3252computer Cracker Final
3252computer Cracker Final
Microsoft Office-:
Microsoft Office is an office suite of desktop applications, servers and services for the Microsoft Windows
and OS X operating systems. It was first announced by Bill Gates of Microsoft on August 1, 1988 at
COMDEX in Las Vegas.
MS Word : It is the word processing application that allows user to create documents and reposts.
Microsoft Word is a word processor developed by Microsoft. It is used for creating, editing, formatting,
storing, retrieving and printing of a text document. Microsoft Word's native file formats are denoted either
by a .doc or .docx file extension
MS Excel : It is a spreadsheet Application that allows users to develop spreadsheets and display data in
various tabular and visual formats.
MS Power Point : This is a presentation application that allows users to create multimedia presentations
for displaying information in a graphical format.
MS Access : It is a database application that stores information that can be manipulated, stored, and filtered
to meet users specific needs.
MS Outlook : It is a desktop information management application that includes tools like e-mail,
document management and calender scheduling.
Front Page : It is a web page editor application that allows users to create professional looking web pages
for the Internet.
Operating System
An Operating System, or OS, is a software program that enables the computer hardware to communicate and operate
with the computer software. Without a computer Operating System, a computer would be useless.
Basic functions of an operating system Operating system controls and coordinates the use of the hardware among the various applications
programs for various uses.
Operating system acts as resource allocator and manager. Since there are many possibly conflicting
requests for resources the operating system must decide which requests are allocated resources to operating
the computer system efficiently and fairly.
Operating system is control program which controls the user programs to prevent errors and improper use
of the computer. It is especially concerned with the operation and control of I/O devices.
Multiprogramming In multiprogramming more than one program reside in the main memory. When one
job is unable to execute because of I/O operation to complete , it switches to other program and allow that
program to run .The main motive of multiprogramming is to utilize the CPU efficiently.
Throughput number of processes that complete their execution per time unit.
Turnaround time amount of time to execute a particular process.
Waiting time amount of time a process has been waiting in the ready queue.
Response time amount of time it takes from when a request was submitted until the first response is
produced, not output (for time-sharing environment).
Difference between Hard and Soft real-time systems A hard real time system guarantees that critical tasks complete on time. This goal requires that all delays
in the system be bounded from the retrieval of the stored data to the time that it takes the operating system
to finish any request made of it.
A soft real time system where a critical real-time task gets priority over other tasks and retains that priority
until it completes. As in hard real time systems kernel delays need to be bounded
Windows-:
In 1983 Bill Gates announces Microsoft Window November 10 ,1983,
Microsoft Windows 1.0 is introduced in November 20,1985 and initially sold for $100.00
Networking
Hub- Broadcasts data from one port to all other ports in the network.
Repeater- Regenerates the input data which is subjected to attenuation.
Switch- Intelligent device which sends data to particular port.
Bridge-Same function as switch but much more primitive and has lesser ports.
Router-Connects all computers from a LAN to internet using same IP.
IEEE 802.11- WiFi standard- 802.11 b has speed of 11 Mbps, 802.11 g has a speed of 54 Mbps and 802.11
N uses multiple wireless signals and antennas and has speeds of over 100Mbps.
Gateway-Needed when 2 different network technologies are being used. Acts as translator.
Connecting Cables- RJ 11(Telephone Cable), RJ 45 (LAN Cable), Twisted pair cables(used in connecting
2 computers), Null Modem Cable(RS232) , Optial Fibre Cable(Gigabit Ethernet).
OSI Model - : OSI (Open Systems Interconnection) is reference model for how messages should be
transmitted between any two points in a telecommunication network. The purpose of the OSI reference
model is to guide vendors and developers so that the digital communication products and software
programs they create will interoperate.
TCP/IP Model -:The Transmission Control Protocol / Internet Protocol (TCP/IP) was created by the
Department of Defense (DoD) to make sure and protect data integrity, and also maintained communications
in the time of disastrous war. However, if designed and deployed properly according to standard, a TCP/IP
network can be a truly reliable and flexible one. Essentially, the Department of Defense (DoD) Model is a
reduced version of the OSI Reference Model. The DoD model based on four layers:
MAC address -: The address for a device as it is identified at the Media Access Control (MAC) layer in the
network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
Bandwidth -: Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited
range is called the bandwidth.
IP Address : A unique string of numbers separated by dot that identifies each computer using the Internet Protocol
to communicate over a network. The class range of IP address is given belowClass A - 0.0.0.0 - 127.255.255.255
Class B - 128.0.0.0 - 191.255.255.255
Class C - 192.0.0.0 - 223.255.255.255
Class D - 224.0.0.0 - 239.255.255.255
Class E - 240.0.0.0 - 247.255.255.255
Protocol A protocol is a set of rules that govern all aspects of information communication. Commonly protocol
list are given below:
SMTP - Simple Mail Transfer Protocol
HTTP - Hyper Text Transfer Protocol
SFTP - Secure File Transfer Protocol
TLS - Transport Layer Security
E6 - Ethernet globalization protocols
PPP - Point to Point Protocol
IMAP - Internet Message Access Protocol
IP- Internet Protocol
ARPANET- Advanced Research Projects Agency Network, ARPANET or ARPAnet began development
in 1966 by the United States ARPA. ARPANET was a Wide Area Network linking many Universities and research
centers, was first to use packet switching, and was the beginning of what we consider the Internet today. Some of the
reasons for creating ARPANET include making it easier for people to access computers, to improve computer
equipment, and to have a more effective communication method for the military.
Bookmark - When referring to the Internet or a browser, a bookmark or electronic bookmark is a method of saving
a web page's address. For example, with most browsers pressing Ctrl + D will bookmark the page you are viewing.
Web serverA Web server is a program that, using the client/server model and the World Wide Web's Hypertext Transfer
Protocol ( HTTP ), serves the files that form Web pages to Web users (whose computers contain HTTP clients that
Database Management SystemThree levels of data abstraction (3-tier Architecture)-: They are three levels of abstraction are given below,
1. Physical level: The lowest level of abstraction describes how data are stored.
2. Logical level: The next higher level of abstraction, describes what data are stored in database and what
relationship among those data.
3. View level: The highest level of abstraction describes only part of entire database.
Entity-: A real-world thing either animate or inanimate that can be easily identifiable and distinguishable.
Entity Set-: An entity set is a collection of similar types of entities. Entity set may contain entities with attribute
sharing similar values.
Partial Key :It is a set of attributes that can uniquely identify weak entities and that are related to same owner entity. It
is sometime called as Discriminator.
Alternate Key:All Candidate Keys excluding the Primary Key are known as Alternate Keys.
Artificial Key:If no obvious key, either stand alone or compound is available, then the last resort is to simply create a key,
by assigning a unique number to each record or occurrence. Then this is known as developing an artificial key.
Compound Key:If no single data element uniquely identifies occurrences within a construct, then combining multiple
elements to create a unique identifier for the construct is known as creating a compound key.
Natural Key:When one of the data elements stored within a construct is utilized as the primary key, then it is called the
natural key.
DDL (Data Definition Language)-:
A data base schema is specifies by a set of definitions expressed by a special language called DDL.
VDL (View Definition Language) -:
It specifies user views and their mappings to the conceptual schema.
SDL (Storage Definition Language)-:
This language is to specify the internal schema. This language may specify the mapping between two schemas.
Data Storage - Definition Language-:
The storage structures and access methods used by database system are specified by a set of definition in a
special type of DDL called data storage-definition language.
DML (Data Manipulation Language)This language that enable user to access or manipulate data as organized by appropriate data model. Procedural
DML or Low level: DML requires a user to specify what data are needed and how to get those data. Non-Procedural
DML or High level: DML requires a user to specify what data are needed without specifying how to get those data.
Durability in DBMSOnce the DBMS informs the user that a transaction has successfully completed, its effects should persist even if the
system crashes before all its changes are reflected on disk. This property is called durability.
OLAP-
New Technology -:
3G - 3G refers to the third generation of mobile telephony (that is, cellular) technology. The third generation, as
the name suggests, follows two earlier generations. The first generation (1G) began in the early 80's with
commercial deployment of Advanced Mobile Phone Service (AMPS) cellular networks. Early AMPS networks used
Frequency Division Multiplexing Access (FDMA) to carry analog voice over channels in the 800 MHz frequency
band. The second generation (2G) emerged in the 90's when mobile operators deployed two competing digital voice
standards. In North America, some operators adopted IS-95, which used Code Division Multiple Access (CDMA) to
multiplex up to 64 calls per channel in the 800 MHz band. Across the world, many operators adopted the Global
System for Mobile communication (GSM) standard, which used Time Division Multiple Access (TDMA) to
multiplex up to 8 calls per channel in the 900 and 1800 MHz bands. The International Telecommunications Union
(ITU) defined the third generation (3G) of mobile telephony standards IMT-2000 to facilitate growth, increase
bandwidth, and support more diverse applications. For example, GSM could deliver not only voice, but also circuitswitched data at speeds up to 14.4 Kbps. But to support mobile multimedia applications, 3G had to deliver packetswitched data with better spectral efficiency, at far greater speeds.
IPv6An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6
(IPv6) addressing scheme.
TrueNorthTrueNorth redefines what is possible in the field of brain-inspired computers, in terms of size, architecture,
efficiency, scalability, and design techniques.
Microsoft Windows 10-:
Microsoft has revealed that its latest operating system will be called Windows 10 skipping 'Windows 9' in an
apparent attempt to emphasise a shift in focus towards mobile devices and the Internet.
Supercomputer
Every six months, the Top500 organization reveals its list of the worlds fastest supercomputers. And for the past
few lists, theres been a lot of movement. In June 2011, it was Japans K supercomputer. In June 2012, it
was IBM s Sequoia. In November 2012, Cray took the lead with its Titan supercomputer. And now theres a new
fastest supercomputer the Chinese Tianhe-2. The Tianhe-2 was built by the National University of Defense
Technology in China. It is the successor to the Tianhe-1A supercomputer, which topped the list of worlds fastest
The Undo button on the quick access Toolbar allows you to cancel your recent commands or
actions.
A gigabyte represents approximately one billion memory locations.
Merging cells involves creating a single cell by combining two or more selected cells.
The horizontal and vertical lines on a worksheet are called gridlines
To delete an incorrect character in a document delete key to erase to the right of the insertion
point.
During the boot process, the BIOS looks for the system files.
Multitasking is the ability of an operating system to control the activities of multiple programs at the
same time.
The unique signal, generated by a device, that tells the operating system that it is in need of immediate
attention is called an- Interrupt.
The operating system controls access to the processor by assigning a slice of time to each task
requiring the processors attention.
The blocks of code, included in the operating system, that software applications interact with are known
as: Application programming interfaces (APIs).
MS-DOS is a command-driven operating system.
SRAM retains data as long as power is provided to the memory chip and need not be refreshed
periodically. SRAM stands for Static Random Access Memory.
The data on DRAM continues to move in and out of the memory as long as power is available and must be
continually refreshed to maintain the data. DRAM stands for Dynamic Random Access Memory.
Impact printers create an image by using some mechanism to physically press an inked ribbon against the
page, causing the ink to be deposited on the page in the shape desired. Examples of Impact Printers are
Character Printers and Dot Matrix Printers.
Non Impact Printers do not touch the paper when creating an image. Examples of Non - Impact
Printers are Inkjet printers, Laser printers, Solid ink printers, Dye- sublimation, Thermal wax printers,
Thermal auto chrome printers.
An Integrated Software is a single application that combines major features of several types of
application.
A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or
that is followed automatically
The Uniform Resource Locator, abbreviated as URL is a specific character string that constitutes a
reference to a resource. In most web browsers, the URL of a web page is displayed on top inside an address
bar. An example of a typical URL would be
10
" http://www.ibtindia.com".
An interrupt handler is a special numeric code that indicates the priority of a request.
A spooler is a program that coordinates the print jobs that are waiting to print.
Virtual memory is typically located on the hard drive.
The purpose of a swap (or page) file is to hold a programs data or instructions in virtual memory when it
cant fit in RAM.
The definition of thrashing is swapping data between virtual memory and RAM too frequently.
Verification of a login name and password is known as authentication.
The correct sequence of actions that takes place during the boot-up process?
Activate BIOS -> Perform POST -> Load operating system -> Check configuration settings
The BIOS stored on a ROM chip, is responsible for loading the operating system from its permanent
location on the hard drive into RAM.
The memory resident portion of the operating system is called the kernel.
The World Wide Web (abbreviated as WWW or W3, commonly known as the Web) is a system of
interlinked hypertext documents that are accessed via the Internet.
CC (Carbon Copy) in e mail indicates those who are to receive a copy of a message addressed primarily
to another. The list of CCed recipients is visible to all other recipients of the message.
An additional BCC (blind carbon copy) field is available for hidden notification; recipients listed in the
BCC field receive a copy of the message, but are not shown on any other recipient's copy (including other
BCC recipients)
power-on self-test (POST)
All of the following are TRUE regarding virtual memory 1. the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
2. this temporary storage is called the swap file (or page file).
3. virtual memory is physical space on the hard drive.
Using Windows Explorer, a plus (+) sign in front of a folder indicates the folder contains subfolders.
In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing
option is the Details view.
The primary purpose of software is to turn data into Information.
A directory within a directory is called-Sub Directory.
A compiler translates a program written in a high-level language into Machine language.
A programming language contains specific rules and words that express the logical steps of an algorithm.
The simultaneous processing of two or more programs by multiple processors is Multiprocessing.
The secret code that restricts entry to some programs-Password
Computers use the binary number system to store data and perform calculations.
Executing is the process of carrying out commands.
Softcopy is the intangible output, so then what is hardcopy - The printed output
An error in a computer program is called as- Bug
Backup is - Protecting data by copying it from the original source to a different destination.
In page preview mode-You can see all pages of your document
A collection of interrelated records is called Database
To move to the beginning of a line of text, press the Home key.
The term user interface refers toWhat the user sees on the screen and how they can interact with it.
Reusable optical storage will typically have the acronym-RW
Text in a column is generally aligned Left
In Excel, Charts are created using which option -Chart Wizard
The Mouse pointer becomes different shapes depending on the task you are performing.
MICR technology used for clearance of cheques by banks refers toMagnetic Ink Character
Recognition
11
12
13
The rectangular area of the screen that displays a program, data, and or information is a window
The process of a computer receiving information from a server on the internet is known as downloading
You can use the tab key to move a cursor across the screen, indent a paragraph.
A collection of related files is called record.
Storage that retains its data after the power is turned off is referred to as non-volatile storage.
Testing is the process of finding errors in software code.
Syntax contains specific rules and words that express the logical steps of an algorithm.
Changing an existing document is called the editing documentation
The windows key will launch the start buttons.
To move to the beginning of a line of text, press the home key.
Information travels between components on the motherboard through buses.
A tool bar contains buttons and menus that provide quick access to commonly used commands
One advantage of dial-up internet access is it utilizes existing telephone security
Protecting data by copying it from the original source is backup
In a relational database, table is a data structure that organizes the information about a single topic into
rows and columns .
When the pointer is positioned on a hyperlink it is shaped like a hand .
A compiler translates higher level programs into a machine language program, which is called object code
The ability to find an individual item in a file immediately Direct access .
Each box in a spread sheet is called a cell.
Network components are connected to the same cable in the bus topology.
Scanner will translate images of text, drawings and photos into digital form.
MS-DOS is a single user operating system
Ethernet is used for high speed telecommunications
FORTRAN is a scientific computer language
Connections to the internet using a phone line and a modem are called dial-up connections
Restarting a computer that is already on is referred to as warm booting
A cluster represents a group of sectors
Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
A goal of normalization is to minimize the number of redundancy
A proxy server is used to process client request for web pages
When data changes in multiple list and list are not updated, this causes data inconsistency
Granting an outside organization access to internet web pages is often implemented using a extranet
The code that relational database management systems use to perform their database task is refer to as SQL
Data integrity means that the data contained in the database is accurate and reliable
The IBM made the first electronic computer in 1953
Control panel is used for increasing and decreasing the speed of the cursor of mouse
The .mpeg is the format of a movie file
The memory address sent from the CPU to the main memory over a set of wires is called address bus
The enhanced keyboard contains 101 keys
Cache memory is a part of main memory
The central host computer or file server in a star network maintains control with its connecting devices
through polling
The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent
presentation combined is called multimedia
A technique for searching special databases, called data warehouses, looking for related information and
patterns is called data mining
Batch processing is a technique in which a number of similar items or transactions are processed in groups
or batches during a machine run
14
Important Abbreviations:
ALUArithmetic and Logical Unit
ANSIAmerican National Standards Institute
ARPANETAdvanced Research Projects Agency Network
ASCIIAmerican Standard Code for Information Interchange
ISCII Indian Standard Code for Information Interchange
ASPActive Server Pages
BASICBeginner's All-Purpose Symbolic Instruction Code
CDMACode Division Multiple Access
CD-RCD-Recordable
CD-RWCD-Rewritable
COBOLCommon Business-Oriented Language
DBMSDatabase Management System
DVDDigital Versatile Disc or Digital Video Disc
ENIACElectronic Numerical Integrator And Computer
EDSACElectronic Delay Storage Automatic Calculator
EDVACElectronic Discrete Variable Automatic Computer
EEPROMElectronically Erasable Programmable Read-Only Memory
EPROMErasable Programmable Read-Only Memory
FDDFloppy Disk Drive
GUIGraphical User Interface
HDHigh Density
HDDHard Disk Drive
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPsSecure Hypertext Transport Protocol
ISOInternational Organization for Standardization
ISPInternet Service Provider
KbKilobit
KBKilobyte
LCDLiquid Crystal Display
LIFOLast In First Out
MACMedia Access Control
MAPIMessaging Application Programming Interface
15
16