Computer Awareness Digest-2017 Final .pdf-53
Computer Awareness Digest-2017 Final .pdf-53
co
www.gradeup.co
This Digest is a complete docket of important fundamentals and basics of Computer Application. The Computer Awareness
Digest is relevant for all Banking and Insurance exams.
Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per the set of
instructions (known as programs) given on a set of data (input) to generate desired information (output ).
➢ Hardware: Hardware represents the physical and ➢ User: The computer operators are known as users.
tangible components of the computer.
➢ Software: Software is a set of electronic instructions ➢ Data: Consists of raw facts, which the computer stores
consisting of complex codes (Programs) that make the and reads in the form of numbers.
computer perform tasks.
Hardware :
✓ Speed
✓ Accuracy
✓ Storage and Retrieval
✓ Repeated Processing Capabilities
✓ Reliability
✓ Flexibility
✓ Low cost
Software
1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types of data
processing operations, stores data, intermediate results and instructions (program).It controls the operation of all parts
of computer.
✓ ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves mathematical calculation
or decision/logic, it passes the control to the second component, i.e., the arithmetic logic unit (ALU). The ALU includes a
group of registers - memory locations built directly into the CPU - that are used to hold data that are being processed by
the current instruction.
✓ Registers: The register is the smallest high-speed storage area in the CPU. All data must be represented in a register
before it can be processed.
✓ Control Unit: This unit controls the operations of all parts of computer but does not carry out any actual data processing
operations
✓ Random Access Memory (RAM): RAM is the internal ✓ Static Random Access Memory (SRAM): A type of
memory of the CPU for storing data, program and memory that is faster and less volatile than DRAM,
program result. It is read/write memory which stores but requires more power and is more expensive. The
data until the machine is working. As soon as the term static is derived from the fact that it does not
machine is switched off, data is erased. need to be refreshed like DRAM.
✓ RAM is volatile, i.e. data stored in it is lost when we ✓ Synchronous Dynamic Random Access Memory
switch off the computer or if there is a power failure. (SDRAM): A type of DRAM that can run at much
Hence a backup uninterruptible power system (UPS) higher clock speeds.
is often used with computers. RAM is small, both in ✓ Read Only Memory (ROM): The memory from which
terms of its physical size and in the amount of data it we can only read but can not write on it . This type of
can hold. memory is non-volatile. The information is stored
There are mainly three types of RAM available: permanently in such memories during manufacture. A
✓ Dynamic Random Access Memory (DRAM): A type ROM, stores such instructions that are required to
of physical memory used in most personal computers. start a computer. This operation is referred to as
The term dynamic indicates that the memory must be bootstrap.
constantly refreshed2 (reenergized) or it loses its
contents. This type of memory is more economical.
✓ MROM (Masked ROM): The very first ROMs ✓ PROM (Programmable Read only Memory):
were hard-wired devices that contained a pre- PROM is read-only memory that can be modified
programmed set of data or instructions. These only once by a user. The user buys a blank PROM
kinds of ROMs are known as masked ROMs which and enters the desired contents using a PROM
are inexpensive. program
www.gradeup.co
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the storage space in
computer where data is to be processed and instructions required for processing are stored. The memory is divided into
large number of small parts called cells. Each location or cell has a unique address which varies from zero to memory size
minus one.
Memory
Primary Memory Secondary Memory
Cache Memory Main Memory ➢ Magnetic Disk(HDD)
➢ Optical Disk (CD, DVD,BRD)
➢ Flash Memory(Memory card, Pen Drive)
Registers RAM ROM
SRAM DRAM PROM
EPROM
EEPROM
2. Secondary Storage (External Storage Devices) : Floppy diskettes, hard disk, tapes and optical disks come under the
category of external storage devices or ancillary storage devices. These devices are very sensitive to environmental
conditions (humidity and temperature) as well as to external magnetic fields and need to be stored carefully.
✓ Floppy Disk : Floppy disks are primarily used on PCs. Information on a floppy disk is recorded in the magnetized
states of particles of iron oxides evenly placed upon concentric circles known as tracks.
✓ Hard Disk: It is a non-removable enclosed magnetic disk included in most PCs. It contains a stack of metal platters,
each coated with iron oxide, that spin on a spindle and the entire unit is encased in a sealed chamber.
✓ Magnetic Tape: This is plastic tape, usually made of Mylar that is coated with iron oxide, thereby enabling the
introduction (writing); retention (memory) and reading of magnetically recorded information. The best use of tape
storage is for data that you do not use very often.
3. Peripherals: Peripheral devices are devices connected to the computer externally. If a peripheral device is
disconnected, the computer will still be able to work; only functions performed by this peripheral device will not be
available.
1. Input Devices (How to tell it what to do): This unit makes link between user and computer. The input devices
translate the information into the form understandable by computer.
➢ Keyboard- The most common and very popular ➢ Mouse- Mouse is the most popular pointing
input device which helps in inputting data to the device and cursor-control device having a small
computer palm size box with a round ball at its base which
senses the movement of mouse and sends
www.gradeup.co
Language Processors:
✓ Assembler: This language processor converts the program written in assembly language into machine language.
✓ Interpreter: This language processor converts a HLL(High Level Language) program into machine language by
converting and executing it line by line.
✓ Compiler:-It also converts the HLL program into machine language but the conversion manner is different. It converts
the entire HLL program in one go, and reports all the errors of the program along with the line numbers.
Classification of Computers:
Software
Software: software represents the set of programs that govern the operation of a computer system and make the hardware
run. There are two types of software
➢ System Software: The system software is collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself. System software are generally prepared by computer manufactures.
www.gradeup.co
System software serves as the interface between hardware and the end users. Examples: Operating
System, Compilers, Interpreter, Assembler etc.
➢ Application Software: It is the set of programs necessary to carry out operations for a specified application.
(A) Packages:-
Packages
Word Processing A package that process textual matter and creates
organized and flawless documents.
Spreadsheets An electronic spreadsheet is a program that
accepts data in a tabular form and allow users to
manipulate , calculate, analyze data in the desired
manner.
Database Management Systems DBMS is a package that can handle and manage
bulk of stored data.
Desktop Publishing Software Handles page layout by combining the functions of
a traditional typesetter and a layout artist.
Graphics, Multimedia and Presentation Application software that manipulates images is
applications known as Graphics software.
(B) Utilities: Utilities are those application programs that assists the computer by performing housekeeping functions like
backing up disk or scanning viruses etc.
Utilities
Text Editor Program is used for creating, editing text files.
Backup Utility Program facilities the backing-up of disk.
Compression Utility Large files can be compressed so that it takes less
storage area.
Disk Defragmentor It speeds up disk access by rearranging the files
and free space on your computer.
Antivirus Software It scans yours disk for viruses and removes them if
any virus is found.
(C) Customized Software: This type of software is tailor-made software according to a user’s requirements.
✓ Boot - When computer starts, the operating system is ✓ Warm Boot: - When you reset the computer that is
first loaded (as it is essential for running all other already ON.
programs), this process is known as booting. ✓ Motherboard - The motherboard serves as a single
✓ Cold Boot - When you turn the computer ON from an platform to connect all of the parts of a computer
OFF position. together. A motherboard connects CPU, memory, hard
drives, optical drives, video card, sound card, and
www.gradeup.co
other ports and expansion cards directly or via cables. ✓ De Multiplexer - It perform opposite
It can be considered as the backbone of a computer. function of Multiplexer. It has single input line and
✓ Combinational Circuit - It consist of AND,OR , multiple output line. n×2N .
NOT,NAND,NOR Gate. Output will depend on input and ✓ Decoder - It is use to convert one code system to
there is no time gap between input and output There anther like Binary to Octal digit or Binary to
are different type of combination circuit used for Hexadecimal digit.
different purpose. ✓ Adder - Adder is used to add bits. Adder is of two
✓ Multiplexer - It has multiple input and Single output. types - Half adder and full Adder.
Multiplexer may be of different type like 4 × 1 Half Adder is used to add two bits and full Adder is
MUX,8×1 MUX,16×1 MUX etc. used to add three bits.
✓ Encoder - It perform opposite function of Decoder;
Software categories
1. Freeware: Software which is completely costless. The producers of this software are either public institutions such as
universities or developers who do it for personal interest or advertisement or private company who do it for dumping
reasons.
2. Shareware: Software which is initially costless but after a certain period the user is asked to pay a fee or delete it. Or
software which has two versions a free one, but incomplete or with advertisement banners and a complete
advertisement free one for which the user must pay. The most common example is WinZip compression program.
3. Commercial: Software for which the user has to pay a license to use it .Common examples are Microsoft Windows
operating system and Microsoft word.
4. Private: Software uniquely built, under payment for a specific customer to fit his need. Only the customer may use it.
5. Open Source: Software may be modified by anyone, sometimes under certain restrictions. Open source software is also
freeware.
6. Proprietary: Software is distributed with the explicit with the explicit legal warning not to modify it and technically
locked to prevent other developers to see or modify its source.
Number System
When we type some letters or words, the computer translates them in numbers as computers can understand only numbers.
A computer can understand positional number system where there are only a few symbols called digits and these symbols
represent different values depending on the position they occupy in the number.
1. Decimal Number System: The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the
left of the decimal point represent units, tens, hundreds, thousands and so on.
2. Binary Number System: Uses two digits, 0 and 1, also called base 2 number system . Each position in a binary number
represents a 0 power of the base (2). Last position in a binary number represents a x power of the base (2).
3. Octal Number System: Uses eight digits, 0,1,2,3,4,5,6,7, also called base 8 number system, Each position in an octal
number represents a 0 power of the base (8).
4. Hexadecimal Number System: Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. Letters represents numbers
starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15. Also called base 16 number system .Each position in a
hexadecimal number represents a 0 power of the base (16).
DBMS
DBMS - DBMS is the acronym of Data Base Management System. DBMS is a collection of interrelated data and a set of
programs to access this data in a convenient and efficient way. It controls the organization, storage, retrieval, security and
integrity of data in a database.
www.gradeup.co
1. External view or User view/View Level: It is the highest level of data abstraction. This includes only those portions of
database of concern to a user or Application program. Each user has a different external view and it is described by means
of a scheme called external schema.
2. Conceptual view/Logical Level: All the database entities and the relationship among them are included. One conceptual
view represents the entire database called conceptual schema.
3. Internal view/Physical Level: It is the lowest level of abstraction, closest to the physical storage method. It describes
how the data is stored, what is the structure of data storage and the method of accessing these data. It is represented by
internal schema.
Keys in DBMS:
• Super key of an entity set is a set of one or more attributes whose values uniquely determine each entity.
• Candidate key of an entity set is a set of fields from which primary key can be selected. It is an attribute or a set of
attributes that can act as a primary key for a table to uniquely identify each record in a table.
• Primary key is a candidate key that is most appropriate to become main key of the table. It is a key that uniquely
identifies each record in the table
LOGIC GATES
Logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given
moment, every terminal is in one of the two binary conditions low (0) or high (1).
Note: There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, XNOR.
Networking
Network: A computer network is a set of computers connected together for the purpose of sharing resources. The most
common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.
Five components
➢ Local Area Network (LAN) - A local area network is relatively smaller and privately-owned network with the
maximum span of 10 km.
➢ Metropolitan Area Network (MAN) - MAN is defined for less than 50 Km and provides regional connectivity
within a campus or small geographical area.
➢ Wide Area Network (WAN): A wide Area Network (WAN) is a group Communication Technology provides no limit
of distance.
www.gradeup.co
Types of Network –
1. Point to Point Network: When a packet is sent from one router to another intermediate routers, the entire packet is
stored at each intermediate router, stored there till the output line is free and then forwarded. A subnet using this
principle is called point to point or packet switched network.
➢ Star: Each device has a dedicated point to point link only to a central controller, usually called a hub.
➢ Tree: A tree topology is a variation of a star.
➢ Ring: Each device has a dedicated point to point line configuration only with the two devices on either side of it.
➢ Bus: One long cable acts as a backbone to link all the devices in the network.
2. Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the machines on
the network.
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal
functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International Organization for Standardization (ISO).
➢ Application Layer: The application layer is the OSI layer closest to the end user, which means both the OSI
application layer and the user interact directly with the software application.
➢ Presentation Layer: The presentation layer establishes context between application-layer entities, in which the
application-layer entities may use different syntax and semantics if the presentation service provides a big mapping
between them.
➢ Session Layer: The session layer controls the dialogues (connections) between computers. It establishes, manages
and terminates the connections between the local and remote application.
➢ Transport Layer: The transport layer provides the functional and procedural means of transferring variable-length
data sequences from a source to a destination host via one or more networks, while maintaining the quality of
service functions.
➢ Network Layer: The network layer provides the functional and procedural means of transferring variable length
data sequences from one node to another connected to the same network.
➢ Data link Layer: The data link layer provides node-to-node data transfer -- a link between two directly connected
nodes. It detects and possibly corrects errors that may occur in the physical layer.
➢ Physical Layer: It defines the electrical and physical specifications of the data connection. It defines the
relationship between a device and a physical transmission medium.
Transmission Media
➢ Network Cables: Network cables are used to ➢ Repeaters: A repeater is an electronic device
connect computers. The most commonly used that receives a signal and retransmits it at a
cable is Category 5 cable RJ-45. higher level or higher power, or onto the other
➢ Distributors: A computer can be connected to side of an obstruction, so that the signal can cover
another one via a serial port but if we need to longer distances.
connect many computers to produce a network, ➢ Bridge: A bridge is a product that connects a local
this serial connection will not work. The solution area network (LAN) to another local area network
is to use a central body to which other computers, that uses the same protocol (for example,
printers, scanners etc. can be connected and then
Ethernet or token ring).
this body will manage or distribute network
traffic ➢ Routers: A router is a device that forwards data
packets along networks. A router is connected to
www.gradeup.co
Operating System
An Operating system is a program, which acts as an interface between a user and the hardware.
MS - Window
MS-Windows is a GUI based operating system. In Windows Operating system multiple applications can be simultaneously
run in different windows.
➢ In MS-Windows, the screen upon which icons, ➢ My computer is helpful for viewing the contents
windows, too are displayed is known as desktop. of a single folder or drive.
➢ An icon is a graphic symbol that represents a ➢ Windows Explorer is another way of seeing
window element like, file, folder, or shortcut. what is on your computer. Windows Explorer
➢ Loading up of operating system files into the shows the computer’s contents as a hierarchy.
computer’s memory in called booting up. ➢ File: A program or document stored on a disk.
➢ The taskbar is a bar, which is usually located at ➢ Toolbar: A set of button you click to perform
the bottom of the screen. common tasks.
www.gradeup.co
➢ A folder is a location in which you can store files ➢ To create a shortcut to a file,
and other folders. firstly select the file or folder, whose shortcut is to
➢ To create a new folder, File—New—Folder be created. Then drag the file icon through right
commands are clicked in My Computer windows. mouse button to desired location where shortcut
➢ To find files or folders, Start---Find---Files or to be placed, and then select create shortcut(s).
Folder commands are clicked. ➢ To shut down the computer, Start—Shut Down
commands are clicked.
MS-Word
Key points related to MS Word -
1. A word processor is a package that processes textual header and footer can be created and formatted using
matter and creates organized and flawless Header and Footer option of the view menu.
documents. 9. In word, the document can either be printed through
2. The world processor offers very useful features like print button of standard toolbar or through the Print
speed, powerful editing and formatting features, option of File menu. The help is available in Word
permanent storage, Graphics, object linking and through the Help menu.
embedding, spell check and mail merge etc. 10. In word, spelling and grammar can be checked either
3. The word processor automatically fits the typed text through the spelling and Grammar option of Tools
within the specified left and right margins. This menu.
feature is called word wrapping. 11. The Autocorrect feature of Word converts shorthand
4. Margins can be four type viz. left, right, top and into longer strings. You can create your own
bottom. Autocorrect entries by clicking to Autocorrect
5. The distance between text boundaries and page command to Tools menu.
margins is called indent. The indent can be positive, 12. Tables can be inserted in a Word document through
negative or hanging indent. Table button of Standard toolbar and can be
6. The text layout manipulated through the table drop menu.
7. In Word, paragraphs can be formatted through 13. In MS-Word, the mail merge involves two files –
Paragraph option of Format menu and the borders Main document and data source file to produce the
can be applied through Borders and shading option of merged document. The main document and data
Format menu. source can handled through Mail Merge option of
8. The page formatting in Word can be controlled Tools menu.
through Page Setup … option of File menu. The
MS-EXCEL
Key points related to MS Excel -
1. A spreadsheet is a software tool that lets one enter, 14. To insert cells, rows or columns in worksheet, use
calculate, manipulate and analyze set of numbers. Insert---Cells----, Insert-----Rows or Insert-----
2. A Worksheet is a grid of cells made up of horizontal Column command respectively.
rows and vertical columns. 15. General arrangement of data is known as formatting.
3. A workbook is a group of worksheets. 16. Formatting does not affect the actual cell value only
4. Three types of data can be entered in a worksheet (i) the appearance change.
number (ii) Text (iii) Formulas. 17. Formatting is performed in MS-Excel through options
5. Cell can be referenced in three ways (i) relative (ii) available in Format menu.
absolute (iii) mixed 18. Charts are the pictorial representation of worksheet
6. A cell can be edited either by overwriting or by data.
partially modifying the cell contents. 19. Various chart types in MS- Excel are area chart,
7. A range can select by using mouse or keyboard. column chart, bar chart, line chart, pie chart,
8. A range can be either through copy and paste XY(Scatter) chart.
operations or by dragging the fill handle. 20. Chart in MS-Excel saved in two ways : (i) embedded
9. A range can be moved either through cut and paste chart (ii) chart sheet
operations or by dragging the range border. 21. Embedded chart is a chart object that is placed on a
10. A range can be cleared through Edit--Clear command. worksheet and saved with that work sheet.
11. To erase everything from a worksheet, select all the 22. Chart sheet is a sheet in workbook that contains only
cells in the worksheet and then use Edit—Clear—All. a chart.
12. To save a workbook use File- Save command. 23. Charts are created using chart wizard.
13. To open a workbook use File—Open command.
PowerPoint
Key points related to PowerPoint -
1. The application software that can create professional 7. A presentation in PowerPoint can viewed in any of
looking visual aids is called Presentation Graphics these views: Normal, Outline, Slide, Slide Sorter,
Software. Slide Show and Notes Page View.
2. MS-PowerPoint can be started by clicking at Start— 8. To apply new design to slides, click either at Apply
Program---Microsoft PowerPoint. Design Template option of Common Tasks options of
3. A slide can contain one or more of these components: Formatting toolbar, or at Format Menu’s Apply Design
Titles, Graphs, Drawing objects, ClipArt and Template option or ever from the shortcut menu.
Pictures. 9. A color scheme is a combination of various colors
4. The slide components that are used for reference are: used for text and other presentation elements.
Handouts, Notes, Outlines. 10. A color scheme can be changed by clicking at Slide
5. A new presentation can be created through one of Color Scheme option of Format menu.
these methods:(i) Auto content Wizard (ii) Design 11. Background color can be changed by clicking at
Templates (iii) Sample Presentation and (iv) Blank Format----Background command or even through
Presentation slide’s shortcut menu.
6. A new side can be added by either clicking at 12. You can change text font and style by using Format---
Common Tasks options of Formatting toolbar and Font command.
then selecting New Slide option, by clicking at Insert 13. Header and Footer information can be viewed and
Menu’s New Slide option. changed by clicking at View---Header and Footer
option.
www.gradeup.co
14. The slide ---shorter view in useful for viewing the 16. While creating slide shows you can
slides in miniature forms and for rearranging them. add transitions to slides by using Slide Show --- Slide
15. Movies (Video) & Sound can be inserted by using Transition command.
Insert—Movies & Sounds command. 17. To add animation, you can use Slide Show-----Custom
Animation commands.
Internet
• The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/IP) to link several billion devices worldwide. It also known as “network of networks” that consists of millions of
private, public, academic, business, and government networks.
• The World Wide Web commonly known as the Web or www developed founded by Tim Berners – Lee in 1989, is a
system of interlinked hypertext documents that are accessed via the Internet. These multimedia pages are ever-
changing.
• A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing
information resources on the World Wide Web.
1. Menu bar: The menu bar, located at the very top of the screen, can be accessed using the mouse. Actions that are in
black can be performed, while actions that cannot be performed will be in gray or lightened.
2. Tool bar: The tool bar is located at the top of the browser; it contains navigational buttons for the Web. Basic functions
of these buttons include:
Command Function
Home Opens or returns to starting page
Back Takes you to the previous page
Forward Takes you to the next page
Print Prints current page
Stop Stops loading a page
Reload Refresh/redisplays current page
Search Accesses search engine
3. Location bar: The location bar, below the tool bar, is a box labelled "Location," "GoTo," or "Address." You can type in a
site's address, and press the Return or Enter key to open the site.
4. Status bar: The status bar is located at the very bottom of the browser window. You can watch the progress of a web
page download to determine if the host computer has been contacted and text and images are being downloaded.
5. Scroll bar: The scroll bar is the vertical bar located on the right of the browser window. You can scroll up and down a
web page by placing the cursor on the slider control and holding down the mouse button.
6. A website is a set of related web pages served from a single web domain.
7. The Uniform Resource Locator, abbreviated as URL is the Address for web sites. Most of them begin with http (Hyper
Text Transfer Protocol), followed by a colon and two slashes.. In most web browsers, the URL of a web page is displayed
on top inside an address bar. An example of a typical URL would be "http://www.gradestack.com".
8. A Home page, index page, or main page is a page on a website. A home page usually refers to:
9. A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is followed
automatically.
www.gradeup.co
10. Downloading means to receive data to a local system from a remote system, or to initiate such a data
transfer.
11. Uploading refers to the sending of data from a local system to a remote system such as a server or another client with
the intent that the remote system should store a copy of the data being transferred.
12. An email attachment is a computer file sent along with an email message. One or more files can be attached to any
email message, and be sent along with it to the recipient. The first email was sent by Ray Tomlinson to himself in 1971.
13. CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another.
The list of CCed recipients is visible to all other recipients of the message.
14. An additional BCC (blind carbon copy) field is available for hidden notification; recipients listed in the BCC field receive
a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients).
15. The Drafts folder retains copies of messages that you have started but are not yet ready to send.
16. Hotmail, a free e-mail service provided by Microsoft which was established in 1995 was co - founded by an Indian
American entrepreneur Sabeer Bhatia along with Jack Smith in July of 1996.
17. An Internet Protocol address (also known as an IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network. It acts as an identifier for a computer. It is a unique address for
every computer.
18. Top-level domain: Each part of a domain name contains certain information. The first field is the host name, identifying
a single computer or organization. The last field is the top-level domain, describing the type of organization and
occasionally country of origin associated with the address. For e.g. - .com – Commercial, .edu – Educational.
1. Toggle keys- toggle the input from a group of keys on a keyboard between two different input modes.
✓ Caps Lock ✓ Scroll Lock
✓ Num Lock ✓ Insert
2. Modifier Keys - In computing, a modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. For e.g.-
✓ Shift ✓ Ctrl
✓ Alt ✓ Fn
3. Function keys – A function key is a key on a computer or terminal keyboard which can be programmed so as to cause
an operating system command interpreter or application program to perform certain actions, a form of soft key. For e.g.
- F1 through F12 keys are known as function keys. Each key performs different functions.
Computer Viruses:
A virus is a parasitic program that infects another legitimate program, which is sometimes called the host. To infect the host
program, the virus modifies the host so that it contains a copy of the virus.
1. Boot sector viruses: A boot sector virus infects the boot record of a hard disk. The virus allows the actual boot sector
data to be read as through a normal start-up were occurring.
2. Cluster viruses: If any program is run from the infected disk, the program causes the virus also to run . This technique
creates the illusion that the virus has infected every program on the disk.
3. Worms: A worm is a program whose purpose is to duplicate itself.
4. Bombs: This type of virus hides on the user’s disk and waits for a specific event to occur before running.
5. Trojan Horses: A Trojan Horses is a malicious program that appears to be friendly. Because Trojan Horses do not make
duplicates of themselves on the victim’s disk. They are not technically viruses.
6. Stealth Viruses: These viruses take up residence in the computer’s memory, making them hard to detect.
7. Micro Viruses: A macro virus is designed to infect a specific type of document file, such as Microsoft Word or Microsoft
Excel files. These types of documents can include macros, which are small programs that execute commands.
www.gradeup.co
✓ Abort: To stop a program or function before it has ✓ DVD: Digital Versatile Disc or Digital Video Disc
finished. ✓ Dynamic: Refers to actions that take place at the
✓ Algorithm: A set of instructions that provides a moment they are needed rather than in advance.
solution to a given problem. ✓ EDP: Electronic Data Processing.
✓ Animation: A simulation of movement created by ✓ E-Mail: Electronic Mail. A facility to send electronic
displaying a series of pictures, or frames. For example, messages to another person on a computer network.
cartoons on television. ✓ End-User: The end user is the individual who uses
✓ ANSI: American National Standards Institute, a the product after it has been fully developed and
powerful industry association of USA, promoting marketed.
Programming language standards. ✓ EPROM: Erasable Programmable Read Only Memory.
✓ Antivirus: Program A utility that searches a hard disk A type of ROM that can be programmed or
for viruses and removes any, that is found. reprogrammed usually by exposing a normally
✓ Architecture: A design. It can refer to either covered sector to UV-Light.
hardware or software or to a combination of ✓ Extended Memory: Memory in addition to
hardware and software. The architecture of a system conventional memory used to run and manage
defines its broad outlines. applications; together with expanded memory, it
✓ ASCII: American Standard Code for Information helps PCs to address increased amounts of data in
Inter change. This is a seven/eight bit code widely memory.
used in computers for the transfer of data. ✓ Fax/Facsimile: A way of transmitting copies of
✓ Bandwidth: The amount of data that can be documents over telephone lines. Fax is short for
transmitted in a fixed amount of time. It is usually Facsimile.
expressed in bits per second (bps) or bytes per ✓ Gigabyte: Abbreviated as GB, is equal to 1024 MB.
second. GUI Graphical User Interface. A user interface that
✓ Bit: The smallest unit of information in computer works visually and is based on the selection of actions
system. Bit is short for binary digit; either a "1” or a using a mouse or a similar pointing device to click on
"0". icons or to pick options from menus; see also icon.
✓ Boot: The process of getting the computer started. ✓ Hertz: A unit of frequency that means Cycles per
✓ Byte: A byte is made up of 8 bits. The amount of Second.
memory it takes to store a single character. ✓ High Density: The amount of information a disk can
✓ Cache: A separate area of Primary Memory (RAM) hold. High Density disks hold more information than
where the computer stores a copy of frequently used Double Density disks.
information for quick access. This is meant to speed ✓ Hypertext: A method of presenting information so
up the operation of the hard disk. the user can view it in a non-sequential way,
✓ CD-ROM: Compact Disk-Read Only Memory. This is a regardless of how the topics were originally arranged.
permanent storage device used to store large It has now evolved as a flexible software technology
quantities of information that need not be changed. to create electronic books provides fast and flexible
✓ CGA: Color Graphics Adapter. Low-resolution screen access to search criteria and provides quick access to
(640x200 pixels) with color capability. information in large documents.
✓ Character: A number, letter, symbol, or punctuation ✓ HTML: Hyper Text Markup Language. A markup or
mark. structuring language used to describe Web and
✓ Chip: A small piece of silicon containing thousands or Intranet documents. It is used to define structure,
millions of electrical elements. Also called an appearance and placement of HTML elements
Integrated Circuit (IC). including, fonts, graphics, text, hypertext links to
✓ Compatible: The ability of one device or program to other sites and many more details.
work with another device or program. For example, a ✓ IBM: International Business Machines, a USA based
printer and a computer are said to be compatible if multinational Company.
they can be connected to each other. ✓ Icon: A graphical screen element that executes one or
✓ Conventional Memory: The first 640K of electronic more commands when selected with a mouse or other
Memory (RAM) in a computer used to run OS and pointing device
applications. ✓ IDE: Integrated Device Electronics, a standard used
✓ Debug: In computer related systems, fixing software for connecting hard drive to a computer. IDE hard
related problem is known as debugging. drives are very common and relatively inexpensive.
✓ Digitize To scan a piece of artwork in very fine detail ✓ Intel: The manufacturer of the most popular
and store it in a form that computer understands. microprocessors or CPUs.
✓ DOS: It stands for Disk Operating System. It is a single ✓ Intelligent: Printer combining laser, computer and
user operating system. photocopying technology.
www.gradeup.co
✓ Internet: The world's largest computer network that ✓ Notebook Computer: A portable
links many of the scientific, research and educational computer, approximately 8½ by 11 inches, that fits
computers as well as commercial networks. The inside a briefcase.
internet uses TCP/IP protocols, and computers on ✓ Numeric keypad: The part of a keyboard that looks
Internet can run on any operating system, like, several like an adding machine, with 10 digits and
variations of UNIX, Windows NT, and VMS etc. mathematical operators; usually located on the right
✓ Intranet: In the most general sense, a private side of the keyboard.
corporate network that uses Internet technology ✓ Office-Automation: The use of computer systems to
based software and TCP/IP protocol standards. Many execute a variety of office operations, such as word
companies use intranets for tasks as simple as processing, accounting and Email.
distributing a company letter and for tasks as complex ✓ Parallel Port: An outlet on a computer used to attach
as posting and updating technical support bulletins to a device, such as a printer. A parallel port sends data
service personnel worldwide. An intranet does not (bits) down the wire side by side (parallel to each
always include permanent connection to Internet. other).
✓ Kilobyte (KB) Approximately one thousand ✓ Pentium: The fifth generation of microprocessors.
characters; actually 1024bytes. The Pentium is 2 to 3 times faster than the 80486, the
✓ LAN An acronym for local area network. A system of fourth generation of microprocessors.
PCs that are located relatively near to each other and ✓ Peripheral: Any piece of hardware attached to the
connected by wire so that individual users can outside of a computer. Examples are printers and
cooperatively process information and share modems.
resources; see also WAN. ✓ Pixel: Short for "Picture Element". A Pixel is the
✓ Laptop Computer: A portable computer, small smallest dot the computer can control on the screen.
enough to be held on a lap,but slightly larger than a ✓ Portable computer: A small computer that usually
notebook computer. runs on batteries. In the categories of portable
✓ LED: Light Emitting Diode. An electronic device that computers are laptop, notebook, sub-notebook and
lights up when electricity is passed through it. palmtop.
✓ Light Pen: An input device that allows a user to write ✓ Protocol: In networking and communications, the
on or point to a special pad or the screen of a pen- formal specification that defines the procedures to
based computer, such as a PDA. follow when transmitting and receiving data. Protocol
✓ Macintosh: A PC based on a Motorola microprocessor defines the format, timing, sequence and error
employing GUI. Apple Macintosh has been in use since checking used on the network.
late eighties. ✓ Resolution: The size and quantity of dots that make
✓ Macro: A symbol, name, or key that represents a list up a printed page, screen or scanned image.
of commands, actions or keystrokes. ✓ Runtime: Error An error that occurs during the
✓ Math co-processor: Part of the microprocessor; a execution of a program.
companion chip designed to perform complex ✓ Scanner: An input device used to copy a printed
calculations. document into a computer’s memory in digital form,
✓ Megabyte (M, MB): Approximately one million without requiring manual keying.
characters; actually 1,048,576 bytes. A measure of ✓ SCSI: Small Computer System Interface. A standard
memory or storage. for connecting a hard drive to a computer.
✓ Megahertz (MHz): A measure of processing speed. ✓ Serial Port: An outlet on a computer used to attach a
The higher the value, the faster a computer can work. device, such as a modem. A serial port sends data
✓ Microprocessor: A single chip containing all the (bits) down the wire one at a time (in a series).
elements of a computer's CPU. ✓ Service Pack: It is an update to a software version
✓ MIPS: Million Instructions Per Seconds, a unit for that fixes an existing problem, such as a bug or
measuring the speed of a computer. ✓ provides enhancements to the product that will
✓ Mother Board: The main circuit board of a computer, appear in the next version of the product.
which carries electrical signals to and from various ✓ TCP/IP: Transmission Control Protocol / Internet
parts of the computer. Protocol is a set of communication protocols that
✓ Multimedia: A computer system that combines text, encompass media access, packet transport, session
graphics, animation, music, voice and video media; communications, file transfer, e-mail, and terminal
may include stereo speakers as an output device. emulation. TCP/IP is supported by a large number of
✓ Multiprocessing: It refers to a computer system’s H/W and S/W vendors and is available on many
ability to support more than one process at the same computer systems, from PCs to mainframes.
time. It is also called multitasking. ✓ Troubleshoot: To isolate the source of a problem and
✓ Nibble: Half a byte i.e. 4bits. fix it. In case of computer systems, troubleshoot is
✓ Non-Volatile Memory: This is data storage that does usually used when the problem is hardware related.
not lose its contents on power off; for example, ROM. ✓ UNIX: A multi user operating system.
www.gradeup.co
✓ Upgrade: A new version of a software or hardware the event of a power cut for several
product designed to replace an older version of the minutes to some hours.
same product. ✓ Utility: A program that performs a very specific task,
✓ UPS: Uninterruptible Power Supply. It is a power usually related to managing system resources.
supply that includes a battery to maintain power in
Some expected and important questions of Computer Awareness for upcoming examinations
11. ____ ___technologies is used by banks for faster processing 17. Physical components that make up
of large volumes of cheques. your computer are known as______.
A. OCR B. OMR C. MICR A. Software B. Operating Systems
D. Bar code E. None of these C. Hardware D. Web Browsers
Ans: C E. None of these
Magnetic Ink Character Recognition Code is a character- Ans: C
recognition technology used mainly by the banking The most common hardware components are Monitor,
industry to ease the processing and clearance of cheques Keyboard, Mouse, CPU etc.
and other documents. 18. In MS- Word WYSIWYG stands for__________?
12. Who invented Analytical engine? A. Preview B. What you see is what you get
A. Blaise Pascal B. George Bool C. What you see is where you get
C. Charles Babbage D. Dr. Herman Hollerith D. Print E. None of these
E. None of these Ans: B
Ans: C WYSIWYG is an acronym for "What you see is what you
The Analytical Engine was a proposed mechanical get".
general-purpose computer designed by English 19. Which of the following is suitable after you install new
mathematician and computer pioneer Charles Babbage. drivers?
13. Memory which forgets everything when you switch off the A. Shut Down B. Restart C. Sleep
power is known as_____. D. Hibernate E. None of these
A. Corrupted B. Volatile C. Non-Volatile Ans: B
D. Non-Corrupted E. None Restart is suitable after you install new drivers.
Ans: B 20. Which of the following cannot be shared?
Non-volatile keeps memory when the computers power is A. Printer B. Scanner C. Plotter
switched off. Volatile dumps everything in RAM when the D. Mouse E. None of these
computer loose power. Ans: D
14. Which of the following code used in present day Mouse is a pointing device that detects two-dimensional
computing was developed by IBM Corporation? motion relative to a surface. Mouse cannot be shared.
A. ASCII B. Hollerith Code 21. A terabyte comprises_______.
C. EBCDIC Code D. Baudot Code A. 1025 byte B. 1024 byte C. 1024 bits
E. None of these D. 1024 gigabyte E. None of these
Ans: C Ans: D
Extended Binary Coded Decimal Interchange Code A terabyte (TB) is a measure of computer storage
(EBCDIC) is an 8-bit character encoding used mainly on capacity approximately 1,024 gigabytes (GB).
IBM mainframe and IBM midrange computer operating 22. What does MICR stand for?
systems. A. Magnetic Ink character Register
15. An image editing software in which we can draw and edit B. Magnetic Ink Code Reader
images is? C. Magnetic Ink Code Register
A. PageMaker B. MS-Paint C. Coral Draw D. Magnetic Ink character Recognition
D. Photo Image E. Front page E. Magnetic Ink cases Reader
Ans: C Ans: D
Corel Draw is a vector graphics editor. A vector graphics Magnetic Ink Character Recognition (MICR) is a
editor is a computer program that allows users to character-recognition technology used mainly by the
compose and edit vector graphics images interactively on a banking industry to ease the processing and clearance of
computer. cheques and other documents.
16. In DOS, which of the following command is used to delete 23. Virtual memory is________?
all the files as well as sub-directories of a directory? A. Memory on the hard disk that the CPU uses an extended
A. Delete B. Del C. Deltree RAM
D. Move E. None of B. Access the page table
Ans: C C. CPU generates a physical address
Deltree command is used to delete all the files as well as D. Automatic storage allocation
sub-directories of a directory. E. None of these
Ans: A
www.gradeup.co
34. To save an existing file with new name at a new location 39. Video–conferencing requires a
we should use_______command . microphone, speakers and a ______ attached to your
A. Save B. Save and replace computer.
C. Save as D. New file A. Mouse B. Keyboard C. Video camera
E. None of these D. Scanner E. Light pen
Ans: C Ans: C
Choosing "Save As" brings up a prompt to save your work Video-conferencing is a set of telecommunication
as a file with a different name. Just be sure to rename the technologies which allow two or more locations to
file something new when you choose "Save As" or you communicate by simultaneous two-way video and audio
will overwrite the current saved version. transmissions. For a videoconferencing system video
35. You can use ____to copy selected text and ______ to paste it camera, computer monitor, television, projector are
in a document. required.
A. ctrl+c, ctrl+ v B. ctrl+ c, ctrl+p 40. Which of the following is an operating system?
C. ctrl+ s, ctrl+z D. shift+ c, alt+ p A. Linux B. Debugger C. Mozilla
E. ctrl+d , ctrl+a D. Google chrome E. Intel 8085
Ans: A Ans: A
We can use ctrl+c to copy selected text and ctrl+v to Linux is a Unix-like computer operating system
paste it to the document. assembled under the model of free and open-source
36. A red wavy line under a word indicates that the software development and distribution.
word_______. 41. What is Dr. Watson?
A. Is too long for the line of text A. IT Expert B. Application Debugger
B. Is not in the dictionary file and therefore might be spelt C. Surgeon D. Operating system
incorrectly E. None
C. Is not appropriate for that particular sentence Ans: B
D. Is a verb Dr. Watson is an application debugger included with the
E. None of these Microsoft Windows operating system.
Ans: B 42. Which of the following cables can transmit data at high
MS word can check the text for correctness and allows speeds?
you to make amends. If there is a spelling mistake, the A. Flat cables B. Coaxial cable
word gets underlined with a red color line indicating the C. Optic fiber cable D. Twisted pair cable
error. E. UTP cable
37. Windows xp, windows 7, windows 8.1 are known as what? Ans: C
A. Processors B. Domain names A fiber optic cable consists of a bundle of glass threads,
C. Modems D. Operating system each of which is capable of transmitting messages
E. None of these modulated onto light waves.
Ans: D 43. Which of the following is not a binary number?
An operating system is system software that manages A. 11101 B. 110 C. 233
computer hardware and software resources and provides D. 1001 E. 10010
common services for computer programs. Ans: C
38. _______ is when the more power-hungry components, such A binary number is a number expressed in the binary
as the monitor and the hard drive are put in idle. numeral system which represents numeric values using
A. Hibernation B. Power down two different symbols, typically 0 and 1.
C. Standby mode D. The shutdown procedure 44. What does the computer abbreviation MB used for?
E. None of these A. Mega Bit B. Million Bytes C. Mega Bytes
Ans: C D. Million Bit E. Micro Bytes
When electronic devices are receiving power but are not Ans: C
running, they are in standby mode. A computer in The megabyte is a multiple of the unit byte for digital
standby mode requires a small amount of current called a information. Its recommended unit symbol is MB.
"trickle charge" that keeps the current state of running
software saved in the computer's RAM.
www.gradeup.co
45. What is the base of hexadecimal number system? identification number (VIN). A
A. 2 B. 8 C. 16 relational database must always have one and only one
D. 10 E. None of these primary key.
Ans: C 51. Which of the following computer language is a
The hexadecimal numeral system, is a numeral system mathematically oriented languages used for scientific
made up of 16 symbols (base 16). problems?
46. RTGS stand for_____. A. FORTRAN B. COBOL C. LISP
A. Real Time Gross Settlement D. PROLOG E. APPLE
B. Real Time General Settlement Ans: A
C. Run Time gross Settlement FORTRAN is used for scientific & Engineering while
D. Regular Time General Settlement COBOL is oriented language commercial and PROLOG is a
E. None of these general-purpose logic programming language associated
Ans: A with artificial intelligence and computational linguistics.
Real-time gross settlement (RTGS) systems are specialist 52. Which of the following is NOT a computer programming
funds transfer systems where transfer of money or language?
securities takes place from one bank to another on a A. C B. C++ C. Java
"real time" and on "gross" basis. D. COBOL E. Microsoft
47. What is the name given to the temporary storage area that Ans: E
a web browser uses to store pages and graphics that it has C, C++, Java ,COBOL are the computer programming
recently opened? languages while Microsoft is an application software.
A. Niche B. Webspace C. Cache 53. Which of the following is not an operating system?
D. Cellar E. None of these A. DOS B. UNIX C. MAC(OS)
Ans: C D. DBMS E. Windows XP
Images are often stored in a cache so the next time you Ans: D
request for that image it is obtained locally rather than Operating system is a system software that manages
from the website. computer hardware and software resources and
48. Oracle is an example of ______ application software. provides common services for computer programs.
A. Database 54. One nibble is equal to how many bits ?
B. Word processing A. 4 bits B. 8 bits C. 12 bits
C. Project management D. 16 bits E. None of these
D. Presentation graphics Ans: A
E. Desktop In computing, a nibble is a four-bit aggregation. It is also
Ans: A known as half-byte.
Database software tools are primarily used for storing, 55. Verification of a Login name and password is known
modifying, extracting and searching for information as________.
within a database. A. Configuration B. Accessibility
49. MySQL is_____? C. Authentication D. Logging in
A. a hierarchical model B. a RDBMS E. None of these
C. a relational model D. a database scheme Ans: C
E. None of these Authentication is the process of identifying an
Ans: B individual, usually based on a login name and password.
MySQL is a relational database management system 56. Which of the following can be used to select the entire
(RDBMS). It was the world's second most widely used document?
RDBMS and the most widely used open-source RDBMS. A. Ctrl+A B. Alt+F5 C. Shift+A
50. Primary key is a ______? D. Ctrl+K E. Ctrl+H
A. Common key B. Unique key Ans: A
C. Input key D. Output key For selecting entire document we use Ctrl+ A.
E. None of these
Ans: B
A primary key is a key in a relational database that is
unique for each record. It is a unique identifier, such as a
driver license number, telephone number or vehicle
www.gradeup.co
Ans: D
91. POST stands for_______. Command is a directive to a computer program acting as
A. Power On Selfie Test B. Power One Self Test an interpreter of some kind in order to perform a specific
C. Power On Self Test D. Power On Self Testing task.
E. None of these
Ans: C 97. An e-mail address typically consists of a user ID followed
The first thing that the BIOS does when it boots the PC is to by the ____ sign and the name of the e-mail server that
perform what is called the Power-On Self-Test. The POST manages the user’s electronic post office box.
is a built-in diagnostic program that checks your hardware A. @ B. # C. &
to ensure that everything is present and functioning D. * E. None of these
properly, before the BIOS begins the actual boot. Ans: A
92. Which of the following is a network in which computers An e-mail address typically consists of a user ID followed
are located physically close together, often in the same by @ sign and the name of the e-mail server that manages
building? the user’s electronic post office box.
A. LAN B. WAN C. RAM 98. _______are devices used to transmit data over
D. ROM E. None of these telecommunications lines.
Ans: A A. Drives B. Drives bays C. Modems
A local area network (LAN) is a computer network that D. Platform E. None of these
interconnects computers within a limited area such as a Ans: C
residence, school, laboratory, or office building. A modem is a device that modulates signals to encode
93. Programs such as Mozilla Firefox that serve as navigable digital information and demodulates signals to decode
windows into the Web are called__________. the transmitted information. This device used to transmit
A. Internet B. Data card C. Web browsers data over telecommunication.
D. RAM E. None of these 99. What is the file extension of MS-Power point ?
Ans: C A. .exe B. .xls C. .ppt
Mozilla Firefox is a free and open-source web browser D. .pst E. None of these
developed by the Mozilla Foundation and its subsidiary, Ans: C
the Mozilla Corporation. .ppt is a file extension for a presentation file format used
94. Who invented the language ‘C ‘? by Microsoft PowerPoint, the popular presentation
A. Dennis M. Ritchie B. Niklaus Writh software commonly used for office and educational slide
C. Seymour Papert D. Donald Kunth shows.
E. None of these 100. The information stored in the catalog is called ________.
Ans: A A. Meta-data B. Mini-world
Dennis MacAlistair Ritchie was an American computer C. Record D. All of the above
scientist. He created the C programming language. E. None of these
95. You click at B to make the text ________. Ans: A
A. Italics B. Underlined The system catalogs are the place where a relational
C. Italics and under lined database management system stores schema metadata,
D. Bold such as information about tables and columns and
E. None of these internal book keeping information.
Ans: D
If i click at B it makes the text Bold.
96. Each ______ on a menu performs a specific action.
A. Client B. Server C. Node
D. Command E. None of these
www.gradeup.co
Computer Abbreviations
1. ADSL: Asymmetric Digital Subscriber Line 42. CGM: Computer Graphics Metafile
2. AGP: Accelerated Graphics Port 43. CIDR: Classless InterDomain Routing
3. AI: Artificial Intelligence 44. CIM: Computer Integrated Manufacture
4. ALGOL: Algorithmic Language 45. CISC: Complex Instruction Set Computers
5. ALU: Arithmetic Logic Unit 46. CIX: Commercial Internet Exchange
6. ANSI: American National Standards Institute 47. CLR: Common Language Runtime
7. API: Application Program Interface 48. CMOS: Complementary Metal Oxide Semiconductor
8. APIPA: Automatic Private Internet Protocol Addressing 49. CMS: Content Management System
9. APT: Automatically Programmed Tooling 50. CMYK: Cyan, Magenta, Yellow, Key (Black)
10. ARP: Address Resolution Protocol 51. COBOL: Common Business Oriented Language
11. ARPANET: Advanced Research Projects Agency 52. CORBA: Common Object Request Broker Architecture
Network 53. CPI: Clock Cycle Per Instruction
12. ASCII: American Standard Code For Information 54. CPU: Central Processing Unit
Interchange 55. CRC: Cyclic Redundancy Check
13. ASF: Advanced Streaming Format 56. CRM: Customer Relationship Management
14. ASP: Active Server Pages 57. CROM: Control Read Only Memory
15. ATAPI: Advanced Technology Attachment Packet 58. CRT: Cathode Ray Tube
Interface 59. CUI: Character User Interface
16. ATM: Asynchronous Transfer Mode 60. DAC: Digital To Analog Converter
17. AUI: Attachment Unit Interface 61. DAO: Data Access Objects
18. AVI: Audio Video Interleave 62. DARPANET: Defense Advanced Research Projects
19. BASIC: Beginner`s All Purpose Symbolic Instruction Agency Network
Code 63. DBA: Data Base Administrator
20. BCD: Binary Coded Decimal 64. DBMS: Data Base Management System
21. BDPS: Business Data Processing Systems 65. DCL: Data Control Language
22. BHTML: Broadcast Hyper Text Markup Language 66. DCP: Data Communication Processor
23. BIOS: Basic Input Output System 67. DDL: Data Definition Language
24. BIU: Bus Interface Unit 68. DDOS: Distributed Denial Of Service
25. BMP: Bitmap 69. DDP: Distributed Data Processing
26. BPS: Bytes Per Seconds 70. DFD: Data Flow Diagram
27. C-DAC: Centre For Development Of Advanced 71. DFS: Distributed File System
Computing 72. DHCP: Dynamic Host Control Protocol
28. CAD: Computer Aided Design 73. DHTML: Dynamics Hyper Text Markup Language
29. CADD: Computer Added Drafting And Design 74. DLC: Data Link Control
30. CAI: Computer Aided Instruction 75. DLL: Dynamic Link Library
31. CAM: Computer Aided Manufacturing 76. DMA: Direct Memory Access
32. CAR: Control Address Register 77. DML: Data Manipulation Language
33. CASE: Computer Aided Software Engineering 78. DMTF: Distributed Management Test Force
34. CCIS: Common Channel Interoffice Signaling 79. DNA: Distributed Internet Architecture
35. CCNA: Cisco Certified Network Associate 80. DNS: Domain Name System
36. CD: Compact Disc 81. DOM: Document Object Model
37. CD RW: Compact Disc ReWritable 82. DOS: Disk Operating System
38. CDMA: Code Division Multiple Access 83. DPI: Dots Per Inch
39. CDROM: Compact Disc Read Only Memory 84. DRAM: Dynamic Random Access Memory
40. CFG: Control Flow Graph 85. DSL: Digital Subscriber Line
41. CGI: Common Gateway Interface 86. DSN: Digital Subscriber Network
www.gradeup.co
X_________________________X________________________________X_____________________________________X