Computer Gr.1
Computer Gr.1
to Computers
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Types of Computers
A computer is an electronic device that manipulates information, or data. It has the abil-
ity to store, retrieve, and process data. You may already know that you can use
a computer to type documents, send email, play games, and browse the Web.
COMPUTER stands for Common Operating Machine Purposely Used for Technological
and Educational Research.
Type Specifications
PC (Personal Computer) It can hold a single user at a time and this computer system has
moderately powerful microprocessor.
Main Frame This one is also a multi-user system. The software technology is
different from minicomputer.
This an extremely fast computer used to solve problems beyond
Supercomputer human capabilities. This can execute hundreds of millions of
instructions per second.
PC (Personal Computer)
This can be defined as a small, relatively less expensive computer designed for an
individual user. PCs are driven by the microprocessor chip that enables
manufacturers to fabricate an entire CPU on one chip. Personals in businesses
keeps a personal computers for desktop publishing, word processing, accounting, ,
and for running spreadsheet and database management applications. Individuals
owing it home, use it for playing games, surfing the Internet, etc.
Workstation
It is a machine used for desktop publishing, software development, engineering
applications (CAD/CAM), and other similar types
of applications which needs a moderate amount
of execution power and relatively high quality
graphics capabilities.
Generally, UNIX and Windows NT are common operating systems for workstations.
Similar to PC, workstations can also handle single-user but are typically connected
together to form a local-area network, although they may operate as stand-alone
systems.
Minicomputer
It is a medium size, multi-processing machine capable of serving up to 250
users simultaneously.
Mainframe
This is very large sized and expensive machine capable
enough to support hundreds or even thousands of users
at a time. Mainframe performs large quantity of programs
concurrently and supports many executions of programs
simultaneously.
Supercomputer
Supercomputers are logically one of the fastest
machines currently available. These are very
expensive and are deployed for specialized
operations that require immense amount of
mathematical calculations (number crunching).
Few examples are - fluid dynamic calculations,
weather forecasting, nuclear energy research,
scientific simulations, (animated) graphics, electronic
design, and analysis of geological data (e.g. in petrochemical prospecting).
Components of Computers
All types of computers are based on the same basic logical structure and execute the
following 5 basic operations for converting raw input data into useful information for their
users.
1. Take Input: The process of feeding data and instructions to the comput-
er.
2. Store Data: Saving unprocessed/processed data and instructions so
that they are ready for processing as and when required.
3. Processing Data: Executing arithmetic and logical operations on the da-
ta provided in order to transform it into useful information.
4. Output Information: Producing useful information/results for the user,
like printed report or visual information.
Input Unit
This part of computer encapsulates devices with the help of which user feed data to the
computer. It creates an interface between the user and the computer. The input devices
transform the information into a form acceptable by the computer.
Output Unit
This part of computer encapsulates devices with the help of which user receive the
information from the computer. Output devices transform the output from computer into
a form understandable by the users.
Control Unit
This unit manages the operations of all parts of the computer but does not carry out
any calculations or comparisons or actual data processing operations.
Responsibilities of this unit are −
1. For facilitating the transfer of data and instructions among other units of a
system.
2. It manages and coordinates all the units of the system.
3. It receives the instructions from the memory, interprets them, and directs the
operation of the system.
4. It interacts with Input/output units to transfer of data/results from storage.
5. It does not performs processes or store data.
Input Devices
Some of the Commonly used input units used in a computer system are follows:
1. Keyboard
2. Mouse
3. Joy Stick
4. Light pen
5. Track Ball
6. Scanner
7. Graphic Tablet
8. Microphone
9. Magnetic Ink Card Reader (MICR)
10. Optical Character Reader (OCR)
11. Bar Code Reader
12. Optical Mark Reader (OMR)
Keyboard
Keyboard is the most basic, and very commonly
used input device which helps to input data to the
computer. The layout of the buttons in a normally
used keyboard is similar to the traditional
typewriter, but there are a few additional keys
provided by different manufacturers for performing
additional functions.
Normally available keyboards in market were of two sizes 84 keys and 101/102
keys, but now keyboards with 104 keys or 108 keys are also available for Windows
and Internet.
Following is the description of the buttons on the keyboard:
1. Typing Keys
These buttons include the letter keys (A-Z) and digit keys (09) which normally
give the same layout like typewriters.
2. Numeric Keypad
These buttons are used to input the numeric data or cursor movement.
Normally, it consists of a set of 17 keys that are laid out in the similar
configuration used by most addition machines and calculators.
3. Function Keys
The 12 function keys are provided on the keyboard which are arranged in a
row at the top of the keyboard. Each of these keys has a unique function and
is used for some specific task.
4. Control keys
These buttons are used to cursor and screen control. It also adds four
directional arrow keys. Following are also included in control keys: Home,
End, Insert, Delete, Page Up, Page Down, Control (Ctrl), Alternate (Alt),
Escape (Esc).
Mouse
It is the most commonly used pointing device. It is a
very famous cursor-control device and the earlier
versions of it was built over a small palm size box
with a round ball at its base, which tracks the
movement of the mouse and feed digital signals to
the CPU when the mouse buttons are pressed.
Currently, mouse have a sensor at bottom to detect
cursor position.
Basic versions if it has two buttons called the left and the right click button and a
wheel is present between the buttons to provide scroll function. The movement of
mouse on flat surface is used to control the position of the cursor on the display, but
it cannot be used to feed text into the system directly.
Advantages
Easy to use
Not very expensive
The cursor movement is faster than the arrow keys of the keyboard.
Joystick
Just like a mouse, Joystick is also a pointing device, which is used
to travel the cursor position on a display. It is a perpendicular stick
having a spherical ball at its both lower and upper ends. The
spherical ball connected at the circuit having sensors moves in a
socket. The joystick controller can be traversed in all directions.
The functionality of the joystick is just like a mouse. Its applications
are generally in Computer Aided Designing (CAD) and playing computer games.
Light Pen
Just like a pen, light pen is a digital pointing device. This
device is used to select an item displayed in the menu or
to draw anything on the display. It contains a photocell
and an optical sensor placed in a small tube at the tip.
When the light pen tip is travelled on the display, its
photocell sensing element calculates the screen location
and sends the digital signal to the CPU.
Track Ball
Track ball is another type of input device similar to
the mouse. It is mostly helpful with notebook or
laptop computer, instead of a mouse. It consists a
ball on the top which is half inserted and
connected to the sensors. By moving fingers on
the ball, the cursor can be moved.
Because the whole device is not moved to move the cursor, a track ball requires
less space as compared to the mouse. This device comes in different shapes like a
ball, a button, or a square.
Scanner
Scanner is another input device, which works very
much like a photocopy machine. It can be used when
some information on paper is to be transferred to the
hard disk of the computer in digital format for further
manipulation.
Scanner captures high resolution images from the source
which are then converted into a digital format that can be saved on the disk and
shared digitally. These digital images can be edited before they are printed.
Digitizer
Digitizer is also an input device which is used to convert
analog information into digital form. Using digitizer, signal
from the television or camera can be converted into a
series of numbers that could be saved in a computer hard
drive. They can be helpful with the computer to create a
picture of whatever the camera had been pointed at.
Digitizer is also called Tablet or Graphics Tablet because it transforms graphics and
pictorial data into binary inputs to the system. A special kind of graphic tablet as
digitizer is used for fine works of drawing and image related applications.
Microphone
Microphone is a very common input device used to input
sound that is then stored in a digital form.
Now a days microphones are used in almost every
industry and devices related to sound recording or
transmission.
The microphone is used for different applications like adding sound to a multimedia
presentation or for mixing music.
The format to be fed to the OCR is predefined and can’t be used like an ordinary
scanner.
OCR, unlike scanner, scans the text optically, character by character, converts them
into a machine readable digital code instead of creating high resolution images, and
stores the text on the system memory.
A flash of light from the device strikes to the surface of the object and reflects back
to the sensors present behind the source of light to collect the input.
Bar Code Reader can only scan a bar code image, converts it into an alphanumeric
value, which is then transferred to the computer that the bar code reader is
connected to.
Output Devices
Following are some of the commonly used output devices used in a computer system:
1. Monitors
2. Printer
Monitors
Monitors or Visual Display Unit (VDU), are the primary output device of a computer
system. It creates images from tiny dots, so called pixels that are arranged in a well-
defined rectangular form. The depth and sharpness of the image depends upon the
number and sized of the pixels.
There are two types of digital screen used for monitors:
1. Cathode-Ray Tube (CRT)
2. Flat-Panel Display
Printers
Printer is a very commonly used output device, which is used to print information on
paper.
There are two types of printers −
1. Impact Printers
2. Non-Impact Printers
Impact Printers
Impact printers print by hitting the characters on the ribbon containing ink, which is
then pressed on the paper.
following are the characteristics of Impact Printers −
1. Very low consumable costs
2. Very noisy
3. Useful for bulk printing due to low cost
Character Printers
Character printers are the type of printers that are capable of printing only one
character at a time.
These can be further categorized into two types:
1. Dot Matrix Printer (DMP)
2. Daisy Wheel
Daisy Wheel
Head is fixed on a wheel and pins creating characters are like petals of Daisy
(flower) that is why it is known as Daisy Wheel
Printer. These printers are commonly used for word-
processing tasks in offices that need a very less
number of letters to be sent here and there with very
nice quality.
Advantages:
More reliable than DMP
Better quality
Fonts of character can be easily changed
Disadvantages:
Slower than DMP
Noisy
More expensive than DMP
Line Printers
These printers are capable of printing one line at a time.
These are of two types −
1. Drum Printer
2. Chain Printer
Drum Printers
The head of this printer is in the shape of
drum in that is why it is known drum printer.
The printing drum surface is divided into a
number of tracks which are equivalent to the
size of the paper. For instance, if a paper is of
width of 200 characters, then the drum will
have 200 tracks. A fixed character set is
embossed on the track which cannot be
altered any means. To use a different character set, a different drum needs to be
purchased like the one with 48 character set, or 64 and 96 characters set. Single
rotation of drum containing permanent characters prints a single line. These printers
are offer fast printing speed and can print 300 to 2000 lines per minute.
Advantages:
Very high speed
Disadvantages:
Very expensive
Characters fonts cannot be changed
obsolete
Chain Printers
In this type printer, a chain consisting of character set is used, that is why it is known
as Chain Printer. The predefined-standard character set can have 48, 64, or 96
characters.
Advantages:
It is easier to change character fonts.
Different languages can be used by replacing chains with the same printer.
Disadvantages:
Noisy
Chain Printers
In this type printer, a chain consisting of character set is used, that is why it is known
as Chain Printer. The predefined-standard character set can have 48, 64, or 96
characters.
Advantages:
It is easier to change character fonts.
Different languages can be used by replacing chains with the same printer.
Disadvantages:
Noisy
Non-Impact Printers
Non-impact printers do not hit the paper with any embossed character-containing
instrument. These printers are able to print a complete page all at once, this is the
reason why they are also known as Page Printers.
Chain Printers
These are very commonly used these days and are type of non-impact page
printers. They use laser lights to charge the metallic drum in shape of characters or
objects to be printed which attracts powdered ink. Then this drum is pressed over
the page to create printed output.
Advantages
Very high speed
Very high quality output
Good graphics quality
Supports many fonts and different character
size
Disadvantages
Expensive
Produces heat
Difficult to maintain
Inkjet Printers
Inkjet printers are also very commonly used printers these days. They use ink
cartridges to print characters by spraying small drops of ink in very precise manner
onto the paper. Inkjet printers are very versatile and can produce relatively high
quality output with presentable features.
They make very less noise as compared to other printers because no hammering is
done and these have many different modes of printing. Using these printers, color
printing is also possible. Some advanced and
newer models of Inkjet printers are capable
enough to produce multiple number copies of
printing also.
Advantages
High quality printing
More reliable
Disadvantages
Expensive as the cost per page is high
Slow as compared to laser printer
Booting
Starting a computer or a computer-embedded device is called booting. Booting takes
place in two steps −
The first program or set of instructions that run when the computer is switched on is
called BIOS or Basic Input Output System. BIOS is a firmware, i.e. a piece of
software permanently programmed into the hardware.
Cold Booting − When the system is started by switching on the power supply it is
called cold booting. The next step in cold booting is loading of BIOS.
Warm Booting − When the system is already running and needs to be restarted or
rebooted, it is called warm booting. Warm booting is faster than cold booting
because BIOS is not reloaded.
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Functionalities of Computer
If we consider it in a very broad sense, any digital computer performs the following five
operations −
• Step 1 − Accepts data as input.
• Step 2 − Saves the data/instructions in its memory and utilizes them as
required.
• Step 3 − Execute the data and converts it into useful information.
• Step 4 − Provides the output.
• Step 5 − Have a control over all the above four steps.
Advantages of Computer
• High Speed
Computer is a very fast device.
It can perform calculation of very huge amount of data.
The computer has units of speed in microsecond, nanosecond, and even the
picosecond.
It can process millions of computational calculations in a fraction of seconds
unlike man who may spend many months to perform the same task.
• Accuracy
In addition to being very fast, computers are very accurate.
The calculations are 100% error free.
Computers perform all jobs with 100% accuracy provided that the input is
correct.
• Storage Capability
Memory is a very important characteristic of computers.
A computer has much more storage capacity than human beings.
It can store large amount of data.
It can store any type of data such as images, videos, text, audio, etc.
• Diligence
Unlike human beings, a computer is free from monotony, tiredness, and lack
of concentration.
Disadvantages of Computer
• No I.Q.
A computer is a machine that has no intelligence to perform any task.
Each instruction has to be given to the computer.
A computer is not capable enough to take any decision on its own.
• Dependency
It works according to the user’s instruction, thus it is entirely dependent on
humans.
• Environment
The operating environment of the computer should be dust free and suitable.
• No Feeling
Computers have no feelings or emotions.
It is not smart enough make judgment based on experience, feeling, taste,
and knowledge just like humans.
Applications
Business
• Because a computer system has a very high calculation speed, diligence, accuracy,
reliability, or versatility, it became an integrated part in all business institutions.
• Computer is very helpful in business institutions in
terms of −
1. Payroll calculations
2. Budgeting
3. Sales analysis
4. Financial forecasting
5. Managing employee database
6. Maintenance of stocks, etc.
Banking
• In present time, banking is entirely based on computers.
• Banks provide the following facilities −
Online accounting facility, which includes checking current balance, making
deposits and overdrafts, checking interest charges, shares, and trustee
records.
ATM machines which are entirely automated are making this facility simpler
for customers to deal with banks.
Insurance
• Insurance companies are handling all records and keeping them up-to-date using
computers. Entities like Insurance companies, finance houses, and stock broking
firms, etc., are using computers at very high scale for their concerns.
• Companies are keeping a database of all
customers with information showing −
1. Procedure to continue with policies
2. Starting date of the policies
3. Next due instalment of a policy
4. Maturity date
5. Interests due
6. Survival benefits
7. Bonus
Education
• The computer helps in providing a lot of facilities in the education system.
• There is a tool available on computer for the
education system known as CBE (Computer
Based Education).
• CBE has many features that can be used for the
purpose of control, delivery, and evaluation of
learning.
• Education based on computers is transforming
the way students study and in turn increasing the
graph of number of computer students.
• A lot of ways are there in which educational institutions can utilize a computer to
educate the students.
• It helps to create a centralized database which stores the performance of a student
and analysis is carried out on this basis.
Marketing
• In advertising − Using computers,
professionals working in advertising make
art and graphics, write and revise copy, and
print and disseminate ads with the purpose of
selling more products.
• Home Shopping − It is possible to shop while
sitting at home through the use of
computerized catalogues that facilitate access
to product information and allow direct entry of
orders to be filled by the customers.
Healthcare
• The use of computers have become an integral part at hospitals, labs, and
dispensaries. They are being used in
hospitals to keep the record of patients and
medicines. It also aids in scanning and
diagnosing various diseases. ECG, EEG,
ultrasounds and CT scans, etc. are also
done by computerized machines.
• Computers are used in following major fields
of health care:
1. Diagnostic System − Computers are used to collect data and identify the
cause of illness.
2. Lab-diagnostic System − All tests can be done and the reports are
prepared by computer.
3. Patient Monitoring System − These are used to check the patient's signs
for abnormality such as in Cardiac Arrest, ECG, etc.
4. Pharma Information System − Computer is used to check drug labels,
expiry dates, harmful side effects, etc.
5. Surgery − In these days, computers are also used in conducting surgery.
Engineering Design
• Computers are widely used for engineering
purpose.
• CAD (Computer Aided Design) is one of the
major areas that aids in creation and
modification of images. Some of the fields
are-
1. Structural Engineering − Needs
digital stress and strain recreation
and analysis for designing of ships, budgets, airplanes, buildings, etc.
2. Industrial Engineering − Computers deal with design, implementation, and
improvement of integrated systems of people, materials, and equipment.
3. Architectural Engineering − Systems based on computers aid in planning
towns, designing buildings, determination of a range of buildings on the sites
with the help of both 2D and 3D drawings.
Military
Computers are extensively used in defence in designing and controlling modern tanks,
missiles, weapons, etc. They also deploys computerized control systems that are used
for communication. Some areas in military where a computer has
been used are −
1. Missile Control
2. Military Communication
3. Military Operation and Planning
4. Smart Weapons
Communication
It is a process to convey a message, an idea, a picture, or speech that is received and
understood clearly and correctly by the person for whom it is meant. Some main areas
in this category are −
1. E-mail
2. Chatting
3. Usenet
4. FTP
5. Telnet
6. Video-conferencing
Government
Computers performs a very important role in services related to the government. Some
major fields in this category are −
1. Budgets
2. Sales tax department
3. Income tax department
4. Computation of male/female ratio
5. Computerization of voters lists
6. Computerization of PAN card
7. Weather forecasting
Generations of Computer
• The generations in computer terminology describes a change in technology (on
which the computer system is designed) a computer is/was being used. Basically,
the generation word was used to differentiate between various hardware
technologies. Now a days, generation encapsulates both hardware and software,
which in combination make up an entire computer system.
• There exists 5 computer generations till date. In the following list, approximate dates
against each generation has been mentioned, which are normally accepted.
• There are five main generations of computers based on their processing hardware.
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Computer Abbreviations
Abbreviations Full Form
AI Artificial Intelligence
BMP Bitmap
CD Compact Disc
E Electronic
FO Fiber Optics
GB Giga Bytes
HP Hewlett Packard
IO Input Output
IC Integrated Circuit
IE Internet Explorer
IL Intermediate Language
IP Internet Protocol
IT Information Technology
COMPUTER AWARENESS | Computer Abbreviations PAGE 7
Download Testbook
KB Kilo Bytes
MB Mega Bytes
MG Mega Bytes
MS Microsoft
OS Operating System
PC Personal Computer
PS Post Script
SW Software
TB Tera Bytes
UI User Interface
VB Visual Basic
VS Visual Studio
Image Extensions
JPEG Joint Photographic Experts Group
GIF Graphics Interchange Format,
Text Extensions
PDF Portable Document Format ( read only)
DOC Microsoft Word Document
TXT Plain Text File
RTF Rich Text Format File
FDR Final Draft Document
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Basic Key
Shortcuts Work of shortcuts
F5 Refresh contents
Ctrl + Plus Key Automatically adjust widths of all columns in Windows Explorer
Ctrl + V Paste
F1 Open help
F12 Save as
Ctrl + S Save
F5 Go to a specific cell
Ctrl + V Paste
Ctrl + D Fill
Ctrl + S Save
Ctrl + Insert the value of above cell into the current cell
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Computer Software
Software is a collection of instructions and data that tell a computer how to work. This is in contrast
to physical hardware, from which the system is built and actually performs the work. In computer
science and software engineering, computer software is all information processed by computer systems,
including programs and data. Computer software includes computer programs, libraries and related non-
executable data, such as online documentation or digital media. Computer hardware and software require
each other and neither can be realistically used on its own.
A set of instructions that achieve a single outcome are called program or procedure. Many programs
functioning together to do a task make a software.
For example, a word-processing software enables the user to create, edit and save documents. A web
browser enables the user to view and share web pages and multimedia files. There are two categories of
software −
System Software
Application Software
Utility Software
System Software
Software required to run the hardware parts of the computer and other application software are
called system software. System software acts as interface between hardware and user applications. An
interface is needed because hardware devices or machines and humans speak in different languages.
Machines understand only binary language i.e. 0 (absence of electric signal) and 1 (presence of electric signal)
while humans speak in English, French, German, Tamil, Hindi and many other languages. English is the pre-
dominant language of interacting with computers. Software is required to convert all human instructions into
machine understandable instructions. And this is exactly what system software does.
Operating System
Language Processor
Device Drivers
Operating System
System software that is responsible for functioning of all hardware parts and their interoperability to
carry out tasks successfully is called operating system (OS). OS is the first software to be loaded into
computer memory when the computer is switched on and this is called booting. OS manages a
computer’s basic functions like storing data in memory, retrieving files from storage devices, scheduling
tasks based on priority, etc.
1. MS-Windows
2. Ubuntu
3. Mac OS
4. Fedora
5. Solaris
6. Free BSD
7. Chrome OS
COMPUTER AWARENESS | Computer Software PAGE 3
Download Testbook
8. CentOS
9. Debian
10. Deepin
Language Processor
As discussed earlier, an important function of system software is to convert all user instructions into
machine understandable language. When we talk of human machine interactions, languages are of three
types −
Machine-level language − This language is nothing but a string of 0s and 1s that the machines can
understand. It is completely machine dependent.
High level language − This language uses English like statements and is completely independent of
machines. Programs written using high level languages are easy to create, read and understand.
Program written in high level programming languages like Java, C++, etc. is called source code. Set of
instructions in machine readable form is called object code or machine code. System software that
converts source code to object code is called language processor. There are three types of language
interpreters−
Interpreter − Converts high level programs into machine level program line by line.
Compiler − Converts high level programs into machine level programs at one go rather than line by line.
Device Drivers
System software that controls and monitors functioning of a specific device on computer is called device
driver. Each device like printer, scanner, microphone, speaker, etc. that needs to be attached externally
to the system has a specific driver associated with it. When you attach a new device, you need to install its
driver so that the OS knows how it needs to be managed.
Computer printers.
Graphic cards.
Modems.
Network cards.
Sound cards.
Application Software
A software that performs a single task and nothing else is called application software. Application
software are very specialized in their function and approach to solving a problem.
Application programs interact with systems software; systems software then directs computer hardware
to perform the necessary tasks.
So a spreadsheet software can only do operations with numbers and nothing else. A hospital
management software will manage hospital activities and nothing else. Here are some commonly used
application software −
Word processing
Spreadsheet
Presentation
Database management
Multimedia tools
Utility Software
Application software that assist system software in doing their work is called utility software. Thus utility
software is actually a cross between system software and application software. Examples of utility software
include −
Antivirus software
Compression tools
Backup tools
Middleware software
Middleware is software that enables one or more kinds of communication or connectivity between two
or more applications or application components in a distributed network.
Common middleware examples include database middleware, application server middleware, message-
oriented middleware, web middleware, and transaction-processing monitors.
Shareware software
Shareware software is a software that are freely distributed to users on trial basis. There is a time
limit inbuilt in the software ( for example- free for 30 days or 2 months). As the time limit gets over, it will
be deactivated. To use it after time limit, you have to pay for the software.
Users prefer shareware because of following reasons –
Winzip
Getright
Freeware software
Freeware software is a software that is available free of cost. An user can download freeware from internet
and uses it. These softwares do not provide any freedom of modifying, sharing and studying the program as
in open source software. Freeware is closed source.
Users prefer freeware because of following reasons –
Adobe PDF
yahoo messenger
Google Talk
MSN messenger
Freeware Shareware
Free of cost
May or may not be freely distributed usually requires
Distribution distributed among
author’s permission.
the people.
Access Duration time Having no time limit Program may only work for short duration eg 30 days.
A free copyrighted Some features are free for trial and covered by
Advantage
software copyright.
MSN messenger,
Examples yahoo messenger, Winzip,CuteFTP, Getright,etc.
Adobe PDF,etc.
More secure
Stable
Helps in becoming a better programmer as you can learn and develop from the source code to make
new softwares.
database system
Moodle
OpenOffice
PHP
Perl
Proprietary Software
Proprietary software refers to the software which is owned by an individual or a company. There are
restrictions on its distribution and use. It is also sometimes known as closed-source or commercial
software.
Stability – Its releases are stable throughout and the software does not crash easily.
It is costly in nature.
Redistribution is forbidden.
MacOS
Adobe Suite
COMPUTER AWARENESS
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Hardware
Hardware refers to the physical and tangible parts of a computer system, i.e. the components that can be
seen and touched by user. Hardware can be taken as the body of a computer consisting different logically and
physically operational parts for different functions.
Hardware in absence of a set of programs to operate upon cannot perform any useful operations and is
useless.
To get a particular task or operation executed by the computer, relevant software must be loaded into
the hardware.
If the hardware can be considered as the 'heart' of a computer system, then the software is considered
as its 'soul'. Both of them are complementary to each other.
CPU
Central processing unit (CPU), principal part of any digital computer system, generally composed of the main
memory, control unit, and arithmetic-logic unit.
Control Unit
Its size affects speed, power, and capability. Primary memory and secondary memory are two types of
memories in the computer. Functions of the memory unit are −
It stores all the data and the instructions required for processing.
It stores the final results of processing before these results are released to an output device.
All inputs and outputs are transmitted through the main memory.
COMPUTER AWARENESS | Hardware PAGE 4
Download Testbook
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual data pro-
cessing operations.
It is responsible for controlling the transfer of data and instructions among other units of a computer.
It obtains the instructions from the memory, interprets them, and directs the operation of the computer.
It communicates with Input/Output devices for transfer of data or results from storage.
Arithmetic Section
Logic Section
Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication,
and division. All complex operations are done by making repetitive use of the above operations.
Logic Section
Function of logic section is to perform logic operations such as comparing, selecting, matching, and merging
of data.
Motherboard
The motherboard works as a single platform to assemble all of the parts of a computer system together.
It connects the primary components like CPU, memory, hard drives, and the secondary components like
optical drives, video card, sound card, and other ports and expansion cards directly or via cables. It acts
as the backbone of a computer.
Features of Motherboard
A motherboard comes with various features as follows:
Motherboard varies very much in supporting different types of devices and components.
Motherboard provides provision for a single type of CPU and a multiple number of memories.
Devices like video cards, hard disks, sound cards have to be compatible with the particular moth-
erboard to integrate with the rest of the components.
Motherboards, cases, and power supplies should be compatible to work properly in collaboration
with the other components.
Popular Manufactures
Following are few of the popular manufacturers in the market of the motherboard:
Intel
ASUS
A Open
ABIT
Bio star
Gigabyte
MSI
Description of Motherboard
The motherboard is installed inside the case or cabinet and is securely attached using small screws. Moth-
erboard consists of ports to connect all of the internal hardware components. It has provision for a single
socket for CPU, whereas for memory, generally one or more slots are available. Motherboards contain
ports to attach input devices like the floppy drive, hard drive, and optical drives via ribbon cables. Moth-
erboard carries fans for heat dissipation and a special component called SMPS (switched-mode power
supply) designed for power supply.
COMPUTER AWARENESS | Hardware PAGE 7
Download Testbook
It contains a peripheral card slot in front of the motherboard which can be used to attach output/input
devices like video cards, sound cards, and other expansion cards to the motherboard.
On the other side, motherboards carry a variety of ports to connect the important input/output devices
like monitor, printer, mouse, keyboard, speaker, and network cables. Motherboards also consists ad-
vanced technology known as USB ports, which allow compatible devices to be connected in plug-in/plug-
out fashion. For example, pen drive, digital cameras, etc.
RAM
RAM, which stands for random access memory, and ROM, which stands for read-only memory, are both
present in your computer. RAM is volatile memory that temporarily stores the files you are working
on. ROM is non-volatile memory that permanently stores instructions for your computer.
The information stored in RAM can be checked with the help of BIOS. It is generally known as the main
memory or temporary memory or cache memory or volatile memory of the computer system.
Static RAM
Dynamic RAM
Static RAM
Static RAM is the full form of SRAM. In this type of RAM, data is stored using the state of a six transistor
memory cell. Static RAM is mostly used as a cache memory for the processor (CPU).
Dynamic RAM
DRAM stands for Dynamic Random Access Memory. It is a type of RAM which allows you to stores each
bit of data in a separate capacitor within a specific integrated circuit. Dynamic RAM is a standard
computer memory of the many modern desktop computers.
This type of RAM is a volatile memory that needs to be refreshed with voltage regularly. Else it loses the
information stored on it.
SRAM VS DRAM
SRAM DRAM
Types of RAM
DDR2 2003
DDR4 2012
ROM
Read-Only Memory (ROM), is a type of electronic storage that comes built in to a device during
manufacturing. You’ll find ROM chips in computers and many other types of electronic products; VCRs,
game consoles, and car radios all use ROM to complete their functions smoothly.
ROM chips come built into an external unit – like flash drives and other auxiliary memory devices or
installed into the device’s hardware on a removable chip. Non-volatile memory like ROM remains viable
even without a power supply.
Ports
In terms of computers, a port is a physical docking socket using which an external or internal device can
be connected to the motherboard. It may also be programmatic docking point which can be used for flow
of information from a program to the computer or over the Internet.
Characterstics of Ports
Following are the characteristics of a port:
Most of the external devices are connected to the system through cables and ports.
Ports are sockets on the motherboard of the system into which the device itself or the cable of external
device is plugged in.
Serial Port
Useful for external modems and older version of computer mouse
Parallel Port
Used to attach scanners and printers
25 pin model
PS/2 Port
Used to connect earlier version computer keyboard and mouse
Most of the earlier version computers provide two PS/2 port, each for the mouse and keyboard
Most of the newer versions of computers are equipped with two USB ports as minimum.
VGA Port
It is used to connect monitor to a computer's video card.
It consists 15 holes.
It resembles the serial port connector. However, serial port connector consists pins, VGA port consists
holes.
Power Connector
Three-pronged plug.
It connects to the computer's power socket available in SMPS that plugs into a power bar or wall socket.
FireWire Port
It can transfer huge amount of data at comparatively very fast speed.
Invented by Apple.
It has 3 variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector, and 9-Pin FireWire 800 con-
nector.
Modem Port
It is used to connect a PC's modem to the telephone network.
Ethernet Port
Used to connect computer system to a network and high speed Internet.
Data travels at the speed of 10 megabits to 1000 megabits per seconds, which depends upon the network
bandwidth.
COMPUTER AWARENESS | Hardware PAGE 12
Download Testbook
Game Port
Used to connect a joystick to a PC
Sockets
Sockets usually connects the microphone (mic) and speakers to the sound card on the motherboard.
COMPUTER AWARENESS
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Microsoft Word
Introduction
Let us consider an office scene. Many letters are typed in the office. The officer dictates a letter. The typist
first types a draft copy of the letter. The officer goes through it to check mistakes regarding spelling errors,
missing words, etc. and suggests corrections. The typist changes the letter as suggested by the officer. This
is a simple example of word processing.
There are many software packages to do the job of word processing. Some of them work in DOS
environment. Example are WordStar, Word Perfect and Professional Write. But in these days working in
WINDOWS is becoming more and more popular. So let us consider software for word processing which
works in WINDOWS. Our choice is MS-WORD because it is the most popular software in these days.
MS-WORD is a part of the bigger package called MS OFFICE, which can do much more than word
processing. In fact when you open up MS OFFICE you will find four main components in it. They are MS-
WORD (for word processing), MS EXCEL (for spreadsheet), MS ACCESS (for database management) and MS
POWERPOINT (for presentation purposes). However, we will limit ourselves to MS-WORD only in this
Objectives
After going through this lesson you should be in a position to :
Text is typing into the computer, which allows alterations to be made easily.
Spelling can be checked and modified through the spell check facility.
Multiple copies of letters can be generated with different addresses through the mail-merge
facility.
Soft word
WordStar
Word perfect
Microsoft word
Using word you can create the document and edit them later, as and when required, by adding more
text, modifying the existing text, deleting/moving some part of it.
Changing the size of the margins can reformat complete document or part of text.
Font size and type of fonts can also be changed. Page numbers and Header and Footer can be included.
Spelling can be checked and correction can be made automatically in the entire document. Word count
and other statistics can be generated.
Text can be formatted in columnar style as we see in the newspaper. Text boxes can be made.
Word also allows the user to mix the graphical pictures with the text. Graphical pictures can either be
created in word itself or can be imported from outside like from Clip Art Gallery.
Word also has the facility of macros. Macros can be either attached to some function/special keys or to a
tool bar or to a menu.
While working in MS-WORD you have to work with a mouse. Also one can work, to some extent, through
the keyboard. The use of mouse is simpler as it is fully menu driven. In MS-WORD every command is
available in the form of ‘icons’.
Take the mouse pointer to START button on the task bar. Click the left mouse button.
Move the pointer to programs. You will notice another menu coming up to the right.
In that menu identify where Microsoft word is placed. Move the cursor horizontally to come out
of programs.
Move into the rectangular area meant for Microsoft word. Click the left mouse button there. The
computer will start MS-WORD.
Title Bar: The title bar displays the name of the currently active word document. Like other WINDOWS
applications, it can be used to alter the size and location of the word window.
Tool Bars: Word has a number of tool bars that help you perform task faster and with great ease. Two
of the most commonly tool bars are the formatting tool bar and the standard tool bar. These two toolbars
are displayed just below the title bar. At any point of time any tool bar can be made ON or OFF through
the tool bar option of View Menu.
Ruler Bar: The Ruler Bar allows you to format the vertical alignment of text in a document.
Status Bar: The Status Bar displays information about the currently active document. This includes the
page number that you are working, the column and line number of the cursor position and so on.
Scroll Bar: The Scroll Bar helps you scroll the content or body of document. You can do so by moving
the elevator button along the scroll bar, or by click in on the buttons with the arrow marked on them to
move up and down and left and right of a page.
Workspace: The Workspace is the area in the document window were you enter/type the text of your
document.
Main Menu: The Word main menu is displayed at the top of the screen as shown in the Figure. The
main menu further displays a sub menu. Some of the options are highlighted options and some of them
appear as faded options. At any time, only highlighted options can be executed, faded options are not
applicable. Infect if the option is faded you will not be able to choose it. You may not that any option
faded under present situation may become highlighted under different situations
File
You can perform file management operations by using these options such as opening, closing, saving,
printing, exiting etc.
New Ctrl+N
Open Ctrl+O
Close ALT + F4
Save Ctrl+S
Save As CTL + A
Print Ctrl+P
Using this option you can perform editing functions such as cut, copy, paste, find and replace etc.
Word document can be of many pages. The different pages may have different modes. Each mode has its
limitations. For example in normal mode the graphical picture cannot be displayed. They can only be
displayed in page layout mode. Using the option “View” you can switch over from one mode to other. It
displays the following Sub menu.
Online Layout
Page Layout
Normal
Outline
Master Document
Tool Bars Ruler
Footnotes
Comments
Header and Footer
Full Screen
Zoom
Insert
Using this menu, you can insert various objects such as page numbers, footnotes, picture frames etc. in
your document. It displays the following Sub menu.
Break
Page Numbers
Date and Time
AutoText
Symbol
Comment
Footnote
Caption
Cross-reference
Index & Tables
Picture
Text Box
File
Object
Bookmark
Hyperlink
Format
Using this menu, you can perform various type of formatting operations, such as fonts can be changed,
borders can be framed etc. It displays the following Sub menu.
Paragraph…
Font Bullets and Numbering
Borders and Shading
Tabs…
Drop Cap…
Text Direction…
Change Case…
Columns
Auto Format… Style Gallery…
Style…
Background…
Object
Tools
Using this menu, you can have access to various utilities/tools of Word, such as spell check, macros, mail
merge etc. It displays the following Sub menu.
Language…
Word Count AutoSummarise
Spelling and Grammar
Auto Correct..
Look Up Reference
Merge Documents…
Track Change Protect Document…
Mail Merge
Letter Wizard…
Macro…
Envelops and Lebels Templates and Add-Ins…
Customize…
Options…
Table
This menu deals with tables. Using this menu you can perform various types of operations on the table. It
displays the following Sub menu.
Draw Table
Delete Cells…
Insert Table Merge Cells…
Split Cells
Select Column
Select Row
Select Table
Distribute Rows Evenly
Distribute Columns Evenly
Table Auto Format
Cell Height and Width…
Headings
Sort …
Formula…
Convert Text to table
Split Table
Hide Grid Lines
COMPUTER AWARENESS | Microsoft Word PAGE 8
Download Testbook
Window
This menu allows you to work with two documents simultaneously. This would require two windows to
be opened so that each one can hold one document. Using this menu, you can switch over from one
window to another. It displays the following Sub menu.
Arrange All
New Window Split
1Document1.doc
Help
Using this menu, you can get on-line help for any function.
Ctrl + V -- Paste.
F1 -- Open help.
Ctrl + S -- Save.
Word Processing: Word Processing refers to the act of using a computer to create, edit, save and print
documents.
Word Wrap: Word Wrap refers to the function of a word processor that will automatically force text to
a new line when the right margin is reached while typing. Word Wrap eliminates the need for pressing
the Enter key on the keyboard at the end of every line.
Charts: graphs that use lines, columns, and pie shapes to represent numbers and data.
Desktop Publishing: the ‘big brother’ of word processing, the process of using a word processor type
package to create things such as newsletters, flyers, brochures etc. combining both text and graphics.
Embedded Object: an object that becomes part of the destination file and is no longer a part of the
source file.
Font: a set of characters that all use the same basic design.
Font Effects: a way to change the appearance of text such as bold, italics, underline etc.
Footer: text or graphics that are printed on every page or section, usually at the bottom but can be
anywhere on a page
Header: text or graphics that are printed on every page or section, usually at the top but can be
anywhere on a page.
Indent Markers: markers along the ruler that control how text wraps on the left or right side of a
document.
Index: a list of the topics, names and terms used in a document along with the corresponding page
numbers. An index is usually found at or near the end of a document (also see Table of Contents)
Landscape: a term used to describe page orientation, where the page is wider than it is tall.
Linked Object: an object such as a graphic etc, which is included within a document in such a way that
it is linked to the source file, so that when ever the source changes, the object automatically updates.
Macro: A recorded series of commands, menu selections and key presses that automate repetitive
tasks.
Mail Merge: The process of combining a standard ‘form’ letter with a set of names and addresses to
create many letters that appear to be individually written.
Main Document: the standard ‘form’ letter used in a mail merge process.
Manual Page Break: a page break inserted into a document by the author at a specific position rather
than one created automatically when a page has no more room for text.
Merge Field: a placeholder that indicates where Word inserts information from a data source during a
mail merge
Normal View: the default editing view which is usually used to write and edit documents.
Note Separator: the line that divides the notes from the body of the document.
Office Assistant: a help that answers questions for the Microsoft Office suite of programs.
Office Clipboard: a storage area that allows the user to temporarily store snippets of information, and
retrieve them later.
AutoCorrect: a feature that corrects commonly misspelled words automatically as they are typed.
Bookmark: a method to mark locations within a document so that they can be easily returned to later.
Bullet: a small graphic, commonly a large dot, that starts each item in a list.
Character Style: a style for selected words and lines of text within a paragraph
Outline View: a view that shows the structure of a document which consists of headings and body text.
Page Orientation: the way in which pages are laid out in a printed document.
Paragraph: a piece of text that has had the enter key pressed before its first line, and after its last.
COMPUTER AWARENESS | Microsoft Word PAGE 14
Download Testbook
Paragraph Styles: Styles for entire paragraphs, including their fonts, tabs, alignments etc.
Point: a measure of the size of text for a font. One point is approximately 1/72 of an inch.
Print Layout View: a view that shows how a document will appear when it is printed.
Reference Mark: a number or character in the main text of a document that indicates additional
information is included in a footnote or endnote.
Reviewing Pane: a pane that shows information regarding the changes made to a document.
Section Break: a section of the document that can be formatted differently to other parts of the
document.
Selection Area: a blank area to the left of a documents left margin that you can click to select parts of
the document.
Soft Page Break: a page break that is automatically inserted into a document by Word when a there
is too much text to fit on the current page.
Spelling and grammar checker: a feature that attempts to check and correct errors in spelling and
grammar that the writer may have missed.
Tab Stop: a location along the ruler that you use to align text.
Table AutoFormat: a set of predefined styles that are intended to make table formatting easier.
Table of Contents: a list of the main headings and sub headings that indicate to the reader the
contents of a document.
Template: a document that stores formatting, text styles and document information that is then
used as the basis for another document.
Theme: a unified look in a document that incorporates heading and text styles.
Thesaurus: a feature that looks up alternative words with the similar meanings.
Watermark: semi-transparent text or picture that are ‘behind’ the main text of the document.
Web Layout View: a view showing how a document will appear when viewed as a web page.
Web Page: a special page written using the HTML language that is intended for viewing in a web
browser.
WordArt: a tool within Microsoft Office that allows you to manipulate text in a variety of different,
graphical ways.
Word Processing: the process of creating, editing and printing a computer written text document.
Word Wrap: the movement of text to the next line when typing goes beyond the right margin.
Scroll Bars: Since many documents are too long to fit legibly on a single computer screen, vertical and
horizontal scroll bars are included to allow you to move through the document and change the area of
the document that is currently being viewed on the screen.
Clipboard: The clipboard is a temporary holding area the computer uses for any item that has been
copied or cut. When an item such as text is placed on the clipboard, it can then be pasted elsewhere in
the document. Items will stay on the clipboard until they are deleted or erased. The manner in which the
clipboard is cleared depends on the application being used. Quite often, the clipboard is cleared when
another item is cut or copied or if the application is closed.
Header: The header is an area that appears at the top of every page in a document that can contain
one or more lines of text. One common use of the header is to include information about the document
(such as the title) on every page in the document.
Footer: The footer is an area that appears at the bottom of every page in a document that can contain
one or more lines of text. One common use of the footer is to insert the current page number on every
page in the document.
Font: A font is a set of letters and numbers of one particular typeface. The font includes not only the
typeface, but other characteristics such as size, spacing and emphasis. An example of a font would be
Arial, 12 point, italic.
Formatting: The process of formatting a document involves specifying how the document will look in its
final form on the screen and when printed. Common formatting options include the font, font size, color,
alignment, spacing, margins and other properties.
Indent: The space between the margin of the page and the text. Most word processors allow for both
left and right indentation. One other common use of indention is what is known as a "first line indent"
where only the first line of a paragraph is indented and the remaining lines of text lie directly against the
left margin of the page.
Line Spacing: Line spacing refers to the amount of white space between lines of text in a paragraph.
Commonly used line spacing settings are single spaced and double spaced.
COMPUTER AWARENESS
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Microsoft Excel
MS-Excel 2000 is a Windows based application package. It is quite useful in entering, editing, analysis and
storing of data. Arithmetic operations with numerical data such as addition, subtraction, multiplication and
division can also be done with Excel.
You can sort the numbers/characters according to some given criteria (like ascending, descending etc.)and
solve simple financial, mathematical and statistical formulas.
Overview of ms-excel
Data entry
Data management
Accounting
Financial analysis
Programming
Time management
Task management
Financial modeling
Ms –excel interface
In the upper left corner of the Excel 2007 windows is the Microsoft office button. When you click . The
button ,a menu appears. You can use the menu to create a new file, open an existing file, Save a file, and
perform many other tasks.
The Quick Access Toolbar (QAT) is a small, customizable toolbar at the top of the Office application
window that contains a set of frequently used commands. These commands can be accessed from almost
any part of the application, independent of the ribbon tab that is currently opened.
The Quick Access Toolbar has a drop-down menu containing a predefined set of the default commands,
which may be displayed or hidden. Additionally, it includes an option to add your own commands.
There is no limit to a maximum number of commands on the QAT, although not all the commands may be
visible depending on the size of your screen
Microsoft Excel ribbon is the row of tabs and icons at the top of the Excel window that allows you to quickly
find, understand and use commands for completing a certain task. ... The ribbon in Excel is made up of four
basic components: tabs, groups, dialog launchers, and command buttons.
Worksheets:
Each worksheets in MS-Excel contains columns and rows . The columns are lettered A to Z and the containing
AA, AB, AC, AD and so on. There are 65,536 rows and 256 columns in a worksheet in general . The
combination of a column coordinate and a row coordinate make up a cell address.
Excel formula bar is a special toolbar at the top of the Excel worksheet window, labeled with function
symbol (fx). You can use it to enter a new formula or copy an existing one. ... The formula bar gets activated
as soon as you type an equal sign in any cell or click anywhere within the bar.
The status bar is a name for the lower edge of the worksheet window, which displays various
information about an Excel worksheet.
The status bar can be configured to display things like sum, count, and average of the currently selected
cells.Right click the status bar to control what kind of information is displayed.
Elements in Excel
Worksheet — Within the workbook is where you'll find documents called worksheets. Also
known as spreadsheets, you can have multiple worksheets nestled in a workbook. Tabs at
the bottom of the of the screen will indicate which of your worksheets you are currently
working on. This is also known as an active worksheet or active sheet.
Cell — A cell is a rectangle or block housed in a worksheet. Any data that you want to enter
into your worksheet must be placed in a cell. Cells can be color coded, display text, numbers
and the results of calculations, based on what you want to accomplish. An Active Cell is one
that is currently opened for editing.
Columns and Rows — Columns and Rows refer to how your cells are aligned. Columns are
aligned vertically while rows are aligned horizontally.
Column and Row headings — These headings are the lettered and numbered gray areas
found just outside of columns and rows. Clicking on a heading will select the entire row or
column. You can also alter the row height or column width using the headings.
Workspace — Much like worksheets in a workbook, a workspace allows you to open
numerous files simultaneously.
Ribbon — Above the workbook is a section of command tabs called the Ribbon. A multitude
of options are found behind each tab of the ribbon
Cell Reference — A cell reference is a set of coordinates that identifies a specific cell. It's a
combination of letters and numbers. A5, for example, would point to the cell located where
column A and row 5 intersect.
Cell Range — A Cell range is a collection of cells that have been identified as a group based
on a variety of criteria. By using a colon (:) between cell references, Excel can determine the
range, also known as an array. A range in a row, for example, could look like A1:C1, telling
the formula to look at the cells in a row between A1 and C1, while B4:D9 would tell the
formula to look at all cells in a box bounded by columns B and D and rows 4 and 9. A 3-D
reference refers to a range that encompasses more than one worksheet in the same
workbook.
Merged Cell — When two or more cells are combined, it's become what is known as a
merged cell.
Template — A template is a formatted workbook or worksheet designed to help users fulfill
a specific need in Excel. Examples of this include stock analysis, process map, and calendar.
Operator — Operators are symbols or signs that indicate which calculation must be made in
an expression. Operators do not necessarily refer to simple mathematical types; comparison,
text concatenation or reference operators also exist.
Formula — A sequence inside a cell that is used to produce a value. It must begin with an
equal (=) sign. This could be a mathematical equation, cell references, functions or operator.
A formula is also known as an expression.
COMPUTER AWARENESS| Microsoft Excel PAGE 7
Download Testbook
Formula Bar — Nestled between the ribbon and workbook, the Formula Bar will display the
contents of an active cell. In the case of formulas, the formula bar will display all
components of the formula.
Function — Functions are formulas that are pre-built into Excel. They are designed to help
simplify potentially complex formulas in a worksheet.
Error Code — Error Codes appear if Excel finds a problem with a provided formula.
Cell Formatting — This is the act of changing the in which cell data is displayed in the
spreadsheet. When you format cells, only the visual appearance of the cells is changed; the
value within the cells remain constant.
Conditional Formatting — Formatting is applied only when the cell meets determined
criteria such as duplicate values or values above or below a threshold.
Filter — Filters are rules that you can employ to decide which rows in a worksheet to
display. These filters can use data such as conditions or values.
Freeze Panes — Freezing Panes allows you to select specific columns and/or rows to remain
visible on the worksheet, even if you are scrolling, such as header cells that label a column.
AutoFill — This enables you to effortless copy data to more than one cell.
AutoSum — This feature will add up the numbers you have entered in your sheet and
displays the total in a cell of your choosing.
AutoFormat — This is an automated format application to cells that match pre-determined
criteria. This could be as simple as font alignment and size.
Data Validation — This feature helps to prevent incorrect data from being entered into your
worksheet. This most commonly used to create drop-down lists for common terms. Data
validation promotes consistency and accuracy in the data to be entered.
Pivot Table — This is a data summarization tool most commonly used to sort, average to
sum up data automatically. The information is pulled from one table while the results are
displayed in another. Pivot Tables makes it easy to retrieve specific information from a large
source of data.
Pivot Chart — This type of chart provides a visual aid for pivot tables. By providing graphical
representations of the pivot table data, the user can provide a level of interactivity with the
data.
Pivot Area — The pivot area is a point on the worksheet where you would drag a Pivot Table
field in order to reorganize how a report is displayed.
Source Data — This is the information used to create your pivot table. It can either exist
within the worksheet or from and an external database.
Values Area — In a pivot table, Value areas are identified as the cells that contain the
summary information.
COMPUTER AWARENESS| Microsoft Excel PAGE 8
Download Testbook
Item — These are sub-categories of fields in your pivot table. If you have a field that is
marked State, the items could be Alabama, Alaska and so on.
Ctrl + Page Down Move between Excel worksheets in the same document
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook
Microsoft PowerPoint is a software application that is particularly used to present data and information by us-
ing text, diagrams with animation, images, and transitional effects, etc in the form of slides. It helps people to
better understand the idea or topic in front of the audience practically and easily.
The presentation can be printed, displayed on a computer, and can be projected using a video projector.
PowerPoint can add animation to your texts, graphics, tables, movies, and other objects through Custom
Animations. You can also add transition (movement) between your slides.
PowerPoint 2010 has a new, intuitive user interface called the Microsoft Office Fluent User Interface, which
helps you create better presentations quicker. Additionally, PowerPoint 2010 offers new and improved effects,
themes, and layouts.
Title Bar Displays the name of the application and the file currently in use.
The Ribbon Displays the numerous functions and tools available to work with your presentation.
Quick Access
Enables you to customise the toolbar to contain the commands you use most frequently.
Toolbar
File tab (Backstage Provides access to basic commands such as New, Open, Save, Print and Share plus access
View) to customise the application.
Slides pane Displays a thumbnail version of each slide within the presentation.
Slide The area which will be displayed as full screen when viewed in Slide Show mode.
Provides information relating to features such as slide number, spell check and shortcuts
Status Bar
to Notes, Comments, various different views and zoom functions.
Displayed as dotted lines which allows you to identify where you can add text, and insert
Placeholder
elements such as images or tables.
In the upper‐left corner is the Microsoft Office button. When you click the button, a menu appears. You can
use the menu to create a new file, open your existing file, save a file, and print a file.
Next to the Microsoft Office button is the Quick Access toolbar. The quick access toolbar is a customizable
toolbar that contains commands
The Ribbon
You can use the commands to tell PowerPoint what to do. The Ribbon is located at the top of the PowerPoint
Window. At the top of the Ribbon there are several tables; clicking a table displaces several replanted group
commands.
You can click on the command buttons to issue commands or to access menus.
PowerPoint Window
Each page of a PowerPoint presentation is called a slide. The default orientation of the slide is landscape.
You can change the slide orientation and the slide size. Add text, graphics, and pictures to the slide to
enhance its appeal and illustrate your point.
Design Template
Think of a design template as a coordinated package deal. When you decorate a room, you use colors and
patterns that work together. A design template acts in much the same way. Even though different slide
types can have different layouts and graphics, the design template ties the whole presentation together in
an attractive package.
Title slides
Blank slides
Slide Views
There are several ways to view slides and slideshows. These views are:
Normal view: Also commonly known as slide view. It is the main working window in the presentation. The
slide is shown at its full size on the screen.
Outline view: Shows all the text of all slides, in a list on the left of the PowerPoint screen. No graphics
display in this view. Outline view is useful for editing and can be exported as a Word document to use as a
summary handout.
Slide Sorter view: Displays thumbnail versions of all your slides, arranged in horizontal rows. This view is
useful for making global changes to several slides at one time. Rearranging or deleting slides is easy to do
in slide sorter view.
Notes Page view: Shows a smaller version of a slide with an area underneath for notes. Each slide is
created on its own notes page. Print these pages to use as a reference while making the presentation. The
notes do not show on the screen during the presentation.
Task Pane
Located on the right side of the screen, the task pane changes to show options that are available for the
current task that you are working on. For example, when changing the background for a slide, the Format
Background task pane appears; when adding animations, you'll set animation options in the Animation
pane.
Transition
Slide transitions are the visual effects that appear as one slide changes to another. PowerPoint offers
several different transitions, such as fade and dissolve.
PowerPoint Online
PowerPoint Online is the web version of PowerPoint. It allows a PowerPoint presentation to be played on
any computer, even one that doesn't have PowerPoint installed. To use PowerPoint Online, you'll need a
Microsoft account or an Microsoft 365 work or school account. To view a presentation in a web browser,
save the presentation to OneDrive or Dropbox and open it in PowerPoint Online.
Slide Master
The default design template when starting a PowerPoint presentation is a plain, white slide. When you
want to design your own template, use the Slide Master.
After you update the Slide Master with your design choices, all the slides in your presentation will use the
fonts, colors, and graphics in the Slide Master. Each new slide that you create takes on these aspects.
Ctrl+A: Select all text in a text box, all objects on a slide, or all slides in a presentation (for the latter, click
on a slide thumbnail first)
Home: Go to the first slide, or from within a text box, go to the beginning of the line
End: Go to the last slide, or from within a text box, go to the end of the line
Ctrl+Up/Down Arrow: Move a slide up or down in your presentation (click on a slide thumbnail first)
Ctrl+Shift+Up/Down Arrow: Move a slide to the beginning or end of your presentation (click on a slide
thumbnail first)
Ctrl+T: Open the Font dialog box when text or object is selected
Alt+W,Q: Open the Zoom dialog box to change the zoom for the slide
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Memory
A memory is acts like a human brain. It is available to hold data and instructions.
Computer memory is the type of storage space built in the computer, where data is
to be processed and instructions needed for processing are stored. The memory is
categorized into high number of small sections called cells. Every memory location
or cell consists a unique address that varies from 0 to memory size -1. For instance,
if the computer comprised of 64k words, then this memory entity has 64 * 1024 =
65536 memory locations. The memory address of these locations differs from 0 to
65535.
Cache Memory
Cache memory is the most high speed semiconductor memory type which can speed
up the working of CPU. This works like a buffer between the main memory and the
CPU. This memory is available to store those sections of data and program
which are very frequently required by the CPU. The sections of data and programs are
transferred from the disk to cache memory through the operating system, from where
the CPU has accessibility of them.
Advantages
Cache memory is faster than main memory.
It stores the program that can be executed within a short period of time.
Disadvantages
Cache memory has limited capacity.
It is very expensive.
Primary Memory
Primary memory keeps only those data and instructions on which the computer is
currently processing. It has a fixed capacity and data is lost when power is
disconnected. It is usually made up of semiconductor ICs and registers. These
memories are not as fast as registers. The fetched data and instruction going to be
processed resides in the main memory. It is categorized in 2 subcategories RAM
and ROM.
Secondary Memory
This kind of memory is also called as external memory or non-volatile memory. It
works slower as compared to the main memory. These are installed for holding data/
information permanently. CPU does not access these memories directly, rather they
are accessed through input-output routines. The data hold in secondary memories
are transferred to the main memory for, and then the CPU can access that data. For
instance, disk, CD-ROM, DVD, etc.
RAM is volatile type of memory, i.e. data stored in it is dumped when we power off
the computer or if there is a power failure situation. Hence, it is recommended to
have Uninterruptible Power System (UPS) which can provide enough backup power
as to store data before shut down. The RAM is small in terms of its physical size as
well as in terms of the amount of data it can store.
In the matrix, there exists an extra space, that is why SRAM consists of high number
of chips as compared to the DRAM for the same capacity of storage space, making
the manufacturing costs comparatively higher. That is why SRAM is utilized as
cache memory and has very fast accessing capability.
DRAM is installed for most system memory as it is comparatively cheap and small.
All DRAMs consists of memory cells, which are composed of single capacitor and
single transistor.
Advantages of ROM
Non-volatile in nature
Cannot be accidentally changed
Cheaper than RAMs
Easy to test
More reliable than RAMs
Static and do not require refreshing
Contents are always known and can be verified
Nibble
2 A group of 4 bits is called nibble.
Byte
3 A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data
item or a character.
Word
A computer word, like a byte, is a group of fixed number of bits processed as a unit,
which varies from computer to computer but is fixed for each computer.
4 The length of a computer word is called word-size or word length. It may be as small
as 8 bits or may be as long as 96 bits. A computer stores the information in the form
of computer words.
Kilobyte
Kilobyte can be defined as one of the many multiples of the byte memory units. The
prefix kilo- , normally, represents the unit to be ‘Kilo’ and it comes in multiples of
5 ‘1000’. Though in terms of international standards kilo means 1000, in a typical
memory unit, the binary digit are seen as Base 2 and so the ‘Kilo’ here means 1024
of binary digits or bits. In short, 1Kilobyte or 1KB is equal to the 1024 bits or binary
digits.
Megabyte
Similar to the Kilobyte memory unit, the megabyte memory unit is used when the bits
are large in number and when it makes it easy to say it the number to be in lesser
6 length. That is, in international standards the prefix ‘mega-‘ is used for showing the
10^6 or the 1000000. This also means that a typical MB is shown with Base 2, and
so the 1MB or the 1 Megabyte equals to the 1048576 bytes of the memory unit. It can
also be calculated as (1024)^2bytes or the 2^20 bytes.
Gigabyte
The Gigabytes are used to represent the data to be in multiples of 10^9 or
7 1000000000 binary digits, and when the memory unit is in terms of Base 2 then the
storage space is calculated as 2^30 bytes or as 1024^3 bytes. In other words, the
memory units used by the processor that runs on the Base 2 are termed as the Giga-
bytes and is equal to the 1073741824 bytes.
Terabyte
Terabyte are applied when the memory requirement is as high as the 2^40,
8 that is the binary digits exponential to the number 40. It can also be seen as
an equal to the 1024 terabytes and is represented as TB. Or other words
equals to 10^12 bytes in international standards and that can also be termed
as the trillion bytes.
Petabyte
Petabyte can be defined as a memory unit that represents the higher multiples
9. of bytes, next to the Terabyte that comes in PB units. It is equal to the 10^15
bytes in terms of the international standards, or the 1024^5 bytes when the
bytes come with the Base 2.
Exabyte
Exabyte is a memory unit that is equal to the 10^18 equivalent in the interna-
tional standards scale, and the same is equal to the 1024^6 for the memory
10 units that come in the form of Base 2. The unit terms of the Exabyte are EB,
and this EB is the same as the 1 million TB or the 1 billion GB or the 1 thou-
sand PB.
Zettabyte
Similar to other byte sized memory units, Zettabyte can be seen as an equiva-
lent to 10^21, according to the ‘zetta’ representation in terms of the interna-
11 tional standards. The Zettabyte or the ZB also can be seen as 1 thousand of
the EB, 1 million PB, 1 billion TB, 1 trillion GB, etc.
Yottabyte
As the name says, the Yottabyte unit or the YB represents another memory
unit for the bytes to be in multiples of the other lower byte units or even the
12. bytes. In international standards, it is equal to the 10^24, and for base 2 byte
units the YB is also equal to 1024^8, 1 thousand ZB, 1 trillion TB, etc.
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Operating Systems
• A computer system has various resources (hardware and software), which may be
needed to complete a task. The most commonly needed resources are memory, file
storage space, input/output devices, CPU etc.
• The operating system works as a manager of the above resources and allocates
them to particular programs and users, whenever required to perform a specific task.
That is why operating system is the resource manager i.e. it can handles the re-
source of a computer system from inside. The resources can be processor, memory,
files, and I/O devices. In easy words, an operating system acts as an interface be-
tween the machine and the user.
Early Evolution
• 1945: ENIAC, Moore School of Engineering, University of Pennsylvania.
• 1949: EDSAC and EDVAC
• 1949: BINAC - a updated version to the ENIAC
• 1951: UNIVAC by Remington
• 1952: IBM 701
• 1956: The interrupt
• 1954-1957: FORTRAN was developed
• Then a unique program, the monitor, controls the execution of every program in the
batch.
• The monitor is all the time in the main memory and up for execution.
Multiprocessor Systems
• A Multiprocessor system contains multiple processors that share a same physical
memory. Multiprocessor system facilitates higher computing efficiency and speed. In
multiprocessor system all processors works under individual operating system.
Expansion of number of the processors and how they do act together are
transparent to the others.
Desktop Systems
• In past, CPUs and PCs didn’t had the features required to protect an OS from user
programs. PC OS that is why were neither multiuser nor multitasking. However, the
primary motive of these OS have changed with time; instead of increasing CPU and
peripheral utilization, the systems work for improving user convenience and
responsiveness. These systems are named Desktop Systems and examples are the
PCs running Microsoft Windows and the Apple Macintosh. Operating systems for
such computers have benefited in multiple ways from the advancements of
operating systems for mainframes.
• Microcomputers in no time were able to adopt few of the technology created for
larger OS. On the other hand, the hardware expanses for microcomputers are
sufficiently reduced that individuals have personal use of the computer, and CPU
utilization is no longer a major concern. Thus, some of the structure decisions
decided in OS for mainframes may not be worth for smaller systems.
Client-Server Systems
• Centralized systems today works as server systems to fulfil requests created by
client systems. The general structure of a client-server system is depicted in the
following figure:
Server Systems can be broadly classified as: Compute Servers and File Servers.
1. Compute Server systems, facilitates an interface to which users can send requests
to perform an action, in acknowledgement to which they execute the action and
transmits back results to the client.
2. File Server systems, facilitates a file-system interface in which users can create,
update, read, and delete files.
Clustered Systems
• Similar to parallel systems, clustered systems combines together various CPUs to
accomplish computational work.
• Clustered systems are different from parallel systems, however, in that they are
made up of two or more individual systems grouped together.
• The definition of the term clustered is not predefined; the commonly accepted
definition is that clustered machines share storage and are closely connected
through LAN networking. Clustering is generally performed to facilitate high
availability.
• A layer of cluster software works on the cluster nodes. Every node may monitor
one or more of the others. If the monitored machine crashes, the monitoring
system can take ownership of its storage, and reboot the application(s) that were
working on the failed machine. The failed machine can remain shut, but the users
and clients of the application can only see a brief interruption of service.
• Asymmetric Clustering - In this, one system stays in hot standby mode while the
other is processing the applications. The hot standby host (machine) performs no
task but monitor the active server. If that server crashes, the hot standby host
started working as the active server.
• Symmetric Clustering - In this, multiple hosts are processing applications, and
they are monitoring each other. This mode is in fact more efficient, as it utilizes all
of the available hardware.
• Parallel Clustering - Parallel clusters permits different hosts to access the same
data on the shared storage. Because most OS lack support for this simultaneous
data access by multiple hosts, parallel clusters are normally accomplished by
specific versions of programs and special releases of applications.
• Clustered technology is changing very fast. Clustered system's working and its
features must expand extensively as Storage Area Networks (SANs). SANs allow
simple attachment of various hosts to various storage units. Current clusters are
normally restricted to two or four hosts due to the complexity of linking the
hosts to shared storage.
Handheld Systems
• Handheld systems involves Personal Digital Assistants (PDAs), such as Palm-Pilots
or smartphones with connectivity to the Internet. They are usually of smaller size
due to which most handheld devices have a smaller memory, possess slow
processors, and feature small display.
• Many handheld devices have low memory. As a result, the OS and applications
must accommodate memory effectively. This includes returning all provided memory
back to the memory manager when the memory is no longer being used.
• Usually, many handheld devices do not use virtual memory techniques, thus
restricting program developers to work within the limitations of less physical
memory.
• Processors for many handheld devices usually works at a fractions of the speed of a
processor in a PC. Faster processors need more electricity. To implement a faster
processor in a handheld device would need a larger battery that would have to be
recharged more frequently and becomes bulky.
• One more issue confronting program designers for handheld devices is the limited
sized display screens normally available. One approach for adjusting the content in
web pages is web clipping, where only a small subset of a web page is transferred
and displayed on the handheld device.
• Most handheld devices possess wireless technology such as Bluetooth and Wi-Fi,
enabling remote access to e-mail and web browsing. Smartphones with connectivity
to the Internet comes into this category. Their use is gradually expanding as network
connections are becoming more common and other options just like cameras and
MP3 players, expand their utility.
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Internet
The Internet is a huge collection of networks, a networking infrastructure. It
encapsulates millions of computers together globally, forming a network in which
any computer can communicate with any other computer as long as they are both
connected to the Internet. In other words, it is a worldwide system of cross
connected computer networks, connecting millions of devices through which
exchange of information such as data, news and opinions etc. is possible.
The Internet is available to each and every user across the globe.
Evolution
The methodology of Internet was coined in 1969 and has undergone various
technological & Infrastructural amendments that are discussed below:
The origin of the Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
ARPANET was designed by the Department of Defence of The United States.
The primary motive of ARPANET was to facilitate communication among the
different bodies of the government.
At that time, there existed only four nodes, formally named Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located in different
countries and thus became known as the Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc., the Internet provided a medium to
publish and access information over the web.
Advantages
The Internet covers almost every aspect of life, one can think of. Here, we will
discuss some of the advantages of Internet:
The Internet allows us to communicate with the people sitting at remote locations.
There are various apps available on the web that use the Internet as a medium for
communication. Users can find different social networking sites. Following are
examples of few Social Networking sites:
Facebook
Twitter
Yahoo
Flickr
Anyone can surf for various kinds of information using the internet. Information
related to different topics such as Technology, Geographical Information, Health &
Science, Social Studies, Information Technology, Products etc can be surfed using a
search engine.
Apart from communication and source of information, the internet also serves a
medium for entertainment. Following are the various modes for entertainment over
the internet.
Online Television
Online Games
Songs
Videos
Social Networking Apps
Internet allows us to use many services like:
Internet Banking
Matrimonial Services
Online Shopping
Online Ticket Booking
Online Bill Payment
Data Sharing
E-mail
The Internet facilitates the concept of electronic commerce, that aids the business
deals to be processed on electronic systems.
Disadvantages
However, Internet is evolved to be a powerful medium of information in almost all
areas, yet there are many associated disadvantages discussed below:
There is always the possibility to lose personal information such as name, address,
credit card number. Therefore, users must be very vigilant while sharing this type of
information. Users must use credit cards only via authenticated websites.
Another disadvantage is the Spamming. Spamming corresponds to the unwanted
emails in bulk. These emails serve no purpose and lead to obstruction of the entire
system.
Virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause the user's system to crash or the user's important data may get
deleted.
There are different websites that do not supply the authenticated information. This
leads to misconception among many people.
Intranet
Intranet is defined as a private network of computers within an organization with its
own server and firewall.
Moreover we can define
Intranet as:
The Internet is a system
in which multiple PCs are
networked to be
connected to each other.
PCs on the intranet are
not available to the world
outside of the intranet.
Normally each company
or organization holds their
own Intranet network and
members/employees of
that company collaborate
via access to the computers in their intranet.
Each computer in Intranet is also identified by an IP Address, which is unique
among the computers in that Intranet.
Benefits
Intranet is considered as a very efficient and reliable network infrastructure for any
organization. It is profitable in every aspect such as cost-effectiveness,
collaboration, security, productivity and much more.
Application
Intranet applications are the same as that of Internet applications. Intranet
applications can be also accessed via a web browser. The only difference is that,
Intranet applications reside on local servers while Internet applications reside on
remote servers. Here, we've discussed some of these applications:
Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Intranet Have access to the Internet.
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability
Extranet
Extranet refers to a network
within an organization, using the
internet to connect to the
outsiders in a controlled manner.
It aids to interconnect businesses
with their customers and
suppliers and in turn allows
working in a collaborative
manner.
Implementation
Extranet is implemented as a Virtual Private Networks (VPN) because it uses the
internet to connect to corporate organizations and there is always a threat to
information security. VPN facilitates a secure network in public infrastructure
(Internet).
Key Points
1. The packet is wrapped at the boundary of networks in IPSEC compliant
routers.
2. It utilizes an encryption key to associate packets and IP addresses as well.
3. The packet is decoded only by the IPSEC compliant routers or servers.
4. The digital information is shared over VPN via VPN Tunnel and this process
is called tunneling.
VPN utilizes Internet Protocol Security Architecture (IPSEC) Protocol to facilitate
secure transactions by implementing an additional security layer to TCP/IP protocol.
This layer is implemented by encapsulating the IP packet to a new IP packet as
described in the following diagram:
Benefits
Extranet has proven to be a successful model for various kinds of businesses even
if they are small or big. following are few of the advantages of extranet for business
partners, employees, suppliers, and customers:
Issues
Apart from advantages there are also some issues associated with extranet. These
issues are discussed below:
Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this
context there are two choices:
1. May host it on the user's own server.
2. May host it along with an Internet Service Provider (ISP) in the similar way as
web pages.
But hosting extranet pages on a user's own server requires high bandwidth internet
connection which is comparatively very costly.
Security
Additional firewall security is required if the user hosts extranet pages on the user's
own server which result in a complex security mechanism and increased workload.
Accessing Issues
Information cannot be accessed in absence of internet connection. However,
information may be accessed within Intranet with no internet connection.
Decreased Interaction
It reduces the face to face interaction in the business which results in lack of
communication among customers, business partners and suppliers.
Extranet Intranet
Internal network that can be accessed externally. Internal network that cannot be
accessed externally.
Extranet is an extension of the company's Intranet. Only limited users of a company.
For controlled external communication between Only for communication within a
customers, suppliers and business partners. company.
Internet Services
Internet Services allow us to access a huge amount of information such as text,
graphics, sound and software over the internet. The diagram given below shows the
four different categories of Internet Services.
Communication Services
There are different communication Services available that facilitate exchange of
information among individuals or groups. The following table provides a brief
introduction to such services:
Archie: It's an updated database of public FTP sites and their content. It helps
2
to find a file by using its name.
Gopher: It is utilized to retrieve, search, and display documents on remote
3
sites.
VERONICA (Very Easy Rodent Oriented Net wide Index to Computer
4 Achieved): VERONICA is a resource based on gopher. It facilitates access to
the information resource saved on gopher’s servers.
Web Services
Web services facilitate exchange of information among applications on the web.
Through web services, applications can simply interact with each other.
The web services are offered using the concept of Utility Computing.
Video Conferencing
Video conferencing or Video teleconferencing is a way of communicating by two-
way video and audio transmission with help of telecommunication technologies.
Multi Point
Such mode of conferencing established connection between more than two
locations via Multipoint Control Unit (MCU).
Internet Protocols
Transmission Control Protocols (TCP)
TCP is basically a connection oriented protocol and offers end-to-end packet delivery. It
acts as a back bone for connection. It exhibits the following key features:
Transmission Control Protocol (TCP) works at the Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end packet delivery.
TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expects to receive.
It retransmits the bytes not acknowledged within a specified time period.
TCP Security
TCP facilitates the following services to the processes at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
Sending and Receiving Buffers: It may not be possible for the sending and
receiving process to produce and obtain data at same speed, therefore, TCP needs
buffers for storage at sending and receiving ends.
Full Duplex Service: Transmission of the data in duplex mode simply defi nes
the flow of data in both the directions at the same time.
TCP of the first process informs TCP of the second process and gets its
approval.
TCP of the first process and TCP of the second process and exchange data
in both the two directions.
After completion of the exchange of data, when buffers on both of the sides
are empty, the two TCP’s destroy their buffers.
Points to remember:
1. The length of the datagram is variable.
2. The Datagram can be segmented into two parts: header and data.
3. The associated length of its header is around 20 to 60 bytes.
4. The header contains information for routing and delivery of the packet.
Points to remember:
1. UDP is utilized by the application that typically transmits a small quantity of
data at one time.
2. UDP provides protocol port utilized i.e. UDP message consists of both source
and destination port number, that makes it easier for UDP software at the
destination to divert the message to the right application program.
Telnet
Telnet is a protocol used to log in to remote computers on the internet. There are a
number of Telnet clients having user friendly interfaces. The following diagram
elaborates that a person is logged into the computer named A, and from there, he
remotely logged into computer named B:
HTTP Request
HTTP request comprises of lines which contains:
1. Request line
2. Header Fields
3. Message body
Key Points
1. The first line i.e. the Request line specifies the request method i.e. Get or Post.
2. The second line defines the header which reflects the domain name of the server
from where index.htm is retrieved.
HTTP Response
Like HTTP requests, HTTP response also has a certain structure. HTTP response
contains:
1. Status line
2. Headers
3. Message body
While every computer has its own unique address, every user using the Internet has a
unique address called a domain. A domain recognizes one or more IP addresses. An
example of a domain is weather.com and is part of the URL such as https://
www.weather.com. The standard top-level domains are:
mil - Military
There are additional top-level domains that are now recognized on the Internet. They
include:
biz - Businesses
coop - Cooperatives
museum - museums
tv - Television
Browser
A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer
to access and display documents, view pictures, hear sound, and view video clips from
the World Wide Web.
Mail that's electronically transmitted by your computer. As opposed to snail mail, e-mail
sends your messages instantaneously, anywhere in the world. It has the capability to
send messages at any time and to anyone.
The standard method for downloading and uploading files over the Internet. With FTP,
you can login to a server and transfer files (meaning you can "send" or "receive" files).
Homepage
The first page that is viewed when the browser starts. It is also the page of a Web site
that provides the introduction or content with links.
The abbreviation for Hypertext Transfer Protocol. It is the set of rules by which Web
pages are transferred across the Internet.
The Internet is composed of local, regional, national, and worldwide computer networks.
Each computer on the Internet can be identified by a set of unique numbers that is
called an internet protocol (IP) address. The IP address is composed of four different
numbers separated by periods such as 205.134.120.60.
An underlined word(s), phrase(s), or graphics on a Web page that transports the reader
to additional or related information on the Internet.
TelNet
An addressing scheme that is used on the Internet to locate resources and/or services
on the World Wide Web. Basically the URL is the address of a computer file that has
been put on a computer server to access the Internet.
Web Page
Website
Address
Cyberspace
Navigate
The act of moving from page to page and website to website online.
Piracy
Website :
A collection of “pages” or files linked together and available on the world Wide Web.
Attachment:
Chat:
Cyber bullying
Sending or posting harmful or cruel text or images using the internet or other digital
communication devices.
Icons:
Post
Query
A request for information about certain topic. It is what you put in the box when you
type something into the search engine.
Usually defines as a personal or noncommercial web site that uses a dated log format.
Emoticons
Outbox
This is where all of the messages that you send are kept.
Server
Surf
Bookmark:
Hacker:
A popular term for someone who accesses computer information either legally or
illegally.
Spamming
The coded format language used for creating documents on the world wide web and
controlling how web pages appear.
Cookie :
Also known as an HTTP cookie, web cookie, or browser cookie.A small file downloaded
by some web sites to store a packet of information on your browser.
History:
A list of websites the people are using a particular computer have visited.
Netiquette
Plug-in
Softcopy
Domain Name
A name given to the numerical or internet protocol (IP) address of a web site.
Firewall
This is a system that creates a special “wall” used by network servers to separate their
intranet from internet
The standard method computers use to communicate via the world wide web.
Pharming
Phishing
An online scam that uses e-mail to “fish” for users’ private information by imitating
legitimate companies.
Streaming (media)
The exchange of video clips, sounds or other types of media over the internet.
The protocol or conventions that computers use to communicate over the internet.
Zip File
Large files that have been compressed to make them easier to send over the internet
Google Chrome
Microsoft Edge
Apple Safari
Opera
Brave
Vivaldi
DuckDuckgo
Chromium
Epic
2. Bing : Bing is Microsoft’s answer to Google and it was launched in 2009. Bing is the
default search engine in Microsoft’s web browser. At Bing, they are always striving to
make it a better search engine but it’s got a long way to go to give Google competition.
Microsoft’s search engine provides different services including image, web and video
search along with maps. Bing introduced Places (Google’s equivalent is Google My
Business), this is a great platform for business to submit their details to optimise their
search results.
3. Yahoo : Yahoo & Bing compete more with each other than with Google. A
recent report on netmarketshare.com tells us that Yahoo have a market share of 7.68
percent. Although a leader as a free email provider, this is declining significantly though
with their recent acknowledgement that User Details & Passwords where hacked last
year.
4. Baidu : Baidu is the most used search engine in China and was founded in Jan,
2000 by Chinese Entrepreneur, Eric Xu. This web search is made to deliver results for
website, audio files and images. It provides some other services including maps, news,
cloud storage and much more.
5. AOL : Aol.com is also among the top search engines. These are the guys that used
to send out CD’s which you’d load onto your PC to install their browser and modem
software. Once the pre-eminent player they now have a market share of 0.59 percent.
Verizon Communication bought AOL for $4.4 billion. It was started back in 1983 as
Control Video Corporation. It was named America Online in 1991 and in 2009 as AOL
Inc. AOL is a global mass media company which is based in New York. The company
also provides advertising services as AOL Advertising, AOL mail and AOL Platform.
7. Excite : Excite is not widely known but is one that still gets into the top 10.
Excite is an online service portal that provides internet services like email, search
engine, news, instant messaging and weather updates. This also provides us with the
latest trends, topics and search for phrases such as: What can President Trump
actually do?
10. Yandex : Launched in 1997, Yandex is most used search engine in Russia.
Yandex also has a great presence in Ukraine, Kazakhstan, Belarus and Turkey. It
provides services like Yandex Maps, Yandex Music, online translator, Yandex Money
and many other services.
11. Lycos : Lycos has a good reputation in search engine industry. Its key areas
served are email, web hosting, social networking, and entertainment websites.
QZone
Tumblr
Baidu Tieba
Skype
Viber
Sina Weibo
LINE
Snapchat
Telegram
Myspace
Ali Baba.
eBay.
Jingdong.
Zappos.
Rakuten.
Home Depot.
Flipkart.
Snapdeal
Ali Baba
Snanpdeal
Myntra
COMPUTER AWARENESS
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
What is a network?
Network is defined as a set of devices connected to each other using a physical
transmission medium. For Example, A computer network is a group of computers
connected with each other to communicate and share information and resources like
hardware, data, and software.
Network, a group of computers and associated devices that are connected by
communication facilities.
Components of Networks
Homes usually have LAN networks as well, especially if there are multiple devices in
the home. Often they do not contain more than one subnet, if any, and are generally
controlled by a single administrator. They are not bound to be linked to the internet to
work, even though they can be.
LANs connect to WANs, such as the internet, using routers to transfer data and
information quickly and securely. WANs are generally too large to be controlled by
one administrator, and so generally have collective ownership, or in the case of the
internet, is publicly owned.
Initially a central gateway, which separates the LAN from the WAN, and then others
which transmit the data from one to the next, until it is received at its final destination
– another device which is being communicated with. This all takes place at a very
high speed over modern broadband modems, thanks to efficient and effective
protocols and rules being developed to control and manage data.
BUS Topology
Bus topology is a type of network in which each computer and network device is joint to
single cable. When it consists exactly two endpoints, then it is called Linear Bus
topology.
RING Topology
It is named ring topology because it creates a ring as each computer is linked to
neighbouring computer, with the last one linked to the first, exactly two neighbours
for each computer.
STAR Topology
In Star Topology all the nodes are linked to a common hub via a cable. This hub is
the central node and all others nodes are linked to the central node.
MESH Topology
It is type of a point-to-point to link other nodes or devices. All the network nodes are
linked to each other. Mesh consists of n(n-1)/2 physical channels to link n number of
devices.
There are two types of methods to transmit data via the Mesh topology, they are :
1. Routing
2. Flooding
TREE Topology
It has a root node and all other nodes are linked to it creating a hierarchy. It is also
called hierarchical topology. It must have minimum three levels to the hierarchy.
HYBRID Topology
It is two different kinds of topologies which is a combination of two or more
topologies. For example if in an office in some department ring topology is used and
in another department in same place, star topology is used, connecting these
topologies will form a Hybrid Topology (ring topology and star topology).
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input,
the monitor can only give the output.
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive, and vice versa. The
half-duplex mode is used in cases where there is no need for communication in both
direction at the same time. The entire capacity of the channel can be utilized for
each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are
sent in both the directions.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In
full_duplex mode, signals going in one direction share the capacity of the link with
signals going in other direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one for
sending and other for receiving.
Full-duplex mode is used when communication in both direction is required all the time.
The capacity of the channel, however must be divided between the two directions.
Example: Telephone Network in which there is communication between two persons
by a telephone line, through which both can talk and listen at the same time.
Reference Model
Reference Model facilitates the ways of standardization which is acceptable
worldwide. As people using the computer network are situated over a huge physical
range and their network devices might consists heterogeneous architecture. The
need to provide connection among heterogeneous devices, we require a
standardized model i.e. a reference model, which would facilitate us way to
communicate using these devices regardless their architecture.
There exists two reference models namely OSI model and TCP/IP reference model,
however, the OSI model is basically a hypothetical one but the TCP/IP is absolutely
practical model.
OSI Model
OSI is acronym of Open System Interface. This model type was created by the
International organization of Standardization (ISO) and therefore also called as ISO-
OSI Model.
The OSI model consists of seven layers as shown in the given diagram. Each layer
is responsible for a specific function, however each layer provide services to the
layer above.
Physical Layer
The Physical layer is responsible for the given activities:
Activating, maintaining and deactivating the physical connection.
Defining voltages and data rates needed for transmission.
Converting digital bits into electrical signal.
Deciding whether the connection is simplex, half duplex or full duplex.
Network Layer
Given are the functions of Network Layer:
To route the signals through various channels to the other end.
To act as the network controller by deciding which route data must take.
To divide the outgoing messages into packets and to assemble incoming
packets into messages for higher levels.
Transport Layer
The Transport layer performs the given functions:
It decides if the data transmission must take place on parallel paths or single
path.
It performs multiplexing, splitting on the data.
It breaks the data groups into smaller units so that they are handled more
efficiently by the network layer.
The Transport Layer ensures sending of data from one end to other end.
Session Layer
The Session layer performs the given functions:
Manages the messages and synchronizes conversations between two
different applications.
It controls logging on and off, user identification, billing and session
management.
Presentation Layer
The Presentation layer performs the given functions:
This layer makes it sure that the information is delivered in such a form that
the receiving system will understand and use it.
Application Layer
The Application layer performs the given functions:
It provides various facilities such as manipulation of information in different
ways, retransferring the files of information, distributing the final results etc.
The functions such as LOGIN or password checking are also performed by
the application layer.
TCP/IP Model
TCP/IP model is practically implemented model, unlike OSI, and is used in the
Internet. TCP/IP refers to Transmission Control Protocol and Internet Protocol.
The TCP/IP model encapsulates the two layers (Physical and Data link layer) into
one layer i.e. Host-to-Network layer. The given diagram shows the various layers of
TCP/IP model:
Application Layer
This layer is same as that of the OSI model and performs the given functions:
It provides various facilities such as manipulation of information in different
ways, redistributing the files of information, distributing the results etc.
The functions such as LOGIN or password checking are also performed by
the application layer.
Protocols used in this layer: TELNET, HTTP, NNTP, FTP, SMTP, DN are the
protocols employed in this layer
Transport Layer
It performs the same functions as that of transport layer present in OSI model. Here
are the key points regarding transport layer:
It uses TCP and UDP protocol for end to end transmission.
TCP is reliable and connection oriented protocol.
TCP also handles flow control.
The UDP is not reliable and a connection less protocol also does not perform
flow control.
Protocols utilized in this layer: TCP/IP and UDP protocols are deployed in this layer.
Internet Layer
The responsibility of this layer is to permit the host to insert packets into network and
then make them travel independently to the destination. However, the sequence of
receiving the packet may vary from the sequence they were sent.
Protocols used: Internet Protocol (IP) is deployed in Internet layer.
Network Devices
HUB
Ethernet Hubs
It is a device linking various Ethernet
devices together and makes them carry on
the functions as a single device. They are
different in speed in terms of data transfer
rate. Ethernet utilizes so called Carrier
Sense Multiple Access with Collision
Detect (CSMA/CD) to control Media access. Ethernet hub connects in half-duplex
mode where the possibility of data collision are inevitable at most of the times.
Switches
Switches works as the connection points for an Ethernet network. Just like in hub,
devices in switches are linked to them through twisted pair cabling. But the variation
shows up in the manner both the devices, hub and a switch, takes the data. Hub
works by sending the data to all the ports on the device whereas a switch transfers it
only to that port which is linked to the destination device.
A switch does so by having an in-built learning of the MAC address of the devices
linked to it. Since the sending of data signals are predefined in a switch, therefore
the network performance is consequently effective. Switches work in full-duplex
mode where nodes can send and receive data from the switch simultaneously unlike
in half-duplex mode.
The transmission bandwidth in switches is double as compared to the Ethernet
hub transferring around 20Mbps connection into 30Mbps and around
200Mbps connection to become 300Mbps. Performance enhancements are
observed in networking with the extensive utilization of switches in the recent days.
Bridges
A bridge is a type of computer networking component that builds the connection with
the other bridge networks that are
present on the same protocol. It is
implemented at the Data Link layer of
the OSI Model and links the different
networks together and creates
communication between them. It
combines two local-area networks;
two physical LANs into bigger logical
LAN or two segments of the already
existing LAN that use the same
protocol.
Apart from creating larger networks, bridges are also utilized to segment bigger
networks into smaller portions. The bridge performs this by placing itself between
the two portions of two physical networks and managing the flow of the data
between them.
Types of Bridges
There are basically three types in which bridges can be segmented:
Transparent Bridge: As the name signifi es, it appears to be transparent
for the other devices on the network. The other devices are ignorant of its
existence. It only restricts or permits the data according to the MAC address.
Source Route Bridge: It received its name from the fact that the way
which packet takes via the network is implanted within the packet. It is mainly
utilized in Token ring networks.
Translational Bridge: The process of conversion happens via
Translational Bridge. It transforms the data format of one networking to
another. For example, conversion of Token ring to Ethernet and vice versa.
Routers
Routers are network layer components and are particularly categorised as Layer- 3
components of the OSI Model. They works on logical addressing information in the
Network header of a packet like IP Addresses.
Router is utilized to implement bigger complex networks by complex traffic routing. It
has the authority to connect dissimilar LANs on the same protocol. It also has the
authority to restrict the flow of broadcasts. A router mainly comprises of a hardware
component or a system of the computer which has multiple network interface and
routing software.
Functionality
When a router receives the data, it analyses the destination address by checking the
header of the packet. Once the address is analysed, it finds in its routing table to get
know how to connect to the destination and then transmits the packet to the higher
hop on the route. The hop might be the last destination or another router.
Routing tables play a very crucial role in letting the router takes a decision. That is
why a routing table needs to be updated and complete. The two methods using
which a router can receive data are:
Static Routing: In static routing, the routing information is fed into the routing
tables manually. It does not only become a time-taking task but gets prone to errors
as well. The manual updating is also required in case of statically configured routers
when change in the topology of the network or in the format takes place. Thus static
routing is considered for smallest environments with least number of one or two
routers.
Dynamic Routing: For larger environment dynamic routing proves to be the
practical solution. The process includes use of peculiar routing protocols to establish
communication. The purpose of these protocols is to facilitate the other routers to
transmit information about to other routers, so that the other routers can build their
own routing tables.
Repeater
Repeaters are network devices operating at physical layer of the OSI model that
amplify or regenerate an incoming signal before retransmitting it.
They are incorporated in networks to expand its coverage area. They are also
known as signal booster
Brouters
Brouters are the collaboration of bridge and routers. They take up the functionality of
the both networking components working as a bridge when forwarding data between
networks, and serving as a router when routing information to individual systems.
Brouter works as a filter that permits some data into the local network and redirects
unknown packets to the other network.
These days Brouters are not used because their functionality is embedded into the
routers in order to work as bridge as well.
RJ 45 Connector
RJ45 is a type of cable connector which is mainly used in computer
networks. RJ45 is mainly used for ethernet networking which is used to connect
different type of devices like a switch, hub, PC, router, firewall to each other. RJ45 is
the most known and popular connector type in the IT world
Gateways
Gateway is a device which is implemented to combine multiple networks and
transmits packets from one packet to the
other network. Working as the ‘gateway’ in
middle of different networking systems or
computer programs, a gateway is a
component which forms a link between
them.
It facilitates the computer programs, either
on the same device or on different device
to share information across the network via
protocols. A router is also a kind of
gateway, because it interprets data from one network protocol to another.
Other components such as bridge translates the data into different forms among two
networking systems. Then a software application transforms the data from one
format into another. Gateway is a crucial tool to translate the data format, even
though the data itself remains unchanged. Gateway might be implemented in some
other device to add its functionality into another.
Network Card
Network cards are sometimes referred as Network Interface Cards (NICs). These
are hardware components that link a computer with the network. They are installed
on the mother board. They works for
developing a physical connection of the
network to the computer. Computer data is
transformed into electrical (analog) signals
send to the network via Network Interface
Cards.
They are also able to manage some
important data-transformation function. These days’ network cards are software
controlled unlike in older days when drivers were required to configure them. In case
if the NIC doesn’t packed with the software in box then the latest drivers or the
associated software can be downloaded from the internet also.
Network Protocols
Network protocols forms a language of instructions and translations for
communication between the network components. It is mandatory that a networked
device should have one or more protocol drivers. Generally, for two computers to
interconnect on a network, they must use identical protocols. In some cases, a
computer is designed to use more than one protocols. Network protocols such as
HTTP, TCP/IP offer a provisions on which much of the Internet stands.
System requirement:
The bus compatibility should be verified on installation of an NIC into the
machine. The commonly utilized bus system is Peripheral Component
Interconnect (PCI)
Memory I/O addresses and IRQ are required.
Requirement of drivers if not already installed.
Modems
Modem is a device which transforms the computer-generated digital signals into
analog signals to enable their travelling through
phone lines. The ‘modulator-demodulator’ or
modem may work as a dial up for LAN or to
connect to an ISP.
Modems can be both external, as in the device
which connects to the USB or the serial port of a
computer machine, or proprietary components for
handheld smart devices and other devices, also
as internal, in the form of add-on expansion cards
for computer systems and PCMCIA cards for
laptop computers.
Design of a modem differs for both the external and internal modem. In internal
modems, IRQ – Interrupt request is utilized to configure the modem in addition to I/
O, which is a memory address. Usually before the installation of built-in modem,
integrated serial interfaces are disabled, assigning them the COM2 resources at the
same time.
For external types of a modem, the modem assigns and uses the resources itself.
This is especially helpful for the USB port and laptop users as the non-complex and
simpler nature of the process renders it far much more useful for daily usage.
At the time of setup, the second step to make sure the proper working of a modem is
the installation of drivers. The modem working efficiency and processing is decided
by two factors:
Speed of UART –An acronym for Universal Asynchronous Receiver or
Transmitter chip (installed on the motherboard to which the modem connection is
established)
Speed of the modem itself
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Computer Security
The definition of the term computer security has changed in recent years. Prior the
problem of data security became hugely publicized in the media, most people’s
thoughts of computer security based on the physical machine. Traditionally,
computer services have been physically protected for the following three reasons:
Pharming
Pharming Is another technique used to steal confidential access code. It works by
redirecting users to a rogue server.
SQL injection
A SQL injection attack consists of insertion or “injection” of a SQL query via the input
data from the client to the application.
A successful SQL injection exploit can read sensitive data from the database, modify
database data (Insert/Update/Delete), execute administration operations on the
database (such as shutdown the DBMS), recover the content of a given file present
on the DBMS file system and in some cases issue commands to the operating
system.
SQL injection attacks are a type of injection attack, in which SQL commands are
injected into data-plane input in order to affect the execution of predefined SQL
command,
Spyware
Spyware is a type of malicious software -- or malware -- that is installed on a
computing device without the end user's knowledge. It invades the device, steals
sensitive information and internet usage data, and relays it to advertisers, data firms
or external users.
Spyware secretly places itself on your computer and views transactions that are
made on websites.
Adware
Adware (short for advertising-supported software) is a type of malware that
automatically delivers advertisements. Common examples of adware include pop-
up ads on websites and advertisements that are displayed by software. Often times
software and applications offer “free” versions that come bundled with adware.
Bot/Botnet
A type of software application or script that performs tasks on command, allowing an
attacker to take complete control remotely of an affected computer.
Spyware and adware both cause a great risk dealing with credit card fraud
and identification theft.
Clickjacking
Clickjacking is an attack that tricks a user into clicking a webpage element which is
invisible or disguised as another element. The invisible page could be a malicious
page, or a legitimate page the user did not intend to visit – for example, a page on
the user's banking site that authorizes the transfer of money.
A hacking attack that tricks victims into clicking on an unintended link or button,
usually disguised as a harmless element.
Encryption
Encryption is the method by which information is converted into secret code that
hides the information's true meaning. The science of encrypting and decrypting
information is called cryptography. In computing, unencrypted data is also known as
plaintext, and encrypted data is called ciphertext.
The process of encoding data to prevent theft by ensuring the data can only be
accessed with a key.
It helps protect private information, sensitive data, and can enhance the
security of communication between client apps and servers.
Hacker
A hacker is a person who uses computer system, networking or other techniques in
order to overcome a technical issues. The word hacker may define anyone with
technical skills, but it generally refers to a person who utilises his or her abilities to
attain unauthorized access to machines or networks in order to commit criminal
activities.
A hacker may, for example, steal data and info to hurt people via identity theft,
damage or bring down systems and, in some cases, keep such systems hostage to
demand ransom.
The word hacker has traditionally been a divisive one, often being used as a term of
admiration for a person who possess a high degree of skill, and also creativity in his
or her approach to technical issues. However, the term is generally applied to an
individual who utilizes this knowledge for illegal or unethical purposes.
Types of Hackers
The security community has unofficially used definitions to hat colour as a way various
hackers are identified, usually categorized into three types: white hat, black hat and
grey hat.
1. White hat hackers, also called ethical hackers, strive to work in the public's best
interest, instead of creating turmoil. Many white hat hackers used to perform
penetration testing, hired to test to break into the company's networks to figure out
and report on security vulnerabilities. The security firms then aid their clients mitigate
security risks before criminal hackers may exploit them.
2. Black hat hackers by their own will acquire unauthorized access to networks and
machines with malicious intentions, in order to steal data, spread malware or profit
from ransom ware, vandalize or in some case damage systems or for any other
purpose, which involves gaining notoriety. Black hat hackers are clearly criminals by
definition as they violate regulations against accessing machines without
authorization, but they may also involve in other illegal jobs, including identity theft
and distributed denial-of-service attacks.
3. Grey hat hackers comes approximately between white hat hackers and black hat
hackers. While their motives can be same as to those of white hat hackers, grey
hats are more likely than white hat hackers to access systems in absence of
authorization; at the same time, they are more likely than black hat hackers to
prevent doing intentional damage to the systems they hack. Although they aren't
typically, or solely, motivated by money, grey hat hackers may help to fix
vulnerabilities they have found through their own, unauthorized, activities instead of
using their knowledge to exploit vulnerabilities for illegal intentions.
Vulnerability
Vulnerability is a flaw which enables an attacker to decrease a system's information
guarantee. Vulnerability is the combination of three elements: a system susceptibility
or weakness, attacker permissibility to the flaw, and attacker ability to exploit the
flaw. In order to exploit vulnerability, the hacker must have at least one equivalent
tool or technique that can link to a system flaw. In this frame, vulnerability is also
referred as the attack surface.
Backdoors
A backdoor in a computer system, is a process of bypassing usual authentication,
securing remote permit to a computer, gaining access to plaintext, and so on, while
trying to stay undetected.
The backdoor can take the resemblance of an installed program (e.g., Back Orifice),
or could be an amendment to an existing program or hardware component. It may
also forged information about disk and memory usage.
Denial-of-Service Attack
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or
network, making it inaccessible to its intended users. DoS attacks accomplish this
by flooding the target with traffic, or sending it information that triggers a crash.
DoS attack is not to steal information but to slow or take down a web site. Denial of
service attack (DOS) is an attack against computer or network which reduces,
restricts or prevents accessibility of its system resources to authorized users.
Digital Signature
A digital signature is an electronic form of a signature that can be used to
authenticate the identity of the sender of a message or the signer of a document,
and also ensure that the original content of the message or document that has been
sent is unchanged.
Ransomware
Ransomware is a form of malware that encrypts a victim's files. The attacker then
demands a ransom from the victim to restore access to the data upon payment.
“Ransomware is extortion software that can lock your computer and then
demand a ransom for its release.”
Deepfake
An audio or video clip that has been edited and manipulated to seem real or
believable. The most dangerous consequence of the popularity of deepfakes is that
they can easily convince people into believing a certain story or theory that may
result in user-behavior with a bigger impact as in political or financial.
Social Engineering
Social engineering is a manipulation technique that exploits human error to gain
private information, access, or valuables.
Scams based on social engineering are built around how people think and act. So,
once a hacker understands what motivates a person’s actions, they can usually
retrieve exactly what they’re looking for – like financial data and passwords.
Direct-Access Attacks
A malicious user gaining physical entry to a system (or part thereof) can conduct many
functions, install various types of devices to compromise integrity, including operating
system amendments, software worms, key loggers, and covert voice devices. The
attacker may also simply download large amounts of data onto backup media, for
example CD-R/DVD-R, tape; or portable drives such as key drives, digital cameras or
digital audio players. One more common technique is to start an operating system
stored on a CD-ROM or other bootable device and retrieve the data from the hard drive
(s) this way. The only way to prevent this is to encrypt the storage device and save the
key away from the system. Direct-access attacks are the only kind of threat to
Standalone machines (never connect to internet), in majority of cases.
Eavesdropping
Eavesdropping is the practice of surreptitiously monitoring a private conversation,
typically between hosts connected on a network. For instance, programs like
Carnivore and NarusInsight have been utilized by the FBI and NSA to eavesdrop on
the machines of internet service providers.
Spoofing
Spoofing of user identity defines a condition in which one person or program
intentionally masquerades as another by falsifying information and thereby
achieving an illegitimate advantage.
Snooping
Snooping, in a security context, is unauthorized access to another person's or
company's data. The practice is similar to eavesdropping but is not necessarily
limited to gaining access to data during its transmission
Tampering
Tampering defines an intentional amendment of products in the means that would
turn them harmful to the user.
Repudiation
Repudiation defines a condition where the authenticity of a signature is being
compromised.
Information Disclosure
Information Disclosure (Privacy breach or Data leak) defines a condition where
information, thought as protected, is shared in an untrusted place.
Elevation of Privilege
Elevation of Privilege defines a condition where a user or a program tries to attain
elevated privileges or permit to resources that are usually restricted to him/it.
Exploits
An exploit is a fragment of software, a chunk of data, or queue of commands that
uses a software "bug" or "glitch" to cause unintended or unanticipated working to
occur on computer software, machine itself, or something electronic (usually
computerized). This frequently involves such things as attaining control of a
computer machine or permitting privilege escalation or a denial of service attack.
The term "exploit" normally refers to small programs created to take advantage of a
software weakness that has been revealed, either remote or local. The code from
the exploit program is periodically reused in Trojan horses and computer viruses.
Indirect Attacks
An indirect attack is an attack conducted by a third-party computer machine. By
using second person’s computer to conduct an attack, it becomes far more
challenging to track down the real attacker. There have also been events where
attackers used the anonymity of public systems, such as the tor onion router
system.
5. Cyber security is referred as protecting computer machines, which are linked over
the computer networks
Types of Attacks
Attacks are categorized into two types:
Active attacks: the body of the original message are amended in some
ways.
Hardware, the physical part of the machine, like the system memory and disk drive
Software, the programming that facilitates services, like operating system, word
processor, net browser to the user
Trojans
A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer.
Viruses
A computer virus is a malicious program which is transmitted into
the user’s computer without user’s knowledge. It copies itself and
effects the files and programs on the user’s PC. The actual
intention of a virus is to make sure that the victim’s computer will
never be able to work properly or even at all.
Computer Worm
A computer worm is a kind software program that can replicate
itself from one computer to another, without manual involvement.
The potential vulnerability here is that it will utilize up user’s
computer hard disk space as a worm can copy in large volume and
with very high speed.
Phishing
Disguising as an authentic individual or business, phishers try to
steal sensitive financial or personal data through fraudulent email
or instant mails. Phishing is in real unfortunately very simple to
execute. User is deluded into thinking it’s the genuine mail and he/
she may enter his/her personal information.
Botnet
A botnet is a cluster of computers linked to the internet that have
been compromised by a hacker through a computer virus. This
particular computer is known as ‘zombie computer’.
Rootkit
A rootkit is a computer program created to facilitate continued
privileged permit to a computer while actively hiding its
activity. Once a rootkit has been loaded, the controller of the
rootkit will be having ability to remotely control and execute files
and change system specifications on the host machine.
Key logger
Also called a keystroke logger, key loggers can track the real-time working of a user
on his/her computer. It maintains a record of all the keystrokes
done by user keyboard. Key logger is also a very strong threat to
steal people’s login credential, namely, username and password.
These are perhaps the very common security threats that anyone
can come across. Apart from these, there are different ones like
spyware, wabbits, scareware, bluesnarfing and so on. Fortunately, there are
techniques to secure the system against these attacks.
Logic Bomb
A logic bomb is a piece of code intentionally inserted into a software system that will
set off a malicious function when specified conditions are met. For example, a
programmer may hide a piece of code that starts deleting files (such as a
salary database trigger), should they ever be terminated from the company.
Software that is inherently malicious, such as viruses and worms, often contain logic
bombs that execute a certain payload at a pre-defined time or when some other
condition is met.
This technique can be used by a virus or worm to gain momentum and spread
before being noticed. Some viruses attack their host systems on specific dates, such
as Friday the 13th or April Fools' Day. Trojans and other computer viruses that
activate on certain dates are often called "time bombs".
What is Anti-Virus?
Antivirus software is a commonly available and widely used program or set of
programs that are designed to restrict, search for, detect, and remove software
viruses, and other malicious software like worms, Trojans, adware, and more.
Today's malware (an umbrella term that encapsulates computer viruses) alters
appearance suddenly to prevent detection by older, definition-based antivirus
program. Viruses can be designed to cause damage to the device, prohibit a user
from accessing data, or to take control of the computer.
Always be sure user has the best, up-to-date security software installed to protect
his/her devices like computers, laptops, tablets, and smartphones.
Unfortunately, we usually expect our online data to stay protected without lifting a
finger or spending anything. Companies encouraging to do it without any cost are
partly responsible for the ambiguity, to be sure.
But consumers must insist on features like identity theft security, mobile security,
and support facilities when it comes to their data security, too—features normally
lacking with priceless solutions.
What is Firewall?
A firewall is a kind of security-conscious type of hardware or software that stays
between the computer and our network with a primary task: preventing malicious
software from reaching us. In other words we can say that the firewall works like a
security guard between the Internet and our local area network (LAN). All network
traffic passing through the LAN must face the firewall, which restricts unauthorized
access to the network.
Types of Firewalls
1. Packet-filtering firewall: It checks every packet that passes the fi rewall and
examines the packet as per the set of rules that user sets up. If the packet gets to
pass the test, it’s allowed to go through. If the packet fails to pass the test then it is
rejected. Packet filters are the most inexpensive variety of firewall. That is why
packet-filtering firewalls are used very common.
3. Deep packet inspection (DPI): It is the actual data of the packets is checked
so viruses, spam, and other harmful content can be restricted. DPI also enables
practices, such as data mining, eavesdropping, and content censorship, which make
its way through a controversial subject.
2. Securing computer:
a. Activate the firewall: Firewalls are the primary line of cyber defence.
They restrict connections to unknown or bogus websites and will keep out
various types of viruses and hackers.
3. Being Social-Media Savvy: Making sure that social networking profi les (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are made private. Checking the security
settings. Being careful what information are being posted online. Once it is on
the Internet, it is stays there forever!
4. Securing Mobile Devices: Being aware that the mobile device is vulnerable to
viruses and hackers. Downloading applications from trusted sources.
5. Install the latest operating system updates: Keeping the applications and
operating system (e.g. Windows, Mac, Linux, etc.) current with the earliest system
updates. Turning on automatic updates to prohibit potential attacks on older
software.
6. Protecting the Data: Using encryption for the most sensitive documents such
as tax returns or financial records, making regular back-ups of all the important data,
and storing it in different location.
10. Avoiding being scammed: Always checking before clicking on a link or file of
unknown origin. Not feeling compelled by emails. Checking the source of the
message for authenticity. When doubtful, verifying the source. Avoiding
replying to emails that ask to verify the information or confirm the user ID or
password.
11. Calling the right person for help: Not getting panic! If anyone is a victim, if
encountered illegal Internet content (e.g. child exploitation) or if suspecting a
computer crime, identity theft or a commercial scam, reporting this to the local law
authority. If need help with maintenance or software installation on the computer,
consulting with authorised service provider or a certified computer technician.