0% found this document useful (0 votes)
112 views

Computer Awareness Digest-2017 Final .pdf-53

This document provides an overview of basic computer concepts including hardware, software, and memory. It discusses: - The four main parts of a computer system: hardware, software, users, and data. Hardware is the physical components while software are instruction codes. - Common computer hardware components including the central processing unit (CPU), memory (RAM and ROM), and peripheral devices. The CPU consists of the arithmetic logic unit, control unit, and registers. - Different types of computer memory like cache memory, primary/main memory, and secondary memory which is used for permanent storage. - Input and output devices that allow interaction with the computer like keyboards, mice, printers and monitors.

Uploaded by

UMESH CHAUHAN
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views

Computer Awareness Digest-2017 Final .pdf-53

This document provides an overview of basic computer concepts including hardware, software, and memory. It discusses: - The four main parts of a computer system: hardware, software, users, and data. Hardware is the physical components while software are instruction codes. - Common computer hardware components including the central processing unit (CPU), memory (RAM and ROM), and peripheral devices. The CPU consists of the arithmetic logic unit, control unit, and registers. - Different types of computer memory like cache memory, primary/main memory, and secondary memory which is used for permanent storage. - Input and output devices that allow interaction with the computer like keyboards, mice, printers and monitors.

Uploaded by

UMESH CHAUHAN
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

www.gradeup.

co
www.gradeup.co

Computer Awareness Digest-2017


Dear readers,

This Digest is a complete docket of important fundamentals and basics of Computer Application. The Computer Awareness
Digest is relevant for all Banking and Insurance exams.

Basics & Fundamentals of Computer

Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per the set of
instructions (known as programs) given on a set of data (input) to generate desired information (output ).

A complete computer system consists of four parts:

➢ Hardware: Hardware represents the physical and ➢ User: The computer operators are known as users.
tangible components of the computer.

➢ Software: Software is a set of electronic instructions ➢ Data: Consists of raw facts, which the computer stores
consisting of complex codes (Programs) that make the and reads in the form of numbers.
computer perform tasks.

Hardware :

Input Devices Processing Devices Output Devices Storage Devices


Keyboard Mother board Monitor Magnetic Disk
Microphone Processor Printer Optical Disk
Mouse RAM Speaker Flash Memory
Web camera ROM Magnetic Tape
Touch Screen SMPS
Light Pen

The following features characterize this electronic machine:

✓ Speed
✓ Accuracy
✓ Storage and Retrieval
✓ Repeated Processing Capabilities
✓ Reliability
✓ Flexibility
✓ Low cost

Software

Utility Software Application Software System Software (OS)


Utility Text Single user Multi User
Tools
Customized Graphics DOS Unix
Software
Multimedia Mac-OS Windows Server
Language Windows xp,7,8.1
Accounting
www.gradeup.co

Computer hardware consists of the following components:

1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types of data
processing operations, stores data, intermediate results and instructions (program).It controls the operation of all parts
of computer.

Fig: The relationship between different hardware components

[A] CPU itself has following three components:

✓ ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves mathematical calculation
or decision/logic, it passes the control to the second component, i.e., the arithmetic logic unit (ALU). The ALU includes a
group of registers - memory locations built directly into the CPU - that are used to hold data that are being processed by
the current instruction.
✓ Registers: The register is the smallest high-speed storage area in the CPU. All data must be represented in a register
before it can be processed.
✓ Control Unit: This unit controls the operations of all parts of computer but does not carry out any actual data processing
operations

[B] Primary memory consists of mainly two types of memories:

✓ Random Access Memory (RAM): RAM is the internal ✓ Static Random Access Memory (SRAM): A type of
memory of the CPU for storing data, program and memory that is faster and less volatile than DRAM,
program result. It is read/write memory which stores but requires more power and is more expensive. The
data until the machine is working. As soon as the term static is derived from the fact that it does not
machine is switched off, data is erased. need to be refreshed like DRAM.
✓ RAM is volatile, i.e. data stored in it is lost when we ✓ Synchronous Dynamic Random Access Memory
switch off the computer or if there is a power failure. (SDRAM): A type of DRAM that can run at much
Hence a backup uninterruptible power system (UPS) higher clock speeds.
is often used with computers. RAM is small, both in ✓ Read Only Memory (ROM): The memory from which
terms of its physical size and in the amount of data it we can only read but can not write on it . This type of
can hold. memory is non-volatile. The information is stored
There are mainly three types of RAM available: permanently in such memories during manufacture. A
✓ Dynamic Random Access Memory (DRAM): A type ROM, stores such instructions that are required to
of physical memory used in most personal computers. start a computer. This operation is referred to as
The term dynamic indicates that the memory must be bootstrap.
constantly refreshed2 (reenergized) or it loses its
contents. This type of memory is more economical.

There are mainly three types of ROM available:

✓ MROM (Masked ROM): The very first ROMs ✓ PROM (Programmable Read only Memory):
were hard-wired devices that contained a pre- PROM is read-only memory that can be modified
programmed set of data or instructions. These only once by a user. The user buys a blank PROM
kinds of ROMs are known as masked ROMs which and enters the desired contents using a PROM
are inexpensive. program
www.gradeup.co

✓ EPROM (Erasable and Programmable Read EEPROM is programmed and


Only Memory): The EPROM can be erased by erased electrically. It can be erased and
exposing it to ultra-violet light for a duration of up reprogrammed about ten thousand times. Both
to 40 minutes. Usually, an EPROM eraser achieves erasing and programming take about 4 to 10 ms
this function. (milli second).
✓ EEPROM (Electrically Erasable and
Programmable Read Only Memory): The
Memory

A memory is just like a human brain. It is used to store data and instructions. Computer memory is the storage space in
computer where data is to be processed and instructions required for processing are stored. The memory is divided into
large number of small parts called cells. Each location or cell has a unique address which varies from zero to memory size
minus one.

Memory
Primary Memory Secondary Memory
Cache Memory Main Memory ➢ Magnetic Disk(HDD)
➢ Optical Disk (CD, DVD,BRD)
➢ Flash Memory(Memory card, Pen Drive)
Registers RAM ROM
SRAM DRAM PROM
EPROM
EEPROM

Memory is primarily of three types


➢ Cache Memory: It is a very high speed semiconductor memory which can speed up CPU. It acts as a buffer between
the CPU and main memory.
➢ Primary Memory/Main Memory: Primary memory holds only those data and instructions on which computer is
currently working. It has limited capacity and data is lost when power is switched off.
➢ Secondary Memory: This type of memory is also known as external memory or non-volatile. It is slower than main
memory. These are used for storing data/Information permanently.

2. Secondary Storage (External Storage Devices) : Floppy diskettes, hard disk, tapes and optical disks come under the
category of external storage devices or ancillary storage devices. These devices are very sensitive to environmental
conditions (humidity and temperature) as well as to external magnetic fields and need to be stored carefully.
✓ Floppy Disk : Floppy disks are primarily used on PCs. Information on a floppy disk is recorded in the magnetized
states of particles of iron oxides evenly placed upon concentric circles known as tracks.
✓ Hard Disk: It is a non-removable enclosed magnetic disk included in most PCs. It contains a stack of metal platters,
each coated with iron oxide, that spin on a spindle and the entire unit is encased in a sealed chamber.
✓ Magnetic Tape: This is plastic tape, usually made of Mylar that is coated with iron oxide, thereby enabling the
introduction (writing); retention (memory) and reading of magnetically recorded information. The best use of tape
storage is for data that you do not use very often.

3. Peripherals: Peripheral devices are devices connected to the computer externally. If a peripheral device is
disconnected, the computer will still be able to work; only functions performed by this peripheral device will not be
available.

Mainly there are following types of peripheral devices:

1. Input Devices (How to tell it what to do): This unit makes link between user and computer. The input devices
translate the information into the form understandable by computer.

➢ Keyboard- The most common and very popular ➢ Mouse- Mouse is the most popular pointing
input device which helps in inputting data to the device and cursor-control device having a small
computer palm size box with a round ball at its base which
senses the movement of mouse and sends
www.gradeup.co

corresponding signals to CPU when the mouse


buttons are pressed. ➢ Optical Character Reader (OCR)- OCR scans
➢ Joy Stick- To move cursor position on a monitor text optically character by character, converts
screen. It is mainly used in Computer Aided them into a machine readable code and stores the
Designing (CAD) and playing computer games. text on the system memory.
➢ Light pen- It is used to select a displayed menu ➢ Bar Code Reader- A device used for reading bar
item or draw pictures on the monitor screen. coded data (data in form of light and dark lines).
➢ Track Ball- Mostly used in notebook or laptop Bar coded data is generally used in labeling goods,
computer, instead of a mouse .This is a ball which numbering the books.
is half inserted and by moving fingers on ball, ➢ Optical Mark Reader (OMR)- A special type of
pointer can be moved optical scanner used to recognize the type of
➢ Scanner- A scanner allows you to scan printed mark made by pen or pencil.
material and convert it into a file format that may
be used within the PC.
➢ Digitizer- It converts analog information into
digital form.
➢ Microphone-Microphone is an input device to
input sound that is then stored in digital form.
➢ Magnetic Ink Card Reader (MICR)-MICR input
device is generally used in banks because of a
large number of check to be processed every day.
2. Output Devices: (How it shows you what it is doing) Output devices translate the computer's output into the form
understandable by users.
Monitors: Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms
images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon
the number of pixels.
There are two kinds of viewing screen used for monitors.
➢ Cathode-Ray Tube (CRT): The CRT display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity, or resolution
➢ Flat- Panel Display: The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT.

Printer: Printer is an output device, which is used to print information on paper.


➢ Impact Printers: The impact printers print the characters by striking them on the ribbon which is then pressed on
the paper.
➢ Non-Impact Printers: Non-impact printers print the characters without using ribbon. These printers print a
complete page at a time so they are also called as Page Printers. Laser Printers, Inkjet Printers.
Note:
✓ Data: Data can be defined as a representation of facts, concepts or instructions in a formalized manner which should
be suitable for communication, interpretation, or processing by human or electronic machine.
✓ Information:- Information is organized or classified data which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
✓ Data Processing Cycle: Data processing is the re-structuring or re-ordering of data by people or machine to
increase their usefulness and add values for particular purpose. Data processing consists of basic steps input,
processing and output.
These three steps constitute the data processing cycle.
✓ Input -Input data is prepared in some convenient form for processing. The form will depend on the processing
machine. For example, when electronic computers are used, the input data could be recorded on any one of several
types of input medium, such as magnetic disks, tapes and so on.
✓ Processing - In this step input data is changed to produce data in a more useful form. For example, paychecks may
be calculated from the time cards, or a summary of sales for the month may be calculated from the sales orders.
✓ Output - The result of the proceeding processing step are collected. The particular form of the output data depends
on the use of the data. For example, output data may be pay-checks for employees.
www.gradeup.co

Language Processors:

✓ Assembler: This language processor converts the program written in assembly language into machine language.
✓ Interpreter: This language processor converts a HLL(High Level Language) program into machine language by
converting and executing it line by line.
✓ Compiler:-It also converts the HLL program into machine language but the conversion manner is different. It converts
the entire HLL program in one go, and reports all the errors of the program along with the line numbers.

Classification of Computers:

Computers can be broadly classified by their speed and computing power:

Sr. Type Specifications


No.
1 PC (Personal It is a single user computer system having moderately powerful
Computer) microprocessor.
2 WorkStation It is also a single user computer system which is similar to personal computer
but have more powerful microprocessor.
3 Mini Computer It is a multi-user computer system which is capable of supporting hundreds of
users simultaneously. Software technology is different from minicomputer.
4 Main Frame It is a multi-user computer system which is capable of supporting hundreds of
users simultaneously. Software technology is different from minicomputer.
5 Supercomputer It is an extremely fast computer which can execute hundreds of millions of
instructions per second.

Following are the main memory storage units:

S.No. Unit Description


1 Bit(Binary A binary digit is logical 0 and 1 representing a passive or an active state of a
Digit) component in an electric circuit.
2 Nibble A group of 4 bits is called nibble.
3 Byte A group of 8 bits is called byte. A byte is the smallest unit which can represent a
data item or a character. (1 byte = 8 bits)
4 Word A computer word, like a byte, is a group of fixed number of bits processed as a unit
which varies from computer to computer but is fixed for each computer. The length
of a computer word is called word-size or word length and it may be as small as 8
bits or may be as long as 96 bits. A computer stores the information in the form of
computer words.

Few higher storage units are following:

S.No. Unit Description


1 Kilobyte (KB) 1 KB = 1024 Bytes
2 Megabyte(MB) 1 MB = 1024 KB
3 GigaByte (GB) 1 GB = 1024 MB
4 TeraByte (TB 1 TB = 1024 GB
5. PetaByte (PB) 1 PB = 1024 TB

Software

Software: software represents the set of programs that govern the operation of a computer system and make the hardware
run. There are two types of software
➢ System Software: The system software is collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself. System software are generally prepared by computer manufactures.
www.gradeup.co

System software serves as the interface between hardware and the end users. Examples: Operating
System, Compilers, Interpreter, Assembler etc.

➢ Application Software: It is the set of programs necessary to carry out operations for a specified application.

Application software can subdivide into three categories:

(A) Packages:-

Packages
Word Processing A package that process textual matter and creates
organized and flawless documents.
Spreadsheets An electronic spreadsheet is a program that
accepts data in a tabular form and allow users to
manipulate , calculate, analyze data in the desired
manner.
Database Management Systems DBMS is a package that can handle and manage
bulk of stored data.
Desktop Publishing Software Handles page layout by combining the functions of
a traditional typesetter and a layout artist.
Graphics, Multimedia and Presentation Application software that manipulates images is
applications known as Graphics software.

(B) Utilities: Utilities are those application programs that assists the computer by performing housekeeping functions like
backing up disk or scanning viruses etc.

Utilities
Text Editor Program is used for creating, editing text files.
Backup Utility Program facilities the backing-up of disk.
Compression Utility Large files can be compressed so that it takes less
storage area.
Disk Defragmentor It speeds up disk access by rearranging the files
and free space on your computer.
Antivirus Software It scans yours disk for viruses and removes them if
any virus is found.

(C) Customized Software: This type of software is tailor-made software according to a user’s requirements.

Following are the main five generations of computers:

S. No. Generation & Description


1 First Generation (1946-1959) Vacuum tube based
2 Second Generation (1959-1965) Transistor based
3 Third Generation (1965-1971) Integrated Circuit based
4 Fourth Generation (1971-1980) VLSI microprocessor based
5 Fifth Generation (1980-onwards) ULSI microprocessor based

✓ Boot - When computer starts, the operating system is ✓ Warm Boot: - When you reset the computer that is
first loaded (as it is essential for running all other already ON.
programs), this process is known as booting. ✓ Motherboard - The motherboard serves as a single
✓ Cold Boot - When you turn the computer ON from an platform to connect all of the parts of a computer
OFF position. together. A motherboard connects CPU, memory, hard
drives, optical drives, video card, sound card, and
www.gradeup.co

other ports and expansion cards directly or via cables. ✓ De Multiplexer - It perform opposite
It can be considered as the backbone of a computer. function of Multiplexer. It has single input line and
✓ Combinational Circuit - It consist of AND,OR , multiple output line. n×2N .
NOT,NAND,NOR Gate. Output will depend on input and ✓ Decoder - It is use to convert one code system to
there is no time gap between input and output There anther like Binary to Octal digit or Binary to
are different type of combination circuit used for Hexadecimal digit.
different purpose. ✓ Adder - Adder is used to add bits. Adder is of two
✓ Multiplexer - It has multiple input and Single output. types - Half adder and full Adder.
Multiplexer may be of different type like 4 × 1 Half Adder is used to add two bits and full Adder is
MUX,8×1 MUX,16×1 MUX etc. used to add three bits.
✓ Encoder - It perform opposite function of Decoder;

Software categories

1. Freeware: Software which is completely costless. The producers of this software are either public institutions such as
universities or developers who do it for personal interest or advertisement or private company who do it for dumping
reasons.
2. Shareware: Software which is initially costless but after a certain period the user is asked to pay a fee or delete it. Or
software which has two versions a free one, but incomplete or with advertisement banners and a complete
advertisement free one for which the user must pay. The most common example is WinZip compression program.
3. Commercial: Software for which the user has to pay a license to use it .Common examples are Microsoft Windows
operating system and Microsoft word.
4. Private: Software uniquely built, under payment for a specific customer to fit his need. Only the customer may use it.
5. Open Source: Software may be modified by anyone, sometimes under certain restrictions. Open source software is also
freeware.
6. Proprietary: Software is distributed with the explicit with the explicit legal warning not to modify it and technically
locked to prevent other developers to see or modify its source.

Number System

When we type some letters or words, the computer translates them in numbers as computers can understand only numbers.
A computer can understand positional number system where there are only a few symbols called digits and these symbols
represent different values depending on the position they occupy in the number.

A value of each digit in a number can be determined using


• The digit.
• The position of the digit in the number.
• The base of the number system (where base is defined as the total number of digits available in the number
system).

1. Decimal Number System: The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the
left of the decimal point represent units, tens, hundreds, thousands and so on.
2. Binary Number System: Uses two digits, 0 and 1, also called base 2 number system . Each position in a binary number
represents a 0 power of the base (2). Last position in a binary number represents a x power of the base (2).
3. Octal Number System: Uses eight digits, 0,1,2,3,4,5,6,7, also called base 8 number system, Each position in an octal
number represents a 0 power of the base (8).
4. Hexadecimal Number System: Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. Letters represents numbers
starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15. Also called base 16 number system .Each position in a
hexadecimal number represents a 0 power of the base (16).

DBMS

DBMS - DBMS is the acronym of Data Base Management System. DBMS is a collection of interrelated data and a set of
programs to access this data in a convenient and efficient way. It controls the organization, storage, retrieval, security and
integrity of data in a database.
www.gradeup.co

Architecture of DBMS divided into three levels:

1. External view or User view/View Level: It is the highest level of data abstraction. This includes only those portions of
database of concern to a user or Application program. Each user has a different external view and it is described by means
of a scheme called external schema.
2. Conceptual view/Logical Level: All the database entities and the relationship among them are included. One conceptual
view represents the entire database called conceptual schema.
3. Internal view/Physical Level: It is the lowest level of abstraction, closest to the physical storage method. It describes
how the data is stored, what is the structure of data storage and the method of accessing these data. It is represented by
internal schema.

Keys in DBMS:

• Super key of an entity set is a set of one or more attributes whose values uniquely determine each entity.
• Candidate key of an entity set is a set of fields from which primary key can be selected. It is an attribute or a set of
attributes that can act as a primary key for a table to uniquely identify each record in a table.
• Primary key is a candidate key that is most appropriate to become main key of the table. It is a key that uniquely
identifies each record in the table

LOGIC GATES

Logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given
moment, every terminal is in one of the two binary conditions low (0) or high (1).
Note: There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, XNOR.

Networking

Network: A computer network is a set of computers connected together for the purpose of sharing resources. The most
common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.
Five components

✓ Sender Computer ✓ Receiver Equipment(Modem)


✓ Sender equipment (Modem) ✓ Receiver Computer
✓ Communication Channel ( Telephone Cables)

Classified on the basis of Geographical Coverage:

➢ Local Area Network (LAN) - A local area network is relatively smaller and privately-owned network with the
maximum span of 10 km.
➢ Metropolitan Area Network (MAN) - MAN is defined for less than 50 Km and provides regional connectivity
within a campus or small geographical area.
➢ Wide Area Network (WAN): A wide Area Network (WAN) is a group Communication Technology provides no limit
of distance.
www.gradeup.co

Types of Network –

1. Point to Point Network: When a packet is sent from one router to another intermediate routers, the entire packet is
stored at each intermediate router, stored there till the output line is free and then forwarded. A subnet using this
principle is called point to point or packet switched network.

Topologies for a point to point Subnet –

➢ Star: Each device has a dedicated point to point link only to a central controller, usually called a hub.
➢ Tree: A tree topology is a variation of a star.
➢ Ring: Each device has a dedicated point to point line configuration only with the two devices on either side of it.
➢ Bus: One long cable acts as a backbone to link all the devices in the network.

2. Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the machines on
the network.

Open Systems Interconnection model (OSI)

The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal
functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International Organization for Standardization (ISO).

Seven layers of OSI Model are:

➢ Application Layer: The application layer is the OSI layer closest to the end user, which means both the OSI
application layer and the user interact directly with the software application.
➢ Presentation Layer: The presentation layer establishes context between application-layer entities, in which the
application-layer entities may use different syntax and semantics if the presentation service provides a big mapping
between them.
➢ Session Layer: The session layer controls the dialogues (connections) between computers. It establishes, manages
and terminates the connections between the local and remote application.
➢ Transport Layer: The transport layer provides the functional and procedural means of transferring variable-length
data sequences from a source to a destination host via one or more networks, while maintaining the quality of
service functions.
➢ Network Layer: The network layer provides the functional and procedural means of transferring variable length
data sequences from one node to another connected to the same network.
➢ Data link Layer: The data link layer provides node-to-node data transfer -- a link between two directly connected
nodes. It detects and possibly corrects errors that may occur in the physical layer.
➢ Physical Layer: It defines the electrical and physical specifications of the data connection. It defines the
relationship between a device and a physical transmission medium.

Transmission Media

➢ Network Cables: Network cables are used to ➢ Repeaters: A repeater is an electronic device
connect computers. The most commonly used that receives a signal and retransmits it at a
cable is Category 5 cable RJ-45. higher level or higher power, or onto the other
➢ Distributors: A computer can be connected to side of an obstruction, so that the signal can cover
another one via a serial port but if we need to longer distances.
connect many computers to produce a network, ➢ Bridge: A bridge is a product that connects a local
this serial connection will not work. The solution area network (LAN) to another local area network
is to use a central body to which other computers, that uses the same protocol (for example,
printers, scanners etc. can be connected and then
Ethernet or token ring).
this body will manage or distribute network
traffic ➢ Routers: A router is a device that forwards data
packets along networks. A router is connected to
www.gradeup.co

at least two networks, commonly two LANs or ➢ External Network Cards:


WANs or a LAN and its ISP's network. Router sare External network cards come in two flavours like
located at gateways, the places where two or Wireless and USB based. Wireless network card
need to be inserted into the motherboard but no
more networks connect.
network cable is required to connect to network.
➢ Internal Network Cards: Network card is a ➢ Universal Serial Bus (USB): USB card are easy to
necessary component of a computer without use and connect via USB port. Computers
which a computer cannot be connected over a automatically detect USB card and can install the
network. It is also known as network adapter or drivers required to support the USB network card
Network Interface Card (NIC). Most branded automatically.
computers have network card pre-installed. ➢ Modem (Modulator –DE Modulator): Modem is
a device attached to computers that can convert
Network cards are of two types: Internal and
digital signals to analog signals to analog signals
External Network Cards. and vice versa.

Operating System

An Operating system is a program, which acts as an interface between a user and the hardware.

Characteristics of Operating System:

1. Memory Management -- keeps tracks of primary


memory i.e. what part of it is in use by whom, 7. Control over system performance -- records
what part is not in use etc. and allocates the delays between request for a service and from the
memory when a process or program requests it. system.
2. Processor Management -- allocates the 8. Interaction with the operators -- The
processor(CPU) to a process and de-allocates interaction may take place via the console of the
processor when it is no longer required. computer in the form of instructions. Operating
3. Device Management -- keeps track of all devices. System acknowledges the same, does the
This is also called I/O controller that decides corresponding action and informs the operation
which process gets the device, when, and for how by a display screen.
much time. 9. Error-detecting aids -- Production of dumps,
4. File Management -- allocates and de-allocates traces, error messages and other debugging and
the resources and decides who gets the resources. error-detecting methods.
5. Security -- prevents unauthorized access to 10. Coordination between other software and
programs and data by means of passwords and users -- Coordination and assignment of
similar other techniques. compilers, interpreters, assemblers and other
6. Job accounting -- keeps track of time and software to the various users of the computer
resources used by various jobs and/or users. systems.

MS - Window

MS-Windows is a GUI based operating system. In Windows Operating system multiple applications can be simultaneously
run in different windows.

Key points related to MS Windows

➢ In MS-Windows, the screen upon which icons, ➢ My computer is helpful for viewing the contents
windows, too are displayed is known as desktop. of a single folder or drive.
➢ An icon is a graphic symbol that represents a ➢ Windows Explorer is another way of seeing
window element like, file, folder, or shortcut. what is on your computer. Windows Explorer
➢ Loading up of operating system files into the shows the computer’s contents as a hierarchy.
computer’s memory in called booting up. ➢ File: A program or document stored on a disk.
➢ The taskbar is a bar, which is usually located at ➢ Toolbar: A set of button you click to perform
the bottom of the screen. common tasks.
www.gradeup.co

➢ A folder is a location in which you can store files ➢ To create a shortcut to a file,
and other folders. firstly select the file or folder, whose shortcut is to
➢ To create a new folder, File—New—Folder be created. Then drag the file icon through right
commands are clicked in My Computer windows. mouse button to desired location where shortcut
➢ To find files or folders, Start---Find---Files or to be placed, and then select create shortcut(s).
Folder commands are clicked. ➢ To shut down the computer, Start—Shut Down
commands are clicked.

MS-Word
Key points related to MS Word -

1. A word processor is a package that processes textual header and footer can be created and formatted using
matter and creates organized and flawless Header and Footer option of the view menu.
documents. 9. In word, the document can either be printed through
2. The world processor offers very useful features like print button of standard toolbar or through the Print
speed, powerful editing and formatting features, option of File menu. The help is available in Word
permanent storage, Graphics, object linking and through the Help menu.
embedding, spell check and mail merge etc. 10. In word, spelling and grammar can be checked either
3. The word processor automatically fits the typed text through the spelling and Grammar option of Tools
within the specified left and right margins. This menu.
feature is called word wrapping. 11. The Autocorrect feature of Word converts shorthand
4. Margins can be four type viz. left, right, top and into longer strings. You can create your own
bottom. Autocorrect entries by clicking to Autocorrect
5. The distance between text boundaries and page command to Tools menu.
margins is called indent. The indent can be positive, 12. Tables can be inserted in a Word document through
negative or hanging indent. Table button of Standard toolbar and can be
6. The text layout manipulated through the table drop menu.
7. In Word, paragraphs can be formatted through 13. In MS-Word, the mail merge involves two files –
Paragraph option of Format menu and the borders Main document and data source file to produce the
can be applied through Borders and shading option of merged document. The main document and data
Format menu. source can handled through Mail Merge option of
8. The page formatting in Word can be controlled Tools menu.
through Page Setup … option of File menu. The

Shortcut Keys used in MS Word


Shortcut Description
Ctrl+W Close the active window / document
Ctrl+Z Undo an action
Ctrl+Y Redo the last action or repeat an action
Ctrl+S Save a document
Ctrl+P Print a document
Ctrl+K Insert a hyperlink.
Alt+Right. Arrow Go forward one page.
Ctrl+C Copy selected text or graphics to the Office Clipboard.
Ctrl+V Paste the most recent addition to the Office Clipboard.
Ctrl+Shift+A Format all letters as capitals.
Ctrl+B Applies or removes bold formatting.
Ctrl+I Applies or removes italic formatting.
Ctrl+= Apply subscript formatting (automatic spacing).
F1 Open Help
F4 Repeat the last action performed(Word 2000+)
F5 Open the Find, Replace, and Go To window in Microsoft Word
F7 Spellcheck and grammar check selected text or document
F12 Save As
www.gradeup.co

Some of the valid file names are as follows:


Type of File File name and Extension
Notepad File Type.txt
Paintbrush File Painting.bmp
Word Document.doc
Excel Book.xls
PowerPoint Presentation.ppt
Database Db1.mdb
Executable Game.exe

MS-EXCEL
Key points related to MS Excel -

1. A spreadsheet is a software tool that lets one enter, 14. To insert cells, rows or columns in worksheet, use
calculate, manipulate and analyze set of numbers. Insert---Cells----, Insert-----Rows or Insert-----
2. A Worksheet is a grid of cells made up of horizontal Column command respectively.
rows and vertical columns. 15. General arrangement of data is known as formatting.
3. A workbook is a group of worksheets. 16. Formatting does not affect the actual cell value only
4. Three types of data can be entered in a worksheet (i) the appearance change.
number (ii) Text (iii) Formulas. 17. Formatting is performed in MS-Excel through options
5. Cell can be referenced in three ways (i) relative (ii) available in Format menu.
absolute (iii) mixed 18. Charts are the pictorial representation of worksheet
6. A cell can be edited either by overwriting or by data.
partially modifying the cell contents. 19. Various chart types in MS- Excel are area chart,
7. A range can select by using mouse or keyboard. column chart, bar chart, line chart, pie chart,
8. A range can be either through copy and paste XY(Scatter) chart.
operations or by dragging the fill handle. 20. Chart in MS-Excel saved in two ways : (i) embedded
9. A range can be moved either through cut and paste chart (ii) chart sheet
operations or by dragging the range border. 21. Embedded chart is a chart object that is placed on a
10. A range can be cleared through Edit--Clear command. worksheet and saved with that work sheet.
11. To erase everything from a worksheet, select all the 22. Chart sheet is a sheet in workbook that contains only
cells in the worksheet and then use Edit—Clear—All. a chart.
12. To save a workbook use File- Save command. 23. Charts are created using chart wizard.
13. To open a workbook use File—Open command.

PowerPoint
Key points related to PowerPoint -

1. The application software that can create professional 7. A presentation in PowerPoint can viewed in any of
looking visual aids is called Presentation Graphics these views: Normal, Outline, Slide, Slide Sorter,
Software. Slide Show and Notes Page View.
2. MS-PowerPoint can be started by clicking at Start— 8. To apply new design to slides, click either at Apply
Program---Microsoft PowerPoint. Design Template option of Common Tasks options of
3. A slide can contain one or more of these components: Formatting toolbar, or at Format Menu’s Apply Design
Titles, Graphs, Drawing objects, ClipArt and Template option or ever from the shortcut menu.
Pictures. 9. A color scheme is a combination of various colors
4. The slide components that are used for reference are: used for text and other presentation elements.
Handouts, Notes, Outlines. 10. A color scheme can be changed by clicking at Slide
5. A new presentation can be created through one of Color Scheme option of Format menu.
these methods:(i) Auto content Wizard (ii) Design 11. Background color can be changed by clicking at
Templates (iii) Sample Presentation and (iv) Blank Format----Background command or even through
Presentation slide’s shortcut menu.
6. A new side can be added by either clicking at 12. You can change text font and style by using Format---
Common Tasks options of Formatting toolbar and Font command.
then selecting New Slide option, by clicking at Insert 13. Header and Footer information can be viewed and
Menu’s New Slide option. changed by clicking at View---Header and Footer
option.
www.gradeup.co

14. The slide ---shorter view in useful for viewing the 16. While creating slide shows you can
slides in miniature forms and for rearranging them. add transitions to slides by using Slide Show --- Slide
15. Movies (Video) & Sound can be inserted by using Transition command.
Insert—Movies & Sounds command. 17. To add animation, you can use Slide Show-----Custom
Animation commands.

Internet

• The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/IP) to link several billion devices worldwide. It also known as “network of networks” that consists of millions of
private, public, academic, business, and government networks.

Various Applications of Internet are:


1. Exchange messages using e-mail (Electronic 5. Search databases of government, individuals and
mail). organizations.
2. Transfer files as well as software. 6. Read news available from leading news groups.
3. Browse through information on any topic on 7. Send or receive animation and picture files from
web. distant places.
4. Communicate in real time (chat) with others 8. Set up a site with information about your
connected to the Internet. company’s products and services.

• The World Wide Web commonly known as the Web or www developed founded by Tim Berners – Lee in 1989, is a
system of interlinked hypertext documents that are accessed via the Internet. These multimedia pages are ever-
changing.

• A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing
information resources on the World Wide Web.

Various features of a Web Browser are:

1. Menu bar: The menu bar, located at the very top of the screen, can be accessed using the mouse. Actions that are in
black can be performed, while actions that cannot be performed will be in gray or lightened.
2. Tool bar: The tool bar is located at the top of the browser; it contains navigational buttons for the Web. Basic functions
of these buttons include:

Command Function
Home Opens or returns to starting page
Back Takes you to the previous page
Forward Takes you to the next page
Print Prints current page
Stop Stops loading a page
Reload Refresh/redisplays current page
Search Accesses search engine

3. Location bar: The location bar, below the tool bar, is a box labelled "Location," "GoTo," or "Address." You can type in a
site's address, and press the Return or Enter key to open the site.
4. Status bar: The status bar is located at the very bottom of the browser window. You can watch the progress of a web
page download to determine if the host computer has been contacted and text and images are being downloaded.
5. Scroll bar: The scroll bar is the vertical bar located on the right of the browser window. You can scroll up and down a
web page by placing the cursor on the slider control and holding down the mouse button.
6. A website is a set of related web pages served from a single web domain.
7. The Uniform Resource Locator, abbreviated as URL is the Address for web sites. Most of them begin with http (Hyper
Text Transfer Protocol), followed by a colon and two slashes.. In most web browsers, the URL of a web page is displayed
on top inside an address bar. An example of a typical URL would be "http://www.gradestack.com".
8. A Home page, index page, or main page is a page on a website. A home page usually refers to:
9. A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is followed
automatically.
www.gradeup.co

10. Downloading means to receive data to a local system from a remote system, or to initiate such a data
transfer.
11. Uploading refers to the sending of data from a local system to a remote system such as a server or another client with
the intent that the remote system should store a copy of the data being transferred.
12. An email attachment is a computer file sent along with an email message. One or more files can be attached to any
email message, and be sent along with it to the recipient. The first email was sent by Ray Tomlinson to himself in 1971.
13. CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another.
The list of CCed recipients is visible to all other recipients of the message.
14. An additional BCC (blind carbon copy) field is available for hidden notification; recipients listed in the BCC field receive
a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients).
15. The Drafts folder retains copies of messages that you have started but are not yet ready to send.
16. Hotmail, a free e-mail service provided by Microsoft which was established in 1995 was co - founded by an Indian
American entrepreneur Sabeer Bhatia along with Jack Smith in July of 1996.
17. An Internet Protocol address (also known as an IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network. It acts as an identifier for a computer. It is a unique address for
every computer.
18. Top-level domain: Each part of a domain name contains certain information. The first field is the host name, identifying
a single computer or organization. The last field is the top-level domain, describing the type of organization and
occasionally country of origin associated with the address. For e.g. - .com – Commercial, .edu – Educational.

Important Key in a Keyboard

1. Toggle keys- toggle the input from a group of keys on a keyboard between two different input modes.
✓ Caps Lock ✓ Scroll Lock
✓ Num Lock ✓ Insert
2. Modifier Keys - In computing, a modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. For e.g.-
✓ Shift ✓ Ctrl
✓ Alt ✓ Fn
3. Function keys – A function key is a key on a computer or terminal keyboard which can be programmed so as to cause
an operating system command interpreter or application program to perform certain actions, a form of soft key. For e.g.
- F1 through F12 keys are known as function keys. Each key performs different functions.

Computer Viruses:

A virus is a parasitic program that infects another legitimate program, which is sometimes called the host. To infect the host
program, the virus modifies the host so that it contains a copy of the virus.

1. Boot sector viruses: A boot sector virus infects the boot record of a hard disk. The virus allows the actual boot sector
data to be read as through a normal start-up were occurring.
2. Cluster viruses: If any program is run from the infected disk, the program causes the virus also to run . This technique
creates the illusion that the virus has infected every program on the disk.
3. Worms: A worm is a program whose purpose is to duplicate itself.
4. Bombs: This type of virus hides on the user’s disk and waits for a specific event to occur before running.
5. Trojan Horses: A Trojan Horses is a malicious program that appears to be friendly. Because Trojan Horses do not make
duplicates of themselves on the victim’s disk. They are not technically viruses.
6. Stealth Viruses: These viruses take up residence in the computer’s memory, making them hard to detect.
7. Micro Viruses: A macro virus is designed to infect a specific type of document file, such as Microsoft Word or Microsoft
Excel files. These types of documents can include macros, which are small programs that execute commands.
www.gradeup.co

Commonly Used Computer Terms

✓ Abort: To stop a program or function before it has ✓ DVD: Digital Versatile Disc or Digital Video Disc
finished. ✓ Dynamic: Refers to actions that take place at the
✓ Algorithm: A set of instructions that provides a moment they are needed rather than in advance.
solution to a given problem. ✓ EDP: Electronic Data Processing.
✓ Animation: A simulation of movement created by ✓ E-Mail: Electronic Mail. A facility to send electronic
displaying a series of pictures, or frames. For example, messages to another person on a computer network.
cartoons on television. ✓ End-User: The end user is the individual who uses
✓ ANSI: American National Standards Institute, a the product after it has been fully developed and
powerful industry association of USA, promoting marketed.
Programming language standards. ✓ EPROM: Erasable Programmable Read Only Memory.
✓ Antivirus: Program A utility that searches a hard disk A type of ROM that can be programmed or
for viruses and removes any, that is found. reprogrammed usually by exposing a normally
✓ Architecture: A design. It can refer to either covered sector to UV-Light.
hardware or software or to a combination of ✓ Extended Memory: Memory in addition to
hardware and software. The architecture of a system conventional memory used to run and manage
defines its broad outlines. applications; together with expanded memory, it
✓ ASCII: American Standard Code for Information helps PCs to address increased amounts of data in
Inter change. This is a seven/eight bit code widely memory.
used in computers for the transfer of data. ✓ Fax/Facsimile: A way of transmitting copies of
✓ Bandwidth: The amount of data that can be documents over telephone lines. Fax is short for
transmitted in a fixed amount of time. It is usually Facsimile.
expressed in bits per second (bps) or bytes per ✓ Gigabyte: Abbreviated as GB, is equal to 1024 MB.
second. GUI Graphical User Interface. A user interface that
✓ Bit: The smallest unit of information in computer works visually and is based on the selection of actions
system. Bit is short for binary digit; either a "1” or a using a mouse or a similar pointing device to click on
"0". icons or to pick options from menus; see also icon.
✓ Boot: The process of getting the computer started. ✓ Hertz: A unit of frequency that means Cycles per
✓ Byte: A byte is made up of 8 bits. The amount of Second.
memory it takes to store a single character. ✓ High Density: The amount of information a disk can
✓ Cache: A separate area of Primary Memory (RAM) hold. High Density disks hold more information than
where the computer stores a copy of frequently used Double Density disks.
information for quick access. This is meant to speed ✓ Hypertext: A method of presenting information so
up the operation of the hard disk. the user can view it in a non-sequential way,
✓ CD-ROM: Compact Disk-Read Only Memory. This is a regardless of how the topics were originally arranged.
permanent storage device used to store large It has now evolved as a flexible software technology
quantities of information that need not be changed. to create electronic books provides fast and flexible
✓ CGA: Color Graphics Adapter. Low-resolution screen access to search criteria and provides quick access to
(640x200 pixels) with color capability. information in large documents.
✓ Character: A number, letter, symbol, or punctuation ✓ HTML: Hyper Text Markup Language. A markup or
mark. structuring language used to describe Web and
✓ Chip: A small piece of silicon containing thousands or Intranet documents. It is used to define structure,
millions of electrical elements. Also called an appearance and placement of HTML elements
Integrated Circuit (IC). including, fonts, graphics, text, hypertext links to
✓ Compatible: The ability of one device or program to other sites and many more details.
work with another device or program. For example, a ✓ IBM: International Business Machines, a USA based
printer and a computer are said to be compatible if multinational Company.
they can be connected to each other. ✓ Icon: A graphical screen element that executes one or
✓ Conventional Memory: The first 640K of electronic more commands when selected with a mouse or other
Memory (RAM) in a computer used to run OS and pointing device
applications. ✓ IDE: Integrated Device Electronics, a standard used
✓ Debug: In computer related systems, fixing software for connecting hard drive to a computer. IDE hard
related problem is known as debugging. drives are very common and relatively inexpensive.
✓ Digitize To scan a piece of artwork in very fine detail ✓ Intel: The manufacturer of the most popular
and store it in a form that computer understands. microprocessors or CPUs.
✓ DOS: It stands for Disk Operating System. It is a single ✓ Intelligent: Printer combining laser, computer and
user operating system. photocopying technology.
www.gradeup.co

✓ Internet: The world's largest computer network that ✓ Notebook Computer: A portable
links many of the scientific, research and educational computer, approximately 8½ by 11 inches, that fits
computers as well as commercial networks. The inside a briefcase.
internet uses TCP/IP protocols, and computers on ✓ Numeric keypad: The part of a keyboard that looks
Internet can run on any operating system, like, several like an adding machine, with 10 digits and
variations of UNIX, Windows NT, and VMS etc. mathematical operators; usually located on the right
✓ Intranet: In the most general sense, a private side of the keyboard.
corporate network that uses Internet technology ✓ Office-Automation: The use of computer systems to
based software and TCP/IP protocol standards. Many execute a variety of office operations, such as word
companies use intranets for tasks as simple as processing, accounting and Email.
distributing a company letter and for tasks as complex ✓ Parallel Port: An outlet on a computer used to attach
as posting and updating technical support bulletins to a device, such as a printer. A parallel port sends data
service personnel worldwide. An intranet does not (bits) down the wire side by side (parallel to each
always include permanent connection to Internet. other).
✓ Kilobyte (KB) Approximately one thousand ✓ Pentium: The fifth generation of microprocessors.
characters; actually 1024bytes. The Pentium is 2 to 3 times faster than the 80486, the
✓ LAN An acronym for local area network. A system of fourth generation of microprocessors.
PCs that are located relatively near to each other and ✓ Peripheral: Any piece of hardware attached to the
connected by wire so that individual users can outside of a computer. Examples are printers and
cooperatively process information and share modems.
resources; see also WAN. ✓ Pixel: Short for "Picture Element". A Pixel is the
✓ Laptop Computer: A portable computer, small smallest dot the computer can control on the screen.
enough to be held on a lap,but slightly larger than a ✓ Portable computer: A small computer that usually
notebook computer. runs on batteries. In the categories of portable
✓ LED: Light Emitting Diode. An electronic device that computers are laptop, notebook, sub-notebook and
lights up when electricity is passed through it. palmtop.
✓ Light Pen: An input device that allows a user to write ✓ Protocol: In networking and communications, the
on or point to a special pad or the screen of a pen- formal specification that defines the procedures to
based computer, such as a PDA. follow when transmitting and receiving data. Protocol
✓ Macintosh: A PC based on a Motorola microprocessor defines the format, timing, sequence and error
employing GUI. Apple Macintosh has been in use since checking used on the network.
late eighties. ✓ Resolution: The size and quantity of dots that make
✓ Macro: A symbol, name, or key that represents a list up a printed page, screen or scanned image.
of commands, actions or keystrokes. ✓ Runtime: Error An error that occurs during the
✓ Math co-processor: Part of the microprocessor; a execution of a program.
companion chip designed to perform complex ✓ Scanner: An input device used to copy a printed
calculations. document into a computer’s memory in digital form,
✓ Megabyte (M, MB): Approximately one million without requiring manual keying.
characters; actually 1,048,576 bytes. A measure of ✓ SCSI: Small Computer System Interface. A standard
memory or storage. for connecting a hard drive to a computer.
✓ Megahertz (MHz): A measure of processing speed. ✓ Serial Port: An outlet on a computer used to attach a
The higher the value, the faster a computer can work. device, such as a modem. A serial port sends data
✓ Microprocessor: A single chip containing all the (bits) down the wire one at a time (in a series).
elements of a computer's CPU. ✓ Service Pack: It is an update to a software version
✓ MIPS: Million Instructions Per Seconds, a unit for that fixes an existing problem, such as a bug or
measuring the speed of a computer. ✓ provides enhancements to the product that will
✓ Mother Board: The main circuit board of a computer, appear in the next version of the product.
which carries electrical signals to and from various ✓ TCP/IP: Transmission Control Protocol / Internet
parts of the computer. Protocol is a set of communication protocols that
✓ Multimedia: A computer system that combines text, encompass media access, packet transport, session
graphics, animation, music, voice and video media; communications, file transfer, e-mail, and terminal
may include stereo speakers as an output device. emulation. TCP/IP is supported by a large number of
✓ Multiprocessing: It refers to a computer system’s H/W and S/W vendors and is available on many
ability to support more than one process at the same computer systems, from PCs to mainframes.
time. It is also called multitasking. ✓ Troubleshoot: To isolate the source of a problem and
✓ Nibble: Half a byte i.e. 4bits. fix it. In case of computer systems, troubleshoot is
✓ Non-Volatile Memory: This is data storage that does usually used when the problem is hardware related.
not lose its contents on power off; for example, ROM. ✓ UNIX: A multi user operating system.
www.gradeup.co

✓ Upgrade: A new version of a software or hardware the event of a power cut for several
product designed to replace an older version of the minutes to some hours.
same product. ✓ Utility: A program that performs a very specific task,
✓ UPS: Uninterruptible Power Supply. It is a power usually related to managing system resources.
supply that includes a battery to maintain power in

Some expected and important questions of Computer Awareness for upcoming examinations

6. Which of these is a not a computer manufacturer?


1. How many vacuum tubes was used if ENIAC? A. IBM B. Apple C. Microsoft
A. 8,498 B. 19,230 C. 17,468 D. Sun E. None of these
D. 13,621 E. None of these Ans: C
Ans: C Microsoft manufactures a variety of software programs
ENIAC contained 17,468 vacuum tubes, 7200 crystal and its Operating System Windows is one of the most
diodes, 1500 relays, 70,000 resistors, 10,000 capacitors popular Operating Systems around. It however does not
and approximately 5,000,000 hand-soldered joints. manufacture computers.
2. Vacuum Tube is the invention ……generation. 7. Which of the following is not an input device?
A. 1st Gen B. 2nd Gen A. OCR
C. 4th Gen D. 5th Gen E. None of these B. Optical scanners
Ans: A C. Voice recognition device
In first Generation (1940-1956), the first computers used D. COM (Computer Output to Microfilm)
vacuum tubes for circuitry and magnetic drums for E. None of these
memory and were often enormous, taking up entire rooms. Ans: D
3. The computer size was very large in ____. An input device is a peripheral used to provide data and
A. First Generation B. Second Generation control signals to an information processing system such
C. Third Generation D. Fourth Generation as a computer or information appliance. Examples of
E. None of these input devices include keyboards, mice, Optical scanners,
Ans: A digital cameras, Voice recognition device, OCR and
First generation computers used 1000s of vacuum joysticks.
tubes that required lot of space made them gigantic in 8. Which among the following is the odd one______?
size. Single transistor could replace 1000 vacuum tubes A. Mouse B. Scanner
and a single IC chip replaced 1000s of transistors made C. Printer D. Keyboard E. None of these
computers smaller and more-speedy. Ans: C
4. ____ is responsible for overall control and co-ordination of Except Printer (Output device) all are examples of input
instruction execution. devices (keyboards, mouse, scanners ).
A. CPU B. ALU C. RAM 9. What is Skylake?
D. Control Unit E. None of these A. NASA’s new mission
Ans: D B. Upcoming James Bond’s Movie
The control unit (CU) is a component of a computer's C. Core Processors
central processing unit (CPU) that directs operation of D. China’s New Fourth Generation Aircraft
the processor. It tells the computer's memory, E. None of these
arithmetic/logic unit, input and output devices how to Ans: C
respond to a program's instructions. Skylake is Intel’s Sixth Generation Core Processors.
5. Which of the following is the fastest type of computer? 10. Which is not a storage device?
A. Minicomputer B. Mainframe computer A. Printer B. CD C. Hard disk
C. Supercomputer D. Digital computer D. Floppy Disk E. DVD
E. None of these Ans: A
Ans: C Storage device is a piece of computer equipment on
A supercomputer is a computer with great speed and which information can be stored. But Printer is the
memory. supercomputer channels all its power into External device that communicates with another digital
executing a few programs as fast as possible. device to print what a user sees on a screen.
www.gradeup.co

11. ____ ___technologies is used by banks for faster processing 17. Physical components that make up
of large volumes of cheques. your computer are known as______.
A. OCR B. OMR C. MICR A. Software B. Operating Systems
D. Bar code E. None of these C. Hardware D. Web Browsers
Ans: C E. None of these
Magnetic Ink Character Recognition Code is a character- Ans: C
recognition technology used mainly by the banking The most common hardware components are Monitor,
industry to ease the processing and clearance of cheques Keyboard, Mouse, CPU etc.
and other documents. 18. In MS- Word WYSIWYG stands for__________?
12. Who invented Analytical engine? A. Preview B. What you see is what you get
A. Blaise Pascal B. George Bool C. What you see is where you get
C. Charles Babbage D. Dr. Herman Hollerith D. Print E. None of these
E. None of these Ans: B
Ans: C WYSIWYG is an acronym for "What you see is what you
The Analytical Engine was a proposed mechanical get".
general-purpose computer designed by English 19. Which of the following is suitable after you install new
mathematician and computer pioneer Charles Babbage. drivers?
13. Memory which forgets everything when you switch off the A. Shut Down B. Restart C. Sleep
power is known as_____. D. Hibernate E. None of these
A. Corrupted B. Volatile C. Non-Volatile Ans: B
D. Non-Corrupted E. None Restart is suitable after you install new drivers.
Ans: B 20. Which of the following cannot be shared?
Non-volatile keeps memory when the computers power is A. Printer B. Scanner C. Plotter
switched off. Volatile dumps everything in RAM when the D. Mouse E. None of these
computer loose power. Ans: D
14. Which of the following code used in present day Mouse is a pointing device that detects two-dimensional
computing was developed by IBM Corporation? motion relative to a surface. Mouse cannot be shared.
A. ASCII B. Hollerith Code 21. A terabyte comprises_______.
C. EBCDIC Code D. Baudot Code A. 1025 byte B. 1024 byte C. 1024 bits
E. None of these D. 1024 gigabyte E. None of these
Ans: C Ans: D
Extended Binary Coded Decimal Interchange Code A terabyte (TB) is a measure of computer storage
(EBCDIC) is an 8-bit character encoding used mainly on capacity approximately 1,024 gigabytes (GB).
IBM mainframe and IBM midrange computer operating 22. What does MICR stand for?
systems. A. Magnetic Ink character Register
15. An image editing software in which we can draw and edit B. Magnetic Ink Code Reader
images is? C. Magnetic Ink Code Register
A. PageMaker B. MS-Paint C. Coral Draw D. Magnetic Ink character Recognition
D. Photo Image E. Front page E. Magnetic Ink cases Reader
Ans: C Ans: D
Corel Draw is a vector graphics editor. A vector graphics Magnetic Ink Character Recognition (MICR) is a
editor is a computer program that allows users to character-recognition technology used mainly by the
compose and edit vector graphics images interactively on a banking industry to ease the processing and clearance of
computer. cheques and other documents.
16. In DOS, which of the following command is used to delete 23. Virtual memory is________?
all the files as well as sub-directories of a directory? A. Memory on the hard disk that the CPU uses an extended
A. Delete B. Del C. Deltree RAM
D. Move E. None of B. Access the page table
Ans: C C. CPU generates a physical address
Deltree command is used to delete all the files as well as D. Automatic storage allocation
sub-directories of a directory. E. None of these
Ans: A
www.gradeup.co

Virtual memory is a feature of an operating system (OS) 29. Micro-programming introduced


that allows a computer to compensate for shortages of by_______?
physical memory by temporarily transferring pages of data A. John Mauchley B. Maurice Wilkies
from random access memory (RAM) to disk storage. C. William Shockley D. Blaise pascal
24. In DVD, V stands for_________. E. None of these
A. Video B. Versatile Ans: B
C. Both A and B D. Volatile In 1951, Maurice Wilkies was developed the concept of
E. None of these microprogramming from the realization that the Central
Ans: B Processing Unit of a computer could be controlled by a
DVD (digital versatile disc or digital video disc) is a miniature, highly specialised computer program in
digital optical disc storage format, invented and developed high-speed ROM.
by Philips, Sony, Toshiba and Panasonic in 1995. 30. On color monitor each pixel is composed of _____.
25. What is the full form of SIM? A. two mini dots B. five mini dots
A. Station Identity Module C. six mini dots D. three mini dots
B. System Identity Module E. None of these
C. Subscriber Identity Module Ans: D
D. Subscriber Trunk Dialing On color monitors, each pixel is actually composed of
E. None of these three dots a red, a blue and a green one.
Ans: C 31. Numbers and formulae entered in a cell are called _____.
A Subscriber Identity Module card is a portable memory A. Labels B. Numeric entries
chip,that enables you to make phone calls from any C. Intersection D. Text
corner of the Globe, where you get the subscriber's E. Fellers
Network. Ans: B
26. Who among the following has coined the term When entering numbers in a cell the spreadsheet
Multimedia? interprets the data as being numbers, which makes the
A. Bob Goldstein B. Tay Vaughan use of mathematical formulas on the data possible.By
C. NASA D. Mc Graw Hills default the data recognized as being numbers will be right
E. None of these justified in the cell.
Ans: A 32. Fax machines are used to send documents through a?
The term multimedia was coined by singer and artist Bob A. Telephone line B. Modems
Goldstein to promote the July 1966 opening of his C. Co-axial wire D. All of these
"LightWorks at L'Oursin" show at Southampton, Long E. None of these
Island. Ans: A
27. What is GIS stands for? Fax is the telephonic transmission of scanned printed
A. Geological Information System material normally to a telephone number connected to a
B. Genetics Information Systems printer or other output device.
C. Geographic Information Systems 33. Date and time are available on the desktop at_________.
D. Gene Information systems A. Keyboard B. Recycle bin
E. None of these C. My computer D. Task bar
Ans: C E. None of these
A geographic information system (GIS) is a system Ans: D
designed to capture, store, manipulate, analyze, manage, A taskbar is an element of a graphical user interface. It
and present all types of spatial or geographical data. shows which programs or applications are running on the
28. A ______is a software program used to view Web pages. device as well as provide links or shortcuts to other
A. Site B. Host C. Link programs or places, such a start menu, notification area
D. Browser E. None of these and clock.
Ans: D
A browser is a software application used to locate,
retrieve and display content on the World Wide Web,
including Web pages, images, video and other files.
www.gradeup.co

34. To save an existing file with new name at a new location 39. Video–conferencing requires a
we should use_______command . microphone, speakers and a ______ attached to your
A. Save B. Save and replace computer.
C. Save as D. New file A. Mouse B. Keyboard C. Video camera
E. None of these D. Scanner E. Light pen
Ans: C Ans: C
Choosing "Save As" brings up a prompt to save your work Video-conferencing is a set of telecommunication
as a file with a different name. Just be sure to rename the technologies which allow two or more locations to
file something new when you choose "Save As" or you communicate by simultaneous two-way video and audio
will overwrite the current saved version. transmissions. For a videoconferencing system video
35. You can use ____to copy selected text and ______ to paste it camera, computer monitor, television, projector are
in a document. required.
A. ctrl+c, ctrl+ v B. ctrl+ c, ctrl+p 40. Which of the following is an operating system?
C. ctrl+ s, ctrl+z D. shift+ c, alt+ p A. Linux B. Debugger C. Mozilla
E. ctrl+d , ctrl+a D. Google chrome E. Intel 8085
Ans: A Ans: A
We can use ctrl+c to copy selected text and ctrl+v to Linux is a Unix-like computer operating system
paste it to the document. assembled under the model of free and open-source
36. A red wavy line under a word indicates that the software development and distribution.
word_______. 41. What is Dr. Watson?
A. Is too long for the line of text A. IT Expert B. Application Debugger
B. Is not in the dictionary file and therefore might be spelt C. Surgeon D. Operating system
incorrectly E. None
C. Is not appropriate for that particular sentence Ans: B
D. Is a verb Dr. Watson is an application debugger included with the
E. None of these Microsoft Windows operating system.
Ans: B 42. Which of the following cables can transmit data at high
MS word can check the text for correctness and allows speeds?
you to make amends. If there is a spelling mistake, the A. Flat cables B. Coaxial cable
word gets underlined with a red color line indicating the C. Optic fiber cable D. Twisted pair cable
error. E. UTP cable
37. Windows xp, windows 7, windows 8.1 are known as what? Ans: C
A. Processors B. Domain names A fiber optic cable consists of a bundle of glass threads,
C. Modems D. Operating system each of which is capable of transmitting messages
E. None of these modulated onto light waves.
Ans: D 43. Which of the following is not a binary number?
An operating system is system software that manages A. 11101 B. 110 C. 233
computer hardware and software resources and provides D. 1001 E. 10010
common services for computer programs. Ans: C
38. _______ is when the more power-hungry components, such A binary number is a number expressed in the binary
as the monitor and the hard drive are put in idle. numeral system which represents numeric values using
A. Hibernation B. Power down two different symbols, typically 0 and 1.
C. Standby mode D. The shutdown procedure 44. What does the computer abbreviation MB used for?
E. None of these A. Mega Bit B. Million Bytes C. Mega Bytes
Ans: C D. Million Bit E. Micro Bytes
When electronic devices are receiving power but are not Ans: C
running, they are in standby mode. A computer in The megabyte is a multiple of the unit byte for digital
standby mode requires a small amount of current called a information. Its recommended unit symbol is MB.
"trickle charge" that keeps the current state of running
software saved in the computer's RAM.
www.gradeup.co

45. What is the base of hexadecimal number system? identification number (VIN). A
A. 2 B. 8 C. 16 relational database must always have one and only one
D. 10 E. None of these primary key.
Ans: C 51. Which of the following computer language is a
The hexadecimal numeral system, is a numeral system mathematically oriented languages used for scientific
made up of 16 symbols (base 16). problems?
46. RTGS stand for_____. A. FORTRAN B. COBOL C. LISP
A. Real Time Gross Settlement D. PROLOG E. APPLE
B. Real Time General Settlement Ans: A
C. Run Time gross Settlement FORTRAN is used for scientific & Engineering while
D. Regular Time General Settlement COBOL is oriented language commercial and PROLOG is a
E. None of these general-purpose logic programming language associated
Ans: A with artificial intelligence and computational linguistics.
Real-time gross settlement (RTGS) systems are specialist 52. Which of the following is NOT a computer programming
funds transfer systems where transfer of money or language?
securities takes place from one bank to another on a A. C B. C++ C. Java
"real time" and on "gross" basis. D. COBOL E. Microsoft
47. What is the name given to the temporary storage area that Ans: E
a web browser uses to store pages and graphics that it has C, C++, Java ,COBOL are the computer programming
recently opened? languages while Microsoft is an application software.
A. Niche B. Webspace C. Cache 53. Which of the following is not an operating system?
D. Cellar E. None of these A. DOS B. UNIX C. MAC(OS)
Ans: C D. DBMS E. Windows XP
Images are often stored in a cache so the next time you Ans: D
request for that image it is obtained locally rather than Operating system is a system software that manages
from the website. computer hardware and software resources and
48. Oracle is an example of ______ application software. provides common services for computer programs.
A. Database 54. One nibble is equal to how many bits ?
B. Word processing A. 4 bits B. 8 bits C. 12 bits
C. Project management D. 16 bits E. None of these
D. Presentation graphics Ans: A
E. Desktop In computing, a nibble is a four-bit aggregation. It is also
Ans: A known as half-byte.
Database software tools are primarily used for storing, 55. Verification of a Login name and password is known
modifying, extracting and searching for information as________.
within a database. A. Configuration B. Accessibility
49. MySQL is_____? C. Authentication D. Logging in
A. a hierarchical model B. a RDBMS E. None of these
C. a relational model D. a database scheme Ans: C
E. None of these Authentication is the process of identifying an
Ans: B individual, usually based on a login name and password.
MySQL is a relational database management system 56. Which of the following can be used to select the entire
(RDBMS). It was the world's second most widely used document?
RDBMS and the most widely used open-source RDBMS. A. Ctrl+A B. Alt+F5 C. Shift+A
50. Primary key is a ______? D. Ctrl+K E. Ctrl+H
A. Common key B. Unique key Ans: A
C. Input key D. Output key For selecting entire document we use Ctrl+ A.
E. None of these
Ans: B
A primary key is a key in a relational database that is
unique for each record. It is a unique identifier, such as a
driver license number, telephone number or vehicle
www.gradeup.co

62. Time during which a job is processed


57. Which of the following will you require to hear music on by the computer is_____.
your computer? A. Execution Time B. Delay Time
A. Video Card B. Sound Card C. Real Time D. Waiting Time
C. Mouse D. Joy Stick E. None of these
E. None of these Ans: A
Ans: B Time during which a job is processed by the computer is
A sound card is used to generate sound and provides Execution Time.
audio output to external devices like speakers and 63. Internet Explorer is a _____.
headphones. A. Web Browser B. Graphing Package
58. What is the meaning of OSI, in terms of computers? C. News Reader D. Any person browsing the net
A. Open Software Interrelation E. None of these
B. Open System Interrelation Ans: A
C. Open System Interconnection Internet Explorer (IE) is the most common web
D. Open Software Interconnection browsers . Web Browser is a program that you use to
E. None of these surf the internet.
Ans: C 64. USB in data cables stands for?
The Open Systems Interconnection (OSI) model is a A. Unicode smart Bus B. Universal structural Bus
conceptual model that characterizes and standardizes C. Unicode Serial Bus D. Universal serial Bus
the communication functions of computing system E. None of these
without regard of their underlying internal structure and Ans: D
technology. Universal Serial Bus (USB) is an industry standard
59. Father of 'C' programming language_________. developed in the mid-1990s that defines the cables,
A. Dennis Ritchie connectors and communications protocols used in a bus
B. Prof Jhon Kemeny for connection, communication, and power supply
C. Thomas Kurtz between computers and electronic devices.
D. Bill Gates 65. You must install a (n) ____________ on a network if you want
E. None to share a broadband Internet connection.
Ans: A A. router B. modem
Dennis Mac Alistair Ritchie was an American computer C. node D. cable E. None of these
scientist. He created the C programming language. Ans: A
60. Which of the following is not a method of accessing the A router is a device that forwards data packets along
web? networks. A router is connected to at least two networks.
A. modem B. ISDN C. DSL Routers are located at gateways, the places where two or
D. CPU E. None of these more networks connect.
Ans: D 66. To reload a web page, press the _____button.
CPU (central Processing Unit) is a part of the computer. A. Redo B. Reload C. Restore
All the others can be used to access the net. D. Ctrl E. Refresh
61. Yahoo (www.yahoo.com) is a _________. Ans: E
A. Website for Consumers In general refresh is another way of saying reload or
B. Portal updating what is being displayed in web page.
C. Organization that allocates web addresses 67. ____ mouse uses laser rays for the movement of curser.
D. Super Computer A. Mechanical mouse B. Optical mouse
E. None of these C. Magnetic mouse D. Normal mouse
Ans: B E. None of these
Yahoo is one of the largest portals in the world. A portal Ans: B
is a website intended to be a starting point for exploring An optical computer mouse uses only a light source,
and searching the www. typically a laser and a light detector, such as an array of
photodiodes to detect movement relative to a surface.
www.gradeup.co

74. A web ______consists of one or more


68. Full form of PSU which is an internal component used to Web pages located on a Web server.
supply the power. A. Hub B. Site C. Story
A. Power supply unit B. Permanent supply unit D. Template E. None of these
C. Placement supply unit D. Programmable supply unit Ans: B
E. None of these A web site is a set of related web pages typically served
Ans: A from a single web domain.
A power supply unit (PSU) converts mains AC to low- 75. __________are used to identify a user who returns to a
voltage regulated DC power for the internal components Website.
of a computer. Modern personal computers universally use A. Cookies B. Plug-ins C. Scripts
a switched-mode power supply. D. ASPs E. None of these
69. Disk access times are measured in ______? Ans: A
A. minute B. Milliseconds An HTTP cookie is a small piece of data sent from a
C. Hours D. seconds E. None of these website and stored in a user's web browser while the
Ans: B user is browsing that website.
Disk access times are measured in milliseconds, often 76. The _______specifies the operation to be performed and the
abbreviated as ms. operands provide the data on which the operation is to be
70. Blaise Pascal has introduced_______________? performed.
A. Adding machine B. Abacu A. Source code B. Opcode C. Object code
C. Calculator D. difference engine D. Program code E. None of these
E. None of these Ans: B
Ans: A An opcode is the portion of a machine language
In 1642, Balise Pascal has introduced an adding machine instruction that specifies the operation to be performed.
that could perform additions and subtractions directly Beside the opcode itself, instructions usually specify the
and multiplication and divisions by repetition. data they will process, in form of operands.
71. Sending an e-mail is similar to _________. 77. Which of the following is Open Source Software?
A. Petering an event B. Narrating a store A. Windows B. Linux C. IOS
C. Writing a letter D. Creating a drawing D. Adobe Photoshop E. None of these
E. None of these Ans: B
Ans: C Linux is a Unix-like computer operating system (OS)
Creating and sending an e-mail message is in many ways assembled under the model of free and open-source
similar to writing a letter without a stamp. software development and distribution.
72. You can use the ______bar to type a URL and display a 78. What is the name of the software that allows us to browse
webpage or type a keyword to display a list of related through web pages called?
webpages. A. Browser B. Mail client C. FTP client
A. Menu B. Title C. Search D. Messenger E. None of these
D. Web E. Address Ans: A
Ans: E A web browser is a software application for retrieving,
The graphical control element address bar shows the presenting and traversing information resources on the
current URL and accepts a typed URL that navigates the World Wide Web.
user to a chosen website in a web browser. 79. When you purchase a product over a Mobile Phone, the
73. Which one of the following is a search engine? transaction is called_____.
A. Airtel B. Jagran C. Live Hindustan A. Web commerce B. e- commerce
D. Google E. None of these C. m-commerce D. Mobile Purchase
Ans: D E. None of these
A web search engine is a software system that is designed Ans: C
to search for information on the World Wide Web. The M-commerce (mobile commerce) is the buying and
search results are generally presented in a line of results selling of goods and services through wireless handheld
often referred to as search engine results pages. devices such as cellular telephone and personal digital
assistants (PDAs).
www.gradeup.co

86. What is an e-mail attachment?


80. Named collection of fields which represent a complete unit A. A receipt sent by the recipient
of information is called______. B. A separate document from another program sent along
A. Field B. Record C. Table with an e-mail message
D. File E. None of these C. A malicious parasite that feeds off of you messages and
Ans: B destroys the contents
A record is a collection of elements, typically in fixed D. A list of CC and BCC recipients
number and sequence and typically indexed by serial E. None of these
numbers or identity numbers. The elements of records Ans: B
may also be called fields or members. An email attachment is a computer file sent along with
81. A __________ is a grid with labeled columns and rows. an email message. One or more files can be attached to
A. Dialog box B. Worksheet any email message and be sent along with it to the
C. Clipboard D. Toolbar recipient.
E. None of these 87. The _________program compresses large files into a smaller
Ans: B file.
An Excel worksheet is a single spreadsheet that contains A. WinZip B. WinShrink C. WinStyle
cells organized by rows and columns. D. Microsoft E. None of above
82. An example of a telecommunication device is a________. Ans: A
A. Keyboard B. Mouse C. Modem WinZip is a program that lets you archive and compress
D. Printer E. Scanner files so that you can store or distribute them more
Ans: C efficiently.
Modem is one that turns the digital data of a computer 88. The _________folder retains copies of message that you have
into modulated electrical signal for transmission over started but are not yet ready to send.
telephone lines and demodulated by another modem at A. Inbox B. Outbox C. Drafts
the receiver side to recover the digital data. D. Sent Items E. Address Book
83. Programs that automatically submit your search request to Ans: C
several search engines simultaneously are called________. A draft is simply an email message you haven’t yet sent.
A. Metasearch engines B. Webcrawlers It’s not the same thing as an email waiting to be sent.
C. Spiders D. Hits 89. Which is not an internet protocol?
E. None of these A. HTTP B. FTP C. STP
Ans: A D. UDP E. None of these
Metasearch engine is a search tool that uses another Ans: C
search engine's data to produce their own results from the The Internet Protocol (IP) is the principal
Internet. communications protocol in the Internet protocol suite for
84. What kind of Protocol is used to provide Internet access relaying datagrams across network boundaries. Some
from mobile? protocols are TCP, IP, UDP, POP, SMTP, HTTP, FTP.
A. TCP/IP B. ISD C. WAP 90. What kind of server converts IP addresses to domain
D. HTTP E. None of these names?
Ans: C A. DNS B. MNS C. UTP
WAP (Wireless Application Protocol) is a technical D. RTP E. None of these
standard for accessing information over a mobile Ans: A
wireless network. The Domain Name System (DNS) is a hierarchical
85. What is the slowest transmission medium? distributed naming system for computers, services, or
A. Twisted pair wire B. Coaxial cable any resource connected to the Internet or a private
C. Fiber optic cable D. All of the above network.
E. None of these
Ans: A
Twisted pair wire is the most widely used but slowest
medium for telecommunication. It consists of copper
wires that are twisted into pairs. The transmission speed
ranges from 2 million bits per second to 10 billion bits
per second.
www.gradeup.co

Ans: D
91. POST stands for_______. Command is a directive to a computer program acting as
A. Power On Selfie Test B. Power One Self Test an interpreter of some kind in order to perform a specific
C. Power On Self Test D. Power On Self Testing task.
E. None of these
Ans: C 97. An e-mail address typically consists of a user ID followed
The first thing that the BIOS does when it boots the PC is to by the ____ sign and the name of the e-mail server that
perform what is called the Power-On Self-Test. The POST manages the user’s electronic post office box.
is a built-in diagnostic program that checks your hardware A. @ B. # C. &
to ensure that everything is present and functioning D. * E. None of these
properly, before the BIOS begins the actual boot. Ans: A
92. Which of the following is a network in which computers An e-mail address typically consists of a user ID followed
are located physically close together, often in the same by @ sign and the name of the e-mail server that manages
building? the user’s electronic post office box.
A. LAN B. WAN C. RAM 98. _______are devices used to transmit data over
D. ROM E. None of these telecommunications lines.
Ans: A A. Drives B. Drives bays C. Modems
A local area network (LAN) is a computer network that D. Platform E. None of these
interconnects computers within a limited area such as a Ans: C
residence, school, laboratory, or office building. A modem is a device that modulates signals to encode
93. Programs such as Mozilla Firefox that serve as navigable digital information and demodulates signals to decode
windows into the Web are called__________. the transmitted information. This device used to transmit
A. Internet B. Data card C. Web browsers data over telecommunication.
D. RAM E. None of these 99. What is the file extension of MS-Power point ?
Ans: C A. .exe B. .xls C. .ppt
Mozilla Firefox is a free and open-source web browser D. .pst E. None of these
developed by the Mozilla Foundation and its subsidiary, Ans: C
the Mozilla Corporation. .ppt is a file extension for a presentation file format used
94. Who invented the language ‘C ‘? by Microsoft PowerPoint, the popular presentation
A. Dennis M. Ritchie B. Niklaus Writh software commonly used for office and educational slide
C. Seymour Papert D. Donald Kunth shows.
E. None of these 100. The information stored in the catalog is called ________.
Ans: A A. Meta-data B. Mini-world
Dennis MacAlistair Ritchie was an American computer C. Record D. All of the above
scientist. He created the C programming language. E. None of these
95. You click at B to make the text ________. Ans: A
A. Italics B. Underlined The system catalogs are the place where a relational
C. Italics and under lined database management system stores schema metadata,
D. Bold such as information about tables and columns and
E. None of these internal book keeping information.
Ans: D
If i click at B it makes the text Bold.
96. Each ______ on a menu performs a specific action.
A. Client B. Server C. Node
D. Command E. None of these
www.gradeup.co

Computer Abbreviations

1. ADSL: Asymmetric Digital Subscriber Line 42. CGM: Computer Graphics Metafile
2. AGP: Accelerated Graphics Port 43. CIDR: Classless InterDomain Routing
3. AI: Artificial Intelligence 44. CIM: Computer Integrated Manufacture
4. ALGOL: Algorithmic Language 45. CISC: Complex Instruction Set Computers
5. ALU: Arithmetic Logic Unit 46. CIX: Commercial Internet Exchange
6. ANSI: American National Standards Institute 47. CLR: Common Language Runtime
7. API: Application Program Interface 48. CMOS: Complementary Metal Oxide Semiconductor
8. APIPA: Automatic Private Internet Protocol Addressing 49. CMS: Content Management System
9. APT: Automatically Programmed Tooling 50. CMYK: Cyan, Magenta, Yellow, Key (Black)
10. ARP: Address Resolution Protocol 51. COBOL: Common Business Oriented Language
11. ARPANET: Advanced Research Projects Agency 52. CORBA: Common Object Request Broker Architecture
Network 53. CPI: Clock Cycle Per Instruction
12. ASCII: American Standard Code For Information 54. CPU: Central Processing Unit
Interchange 55. CRC: Cyclic Redundancy Check
13. ASF: Advanced Streaming Format 56. CRM: Customer Relationship Management
14. ASP: Active Server Pages 57. CROM: Control Read Only Memory
15. ATAPI: Advanced Technology Attachment Packet 58. CRT: Cathode Ray Tube
Interface 59. CUI: Character User Interface
16. ATM: Asynchronous Transfer Mode 60. DAC: Digital To Analog Converter
17. AUI: Attachment Unit Interface 61. DAO: Data Access Objects
18. AVI: Audio Video Interleave 62. DARPANET: Defense Advanced Research Projects
19. BASIC: Beginner`s All Purpose Symbolic Instruction Agency Network
Code 63. DBA: Data Base Administrator
20. BCD: Binary Coded Decimal 64. DBMS: Data Base Management System
21. BDPS: Business Data Processing Systems 65. DCL: Data Control Language
22. BHTML: Broadcast Hyper Text Markup Language 66. DCP: Data Communication Processor
23. BIOS: Basic Input Output System 67. DDL: Data Definition Language
24. BIU: Bus Interface Unit 68. DDOS: Distributed Denial Of Service
25. BMP: Bitmap 69. DDP: Distributed Data Processing
26. BPS: Bytes Per Seconds 70. DFD: Data Flow Diagram
27. C-DAC: Centre For Development Of Advanced 71. DFS: Distributed File System
Computing 72. DHCP: Dynamic Host Control Protocol
28. CAD: Computer Aided Design 73. DHTML: Dynamics Hyper Text Markup Language
29. CADD: Computer Added Drafting And Design 74. DLC: Data Link Control
30. CAI: Computer Aided Instruction 75. DLL: Dynamic Link Library
31. CAM: Computer Aided Manufacturing 76. DMA: Direct Memory Access
32. CAR: Control Address Register 77. DML: Data Manipulation Language
33. CASE: Computer Aided Software Engineering 78. DMTF: Distributed Management Test Force
34. CCIS: Common Channel Interoffice Signaling 79. DNA: Distributed Internet Architecture
35. CCNA: Cisco Certified Network Associate 80. DNS: Domain Name System
36. CD: Compact Disc 81. DOM: Document Object Model
37. CD RW: Compact Disc ReWritable 82. DOS: Disk Operating System
38. CDMA: Code Division Multiple Access 83. DPI: Dots Per Inch
39. CDROM: Compact Disc Read Only Memory 84. DRAM: Dynamic Random Access Memory
40. CFG: Control Flow Graph 85. DSL: Digital Subscriber Line
41. CGI: Common Gateway Interface 86. DSN: Digital Subscriber Network
www.gradeup.co

87. DTD: Document Type Definition 133.IOP: InputOutput Processor


88. DVD: Digital Versatile Disc 134.IP: Internet Protocol
89. EAROM: Electrically Alterable Read Only Memory 135.IPX: Internetworked Packet Exchange
90. EBCDIC: Extended Binary Coded Decimal Interchange 136.IRAM: Integration Ram
Code 137.IRC: Internet Relay Chat
91. EDC: Electronic Digital Computer 138.IRDA: Infrared Data Association
92. EDCDIC: Extended Binary Coded Decimal Interchange 139.IRQ: Interrupt Request
Code 140.ISAPI: Internet Server Application Program Interface
93. EEPROM: Electrically Erasable Programmable Read 141.ISDN: Integrated Services Digital Network
Only Memory 142.ISO: International Standard Organization
94. EFS: Encrypted File System 143.ISP: Internet Service Provider
95. ENIAC: Electronics Numerical Integrator And Calculator 144.ISR: Interrupt Service Routine
96. EPROM: Erasable Programmable Read Only Memory 145.JCL: Job Control Language
97. EROM: Erasable Read Only Memory 146.JDBC: Java Data Base Connectivity
98. EULA: End User License Agreement 147.JHTML: Java Within Hyper Text Markup Language
99. FAT: File Allocation Table 148.JPEG: Joint Photographic Experts Group
100. FDD: Floppy Disk Drive 149.JSP: Java Server Pages
101. FDDI: Fiber Distributed Data Interface 150.KB: Kilo Bytes
102. FDMA: Frequency Division Multiple Access 151.KBPS: Kilo Bytes Per Second
103. FIFO: First In First Out 152.L2TP: Layer Two Tunneling Protocol
104. FLOPS: Floating Point Operations Per Second 153.LAN: Local Area Network
105. FO: Fiber Optics 154.LCD: Liquid Crystal Display
106.FORTRAN: Formula Translation 155.LDAP: Light Weight Directory Access Control
107. FPS: Frames Per Second 156.LIFO: Last In First Out
108. FRAM: Ferro Electric Random Access Memory 157.LIPS: Logical Interfaces Per Second
109. FTP: File Transfer Protocol 158.LOC: Lines Of Code
110. GB: Giga Bytes 159.LSI: Large Scale Integration
111. GIF: Graphic Interchange Format 160.LSP: Layered Service Provider
112. GIGO: Garbage In Garbage Out 161.MAC: Media Access Control
113. GML: General Markup Language 162.MAN: Metropolitan Area Network
114. GUI: Graphical User Interface 163.MAU: Multi Station Access Unit
115. HDD: Hard Disk Drive 164.MB: Mega Bytes
116. HFS: Hierarchical File System 165.MBONE: Multicast Backbone
117. HP: Hewlett Packard 166.MBPS: Mega Bytes Per Second
118.HPC: High Performance Computing 167.MBR: Master Boot Record
119.HPFS: High Performance File System 168.MCP: Microsoft Certified Professional
120.HSR: Horizontal Scan Rate 169.MCS: Multicast Server
121.HTML: Hyper Text Markup Language 170.MDI: Multiple Document Interface
122.HTTP: Hyper Text Transfer Protocol 171.MDS: Microcomputer Development System
123.IO: Input Output 172.MG: Mega Bytes
124.IBM: International Business Machines 173.MICR: Magnetic Ink Characters Reader
125.IC: Integrated Circuit 174.MIMD: Multiple Instruction Multiple Data
126.ICMP: Internet Control Message Protocol 175.MIME: Multipurpose Internet Mail Extensions
127.ICS: Reduce Instruction Set Computer 176.MIPS: Millions Of Instructions Per Second
128.ICT: Information And Communication Technology 177.MISD: Multiple Instruction Single Data
129.IDE: Integrated Development Environment 178.MODEM: Modulator And Demodulator
130.IE: Internet Explorer 179.MP3: Motion Pictures Experts Group Layer 3
131.IGMP: Internet Group Management Protocol 180.MPEG: Motion Pictures Experts Group
132.IL: Intermediate Language 181.MSDN: Microsoft Developer Network
www.gradeup.co

182.MSIIS: Microsoft Internet Information Server 229.RICS: Reduced Instruction Set


183.MTU: Maximum Transmission Unit Computer
184.MUDS: Multi User Dungeons 230.RIP: Raster Image Processor
185.NAS: Network Attached Storage 231.RISC: Reduced Instruction Set Computer
186.NCP: Network Control Protocol 232.ROM: Read Only Memory
187.NDIS: Network Driver Interface Specification 233.RPC: Remote Procedure Call
188.NDRO: Nondestructive Read Out 234.RTC: Real Time Clock
189.NNTP: Network News Transfer Protocol 235.RTF: Rich Text Format
190.NTFS: New Technology File System 236.RTOS: Real Time Operating System
191.NTP: Network Time Protocol 237.SAM: Security Access Manager
192.OCR: Optical Character Readers 238.SAP: Service Access Point, Systems Applications
193.ODBC: Open Data Base Connectivity Products
194.OLE: Object Linking And Embedding 239.SD RAM: Synchronous Dynamic Random Access
195.OMR: Optical Mark Reader Memory
196.ONE: Open Network Architecture 240.SDD: Software Design Description
197.OOA: Object Orient Analysis 241.SDK: Software Development Kit
198.OOAD: Object Oriented Analysis And Design 242.SDL: Storage Definition Language
199.OOP: Object Oriented Programming 243.SDN: Integrated Service Digital Network
200.OOPS: Object Oriented Programming System 244.SDRAM: Static Dynamic Random Access Memory
201.OPEN GL: Open Graphics Library 245.SDSL: Symmetric Digital Subscribes Line
202.OSI: Open System Interconnection 246.SG RAM: Synchronous Graphics Random Access
203.PCI: Peripheral Component Interconnect Memory
204.PCMCIA: Personal Computer Memory Card 247.SGML: Standard Generalized Markup Language
International Association 248.SIM: Subscriber Identification Module
205.PDA: Personal Digital Assistant 249.SIMD: Single Instruction Multiple Data
206.PDF: Portable Document Format 250.SISD: Single Instruction Single Data
207.PDL: Page Description Language 251.SIU: Serial Interface Unit
208.PDU: Protocol Data Unit 252.SMP: Symmetric Multi-Process
209.PIC: Programming Interrupt Control 253.SMS: Short Message Service
210.PILOT: Programmed Inquiry Learning Or Teaching 254.SMTP: Simple Mail Transfer Protocol
211.PLA: Programmable Logic Array 255.SNA: System Network Architecture
212.PLC: Programmable Logic Controller 256.SNAP: Sub Network Access Protocol
213.PNG: Portable Network Graphics 257.SNMP: Simple Network Management Protocol
214.PNP: Plug And Play 258.SNOBOL: String Oriented Symbolic Language
215.PP: Peer To Peer Protocol 259.SOAP: Simple Object Access Protocol
216.PPTP: Point To Point Tunneling Protocol 260.SPX: Sequenced Packet Exchange
217.PROM: Programmable Read Only Memory 261.SQA: Statistical Quality Assurance
218.RADSL: Rate Adaptive Digital Subscribes Line 262.SQL: Structured Query Language
219.RAID: Redundant Array Of Independent Disks 263.SRAM: Static Random-Access Memory
220.RAM: Random Access Memory 264.SRS: Software Requirements Specification
221.RAMDAC: Random Access Memory Digital To Analog 265.TCP/IP—Transmission Control Protocol/Internet
Converter Protocol
222.RAS: Remote Access Network 266.TDMA—Time Division Multiple Access
223.RD RAM: Rambus Dynamic Random Access Memory 267.TTL—Transistor-Transistor Logic
224.RDBMS: Relational Data Base Management System 268.UDD: User Datagram Protocol
225.RDO: Remote Data Objects 269.UDP: User Datagram Protocol
226.RDP: Remote Desktop Protocol 270.UNC: Universal Naming Convention
227.RFC: Request For Comments 271.UNIX: Uniplexed Information And Computer Systems
228.RGB: Red Green Blue 272.UPS—Uninterruptible Power Supply
www.gradeup.co

273.URI—Uniform Resource Identifier 280.WAN—Wide Area Network


274.URL—Uniform Resource Locator 281.WAP—Wireless Access Point /Wireless Application
275.USB—Universal Serial Bus Protocol
276.UTF—Unicode Transformation Format 282.Wi-Fi—Wireless Fidelity
277.UTP—Unshielded Twisted Pair 283.WLAN—Wireless Local Area Network
278.VPN—Virtual Private Network 284.WPAN - Wireless Personal Area Network
279.VPU—Visual Processing Unit 285.XML - eXtensible Markup Language

X_________________________X________________________________X_____________________________________X

Best Wishes for Your Exam!


www.gradeup.co

You might also like