently.  Hard Disk: It is a non-removable enclosed magnetic disk included in most PCs. Mainly there are following types of peripheral devices: 1. that spin on a spindle and the entire unit is encased in a sealed chamber. These devices are very sensitive to environmental conditions (humidity and temperature) as well as to external magnetic fields and need to be stored carefully. If a peripheral device is disconnected.To move cursor position on a monitor input device which helps in inputting data to the screen. It contains a stack of metal platters. buttons are pressed.  Secondary Memory: This type of memory is also known as external memory or non-volatile. Each location or cell has a unique address which varies from zero to memory size minus one.  Magnetic Tape: This is plastic tape. DVD. retention (memory) and reading of magnetically recorded information.Mostly used in notebook or laptop senses the movement of mouse and sends computer. instead of a mouse . The input devices translate the information into the form understandable by computer.  Floppy Disk : Floppy disks are primarily used on PCs. 2. Input Devices (How to tell it what to do): This unit makes link between user and computer.com/blogs Memory A memory is just like a human brain. thereby enabling the introduction (writing).  Primary Memory/Main Memory: Primary memory holds only those data and instructions on which computer is currently working. hard disk. 3. tapes and optical disks come under the category of external storage devices or ancillary storage devices.gradestack. It is used to store data and instructions. usually made of Mylar that is coated with iron oxide. only functions performed by this peripheral device will not be available.www. Pen Drive) Registers RAM ROM SRAM DRAM PROM EPROM EEPROM Memory is primarily of three types  Cache Memory: It is a very high speed semiconductor memory which can speed up CPU.  Mouse.  Keyboard. It has limited capacity and data is lost when power is switched off. each coated with iron oxide.The most common and very popular  Joy Stick. It acts as a buffer between the CPU and main memory. The memory is divided into large number of small parts called cells. palm size box with a round ball at its base which  Track Ball.It is used to select a displayed menu device and cursor-control device having a small item or draw pictures on the monitor screen.This is a ball which corresponding signals to CPU when the mouse is half inserted and by moving fingers on ball.BRD)  Flash Memory(Memory card. Computer memory is the storage space in computer where data is to be processed and instructions required for processing are stored. The best use of tape storage is for data that you do not use very often. Peripherals: Peripheral devices are devices connected to the computer externally. quizzes and notifications on mobile . pointer can be moved Now get GK updates. It is slower than main memory. It is mainly used in Computer Aided computer Designing (CAD) and playing computer games.Mouse is the most popular pointing  Light pen. Memory Primary Memory Secondary Memory Cache Memory Main Memory  Magnetic Disk(HDD)  Optical Disk (CD. Information on a floppy disk is recorded in the magnetized states of particles of iron oxides evenly placed upon concentric circles known as tracks. the computer will still be able to work. quizzes and notifications on mobile . For example. Bar coded data is generally used in labeling goods. be used within the PC. Printer: Printer is an output device.It converts analog information into coded data (data in form of light and dark lines).Information is organized or classified data which has some meaningful values for the receiver.  Data Processing Cycle: Data processing is the re-structuring or re-ordering of data by people or machine to increase their usefulness and add values for particular purpose. or processing by human or electronic machine. converts 2.com/blogs  Scanner. Monitors: Monitors. Laser Printers. called pixels that are arranged in a rectangular form. commonly called as Visual Display Unit (VDU).gradestack. Information is the processed data on which decisions and actions are based. concepts or instructions in a formalized manner which should be suitable for communication. The form will depend on the processing machine. The sharpness of the image depends upon the number of pixels. There are two kinds of viewing screen used for monitors. tapes and so on.A special type of  Magnetic Ink Card Reader (MICR)-MICR input optical scanner used to recognize the type of device is generally used in banks because of a mark made by pen or pencil. For example.In this step input data is changed to produce data in a more useful form. Inkjet Printers. paychecks may be calculated from the time cards.OCR scans text optically character by character. output data may be pay-checks for employees. It forms images from tiny dots.  Microphone-Microphone is an input device to numbering the books. For example. processing and output. or resolution  Flat. large number of check to be processed every day.www.A device used for reading bar  Digitizer.  Cathode-Ray Tube (CRT): The CRT display is made up of small picture elements called pixels.The result of the proceeding processing step are collected.  Information:. digital form.  Input -Input data is prepared in some convenient form for processing. Data processing consists of basic steps input.  Interpreter: This language processor converts a HLL(High Level Language) program into machine language by converting and executing it line by line.  Processing . The particular form of the output data depends on the use of the data. weight and power requirement in comparison to the CRT. such as magnetic disks.  Optical Mark Reader (OMR). Language Processors:  Assembler: This language processor converts the program written in assembly language into machine language. and reports all the errors of the program along with the line numbers. are the main output device of a computer.  Output . Note:  Data: Data can be defined as a representation of facts.  Non-Impact Printers: Non-impact printers print the characters without using ribbon.  Optical Character Reader (OCR). The smaller the pixels. or a summary of sales for the month may be calculated from the sales orders. These printers print a complete page at a time so they are also called as Page Printers. It converts the entire HLL program in one go.  Bar Code Reader. These three steps constitute the data processing cycle. when electronic computers are used. the better the image clarity.Panel Display: The flat-panel display refers to a class of video devices that have reduced volume.A scanner allows you to scan printed them into a machine readable code and stores the material and convert it into a file format that may text on the system memory. interpretation. which is used to print information on paper. Output Devices: (How it shows you what it is doing) Output devices translate the computer's output into the form understandable by users.  Compiler:-It also converts the HLL program into machine language but the conversion manner is different. Now get GK updates. the input data could be recorded on any one of several types of input medium.  Impact Printers: The impact printers print the characters by striking them on the ribbon which is then pressed on the paper. input sound that is then stored in digital form. control.com/blogs Classification of Computers: Computers can be broadly classified by their speed and computing power: Sr. PetaByte (PB) 1 PB = 1024 TB Software Software: software represents the set of programs that govern the operation of a computer system and make the hardware run. 3 Mini Computer It is a multi-user computer system which is capable of supporting hundreds of users simultaneously. A computer stores the information in the form of computer words. Assembler etc. Type Specifications No. Software technology is different from minicomputer. Few higher storage units are following: S.No. Following are the main memory storage units: S. 5 Supercomputer It is an extremely fast computer which can execute hundreds of millions of instructions per second. and extend the processing capabilities of the computer itself. 2 Nibble A group of 4 bits is called nibble.gradestack. Compilers. Interpreter. quizzes and notifications on mobile . The length of a computer word is called word-size or word length and it may be as small as 8 bits or may be as long as 96 bits. (1 byte = 8 bits) 4 Word A computer word.  Application Software: It is the set of programs necessary to carry out operations for a specified application. 2 WorkStation It is also a single user computer system which is similar to personal computer but have more powerful microprocessor. System software are generally prepared by computer manufactures. There are two types of software  System Software: The system software is collection of programs designed to operate. Software technology is different from minicomputer.www. System software serves as the interface between hardware and the end users. Unit Description 1 Bit(Binary A binary digit is logical 0 and 1 representing a passive or an active state of a Digit) component in an electric circuit. like a byte. is a group of fixed number of bits processed as a unit which varies from computer to computer but is fixed for each computer. Examples: Operating System. Unit Description 1 Kilobyte (KB) 1 KB = 1024 Bytes 2 Megabyte(MB) 1 MB = 1024 KB 3 GigaByte (GB) 1 GB = 1024 MB 4 TeraByte (TB 1 TB = 1024 GB 5. 1 PC (Personal It is a single user computer system having moderately powerful Computer) microprocessor. 3 Byte A group of 8 bits is called byte.No. Now get GK updates. 4 Main Frame It is a multi-user computer system which is capable of supporting hundreds of users simultaneously. A byte is the smallest unit which can represent a data item or a character. analyze data in the desired manner.www. (B) Utilities: Utilities are those application programs that assists the computer by performing housekeeping functions like backing up disk or scanning viruses etc. Database Management Systems DBMS is a package that can handle and manage bulk of stored data. Graphics.gradestack. calculate. Disk Defragmentor It speeds up disk access by rearranging the files and free space on your computer. the operating system is first Motherboard: The motherboard serves as a single loaded (as it is essential for running all other programs). memory. ports and expansion cards directly or via cables. A motherboard connects CPU. Now get GK updates. Spreadsheets An electronic spreadsheet is a program that accepts data in a tabular form and allow users to manipulate . and other position. Antivirus Software It scans yours disk for viruses and removes them if any virus is found. already ON. quizzes and notifications on mobile . together. Following are the main five generations of computers: S. Desktop Publishing Software Handles page layout by combining the functions of a traditional typesetter and a layout artist. optical drives.When you reset the computer that is considered as the backbone of a computer. sound card. video card. editing text files. It can be Warm Boot: . Compression Utility Large files can be compressed so that it takes less storage area.com/blogs Application software can subdivide into three categories: (A) Packages:- Packages Word Processing A package that process textual matter and creates organized and flawless documents. Utilities Text Editor Program is used for creating. Backup Utility Program facilities the backing-up of disk. Multimedia and Presentation Application software that manipulates images is applications known as Graphics software. (C) Customized Software: This type of software is tailor-made software according to a user’s requirements. Generation & Description 1 First Generation (1946-1959) Vacuum tube based 2 Second Generation (1959-1965) Transistor based 3 Third Generation (1965-1971) Integrated Circuit based 4 Fourth Generation (1971-1980) VLSI microprocessor based 5 Fifth Generation (1980-onwards) ULSI microprocessor based Boot: When computer starts. platform to connect all of the parts of a computer this process is known as booting. hard Cold Boot: -When you turn the computer ON from an OFF drives. No. 2. closest to the physical storage method.Each position in a hexadecimal number represents a 0 power of the base (16). Proprietary: Software is distributed with the explicit with the explicit legal warning not to modify it and technically locked to prevent other developers to see or modify its source. 0. Decimal Number System: The number system that we use in our day-to-day life is the decimal number system.www. Letters represents numbers starting from 10.F.A.6. 3. what is the structure of data storage and the method of accessing these data. under payment for a specific customer to fit his need.5.gradestack. In decimal number system. Shareware: Software which is initially costless but after a certain period the user is asked to pay a fee or delete it. also called base 2 number system . security and integrity of data in a database. retrieval. 4. B = 11. DBMS is a collection of interrelated data and a set of programs to access this data in a convenient and efficient way.4.9. 1. the computer translates them in numbers as computers can understand only numbers. 2. External view or User view/View Level: It is the highest level of data abstraction.2. DBMS – Data Base Management System DBMS: DBMS is the acronym of Data Base Management System. A computer can understand positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number. Last position in a binary number represents a x power of the base (2). sometimes under certain restrictions. Now get GK updates. Each position in a binary number represents a 0 power of the base (2). 3. the successive positions to the left of the decimal point represent units. The most common example is WinZip compression program.C.6. Internal view/Physical Level: It is the lowest level of abstraction. Each user has a different external view and it is described by means of a scheme called external schema. Hexadecimal Number System: Uses 10 digits and 6 letters. Number System When we type some letters or words. quizzes and notifications on mobile . A = 10. hundreds.Common examples are Microsoft Windows operating system and Microsoft word.E. F = 15. Open source software is also freeware. It controls the organization.1.4. tens.5. A value of each digit in a number can be determined using  The digit  The position of the digit in the number  The base of the number system (where base is defined as the total number of digits available in the number system).7. E = 14. also called base 8 number system. One conceptual view represents the entire database called conceptual schema.2. D = 13. It is represented by internal schema.B.3. Each position in an octal number represents a 0 power of the base (8). Or software which has two versions a free one. Binary Number System: Uses two digits. 0. Architecture of DBMS divided into three levels: 1. Private: Software uniquely built. Conceptual view/Logical Level: All the database entities and the relationship among them are included. Octal Number System: Uses eight digits.8. Commercial: Software for which the user has to pay a license to use it . Open Source: Software may be modified by anyone. C = 12. thousands and so on.com/blogs Software categories Freeware: Software which is completely costless .7. This includes only those portions of database of concern to a user or Application program.1. Decimal number system has base 10 as it uses 10 digits from 0 to 9. Also called base 16 number system . Only the customer may use it.3. storage. It describes how the data is stored. 0 and 1.The producers of this software are either public institutions such as universities or developers who do it for personal interest or advertisement or private company who do it for dumping reasons.D. but incomplete or with advertisement banners and a complete advertisement free one for which the user must pay. provides no limit of distance. Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the machines on the network. Most logic gates have two inputs and one output. quizzes and notifications on mobile . It is an attribute or a set of attributes that can act as a primary key for a table to uniquely identify each record in a table. stored there till the output line is free and then forwarded. NAND.com/blogs Keys in DBMS:  Super key of an entity set is a set of one or more attributes whose values uniquely determine each entity. Network (WAN) is a group Communication  Metropolitan Area Network (MAN) : MAN is Technology . OR.  Tree: A tree topology is a variation of a star. defined for less than 50 Km and provides regional Types of Network 1. Point to Point Network: When a packet is sent from one router to another intermediate routers. It is a key that uniquely identifies each record in the table LOGIC GATES Logic gate: is an elementary building block of a digital circuit. every terminal is in one of the two binary conditions low (0) or high (1). At any given moment. the entire packet is stored at each intermediate router. Now get GK updates.  Ring: Each device has a dedicated point to point line configuration only with the two devices on either side of it. is relatively smaller and privately owned network  Wide Area Network (WAN): A wide Area with the maximum span of 10 km.www.gradestack. 2. NOT. NOR.  Candidate key of an entity set is a set of fields from which primary key can be selected. A subnet using this principle is called point to point or packet switched network. Topologies for a point to point Subnet  Star: Each device has a dedicated point to point link only to a central controller. There are seven basic logic gates: AND.  Bus: One long cable acts as a backbone to link all the devices in the network.  Primary key is a candidate key that is most appropriate to become main key of the table. Five components:  Sender Computer  Receiver Equipment(Modem)  Sender equipment (Modem)  Receiver Computer  Communication Channel ( Telephone Cables) Classified on the basis of Geographical Coverage: connectivity within a campus or small  Local Area Network (LAN): A local area network geographical area. XOR. usually called a hub. XNOR Networking Network: Computer Networks means interconnected set of autonomous system that permits distributed processing to information. a link between two directly connected nodes.gradestack.  Physical Layer: It defines the electrical and physical specifications of the data connection. Router sare and vice versa.  Network Layer: The network layer provides the functional and procedural means of transferring variable length data sequences from one node to another connected to the same network. Computers that uses the same protocol (for example. It establishes. which a computer cannot be connected over a this serial connection will not work. Transmission Media  Network Cables: Network cables are used to located at gateways. Most branded printers. Seven layers of OSI Model are:  Application Layer: The application layer is the OSI layer closest to the end user. It detects and possibly corrects errors that may occur in the physical layer.  Presentation Layer: The presentation layer establishes context between application-layer entities.com/blogs Open Systems Interconnection model (OSI) The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO).  Session Layer: The session layer controls the dialogues (connections) between computers. It is also known as network adapter or is to use a central body to which other computers.  Repeaters: A repeater is an electronic device  External Network Cards: External network that receives a signal and retransmits it at a cards come in two flavours like Wireless and USB higher level or higher power. quizzes and notifications on mobile . so that the signal can cover into the motherboard but no network cable is longer distances. in which the application-layer entities may use different syntax and semantics if the presentation service provides a big mapping between them.  Transport Layer: The transport layer provides the functional and procedural means of transferring variable- length data sequences from a source to a destination host via one or more networks.www. The most commonly used more networks connect. It defines the relationship between a device and a physical transmission medium. the places where two or connect computers. drivers required to support the USB network card  Routers: A router is a device that forwards data automatically.  Bridge: A bridge is a product that connects a local  Universal Serial Bus (USB): USB card are easy to area network (LAN) to another local area network use and connect via USB port. while maintaining the quality of service functions. can be connected and then computers have network card pre-installed. scanners etc. packets along networks.  Data link Layer: The data link layer provides node-to-node data transfer -. or onto the other based. this body will manage or distribute network Network cards are of two types: Internal and traffic External Network Cards. Now get GK updates. which means both the OSI application layer and the user interact directly with the software application. commonly two LANs or a device attached to computers that can convert digital signals to analog signals to analog signals WANs or a LAN and its ISP's network. cable is Category 5 cable RJ-45.  Internal Network Cards: Network card is a  Distributors: A computer can be connected to necessary component of a computer without another one via a serial port but if we need to connect many computers to produce a network. The solution network. Wireless network card need to be inserted side of an obstruction. Network Interface Card (NIC). required to connect to network. A router is connected to  Modem (Modulator –DE Modulator): Modem is at least two networks. automatically detect USB card and can install the Ethernet or token ring). manages and terminates the connections between the local and remote application. computer in the form of instructions. Start---Find---Files or the bottom of the screen.  Security -. error messages and other debugging and the resources and decides who gets the resources. when.e.allocates and de-allocates traces.prevents unauthorized access to  Coordination between other software and programs and data by means of passwords and users -. This feature is called word wrapping. file. and for how by a display screen. the screen upon which icons.gradestack. right.keeps track of all devices.records what part is not in use etc. which is usually located at  To find files or folders. which acts as an interface between a user and the hardware. quizzes and notifications on mobile . object  The distance between text boundaries and page linking and embedding. powerful editing and formatting bottom.www. File—New—Folder computer’s memory in called booting up. systems. left. or shortcut. assemblers and other  Job accounting -. folder. MS-Word  A word processor is a package that processes  The word processor automatically fits the typed textual matter and creates organized and flawless text within the specified left and right margins. whose shortcut is to be created.keeps track of time and software to the various users of the computer resources used by various jobs and/or users. Characteristics of Operating System:  Memory Management -. permanent storage. and allocates the delays between request for a service and from the memory when a process or program requests it. features. Start—Shut Down commands are clicked. compilers.Coordination and assignment of similar other techniques. what part of it is in use by whom. Folder commands are clicked. spell check and mail margins is called indent. system.keeps tracks of primary  memory i. positive. firstly select the file of a single folder or drive.  The world processor offers very useful features  Margins can be four type viz. top and like speed.  The taskbar is a bar. interpreters.  An icon is a graphic symbol that represents a  A folder is a location in which you can store files window element like. much time.Production of dumps.allocates the  Interaction with the operators -.  To shut down the computer.  Control over system performance -.  Error-detecting aids -. or folder.The processor(CPU) to a process and de-allocates interaction may take place via the console of the processor when it is no longer required. System acknowledges the same. commands are clicked in My Computer windows.  Toolbar: A set of button you click to perform windows.  In MS-Windows. In Windows Operating system multiple applications can be simultaneously run in different windows.  Loading up of operating system files into the  To create a new folder.  My computer is helpful for viewing the contents  To create a shortcut to a file. error-detecting methods. and shows the computer’s contents as a hierarchy. The indent can be merge etc.  File Management -. Graphics. Then  Windows Explorer is another way of seeing drag the file icon through right mouse button to what is on your computer.Window MS-Windows is a GUI based operating system. does the This is also called I/O controller that decides corresponding action and informs the operation which process gets the device. and other folders. common tasks. then select create shortcut(s). Operating  Device Management -. Windows Explorer desired location where shortcut to be placed.  The text layout Now get GK updates.  Processor Management -. MS . documents. negative or hanging indent. too are displayed is known as desktop.com/blogs Operating System:- An Operating system is a program.  File: A program or document stored on a disk. . Ctrl+I Applies or removes italic formatting. The main document and through the Print.www. and Go To window in Microsoft Word F7 Spellcheck and grammar check selected text or document F12 Save As Some of the valid file names are as follows: Type of File File name and Extension Notepad File Type. Arrow Go forward one page.  In word. Ctrl+Shift+A Format all letters as capitals. The through Table button of Standard toolbar and can header and footer can be created and formatted be manipulated through the table drop menu. You can create your borders can be applied through Borders and own Autocorrect entries by clicking to shading option of Format menu. paragraphs can be formatted through  The Autocorrect feature of Word converts Paragraph option of Format menu and the shorthand into longer strings. Ctrl+= Apply subscript formatting (automatic spacing). spelling and grammar can be checked either through the spelling and Grammar option of Tools menu. Shortcuts Shortcut Description Ctrl+W Close the active window / document Ctrl+Z Undo an action Ctrl+Y Redo the last action or repeat an action Ctrl+S Save a document Ctrl+P Print a document Ctrl+K Insert a hyperlink. Ctrl+B Applies or removes bold formatting.ppt Database Db1. Replace. option of File menu. F1 Open Help F4 Repeat the last action performed(Word 2000+) F5 Open the Find.doc Excel Book. Ctrl+C Copy selected text or graphics to the Office Clipboard.bmp Word Document.exe Now get GK updates.  The page formatting in Word can be controlled  Tables can be inserted in a Word document through Page Setup … option of File menu. the document can either be printed Main document and data source file to produce through print button of standard toolbar or the merged document. Alt+Right. using Header and Footer option of the view menu.gradestack. option of Tools menu. Autocorrect command to Tools menu.  In MS-Word. The help data source can handled through Mail Merge is available in Word through the Help menu.xls PowerPoint Presentation.mdb Executable Game.txt Paintbrush File Painting. Ctrl+V Paste the most recent addition to the Office Clipboard. the mail merge involves two files –  In word.com/blogs  In Word. quizzes and notifications on mobile . components: Titles.Outlines. calculate. Format----Background command or even  The slide components that are used for reference through slide’s shortcut menu. Slide Show and Notes Page View. Now get GK updates. of these views: Normal.  A range can selected using mouse or keyboard.gradestack. bar chart.  To erase everything from a worksheet . Notes . Powerpoint  The application software that can create menu’s Apply Design Template option or ever professional looking visual aids is called from the shortcut menu. a worksheet and saved with that work sheet. Insert---Cells----. Apply Design Template option of Common Tasks  To add animation.  You can change text font and style by using  A new presentation can be created through one of Format---Font command.  A color scheme can be changed by clicking at  A slide can contain one or more of these Slide Color Scheme option of Format menu. operations or by dragging the fill handle. horizontal rows and vertical columns. rows or columns in worksheet.Excel are area chart. formatting. Outline. are: Handouts.  A range can be either through copy and paste column chart. pie chart. Presentation Graphics Software. Insert menu’s New Slide option. transitions to slides by using Slide Show --.  Movies (Vedio) & Sound can be inserted by using  A presentation in PowerPoint can viewed in any Insert—Movies & Sounds command. use numbers. Slide  While creating slide shows you can add Sorter. click either at Transition command. manipulate and analyze set of  To insert cells.  To save a workbook use File. worksheet data. Insert-----Rows or Insert-----  A Worksheet is a grid of cells made up of Column command respectively. quizzes and notifications on mobile .  A cell can be edited either by overwriting or  Charts are the pictorial representation of by partially modifying the cell contents.Save command.  Charts are created using chart wizard.select all  Chart sheet is a sheet in workbook that contains the cells in the worksheet and then use Edit— only a chart. by clicking at them. Start—Program---Microsoft PowerPoint. or at Format Custom Animation commands. Slide. embedded chart (ii) chart sheet  A range can be cleared through Edit--Clear  Embedded chart is a chart object that is placed on command. enter.  General arrangement of data is known as  A workbook is a group of worksheets.  A color scheme is a combination of various colors  MS-PowerPoint can be started by clicking at used for text and other presentation elements. line chart. Drawing objects. these methods:(i) Auto content Wizard (ii)  Header and Footer information can be viewed and Design Templates (iii) Sample Presentation changed by clicking at View---Header and Footer and (iv) Blank Presentation option.  Three types of data can be entered in a worksheet  Formatting does not affect the actual cell value (i) number (ii) Text (iii) Formulas. only the appearance change.  Background color can be changed by clicking at ClipArt and Pictures. XY(Scatter) chart.  A range can be moved either through cut and  Chart in MS-Excel saved in two ways : (i) paste operations or by dragging the range border.Slide  To apply new design to slides.  Cell can be referenced in three ways (i) relative  Formatting is performed in MS-Excel through (ii) absolute (iii) mixed options available in Format menu.com/blogs MS-EXCEL  A spreadsheet is a software tool that lets one  To open a workbook use File—Open command.www.  A new side can be added by either clicking at  The slide ---shorter view in useful for viewing the Common Tasks options of Formatting toolbar slides in miniature forms and for rearranging and then selecting New Slide option.  Various chart types in MS. Clear—All. Graphs. you can use Slide Show----- options of Formatting toolbar.  Status bar: The status bar is located at the very bottom of the browser window.com/blogs Internet  The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. can be accessed using the mouse. and be sent along with it to the recipient. Various features of a Web Browser are:  Menu bar: The menu bar.com". is a system of interlinked hypertext documents that are accessed via the Internet. The first email was sent by Ray Tomlinson to himself in 1971. distant places. You can watch the progress of a web page download to determine if the host computer has been contacted and text and images are being downloaded." "GoTo. located at the very top of the screen. organizations. is a box labelled "Location. while actions that cannot be performed will be in gray or lightened. below the tool bar. or main page is a page on a website. The list of CCed recipients is visible to all other recipients of the message. An example of a typical URL would be "http://www.  A Home page.  Downloading means to receive data to a local system from a remote system. One or more files can be attached to any email message. it contains navigational buttons for the Web.  The Uniform Resource Locator. and government networks. the URL of a web page is displayed on top inside an address bar. presenting and traversing information resources on the World Wide Web. A home page usually refers to:  A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is followed automatically.  A website is a set of related web pages served from a single web domain.  Scroll bar: The scroll bar is the vertical bar located on the right of the browser window. Now get GK updates.  Communicate in real time (chat) with others  Set up a site with information about your connected to the Internet. individuals and mail).  Tool bar: The tool bar is located at the top of the browser. Actions that are in black can be performed. In most web browsers. business.. It also known as “network of networks” that consists of millions of private.gradestack.  Transfer files as well as software.  The World Wide Web commonly known as the Web or www developed founded by Tim Berners – Lee in 1989.  Read news available from leading news groups.  CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. abbreviated as URL is the Address for web sites. company’s products and services.  A web browser (commonly referred to as a browser) is a software application for retrieving. Basic functions of these buttons include: Command Function Home Opens or returns to starting page Back Takes you to the previous page Forward Takes you to the next page Print Prints current page Stop Stops loading a page Reload Refresh/redisplays current page Search Accesses search engine  Location bar: The location bar. or to initiate such a data transfer. Various Applications of Internet are:  Exchange messages using e-mail (Electronic  Search databases of government.  Browse through information on any topic on  Send or receive animation and picture files from web." or "Address. quizzes and notifications on mobile . These multimedia pages are ever- changing. and press the Return or Enter key to open the site.  An email attachment is a computer file sent along with an email message. academic. index page. public. You can scroll up and down a web page by placing the cursor on the slider control and holding down the mouse button. Most of them begin with http (Hyper Text Transfer Protocol)." You can type in a site's address.gradestack. followed by a colon and two slashes.  Uploading refers to the sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred.www. founded by an Indian American entrepreneur Sabeer Bhatia along with Jack Smith in July of 1996.edu – Educational. For e.  Bombs: This type of virus hides on the user’s disk and waits for a specific event to occur before running.  An Internet Protocol address (also known as an IP address) is a numerical label assigned to each device (e. The virus allows the actual boot sector data to be read as through a normal start-up were occurring.toggle the input from a group of keys on a keyboard between two different input modes. quizzes and notifications on mobile . a modifier key is a special key (or combination) on a computer keyboard that temporarily modifies the normal action of another key when pressed together. The first field is the host name. promoting  Algorithm: A set of instructions that provides a Programming language standards. a finished. describing the type of organization and occasionally country of origin associated with the address. which is sometimes called the host. powerful industry association of USA. or frames. identifying a single computer or organization. These types of documents can include macros. displaying a series of pictures. It acts as an identifier for a computer. solution to a given problem.  Boot sector viruses: A boot sector virus infects the boot record of a hard disk. making them hard to detect.  Hotmail. which are small programs that execute commands.F1 through F12 keys are known as function keys.com/blogs  An additional BCC (blind carbon copy) field is available for hidden notification. To infect the host program.In computing.-  Shift  Ctrl  Alt  Fn Function keys – A function key is a key on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions.. It is a unique address for every computer. For example. but are not shown on any other recipient's copy (including other BCC recipients). .  Trojan Horses: A Trojan Horses is a malicious program that appears to be friendly. printer) participating in a computer network. They are not technically viruses. the virus modifies the host so that it contains a copy of the virus. The last field is the top-level domain.  Top-level domain: Each part of a domain name contains certain information. For e.www.g.  Micro Viruses: A macro virus is designed to infect a specific type of document file. This technique creates the illusion that the virus has infected every program on the disk.  Caps Lock  Scroll Lock  Num Lock  Insert Modifier Keys .com – Commercial. It can refer to either cartoons on television.  Worms: A worm is a program whose purpose is to duplicate itself. Each keys perform different functions. Computer Viruses: A virus is a parasitic program that infects another legitimate program.g. the program causes the virus also to run . recipients listed in the BCC field receive a copy of the message.. computer. such as Microsoft Word or Microsoft Excel files.  Architecture: A design.  Stealth Viruses: These viruses take up residence in the computer’s memory. a free e-mail service provided by Microsoft which was established in 1995 was co . Because Trojan Horses do not make duplicates of themselves on the victim’s disk.  The Drafts folder retains copies of messages that you have started but are not yet ready to send.gradestack. For e. . hardware or software or to a combination of Now get GK updates.g. that is found.  Cluster viruses: If any program is run from the infected disk.  Antivirus: Program A utility that searches a hard disk  Animation: A simulation of movement created by for viruses and removes any. Commonly Used Computer Terms  Abort: To stop a program or function before it has  ANSI: American National Standards Institute. a form of soft key.g. Important Key in a Keyboard Toggle keys. . expressed in bits per second (bps) or bytes per GUI Graphical User Interface. symbol. For example. Fax is short for  Bandwidth: The amount of data that can be Facsimile.  CD-ROM: Compact Disk-Read Only Memory.  Hertz: A unit of frequency that means Cycles per  Boot: The process of getting the computer started. It is used to define structure. more commands when selected with a mouse or other  Conventional Memory: The first 640K of electronic pointing device Memory (RAM) in a computer used to run OS and  IDE: Integrated Device Electronics. Internet can run on any operating system.  DOS: It stands for Disk Operating System. text.  Intel: The manufacturer of the most popular  Digitize To scan a piece of artwork in very fine detail microprocessors or CPUs. regardless of how the topics were originally arranged. internet uses TCP/IP protocols. where the computer stores a copy of frequently used  Hypertext: A method of presenting information so information for quick access.  Intranet: In the most general sense. A facility to send electronic variations of UNIX. This is a seven/eight bit code widely used in  Fax/Facsimile: A way of transmitting copies of computers for the transfer of data. and store it in a form that computer understands. Many marketed. user operating system. Second. An intranet does not covered sector to UV-Light. Intranet documents. together with expanded memory. quizzes and notifications on mobile . like. transmitted in a fixed amount of time. is equal to 1024 MB. for connecting hard drive to a computer. actually 1024bytes.  Extended Memory: Memory in addition to  Kilobyte (K.  HTML: Hyper Text Markup Language. The amount of  High Density: The amount of information a disk can memory it takes to store a single character. related problem is known as debugging. High Density disks hold more information than  Cache: A separate area of Primary Memory (RAM) Double Density disks. and VMS etc. a USA based work with another device or program. The moment they are needed rather than in advance. helps PCs to address increased amounts of data in  ASCII: American Standard Code for Information Inter memory.  Chip: A small piece of silicon containing thousands or appearance and placement of HTML elements millions of electrical elements. see also icon. graphics. printer and a computer are said to be compatible if  Icon: A graphical screen element that executes one or they can be connected to each other. documents over telephone lines. fonts. Also called an including. a private  End-User: The end user is the individual who uses corporate network that uses Internet technology the product after it has been fully developed and based software and TCP/IP protocol standards. fixing software drives are very common and relatively inexpensive. change. IDE hard  Debug: In computer related systems.  Intelligent: Printer Printer combining laser. it defines its broad outlines. research and educational  Dynamic: Refers to actions that take place at the computers as well as commercial networks. letter. and computers on  EDP: Electronic Data Processing. works visually and is based on the selection of actions  Bit: The smallest unit of information in computer using a mouse or a similar pointing device to click on system. distributing a company letter and for tasks as complex A type of ROM that can be programmed or as posting and updating technical support bulletins to reprogrammed usually by exposing a normally service personnel worldwide. KB) Approximately one thousand conventional memory used to run and manage characters.  Internet: The world's largest computer network that  DVD: Digital Versatile Disc or Digital Video Disc links many of the scientific. Now get GK updates. companies use intranets for tasks as simple as  EPROM: Erasable Programmable Read Only Memory. The architecture of a system applications. A user interface that second. other sites and many more details. either a "1” or a icons or to pick options from menus.  Byte: A byte is made up of 8 bits. access to search criteria and provides quick access to  CGA: Color Graphics Adapter. "0".www. This is a It has now evolved as a flexible software technology permanent storage device used to store large to create electronic books provides fast and flexible quantities of information that need not be changed. a multinational Company. (640x200 pixels) with color capability. up the operation of the hard disk.com/blogs hardware and software. a standard used applications. or punctuation structuring language used to describe Web and mark. It is a single computer and photocopying technology. several  E-Mail: Electronic Mail. This is meant to speed the user can view it in a non-sequential way. messages to another person on a computer network. A markup or  Character: A number. hold. hypertext links to Integrated Circuit (IC).  Compatible: The ability of one device or program to  IBM: International Business Machines. Windows NT.gradestack. always include permanent connection to Internet. Bit is short for binary digit. It is usually  Gigabyte: Abbreviated as GB. Low-resolution screen information in large documents. runs on batteries. such as a printer.  Upgrade: A new version of a software or hardware  Numeric keypad: The part of a keyboard that looks product designed to replace an older version of the like an adding machine.www. such as word hours. session  Multiprocessing: It refers to a computer system’s communications. for connecting a hard drive to a computer.  Multimedia: A computer system that combines text.com/blogs  LAN An acronym for local area network. Protocol is a set of communication protocols that may include stereo speakers as an output device. appear in the next version of the product. voice and video media.but slightly larger than a  Pixel: Short for "Picture Element". animation. A measure of document into a computer’s memory in digital form. Apple Macintosh has been in use since follow when transmitting and receiving data.  SCSI: Small Computer System Interface. A system of  Pentium: The fifth generation of microprocessors. the faster a computer can work. companion chip designed to perform complex  Runtime: Error An error that occurs during the calculations. quizzes and notifications on mobile . of commands. accounting and Email.  Parallel Port: An outlet on a computer used to attach usually related to managing system resources.576 bytes. A serial port sends data  MIPS: Million Instructions Per Seconds. A Pixel is the notebook computer.  Resolution: The size and quantity of dots that make  Math co-processor: Part of the microprocessor. small modems. TCP/IP is supported by a large number of time. defines the format.  Service Pack: It is an update to a software version  Mother Board: The main circuit board of a computer. a unit for (bits) down the wire one at a time (in a series).  Megahertz (MHz): A measure of processing speed. palmtop. processing. without requiring manual keying. cooperatively process information and share  Peripheral: Any piece of hardware attached to the resources. sequence and error  Macro: A symbol. Protocol late eighties. briefcase.  Protocol: In networking and communications. the connected by wire so that individual users can fourth generation of microprocessors. usually located on the right  UPS: Uninterruptible Power Supply. actions or keystrokes. such as a bug or which carries electrical signals to and from various  provides enhancements to the product that will parts of the computer. A standard The higher the value. name. see also WAN. It is a power side of the keyboard. H/W and S/W vendors and is available on many  Nibble: Half a byte i. 4bits.048. a up a printed page. file transfer.  Utility: A program that performs a very specific task. PCs that are located relatively near to each other and The Pentium is 2 to 3 times faster than the 80486. outside of a computer. device.  LED: Light Emitting Diode. the  Macintosh: A PC based on a Motorola microprocessor formal specification that defines the procedures to employing GUI. computer systems. encompass media access. with 10 digits and same product. In the categories of portable  Light Pen: An input device that allows a user to write computers are laptop. a device.e.  Megabyte (M. based computer. such as a PDA. packet transport. such as a modem. timing. mathematical operators. music. that fixes an existing problem. actually 1. notebook. and terminal ability to support more than one process at the same emulation. smallest dot the computer can control on the screen.gradestack. A parallel port sends data (bits) down the wire side by side (parallel to each other). measuring the speed of a computer. Now get GK updates. screen or scanned image. usually used when the problem is hardware related.  Non-Volatile Memory: This is data storage that does  Troubleshoot: To isolate the source of a problem and not lose its contents on power off. approximately 8½ by 11 inches. or key that represents a list checking used on the network. An electronic device that  Portable computer: A small computer that usually lights up when electricity is passed through it. supply that includes a battery to maintain power in  Office-Automation: The use of computer systems to the event of a power cut for several minutes to some execute a variety of office operations. It is also called multitasking. that fits inside a  UNIX: A multi user operating system. Examples are printers and  Laptop Computer: A portable computer. from PCs to mainframes. fix it. memory or storage. ROM.  TCP/IP: Transmission Control Protocol / Internet graphics. MB): Approximately one million  Scanner: An input device used to copy a printed characters. In case of computer systems.  Microprocessor: A single chip containing all the  Serial Port: An outlet on a computer used to attach a elements of a computer's CPU. e-mail. for example. execution of a program. sub-notebook and on or point to a special pad or the screen of a pen. troubleshoot is  Notebook Computer: A portable computer. enough to be held on a lap. CPU B. mice. China’s New Fourth Generation Aircraft A. None of these Ans: (D) The control unit (CU) is a component of a Ans: (C) Except Printer (Output device) all are computer's central processing unit (CPU) that examples of input devices (keyboards. Paste great speed and memory. the first Systems around. First Generation B. Fourth Generation D. It tells the scanners). magnetic drums for memory and were often 7. the clipboard Ans: (C) A supercomputer is a computer with C. Single transistor could processing system such as a computer or replace 1000 vacuum tubes and a single IC chip information appliance.www. Optical scanners. None of these all its power into executing a few programs as fast Ans (B) A special file or memory area where data is as possible. Who among the following is the odd one______? A. taking up entire rooms. None of these E. Copying data saves in A. None of these A. Now get GK updates. input 9. Examples of input devices replaced 1000s of transistors made computers include keyboards. A. Mainframe E. OCR 3. 2nd gen Ans: (C) Microsoft manufactures a variety of C. Voice recognition device C. Digital computer Processors. Microsoft D.gradestack. Core Processors computer? D. Printer D. Vacuum Tube is the invention ……generation. IBM B. Supercomputer channels E. C. Which of these is a not a computer manufacturer? location is called clipboard. 1st generation B. ____ is responsible for overall control and co. 4th gen D. ordination of instruction execution. and joysticks. quizzes and notifications on mobile . None of these Windows is one of the most popular Operating Ans: (A) In first Generation (1940-1956). OCR 4. None of these computer Ans: (C) Skylake is Intel’s Sixth generation Core C. digital cameras. It however does not manufacture computers used vacuum tubes for circuitry and computers. COM (Computer Output to Microfilm) C. the desktop B. stored temporarily before being copied to another 6. mouse. What is Skylake? and output devices how to respond to a program's A. Third Generation D. Which of the following is the fastest type of C. Upcoming James Bond’s Movie 5. The computer size was very large in ____. NASA’s new mission instructions. None of these Ans: (A) First generation computers used 1000s Ans: (D) An input device is a peripheral used to of vacuum tubes that required lot of space made provide data and control signals to an information them gigantic in size. Second Generation C. Which of the following is not an input device? enormous. Control Unit C. Mouse B. 5th gen software programs and its Operating System E.com/blogs Some expected and important questions of Computer Awareness for upcoming examinations Computer Questions 1. B. B. Optical scanners A. E. Minicomputer B. Keyboard E. Scanner C. 8. None of these E. Apple clipboard. The copy command saves to: E. ALU A. Microsoft Word D. smaller and more speedy. Sun 2. computer's memory. RAM D. directs operation of the processor. Voice recognition device. Supercomputer D. None of these A. arithmetic/logic unit . None of these off the power is known as_____. 12. Mouse. Which of the following command is used to processing of large volumes of cheques. 11. C. Restart computers power is switched off. Sleep D. Non-Corrupted 19. What you see is what you get Charles Babbage. are known as______. Which is not a storage device? 15. Delete B. Hardware D. delete all the files as well as sub-directories of a A. Hard disk D. ASCII B. Move Ans: (C) Magnetic Ink Character Recognition E. Print E. encoding used mainly on IBM mainframe and IBM Mouse cannot be shared. None of Code is a character-recognition technology used Ans: (C) Deltree command is used to delete all the mainly by the banking industry to ease the files as well as sub-directories of a directory. PageMaker B. Deltree D. Printer B. Preview B. None new drivers? Ans (B) Non-volatile keeps memory when the A. Floppy Disk A. None of these power. computing was developed by IBM Corporation? 20. Photo Image Ans (A) Storage device is a piece of computer E. George Bool C. A Printer is the External device that communicates vector graphics editor is a computer program that with another digital device to print what a user allows users to compose and edit vector graphics sees on a screen. Ans: (B) Restart is suitable after you install new 14. Ans: (B) WYSIWYG is an acronym for "What you A. C. CD and edit images is? C. None of these Ans: (C) The most common hardware components Ans (C) The Analytical Engine was a proposed are Monitor. CPU etc. images interactively on a computer. Mouse E. None of these Ans: (C) Extended Binary Coded Decimal Ans (D) Mouse is a pointing device that detects Interchange Code (EBCDIC) is an 8-bit character two-dimensional motion relative to a surface. quizzes and notifications on mobile . Hibernate everything in RAM when the computer loose E. processing and clearance of cheques and other 17. Blaise Pascal B. Volatile see is what you get". OMR directory? C. Shut Down B. Bar code A. Which of the following cannot be shared? A. Non-Volatile D. Corrupted B. midrange computer operating systems.com/blogs 10. In DOS. EBCDIC Code D. Who invented Analytical engine? A. Dr. MICR D. ____ ___technologies is used by banks for faster 16. mechanical general-purpose computer designed 18. Hollerith Code A. Printer B. Software B. Physical components that make up your computer documents. Baudot Code C. Scanner C.gradestack. None of these E. An image editing software in which we can draw A. Coral Draw D. Web Browsers C. MS-Paint E. OCR B. DVD C. Keyboard. Now get GK updates. None of these E. Front page equipment on which information can be stored. Which of the following code used in present day drivers. What you see is where you get 13. Volatile dumps C. But Ans: (C) Corel Draw is a vector graphics editor.www. Memory which forgets everything when you switch D.Word WYSIWYG stands for__________? by English mathematician and computer pioneer A. Operating Systems A. In MS. Charles Babbage D. None of these C. Plotter D. Del E. Herman Hollerith E. Which of the following is suitable after you install E. six mini dots D. None of these E. manipulate. the concept of microprogramming from the invented and developed by Philips. Blaise pascal E. V stands for_________. Gene Information systems processing and clearance of cheques and other E. video and other files. Magnetic Ink character Recognition 27. random access memory (RAM) to disk storage.that enables you to make Now get GK updates.com/blogs 21. C. Subscriber Identity Module A. John Mauchley B.www.024 gigabytes C. D. What is GIS stands for? E. Memory on the hard disk that the CPU uses an analyze. Toshiba realization that the Central Processing Unit of a and Panasonic in 1995. manage. None of these 22. Subscriber Trunk Dialling C. Link D. 1024 gigabyte 26. Station Identity Module speed ROM. William Shockley D. Magnetic Ink Code Register Southampton. 25. B. Versatile A. Who among the following has coined The term E. Mc Graw Hills (GB). Host E. 1024 bits D.gradestack. Site B. A. None of these ‘Multimedia‘ ? Ans (D) A terabyte (TB) is a measure of computer A. D. Volatile C. Genetics Information Systems (MICR) is a character-recognition technology used C. computer could be controlled by a miniature. Maurice Wilkies was developed disc) is a digital optical disc storage format. Bob Goldstein B. Magnetic Ink cases Reader A. None of these E. five mini dots D. three mini dots E. 29. Maurice Wilkies C. 1025 byte B. 24. Automatic storage allocation A. Sony. including Web pages. Magnetic Ink character Register and artist Bob Goldstein to promote the July 1966 B. and present all types of spatial or extended RAM geographical data. Tay Vaughan storage capacity approximately 1. store. None of these Ans (C) A Subscriber Identity Module card is a portable memory chip. None of these Ans (B) DVD (digital versatile disc or digital video An (B) In 1951. What is the full form of SIM? highly specialised computer program in high- A. A terabyte comprises_______. Geological Information System Ans: (D) Magnetic Ink Character Recognition B. Magnetic Ink Code Reader opening of his "LightWorks at L'Oursin" show at C. None of these documents. images. quizzes and notifications on mobile . C. 1024 byte you get the subscriber's Network. NASA D. where A. Both A and B D. Virtual memory is________? a system designed to capture. phone calls from any corner of the Globe. None of these operating system (OS) that allows a computer to Ans (D) A browser is a software application used compensate for shortages of physical memory by to locate. two mini dots B. Access the page table 28. What does MICR stand for? Ans (A) The term multimedia was coined by singer A. Browser Ans (A) Virtual memory is a feature of an E. Geographic Information Systems mainly by the banking industry to ease the D. Long Island. retrieve and display content on the temporarily transferring pages of data from World Wide Web. E. Ans (C) A geographic information system (GIS) is 23. In DVD. A ______is a software program used to view Web C. On color monitor each pixel is composed of _____. CPU generates a physical address pages. System Identity Module 30. Video B. B. Micro-programming introduced by_______? A. None of these C. To save an existing file with new name at a new C. Task bar Ans (D) An operating system is system software E. Hibernation B. current saved version. such a start menu. alt+ p _____. Save B. The shutdown location we should use_______command. clock. a blue and a green paste it in a document. E. Fax machines are used to send documents through D. each pixel is actually 35. ctrl+z D. windows 8. Modems D. New file Ans (C) When electronic devices are receiving E. ctrl+ s. Numeric entries Ans (A) We can use ctrl+c to copy selected text and C. You can use ____to copy selected text and ______ to composed of three dots a red. _______ is when the more power-hungry components. None of these C. ctrl+a A. Power down 34. Save as D. Numbers and formulae entered in a cell are called C. applications are running on the device as well as 38. procedure A. shift+ c. Fellers 36.1 are known as device. ctrl+ c. they are in standby Ans (C) Choosing "Save As" brings up a prompt to mode. None of these power but are not running. quizzes and notifications on mobile . ctrl+p 31. Modems Ans (B) MS word can check the text for C. the word gets Ans (A) Fax is the telephonic transmission of underlined with a red color line indicating the scanned printed material normally to a telephone error. ctrl+ v B. Save and replace E. Telephone line B. A. It shows which programs or computer programs.www.gradestack. spreadsheet interprets the data as being numbers. None of these that manages computer hardware and software Ans (D) A taskbar is an element of a graphical resources and provides common services for user interface. Just small amount of current called a "trickle charge" be sure to rename the file something new when that keeps the current state of running software you choose "Save As" or you will overwrite the saved in the computer's RAM. notification area and idle. E. C. None of these there is a spelling mistake. Labels B. Recycle bin E. A. Is a verb a? E. None of these A. Windows xp. Date and time are available on the desktop A. C. Is too long for the line of text which makes the use of mathematical formulas on B.com/blogs Ans (D) On color monitors.By default the data recognized as spelt incorrectly being numbers will be right justified in the cell. A computer in standby mode requires a save your work as a file with a different name. Keyboard B. ctrl+d . Operating system A. Standby mode D. None of these C. Is not appropriate for that particular sentence 32. windows 7. ctrl+c. Co-axial wire D. Now get GK updates. If E. Text ctrl+v to paste it to the document. number connected to a printer or other output 37. All of these correctness and allows you to make amends. My computer D. what? 33. A red wavy line under a word indicates that the Ans (B) When entering numbers in a cell the word_______. one. Processors B. Intersection D. provide links or shortcuts to other programs or such as the monitor and the hard drive are put in places. Domain names at_________. A. Is not in the dictionary file and therefore might be the data possible. Debugger 46.com/blogs 39. For a A. a database scheme typically 0 and 1. C. Google chrome A. glass threads. Scanner E. is a 40. Ans (C) A binary number is a number expressed in 49. a RDBMS numeric values using two different symbols. Flat cables B. Optic fiber cable D. 11101 B. Coaxial cable E. C. Mega Bit B. Run Time Gross Settlement system assembled under the model of free and D. 10 computer monitor. quizzes and notifications on mobile . Word processing waves. Intel 8085 B. 1001 used for storing. Keyboard C. Surgeon D. 16 D. C. MySQL is_____? the binary numeral system which represents A. Cellar A. IT Expert B. Which of the following cables can transmit data at A. Mozilla D. None of these Ans (B) MySQL is a relational database management system (RDBMS). 2 B. a relational model D. Application Debugger where transfer of money or securities takes place C. Real Time General Settlement Ans (A) Linux is a Unix-like computer operating C. Niche B.www. Micro Bytes E. graphics that it has recently opened? 42. C. None "gross" basis. None of these required. Which of the following is an operating system? numeral system made up of 16 symbols (base 16). Ans (C) The hexadecimal numeral system. or more locations to communicate by simultaneous 45. What does the computer abbreviation MB used for? speakers and a ______ attached to your computer. Twisted pair cable Ans (C) Images are often stored in a cache so the E. E. extracting and E. Watson? systems are specialist funds transfer systems A. Regular Time General Settlement open-source software development and E. Ans (B) Dr. transmitting messages modulated onto light A. What is the base of hexadecimal number system? two-way video and audio transmissions. Desktop A. Mouse B. It was the world's Now get GK updates. Which of the following is not a binary number? E. None of these distribution. A. Ans (A) Real-time gross settlement (RTGS) 41. What is Dr. Light pen Ans (C) The megabyte is a multiple of the unit Ans (C) Video-conferencing is a set of byte for digital information. 10010 searching for information within a database. 110 Ans (A) Database software tools are primarily C.gradestack. Cache D. Presentation graphics 43. each of which is capable of 48. Project management D. Oracle is an example of ______ application software. What is the name given to the temporary storage included with the Microsoft Windows operating area that a web browser uses to store pages and system. Webspace high speeds? C. Million Bit C. RTGS stand for_____. projector is E. Operating system from one bank to another on a "real time" and on E. Database B. Million Bytes A. 8 videoconferencing system video camera. A. Video camera D. Watson is an application debugger 47. Linux B. None of these C. UTP cable next time you request for that image it is obtained Ans (C) A fiber optic cable consists of a bundle of locally rather than from the website. Real Time Gross Settlement E. 233 D. modifying. Its recommended unit telecommunication technologies which allow two symbol is MB. television. a hierarchical model B. Video–conferencing requires a microphone. Mega Bytes D. 44. 4 bits B. Configuration B. 16 bits E. None of these Ans (A) In computing. Prof Jhon Kemeny that manages computer hardware and software C. It is a name and password. What is the meaning of OSI. MAC(OS) D. Video Card B. as________. Ctrl+A B. Primary key is a ______? A.COBOL are the computer E.com/blogs second most widely used RDBMS and the most 55. unique identifier. Bill Gates E. A relational database must always A. Accessibility A. DBMS underlying internal structure and technology. C. APPLE A.www.gradestack. Alt+F5 have one and only one primary key. 50. UNIX computing system without regard of their C. E. American computer scientist. Open Software Interconnection Ans (E) C. Sound Card Ans (A) FORTRAN is used for scientific & C. A. A. 56. Shift+A D. COBOL C. Which of the following is not an operating system? standardizes the communication functions of A. Thomas Kurtz D. C++ B. Output key E. Open System Interconnection E. None of these Ans (C) Authentication is the process of Ans (B) A primary key is a key in a relational identifying an individual. Ctrl+K 51. 8 bits C. such as a driver license number. 52. None of these commercial and PROLOG is a general purpose logic Ans (B) A sound card is used to generate sound programming language associated with artificial and provides audio output to external devices like intelligence and computational linguistics. Windows XP 59. Dennis Ritchie B. FORTRAN B. C B. Ctrl+H mathematically oriented languages used for Ans (A) For selecting entire document we use scientific problems? Ctrl+ A. Open Software Interrelation A. Ans (D) Operating system is a system software A. Java . Input key D. Now get GK updates. PROLOG music on your computer? E. quizzes and notifications on mobile . Common key B. LISP D. usually based on a login database that is unique for each record. 12 bits D. Verification of a Login name and password is known widely used open-source RDBMS. speakers and headphones. Authentication D. in terms of computers? programming language? A. None of these programming languages while Microsoft is an Ans (C) The Open Systems Interconnection (OSI) application software. Unique key C. COBOL 57. a nibble is a four-bit aggregation. Microsoft D. Joy Stick Engineering while COBOL is oriented language E. Logging in C. Open System Interrelation C. Which of the following is NOT a computer 58. Mouse D. Father of 'C' programming language_________. None resources and provides common services for Ans (A) Dennis Mac Alistair Ritchie was an computer programs. Which of the following computer language is a E. Java D. DOS B. Which of the following can be used to select the telephone number or vehicle identification entire document? number (VIN). C++. He created the C 54. Which of the following will you require to hear C. One nibble is equal to how many bits ? programming language. model is a conceptual model that characterizes and 53. None of these E. It is also known as half-byte. Ctrl D. A. cable E. Waiting Time Ans (B) An optical computer mouse uses only a E. Restore D. USB in data cables stands for? Ans (A) A power supply unit (PSU) converts mains A. Organization that allocates web addresses C. A router is connected to at the net. DSL D. 68. Ans (A) Time during which a job is processed by such as an array of photodiodes to detect movement the computer is Execution Time. Magnetic mouse D. Ans (B) Disk access times are measured in milliseconds. Any person browsing the net A. None of these E. Execution Time B. Unicode smart Bus B. Refresh E. To reload a web page. and power supply between E. Graphing Package used to supply the power. None of these personal computers universally use a switched- Ans (D) Universal Serial Bus (USB) is an industry mode power supply. Universal structural Bus AC to low-voltage regulated DC power for the C. ISDN A. starting point for exploring and searching the 67. press the _____button. Real Time D. Internet Explorer is a _____. seconds communication. Modern E. 61. ____ mouse uses laser rays for the movement of www. None of these 64. None of these light source. Disk access times are measured in ______? the cables. curser. None of these Ans (E) In general refresh is another way of saying Ans (B) Yahoo is one of the largest portals in the reload or updating what is being displayed in web world. Optical mouse computer is_____. B. Time during which a job is processed by the A. connectors and communications A. Programmable supply unit program that you use to surf the internet. often abbreviated as ms. A portal is a website intended to be a page. Placement supply unit common web browsers . Milliseconds protocols used in a bus for connection. Delay Time E. None of these C. None of these computers and electronic devices. minute B. standard developed in the mid-1990s that defines 69. Yahoo (www.yahoo.com) is a _________. Web Browser is a D. Redo B. E. the places where two or more networks connect. All the others can be used to access packets along networks.Routers are located at gateways. Website for Consumers 66. Now get GK updates. 62. Permanent supply unit Ans (A) Internet Explorer (IE) is the most C. relative to a surface. modem B. typically a laser and a light detector. C. Mechanical mouse B.www. You must install a (n) ____________ on a network if you the web? want to share a broadband Internet connection. router B. A.com/blogs 60. CPU C. quizzes and notifications on mobile . Unicode Serial Bus D.gradestack. Normal mouse A. 63. C. Which of the following is not a method of accessing 65. least two networks. Universal serial Bus internal components of a computer. node D. C. Power supply unit E. None of these Ans (D) CPU (central Processing Unit) is a part of Ans (A) A router is a device that forwards data the computer. modem C. Web Browser B. Super Computer E. News Reader D. Portal A. None of these B. Reload C. Hours D. Full form of PSU which is an internal component A. opcode subtractions directly and multiplication and C. File A. None of these and the operands provide the data on which the Ans (A) In 1642. None of these related webpages. E. Address distribution. __________are used to identify a user who returns to a Website. Cookies B. The search results are generally A. Google for retrieving. Web and open-source software development and E. IOS D. Linux 72.www. Creating a drawing to be performed. E. Live Hindustan D. Which one of the following is a search engine? E. Blaise Pascal has introduced_______________? Ans (A) An HTTP cookie is a small piece of data A. Jagran Ans (A) A web browser is a software application C. Ans (D) A web search engine is a software system 79. Petering an event B. C. Menu B. Calculator D. Narrating a store language instruction that specifies the operation C. Ans (B) Linux is a Unix-like computer operating A. is in many ways similar to writing a letter without 77. Field B. Web commerce B. Adobe Photoshop a webpage or type a keyword to display a list of E. Mail client web browser. typically served from a single web domain. A web ______consists of one or more Web pages Ans (C) M-commerce (mobile commerce) is the located on a Web server. difference engine browser while the user is browsing that website. None of these 74.gradestack. None of these typically in fixed number and sequence and typically indexed by serial numbers or identity Now get GK updates. Windows B. e. None of these 71. E. Plug-ins E.com/blogs 70. E. Mobile Purchase search engine results pages. Record 75. Ans (B) An opcode is the portion of a machine A. E. 76. None of these information resources on the World Wide Web. Beside the opcode itself. A. You can use the ______bar to type a URL and display C. quizzes and notifications on mobile . The _______specifies the operation to be performed E. None of these instructions usually specify the data they will Ans (C) Creating and sending an e-mail message process. When you purchase a product over a Mobile Phone.commerce presented in a line of results often referred to as C. object code D. Scripts D. Which of the following is Open Source Software? a stamp. Browser B. Adding machine B. Story D. Balise Pascal has introduced an operation is to be performed: adding machine that could perform additions and A. in form of operands. FTP client D. that is designed to search for information on the the transaction is called_____. Named collection of fields which represent a Ans (B) A web site is a set of related web pages complete unit of information is called______. Airtel B. m-commerce D. Sending an e-mail is similar to _________. Site wireless handheld devices such as cellular C. Title system (OS) assembled under the model of free C. buying and selling of goods and services through A. None of these A. Writing a letter D. None of these 80. Abacus sent from a website and stored in a user's web C. Search D. C. What is the name of the software that allows us to shows the current URL and accepts a typed URL browse through web pages called? that navigates the user to a chosen website in a A. presenting and traversing E. Table D. None of these C. World Wide Web. A. source code B. Hub B. ASPs Ans (B) A record is a collection of elements. Template telephone and personal digital assistants (PDAs). Messenger 73. Ans (E) The graphical control element address bar 78. program code divisions by repetition. Inbox B. UTP D. An example of a telecommunication device is Ans (B) An email attachment is a computer file a________. None of these The transmission speed ranges from 2 million Ans (A) The Domain Name System (DNS) is a bits per second to 10 billion bits per second. A. ISD A. Clipboard D. Now get GK updates. It C. Which is not an internet protocol? A. IP. Ans (A) WinZip is a program that lets you archive 83. HTTP. WAP D. Toolbar C. None of these 82. a computer into modulated electrical signal for A. FTP. HTTP C. Webcrawlers you have started but are not yet ready to send. Worksheet along with an e-mail message C. WinStyle D. quizzes and notifications on mobile . A __________ is a grid with labeled columns and rows. Microsoft demodulated by another modem at the receiver E. The _________folder retains copies of message that A. Modem D. None of these messages and destroys the contents Ans (B) An Excel worksheet is a single spreadsheet D. What is the slowest transmission medium? boundaries. E. FTP C. HTTP B. Fiber optic cable D. Twisted pair wire B. hierarchical distributed naming system for computers. Address Book uses another search engine's data to produce their Ans (C) A draft is simply an email message you own results from the Internet. RTP consists of copper wires that are twisted into pairs. Hits A. What kind of Protocol is used to provide Internet waiting to be sent. Programs that automatically submit your search and compress files so that you can store or request to several search engines simultaneously distribute them more efficiently. None of these domain names? Ans (A) Twisted pair wire is the most widely used A. POP. What is an e-mail attachment? called fields or members. The _________program compresses large files into a Ans (C) Modem is one that turns the digital data of smaller file. None of these Ans (C) WAP (Wireless Application Protocol) is a Ans (C) The Internet Protocol (IP) is the principal technical standard for accessing information over communications protocol in the Internet protocol a mobile wireless network. Drafts D. Printer sent along with it to the recipient. A receipt sent by the recipient 81. sent along with an email message. It’s not the same thing as an email 84. 88. DNS B. access from mobile? 89. C. The elements of records may also be 86. None of these C. services. haven’t yet sent. suite for relaying datagrams across network 85. are called________. MNS but slowest medium for telecommunication. Some protocols are TCP. or any resource connected to the Internet or a private network. None of these E. C.com/blogs numbers. None of above side to recover the digital data. One or more A. A list of CC and BCC recipients that contains cells organized by rows and columns. Sent Items Ans (A) Metasearch engine is a search tool that E. B. WinShrink transmission over telephone lines and C. A separate document from another program sent A. UDP.www. TCP/IP B. Spiders D. E. Outbox E. What kind of server converts IP addresses to E. Mouse files can be attached to any email message and be C. Coaxial cable SMTP. Scanner 87.gradestack. A. Dialog box B. UDP E. Metasearch engines B. Keyboard B. All of above 90. A malicious parasite that feeds off of you E. E. WinZip B. STP D. the Mozilla A. The POST is a built-in diagnostic followed by the ____ sign and the name of the e-mail program that checks your hardware to ensure that server that manages the user’s electronic post office everything is present and functioning properly. limited area such as a residence. Power On Self-Test E.gradestack. Now get GK updates.exe B. None of these program acting as an interpreter of some kind in Ans (C) The first thing that the BIOS does when it order to perform a specific task. RAM D. POST stands for_______. kick Ans (C) .com/blogs 91. A.pp t D. Client B. . the E. None of these Ans (D) If i click at B it makes the text Bold. What is the file extension of MS-Power point ? Foundation and its subsidiary. Italics and under lined D. Programs such as Mozilla Firefox that serve as E. RAM demodulates signals to decode the transmitted E. All of these E. Bold C. Platform 93. web browser developed by the Mozilla 99. school. Power On Self-Testing Ans (D) Command is a directive to a computer E. laboratory.start (a computer) and put it office and educational slide shows. Ans (A) The system catalogs are the place where a relational database management system stores schema metadata. Server B. into a state of readiness for operation. Mini-world C. A. Ans (C) A modem is a device that modulates A. Each ______ on a menu performs a specific action. . None of these information. quizzes and notifications on mobile . before the BIOS begins the actual boot. . Drives B. Modems D. Power One Self-Test C. . Start or restart the computer means ___. The information stored in the catalog is 95. An e-mail address typically consists of a user ID On Self-Test. Power On Selfie Test A. @ B.xls Corporation. Underlined A. Internet B. boot D. 96. box. A. E. C. Which of the following is a network in which C. None of these E.pst 94. None of these navigable windows into the Web are called__________. WAN user ID followed by @ sign and the name of the e- C. Record D. _______are devices used to transmit data over network that interconnects computers within a telecommunications lines. Data card signals to encode digital information and C. & D.www. A. boots the PC is to perform what is called the Power. Meta-data B. None of these D. Node D. called ________. 100. None of these often in the same building? Ans (A) An e-mail address typically consists of a A. 97. None of these popular presentation software commonly used for Ans (C) Boot means . Italics B. Command C. C. This device used to transmit data over Ans (C) Mozilla Firefox is a free and open-source telecommunication. * computers are located physically close together. LAN B. Drives bays or office building. Ans (A) A local area network (LAN) is a computer 98. None of these A.ppt is a file extension for a presentation C. Web browsers D. exit B. such as information about tables and columns and internal book keeping information. kick-start file format used by Microsoft PowerPoint. E. You click at B to make the text ________. ROM mail server that manages the user’s electronic post E. # 92. None of these office box. com/blogs Now get GK updates.www.gradestack. quizzes and notifications on mobile .
Copyright © 2024 DOKUMEN.SITE Inc.