Comp Swa
Comp Swa
AWARENESS
Book for
Competitive Exams
FSSAI-FSO
STATE FSO
FCI - AGM
ENIAC was the first digital computer and it was invented by J. Presper
Eckert and John Mauchly at the University of Pennsylvania and began construction in 1943.
It uses 18000 vacuum tubes as a storing device. They were also founders of the first computer
company, it was initially named Electronic Controls Company which was later changed to
Eckert– Mauchly Computer Corporation, and released a series of mainframe electronic digital
stored-program computer under the name of UNIVAC. MIT introduces the whirlwind machine
(first computer with RAM) on March 8, 1955.
TYPES OF COMPUTER
Classification of Computer
Digital Analog Hybrid Super Mainframe Mini Micro General Special Purpose
Purpose
Hybrid computer used the combined feature of Analog and digital machine. you can see
hybrid computer in geological departments. Microcomputer these are small relatively
inexpensive computer designed for personal and office use. It has lowest storing and
processing speed. These can be laptop or desktop.
Mainframe computer it has very high memory and processing speed and used as a server
(can support thousands of users) Super computer can be used for complex type of
application i.e. specific research, weather forecasting, Weapon designing etc.
CDC 6600 was the first successful supercomputer. Sunway Taihu Light of China is the fastest
supercomputer in the world.PARAM-8000 India’s first Super Computer developed by C- DAC
Pune in 1998. Shasra T is considered as India’s fastest super computer, manufactured by Indian
Institute of Science.
Servers are dedicated computers that serve the needs or request of other programs or
computer. Workstations serve usually one user only. Information appliances are computers
specially designed to perform a specific "user-friendly" function—such as playing music,
photography. An embedded system is a computer system with a dedicated function within
a larger system.
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form.
The CPU is fabricated as a single Integrated Circuit (IC) chip. It is also known as the
Microprocessor. Multiprocessor Computers uses two or more central processing units
(CPUs) within a single computer system. The term also refers to the ability of a system to
support more than one processor and/or the ability to allocate tasks between them.
The central processing unit (CPU) is the brain of your computer. It handles all the
instructions you give your computer. The control unit (CU) is a component of a computer's
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic
operations. It represents the fundamental building block of the central processing unit
(CPU) of a computer.
Accumulator Register:- which stores the immediate result of arithmetic and logical
operations.
Memory address register (MAR) :- which contain the address of memory location to which
data is to be stored.
Program counter :- which contain the address of the next instruction to process.
Numeric Keypad is a keypad located on the right hand side of the keyboard. It consists of
digits and mathematical operators.
A Modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. By themselves,
modifier keys usually do nothing; that is, pressing any of the Shift, Alt, or Ctrl keys alone
does not (generally) trigger any action from the computer.
Hardware of Computer
A Mouse is the most popular input device which is used today for interactive processing
and for the one line entry of data for batch processing. The first computer mouse was
invented by Douglas Engelbart.
Joystick is the device that moves in all directions and controls the movement of a pointer.
A Touch Screen is a type of display screen device that is placed on the computer monitor
to allow direct selection or activation of the computer when the user touches the screen.
It acts as both input and output device.
Light Pen is the pen shaped device, which can sense light and is used to point at spots on
a video screen.
MICR reads the characters by examining their shapes in a matrix form and the information
is then passed `on to the computer. MICR stands for Magnetic Ink Character Reader. It
provides a high level of security and is therefore used by the banking industry for faster
processing of the cheque.
Bar Code is a machine readable code, which is represented by parallel vertical lines with
varying widths. For reading these bar-coded data, a device is used, which is known as a Bar
Code Reader (BCR)
Optical Character Recognition (OCR) is used to scan the document containing text. It is
the mechanical or electronic conversion of scanned or photographed images of
typewritten or printed text into machine- encoded/computer-readable text.
A point of sale terminal (POS terminal) is an electronic device used to process card
payments at retail locations.
The device that prints information from the computer onto the paper is Printer. The
printed form of output is referred as Hard Copy. The form of output displayed on the
screen is referred as Soft Copy. Pages per Minute (PPM) is the unit used to count the
speed of the printer. On the basis of technology, printers are categorized into Impact and
Non- Impact Printers.
II) Daisy wheel:- A hammer strikes a “petal” containing a character against the ribbon, and
the character prints on the paper. Its speed is slow typically 25-55 characters per second.
III) Line printer:- Line printers, or line-at-a-time printers, use special mechanism that can
print a whole line at once; they can typically print the range of 1,200 to 6,000 lines per
minute
IV) Drum printer:- A drum printer consists of a solid, cylindrical drum that has raised
characters in bands on its surface. The number of print positions across the drum equals
the number available on the page.
V) Chain printer:- A chain printer uses a chain of print characters wrapped around two
pulleys.
VI) Band printer:- Band printer has a steel band divided into five sections of 48 characters
each.
2. Non – Impact Printers do not touch the paper when creating an image.
I) Ink-jet printers:- One or more nozzles in the print head emit a steady stream of ink drops.
Droplets of ink are electrically charged after leaving the nozzle. The droplets are then
guided to the paper by electrically charged deflecting plates
II) Laser printers:- Laser printers use buffers that store an entire page at a time. When a
whole page is loaded, it will be printed.
III) Thermal printer:- is a digital printing process which produces a printed image by
selectively heating coated thermo chromic paper, or thermal paper as it is commonly
known, when the paper passes over the thermal print head.
A plotter is an output device that interprets commands from a computer to make line
drawings on paper with one or more automated pens. Unlike a regular printer, the plotter
can draw continuous point-to-point lines directly from vector graphics files or commands.
An uninterruptible power supply (UPS) is a device that allows a computer to keep running
for at least a short time when the primary power source is lost.
A Monitor is a TV-like display attached to the computer on which the output can be
displayed and viewed. It can either be a monochrome display or a colour display. The
number of pixels displayed on a screen is known as Resolution.
System software is a program which is created for the system and to make the system user
friendly such as operating system or is a type of computer program that is designed to run
a computer's hardware and application programs.
Utility software designed to help analyse, configure, optimize or maintain a computer such
antivirus software.
Operating system is a set of programs that help in controlling and managing the hardware
and the software resources of a computer system. Main functions of operating system
are :-
• Process management
• Memory management
• File management
• Security
• Command and interpretation
• Resource allocation
2) Multiprogramming operating system : It allows the instruction and data from two or
more separate process to reside in primary simultaneously. Multiprogramming system are
multitasking multiuser and multiprocessing operating system.
3) Single user : It is designed for single user and a single person use it at a time i.e. DOS
window’s 95 etc.
6) Time Sharing System: A time sharing system allows the many users to simultaneously
share the computer resources. Since each action or command in a time-shared system
take a very small fraction of time, only a little CPU time is needed for each user.
7) Mobile OS: Windows 10 Mobile is the latest name for Microsoft's phone and tablet
operating system. Google's latest’s version of its android OS is Nougat and iOS i.e. iPhone
Operating System's latest version is iOS 10.
MEMORY MANAGEMENT
Primary Storage (memory), also known as main storage and it is the area in a computer
in which data is stored for quick access by the computer's processor. The terms random
access memory (RAM) and memory are often as synonyms for primary or main storage.
Primary storage is volatile and can be contrasted with non-volatile secondary storage, also
known as auxiliary storage.
Cache memory is a smaller, faster memory which stores copies of the data from frequently
used main memory locations. A CPU cache is a hardware cache used by the central
processing unit (CPU) of a computer to reduce the average time to access data from the
main memory.
FSSAI: FCI: Computer Awareness Page 13
Secondary memory is where programs and data are kept on a long-term basis. Common
secondary storage devices are the hard disk and optical disks. The hard disk has enormous
storage capacity compared to main memory. The hard disk is usually contained inside the
case of a computer.
Read-only memory (ROM) is a storage medium used in computers and other electronic
devices. Data stored in ROM can only be modified slowly or with difficulty, or not at all.
ROM is non-volatile and the contents are retained even after the power is switched off.
It only allows reading.
The types of ROM include PROM, EPROM and EEPROM.
PROM - (programmable read-only memory) is a memory chip on which data can be written
only once.
The difference between a PROM and a ROM (read-only memory) is that a PROM is
manufactured as blank memory, whereas a ROM is programmed during the manufacturing
process. To write data onto a PROM chip, you need a special device called a PROM
programmer or PROM burner.
EPROM - (erasable programmable read-only memory) is a special type of PROM that can
be erased by exposing it to ultraviolet light.
Random Access Memory (RAM), allows the computer to store data for immediate
manipulation and to keep track of what is currently being processed.
RAM is referred to as volatile memory and is lost when the power is turned off.
It also known as read/write memory as information can be read from and written onto it.
The two main types of RAM are Static RAM and Dynamic RAM.
SRAM retains data as long as power is provided to the memory chip and need not be
refreshed periodically. It is often used as CPU Cache memory. SRAM stands for Static
Random Access Memory.
The data on DRAM continues to move in and out of the memory as long as power is
available and must be continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory. Virtual memory is memory on the hard disk that the
CPU uses as an extended RAM.
8 bit 1 byte
1024 Byte 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)
A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which
can be shared by multiple hardware components in order to communicate with one
another.
The address bus (sometimes called the memory bus) transports memory addresses which
the processor wants to access in order to read or write data. It is a unidirectional bus.
The data bus transfers instructions coming from or going to the processor. It is a
bidirectional bus.
The control bus (or command bus) transports orders and synchonisation signals coming
from the control unit and travelling to all other hardware components. It is a bidirectional
bus, as it also transmits response signals from the hardware.
NUMBER SYSTEM
FSSAI: FCI: Computer Awareness Page 15
The radix or base is the number of unique digits, including zero, used to represent numbers
in a positional numeral system. For example, for the decimal system the radix is ten,
because it uses the ten digits from 0 through 9. And that of Binary is base 2.
(1A2)16 = (?)2
1=0001, A= 1010, 2=0010; Hence (1A2)16 =
(000110100010)2
Decimal to Binary: (75)10 =(?)2
Divide 75 by 2 (and write down its remainder).
Example: (110110)2=(?)10
((1×25)+ (1×24)+ (0×23)+ (1×22)+ (1×21)+
(0×20))=32+16+4+2= 54; (110110)2=(54)10
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive (e.g., token ring or Ethernet).
A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. A WAN (wide area network), in comparison to a MAN,
is not restricted to a geographical location, although it might be confined within the
bounds of a state or country. A WAN connects several LANs, and may be limited to an
enterprise (a corporation or an organization) or accessible to the public. The technology is
high speed and relatively expensive. The Internet is an example of a worldwide public
WAN.
A personal area network (PAN) is a computer network used for data transmission amongst
devices such as computers, telephones, tablets and personal digital assistants.
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-
level network access to storage. A virtual private network (VPN) extends a private
network across a public network, such as the Internet. It enables users to send and receive
data across shared or public networks as if their computing devices were directly
connected to the private network.
Networking Devices
Modem: Modem stands for Modulator-Demodulator. It is used to connect computers for
communication via telephone lines.
Hub: It works at the Physical layer. It just acts like a connector of several computers i.e.
simply connects all the devices on its ports together. It broadcasts all the data packets
arriving at it with no filtering capacity.
FSSAI: FCI: Computer Awareness Page 18
Switch: It works at the Data Link Layer. It is used for dividing a network into segments
called subnets. It provides filtering of data packets and prevents network traffic also.
Repeater: It operates at the Physical Layer. It is used to amplify a signal that has lost its
original strength so as to enable them to travel long distances.
Router: It works at the Network Layer and is used to connect different networks that have
different architectures and protocols. It sends the data packets to desired destination by
choosing the best path available thus reducing network traffic.
Gateway: It operates in all the layers of the network architecture. It can be used to connect
two different networks having different architectures, environment and even models.
Bridge: They are used two connect two LANs with the same standard but using different
types of cables. It provides an intelligent connection by allowing only desired messages to
cross the bridge thus improving performance. It uses physical addresses of the packets for
this decision.
IPv6 does not use broadcast messages and has three types of addresses, which are
categorized as :
Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of
routing distance).
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class
C, Class D and Class E, while only A, B, and C are commonly used. Each class allows for a
particular range of valid IP addresses. Class D is reserved for multicast groups and Class E
is reserved for future use, or Research and Development Purposes.
Data Communication deals with the transmission of digital data from one device to
another. Data is transferred through a pathway called as communication channel which
can be physical wire connecting the devices or may be unguided media like laser,
microwave etc.
Simplex: This, communication is unidirectional i.e. one of the two devices can transmit the
data and the other can only receive the data. For e.g. Radio broadcasting, television
broadcasting etc.
Half duplex: This communication is bidirectional. Either of the devices can act as
transmitter or receiver but only one device can transmit the data at one time. For e.g.
Walkie- Talkie.
Full Duplex: Here the communication is in both directions and both the devices can
simultaneously transmit the data. For e.g. Telephone conversation.
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes
and standardizes the internal functions of a communication system by partitioning it into
abstraction layers. The model is a product of the Open Systems Interconnection project at
the International Organization for Standardization (ISO).
Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network. There are two basic categories of network topologies:
2. Hybrid topology uses a combination of any two or more topologies in such a way
that the resulting network does not exhibit one of the standard topologies.
Public clouds are owned and operated by companies that offer rapid access over a public
network to affordable computing resources.
A hybrid cloud uses a private cloud foundation combined with the strategic integration
and use of public cloud services.
INTERNET
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array of
electronic, wireless, and optical networking technologies. ARPANET adopted TCP/IP in
1983, and from there researchers began to assemble the “network of networks” that
became the modern Internet. The World Wide Web (abbreviated as WWW or W3,
commonly known as the Web) is a system of interlinked hypertext documents that are
accessed via the Internet. A Website is a set of related web pages served from a single web
domain. A Home page, index page, or main page is a page on a website. A home page
usually refers to:
• The initial or main web page of a website, sometimes called the "front page" (by
analogy with newspapers).
• The first page that appears upon opening a web browser program, which is also
sometimes called the start page. This 'start page' can be a website or it can be a page
with various browser functions such as the visual display of websites that are often
visited in the web browser.
• The web page or local file that automatically loads when a web browser starts or when
the browser's "home" button is pressed; this is also called a "home page". The user
can specify the URL of the page to be loaded, or alternatively choose e.g. to re-load
the most recent web page browsed.
A personal web page, for example at a web hosting service or a university web site that
typically is stored in the home directory of the user.
A Hyperlink is a reference to data that the reader can directly follow either by clicking or
by hovering or that is followed automatically
Some of the famous browsers are Safari, Chrome, Firefox, Bolt, UC Browser and Internet
Explorer
Downloading means to receive data to a local system from a remote system or to initiate
such a data transfer Uploading refers to the sending of data from a local system to a remote
system such as a server or another client with the intent that the remote system should
store a copy of the data being transferred
directions, and it contains extremely detailed information. The domain name is one of the
pieces inside of a URL.
DOMAIN TYPES
Type Description
com Commercial and for profit organization
edu Educational provider, college, Universities
gov Government agencies
Mil US military sites
net Internet infrastructure and service providers
org Miscellaneous and Non-profit organisations
An email attachment is a computer file sent along with an email message. One or more files
can be attached to any email message, and be sent along with it to the recipient.
Hotmail was co-founded by an Indian American entrepreneur Sabeer Bhatia along with
Jack Smith in July of 1996.
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another.
The list of CC recipients is visible to all other recipients of the message.
Internet Explorer was deprecated in Windows 10, with Microsoft Edge replacing it as the
default web browser.
COMPUTER SECURITY
A Computer Virus is a computer program or code that can replicate itself and spread from
one computer system to another system. A computer virus has the capacity to corrupt or
to delete data on your computer and it can utilize an e- mail program to spread the virus
to other computer systems
In the worst case scenario, it can even delete everything on your hard disk .The purpose
of it is to disrupt the operation of the computer or the program.
Some examples of Computer Virus are Trojan viruses. Stealth viruses, worms, malware
(malicious software), Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word Concept,
etc.
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of executable code, scripts, active content, and other software.
Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.
A person who uses his or her expertise to gain access to other people’s computers to get
information illegally or do damage is a Hacker.
Authentication is the act of confirming the truth of an attribute of a single piece of data
or entity. It might involve confirming the identity of a person by validating their identity
documents, verifying the validity of a website with a digital certificate, tracing the age of
an artifact by carbon dating, or ensuring that a product is what its packaging and labelling
Note- Microsoft Azure is a growing collection of integrated cloud services which developers
and IT professionals use to build, deploy and manage applications through our global
network of data centres. It provides software as a service (SaaS), platform as a service (PaaS)
and infrastructure as a service (IaaS) and supports many different programming languages,
tools and frameworks. Microsoft Azure was earlier known as Windows Azure.
Share: In Word 2016 for Windows, it is easier than ever to share your documents. When
you share your files by using OneDrive or SharePoint Online for Office 365, you can invite
people to the document directly from within Word, or send a PDF or Word file as an email
attachment. This feature of share is also available for Excel and PowerPoint 2016.
Tell Me: This is a text field where you can enter words and phrases about what you want
to do next and quickly get to those features you want to use or actions you want to
perform. You can also use Tell Me to find help about what you're looking for, or to use
Smart Lookup to research or define the term you entered.
New Charts introduced in Excel 2016 : New Chart types and templates are introduced in
Excel 2016 such as tree map, sunburst chart (also known as a ring chart), waterfall chart,
box plot and histogram, and financial and calendar templates.
Skype and OneDrive Integration : One of the new features added to Word, Excel, and
PowerPoint is the ability to use Skype for Business to collaborate and communicate while
working on documents. User can IM or video-call someone with Skype from the new Share
pane built into the new Office applications. OneDrive integration supports cloud storage
file hosting service that supports access of office document from anywhere on any device.
Enterprise Data Protection: To manage and prevent data loss at enterprise level, MS Office
2016 comes paced with inbuilt security feature that provide an ease for system admin to
enforce policies for content authoring and document sharing.
1. Save Vs Save As
"Save" simply saves your work by updating the last saved version of the file to match the
current version you see on your screen.
"Save As" brings up a prompt to save your work as a file with a different name. For
example, you might choose to save a document called "New Doc" as "Final Doc". This way,
you can save you file at different stages and keep multiple versions on your hard drive.
3. Undo Vs Redo
You can undo, redo, or repeat many actions in Microsoft Word, PowerPoint, and Excel.
Undo reverses the immediate action. Redo reverts the effects of the undo action.
4. Portrait Vs Landscape
The terms portrait and landscape refer to different orientations of the paper; whether it
is oriented vertically or horizontally. A page with portrait orientation, typical for letters,
memos, and other text documents, is taller than it is wide. Portrait is vertical mode and
landscape is horizontal mode.
MS WORD 2016:
Backstage View in MS Word 2016: MS Word 2016 has a backstage view where you can see
the recent documents that you’ve visited or edited and a few templates as well. There is
also an option to search for more templates. These templates can help you get the desired
layout where a sample data will already be there. You may edit and enter data as you may
like.
Note- Each tab has many commands which are grouped into specific categories. Following
are the groups for commands under various tabs of MS Word 2016:
MS POWERPOINT 2016:
PowerPoint is a slideshow presentation program that's part of the Microsoft office suite
of tools. PowerPoint slides can be plain with only text, or they can include pictures and
even animation, including moving text and images. Text can be formatted in the same way
as text can be formatted in Microsoft Word, including colour, size, and font type.
In PowerPoint 2016 there are 9 tabs followed by a new feature of “Tell me what you want
to do” arranged in a horizontal fashion. The tabs are as follows: File, Home, Insert, design,
Transition, Animation, Slide Show, Review, and View.
1. Home
The home tab in PowerPoint has following groups: Clipboard, Slides, Font, Paragraph,
drawing and Editing. The Clipboard, Editing and Font commands are same as that in Word
2016. The Slides group contains commands to insert new slide, choose slide layout, reset
the positions and formatting of the slide placeholders and option to organize your slides
into sections.
3. Design
On the Design tab, you can add a theme or colour scheme, or format the slide background.
The design tab has following categories or groups of commands:
Themes- Each theme has its own unique set of font, effect, colour to create a visually
appeasing and overall look of the slide.
Variants - The current theme or style can be customized using various colour schemes
through variants.
Customize- This group contains commands to change slide size and Format Background.
Designer- For instant slide makeovers.
4. Transitions
Set up how your slides change from one to the next on the Transitions Tab. Find a gallery
of the possible transitions in the Transition to This Slide group – click More Button at the
side of the gallery to see all of them.
5. Animations
User may use the Animations tab to choreograph the movement of things on his slides.
Note that you can see many possible animations in the gallery in the Animation group, and
see more of them by clicking More Button. Apart from adding animation you can also
customize its duration and timing as you need by using advanced animation and timing
group of commands.
6. Slide Show
On the Slide Show tab, set up the way that you want to show your presentation to others.
7. Review
The Review tab lets you add comments, run spell-check, or compare one presentation with
another (such as an earlier version).
8. View
Views allow you to look at your presentation in different ways, depending on where you
are in the creation or delivery process.
9. File
At one end of the ribbon is the File tab, which you use for the behind-the-scenes stuff you
do with a file, such as opening, saving, sharing, exporting, printing and managing your
presentation. Click the File tab to open a new view called the Backstage.
10. Tools tabs
MS EXCEL 2016
Microsoft Excel is a spreadsheet developed by Microsoft. Spreadsheets allow you to keep
track of data, create charts based from data, and perform complex calculations. Just like a
book ledger, spreadsheets store information in columns and rows. You can have up to 256
columns and 65,536 rows per worksheet.
IF function Use this function to return one value if a condition is true and another
value if it's false
LOOKUP Use this function when you need to look in a single row or column and
function find a value from the same position in a second row or column.
MATCH Use this function to search for an item in a range of cells, and then
function return the relative position of that item in the range. For example, if the
range A1:A3 contains the values 5, 7, and 38, then the formula
=MATCH(7,A1:A3,0) returns the number 2, because 7 is the second item
in the range.
CHOOSE Use this function to select one of up to 254 values based on the index
function number. For example, if value1 through value7 are the days of the week,
CHOOSE returns one of the days when a number between 1 and 7 is
used as index_num.
DATE Use this function to return the sequential serial number that represents
function a particular date. This function is most useful in situations where the
year, month, and day are supplied by formulas or cell references. For
example, you might have a worksheet that contains dates in a format
that Excel does not recognize, such as YYYYMMDD.
Use the DATEDIF function to calculate the number of days, months, or
years between two dates.
DAYS Use this function to return the number of days between two dates.
function
FIND, FINDB FIND and FINDB locate one text string within a second text string. They
functions return the number of the starting position of the first text string from
the first character of the second text string.
Home: Clipboard, Font, Alignment, Number, Style (for Conditional Formatting of table),
Cells (to insert, delete and format cells), Editing (AutoSum, Sort & Filter, Find & Select)
Insert: Tables (Pivot Table, and Tables); Illustrations (Pictures, Online Picture, shapes and
Icon); Add-ins;
Charts; Tours (3D Map); Spark lines (Line, Column, Win/Loss); Filters; Links; Text; Symbols.
Page Layout: Themes; Page Setup (Margin, orientation, page size, print area, breaks,
background and print titles); Scale to fit; Sheet Options (Gridline, headings); Arrange
Formulas: Insert Function; Function Library; Defined Names; Formula Auditing; Calculation
Data: Get external Data; Get & Transform (New query, show queries, from table, recent
sources): Connections; Sort and Filter; Data Tools; Forecast (what-if analysis, forecast
sheet); Outline
View: Workbook Views (Normal, Page Break Preview, Page Layout, Custom Views); Show
(gridlines, ruler. formula bar, headings); Zoom; Window; Macros.
FILE EXTENSIONS:
Word
XML file type Extension
Document .docx
Macro-enabled document .docm
Template .dotx
Macro-enabled template .dotm
Excel
XML file type Extension
Workbook .xlsx
Macro-enabled workbook .xlsm
Template .xltx
Macro-enabled template .xltm
Non-XML binary workbook .xlsb
Macro-enabled add-in .xlam
Architecture of DBMS- The generalized architecture of DBMS is called ANSI/ SPARC model.
The architecture is divided into three levels:
External view or user view/View Level- It is the highest level of data abstraction. This
includes only those portions of database of concern to a user or Application program. Each
user has a different external view and it is described by means of a scheme called external
schema.
• Conceptual view/Logical Level- All the database entities and the relationship among
them are included. One conceptual view represents the entire database called conceptual
schema.
• Internal view/Physical Level- It is the lowest level of abstraction, closest to the physical
storage method. It describes how the data is stored, what is the structure of data storage
and the method of accessing these data. It is represented by internal schema.
Data model: A data model is a plan for building a database. The model represents data
conceptually, the way the user
sees it, rather than how computers store it. Data models focus on required data elements
and associations.
SQL (Structured Query Language) is a database computer language designed for the
retrieval and management of data in relational database.
COMPUTER LANGUAGES
Low level language: these are coded in a form which is easy to understand by the
processor.
Machine language: it is also a type of low level language these can be develop in binary
language (0 and 1) .
Assembly language: it is also a type of low level language and using the human readable
instruction of the CPU. It is written as ‘MOV A.’
High level language programmer can write code in simple easy language, it is user friendly
. E.g. C, JAVA
COBOL (Common Business Oriented Language ): used for record keeping and data
management in business organizations.
BASIC (Beginner’s All Purpose Symbolic Instruction Code): first language designed for
non-professional programmers.
Simula was the first object-oriented programming language. Java, Python, C++, Visual
Basic .NET and Ruby are the most popular Object Oriented Programming languages. The
Java programming language is designed especially for use in distributed applications on
corporate networks and the Internet. Ruby is used in many Web applications. Curl,
Smalltalk, Delphi and Eiffel are also examples of object- oriented programming languages.
Language processor (Translator): Programmers write their program in one of the high
level language because it is much easy to code in these language but computer does not
FSSAI: FCI: Computer Awareness Page 39
understand any of these language so it is necessary to convert program into a machine
language so translator do this work.
Loader: It loads the code which is translated by translator into the main memory and
makes it ready to execute.
Linker is used to combine all the object files and convert them into a final executable
program.
Interpreter converts high level language program into machine language. It is very slow
because it convert program line by line.
Compiler: It also translates the program from high level language to machine language. It
is very
Assembler: It is used for converting the code of low level language (assembly language)
into machine level language.
PROGRAMMING LANGUAGE
Programming Language are coded language are coded language used by programmer to
write instructions that a computer can understand to what the Programmer want.
Following are the major categories of Programming Languages −
• Machine Language
• Assembly Language
• High Level Language
• System Language
• Scripting Language
Pseudo code -
Pseudo code is a simple way of writing programing code in English.
For example – Task – Add two Numbers ,
• Start
• Get two numbers
• Add them
• Print the answer
• End
Flow chart
FSSAI: FCI: Computer Awareness Page 40
A flow chart is a graphical or symbolic representation of a process. Each step in the process
is represented by a different symbol and contains a short description of the process step.
Different flow chart symbols have different meanings. The most common flow chart
symbols are:
• Terminator: An oval flow chart shape indicating the start or end of the process.
• Process: A rectangular flow chart shape indicating a normal process flow step.
• Decision: A diamond flow chart shape indication a branch in the process flow.
• Connector: A small, labelled, circular flow chart shape used to indicate a jump in
the process flow. (Shown as the circle with the letter "A", below.)
• Data: A parallelogram that indicates data input or output (I/O) for a process.
• Document: Used to indicate a document or report (see image in sample flow chart
below).
What is Algorithm
An algorithm is a well-defined procedure that allows a computer to solve a problem.
Another way to describe an algorithm is a sequence of unambiguous instructions. ... In
fact, it is difficult to think of a task performed by your computer that does not use
algorithms.
Sequence of program –
• Algorithm
• Flowchart
• Program (source code)
• Compiling
• Object code
What is syntax - way to write any instruction in any programming language with the help
of some special symbols and character.
• Assembly Language -
Assembly language used mnemonic code in place of binary language. It is second
generation programming language. An assembly language is a low-level programming
language designed for a specific type of processor. Assembly languages generally lack high-
level conveniences such as variables and functions.
➢ ALGOL
ALGOL is short for algorithmic language. It is an early high-level computer programming
language devised to carry out scientific calculations. ALGOL was used as the standard
method for creating algorithms. First appeared in 1958. ALGOL language designed by:
Friedrich L. Bauer, Hermann Botten bruch
➢ COBOL
The name COBOL stands for Common Business-Oriented Language. COBOL is a
programming language that was developed in the year 1959. It was one of the first
computer programming languages used for commercial. It was introduced by Grace
Hopper.
➢ Pascal
Pascal is an imperative and procedural programming language, designed by Niklaus Wirth
as .... Apollo Computer used Pascal as the systems programming language for its operating
systems beginning in 1980. It is named in honor of the French mathematician, philosopher
and physicist Blaise Pascal.
➢ C Language
C is a general-purpose, procedural computer programming language supporting
structured programming, lexical variable scope, and recursion, while a static type system
prevents unintended operations. C was developed at Bell Labs by Dennis Ritchie for the
Unix Operating System in the early 1970s. It is also called middle level language.
➢ C++ Language
C++ is a High-level programming language developed by Bjarne Stroustrup starting in 1979
at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various
versions of UNIX. This C++ tutorial adopts a simple and practical approach to describe the
concepts of C++ for beginners to advanced software engineers. C++ fully supports object-
oriented programming, including the four pillars of object-oriented development.
➢ Python
Python is a general purpose and high level programming language. You can use Python for
developing desktop GUI applications, websites and web applications. It is introduced by
Guido van Rossum.
➢ C# Language
C# can be used to create almost anything but is particularly strong at building Windows
desktop applications and games. C# can also be used to develop web applications and has
become increasingly popular for mobile development too. It is developed by Microsoft. C#
is an object-oriented programming language used with XML-based Web services on the
.NET platform and designed for improving productivity in the development of Web
applications.
SCRIPTING LANGUAGE
Scripting languages are server-side scripting languages that manipulate the data, usually
in a database, on the server. Scripting languages came about largely because of the
development of the Internet as a communications tool.
Html, Xml, JavaScript, ASP, JSP, PHP, Perl, Tcl and Python are examples of scripting
languages.
1. Assembler- Assembler are used to convert assembly language code into machine code.
Assembler convert mnemonic code in to object code.
2. Compiler- Compiler translate high level language in machine language. It read the
entire program. It finds the syntax error. Error in a program is called bug. Compiler convert
source code into object code.
12 CD Compact Disc
18 IP Internet Protocol
134 BY Bronto-bytes
143 EB Exa-bytes
253 ZB Zetta-bytes
275 KB Kilo-bytes
277 PB Peta-bytes
346 MB Mega-bytes
382 GB Giga-bytes
427 TB Tera-bytes
“Websites and applications that enable users to create and share content or to
participate in social networking”.
Social media is a collective term for websites and applications that focus on communication,
community-based input, interaction, content-sharing and collaboration. People use social
media to stay in touch and interact with friends, family and various communities. Businesses
use social applications to market and promote their products and track customer concerns.
Twitter, Facebook, and Instagram are just a few of the most famous social media platforms
that exist this century, with Facebook leading the list. Billions of people have been using
social media since it boomed. As long as there are cell phones, tablets, computers and an
internet connection, people can easily connect with other people from anywhere through
social media. Some may even have multiple accounts registered on one social media
platform.
But have you ever wondered how it all started? Who the founder was? How it has evolved?
Let’s take a quick trip down memory lane.
• MySpace
MySpace played a very important role in social media life since its launch in 2004.
By 2006, it had grown to become the most famous social media platform in the
world. With MySpace, users could customize their profiles completely, embed
videos and post music. It also has MySpace IM allowing people to chat with each
other.
Facebook is the largest social media platform in the world, with a clear advantage over
other social media, though it has similar audiences to others like Twitter and Instagram.
The figures for the most popular social media websites as of 2021 are as follows:
Facebook, YouTube, and WhatsApp are the world's largest social media
networks.
Website: www.swaeducation.com
Instagram : swaeducation_official