0% found this document useful (0 votes)
64 views

Comp Swa

Uploaded by

Tejus Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

Comp Swa

Uploaded by

Tejus Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

COMPUTER

AWARENESS
Book for
Competitive Exams
FSSAI-FSO
STATE FSO
FCI - AGM

FSSAI: FCI: Computer Awareness Page 1


CONTENTS
S. No CHAPTER PAGE. NO
1 BASICS OF COMPUTER 3-5

2 COMPUTER HARDWARE & SOFTWARE 06-12

3 MEMORY MANAGEMENT 13-17

4 COMPUTER NETWORK & INTERNET 18-24

5 MICROSOFT OFFICE 25-38

6 PROGRAMMING LANGUAGE 39-45

7 COMPUTER ABBREVIATIONS 46-61

8 SOCIAL MEDIA 62-69

FSSAI: FCI: Computer Awareness Page 2


CHAPTER 01
BASICS OF COMPUTER
HISTORY OF COMPUTER
The word Computer in earlier times meant a person who performed calculations or
computations. With years its definition changed to a machine that performs calculations. It
can perform all type of mathematical and logical operations; it can accept data, store data,
retrieve data, process data and produce output Charles Babbage was known as father of
computer. He invented two machines in 1822 introduced Difference Engine and in 1834,
introduced Analytical engine.

ENIAC was the first digital computer and it was invented by J. Presper
Eckert and John Mauchly at the University of Pennsylvania and began construction in 1943.
It uses 18000 vacuum tubes as a storing device. They were also founders of the first computer
company, it was initially named Electronic Controls Company which was later changed to
Eckert– Mauchly Computer Corporation, and released a series of mainframe electronic digital
stored-program computer under the name of UNIVAC. MIT introduces the whirlwind machine
(first computer with RAM) on March 8, 1955.

Charles Babbage ( 26 December 1791 – 18 October


1871) was an English polymath. A mathematician,
philosopher, inventor and mechanical engineer,
Babbage originated the concept of a digital
programmable computer.
Babbage is considered by some to be "father of the
computer". Babbage is credited with inventing the
first mechanical computer, the Difference Engine,
that eventually led to more complex electronic
designs, though all the essential ideas of modern
computers are to be found in Babbage's Analytical
Engine.

FSSAI: FCI: Computer Awareness Page 3


GENERATION OF COMPUTER
Generation 1st Gen 2nd Gen 3rd Gen 4th Gen 5th Gen

Period 1940-56 1956-63 1964-71 1971-present Present &


beyond
Circuitry Vacuum Transistor Integrated Microprocessor Ultra Large
tube chip (IC) (VLSI) Scale
Integration
Technology
(ULSI)
Memory 20 KB 128 KB 1 MB Semiconductor VLSI and ULSI
Capacity type and very
high
Processing 300 IPS inst. 300 IPS 1 MIPS (1 Faster than 3rd Very fast
Speed Per Sec million inst. generation
Per Sec)
Programmi Assembly High level language All the Higher
ng Language (FORTRAN,COBOL, level
ALGOL) C, C++ C,C++,java language,
Language
Neural
network,
Example UNIVAC, IBM 1401 ,IBM IBM 360 Pentium series Artificial
EDVAC 7094,CDC 3600 , Series, multimedia Intelligence,
D UNIVAC 1108 1900 series ,Stimulation Robotics

TYPES OF COMPUTER

Classification of Computer

Computational Method Size and Capability Purpose

Digital Analog Hybrid Super Mainframe Mini Micro General Special Purpose
Purpose

Analog computer introduced by Lord Kelvin. Numerical data are represented by


measurable physical variables such as electrical voltage. A thermometer is a simple Analog
computer.

FSSAI: FCI: Computer Awareness Page 4


Digital computer that accepts and process data in the form of numbers and all the character
are converted into binary code.

Hybrid computer used the combined feature of Analog and digital machine. you can see
hybrid computer in geological departments. Microcomputer these are small relatively
inexpensive computer designed for personal and office use. It has lowest storing and
processing speed. These can be laptop or desktop.

Minicomputer powerful as compare to microcomputer it has higher memory provide


faster operating speeds and large storage capacities than microcomputers. It can be used as
a server and capable of supporting from 2 to 200 users.

Mainframe computer it has very high memory and processing speed and used as a server
(can support thousands of users) Super computer can be used for complex type of
application i.e. specific research, weather forecasting, Weapon designing etc.

CDC 6600 was the first successful supercomputer. Sunway Taihu Light of China is the fastest
supercomputer in the world.PARAM-8000 India’s first Super Computer developed by C- DAC
Pune in 1998. Shasra T is considered as India’s fastest super computer, manufactured by Indian
Institute of Science.

Servers are dedicated computers that serve the needs or request of other programs or
computer. Workstations serve usually one user only. Information appliances are computers
specially designed to perform a specific "user-friendly" function—such as playing music,
photography. An embedded system is a computer system with a dedicated function within
a larger system.

FSSAI: FCI: Computer Awareness Page 5


CHAPTER 02
COMPUTER HARDWARE & SOFTWARE
HARDWARE OF COMPUTER
A computer is an electronic device that accepts data from the user (input), processes the
data by performing calculations and operations on it and generates the desired Output. An
unprocessed collection or representation of raw facts represented in a manner suitable
for communication, interpretation or processing by humans or by automatic means, is
known as Data. Personal computers use a number of chips mounted on a main circuit
board called Motherboard. A motherboard is the physical arrangement in a computer that
contains the computer's basic circuitry and components.

An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form.

The CPU is fabricated as a single Integrated Circuit (IC) chip. It is also known as the
Microprocessor. Multiprocessor Computers uses two or more central processing units
(CPUs) within a single computer system. The term also refers to the ability of a system to
support more than one processor and/or the ability to allocate tasks between them.

The central processing unit (CPU) is the brain of your computer. It handles all the
instructions you give your computer. The control unit (CU) is a component of a computer's

FSSAI: FCI: Computer Awareness Page 6


central processing unit (CPU) that directs operation of the processor. It tells the
computer's memory, arithmetic/logic unit and input and output devices how to respond
to a program's instructions.

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic
operations. It represents the fundamental building block of the central processing unit
(CPU) of a computer.

Instruction Execution: the program which is to be executed is a set of instruction which


are stored in memory. The CPU executes the instructions of program to complete a task
and this execution takes place inside the CPU with the help of registers ALU (arithmetic
logic unit) and CU(control unit). When the processor executes instructions, data is
temporarily stored in small local memory location and these are called registers.

Accumulator Register:- which stores the immediate result of arithmetic and logical
operations.

Memory address register (MAR) :- which contain the address of memory location to which
data is to be stored.

Program counter :- which contain the address of the next instruction to process.

Instruction register:- which contain the current instruction being processed

FSSAI: FCI: Computer Awareness Page 7


The data that is fed into a computer processor, received into the computer by a keyboard
or other sources is called Input. Examples of input devices include keyboards, mouse,
scanners, digital cameras and joysticks.

A keyboard is a typewriter-style device, which uses an arrangement of buttons or keys, to


act as mechanical levers or electronic switches. Most of the commonly available personal
computers have a keyboard, popularly known as Qwerty. 'Caps lock' and 'Num lock' keys
are called as Toggle Keys because when pressed, they change their status from one state
to another.

Numeric Keypad is a keypad located on the right hand side of the keyboard. It consists of
digits and mathematical operators.

A Modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. By themselves,
modifier keys usually do nothing; that is, pressing any of the Shift, Alt, or Ctrl keys alone
does not (generally) trigger any action from the computer.

Hardware of Computer
A Mouse is the most popular input device which is used today for interactive processing
and for the one line entry of data for batch processing. The first computer mouse was
invented by Douglas Engelbart.

FSSAI: FCI: Computer Awareness Page 8


Drag and Drop refers to the action of clicking and holding down the mouse button, while
moving the mouse and then releasing the mouse button.

Joystick is the device that moves in all directions and controls the movement of a pointer.

A Touch Screen is a type of display screen device that is placed on the computer monitor
to allow direct selection or activation of the computer when the user touches the screen.
It acts as both input and output device.

Light Pen is the pen shaped device, which can sense light and is used to point at spots on
a video screen.

A technology enables a high-speed reading of large quantities of data and transferring


these data to the computer without using a keyboard. It is referred as Optical Mark Reader
(OMR). It uses a beam of light that is reflected on the paper with marks, to capture
presence and absence of marks.

MICR reads the characters by examining their shapes in a matrix form and the information
is then passed `on to the computer. MICR stands for Magnetic Ink Character Reader. It
provides a high level of security and is therefore used by the banking industry for faster
processing of the cheque.

Bar Code is a machine readable code, which is represented by parallel vertical lines with
varying widths. For reading these bar-coded data, a device is used, which is known as a Bar
Code Reader (BCR)

Optical Character Recognition (OCR) is used to scan the document containing text. It is
the mechanical or electronic conversion of scanned or photographed images of
typewritten or printed text into machine- encoded/computer-readable text.

A point of sale terminal (POS terminal) is an electronic device used to process card
payments at retail locations.

The device that prints information from the computer onto the paper is Printer. The
printed form of output is referred as Hard Copy. The form of output displayed on the
screen is referred as Soft Copy. Pages per Minute (PPM) is the unit used to count the
speed of the printer. On the basis of technology, printers are categorized into Impact and
Non- Impact Printers.

1. Impact printers create an image by using some mechanism to physically press an


inked ribbon against the page, causing the ink to be deposited on the page in the shape
desired.

FSSAI: FCI: Computer Awareness Page 9


I) Dot matrix :- The dot-matrix printer uses print heads containing from 9 to 24 pins. These
pins produce patterns of dots on the paper to form the individual characters

II) Daisy wheel:- A hammer strikes a “petal” containing a character against the ribbon, and
the character prints on the paper. Its speed is slow typically 25-55 characters per second.

III) Line printer:- Line printers, or line-at-a-time printers, use special mechanism that can
print a whole line at once; they can typically print the range of 1,200 to 6,000 lines per
minute

IV) Drum printer:- A drum printer consists of a solid, cylindrical drum that has raised
characters in bands on its surface. The number of print positions across the drum equals
the number available on the page.

V) Chain printer:- A chain printer uses a chain of print characters wrapped around two
pulleys.

VI) Band printer:- Band printer has a steel band divided into five sections of 48 characters
each.

2. Non – Impact Printers do not touch the paper when creating an image.
I) Ink-jet printers:- One or more nozzles in the print head emit a steady stream of ink drops.
Droplets of ink are electrically charged after leaving the nozzle. The droplets are then
guided to the paper by electrically charged deflecting plates

II) Laser printers:- Laser printers use buffers that store an entire page at a time. When a
whole page is loaded, it will be printed.

III) Thermal printer:- is a digital printing process which produces a printed image by
selectively heating coated thermo chromic paper, or thermal paper as it is commonly
known, when the paper passes over the thermal print head.

A plotter is an output device that interprets commands from a computer to make line
drawings on paper with one or more automated pens. Unlike a regular printer, the plotter
can draw continuous point-to-point lines directly from vector graphics files or commands.

An uninterruptible power supply (UPS) is a device that allows a computer to keep running
for at least a short time when the primary power source is lost.

A Monitor is a TV-like display attached to the computer on which the output can be
displayed and viewed. It can either be a monochrome display or a colour display. The
number of pixels displayed on a screen is known as Resolution.

FSSAI: FCI: Computer Awareness Page 10


COMPUTER SOFTWARE AND OPERATING SYSTEM
A set of instructions that tells the computer about the tasks to be performed and how these
tasks are to performed, is known as Software.
The set of instructions, which control the sequence of operations, are known as Program. It
is a sequence of instructions, written to perform a specified task with a computer.
Application software is a group of program designed for fulfil the demand of end user e.g.
MS office, PowerPoint, Windows Media Player.

System software is a program which is created for the system and to make the system user
friendly such as operating system or is a type of computer program that is designed to run
a computer's hardware and application programs.

Utility software designed to help analyse, configure, optimize or maintain a computer such
antivirus software.

Operating system is a set of programs that help in controlling and managing the hardware
and the software resources of a computer system. Main functions of operating system
are :-

• Process management
• Memory management
• File management
• Security
• Command and interpretation
• Resource allocation

TYPES OF OPERATING SYSTEM


1) Batch operating system : Here data and program that need to be processed are bundled
and collected as a batch and executed together.

2) Multiprogramming operating system : It allows the instruction and data from two or
more separate process to reside in primary simultaneously. Multiprogramming system are
multitasking multiuser and multiprocessing operating system.

3) Single user : It is designed for single user and a single person use it at a time i.e. DOS
window’s 95 etc.

4) Distributed operating system : It is the one which manages a collection of independent


computers and makes them appear to the user of the system as a single computer.
FSSAI: FCI: Computer Awareness Page 11
5) Real Time Operating System (RTOS) : It is a computing environment that reacts to input
within a specific time period. It is used at those Places in which we Requires higher and
Timely Response.

6) Time Sharing System: A time sharing system allows the many users to simultaneously
share the computer resources. Since each action or command in a time-shared system
take a very small fraction of time, only a little CPU time is needed for each user.

7) Mobile OS: Windows 10 Mobile is the latest name for Microsoft's phone and tablet
operating system. Google's latest’s version of its android OS is Nougat and iOS i.e. iPhone
Operating System's latest version is iOS 10.

FSSAI: FCI: Computer Awareness Page 12


CHAPTER 03
MEMORY MANAGEMENT

MEMORY MANAGEMENT
Primary Storage (memory), also known as main storage and it is the area in a computer
in which data is stored for quick access by the computer's processor. The terms random
access memory (RAM) and memory are often as synonyms for primary or main storage.
Primary storage is volatile and can be contrasted with non-volatile secondary storage, also
known as auxiliary storage.
Cache memory is a smaller, faster memory which stores copies of the data from frequently
used main memory locations. A CPU cache is a hardware cache used by the central
processing unit (CPU) of a computer to reduce the average time to access data from the
main memory.
FSSAI: FCI: Computer Awareness Page 13
Secondary memory is where programs and data are kept on a long-term basis. Common
secondary storage devices are the hard disk and optical disks. The hard disk has enormous
storage capacity compared to main memory. The hard disk is usually contained inside the
case of a computer.

Read-only memory (ROM) is a storage medium used in computers and other electronic
devices. Data stored in ROM can only be modified slowly or with difficulty, or not at all.

ROM is non-volatile and the contents are retained even after the power is switched off.
It only allows reading.
The types of ROM include PROM, EPROM and EEPROM.

PROM - (programmable read-only memory) is a memory chip on which data can be written
only once.

The difference between a PROM and a ROM (read-only memory) is that a PROM is
manufactured as blank memory, whereas a ROM is programmed during the manufacturing
process. To write data onto a PROM chip, you need a special device called a PROM
programmer or PROM burner.

EPROM - (erasable programmable read-only memory) is a special type of PROM that can
be erased by exposing it to ultraviolet light.

EEPROM - (electrically erasable programmable read-only memory). EEPROM is a special


type of PROM that can be erased by exposing it to an electrical charge.

Random Access Memory (RAM), allows the computer to store data for immediate
manipulation and to keep track of what is currently being processed.

RAM is referred to as volatile memory and is lost when the power is turned off.

It also known as read/write memory as information can be read from and written onto it.

The two main types of RAM are Static RAM and Dynamic RAM.

SRAM retains data as long as power is provided to the memory chip and need not be
refreshed periodically. It is often used as CPU Cache memory. SRAM stands for Static
Random Access Memory.

The data on DRAM continues to move in and out of the memory as long as power is
available and must be continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory. Virtual memory is memory on the hard disk that the
CPU uses as an extended RAM.

FSSAI: FCI: Computer Awareness Page 14


MEMORY MANAGEMENT

8 bit 1 byte
1024 Byte 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)

Memory can also be categorized on the basis of their material:


Semiconductor memory:-such as RAM, ROM, EPROM, and flash memory.

Magnetic memory:-such as hard disk, floppy disk and magnetic tapes.

Optical memory:-such as computer disk, DVD and blue-ray disk.

A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which
can be shared by multiple hardware components in order to communicate with one
another.

The address bus (sometimes called the memory bus) transports memory addresses which
the processor wants to access in order to read or write data. It is a unidirectional bus.

The data bus transfers instructions coming from or going to the processor. It is a
bidirectional bus.

The control bus (or command bus) transports orders and synchonisation signals coming
from the control unit and travelling to all other hardware components. It is a bidirectional
bus, as it also transmits response signals from the hardware.

NUMBER SYSTEM
FSSAI: FCI: Computer Awareness Page 15
The radix or base is the number of unique digits, including zero, used to represent numbers
in a positional numeral system. For example, for the decimal system the radix is ten,
because it uses the ten digits from 0 through 9. And that of Binary is base 2.

Decimal Binary Octal Hexadecimal


0 0000 000 0
1 0001 001 1
2 0010 002 2
3 0011 003 3
4 0100 004 4
5 0101 005 5
6 0110 006 6
7 0111 007 7
8 1000 010 8
9 1001 011 9
10 1010 012 A
11 1011 013 B
12 1100 014 C
13 1101 015 D
14 1110 016 E
15 1111 017 F

Hexadecimal to Binary: Refer the above table for the,

(1A2)16 = (?)2
1=0001, A= 1010, 2=0010; Hence (1A2)16 =
(000110100010)2
Decimal to Binary: (75)10 =(?)2
Divide 75 by 2 (and write down its remainder).

FSSAI: FCI: Computer Awareness Page 16


Hence (75)10 =(101011)2
Any number system to decimal:

Sum of all (Digit × (Base)Base’s Place)


Example: (1A2)16 = (?)10 (From the table you can refer A
is equivalent to 10 )

((1× 162)+(10 × 161)+ (2×160))= 256+160+2=418

Example: (110110)2=(?)10
((1×25)+ (1×24)+ (0×23)+ (1×22)+ (1×21)+
(0×20))=32+16+4+2= 54; (110110)2=(54)10

Octal to Binary: (345)8 =(?)2 (Write down 3 bit binary


equivalents of all digits)
3=011, 4=100, 5=101; Hence (345)8 =(011100101)2

FSSAI: FCI: Computer Awareness Page 17


CHAPTER 04
COMPUTER NETWORK & INTERNET
COMPUTER NETWORK
Different types of network are: LAN, MAN and WAN.

A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive (e.g., token ring or Ethernet).

A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. A WAN (wide area network), in comparison to a MAN,
is not restricted to a geographical location, although it might be confined within the
bounds of a state or country. A WAN connects several LANs, and may be limited to an
enterprise (a corporation or an organization) or accessible to the public. The technology is
high speed and relatively expensive. The Internet is an example of a worldwide public
WAN.

A personal area network (PAN) is a computer network used for data transmission amongst
devices such as computers, telephones, tablets and personal digital assistants.

Campus Area Network or corporate area network is a computer network made up of an


interconnection of local area networks (LANs) within a limited geographical area.

A Storage Area Network (SAN) is a specialized, high-speed network that provides block-
level network access to storage. A virtual private network (VPN) extends a private
network across a public network, such as the Internet. It enables users to send and receive
data across shared or public networks as if their computing devices were directly
connected to the private network.

Networking Devices
Modem: Modem stands for Modulator-Demodulator. It is used to connect computers for
communication via telephone lines.
Hub: It works at the Physical layer. It just acts like a connector of several computers i.e.
simply connects all the devices on its ports together. It broadcasts all the data packets
arriving at it with no filtering capacity.
FSSAI: FCI: Computer Awareness Page 18
Switch: It works at the Data Link Layer. It is used for dividing a network into segments
called subnets. It provides filtering of data packets and prevents network traffic also.

Repeater: It operates at the Physical Layer. It is used to amplify a signal that has lost its
original strength so as to enable them to travel long distances.

Router: It works at the Network Layer and is used to connect different networks that have
different architectures and protocols. It sends the data packets to desired destination by
choosing the best path available thus reducing network traffic.

Gateway: It operates in all the layers of the network architecture. It can be used to connect
two different networks having different architectures, environment and even models.

Bridge: They are used two connect two LANs with the same standard but using different
types of cables. It provides an intelligent connection by allowing only desired messages to
cross the bridge thus improving performance. It uses physical addresses of the packets for
this decision.

IPv4 - 32 bits numeric address

IPv6 - 128 bits hexadecimal address

IPv6 does not use broadcast messages and has three types of addresses, which are
categorized as :

Unicast addresses. A packet is delivered to one interface.

Multicast addresses. A packet is delivered to multiple interfaces.

Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of
routing distance).

With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class
C, Class D and Class E, while only A, B, and C are commonly used. Each class allows for a
particular range of valid IP addresses. Class D is reserved for multicast groups and Class E
is reserved for future use, or Research and Development Purposes.

Data Communication deals with the transmission of digital data from one device to
another. Data is transferred through a pathway called as communication channel which
can be physical wire connecting the devices or may be unguided media like laser,
microwave etc.

FSSAI: FCI: Computer Awareness Page 19


A communication channel has a source or transmitter at one side and a designation or
receiver at another side of the network. The source of data origination is single but there
may be multiple receivers. A communication channel is of 3 types:

Simplex: This, communication is unidirectional i.e. one of the two devices can transmit the
data and the other can only receive the data. For e.g. Radio broadcasting, television
broadcasting etc.

Half duplex: This communication is bidirectional. Either of the devices can act as
transmitter or receiver but only one device can transmit the data at one time. For e.g.
Walkie- Talkie.

Full Duplex: Here the communication is in both directions and both the devices can
simultaneously transmit the data. For e.g. Telephone conversation.

The Open Systems Interconnection model (OSI) is a conceptual model that characterizes
and standardizes the internal functions of a communication system by partitioning it into
abstraction layers. The model is a product of the Open Systems Interconnection project at
the International Organization for Standardization (ISO).

Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network. There are two basic categories of network topologies:

1. Physical topology is the placement of the various components of a network,


including device location and cable installation, while Logical topology illustrates how data
flows within a network, regardless of its physical design. Various types of topologies are:

2. Hybrid topology uses a combination of any two or more topologies in such a way
that the resulting network does not exhibit one of the standard topologies.

Cloud computing is a type of Internet-based computing that provides shared computer


processing resources and data to computers and other devices on demand.

Public clouds are owned and operated by companies that offer rapid access over a public
network to affordable computing resources.

A private cloud is infrastructure operated solely for a single organization, whether


managed internally or by a third party, and hosted either internally or externally.

A hybrid cloud uses a private cloud foundation combined with the strategic integration
and use of public cloud services.

FSSAI: FCI: Computer Awareness Page 20


Google Drive is a personal cloud storage service from Google which gives every user 15 GB
of Drive storage space. OneDrive is Microsoft's service for hosting files in the "cloud
computing". OneDrive offers 5GB of storage space for free.

INTERNET
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array of
electronic, wireless, and optical networking technologies. ARPANET adopted TCP/IP in
1983, and from there researchers began to assemble the “network of networks” that
became the modern Internet. The World Wide Web (abbreviated as WWW or W3,
commonly known as the Web) is a system of interlinked hypertext documents that are
accessed via the Internet. A Website is a set of related web pages served from a single web
domain. A Home page, index page, or main page is a page on a website. A home page
usually refers to:
• The initial or main web page of a website, sometimes called the "front page" (by
analogy with newspapers).
• The first page that appears upon opening a web browser program, which is also
sometimes called the start page. This 'start page' can be a website or it can be a page
with various browser functions such as the visual display of websites that are often
visited in the web browser.
• The web page or local file that automatically loads when a web browser starts or when
the browser's "home" button is pressed; this is also called a "home page". The user
can specify the URL of the page to be loaded, or alternatively choose e.g. to re-load
the most recent web page browsed.

A personal web page, for example at a web hosting service or a university web site that
typically is stored in the home directory of the user.

A Hyperlink is a reference to data that the reader can directly follow either by clicking or
by hovering or that is followed automatically

A web browser (commonly referred to as a browser) is a software application for retrieving,


presenting and traversing information resources on the World Wide Web.

Some of the famous browsers are Safari, Chrome, Firefox, Bolt, UC Browser and Internet
Explorer

FSSAI: FCI: Computer Awareness Page 21


The Uniform Resource Locator, abbreviated as URL is a specific character string that
constitutes a reference to a resource. In most web browsers, the URL of a web page is
displayed on top inside an address bar.

(i) An example of a typical URL would be "http://www.swaeducation.com".

Here the domain name is ‘swaeducation.com’

Downloading means to receive data to a local system from a remote system or to initiate
such a data transfer Uploading refers to the sending of data from a local system to a remote
system such as a server or another client with the intent that the remote system should
store a copy of the data being transferred

An Internet Protocol address (also known as an IP address) is a numerical label assigned


to each device (e.g., computer, printer) participating in a computer network. It acts as an
identifier for a computer. It is a unique address for every computer.

Domain names are used to identify one or more IP addresses.

The universal resource locator, or URL, is an entire set of

directions, and it contains extremely detailed information. The domain name is one of the
pieces inside of a URL.

DOMAIN TYPES
Type Description
com Commercial and for profit organization
edu Educational provider, college, Universities
gov Government agencies
Mil US military sites
net Internet infrastructure and service providers
org Miscellaneous and Non-profit organisations

An email attachment is a computer file sent along with an email message. One or more files
can be attached to any email message, and be sent along with it to the recipient.

Hotmail was co-founded by an Indian American entrepreneur Sabeer Bhatia along with
Jack Smith in July of 1996.

CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another.
The list of CC recipients is visible to all other recipients of the message.

FSSAI: FCI: Computer Awareness Page 22


An additional BCC (blind carbon copy) field is available for hidden notification; recipients
listed in the BCC field receive a copy of the message, but are not shown on any other
recipient's copy (including other BCC recipients) The Drafts folder retains copies of
messages that you have started but are not yet ready to send.

The first email was sent by Ray Tomlinson to himself in 1971.

Internet Explorer was deprecated in Windows 10, with Microsoft Edge replacing it as the
default web browser.

COMPUTER SECURITY
A Computer Virus is a computer program or code that can replicate itself and spread from
one computer system to another system. A computer virus has the capacity to corrupt or
to delete data on your computer and it can utilize an e- mail program to spread the virus
to other computer systems
In the worst case scenario, it can even delete everything on your hard disk .The purpose
of it is to disrupt the operation of the computer or the program.

Some examples of Computer Virus are Trojan viruses. Stealth viruses, worms, malware
(malicious software), Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word Concept,
etc.

Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of executable code, scripts, active content, and other software.

Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.

A person who uses his or her expertise to gain access to other people’s computers to get
information illegally or do damage is a Hacker.

Authorization is the function of specifying access rights to resources related to


information security and computer security in general and to access control in particular.
More formally, "to authorize" is to define an access policy.

Authentication is the act of confirming the truth of an attribute of a single piece of data
or entity. It might involve confirming the identity of a person by validating their identity
documents, verifying the validity of a website with a digital certificate, tracing the age of
an artifact by carbon dating, or ensuring that a product is what its packaging and labelling

FSSAI: FCI: Computer Awareness Page 23


claim to be. In other words, Authentication often involves verifying the validity of at least
one form of identification.

Phishing is the attempt to acquire sensitive information such as usernames, passwords,


and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.

A Spoofing attack is a situation in which one person or program successfully represents


oneself as another by falsifying data and thereby gaining an illegitimate advantage.

FSSAI: FCI: Computer Awareness Page 24


CHAPTER 05
MICROSOFT OFFICE
MICROSOFT OFFICE
Microsoft Office is an office suite of desktop applications, servers and services for the
Microsoft Windows and Mac operating systems. It includes Microsoft Word, Excel,
PowerPoint, Outlook, OneNote, Access and Publisher.
Note: Microsoft Windows Vista was an windows OS for PC not Office Suit.
Office 365 is a subscription service that includes the most recent version of Office, which
currently is Office 2016. It comes with the applications you’re familiar with, like Word,
PowerPoint, and Excel, plus extra online storage, ongoing tech support.

Note- Microsoft Azure is a growing collection of integrated cloud services which developers
and IT professionals use to build, deploy and manage applications through our global
network of data centres. It provides software as a service (SaaS), platform as a service (PaaS)
and infrastructure as a service (IaaS) and supports many different programming languages,
tools and frameworks. Microsoft Azure was earlier known as Windows Azure.

FSSAI: FCI: Computer Awareness Page 25


SOME NEW FEATURES INTRODUCED IN OFFICE 2016 FOR WINDOWS OS

Share: In Word 2016 for Windows, it is easier than ever to share your documents. When
you share your files by using OneDrive or SharePoint Online for Office 365, you can invite
people to the document directly from within Word, or send a PDF or Word file as an email
attachment. This feature of share is also available for Excel and PowerPoint 2016.

Tell Me: This is a text field where you can enter words and phrases about what you want
to do next and quickly get to those features you want to use or actions you want to
perform. You can also use Tell Me to find help about what you're looking for, or to use
Smart Lookup to research or define the term you entered.

Smart Lookup: Bing search incorporated with applications

New Charts introduced in Excel 2016 : New Chart types and templates are introduced in
Excel 2016 such as tree map, sunburst chart (also known as a ring chart), waterfall chart,
box plot and histogram, and financial and calendar templates.
Skype and OneDrive Integration : One of the new features added to Word, Excel, and
PowerPoint is the ability to use Skype for Business to collaborate and communicate while
working on documents. User can IM or video-call someone with Skype from the new Share
pane built into the new Office applications. OneDrive integration supports cloud storage
file hosting service that supports access of office document from anywhere on any device.

Some other features:


New animations in PowerPoint (such as the Morph transition), the ability to insert online
video in OneNote, and a data loss prevention feature in Word, Excel, and PowerPoint.
New recent-documents feature in Outlook 2016 shows you the documents you've recently
worked on in the Office apps, so you don't have to hunt for them on your PC.

Enterprise Data Protection: To manage and prevent data loss at enterprise level, MS Office
2016 comes paced with inbuilt security feature that provide an ease for system admin to
enforce policies for content authoring and document sharing.

FSSAI: FCI: Computer Awareness Page 26


SOME COMMANDS RELATED TO MS OFFICE

1. Save Vs Save As
"Save" simply saves your work by updating the last saved version of the file to match the
current version you see on your screen.
"Save As" brings up a prompt to save your work as a file with a different name. For
example, you might choose to save a document called "New Doc" as "Final Doc". This way,
you can save you file at different stages and keep multiple versions on your hard drive.

2. Save or convert to PDF


You can use the Office programs to save or convert your files to PDFs so that you can share
them or print them using commercial printers. To export or save as PDF, in your Office file,
on the File menu, click Export or Save As.

3. Undo Vs Redo
You can undo, redo, or repeat many actions in Microsoft Word, PowerPoint, and Excel.
Undo reverses the immediate action. Redo reverts the effects of the undo action.

4. Portrait Vs Landscape
The terms portrait and landscape refer to different orientations of the paper; whether it
is oriented vertically or horizontally. A page with portrait orientation, typical for letters,
memos, and other text documents, is taller than it is wide. Portrait is vertical mode and
landscape is horizontal mode.

MS WORD 2016:
Backstage View in MS Word 2016: MS Word 2016 has a backstage view where you can see
the recent documents that you’ve visited or edited and a few templates as well. There is
also an option to search for more templates. These templates can help you get the desired
layout where a sample data will already be there. You may edit and enter data as you may
like.

MS Word 2016 Ribbons:


Quick Access Toolbar
By default, on top is the Quick access toolbar which has 3 default options available: Save,
Undo Typing and Repeat Typing. After this there is a drop-down menu for customizing the
quick access toolbar. This toolbar is totally customizable; you can position it below the tabs
and commands or add more items to it.
To add or remove a command from the quick access toolbar: When you find a favourite
command, right-click it, and then click Add to Quick Access Toolbar.
Remove a command by right-clicking it on the Quick Access Toolbar, and then clicking
Remove from Quick Access Toolbar.

FSSAI: FCI: Computer Awareness Page 27


Tabs in Word 2016
The ribbon in Word and other Office Suite’s Application has Tabs. In Word 2016 there are
9 tabs followed by a new feature of “Tell me what you want to do” arranged in a horizontal
fashion. The tabs are as follows: File, Home, Insert, design, Layout, References, Mailing,
Review, and View. The File tab opens the Info Window and has options arranged in a
vertical array: Info, New, Open, Save, Save As, Print, Share, Export, Close, Account,
Feedback and Options.
The ribbon containing Tabs also have a new feature of Share and Comment at the extreme
right corner.

Note- Each tab has many commands which are grouped into specific categories. Following
are the groups for commands under various tabs of MS Word 2016:

Home: Clipboard, Font, Paragraph, Styles and Editing


Insert: Pages, Tables, Illustrations, Add-ins, Media, Links, Comments, Header & Footer,
Text, Symbols
Design: Document Formatting, Page Background
Layout: Page Setup, Paragraph, Arrange
References: Table of Contents, Footnotes, Research, Citation & Bibliography, Captions,
Index, Table of Authorities
Mailings: Create, Start Mail Merge, Write &Insert Fields, Preview Results, Finish
Review: Proofing, Accessibility, Language, Comments, Tracking, Changes, Compare,
Protect
View: Views, Page Movement, Show, Zoom, Window, Macros

MS POWERPOINT 2016:
PowerPoint is a slideshow presentation program that's part of the Microsoft office suite
of tools. PowerPoint slides can be plain with only text, or they can include pictures and
even animation, including moving text and images. Text can be formatted in the same way
as text can be formatted in Microsoft Word, including colour, size, and font type.

In PowerPoint 2016 there are 9 tabs followed by a new feature of “Tell me what you want
to do” arranged in a horizontal fashion. The tabs are as follows: File, Home, Insert, design,
Transition, Animation, Slide Show, Review, and View.

1. Home
The home tab in PowerPoint has following groups: Clipboard, Slides, Font, Paragraph,
drawing and Editing. The Clipboard, Editing and Font commands are same as that in Word
2016. The Slides group contains commands to insert new slide, choose slide layout, reset
the positions and formatting of the slide placeholders and option to organize your slides
into sections.

FSSAI: FCI: Computer Awareness Page 28


2. Insert
Click Insert to add something to a slide. This includes pictures, shapes, charts, links, text
boxes, video and more. The Insert Tab has following groups of commands: Slides, Tables,
Images, Illustrations, Add-ins, Links, Comments, Text, Symbols and Media.

3. Design
On the Design tab, you can add a theme or colour scheme, or format the slide background.
The design tab has following categories or groups of commands:
Themes- Each theme has its own unique set of font, effect, colour to create a visually
appeasing and overall look of the slide.
Variants - The current theme or style can be customized using various colour schemes
through variants.
Customize- This group contains commands to change slide size and Format Background.
Designer- For instant slide makeovers.

4. Transitions
Set up how your slides change from one to the next on the Transitions Tab. Find a gallery
of the possible transitions in the Transition to This Slide group – click More Button at the
side of the gallery to see all of them.

5. Animations
User may use the Animations tab to choreograph the movement of things on his slides.
Note that you can see many possible animations in the gallery in the Animation group, and
see more of them by clicking More Button. Apart from adding animation you can also
customize its duration and timing as you need by using advanced animation and timing
group of commands.

6. Slide Show
On the Slide Show tab, set up the way that you want to show your presentation to others.

7. Review
The Review tab lets you add comments, run spell-check, or compare one presentation with
another (such as an earlier version).

8. View
Views allow you to look at your presentation in different ways, depending on where you
are in the creation or delivery process.

9. File
At one end of the ribbon is the File tab, which you use for the behind-the-scenes stuff you
do with a file, such as opening, saving, sharing, exporting, printing and managing your
presentation. Click the File tab to open a new view called the Backstage.
10. Tools tabs

FSSAI: FCI: Computer Awareness Page 29


When you click some parts of your slides, such as pictures, shapes, SmartArt or text boxes,
you might see a colourful new tab appear.
For example, the Drawing Tools tab appears when you click a shape or text box. When you
click a picture, the Picture Tools tab appears. Other such tabs include SmartArt Tools, Chart
Tools, Table Tools and Video Tools. These tabs disappear or change when you click
something else in your presentation.

Terms related to PowerPoint


Slide Show : Each page of a PowerPoint presentation is called a slide. The default
orientation of the slide is in landscape layout
Design Template : A design template acts as a coordinated packaged deal. It is created so
that even though different slide types can have different layouts and graphics, the whole
presentation goes together as an attractive package.
Slide Master : When you want all your slides to contain the same fonts and images (such
as logos), you can make those changes in one place—the Slide Master, and they'll be
applied to all your slides. To open Slide Master view, on the View tab, select Slide Master.

MS EXCEL 2016
Microsoft Excel is a spreadsheet developed by Microsoft. Spreadsheets allow you to keep
track of data, create charts based from data, and perform complex calculations. Just like a
book ledger, spreadsheets store information in columns and rows. You can have up to 256
columns and 65,536 rows per worksheet.

Workbook and Worksheet


An Excel worksheet is a single spreadsheet that contains cells organized by rows and
columns. A worksheet begins with row number 1 and column A. Each cell can contain a
number, text or formula. Excel Workbook comprises number of worksheets. Many new
sheets can be added to a workbook using adding worksheet command which is present at
the bottom.

Formula and Function


Formulas enable you to enter calculations in a worksheet. Using Excel for calculations gives
you the ability to change the data (or values) of the cells, and have the program
automatically update the recalculate the value of the output based on the new numbers.

FSSAI: FCI: Computer Awareness Page 30


Function Description
SUM Use this function to add the values in cells.
function

IF function Use this function to return one value if a condition is true and another
value if it's false

LOOKUP Use this function when you need to look in a single row or column and
function find a value from the same position in a second row or column.

MATCH Use this function to search for an item in a range of cells, and then
function return the relative position of that item in the range. For example, if the
range A1:A3 contains the values 5, 7, and 38, then the formula
=MATCH(7,A1:A3,0) returns the number 2, because 7 is the second item
in the range.

CHOOSE Use this function to select one of up to 254 values based on the index
function number. For example, if value1 through value7 are the days of the week,
CHOOSE returns one of the days when a number between 1 and 7 is
used as index_num.

DATE Use this function to return the sequential serial number that represents
function a particular date. This function is most useful in situations where the
year, month, and day are supplied by formulas or cell references. For
example, you might have a worksheet that contains dates in a format
that Excel does not recognize, such as YYYYMMDD.
Use the DATEDIF function to calculate the number of days, months, or
years between two dates.
DAYS Use this function to return the number of days between two dates.
function

FIND, FINDB FIND and FINDB locate one text string within a second text string. They
functions return the number of the starting position of the first text string from
the first character of the second text string.

FSSAI: FCI: Computer Awareness Page 31


Freeze Panes in Excel
If you wish to see a particular area of a worksheet visible or multiple rows and columns
while you scroll to another area of the worksheet, you can use Freeze Panes (available
under view tab).

Tabs in MS Excel 2016


The ribbon in Excel and other Office Suite’s Application has Tabs. In Excel 2016 there are 8
tabs followed by a new feature of “Tell me what you want to do” arranged in a horizontal
fashion. The tabs are as follows: File, Home, Insert, Page Layout, Formulas, Data, Review,
and View.
Following are the groups of Commands available under tabs of Excel 2016:

Home: Clipboard, Font, Alignment, Number, Style (for Conditional Formatting of table),
Cells (to insert, delete and format cells), Editing (AutoSum, Sort & Filter, Find & Select)
Insert: Tables (Pivot Table, and Tables); Illustrations (Pictures, Online Picture, shapes and
Icon); Add-ins;

Charts; Tours (3D Map); Spark lines (Line, Column, Win/Loss); Filters; Links; Text; Symbols.

Page Layout: Themes; Page Setup (Margin, orientation, page size, print area, breaks,
background and print titles); Scale to fit; Sheet Options (Gridline, headings); Arrange

Formulas: Insert Function; Function Library; Defined Names; Formula Auditing; Calculation

Data: Get external Data; Get & Transform (New query, show queries, from table, recent
sources): Connections; Sort and Filter; Data Tools; Forecast (what-if analysis, forecast
sheet); Outline

Review: Proofing (Spelling, Thesaurus); Accessibility; Insights-smart lookup; Comments;


Changes (Protect sheet, protect workbook, share workbook, allow users to edit ranges,
track changes)

View: Workbook Views (Normal, Page Break Preview, Page Layout, Custom Views); Show
(gridlines, ruler. formula bar, headings); Zoom; Window; Macros.

FSSAI: FCI: Computer Awareness Page 32


MICROSOFT OFFICE SHORT KEYS

BASIC SHORTCUT KEYS

Alt + F File menu options in current program


Alt + E Edit options in current program
F1 Universal help (for all programs)
Ctrl + A Select all text
Ctrl + X Cut selected item
Shift + Del Cut selected item
Ctrl + C Copy selected item
Ctrl + Ins Copy selected item
Ctrl + V Paste
Shift + Ins Paste
Home Go to beginning of current line
Ctrl + Home Go to beginning of document End Go to end of current line
Ctrl + End Go to end of document
Shift + Home Highlight from current position to beginning of line
Shift + End Highlight from current position to end of line

WORD SHORTCUT KEYS

Ctrl + A Select all contents of the page


Ctrl + B Bold highlighted selection
Ctrl + C Copy selected text
Ctrl + X Cut selected text
Ctrl + N Open new/blank document
Ctrl + O Open options
Ctrl + P Open the print window
Ctrl + F Open find box
Ctrl + I Italicize highlighted selection
Ctrl + K Insert link
Ctrl + U highlighted selection
Ctrl + V Paste
Ctrl + Y Redo the last action performed

FSSAI: FCI: Computer Awareness Page 33


Ctrl + Z Undo last action
Ctrl + G Find and replace options
Ctrl + H Find and replace options
Ctrl + J Justify paragraph alignment
Ctrl + L Align selected text or line to the left
Ctrl + Q Align selected paragraph to the left
Ctrl + E Align selected text or line to the centre
Ctrl + R Align selected text or line to the right
Ctrl + M Indent the paragraph
Ctrl + T Hanging indent
Ctrl + D Font options
Ctrl + Shift + F Change the font
Ctrl + f Move one word to the left
Ctrl + Space Reset highlighted text to default font
Ctrl + 1 Single-space lines
Ctrl + 2 Double-space lines
Ctrl + 5 1.5-line spacing
Ctrl + Alt + 1 Change text to heading 1
Ctrl + Alt + 2 Change text to heading 2
Ctrl + Alt + 3 Change text to heading 3
F1 Open help
Shift + F3 Change case of selected text
Shift + Insert Paste
F4 Repeat last action performed (Word 2000+)
F7 Spell check selected text and/or document
Shift + F7 Activate the thesaurus F12 Save as
Ctrl + S Save
Shift + F12 Save
Alt + Shift + D Insert the current date
Alt + Shift + T Insert the current time
Ctrl + W Close document

FSSAI: FCI: Computer Awareness Page 34


EXCEL SHORTCUT KEYS

F2 Edit the selected cell


F5 Go to a specific cell
F7 Spell check selected text and/or document
F11 Create chart
Ctrl + Shift + Enter the current time
Ctrl + Enter the current date
Alt + Shift + F1 Insert new worksheet
Shift + F3 Open the Excel® formula window
Shift + F5 Bring up search box
Ctrl + A Select all contents of worksheet
Ctrl + B Bold highlighted selection
Ctrl + I Italicize highlighted selection
Ctrl + C Copy selected text
Ctrl + V Paste
Ctrl + D Fill
Ctrl + K Insert link
Ctrl + F Open find and replace options
Ctrl + G Open go-to options
Ctrl + H Open find and replace options
Ctrl + U Underline highlighted selection
Ctrl + Y Underline selected text
Ctrl + 5 Strikethrough highlighted selection
Ctrl + O Open options
Ctrl + N Open new document
Ctrl + P Open print dialog box
Ctrl + S Save
Ctrl + Z Undo last action
Ctrl + F9 Minimize current window
Ctrl + F10 Maximize currently selected window
Ctrl + F6 Switch between open workbooks/windows
Ctrl + Tab Move between two or more open Excel files
Alt + = Create formula to sum all of above cells

FSSAI: FCI: Computer Awareness Page 35


Ctrl + Insert Value of above cell into current cell
Ctrl + Shift + ! Format number in comma format
Ctrl + Shift + $ Format number in currency format
Ctrl + Shift + # Format number in date format
Ctrl + Shift + % Format number in percentage format
Ctrl + Shift + ^ Format number in scientific format
Ctrl + Shift + @ Format number in time format
Ctrl + g Move to next section of text
Ctrl + Space Select entire column
Shift + Space Select entire row
Ctrl + W Close document

FILE EXTENSIONS:

Word
XML file type Extension
Document .docx
Macro-enabled document .docm
Template .dotx
Macro-enabled template .dotm

Excel
XML file type Extension
Workbook .xlsx
Macro-enabled workbook .xlsm
Template .xltx
Macro-enabled template .xltm
Non-XML binary workbook .xlsb
Macro-enabled add-in .xlam

FSSAI: FCI: Computer Awareness Page 36


Power Point
XML file type Extension
Presentation .pptx
Macro-enabled presentation .pptm
Template .potx
Macro-enabled template .potm
Macro-enabled add-in .ppam
Show .ppsx
Macro-enabled show .ppsm
Slide .sldx
Macro-enabled slide .sldm
Office theme .thmx

DATABASE MANAGEMENT SYSTEM


DBMS is the acronym of Data Base Management System. DBMS is a collection of
interrelated data and a set of programs to access this data in a convenient and efficient
way. It controls the organization, storage, retrieval, security and integrity of data in a
database.

Types of Database Model: Network Database Model, Hierarchical Database model,


Relational Database Model and Object-Oriented Database Model.

Architecture of DBMS- The generalized architecture of DBMS is called ANSI/ SPARC model.
The architecture is divided into three levels:

External view or user view/View Level- It is the highest level of data abstraction. This
includes only those portions of database of concern to a user or Application program. Each
user has a different external view and it is described by means of a scheme called external
schema.

• Conceptual view/Logical Level- All the database entities and the relationship among
them are included. One conceptual view represents the entire database called conceptual
schema.

• Internal view/Physical Level- It is the lowest level of abstraction, closest to the physical
storage method. It describes how the data is stored, what is the structure of data storage
and the method of accessing these data. It is represented by internal schema.

Data model: A data model is a plan for building a database. The model represents data
conceptually, the way the user

FSSAI: FCI: Computer Awareness Page 37


• Entity – Relationship Model
• Relational Model

sees it, rather than how computers store it. Data models focus on required data elements
and associations.

Entity: A thing (animate or inanimate) of independent physical or conceptual existence


and distinguishable. In the University database context, an individual student, faculty
member, a class room, are entities.

Attributes: Each entity is described by a set of attributes/properties.

SQL (Structured Query Language) is a database computer language designed for the
retrieval and management of data in relational database.

Constrains: In SQL, we have the following constraints-


NOT NULL - Indicates that a column cannot store NULL value UNIQUE - Ensures that each
row for a column must have a unique value
CHECK - Ensures that the value in a column meets a specific condition
DEFAULT - Specifies a default value for a column.

Primary Key uniquely identifies a record in a table.


A candidate key is a single field or the least combination of fields that uniquely identifies
each record in the table.
A foreign key is generally a primary key from one table that appears as a field in another.
DDL: Data Definition Language is used for specifying the database schema. It contains
commands to create tables, alter the structure, delete tables or rename tables. E.g. Create.
DML: Data Manipulation Language is used for accessing and manipulating data in a
database. E.g. Select, Update
DCL: Data Control Language is used for granting and revoking user access on a database.

FSSAI: FCI: Computer Awareness Page 38


CHAPTER 06
PROGRAMMING LANGUAGE

COMPUTER LANGUAGES
Low level language: these are coded in a form which is easy to understand by the
processor.

Machine language: it is also a type of low level language these can be develop in binary
language (0 and 1) .

Assembly language: it is also a type of low level language and using the human readable
instruction of the CPU. It is written as ‘MOV A.’

High level language programmer can write code in simple easy language, it is user friendly
. E.g. C, JAVA

C language: it is a middle level programming language and also known as procedural


language

C++ is high level language that uses the OOPS concept.

Fortran: it is known as formula translation. It is used for scientific application

COBOL (Common Business Oriented Language ): used for record keeping and data
management in business organizations.

BASIC (Beginner’s All Purpose Symbolic Instruction Code): first language designed for
non-professional programmers.

PASCAL: it is developed as a teaching tool for programming concepts.

Simula was the first object-oriented programming language. Java, Python, C++, Visual
Basic .NET and Ruby are the most popular Object Oriented Programming languages. The
Java programming language is designed especially for use in distributed applications on
corporate networks and the Internet. Ruby is used in many Web applications. Curl,
Smalltalk, Delphi and Eiffel are also examples of object- oriented programming languages.

Language processor (Translator): Programmers write their program in one of the high
level language because it is much easy to code in these language but computer does not
FSSAI: FCI: Computer Awareness Page 39
understand any of these language so it is necessary to convert program into a machine
language so translator do this work.

Loader: It loads the code which is translated by translator into the main memory and
makes it ready to execute.

Linker is used to combine all the object files and convert them into a final executable
program.

Interpreter converts high level language program into machine language. It is very slow
because it convert program line by line.

Compiler: It also translates the program from high level language to machine language. It
is very

fast because it converts the whole program into machine language.

Assembler: It is used for converting the code of low level language (assembly language)
into machine level language.

PROGRAMMING LANGUAGE
Programming Language are coded language are coded language used by programmer to
write instructions that a computer can understand to what the Programmer want.
Following are the major categories of Programming Languages −

• Machine Language
• Assembly Language
• High Level Language
• System Language
• Scripting Language

Pseudo code -
Pseudo code is a simple way of writing programing code in English.
For example – Task – Add two Numbers ,
• Start
• Get two numbers
• Add them
• Print the answer
• End

Flow chart
FSSAI: FCI: Computer Awareness Page 40
A flow chart is a graphical or symbolic representation of a process. Each step in the process
is represented by a different symbol and contains a short description of the process step.

Different flow chart symbols have different meanings. The most common flow chart
symbols are:

• Terminator: An oval flow chart shape indicating the start or end of the process.
• Process: A rectangular flow chart shape indicating a normal process flow step.
• Decision: A diamond flow chart shape indication a branch in the process flow.
• Connector: A small, labelled, circular flow chart shape used to indicate a jump in
the process flow. (Shown as the circle with the letter "A", below.)
• Data: A parallelogram that indicates data input or output (I/O) for a process.
• Document: Used to indicate a document or report (see image in sample flow chart
below).

What is Algorithm
An algorithm is a well-defined procedure that allows a computer to solve a problem.
Another way to describe an algorithm is a sequence of unambiguous instructions. ... In
fact, it is difficult to think of a task performed by your computer that does not use
algorithms.

Sequence of program –
• Algorithm
• Flowchart
• Program (source code)
• Compiling
• Object code

What is syntax - way to write any instruction in any programming language with the help
of some special symbols and character.

FSSAI: FCI: Computer Awareness Page 41


• Machine language
Machine language is written in binary language. It is consists of 0s and 1s. Machine
language is dependent programming language. It is first generation programming
language. It does not require translator. Machine Language is easy to understand for
computer but difficult to programmer.
The program is written in machine is called object code.
It has two part –
Opcode – Operation code – an opcode is a single instruction that can be executed by the
CPU.
Operand (address part) – operands are manipulated by opcode

• Assembly Language -
Assembly language used mnemonic code in place of binary language. It is second
generation programming language. An assembly language is a low-level programming
language designed for a specific type of processor. Assembly languages generally lack high-
level conveniences such as variables and functions.

• High level Language -


A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that
enables a programmer to write programs that are more or less independent of a particular
type of computer. It is independent programming language. It is third Generation
programming language. The program is written in high level is called source code. FORTAIN
was first high level language.

FSSAI: FCI: Computer Awareness Page 42


➢ FORTRAN
Full form Formula Translation. It was first high-level language. It was introduced by John
Backus in 1957. It is used for scientist and engineers.

➢ ALGOL
ALGOL is short for algorithmic language. It is an early high-level computer programming
language devised to carry out scientific calculations. ALGOL was used as the standard
method for creating algorithms. First appeared in 1958. ALGOL language designed by:
Friedrich L. Bauer, Hermann Botten bruch

➢ COBOL
The name COBOL stands for Common Business-Oriented Language. COBOL is a
programming language that was developed in the year 1959. It was one of the first
computer programming languages used for commercial. It was introduced by Grace
Hopper.

➢ BASIC(Beginner's All-purpose Symbolic Instruction Code)


BASIC , Stands for "Beginner's All-purpose Symbolic Instruction Code”. BASIC is a computer
programming language that was developed in the mid-1960s to provide a way for students
to write simple computer programs. In 1964, John G. Kemeny and Thomas E. Kurtz
designed the original BASIC language at Dartmouth College.

➢ Pascal
Pascal is an imperative and procedural programming language, designed by Niklaus Wirth
as .... Apollo Computer used Pascal as the systems programming language for its operating
systems beginning in 1980. It is named in honor of the French mathematician, philosopher
and physicist Blaise Pascal.

➢ C Language
C is a general-purpose, procedural computer programming language supporting
structured programming, lexical variable scope, and recursion, while a static type system
prevents unintended operations. C was developed at Bell Labs by Dennis Ritchie for the
Unix Operating System in the early 1970s. It is also called middle level language.

➢ C++ Language
C++ is a High-level programming language developed by Bjarne Stroustrup starting in 1979
at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various
versions of UNIX. This C++ tutorial adopts a simple and practical approach to describe the
concepts of C++ for beginners to advanced software engineers. C++ fully supports object-
oriented programming, including the four pillars of object-oriented development.

FSSAI: FCI: Computer Awareness Page 43


➢ JAVA
Java is a programming language and a platform. Java is a high level, robust, object-oriented
and secure programming language. Java is introduced by James Gosling. Java is used many
application like ,

1. Desktop Applications such as acrobat reader, media player, antivirus, etc.


2. Web Applications such as irctc.co.in, javatpoint.com, etc.
3. Enterprise Applications such as banking applications.
4. Mobile
5. Embedded System
6. Smart Card
7. Robotics
8. Games, etc.

➢ PERL(Practical Extraction and Reporting Language)


Perl is a general-purpose programming language originally developed for text
manipulation and now used for a wide range of tasks including system administration, web
development, network programming, GUI development, and more. Perl was originally
developed by Larry Wall in 1987. Stand for "Practical Extraction and Reporting Language.

➢ Python
Python is a general purpose and high level programming language. You can use Python for
developing desktop GUI applications, websites and web applications. It is introduced by
Guido van Rossum.

➢ C# Language
C# can be used to create almost anything but is particularly strong at building Windows
desktop applications and games. C# can also be used to develop web applications and has
become increasingly popular for mobile development too. It is developed by Microsoft. C#
is an object-oriented programming language used with XML-based Web services on the
.NET platform and designed for improving productivity in the development of Web
applications.

SCRIPTING LANGUAGE
Scripting languages are server-side scripting languages that manipulate the data, usually
in a database, on the server. Scripting languages came about largely because of the
development of the Internet as a communications tool.
Html, Xml, JavaScript, ASP, JSP, PHP, Perl, Tcl and Python are examples of scripting
languages.

FSSAI: FCI: Computer Awareness Page 44


LANGUAGE TRANSLATOR
Language translator is a program which is used to translate instructions that are written in
the source code to object code i.e. from high-level language or assembly language into
machine language.

There are 3 different types of translators as

1. Assembler- Assembler are used to convert assembly language code into machine code.
Assembler convert mnemonic code in to object code.

2. Compiler- Compiler translate high level language in machine language. It read the
entire program. It finds the syntax error. Error in a program is called bug. Compiler convert
source code into object code.

3. Interpreter- An interpreter translates high-level instructions into an intermediate form,


which it then executes. It reads the program line by line. In contrast, a compiler translates
high-level instructions directly into machine language. Compiled programs generally run
faster than interpreted programs.

FSSAI: FCI: Computer Awareness Page 45


CHAPTER 07
COMPUTER ABBREVIATIONS
ABBREVIATIONS ASSOCIATED WITH COMPUTER
No. Abbreviation Full Form

Common Operating Machine Purposely Used for Technological and Educational


1 COMPUTER Research

2 ROM Read Only Memory

3 CPU Central Processing Unit

4 URL Uniform Resource Locator

5 USB Universal Serial Bus

6 VIRUS Vital Information Resource Under Siege

7 TCP Transmission Control Protocol

8 UPS Uninterruptible Power Supply

9 SATA Serial Advanced Technology Attachment

10 RAM Random Access Memory

11 SMPS Switched-Mode Power Supply

12 CD Compact Disc

13 DVD Digital Versatile Disc

14 CRT Cathode Ray Tube

15 DEC Digital Equipment Corporation

16 SAP System Application and Products

17 PNG Portable Network Graphics

18 IP Internet Protocol

19 GIS Geographical Information system

20 DDS Digital Data Storage

FSSAI: FCI: Computer Awareness Page 46


21 CAD Computer Aided Design

22 ACPI Advanced Configuration and Power Interface

23 AGP Accelerated Graphics Port

24 APM Advanced Power Management

25 APIPA Automatic Private Internet Protocol Addressing

26 HTTP Hyper Text Transfer Protocol

27 HTTPS Hyper Text Transfer Protocol Secure

28 GPU Graphics Processing Unit

29 GDI Graphics Device Interface

30 ICP Internet Cache Protocol

31 GIGO Garbage In Garbage Out

32 GMAIL Graphical Mail

33 CAN Campus Area Network

34 CAL Computer Aided Leering

35 GPL General Public License

36 GCR Group Code Recording

37 MSN Microsoft Networks

38 BCC Blind Carbon Copy

39 VDI Virtual Desktop Infrastructure

40 MPEG Moving Picture Experts Group

41 TPU Tensor Processing Unit

42 PSD Photoshop Document

43 DPI Dots Per Inch

44 FYA For Your Action

45 CRS Computer Reservation System

46 BFD Binary File Descriptor

47 ABR Available Bit Rate

48 GBPS Gigabits Per Second

49 PING Packet InterNet Groper

50 CSMA Carrier Sense Multiple Access

FSSAI: FCI: Computer Awareness Page 47


51 AD Active Directory

52 ADC Analog to Digital Converter

53 BGP Border Gateway Protocol

54 CSI Common System Interface

55 DHCP Dynamic Host Configuration Protocol

56 OSI Open Systems Interconnection

57 LAN Local Area Network

58 WAN Wide Area Network

59 MAN Metropolitan Area Network

60 PAN Personal Area Network

61 MAC Media Access Control

62 OMR Optical Mark Recognition

63 NIC Network Interface Card

64 LDAP Lightweight Directory Access Protocol

65 UART Universal Asynchronous Receiver-Transmitter

66 DCE Distributed Computing Environment

67 PFA Please Find Attached

68 HCI Human Computer Interaction

69 FHS Filesystem Hierarchy Standard

70 FCS Frame Check Sequence

71 DVE Digital Video Effects

72 DLL Data Link Layer

73 CSV Comma Separated Values

74 CTCP Client–to–Client Protocol

75 ABI Application Binary Interface

76 MIS Management Information System

77 BIOS Basic Input Output System

78 SMTP Simple Mail Transfer Protocol

79 LTE Long Term Evolution

80 AHA Accelerated Hub Architecture

FSSAI: FCI: Computer Awareness Page 48


81 ALU Arithmetic Logical Unit

82 FPU Floating Point Unit

83 FXP File Exchange Protocol

84 HID Human Interface Device

85 IOS iPhone Operating System

86 PATA Parallel Advanced Technology Attachment

87 DDR Double Data Rate

88 DFS Distributed File System

89 MIPS Million Instructions Per Second

90 MMC Microsoft Management Console

91 VGCT Video Graphics Character Table

92 WBMP Wireless BitMap Image

93 PCM Pulse-Code Modulation

94 WMA Windows Media Audio

95 RAS Remote Access Service

96 HTM Hierarchical Temporal Memory

97 SIS Security and Intelligence Services

98 LBA Logical Block Addressing

99 CIDR Classless Inter-Domain Routing

100 MIMO Multiple-Input Multiple Output

101 PLC Programmable Logic Controller

102 SCSI Small Computer System Interface

103 NVRAM Non-Volatile Random-Access Memory

104 BLOB Binary large Object

105 VPN Virtual Private Network

106 SFF Small Form Factor

107 CAI Computer–Aided Instruction

108 EMP Electro-Magnetic Pulse

109 EIDE Enhanced Integrated Drive Electronics

110 AAC Advanced Audio Codec

FSSAI: FCI: Computer Awareness Page 49


111 IIOP Internet Inter-ORB Protocol

112 ASL Age Sex Location

113 MBSA Microsoft Baseline Security Analyzer

114 ZIP Zig-zag In-line Package

115 HSPA High Speed Packet Access

116 VFS Virtual File System

117 SIMD Single Instruction Multiple Data

118 IPC Inter-Process Communication

119 DAC Discretionary Access Control

120 DKIM Domain Keys Identified Mail

121 WIFI Wireless Fidelity

122 PTP Picture Transfer Protocol

123 IGRP Interior Gateway Routing Protocol

124 HIG Human Interface Guidelines

125 UNIVAC Universal Automatic Computer

126 CIFS Common Internet File System

127 HAL Hardware Abstraction Layer

128 IPV6 Internet Protocol Version 6

129 CNR Communication Network Riser

130 EISA Extended Industry Standard Architecture

131 RPM Red-Hat Package Manager

132 DLT Distributed Ledger Technology

133 ISH Information Super Highway

134 BY Bronto-bytes

135 DTS Digital Theater System

136 MSB Most Significant Bit

137 HVD Holographic Versatile Disk

138 MOSFET Metal-Oxide Semiconductor Field Effect Transistor

139 AMR Adaptive Multi-Rate

140 CMD Command

FSSAI: FCI: Computer Awareness Page 50


141 BCD Binary Coded Decimal

142 DMA Direct Memory Access

143 EB Exa-bytes

144 AVI Audio Video Interleave

145 WLAN Wireless Local Area Network

146 CAM Computer Aided Manufacturing

147 RIFF Resource Interchange File Format

148 TFTP Trivial File Transfer Protocol

149 WUSB Wireless Universal Serial Bus

150 HHD Hybrid Hard Drive

151 HSDPA High Speed Downlink Packet Access

152 AST Abstract Syntax Tree

153 MSD Most significant Digit

154 IRQ Interrupt Request

155 DVI Digital Visual Interface

156 SPARC Scalable Processor Architecture

157 URI Uniform Resource Identifier

158 EPROM Erasable Programmable Read Only Memory

159 SAN Storage Area Network

160 EBCDIC Extended Binary Coded Decimal Interchange Code

161 MVS Multiple Vendor System

162 NAS Network Attached Storage

163 BPS Bits Per Second

164 LPX Low Profile Extension

165 HCL Hardware Compatibility List

166 RTS Real Time Streaming

167 RAID Redundant Array of Inexpensive Disks

168 MUI Multilingual User Interface

169 MFD Multi-Function Device

170 CISC Complex Instruction Set Computer

FSSAI: FCI: Computer Awareness Page 51


171 MBR Master Boot Record

172 BINAC Binary Automatic Computer

173 SGRAM Synchronous Graphics Random Access Memory

174 DLP Digital Light Processing

175 UEFI Unified Extensible Firmware Interface

176 LLC Logical Link Control

177 DOC Document (Microsoft Corporation)

178 ARPANET Advanced Research Projects Agency Network

179 ACL Access Control List

180 RAIT Redundant Array of Inexpensive Tapes

181 MMX Multi-Media Extensions

182 STP Spanning Tree Protocol

183 MLI Multiple Link Interface

184 RIP Routing Information Protocol

185 AIFF Audio Interchange File Format

186 RMA Returned Materials Authorization

187 EGP Exterior Gateway Protocol

188 XMF Extensible Music File

189 MTBF Mean Time Between Failure

190 MIME Multipurpose Internet Mail Extensions

191 SRAM Static Random-Access Memory

192 SDR Software-Defined Radio

193 PAP Password Authentication Protocol

194 VRAM Video Random Access Memory

195 WAP Wireless Application Protocol

196 TGT Ticket Granting Ticket

197 GIF Graphics Interchange Format

198 TPM Trusted Platform Module

199 SPSS Statistical Package for the Social Sciences

200 ULSI Ultra Large-Scale Integration

FSSAI: FCI: Computer Awareness Page 52


201 EIGRP Enhanced Interior Gateway Routing Protocol

202 CDN Content Delivery Network

203 NMI Non-Maskable Interrupt

204 PPI Pixels Per Inch

205 RJ45 Registered Jack 45

206 SEC Single Edge Connector

207 BER Bit Error Rate

208 OOPS Object-Oriented Programming System

209 ATA Advanced Technology Attachment

210 RISC Reduced Instruction Set Computer

211 NFS Network File System

212 SFC System File Checker

213 ICR Intelligent Character Recognition

214 BTX Balanced Technology Extended

215 DOS Disk Operating System

216 CTS Clear to Send

217 AMD Advanced Micro Devices

218 DVD Digital Video Disc

219 CD-R Compact Disk – Recordable.

220 BAL Basic Assembly Language

221 UTF Unicode Transformation Format

222 MIDI Musical Instrument Digital Interface

223 BAT Microsoft Batch Processing

224 VT Video Terminal

225 HP Hewlett Packard

226 URN Uniform Resource Name

227 D2D Device to Device

228 DSHD Double Sided High Density

229 FDC Floppy Disk Controller

230 SDN Service Delivery Network

FSSAI: FCI: Computer Awareness Page 53


231 SBU Standard Build Unit

232 MPL Mozilla Public License

233 ENIAC Electronic Numerical Integrator and Computer

234 CAQA Computer–Aided Quality Assurance

235 ASF Advanced Systems Format

236 VM Virtual Machine

237 Mac Macintosh

238 OS Operating System

239 MNG Multiple-image Network Graphics

240 CD-ROM Compact Disk-Read Only Memory

241 MSB Most Significant Byte

242 TCP/IP Transmission Control Protocol/Internet Protocol

243 DMI Desktop Management Interface

244 NTP Network Time Protocol

245 PINE Program for Internet News and Email

246 SSL Secure Sockets Layer

247 BCR Bar Code Reader

248 SPI Serial Peripheral Interface

249 KBPS Kilobits Per Second

250 TSI Time Slot Interchange

251 ABC Atanasoff-Berry Computer

252 YB Yotta Byte

253 ZB Zetta-bytes

254 WDDM Windows Display Driver Model

255 ZIF Zero-Insertion-Force

256 RDBMS Relation Database Management System

257 MSI Microsoft Installer

258 ISP Internet Service Provider

259 WAV Waveform Audio

260 TPS Transaction Per Second

FSSAI: FCI: Computer Awareness Page 54


261 ISV Independent Software Vendor

262 SXGA Super Extended Graphics Array

263 GP Graphics port

264 BGA Ball Grid Array

265 SIS Safety Instrumented System

266 CGI Common Gateway Interface

267 PDF Portable Document Format

268 MMU Memory Management Unit

269 PIC Peripheral Interface Controller

270 NIU Network Interface Unit

271 TPS Transaction Processing System

272 VLSI Very Large-Scale Integration

273 ESD Electro Static Discharge

274 MAPI Messaging Application Program Interface

275 KB Kilo-bytes

276 DSL Domain–Specific Language

277 PB Peta-bytes

278 NAP Network Access Point

279 MS-DOS Microsoft Disk Operating System

280 WMV Windows Media Video

281 MFA Multi-Factor Authentication

282 GUI Graphical User Interface

283 RIS Remote Installation Service

284 ASCII American Standard Code for Information Interchange

285 ELF Executable and Linkable Format

286 WWAN Wireless Wide Area Network

287 DFD Data Flow Diagram

288 IRC Internet Relay Chat

289 PC Personal Computer

290 SDL Software and Documentation Localization

FSSAI: FCI: Computer Awareness Page 55


291 WINS Windows Internet Name Service

292 NOS Network Operating System

293 UNICS UNiplexed Information Computing System

294 DVR Digital Video Recorder

295 XMS Extended Memory Specification

296 LSI Large-Scale Integration

297 STP Shielded Twisted Pair

298 PCB Process Control Block

299 AGA Advanced Graphics Architecture

300 HSUPA High-Speed Uplink Packet Access

301 ICS Internet Connection Sharing

302 SOA Service Oriented Architecture

303 WWW World Wide Web

304 DLL Dynamic Link Library

305 DAP Direct Access Protocol

306 WMF Windows Metafile

307 EVDO Evolution Data Optimized Or Evolution Data Only

308 FAT File Allocation Table

309 DTE Data Terminal Equipment

310 PAL Phase Alternation Line

311 VGA Video Graphics Array

312 HSSI High-Speed Serial Interface

313 SIMM Single In-Line Memory Module

314 IPX Internetwork Packet Exchange

315 BWF Broadcast Wave Format

316 CRIMM Continuity-Rambus Inline Memory Module

317 OOP Object Oriented programming

318 RTOS Real Time Operating System

319 DBSN Database Source Name

320 IHV Independent Hardware Vendor

FSSAI: FCI: Computer Awareness Page 56


321 ISR Interrupt Service Routine

322 SOAP Simple Object Access Protocol

323 FTP File Transfer Protocol

324 DRAM Dynamic Random-Access Memory

325 BSOD Blue Screen of Death

326 HTX Hyper Transport Expansion

327 LSTM Long Short-Term Memory

328 DIVX DIgital Video Express

329 UAC User Account Control

330 CASE Computer-Aided Software Engineering

331 HDMI High Definition Multimedia Interface

332 VDC Video Display Controller

333 AVC Advanced Video Coding

334 CGA Color Graphics Array

335 DPMS Display Power Management Signaling

336 DBA DataBase Administrator

337 P2P Peer-To-Peer

338 MSI Medium Scale Integration

339 EPP Enhanced Parallel Port

340 EFS Encrypting File System

341 MHz Megahertz

342 WPAN Wireless Personal Area Network

343 CAN Controller Area Network

344 VDU Video Display Unit

345 JPG Joint Photographic Expert Group

346 MB Mega-bytes

347 ENI Elastic Network Interface

348 VPU Visual Processing Unit

349 MTP Media Transfer Protocol

350 MDI Multiple Document Interface

FSSAI: FCI: Computer Awareness Page 57


351 TDR Time Domain Reflectometer

352 WUXGA Wide Ultra Extended Graphics Array

353 NAP Network Access Protection

354 DWM Desktop Window Manager

355 ERP Enterprise Resource Planning

356 PPT PowerPoint Presentation

357 LSB Least Significant Byte

358 CCD Charged Coupled Device

359 VCR Video Cassette Recorder

360 EEPROM Electrically Erasable Programmable Read-Only Memory

361 CRC Cyclic Redundancy Check

362 XGA Extended Graphics Array

363 LSB Least Significant Bit

364 ZISC Zero Instruction Set Computer

365 ISA Instruction Set Architecture

366 HPC High-Performance Computing

367 MSDN Microsoft Developer Network

368 BPI Bytes Per Inch

369 SVGA Super Video Graphics Array

370 RDF Resource Description Framework

371 MFP Multi-Function Product

372 FCPGA Flip Chip Pin Grid Array

373 ASR Automated System Recovery

374 VAN Value-Added Network

375 PIO Programmed Input/Output

376 RGB Red, Green, Blue

377 FDMA Frequency-Division Multiple Access

378 SWF Shock Wave Flash

379 EOF End of File

380 POP Post Office Protocol

FSSAI: FCI: Computer Awareness Page 58


381 CBEMA Computer Business Equipment Manufacturers Association

382 GB Giga-bytes

383 EDP Electronic Data Processing

384 DIMM Dual In-Line Memory Module

385 VM Virtual Memory

386 SHDSL Single-pair High-speed Digital Subscriber Line

387 WEP Wired Equivalent Privacy

388 MBCS Multi Byte Character Set

389 IPV4 Internet Protocol Version 4

390 MCR Multivariant Curve Resolution

391 MTA Mail Transfer Agent

392 BOSS Bharat Operating System Solutions

393 ISC Internet Storm Center

394 POST Power on self-test

395 DTR Data Terminal Ready

396 SMBIOS System Management BIOS

397 HPFS High Performance File System

398 SNMP Simple Network Management Protocol

399 IIS Internet Information Services

400 VPG Virtual Private Gateway

401 CUA Common User Access

402 NID Network Interface Device

403 HDD Hard Disk Drive

404 IMAP Internet Message Access Protocol

405 VLC Video LAN Client

406 ERD Emergency Repair Disk

407 WPA Wireless Protected Access

408 IOS Internetwork Operating System

409 PKI Public key Infrastructure

410 UDP User Datagram Protocol

FSSAI: FCI: Computer Awareness Page 59


411 ISA Industry Standard Architecture

412 TPDU Transaction Protocol Data Unit

413 M3G Mobile 3D Graphics

414 DTP Desktop Publishing

415 PCI Peripheral Component Interconnect

416 CAE Computer–Aided Engineering

417 NTFS New Technology File System

418 FDD Floppy Disk Drive

419 IPP Internet Printing Protocol

420 VLAN Virtual Local Area Network

421 PSU Power Supply Unit

422 CTL Computation Tree Logic

423 DAT Digital Audio Tape

424 BiDi Bi–Directional

425 SVG Scalable Vector Graphics

426 ECP Extended Capabilities Port

427 TB Tera-bytes

428 CMOS Complementary Metal–Oxide–Semiconductor

429 OCR Optical Character Reader

430 JPEG Joint Photographic Experts Group

431 SONET Synchronous Optical Networking

432 CCS Common Command Set

433 CUPS Common Unix Printing System

434 ENIAC Electronic Numerical Integrator and Compute

435 IVR Interactive Voice Response

436 HTPC Home Theatre Personal Computer

437 HD High Definition

438 EVC Ethernet Virtual Circuit

439 NMS Network Management System

440 UTP Unshielded Twisted Pair-Cable

FSSAI: FCI: Computer Awareness Page 60


441 FDDI Fiber Distributed Data Interface

442 HAN Home Area Network

443 XMPP Extensible Messaging and Presence Protocol

444 ISCSI Internet Small Computer Storage Interface

445 PDP Plasma Display Panel

FSSAI: FCI: Computer Awareness Page 61


CHAPTER 08
SOCIAL MEDIA
What is Social media ?

“Websites and applications that enable users to create and share content or to
participate in social networking”.
Social media is a collective term for websites and applications that focus on communication,
community-based input, interaction, content-sharing and collaboration. People use social
media to stay in touch and interact with friends, family and various communities. Businesses
use social applications to market and promote their products and track customer concerns.

FSSAI: FCI: Computer Awareness Page 62


HISTORY OF SOCIAL MEDIA

Twitter, Facebook, and Instagram are just a few of the most famous social media platforms
that exist this century, with Facebook leading the list. Billions of people have been using
social media since it boomed. As long as there are cell phones, tablets, computers and an
internet connection, people can easily connect with other people from anywhere through
social media. Some may even have multiple accounts registered on one social media
platform.
But have you ever wondered how it all started? Who the founder was? How it has evolved?
Let’s take a quick trip down memory lane.

• 20th Century and the Precursors of Social media


Tom Truscott and Jim Ellis first mentioned Usenet in 1979. Usenet allowed posting
news post or articles to newsgroups. Usenet systems were the one responsible for
the evolution of newsreader clients. They are also the precursor of RSS feed
readers.

• Bulletin Board Systems (BBS)


Bulletin board systems are one of the first forms of the social media in the late
1970’s. They are hosted on personal computers and are accessible to one person
at a time. BBS was the first kind of website that allows users to log on and connect
with each other. It remained famous until the end of 1990’s.

• Instant Messaging Time


Internet Relay Chat (IRC) was first introduced in 1988 and is used for link and file
sharing as well as keeping in touch. It came from BBS roots. It was also the real

FSSAI: FCI: Computer Awareness Page 63


predecessor of modern instant messaging. ICQ, on the other hand, was known as
the first program for instant messaging for PCs.

• Early social media


Sixdegrees is the first of social media platforms launched in 1997. It had about a
million members when it peaked. Unfortunately, SixDegrees was shutdown in the
year 2001.
From 1997 to 2001, other sites followed like Asianavanue, Migente and
Blackplanet. Users could create profiles, either personal or professional, and also
add friends.

• Social Media Advances in 2000s


In terms of modern social media, Friendster was the very first proper social
network. It was founded in 2002 and has over hundred million registered users,
mostly from Asia. Through Friendster, users can discover friends and expand their
growing networks. Its idea was to safely meet more new people than in the real
world. However, they took a break in 2015 to further improve their services.
LinkedIn, founded in 2003, first used mainstream networks for business. It allows
posting and interacting through private messaging. LinkedIn has now added new
options like groups; new profile features, forums, video, an ads platform etc.for
easier use and greater scale. Another social media network published in 2003 was
Hi5. It has over a million active users as of now. Users have an option to decide if
they prefer to be seen within their network or by other users in general. It is mostly
popular in Central Africa, Asia and Latin America.

• The Beginning of Facebook


Facebook started its history when it was first launched in Harvard in 2004. It quickly
spread to other schools and by 2008; it had become the most famous social media
platform and it still continues to grow rapidly. It allows its users to post content
and personalize their profiles. Over the years, it has added many fresh features that
made it even more popular. People could also use private messaging as well as add
various posts to their walls. It is even easier for them to change the settings of their
account based on their own discretion. The ads platform has now made it available
for marketer to reach their audiences like never before.

• MySpace
MySpace played a very important role in social media life since its launch in 2004.
By 2006, it had grown to become the most famous social media platform in the
world. With MySpace, users could customize their profiles completely, embed
videos and post music. It also has MySpace IM allowing people to chat with each
other.

FSSAI: FCI: Computer Awareness Page 64


• Youtube
Youtube launched its website in 2005 and is the one first major sharing sites and
video hosting platforms. Users can upload videos and even embed them to other
sites or blogs.

• Twitter came in 2006.


It was originally designed as mobile SMS-platform. It has upgraded since then and
now has over 300 million active users monthly.

• 2010 saw Instagram launch into the public domain


Instagram uses visual communication and social interaction to connect people
around the world. It allows users to upload and share photos and video stories. It
has many filters that could transform a boring picture into an Instagram-worthy
masterpiece.
Many of us will have started out in business before any of these platforms really
took off. How have you embraced the rapidly evolving landscape of the social
media world? Or maybe it’s all to much to take on, on top of the day to day running
of your business. If that’s the case, have you ever looked at social media
management? We can help your company enter the social media world to reach
out to clients otherwise missed through traditional marketing methods. If you’d
like to know more please read more here

Facebook is the largest social media platform in the world, with a clear advantage over
other social media, though it has similar audiences to others like Twitter and Instagram.
The figures for the most popular social media websites as of 2021 are as follows:

1. Facebook (2.85 billion users)


2. YouTube (2.29 billion users)
3. WhatsApp (2 billion users)
4. Facebook Messenger (1.3 billion users)
5. Instagram (1.22 billion users)
6. Whatsapp (1.21 billion users)
7. TikTok (689 million users)
8. QQ (617 million users)
9. Douyin (600 million users)
10. Sino Weibo (511 million users)

Facebook, YouTube, and WhatsApp are the world's largest social media
networks.

FSSAI: FCI: Computer Awareness Page 65


SOCIAL MEDIA WEBSITES FOUNDERS
No. Website Founder Launch

1 Badoo Andrey Andreev 2006

2 Bumble Whitney Wolfe Herd 2014

3 Buzznet 1) Marc Brown 2005


2) Anthony Batt
3) Kevin Woolery
4) Steve Haldane

4 Classmates Randy Conrads 1995

5 Facebook 1) Mark Zuckerberg 2004


2) Andrew McCollum
3) Eduardo Saverin
4) Dustin Moskovitz
5) Chris Hughes

6 Flickr 1) Stewart Butterfield 2004


2) Caterina Fake

7 Friendica Mike Macgirvin 2010

8 Friendster Jonathan Abrams 2002

9 Happn Didier Rappaport 2014

10 HotorNot James Hong 2000

11 Hi5 Ramu Yalamanchi 2004

12 Instagram 1) Mike Krieger 2010


2) Kevin Systrom

13 Kik Ted Livingston 2010

14 Kuaishou 1) Su Hua 2011


2) Cheng Yixiao

15 Likee Jason Hu 2017

FSSAI: FCI: Computer Awareness Page 66


16 LINE Hae Jin Lee 2011

17 LinkedIn 1) Reid Hoffman 2003


2) Konstantin Guericke
3) Jean-Luc Vaillant
4) Allen Blue
5) Eric Ly

18 LiveJournal Brad Fitzpatrick 1999

19 Lovoo Florian Braunschweig 2011

20 MocoSpace Justin Siegel 2005

21 Musical.ly 1) Alex Zhu 2014


2) Luyu Yang

22 Myspace 1) Tom Anderson 2003


2) Chris DeWolfe
3) Jon Hart

23 Ning 1) Marc Andreessen 2004


2) Gina Bianchini

24 OkCupid 1) Chris Coyne 2004


2) Christian Rudder
3) Sam Yagan
4) Max Krohn

25 Pinterest Ben Silbermann 2010

26 Quora 1) Adam D’Angelo 2010


2) Charlie Cheever

27 Reddit 1) Steve Huffman 2005


2) Alexis Ohanian
3) Aaron Swartz

28 Signal 1) Brian Acton 2018


2) Moxie Marlinspike

29 Skout 1) Christian Wiklund 2009


2) Niklas Lindstrom

FSSAI: FCI: Computer Awareness Page 67


30 Skype 1) Niklas Zennström 2003
2) Janus Friis

31 StumbleUpon 1) Garrett Camp 2001


2) Justin LaFrance
3) Geoff Smith

32 Snapchat 1) Evan Spiegel 2011


2) Bobby Murphy
3) Reggie Brown

33 Tagged 1) Greg Tseng 2004


2) Johann Schleier-Smith

34 Telegram 1) Pavel Durov 2013


2) Nikolai

35 TikTok ByteDance 2016

36 Tinder 1) Sean Rad 2012


2) Whitney Wolfe Herd
3) Arun Gopan
4) Jonathan Badeen
5) Justin Mateen
6) Joe Munoz
7) Dinesh Moorjani

37 Tumblr David Karp 2007

38 Twitter 1) Jack Dorsey 2006


2) Evan Williams
3) Noah Glass
4) Biz Stone

39 Twoo 1) Toon Coppens 2011


2) Lorenz Bogaert

40 Viber 1) Talmon Marco 2010


2) Igor Magazinnik

41 VK 1) Pavel Durov 2006


2) Nikolai Durov

FSSAI: FCI: Computer Awareness Page 68


3) Yitzchak Mirilashvili
4) Lev Binzumovich Leviev

42 WeChat Allen Zhang 2011

43 WhatsApp 1) Brian Acton 2009


2) Jan Koum

44 YouTube 1) Jawed Karim 2005


2) Steve Chen
3) Chad Hurley

45 Zoom Eric Yuan 2011

46 Zoosk 1) Alex Mehr 2007


2) Shayan Zadeh

FSSAI: FCI: Computer Awareness Page 69


Connect with Us

Website: www.swaeducation.com

Instagram : swaeducation_official

Telegram : Swa Education

Facebook: Swa Education

FSSAI: FCI: Computer Awareness Page 70


STATE & CENTRAL FOOD SAFETY OFFICER

Our eBOOK For Competitive Exam

ODISHA- FSO FSSAI - CFSO

FSSAI: FCI: Computer Awareness Page 71

You might also like