O Level Module 1 M1 R5 Information Technology & Tools and Network
O Level Module 1 M1 R5 Information Technology & Tools and Network
O'level
Module-1[M1-R5]
Information Technology Tools
&
Network Basics
Study Material
&
Objective Question Bank
Chief Editor
A. K. Mahajan
Compiled and Edited by
Mahima Tripathi
Computer Graphics by
Balkrishna, Charan Singh, Anurag Pandey
Editorial Office
12, Church Lane Prayagraj-211002
Mob. : 9415650134
Email : [email protected]
website : www.yctbooks.com / www.yctfastbook.com
© All rights reserved with Publisher
Publisher Declaration :
Edited and Published by A.K. Mahajan for YCT Publications Pvt. Ltd. and printed by Roop
Printing Press, Prayagraj. In order to Publish the book,
full care has been taken by the Editor and the Publisher,
still your suggestions and queries are welcomed. Rs. : 395/-
In the event of any dispute, the judicial area will be Prayagraj.
Search on TG: @apna_pdf
CONTENTS
M1R5
Information Technology Tools & Network Basics
1. INTRODUCTION OF COMPUTER 2.7 Icons & Shortcuts --------------------------------------------41
1.0 Introduction ---------------------------------------------------- 7 2.8 Running an application window -------------------------43
1.1 Types of Computer ------------------------------------------- 7 2.9 Operating System Simple Setting------------------------45
(i) Characteristics of Computer --------------------------- 8 (i) Using Mouse and changing its Properties ---------45
(ii) Basic Applications of Computer --------------------- 8 (ii) Changing System Date and Time -------------------47
(iii) Latest IT Gadgets --------------------------------------- 9 (iii) Changing Display Properties of System ---------48
1.2 Evolution of Computers & its Applications ----------- 9 2.10 To Add or Remove Program and Features -----------49
(i) Generation of Computer ------------------------------ 10 2.11 Adding, Removing to Sharing Printers ----------------50
1.3 IT Gadgets and their Applications --------------------- 11 2.12 File and Folder Management -----------------------------51
1.4 Basics of Hardware and Software ---------------------- 11 2.13 Types of File Extension -----------------------------------55
(i) Software --------------------------------------------------- 12 2.14 File Struture---------------------------------------------------55
1.5 Central Processing Unit (CPU) ------------------------- 12 2.15 File Handling in Linux -------------------------------------55
(i) Types of Processing ------------------------------------ 12 2.16 Other Important Points ------------------------------------57
(ii) Processor Speed ---------------------------------------- 13 (i) Open Office Software ----------------------------------57
(iii) Cache Memory ----------------------------------------- 13 (ii) GNU Project ---------------------------------------------57
(iv) Levels of Cache Memory --------------------------- 13 (iii) Difference Between Open Source Software and
(v) Importance of Cache Memory ---------------------- 14 Proprietary -----------------------------------------------58
1.6 Input Devices ------------------------------------------------ 14 (iv) Introduction of Ubuntu Operating System ------58
1.7 Output Devices --------------------------------------------- 17 (v) Method to Download Ubuntu ------------------------58
1.8 Computer Memory and Storage ------------------------ 19 Practice Questions with Explanatory Solutions ---58-61
(i) Booting ---------------------------------------------------- 22 3. WORD PROCESSING
(ii) Computer System -------------------------------------- 23 3.0 Introduction----------------------------------------------------62
(iii) Number System ---------------------------------------- 24
3.1 Word Processing Basic -------------------------------------62
(iv) Coding Scheme ---------------------------------------- 27
(i) Introduction of Libre office Writer -----------------62
(v) EBCDIC Code ------------------------------------------ 29
(vi) UNICODE ---------------------------------------------- 29 (ii) Objective -------------------------------------------------62
1.9 Application Software --------------------------------------- 29 (iii) Comparision of Libre office and Microsoft
1.10 System Software -------------------------------------------- 29 office -------------------------------------------------------62
1.11 Utility Softwre ---------------------------------------------- 30 3.2 Opening Word Processing Package ---------------------62
(i) Utility Program ------------------------------------------ 30 3.3 Menu/Ribbon and Tabs-------------------------------------63
1.12 Open Source and Proprietary Software -------------- 31 (i) Libre Office Document Window --------------------63
1.13 Mobile Apps ------------------------------------------------ 31 (ii) Side Bar ---------------------------------------------------63
Practice Questions with Explanatory Solutions--- 33-35 (iii) Style and Formatting ----------------------------------63
2. INTRODUCTION OF OPERATING (iv) Toolbar ----------------------------------------------------63
SYSTEM (v) Status bar -------------------------------------------------64
2.0 Introduction --------------------------------------------------- 36 3.4 Creating a New Document --------------------------------64
2.1 Operating System ------------------------------------------- 36 (i) Creating Document Using Blank Templates -----64
2.2 Basics of Operating System ------------------------------ 36 3.5 Opening and Closing Documents ------------------------65
2.3 Operating Systems for Desktop and Laptop --------- 36 (i) Save and Save as ----------------------------------------65
(i) DOS (Disk Operating System) ---------------------- 36 (ii) Save a Document Automatically -------------------65
(ii) Windows Operting System -------------------------- 37 (iii) Closing Document -------------------------------------66
(iii) Linux Operating System ---------------------------- 37 3.6 Using the Help ------------------------------------------------66
A. Basic Elements of Linux --------------------------- 37
3.7 Page Setup -----------------------------------------------------66
B. Feature of Linux Operating System-------------- 38
(i) Page Orientation ----------------------------------------66
C. Key Differences between Windows and Linux
Operating System------------------------------------- 38 (ii) Paper Margin and Size --------------------------------67
(iv) Mac Operating System ------------------------------- 38 (iii) Page Layout Borders, Watermark -----------------67
2.4 Operating Systems for Mobile Phone and Tablets - 38 A. Page Layout----------------------------------------------67
2.5 User Interface for Desktop and Laptop ---------------- 39 B. Border -----------------------------------------------------67
2.6 Taskbar--------------------------------------------------------- 41 C. Water Mark ----------------------------------------------68
2
Search on TG: @apna_pdf
3.8 Print Preview, Printing of Documents ----------------- 68 4.18 Formulas, Functions and Charts -------------------------97
(i) Print Preview --------------------------------------------- 68 (i) Use of Formulas------------------------------------------97
(ii) Printing of Documents ------------------------------- 68 (ii) Autosum Feature ----------------------------------------97
3.9 PDF File and Saving a Document as a PDF File --- 69 (iii) Functions -------------------------------------------------97
3.10 Text Creation and Manipulation ------------------------ 69 4.19 Difference Between function and formula in Calc 101
(i) Document Creation ------------------------------------- 69 4.20 Database Function ---------------------------------------- 101
(ii) Editing Text --------------------------------------------- 70 (i) DAVERAGE ----------------------------------------------- 102
(iii) Text Selection ------------------------------------------ 70 (ii) DSUM ----------------------------------------------------- 102
(iv) Cut, Copy and Paste ---------------------------------- 71 (iii) DCOUNT ------------------------------------------------- 102
(v) Font Color, Style and Size Selection ------------- 72 (v) DMAX ----------------------------------------------------- 102
(vi) DMIN ----------------------------------------------------- 102
(vi) Bold, Italic and Underline -------------------------- 72
4.21 Pivot Table Chart ----------------------------------------- 102
(vii) Changing Color --------------------------------------- 72
Practice Questions with Explanatory Solutions 106-107
(viii) Alignment of Text ---------------------------------- 73
(ix) Undo and Redo ---------------------------------------- 73 5. PRESENTATION
3.11 Auto Correct & Spell Checking------------------------ 74 5.0 Introduction-------------------------------------------------- 108
3.12 Using Find and Replace ---------------------------------- 75 5.1 Basic Feature of Libre Office Impress --------------- 108
3.13 Formatting the Text --------------------------------------- 75 5.2 Creation of Presentation ---------------------------------- 109
(i) Paragraph Indenting ------------------------------------ 75 (i) Creating a Presentation Using an Installed
(ii) Bullet and Numbering -------------------------------- 76 Template ----------------------------------------------------- 109
(iii) Using Change Case Command -------------------- 77 (ii) Creating Blank Presentation ----------------------- 109
3.14 Header & Footer ------------------------------------------- 77 (iii) Entering and Editing Text ------------------------- 109
3.15 Table Manipulation --------------------------------------- 78 (iv) Inserting and Deleting Slides in a Presentation110
(i) Insert and Draw Table --------------------------------- 78 (v) Saving the presentation ------------------------------ 111
(ii) Changing Cell width and Height ------------------- 79 5.3 Manipulating Slides --------------------------------------- 111
(iii) Deletion/Insertion of Row & Column ----------- 79 (i) Inserting table------------------------------------------- 111
3.16 Borders and Shading -------------------------------------- 79 (ii) Adding Clipart Pictures ----------------------------- 113
3.17 Mail Merge -------------------------------------------------- 80 (iii) Inserting other objects ------------------------------ 113
3.18 Table of Contents ------------------------------------------ 80 (iv) Resizing and scaling on object-------------------- 113
(i) Creating a Table of Contents ------------------------ 80 (v) Creating and Using Master Slide ----------------- 114
(ii) Editing a table of Content --------------------------- 81 5.4 Presentation of Slides ------------------------------------- 114
(iii) Updating and deleting the table of Contents --- 81 (i) Viewing a Presentation ------------------------------- 114
3.19 Adding Comments ---------------------------------------- 81 (ii) Choosing a setup for presentation ---------------- 115
3.20 Tracking Changes ----------------------------------------- 81 (iii) Adding Headers and Footers ---------------------- 115
3.21 Macro --------------------------------------------------------- 81 (iv) Printing Slides and Handouts --------------------- 115
3.22 Key Board Shortcuts -------------------------------------- 82 5.5 Slide Show -------------------------------------------------- 116
Practice Questions with Explanatory Solutions--- 83-84 (i) Running a Slide Show -------------------------------- 116
(ii) Transitions and Slide Timings --------------------- 116
4. SPREADSHEET (iii) Automating a Slide Show -------------------------- 117
4.1 Introduction --------------------------------------------------- 85
5.6 Providing Aesthetics -------------------------------------- 117
(i) Elements of Spreadsheet ------------------------------ 85
(ii) Opening of Spreadsheet ------------------------------ 85 (i) Enhancing Text Presentation ----------------------- 117
(iii) LibreOffice Calc Interface -------------------------- 85 (ii) To Change Shape fill Color ------------------------ 119
4.2 Creation of Spreadsheets ---------------------------------- 86 (iii) Adding Movie or Video & Sound --------------- 119
4.3 Concept of Cell Address [Row and Column] and Practice Questions with Explanatory Solutions 120-122
Selecting a Cell --------------------------------------------- 86 6. INTRODUCTION OF INTERNET
4.4 To Enter Text, Numbers and Data in a Worksheet - 87 & WWW
4.5 Page Setup ---------------------------------------------------- 89 6.0 Introduction ------------------------------------------------ 123
4.6 Printing a Worksheet --------------------------------------- 89 6.1 Basics of Computer Network --------------------------- 123
4.7 Saving a Workbook----------------------------------------- 90 (i) Transmission Media ---------------------------------- 124
4.8 Opening a Workbook -------------------------------------- 90 (ii) Local Area Network (LANs) ---------------------- 125
4.9 Manipulation of Cells & Worksheet ------------------- 90 (iii) Metropolitan Area Networks (MANs) --------- 126
4.10 Modifying Editing Cell Contents----------------------- 90 (iv) Wide Area Networks (WANs) -------------------- 126
4.11 Formatting Cells -------------------------------------------- 91 6.2 Network Topology----------------------------------------- 128
4.12 Cut, Copy, Paste & Paste Special ---------------------- 92 (i) Bus Topology ------------------------------------------- 128
4.13 Inserting and Deleting Rows and Columns ---------- 93 (ii) Star Topology ------------------------------------------ 128
4.14 Changing Cell Height and Width ---------------------- 94 (iii) Mesh Topology --------------------------------------- 129
4.15 Auto fill ------------------------------------------------------- 95 (iv) Ring Topology ---------------------------------------- 129
4.16 Sorting & Filtering ----------------------------------------- 96 (v) Tree Topology ----------------------------------------- 129
4.17 Freezing Pane------------------------------------------------ 96 6.3 Protocol ------------------------------------------------------- 130
3
Search on TG: @apna_pdf
6.4 Internet -------------------------------------------------------- 1318.3 Unified Payment Interface ------------------------------- 170
(i) Concept of Internet & WWW ---------------------- 131 (i) How to receive Payment Using UPI? ------------ 171
(ii) Website Address and URL ------------------------- 131 (ii) Benifits of UPI ----------------------------------------- 171
(iii) Application of Internet ------------------------------ 133 8.4 Aadhaar Enabled Payment System -------------------- 171
(i) Features of Aadhar Enabled Payment System - 171
(iv) Difference between Internet and www --------- 133
(ii) Benifits of AePS -------------------------------------- 171
(v) Difference between Internet and Intranet ------- 133
(iii) How to Use AePS? ---------------------------------- 172
6.5 ISP and Role of ISP --------------------------------------- 133 8.5 Unstructured Supplementary Service Data ---------- 172
(i) Introduction to IP Address -------------------------- 134 (i) How to send money using USSD *99#, Using
(ii) Modes of Connecting Internet --------------------- 134 IFSC Code & Bank Account Number? ---------- 172
6.6 Identifying IP/MAC/IMEI of Various Devices and 8.6 Card (Credit/Debit) ---------------------------------------- 172
their Users --------------------------------------------------- 138 (i) Credit Card ---------------------------------------------- 172
6.7 Popular Web Browsers ----------------------------------- 140 (ii) Debit Card ---------------------------------------------- 173
6.8 Exploring the Internet ------------------------------------- 141 (iii) Difference between Credit and Debit Card --- 173
(i) Surfing the Web ---------------------------------------- 141 8.7 E-Wallet ------------------------------------------------------ 173
(i) Benifits of E-Wallet ----------------------------------- 173
(ii) Popular Search Engines ----------------------------- 142
(ii) Various E-Wallet Payment Gateway ------------ 174
(iii) Searching on Internet-------------------------------- 143
8.8 Point of Sale [POS] ---------------------------------------- 174
(iv) Downloading Web Pages--------------------------- 143 8.9 Internet Banking-------------------------------------------- 175
(v) Save Complete Web-Pages as PDF -------------- 143 (i) Advantages and Disadvantages of Internet
(vi) Printing Web Pages ---------------------------------- 144 Banking -------------------------------------- 175 _
Practice Questions with Explanatory Solutions 144-147 8.10 National Electronic Fund Transfer 'NEFT', Real
Time Gross Settlement 'RTGS' ------------------------ 176
.
7 E-MAIL, SOCIAL NETWORKING (i) What is IFSC -------------------------------------------- 176
AND E-GOVERNANCE SERVICES 8.11 Real Time Gross Settlement (RTGS) ---------------- 177
7.0 Introduction -------------------------------------------------- 148 8.12 Immediate Payment Service --------------------------- 177
7.1 Structure of E-mail----------------------------------------- 148 8.13 Online Payment ------------------------------------------- 177
7.2 Using E-Mail ------------------------------------------------ 149 Practice Questions with Explanatory Solutions 178-181
(i) Opening an E-mail Account ------------------------ 149 9. OVERVIEW OF FUTURSKILLS AND
7.4 Mailbox:Inbox and Outbox ------------------------------ 152 CYBER SECURITY
7.5 Creating and Sending a New E-mail ------------------ 152 9.0 Introduction to Futureskils ------------------------------ 182
(i) Replying to an E-mail Message -------------------- 153 9.1 Industrial Revolution 4.0 -------------------------------- 182
(ii) Forwarding an E-mail Message ------------------- 153 9.2 Introduction to Internet of Things [IOT]------------- 183
(i) Advantages and Disadvantages of IOT --------- 183
(iii) Turn automatic forwarding on or off ------------ 153
9.3 Big Data Analytics----------------------------------------- 184
7.6 Sorting and Searching of E-mail ----------------------- 153
(i) Characteristics of Big Data-------------------------- 184
7.7 Attaching Files with E-mail ----------------------------- 154 (ii) Applications of Big Data --------------------------- 184
7.8 E-mail Signature-------------------------------------------- 155 9.4 Cloud Computing ------------------------------------------ 185
7.9 Social Networking ----------------------------------------- 155 (i) Basic Concept of Cloud Computing -------------- 185
(i) Examples of Social Network------------------------ 156 (ii) Service Model of Cloud Computing ------------- 185
(ii) Instant Messaging ------------------------------------- 158 (iii) Advantages of Cloud Computing ---------------- 185
7.10 Introduction to Blogs ------------------------------------- 161 (iv) Characteristics of Cloud Computing ------------ 185
7.11 Basics of E-Commerce ---------------------------------- 161
9.5 Virtual Reality ---------------------------------------------- 185
7.12 Netiquette ---------------------------------------------------- 161
(i) Applications of Virtual Reality -------------------- 186
7.13 Overview of E-Governance Services Like Railway
Reservation Passport and eHospital (ORS) -------- 161 9.6 Artificial Intelligence ------------------------------------- 186
7.14 Accessing E-governance Services on Mobile Using (i) Goal of AI ----------------------------------------------- 186
"UMANG App" -------------------------------------------- 163 (ii) Applications of AI ------------------------------------ 186
7.15 Digital Locker ---------------------------------------------- 164 9.7 Social & Mobile -------------------------------------------- 187
Practice Questions with Explanatory Solutions 165-168 9.8 Block Chain Technology--------------------------------- 187
8. DIGITAL FINANCIAL TOOLS AND 9.9 3D Printing Additive Manufacturing ----------------- 187
APPLICATIONS 9.10 Robotics Process Automation -------------------------- 187
8.0 Introduction -------------------------------------------------- 169 (i) Applications of RPA ---------------------------------- 188
8.1 Digital Financial Tools ----------------------------------- 169 9.11 Cyber Security --------------------------------------------- 188
(i) Key Component of Digital Financial Services - 169 (i) Need for Cyber Security ----------------------------- 188
8.2 Understanding OTP and QR ---------------------------- 169 (ii) Securing your PC ------------------------------------- 188
(i) One Time Password ---------------------------------- 169 (iii) Securing your Smartphone ------------------------ 189
(ii) Quick Resoponse Code [QR] ----------------------- 170 Practice Questions with Explanatory Solutions 189-192
4
Search on TG: @apna_pdf
M1-R5
NIELIT Syllabus 'O' Level, Information Technology
Tools and Basics of Network (Revision V)
Outline of Course
1. Introduction to Computer, Introduction to Operating System 10
2. Word Processing 20
3. Spreadsheet 20
4. Presentation 20
5. Introduction to Internet and WWW, E-mail, Social Network and e- 20
Governance Services
6. Digital Financial Tools and Applications, Overview of Future Skills & Cyber 10
Security
7. Total 100
Detailed Syllabus
(i) Introduction of Computer
Computer and Latest IT gadgets, Evolution of Computers & its applications, IT gadgets
and their applications, Basics of Hardware and Software, Central Processing Unit, Input
devices, Output devices, Computer Memory & storage, Application Software, System
Software, Utility Software, Open source and Proprietary Software, Mobile Apps.
(ii) Introduction to Operating System
Operating System, Basics of Operating system, Operating Systems for Desktop and
Laptop, Operating Systems for Mobile Phone and Tablets, User Interface for Desktop and
Laptop, Task Bar, Icons & shortcuts, Running an Application, Operating System Simple
Setting, Using Mouse and Changing its Properties, Changing System Date and Time,
Changing Display Properties, To Add or Remove Program and Features, Adding,
Removing & Sharing Printers, File and Folder Management, Types of file Extensions.
(iii) Word Processing
Word Processing Basics, Opening Word Processing Package, Title Bar, Menu Bar,
Toolbars & Sidebar, Creating a New Document, Opening and Closing Documents,
Opening Documents, Save and Save As, Closing Document, Using The Help, Page Setup,
Page Layout, Borders, Watermark, Print Preview, Printing of Documents, PDF file and
Saving a Document as PDF file, Text Creation and manipulation, Document Creation,
Editing Text, Text Selection, Cut, Copy and Paste, Font, Color, Style and Size Selection,
Alignment of Text, Undo & Redo, AutoCorrect, Spelling & Grammar, Find and Replace,
Formatting the Text, Creating and using user defined Styles, Paragraph Indentation,
Bullets and Numbering, Change case, Header & Footer, Table Manipulation, Insert &
Draw Table, Changing cell width and height, Alignment of Text in cell, Delete/Insertion
of Row, Column and Merging & Splitting of Cells, Border and Shading, Mail Merge,
Table of Contents, Indexes, Adding Comments, Tracking changes.
(iv) Spreadsheet
Elements of Spread Sheet, Creating of Spread Sheet, Concept of Cell Address [Row and
Column] and selecting a Cell, Entering Data [text, number, date] in Cells, Page Setup,
Printing of Sheet, Saving Spreadsheet, Opening and Closing, Manipulation of Cells &
Sheet, Modifying/Editing Cell Content, Formatting Cell (Font, Alignment, Style), Cut,
SYLLABUS 5 YCT
Search on TG: @apna_pdf
Copy, Paste & Paste Special, Changing Cell Height and Width, Inserting and Deleting
Rows, Column, AutoFill, Sorting & Filtering, Freezing panes, Formulas, Functions and
Charts, Using Formulas for Numbers (Addition, Subtraction, Multiplication & Division),
AutoSum, Functions (Sum, Count, MAX, MIN, AVERAGE), Sort, Filter, Advanced
Filter, Database Functions (DSUM, DMIN, DMAX, DCOUNT, DCOUNTA), What-if
Analysis, Pivot table Charts (Bar, Column, Pie, Line).
(v) Presentation
Creation of Presentation, Creating a Presentation Using a Template, Creating a Blank
Presentation, Inserting & Editing Text on Slides, Inserting and Deleting Slides in a
Presentation, Saving a Presentation, Manipulating Slides, Inserting, Table, Adding ClipArt
Pictures, Inserting Other Objects, Resizing and Scaling an Object, Creating & using
Master Slide, Presentation of Slides, Choosing a Set Up for Presentation, Running a Slide
Show, Providing Aesthetics to Slides & Printing, Enhancing Text Presentation, Working
with Color and Line Style, Adding Movie and Sound, Adding Headers, Footers and Notes,
Printing Slides and Handouts
(vi) Introduction to Internet and WWW
Basic of Computer Networks, Local Area Network (LAN), Wide Area Network (WAN),
Network Topology, Internet, Concept of Internet & WWW, Applications of Internet,
Website Address and URL, Introduction to IP Address, ISP and Role of ISP, Internet
Protocol, Modes of Connecting Internet (Hot Spot, Wifi, LAN Cable, Broad Band, USB
Tethering), Identifying and uses of IP/MAC/IMEI of various devices, Popular Web
Browsers (Internet Explorer/Edge, Chrome, Mozilla Firefox, Opera etc.), Exploring the
Internet, Surfing the web, Popular Search Engines, Searching on Internet, Downloading
Web Pages, Printing Web Pages
(vii) E-mail, Social Networking and e-Governance Services
Structure of E-mail, Using E-mails, Opening Email account, Mailbox: Inbox and Outbox,
Creating and Sending a new E-mail, Replying to an E-mail message, Forwarding an E-
mail message, Searching emails, Attaching files with email, Email Signature, Social
Networking & e-commerce, Facebook, Twitter, Linkedin, Instagram, Instant Messaging,
(Whatsapp, Facebook, Messenger, Telegram), Introduction to Blogs, Basics of E-
commerce, Netiquetters Overview of e-Governance Services like Railway Reservation,
passport, e-Hospital [ORS], Accessing e-Governance Services on Mobile Using
"UMANG APP", Digital Locker
(viii)Digital Financial Tools and Applications
Digital Financial Tools, Understanding OTP [One Time Password] and QR [Quick
Response] Code, UPI [Unified Payment Interface], AEPS [Aadhaar Enabled Payment
System], USSD [Unstructured Supplementary Service Data], Card [Credit/Debit], e-
Wallet, Pos [Point of Sale], Internet Banking, National Electronic Fund Transfer (NEFT),
Real Time Gross Settlement (RTGS), Immediate Payment Service (IMPS), Online Bill
Payment
(ix) Overview of Future skills and Cyber Security
Introduction to Internet of Things (IoT), Big Data Analytics, Cloud Computing, Virtual
Reality, Artificial Intelligence, Social & Mobile, Blockchain Technology, 3D Printing/
Additive Manufacturing, Robotics Process Automation, Cyber Security, Need of Cyber
Security, Securing PC, Securing Smart Phone.
SYLLABUS 6 YCT
Search on TG: @apna_pdf
1 INTRODUCTION TO COMPUTER
M1R5 8 YCT
Search on TG: @apna_pdf
In Banks–The application of computer in banks has
brought a revolution. Today, computers are being used
for most of the time-consuming tasks of banks like
online banking, withdrawing money from ATMs,
payment of cheques, counting money, passbook entry
etc. Different branches of banks are connected through
computer network, so clearing of cheques like
interbranch transaction can also be done immediately.
Games– Many types of video games are played on Figure - 1.2 Laptop
the computer, they can be both entertaining and (b) PDAs (Personal Digital Assistants)– Personal
educative. Digital Assistant PDA is a hand held computer. It is also
Education– Computer has changed the picture of called palmtop. They are smaller than laptops and can be
modern education, today through internet we can get easily kept in a pocket. It is touch screen and has a
information about any subject in a few moments, schools memory card for storage of data. It is effectively used as
and colleges have also been connected to internet. But portable audio players, web browsers etc.
the emphasis is on smart class which is possible only
because of computers. The development of computer-
based education and multimedia has made it more useful
and accessible to the students. According to the
researchers, when a new concept is brought to the
students through audio-video medium from a computer,
they can learn that subject better and faster.
Personal– In modern times, people use computers to
Figure-1.3 PDA
keep their records safe and to analyze their income,
(c) Tablet PC– A tablet PC is a slate-like thin
expenditure, cost, savings etc. There is a financial
mobile computing device. There is a touch screen facility
package called SM Money which helps in calculating to operate this device. This makes it easy to operate the
income, interest insurance etc. tablet. In this, instead of physical keyboard, there is a
Accounting–Special programs like Tally 9 are virtual on-screen keyboard. Tablet PCs have a wireless
available for accounting; this program is used in adapter for Internet and LAN (Local Area Network)
maintaining the account of a company, making profit and connections.
loss account and balance sheet etc.
1.1(iii) Latest IT Gadgets:
In modern times, daily life is greatly affected by the
inclusion of IT gadgets. Gadget is generally used for
inormation and communication technology.
All devices such as mobile, radio, TV, personal
computer, PDA, landline phone etc belongs under
gadgets. These devices are being used in various fields
like education, entertainment and business, medical Figure - 1.4 Tablet PC
through specially designed applications. 1.2 Evolution of Computers & its
You can install different types of software packages Applications:
in the computer and use it in many ways. Some of the Computer is such a man-made machine that has
major IT gadgets are as follows- changed the way we work, live, play etc. It has hardly
(a) Laptop and Notebooks been 50 years since modern computers came into
(b) PDAs (Personal Digital Assistants) existence, but the history of their development is very
(c) Tablet PC old. In the last almost four decades, computers have
(a) Laptop and Notebooks– Laptop is a small and changed the way of living and working of our society.
portable computer. It is so small in size that can be Abacus– It was invented by Li Kai Chen (China) in
operated by keeping it on the lap. That's why it got name the 16th century. This is the first and simplest device. It
laptop. Notebooks are smaller in size than laptops. It can was also used for addition, multiplication and square
be easily carried in any bag. It is more expensive than root. The abacus was a rectangular wooden frame with a
desktop. It is used by reporters and other field work wire frame inside. Counting was done by circular beads
people. in horizontal wires.
M1R5 9 YCT
Search on TG: @apna_pdf
Fig-1.8 ENIAC
Fig. 1.5 Abacus EDSAC (Stored Program Concept)– It was
Pascaline or Pascal Calculator– The first invented by Marris Wilkes (UK) in 1949 AD. It was
calculating machine was built in 1645AD by Blaise developed at the University of Cambridge. According to
Pascal (France). This machine worked on the principle of the stored program concept, the operating instructions
odometer and clock. In this machine there were dialers and data that are going to be used in the processing
like many cycles and old telephones, numbers from 0 to should be stored in the computer and should be modified
9 were marked on them, these dialers were used by at the time of execution of the program as required.
rotating them. These mercury deley lines are used for memory and
vacuum tubes are used for logic.
EDVAC (Electronic Discrete Variable Automatic
Computer)– It was invented in 1950 by John Von
Newman (America). It was used to do calculations. It
was a 150 feet wide computer with the weight of 30 tons.
UNIVAC (Universal Automatic Computer)– It
was invented in 1951 by J. Prosper Eckert and John
Mauchly (America). It was used for commercial use.
Figure 1.6 Pascaline or Pascal calculator This computer can process both statistical and textual
Analytical Engine– It was invented in 1833 AD by data. It contained all the qualities of the first generation
Charles Babbage (England). It is used in all computer.
mathematical operations. It is a mechanical machine
which is considered to be the earliest form of modern
1.2(i) Generation of Computer:
computers. For this reason, Charles Babbage is After the Second World War, the development of
considered the father of computer. The five main parts of computers took place very rapidly. The purpose of
this machine were input unit, store, mill, control, output developing various reliable generations of computers has
unit. been to make cheap, small, fast and reliable computers.
First Generation Computer (1942-1955)– Vaccum
Tube was used in this. These computers were larger in
size and generated more heat. The vacuum tube took
time to heat up and after heating produced a lot of heat,
which required the use of an expensive air conditioning
system to keep it cool and consumed a lot of electricity.
In this, all instructions and information were stored in the
form of 0 and 1 and machine language was used in this.
Its speed was 333 microseconds. It was mainly used at
scientific level later in general business systems like
ENIAC, UNIVAC and MARK-1 etc. It had limited main
storage capacity.
Figure 1.7 Analytical Engine Second Generation Computer (1955-1964)– Light
ENIAC (First Electronic Computer)– ENIAC small transistors were used instead of vacuum tubes in
(Electronic Numerical Integrated and Calculator) was this generation computers. In this, magnetic core
built in 1946 during World War II. This was developed technology was used in storage devices. Assembly
by P. Eckert and John Mauchly (USA). It was the first language and high level language were used in this. It
fully electronic computer and was a combination of was widely used in commercial applications, including
twenty accumulators. It had 18000 vacuum tubes. It was engineering design and updation of inventory file etc.
used by private firms, the Engineers Research Computers of this generation were less in size & heat
Association, and IBM. and were faster and more reliable.
M1R5 10 YCT
Search on TG: @apna_pdf
Third Generation Computer (1965-1974)– Google Glass– Google Glass is a wearable, voice-
Continuous technological advances in electronics led to controlled Android device that works like a pair of
the reduction in size of computers and the ability to glasses. It uses visual, audio, and location-based input to
perform tasks at a faster rate. The third generation appear and provide information directly in the user's field
developed by J. S. Kilby. Due to the use of RAM of vision argument by providing the experience of
(Random Access Memory) in this Genertion, the storage reality.
capacity of magnetic tape and disk increased. Languages Drone Camera– A drone is an unmanned small
like Fortron, COBOL etc. were used in this. It was used aircraft or ship that can navigate without man control. To
in database management system, online system, reduce weight, a drone is made from different
reservation system etc. For example- IBM system/360, lightweight composite materials, which can be equipped
NCR 395, B 65001. Magnetic core and solid state were with a variety of additional equipment, which includes
used as main storage. cameras, GPS, guided missiles, global positioning
Fourth Generation Computer (1975-up till now)– systems, navigation systems, sensors, etc.
VLSI (Very Large Scale Integration) and ULSI (Ultra Pen with Camera– It has a hidden digital camera
Large Scale Integration) started being used instead of inside, which gives the facility of taking secret videos.
LSIIC in the fourth generation computer. In which about Often the pen is kept in a shirt pocket or held in the hand.
millions of things could be stored in a single chip.
1.4 Basics of Hardware and Software:
Languages such as Fortron-77, Pascal, ADA, COBOL-74
Computer system is a combination of hardware and
etc. were used in computers of this generation. The use
software.
of mini computers increased in this generation. There
was compatibility between devices from different Hardware– Every machinery part of a computer is
hardware manufacturers so that the consumer was not hardware, whether it is a monitor, keyboard, memory
tied to a single vendor. Computers of this generation are chip, hard disk, circuit board, cooling fan, plug in the
electrical board.
IBM PC-XT Apple II, Intel 4004 chip etc.
Computer system consists of monitor, CPU and a
The Fifth Generation Computer At Present– In
keyboard, peripheral devices and an operating system.
the fifth generation computer, ULSI (Ultra Large Scale
Integration) was developed in place of VLSI and it was The parts connected in the form of hardware in the
possible to perform crores of calculations by a single computer perform their different functions, such as the
chip. CD (Compact Disk) was developed for storage. keyboard takes input from the user, the processor
processes the instructions given by the software.
Internet, e-mail and the World Wide Web (www)
developed. Very small and fast working computers were The main functional units of a digital computer are-
developed and programming complexity decreased. An ■ Central Processing Unit (CPU)
attempt was made to develop Artificial Intelligence so ■ Input Devices
that computers can take decisions according to the ■ Output Devices
situation. Portable PC and Desktop PC revolutionized the The following hardware components are available to
field of computer and it started being used in every field perform various functions in a computer system-
of life. In this, optical disc is used for storage. They are Motherboard– In a computer system, the
very small in size, fast and easy to use, plug and play. motherboard is such a link to which all electronic
Example- IBM notebook, Pentium PC super computer components such as memory, CPU, etc components are
etc. connected. These components are connected to the
motherboard by recieving power allow them to
1.3 IT Gadgets and their Applications: communicate with each other.
An IT device is used for "Information and SMPS (Switch Mode Power Supply)– This is an
Communication Technology". It is a term that covers all electronic circuit. This device gives power to different
available communication tools such as cell phones, parts of the computer such as motherboard, RAM, fan.
television sets, tablets, personal computers, etc. IT The main components of SMPS are power connectors
includes both Internet-connected devices and mobile and power supply.
devices supported by wireless technology. Storage Controllers– Storage Controller, hard disk,
Following are some of the major latest IT gadgets- floppy disk, CD ROM etc. to other devices let's control.
Smart Watch 360– Smart watch can play apps and The controllers are located directly on the motherboard.
all types of digital media. Such as audio tracks or radio Graphics Controllers– Graphics controllers that
streaming to Bluetooth headphones. Most of these watch produce output for the monitor.
have touchscreens that allow the use of various function Interface Controllers– It is used to connect the
such as a calculator, thermometer, compass, etc. computer to external peripheral devices.
M1R5 11 YCT
Search on TG: @apna_pdf
1.4(i) Software: Output– The process of displaying the information
Software is a set of instructions written in a on the paper by user to the monitor or printer is called to
programming language, that control the functions of a output.
computer system. Software coordinates between the Controlling– Directing all the processes written
various hardware components of the computer so that a above is called controlling. This controlling is done by
particular task can be accomplished. Its primary purpose CU in CPU.
is to convert data into information. It also helps in data The chip speed of CPU is measured in GHz. The
input and produce the result output. higher the speed, the faster the computer works.
Types of Software: Software can be divided into (CPU) Following are the main three components of
the following categories– CPU-
(i) System Software ■ Memory Unit
(ii) Application Software ■ Arithmetic and Logic Unit (ALU)
(iii) Packages ■ Control Unit
(iv) Utilities Memory Unit– The memory unit is used to store
data and instructions. Memory units are mainly divided
into two categories – primary memory and secondary
memory. The data and instructions currently in use on
the computer are stored in the primary memory.
Secondary memory is used to store data and instructions
for later use. Primary Memory is located within CPU.
That's why it is called Internal Memory or RAM
(Random Access Memory).
Arithmetic Logic Unit (ALU)– In a computer
system, the instructions received from the control unit
(Types of software) are executed in the Arithmetic logic unit.
1.5 Central Processing Unit (CPU): It is used in arithmetic and logical calculations.
Arithmetic calculations include addition, subtraction,
CPU is called processor. Most of the devices multiplication, division, and logical calculations include
connected to the computer, communicate with the CPU comparative calculations As- >, <, =, Yes or No etc.
to perform some work. CPU is an electronic microchip The results generated in the ALU are stored in the
that processes data by converting it into information. It memory unit. This storage is temporary until they are
works to transfer instructions and data from main needed again. Data and instructions stored in main
memory to registers. The CPU executes the instructions memory are transferred for processing when required.
sequentially and transfers the output data from the No processing takes place in the memory unit. After
registers to the main memory as and when required. processing is completed, the final results stored in the
memory unit (RAM) are sent to the output device such as
monitor or printer.
Control Unit– The functions of the control unit are
as follows-
• It is responsible for controlling all the functions of
the computer.
• The control and typing signals generated by the
control unit are sent to other units for program
execution and correct control.
• The control unit coordinates all the activities of all
the parts of the computer such as input, output
devices, processor etc.
M1R5 12 YCT
Search on TG: @apna_pdf
iii. Pipeline processing– It is a process in which a task is
divided into sub-tasks and all the Sub-Tasks are
1.5(iii) Cache Memory:
executed in different segments and all the segments Cache memory is a special type of high speed
are executed simultaneously. This reduces the memory which is placed between the CPU and main
processing time and also increases the throughput of memory and it increases the processing speed of the
the system. computer. It is part of the static RAM already assigned to
the system.
For example, if we do more than two printing
commands and more than two music plays
simultaneously, then printing and music play go on CPU → Cache Memory → Main Memory
simultaneously, but the second printing task starts only
after the first print is over and the second music also The speed of CPU is high but due to low speed of
starts after the first music. RAM, the speed of data transfer between CPU and RAM
decreases. The speed of cache memory is high, it makes
1.5(ii) Processor Speed:
data available to the CPU at a faster rate. Similarly, the
Processor is the main part of the computer system, it processed data from the CPU is also received at a faster
is also called the brain of the computer. It takes the rate, due to which the access time of the entire computer
instructions given by a user as input, processes it and is reduced.
produces the output. It can execute more than one
Cache memory is very small in size but much faster
million instructions in a second. The speed of a than the main memory of the computer, it is also called
microprocessor is often measured in MIPS (Million the memory of the CPU.
Instructions per Second). MIPS is used for integer
The programs and instructions that are used
computation and for floating point measurement repeatedly, stored inside the cache memory. The
MFLOPS (Million of Floating Point Instructions per processor checks the cache memory before processing
Second) is used. any data. If it does not find that file there, then it check
Microprocessor requires main memory, power this in the primary memory. If the required data is
supply and clock system to function like a PC. available then it is called Hit while the data is not
Processor is a combination of ALU and CU built on available it is called Miss. Cache memory is more
an integrated chip according to the capacity of the CPU, expensive than main memory. It is often used to store
a computer may have one or more processors can be instructions and only cache is used in the 68020
engaged. Processors differ from each other on the basis processor. The work of cache memory depends on its
of the following points- speed and size.
'Based on the size of the data that can be manipulated Most newer microprocessors have cache memory
at a time (16 bits, 32 bits or 64 bits) etc. that is added to the CPU to speed up processing.CPU is
Depending on the architecture (such as the internal cache memory but you can also add external
processor's involvement in floating point math and cache memory.
the size of the cache memory, etc.) 1.5(iv) Levels of Cache Memory:
Based on the maximum addressable memory. Standard PCs have Level 1 (L1) and Level 2 (L.2)
8-bit microprocessor– 8-bit microprocessor cache memory built-in. Some specialized processors,
executes 8-bit data consisting of 0's and 1's in one clock such as the Intel Itanium, have caches up to level 3 (L3).
cycle. It has an address and a data bus. The Intel 8085 Level 1 (L1) Cache– L1 cache is also called
was the most popular processor. But currently processors primary or internal cache; it is in the form of CPU cache
with more capacity are available. in the micro processor chip. It is part of the RAM which
16-bit microprocessor– 16-bit microprocessor is 8, 16, 20, 32, 64 or 128KB in size and works at the
manipulates 16 bits at a time and its word length is 16 same clock frequency as the rest of the CPU.
bits. The Intel 80286 is an example of a 16bit LI cache is generally divided into two parts – one for
microprocessor. data, the other for instructions, common for both data
32-bit microprocessor– A 32-bit microprocessor and instructions. The cache is called Unified Cache.
can handle 32 bits at a time. this kind of microprocessors Level 2 (L2) cache– It is larger than the level 1
were used in earlier expensive PCs. cache and can store data up to a maximum of 24KB. This
32bit is available in all operating systems since Increases the processing speed. The main function of
Microsoft Windows 95. cache L2 is to keep L1 available by continuously reading
64-bit microprocessor– A 64-bit microprocessor large amount of data.
can handle 64 bits of data at a time. It is used in more Level 3 (L3) Cache - This memory boosts
powerful workstations and computers (such as performance when combined with the L1, L2 cache.
minicomputers, servers and high-end workstations) Multicore processors have dedicated L1 and L2 caches
DEC's Alpha Server etc are important microprocessor, for each core, but L3 caches can be shared. It is different
based on 64-bit. from other caches (CPU cache, hard disk cache, etc.).
M1R5 13 YCT
Search on TG: @apna_pdf
Keyboard– Keyboard is the most important device
of any computer. Text or numerical data can be entered
in the computer from the keyboard itself. The keyboard
has all the letters in the same order as a typewriter, but it
has more buttons than a typewriter.
A port is made to connect the keyboard to the
computer, but nowadays USB keyboards are available,
which plug into the USB port of the computer, and
wireless keyboards also available which do not need to
be connected to the system.
1.5(v) Importance of Cache Memory:
System performance matters a lot to a computer
user. For this, the CPU needs to be faster and more
efficient i.e. the faster and more efficient the CPU will
perform a process. The better performance of the
computer, the better the cache memory improves the
efficiency of the CPU. Due to the slowness of the main
memory, the CPU slows down the process of program
execution, while using the cache memory speeds up the
process.
1.6 Input Devices: Fig. 1.11 Keyboard showing the functions of
The devices, through which data is input or the different buttons.
devices through which words, data or instructions are
inserted into the memory, are called input devices. There are five types of keys in the keyboard–
Following are some of the main input devices- ■ Alphabet Keys: There are 26 alphabet keys from A
Mouse– This is an input device; it is used to give to Z in the keyboard, which are used to type any
instructions to the computer with the help of graphics in word or text.
the computer. It was invented by Douglas C. Engelbart. ■ Numeric Keys– The numeric keys are in the row
It usually has two or three buttons. It has a left button, above the alphabetic keys. They are numbered from
right button and a scroll wheel in the middle. Using a 0 to 9. There is a separate set of keys for typing
mouse, we do not have to remember any key on the numbers called Numeric Key Pad. It contains 0 to 9
keyboard; just click the mouse pointer at a certain place digits, decimal, addition, subtraction, multiplication
on the screen. and division etc.
■ Function Keys– These are located at the top of the
keyboard. These buttons are marked F1 to F12. They
are used for specific tasks defined in the computer.
Their work also depends on the running program.
■ Cursor Control Keys– These keys are used to
move the cursor anywhere on the desktop. These
indicate four different directions, right, left, up and
down, which are indicated by arrows. These are also
called Arrow Keys.
Just above these, there are four more buttons to
Fig. 1.10 Mouse control the cursor which are Home, End, Page Up
There are mainly four functions of the mouse- and Page Down.
1. Left Click: It is used to select an object on the Home: This key moves the cursor to the beginning
screen. of the line.
2. Double Click: Pressing the left mouse button twice End: This key moves the cursor to the end of the
quickly is called double click. It is used to open a line.
file, document or program. Page Up: It moves the cursor to the previous page.
3. Right Click: It shows the list of commands on the Page Down: It moves the cursor to the next page.
screen. Use right click to open the properties of the ■ Special Purpose Key:
object is accessed. Caps Lock Key– It is a toggle button, that is, when
4. Drag & Drop: It is used to move any object from this key is activated, it converts the uppercase letters to
one place to another on the screen. lowercase and lowercase to uppercase.
M1R5 14 YCT
Search on TG: @apna_pdf
Num Lock Key– It is also a toggle button, when
activated; it acts as a group of numeric keys on the right
side of the keyboard. It acts as a directional switch when
the Num lock is off.
Shift Keys– There are two shift keys on any
keyboard. This is a combination button. It is used with
any other button. It is used to change the case of a letter
and at any button on the keyboard where two characters
are marked, then the 'shift key' is used to type the above
character.
Enter Keys– It is also called the Return Key. It is
used to execute the command or program given to the Figure 1.13 Light Pen
computer. It is also used to start a paragraph. Scanner– A scanner is used to convert data written
Tab Key– Its full name is tabulator button. It moves on paper or printed images into digital form. It is an
the cursor to a certain distance at once and takes the
optical input device. Scanned images can be saved in
browser to another link in the page. By setting the tab in
the Word document, the margin of the page, paragraph memory or CD or any processing or editing can be done.
and the distance between one word to another is set. The scanners are of the following types-
Escape Key– This is like the Cancel button. (i) Hand Held Scanner– Hand held scanner is a
Whatever work is going-on on the computer, this button portable scanner. To scan the object, the hand held
closes it and quit program. Using the Esc button along scanner is moved over the object. It is more useful for
with Ctrl button opens the Start menu. small images such as signatures, signs, symbols or small
Space Bar– This key is used to insert space between photographs. It is used in many applications such as bar
words. code readers.
Back Space Key– By using this key, the text to the
left of the cursor is erased.
Delete Key– This key is used to delete the text on
the right side of the cursor, as well as it can also be used
to delete the selected word, line, page, file or drawing.
Ctrl Key– This key is used in conjunction with any
other key to give a specific command. There are two
places on the keyboard. Control is used to give various
shortcuts such as- Ctrl + C to copy, Ctrl + V to paste and
Ctrl + Alt + Delete to reset etc.
Joystick– Joystick is an input device and it is a
pointing device which moves in all directions and
controls the movement of the cursor. Joysticks are used
in flight simulators, computer gaming and CAD/CAM Figure 1.14 Hand held scanner
systems. Its system is also similar to that of a track ball, (ii) Flatbed scanner– Flatbed scanner is also called
except instead of a ball, a stick is attached to it. desktop scanner which is used to convert the object into
digital format. It also scans sheets of image paper (most
are A4 size). It provides excellent output in less time.
M1R5 15 YCT
Search on TG: @apna_pdf
(iii) Sheetfed Scanner– Sheetfed scanner is also
called rolled over scanner. It looks like a fax machine.
This scanner can scan only one sheet of paper at a time.
The pages to be scanned are passed through like a
lamination machine. These scans are less expensive but
take longer to produce normal output.
M1R5 16 YCT
Search on TG: @apna_pdf
M1R5 17 YCT
Search on TG: @apna_pdf
(ii) Daisy Wheel Printers: This is such a printer in
which a daisy wheel is attached instead of the print head,
which is made of plastic or metal. It prints with higher
resolution than dot matrix printer and its output is more
reliable than dot matrix printer. It cannot print graphs or
pictures. It is noisy and prints slowly.
M1R5 18 YCT
Search on TG: @apna_pdf
(ii) Thermal Printer– Thermochromic paper is
used in Thermal Printer. In this, the ink is melted by heat
and left on the paper, due to which letters or pictures are
printed. Fax machine is also a type of thermal printer. It
is faster and noiseless as compared to dot matrix printer.
It has good print quality.
M1R5 19 YCT
Search on TG: @apna_pdf
■ Burning process in EPROM can be repeated with the
help of ultraviolet rays.
■ EEPROM is also permanent memory such as
EPROM, but the burning process can be repeated
with the help of electricity.
M1R5 23 YCT
Search on TG: @apna_pdf
Inside the system unit: CPU Support Chip– It is a chip that helps CPU in
Some electronic components inside the system unit managing various parts (peripherals) of the computer this
to operate the program, handle instructions, and is mounted on the motherboard.
determine results are attached which are as follows- 1.8 (iii) Number System:
Motherboard– In a computer system, the The way of representing a number is called a
motherboard is such a link that all electronic components number system. Numbers commonly used in computer
such as RAM, ROM, processor etc remain connected. systems
These electronic components connected to the There are four types, which are as follows-
motherboard make operation possible. It allows the 1. Decimal Number System
components to receive power and communicate with 2. Binary Number System
each other. 3. Octal Number System
RAM Chip (Random Access Memory)– RAM is 4. Hexa Decimal Number System
the most commonly used primary memory in the 1. Decimal Number System: The base of the
computer. A RAM chip consists of a black plastic decimal number system is 10. It contains numbers in the
integrated circuit (IC) with a row of pins on either side, range 0-9.
inserted either as a chip with the help of a slot, or directly Example:- (75)10, (821)10, (799)10 etc.
mounted on a circuit board. Memory chips are usually 2. Binary Number System: It is a number system
inserted in the motherboard as a group called SIMM whose base or radix is 2 which is always written in
(Single in Line Memory Module). They are inserted into subscript format and binary number system as per its
SIMM slots to increase the capacity of a computer name supports only two numbers 0 and 1.
system to store more data. RAM chips are available in The 2 written in subscript in the binaray number
64MB, 128MB, 256MB, 512MB, 1GB and more (101010)2 is its base.
capacities. Here are the binary numbers equivalents to some
ROM Chip (Read Only Memory)– ROM is decimal numbers-
connected to the computer system in the form of a chip. Decimal Numbers Binary Numbers
Read Only Memory is a memory in which the stored data
0 0000
can only be read and cannot be destroyed or changed.
1 0001
It is a permanent (Non-Volatile) memory. ROM is
2 0010
used to store BIOS information. This is used during the
booting of computer system. ROM is a silicon chip 3 0011
located on top of the motherboard that stores instructions 4 0100
at the time of manufacture. When the computer is 5 0101
switched on the instruction/program stored in ROM is 6 0110
automatically executed and the instruction/program 7 0111
stored in it is not destroyed even after turning off the 8 1000
power button. 9 1001
Video Graphics Card / Display Adapter Card– A 10 1010
display adapter card is an adapter for linking the CPU to Table 1.1 Binary numbers equivalent to decimal
the monitor. It displays all the tasks under the CPU on numbers
the monitor and converts the binary form of information Conversion from Decimal to Binary– The process
into a form understandable by the user. used to convert a decimal number to binary is called
Expansion Slot– An expansion slot is a thin long Dibble-Dabble. In this, the given number is divided
connector that allows other devices or adapter cards to be by 2 continuously until the quotient becomes 1 and
connected to a computer system. Some features such as whatever remainder remains 0 or 1 while dividing,
sound card, network card, graphics card, etc., which the writing them in reverse order (from bottom to top)
PC does not support, we can increase the capacity of our with base 2, The binary number equivalent to the
PC by connecting it with the help of expansion slot. decimal is obtained.
Disk Interface Card– Disk Interface Card is Example:-
required to communicate with hard disk and other (A) Convert the decimal number (255)10 to its
peripherals like floppy disk drive etc. equivalent binary number.
I/O interface card– Input / output interface card for
input / output (I/O) devices such as keyboards, printers,
modems, etc. It usually has one or two serial ports, one
joystick port, and one or two parallel ports.
Microprocessor– Microprocessor is called the heart
of the PC; it executes all the program instructions. CU
(Control Unit) and ALU (Airthmatic Logic Unit)
registers remain in the microprocessor. It contains a
silicon chip. Which are available in different types and
sizes such as- Intel P4 Athlon etc. (255)10 = (11111111)2
M1R5 24 YCT
Search on TG: @apna_pdf
(B) Convert the decimal number ( 295)10 to octal Example:-
number. (A) Convert the decimal number (90)10 to octal number.
∴ (90)10 = (132)8
(B) Convert the decimal number (295)10 to octal
number.
(255)10 = (11111111)2
∴ (295)10 = (447)8
M1R5 25 YCT
Search on TG: @apna_pdf
IInd Method: (123)8 → (HexaDecimal) = 4096+0+16+0
(1) (2) (3) = (4112)10 (Decimal)
↓ ↓ ↓ ■ Hexadecimal to Binary Conversion- The
001 010 011 hexadecimal number system is repesented in 4 bits.
∴ (123)8 = (001010011)2
To convert a hexadecimal number to binary, each
⇒ (1010011)2 hxadecimal number can be converted to 4 bits and
■ Binary to Octal Conversion– combined with base 2 to get the equivelent binary
Example:- number.
(A) Convert the binary number (10101)2 to its equivalent
octal number. Example:- Convert hexadecimal number (7C2)16 to
st 4 3 2
I Method:(10101)2 = 1×2 +0×2 +1×2 +0×2 +1×2 1 0 binary number.
(Binary) = 16+0+4+0+1 Ist Method: (7C2)16 →
= 2110 (Decimal) 7 C 2
(21)10 → ↓ ↓ ↓
(0111) (1100) (0010)
= (011111000010)2
∴ (7C2)16 = (011111000010)2
∴ (10101)2 = (25)8 Or,
Binary numbers can be directly converted to octal IInd Method: (7C2)16 → 7×162+12×16'+2×160
number by pairing a 3-bit pair from right to left.
IInd Method: (10101) → (∵ C = 12)
010101 = 1792+192+2
↓ ↓ = (1986)10 (Decimal)
2 5 (1986)10 →
∴ (10101)2 = (25)8
162.......... ↓
Example:- 6
(A) Convert the Hexadecimal number (1010)16 in to = (16)16
Decimal. Or,
(1010)16 → 1×163+0×162+1×161+0×160 nd
II Method:
(HexaDecimal) = 4096+0+16+0 (10110)2 → 1×24+0×23+1×22+1×21+0×20
= (4112)10 (Decimal)
(Binary) → 16+0+4+2+0
(B) Convert the Hexadecimal number (7B1)16 in to
Decimal. = (22)10 (Decimal)
(1010)16 → 1×163+0×162+1×161+0×160 (22)10 →
M1R5 26 YCT
Search on TG: @apna_pdf
16 22 Interchange) code is used to display number characters
1 6 and symbols in each computer. Presently this code is
accepted by computer system and uses 7 or 8 bits to
(16)16 represent the data. These codes allow computer
∴ (10110)2 = (16)16 manufacturers to standardize computer hardware such as
keyboards, printers, video displays, etc., to identify the
1.8 (iv) Coding Scheme: data and instructions used in computer systems. When
Any text based data is stored by the computer in the input is given by the user to the computer system the data
form of bits (series of 1S and 0s) and it follows a given is first converted into code after that it is converted into
coding scheme. A coding scheme is a standard that tells a binary information and executed in the computer system.
user's machine character represents which set of bytes. It 7 bit ASCII code is represented as–
is very important to specify the coding scheme used x6 x5 x4 x3 x2 x1 x0
The following coding scheme is used to represent Each bit in this is either 0 or 1. Upper character 'E' is
any character– coded as 100101 and lower case 'e' is coded as 1100101.
ASCII (American Standard Code for In an 8-bit ASCII code, the 8th bit is used as the check or
Information Interchange)– When the user writes parity bit. The 8-bit ASCII code x6 x5 x4 x3 x2 x1 x0 in x7
anything on the computer, it is written in ASCII only. is the parity bit that is added to 7-bit ASCII to make it 8-
ASCII (American Standard Code for Information bit.
Symbol Hex Code ASCII Symbol Hex Code ASCII
NUL 00 0 & 26 38
SOH 01 1 ’ 27 39
STX 02 2 ( 28 40
ETX 03 3 ) 29 41
EOT 04 4 * 2A 42
ENQ 05 5 + 2B 43
ACK 06 6 , 2C 44
BEL 07 7 – 2D 45
BS 08 8 ⋅ 2E 46
TAB 09 9 / 2F 47
LF 0A 10 0 30 48
VT 0B 11 1 31 49
FF 0C 12 2 32 50
CR 0D 13 3 33 51
SO 0E 14 4 34 52
SI 0F 15 5 35 53
DEL 10 16 6 36 54
DC1 11 17 7 37 55
DC2 12 18 8 38 56
DC3 13 19 9 39 57
DC4 14 20 : 3A 58
NAK 15 21 ; 3B 59
SYN 16 22 < 3C 60
ETB 17 23 = 3D 61
CAN 18 24 > 3E 62
EM 19 25 ? 3F 63
SUB 1A 26 @ 40 64
ESC 1B 27 ! 21 33
FS 1C 28 " 22 34
GS 1D 29 # 23 35
RS 1E 30 $ 24 36
US 1F 31 % 25 37
(space) 20 32 | 7C 124
{ 7B 123 } 7D 125
M1R5 27 YCT
Search on TG: @apna_pdf
[ 5B 91 ] 5D 93
\ 5C 92 _ 5F 95
^ 5E 94 ` 60 96
∼ 7E 126 7F 127
A 41 65 a 61 97
B 42 66 b 62 98
C 43 67 c 63 99
D 44 68 d 64 100
E 45 69 e 65 101
F 46 70 f 66 102
G 47 71 g 67 103
H 48 72 h 68 104
I 49 73 i 69 105
J 4A 74 j 6A 106
K 4B 75 k 6B 107
L 4C 76 l 6C 108
M 4D 77 m 6D 109
N 4E 78 n 6E 110
O 4F 79 o 6F 111
P 50 80 p 70 112
Q 51 81 q 71 113
R 52 82 r 72 114
S 53 83 s 73 115
T 54 84 t 74 116
U 55 85 u 75 117
V 56 86 v 76 118
W 57 87 w 77 119
X 58 88 x 78 120
Y 59 89 y 79 121
Z 5A 90 z 7A 122
Table 1.2a ASCII Code
Control Character Definition Control Character Definition
NUL NULL DC2 DIRECTION CONTROL 2
SOH START OF HEADIN DC3 DIRECT CONTROL 3
STX START TEXT DC4 DIRECT CONTROL 4
ETX END TEXT NAK NEGATIVE ACKNOWLEDGE
EOT END OF TRANSMISSION SYN SYNCHRONOUSE IDLE
ENQ ENQUIRY ETB END TRANSMISSION BLOCK
ACK ACKNOWLEDGE CAN CANCLE
BEL BELL EM END OF MEDIUM
BS BACKSPACE SUB SUBSTITUTE
HT HORIZONTAL TAB ESC ESCAPE
LF LINE FEED FS FORM SEPARATOR
VT VERTICAL TAB GS GROUP SEPARATOR
FF FORM FEED DLE DATA LINK ESCAPE
CR CARRIAGE DCI DIRCTION CONTROL 1
SO SHIFT OUT RS RECORD SEPARATOR
SI SHIFT IN US UNIT SEPARATOR
Table 1.2b Control characters and their definitions
M1R5 28 YCT
Search on TG: @apna_pdf
■ A computer does not need more than one type of
1.8 (v) EBCDIC Code: system software, while several application software
The full name of the EBCDIC code is Extended
programs can be installed.
Binary Coded Decimal Interchange Code which was
developed by IBM for use on mainframe operating ■ System software can run independently of application
systems. It encodes 8-bit characters. It converts the software, whereas application cannot run without the
number characters and symbols inputted by the user into presence of application software.
binary code for the computer to understand easily. Packages– A package is a computer application that
EBCDIC code is similar to ASCII code and is used includes individual files or resources as part of a
in computers and its devices. software collection packaged together in a form that
1.8 (vi) UNICODE: provides some functionality as part of a larger system.
Unicode is an international language encoding Software suite, which provides an organized
method that converts numbers, alphabets and symbols of collection of several packages or a package consisting of
most platforms, programs and local languages and scripts more than one separate piece. Application packages are
into a unique number value, after which that Unicode can available for all types of applications such as business
be used in various application programs. Three forms of applications, engineering designs, home applications, etc.
Unicode are in use, UTF-8, UTF-16, UTF-32 and it
consumes more memory than ASCII. It can represent 1.10 System Software:
65000 different characters with the help of Unicode. System software is the software that is written to run
At present, services such as Google Input Tools are the computer, control it, take care of its various parts and
available for typing in the local language in the computer make good use of all its capabilities. Our communication
system. system with the computer is possible only through
UTF-8– In this format, all Unicode characters are software.
converted into codes of one, two, three or four bytes.
UTF-16– In this format, Unicode characters are System software includes those programs, which
converted into codes of one or two words. Hence it is control the computer system and make it working by
also called Word Oriented Format. making proper coordination between its various parts.
UTF-32– All the letters of this code are converted Operating System– Operating System is the main
into two words i.e. 32 bit Unicode. type of system software, without which it is impossible
to run a computer. This is the first program that is loaded
1.9 Application Software: into the computer's memory when the computer is
Application software are programs that are written switched on.
to do our actual work, such as calculating the salaries of ■ It controls the signal coming from the CPU with a
office workers, keeping track of all transactions and
view to flow to different parts of the computer.
accounts, printing various types of reports, preparing
letters and documents. Application software is developed ■ MS-DOS. MS-Window, Unix, Linux, OS/2, Apple
by using high level computer languages. Software Macintosh, etc. are some of the major operating
programs are written using the English language, so the systems.
user can easily use the computer; Such as industrial
automation, medical software, educational software,
word processor etc.
Now a days, such programs usually written in the
same way for everyone, which are called readymade
software or packages, such as- MS Word, Ms-Excel,
Tally, Corel Draw Page Maker, Photoshop etc.
Differences between system and application
software–
■ System software is installed when the operating system
is installed on the computer, while as per the user's
requirement application software is installed.
■ System software includes programs such as compilers,
debuggers, drivers while application software includes ■ That operating system is the group of instructions that
media players, word processors and spreadsheet runs various activities of the computer such as
programs. memory, processor, file system and other I/O devices,
■ Generally users do not interact with the system in addition to this it also decides who will use the
software as it works in the background while the user various devices of the computer and For how long will
performs various tasks interacts with application do it? Operating systems perform the following
software during activities. functions-
M1R5 29 YCT
Search on TG: @apna_pdf
Job Management– Job management is the process A computer system can be booted in two ways, first
of organizing the execution of jobs required for a system cold booting which occurs when the computer is first
to funtion jobs are usually arranged in a sequence called turned on and second warm booting in which the
FIFO (First In First Out). computer is already on and it is restart. [ Ctrl + [Alt] +
Most OS like Unix, Windows etc include standard [Del] Keys Combination is used for warm booting.
job management capabilities Database Management
System (DBMS), many programs also have specific job 1.11 Utility Softwre:
capabilities, including backup. Utility software is a type of system software
Task Management– Task Management is a system designed to assist in the analysis, configuration, and
monitoring program that provides information about the maintenance of a computer.
processes and programs running on the computer as well The following are examples of utility software:
as the general status of the computer. ■ Virus scanner– To protect computer system from
In multiprogramming computers, the operating trojans and viruses.
system decides which process will get the processor and ■ Disk Defragmenter– To increase the speed of hard
which will not and for how long. This process is called disk.
task management. ■ File Manager– To add, remove, rename and transfer
Data Management– The main function of the files and folders.
operating system is to keep track of the data on the disk.
from which its name DOS (Disk Operating System) was 1.11(i) Utility Program:
installed. A utility program is a type of system software that is
Operating system access methods or device driver used to perform a specific task utility some examples of
routines contain knowledge of where to get data to an programs are as follows-
application program have to retrieve when a program is Assemblers– This is a program that reads a program
ready to accept data, the operating system (OS) signals written in assembly language and translates it into
with a coded message. The OS locates the data and machine language. This translation is necessary because
delivers it to the program. In contrast, when the program the computer can only follow the program written in its
is ready for output, the OS transfers the data from the machine language.
program to the next available space on disk. The source program of the assembly language
Security– In a multi user and multi programming program is also called the object program and the
system where many programs of many users run at the program that is obtained after its translation into machine
same time however, protecting those programs and their language.
data is a complex task. Compilers– Compiler is a program that converts the
In multi programming system, many jobs are program or source code written in high level language
processed in RAM at the same time and the data into machine language or object program.
processed by jobs is also remains in RAM there are It reads the entire program at once and points out all
always the possibility that the output of a program may the errors. This converts the program into machine
not be stored in the data space. language when the errors are removed. A separate
Operating systems maintain a list of authorized users compiler is required for each high level language.
and provide password protection against unauthorized A compiler is more intelligent than an assembler,
users. but its program execution time is longer.
Boot Strap Program– Bootstrap is a program that Compiler checks all types of limits ranges and errors
initiates the operating system during startup. etc.
Bootstrapping is the process of loading a set of Interpreters– It translates the source program
instructions when a computer is powered on or booted. written in high level language by a program into machine
During the startup process, diagnostic tests are language. Interpreter translates each instruction one by
performed Such as Power on Self Test (POST) which one without storing it, then translates another instruction.
sets the configuration for the equipment and routine tests In this way, when the whole program is executed, it
for connections to peripherals, then the bootstrap finally gives the response.
program is loaded to start the OS. ROM chip in PC Basically the work of Compiler and Interpreter is the
(Personal Computer) has a small boot strap routine same, the only difference is that while Compiler creates
which is automatically executed. Object Program, Interpreter does not create anything, so
source program is required every time while using
Such PC (Personal Computers) in which single
Interpreter.
tasking operating system is used, it is necessary to reset A compiler is 5 to 25 times faster than an interpreter.
them after they are cached. Interpreter takes less memory space.
M1R5 30 YCT
Search on TG: @apna_pdf
1.12 Open Source and Proprietary Software: Types of Mobile Applications– There are three
Software that is developed and tested through open types of mobile apps-
collaboration is called open source software. With 1. Native Apps– These types of apps are specially
academic knowledge anyone can inspect, modify and developed for single mobile operating system so they can
redistribute the source code. In this, the management of be used on a particular platform only. The Android app
the project is done by the open source community of cannot be used on the iPhone. Apps made for systems
developers and programmers. They are not aimed at Such as Android, Windows Phone cannot be used on any
unskilled users. It provides better flexibility. platform other than itself.
Software that is owned by the person or organization 2. Web Apps– These types of apps also behave in
that developed it is called proprietary software. Only the the same way as Native Apps. Web apps use a browser
owner or publisher who holds the legal property rights to to run, which are usually coded in HTML, JavaScript, or
the source code can access this software. This project is CSS. Chrome, Firefox, Opera and Safari are web
used or managed by a closed group of the team who applications. These apps are generalized for multiple
developed it. This software is focused on a limited platforms and cannot be installed locally. It is made
market of both skilled and unskilled users. There are available on the Internet through a browser.
restrictions as well as limited scope for innovation. 3. Hybrid Apps– Such apps are a combination of
1.13 Mobile Apps: both native and web apps. Hybrid apps are often used to
A mobile app is a type of application software refer to mobile computing.
designed to run on a mobile device (tablet, smartphone). In modern times, mobile companies are increasingly
Applications are usually small, personal software units making smartphones. With the help of communication
with limited functions. App software is originally used apps, people can sit anywhere and share any information,
by Apple Inc. and was popularized by its App Store, audio, video, image etc. Through these mobile apps, we
which offers many applications for the iPhone, iPad, and can easily do shopping, ticket booking, bill payment,
iPod Touch. getting traffic information etc. while sitting at home.
Applications are typically downloaded from Following are some of the important mobile
application distribution platforms operated by the owner applications-
of the mobile operating system, such as the Google Play BHIM App– The full name of BHIM is Bharat
Store App Store (iOS). Mobile applications provide users Interface for Money. It was launched by the Government
with services similar to those that can be accessed on a of India on 30 December 2016, through which we can
personal computer. Using these, any person can talk to make fast, secure and reliable cashless payments with the
help of our mobiles. BHIM integrates with other UPI
anyone from any place, internet browsing, entertainment
applications and bank accounts to easily transfer money.
etc. In modern times, mobile apps are widely used in It is developed by National Payments Corporation of
their vast work areas such as calling, browsing, chatting, India. Through BHIM app, we can send or receive
social network communication, games, audio, video etc. money from one account to another. You can send
Some applications are pre-installed in the mobile and money to any person using UPI ID only. BHIM app can
other apps can be installed using internet. Some apps are be used not only to transfer money but also to make all
available for free to use, while some apps cost money, other types of online payments.
the profit of which is split between the application Following are some of the salient features of BHIM
developer and the app distribution platform. app-
There are following categories of mobile (i) UPI supports all banks.
applications on the basis of usage- (ii) It is based on Immediate Payment Interface.
■ Communications–E-mail, Facebook Twitter, (iii) Money transfer can be done using the UPI address
Instagram etc. (mobile no.).
■ Multimedia–Graphics, image, presentation viewer etc. (iv) This app can work even without internet.
■ Games–Temple Run, Solitaire, Trivial Crack, PUBG (v) It allows instant money transfer between two bank
etc. accounts.
■ Productivity–Notepad, Calendar, Calculator etc. (vi) Presently maximum `10,000 per transaction and
■ Business–Adobe Acrobat Reader `20,000 transactions per day are permitted.
■ Utility–Bitmoji, Flashlight, Speed Test My Gov App– It is a portal of the Government
■ Travel–Google Earth, United Airlines etc. of India which was launched by Prime Minister Narendra
Installing Mobile Apps– Mobile apps are installed Modi on 26 July 2014. The main objective of this portal
by searching them from application distribution is to connect the citizens with the government and act as
platforms. Apps can be installed from the Google Play a medium to join hands in the development of the nation.
Store for Android devices and the Apple App Store for The app gives citizens an opportunity to participate in
iPads and iPhones. To install the app, navigate to your discussions and debates on a wide range of topics and
App Store and select the app as per your requirement and exchange ideas with a wide range of people. Through
download the app. After downloading, the device this app, users can log-in and share their suggestions,
automatically installs it. feedback and ideas with Central Ministry.
M1R5 31 YCT
Search on TG: @apna_pdf
IRCTC Connect App– It plays an important role The service transformations achieved through PSP
in railway reservation system, it helps passengers to get are as follows-
train related information on the basis of destination. • Through PSP Portal (www.passportindia.gov.in)
Status of booked tickets, ticket cancellation etc are done citizens can pay passport fee from anywhere at their
through e-governance. Reservation and cancellation of convenience. It also provides latest information on
train tickets is done through the official website of all passport related services.
IRCTC (Indian Railways Catering and Tourism • PSP has expanded to 37 Passport Offices to increase
Corporation Limited) www.irctc.co.in. its network.
Digital Locker App– Digital Locker is a service • National Call Center operated in Indian languages,
operated by the Department of Electronics and for Indian citizens to obtain passport related
Information Technology, Government of India. It allows information.
all Indian citizens to scan or store their documents in Online RTI App– RTI means Right to
digital formats. It uses cloud computing where all Information, this law came into force in our country in
citizens are given 1GB of storage space in a secure and
private cloud account. It is part of the Digital India 2005, using which you can ask for information from the
initiative of the government. government and any department, under 'right to
To use the Digital Locker portal, sign up using the information', the country's democracy is strengthened
Aadhaar card number at digitallocker.gov.in. The OTP and administrative Participation of common citizens in
sent to the mobile number linked with Aadhaar has to be works increases. The biggest objective of bringing this
entered. law was to give the common people the right to question
Following are the objectives of Digital Locker the government. This law can prove to be a great way to
System- stop corruption. This law is applicable in all the states of
• Digitally empowers to the residents by providing India except Jammu and Kashmir. 'J&K RTI' runs in
digital lockers on the cloud. Jammu and Kashmir. Almost all the constitutional posts
• By ensuring the authenticity of e-documents, it also come under this law whose information can be obtained.
eliminates the use of fake documents. It protects the rights of the common citizens and
• Easy access to documents for residents at any point empowers the citizens. Under this law, a person can get
of time. all the information related to his personal life, such as
• It ensures the confidentiality and authorized access passport, provident fund related information, tax refund
of the data. related information, pension related information etc.
Along with this, by using the RTI Act, people can get
• Provides a well-structured document format to information related to complaints of corruption,
support easy sharing between departments and problems related to electricity, water, repair of roads, etc.
agencies. Important rules related to Right to Information–
• Through this, departments and agencies make it Under this, it is necessary to take care of some special
easier for residents to get services. things before submitting the application-
Voter Helpline App– The Election Commission • An Indian citizen can submit his application under
has developed Voter Helpline App to solve the problems this. If you are an Indian citizen, using this you can
of voters at home. Through this mobile app, citizens can also get the necessary information from the
register their names in the voter list, modify it, transfer to government office.
another part of the same assembly, transfer from one • In this application the applicant has to submit the
assembly to another, know the candidates involved in the exact name of the government organization from
election process, know the results of the election facility where the applicant has to get the information.
has been made available. • Many institutions have been kept separate from this
GARV App– The full name of this app is act. Security and intelligence agencies have been
Gramin Vidyutikaran App. The app provides the facility kept out of this under section 24 (1) of the Right to
to track the progress of rural electrification in India Information Act.
through a dashboard in real time. Dashboard is • The applicant has to send the application fee along
multilingual, which is user friendly. Through this you with his application.
can also see which villages will be electrified. • Under this the applicant gets the result within 30
M Passport Seva App– In the last few years, the days. Urgent documents can also be received in 48
Government of India has taken several initiatives in e-
governance to improve public services. The National e- hours.
Governance Plan (NeGP) includes several high-impact e- Process of filing RTI– Under this, the applicant can
Governance projects, including Passport Seva. adopt the following process for applying and obtaining
The Ministry of External Affairs is responsible for information-
issuing passports to Indian citizens ministry of external • You can write an application with your own hand to
affairs (MEA) 37 passport centers across the country, apply under it. Many online samples are also
Issues passports by creating a network of 180 India Post available for this with the help of which the
offices and abroad. application can be written.
Passport is an essential travel document for those • If you have any difficulty in writing the application,
who are traveling abroad for education, tourism, you can also get help from the Information Officer.
pilgrimage, business purposes and family visits. In order • The application form for this has been put online by
to enhance and improve the delivery of passport services the Central Government, which you can get from the
to Indian citizens, the Ministry of External Affairs website https://rtionline.gov.in/request/request.php.
launched passport Seva Project (PSP) in May 2 010. PSP With the help of this application can be made by
is a simple, efficient and enables transparent process. depositing the online fee sitting at home.
M1R5 32 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. Which symbols are used in hexadecimal number Ans.(c) Plotter heads, tracks, sectors, clusters,
system? cylinders etc. are the components in a hard disk drive.
(a) 0-7 (b) 0-9 The surface of the disc is divided into a number of
(c) 0-9, A-F (d) none of these invisible concentric circles called tracks. Each track is
divided into small blocks called sectors. There are 8 or
Ans.(c) The base of the hexadecimal number system more sectors on a track.
is 16 and the range is from 0 to 9 and from A to F i.e.
The storage capacity of a hard disk depends on
the symbols used in hexadecimal are 0. 1, 2, 3, 4, 5, 6,
the number of surfaces in the disc pack.
7, 8, 9 is A, B, C, D, E, F.
6. What is information?
2. Binary of (23)10 :
(a) data
(a) 01011 (b) 10111
(b) significant and understandable data
(c) 10011 (d) none of these
(c) alphanumeric data
Ans.(b) (d) program
2 23 Ans.(b) When instructions are given to the computer
2 11 1 to perform any task, then this data is processed and
2 5 1 meaningful results are given.
2 2 1 7. which is called information. Which of the
1 0 (10111)2 following is not an output device? [July 2003]
(a) Plotter
3. Also known as daisy wheel printer– (b) Printers
(a) Line printer (b) Petal printer (b) RAM
(c) Golf ball printer (d) laser printer (d) Smart and Digital Terminal
Ans.(c) MICR is an input device used in banks to
Ans.(c) A plastic wheel is used for printing in daisy recognize magnetic encoding numbers printed on
wheel printer, whose shape is similar to daisy flower, cheques.
so it is called daisy wheel printer. This wheel is 8. Which of the following is a secondary storage
rotated at high speed by a motor when the position of device? [July 2003]
the correct letter comes on printing, it prints the (a) CD-ROM (b) RAM
character. The quality of these printers is good. These (c) ROM (d) OMR
printers can print 10 to 50 characters in a second.
These are impact printers. These are also called golf Ans.(a) CD-ROM is an optical disc in which data is
ball printers. stored for future reference. CD-ROM one is a
secondary storage device.
4. .........is a system software.
9. The equivalent decimal number of (1101011)2 is–
(a) operating system (b) loader
[Jan 2005]
(c) linker (d) all of these
(a) 107 (b) 111
Ans.(a) System software is the software which is (c) 110 (d) 164
written to run the computer, control it, take care of its
Ans.(a) (1101011)2 Equivalent to Decimal Number;
various parts and make good use of all its capabilities.
Our communication system with the computer is done 1101011→ 1 × 26 + 1 × 25 + 0 × 24 + 1 × 23 + 0 × 22 +
through software. 1 × 21 + 1 × 20
Operating systems are the main type of system 64 + 32 + 0 + 8 + 0 + 2 + 1 = (107)10
software. Without which it is impossible to run the 10. Which of the following is not a high level
computer. This is the first program that gets loaded language? [Jan 2005]
into the computer's memory when the computer is (a) C programming (b) LISP
switched on. (c) Java (d) assembly
5. The storage capacity of a disk system depends on Ans.(d) High level language is a programming
the bits per inch of track and tracks per inch. language which is designed to simplify computer
(a) Platter (b) cluster programming. C++ C#, COBOL Photon, Java,
(c) Surface (d) cylinder JavaScript Pascal, LISP etc. are high level languages.
M1R5 33 YCT
Search on TG: @apna_pdf
11. ASCII means- [July 2005] 17. Who tanslates the program in high level language
(a) American Standard Code for Information into mahine code?
Interchange (a) Assembler (b) Compiler
(b) American Statistical Code for Information (c) Operating (d) Editor
Interchange Ans.(b) A compiler is a program that converts a
(c) Alphabetic Series Co for Information program written in a high level language into a
Interchange machine language. Each high level language requires
(d) Alphabetic Standard Code for Information a separate compiler.
Interchange 18. What type of software is Linux?
Ans.(a) The full form of ASCII is American Standard (a) Compiler (b) Operating System
Code for Information Interchange. It uses 17 bit (c) Utility Software (d) Application Software
binary code to represent text in the computer. Ans.(b) Linux operating system is a multiuser,
12. The equivalent octal number of binary bits multitasking and multiprocessing software desingned
(1001101) is- [July 2007] for personal omputers. It is open soure operating
(a) 464 (b) 715 system.
(c) 125 (d) 115 19. RAM............is a memory:
Ans.(d) (1001101)2 Equivalent to Octal; (a) Volatile (b) Non-Volatile
(1001101)2 → 1 × 26 + 0 × 25 + 0 × 24 + 1 × 23 + 1 ×
2 1 0 (c) Cache (d) None of these
2 +0×2 +1×2
64 + 0 + 0 + 8 + 4 + 0 × 1 = (77)10 Ans.(a)Volatility of computer memory refers to the
most appropriate "Capaity to retain". RAM is volatile
8 77 memory which means information is lost when power
(77)10 → 8 9 5 off.
1 1 (115)8 20. Hexadeimal of binary number 1001001011:
∴ (1001101)2 Equivalent to Octal = (115)8 (a) 587 (b) 24B
13. The most appropriate input device for Kiosk (c) 92B (d) None of these
operation is: Ans.(b) Hexadecimal number of (1001001011)2:
(a) Key-board (b) Trackball 1001001011 = 1 × 29 + 0 × 28 + 0 × 27 + 1 × 26 + 0 ×
25 + 0 × 24 + 1 × 23 + 0 × 22 + 1 × 21 + 1 × 20
(c) Bar code Reader (d) Touch-pannel
= 512 + 0 + 0 + 64 + 0 + 0 + 8 + 0 + 2 + 1
Ans.(d) Information Kiosk is like an ATM machine in = (587)10 decimal
which all the hardware such as PC. Motherboard,
(587)10 →
RAM, hard disk etc. are inbuilt. Input can be with the
help of touch panel.
14. By whom was the basic architecture of computer
developed?
(a) John von Nmen (b) Charles Babbage
(c) Blaze Pascal (d) Gardan Mure
Ans.(a) Basic architecture of computer was developed (24B)16 [Hexadeimal]
by John von Numen. 21. Standard Alphanumeric Code is- [July 2015]
15. Which language is written in the form of binary (a) EBCDIC (b) UNICODE
binary digits? (c) ASCII (d) None of these
(a) Assembly (b) High level Ans.(c) When the user writes anything on the
(c) Machine (d) Basic computer, this uses ASCII (American Standard Code
Ans.(c) Only two digits zero and one are used in for Information Interchange) to write. ASCII code is
machine language. It is the basic language of the used to display number characters and symbols in
computer, which is written in binary Code. every computer. Presently this code is accepted by
computer system system and uses 7 or 8 bits to
16. Which file extension indicates only graphis file? represent the data.
(a) BMP and DOC (b) JPEg and TXT
22. Artificial Intelligence is related to which
(c) TXT and STK (d) BMP GIF generation- [July 2013]
Ans.(d)BMP (bitmap) and GIF file extenssion indiates (a) first (b) third
only graphics file.
(c) fourth (d) fifth
M1R5 34 YCT
Search on TG: @apna_pdf
Ans.(d) Fifth generation computers are based on ULSI 27. The operating system of a computer does the
(Ultra Large Scale Integration) technology. Artificial following:
intelligence capability is being developed in the (a) Disk and file management
computer of this generation, due to which the ability (b) Management of computer resoures
to think on its own is being created in the computer. (c) Management of computer memory
(d) All of the above.
23. BIOS means- Ans.(d) Operating system is a type of system software
(a) Base Input Output System without which running of computer is not possible.
(b) Basic Input Output Source The operating systems perform many funtions such as
(c) Basic Input Output System disk and file management, computer resource
(d) None of these management, memory management Job management,
task management, data management, security etc.
Ans.(c) BIOS stands for Basic Input Output System. It
is a software or firmware, which enables you to start a 28. Which can be used to input printed text?
(a) OCR (b) OMR
computer system. When system starts, BIOS runs a (c) MICR (d) All of the above
Power On Self Test (POST) to ensure up that all
Ans.(a) OCR is used to input printed text. The full
hardware connected to the system is working properly. form of OCR is optical character Recognition. Which
24. Example of utility software is- is used to recognize text in digital images. Using this
(a) Virus scanner (b) Disk Defragmenter any hard copy document can be converted into
(c) File manager (d) All of the above electronic version (soft copy).
Ans.(d) Utility software is a type of system software 29. What is the meaning of EEPROM?
designed to assist in the analysis, configuration and (a) Electronically erasable program read only
maintenance of a computer. memoy.
(b) Eletrically erasable programmable read only
Following are the examples of utility memory.
software- (c) Electronically erasable programmable read only
Virus scanner– To protect the computer system from memory.
trojans and viruses. (d) None of these.
Disk Defragmenter– Its increase the speed of hard Ans.(b) The full form of EEPROM is Electronically
disk. Erasable Programmable only Memory. It is a type of
File Manager– To add, remove, rename and transfer non-volatile memory used in computers and other
files and folders. electronic devices to store relatively small amounts of
data.
25. On which is the fourth generation computer
based? 30. Which of the following is the largest unit of
(a) Microprocessor (b) VLSI chip storage is;
(c) ULSI chip (d) All of the above (a) MB (b) TB
(c) KB (d) GB
Ans.(b&c) VLSI (Very Large Scale Integration) and
ULSI (Ultra Large Scale Integration) started being Ans.(b) The computer understands only machine
used instead of LSIC in fourth generation computers. language, whih includes a combination of two digits 0
In which about millions of things could be stored in a and 1, and in this form the computer stores the data in
single chip. Languages like Fortron-77, Pascal, ADA, the memory. These are called bits or binary digits of a
COBOL 74 etc. were used in computers of this computer is written in binary code. It starts with 8 bits
generation. The use of mini computers increased in or digits. A group of 8 bits is called 1 byte.
this generation. There was compatibility between 1 Bit Single Dgit 0 or 1
devices from different hardware manufacturers so that 1 Nibble 4 Bits
the consumer was not tied to a single vendor.
Computers of this generation IBM PC-XT Apple 11, 1 Byte 8 Bits
Intel 4004 chip etc. 1 KB (Kilobyte) 1024 Bytes
26. UNIVAC IS: 1 M B (M egabyte) 1024 KB
(a) Universal Automatic computer 1 GB(Gigabyte) 1024 M B
(b) Unvalued Automatic Computer 1T B (Terabyte) 1024 GB
(c) Unique Automatic Computer
1 PB (Petabyte) 1024 TB
(d) Universal Array Computer
1 EB (Exabyte) 1024 PB
Ans.(a) The full form of UNIVAC is Universal
Automatic Computer. It was invented in 1951 by J. 1 ZB (Zettabyte) 1024 EB
Prosper Eckert and John Mauchly (USA). It was used 1 YB (Yotta Byte) 1024 ZB
for commercial use. This omputer can process both 1 Bronto Byte 1024 YB
statistical and Textual data. It contained all the
1 Geop Byte 1024 Born to Byte
qualities of the first generation computer.
M1R5 35 YCT
Search on TG: @apna_pdf
2 INTRODUCTION TO OPERATING
SYSTEM
M1R5 40 YCT
Search on TG: @apna_pdf
Navigation Pane– Windows keeps the most Moving the Taskbar–
recently used items by the personal computer in the Taskbar → Right click → Taskbar setting →
navigation pane. There is a navigation pane on the left Taskbar location on screen → Choose
side of all the folders which have several main sections Left/Right/Top/Bottom
which are as follows- The default location of the taskbar is the bottom.
● Quick Access– It stores shortcuts to items you ■ To change the height of the taskbar, click on the
frequently use from different locations on your inside edge of the taskbar. When the mouse pointer
computer. It is also called favourites. is changed in double headed arrow this, drag it and
● Desktop– The screen displayed when the computer set its height according to your wish.
system is turned on is called Desktop and it is one of Pinning an app to the taskbar– You can pin
the navigation panes. Works such as folder by clicking frequently used apps on your PC to the taskbar to open
on which you can see your content quickly. them with a single click.
● Downloads– By clicking on this folder you can get the ■ To pin an app to the taskbar,
files which are downloaded while browsing the • Right click → More → Pin to taskbar
internet. ■ To unpin any app from taskbar,
● Documents– It is a special folder that stores most of • Right click on the app's icon and select "Unpin".
the works like images, reports, letters etc.
2.7 Icons & Shortcuts:
● Pictures– Through this folder you can see all the
Each version of Windows has different icons. An
images saved in your PC. icon is a small graphic image that represents an
● One Drive– When you create a Microsoft account, execution of a program. When the user clicks on this
you get free online storage space from Microsoft it is icon with the mouse, the program related to it gets
called One Drive. You can access it through any PC. executed. Programs, files and folders are shown on the
In this you can store your favorite files and it is desktop through icons and below these are program files
password protected. or folders the name of the folder is written.
This PC– Through this folder you can browse the ■ To add desktop apps,
folders of your PC and hard drive. 1. Open the Start menu by clicking on the Windows
Dismiss a notification– You can dismiss a button.
notification without even opening it for this, 2. Select "All Apps".
● Click on the Action Center on the taskbar. 3. Right click on that app, you want to create desktop
● Click on the Notifications close button on the top right shortcut.
corner. 4. More → Open File Location
Or, you can click the "Clear All" button to clear all 5. Right click on the selected app icon.
notifications from your PC at once. 6. Select 'Create Shortcut'.
2.6 Taskbar: 7. Select Yes.
The taskbar is located at the bottom of the Windows A desktop shortcut to your program is created.
screen. The Windows 10 taskbar contains icons for the ■ Create shortcut on desktop by drag and drop,
Start Menu, Cortana Search Box, Task View, Microsoft 1. Minimize all running programs.
Ease, Documents, Sound, Battery Life, System 2. Click on the Start button.
Language, Notifications, Date & Time, etc. On 3. Click on the app.
Windows, the current active programs are also displayed 4. Click on the program whose shortcut you want to
on the taskbar as icons. create.
5. You can create shortcut icons on the desktop by
dragging and dropping programs.
M1R5 41 YCT
Search on TG: @apna_pdf
6. The shortcut will be displayed on the desktop as Desktop Icons:
shown in the above picture. Desktop icons are the icons that appear on the
This is displayed in the lower left corner of the desktop screen that opens after turning on the computer.
shortcut icon. Recycle Bin– That icon provides temporary storage
■ To create a shortcut using the Create Shortcut Wizard, for deleted files and folders from the user's hard drive.
1. Right click on the desktop and select New and then Which can be restored again if needed. In fact, the
'Shortcut' from the context menu. Recycle Bin acts like a folder. It looks like a waste paper
basket. Recycle Bin is not included in a single drive like
a folder rather each hard drive of your computer
maintains its own Recycle Bin and whenever we open
Recycle Bin all the Recycle folders are visible.
M1R5 42 YCT
Search on TG: @apna_pdf
■ From the All Programs menu item list, click on the
desired application such as Word, Excel, PowerPoint
etc. For example an application window (MS-Word)
opens.
Closing Apps– You can close Windows apps in the
following several ways-
M1R5 44 YCT
Search on TG: @apna_pdf
Task Scheduler– This tool schedules the disk. It • Moving files by dragging and dropping.
automatically turns on every time Windows is turned on
and continues to run in the background. • Scrolling through windows or web pages with the
■ To add a schedule task, tap mouse wheel.
Using the Mouse– Mouse is an input device whose
• Start → All programs → Accessories Task System real name is Pointer Device, it is used to control the
Tools → Task Schedular screen pointer. The mouse is mainly used to select
• Task Scheduler window displayed as figure no. 3.21 menus, commands, text, graphic objects or windows.
There should be a smooth and flat surface to move the
mouse. User should not use mouse on paper or card
board surface
The main actions of the mouse are as follows -
Double click– Pressing the left button of the mouse
twice quickly at the same time is called double click.
Double click acts like a shortcut. By this any items,
folders, files, programs etc. can be opened. Apart from
this, double click is also used to select any word in a
document.
Right Click– Pressing the right button of the mouse
is called Right Click. Right clicking on an item opens a
list of actions that can be performed with that item.
Shift + Click– If the user wants to select the names
of several conjunctive files at once then the Shift key
Fig - 2.21 Task Scheduler Window should be pressed and clicked. In this way the user can
• Action Menu → Create Basic Task also select the text between the location clicked with
• In the Create Basic Task window, enter a description Shift and the current insertion point.
for the task by typing in a name, then click Next. Ctrl + Click– This method is used to select the
• In the next step, when do you want the task to slant? names of different types of non-conjutive files. While
Select one option from Daily, weekly etc. then click clicking in this, the Ctrl key has to be kept pressed. From
on next. this the item of your choice can also be selected.
• Select the schedule you want to use by choosing that Dragging–Any item available on the computer
Click Next. screen can be moved from one place to another by using
Mouse Dragging and Dropping action of Mouse is used
• To schedule the start of a program automatically, for this. To select an item by Mouse Pointer, press the
start a program → Next. left button on that item and drag that item to its desired
• Select the program from the list, browse it and click place, release the button. This whole process is called
on Next do it. Dragging and dropping.
• Click on Finish. Click– Pressing the left mouse button once is called
2.9 Operating System Simple Setting: a click; it selects the data and executes the command.
Most of the Windows settings are done through the
Control Panel. We can also do some settings without To Change the Basic Setting of Mouse–
using the control panel. Control Panel is a special folder 1. Open the start menu by clicking on the start button
that contains many small programs, they are called and click on setting as shown in figure 2.27.
applets. Each applet is designed to allow you to adjust 2. Setting → Choose "Devices"
settings for a specific part of your system.
2.9(i) Using Mouse and changing its
Properties:
Use the mouse to interact with objects on the
Windows screen.
As soon as the user starts the computer, the mouse
starts working then the user can make some changes in
its working system and may bring some changes in the
functionality and look and behavior of the user's mouse
pointer on the screen. For example, users can change the
role of their mouse buttons. You can increase the
visibility of the mouse pointer; change its appearance,
etc. Fig- 2.27 Selecting devices from Windows Settings
The basic functions of the mouse are as follows- 3. Select "Mouse" from the left pane of the window to
• Pointing and selecting an object on the screen. access the mouse configuration settings.
M1R5 45 YCT
Search on TG: @apna_pdf
mouse click on the check box next to the "Switch
Primary and Secondary buttons" option. This
function is useful for left-handed users.
• Some users are unable to double click the mouse in
time, so you can adjust the speed under 'Double
Click Speed' section. You can manage the double
click speed by dragging the slider towards Slow or
Fast. To test speed double clicks inside the yellow
folder icon.
• Drag and drop process is used to move files. To
move an item it is dragged while releasing the left
mouse button and if the mouse button is released in
the middle, it moves to the wrong place. Insted of
holding down the mouse button while dragging. You
can use lock option while typing. Under the click
Fig - 2.23 Select the mouse with the left pane look section, Click on the check box in front of
4. To select your primary mouse button, select the left "Turn on click Lock"
or right mouse button by clicking "select your
primary button." (fig 2.23) Pointers tab of Mouse– Use the Pointers tab to
5. Select any one of the options available in the "Roll change the appearance of the mouse pointer.
the mouse wheel to scroll" option.
Multiple lines at a time– This option is set by
default. By this option you can change how much in each
scroll lines are scrollable, can be selected. You can
increase or decrease the number of scroll lines by
dragging the cursor left or right. Its default setting
position is 3.
One Screen at a time– On selecting this option, the
entire screen is scrolled at once.
6. When the "Scroll inactive windows when hover over
them" option is on, you can scroll an inactive
window without focus and when this option is off,
you can click on the inactive window and then scroll
its content. By default it is on. (Figure 2.23)
7. You can explore other settings in the mouse by
clicking on "Additional Mouse Properties" in the Fig. 2.25 Mouse Properties dialog box with Pointers tab
"Related Setting" section.
8. The Mouse Properties dialog box appears as shown ■ To convert all your pointers at once, select "new
in Figure 2.24 below. scheme" under Scheme.
■ To change a particular pointer, select it from the
custom list and click the mouse button. Select the
name of the new pointer file from the list of selected
cursor files which you want to use for your task.
M1R5 47 YCT
Search on TG: @apna_pdf
• Select the "Change Date and Time" button from
the Date and Time tab. Date and time setting
dialog as shown in figure 2.33 The box opens.
Chitra - 2.33 Date and Time Dialog Box Figure - 2.35 Display Settings
M1R5 48 YCT
Search on TG: @apna_pdf
Display– You can adjust the display setting of your
personal computer such as text size, brightness level,
apps etc. You can easily connect to any display near your
device by recognizing it. Go through the advanced
display settings in the multiple displays section, click on
"Connect to a wireless display" and follow the
instructions Computer.
Notification Area– Through this tab you can turn
on or turn off notifications for selected apps. You can
toggle on/off the app's icon for clock, power, volume,
etc. and select the icon to be displayed on the taskbar or
system tray as per your preference.
Quick Actions– You can customize the quick
access buttons in the Notification Center and arrange
them in the order you want. You can click on an action to Figure - 2.36 selecting a program and choosing to
swap it with another action and arrange it according to uninstall
your preference. • A pop-up window is displayed when an application
Multitasking– You can arrange two or more
is uninstalled. Which displays the message that
windows by dragging them across the corners of the
screen. You can also automatically adjust the setting by information related to the application will be
selecting the window you want to snap. uninstalled along with it. You can complete the
Tablet Mode– This setting is for tablet users. If process by clicking on the Uninstall button
you're working on a touch-friendly device, you can make
Windows 10 more touch-friendly by turning on the tablet
mode button.
Battery Saver– Through the Battery Saver setting
of System Settings, you can limit your background
activity. You can also stop notifications of any app as per
your need by turning on the battery saver mode
automatically or manually and you can turn on the
notifications for those apps on that you want to receive
even when the battery saver mode is on.
Power and Sleep– You can set power off times for
both battery and power plugging modes by adjusting the
power and sleep settings for your PC and similarly, when Fig- 2.37 Message pop-up window
your PC is on battery or plugged in you can organize the • Uninstalling a desktop program opens the "Programs
sleep time.
and Features" window.
Storage– You can check the available storage in
your PC drive and you can also change the location of
the documents saved on different location in PC.
About– Through this you can check the details of
your system and you can rename PC or receive other
privacy setting link and system update link.
2.10 To Add or Remove Program and
Features:
Add or Remove Programs is a feature in the
Microsoft Windows operating system that allows users to
uninstall or organize software installed on their
computers. This feature is named Add/Remove Programs
in Windows 98 and Programs and Features in Windows Figure- 2.38 Programs and Features window
Vista and Windows 7, Apps and Features in Windows
10. • Select the program you want to uninstall and click
You can uninstall software in Windows 10 in the Uninstall. A pop-up window "If you are sure to
following ways– uninstall the Program" will be displayed. Clicking
■ To add or remove programs and apps, yes will uninstall the program.
• Start Menu → All apps ■ Removing programs and apps from the Settings
Select the program you want to delete. menu,
• Select Uninstall by right clicking on the program. Start Menu→Setting→Apps→Apps&Features.
M1R5 49 YCT
Search on TG: @apna_pdf
• You will see a complete list of applications and • Select the program you want to uninstall.
programs. You can search for an app using the
search box at the top of the screen.
M1R5 51 YCT
Search on TG: @apna_pdf
M1R5 52 YCT
Search on TG: @apna_pdf
Using Address Bar– The address bar is located at
the top of File Explorer. This displays the path of the
currently selected folder. (Fig. 2.52)
M1R5 53 YCT
Search on TG: @apna_pdf
● Release the mouse button. The file folder will be
moved to that location. Or,
µ Select file → Home tab → Organize group →
'Move to' Drop down arrow
To copy file folder to another drive or folder
● Task bar → File explorer → Select File/Folder
● Pointing to the selected file, hold down the left
mouse button.
● Now holding down the Ctrl key, drag the file folder
from the right pane to the left pane and drop it in the
file/folder in which you want to copy it.
Figure 2.56 Renaming a Folder
■ Make it bold.
● Any file or folder can be opened by double clicking
on it.
Or, you can open the folder by selecting it and clicking
the Open Folder icon in the Open group, and to open
the file, select the file by clicking on it and click on
open with the selected application icon selected in
the Open group.
M1R5 54 YCT
Search on TG: @apna_pdf
• The files and foders you delete go to the Recycle Root– The list of all the directories through which
Bin. You can also restore by double clicking them. one has to go to reach additional files from the root
directory is called the path of that file. Linux commands
• To permanently delete a file folder from the Recycle require path to be given multiple times.
Bin, click the Delete drop-down arrow in the
Organize group. Select 'Permanently delete'. • /bin directory– In this, the utilities available by Linux
2.13 Types of File Extension: are stored in the root directory, due to all the command
files being in binary format, they are kept in the 'bin'
A file extension is an identifier placed at the end of a
directory.
computer file name. File extensions are used by the
operating system to determine in which app the file will • /dev directory– In this directory, files related to all the
display best when opened. devices of the system are kept, so that they can be used
Each file contains different types of information again.
such text, audio, video etc. and each file type has a • /etc directory– In this, the files related to the
specific icon which helps you to understand the type of configuration of the system such as password files etc.
file. are stored in the form of text files.
Some main file extensions are–
(i) DOCX (MS Word Document)
• /lib directory– This directory contains the library files
and all the small programs that are needed by the
(ii) XLSX (Microsoft Excel Spreadsheet) compiler. By which the compiler works.
(iii) PNG-Portable Network graphics (an image
format) • /tmp directory– All the temporary files of the Linux
(iv) HTML-Hyper Text Markup Language (for operating system are stored in this directory. The files
creating online web pages) which are used as variable or swapping files are called
(v) PDF Portable Document Format: temporary files.
• /usr directory– It contains files that are not required
during booting. This also includes utilities can be
placed.
• /mnt directory– This directory holds all storage
devices except the hard disk. Subdirectories like
Fig- 2.62 File extension 'Floppy' and 'Cdrom' are kept in the directory.
You can also easily turn on or off the file extension. • /kernel directory– This directory contains all the
For this, click on the View tab in File Explorer. Turn it kernel specified code. The kernel is the heart of the
on by clicking on the check box in front of the option Linux system. It is responsible for resource allocation,
'File Name Extension' given in the Show/hide group. security and low level hardware interface.
Clicking on the same checkbox again turns it off.
2.15 File Handling in Linux:
2.14 File Struture: In Linux, each file is referred to using its pathname
Following are the basic elements of Linux- starting with the root directory. Such as usr directory is
Kernel– The kernel is the main part of Linux, which represented as /usr (/ or root is its parent directory) and
organizes and operates other programs and hardware. mini is represented as /usr/mini, in mini Office the parent
The kernel is the central module of the OS. It is the part directory of a directory is usr.
of the operating system that is loaded first and then
There are two types of path names in a file–
transferred to the main memory. Maintaining time and
date, launching applications and allocating system 1. Absolute Path
resources are also the functions of this part of OS. 2. Relative Pathname
Shell– Shell is a program that interprets the Absolute pathname specifies the entire path of a
commands given by the user. Shell is also called single directory starting from the root. the root with a
Command Interpreter. Commands in the shell are either forward slash (/) is shown.
typed on the command line or placed in a file. The relative path name tells the location of a
File System– Linux treats everything as a file. A directory relative to the current working directory. If a
directory containing multiple files is also treated as a pathname contains a slash (/) if not specified, Linux
single file. In Linux, all hardware devices such as I/O assumes that the user is using relative path names.
devices, storage devices, etc. are considered as files. In Identifying the Current Working Directory– $
this, the files are arranged according to the hierarchy in pwd Enter command should be typed by a user to know
the directory. The topmost directory is called the root in which directory he is working.
directory. It is expressed by a slash (/). All files and Pwd command will print the absolute path name of
directories are attached to the root directory in it. the current working directory of the user. There is no
parameter in this command.
Making New Directories–
(mkdir): The mkdir command is used with the name
of the directory to create a new directory.
M1R5 55 YCT
Search on TG: @apna_pdf
For example, if a new directory named Sales is This will have the following output-
created in /usr/mini, it can give the following command- east
west
north
south
In the list that will be displayed in this type of
display, the numbers will come before the letters and in
the letters also, the uppercase letters will come before the
lowercase ones.
If the list of names and files of the directories
coming under a certain directory (Like- north) is to be
made, then the user will have to give ℓs command with
the name of the directory which will be like this–
$ ℓs north
Fig - 2.63 A sample Linux session using the commands This command will display the output as shown in
mentioned so far. the picture.
Subdirectory Sales is created in the current directory Generally, there are many files in a directory and for
/usr/mini. the convenience of knowing whether there is any
If a multiple directories are to be created with one important file in a directory, the user should give is
mkdir command, separate the names of each directory by command with the name of the directory, which is as
a space is written. The example of this is as follows-
$ mkdir sales/east sales/west sales/north sales/southEnter follows– $ ℓs March
The above command creates 4 directories inside the In our current working directory, This command
sales subdirectory. displays the result "File not found error" because there is
No subdirectory can be created without creating a no file named if there is a file with this name in the
parent directory. In this, the order of arguments is directory, it will display is and the name of the file.
important.
Moving to a different directory (Cd)– Using the This ℓs command can be used with a number of
Cd command, your current working directory can be options. The options used in this are predefined
changed. For this, after the Cd command, we have to arguments and they are used with a negative sign (-Sign).
write the path name of the directory in which we want to Each option has its own separate meaning.
go. The path name of the directory can be absolute or
relative. For example, if the user wants to go to the Sales Option Description
directory, then he should type the following command- –a Generally hidden files also list all other
$ Cd Sales Enter files as well.
Relative path names are used in this command. –A Lists files by inode modification time.
–c It lists the inode of each file.
The Cd command always returns the user to his
home directory without using a pathname. –i Size allows more modification time.
In Linux, the current working directory is specified –l Displays the names of files and
using a single dot (.) and the current working directory is directories.
specified using a double dot (..). The parent of the
directory is used to represent the directory. –r It lists files and subdirectories in reverse
Removing a directory (rmdir)– The rmdir order.
command is used to delete a directory. To delete a –t It lists files and subdirectories lists in
directory, it must be empty. For example, to delete the Time order.
directory named Exam, the following command should
–x Multi columnar output
be typed– $ rmdir exam Enter RD exam
If a user wants to delete directory while being in a Table- 3.2 Different options of ℓs command
subdirectory, he cannot do so and if you want to delete
multiple directories at once, then for this, the names of Creating files (Using Cat)– To create a file, type
the directories are written separately by each space. the Cat command at the shell prompt character and then
Listing the Contents of Directories (ℓs)– The ℓs the name of the file is typed. For example, if a file named
January is to be created, then use the following command
command is used by the user to create a list of files and
would be– $ Cat > January Enter
subdirectories of the working current directory. Its
function is also similar to the DIR command of DOS. For As soon as the user presses the Enter key, the user is
example, the user mini would type the following prompted to enter the contents of the file. By pressing
command to list the contents of his current directory- $ Ctrl + D keys after typing the data the command line is
ℓs terminated simultaneously. (Fig. 2.64)
M1R5 56 YCT
Search on TG: @apna_pdf
Listing the contents of a file (Cat)– To list the
contents of a file, use the Cat command to list its Deleting Files (rm) - Use of command to remove or
contents. After this the name of the file is written delete a file. The rm command is similar to the DEL
whereas in DOS TYPE command was used for this. For command used in DOS. For example, use the $ rm >
example, "$ Cat January" command is used to list the March Enter command to delete the March file.
contents of January file. ■ Same as Cp command, the option should be used
By entering the absolute path name of the file, it can with rm to prompt the user for confirmation before
also be displayed in other directory. To display more the system deletes a file. To delete a directory, it is
than one file by the Cat command, their names are used with the option of rm command.
written separately from each space. As– $ rm – r accounts Enter
Example: $ Cat January February Enter The above command will delete the accounts
The above command displays the contents of two directory. In this option means Recursive deletion.
files on two separate lines. Create and display the ■ The rmdir command only removes empty directories
contents of files using the cat command may go. (Fig. while rm-r deletes a directory whether it is empty or
2.64) not.
In the above picture directory east could not be
deleted by rmdir but it was deleted by rm-r
command.
M1R5 58 YCT
Search on TG: @apna_pdf
4. Which of the following allows you to view and 8. Which of the following is not true about
change system settings? computer files?
(a) My Computer (b) Windows Explorer (a) They are a collection of data saved in a storage
(c) Control Panel (d) Recycle Bin medium.
Ans.(c) Control Panel is a group of many programs (b) Every file has a name.
which is used for hardware, font setting, system and (c) The user gives an extension to specify the date
security setting, network and internet setting, user it was created.
account setting. This is an option in which all the (d) Files generally contain data.
methods of controlling the software or system are
present. Window settings and changes can be using Ans.(c) Files are required to keep data programs,
Control Panel functions. software etc. safe in the computer. Data files are
5. Which of the following button is used to reduce prepared with the help of any software. Usually files
the size of any window? contain data. For this reason, they are also called
(a) Minimize document files. Each file has a name and they are a
(b) Maximize collection of data saved in a storage medium.
(c) Close button 9. Both GUI and CUI properties are present in the
(d) Restore button operating system.
(a) WINDOWS
Ans.(d) Restore button is used to reduce the size of
any window. This button is just another form of the (b) MS-DOS
Maximize button available on the title bar. The (c) LINUX
window is enlarged according to the screen by the (d) SUN
Maximize button and the Restore button is used to
Ans.(a) Windows is a graphical user interface
bring back the maximized window to its previous size.
operating system developed by Microsoft. In this the
6. The full form of GUI is. shortcomings of MS-DOS were kept in mind and it
(a) Graphical User Interface
was made user friendly. Windows is 32/64 bit multi
(b) Graphical User Interface tasking operating software released by Microsoft
(c) Great User Interface company such as-windows 95, windows-98. Windows
(d) None of the above ME, Windows XP, Windows Vista, Windows-7,
Ans.(a) The full form of GUI is Graphical User Windows 10 etc. Windows operating systems have
Interface. In Graphical user interface (GUI) both GUI and CUI features. Windows 3.0 was
Commands is represented by small pictures called released in 1990 to address the shortcomings of MS-
icons. In this, the user does not need to remember DOS. Later, some revised versions of it were
various commands. The user can get the commands published from time to time.
executed by pointing or clicking on the command 10. What does "Sleep" mean in Windows 10?
objects displayed through the icons, menus, windows (a) Restarting the computer in safe mode
present on the screen.
(b) Restarting the computer in sleep mode
7. ...........The list includes programs that perform
(c) Shutting down the computer by closing all
various tasks commonly required on a computer.
running applications.
Most of these programs are installed with
Windows 10 such as notepad, spinning tool, quick (d) Shutting down the computer without closing the
assist and wordpad: running applications.
(a) Helper programs Ans.(d) You can set power off time for both battery
(b) Nesties and power plugging mode by adjusting power and
(c) Utilities sleep setting for your PC and similarly you can set
(d) Windows Accessories sleep time when your PC is on battery or plugged in.
Ans.(d) Windows 10 provides some formatting utility 11. Which of the following is responsible for
software packages such as disk formatting, disk clean searching and loading the operating system into
up backup program, calculator, notepad, paint etc. RAM?
These are used to simplify the work of the computer, (a) Bootstrap loader
to keep it away from errors and to maintain the (b) CMOS
various functions of the system software designed for (c) DMOS
security purposes. (d) BIOS
M1R5 59 YCT
Search on TG: @apna_pdf
Ans.(a) A bootstrap loader is the program that Ans.(d) When the user starts the computer, the CPU
initializes the operating system by searching it in and BIOS scan computer together. In which the
RAM during startup. It is the process of loading a set computer finds out which devices are connected to the
of instructions when a computer is first turned on or motherboard and working properly or not. In this,
booted. Bootstrap operating allows programs to be RAM, display, hard disk etc. are checked; this process
loaded to start the system. is called POST (Power on self test). Load the basic
12. Which of the following command is used to elements of the operating system into its main
memory. The process of starting the computer by
rename a file?
doing this is called booting.
(a) Not
(b) Rename 16. Not a part of operating system:
(a) Linker (b) Booting loader
(c) Both (a) and (b)
(c) BIOS (d) Supervisor
(d) All of the above
Ans.(d) Linux operating system is mainly divided into
Ans.(b) On saving a file created by the user, that file
three parts – Kernel, System Library and System
is saved with the default name by the computer
Utility. Kernel is the main part of Linux operating
system. Users can rename the file according to their system and it is responsible for all the main activities
own preferences by changing the default name. of Linux. System libraries are special functions or
Rename to change the file name command is used. programs with the help of which various application
13. What is the meaning of OSI in the context of programs of Linux use the features of the kernel. A
computer? system utility program is responsible for performing a
(a) Open Software Interrelation specific task.
(b) Open System Intrarelation 17. Linux is:
(c) Open Software Interconnection (a) Application software
(d) Open system interconnection (b) System software
Ans.(d) The full form of OSI is Open System (c) (a) and (b) Both
Interconnection. It was developed by ISO (d) none of these
(International Organization for Standardization) in Ans.(b) Linux operating system is a multi user, multi
1978 and the OSI model consists of 7 layers. It is a tasking and multi processing software designed for
reference model for communication between two personal computers. It is a freely available open
users in a network. OSI model has 7 layers application source operating system developed for network use.
layer, transport layer network layer, data link layer, The first version was brought out by Lines Benedict
presentation layer, session layer and physical layer. Torvalds in 1991. Linux is a 32 bit operating system.
The OSI model describes how data or information is It includes most of the features of all other operating
sent or received over a network is in this, all the layers systems, not just Unix. All versions of Linux are
have their own separate work so that data can easily distributed free of charge via the Internet. Red Hat,
reach from one system to another. Ubuntu and Chromium etc. are Linux based operating
14. Operating systems and utility programs belong to systems.
the class of software known as. 18. Ubuntu........ is an operating system available for:
(a) Application software (a) PC (b) mobile
(b) System software (c) both (a) and (b) (d) none of these
(c) Software suites Ans.(c) Ubuntu is also an operating system like
(d) BIOS software Microsoft Windows which is available for personal
computers, devices, mobile phones and Available for
Ans.(b) System software is such software which is
free on the server. This system has been developed by
written to run the computer, control it, take care of its Canonical Limited, a UK based company. All the
various parts and make good use of all its capabilities. principles used to develop Ubuntu software are based
Our communication system with the computer is on the principles of open source software
possible only through software. System software development. Ubuntu also includes a lot of other
includes programs that control the computer system software. Starting with Linux kernel versions 4.15 and
and makes proper coordination between its different GNOME 3.28, it covers virtually every standard
parts. desktop application, from word processing and
15. The process of making the computer functional spreadsheet applications to Internet access
after the light is on is called. applications, web server software, email software
(a) Application (b) System programming languages, various tools, and many
(c) Strap (d) Booting computer games.
M1R5 60 YCT
Search on TG: @apna_pdf
19. Taskbar is available in Windows screen: Ans.(a) Operating system is the main type of system
(a) Top (b) Bottom software which controls the working of the computer,
(c) Left (d) Right it's not possible to run the computer without operating
Ans.(c) The taskbar is located at the bottom of the system. The operating system is the first program that
Windows screen. The Windows 10 taskbar contains runs after the computer is switched on is loaded into
icons for the Start Menu, the cortana search box, Task the computer's memory.
View, Microsoft Edge, Documents, Sound, Battery 25. Which of the following shortcut key is used to
Life, System Language, Notifications, Date and Time, open the Run program window?
etc. On Windows, the current active programs are also (a) Ctrl + R (b) Alt+R
displayed on the taskbar as icons. (c) Win+R (d) Ctrl + Shift + R
20. Linux GREP command is used– Ans.(c) The Win + R shortcut key combination is used
(a) Searching for a particular line to open the Run program window.
(b) Creating a new file 26. Which of the following is not based on Unix?
(c) Delete the already created file (a) Mac OS (b) Fedora
(d) Serving the file path (c) MS-DOS (d) Android
Ans. (a) The full form of GREP command is Globally Ans.(c) M.S. DOS is a non-graphical command line
Search Regular Expression and Print. It is used to operating system while Mac OS, Fedora and Android
search for files that contain a particular pattern in a are Unix based operating systems.
particular file. It prints the entire line and displays the
27. To retrieve the properties of a file DOS command
searched word in red.
is:
21. Multitasking operating system is: (a) FORMAT (b) DOSKEY
(a) windows 2000 (b) OS/2 (c) ATTRIB (d) DIR
(c) Unix (d) all of the above
Ans. (c) We can use ATTRIB command to retrieve
Ans.(d) OS can execute more than one program at a the properties of a file.
time under multitasking operating system. Almost all
operating systems of modern times support 28. Which of the following is not based on Unix?
multitasking operating systems. such as-Windows (a) Mac OS (b) Fedora
2000, OS/2, Unix, Linux etc. (c) MS-DOS (d) Android
22. What is the shortcut key for reboot? Ans.(c) M.S. DOS is a non-graphical command line
(a) Ctrl+Alt+Del (b) Ctrl+B+T operating system while Mac OS, Fedora and Android
(c) Ctrl+C (d) Ctrl+X are Unix based operating systems.
Ans.(a) To reboot a computer system means to switch 29. GUI is used to interface between:
off and on again the operating system. The (a) Hardware and software
combination of Ctrl+Alt+Del shortcut is used for (b) Man and machine
reboot. Use Reboot to fix device hangs, while (c) Software and user
installing apps, this is done when updating the (d) None of these
operating system. Ans.(c) In Graphical User Interface (GUI), many
23. The shortcut to open the start menu is: commands are represented by the computer operating
(a) Window logo system through thumbnails. Those are called icons. In
(b) Window logo + @ this, the user does not need to keep following various
(c) Window logo + M commands. The user can get the commands executed
(d) Window logo + F by pointing or clicking on the command objects
displayed through the icons, menus, windows present
Ans. (a) You can open the start menu without using
on the screen. GUI is used as an interface between the
the mouse by pressing the window logo key. The start
software and the user.
menu can also be opened by the 'Ctrl+Esc' shortcut
key. 30. Which of the following command is used to delete
an empty directory?
24. Operating system means:
(a) From (b) RD
(a) The set of programs that control the working of
(c) Erase (d) MD
the computer.
(b) The way a floppy disk drive operates. Ans.(b) RD command is used to delete an empty
(c) The way a computer operator works. directory. To use the RD command for,
(d) Converting high level language to low level Syntax– C:\>RD<DIR name>
language. Example– C:\>RD ABC
M1R5 61 YCT
Search on TG: @apna_pdf
3 WORD PROCESSING
M1R5 64 YCT
Search on TG: @apna_pdf
• Documents available in the template, as shown in Typing and editing a document– After the
the image above. LibreOffice writer document is opened, the user starts
• Create a new blank document by clicking on Select typing the text. Typed text is appended to the character
button. sequence at the cursor position and words, at the end of
the line automatically wrap the text to the next line.
Using Enter, moves the cursor to a new line.
Mistakes made during typing can be corrected by using
the Backspace key or by using the arrow keys to move
the cursor to the right place by using the Delete key. Any
change can be made at any time by editing the document.
3.5(i) Save and Save as:
Unless a document is saved to a disk, it remains only
in the main memory and destroyed forever after power
off.
To save any LibreOffice Writer document, the
following steps should be followed-
• Click on File tab → Save/Save As. Or, on pressing
Ctrl + S key, the following dialog box will be
Figure-3.6 Writer Blank Document displayed-
3.5 Opening and Closing Documents:
Apart from creating new documents, there is a need
to open previously saved documents. You can open a
document and make some other changes in it.
By doing this, you can also save it at another
location with another name.
■ To open a document which is already created in
LibreOffice Writer,
• File Menu → Open
Or, File Menu → Open remote file or press the
combination of Ctrl + O
Or, the drop-down menu of the Open icon is available
on the Standard toolbar.
Select the file by clicking on the list and open it.
Scrolling in a document– Scrolling in a document
can be done using the mouse or keyboard. Splitting a Fig - 3.7 Save As Dialog Box
document window lets you view two different parts of a • In the displayed dialog box, select the name of that
document. document in the text box in front of the File name
Scrolling through a document with the mouse– label and select its type in Save as type and click on
• If you want to scroll up one screen then click on Save button. After this, every time that file is
scroll box. opened, the file name will be displayed on the title
• If you want to scroll down one screen, click at the bar.
bottom of the scroll box. Naming a Document– The name of a file in
• To scroll up one line, click on the up scroll arrow. Windows can be up to 255 characters long. After these
• To scroll down one line, click on the down scroll dot (⋅) appears and there is a file extension of three
arrow. characters. When naming the file * ? : [ ] + = \/;< > etc.
• If you want to click left, click on the left scroll characters should not be used.
arrow. 3.5(ii) Save a Document Automatically:
• If you want to scroll right, click the right scroll LibreOffice can set and reset user data, versions, etc.
arrow. This is a special facility and saves your work in some
• To scroll to a specific page, drag the scroll button. time interval.
• To scroll left beyond the margin in Normal View, ■ To save your document automatically,
hold down the Shift key and click the left scroll • Tools→Options→Load/Save→General
arrow. • Click on Save AutoRecovery Information and set 5
It allows fast scrolling up or down the page by minutes, 10 minutes or any other time. Auto backup
clicking on the "select browse object" on the vertical option can be select to backup your work.
scroll bar and choosing the desired option.
M1R5 65 YCT
Search on TG: @apna_pdf
3.6 Using the Help:
For any kind of help related to LibreOffice Writer,
you can use Help. Help is available in LibreOffice Writer
and can be accessed by using the Help menu or the F1
key.
Figure-3.10 Selecting Exit Option in File Tab Fig-3.12 Selecting page orientation
M1R5 66 YCT
Search on TG: @apna_pdf
3.7(ii) Paper Margin and Size:
There are four types of margin available in
LibreOffice Writer– Left, Right, Top and Bottom, by
default all four margins are 2 cm. All four margins in MS
Word are 1 cm. Left and right margins can be set up to
0cm to 20.5cm this is for A4 paper size. For top and
bottom margin can be set up to from 0cm to 29.2cm.
The paper margin is set according to the paper size
used. A4 paper size is set by default, Paper width 23 cm.
and length and height 29.7cm.
■ How to set paper margin and size in LibreOffice
Writer
fig-3.14 Page Style' dialog box
• Format→ Page Style → Page tab
• With the help of above dialog box you can set paper
• Under the Margins section of the Page tab; format, orientation (portrait/landscape), layout
Left, Right, Top and Bottom margins can be set. settings.
• Click on 'Apply' and click on the OK button.
• Under the page margins section of the page tab:
3.7(iii)A. Page Layout:
Set the paper size using the Format option. In LibreOffice writer also Like MS Word, there are
two types of page orientations– Portrait (vertical, longer
than width) and Landscape (horizontal, wider than tall).
The page layout of a new text document uses the default
page style for all pages users can apply different page
styles to different pages according to their own
preferences.
■ To set the page orientation,
• Format Page
• Click on the page tab.
• Select Portrait or Landscape under Paper Format.
• Click on the OK button.
3.7(iii)B. Border:
Border is a box which surrounds the paragraph.
Borders are defined for page styles in LibreOffice
Writer. The change to the border is displayed on all
pages that use the same page style.
■ To set the border,
• Format Page→ Borders
M1R5 69 YCT
Search on TG: @apna_pdf
3.10(ii) Editing Text:
After typing some text in the document, the user can
edit it as required. Any text, sentence, word etc. can be
added to the document. To add new text, click and type
by placing the mouse pointer to the appropriate place.
All typed text will shift to the right of the cursor. A
document can also be deleted from the document.
Typing over existing text– By default, it moves the
text to the right when new characters are inserted. But by
switching to overtype mode, we can replace the existing
text character by character.
Applying Correction in the Typed Text– Delete or
Backspace is used to correct simple mistakes made
during typing. To delete multiple characters at once, first
select the text then delete it with any of the following Fig - 3.22 Selecting text using the selection bar
Selecting Text with a Mouse– Using the mouse,
key-combination– you can select a single character, a paragraph, or an
To delete Key combination entire document.
Selected text Press Backspace or ■ To select a small text with the mouse,
Delete • Double click left mouse button by moving cursor at
Characters before insertion Press Backspace the beginning of the text to be selected.
• By dragging the mouse pointer over the text in any
point
direction, you can select the desired text as per your
Characters after insertion Press Delete requirement.
point
Word before insertion Ctrl + Backspace Mouse Action Select to Text
point Double click on a word Selects a word
Word after the word Ctrl + Delete Click on the sentence by A word
insertion point pressing Ctrl key.
Table-3.1 Key combination to delete text or graphics Lines by clicking on the Single line
selection bar text the select to
■ To restore deleted text,
end up or down.
Click the Undo button on the Quick Access Tool bar Double click on selection bar A paragraph
or press the Ctrl + Z key combination. Click on the pressing Ctrl key Document
■ To replace a selection with new text, silection bar
Select Text → Type New Text. Table- 3.2 Method of text selection
The new text will replace the selected text. To Select to text using keyboard– By moving
3.10(iii) Text Selection: Insertion point to move hold down the Shift key. Text
can be selected by using any of the move keys along with
For any type of formatting on the text in the
the Shift key. Some key combinations are as follows.
document, such as moving, formatting or deleting the
Key Combiantion To Select
graphic picture, the items have to be selected. Text can
Shift + → Letters from left to right
be selected with both the mouse and keyboard. To select
Shift + ← Letters from right to left
the text with the mouse, click and drag with the mouse
Shift + ↑ Bottom to top lines
from the first character of the text while other keys are
Shift + ↓ Top bottom lines
used from the keyboard with the Shift key. Selecting a
Shift + Ctrl + ← or → A word
text highlights it and click outside the selection to cancel
Shift + Home To the beginging of a line
the selection.
Shift + End To the end of a line
■ To select text,
Ctrl + Shift + ↓ The end of a paragraph
• Place the insertion point from where you want to
Ctrl + Shift + ↑ The begining of the
select the text. paragraph
• Move the mouse pointer by holding down the left Shift + Ctrl + End To the end of the document
mouse button or by placing the insertion point at the Shift + Ctrl + Home To the begining of the
beginning of the text to be selected and holding doument
down the Shift key, click there, the selected text will Ctrl + A Full document
be displayed as shown below- Table- 3.3 Key combinations for text selection
M1R5 70 YCT
Search on TG: @apna_pdf
■ To select a distance location from the insertion Moving text– Moving means cutting the selected
point, text and transferring it to another location in the same
• Move Insertion point at the begining of the text to bedocument.
selected.
■ To move text from one location to another within
• Press F8 key to extend selection. In this mode the
word is displayed on the status bar at the bottom of the same document,
the screen. • Select the text to be cut.
Press any of the following keys. • Edit Menu → Cut
Key Combiantion To Select or Ctrl + X. The selected text will disappear from the
← or → keys Next or previous character
screen and placed on the clip board.
End key End of the line
• Place the insertion point at the place to be pasted.
Page Down key To the bottom of the next screen
Page Up key Top of the previous screen • Edit Menu → Paste
Home key Start of line In this way the selected text will be moved.
Ctrl + Home key To the begining of the document Moving and copying by Drag and Drop method–
Ctrl + End key To the end of the document If the text is to be moved within the current page of the
Table- 3.4 Selecting text from the insertion point document, then drag and drop is an easy way to do it. By
After pressing any of the above keys, finally press this method, you can move the text to a short distance,
the Esc button. only cut, copy and paste commands are used to copy or
Delelting Text– Press Backspace to delete all move more distance.
characters to the left of the insertion point in a document■ To move text graphics by drag and drop editing,
and the Delete button to delete character to the right of
the insertion point. • Select the text graphics to be moved.
This method is not suitable for deleting multple line • Pointing to the selected text graphics and holding
at once, for this select all text to be deleted at once. down the left mouse button, drag the dotted insertion
■ To delete text, point to the new location until the drag and drop
• Select the text to be deleted by pressing the left pointer is displayed as shown in Figure (3.24).
mouse button.
• Press the Delete button with the help of the • Release the mouse button to move the text to the
keyboard. new location.
3.10(iv) Cut, Copy and Paste: ■ To copy text by drag and drop editing,
With the help of copy command, the document text • Point the text to be copied and, while holding down
can be transferred to another place with the help of paste the left mouse button, drag the dotted insertion point
while remaining in place. This command does not affect
to the new location.
the original document.
■ To copy text from one location to another in the
same document,
• First select the content or text which you want to
copy.
• Edit Menu → Copy
or, Ctrl + C. copied text will be copy to the Clipboard
which is an accessory of Libre office.
M1R5 74 YCT
Search on TG: @apna_pdf
• Replace; Type the misspelled words or abbreviations 3.13(i) Paragraph Indenting:
that you want automatically correct in the text box. Indents are the white space added to a margin along
• With; Type the correct spelling or phrase in the text the margin, which is used to reduce the text area for
box. paragraphs in a document. In this, if the user sets a left
• To add these entries, click on add and then on Ok. margin of 1.0 inches, then at the time of printing the text
3.12 Using Find and Replace: will be printed at 2.0 inches from the left edge of the
With the help of Find and Replace command, you paper.
can easily edit your document. With the help of Find Once a paragraph indent is set in a document, the
command, you can search for any text and with the help same indent applies to each new paragraph until it is set
of Replace command, you can replace it. again.
Searching for text– You can search for a text or Line Spacing– The space set between two lines in a
sentence within a document by using the Find command. document is called line spacing. Following are the
■ To search for a specific text in Writer, options of line spacing available in the writer–
• Use Edit menu → Find or Ctrl + Shift + F shortcut
key. Option Description
Single Spacing No spaces between lines of text
the place is not visible.
Double Spacing A blank space appears between
lines of text.
1.5 Spacing A line space half the height of a
line space of text appears
Fig-3.36 Finding text in Writer between lines of text.
• Enter the text to search for in the dialog box that Table-3.7 Different options for line spacing
appears. Space before and after paragraphs– There is a
• Click on Find Next / Find All. spacing box in the Before Paragraph and Paragraph
Replacing text– If you find any wrong text in the dialog box to set before and after white space settings
document and want to replace the word, you can use the can be entered in Points (Pts), Inches (In), Lines (Li) or
replace command to replace it with the correct word.
■ To replace any text with other text in Writer For, Centimeters (Cm).
• Edit menu→ Find and Replace Formatting Paragraph Using Dialog Box
Launcher–
■ For formatting paragraphs,
• Place the insertion point in that paragraph or select
several at once.
• Paragraph Format Menu→ Paragraph option →
Indent & Spacing
M1R5 76 YCT
Search on TG: @apna_pdf
Sentence case
UPPER CASE
lower case
Each Word
tOGGLE cASE
M1R5 77 YCT
Search on TG: @apna_pdf
3.15 Table Manipulation: • Writer inserts an empty table as soon as you release
Information is organized in the form of rows and the mouse button.
columns in the table. Tables are used to prepare forms, ■ To create a table using the Table option in Writer,
reports and resumes etc. Tables are made up of • Place the insertion point where the table is to be
horizontal rows and vertical columns. inserted.
The boxes made by intersecting of rows and • Table → Insert table.
columns are called cells. Any cell can also contain Enter the number of rows and column which you
numbers, characters or graphics. Rows and columns can want to have in the table as shown in the above
also be inserted and deleted in the table. In this, the table picture.
can be more attractive by using border and shading • Click Ok
features. The drag and drop feature of the mouse or the Ctrl +
Concept of Table– Table Cells are made up of rows F12 shortcut key combination can be used to insert a
and columns. The user can insert characters, numbers or table into a document in Libre Office Writer. For this
graphics in the cell. Numbers in the columns of tables. follow the following steps-
Calculation is also done by aligning and sorting them. • Click on the menu available in the menu bar and
Rows– A row is a horizontal block that runs across select Insert Table.
from left to right in the document.
Column– Column is a vertical block which runs
from top to bottom through the entire document.
Cell– This is the intersecting point of the row and
column. This is the storage space of the table in which
text or graphics are stored.
M1R5 80 YCT
Search on TG: @apna_pdf
3.19 Adding Comments:
Comments are a way of making notes on a section of
a document. It helps in getting the information about the
document correctly. Follow these steps to add a comment
to a document–
• Place the cursor at the place in the document where
you want to insert the comment.
• Insert Menu → Comment
Or, press the combination of Ctrl + Alt + N
simultaneously.
• The new comment block will appear on the right
Fig-3.51 Table of Contents Index and Bibliography side of the document.
Dialog Box
iii. You can see the preview of Insert Index or Table of
Contents in the box that appears.
iv. Press the OK button to insert the Table of Contents.
Now the table of contents is automatically created
and appears with a gray background color around
the text.
3.18(ii) Editing a table of Content: Figure-3.53 Comment block
After creating the table of contents, users can also • Insert your comment in the block.
make changes in it as per their requirement. To edit the • Comment can also be removed by clicking on the
Table of Contents (Toc), follow these steps– drop down arrow.
• Right click anywhere inside the Toc. 3.20 Tracking Changes:
• Select the "Edit Table of Contents" command from
the context menu. In-built review mechanism in LibreOffice is helpful
• You can change the title of the table of contents when you're working with a document that needs to be
through the "Index or Table of Contents" tab. reviewed by multiple people. It provides all the basic
3.18(iii) Updating and Deleting the table of tracking, comments needed for an effective review. This
Contents: gives you the ability to distribute and enable track
Once the new heading is added, follow the steps changes in a document.
given below to update the table of contents– Following are the steps for track change–
• Right click on the top of the table of contents and • To initiate a track change in any document, select
Click on Update index. the Track Change option from the Edit Menu.
Or, press the key combination Ctrl + Shift + C.
Your document enters review mode.
• Whatever changes the user will make now in his
document and all changes are displayed highlight.
• The 'Manage Changes' dialog box is displayed.
Hovering over a marked change with the mouse
pointer shows a reference to the change type, author,
date and change time.
• Select Change in the List tab.
• You can insert comments on each change by placing
the cursor in the change area, for this,
Edit→Track Changes→Comment
• To stop recording changes, go to Edit Menu →
Track Changes → Record. The check mark is
removed and the document can be saved.
3.21 Macro:
Figure-3.52 Context Menu Using macro we can also record text or any task.
• Toc → Update This is very useful when there is a need to perform the
• The complete table of contents will be updated with same task over and over again. A macro is a sequence of
the title of the entire document. commands or keystrokes that can be used to perform a
• If you want to edit the styles of the Table of repeated task easily.
Contents, right click and select 'Edit Index' option To create a library to contain the macro Follow the
from context menu. steps below–
• Click on "Delete Index" to delete the Table of • Tools Menu→ Macros→ Organize Macros→ Libre
Contents. office Basic
M1R5 81 YCT
Search on TG: @apna_pdf
Ctrl + Right Arrow For move next word
Ctrl + Shift + Right Word by word to the right of the
Arrow selection
Arrow Up Move cursor up one line
Shift + Arrow Up Lines in the upward direction
Ctrl + Arrow Up Cursor to beginning of previous
paragraph to make selection
Ctrl + Shift + Arrow Select to start a paragraph
Up
Arrow Down Move the cursor down one line
Home Go to the start of the line
Home + Shift Select start of line
End Go to the end of the line
End + Shift At the end of the line while
selecting
Ctrl + Home Go to beginning of document
Figure-3.54 Creating a Macro Ctrl + Home + Shift Go to beginning of document by
selecting
• Click on Organizer to open the Basic Micro Ctrl + End Go to end of document
Organizer dialog box. Ctrl + + Calculation Options
• Select the Library tab. Ctrl + Alt + E Extension Manager
• Set the location to My Macro & Dialogs, which is Ctrl + F2 Insert field
the default location. Ctrl + F3 Auto text
Ctrl + F7 Thesaurus
• Click New to open the New Library dialog box. Ctrl + W Close the writer
• Enter a library name, for example, My Library, and Ctrl + Shift + R For Ruler (on / off)
then click Ok. Ctrl + 1, Ctrl + 2.... Heading style
• Select the Modules tab. Shift + Enter Line break
The user can expand the module list as per their Ctrl + Enter Page break
choice.
Ctrl + Left Arrow Moves the cursor to the beginning
3.22 Key Board Shortcuts: of the word.
Shortcut keys for LibreOffice Writer– Ctrl + Backsace Delete the text at the beginning of
Shor cut keys Function the word.
Ctrl + A Select all
Ctrl + N To create a new document Shift + Enter Line break
Ctrl + O To open the document Ctrl + Enter Page break
Ctrl + Shift + O Print preview Ctrl + Left Arrow Moves the cursor to the beginning
Ctrl + S To save the current document of the word.
Ctrl + Shift + S To copy or save as on other Ctrl + Backspace Delete the text at the beginning of
location the word.
Ctrl + P To print the document Ctrl + Shift + C Track change record
Ctrl + Q To exit the LibreOffice Ctrl + Shift + J Full screen
application (closing LibreOffice) Ctrl + Alt + C Comment
Ctrl + X To cut the selected item Ctrl + Shift + A Left to Right
Ctrl + V For paste to copied content Ctrl + Shift + D Right to Left
Ctrl + K Hyperlink Ctrl + F5 Side bar (show/hide)
Ctrl + Shift + V For Paste Special dialog box Shift + F11 Create style
Ctrl + Z For undo last action Ctrl + F11 Check style
Ctrl + Y For last action redo Shift + F12 Insert bullets
Ctrl + Shift + Y For action repeat
Ctrl + F To search Ctrl + F12 Insert table
Ctrl + H For search and replace F1 Libreoffice help
Ctrl + G Go to page F2 Formula bar
Ctrl + Shift + P For superscript F3 Complete auto text
Ctrl + Shift + B For subscript F4 Open data source view
Ctrl + L Left align F5 Navigator
Ctrl + R Right align F7 Spell check
Ctrl + J Justify F11 To display style
Ctrl + I Italicize selected text F12 Numbering on
Ctrl + B Bold the selected text Ctrl + Shift + F8 Ùee Block Selection Mode
Ctrl + U Underline selected text
Ctrl + D Double underline selected text Alt + Shift + F8
Ctrl + Shift + F For the last searched term Ctrl + Shift + F4 Data Source (Bibliography)
Ctrl + Shift + J For fullscreen mode and normal Ctrl + ] To increase text size
mode Ctrl + [ To decrease text size
Alt + Enter To enter a new paragraph directly
before a section or table. Shift + F3 Style case
Arrow Left To move the cursor to the left Shift + F7 Auto Spellcheck (Select Word)
Shift + Left Arrow Move the cursor to the left with Ctrl + M Clear formatting
the selection Alt + F12 Options
M1R5 82 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. To copy character formatting, Ans. (d) LibreOffice writer export files in HTML,
(a) Ctrl + Shift+C (b) Curl+Shift+V XHTML, XML, Adobe, Portable format (PDF) etc. as
(c) Ctrl + Shift+V (d) Ctrl+Shift+D well as multiple versions of microsoft word file.
Ans. (a) Ctrl + Shift + C Key combination is used to 9. To insert a table in LibreOffice Writer Shortcut
copy character formatting the color, size, font etc. of a key is–
(a) Ctrl + F2 (b) Ctrl + F12
text is called format. In character formatting, only the
(c) Ctrl + Fl (d) Ctrl + F10
formatting of words is set.
Ans. (b). Information is arranged in the form of rows
2. 'Shrink to fit' is an option to fit the full content of and columns in a table. Tables are used to prepare
the page– forms, reports and resumes etc. Tables are made up of
(a) Before print (b) Inside the print horizontal rows and vertical columns. Inserting a table
(c) below print (d) above the print can be done using the Ctrl + F12 shortcut key in
Ans. (a) Before printing a document, Shrink to fit LibreOffice Writer.
option is used to completely contain the contents of 10. For double underline in LibreOffice Writer
the page. Shortcut key is–
3. The key used to subscript text in LibreOffice (a) Ctrl + Shift + D (b) Ctrl + D
Writer is– (c) Ctrl + U (d) Ctrl + Shift + U
(a) Ctrl + P (b) Ctrl + Shift + B Ans. (b) While working in libreOffice writer, if you
(c) Ctrl + O (d) Ctrl + M want to highlight a text through double underline, Ctrl
Ans. (b) The combination of Ctrl + Shift + B shortcut + D shortcut is used.
key is used to subscript the text in LibreOffice Writer. 11. Shortcut to Exit LibreOffice Writer is it–
Subscripts appear at or below the baseline. In this, all (a) Ctrl + Q (b) Ctrl + W
the remaining characters appear relatively large. (c) Ctrl + T (d) None of these
4. Numerical list can be prepared in ......... – Ans. (a) by using Ctrl + Q shortcut key LibreOffice
(a) Arabic numerals Writer can be closed.
(b) Roman number
(c) Alphabetical order 12. The file extension for the template in LibreOffice
(d) all of the above Writer is–
(a) ⋅ott (b) ⋅ods
Ans. (d). Arabic numerals, Roman numerals, small or
(c) ⋅ppt (d) ⋅doc
capital alphabet order can be used to make a list in
Writer document. Ans. (a) A template is a pre-made format of a
document in which the necessary rules for the format
5. Print dialog box opens– or preparation of a document are given. Selecting a
(a) Ctrl + P (b) Ctrl + V
template applies all those rules to that document. For
(c) Ctrl + A (d) Ctrl + I
example, font, color, background, style, table, text box
Ans. (a) A document is printed to be presented as a etc. are already set in the template. User only needs to
hard copy. The shortcut key combination Ctrl+P opens insert their own data are. The template file extension
the Print dialog box. in LibreOffice Writer is ⋅ott.
6. The minimum zoom percentage in a LibreOffice 13. Elements can be added to a Writer
writer is– document.........–
(a) 40% (b) 30% (a) Image (b) Chart
(c) 20% (d) 10% (c) Special character (d) All of the above
Ans. (c). The minimum zoom in a LibreOffice writer Ans. (d) All the elements such as image, shape,
is 20% and the maximum zoom percentage is 600%. object, chart, symbol, special character, table, header
The zoom slider is on the right side of the title bar. It and footer, page number, column and word art etc. can
is used to increase or decrease the zoom size of the be added in LibreOffice Writer document.
page.
14. Which option is used to save a file for online use–
7. LibreOffice works on …………… operating (a) Save (b) save as
system. (c) save remote (d) Save as PDF
(a) Windows (b) Apple Ans. (c) There is a save remote option in the file menu
(c) Linux (d) All of the above of the libreOffice writer. Saving a document created in
Ans. (d) LibreOffice works on all types of GUI based LibreOffice as an online file on a server such as
operating systems such as Microsoft Windows, Linux, Google Drive, One Drive etc. is Save Remote and
Apple, Mac OS etc. opening it is called Open Remote.
8. In which version, LibreOffice Writer can export 15. In which menu is the digital signature option
file?. available?
(a) HTML (b) XML (a) File (b) Edit
(c) PDF (d) All of the above (c) View (d) Format
M1R5 83 YCT
Search on TG: @apna_pdf
Ans. (a) Digital signature option is available in the 23. The key combination is used to select a line from
File menu of LibreOffice Writer. Electronically the beginning in a LibreOffice writer–
signed, document is called digital signature. This icon (a) Home + Shift (b) Ctrl+ Home
is displayed if the document is digitally signed, (c) Alt + Home (d) Shift + C
otherwise it is blank. Double click on this icon to view Ans. (c) While working on the document in
the certificate. LibreOffice Writer, if you want to select the text from
16. Which combination is used to cut text from a the beginning of the line, the Home + Shift shortcut
document– key is used for this.
(a) Ctrl + V (b) Ctrl + C 24. To break the line in LibreOffice Writer, the
(c) Ctrl + A (d) Ctrl+ X shortcut key is used–
Ans. (d) 'Cut' option is used to move any text from (a) Ctrl + M (b) Ctrl+P
one place to another in the document. For this Ctrl + X (c) Shift + Enter (d) Ctrl + O
shortcut key is used. Ans. (c) You can go to the next line without creating a
17. Which of the following file extension is not new paragraph by using the line break option. The
associated with Open Office Writer? Shift + Enter key combination is used to break a line
(a) ⋅ods (b) ⋅odt in LibreOffice Writer
(c) ⋅rtf (d) ⋅doc 25. The shortcut key used to left align the text in
Ans. (c) ⋅txt, doc and sxw file extensions are LibreOffice Writer is–
associated with Open Office Writer .doc is related to (a) Ctrl+ M (b) Ctrl+P
MS Word. A file extension is an identifier placed at (c) Ctrl+L (d) Ctrl+O
the end of a computer file name. File extensions are Ans. (c) On which side and how much space should
used by the operating system to determine in which be left before typing text in a document is called
app the file will display best when opened. alignment. When we start typing text leaving space on
18. What is the A series standard paper size the left side, it is called left alignment. For this, Ctrl +
supported by most printers? L shortcut key is used.
(a) Al (b) A2 26. The minimum font size in LibreOffice Writer is–
(c) A3 (d) A4 (a) 6 (b) 3
Ans. (d) A4, A4, A5, Letter, Legal, Custom etc. paper (c) 1 (d) 0
sizes are available in word processing. A4 paper size is Ans. (a) Computer font is also called type case. This
supported by most printers. is the way of writing different types of words in the
19. The key combination to insert page break in computer. The minimum font size in LibreOffice
LibreOffice Writer is– Writer is 6.
(a) Shift + A (b) Tab 27. Exiting the Application in LibreOffice Writer
(c) Ctrl + Enter (d) Ctrl+C which shortcut key is used–
Ans. (c) Using the page break option, you can go to (a) Ctrl + O (b) Ctrl+T
the next page even before reaching the end of the (c) Ctrl + F1 (d) Ctrl+ Q
page. For this, the combination of Ctrl + Enter Ans. (d) When the user has finished working on an
shortcut is used in LibreOffice Writer. application, the key combination Ctrl + Q is used to
20. In a LibreOffice Writer document usually what is exit that application.
Margin? 28. What is the shortcut key for redo in Writer?
(a) 0.5 (b) 0 (a) Ctrl + Z (b) Ctrl+Y
(c) 1.5 (d) 1 (c) Ctrl+R (d) Ctrl + Shift + R
Ans. (d) The untyped or empty space around the Ans. (b) By using redo command user can get back
document page is called margin. LibreOffice Writer their deleted text. The combination of Ctrl + Y is used
documents usually have margins of 1. for this in Writer.
21. Under which menu in LibreOffice Writer mail or 29. How many menus are there in LibreOffice
letter wizard found? Writer?
(a) format (b) file (a) 11 (b) 10
(c) tools (d) insert (c) 7 (d) 8
Ans. (c) Wizard is such a facility which provides step- Ans. (a) Where the functions are found in LibreOffice
by-step guidance to do any work, by which any work Writer are categorized by the menu bar. LibreOffice
Writer has 11 menus. File, Edit, View, Insert, Format
can be done easily. LibreOffice Writer's Under the
Styles, Table, Form, Tools, Window and Help.
Tools menu provides Mail or Letter Wizard option.
30. Which shortcut key is used to add bullet list in
22. Which function is used for spell check is? LibreOffice Writer?
(a) F7 (b) Ctrl+C (a) Shift + F12 (b) F12
(c) Shift + C (d) Ctrl + F7 (c) Ctrl + F12 (d) none of these
Ans. (a) The spelling and grammar option is an Ans. (a) Bullet option is used to arrange any subject
important tool for users with little knowledge of matter in a sequence. Bullet list can be added in
English. Spelling check is done using the shortcut key LibreOffice Writer by using Shift + F12 (key)
Ctrl + F7. combination.
M1R5 84 YCT
Search on TG: @apna_pdf
4 SPREAD
SPREAD SHEET
SHEET
M1R5 85 YCT
Search on TG: @apna_pdf
Title Bar– The title bar is located at the top of the ⇒ The facility of clear viewing is available for any part
spreadsheet. Where the name of the spreadsheet is of the entire sheet. Calculations can be done easily
displayed when a user creates a spreadsheet from a with the help of formulas in worksheets.
template or blank document, the name of the spreadsheet Importance of electronic spreadsheet–
is displayed as Untitled. Spreadsheet is used to calculate tax, number and formula
Menu Bar– The commands in the available tabs are etc. This software is essential for many businesses that
arranged in logical groups in menu bar. have to keep track of income-expenditure, plan budget,
• File– It stores the commands applicable to the entire chart data. Data can be easily saved and edited in an
document. Such as- Open, Save, Wizards, Export as electronic spreadsheet. You can use this software by
PDF, Print, Digital Signatures etc. installing it on your computer. Many websites have the
option of using an online spreadsheet.
• Edit– Commands are available to edit the document,
such as Undo, Copy, Redo Cut, Paste, Paste Special, 4.2 Creation of Spreadsheets:
Find, Find & Replace etc. Opening LibreOffice Calc displays a new
spreadsheet document file with a grid made up of
• View– Commands are available for editing the Calc columns and rows.
user interface, such as Normal, Page Break,
New workbooks can be created based on pre-
Toolbars, Formula Bar, Status Bar, Split Window,
existing or template workbooks.
Show Formula, Freeze Cells, Side Bar, Styles
■ To create a new workbook in LibreOffice Calc,
Gallery, Navigator, Zoom Full Screen etc.
• Open the LibreOffice.
• Insert– It Contains commands related to the
insertion of other elements in a spreadsheet. Such • File Menu → New → Spreadsheet
as- Image, Chart, Pivot Table, Media, Object, Shape, Or, you can open a new Calc spreadsheet in a new
Function, Text Box, Comment, Date, Time etc. window by pressing the combination of Ctrl + N.
• Format– It Contains commands related to 4.3 Concept of Cell Address [Row and Column]
modifying the layout of a spreadsheet. Such as- and Selecting a Cell:
Text, Spacing, Align Cells, Rows, Columns, Page, Inserts the value or data in the cell. This cell is made
Anchor etc. up of rows and columns. Cells are made up of horizontal
• Styles– In this, the styles related to the spreadsheet lines which is name as row. From these and the
are available. Such as- Default, Accent 1, Good, intersection of the columns, a cell is formed. To
Bad, Neutral etc. represent the address of a cell, its column alphabet and
then use the row number.
• Sheet– Most commonly used commands for table Such as- B3, C4, etc.
handlings are available in this. Such as- Insert Cells,
Insert Rows, Insert Columns, Delete Rows/Cells /
Columns, Fill Cells, Clear Cells etc.
• Data– In this, commands related to data
manipulation are available in the spreadsheet. Such
as- Sort, Auto Filter, Define Range, Pivot Table,
Calculate, Validity, Form etc.
• Tools– Commands are available for the display
window Such as- New Window, Close Window etc.
• Help– It contains links to the LibreOffice Help
system and various other functions. Such as- Libre
Office Help, License Information, Send Feedback,
Show Tip-of-the-Day etc.
Status bar– The status bar displays information at
the bottom of the LibreOffice Calc window. About
current working command and active worksheet etc.
Features and Significance of electronic
Spreadsheet– Each spreadsheet is a group of many cells, Figure-4.3 Addressing of Cells
which are arranged in rows and columns. Calc is a
spreadsheet program for Office with the help of which In the above picture alphabet B is column name and
users can store and manipulate data. 3 is Row number, B3 is a address of the cell.
Features of electronic spreadsheet– Constant Value– This value is a type of data which
⇒ In this, the data can be easily edited in less time. is typed directly in the cell and can be changed only by
⇒ Printing copies of sheets is very easy and editing them. This value can be text, number, fraction
convenient. etc.
M1R5 86 YCT
Search on TG: @apna_pdf
Formulas– Formulas always begin with an equal
sign (=) which is sequence of values, names, operators or
functions entered into a cell, using which a new value is
obtained, changing the values used in formula it changes
in the worksheet
Calc helps to perform calculations on numerical
data. If you want to extract the sum of some data, then
you can use either a formula or a function.
The formula to find the sum of numbers from cell
address B1 to B8 will be like this,
= B1 + B2 + B3 + B4 + B6 + B7 + B8 Figure-4.5 Selecting cell range
A function is a shortcut to a formula, such as the • On releasing the mouse button, that cell will
function used to calculate numbers from B1 to B8 will be continue to be displayed until another cell is selected
like this, in the worksheet is done.
= Sum (B1:B8) Cell Referencing– Each cell in the worksheet has a
Writing a function is relatively easier than a unique address by which a cell is referred. When the user
formula. references a cell address in a formula, LibreOffice Calc
reads the value of that cell address.
Formulas Using Cell Addresses– When using a Cell referencing can be done in three ways in
formula in a spreadsheet, the address of the cell can be LibreOffice Calc–
used instead of the value, which can be highlighted and
included in the cell. In a formula, cell addresses are used i. Relative cell referencing– When we copy a formula
with numbers, functions and mathematical operators. For from one cell to another, Calc automatically adjusts
example, To multiply the value in A17 by C20, type each cell reference in the formula. In this type of cell
address, first the letter of the column then the
following formula, number of the row is entered. Such as- A1 B5, D6
= A17 * C20 etc.
It provides calculations in a preset order when ii. Absolute cell referencing– In this, when copying a
multiple formulas are used together in Calc. formula from one cell to another, the reference of
Selecting a cell– To input or edit cell content, it is the cell address given in the formula does not
necessary to select the cell first. change.
To make any cell address absolute, one dollar sign is
To select a cell, put before the column letter and Row number of that
• Click on a cell. In the picture given below, cell B3 is cell address, Such as - $A$2, $B$9 etc.
selected. When a cell is selected, a border is created iii. Mixed cell referencing– Any cell address has two
around it. The selected cell remains selected until parts, one column letter and the other Row number.
you click another cell in the worksheet By keeping any one part of the cell address relative
and the other part absolute, the reference of that cell
gets mixed. Such as- $A1 and A$1, $D6 and D$6
etc.
4.4 To Enter Text, Numbers and Data in a
Worksheet:
Follow these steps to insert the data in Calc–
⇒ Select the cell in which you want to enter data.
When selected, that cell becomes active and gets
displayed with a dark colored border.
■ To enter a number,
• Select cell → Type Number → Enter key
When a number is entered as text, it displays the #
sign if the cell is not wide enough to display the
number.
• Integer 236, Decimal Fraction 256.45, Integer
Fraction 21/2 etc. can be entered in a cell. Fig – 4.7 Creating text in a cell
M1R5 88 YCT
Search on TG: @apna_pdf
4.5 Page Setup: ■ To select the page order details, etc., to be used
Under page setup, page margin, orientation, size, when printing a spreadsheet in calc.
etc. settings of the Calc document are done. Page is setup • Format→Page→Sheet tab→Select options→Ok
according to the printer and paper, before printing a
worksheet.
Set margin from Margin tab of page setup and select
headers, footers, print area etc. Available in Margin tab
the options are as follows–
Top: It sets margin between printed data and the top
edge of the page.
Bottom: It sets the margin between the bottom edge
of the page and the printed data on the page.
Left: It sets the margin between the left edge of the
page and the data printed on the page.
Right: It sets the margin between the right edge of
the page and the printed data in the page.
Fig- 4.8 Style dialog box with page tab in Calc Figure 4.10 Print range in Calc
Now you can set page margins by selecting the tab
of the Page Style dialog box. • Page break lines are displayed on the screen.
■ You can define borders, background, header footer • Now you can check the print range by,
etc. in your spreadsheet only through the Page Style Format → Print preview.
dialog box. • LibreOffice will display print ranges in separate
pages.
4.6 Printing a Worksheet:
• You can also remove print ranges using,
To print an open worksheet, select the Print option Format → Print Ranges → Remove / Clear.
from Backstage View or Print Preview from the Quick • You can print the spreadsheet using the Print option
Access Toolbar and click on the Print button. of the File menu.
M1R5 89 YCT
Search on TG: @apna_pdf
4.7 Saving a Workbook: • To open CSV (Comma Separated Values) files,
■ You can save the spreadsheet in the LibreOffice calc select open command from file menu. It is a text file
in the following way– whose extension is CSV.
• Click the Save icon on the Standard toolbar. • Some CSV files also have the extension txt.
Or, use the Ctrl + S shortcut key combination. Closing a workbook window– If the user wants to
Or, File Save / Save to remote server / Save a close a workbook after making some changes to it, Calc
copy/Save all. displays an alert box asking the user to agree that they
• Type a name for the file in File Name. want to save their work or not.
• Select the file format by clicking on the drop down
menu in Save as Type.
• Click on the Save button.
M1R5 91 YCT
Search on TG: @apna_pdf
Cell Styles– Some cell styles are already available
in Calc. You can also design the cell style according to
your choice.
■ To apply cell style in LibreOffice Calc,
• Select the cells to which you want to apply the cell
style.
• You can select the cell style according to you by
clicking on Styles in the menu bar.
Fig - 4.17 Cell Style Options Fig - 4.19 Selecting the content to cut
• It displays the new style by replacing the old cell Or, press Ctrl + X keys together or you can also select
style. the Cut command by right clicking on the cell
Text Alignment– By default in Calc, the entered selection.
text in the cell is bottom left aligned. You can also align • Now click on the cell where you want to move and
your cell content as per your wish. paste those cells.
■ To align text in Calc, • Select Paste from the Ctrl + V keys or Clip Board
• Select the cells whose content you want to align, group. The cell content will be pasted.
Format → Align → Left/Center/Right/Justified.
• For vertical alignment,
Format → Align → Top/Center/Bottom.
M1R5 92 YCT
Search on TG: @apna_pdf
■ To use Paste Special feature in LibreOffice Calc,
• Select the cells.
• Edit → Paste Special
M1R5 93 YCT
Search on TG: @apna_pdf
• Click on the Ok button. This will replace the Keys Function
selected range with an empty cell and the cells This clears selected content
affected by it will be deleted and arrange according Delete like the Clear command on
to the setting. the Edit menu.
■ To insert Row or column, Backspace Activates and clears the
• Select the same number of columns or rows where contents of the formula bar.
you want to insert new rows or columns. Ctrl + Backspace By repositioning this
• Sheet → Insert Rows/ Columns worksheet displays the active
This will add as many empty rows or columns at that cell.
place and fill the data in all the columns ahead of that It cuts the selected contents
column is shifted to the right. Ctrl + X just like the cut command of
Deleting Cells, Rows, or Columns– You can delete the Edit menu, for pasting.
cells, rows, or columns from a Calc worksheet. It copies the selected contents
■ To delete cells, rows or columns in Calc, Ctrl + C to paste like the copy
• Select the cells, rows or columns you want to delete. command of the Edit menu.
• Sheet → Delete Cells / Rows / Columns. It paste the selected cell
• This displays the Delete dialog box. Ctrl + V content like the Paste
command of the Edit menu.
Ctrl + Z This is a shortcut to the undo
command on the Edit menu.
4.14 Changing Cell Height and Width:
According to the data in a worksheet, the height and
width of the cell have to be changed so that maximum
data can be fitted in the same sheet. If required, hidden
data can also be hidden in the worksheet.
How to adjust column width– On entering the data
in the worksheet, if the width of the column in the cell
does not have enough space to display the data, it
displays the # character, so to display the entire content
for this, the width of the column has to be adjusted.
M1R5 95 YCT
Search on TG: @apna_pdf
M1R5 96 YCT
Search on TG: @apna_pdf
To Unfreeze Panes– • To move a cell, drag the selection to a cell in the
■ To unfreeze a row or column, upper left of the paste area. Calc replaces the data in
• View tab → windows group → Freeze panes → the pasted area.
Unfreeze panes • To copy the cell, hold down the Ctrl key while
dragging the mouse.
You can also use the fill handle to copy a formula to
an adjacent cell. Select that cell, Which contain the
formula, and then drag the fill handle over the range you
want to fill.
4.18(ii) Autosum Feature:
You can quickly sum up data in a row or column by
using the AutoSum feature in Calc. It makes calculations
easy.
■ To autosum in LibreOffice Calc,
• Select the cell in which you want to sum.
• Click on the Autosum button in Function Library.
The Sum function appears in the cell, dotted around
Fig-4.37 Unfreezing the pane
the cell range. The line is displayed that sums by
■ To unfreeze all row and columns of LibreOffice calc.
Calc, • Confirm this action by pressing Enter key, the cell
• View → Unchecked Freeze Rows & Columns. range will be totaled in the selected cell.
4.18 Formulas, Functions and Charts: 4.18(iii) Functions:
To perform many calculations from the data inserted Functions are predefined formulas that perform
in the cells of the worksheet prepared in Calc, many calculations on certain values. The values passed to the
formulas and charts are used to display the data in a function are called augments. Every function has a fixed
graphical form. With the help of function engineering number of values, such as number references, text or
calculations, financial calculations and various studies logical, that can be entered as arguments to the function.
related work can be done. Calc also uses these arguments of the function in the
same way as algebraic equations use variables.
4.18(i) Use of Formulas: There are many types of functions available in Calc.
Formulas in Calc always begin with an equal (=) In which there are Mathematical Function, Logical
sign. In these, thousands of millions of data can be Function, Statistical Function, Date and Time Function,
manipulated simultaneously by using formula. You can Financial Function etc.
use formulas to perform mathematical and logical In LibreOffice Calc also, you can open Function
calculations such as addition, subtraction, multiplication, Wizard by using Ctrl + F2 or Insert to Function–
etc. This can include the following types of data;
• Constant (Numeric & Text)
• Arithmetic, comparison, text operator functions and
parenthesis.
• cell references and names
By combining the above components the user can
calculate any result that they want to display in the
worksheet.
Copying a Formula– Moving a formula from one
cell to another, It does not change the cell reference
within the formula, but if a formula is copied, the relative
cell reference changes and the absolute cell reference
does not change.
■ To move or copy a formula,
• Select the cell that contains the formula to be moved
or copied.
• Point to the border of the selected cell. Fig-4.38 Function Wizard in Calc
M1R5 97 YCT
Search on TG: @apna_pdf
Before starting the wizard, select a cell or cell range Number– That number you want to round.
from the current sheet in which to define the formula. Num–digits– That number to digit which you want
■ SUM– It Sums up all the values in a cell or range of to round the number.
cells. • If NumDigits is greater than '0' then the number is
Syntax: SUM (Number1, Number 2 ...) you can
rounded off to a specified number of decimal places.
enter up to 30 arguments such as Number 1, Number
2 for which you want total sum or total value. • If NumDigits is '0' then the number is rounded off to
■ ROUND– This function rounds a number up to a the nearest integer.
certain number of digits (Figure-4.39) • If NumDigits is less than '0' then the number is
Syntax– ROUND (Number, Num–digits) rounded to the left of the decimal point.
M1R5 99 YCT
Search on TG: @apna_pdf
■ MIN ( )– This function returns the smallest number If number, date or text forms of numbers are taken
from a set of values. as arguments, they are counted only. Text and error
Syntax– MIN (number1 number2.......) is ignored in the argument it is a reference or array
in which There are number 1, number2. up to 30 except for then its empty cell, logical value, It count
numbers out of which you find the smallest value. only number except text value.
MIN ( ) can take numbers, empty cells, logical Example– If column J2 to 37 has the following values.
values, etc. as arguments. Value 0 is returned if there (Fig-4.41)
is no number in the Augment. For example, if cells J1 = Sales
A1:A5 contain the numbers 5.8, 17, 40 and 1, then J2 = 2/6/2015
MIN (A1 A5 ) = 1. (Fig. 4.41) J3 = 20
MIN (A1 A50 ) 0 J4 = 73,42
■ AVERAGE ( )– This function returns the average of J5 = FALSE
the function passed as argument. (Fig. 4.41) J6 = DIV/O!
Syntax– AVERAGE (number1, number2........) J17 = Blank
There can be numbers from 1 to 30 whose average COUNT (J2 : J8) = 2 (Fig-4.41)
you want to calculate. As a document, this function COUNT (J5 : J8 ) = 0
can contain numbers, names and references with COUNT (J2: J8:2) = 3
numbers.
In the Argument of this function, if there is an array ■ TODAY ( )– This function returns the current date
or reference that contains empty cells, text or logical of the system. (Fig-4.42)
values, they are not included in the function, but Syntax– TODAY ( )
cells with the value '0' are included in the function. ■ NOW ( )– This function returns the current date and
Example– If A1 A5 is named as Scores and it time of the system. (Fig. 4.41)
contains numbers 5, 8, 17, 40 and 1 then, Syntax– NOW( )
AVERAGE (A1 : A5 ) = 14.2 (Fig. 4.41) ■ DAY ( )– This function returns the day of the date
AVERAGE (Scores) = 14.2 (Scores-name of range) passed as an argument. This is as an integer between
AVERAGE (A1: A5, 9 ) = 13.33333 1 and 31 returns happens. (Fig. 4.42)
AVERAGE (A1 : A5 ) = SUM (A1: A5) COUNT Syntax– DAY (Serial–Number)
(A1: A5 ) = 14.2
■ COUNT ( )– This function counts the number of In this the Serial Number is the date of the day you
cells in a number field in a range or array of want to find. Enter this date inside Quotation Marks
numbers that contain numbers. (Fig. 4.41) is done.
Syntax– COUNT (Value 1. Value2........) Example– DAY ("27-July") = 27
It can have 30 arguments such as Value 1, Value etc. DAY ("10-Apr-1998" ) = 10
which can contain different types of data but it only AY ("11/17/2010") = 17
counts cells with numbers. DAY ("2013/11/11) = 11
Ctrl + Shift + Selects all cells from the current Shift + F11 Saves as an open template.
Arrow Keys cell to the end of a continuous Ctrl + S Save document file
range of data cells.
Ctrl + Shift + S Save (Save As)
Ctrl + Page Up It moves Left to the sheet and in
Ctrl + Enter Moves to the next line.
page preview it moves to last
print. Ctrl + Shift + O print preview
Ctrl + Page Down Moves one sheet to the right. Ctrl + Q Exit from LibreOffice.
F1 LibreOffice Help Ctrl + X Cuts the selected matter
Shift + F1 Context help Ctrl + C copies the selected matter
Ctrl + F1 It displays note connected with Ctrl + Z Undo
present cell.
Ctrl + Y Redo
Ctrl + F2 Insert function
Ctrl + Shift + Y repeat (To get back current
Shift + F2 Opens the Function Wizard. matter)
Shift + Ctrl + F2 Moves the cursor to the input Ctrl + V to paste
line.
Ctrl + Shift + V paste special
Alt + Down Increases the height of the
Ctrl + Shift + select all
Arrow current column.
Space Bar
Alt + Right Arrow Increases the width of the
Ctrl + Page Down Moves to the next sheet.
current column.
Ctrl + Shift + Tab
F4 Shows or hides the Database
Sources menu. Ctrl + Page Up / Moves to the previous sheet.
Ctrl + Shift + Tab
Shift + F5 Moves the name box of the
cursor. Shift + Space Bar Selects a row.
Ctrl + F5 show/hide sidebar
F7 Checks spelling in the current
sheet. Ctrl + Shift + J full screen
5 PRESENTATION
Figure 5.7 Save As Dialog Box Figure 5.9 Using the Table Tool
• Highlight the required column and name by
• Set the location of your file in Save As dialog box. dragging the mouse.
• Enter the name of your file in File Name. • When you release the mouse button, a table appears
• Click on the Save button. on the current slide.
■ To save a presentation using Save As command For,
Fig– 5.16 Insert Audio/Video Dialog Box • Insert the Width and Height in displayed Position
• Select File / Image / Picture from the left pane of the and Size dialog box.
dialog box and click on the Open button. • Click OK.
M1R5 113 YCT
Search on TG: @apna_pdf
■ Creating a hyperlink to link to a different slide in the
presentation,
• Hyperlinking to another file is an important tool in a
LibreOffice Impress presentation. to create a
hyperlink Follow the steps below–
• Select the inserted object on the slide that you want
to use for the hyperlink.
• Insert → Hyperlink
Or press the shortcut key combination Ctrl + K.
6 INTRODUCTION OF
INTERNET & WWW
Coverage It connects the devices in the They are bigger than local It can spread all over the world.
Area network located in a short area network but smaller
distance (about 1 km). than wide area network
connects to networks.
Distance Limited Limited Unlimited
Node Desktop desktop or mini computer Desktop
Medium Twisted pair cable, fiber optics Twisted pair cable, fiber Twisted pair cable, fibre optics,
and coaxial cable optics coaxial cable satellite for
wireless
Speed Extreme 1000 Mbps Maximum– 100 to 1000 Minimum– 10 to 100mbps
mbps.
Graphical
representation
Fig- 6.39 MAC address displayed in the property Figure- 6.42 In the details window, the MAC address
section displayed as the physical address
M1R5 139 YCT
Search on TG: @apna_pdf
IMEI– International Mobile Equipment Identity can make annotations on web pages that can be stored
(IMEI) is a unique identification number or serial with a drive but cannot save HTML pages.
number assigned to all mobile phones and smart phones. Mozilla Firefox– This is a free open source web
Usually the phone has only one IMEI number but dual browser developed by Mozilla Corporation, it can be
SIM phones have two IMEI numbers. This is a 15 digit used in Windows, Linux, Macintosh etc. operating
number which is used only to identify the device. This systems. It can also be downloaded from its official
number is used to identify legitimate devices through the website.
GSM network and steal the phone from it to others. Its Opera– Opera is a free Internet browser available
use can be prevented by the person. for mobile phones and computers. It includes features
■ To check IMEI, like tab browsing, page zooming, mouse gestures and an
• Dial *#06# from your mobile phone keypad. The integrated download manager. Opera comes with a free
IMEI number is also written on the back of the Virtual Private Network (VPN) that works on private and
battery of the mobile phone. public, free internet and protects your location from
hackers. Opera's VPN blocks your location when using
the public Internet, providing additional protection
against malware. The Opera Portable browser, available
for Windows, stores your browsing history, bookmark
extensions and other private data on a portable storage
device such as a USB drive.
Google Chrome– This is a web browser developed
by Google Company in 2008, which is becoming popular
for its fast speed and better security provisions. It is a
web browser primarily released for Microsoft Windows.
■ To open Microsoft Edge,
• Click on the Microsoft Edge icon on the taskbar.
Figure - 6.43 IMEI number
another web page using hyperlinks in the Internet • Click on the drop-down arrow of the address bar.
browser is called Web surfing. The term surfing was first • A list of the addresses you typed is displayed. Select
used by Mark McHill. When a person is surfing the the site address of your choice.
internet, he is called a surfer or net surfer. Web is the • The web page is displayed.
only way to get information about different topics on Opening a Web Page in a Tab– While browsing
the web, it is sometimes more convenient to open a web
different websites, it's called surfing.
page in a new tab than the one you are currently using.
■ Accessing the web browser,
By doing this you can do your work on one site as well
• Open Microsoft Edge from the taskbar. as other sites can open to load. You can open multiple
• The initial page of the browser is called the home pages in different tabs at the same time.
page and can be set to any page on the Internet. ■ To open a web page in a tab,
■ Typing a web page address, • Right click on the link you want to open.
• Click on the address bar. • Click on Open in New Tab.
7.0 Introduction:
E-mail is a popular feature of the Internet. It is a
cheap, fast and reliable medium of exchanging
Messages, Videos, Images, Graphics etc. It is a
client/server application that provides a routed, stored
message service between two e-mail accounts. With
modern computers connected to the Internet, users can
send e-mail from any location.
7.1 Structure of E-mail:
E-mail messages are composed of binary data, most
often in ASCII (American Standard Code for
Information Exchange).
Fig- 7.13 Setting E-mail Account Figure- 7.16 Adding an account while configuring the
The dialog box appears as shown in figure-7.14. e-mail server settings
M1R5 151 YCT
Search on TG: @apna_pdf
After the account is added, you can add multiple 7.5 Creating and Sending a New E-mail:
accounts by clicking on the Add another Account With the help of Microsoft Outlook, we can easily
button. create and send any mail. Before creating and sending
Click on the Finish button to exit the Add Account
the e-mail, the e-mail address of the message recipient
dialog box.
has to be ensured.
7.4 Mailbox:Inbox and Outbox: After logging in to the e-mail account, click on the
A mailbox is the storage area of an e-mail account
that holds received e-mail, sent e-mail, and some Compose button on the top left corner of your Gmail
additional e-mail folders. As soon as an e-mail arrives at inbox. This opens a New Message window at the bottom
the mailbox, the e-mail software automatically stores it right corner.
in the user's mailbox and stores it until the user reads it.
In this, recently received messages are at the top and
old messages are at the bottom. You can sort the message
list by clicking on any field header (From, Subject,
Recieve etc.).
The Outbox is the part of the e-mail account that
stores e-mails that have not been fully delivered. Once
done, it is moved out of the Outbox and stored in the
Sent Item.
You can view the contents of the outbox and edit
them before sending.
Editing messages in Outbox
• Click on Outbox in the Folder pane to select it.
• Double-click the message header in the message list
pane.
• An edit window is displayed and you can edit the Fig- 7.18 Selecting mail to open new message window
message in it. Insert other people's e-mail addresses into the
• After clicking on Send, it goes back to Outbox. different fields. Like–
• It prompts to connect, click on Cancel. (a) To; To whom to send the e-mail (recipient). Enter
Sending a message from outbox. that e-mail address.
• Click on the Send/Receive tab and select the (b) CC; To send the message more than one recipient,
message you want to edit. their e-mail address is written in carbon copy (CC).
• When offline it prompts the user to go online, click Under this, the person receiving the message from
on yes and then click on Connect. the mentioned e-mail address would also have this
• After clicking on the Connect button, the message is information that, who else has received this
sent to the recipient address. message.
Logging In of an E-mail account– After creating e-
(c) BCC; It is exactly the same as CC, the only
mail account, the user can sign in, that is, by opening the
e-mail account, user can see their e-mail. difference is that in (BCC) the recipient is not
For this, go to the homepage of the web site where known which other people have received this
you have your e-mail account. There will be a dialog box message apart from him.
display for Sign in, after entering your e-mail ID and (d) Subject; one-line display of the being sent message.
Password, your Gmail box will open. After successful (e) e-mail; Type the message body in the message.
login, you can view the e-mails in your inbox.
Figure- 7.25 Selected sender list of e-mail addresses Fig- 7.28 Click on the Send button.
7.7 Attaching Files with E-mail: • Click on the Send button.
We can send documents and pictures very easily by Create and Send an E-mail Message in Outlook 2010–
attaching files with the help of e-mail. • Home tab → New group → New E-mail
Open Gmail.
• Click on Compose.
• Click on the Attach button displayed as a paper clip
icon.
Fig- 7.42 WhatsApp on your mobile to scan the code Fig- 7.45 Selecting Logout
• You can logout from all computers through WhatsApp
• Open Whatsapp from your phone. mobile app by going to Whatsapp Web Screen and
• Go to Settings and click on Whatsapp Web.
clicking on "Logout from all Computers".
• Scroll down and select Scan QR Code is your phone
which asks for permission to use the camera. Allow it
as per the picture given below–
8.0 Introduction: (ii) Retail Agent– Retail agents use a digital device
Digital Financial Services provide basic financial connected to a communication infrastructure to send
services to the people at very low cost through latest and receive transaction details. It enables the
technologies. DFS (Digital Financial Services) channels customer to convert cash electronically into store
provide 24x7x365 services. Digital channels drastically value and convert store value into cash.
reduce costs for customers and service providers. (iii) Device– The customer's device can be digital like a
mobile which is a medium of transmitting data and
information or a device like payment card machines
which connects to a device like a POS terminal.
8.2 Understanding OTP (One Time
Password) and QR (Quick Response
Code):
8.2(i) One Time Password (OTP):
OTP is also known as One Time Pin. It is a string of
characters that is used only once for login or transaction.
It can be used only once with an individual name or
Figure- 8.1 Digital Financial Services
password. Many software or devices can be used to
8.1 Digital Financial Tools: generate OTP, such as personal digital assistant, mobile
Digital services are accessed with the help of digital phone etc. OTP is sent to a user's phone via SMS. This is
financial tools which include mobile and internet. Mobile a password based authentication.
phones, computers or cards are used at Point of Sale It is more secure than static passwords. These are
(POS), which connect individuals and businesses to a invalidated on every 30 or 60 seconds, which prevents
digital national payment system and enable seamless all- attackers from obtaining the secret codes and reusing
party transactions. This includes the following services– them. This code is a random series of numeric and
• All types of financial services like savings bank alphanumeric characters.
account credit, insurance etc. The information flow works in this order–
• Banks, payment providers, other financial • User enters username and password.
institutions, telecommunications companies, • The request is sent to the back-end.
financial technology startups, retailers and provider • Username and Password are matched.
of all types of financial services including other • User receives OTP through SMS.
businesses. • User logins to the site by entering OTP.
• Users of all income levels. It generates random password and does not allow
8.1(i) Key Component of Digital Financial hackers to easily guess the OTP for future reuse. It uses
random characters and symbols while generating one
Services:
time password. It uses several techniques to generate
There are three major components of any digital passwords–
financial service–
• Based on time-synchronization between the
(i) Digital Transaction Platform– It enables a authentication server and the client to provide the
customer to use a device to make payments, money password (OTPs are valid only for a short period of
transfers or conduct financial transactions time.)
electronically with a bank or any such non-bank • Using a mathematical algorithm to generate a new
institution or to support electronic value. password based on the previous password (OTPs are
Importantly, there is no contribution of cash money an effect chain and must be used in a predefined
in this. order)
M1R5 169 YCT
Search on TG: @apna_pdf
Benefits of OTP– OTP is used to keep secure our Error Correction Code (Reed Solomon Code)–
account. For example, OTP is used while using Google Read solomon codes are implemented to restore data
account, bank account, net banking or ATM etc. OTP when a portion of the QR code is missing or damaged.
acts as a security shield like the login password. For Restoration rate is at four different error correction
some reason someone knows your bank's netbanking levels.
password. Even then he cannot misuse it without OTP. Other types of information in a QR code–
8.2(ii) Quick Resoponse Code [QR]: • It contains an e-mail message with a subject and
message text. There may be a request for message
The QR code is a two-dimensional barcode created
information So that you can get reply with additional
in 1994 by the Japanese company Denso waive. This can
information and attached files.
be read by the digital device and stores the information.
• Dynamic QR Code redirects users to a webpage. It
QR codes are often used to track information about
also offers new useful features.
products. When you scan the QR Code with a webcam or
• It also includes a Geographical Location which can
mobile, the QR application takes the user to a website or
be accessed directly by scanning the QR Code from
other web content. Codes hold information in the form of the advertisement of a hotel or other.
horizontal and vertical axes. Compared to regular • Business cards include an electronic version of
barcodes, QR codes allow a large amount of raw data to contact information. Reader connects to the
be embedded. Data can be stored up to 2953 bytes in application by scanning the code.
these. The smallest element of QR code is called module.
8.3 Unified Payment Interface:
A QR code is composed of black and white module,
UPI is a system that provides multiple banking
position detection pattern, timing pattern, format
features to bank accounts in a single mobile application.
information, containing error connection level This transfers instantly money through mobile device
and available 24x7 and 365 days. It is an instant real time
payment system developed by National Payments
Corporation of India. The interface is regulated by the
Reserve Bank of India and works by making instant
money transfers between two bank accounts on a mobile
platform. In this, the user has to use only virtual address,
which is known as VPA (Virtual Payment Address).
VPA is used only to carry the transaction.
Nowadays UPI is very popular for digital payment.
UPI interface is compatible with most of the banks,
Figure- 8.2 Structure of QR code digital wallets, payment applications and apps like
Google Tez, Airtel Payment, Phonepe and Paytm.
Position detection patterns– Arranged at the three Transaction Limit– NPCI has prescribed
corners of a QR code. They indicate the direction in transaction limit for UPI transfer and also transaction
which the code prints. Code can be read from any limit per day. Currently the UPI transaction limit is per 1
direction. lakh.
Alignment Pattern– Alignment pattern is used to
locate the position, when module is displaced due to Following are the types of transactions that can be
distortion. done through UPI–
Margin– This is the blank area around the QR code. • Sending/Receiving Money; You can transfer money
Model 1 and 2 require a margin of four modules and two and receive money instantly through VPA.
modules require a Micro QR Code. • Bill Payment; You can also pay your utility and
Timing Pattern– The white and black modules are communication bills.
arranged alternately to determine the co-ordinate. • Merchant Transactions; You can shopping or movie
Format information– It contains the error ticket booking etc through the online app.
correction rate of the code and the mask pattern of the
code. Format Information is read first when the code is Following are some of the essential steps to register
decoded. on the UPI app–
M1R5 170 YCT
Search on TG: @apna_pdf
• First download the UPI application from the Google * Bill Payment,
Play App Store or the bank's website. If you try to * Balance Enquiry,
download it from the bank's website, most of the * Sending money request.
banks will send you the download link on your Non-Financial Services–
phone. * Generating OTP,
• Once you have downloaded the application, open the * Changing and Creating PIN,
app and create a profile. For registration you need to * Creating and changing virtual payment addresses,
enter some details. * Add and remove bank accounts,
• After this you have to enter the virtual ID of the * View transactions,
beneficiary and the amount you want to send. * Generating QR code,
• Once you receive the confirmation message, check * Complaint related to any transaction.
the payment details to confirm the payment. 8.4 Aadhaar Enabled Payment System:
• Then you have enter MPIN. AePs (Aadhar Enabled Payment System), provides
• You will receive a notification containing the basic financial services at low cost to access device
message 'Success' or 'Failure' of the payment. (micro ATM) arranged in an interpretable manner on low
cost access devices (cash deposit, cash widthdrawl,
Remittances). This system has been developed by the
National Payment Corporation of India through which
8.3(i) How to receive Payment Using UPI ?: Balance enquiry cash deposit etc. necessary banking
transactions are allowed to do. It allows customers to use
This will also help you understand how to accept or
their Aadhaar number to make payments by providing
decline a UPI payment request if someone sends you
Aadhaar verification at Point of Sale or Micro ATM.
from their end. For this also you need to login your
RBI has not set any limit for the transactions that
bank's UPI application–
can be through AEPS. Some banks have set a maximum
• Once you are logged in, click on the Collect Money
transaction limit of 50,000 per day.
option which displays the payment request.
The following services offered by AePS are
• Next you need to enter the virtual ID of the payee or
available in both interbank and intra bank mode–
remitter, the amount as well as the account that
• Cash Withdrawal
needs to be credited.
• Cash Deposit
• On the next screen you have to review and check the
• Balance inquiry
payment details and click on confirm.
● Aadhar to Aadhar Fund Transfer
• Request money notification is sent to the payer. He
• Mini Statement
reviews your payment request and opens his bank's
UPI app. • Best Finger Detection
• Payer may accept or decline your decision to pay 8.4(i) Features of Aadhar Enabled Payment
your accounts payment. System:
• He has to enter the MPIN to authorize the • It supports various network protocols
transaction. (CDMA/GPRS/PSTN/IP).
• Once you complete the transaction, get a notification • It facilitates delivery of government schemes like
whether the transaction is 'Success' or 'Decline'. NAREGA, social security, pension, handicapped,
• As a recipient, you will also receive text and old age pension etc. of any central or state
notification from the bank once the money is government bodies using Aadhaar verification.
credited to your account. • Aadhaar biometric based transactions.
8.3(ii) Benifits of UPI: • It autolocks when the Micro ATM is idle.
Two types of services are available to the users • Many Technology Service Providers (TSP) are
through UPI– Financial Services and Non-Financial arranged by the banks.
Services. 8.4(ii) Benifits of AePS:
Financial Services– Enables the weaker sections of the society to access
* Transfer money, economic and basic services benefits associated with
* Receive money, AePS. Following are the AEPS societies–
18. KYC means– 22. When has the symbol of Indian rupee been
recognized?
(a) Know Your Customer (a) 2009 (b) 2010
(b) Know Your Character (c) 2012 (d) 2015
(c) Both of the above
Ans. (b) The Indian rupee symbol (`) was issued by
(d) none of these
the Government of India on 15 July 2010. It is the
Ans.(a) KYC means- Know Your Customer. KYC symbolic currency symbol of the Indian Rupee, the
guidelines are used for customer identification official currency used in India.
process. This includes correct identification of account
23. PoS is–
holders, sources of income, nature of their industry,
(a) Point of sale
etc. so that banks are able to recognize the credibility (b) Picture of Sale
of their customers and give them good facilities. (c) Position of Sale
19. What is IFSC Code? (d) None of these
(a) 11 digit alphanumeric code Ans. (a) The full form of PoS is Point of Sale. Point of
(b) Indian Financial System Code sale means that the customer pays money to a
(c) both (a) and (b) merchant for receiving services or goods. After
(d) none of these receiving the payment, the merchant gives a receipt
Ans. (c) The full form of IFSC Code is Indian for that transaction. The customer can also make the
Financial System Code, which is a unique code for payment by credit or debit card.
each bank branch. It is an 11 character alphanumeric 24. What is Aadhaar seeding?
code, which is given by the Reserve Bank of India to (a) Linking Aadhaar with bank account
each branch. (b) Linking Aadhaar card with post office
9 OVERVIEW OF FUTURSKILLS
AND CYBER SECURITY
9.0 Introduction to Futureskils: ■ Nearly a century later, the emergence and expansion of
Future skills are abilities that allow individuals to electricity, gas, and oil from the 1870s onwards
solve complex problems in highly emergent contexts of represented the beginning of the Second Industrial
action in a self-organized manner and enable them to Revolution. Chemical synthesis gave us synthetic
perform successfully. They are based on cognitive, fabrics, dyes and fertilizers invention of telegraph and
motivational, voluntary, social resources, value based telephone.
and can be acquired in the learning process. ■ The second half of the 20th century saw the Third
The Future Skills Portal was launched on 19 Industrial Revolution with a new type of energy
February 2018. FutureSkills is an industry utility that (nuclear power), the rise of electronics (transistors and
helps India to upgrade skill and become a global hub for microprocessors), and the development of information
its talent in emerging technologies. Future Skills includes technology.
9 skills– Internet of Things, Big Data Analytics, Cloud ■ The fourth manufacturing technology is the trend of
Computing, Virtual Reality, Artificial Intelligence, automation and data exchange. Which includes Cyber
Social and Mobile, Blockchain Technology, 3D Printing Physical System, Industrial Internet of Things (IIOT),
/Additive Manufacturing and Robotic Process Big Data, Cloud Computing etc. Digital technology
Automation. allows new business models and value creators for
opportunities and is attainable for most developing
9.1 Industrial Revolution 4.0:
countries.
Industry 4.0 refers to a new phase in the industrial
Future skills training can help in increasing industry
revolution that focuses heavily on interconnectivity,
and employment. For which NASSCOM (National
automation, machine learning, and real-time data.
Association of Software and Service Companies) started
Industry 4.0 is also known as IIOT (Industrial Internet of
the Future Skill Portal on 19 February 2018, playing an
Things). Industry 4.0, is also known as the Fourth
important role.
Industrial Revolution (4IR), refers to a period of current
The diagram below shows the timeline of the
technology that is enabled by advanced technologies,
development of manufacturing in the industrial sector (as
such as artificial intelligence (AI), machine learning, big
in Figure 9.1). There are four design principals in
data, Internet of Things (IOT), Cyber Physical Systems,
Industry 4.0 that identifies and apply Industry 4.0
Robotics and Automation. It is often predicted that
scenarios. These principles are–
Industry 4.0 will differ from the first three industrial
revolutions because of the nature of work and its
disruptive and transformative impact on the future of
society. Industry 4.0 will blur the lines between the third
industrial revolution and the digital and organic spheres
occurring since the middle of the last century.
Technologies like cloud computing, big data and IoT
enable us to connect all production resources and allow
them to do real time conversion.
Industry 4.0 was first introduced in 2011 as
"Industry 4.0" to enhance German competitiveness in the
manufacturing industry by a group of different sectors Fig. 9.1 Timeline of development of manufacturing in
and their representatives. the industrial sector refers to ability.
■ The first industrial revolution spread from the end of Interconnection– It refers to the ability of
the 18th century to the beginning of the 19th century. machinery and related components to connect and
The invention of the steam engine and the emergence communicate with people via Internet.
of mechanization established the role of industry as the Transparency in Information– Transparency
foundation of the economic structure, spurring the operated by Industry 4.0 provides operators with useful
development of the economy and society. information needed to make appropriate decisions.
M1R5 182 YCT
Search on TG: @apna_pdf
Technical Support– It provides services, support • Sensors / devices; Sensors or devices help in collecting
and aids to the people. It focuses on the ability of cyber data from the surrounding environment and
enabled systems to physically support human resources networking to collect data. The device helps in sending
handle various tasks. data from one device to another through the network.
Decentralization of decisions– This principle refers • Connectivity; Data collected by sensors or devices is
to the ability of cyber physical systems to make their sent to the cloud infrastructure, but requires a medium
own decisions and to be as independent as possible of to sent it. For this, various mediums are used like
their function. cellular network, satellite network, Bluetooth, Wi-Fi
etc.
9.2 Introduction to Internet of Things • Data processing, when data reaches to the cloud after
[IOT]: collection, software is used for processing to stored
data.
The full form of IOT is Internet of Things. It was
developed by Kevin Ashton. It broadens the concept of • User Interface, it determines the way in which data is
the Internet. It is the connection of electronic devices presented to the end users.
containing various sensors. It is a concept that refers to Challenges of IOT–
a. Privacy
the connections between physical devices such as
b. Security
vehicles, home appliances and other objects embedded in
c. Electricity Consumption
electronics such as sensors and software refers to the d. Network Congestion
connection between these things that enables data Examples of Big Data are Stock Exchange, Social
collection and exchange etc. Media, Big Data in Education Industry, Healthcare
Industry, Public Sector, Media and Entertainment,
Banking Sector etc.
3. Provides the most software and storage on the Ans. (d) Any record available in the block chain can
Internet– be accessed by many person at a time. Blockchain
(a) Public cloud (b) Private Cloud technology is a structure that supports public records
(c) a hybrid cloud (d) none of these
known as block records in multiple databases.
Ans.(a) Cloud Computing is mainly of 3 types- Public
Cloud, Private Cloud and Hybrid Cloud 6. How many devices were estimated to be
• Public Cloud; It provides computing resources connected to the Internet of Things (IOT) by the
such as software and storage on the Internet. This year 2020?
type of cloud can be used by any person or (a) 2 million (b) 5 million
company. (c) 50 million (d) 100 million
M1R5 189 YCT
Search on TG: @apna_pdf
Ans.(d) By the year 2020, around 100 million devices Through malware, hackers can steal your information,
were estimated connected to IOT. Most of the IoT photos, videos or bank account related information.
(Internet of things) devices are made for consumer There are many reasons for malware attack on
use. computer. The biggest reason for this is the
7. The first artificial intelligence programming downloading from the internet. The more you
language was– download, could be greater the risk of malware.
(a) FORTRON (b) LISP Malware can be prevented by installing anti malware,
(c) COBOL (d) BASIC anti virus and firewall in your system.
Ans. (b) The first artificial intelligence programming 11. Cloud service provider is–
language was LISP (List Processing). It was (a) Red Hat
developed in 1995 by John McCarthy. It is a (b) VM ware
functional programming language. (c) IBM Cloud Service
(d) All of the above
8. Who is considered the discoverer of 3-D
Ans.(d) Following are some of the major cloud
printing?
service providers- Amazon web services (AWS),
(a) Charles Hull (b) Chuck Hull
Gooogle cloud platform, Red Hat, SAP, Dropbox,
(c) Hamlinson (d) none of these
Oracle cloud, Salesforce, Microsoft Azure, IBM cloud
Ans. (b) Chuck Hull is considered the discoverer of
services, Adobe creative, VM ware.
3D (3 – Dimension) printing. The first 3D printer was
12. MQTT stands for–
made in 1983 by him.
(a) MQ Transport Tool
9. The main objective of Denial of Services attack
(b) MQ Telementary Tool
is– (c) MQ Telementary Transport
(a) Block access to any service (d) None of these
(b) To access any service
Ans.(c) The full form of MQTT is MQ Telementary
(c) Discontinuation of a service
Transport. It is a protocol used in IoT. MQTT protocol
(d) None of these
is a machine to machine and Internet of Things (IoT)
Ans. (a) The main objective of a DOS (Denial of connectivity protocol.
Services) attack is to prevent users from accessing a
13. The language used for IOT analysis is–
service such as the Internet. The main purpose of a
(a) Java (b) C
DOS attack is to prevent users from accessing a
(c) Python (d) C++
service such as the Internet. In DOS attack, only a
Ans.(c) Python language is used to analyze the data
computer and an internet connection are required to
generated in IOT.
make Unavailable network or machine.
14. Which is the Big Data Framework developed by
10. Malware is–
Google?
(a) Software program
(a) Map Reduce (b) YouTube
(b) Collects sensitive information.
(c) Hive (d) All of the above
(c) Comes in computer due to downloading from
Ans. (a) Big data framework like Map reduce, Apache
internet.
Hadoop etc. has been developed by Google.
(d) All of the above.
15. Who creates the RPA process–
Ans. (d) Malware is a type of software program
(a) Robot (b) Tester
designed to harm a computer. Software is designed by
(c) User (d) Programmer
hackers to steal personal data from computers. In the
language of hackers, the term malware is used for Ans.(a) RPA is used for automating workflow,
virus, spyware, trojan, worm etc. Malware can access infrastructure, bank, office process. RPA is a software
your private files and transfer them to another device. program that runs on the end user's PC, laptop or