0% found this document useful (0 votes)
189 views

Arihant Computer General Awareness English

The document provides an overview of computers, including their functions, features, history, generations, classifications, and applications. It explains the evolution of computers from early mechanical devices to modern supercomputers and categorizes them based on size, work, and purpose. Additionally, it includes a question bank for practice related to computer awareness.

Uploaded by

Narayan Rath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views

Arihant Computer General Awareness English

The document provides an overview of computers, including their functions, features, history, generations, classifications, and applications. It explains the evolution of computers from early mechanical devices to modern supercomputers and categorizes them based on size, work, and purpose. Additionally, it includes a question bank for practice related to computer awareness.

Uploaded by

Narayan Rath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 186

CONTENTS

1. Introduction to Computer 1-10


2. Computer Architecture 11-17
3. Computer Hardware 18-30
4. Computer Memory 31-40
5. Data Representation 41-49
6. Computer Software 50-58
7. Operating System 59-67
8. Programming Concepts 68-74
9. Microsoft Windows 75-84
10. Microsoft Office 85-103
11. Database Concepts 104-112
12. Data Communication and Networking 113-124
13. Internet and its Services 125-136
14. Computer Security 137-145
15. Overview of Future Technology 146-152
16. Miscellaneous 153-158

Ÿ Practice Sets (1-5) 159-173


Ÿ Abbreviation 174-177
Ÿ Glossary 178-184
C H A P T E R

01
INTRODUCTION

df
_p
TO COMPUTER
na
ap
:@

The word ‘computer’ has been derived from the Latin word ‘computare’, which means ‘to calculate’. A
computer is an electronic device that manipulates information or data according to the set of instructions
TG

called programs. It has the ability to store, retrieve and process data.

Functions of Computer
n

1. Input Information or data that is entered into a computer is called input. It sends data and
O

instructions to the Central Processing Unit (CPU).


2. Processing It is the sequence of actions taken on data to convert it into information which is
h

meaningful to the user. It can be calculations, comparisons or decisions taken by the computer.
c

3. Output It makes processed data available to the user. It is mainly used to display the desired result to
ar

the user as per input instructions.


4. Storage It stores data and programs permanently. It is used to store information during the time of
Se

program execution and possible to get any type of information from it.

Features of Computer
1. Speed The computer can process data very fast at the rate of millions of instructions per second.
2. Accuracy Computers provide a high degree of accuracy. They respond to the user as per the input
instructions.
3. Storage Capacity Computers are capable to store huge amount of data, which depends on the
capacity of hard disk.
4. Versatility Computers can do different types of work simultaneously. They can perform multiple
tasks at a same time.
5. Diligence Unlike human beings, a computer is free from monotony, tiredness, lack of concentration,
etc., and can work for hours without creating any errors.
2 Learn, Revise & Practice ~ Computer Awareness

6. Secrecy Leakage of information is reduced by creating login system with password protection.
7. Reliability Computers are more reliable than human beings. Computers always produce exact results.
The possibility of errors occur only if the input is wrong, i.e. the computers never make mistakes of
their own accord.
8. Plug and Play Computers have the ability to automatically configure a new hardware and software
components.

History of Computer
Computer is not the creation of one day, rather it took a long period for the development of modern
computer.

df
History of computer is described in this table

_p
Inventions Inventors Characteristics Applications
■ First mechanical calculating device. ■ Used for addition and subtraction
Abacus

na
■ A horizontal rod represents the one, tens, operations.
1602 China
hundred, etc. ■ Calculation of square roots can also
ap be performed.
■ Three dimensional structure. ■ Perform multiplication of numbers.
Holding numbers from 0 to 9 only.
:@

Napier’s John Napier
Bones
■ Represent graphical structure of calculating
(Scotland) result.
1617 ■ Technology used for calculation called
TG

Rabdologia.
■ First mechanical adding machine. ■ Perform addition and subtraction of
■ This machine worked on the principle of two numbers.
Pascaline Blaise Pascal
n

(France) odometer and watch.


1642 Mainly designed with regard to the
O

pressure of liquid.
Joseph Marie It was first mechanical loom. Simplified the process of textiles.
h

■ ■
Jacquard’s
Loom Jacquard ■ Used punched card for the sequence of
c

1801 (France) operation.


ar

Analytical Charles ■ First general-purpose computer. ■ It was a decimal machine used sign
Se

Engine Babbage ■ Stored program in the form of ‘pegs’ also and magnitude for representation of
1837 (London) called barrels. a number.

Tabulating Herman ■ It used punched cards for reading numbers. ■ It was used in the 1890 census.
Machine Hollerith ■ It was the first electromechanical machine.
1890 (America)
MARK-1 Howard ■ Consists of interlocking panels of small ■ Mainly used in the war effort during
1944 Aiken glass, counters, switches and control World War-II.
(America) circuits. ■ Magnetic drums are used for
■ Data can be entered manually. storage.

It is a combination of twenty accumulators.


■ Used for weather prediction, atomic
JP Eckert and ■

ENIAC energy calculation and other


JW Mauchly ■ First electronic digital computer. scientific uses.
1946 (America) ■ Used in IBM and other.
Introduction to Computer 3

Inventions Inventors Characteristics Applications


■ Electronic digital computer ■ Logical design of a computer with a
John Von
EDVAC stored program.
Neumann
1947
(America)
■ It was the first computer which provided ■ Capable of storing instructions and
EDSAC Maurice
storage capacity. data in memory.
1949 Wilkes ■ First computer program was run on ■ Used mercury delay lines for
(America)
machine. memory, vacuum tubes for logic.
J. Presper ■ First general-purpose electronic computer ■ Used magnetic tapes as input and
Eckert and with large amount of input and output. output.
UNIVAC John ■ Use for account work.
1951

df
Mauchly
(America)

_p
IBM-650 ■ Provided input/output units converting ■ Payroll processing
IBM alphabetical and special characters to
Computer ■ Oil refinery design

na
Company two-digit decimal code.
1953 ■ Market research analysis

Generations of Computer
ap
:@
A generation refers to the state of improvement in the development of system. Each generation of
computer is characterised by a major technological development that fundamentally changed the way,
computers operate.
TG

Generations Switching Storage Operating Systems/ Characteristics Applications


Devices Devices/Speed Programming
Languages
First Vacuum tubes Magnetic drums Batch operating system Fastest computing Used for scientific
n

■ ■

(1940-56) (milli seconds) /Machine language device. purpose.


O

(Binary numbers 0’s ■ Generate large amount e.g. ENIAC,


and 1’s) of heat. UNIVAC, MARK-1,
etc.
h

■ Non-portable.
c

Second Transistors Magnetic core Time sharing OS, ■ More reliable and less ■ Used for commercial
ar

(1956-63) (Made up of technology Multitasking OS/ prone to hardware production.


semiconductors) (micro seconds) Assembly language, failure. e.g. PDP-8,
Se

high level language ■ Portable and generate IBM-1401, etc.


less amount of heat.
Third Integrated Magnetic core Real-time system/ ■ Consumed less power. ■ Database
(1964-71) Circuits (ICs) as primary storage High level language ■ Highly sophisticated management system
(Made up of medium (nano (FORTRAN, COBOL, technology required. e.g. NCR-395, B6500,
silicon) seconds) ALGOL) etc.
Fourth Large Scale Semi conductor Time sharing ■ More reliable and ■ Electronic fund
(1971- Integrated (LSI) memory, /PASCAL, ADA, portable. transfer, Distributed
Present) circuit, Winchester disc COBOL-74, ■ This generation leads to system,
microprocessor (pico seconds) FORTRAN IV better communication e.g. Intel 4004 chip,
and resource sharing. Macintosh.
Fifth Super Large Scale Optical disc Knowledge ■ Parallel processing. ■ Artificial intelligence
(Present and Integrated (SLSI) Information Processing ■ Intel core e.g. Robotics.
Beyond) chips System microprocessor is
implemented.
■ Enables mega chips.
4 Learn, Revise & Practice ~ Computer Awareness

Classification of Computer
Classification of Computer

Based on Size Based on Work Based on Purpose

Microcomputer Mainframe Analog Hybrid General Special


Computer Computer Computer Purpose Purpose
Digital Computer Computer
Minicomputer Supercomputer Computer

Based on Size For example, Raspberry Pi, which could be used in

df
schools to teach science to children.
Microcomputer

_p
This type of computer is the least powerful than Embedded Computer
other computers, which are based on size, yet the

na
It is a small size, powerful and easy to operate
most widely used and is also called portable electronic module, based on microcontroller/
computer. microprocessor and acts as a bridge between
Some types of microcomputer are as follows
ap
electronics hardware and computer software. e.g.
cellphone, camera, automotive system, digital watch,
(a) Desktop Computer or Personal
:@
etc.
Computer (PC) This is small and relatively
economical computer. This is based on the Quantum Computer
microprocessor technology (Integrated Quantum computer was first introduced by Richard
TG

Circuit-IC). Feynman. It uses quantum mechanical phenomena.


It is the fastest computer imitating brain working.
(b) Laptop This computer is also known as
ultra book or notebook. This is portable Minicomputer
n

and lightweighted. It includes rechargeable


These are smaller in size, faster and cost lower than
O

battery, so you can work with this anywhere.


mainframe computers. Initially, the minicomputer
(c) Handheld or Palmtop Computer This was designed to carry out some specific tasks, like
h

is the smallest and is designed to fit into the engineering and Computer Aided Design (CAD)
c

palm. So, this is also known as palmtop. calculations.


ar

It is practical for certain functions such as


But now, they are being used as central computer
phone books and calendars. It uses the pen
which is known as server. The speed of
Se

for input instead of keyboard. For example,


minicomputer is between 10 to 30 MIPS (Million
PDA (Personal Digital Assistant), tablets, etc.
Instructions Per Second). First minicomputer was
(d) Workstation Computer This computer is PDP-8. Some examples of minicomputer are
dedicated to a user or group of users engaged IBM-17, DEC PDP-11, HP-9000, etc.
in business or professional work. It includes
one or more high resolution displays and a Mainframe Computer
faster processor than a Personal Computer These types of computer having large internal
(PC). memory storage and comprehensive range of
software. It is considered as the heart of a network
Nano Computer of computers or terminals that allow a large
Nano computer is a general term used to describe a number of people to work at the same time. Some
computer smaller than a microcomputer, usually examples of mainframe computer are IBM-370,
about the size of a credit card. IBM-S/390, UNIVAC-1110, etc.
Introduction to Computer 5

Supercomputer Digital Computer


These are the fastest and most expensive computers. These computers work on binary digits. A digital
They have high processing speed compared to other computer, not only performs mathematical
computers. Supercomputers are most powerful, calculations, but also combines the bytes to
large in size and memory, compared to all other produce desired graphics, sounds.
computers. For example, Desktop (PC).
The speed of supercomputers are measured in
Hybrid Computer
FLOPS (Floating Point Operations Per Second).
Supercomputers are used for highly calculation These computers are the combination of analog and
intensive tasks, such as weather forecasting, nuclear digital computers. Machines used in hospitals like
research, military agencies and scientific research ECG and DIALYSIS are the commonly used hybrid

df
computers.
laboratories.

_p
Some examples of supercomputer are described below Based on Purpose
(i) CRAY-1 was the world’s first supercomputer On the basis of purpose, computer is categorised as

na
introduced by Seymour R CRAY (Father of follows
Supercomputing) in 1976.
General Purpose Computer
ap
(ii) PARAM was the first supercomputer
General purpose computers are those computers,
developed by Vijay Bhatkar in India in 1991.
which are used to solve variety of problems by
:@

(iii) PARAM Siddhi is the latest machine in the changing the program or instructions.
series of PARAM made by C-DAC and released
on 16 November, 2020. For example, To make small database,
calculations, accounting, etc.
TG

(iv) Pratyush, the first multi-petaflops


supercomputer was unveiled at Pune based Special Purpose Computer
Indian Institute of Tropical Meteorology Special purpose computers are those computers’
n

(IITM) in India. which are used to solve a single and dedicated


O

(v) Fugaku is a claimed exascale supercomputer at type of problem.


the RIKEN Center for Computational Science in For example, Automatic aircraft landing,
h

Kobe, Japan. It is scheduled to start operating in multimedia computer, etc.


c

2021. It has defended its title as the world’s


ar

fastest supercomputer.
Tit-Bits
Based on Work
Se


Charles Babbage is known as the father of
On the basis of work, computer is categorised as follows computer. Alan Turing is known as the father of
the modern computer.
Analog Computer ■
Siddhartha was the first computer developed in
India. First computer in India was installed in
These computers carry out arithmetic and logical Indian Statistical Institute (ISI), Kolkata.
operations by manipulating and processing of data. ■
Transistors were invented by Bell Laboratory.
For example, Speedometers, seismograph, etc. ■
In 1958, Jack St. Clair Kilby and Robert Noyce
Analog computer can perform several mathematical invented the first IC (Integrated Circuit).
operations simultaneously. It uses continuous

ENIAC (Electronic Numerical Integrator and
Computer) was the first electronic computer
variables for mathematical operations and utilises developed in Moore School of Engineering,
mechanical or electrical energy. USA.
6 Learn, Revise & Practice ~ Computer Awareness

QUESTION BANK
1. The word ‘computer’ has been derived from 10. Which among the following cycle consists
which of the following language? of input, processing, output and storage as
(1) Greek (2) English its constituents? [IBPS Clerk Mains 2017]
(3) Hindi (4) Latin (1) Processing (2) Output
(3) Input (4) Storage
2. Input, output and processing devices (5) Data
grouped together represent a(n)
(1) mobile device 11. ……… is data that has been organised and

df
(2) information processing cycle presented in a meaningful fashion.
(3) circuit board [IBPS Clerk Mains 2017]

_p
(4) computer system (1) A process (2) Software
(3) Storage (4) Information
3. Which of the following is the correct order

na
(5) Data
of the four major functions of a computer?
(1) Process, Output, Input, Storage 12. Data or information used to run the
(2) Input, Output, Process, Storage
apcomputer is called
(1) hardware (2) CPU
(3) Process, Storage, Input, Output
:@

(4) Input, Process, Output, Storage (3) peripheral (4) None of these

4. Collecting the data and converting it into 13. The steps and tasks needed to process data,
information is called such as responses to questions or clicking
TG

(1) processing (2) compiling an icon, are called [IBPS Clerk Mains 2017]
(3) importing (4) exporting (1) instructions
5. Computer cannot perform (2) the operating system
n

(3) application software


(1) input (2) output
O

(3) thinking (4) processing (4) the system unit


(5) the hardware unit
6. A computer cannot perform which of the
h

following functions? 14. The earliest calculating device is


c

(1) Addition (2) Subtraction (1) calculator (2) abacus


ar

(3) Bake a cake (4) Division (3) difference engine (4) analytical engine
Se

7. Part number, description and number of parts 15. Abacus can perform
ordered are examples of (1) addition (2) subtraction
(1) control (2) output (3) multiplication (4) Both (1) and (2)
(3) processing (4) feedback
16. The Napier’s technology used for
8. Benefit(s) of computer is/are calculation is called
(1) very fast and can store huge amount of data (1) Naptologia (2) Vibologia
(2) provide accurate output either input is correct (3) Semiconductor (4) Rabdologia
or not
(3) think about the processing 17. Pascaline is also known as
(4) All of the above (1) abacus (2) adding machine
(3) division machine (4) difference machine
9. A collection of unprocessed items is
(1) information (2) data [SBI PO 2015] 18. Punched cards were first introduced by
(3) memory (4) reports (1) Powers (2) Pascal
(5) None of these (3) Jacquard (4) Herman Hollerith
Introduction to Computer 7

19. Punched card is also called [RRB NTPC 2016] 28. Computer size was very large in
A. Hollerith card B. Video Card (1) first generation
C. Sound Card D. Accelerator Card (2) second generation
Codes (3) third generation
(1) B (2) C (4) fourth generation
(3) A (4) D 29. First generation computers were based on
20. Which of the following is known as father (1) transistors (2) conductors
of computer? [SSC CGL 2015, UPSSSC 2016] (3) ICs (4) vacuum tubes
(1) Dennis Ritchie (2) Napier 30. Computer built before the first generation
(3) Charles Babbage (4) Alan Turing computer was

df
21. Who is known as the father of the modern (1) mechanical
computer? (2) electromechanical

_p
(1) Charles Babbage (2) Alan Turing (3) electrical
(3) Blaise Pascal (4) Jordan Murn (4) electronics

na
22. Analytical engine developed by 31. First generation computers used .........
(1) Blaise Pascal (2) Charles Babbage
aplanguage(s).
(3) Dennis Ritchie (4) Alan Turing (1) machine (2) assembly
23. The analytical engine developed during first (3) Both (1) and (2) (4) high level
:@

generation of computers used ......... as a 32. The second generation of computers was
memory unit. witnessed in the years from [UPSSSC 2018]
(1) RAM (2) floppies
TG

(1) 1940-1956 (2) 1963-1972


(3) cards (4) counter wheels (3) 1957-1962 (4) 1973-Present
24. Tabulating machine was the first 33. Second generation computers can be
electromechanical machine developed by
n

characterised largely by their use of


(1) Herman Hollerith (2) Howard Aiken
O

[SSC CGL 2018]


(3) Blaise Pascal (4) John Napier (1) integrated circuits (2) vaccum tubes
h

25. Who among the following created the (3) microprocessors (4) transistors
Electronic Discrete Variable Automatic
c

34. Speed of first generation computer was in


Computer (EDVAC) with a memory to hold
ar

(1) nano seconds


both, a stored program as well as data? (2) milli seconds
Se

[SSC CGL 2018]


(3) nano-milli seconds
(1) Thomas H Flowers (2) Arthur Samuel (4) micro seconds
(3) Bletchley Park (4) John Von Neumann
35. Time sharing became possible in .........
26. The first computer which provides storage generation of computers.
is (1) first (2) second
(1) EDSAC (2) EDVAC (3) third (4) fourth
(3) MARK-I (4) ACE 36. Third generation of computers was
27. Name the first general purpose electronic witnessed in the years from……
computer. [UPSSSC 2018]
(1) ADVAC (2) ADSAC (1) 1940-1956 (2) 1963-1972
(3) UNIVAC (4) EDVAC (3) 1957-1962 (4) 1973-Present
8 Learn, Revise & Practice ~ Computer Awareness

37. Integrated Circuits or ICs were started to be 45. Small and cheap computers built into
used from which generation of computers? several home appliances are of which type?
[IBPS PO 2016] [SSC (10+2) 2011]
(1) First generation (2) Second generation (1) Mainframes (2) Mini computers
(3) Third generation (4) Fourth generation (3) Micro computers (4) None of these
(5) Fifth generation
46. Desktop and personal computers are also
38. Chip is a common nickname for a(n) known as
[IBPS Clerk 2014, 15]
(1) supercomputers (2) servers
(1) transistor (2) resistor
(3) mainframes (4) microcomputers
(3) integrated circuit (4) semiconductor
(5) None of these 47. Computers that are portable and convenient

df
39. Integrated Circuit (IC) or chips used in to use for users who travel, are known as
computers are made with [IBPS Clerk 2014] (1) supercomputers

_p
(2) minicomputers
(1) copper (2) aluminium
(3) gold (4) silicon (3) mainframe computers

na
(5) silver (4) laptops

40. Who developed integrated chip? 48. Which of the following uses a handheld
(1) Robert Nayak (2) C Babbage
apoperating system?
(1) A supercomputer
(3) JS Kilby (4) CV Raman
:@
(2) A personal computer
41. A complete electronic circuit with (3) A laptop
transistors and other electronic components (4) A PDA
on a small silicon chip is called a(n)
TG

49. Palmtop computer is also known as


(1) workstation (2) CPU (1) personal computer
(3) magnetic disc (4) integrated circuit
(2) notebook computer
42. PCs are considered fourth generation and (3) tablet PC
n

contain [SBI PO 2014] (4) handheld computer


O

(1) information (2) data


(3) vacuum tubes (4) microprocessors
50. Which of the following is a small
microprocessor based computer designed to
h

(5) transistors
be used by one person at a time?
c

43. Fifth generation computers do not have [SBI Clerk 2014]


ar

[SSC MTS 2012] (1) Netbook (2) Supercomputer


(1) speech recognition
Se

(3) All-in-one (4) Notebook


(2) artificial intelligence (5) Personal computer
(3) very large scale integration
(4) vacuum tubes 51. Which of the following options correctly
44. Match the following. expresses the meaning of the term ‘PCs’?
[IBPS PO 2012]
List I List II (1) Independent computers for all working staff.
A First generation 1. Transistor (2) Personal computers widely available to
B Second generation 2. VLSI microprocessor individual workers with which they can access
C Third generation 3. Vacuum tube information from layer systems and increase
D Fourth generation 4. Integrated circuit their personal productivity.
[UGC NET June 2019] (3) Packed computers system formed by joining
Codes together of various computer terminals.
A B C D A B C D (4) Computer manufactured by the Pentium
(1) 3 4 1 2 (2) 3 1 4 2 Company.
(3) 3 1 2 4 (4) 1 3 4 2 (5) None of the above
Introduction to Computer 9

52. Desktop computers, laptop computers, 61. Pratyush is …… fastest supercomputer in


tablets and smartphones are different types the world.
of [SSC CGL 2018] (1) first (2) second
(1) supercomputers (3) third (4) fourth
(2) mainframe computers 62. Example of super computer is [UPSSSC 2016]
(3) microcomputers
(4) minicomputers (1) CRAY-2 (2) CRAY XMP-24
(3) Tianhe-2 (4) All of these
53. In the context of digital computer, which of
the following pairs of digits is referred to as 63. Which of the following is a supercomputer
binary code? [SSC CGL 2018]
developed by India? [SSC CGL 2018]

(1) 3 and 4 (2) 0 and 1 (1) Param Yuva 2 (2) Onshape

df
(3) 2 and 3 (4) 1 and 2 (3) Venngage (4) Pixir
64. In 1991, India’s first indigenous

_p
54. A central computer that holds collection of
data and programs for many PCs, supercomputer named …… was developed
workstations and other computers is a by Vijay Bhatkar. [SSC CGL 2018]

na
(1) supercomputer (1) Prayas 3000 (2) Prayog 2000
(2) minicomputer (3) Param 8000 (4) Pragati 5000
(3) laptop
(4) server
ap
65. Who among the following is called the
father of supercomputing? [SSC CGL 2018]
:@

55. First mini computer was [UPSSSC 2016] (1) Ken Thompson (2) Alan Perlis
(1) PDP-8 (2) ENIAC (3) Seymour Cray (4) Vint Gerf
(3) UNISAC (4) EDVAC
TG

66. India’s fastest and first multi-petaflops


56. Which of the following is generally costlier? supercomputer named Pratyush was
[IBPS Clerk 2015] unveiled at [SSC CGL 2017]
(1) Server (2) Notebook computer (1) Indian Space Research Organisation
n

(3) Personal computer (4) Laptop computer


(2) Indian Institute of Science, Bangalore
O

(5) Mainframe
(3) Indian Institute of Tropical Meteorology, Pune
57. The user generally applies ......... to access (4) Indian Institute of Technology, New Delhi
h

mainframe or supercomputer.
67. Choose the odd one out.
c

(1) terminal (2) node


(1) Microcomputer (2) Minicomputer
ar

(3) desktop (4) handheld


(3) Supercomputer (4) Digital computer
58. First computer of India is
Se

(1) PARAM (2) Siddhartha


68. A hybrid computer is the one having the
(3) IBM-370 (4) CRAY-1 combined properties of
(1) super and microcomputers
59. Where was the first computer in India (2) mini and microcomputers
installed? [UPSSSC 2016] (3) analog and digital computers
(1) Tata Institute of Fundamental Research (4) super and mini computers
(TIFR), Mumbai
69. Computer system which do not require any
(2) Indian Statistical Institute (ISI), Kolkata
(3) Compunational Research Laboratory (CRL), storage device? [RRB NTPC 2016]
Pune A. Analog
(4) Indian Railway, New Delhi B. Digital
60. First supercomputer developed in India is C. Hybrid
D. Third generation computer
(1) PARAM (2) CRAY-1
Codes
(3) PARAM ISHAN (4) EPRAM
(1) B (2) A (3) D (4) C
10 Learn, Revise & Practice ~ Computer Awareness

70. The …… computer is the most common type 73. Which of the following is not the example
of computer. It is used to process of special purpose computer?
information with quantities usually using (1) Automatic aircraft landing
the binary number system. [UPSSSC 2018] (2) Word processor
(1) Hybrid (2) Digital (3) Multimedia computer
(3) Analog (4) Complex (4) All of the above
71. Calculator works on which type of 74. Which type of computer is used in
computer’s work method? [UPSSSC 2015] automatic aircraft landing?
(1) Hybrid computer (1) General purpose computer
(2) Analog computer (2) Supercomputer
(3) Digital computer (3) Special purpose computer

df
(4) None of the above (4) Microcomputer

_p
72. Which of the following computer is mainly 75. Which of the following is the smallest and
related to convert analog output into digital fastest computer imitating brain working?

na
form? [UPSSSC 2016] (1) Supercomputer [IBPS PO 2016]
(1) Digital computer (2) Quantum computer
(2) Analog computer
(3) Hybrid computer
ap (3) Param-10000
(4) IBM chips
:@
(4) Mainframe computer (5) None of the above

ANSWERS
TG

1. (4) 2. (4) 3. (4) 4. (1) 5. (3) 6. (3) 7. (3) 8. (1) 9. (2) 10. (5)
11. (4) 12. (4) 13. (1) 14. (2) 15. (4) 16. (4) 17. (2) 18. (3) 19. (3) 20. (3)
21. (2) 22. (2) 23. (4) 24. (1) 25. (4) 26. (1) 27. (3) 28. (1) 29. (4) 30. (2)
n

31. (1) 32. (3) 33. (4) 34. (2) 35. (2) 36. (2) 37. (3) 38. (3) 39. (4) 40. (3)
O

41. (4) 42. (4) 43. (4) 44. (2) 45. (3) 46. (4) 47. (4) 48. (4) 49. (4) 50. (5)
51. (2) 52. (3) 53. (2) 54. (4) 55. (1) 56. (5) 57. (2) 58. (2) 59. (2) 60. (1)
h

61. (4) 62. (4) 63. (1) 64. (3) 65. (3) 66. (3) 67. (4) 68. (3) 69. (2) 70. (2)
c

71. (3) 72. (3) 73. (2) 74. (3) 75. (2)
ar
Se
Computer Architecture 11
C H A P T E R

02
COMPUTER

df
_p
ARCHITECTURE
na
ap
Computer architecture deals with the functional behaviour of a computer system as viewed by a
:@
programmer. It can also be described as the logical structure of the system unit that housed electronic
components. The first computer architecture was introduced in 1970, by John Von Neumann.
CPU
TG

Control Unit (CU)

Arithmetic
n

Logic Unit (ALU)


O

Primary
Input Memory Unit Output Control flow
h

Unit Unit Data flow


c
ar

Secondary Storage Unit

Computer Architecture
Se

Components of Computer
1. Input Unit 2. Output Unit
3. Central Processing Unit 4. Memory Unit
Note System unit is a metal or plastic case that holds all the physical parts of the computer.
The components that process data are located in it.

Input Unit
The computer accepts coded information through input unit by the user. This unit is used to give required
information to the computer. For example, keyboard, mouse, etc.
An input unit performs the following functions
It accepts the instructions and data from the user.
It converts these instructions and data to computer acceptable format.
It supplies the converted instructions and data to the computer system for further processing.
12 Learn, Revise & Practice ~ Computer Awareness

(iii) Bit-shifting operations (shifting or rotating a


Output Unit
word by a specified number of bit to the left or
This unit sends the processed results to the user. It
right with or without sign extension).
is mainly used to display the desired result to the
user as per input instructions. (iv) Comparison operations (=, <, < =, >, > =)
For example, monitor, printer, plotter, etc.
Registers
The following functions are performed by an
These are used to quickly accept, store and transfer
output unit
data and instructions that are being used
It accepts the results produced by the computer immediately by the CPU. These registers are the top
which are in coded form and hence cannot be of the memory hierarchy and are the fastest way for
easily understood by user. the system to manipulate data. The number and size

df
It converts these coded results to readable form of registers vary from processor-to-processor.
which convenient to users.

_p
It produces the converted results to the user. Control Unit (CU)
CU coordinates with the input and output devices

na
Central Processing Unit (CPU) of a computer. It directs the computer to carry out
Central Processing Unit is often called the brain of stored program instructions by communicating
computer. The CPU is fabricated as a single
Integrated Circuit (IC) and is also known as
ap
with the ALU and the registers. It organises the
processing of data and instructions.
:@
microprocessor. The basic function of control unit is to fetch the
It consists a set of registers, arithmetic logic unit instruction stored in the main memory, identify the
and control unit, which together interpret and operations and the devices involved in it and
TG

execute instructions in assembly language. accordingly generate control signals.


The primary functions of the CPU are as follows Memory Unit
The CPU transfers instructions and input data This unit is responsible to store programs or data
n

from main memory to registers. on a temporary or permanent basis. It has primary


O

The CPU executes the instructions in the stored memory (main memory) and secondary memory
sequence. (auxiliary memory).
h

When necessary, CPU transfers output data from The input data which is to be processed is brought
c

registers to main memory. into main memory before processing.


ar

A CPU controls all the internal and external devices Another kind of memory is referred to as secondary
memory of a computer system. This unit is used to
and performs arithmetic and logic operations.
Se

permanently store data, programs and output. This


The CPU consists of following main sub-systems unit does not deal directly with the CPU.
Arithmetic Logic Unit (ALU) Microprocessor
ALU contains the electronic circuitry that executes It is the controlling element in a computer system
all arithmetic and logical operations on the and is sometimes referred to as the chip.
available data. ALU uses registers to hold the data Microprocessor is the main hardware that drives
that is being processed. the computer.
Most ALUs can perform the following operations It is a large Printed Circuit Board (PCB), which
(i) Logical operations (AND, NOT, OR, XOR). is used in all electronic systems such as computer,
(ii) Arithmetic operations (addition, subtraction, calculator, digital system, etc. The speed of CPU
multiplication and division). depends upon the type of microprocessor used.
Computer Architecture 13
Intel 4004 was the first microprocessor made by (ii) The address of I/O devices or memory is
Intel in 1971 by scientist Ted Hoff and engineer carried by the address bus.
Frederico Faggin. (iii) The data to be transferred is carried by the
Some of the popular microprocessors are Intel, Intel data bus.
Core i7, Intel Core i9, Dual Core, Pentium IV, etc.
2. External Bus It connects the different external
devices; peripherals, expansion slots, I/O ports
Motherboard
and drive connections to the rest of computer.
The main circuit board contained in any computer
It is also referred to as the expansion bus.
is called a motherboard. It is also known as the
main board or logic board or system board or
planar board.
Instruction Cycle
It represents the sequence of events that takes

df
All the other electronic devices and circuits of
place as an instruction is read from memory and
computer system are attached to this board like,

_p
executed.
ROM, RAM, expansion slots, PCI slots and USB
Fetch
ports. It also includes controllers for devices like

na
the hard drive, DVD drive, keyboard and mouse.
Components on Motherboard
(i) CMOS battery (ii) BIOS chip
ap Store
Instruction
Cycle Decode
:@
(iii) Fan (iv) Expansion slot
(v) SMPS (vi) PCI slot
(vii) Processor chip (viii) Buses Execute
TG

A simple instruction cycle consists of the following


Interconnection of Units steps
CPU sends data, instructions and information to 1. Fetching the instruction from the memory.
n

the components inside the computer as well as to


2. Decoding the instruction for operation.
O

the peripheral devices attached to it.


3. Executing the instruction.
A bus is a set of wires used for interconnection,
4. Storing in memory.
h

where each wire can carry one bit of data.


c

In other words, bus is a set of electronic signal In above steps, steps 1 and 2 instructions are same
ar

pathways that allows information and signals to and known as fetch cycle and steps 3 and 4
travel between components inside or outside of a instructions are different and known as execute cycle.
Se

computer.
A computer bus can be divided into two types Tit-Bits
1. Internal Bus The internal bus connects ■
UPS (Uninterruptible Power Supply) is an electrical
apparatus that provides emergency power to a
components inside the motherboard like CPU
load when the input power source or mains power
and system memory. It is also called the fails.
system bus. ■
Power strip is an electrical device that is used to
Internal bus includes following buses expand the capacity of a wall outlet in terms of the
number of devices it can accommodate.
(i) The command to access the memory or the ■
Instruction code is a group of bits that instruct the
I/O devices is carried by the control bus. computer to perform a specific operation.
Learn, Revise & Practice ~ Computer Awareness

QUESTION BANK
1. ............. forms the backbone for building 8. A(n) ......... device is any device that provides
successful computer system. information, which is sent to the CPU.
(1) Computer architecture (1) input (2) output
(2) Computer model (3) CPU (4) memory
(3) Computer instructions 9. Which of the following includes as a type of
(4) None of the above input?
2. The first computer architecture was (1) Data (2) Programs

df
introduced in (3) Commands (4) User response
(5) All of these

_p
(1) 1970 (2) 1968 (3) 1971 (4) 1973
3. Which circuit board is used in all electronic 10. Information that comes from external
source and fed into computer software is

na
systems such as computer, calculators,
digital system? called [IBPS RRB PO Mains 2017]
(1) Architecture (2) Printer (1) output (2) input
(3) Value (4) Register ap(3) throughout (4) reports
4. The system unit (5) process
:@

(1) coordinates input and output devices


(2) is the container that houses electronic 11. Input unit converts data in computer in ........
components form.
(3) is a combination of hardware and software (1) suitable (2) acceptable
TG

(4) controls and manipulates data (3) understandable (4) rejectable


5. Which of the following is metal or plastic 12. This unit sends the processed results to the
case that holds all the physical parts of the user.
n

computer? [IBPS Clerk Mains 2017] (1) Input (2) Output


O

(1) System unit (2) CPU (3) Memory (4) CPU


(3) Mainframe (4) Platform
h

(5) Microprocessor
13. Output unit includes
c

(1) plotter (2) printer


6. The components that process data are
ar

(3) monitor (4) All of these


located in which of the following?
14. This component is required to process data
Se

[IBPS Clerk Mains 2017]


(1) Input devices (2) Output devices into information and consists of integrated
(3) System unit (4) Storage component circuits.
(5) Expansion board (1) Hard disk (2) RAM
(3) CPU (4) ROM
7. Which of the following is not responsible
for the performance of the computer? 15. The Central Processing Unit (CPU) in a
[IBPS Clerk Mains 2017] computer consists of
(1) Number of keys in the keyboard (1) input, output and processing
(2) Format of the video/graphics word (2) control unit, primary storage and secondary
(3) Memory in the video/graphics word storage
(4) The clock speed of the processor (3) control unit, arithmetic logic unit, memory unit
(5) Number of cores available in the processor (4) All of the above
Computer Architecture 15

16. Which instruction is used for loading data 25. Which part of the computer is used for
into CPU accumulator register from memory? calculating and comparing?
(1) Load (2) Storage (1) ALU (2) Control unit
(3) Machine (4) Access (3) Disc unit (4) Modem
17. Where does computer add and compare data? 26. Pick the one that is used for logical
(1) Hard disc (2) Floppy disc operations or comparisons such as less than,
(3) CPU (4) Memory chip equal to or greater than etc.
18. In computer, which of the following unit is (1) ALU (2) CU (3) Input unit (4) MU
responsible for processing and also known 27. What does ALU in computing denote?
as brain of computer? [SSC CGL 2019] [UPSSSC 2016, IBPS Clerk 2014]
(1) CPU (2) Keyboard (1) Application and Logic Unit

df
(3) Hard disk (4) RAM (2) Algorithm Logic Unit

_p
19. The main job of a CPU is to (3) Arithmetic Layered Unit
(1) carry out program instructions (4) Arithmetic Legal Unit

na
(2) store data/information for further use (5) Arithmetic Logic Unit
(3) process data and information 28. How many types of arithmetic operations
(4) Both (1) and (3) apdoes the ALU of computer perform?
(1) 4 (2) 2 (3) 5 (4) 8
20. The main purpose of time-sharing
:@
techniques used in computers is to make the 29. Processors contain a control unit and a/an
best use of the [SSC CGL 2016]
(1) CPU (2) peripherals (1) Control unit
TG

(3) secondary storage (4) floppy discs (2) Primary storage unit
(3) Input unit
21. The CPU is made up of two smaller (4) Arithmetic logic unit
components 30. Which of the following executes the
n

(1) ALU and CU (2) ALU and RAM computer commands?


O

(3) RAM and ROM (4) RAM and CU


(1) Arithmetic unit (2) Logic unit
22. The CPU comprises of control, memory and (3) Both (1) and (2) (4) Control unit
h

..... units. 31. Which unit is a combinational digital


c

(1) microprocessor (2) arithmetic/logic electronic circuit that performs arithmetic


ar

(3) output (4) ROM and bitwise operations on integer binary


Se

23. What is the responsibility of the logical unit numbers? [IBPS RRB PO Mains 2017]
in the CPU of a computer? [IBPS Clerk 2015] (1) BOU (2) AEU (3) CPU (4) ALU
(5) UPS
(1) To produce result
(2) To compare numbers 32. Internal memory in a CPU is nothing but
(3) To control flow of information (1) a set of registers (2) a set of ALU
(4) To do maths work (3) microprocessor (4) bus
(5) None of the above 33. Which among the following is a small set of
24. Which unit of computer helps in data holding place that is a part of the
communication between the memory and computer processor and may hold an
the arithmetic logical unit? instruction, a storage address, or any kind
[IBPS RRB PO Mains 2017] of data? [IBPS RRB PO Mains 2017]
(1) CMU (2) CCU (1) Register (2) WAN
(3) UPS (4) CPU (3) Bus (4) Address
(5) ALU (5) Processor
16 Learn, Revise & Practice ~ Computer Awareness

34. The portion of the CPU that coordinates the 43. The word ‘computer’ usually refers to the
activities of all the other computer central processing unit plus
components is the [SBI PO 2015] (1) external memory (2) internal memory
(1) motherboard (2) coordination board (3) input devices (4) output devices
(3) control unit (4) arithmetic logic unit 44. Who invent the first microprocessor?
(5) None of these (1) Vint Cerf (2) Terence Percival
35. Which among the following is an important (3) John Mauchly (4) Ted Hoff
circuitry in a computer system that directs 45. A microprocessor is the brain of the
the operation of the processor? computer and is also called a
[IBPS PO 2016] [RBI Grade B 2014]
(1) Memory (2) Address Bus (1) microchip (2) macrochip

df
(3) Accumulator (4) ALU (3) macroprocessor (4) calculator
(5) software

_p
(5) Control unit
36. The part of a computer that coordinates all its 46. Microprocessors can be used to make
(1) computer (2) digital system

na
functions, is called [IBPS Clerk Mains 2017]
(1) ROM program (2) System board (3) calculators (4) All of these
(3) Arithmetic logic unit (4) Control unit
(5) None of these
ap
47. High power microprocessor is
(1) Pentium, Pentium pro [UPSSSC 2019]
:@
37. The control unit controls other units by (2) Pentium II and III
generating (3) Pentium II
(1) control signal (2) timing signal (4) All of the above
TG

(3) transfer signal (4) command signal 48. The microprocessor of a computer
38. Control unit of a digital computer is often (1) does not understand machine language
(2) understands machine language and high level
called the language
n

(1) clock (2) nerve centre (3) understands only machine language
O

(3) Both (1) and (2) (4) IC (4) understands only high level languages
39. Memory unit that communicates directly 49. The CPU and memory are located in which
h

with the CPU is called the of the following devices?


c

(1) main memory (2) secondary memory [IBPS Clerk Mains 2017]
ar

(3) auxiliary memory (4) register (1) Motherboard (2) Expansion board
40. CPU retrieves its data and instructions from (3) Storage device (4) Output device
Se

(1) secondary memory (2) auxiliary memory (5) System unit


(3) main memory (4) All of these 50. Personal computers use a number of chips
41. Which computer memory is used for storing mounted on a main circuit board. What is
programs and data currently being the common name for such boards?
processed by the CPU? (1) Daughterboard
(1) Mass memory (2) Internal memory (2) Motherboard
(3) Non-volatile memory (4) PROM (3) Broadboard
42. The I/O processor has a direct access to …… (4) None of the above
and contains a number of independent data 51. Which of the following are the components
channels. that reside on motherboard?
(1) main memory (2) secondary memory (1) CMOS battery (2) Fan
(3) cache (4) flash memory (3) PCI slot (4) All of these
Computer Architecture 17

52. A …… is the main Printed Circuit Board (PCB) 59. A computer executes program in the
in a computer. [SSC CGL 2018] sequence of [RRB NTPC 2016]
(1) ROM (Read Only Memory) A. Execute, Fetch, Decode
(2) CPU (Central Processing Unit) B. Store, Fetch, Execute
(3) RAM (Random Access Memory) C. Fetch, Decode, Excecute
(4) Motherboard D. Decode, Fetch, Execute
53. Which one among the following is a main (1) D (2) A
system board of a computer? [SSC CGL 2017] (3) C (4) B
(1) CPU (2) Keyboard 60. Which is not an integral part of computer?
(3) Microchip (4) Motherboard [SBI Clerk 2012]
(1) CPU (2) Mouse

df
54. The communication line between CPU, (3) Monitor (4) UPS
memory and peripherals is called a (5) None of these

_p
(1) bus (2) line (3) media (4) All of these
61. A device that not only provides surge
55. A physical connection between the

na
protection, but also furnishes the computer
microprocessor memory and other parts of
with battery backup power during a power
the micro computer is known as
(1) path (2) address bus
apoutage is
(1) battery strip
[IBPS RRB PO Mains 2017]

(3) route (4) All of these


(2) UPS
:@

56. The read/write line belongs to (3) surge strip


(1) the data bus (2) the control bus (4) USB
(3) the address bus (4) CPU bus (5) memory
TG

57. The name of the location of a particular 62. What is a power strip? [UPSSSC 2019]
piece of data is its (1) It is an electrical device that is used to expand
(1) address (2) memory name the capacity of a wall outlet which can
n

accommodate the devices.


(3) storage (4) data location
O

(2) It plugs multiple components into one power


58. Which of the following is used to connect outlet.
the different external devices?
h

(3) It provides power supply for electronic devices.


(1) Address bus (2) Data bus (4) It is used to increase the magnitude of voltage/
c

(3) Control bus (4) External bus current/power of an input signal.


ar
Se

ANSWERS
1. (1) 2. (1) 3. (1) 4. (2) 5. (1) 6. (3) 7. (1) 8. (1) 9. (5) 10. (2)
11. (2) 12. (3) 13. (4) 14. (3) 15. (3) 16. (1) 17. (3) 18. (1) 19. (4) 20. (1)
21. (1) 22. (2) 23. (2) 24. (4) 25. (1) 26. (1) 27. (5) 28. (1) 29. (4) 30. (3)
31. (4) 32. (1) 33. (1) 34. (3) 35. (5) 36. (4) 37. (1) 38. (2) 39. (1) 40. (3)
41. (2) 42. (1) 43. (1) 44. (4) 45. (1) 46. (4) 47. (4) 48. (3) 49. (1) 50. (2)
51. (4) 52. (4) 53. (4) 54. (1) 55. (2) 56. (2) 57. (1) 58. (4) 59. (3) 60. (4)
61. (2) 62. (1)
18 Learn, Revise & Practice ~ Computer Awareness

C H A P T E R

03
COMPUTER

df
_p
HARDWARE
na
ap
:@

Computer hardware refers to the physical components of a computer that can be seen and touched by the
user. The hardware component could be an electronic, electrical and mechanical devices used in the
TG

computer system.

Input Devices
n

An input device can be defined as an electro-mechanical device that allows the user to feed data into the
O

computer. This data is useful for analysis and storage and to give commands to the computer.
The data is entered into the main memory through these input devices. They accept instructions from the
h

user and convert these accepted instructions into machine language.


c

Some of the commonly used input devices are described below


ar

Keyboard
Se

Keyboard is used to enter data or information in a Function Keys


computer system, which may be in numeric form
or alphabetic form. When key is pressed, keyboard
interacts with a keyboard controller and keyboard
buffer. Keyboard controller stores the code of pressed
key in keyboard buffer. The user can type text and
command using this device. The layout of the keyboard
Alphanumeric Cursor Control Numeric
was borrowed from the regular typewriter with some Keys Keys keypad
additional keys.
Keyboard
There are different types of keyboard such as QWERTY,
DVORAK and AZERTY.
Computer Hardware 19

Types of Keys (iv) Escape Key (Esc) It allows a user to


1. Alphanumeric Keys include the alphabet cancel or abort operations, which are
keys (A, B, C, ..., Z) and number keys executing at present. It opens Start menu
(0, 1, 2, 3, ..., 9). with the combination of Ctrl key.
2. Numeric Keys are located at the right hand (v) Backspace Key It is used to erase
side of the keyboard. They consist of digits and anything typed.
mathematical operators. (vi) Delete Key It is used to erase information
3. Function Keys are the programmable keys, from the computer’s memory and characters
i.e. the programs can assign some specific on the screen.
actions. They are numbered from F1 to F12. (vii) Caps Lock Key It is used to type the
alphabet in capital letters. It enables or

df
4. Cursor Control Keys include four directional
(left, right, up, down) arrow keys that are disables all the letters from being typed in

_p
arranged in a inverted T formation between the capital letters.
alphanumeric and numeric keypad. Apart from (viii) Num Lock Key It is used to enable and

na
the above arrow keys, there are four more keys disable the numeric keypad.
to control the cursor. (ix) Windows Key It is used to open the Start
These are as follows ap menu.
(i) Home It is used to return the cursor to the (x) Spacebar Key It provides space between
:@

beginning of the line or the beginning of a two words. It is the longest key on the
document. keyboard.
(ii) End It moves the cursor to the end of line. (xi) Tab Key It is used to move the cursor
TG

(iii) Page Up When it is pressed, the page view over the right to a pre-set point. In Word
will move up one page and cursor goes to document, tab is used to indent a paragraph.
the previous page. Note QWERTY keyboard contains total 104 keys.
n

Caps Lock and Num Lock keys are called as


(iv) Page Down When it is pressed, the page
O

‘toggle keys’ because when they are pressed,


view will move down one page and cursor they toggle or change their status from one state
goes to the next page. to another. Shift, Ctrl and Alt keys are also known
h

5. Other Keys A keyboard contains some other as modifier keys.


c

keys such as follows


ar

(i) Control Key It performs a special Pointing Device


Se

operation as the combination with other A pointing device is used to communicate with
keys. For example, Ctrl + C is used for the computer by pointing to the location on the
copying. monitor. Movements of the pointing device are
(ii) Enter Key It is used to finish an entry echoed on the screen by movements of the pointer.
and begin a new entry in the document. Some commonly used pointing devices are described
Enter key is an alternative to press OK button. below
(iii) Shift Key Some keys on the keyboard
like numeric keys have a symbol printed on Mouse
their upper portion. Shift key is used to Mouse is a small handheld pointing device having
print these symbols. This key is also called two buttons on its upper side and also has a small
combination key, because it is always used wheel between these buttons. It was invented by
with other keys. For example, Shift + a, Douglas Engelbart at Stanford Research Centre in
converts small ‘a’ into capital ‘A’. 1963.
20 Learn, Revise & Practice ~ Computer Awareness

It provides to input data and commands in graphic moving the mouse. But with a joystick, the pointer
form through moving an arrow called pointer on continues moving in the previously pointing
monitor. direction. Joystick allows movements in all
The mouse may be used to position the cursor on directions (360°).
screen, move an object by dragging or select an
Light Pen
object by clicking.
Light pen is a handheld electro-optical pointing
Three types of mouse are as follows
device. It is used for making drawings, graphics
(i) Wireless mouse
and menu selection.
(ii) Mechanical mouse
The pen contains a photocell in a small tube. It
(iii) Optical mouse
senses the light from the screen when it becomes

df
Four actions of mouse are as follows closer and generates a pulse.
1. Click or Left Click It selects an item on the Light pen is used especially in Personal Digital

_p
screen. Assistants (PDA). It is very useful in identifying a
2. Double Click It is used to open a document specific location on the screen. However, it does

na
or program. not provide any information when held over a
3. Right Click It displays a list of commands on blank part of the screen.
the screen. Right click is used to access the
ap
Touch Screen
properties of the selected object.
:@

4. Drag and Drop It is used to move an item on Touch screen is an input device that accepts input
the screen. when the user places a fingertip on the computer
screen. Touch screens have an infrared beam that
TG

Trackball criss-cross the surface of screen. Touch screen is


Trackball is another pointing generally used in applications like ATM, hospitals,
Trackball
device which is an alternative airline reservation, supermarkets, etc.
n

to a mouse. Trackball is also


used to control cursor Barcode Reader
O

movements and actions on a Barcode reader is an input device


computer screen. used for reading printed barcodes
h

It is used on CAD/CAM workstations and (Universal Product Code) available


c

sometimes seen on computerised special purpose on products to be sold. A light


ar

workstations such as radar consoles in an air-traffic sensitive detector in the barcode


Se

control room and sonar equipment on a ship or reader identifies the barcode
submarine. image by recognising special bars Barcode Reader
at both the ends of the image.
Joystick
A perfect example of a barcode reader is, to use it
Joystick is a device that moves in
in a super market where barcode scanner reads the
all directions and controls the
price of a product which is in the form of barcode.
movement of the cursor. Joysticks
A barcode is a machine readable representation of
are used in flight simulators,
Computer Aided Design/Computer information in the form of stripes of dark and light
Aided Manufacturing (CAD/CAM) ink.
system, etc.
A joystick is similar to a mouse Joystick
except that the movement of the 5050574807678
cursor on screen stops as soon as the user stops Barcode
Computer Hardware 21

Optical Mark Reader (OMR)


OMR is also known as Optical Mark Recognition. It
is the process of detecting the presence of intended
marked responses.
OMR is mainly used to detect marks on a paper. It
uses a beam of light that is reflected on the paper
Format of a Cheque
with marks, to capture presence and absence of
It is generally used in banks to process the cheques
data (marks).
for recognising the magnetic encoding numbers
Input printed at the bottom of a cheque.
Hopper

df
Output
Stacker Smart Card Reader

_p
It is a device which is used to access the
microprocessor of a smart card.

na
Optical Mark Reader There are two kinds of smart card reader which are as
follows
The OMR interprets the pattern of marks into a
data record and sends this to the computer for
storage, analysis and reporting. OMR is widely
ap
Memory cards are the cards which contain only
non-volatile memory storage components and
some specific security logic.
:@
used to read the answer of objective type tests,
voting applications and other evaluation studies. Microprocessor cards contain volatile memory
and microprocessor components.
Optical Character Recognition
TG

The card is made-up of plastic, generally PVC.


(OCR) Smart cards are used in large companies and
OCR is a technique for scanning a printed page, organisations for stronger security authentication.
n

translating it and then using the OCR software to


Biometric Sensor
O

recognise the image as ASCII text that is editable. It


translates the array of dots into text that the Biometric Sensor is a device which recognises
physical traits of the individual. Biometric sensors
h

computer can interpret as words and letters.


are used for marking attendance of employees/
c

OCR is a widely used technique for acquiring


students in organisations/ institutions.
ar

textual data from image. It is used in many


applications such as telephone bills, electricity
Se

bills, insurance premium, etc.


OCR technology is being developed for greater
accurate recognition and is also known as
Intelligent Character Recognition (ICR).
Biometric Sensor
Magnetic Ink Character
Recognition (MICR) Scanner
MICR reads the characters by examining their Scanner is an optical input device which uses light
shapes in a matrix form and the information is then as an input source to convert an image into an
passed on to the computer. The characters are electronic form that can be stored on the computer.
printed using a special ink (contains iron oxide) It is used to convert the data and image on paper
that can be magnetised. into the digital form. Scanners can be used for
22 Learn, Revise & Practice ~ Computer Awareness

storing the documents in their original form that Some of the commonly used output devices are
can be modified and manipulated later on. described below
Scanner stores images in both gray scale and color
mode. The most common types of scanners are as Monitor
follows It is also known as Visual Display Unit (VDU). The
(i) Handheld scanners monitor is provided alongwith the computer to
(ii) Flatbed scanners view display the result.
(iii) Drum scanners An image on the monitor is created by a
configuration of dots, also known as pixels.
Microphone (Mic) A monitor is of two kinds; monochrome display
We can send input to the computer through a monitor and colour display monitor.

df
special manual input device called microphone or A monochrome display monitor uses only one
mic. A mic converts the received sound into colour to display text and colour display monitor

_p
computer’s format, which is called Digitised can display 256 colours at a time.
Sound or Digital Audio.

na
The clarity of image depends on three factors which
To convert a voice into digital form, you need an
are as follows
additional hardware known as Sound Card. Sound
is used most often in multimedia. For example, we
can make our presentations more attractive using
ap
1. Resolution of Screen Resolution refers to
the number of pixels in horizontal and vertical
directions. The resolution of a monitor is
:@
recorded narration, music or sound effects.
higher when the pixels are closer together.
Now-a-days, microphones are also used with
speech recognition software. This means that we 2. Dot Pitch It refers to the diagonal distance
between two coloured pixels. The smaller the
TG

do not have to type, rather just have to speak and


the spoken words appear in our document. dot pitch, the better the resolution.
3. Refresh Rate The refresh rate of your display
Webcam (Web Camera) refers to how many times per second the
n

It is a video capturing device. Webcam is a digital display is able to draw a new image. The higher
O

camera attached to computer and can be used for the refresh rate, the more solid the image looks
video conferencing, online chatting, etc. on the screen. The refresh rate of monitor is
h

Webcam measured in Hertz (Hz).


c

The popular types of monitor are as follows


ar

1. Cathode Ray Tube (CRT) It is a typical


Se

rectangular shaped monitor that you see on a


desktop computer. The CRT works in a same
way as a television. CRT has a vacuum tube.
Webcam with Computer Webcam
The screen of CRT is covered with a fine layer
of phosphorescent elements, called phosphores.
Now-a-days, webcams are either embedded into
2. Liquid Crystal Display (LCD) These screens
the display with laptop/computer or connected via
are used in laptops and notebook sized PCs. A
USB or firewire port or Wi-Fi to the computer.
special type of liquid is sandwiched between
Output Devices two plates. It is a thin, flat and light weight
An output device is a piece of computer hardware screen made up of any number of color or
that receives data from a computer and then monochrome pixels arranged in front of a
translates that data into another form. That form light source.
may be audio, visual, textual or hard copy such as 3. Light Emitting Diode (LED) It is an electronic
printed document. device that emits light when electrical current
Computer Hardware 23
is passed through it. LEDs usually produce red 2. Daisy Wheel Printer In daisy wheel
light, but today’s LEDs can produce RGB (Red, printers, characters are fully formed on the
Green and Blue) light, and white light as well. petals, like typewriter keys. These printers
4. 3-D Monitor It is a television that conveys produce high resolution output and are more
depth perception to the viewer. When 3-D reliable than dot matrix.
images are made interactive then user feels 3. Line Printer It is a high-speed printer
involved with the scene and this experience is capable of printing an entire line of a text at
called virtual reality. once instead of one or more characters at a
5. Thin Film Transistor (TFT) It is a type of time. Print quality of line printer is not high.
field effect transistor that is usually used in a 4. Drum Printer It uses a drum to hold paper in
LCD. This type of display features a TFT for place. It receives an image from the laser and

df
each individual pixel. transfers it onto the paper. The drum is coated
These TFTs act as individual switches that with photoreceptor materials.

_p
allow the pixels to change state rapidly, making Non-Impact Printer
them turn ON and OFF much more quickly.

na
This type of printer uses electrostatic chemicals
and inkjet technologies. They do not hit or impact a
Printers ribbon to print. It can produce high quality
A printer prints information and data from the
ap
graphics and often a wide variety of fonts than
computer onto a paper. It can print documents in impact printer.
:@
colour as well as in black and white. The quality of
The types of non-impact printer are as follows
a printer is determined by the clarity of the print.
1. Inkjet Printer It is a printer that places
The speed of a printer is measured in Characters
extremely small droplets of ink onto paper to
TG

Per Second (CPS), Lines Per Minute (LPM) and


create an image. It sprays ink onto paper to
Pages Per Minute (PPM). Printer resolution is a
form characters and prints high quality text
numerical measure of print quality that is
and graphics.
n

measured in Dots Per Inch (DPI).


2. Thermal Printer It uses heat on chemically
O

Printers are divided into two basic categories which


treated paper to form characters.
are as follows
3. Laser Printer They can print in different
h

Impact Printer fonts that is, type, styles and sizes. Laser printer
c

This type of printer strikes paper and ribbon uses laser beam onto photo sensitive surface for
ar

together to form a character, like a typewriter. printing. It prints high quality graphics.
Impact printer can print a character or an entire
Se

4. Electromagnetic Printer These printers


line at a time. They use pins or hammers that are also known as Electrographic or electro-
pressed an inked ribbon against the paper. They are photographic printers. These are very fast
less expensive, fast and can make multiple copies printers and fall under the category of page
with multipart paper.
printers. The electrographic technology have
There are four types of impact printer which are developed from the paper copier technology.
described below
5. Electrostatic Printer These printers are
1. Dot Matrix Printer It forms characters generally used for large format printing.
using rows of pins which impact the ribbon on They are favoured by large printing shops
top of the paper therefore also called pin because of their ability to print fast and making
printers. Dot matrix printer prints one character low cost.
at a time. It prints characters and images as a Note Chuck Hull, the engineer designed and created
pattern of dots. Many dot matrix printers are the first 3D printer in 1984. These printers can be
bi-directional, that is they can print the used to print almost anything into a real life
characters from either direction, i.e. left or right. model.
24 Learn, Revise & Practice ~ Computer Awareness

Plotter Input/Output (I/O)Port


A plotter is a special kind of output channel like a Input/Output ports are the external interfaces that
printer, that produces images on paper. It uses a are used to connect input and output devices like
pen, pencil, marker or other writing tools for printer, monitor and joystick to computer.
making vector graphics.
The I/O devices are connected to the computer via
They are mainly used to produce large drawings or different ports which describe below
images such as construction plans, blueprints for 1. Parallel Port It is an interface for connecting
mechanical objects, AUTOCAD, CAD/CAM, etc.
eight or more data wires. The data flows
Plotters usually come in two forms as follows through the wires simultaneously. They can
1. Flatbed plotter transmit eight bits of data in parallel.

df
2. Drum plotter As a result, parallel ports provide high speed
data transmission. Parallel port is used to

_p
Speaker connect printer to the computer.
It is an output device that receives sound in the form 2. Serial Port It transmits one bit of data

na
of electric current. It needs a sound card connected through a single wire. Since, data is transmitted
to a CPU, that generates sound. serially as single bit. It provides slow speed data
ap
These are attached internally or externally to a transmission. It is used to connect external
computer system. modems, plotters, barcode reader, etc.
:@

These are used for listening music, for being audible 3. Universal Serial Bus (USB) It is a common
in seminars during presentations, etc. and popular external port available with
computers. Normally, two to four USB ports are
TG

Headphones provided on a PC. USB also has the plug and play
feature, which allows devices ready to be run.
These are a pair of small loudspeakers or less
commonly a single speaker, held close to a user’s 4. Firewire It is used to connect audio and video
n

ears and connected to a signal source such as an multimedia devices like video camera. Firewire
O

audio amplifier, radio, CD player or portable media is an expensive technology used for large data
player. They are also known as stereo phones, movement. Hard disk drive and new DVD
h

headsets or cans. drives connect through firewire. It has data


c

transfer rate of upto 400 MB/second.


ar

Projector
It is an output device which is used to project Tit-Bits
Se

information from a computer onto a large screen, ■


MP3 is an audio coding format for digital audio,
so it can be viewed by a large group of people which uses a form of lossy data compression.
simultaneously. ■
The I/O devices that are attached, externally to the
Projectors are widely used for classroom training computer machine are also called peripheral
devices.
or conference halls with a large audience. It ■
Speech recognition software can interpret voice
provides a temporary output display. data into words that can be understood by the
There are mainly two types of projectors; LCD computer.
(Liquid Crystal Display) projector and DLP (Digital ■
A dumb terminal is simply an output device that
Light Processing) projector. accepts data from the CPU.
Computer Hardware 25

QUESTION BANK
1. Any component of the computer you can 9. To move to the beginning of a line of text,
see and touch is [IBPS Clerk 2015] press the ...... key.
(1) software (2) peripheral (1) Page up (2) Shift
(3) storage (4) CPU (3) Home (4) Enter
(5) hardware 10. In a keyboard, left-right-up-down set of
2. Which of the following is not a hardware? keys facilitates which among the following
[SSC FCI 2012] functions? [IBPS RRB PO Mains 2017]

df
(1) Processor chip (2) Printer (1) Deleting data or modification
(3) Mouse (4) Java (2) Page scrolling to view a document

_p
(3) Launching Start Menu
3. A(n) …… device is any hardware component (4) Initiating Search and Help
that allows you to enter data and instructions

na
(5) Controlling RAM or process execution
into a computer. [SBI Clerk 2014]
11. Shift, Ctrl, Alt are examples of which among
(1) interaction (2) input apthe following category?
(3) communication (4) output
[IBPS RRB PO Mains 2017]
(5) terminal
:@

(1) Modifier keys (2) Primary keys


4. Computer gets …… with the help of mouse, (3) Function keys (4) Alternate keys
joystick or keyboard. (5) Candidate keys
TG

(1) insert (2) delete


(3) input (4) output 12. Pointing device includes the following except
(1) mouse (2) joystick
5. Computer keyboard is an example of (3) trackball (4) keyboard
n

(1) memory device


13. What type of device is a computer mouse?
O

(2) input device


[IBPS Clerk 2013]
(3) output device
(1) Storage (2) Output
h

(4) Both (2) and (3)


(3) Input (4) Input/output
c

6. The most common method of entering text (5) Software


ar

and numerical data into a computer system


14. Which of these is a pointing and draw
is through the use of a [SBI PO 2015]
Se

device? [IBPS Clerk 2013]


(1) plotter (2) scanner
(1) Mouse (2) Scanner
(3) printer (4) keyboard
(3) Printer (4) CD-ROM
(5) None of these (5) Keyboard
7. Which key is also known as toggle keys?
15. First computer mouse was built by
(1) Caps lock (2) Num lock [SSC CGL 2016, RRB NTPC 2016]
(3) Both (1) and (2) (4) None of these
(1) Douglas Engelbart (2) William English
8. You can use the Tab key to [SBI Clerk 2013] (3) Oaniel Coogher (4) Robert Zawacki
(1) move a cursor across the screen 16. Keyboard and …… are the examples of input
(2) indent a paragraph device. [SBI Clerk 2014]
(3) move the cursor down the screen (1) monitor (2) modem
(4) Both (1) and (2) (3) printer (4) mouse
(5) None of the above (5) CPU
26 Learn, Revise & Practice ~ Computer Awareness

17. Which is the best position for operating the 25. .......... is generally used in applications like
mouse? ATM, hospitals, airline reservation, etc.
(1) Tail away from the user (1) Light pen (2) Touch screen
(2) Tail towards the user (3) Joystick (4) Trackball
(3) Tail facing the right
(4) Tail facing the left 26. Which one does not related to mobile phone
touch panel sensing methods?
18. Which button is called as middle button [RRB NTPC 2016]
used as third mouse button by pressing on A. Finger touch
it? [IBPS RRB PO Mains 2017] B. Voice recognition
(1) Right button (2) Scroll wheel C. Gloved touch
(3) Touch bar (4) Light bar D. Light transmittance

df
(5) Left button (1) B (2) A
19. Trackball is an example of a/an (3) D (4) C

_p
(1) programming device (2) pointing device 27. The pattern of printed lines on most
(3) output device (4) software device products are called

na
20. Which of the following is an input device (1) prices (2) OCR
used to enter motion data into computers or ap(3) scanners (4) barcodes
other electronic devices? [SSC CHSL 2019] 28. A barcode reader is an example of
(1) Plotter (2) Trackball
:@
(1) processing device (2) storage device
(3) Monitor (4) Joystick (3) input device (4) output device
21. A joystick is primarily used to/for …… . 29. An optical input device that interprets
TG

[SBI PO 2013]
pencil marks on paper media is ………
(1) control sound on the screen [IBPS RRB PO Mains 2017]
(2) computer gaming
(1) OMR (2) punch card reader
(3) enter text
n

(3) optical scanners (4) magnetic tapes


(4) draw pictures
O

(5) print text (5) stylus

22. Which of the following is a lever that can be 30. The OCR is used for the preparation of
h

[IBPS Clerk 2013]


moved in several directions to control the
c

movement of an image on a computer (1) electricity bills (2) insurance premium


ar

monitor or similar display screen? (3) telephone bills (4) All of these
[SSC CHSL 2019] (5) None of these
Se

(1) MIDI devices (2) Optical mark reader 31. The OCR recognises the …… of the
(3) Visual display unit (4) Joystick characters with the help of light source.
23. Which one of the following is not an output (1) size (2) shape
device? [SSC CGL 2018] (3) colour (4) used ink
(1) Projector (2) Headphones 32. What does MICR stand for?
(3) Plotter (4) Joystick [IBPS Clerk 2014, RBI Grade B 2014]
24. CAD stands for [SSC CGL 2014] (1) Magnetic Ink Character Register
(1) Computer Automatic Design (2) Magnetic Ink Code Reader
(2) Computer Aided Decode (3) Magnetic Ink Code Register
(3) Computer Automatic Decode (4) Magnetic Ink Character Recognition
(4) Computer Aided Design (5) Magnetic Ink Cases Reader
Computer Hardware 27

33. Large amounts of cheques are processed by 42. Which of the following could be digital
using input devices for computers?
(1) OCR (2) MICR [RBI Grade B 2014]
(3) OMR (4) All of these (1) Digital camcorder
(2) Microphone
34. Which of the following device recognises (3) Scanner
physical traits of an individual? (4) All of the above
(1) Smart card (2) Biometric sensor (5) None of the above
(3) Barcode (4) MICR 43. Which of the following groups consists of
35. Which of the following consists of an only input devices?
electronic writing area and a special pen (1) Mouse, Keyboard, Monitor

df
that works with it? [SSC CHSL 2019] (2) Mouse, Keyboard, Printer
(1) Trackball (2) Plotters (3) Mouse, Keyboard, Plotter

_p
(3) Abacus (4) Graphics tablet (4) Mouse, Keyboard, Scanner
36. Which of the following converts analog 44. Results are obtained from computer through

na
information into digital form? its
(1) Barcode reader [SSC CHSL 2019] (1) input unit (2) ALU unit
(2) Optical mark reading
(3) Digitizer
ap(3) CU unit (4) output unit
45. After a picture has been taken with a digital
:@
(4) Gamepad camera and processed appropriately, the
37. A........ is used to read handwritten or actual print of the picture is considered as
printed text to make a digital image that is (1) data (2) output
TG

stored in memory. (3) input (4) the process


(1) printer (2) laser beam
46. Using output device one can ………
(3) scanner (4) touchpad [IBPS RRB PO Mains 2017]
n

38. The input device to be used to get a printed (1) view or print data (2) modify data
O

diagram into a computer is the (3) store data (4) replicate data
[IBPS Clerk 2013, IBPS Clerk 2015] (5) enter data
h

(1) printer (2) mouse


47. Which among the following is the smallest
c

(3) keyboard (4) touchpad


unit in an image in a computer screen?
ar

(5) scanner
[IBPS RRB PO Mains 2017]
39. A scanner scans [SBI PO 2015]
Se

(1) Unit (2) Pixel


(1) pictures (3) Array (4) Resolution
(2) text (5) Clip
(3) both pictures and text
(4) neither pictures nor text 48. What type of device is a computer monitor?
(5) None of the above [SBI Clerk 2014]
(1) Software (2) Processing
40. It is a video capturing device
(3) Storage (4) Input
(1) webcam (2) microphone
(3) monitor (4) mouse (5) Output

41. An example of an input device is 49. Soft copy refers to …… . [IBPS Clerk 2013]
[SSC CGL 2018] (1) printed output (2) digitising
(1) soundcard (2) headphones (3) music sounds (4) screen output
(3) projector (4) webcam (5) None of these
28 Learn, Revise & Practice ~ Computer Awareness

50. The higher the resolution of a monitor, the 60. An example of peripheral equipment is
(1) larger the pixels (1) printer
(2) less clear the screen is (2) CPU
(3) further apart the pixels (3) spreadsheet
(4) closer together the pixels (4) microcomputer
51. Screen or monitor device is [UPSSSC 2016] 61. Dot matrix printer is
(1) hard copy (2) soft copy (1) unidirectional (2) bi-directional
(3) input device (4) display device (3) sequential (4) random
52. The CRT is ……… in shape. 62. The impact printers are
[RBI Grade B 2013] (1) dot matrix (2) drum

df
(1) circular (2) rectangular (3) inkjet (4) Both (1) and (2)
(3) eclipse (4) conical
63. Drum printer is an example of

_p
(5) None of these
(1) input (2) output
53. CRT has a [RBI Grade B 2013] (3) processing (4) storage

na
(1) hollow tube (2) vacuum tube
64. The example of non-impact printers are
(3) long tube (4) round tube [RBI Grade B 2013]
(5) None of these ap(1) Laser-Dot matrix (2) Inkjet-Laser
54. The rate at which scanning is repeated in a (3) Inkjet-Dot matrix (4) Dot matrix
:@

CRT is called (5) None of these


(1) refresh rate (2) resolution 65. Line printer speed is specified in terms of
(3) pitch (4) bandwidth (1) LPM (Lines Per Minute) [RBI Grade B 2013]
TG

55. …… provides hard copy output on paper. (2) CPM (Characters Per Minute)
[SBI Clerk 2015] (3) DPM
(1) Mouse (2) Keyboard (4) Any of the above
n

(3) LCD monitor (4) Scanner (5) None of the above


O

(5) Printer 66. In laser printers, printing is achieved by


56. Printer is an example of [SBI Clerk 2014] deflecting laser beam on to …… surface of a
h

(1) output device (2) input device drum. [SBI PO 2013]


c

(3) processing device (4) storage device (1) magnetised (2) photosensitive
ar

(5) None of the above (3) magnetic (4) Either (1) or (2)
(5) None of these
Se

57. What are the units used to count the speed


of a printer? [IBPS Clerk 2013]
67. Which of the following printers, are you
sure, will not to use if your objective is to
(1) CPM (2) DPI (3) PPM (4) BIT
print on multi carbon forms?
(5) None of these
(1) Daisy wheel (2) Dot matrix
58. …… printer cannot print more than one (3) Laser (4) Thermal
character at a time. [SSC CHSL 2013]
68. Laser printers belong to
(1) Line (2) Daisy wheel
(1) line printer (2) page printer
(3) Laser (4) Dot matrix
(3) band printer (4) dot matrix printer
59. Speed of line printer is limited by the speed
69. A hard copy would prepared on a
of [Clerk 2013]
[SBI Clerk 2013]
(1) paper movements (2) cartridge used (1) line printer (2) dot matrix printer
(3) length of paper (4) All of these (3) plotter (4) type writer terminal
(5) None of these (5) All of these
Computer Hardware 29

70. Who invented the 3D printer? 78. Which of the following are properties of
[SSC CGL 2016] USB? [IBPS Clerk Mains 2017]
(1) Nick Holonyak (1) Platform independent
(2) Elias Howe (2) Platform dependent
(3) Chuck Hull (3) Source dependent
(4) Christian Huygens (4) Software dependent
71. It is used to produce large drawings or (5) Software Independent
images such as construction plans, 79. The …… format reduces an audio file to
blueprints for mechnanical object, etc. about one-tenth of its original size, while
(1) Printer (2) Plotter preserving much of the original quality of
(3) MICR (4) OCR the sound. [SBI Clerk 2014]

df
72. What type of devices are computer speakers (1) DOC (2) PNG (3) GIF (4) MP3

_p
or headphones? [IBPS Clerk 2015] (5) VMEG
(1) Input (2) Input/Output 80. Peripheral devices such as printers and

na
(3) Software (4) Storage monitors are considered to be …… .
(5) Output [IBPS Clerk 2013]
73. Which is not an item of hardware? ap(1) hardware (2) software
[IBPS Clerk 2013] (3) data (4) information
(5) source code
:@
(1) An MP3 file (2) A keyboard
(3) A mouse (4) Printer 81. External devices such as printers, keyboards
(5) None of these and modems are known as [IBPS Clerk 2015]
TG

74. The transfer of data from a CPU to (1) add-on devices


peripheral devices of computer is achieved (2) peripherals
through [SSC CGL 2012] (3) extra software devices
(4) PC expansion slot add-ons
n

(1) interfaces (2) buffer memory


(5) special buys
O

(3) modems (4) I/O ports


75. A parallel port is most often used by a 82. …… can interpret voice data into words that
can be understood by the computer.
h

[SSC CPO 2011]


(1) printer [IBPS Clerk 2014]
c

(2) monitor (1) Speech input hardware


ar

(3) mouse (2) Speech recognition software


(3) Word recognition software
Se

(4) external storage device


(4) Talking software
76. USB in data cables stands for (5) Other than those given as options
(1) Unicode Smart Bus [IBPS Clerk 2014]
83. Dumb terminals have terminals and
(2) Universal Structural Bus
[SBI PO 2015]
(3) Unicode Serial Bus
(1) mouse (2) speakers
(4) Universal Smart Bus (3) keyboard (4) mouse or speakers
(5) Universal Serial Bus (5) None of these
77. USB refers to [SSC MTS 2013] 84. Which one of the following input device is
(1) a storage device user-programmable? [IBPS Clerk 2015]
(2) a processor (1) Dumb terminal (2) Smart terminal
(3) a port type (3) VDT (4) Intelligent terminal
(4) a serial bus standard (5) All of these
30 Learn, Revise & Practice ~ Computer Awareness

85. Input devices are used to provide the steps 86. For printing MICR characters, the ink used
and tasks the computer needs to process contains [RRB NTPC 2016]
data and these steps and tasks are called A. Lead oxide B. Graphite
[IBPS Clerk 2015] C. Cuprous oxide D. Iron oxide
(1) program (2) design (1) B (2) C
(3) information (4) instructions (3) D (4) A
(5) flow chart

ANSWERS
1. (5) 2. (4) 3. (2) 4. (3) 5. (2) 6. (4) 7. (3) 8. (2) 9. (3) 10. (2)

df
11. (1) 12. (4) 13. (3) 14. (1) 15. (1) 16. (4) 17. (2) 18. (2) 19. (2) 20. (2)
21. (2) 22. (4) 23. (4) 24. (4) 25. (2) 26. (1) 27. (4) 28. (3) 29. (1) 30. (4)

_p
31. (2) 32. (4) 33. (2) 34. (2) 35. (4) 36. (3) 37. (3) 38. (5) 39. (3) 40. (1)
41. (4) 42. (4) 43. (4) 44. (4) 45. (2) 46. (1) 47. (2) 48. (5) 49. (4) 50. (4)

na
51. (4) 52. (2) 53. (2) 54. (1) 55. (5) 56. (1) 57. (2) 58. (4) 59. (1) 60. (1)
61. (2) 62. (4) 63. (2) 64. (2) 65. (2) 66. (2) 67. (3) 68. (2) 69. (5) 70. (3)
71. (2)
81. (2)
72. (5)
82. (2)
73. (1)
83. (4)
74. (4)
84. (4)
75. (1)
85. (4)
ap
76. (5)
86. (3)
77. (3) 78. (1) 79. (4) 80. (1)
:@
TG
n
O
ch
ar
Se
Computer Hardware 31
C H A P T E R

04
COMPUTER

df
_p
MEMORY
na
ap
Computer memory stores data and instructions The two categories of RAM are as follows
:@

required during the processing of data and output (i) Dynamic RAM (DRAM) It is made up of
results. It also relates to many devices that are memory cells where each cell is composed
responsible for storing data on a temporary or a of one capacitor and one transistor.
TG

permanent basis. DRAM must be refreshed continually to


store information. DRAM is slower, less
Types of Memory expensive and occupies less space on the
n

computer’s motherboard.
Primary Memory
O

The memory unit that communicates directly with (ii) Static RAM (SRAM) It retains the data
as long as power is provided to the
h

the CPU is called main memory or internal memory


or primary memory. memory chip.
c

SRAM needs not be refreshed periodically.


ar

The primary memory allows the computer to store


data for immediate manipulation and to keep track It uses multiple transistors for each
memory cell. It does not use capacitor.
Se

of what is currently being processed. It has limited


storage capacity. SRAM is often used cache memory due to
its high speed. SRAM is more expensive
Main memory is volatile in nature, it means that
when the power is turned OFF, the contents of this and faster than DRAM.
memory are lost forever. 2. Read Only Memory (ROM) It is also known
Primary memory can be further classified in two as non-volatile memory or permanent storage. It
types which are as follows does not lose its contents when the power is
1. Random Access Memory (RAM) It is also switched OFF.
known as read/write memory, that allows CPU ROM can written data and instructions to it
to read as well as write data and instructions only one time. Once a ROM chip is
into it. programmed at the time of manufacturing, it
RAM is used for the temporary storage of input cannot be reprogrammed or rewritten. So, it
data, output data and intermediate results. has only read capability, not write.
32 Learn, Revise & Practice ~ Computer Awareness

The three categories of ROM are as follows


Secondary Memory/ Storage
(i) Programmable ROM (PROM) It is also This memory stores much larger amount of data
non-volatile in nature. Once a PROM has and information for extended periods of time. Data
been programmed, its content can never in secondary memory cannot be processed directly
be changed. It is one-time programmable by the CPU, it must first be copied into primary
device. This type of memory is found in memory, i.e. RAM. It is the slower and cheaper
video game consoles, mobile phones, form of memory than primary memory.
implantable medical devices and high
definition multimedia interfaces. Secondary storage is used to store data and
programs when they are not being processed. It is
(ii) Erasable Programmable ROM (EPROM)
also non-volatile in nature. Due to this, the data
It is similar to PROM, but it can be erased

df
remain in the secondary storage as long as it is not
by exposure to strong ultraviolet light,
overwritten or deleted by the user. It is a permanent

_p
then rewritten. So, it is also known as
storage.
Ultraviolet Erasable Programmable ROM
(UVEPROM). Secondary memory devices include following types of

na
memory
(iii) Electrically Erasable Programmable
1. Magnetic Storage It is the manipulation of
ROM (EEPROM) It is similar to EPROM, apmagnetic fields on a medium in order to record
but it can be erased electrically, then
audio, video or other data. It includes hard disk
rewritten electrically and the burning
:@
drive, floppy disk and magnetic tape, which are
process is reversible by exposure to
described below
electric pulses. It is the most flexible type
of ROM and is now commonly used for (i) Hard Disk Drive (HDD) It is a non-volatile
TG

holding BIOS. and random access digital data storage


Note BIOS stands for Basic Input/Output System.
device. HDD is a data storage device used for
storing and retrieving digital information
n

Some Special Memories using rotating disks (platters) coated with


O

Apart from above memories, there are also some magnetic material.
other memories that help to primary memory, All programs of a computer are installed in
h

which are as follows hard disk. It is a fixed disk, i.e. cannot be


c

removed from the drive. It consists of a


Cache Memory
ar

spindle that holds non-magnetic flat


It is a storage buffer that stores the data which is circular disks called platters, which hold the
Se

used more often, temporarily and makes it available recorded data. Each platter requires two
to CPU at a fast rate. Cache memory is a very high read/write heads, that are used to write and
speed memory placed in between RAM and CPU. It read information from a platter.
increases the speed of processing. All the read/write heads are attached to a
Flash Memory single access arm so that they cannot move
independently.
It is a kind of semiconductor based non-volatile
rewritable memory, used in digital camera, mobile
phone, printer, etc.
Sectors Tracks
Virtual Memory
It is a technique that allows the execution of
processes that are not completely in main memory.
One major advantage of this memory is that
programs can be larger than main memory. Tracks and Sectors
Computer Hardware 33
The information is recorded in bands; each storage device. DVDs offer higher storage
band of information is called a track. Each capacity than CDs while having the same
platter has the same number of tracks and a dimensions.
track location that cuts across all platters is Depending upon the disc type, DVD can
called a cylinder. The tracks are divided into store several gigabytes of data (4.7 GB-17.08
pie-shaped sections known as sectors. GB). DVDs are primarily used to store music
(ii) Floppy Disk (Diskette) Floppy disk is round or movies and can be played back on your
in shape and a thin plastic disk coated with television or computer too. They are not
iron oxide. It is used to store data but it can rewritable storage device.
store small amount of data and it is slower to DVDs come in three varieties are as follows
access than hard disks. DVD-ROM (Digital Video Disc-Read Only

df
Data is retrieved or recorded on the surface Memory)
of the disk through a slot on the envelope.

_p
DVD-R (DVD-Recordable)
Floppy disk is removable from the drive.
DVD-RW (DVD-Re-Writable)
Floppy disk is available in three sizes; 8 inch,

na
1 1 (iii) Blu-ray Disc It is an optical disc storage
5 inch and 3 inch. medium designed to re-capture the data
4 2
(iii) Magnetic Tape These tapes are made of a
ap normally in DVD format. Blu-ray disc (BD)
contains 25 GB (23.31 GB) per layer space.
plastic film-type material coated with
:@

magnetic materials to store data The name Blu-ray disc refers to the blue
permanently. Data can be read as well as laser used to read the disc, which allows
write. It is usually 12.5 mm to 25 mm wide information to be stored at a greater density
TG

and 500 m to 1200 m long. than the longer- wavelength red laser used
in DVDs.
Magnetic tapes hold the maximum data,
Blu-ray can hold almost 5 times more data
which can be accessed sequentially. They are
than a single layer DVD.
n

generally used to store backup data or that


The variations in the formats are as follows
O

type of data, which is not frequently used or


BD-ROM (Read only)
to transfer data from one system to another.
BD-R (Recordable)
h

2. Optical Storage It is any storage type in which


BD-RW (Rewritable)
c

data is written and read with a laser. It includes


BD-RE (Rewritable)
ar

CD, DVD and Blu-ray disc, which are described


below 3. Solid State Storage It is a type of storage
Se

technique that employs storage devices built


(i) Compact Disc (CD) It is the most popular
using silicon microchip based storage
and the least expensive type of optical disc.
architecture. It includes pen/flash drive,
A CD is capable of being used as a data
memory card, which are described below
storage device alongwith storing of digital
audio. (i) Pen/Thumb Drive It is also known as flash
drive. A flash drive is a data storage device
CD is categorised into three main types as follows
that consists of flash memory (key memory)
CD-ROM (Compact Disc-Read Only with a portable USB (Universal Serial Bus)
Memory) interface. USB flash drives are typically
CD-R (Compact Disc- Recordable) removable, rewritable and much smaller
CD-RW (Compact Disc- Re-Writable) than a floppy disk.
(ii) Digital Video Disc (DVD) It is also known Today, flash drives are available in various
as Super Density Disc (SDD) or Digital storage capacities as 256MB, 512MB, 1GB,
Versatile Disc (DVD). It is an optical disc 4GB, 16GB upto 64 GB. They are widely used
34 Learn, Revise & Practice ~ Computer Awareness

as an easy and small medium to transfer and minimising IT infrastructure costs and act as a
store the information from the computers. good option for handling peak loads on the
(ii) Memory Cards These are the data storage local infrastructure. A public cloud is meant to
devices in chip shaped. They are commonly serve multiple users, not a single customer.
used in many electronic devices, including 2. Private Cloud These are distributed systems
digital cameras, mobile phones, laptop, that work on a private infrastructure and
computers. They are small, re-recordable, providing the users with dynamic provisioning
easily portable and very light weighted. of computing resources.
Basic Units of Memory Measurements 3. Hybrid Cloud It is a heterogeneous
1 Bit = Binary Digit (0 or 1) distributed system resulted by combining
= 1 Nibble facilities of public cloud and private cloud. For

df
4 Bits
= 1 Byte = 2 Nibble
this reason, they are also called heterogeneous
8 Bits
clouds.

_p
1024 Bytes = 1 KB (KiloByte)
= 1 MB (MegaByte)
1024 KB Cloud Computing Services

na
1024 MB = 1 GB(GigaByte)
1. Infrastructure as a Service (IaaS) It is a cloud
1024 GB = 1 TB(TeraByte) computing model where virtualised
1024 TB = 1 PB(PetaByte)
apinfrastructure is offered to and managed for
1024 PB = 1 EB(ExaByte) business by external cloud providers. Some
:@

1024 EB = 1 ZB(ZettaByte) examples of the wide usage of IaaS are


1024 ZB = 1 YB (YottaByte) automated policy-driven operations such as
= 1 (BrontoByte) backup, recovery, etc.
1024 YB
TG

1024 BB = 1 (GeopByte) 2. Software as a Service (SaaS) It is a method for


delivering software applications over the
Note Bit is the smallest memory measurement unit.
GeopByte is the highest memory measurement unit. Internet as per the demand and on a
n

A byte can represent 256 (0-255 or 2 8) distinct subscription basis. Most common examples of
O

values. SaaS are Microsoft Office 360, Oracle CRM,


Marketo, etc.
Cloud Computing
h

3. Platform as a Service (PaaS) It refers to the


It is a general term for anything that involves
c

supply an on-demand environment for


hosted services over the internet. The name comes
ar

developing, testing, delivering and managing


from the use of clouds as an abstraction for the software applications. Some key players
Se

complex infrastructure it contains in system offering PaaS are Bluemix, CloudBees,


diagrams.
Salesforce.com, etc.
It entrusts services with a user’s data, software and
computation over a network. It has considerable Several Next Generation
overlap with Software as a Service (SaaS).
Memories
Types of Cloud Deployments FeFET or FeRAM A next generation ferroelectric
memory.
The three types of cloud deployments categorised
based on an organisation’s ability to manage and Nanotube RAM In R & D for years, nanotube
secure assets are as follows RAM is targeted to displace DRAM. Others are
developing carbon nanotubes and next
1. Public Cloud These are managed by third
generation memories on the same device.
party which provides cloud services over the
Internet to public. They offer solutions for Phase Change Memory After shipping the first
Computer Hardware 35
PCM devices, Intel is readying a new version.
Others may enter the PCM market. Tit-Bits
ReRAM Future versions are positioned for AI ■ The rate at which data is written to disc or read
apps. from disc is called data transfer rate.
Spin Orbit Torque-MRAM (SOT-MRAM) A next ■ Root directory is the main folder of disk. It
generation MRAM targeted to replace SRAM. contains information about all folders on the disk.

QUESTION BANK

df
1. …… stores data and instructions required 8. Which of the following is a correct

_p
during the processing of data and output definition of volatile memory?
results. (1) It does retain its contents at high temperature

na
(1) Memory (2) Architecture (2) It is to be kept in air-tight box
(3) Input (4) Output (3) It loses its content on failure of power supply
2. Where is data saved permanently? ap (4) It does not lose its content on failure of power
supply
(1) Memory (2) Storage
:@
(3) CPU (4) Printer 9. Cache and main memory will not be able to
hold their contents when the power is OFF.
3. Where are programs and data to be used by They are
the computer available? [SSC FCI 2012] (1) dynamic (2) static
TG

(1) Processing unit (2) Output (3) volatile (4) non-volatile


(3) Storage (4) Input 10. In computer terminology, what is the full
4. How many types of memory does a form of RAM? [SSC CGL 2018]
n

computer have? (1) Random Access Memory


O

(1) Four (2) Eight (2) Repeated Access Memory


(3) One (4) Two (3) Rapid Access Memory
h

5. Primary storage is .......... as compared to (4) Regular Access Memory


c

secondary storage. 11. …… memory in a computer is where


ar

(1) slow and inexpensive information is temporarily stored while it is


(2) fast and inexpensive being accessed or worked on by the
Se

(3) fast and expensive processor. [IBPS RRB PO 2017]


(4) slow and expensive (1) Logical (2) Secondary
6. The key feature(s) of internal memory is/are (3) ROM (4) RAM
(5) Cache
(1) limited storage capacity
(2) temporary storage 12. Why RAM is so called? [IBPS Clerk 2015]
(3) fast access and high cost (1) Because it is read and write memory
(4) All of the above (2) Because it is a volatile memory
7. The two kinds of main memory are (3) Because it can be selected directly for storing
(1) ROM and RAM and retrieving data and instructions of any
(2) primary and secondary location of chip
(3) floppy disk and hard disk (4) Because it is a non-volatile memory
(4) direct and sequential (5) None of the above
36 Learn, Revise & Practice ~ Computer Awareness

13. Which of the following is not true about 21. A disc’s content that is recorded at the time
RAM? [IBPS PO 2015, IBPS Clerk 2014] of manufacture and cannot be changed or
(1) RAM is the same as hard disk storage erased by the user is [IBPS Clerk 2013]
(2) RAM is a temporary storage area (1) memory only (2) write only
(3) RAM is volatile (3) once only (4) run only
(4) RAM is a primary memory (5) read only
(5) Other than those given as options
22. In the field of Information and
14. Virtual memory allocates hard disk space to Communication Technology (ICT), what is
supplement the immediate, functional the full form of EEPROM? [SSC CGL 2018]
memory capacity of [SBI PO 2014]
(1) Electrically Erasable Programmable Read
(1) ROM (2) EPROM Only Memory

df
(3) the registers (4) extended memory (2) Electrically Efficient Portable Read Only
(5) RAM Memory

_p
15. Storage that retains its data after the power (3) Electrically Efficient Programmable Read
is turned OFF is referred to as Only Memory

na
[SBI Clerk 2009] (4) Enhanced Electrical Portable Read Only
Memory
(1) volatile storage (2) non-volatile storage
(3) sequential storage
16. The advantage of DRAM is
(4) direct storage ap
23. The difference between memory and
storage is that memory is …… and storage is
……… .
:@
(1) it is cheaper than SRAM [IBPS Clerk 2015]
(2) it can store data more than that of SRAM (1) temporary; permanent
(3) it is faster than SRAM (2) permanent; temporary
(3) slow; fast
TG

(4) data can be erased easily from it as compared


to SRAM (4) non-volatile; volatile
(5) None of the above
17. Which of the following stores data
permanently in a computer? [SSC CGL 2017] 24. The …… acts as a buffer between the CPU
n

(1) ALU (2) Cache memory and the main memory. [UPSSSC 2018]
O

(3) RAM (4) ROM (1) primary memory (2) cache memory
18. Permanent instructions that the computer use (3) secondary memory (4) RAM
h

when it is turned ON and that cannot be 25. Which of the following is a very high speed
c

semiconductor memory which can speed up


ar

changed by other instructions are contained


in [UPSSSC 2016] the CPU? [SSC CHSL 2019]
Se

(1) ROM (2) RAM (3) ALU (4) SRAM (1) Secondary memory (2) Main memory
(3) Primary memory (4) Cache memory
19. When you first turn on a computer, the
CPU is preset to execute instructions stored 26. What is the term used for temporarily
in the [IBPS PO 2015] stored data? [UPSSSC 2019]
(1) RAM (2) flash memory (1) Miscellaneous data (2) Cache data
(3) ROM (4) CD-ROM (3) Picked data (4) Tempo data
(5) ALU 27. ......... is having more memory addresses than
20. What is the full form of PROM? are physically available. [SBI PO 2014]
[SSC CHSL 2019] (1) Virtual memory
(1) Programmable Read Only Memory (2) System software
(2) Program Read Output Memory (3) Application software
(3) Program Read Only Memory (4) RAM
(4) Primary Read Only Memory (5) Vertical memory
Computer Hardware 37

28. ……… is the ability of a device to ‘jump’ directly 35. The storage device used to compensate for
to the requested data. the difference in rates of flow of data from
(1) Sequential access one device to another is termed as
(2) Random access (1) chip (2) channel
(3) Quick access (3) floppy (4) buffer
(4) All of the above 36. Which of the following is the magnetic
29. The ……… is the amount of data that a storage device?
storage device can move from the storage to (1) Hard disk (2) Compact disc
the computer per second. (3) Audio tapes (4) All of these
(1) data migration rate 37. Hard disk devices are considered ……
(2) data digitising rate storage.

df
[SBI Clerk 2014]
(3) data transfer rate
(1) flash (2) temporary

_p
(4) data access rate
(3) worthless (4) non-volatile
30. The main directory of a disk is called the (5) non-permanent

na
……… directory. [IBPS PO 2015]
38. The thick, rigid metal plotters that are
(1) network
capable of retrieving information at a high
(2) folder ap
(3) root
rate of speed are known as [SBI Clerk 2014]
(4) other than those given as options (1) hard disk (2) SAN
:@

(5) program (3) soft disk (4) flash memory


(5) None of these
31. The …… indicates how much data a particular
storage medium can hold. [IBPS Clerk 2013] 39. Hard drive is used to store
TG

[IBPS Clerk Mains 2017]


(1) storage (2) access
(3) capacity (4) memory (1) volatile data (2) non-volatile data
(5) None of these (3) permanent data (4) temporary data
(5) intermediate data
n

32. The secondary storage devices can only


O

store data but they cannot perform 40. The hard drive is normally located
(1) arithmetic operations (1) next to the printer [SBI PO 2014]
h

(2) logic operations (2) plugged into the back of the computer
(3) underneath the monitor
c

(3) fetch operations


(4) on top of the CD-ROM
ar

(4) All of the above (5) inside the system base unit
33. Where do you save the data that, your data
Se

41. Data on a floppy disk is recorded in rings


will remain intact even when the computer called
is turned OFF? (1) sectors (2) ringers
(1) RAM (3) rounders (4) tracks
(2) Motherboard
42. Which of the following is/are example(s) of
(3) Secondary storage device
magnetic storage media?
(4) Primary storage device
(1) Zip disk (2) CD-ROM
34. The term ……… refers to data storage systems (3) Floppy disk (4) DVD
that make it possible for a computer or (5) Both (1) and (3)
electronic device to store and retrieve data. 43. Floppy disks are organised as
(1) retrieval technology (1) files
(2) input technology (2) heads and folders
(3) output technology (3) tracks and sectors
(4) storage technology (4) All of the above
38 Learn, Revise & Practice ~ Computer Awareness

44. The capacity of 3.5 inch floppy disk is 52. On a CD-RW, you can
(1) 1.40 MB (2) 1.44 GB (1) read and write information
(3) 1.40 GB (4) 1.44 MB (2) only read information
45. The most common storage device for the (3) only write information
personal computer is the [SBI Clerk 2014] (4) read, write and rewrite information
(1) floppy disk 53. Which of the following are advantages of
(2) USB personal computer CD-ROM as a storage media?
(3) mainframe [RBI Grade B 2014]
(4) a laptop
(5) None of these (1) CD-ROM is an inexpensive way to store large
amount of data and information
46. Which of the following has the smallest (2) CD-ROM discs retrieve data and information

df
storage capacity? [IBPS Clerk 2015] more quickly than magnetic disks
(1) Zip disk (2) Hard disk (3) CD-ROMs make less errors than magnetic media

_p
(3) Floppy disk (4) Data cartridge (4) All of the above
(5) CD (5) None of the above

na
47. FDD stands for 54. Which media has the ability to have
[SSC, CGL 2018, IBPS Clerk 2015] data/information stored (written) on them by
(1) Floppy Drive Detector
(2) Floppy Drive Demodulator
apusers more than once? [RBI Grade B 2014]
(1) CD-R discs
:@
(3) Floppy Disk Drive (2) CD-RW discs
(4) Floppy Demodulator Disc (3) Zip discs
(5) None of the above (4) Optical discs
TG

(5) CD-RW discs and Zip discs


48. ......... is the process of dividing the disc into
tracks and sectors. 55. What is the difference between a CD-ROM
[SBI PO 2015, IBPS Clerk Mains 2017] and CD-RW? [IBPS PO 2015]
n

(1) Tracking (2) Formatting (1) They are the same—just two different terms
(3) Crashing (4) Allotting
O

used by different manufactures.


(5) None of these (2) A CD-ROM can be written to and a CD-RW
cannot.
h

49. Data on a floppy disk was recorded in rings


(3) Other than those given as options
c

called [IBPS RRB PO 2017]


(4) A CD-ROM holds more information than a
ar

(1) flip (2) ringers CD-RW.


(3) rounders (4) fields (5) A CD-RW can be written to but a CD-ROM
Se

(5) segments can only be read from.


50. Magnetic tape is not practical for 56. Compact discs that can store approximately
applications where data must be quickly 650-800 MB of data or 74-80 min of music
recalled because tape is are [SBI Clerk 2015]
(1) a random access medium (1) zip discs (2) CD-ROM
(2) a sequential access medium (3) video cards (4) pressing machines
(3) a read only medium (5) floppy diskettes
(4) fragile and easily damaged 57. A flat metallic disk that contains a large
51. Which of the following can hold maximum amount of permanently stored information
data? read optically, is called a
(1) Optical disc (2) Floppy disk (1) monitor (2) ALU
(3) Magnetic disk (4) Magnetic tape (3) CD-ROM (4) RAM
Computer Hardware 39

58. CD-ROM is an example of 66. Which of the following is the smallest


[RBI Grade B 2014] measure of storage? [UPSSSC 2015]
(1) input device (1) Tera byte (2) Gigabyte
(2) output device (3) Kilobyte (4) Byte
(3) Both input & output devices
67. ……… are used to measure both computer
(4) Memory device
memory (RAM) and storage capacity of
(5) None of the above
Floppy disks, CD-ROM drives and Hard
59. DVD refers to [SSC MTS 2013] drives. [SBI Clerk 2015]
(1) Digital Video Developer (1) Bytes
(2) Digital Video Device (2) Bits
(3) Digital Video Disc (3) Octal numbers

df
(4) None of the above (4) Hexadecimal numbers

_p
60. A DVD is an example of a(n) (5) Binary numbers
[SBI Clerk 2014] 68. How many bits are equal to one byte ?
(1) optical device

na
[SSC CGL 2016]
(2) output device (1) 8 (2) 6 (3) 7 (4) 2
(3) hard disk
(4) solid state storage device
(5) None of the above
ap
69. Instructions and memory address are
represented by [IBPS Clerk 2015]
:@
(1) character code (2) binary codes
61. Which of the following discs can be read
(3) binary word (4) parity bit
only? [IBPS Clerk 2015]
(5) None of these
(1) DVD-R (2) DVD-ROM
TG

(3) DVR-RW (4) CD-R 70. Kilo Byte equals to how many bytes?
(5) None of these [SBI Clerk 2012]
(1) 1000 (2) 1035 (3) 100 (4) 1008
62. Which is not an external storage device? (5) 1024
n

[SSC CGL 2016]


71. A …… is approximately a million bytes.
O

(1) CD-ROM (2) DVD-ROM


[SBI PO 2014]
(3) Pen drive (4) RAM
(1) giga byte (2) kilo byte
h

63. …… is the smallest unit of data in a (3) mega byte (4) tera byte
c

computer. [SSC CGL 2018] (5) None of these


ar

(1) Gigabyte (2) Bit 72. What does the computer abbreviation ‘MB’
(3) Byte (4) Terabyte
Se

used for? [IBPS Clerk 2014]


64. The term Bit is short for [SBI Clerk 2009] (1) Megabit (2) Millionbytes
(1) megabyte (3) Megabytes (4) Millionbit
(2) binary language (5) Microbytes
(3) binary digit 73. The amount of memory (RAM or ROM) is
(4) binary number
measured in [SBI PO 2014]
(5) None of the above
(1) bytes (2) bits
65. Which among the following is another (3) megabytes (4) megabits
name for a group of 4 bits? (5) hertz
[IBPS Clerk 2015, IBPS PO 2016] 74. How many kilobytes make a megabyte?
(1) Nibble (2) Byte [UPSSSC 2016, IBPS Clerk 2015]
(3) KiloByte (3) MegaByte (1) 128 (2) 1024 (3) 256 (4) 512
(5) PetaByte (5) 64
40 Learn, Revise & Practice ~ Computer Awareness

75. A … is approximately one billion bytes. 80. …… (HHDD) is a technology where the
[IBPS Clerk 2014, SBI PO 2015] conventional disk drive is combined with
(1) kilobyte (2) bit non-volatile flash memory, of typically
(3) gigabyte (4) megabyte 128 MB or more to cache data during
(5) None of these normal use. [SSC CGL 2017]
76. The term ‘gigabyte’ refers to [IBPS PO 2012] (1) Hyper Hard Disk Drive
(1) 1024 byte (2) Hybrid Hard Disk Drive
(2) 1024 kilobyte (3) Hybrid Helium Disk Drive
(3) 1024 megabyte (4) Hyper Helium Disk Drive
(4) 1024 gigabyte
(5) None of the above 81. Which of the following provides computing
and storage capacity services to heterogeneous

df
77. Which of the following is the largest unit of community of end recipients?
storage? [SBI PO 2015]

_p
(1) Cloud computing (2) Big data
(1) GB (2) KB
(3) FutureSkills (4) Robotics
(3) MB (4) TB

na
(5) None of these 82. What is/are characteristics of cloud
78. Which of the following is correct sequence computing?
of smallest to largest units of storage size?
ap (1) On demand self services
[SBI PO 2014] (2) Broad network access
:@

(1) Petabyte, Kilobyte, Megabyte, Gigabyte, Terabyte (3) Resource pooling


(2) Kilobyte, Megabyte, Terabyte, Petabyte, (4) All of the above
Gigabyte 83. Which type of cloud deployments is used to
TG

(3) Megabyte, Terabyte, Gigabyte, Kilobyte, Petabyte serve multiple users, not a single customer?
(4) Kilobyte, Megabyte, Petabyte, Terabyte, (1) Private cloud (2) Public cloud
Gigabyte (3) Hybrid cloud (4) None of these
n

(5) Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte


84. Which cloud computing services refers to
O

79. How many gigabytes is equal to 1 petabyte? supply on demand environment for
[SSC CGL 2016]
developing software applications?
h

(1) 256 (2) 512 (1) SaaS (2) AaaS


c

(3) 1024 (4)1024 × 1024 (3) PaaS (4) IaaS


ar

ANSWERS
Se

1. (1) 2. (2) 3. (3) 4. (4) 5. (5) 6. (4) 7. (1) 8. (3) 9. (3) 10. (1)
11. (4) 12. (3) 13. (1) 14. (5) 15. (2) 16. (1) 17. (4) 18. (1) 19. (3) 20. (1)
21. (5) 22. (1) 23. (1) 24. (2) 25. (4) 26. (2) 27. (1) 28. (2) 29. (2) 30. (3)
31. (3) 32. (4) 33. (3) 34. (4) 35. (4) 36. (1) 37. (4) 38. (1) 39. (3) 40. (5)
41. (4) 42. (5) 43. (3) 44. (4) 45. (1) 46. (3) 47. (3) 48. (2) 49. (5) 50. (2)
51. (4) 52. (4) 53. (1) 54. (2) 55. (1) 56. (2) 57. (3) 58. (4) 59. (3) 60. (1)
61. (2) 62. (4) 63. (2) 64. (3) 65. (1) 66. (4) 67. (1) 68. (1) 69. (2) 70. (5)
71. (3) 72. (3) 73. (3) 74. (2) 75. (3) 76. (3) 77. (4) 78. (5) 79. (4) 80. (2)
81. (1) 82. (4) 83. (2) 84. (3)
Data Representation 41
C H A P T E R

05
DATA

df
REPRESENTATION

_p
na
ap
Data representation refers those methods which Decimal Number System
:@

are used internally to represent information stored The number system that we use in our day-to-day
in a computer. Computer store lots of different life is decimal number system.
types of information as numbers, text, graphics,
TG

It consists of 10 digits from 0 to 9. These digits can


sounds, etc. be used to represent any numeric value. It is also
known as Base 10 system or positional number
Number System system. For example, (1275)10
n

It is a technique to represent numbers in the Here, 10 represents the base of decimal number.
O

computer system architecture, every value that


you are saving into/from computer memory has a Octal Number System
h

defined number system. It consists of 8 digits from 0 to 7. It is also known as


c

Base 8 system. Each position of the octal number


ar

Types of Number System represents a successive power of eight.


For example, ( 234 ) 8
Se

Binary Number System Here, 8 represents the base of octal number.


This system is very efficient for computers, but not
for humans. It contains only two unique digits 0’s Hexadecimal Number System
and 1’s. It provides us with a shorthand method of working
with binary numbers. There are 16 unique digits
It is also known as Base 2 system. A string, which available in this system.
has any combination of these two digits (0 and 1
These are 0 to 9 and A to F, where A denotes 10, B
are called bit) is called a binary number. The
denotes 11, ......., F denotes 15.
computer always calculates the input in binary
It is also known as Base 16 system or simply Hex.
form and digital computers internally use the
binary number system to represent data and So, each position of the hexadecimal number
perform arithmetic calculations. represents a successive power of 16.
For example, (F9D) 16
For example, (10101) 2
Here, 2 represents the base of binary number. Here, 16 represents the base of hexadecimal
number.
42 Learn, Revise & Practice ~ Computer Awareness

Decimal, Binary, Octal and Binary to Decimal


Hexadecimal Equivalents To convert binary to decimal, following steps are
Decimal Binary Octal Hexadecimal involved
0 0000 0 0 Step 1 Multiply the all binary digits by powers of 2.
1 0001 1 1 Step 2 The power for integral part will be positive
2 0010 2 2 and for fractional part will be negative.
3 0011 3 3 Step 3 Add all the multiplying digits.
4 0100 4 4
5 0101 5 5 Example (1101.10) 2 → (?)10
6 0110 6 6 (1101.10) 2 = 1 × 2 3 + 1 × 2 2 + 0 × 21
7 0111 7 7 + 1 × 2 0 + 1 × 2 −1 + 0 × 2 −2

df
8 1000 — 8
= 8 + 4 + 0 + 1 + 0. 5 + 0 = 13.5
9 1001 — 9

_p
10 1010 — A Then, (1101.10) 2 → (13. 5)10
11 1011 — B

na
12 1100 — C
Binary to Octal
13 1101 — D
14 1110 — E To convert binary to octal, following steps are
ap
15 1111 — F involved
Step 1 Make the group of 3 bits from right to left. If the
:@

left most group has less than 3 bits, put in the


Conversion between necessary number of leading zeroes on the left.
the Number Systems Step 2 Now, convert each group to decimal number.
TG

Decimal to Binary Example (110110100) 2 → (?) 8


To convert decimal to binary, following steps are involved 110 110 100
Step 1 Divide the given number by 2. ↓ ↓ ↓
n

Step 2 Note the quotient and remainder. Remainder 6 6 4


O

should be 0 or 1.
Step 3 If quotient ≠ 0, then again divide the Then, (110110100) 2 → (664 ) 8
h

quotient by 2 and back to step 2.


If quotient = 0, then stop the process.
Octal to Binary
c

Convert every digit of the number from octal to


ar

Step 4 First remainder is called as Least


binary in the group of 3 bits.
Significant Bit (LSB) and last remainder is
Se

called as Most Significant Bit (MSB). Example (1034. 5) 8 → (?) 2


Step 5 Arrange all remainders from MSB to LSB. 1 0 3 4 5
↓ ↓ ↓ ↓ ↓
Example (43)10 → (?) 2 001 000 011 100 101
Remainder
2 43 1 → LSB
Then, (1034. 5) 8 → (001000011100. 101 ) 2
2 21 1 Binary to Hexadecimal
2 10 0 To convert a binary number to its hexadecimal
2 5 1 equivalent, follow these steps
2 2 0 Step 1 Start making the group of 4 bits each from right
2 1 1 → MSB to left from the given binary number. If the left
0 most group has less than 4 bits, put in the
necessary number of leading 0’s on the left.
Then, (43)10 → (101011 ) 2 Step 2 Now, each group will be converted to decimal
number.
Data Representation 43
Example (11110101111011) 2 → (?)16 Step 2 These powers should be positive for integral
0011 1101 0111 1011 part and negative for fractional part.
↓ ↓ ↓ ↓ Step 3 Add the all multiplying digits.
3 13 7 11
D B Example (327.4) 8 → (?)10
(327. 4) 8 = 3 × 8 2 + 2 × 81 + 7 × 8 0 + 4 × 8 − 1
Then, (11110101111011 ) 2 → ( 3D 7 B)16
4
= 3 × 64 + 2 × 8 + 7 × 1 +
Hexadecimal to Binary 8
For this type of conversion, convert each = 192 + 16 + 7 + 0.5
hexadecimal digit to 4 bits binary equivalent. = 215.5
Example ( BA81)16 → (?) 2 Then, (327.4 ) 8 → ( 215. 5)10

df
B = 11 A = 10 8 1
↓ ↓ ↓ ↓

_p
Decimal to Hexadecimal
1011 1010 1000 0001
To convert decimal to hexadecimal, following steps
Then, ( BA81 )16 → (1011101010000001 ) 2

na
are involved
Step 1 Divide the given number by 16.
Decimal to Octal ap
Step 2 Note the quotient and remainder. Digits of
To convert decimal to octal, following steps are remainder will be 0 to 9 or A to F.
involved Step 3 If quotient ≠ 0, then again divide the
:@

Step 1 Divide the given number by 8. quotient by 16 and go back to step 2.


Step 2 Note the quotient and remainder. Digits of Step 4 If quotient = 0 or less than 16, then stop the
remainder will be from 0 to 7. process.
TG

Step 3 If quotient ≠ 0, then again divide the


Step 5 Write each remainder from left to right
quotient by 8 and go back to step 2. starting from MSD (Most Singnificaut Digit)
Step 4 If quotient = 0 or less than 8 then stop the to LSD (Least Singnificaut Digit).
n

process.
Example (929987)10 → (? )16
O

Step 5 Write each remainder from left to right


starting from MSD (Most Significant Digit) 16 929987 3 LSD
to LSD (Least Significant Digit). 12 → C
h

16 58124
Example (97647)10 → (?) 8
c

16 3632 0
ar

8 97647 7 LSD 16 227 3


8 12205 5 16 14 14 → E MSD
Se

8 1525 5 0
8 190 6
8 23 7
8 2 2 MSD Then, (929987)10 → ( E 30 C 3)16
0
Hexadecimal to Decimal
Then, (97647)10 → (276557) 8 To convert hexadecimal to decimal, following steps
are involved
Octal to Decimal
Step 1 Multiply each digit of hexadecimal number
To convert octal to decimal, following steps are with powers of 16.
involved Step 2 These powers should be positive for integral
Step 1 Multiply each digit of octal number with part and negative for fractional part.
powers of 8.
Step 3 Add the all multiplying digits.
44 Learn, Revise & Practice ~ Computer Awareness

Example ( BC 9. 8)16 → (?)10


Computer Codes
(BC 9. 8)16 = B × 16 2 + C × 161 + 9 × 16 0 + 8 × 16 −1 In computer, any character like alphabet, digit or
8 special character is represented by collection of 1’s
= 11 × 256 + 12 × 16 + 9 × 1 +
16 and 0’s in a unique coded pattern.
= 2816 + 192 + 9 + 0. 5 = 3017.5 In computers, the code is made up of fixed size
Then, (BC 9.8)16 → (3017. 5)10 groups of binary positions.
The binary coding schemes that are most commonly
Octal to Hexadecimal used are as follows
To convert octal to hexadecimal, following steps are
involved Binary Coded Decimal (BCD)

df
Step 1 Convert each digit of octal number to binary This system was developed by IBM. It is a number
number. system where four bits are used to represent each

_p
Step 2 Again, convert each binary digit to decimal digits.
hexadecimal number. BCD is a method of using binary digits to represent

na
Example (7632) 8 → (?)16 the decimal digits (0-9). In BCD system, there is no
Now, limit on size of a number.
7 6 3 2 ap
↓ ↓ ↓ ↓ American Standard Code for
111 110 011 010 Information Interchange (ASCII)
:@

(7632) 8 → (111110 011 010) 2 These are standard character codes used to store
data so that it may be used by other software
1111 1001 1010
programs.
TG

↓ ↓ ↓
15 9 10 Basically, ASCII codes are of two types, which are as
F A follows
(i) ASCII-7 It is a 7-bit standard ASCII code. It
n

Then, (7632) 8 → ( F 9A )16


allows 2 7 = 128 (from 0 to 127) unique symbols
O

or characters.
Hexadecimal to Octal
(ii) ASCII-8 It is an extended version of ASCII-7.
h

To convert hexadecimal to octal, following steps are


It is an 8-bit code, allows 2 8 = 256 (0 to 255)
c

involved
unique symbols or characters.
ar

Step 1 Convert each digit of the hexadecimal


number to binary number. Extended Binary Coded Decimal
Se

Step 2 Again, convert each binary digit to octal Interchange (EBCDIC)


number. In EBCDIC, characters are represented by eight
Example (AC2D)16 → (?) 8 bits. These codes store information which is
A C 2 D readable by other computers. It allows 2 8 = 256
↓ ↓ ↓ ↓ combination of bits.
1010 1100 0010 1101
Now, ( AC2D)16 → (10101100 00101101) 2 Logic Gate
001 010 110 000 101 101 It is a basic building block of a digital circuit that
↓ ↓ ↓ ↓ ↓ ↓ has two inputs and one output. The relationship
1 2 6 0 5 5 between the input and the output is based on a
certain logic. These gates are implemented using
Then, ( AC2D)16 → (126055) 8 electronic switches like transistors, diodes.
Data Representation 45

Logic
4. NAND Gate It is basically the inverse of
Inputs Output the AND gate. This gate is designed by
operation
combining the AND and NOT gates.
There are various types of logic gate as follows
It returns False only if the both conditions
1. AND Gate This gate is also represented by (⋅), or inputs are True otherwise it returns
i.e. ( A ⋅ B ). It returns True only if both the True.
conditions or inputs are True otherwise it A
X
returns False. B
A
X Truth Table of NAND Gate
B
A B X
Truth Table of AND Gate

df
0 0 1
A B X 0 1 1

_p
0 0 0 1 0 1
0 1 0 1 1 0

na
1 0 0 X = ( A ⋅ B) = A + B
1 1 1 ap
5. NOR Gate It is inverse of the OR gate. This
∴ X = A⋅B gate is designed by combining the OR and
:@

2. OR Gate This is represented by ( + ), i.e. NOT gates. It returns True only if both the
conditions or inputs are False otherwise it
( A + B ). It returns True if any one of the
returns False.
conditions or inputs is True and if both
TG

conditions are False, then it returns False. A


X
A B
X
B
Truth Table of NOR Gate
n

Truth Table of OR Gate


O

A B X
A B X 0 0 1
h

0 0 0 0 1 0
c

0 1 1 1 0 0
ar

1 0 1 1 1 0
1 1 1
Se

X = ( A + B) = A ⋅ B
∴ X=A+B
3. Inverter or NOT Gate This gate is also Note NAND and NOR gates are also called
represented by (′), i.e. A′. It returns True if universal gates.
the input is false and vice-versa. 6. Exclusive-OR or XOR Gate It performs
based on the operation of OR gate.
A X
It returns True only if one condition is true
from both the conditions otherwise it
Truth Table of NOT Gate returns False.
A X = A′
A
0 1 X
B
1 0
46 Learn, Revise & Practice ~ Computer Awareness

Truth Table of XOR Gate


Tit-Bits
A B X ■ UNICODE uses 16-bits to represent a symbol in
0 0 0 the data. It represents any non-english character,
0 1 1 scientific symbol in any language like Chinese,
Japanese.
1 0 1 ■ One’s complement of binary number is defined as
1 1 0 the value obtained by inverting all the bits
X = A⊕B For example, 110100
One’s complement is
X = AB + AB 001011

df
_p
QUESTION BANK
na
1. There are how many types of number system?
ap
7. Binary system is also called
(1) One (2) Two (3) Three (4) Four (1) base one system (2) base two system
:@

2. Modern computers represent characters and (3) base system (4) binary system
numbers internally using one of the 8. Which of the following is an example of
following number systems. binary number?
TG

(1) Penta (2) Octal (1) 6AH1 (2) 100101


(3) Hexa (4) Septa (3) 005 (4) ABCD
(5) Binary 9. Numbers that are written with base 10 are
n

3. In the binary language, each letter of the classified as


O

alphabet, each number and each special (1) decimal number


character is made up of a unique (2) whole number
h

(3) hexadecimal number


combination of
c

(4) exponential integers


(1) 8 bytes (2) 8 KB
ar

(5) mantissa
(3) 8 characters (4) 8 bits
10. Decimal number system is the group of
Se

4. To perform calculation on stored data


............ numbers.
computer, uses ……… number system.
(1) 0 or 1 (2) 0 to 9
(1) decimal (2) hexadecimal (3) 0 to 7 (4) 0 to 9 and A to F
(3) octal (4) binary
11. The octal system
5. Which of the following is not a binary
(1) needs less digits to represent a number than in
number? the binary system
(1) 001 (2) 101 (2) needs more digits to represent a number than
(3) 202 (4) 110 in the binary system
6. The number system based on ‘0’ and ‘1’ (3) needs the same number of digits to represent a
only, is known as number as in the binary system
(1) binary system (2) barter system (4) needs the same number of digits to represent a
(3) number system (4) hexadecimal system number as in the decimal system
Data Representation 47

12. A hexadecimal number is represented by 22. The decimal equivalent of binary number
(1) three digits (2) four binary digits (1010 ) 2 is
(3) four digits (4) All of these (1) 8 (2) 9 (3) 10 (4) 11
13. Hexadecimal number system has .......... base. 23. The binary number 10101 is equivalent to
(1) 2 (2) 8 (3) 10 (4) 16 decimal number .............
14. Hexadecimal number system consists of (1) 19 (2) 12 (3) 27 (4) 21
(1) 0 to 9 (2) A to F 24. Which of the following is octal number
(3) Both (1) and (2) (4) Either (1) or (2) equivalent to binary number (110101) 2 ?
15. A hexadigit can be represented by (1) 12 (2) 65
[IBPS Clerk 2012]
(3) 56 (4) 1111

df
(1) three binary (consecutive) bits 25. Which of the following is a binary number
(2) four binary (consecutive) bits equivalent to octal number (.431) 8 ?

_p
(3) eight binary (consecutive) bits (1) (100011001)2 (2) (.100011001)2
(4) sixteen binary (consecutive) bits (3) (100110100)2 (4) (.100110001)2

na
(5) None of the above
26. To convert binary number to decimal,
16. Which of the following is invalid multiply the all binary digits by power of
hexadecimal number?
(1) A0XB (2) A0F6
ap(1) 0
(3) 4
(2) 2
(4) 6
:@
(3) 4568 (4) ACDB 27. Which of the following is hexadecimal
17. What type of information system would be number equivalent to binary number
recognised by digital circuits? ( 1111 1001 ) 2 ?
TG

(1) Hexadecimal system (1) 9F (2) FF


(2) Binary system (3) 99 (4) F9
(3) Both (1) and (2) 28. Conversion of binary number (1001001) 2 to
n

(4) Only roman system hexadecimal is


O

18. The binary equivalent of decimal number 98 (1) (40)16 (2) (39 )16
is [IBPS Clerk 2012] (3) (49 )16 (4) (42)16
h

(1) 1110001 (2) 1110100 29. Which of the following is the correct binary
c

(3) 1100010 (4) 1111001 form of (4A2.8D) 16 ? [IBPS PO Mains 2017]


ar

(5) None of these (1) (010010100010.10001101)2


Se

19. Conversion of decimal number (71)10 to its (2) (010110100010.11101101)2


binary number equivalent is (3) (011110100010.10001101)2
[IBPS Clerk 2012] (4) (010010111110.10001101)2
(1) (110011)2 (2) (1110011)2 (5) None of the above
(3) (0110011)2 (4) (1000111)2 30. Which of the following is an octal number
(5) None of these equal to decimal number (896 )10 ?
20. What is the value of the binary number 101? (1) 0061 (2) 6001
(3) 1006 (4) 1600
(1) 3 (2) 5 (3) 6 (4) 101
21. Decimal equivalent of (1111) 2 is 31. Conversion of decimal number (42)10 to its
[IBPS Clerk 2012] octal number equivalent is
(1) 11 (2) 10 (3) 1 (4) 15 (1) (57 )8 (2) (42)8
(5) 13 (3) (47 )8 (4) (52)8
48 Learn, Revise & Practice ~ Computer Awareness

32. Determine the octal equivalent of (432267 )10 40. How will you represent ‘87’ in this code
(1) (432267 )8 (2) (346731)8 language?
(3) (2164432)8 (4) None of these (1) o∆∆∆o∆∆ (2) ∆o∆o∆∆∆
(3) ∆∆o∆∆∆∆ (4) ∆oo∆oo∆
33. Determine the decimal equivalent of (456 ) 8 (5) ∆∆o∆∆∆o
(1) (203)10 (2) (302)10 41. What will be the code for ∆∆ooo∆o ?
(3) (400)10 (4) (402)10
(1) 98 (2) 95 (3) 96 (4) 94
34. Conversion of octal number (3137 ) 8 to its (5) 99
decimal equivalent is
(1) (1631)10 (2) (1632)10 42. How many values can be represented by a
(3) (1531)10 (4) (1931)10 single byte?

df
(1) 4 (2) 16
35. Conversion of decimal number (15)10 to (3) 64 (4) 256

_p
hexadecimal number is 43. Which of the following is not a computer
(1) (14 )16 (2) (13)16 (3) ( F )16 (4) (7 F )16 code?

na
36. Which of the following is a hexadecimal (1) EBCDIC (2) ASCII
number equal to 3431 octal number? (3) CISC (4) UNICODE
(1) 197
(5) 719
(2) 917 (3) 791 (4) 971 ap
44. ASCII stands for [IBPS Clerk 2014, 2018]
(1) American Special Computer for Information
:@
37. The method used for the conversion of octal Interaction
to decimal fraction is (2) American Standard Computer for Information
(1) digit is divided by 8 Interchange
(3) American Special Code for Information
TG

(2) digit is multiplied by the corresponding power


of 8 Interchange
(3) digit is added with 8 (4) American Special Computer for Information
Interchange
(4) digit is subtracted with 8
n

(5) American Standard Code for Information


O

38. MSD refers as Interchange


(1) Most Significant Digit 45. The most widely used code that represents
h

(2) Many Significant Digit each character as a unique 8-bit code is


c

(3) Multiple Significant Digit [UPSSSC 2017]


ar

(4) Most Significant Decimal (1) ASCII (2) UNICODE


39. LSD stands for (3) BCD (4) EBCDIC
Se

(1) Long Significant Digit 46. Today’s mostly used coding system is/are
(2) Least Significant Digit (1) ASCII (2) EBCDIC
(3) Large Significant Digit (3) BCD (4) Both (1) and (2)
(4) Longer Significant Decimal
47. In EBCDIC code, maximum possible
Directions (40 and 41) Triangle represents ∆ (1) characters set size is
and circle represents o (0). If triangle appears in (1) 356 (2) 756
unit’s place then its value is 1. If it appears in (3) 556 (4) 256
10’s place its value is doubled to 2 like that it 48. Code ‘EBCDIC’ that is used in computing
continues. Using the given terminology answer stands for
the following questions.
(1) Extension BCD Information Code
For example,
(2) Extended BCD Information Code
∆ =1
(3) Extension BCD Interchange Conduct
∆o∆ = 4, 0, 1 = 4 + 0 + 1
(4) Extended BCD Interchange Conduct
∆o = 2 [IBPS PO Mains 2017]
Data Representation 49

49. Most commonly used codes for representing 56. Following diagram depicts which logic
bits are gate? [IBPS PO Mains 2017]
(1) ASCII (2) BCD
A A
(3) EBCDIC (4) All of these
50. The coding system allows non-english (1) NOR gate (2) NOT gate
characters and special characters to be (3) OR gate (4) NAND gate
represented (5) None of these
(1) ASCII (2) UNICODE
57. The NAND gate is AND gate followed by
(3) EBCDIC (4) All of these
......
51. Which of the following character set (1) NOT gate (2) OR gate
supports Japanese and Chinese fonts?

df
(3) AND gate (4) NOR gate
[IBPS Clerk Mains 2017]
58. The NOR gate is OR gate followed by ........

_p
(1) EBCDIC (2) ASCII
(3) BC (4) ECBI (1) AND gate (2) NAND gate
(5) UNICODE (3) NOT gate (4) OR gate

na
52. Two inputs A and B of NAND gate have 0 59. The NOR gate output will be high if the two
output, if inputs are
ap
(1) A is 0 (2) B is 0 (1) 00 (2) 01 (3) 10 (4) 11
(3) Both are zero (4) Both are 1 60. Which of following are known as universal
:@

53. Gate having output 1 only when one of its gates?


input is 1 is called (1) NAND and NOR (2) AND and OR
(3) XOR and OR (4) AND
TG

(1) AND (2) NOT


(3) OR (4) NOR 61. Gate whose output is 0 only when inputs
54. ..........gate is also known as inverter. are different is called
n

(1) OR (2) NOT (1) XOR (2) XNOR (3) NOR (4) NAND
62. If ∆ represents ‘1’ and o represents ‘0’. What
O

(3) XOR (4) NAND


55. The only function of NOT gate is to ........ will be the one’s complement of o∆∆oo∆?
h

(1) stop signal [IBPS PO Mains 2017]


c

(2) invert input signal (1) 011001 (2) 100110


ar

(3) act as a universal gate (3) 101010 (4) 000000


(4) double input signal (5) 111111
Se

ANSWERS
1. (4) 2. (5) 3. (4) 4. (4) 5. (3) 6. (1) 7. (2) 8. (2) 9. (1) 10. (2)
11. (1) 12. (2) 13. (4) 14. (3) 15. (4) 16. (1) 17. (3) 18. (3) 19. (4) 20. (2)
21. (4) 22. (3) 23. (4) 24. (2) 25. (2) 26. (2) 27. (4) 28. (3) 29. (1) 30. (4)
31. (4) 32. (4) 33. (2) 34. (1) 35. (3) 36. (5) 37. (2) 38. (2) 39. (2) 40. (2)
41. (1) 42. (4) 43. (3) 44. (5) 45. (1) 46. (4) 47. (4) 48. (2) 49. (4) 50. (2)
51. (5) 52. (4) 53. (3) 54. (2) 55. (2) 56. (2) 57. (1) 58. (3) 59. (1) 60. (1)
61. (1) 62. (2)
50 Learn, Revise & Practice ~ Computer Awareness

C H A P T E R

06
COMPUTER

df
_p
SOFTWARE
na
ap
Software is a collection of computer programs and related data that provide the instructions for telling a
:@

computer what to do and how to do. A software is an interface between the user and the computer
hardware. It is responsible for controlling, integrating and managing the hardware components of a
computer system and for accomplishing specific tasks.
TG

Types of Software
n

1. System software 2. Application software


O

System Software
h

It consists of several programs, which are directly responsible for controlling, integrating and managing
c

the individual hardware components of a computer system. System software also provides the interface
ar

between the user and components of the computer.


Depending on the functionality, the system software can be further divided into following categories
Se

1. Operating System It consists of programs which control, coordinate and supervise the activities of
various components of a computer system. Its function is to provide link between the computer
hardware and the user. It provides an environment to run the programs. For example, MS-DOS,
Windows XP/2000/98, Unix, Linux, etc.
Operating system performs the following functions
(i) It recognises input from keyboard and sends output to the display screen.
(ii) It makes sure that programs running at the same time do not interfere with each other.
(iii) It is also responsible for security and ensures that unauthorised users do not access the system.

BIOS
The Basic Input/Output System (BIOS) is commonly known as System BIOS. BIOS controls various electronic
components within the main computer system. The initial function of BIOS is to initialise system devices such as
RAM, hard disk, CD/DVD drive, video display card and other hardwares.
Computer Software 51
2. Device Driver A software, which is written Word processors have the ability to create a
with the objective of making a device document and make changes anywhere in the
functional when it is connected to the document.
computer is called device driver. It is a system For example, Microsoft Word, WordPerfect
software that acts like an interface between the (Windows only), AppleWorks (Mac only),
device and the user. OpenOffice.org Writer, etc.
Every device, whether it is a printer, monitor, 2. Electronic Spreadsheets Spreadsheet
mouse or keyboard has a driver program applications are the computer programs that
associated with it for its proper functioning. accept data in a tabular form and allow you to
3. Language Translator It helps in converting create and manipulate spreadsheets
programming language to machine language. electronically.

df
The translated program is called object code. For example, Microsoft Excel, Corel Quattro
There are three different kinds of language

_p
Pro, Lotus 1-2-3, OpenOffice.org Calc, etc.
translator : Assembler, Compiler and Interpreter. 3. Presentation Software This software is used

na
for creation of the slides and to display the
Linker information in the form of presentation of
It is a system program that links together several slides.
object modules and libraries to form a single and
coherent program (executable). The main purpose
ap
For example, Microsoft PowerPoint, Corel
Presentations, Lotus Freelance Graphics,
:@
of linker is to resolve references among files.
OpenOffice.org Impress, etc.
Loader
It is a kind of system software which is responsible 4. Database Management System (DBMS) A
DBMS refers to the software that is responsible
TG

for loading and relocation of the executable program


in the main memory. It is a part of operating system for sorting, maintaining and utilising a
that brings an executable file residing on disk into database.
memory and starts its execution process.
For example, Microsoft Access, Corel Paradox,
n

MySQL, OpenOffice.org Base, etc.


O

Application Software 5. Desktop Publishing (DTP) Software It is a


It is a computer software designed to help the user tool for graphic designers and non-designers to
h

to perform single or multiple tasks. It is a set of create visual communications for professional
c

instructions or programs designed for specific use or desktop printing as well as for online or on
ar

or application, that enable the user to interact with screen electronic publishing.
a computer.
Se

For example, Quark XPress, Adobe PageMaker,


Application softwares are also called the end-user 3B2, CorelDraw, Corel Ventura, Illustrator, etc.
programs. These programs do the real work for 6. Graphics Software (Image Editing) It enables
users. a person to manipulate visual images on a
There are two types of application software computer system. Most graphics softwares
have the ability to import and export one or
General Purpose Software more graphics file formats.
These types of software are used for any general For example, DirectX, Adobe Photoshop,
purpose. They allow people to do simple computer piZap, Microsoft Publisher, Picasa, etc.
tasks.
7. Multimedia Software Multimedia includes
Some of the general purpose softwares are as follows a combination of text, audio, still images,
1. Word Processing Software A word animation, video or interactivity content forms.
processor is a software program capable of For example, Macro-Media Flash, Xilisoft Video
creating, storing and printing of documents. Converter, VLC Media Player, Nimbuzz, etc.
52 Learn, Revise & Practice ~ Computer Awareness

For example, Tally. ERP9, HDPOS, MARG,


Specific Purpose Software
Profit book etc.
These softwares are designed to perform specific
tasks. This type of application software generally 7. Billing System It refers to the software that
has one purpose to execute. is used to perform the billing process. It handles
the tracking of labled products and services
Some of the specific purpose application softwares delivered to a customer or set of customers.
are described below For example, Billing Manager, Billing Tracker,
1. Inventory Management System and kBilling, etc.
Purchasing System Inventory is a list of
goods and materials available in a stock.
Inventory management system is generally
System Utilities
These programs perform tasks related to the

df
used in departmental stores or in an
organisation to keep the records of the stock of maintenance of the computer system. These are the

_p
all the physical resources. packages which are loaded into computer during
the time of installation of operating system.
For example, Fishbowl, AdvancePro, etc.

na
They are used to support, enhance, expand and
2. Payroll Management System It is used by
secure existing programs and data in the computer
all modern organisations to encompass every
employee of the organisation who receives a
regular wages or other compensation.
ap
system.
System utility mainly consists of the following
:@
For example, Namely, UltiPro, etc. functions
3. Hotel Management System It refers to the 1. Disk Compression It increases the amount
management techniques used in the hotel of information that can be stored on a hard disk
TG

sector. These can include hotel administration, by compressing all information stored on it.
accounts, billing, marketing, housekeeping, For example, DiskDoubler, SuperStor Pro,
front office or front desk. DoubleDisk Gold , etc.
n

For example, Djubo, Aatithya HMS, Hotelogix 2. Disk Fragmenter It detects computer files
whose contents are broken across several
O

PMS, etc.
4. Reservation System A reservation system or locations on the hard disk and moves the
fragments to one location to increase efficiency.
h

Central Reservation System (CRS) is a


It can be used to rearrange files and unused
c

computerised system used to store and retrieve


space on your hard disk.
ar

information and conduct transactions related


to air travel, hotels, car rental or other For example, MyDefrag, Diskeeper, Defraggler,
Se

activities. Today, number of websites like etc.


www.yatra.com, www.makemytrip.com 3. Backup Utilities It can make a copy of all
provide online booking for tourists. information stored on a disk and restore either
5. Report Card Generator It is an application the entire disk or selected files.
software which is commonly used in schools by 4. Disk Cleaners It is used to find files that
the examination department to prepare and have not been used for a long time. This utility
generate the report cards of the students. also serves to increase the speed of a slow
For example, E-report card. computer.
6. Accounting Software It is an application For example, Bleach Bit cleaner, etc.
software that records and processes accounting 5. Anti-virus It is the utility which is used to
transactions within functional modules such as scan computer for viruses and prevent the
accounts payable, accounts receivable, payroll computer system and files from being corrupt.
and trial balance. For example, Kaspersky, AVG, McAfee, Avira,
etc.
Computer Software 53
6. Text Editor It is a program that facilitates source code must be in the preferred form in
the creation and correction of text. A text editor which a programmer would modify the
supports special commands for text editing, i.e. program.
you can write, delete, find and replace words, 3. Integrity of the Author’s Source Code The
lines, paragraphs, etc. license may restrict source code from being
For example, MS-Word, WordPad, Notepad, distributed in modified form only if the
etc., in which Notepad is the most popular text license allows the distribution of “patch files”
editor. with the source code for the purpose of
modifying the program at build time.
Open Source Software
Open source refers to something that can be Proprietary Software

df
modified and shared as its designed are publicly It is a software that is owned by an individual or a
accessible. company. There are always major restrictions on it

_p
Open Source Software (OSS) is any computer to use and its source code is always kept secret.
software that is distributed with its source code Proprietary software is copyrighted and bears

na
available for modification. limits against use, distribution and modification
that are imposed by its publisher, vendor or
Examples of Open Source Software are Linux, ap
developer.
Unix, MySQL, etc. To be considered as open source
software by the software development industry,
:@

certain criteria must be met are as follows


Main Barriers for Using
Software must be available free or at a low cost. Proprietary Software
Source code must be included. 1. Licenses and maintenance of proprietary
TG

Anyone must be allowed to modify the source software is very expensive.


code. 2. It is developed for a single purpose,
Modified versions can be redistributed. applications are separately packaged.
n

3. Vendor support is conditional to maintenance


O

Criteria for the Distribution subscription.


of OSS 4. Users have to dependent on the developer of
h

Open source software is normally distributed with proprietary software for all updates, support
c

and fixes.
the source code under an open source license. The
ar

distribution terms of open source software must 5. Low level of customisation and adaptability.
comply with the following criteria
Se

1. Free Redistribution The license shall not


Tit-Bits
restrict any party from selling or giving away

Adobe Page Maker is a typesetting tool which is
used for desktop publishing.
the software distribution containing programs ■
Fully Backup contains a copy of every program,
from several different sources. The license
data and system file on a computer.
shall not require a royalty or other fee for ■
is a combination of software and
such sale. hardware. e.g. ROMs, PROMs and EPROMs.
2. Source Code The program must include ■
Freeware is commonly used for copyrighted
source code and allows distribution with software that is given away for free by its owner.
source code as well as a compiled form. The
Learn, Revise & Practice ~ Computer Awareness

QUESTION BANK
1. Which one of the following is defined as “a 8. The two broad categories of software are
set of instructions, data or programs used to (1) word processing and spreadsheet
operate computers and execute specific (2) transaction and application
tasks”? [SSC CGL 2018] (3) Windows and Mac OS
(1) Processor (2) Hardware (4) system and application
(3) Malware (4) Software 9. System software
2. The term used to describe the intangible (1) allows the user to diagnose and troubleshoot

df
instructions that tell the computer what to the device
(2) is a programming language

_p
do is [IBPS Clerk 2015]
(3) is a part of productivity suite
(1) hardware (2) software
(4) helps the computer manage internal resources

na
(3) storage (4) input/output
(5) None of these 10. A collection of various programs that helps
3. Software refers to apto control your computer is called
(1) the physical components that a computer is (1) system software [SBI Clerk 2015]
made of (2) application software
:@

(2) firmware (3) Microsoft Excel


(3) programs (4) Microsoft Word
(4) people ware (5) Microsoft Outlook
TG

4. Which of the following is software? 11. This type of software works with end-users,
[IBPS Clerk 2014] application software and computer hardware
(1) Keyboard (2) Internet Explorer to handle the majority of technical details.
n

(3) Scanner (4) Mouse [RBI Grade B 2014, IBPS PO 2012]


O

(5) Printer (1) Communication software


5. The primary purpose of software is to turn (2) Application software
h

data into [RBI Grade B 2014] (3) Utility software


c

(1) information (2) programs (4) System software


ar

(3) objects (4) charts (5) None of the above


(5) websites
12. It is a set of programs that enables your
Se

6. Computer software is [SBI Clerk 2015] computer’s hardware device and application
(1) used only for output software to work together.
(2) a computer peripheral (1) Management
(3) used for input (2) Processing
(4) a set of instructions (3) Utility
(5) used only in operating systems (4) System software
7. The steps and tasks needed to process data, 13. A(n) ...... is a software that helps a computer
such as responses to questions or clicking control to operate efficiently and keep track
an icon, are called of data.
(1) instructions (1) application system
(2) the operating system (2) hardware system
(3) application software (3) software system
(4) the system unit (4) operating system
Computer Software 55

14. A computer cannot ‘boot’ if it does not have 22. ........ helps in converting programming
the language to machine language.
(1) compiler (2) loader (1) Operating system (2) Device driver
(3) operating system (4) assembler (3) Language translator (4) Linker
15. The ……… tells the computer how to use its 23. A linker program
components. (1) places the program in the memory for the
(1) utility (2) application purpose of execution
(3) operating system (4) network (2) relocates the program to execute from the
16. Operating system is a specific memory area allocated to it
(1) application software (3) links the program with other programs needed
(2) system software for its execution

df
(3) hardware (4) interfaces the program with the entities
(4) language generating its input data

_p
17. The ……… manual tells you how to use a 24. The main purpose of ……… is to resolve
software program. references among files.

na
[RBI Grade B 2012]
(1) documentation (2) programming (1) text editor (2) loader
(3) user (4) technical ap(3) antivirus (4) linker
(5) None of these
25. Which of the following system software
18. What does the acronym BIOS stand for? resides in main memory always?
:@

[SBI Clerk 2014, RBI Grade B 2013] (1) Text editor (2) Assembler
(1) Basic Input/Outer System (3) Linker (4) Loader
(2) Basic Internal Output System
TG

(3) Basic Inner/Output System 26. A kind of system software, which is


(4) Basic Input/Output Systemisation responsible for loading and relocating of the
(5) Basic Input/Output System executable program in the main memory
n

(1) loader
19. …… includes boot firmware and power
O

(2) linker
management. [SBI Clerk 2015]
(3) translator
(1) CD-ROM (2) Internal buses
h

(4) presentation software


(3) BIOS (4) Chip Set
c

(5) RAM 27. Specialised program that allows user to


ar

utilise in specific application is classified as


20. Which category does best describe the [IBPS RRB PO Mains 2017]
BIOS?
Se

[UPSSSC 2016]
(1) relative program
(1) Hardware (2) Malware
(2) application program
(3) Firmware (4) Utility
(3) appropriate program
21. In computer terminology, which of the (4) replicate program
following best describes a device driver? (5) logical program
[UGC NET 2019]
(1) Software that allows the user to control the 28. .......... is a software which is used to do
operating system particular task. [IBPS Clerk Mains 2017]
(2) Hardware that allows the user to control the (1) Operating system
operating system (2) Program
(3) Hardware that allows interaction between (3) Data software
peripheral devices and the operating system
(4) Data
(4) Software that allows interaction between
peripheral devices and the operating system (5) Application software
56 Learn, Revise & Practice ~ Computer Awareness

29. Software designed for a specific purpose/ 36. DTP is a tool for graphic designers and non-
application such as pay calculations, processing designers to create visual communications
of examination result, etc. are known as for professional. DTP stands for
(1) utility software (1) Device Transfer Protocol
(2) system software (2) Desktop Publishing
(3) application software (3) Device Transfer Programs
(4) customised software (4) All of the above
30. Application software 37. Corel Ventura, Illustrator are examples of
(1) is used to control the operating system (1) Word Processing (2) Graphic
(2) is designed to help programmers (3) Multimedia (4) DTP
(3) performs specific task for computer users

df
38. DirectX is a/an [RBI Grade B 2013]
(4) is used for making design only
(1) computer part

_p
31. The software that is used to create (2) user interface
text-based documents are referred to as (3) operating system
(4) software that drives graphic software

na
……… [SBI PO 2013]
(1) DBMS (5) None of the above
(2) suites 39. Which among the following is not an
ap
(3) spreadsheets example of system software?
(4) presentation software (1) Operating system
:@

(5) Word processors (2) Debugger


32. Which of the following general purpose (3) Software Driver
softwares allow you to do mathematical or (4) Adobe Photoshop
TG

financial calculation? 40. Which application software is used for a


(1) Word processing program special purpose? [IBPS RRB PO Mains 2018]
(2) Spreadsheet program (1) General purpose software
n

(3) Presentation program (2) Special purpose software


O

(4) Database program (3) Important software


33. Spreadsheet software is used (4) System software
h

(1) to keep simple company accounts (5) None of the above


c

(2) calculate employee commission payments 41. Which types of software is used in
ar

(3) as simple stock control system organisations to keep track of products in


(4) All of the above stocks?
Se

34. Which software is used to create (1) Enterprise Resource Planning (ERP) software
(2) Payroll Software
presentations to show to customers or staff
(3) Human resource planning software
members? (4) Inventory management software
(1) Report generation
(2) Graph generator 42. A software program that adds functionality
(3) Presentation software to your computer or help your computer
(4) Picture generator perform better is called as
35. Database software is used to [IBPS RRB PO Mains 2017]
(1) utility program
(1) discard sales records (2) function program
(2) store contacts list (3) specialised program
(3) keep customer records (4) manufacturer program
(4) generate report (5) compiling program
Computer Software 57

43. Which of the following techniques can be 50. Disk cleaner helps to free
used to store a large number of files in a (1) data (2) recycle bin
small amount of storage space? (3) space (4) information
(1) File adjustment 51. They can find files that are unnecessary to
(2) File copying computer operation, or take up considerable
(3) File compatibility amounts of space.
(4) File compression (1) Antivirus
44. What type of software creates a smaller file (2) Sweep
that is faster to transfer over the Internet? (3) Disk cleaner
[IBPS Clerk Mains 2017] (4) Disk Formatting
(1) Compression (2) Fragmentation 52. Which of the following Windows utilities

df
(3) Unzipped (4) Abstraction erase unneeded files?

_p
(5) Encapsulation (1) Backup or Restore Wizard
45. ....... is a Windows utility program that (2) Disk Cleanup

na
locates and eliminates unnecessary (3) Disk Defragmenter
fragments and rearranges files and unused (4) Antivirus
disk space to optimise operations.
[SBI PO 2013]
ap
53. Text editor is a/an
(1) application software
[RBI Grade B 2013]

(2) system software


:@
(1) Backup (2) Disk cleanup
(3) Disk defragmenter (4) Restore (3) utility software
(5) Disk restorer (4) all purpose software
(5) None of the above
TG

46. When files are broken up into small parts


on a disk they are said to be 54. Which of the following is not related to a
(1) fragmented (2) contiguous utility software?
(3) sectored (4) disbursed (1) Text editor
n

(2) Antivirus program


O

47. It can make copies of all information stored (3) Disk compression software
on a disk or either restore the entire disk (4) Railway reservation system
h

(1) Restore utility


55. Utility programs include
c

(2) Disk cleaner


(1) virus scanning software
ar

(3) Backup software


(2) backup software
(4) Defragmenter (3) disk defragmenter
Se

48. What is backup? (4) All of the above


(1) Connect the user’s network to more component 56. Which of the following is not related to an
(2) Copy to save a data from original source to
application software?
other destination
(1) Word processor
(3) Filter on old data from new data
(2) DBMS
(4) Access data from tape
(3) Operating system
49. A(n) ……… backup contains a copy of every (4) Railway reservation system
program, data and system file on a 57. .......... disk encryption is a technology
computer. [Allahabad Bank Clerk 2011] (hardware or software) where data is
(1) restoration (2) bootstrap encrypted before storage. [SCC CGL 2017]
(3) differential (4) full (1) Half (2) Whole
(5) None of these (3) Double (4) Triple
58 Learn, Revise & Practice ~ Computer Awareness

58. Which of the following software is any 60. Which of the following is not an open
computer software that is distributed with source software? [UPSSSC 2018]
its source code available for modification? (1) Linux
[SSC CGL 2018] (2) Microsoft Office
(1) Application software (3) Mozilla Firefox
(2) System Software (4) Android
(3) Open Source Software 61. This software is copyrighted and bears the
(4) Proprietary Software limits against use. [SSC CGL 2017]
59. Example(s) of open source software is/are (1) Proprietary Software
[SSC CHSL 2019] (2) Open Source Software
(1) Linux (2) Unix (3) Application Software

df
(3) MySQL (4) All of these (4) System Software

_p
ANSWERS

na
1. (4) 2. (2) 3. (3) 4. (2) 5. (1) 6. (4) 7. (1) 8. (4) 9. (4) 10. (1)
11. (4)
21. (4)
12. (4)
22. (3)
13. (4)
23. (3)
14. (3)
24. (4)
15. (3)
25. (4)
ap
16. (2)
26. (1)
17. (3)
27. (2)
18. (5)
28. (5)
19. (3)
29. (3)
20. (3)
30. (3)
:@
31. (5) 32. (2) 33. (4) 34. (3) 35. (3) 36. (2) 37. (5) 38. (4) 39. (4) 40. (2)
41. (5) 42. (1) 43. (4) 44. (1) 45. (3) 46. (1) 47. (3) 48. (2) 49. (4) 50. (3)
51. (3) 52. (2) 53. (3) 54. (4) 55. (4) 56. (3) 57. (2) 58. (3) 59. (4) 60. (4)
TG

61. (1)
n
O
c h
ar
Se
Operating System 59
C H A P T E R

07
OPERATING

df
_p
SYSTEM
na
ap
An Operating System (OS) is a program which acts as an interface between the user and the computer
:@

hardware. The interface enables a user to utilise hardware resources very efficiently.
Operating system is an organised collection or integrated set of specialised programs that controls the
overall operations of a computer. It is a program that must be on any computer for proper booting.
TG

Functions of Operating System


Process Management A process is the basic unit of execution in the operating system. It is a process by
n

which operating system can control the planning, monitoring and performance of a CPU.
O

Memory Management It is a process of controlling and coordinating computer memory. It ensures that
all processes are able to access their memory or not.
h

File Management It is the main function of operating system. It manages all data files in a computer
c
ar

system. At the time of execution of a program, the operating system also performs the task of copying files
from secondary memory to primary memory.
Se

Device Management It is a process of managing the operation and maintenance of input/output


devices. It also facilitates the interface between all the connected devices.

Types of Operating System


1. Batch Processing Operating System
In this operating system, a number of jobs are put together and executed as a group. This operating system
is responsible for scheduling the jobs according to priority and the resource required. e.g. Unix.
2. Single User Operating System
It is a type of operating system which allows only one user at a time. Operating system for Personal
Computer (PC) is a single user OS. They are designed to manage one task at a time.
e.g. MS-DOS, Windows 9X.
60 Learn, Revise & Practice ~ Computer Awareness

3. Multi User Operating System communicate with the applications and the
This OS allows multiple users to access a computer hardware.
system concurrently. It is used in computer The user can interact with the computer by using
networks that allow same data and applications to mainly two kinds of interface
be accessed by multiple users at the same time.
e.g. VMS. 1. Graphical User Interface (GUI)
It is a computer program that enables a person to
4. Multi-Tasking Operating System
communicate with a computer through the use of
In this operating system, more than one process symbols, visual metaphors and pointing devices. It
can be executed concurrently. It also allows the is best known for its implementation in Apple
user to switch between the running applications. products.

df
e.g. Linux, Unix, Windows 95.
The first graphical user interface was designed by
Multi-tasking OS further classified into two types

_p
Xerox Corporation in 1970s. GUIs can be found in
(i) Preemptive Multitasking OS It is a type of handheld devices such as MP3 players, portable
multitasking OS that allows computer

na
media players, gaming devices, etc.
programs to share operating system and
underlying hardware resources. 2. Character User Interface (CUI)
ap
(ii) Cooperative Multitasking OS It is the It is also known as Command Line Interface (CLI).
simplest form of multitasking. In it, each CUI is a mechanism of interacting with a computer
:@

program can control the CPU for as long as it system or software by typing commands to perform
need it. specific tasks.
TG

5. Time Sharing Operating System CUI only uses text types one after another just as
This operating system allows multiple programs to commands used in MS-DOS.
simultaneously share the computer resources. It
provides to each process to be run on. e.g. Mac OS.
n

Booting
O

6. Real Time Operating Sytem (RTOS) Booting is starting up a computer or computer


appliance until it can be used. It can be initiated by
These operating systems are designed to respond hardware such as a Start button or by Software
h

to an event within a pre-determined time. command.


c

They are often used in applications such as flight There are two types of booting
ar

reservation system, military applications, etc. This ■ Cold Booting When a computer is turned ON

type of operating system increases the availability after it has been completely shutdown.
Se

and reliability of the system. e.g. Linux. ■ Warm Booting When a computer is restarted by

There are two types of real time operating system pressing the combination of Ctrl + Alt + Del keys
or by Restart button.
(i) Hard Real Time OS In this RTOS, all the
tasks are required to be completed within the
specified time limit. Some Important
(ii) Soft Real Time OS In this RTOS, all the Operating Systems
tasks are not required to be completed within
Some popular operating systems are as follows
the specified time limit.
1. UNIX The first version of Unix was developed
User Interface in 1969 by Ken Thompson and Dennis Ritchie.
The system which provides the facility to the user It is primarily used to a server rather than a
to interact with the computer is called user work station and should not be used by anyone
interface. It allows users to easily access and who does not understand the system.
Operating System 61
2. Apple Macintosh (Mac OS) It was introduced 3. The MS-DOS. sys Program It is a collection
in January, 1984 by Steve Jobs and was initially of program routines and data tables that
named as system software, which was later provide high level programs such as application
renamed as Mac OS. programs.
Versions of Mac OSX are Yosemite, Mavericks, 4. The Command.com Program It provides a
Mountain Lion, Tiger, Tiger Panther, Jaguar, standard set of commands that gives users
etc. access to file management, configuration and
miscellaneous functions.
3. LlNUX The first Linux Kernel was released in
September, 1991 by Linus Torvalds. It is an Configuration of DOS
open source software. Config. sys, Autoexec. bat and their files provide the
Linux is similar to Unix in operations. It is environment to computer to set commands

df
difficult to understand by anyone. (i) Config. sys It adjusts the system acoording

_p
Kernel is the core of the operating system that to commands.
supports the process by providing a path to the (ii) Autoexec.bat When the system is powered

na
peripheral devices. ON, this file executes in automatically
4. Microsoft Windows It is an operating system, command line.
based on GUI, developed by Microsoft.
Microsoft first introduced an operating
ap Important Extensions and their Meanings
Extensions Meanings
:@
environment named Windows in November
.exe Executable files
1985.
.com Command files
MS-DOS (Microsoft-Disk .bat Batch files
TG

Operating System) .doc Document files


The DOS OS was developed by Microsoft in 1980 .txt Text files
n

for micro computers. MS-DOS was the first .prg Program files
O

operating system that run on PC developed by IBM .ovr Over lays


Corporation in 1981. .sys System files
h

DOS is a single user operating system. It is the only


c

operating system which can be loaded in the main Types of MS-DOS Commands
ar

memory of the computer using a single disk. There are two types of MS-DOS commands as follows
Structure of DOS 1. Internal Commands These commands are
Se

There are four essential programs associated with the automatically loaded into main memory when
control of computer and the way it interacts with the booting process gets completed.
them e.g. DATE, TIME, VER, VOL, DIR, COPY, CLS,
1. Boot Record It includes loading the operating etc.
system into main memory. It is the main 2. External Commands These commands require
program of MS-DOS. external files to be loaded in the computer to
2. Basic Input/Output System (BIOS. sys) It run.
provides an interface between the hardware e.g. Checking disk, comparing disk, formatting,
and programs. etc.
62 Learn, Revise & Practice ~ Computer Awareness

Important Commands and their Uses different types of mobile applications. It has
Commands Uses built-in support for mobile multimedia formats.
CALL Call one batch program from another Some popular mobile operating systems are as
CD Change Directory-move to a specific follows
folder 1. Android It is a mobile OS developed by
CLS Clear the screen Google, which is based on Linux (main part of
COPY Copy one or more files to another operating system). It is basically designed for
location touch screen mobile devices like Tablets,
DATE Display or set the date Smartphones, etc. Now-a-days, it is most
DEL Delete one or more files widely used in mobile phones. The latest
DIR Display a list of files and folders version of Android is Android 11, which was

df
ERASE Delete one or more files released on 8th September, 2020.

_p
EDIT View and edit files 2. Symbian It is the OS developed and sold by
EXIT Quit the current script/routine and set an Symbian Ltd. It is an open source mobile OS
error level

na
designed for Smartphones.
FORMAT To erase and prepare the disk drive
It has been used by many major handset
IF Conditionally perform a command
MD Create new folders
apmanufacturers including Motorola, Nokia,
Samsung, Sony, etc. The latest version of
MOVE Move files from one folder to another Symbian is Nokia Belle, which was released on
:@

PATH Display or set a search path for 2 October, 2012.


executable files
3. iOS It is the popular mobile operating
PRINT Prints data to a printer port
TG

system developed by Apple Incorporation.


REN Rename a file or directory This operating system is commonly used in
RD Remove an empty directory Apple iPhone, iPod Touch, iPad, etc. The
SORT Sort input and displays the output to the latest version of iOS is iOS 14.3, which was
n

screen released on 14 December, 2020.


O

START Start a program, command or batch file


4. Black Berry It is the most secure operating
TIME Display or set the system time
h

system used in leading Smartphones


TYPE Display the content of a text file
c

developed by Black Berry company. It also


VER Display version information
ar

supports WAP 1.2. The latest version of


XCOPY Copy multiple files, directories or drives BlackBerry is Black Berry OS 7.1.0, which
Se

from one location to another was released in 2013.


5. Windows Phone It is a mobile operating
Mobile Operating System system developed by Microsoft in 2010, for
This OS operates on Smartphones, Tablets and smartphones. It is a commercial proprietary
Digital Mobile devices. It controls mobile devices and software. Its latest version is 8.1, which was
its design supports wireless communication and released on 2 June, 2015.
Operating System 63

QUESTION BANK
1. Which of the following is the type of 7. The primary purpose of the Windows
software that controls the internal operating system is
operations in the computer? (1) to make the most efficient use of the computer
(1) Shareware hardware
(2) Public domain software (2) to allow people to use the computer
(3) Application software (3) to keep systems programmer’s employed
(4) Operating system software (4) to make computers easier to use

df
2. ......... controls the way in which the 8. Every computer has a(n) ……, many also
computer system does function and have …… [RBI Grade B 2014]

_p
provides a means by which users can (1) operating system; a client system
interact with the computer. (2) operating system; instruction sets

na
(1) Operating system (3) application programs; an operating system
(2) Motherboard (4) application programs; a client system
(3) Platform
(4) Application software
ap(5) operating system; application programs
9. Which of the following is/are function(s) of
:@
3. A collection of programs that controls how operating system?
your computer system runs and processes (1) User interface
information is called [IBPS Clerk 2014] (2) File system manipulation
TG

(1) operating system (2) computer (3) Resource allocation


(3) office (4) compiler (4) All of the above
(5) interpreter
10. A program in execution is called
4. It is the program that manages the
n

(1) process (2) instruction


hardware of the computer system including
O

(3) procedure (4) function


the CPU, memory storage devices and
input/output devices. 11. Memory utilisation factor shall be
h

(1) Software (2) Operating system computed as


c

(3) Hardware (4) System software (1) memory in use/allocated memory


ar

(2) memory in use/total memory connected


5. An operating system is a/an
(3) memory allocated/free existing memory
Se

[UPPSC Computer Assistant 2019,


SSC CGL 2013] (4) memory committed/total memory available
(1) accounting software 12. Which one of the following is not the
(2) application software function of operating system?
(3) system software
(1) Resource Management
(4) utility software
(2) File Management
6. Which of the following is the correct reason (3) Networking
to use an operating system? (4) Processor Management
(1) To manage resources
(2) To control the hardware
13. When a file contains instruction that can be
(3) To provide an interface between the hardware carried out by the computer, it is often
and user called a(n) …… file.
(4) All of the above (1) data (2) information
(3) executable (4) application
64 Learn, Revise & Practice ~ Computer Awareness

14. Grouping and processing all of a firm’s 21. Which of the following terms explains the
transactions at one time, is called execution of more than one file at the same
(1) a database management system on a single processor?
(2) batch processing (1) Single tasking (2) Multitasking
(3) a real time system (3) Scheduling (4) Multiprocessing
(4) on-time system 22. …… is a feature for scheduling and
15. ............ is used for very large files or where a multi-programming to provide an
fast response time is not critical. The files to economical interactive system of two or
be transmitted are gathered over a period more users. [IBPS Clerk 2012]
and then send together as a batch. (1) Time sharing (2) Multisharing
(1) Batch processing (2) Online processing (3) Time tracing (4) Multiprocessing

df
(3) File processing (4) Data processing (5) None of these

_p
16. Which of the following system is a function 23. The simultaneously processing of two or
of dedicated PCs? more programs by multiple processors, is

na
(1) Meant for a single user (1) multiprogramming (2) multitasking
(2) Meant for the single task (3) time sharing (4) multiprocessing
(3) Deal with single software
(4) Deal with only editing
ap
24. Real time systems must have
(1) pre-emptive kernels
:@

17. Windows operating system is ...... and ...... . (2) non-pre-emptive kernels
(1) multitasking, multi user (3) Both (1) and (2)
(4) Either (1) or (2)
(2) multi user, single tasking
TG

(3) single user, multitasking 25. RTOS stands for


(4) single tasking, single user (1) Real Time Operating System
(2) Reliable Time Operating System
18. Operating system that allows only one user
n

(3) Reboot Time Operating System


to work on a computer at a time is known (4) None of the above
O

as [IBPS Clerk 2015]


(1) single user operating system 26. System running more than one processes
h

(2) multi user operating system concurrently are called [SSC CGL 2016]
c

(3) single tasking operating system (1) multiprocessing


(2) multiprogramming
ar

(4) multitasking operating system


(3) real time
(5) real-time operating system
Se

(4) batch processing


19. An operating system is said to be multi user, if 27. Which of the following refers to the means
(1) more than one programs can run by which an OS or any other program
simultaneously
interacts with the user? [SBI Clerk 2014]
(2) more than one users can work simultaneously
(1) Program front-end
(3) Either (1) or (2) (2) Programming interface
(4) None of the above (3) User login
20. …… provides process and memory (4) User interface
management services that allow two or (5) User compatibility
more tasks, jobs or programs to run 28. The first graphical user interface was
simultaneously. designed by
(1) Multitasking (2) Multithreading (1) Apple Inc. (2) Microsoft
(3) Multiprocessing (4) Multicomputing (3) Xerox Corporation (4) None of these
Operating System 65

29. Which process refers to the starting up of a 37. In computers, what does Yosemite,
computer and the loading of the required Mavericks, Mountain Lion, Lion Snow
parts of the operating system into the RAM? Leopard, Leopard, Tiger, Tiger Panther,
[SSC CGL 2018] Jaguar, Puma and Cheetah stand for?
(1) Swipping (2) Booting [RRB NTPC 2016]
(3) Mapping (4) Tagging A. Versions of Mac OSX
30. Which process checks to ensure the B. Types of storage servers
components of the computer are operating C. Macintosh clones
and connected properly? D. None of the above
(1) Booting (2) Processing (1) D (2) A
(3) Saving (4) Editing (3) C (4) B

df
31. What happens when you boot up a PC? 38. Which of the following is an operating

_p
[RBI Grade B 2012] system? [SBI Clerk 2014]
(1) Portions of the operating system are copied (1) Linux (2) Debugger
from disk into memory (3) Mozilla (4) Google Chrome

na
(2) Portions of the operating system are copied (5) Intel 8085
from memory onto disk 39. Linux is a type of …… software.
(3) Portions of the operating system are compiled
(4) Portions of the operating system are emulated
ap(1) shareware (2) commercial
(3) proprietary (4) open source
:@
(5) The PC gets switched off
40. Which one of the following is not an
32. What do you understand by the term operating system? [SSC CGL 2018]
booting? [RBI Grade B 2012]
TG

(1) Linux (2) Unix


(1) The process of starting the computer from the
(3) Intel (4) Windows
power-off position
(2) Connecting computer of the electric switch 41. Who developed the operating system Linux
(3) Increasing the memory of the computer started as a project by a student of Finland?
n

(4) The process of shut down the computer [SSC CGL 2018]
O

(5) None of the above (1) Barbara Liskov


33. Restart of computer is called …… when (2) Linus Torvalds
h

computer is already ON. (3) Leonard M. Adleman


c

(4) Leslie Lamport


(1) cold booting (2) warm booting
ar

(3) shut down (4) logging off 42. Which of the following operating systems
was first developed by Microsoft?
Se

34. The first version of Unix was developed by


(1) Ken Thompson (2) Presper Eckert (1) Windows ME (2) Windows NT
(3) J W Mauchly (4) Herman Hollerith (3) Windows 97 (4) MS-DOS

35. UNIX operating system is generally known 43. Which one of the following file names is
as [SSC CGL 2014]
invalid in DOS? [RBI Grade B 2013]

(1) Multi user operating system (1) RIT. bat (2) LISTEN.bin
(2) General application (3) RLUA.btt (4) TALK.bas
(3) Single user operating system (5) None of these
(4) Single user application program 44. Which one of the following DIR commands
36. Which is the programming tool in UNIX? lists a group of files? [RBI Grade B 2013]
[UPPSC Computer Assistant 2019] (1) DIR INVOICE.bas (2) DIR RESCUE.bas
(1) LINT (2) KERNEL (3) DIR PAYROLL.bas (4) DIR TOOL?.bas
(3) C-Shell (4) None of these (5) None of these
66 Learn, Revise & Practice ~ Computer Awareness

45. ‘DOS’ floppy disk/operating system does 55. Which commands are automatically loaded
not have [SBI PO 2014] into main memory?
(1) a boot record (2) a file allocation table (1) Internal (2) External
(3) a root directory (4) a virtual memory (3) Viral (4) Situational
(5) All of these 56. Which type of commands in MS-DOS needs
46. Which file in MS-DOS contains internal external files to perform their action?
commands that are loaded during booting (1) Internal commands
process? (2) External commands
(1) CONFIG.sys (2) MSDOS.sys (3) Batch commands
(4) Redirectories
(3) BIOS.sys (4) COMMAND.com
57. Which one of the following DOS commands

df
47. What is the name of the batch file that
sends contents of the screen to an output
automatically run when MS-DOS is booted?
device?

_p
[RBI Grade B 2013]
(1) Config.sys (2) Config. bat
(1) BREAK (2) DISK COPY
(3) Autoexe.bat (4) Run.bat
(3) MORE (4) ASSIGN

na
48. MS-DOS is usually supplied on a (5) None of these
(1) hard disk (2) cartridge tape 58. Which of the following is not an external
(3) CD ROM (4) floppy disk
apcommand of DOS?
49. Which of the following is the main program (1) LABEL (2) FORMAT
:@

of MS-DOS? (3) CHKDSK (4) CLS


(1) Boot Record (2) ID.sys 59. CHKDSK can be used to find
(3) MSDOS.sys (4) Command.com
TG

(1) disk’s bad portion (2) occupied space


50. Which of the following operating systems is (3) free space (4) All of these
also known as single user operating system? 60. While working with MS-DOS, which
n

(1) Windows (2) Linux command transfers a specific file from one
O

(3) Unix (4) DOS disk to another?


51. The main difference between Windows and (1) Copy (2) Disk copy
h

(3) Time (4) Rename


DOS is the ability to
c

(1) multitasking (2) speed up 61. DEL command is used to


ar

(3) run a program (4) run without power (1) delete files (2) delete directory
(3) delete lables (4) Both (1) and (2)
52. ‘>’ symbol in DOS commands is used to
Se

(1) compare two values (2) redirect input 62. This command is used to display a list of
(3) redirect output (4) filter data files and sub-directories that are in the
directory you specify.
53. Usually, in MS-DOS, the primary hard disk (1) DER (2) DIS
drives has the drive letter ......... . (3) DIR (4) DAR
[RBI Grade B 2012]
(1) A (2) B 63. The purpose of DISKCOPY command is to
(3) C (4) D [RBI Grade B 2014]
(5) None of these (1) format the disk if it is not formatted before a
write operation is initiated on it
54. Which of the following is not usual file (2) overwrite the existing contents of the destination
extension in DOS? [RBI Grade B 2012] disk as it copies the new information to it
(1) .exe (2) .bat (3) make an exact copy of a floppy disk
(3) .0 (4) .com (4) All of the above
(5) None of these (5) None of the above
Operating System 67

64. Which command is used to delete file from 69. Which of the following is not an internal
a directory in DOS? command of DOS?
(1) REN (2) DEL (3) CD (4) MD (1) VER (2) COPY
65. In MS-DOS, which of the following (3) FORMAT (4) VOL
commands is used to delete directory with 70. Which one of the following is an MS-DOS
all sub-directories and files? external command? [SSC CHSL 2012]
(1) Delete (2) Del (3) Deltree (4) Move (1) DIR (2) COPY
66. Which one of the following DOS command (3) FORMAT (4) PROMPT
sends contents of the screen to an output device? 71. A command, in DOS, used to set a name to a
(1) BREAK (2) DISK COPY disk, is

df
(3) MORE (4) ASSIGN (1) VOL (2) REN
(3) LABEL (4) CLS
67. In DOS, the DIR command is used to

_p
(1) display content of a file [SSC CGL 2013] 72. In DOS, the ‘label’ command is used to
(2) delete file (1) create the label of disk

na
(3) display list of files and sub-directories (2) change the label of disk
(4) copy files (3) remove the label of disk
68. The DOS command, which cannot be ap (4) Both (1) and (2)
73. Which among the following is not a mobile
executed with versions 1 and 2 is
:@
[RBI Grade B 2014, RBI Grade B 2013] operating system? [IBPS PO 2016]
(1) GRAPHICS (2) FIND (1) Android (2) Safari
(3) LABEL (4) MODE (3) Symbian (4) iOS
TG

(5) None of these (5) BlackBerry

ANSWERS
n

1. (4) 2. (1) 3. (1) 4. (2) 5. (3) 6. (5) 7. (4) 8. (5) 9. (4) 10. (1)
O

11. (2) 12. (3) 13. (3) 14. (2) 15. (1) 16. (1) 17. (3) 18. (1) 19. (2) 20. (1)
21. (2) 22. (1) 23. (4) 24. (1) 25. (1) 26. (2) 27. (4) 28. (3) 29. (2) 30. (1)
h

31. (1) 32. (1) 33. (2) 34. (1) 35. (1) 36. (2) 37. (2) 38. (1) 39. (4) 40. (3)
c

41. (2) 42. (4) 43. (3) 44. (4) 45. (5) 46. (3) 47. (3) 48. (1) 49. (1) 50. (4)
ar

51. (1) 52. (3) 53. (3) 54. (3) 55. (1) 56. (2) 57. (5) 58. (4) 59. (4) 60. (1)
61. (4) 62. (3) 63. (4) 64. (2) 65. (3) 66. (2) 67. (3) 68. (3) 69. (3) 70. (3)
Se

71. (3) 72. (4) 73. (2)


68 Learn, Revise & Practice ~ Computer Awareness

C H A P T E R

08
PROGRAMMING

df
_p
CONCEPTS
na
ap
:@

Program can be defined as a set of instructions There are two types of low level language, which are as
that need to be executed to accomplish a follows
computing task. A person who writes or performs 1. Machine Language It is the only language
TG

the program is known as programmer. understood by the computers. Sometimes, it


Programmer uses some specific languages to referred to as machine code or object code or
write program which is known as programming binary language.
n

languages. e.g. C+ +, Java, etc. It is a collection of binary digits (0 or 1) or bits


O

Note Ada Lovelace is regarded as the world’s first that the computer reads and interprets.
programmer.
2. Assembly Language It is a low level
h

programming language which is used as an


Programming Language
c

interface with computer hardwares.


ar

It is a set of commands, instructions and other It uses structured commands as substitutions


syntax use to create a software program. for numbers, allowing humans to read the code
Se

Programming language must be simple, easy to easier than looking at binary codes.
learn and use. It must be consistent in terms of
syntax and semantics. Medium Level Language (MLL)
Programming languages are mainly categorised It serves as the bridge between raw hardware and
into three parts, which are as follows programming layer of a computer system. It is
designed to improve the translated code before it is
Low Level Language (LLL) executed by the processor. e.g. C.
These programming languages are more difficult High Level Language (HLL)
to understand. It is designed to operate and handle
the entire instruction set of a computer system It is an advanced computer programming language
directly which are generally used to write the that is not limited to one computer, designed for a
system software. specific job and is easier to understand.
Programming Concepts 69

The main advantages of high level languages over low level languages is that they are easier to read, write
and understand. e.g. BASIC, C, FORTRAN, Java, Python, etc.
Some High Level Languages and Their Application Areas

Language Year Developer Application Area Nature


FORTRAN (Formula 1957 A team of programmers at Calculation Compiled
Translation) IBM
ALGOL 1958 A commitee of European and Scientific purpose Compiled
(Algorithmic Language) American computer
scientists

df
LISP (List Processing) 1958 John McCarthy at the Artificial intelligence Compiled and
Massachusetts Institute of Interpreted

_p
Technology (MIT)
COBOL (Common 1959 Grace Hopper Business management, Compiled

na
Business Oriented String oriented
Language)
BASIC (Beginner’s All
purpose Symbolic
1964
E. Kurtz at Dartmouth
ap
John G. Kemeny and Thomas Programming for
educational purpose
Interpreted
:@
Instruction Code) College in New Hampshire
Pascal 1970 Niklaus Wirth Education Compiled
C 1972 Dennis Ritchie at Bell Labs System programming Compiled
TG

C ++ 1985 Bjarne Stroustrup at Bell System object Compiled


Labs programming
n

Python 1991 Guido Van Rossum Multimedia, Mobile app, Interpreted


Image processing
O

Java 1995 James Gosling at Sun Internet oriented Compiled and


h

Microsystems programming Interpreted


c

Java Script 1995 Brendan Eich Games, animated 2D and Compiled and
ar

3D graphics Interpreted
Se

Terms Related to Programming


Program Documentation
It is a kind of documentation that gives a comprehensive procedural description of a program. It
shows as to how software is written. The program documentation describes what exactly a
program does by mentioning about the requirements of the input data and effect of performing
a programming task.

OOPs
OOPs stands for Object Oriented Programmings in which programs are considered as a
collection of objects. Each object is nothing but an instance of a class.
De-Bugging
It is the process of locating and fixing or bypassing bugs (errors) in computer program code.
70 Learn, Revise & Practice ~ Computer Awareness

Language Translator Generation of Languages


It converts programming language into machine The concept of language generations, sometimes
language. called levels, is closely connected to the advances in
technology that brought about computer generations.
IF Per >=33 11100110101
Result = ‘P’
The five generations of language are as follows
01101111001
ELSE (i) The first generation languages or 1 GLs are
Result = ‘F’ 01110001111
END
low level languages like machine language.
01010101010
(ii) The second generation languages or 2 GLs
are also low level languages that generally
Language consist of assembly language.

df
Translator
(iii) The third generation languages or 3 GLs
are high level languages such as Java.

_p
(iv) The fourth generation languages or 4 GLs
The translated program is called the object code.
are the languages that consist of statements

na
Depending upon used programming languages,
similar to the statements of human language.
language translator is divided into three categories, 4 GLs are commonly used in database
which are as follows ap programming and scripting programming.
1. Assembler It converts a program written in (v) The fifth generation languages or 5 GLs are
assembly language into machine language.
:@
programming languages that contain visual
Assembly language consists of mnemonic code, tools, which help to develop a program. A good
which are difficult to learn and are machine example of 5 GLs is Visual Basic.
dependent.
TG

2. Interpreter It converts a HLL program into Algorithm


machine language by converting it An algorithm is a step-by-step method of solving a
line-by-line. If there is any error in any line, it problem. It is commonly used for data processing,
n

stops the execution of the program calculation and other related computer and
O

immediately and reports to the user at the mathematical operations.


same time.
h

Program execution cannot resume until the


Flow Chart
c

error is rectified by the user. Interpreter is A flow chart is a visual representation of the
ar

very useful for de-bugging and suitable for sequence of steps and decisions needed to perform a
process. Each step in the sequence is noted within a
Se

novice programmer. This is a slow process and


consumes less memory space. diagram shape. Steps are linked by connecting lines
and directional arrows.
3. Compiler It converts HLL program into
machine language, which can be understood Error
by the processor. For each high level language,
An error in a program is called bug. It is a term used
the machine requires a separate compiler.
to describe any issue that arises unexpectedly that
A compiler creates a unique object program, cause a computers not function properly.
i.e. if a source program is compiled, there is no
need of that source program because output Types of Error
can be obtained by executing that object The types of error are classified into four categories,
program. which are as follows
Compiler converts the entire HLL program in 1. Syntax Error When the rules of the
one go and reports all the errors of the programming language are not followed, the
program alongwith the line numbers. compiler will show syntax error.
Programming Concepts 71

2. Semantic Error Semantic errors are reported


by the compiler when the statements written in
Tit-Bits
the program are not meaningful to the compiler.
■ Reserved words are words that a programming
language has set aside for its own use.
3. Logical Error Logical errors are those errors ■ Pseudocode is not a programming language, but
that occur in the output of the program.The simply an informal way of describing a program. It
presence of logical errors leads to undesired or does not follow any syntax strictly.
incorrect output. ■ Looping is a control structure which is used in a
program to execute a particular set of statements
4. Runtime Error Runtime errors are those
repeatedly.
errors that occur during the execution of a ■ Data Flow Diagram (DFD) describes the processes
program. It generally occurs due to some illegal that are involved in a system to transfer data from the
operation performed in the program. input to the file storage and reports generation.

df
_p
QUESTION BANK
na
1. The instructions that tell a computer how to
carry out the processing tasks are referred
ap
5. Who is regarded as the world’s first
programmer? [RRB NTPC 2016]
:@
to as computer [IBPS PO 2015] A. Alan Turing
(1) programs (2) processors B. Ada Lovelace
(3) input devices (4) memory modules C. Tim Berners Lee
TG

(5) None of these D. Steve Wozniak


2. A set of rules for telling the computer what (1) C (2) A
operations to perform is called a (3) B (4) D
n

[IBPS PO 2012]
(1) Procedural language
6. A factor in the selection of source language is
O

(2) Structures (1) programmer’s skill


(3) Natural language (2) language availability
h

(4) Command language (3) program compatibility with other software


c

(5) Programming language (4) All of the above


ar

3. Which of the following contains specific 7. Languages which can easily interact with
rules and words that express the logical
Se

the hardware are called


steps of an algorithm? [IBPS Clerk 2014]
(1) High level languages
(1) Programming language
(2) Low level languages
(2) Syntax
(3) Middle level languages
(3) Programming structure
(4) Logical chart (4) All of the above
(5) Flow chart 8. Machine language [SBI PO 2013]
4. A(n) ……… program is one that is ready to (1) is the language in which programs were first
run and does not need to be altered in any written
way. [IBPS Clerk 2013] (2) is the only language understood by the computer
(1) interpreter (2) high level (3) differs from one type of computer to another
(3) compiler (4) COBOL (4) All of the above
(5) executable (5) None of the above
72 Learn, Revise & Practice ~ Computer Awareness

9. The use of combination of 1’s and 0’s is 17. Computer language used for calculation is
feature of which of the following type of (1) LOGO (2) FORTRAN
computer language? [IBPS PO 2016] (3) BASIC (4) C + +
(1) High Level Language 18. Which of the following computer language
(2) PASCAL is a mathematically oriented language used
(3) Machine Language for scientific problems? [UPSSSC 2015]
(4) C (1) FORTRAN (2) COBOL
(5) COBOL (3) LISP (4) PROLOG
10. Each model of a computer has a unique 19. FORTRAN stands for
(1) assembly of a computer (1) Formal Translation

df
(2) machine language (2) Formative Translation
(3) high level language (3) Formal Transaction

_p
(4) All of the above (4) Formula Translation
11. All computers execute 20. LISP is designed for

na
(1) BASIC programs (1) artificial intelligence (2) GUI
(2) COBOL programs (3) CUI (4) optical fibre
(3)
(4)
Machine language programs
FORTRAN programs
ap
21. LISP is the second oldest high level
programming language. Here, LISP stands
:@

12. The language which can be relocated easily is for


(1) Machine language (2) Assembly language (1) Level Program (2) Level Process
(3) Low level language (4) Middle level language (3) List Processing (4) List Program
TG

13. Assembly language [IBPS Clerk 2011] 22. What does CO stand in COBOL?
(1) uses alphabetic codes in place of binary [UPSSSC 2015, IBPS Clerk 2012]
numbers used in machine language (1) Common Object (2) Common Oriented
n

(2) is the easiest language to write programs (3) Common Operating (4) Computer Oriented
O

(3) need not be translated into machine language (5) None of these
(4) All of the above
(5) None of the above
23. Which of the following is not characteristic
h

of COBOL?
c

14. Which language is CPU dependent ? (1) It is a very standardised language


ar

(1) C (2) Assembly (2) It is a very efficient in terms of coding and


(3) Java (4) All except Java execution
Se

15. ....... serves as the bridge between raw (3) It had limited facilities for mathematical
notation
hardware and programming layer of a
(4) It is very readable language
computer system.
(1) Medium level language 24. A computer program used for business
(2) Low level language application is
(3) High level language (1) LOGO (2) COBOL
(4) Both (1) and (2) (3) BASIC (4) FORTRAN
16. Which of the following is a machine 25. Who among the following invented the
independent program? computer language, COBOL? [CHSL 2018]
(1) High level language (1) Grace Murray Hopper
(2) Low level language (2) John McCarthy
(3) Assembly language (3) Guido Van Rossum
(4) Machine language (4) Brendan Eich
Programming Concepts 73

26. C programming language was developed by 36. Which of the following is not a computer
[SSC CGL 2017] language ? [UPSSSC 2016, SBI PO 2014]
(1) Charles Babbage (2) Larry Wall (1) BASIC (2) COBOL
(3) James Gosling (4) Dennis Ritchie (3) LOTUS (4) FORTRAN
(5) None of these
27. C + + language developed by
[IBPS Clerk 2012]
37. C, BASIC, COBOL and Java are examples of
(1) Dennis Ritchie (2) Charles Babbage ……… languages. [IBPS Clerk 2015]

(3) Niklaus Wirth (4) Bjarne Stroustrup (1) low level (2) computer
(5) John McCharthy (3) system programming (4) high level
(5) None of these
28. Python is a …… . [SSC CHSL 2019]
38. ……… is a written description of a computer

df
(1) low level language (2) high level language
(3) machine language (4) assembly language program’s functions. [SBI PO 2014]

_p
(1) Explanatory instructions
29. Java is referred to as a [SBI PO 2014] (2) Graphical user interface
(1) high level language (3) Plug and play

na
(2) complex language (4) README files
(3) hardware device driver (5) Documentation
(4)
(5)
low level language
programming mid level language
ap
39. De-bugging is the process of
[RRB NTPC 2016]
:@

30. Computer language used on Internet is A. rolling out a software program


(1) PASCAL (2) Java B. modifying a software program
(3) BASIC (4) LOGO C. checking errors in a software program
TG

D. changing the design structure of a program


31. The language used for development of (1) C (2) D (3) B (4) A
various games is
(1) C (2) C + + (3) Java (4) SQL 40. Translator program used in assembly
n

language is called [SBI Clerk 2012]


32. Which of the following is a programming (1) compiler (2) interpreter
O

language for creating special programs like (3) translation (4) translator
Applets? [IBPS Clerk 2012] (5) assembler
h

(1) Java (2) Cable 41. The ……… program is used to convert
c

(3) Domain name (4) Net mnemonic code to machine code.


ar

(5) COBOL (1) Debug (2) C + +


Se

33. Which is the official language for Android (3) FORTRAN (4) Assembler
development? [RRB NTPC 2016] 42. The function of an assembler is
A. Java B. COBOL (1) to convert basic language into machine
C. FORTRAN D. Ada language
(1) C (2) A (3) B (4) D (2) to convert high level language into machine
language
34. Who invented Java Script programming (3) to convert assembly language into machine
language? [SSC CGL 2016] language
(1) Brendan Eich (2) Willam Einthoven (4) to convert assembly language into low level
(3) George Eastman (4) Emil Erlenmeyer language

35. In which year did the Java Script 43. An assembler is a


programming language come into existence? (1) programming language dependent
[SSC CHSL 2019] (2) syntax dependent
(1) 1995 (2) 1999 (3) machine dependent
(3) 1990 (4) 2000 (4) data dependent
74 Learn, Revise & Practice ~ Computer Awareness

44. Which of the following is not true about an (1) Algorithm (2) Hardware program
assembler? (3) Software (4) Firmware program
(1) Translates instructions of assembly language (5) None of the above
in machine language 51. Error in a program is called
(2) It translates the C program (1) bug (2) debug
(3) It is involved in program’s execution (3) virus (4) noise
(4) It is a translating program
52. Error which occurs when program tried to
45. Compiler is a [UPSSSC 2015] read from file without opening it is
(1) computer program classified as
(2) part of software (1) execution error messages
(3) program for converting from high level to (2) built in messages

df
machine language (3) user defined messages
(4) All of the above (4) half messages

_p
46. Compiling creates a(n) [RBI Grade B 2012] (5) None of the above
(1) error-free program (2) program specification 53. ……… are words that a programming

na
(3) subroutine (4) algorithm language has set aside for its own use.
(5) executable program [IBPS PO 2011]
47. Computer programs are written in a high
ap(1) Control words (2) Control structures
level programming language, however the (3) Reserved words (4) Reserved keys
:@

human readable version of a program is (5) None of these


called [IBPS PO 2015] 54. ........ is a cross between human language and
(1) word size (2) source code a programming language. [IBPS PO 2012]
TG

(3) instruction set (4) application (1) Pseudocode


(5) hard drive (2) Java
48. Second generation languages are languages (3) The Java virtual machine
n

that consists of (4) The compiler


O

(1) machine language (2) assembly language (5) None of the above
(3) Java (4) visual basic 55. In programming, repeating some statements
h

49. Which of the following generation is usually called [SSC CGL 2013]
c

languages consist of statements similar to (1) looping (2) control structure


ar

the statements of human language? (3) compiling (4) structure


(1) 1GL (2) 2GL (3) 3GL (4) 4GL
Se

56. What is the full name of DFD?


50. A set of step-by-step procedures for [UPPSC Computer Assistant 2019]
accomplishing a task is known as a(n) (1) Data Flow Diagram (2) Data Full Document
[IBPS Clerk 2015] (3) Data File Diagram (4) Data File Document

ANSWERS
1. (1) 2. (5) 3. (3) 4. (5) 5. (3) 6. (3) 7. (2) 8. (4) 9. (3) 10. (2)
11. (3) 12. (2) 13. (1) 14. (2) 15. (1) 16. (1) 17. (2) 18. (1) 19. (4) 20. (1)
21. (3) 22. (2) 23. (2) 24. (2) 25. (1) 26. (4) 27. (4) 28. (2) 29. (1) 30. (2)
31. (3) 32. (1) 33. (2) 34. (1) 35. (1) 36. (3) 37. (4) 38. (5) 39. (1) 40. (5)
41. (4) 42. (3) 43. (3) 44. (2) 45. (4) 46. (5) 47. (2) 48. (2) 49. (4) 50. (1)
51. (1) 52. (1) 53. (3) 54. (1) 55. (1) 56. (1)
Microsoft Windows 75
C H A P T E R

09
MICROSOFT

df
_p
WINDOWS
na
ap
Microsoft Windows (MS-Windows) stands for Windows 95
:@

‘Microsoft-Wide Interactive Network Development It is a graphical user interface based operating


for Office Work Solutions’. Microsoft Windows is system. It was released on 24th August, 1995 by
a series of graphical interface operating system Microsoft.
TG

developed, marketed and sold by Microsoft.


Features
A user can easily interact with the windows (i) It is a mixed of 16-bit/32-bit Windows operating
programs or applications by selecting relevant system.
n

options, through the mouse or by entering (ii) It is consumer-oriented.


O

characters through the keyboard. (iii) It supports FAT32 File System, Multi-Display,
Web TV and the Internet Explorer.
h

Versions of MS-Windows
c

Some important versions of MS-Windows are as Windows 98


ar

follows It was developed in 1998. This was produced in two


main versions. The first Windows 98 version was
Se

Windows NT (New Technology) plagued with programming errors but the Windows
A version of Windows NT was introduced in July, 98’s second edition came out later was much better
1993 and made specifically for businesses. It offers with many errors resolved.
better control over work station capabilities to Features
help network administrators.
(i) It supports Internet Explorer 4.0.1.
Features (ii) Windows 98 was the first operating system to
(i) It is based on High Level Language. use the Windows Driver Model (WDM).
(ii) It is able to run on DOS, Windows 3 and Win (iii) It includes a FAT32 converter utility for
32 applications. converting FAT16 drives to FAT32 without
(iii) It has a 32-bit Windows application. formatting the partition.
(iv) It provides higher stability and security. (iv) It also supports many peripheral devices (USB,
DVD, etc.).
76 Learn, Revise & Practice ~ Computer Awareness

Windows ME Features
Windows ME (Millennium Edition) launched in (i) It can be installed Pentium 4, higher, 512MB
June 2000, but it has been historically plagued RAM, 32 MB video card and 40 GB hard disk.
with programming errors which may be (ii) It enhances the features of visual style.
frustrating for home users.
Windows 7
Features It is an OS released by Microsoft on 22nd October,
(i) It is designed for single CPU. 2009. It is an upgrade of Windows XP and Vista. It
(ii) The minimum internal storage is 64 MB and does not include some standard applications like
maximum 4 GB. Windows Movie Maker, Windows Mail, etc.

df
(iii) It introduced Multilingual User Interface
Features
(MUI).

_p
(i) It supports 64-bit processor.
Windows XP (ii) It provides touch, speech, handwriting
recognition.

na
It is an OS produced by Microsoft for use on
personal computers. Microsoft released Windows (iii) It supports a playback of media in MP4.
XP on 25th October, 2001.
Some versions of Windows XP are as follows
ap
(iv) It includes Windows Bio-Metric framework.
(v) It provides multiple firewall.
:@

(i) Windows XP Home edition is a version Windows 8


made for home users.
It is a personal computer operating system that was
(ii) Windows XP Professional is made for developed by Microsoft and released on 26th
TG

business users. October, 2012.


Features Features
n

(i) It has various users with independent


(i) It is a 64-bit logical CPU.
profiles.
O

(ii) It provides 3D Graphic support and Internet


(ii) It has 3.75 GB free space on the disk and that Explorer-10.
h

the total size of the disk is 19.5 GB. (iii) It is based on Microsoft’s Metro Design
c

(iii) Atleast 64 MB of RAM internal storage. language.


ar

(iv) It provides 1.5 GB of available space on the (iv) It supports new emerging technology like USB
hard disk. 3.0, cloud computing.
Se

(v) It includes video adapter and monitor with


Super VGA (Video Graphics Array) or Windows 10
higher resolution. It is a personal computer operating system developed
(vi) It supports sound card, CD-ROM, and released by Microsoft on 29th July, 2015.
DVD-ROM drive, speakers or headphones. Features
(i) It is easy to use social media sites like Facebook
Windows Vista and Twitter.
It is an operating system developed by Microsoft (ii) Windows 10 will also include a ‘game DVR’
for use on personal computers, including home mode to allow recordings of the last 30 seconds
and business desktops, laptops, tablets, PCs and of play, all better for the social gaming.
media center PCs. It was released worldwide on (iii) Windows 10 interface is adapted by hardware it
30th January, 2007. is running on.
Microsoft Windows 77

Desktop
When we turn ON the computer then the first screen, which will be display on the computer is known as
desktop. The background image of desktop is called wallpaper.
A small arrow or blinking symbol, moving on the desktop, is called cursor. Desktop contains Start menu,
Task bar, icons, gadgets, etc.

df
_p
na
Dialog
Box
ap
:@
TG

Some important components of desktop are organised shortcuts. If we delete a file or folder then it
n

as follows goes to recycle bin. From recycle bin, we can


O

restore the deleted files or folders on proper


Icon
place.
A small image of a program, shown on the desktop
h

with program name is known as icon. Icons are Once the recycle bin is empty then we won’t be
c

small pictures that represent files, folders, able to restore those files and folders again.
ar

programs and other items. Task Bar


Users can open these programs by double click on Initially, the long horizontal bar at the bottom of
Se

icons. If you move an icon on your desktop, this is the desktop is known as Task Bar. When we open a
called ‘dragging’ and after releasing it, it will be program or any window, then the button of that
called ‘dropping.’ program will be displayed on the task bar.
Some of the icons displayed on the desktop are as Generally, task bar consists of three parts
follows (i) Start button
1. Computer It is the most important icon on (ii) Middle section
the desktop, which contains icons of document
(iii) Notification area
folders, hard disk’s partition, each removable
disk drive. e.g. Floppy disk, CD, DVD, etc. It Start Menu
also allows the users to access drives, printers, This menu is the main gateway of our computer’s
removable disk or other system applications. program such as files, folders and settings. Start
2. Recycle Bin It is also a form of icon on the menu also contains most recently opened
desktop, which contains deleted files, folders or programs.
78 Learn, Revise & Practice ~ Computer Awareness

Start menu have following options Menu Bar


1. All Programs It contains a list of installed Each window contains its own menu bar which
programs. When we install any software, it performs specific actions when they have been
automatically shows in this menu. selected.
2. Favourites It is a collection of book marked The menu bar consists of several menus, which are as
web pages. follows
3. Documents It shows a list of most recently 1. File menu contains options like New, Open,
opened documents. Close, Save, Save As, Print, etc.
4. Setting It includes Control Panel, Printers, 2. Edit menu contains options like Undo, Cut,
Taskbar, etc. Copy, Paste, Clear, etc.

df
5. Find It searches for specific files or folders.
3. View menu contains options like Normal,
6. Log Off It provides a password to protect Toolbar, Print Layout, etc.

_p
from unauthorised access.
4. Insert menu contains options like Header,
7. Turn Off (Shut down) To shut down or
Footer, etc.

na
restart the system.
5. Help menu is used to provide information
Window apabout window.
Window is a rectangular area which provides an
Dialog Box
environment to run many programs.
:@
When we perform certain operation on our
Some parts of the window are as follows document and click on the Close button without
Title Bar saving the document then dialog box will be appear
TG

It is located at the top of window or any dialog box, on the screen.


which displays the name of the window or software Generally, dialog box contains message, Close
program. Title bar contains atleast three small button, Yes button, No button and Cancel button. It
n

buttons, which are as follows is mainly used to suggest that what to do next.
O

1. Close Button At the right edge of the title bar,


there is a square containing a [×] called the Main Programs Inside the
h

Close button. It helps to terminate the running Windows


program.
c

Notepad
ar

2. Minimize Button It reduces to window in the


form of button which placed on the task bar. It It is a text editor program. Notepad is most
Se

helps to shrink the window. commonly used to edit or view text files. The file
format of Notepad files is .txt (text document).
3. Maximize Button It enlarges the window to
occupy the whole desktop. It expands the size To open Click on Start button → All Programs
of window fit to the desktop. → Accessories → Notepad
Scroll Bar
It appears at the right (or left) side or at the bottom WordPad
of the window. A window can display a document, It is an another text editor program including some
i.e. larger than the window area, so with the help of features such as complex formatting, pictures, etc.
scroll bar arrow, the user can scroll a document in The extension of WordPad file is .rtf (rich text
the window area to bring the view of hidden format).
portion of document.
To open Click on Start button → All Programs
There are two types of scroll bar; i.e. Horizontal → Accessories → WordPad
scroll bar and Vertical scroll bar.
Microsoft Windows 79

Paint ZIP File ZIP stands for Zone Information


It is a drawing program, used to create drawing or Protocol. This is an application that allows for the
edit digital pictures (images). The extension of compression of application files.
paint file is .png or. jpg or. bmp. Executable File When a file contains instructions
that can be carried out by the computer, it is often
To open Click on Start button → All Programs called an executable file.
→ Accessories → Paint
Folders
Calculator These are containers that you can use to store files.
It performs addition, subtraction, multiplication, Folders can also store other folders, i.e. sub-folders.
division, etc. You can create any number of sub-folders and each

df
To open Click on Start button → All Programs can hold any number of files and additional

_p
→ Accessories → Calculator sub-folders.

Windows Library

na
Media Player
Windows media player is an easy-to-use interface A windows library can contain files and folders
to play digital media files, organise digital media
collection, burn CDs, etc.
ap
stored on the local computer. Users interact with
libraries in ways similar to how they would interact
with other folders.
:@

To open Click on Start button → All Programs


Different types of windows library are as follows
→ Windows Media Player
(i) Documents Library It is used to organise
TG

and arrange Word processing documents,


Files Spreadsheets, Presentation and other text
These are the collection of data stored on auxiliary related files.
storage media. In Windows, files are the basic unit
n

(ii) Pictures Library It is used to organise and


to store data. The name given to a file or document
O

arrange your digital pictures.


by the user is called file name. Each file has a
specific filename and has a file extension that (iii) Music Library It is used to organise and
h

identifies the file type. arrange your digital music, such as songs, etc.
c

Some common file name extensions are as follows (iv) Video Library It is used to organise and
ar

arrange your videos, such as clips, recording,


.docx MS-Word document
etc.
Se

.rtf WordPad document


.txt Notepad text file Tit-Bits
.eml E-mail file

To shut down the computer, we need to click
.exe Executable file
Start button and then select Shut down key.
.xlsx MS-Excel file ■
Windows Explorer is a file manager application
.htm that is included with releases of the Microsoft
HTML file (Web page) Windows OS.
.html

Clipboard is a temporary storage in computer
.pptx MS-PowerPoint presentation
memory that stores the cutted or copied data.
80 Learn, Revise & Practice ~ Computer Awareness

MS-Windows Shortcut Keys Keys Description


Keys Description Ctrl + Right Move the insertion point to the
Arrow beginning of the next word
Delete Delete characters to the right of cursor
Backspace Delete characters to the left of the Ctrl + Left Move the insertion point to the
cursor Arrow beginning of the previous word
Ctrl + A Select all Ctrl + Alt + Restart the computer
Del
F3 Search for a file or folder
Ctrl + Esc Display the Start menu
Alt + Enter View properties for the selected item
F5 Refresh the active window
Alt + F4 Close the active item or quit the active
program Esc Cancel the current task
Alt + Spacebar Opens the shortcut menu for the Window To display or hide the Start menu

df
active window Window + D To display the desktop
F2 Rename selected item Window + L To lock the keyboard

_p
na
QUESTION BANK ap
:@
1. In Windows NT, NT stands for 7. Windows 95, Windows 98 and Windows NT
(1) New Terminology (2) New Technique are known as what?
(3) New Technology (4) Normal Technique (1) Processors (2) Domain names
(3) Modems (4) Operating systems
TG

2. If you are performing Windows 98


operating system to Windows XP you are 8. Which of the following is not a version of
performing a(n) [IBPS Clerk 2014]
the Windows operating system software for
the PC? [IBPS PO 2015]
n

(1) push up (2) China


(1) ME (2) 98 (3) XP (4) Linux
O

(3) patch (4) pull down


(5) 95
(5) update
9. Which of the following is not an in-built
h

3. Which of the following is not a feature of


software application found in MS
c

Windows 98?
Windows?
ar

(1) It supports Internet Explorer 4.0.1


(1) Paint (2) CD Player
(2) It supports many peripheral devices
Se

(3) Disk Defragmentor (4) Volume Control


(3) It was the first operating system to use the WDM (5) MS Word
(4) It provides multiple firewall
10. What is Windows Explorer? [SBI Clerk 2014]
4. In Windows ME, what does ME stand for? (1) Personal Computer (2) Network
(1) Millennium Edition (2) Micro Expert (3) File Manager (4) Drive
(3) Macro Expert (4) Multi Expert (5) Web Browser
5. Windows XP released in 11. A screen in a software program that permits
(1) 2000 (2) 1998 the user to view several programs at one
(3) 1999 (4) 2001 time is called a [SSC CGL 2018]
6. Which of the following is an example of a (1) Spreadsheet (2) Word processor
system software? (3) Window (4) Shareware
(1) Windows 7 (2) MS Word 2010 12. Background screen of computer is known as
(3) MS PowerPoint 2010 (4) OpenOffice Writer (1) application (2) window
(3) desktop (4) frame
Microsoft Windows 81

13. The background image of desktop is called as 23. Generally, you access the recycle bin
(1) graphics (2) deskcover through an icon located
(3) wallback (4) wallpaper (1) on the desktop
14. The desktop of a computer refers to (2) on the hard drive
(1) the visible screen (3) on the shortcut menu
(2) the area around the monitor (4) in the properties dialog box
(3) the top of the mouse pad 24. Which of the following is used to access a
(4) the inside of a folder file from the computer store?
[IBPS Clerk Mains 2017]
15. A blinking indicator that shows you where
your next action will happen, is (1) Insert (2) Retrieve
(3) File (4) Print

df
(1) CPU (2) cursor
(3) toolbar (4) boot (5) Find

_p
16. Graphical pictures that represent an object 25. The taskbar is located
like file, folder, etc., are [RBI Grade B 2014] (1) on the start menu

na
(1) task bar (2) windows (2) at the bottom of the screen
(3) desktop (4) icons (3) on the quick launch toolbar
(5) None of these ap(4) at the top of the screen
26. In the split window mode, one title bar
17. A/An ......... contains programs that can be
:@

selected. looks darker than the other, because


[RBI Grade B 2012]
(1) pointer (2) menu (3) icon (4) button
(1) darker title bar shows window not in use
18. To open disk, mouse pointer is placed on
TG

(2) darker title bar shows active window


disk icon and then (3) darker title bar shows unavailable window
(1) mouse is dragged pushing the button (4) Both (1) and (2)
(2) mouse is double-clicked (5) None of the above
n

(3) mouse is rotated around


27. Date and time are available on the desktop at
O

(4) mouse is clicked after rotating it


(1) Keyboard (2) Recycle Bin
19. When you want to move an icon on your (3) My Computer (4) Task Bar
h

desktop, this is called (5) None of these


c

(1) double clicking (2) highlighting


ar

28. Which of the following is an appropriate


(3) dragging (4) pointing
method to shutdown computer?
Se

20. To display the contents of a folder in Windows (1) Click ‘Start’ then select ‘Shut down’
Explorer, you should …… . [SBI PO 2013] (2) Click ‘Start’ then select ‘Restart’
(1) click on it (2) collapse it (3) Click ‘Start’ then switch user
(3) name it (4) give it a password (4) Switch off monitor
(5) rename it
29. End menu is available at which button?
21. Factor making Windows popular is
(1) End (2) Start
(1) multitasking capacity (3) Turn off (4) Restart
(2) desktop features
(3) user friendly 30. When you install a new program on your
(4) being inexpensive computer, it is typically added to the menu
(1) All Programs
22. All the deleted files go to (2) Select Programs
(1) Recycle Bin (2) Task Bar (3) Start Programs
(3) Tool Bar (4) Computer (4) Desktop Programs
82 Learn, Revise & Practice ~ Computer Awareness

31. Why do you log-off from your computer 39. What is an on-screen display listing of
when going out from your office? available options of functions on a
[IBPS Clerk Mains 2017] computer? [SBI Clerk 2015]
(1) Someone might steal your files, passwords, etc. (1) Document (2) View
(2) In order to save electricity (3) Tool (4) Format
(3) Logging off is essential to increase performance (5) Menu
(4) Logging off is mandatory before you go out 40. Menus are the part of [RBI Grade B 2014]
(5) Logging off is a good exercise to perform (1) hardware (2) user interface
regularly
(3) status bar (4) monitor
32. Which of the following refers to the (5) None of these
rectangular area for displaying information

df
41. For creating a new document, you use
and running programs? [SBI PO 2013]
which command at File menu?

_p
(1) Desktop (2) Dialog box (1) Open (2) Close (3) New (4) Save
(3) Menu (4) Window
(5) Icon 42. What menu is selected to cut, copy and

na
paste?
33. Title bar, ribbon, status bar, views and
(1) File (2) Tools (3) Special (4) Edit
document workspace are components ap
of ......... program. 43. Help menu is available at which button?
(1) windows (2) browser (1) End (2) Start
:@

(3) explorer (4) Website (3) Turn off (4) Restart


34. Active window means the 44. It is easier to change the name of file
(1) active window is designated by a different using ......... process.
TG

color toolbar that other open window (1) transforming (2) christening
(2) window that is currently open
(3) renaming (4) retagging
(3) Both (1) and (2)
n

(4) window that is last used 45. The steps involved to open a document are
[RBI Grade B 2013]
O

35. To ‘maximize’ a window means to


(1) fill it to the capacity (1) select the document to open from the File
down menu
h

(2) expand it to fit the desktop


(3) put only like files inside (2) click on the Open option in the Tools menu
c

(4) drag it to the recycle bin (3) Both (1) and (2)
ar

(4) can be different for different Word document


36. To shrink a window to an icon,
(5) None of the above
Se

(1) open a group window


(2) minimize a window 46. A computer message is ‘‘Do you really want
(3) maximize a window to delete the selected file(s)’’? The user
(4) restore a window clicks ‘Yes’ key. It is called
37. Which of the following are lists of commands (1) program response
that appear on the screen? [IBPS Clerk 2015] (2) user output
(3) user response
(1) GUIs (2) Icons
(3) Menus (4) Windows (4) program output
(5) Stacks 47. A symbol or question on the screen that
38. Commands at the top of a screen such; prompts you to take action and tell the
FILE-EDIT-FONT-TOOLS to operate and computer what to do next, is
change things within program comes under (1) scanner (2) questionnaire
(1) menu bar (2) tool bar (3) information seeker (4) prompt and dialog box
(3) user friendly (4) word processor (5) None of these
Microsoft Windows 83

48. ......... menu type is also known as a drop 58. A clipboard [RBI Grade B 2014]
down menu. (1) is used to save data on disk in the event of a
(1) Fly-down (2) Pop-down power failure
(3) Pop-up (4) Pull-up (2) is able to retain the contents even when
(5) Pull-down computer is switched OFF
(3) is available only in Microsoft Word
49. A .... is an additional set of commands that the (4) is a temporary storage in computer memory
computer displays after you make a selection. and temporarily stores the cutted or copied
(1) dialog box (2) sub menu data
(3) menu selecting (4) All of these (5) None of the above
50. Anything written on the screen is called 59. What is the command used to remove text or
(1) cursor (2) text graphics from a document, the information is

df
(3) folder (4) boot then stored on a clipboard so you can paste it?

_p
(5) None of these
(1) Chop (2) Cut
51. …… lets you leave a screen or program. (3) Clip (4) Cart away

na
(1) Boot (2) Programs 60. A saved document is referred to as a
(3) Exit (4) Text (1) file (2) word
52. A ......... is an icon on the desktop that
provides a user with immediate access to a
ap
(3) folder
(5) None of these
(4) project
:@
program or file. 61. The name given to a document by the user
(1) kernel (2) buffer is called
(3) shortcut (4) spooler (1) file name (2) program
TG

53. What is the full form of RTF? (3) data (4) record
[IBPS Clerk Mains 2017]
62. A ......... is a collection of information saved
(1) Richer Text-Formatting as a unit.
(2) Rich Text Format (3) Right Text Fishing
n

(1) folder (2) file


(4) Right Text Font (5) Rich Text Font
O

(3) path (4) file extension


54. The extension(s) of paint file is/are 63. A file is often referred to as a
(1) .png (2) .jpg
h

[RBI Grade B 2012]


(3) .bmp (4) All of these
c

(1) wizard (2) document


55. Which of the following options is used to
ar

(3) pane (4) device


open calculator? (5) documentation
Se

(1) Start button → All Programs → Accessories 64. Which of the following statements is a false
→ Calculator conceiving file names? [IBPS Clerk 2014]
(2) Start button → All Programs → Calculator (1) Every file in the same folder must have a
(3) Start button → Accessories → Calculator unique name
(4) All of the above (2) The file name comes before the dot (.)
56. ........ is an easy-to-use interface to play (3) File extension is another name for the type
digital media files. (4) The file extension comes before the dot (.)
followed by the file name
(1) WordPad (2) Notepad (5) Files may share the same name or the same
(3) Media player (4) Games extension, but not both at the same time
57. When you cut or copy information it gets 65. File extensions are used in order to
place in the …… . [IBPS Clerk 2013] (1) name the file
(1) clipart (2) clipboard (2) ensure the file name is not lost
(3) motherboard (4) Both (1) and (2) (3) identify the file
(5) None of these (4) identify the file type
84 Learn, Revise & Practice ~ Computer Awareness

66. Which of the following contained at the end 73. When embedding object into document, one
of the file name and help to determine the of the following occurs. [RBI Grade B 2014]
type of file? [SBI Clerk 2014] (1) Embedded object becomes a part of the
(1) File property (2) File type document
(3) File name (4) File subname (2) Embedded object remains outside object to the
(5) File extension document, but loaded with document
(3) Both becomes a zip file
67. What are .bas, .doc, .htm examples of in
(4) Both (1) and (2)
computing? [IBPS PO 2015]
(5) None of the above
(1) Extensions (2) Protocols
(3) Database (4) Domains 74. Which of the following shortcut keys
represents the correct sequence for copy,

df
(5) None of these
68. What is the default file extension for all paste and cut commands?

_p
(1) Ctrl + V; Ctrl+C; Ctrl+V
Word documents? [RBI Asstt. 2012]
(2) Ctrl + C; Ctrl+V; Ctrl+X
(1) WRD (2) TXT (3) DOC (4) FIL

na
(3) Ctrl + X; Ctrl+C; Ctrl+V
(5) WD
(4) Ctrl + C; Ctrl+X; Ctrl+V
69. You organise files by storing them in
[RBI Grade B 2012]
ap
75. Which of the following keys is used to
delete characters to the left of the cursor?
(1) archives (2) lists
[SBI PO 2014]
:@
(3) indexes (4) folders
(1) Alt + Delete (2) Shift
(5) None of these
(3) Esc (4) Delete
70. ......... may be included in other folder while (5) Backspace
TG

making hierarchical structure folder.


76. To restart the computer, following
(1) Mini-folder (2) Small folder
combination of keys is used.
(3) Sub-folder (4) Object folder
(1) Del + Ctrl
n

71. Which of the following refers to containers (2) Backspace + Ctrl


O

used to store related documents located on (3) Esc + Ctrl


the computer? [SBI Clerk 2014] (4) Ctrl + Alt + Del
h

(1) Labels (2) Indexes


77. Which of the following shortcut keys is
c

(3) Programs (4) Folders


used to close current or active window?
ar

(5) Sections
[IBPS RRB PO Mains 2018]
72. You can keep your personal files/folders in (1) Alt+F4 (2) Ctrl+F4
Se

(1) My Folder (2) Documents (3) Alt+F6 (4) Ctrl+F6


(3) My Files (4) My Text (5) Ctrl+Esc

ANSWERS
1. (3) 2. (5) 3. (4) 4. (1) 5. (4) 6. (1) 7. (4) 8. (4) 9. (5) 10. (3)
11. (3) 12. (3) 13. (4) 14. (1) 15. (2) 16. (4) 17. (3) 18. (2) 19. (3) 20. (1)
21. (2) 22. (1) 23. (1) 24. (2) 25. (2) 26. (2) 27. (4) 28. (1) 29. (2) 30. (1)
31. (1) 32. (4) 33. (1) 34. (3) 35. (2) 36. (2) 37. (3) 38. (1) 39. (5) 40. (2)
41. (3) 42. (4) 43. (2) 44. (3) 45. (3) 46. (3) 47. (4) 48. (5) 49. (1) 50. (2)
51. (3) 52. (3) 53. (2) 54. (4) 55. (1) 56. (3) 57. (2) 58. (4) 59. (2) 60. (1)
61. (1) 62. (2) 63. (2) 64. (4) 65. (4) 66. (5) 67. (1) 68. (3) 69. (4) 70. (3)
71. (4) 72. (2) 73. (1) 74. (2) 75. (5) 76. (4) 77. (1)
Microsoft Office 85
C H A P T E R

10
MICROSOFT

df
_p
OFFICE
na
ap
:@

Microsoft Office (MS-Office) was developed by Microsoft in 1988. It is a collection of softwares, based on
specific purpose and mainly used in office work. You can start any software of MS-Office by using the
Start button.
TG

There are five packages of MS-Office listed below


1. MS-Word (Word Processing Software)
n

2. MS-Excel (Spreadsheet Software)


O

3. MS-PowerPoint (Presentation Software)


4. MS-Access (Database Management Software)
h

5. MS-Outlook (E-mail Client)


c
ar

Microsoft Word
Se

MS-Word is a Word processing application which is one of the most important and widely used
applications found on computer. It provides tools for editing, formatting and printing of documents
smaller than 45 KB.
The document can be a poster, report, letter, brochure, web page, news letter, etc.
e.g. WordStar, Notepad for Windows.
To start the MS-Word software, we can follow any one method out of them
(i) Click on Start button and then click on Run option. Run dialog box will be appear on the screen.
Now, type winword on text box and press Enter key.
(ii) Click Start button → All Programs → Microsoft Office → Microsoft Word 2010.
It opens MS-Word with a blank document. By default, the name of the blank document is
Document1.docx, where. docx are the extensions of a MS-Word file.
86 Learn, Revise & Practice ~ Computer Awareness

Save Print
Button Preview Minimize Maximize
Menu Bar Title Bar
Formatting
Tool Bar
Close
Ribbon Help

Special
Features
Formatting
Toolbar
Cursor

Vertical

df
Scroll Bar
Text Area

_p
na
ap
:@

Current Page Task Bar Horizontal Division Zoom In and


Location Scroll Bar by Page Zoom Out
TG

Components of Microsoft Word


The components of MS-Word are as follows
n

(i) Title Bar It shows the name of the application and name of the file. It consists of three control
O

buttons, i.e.
(a) Minimize (reduces the window but application still active)
h

(b) Restore (brings Word window to the maximum original size)


c

(c) Close (close the Word window)


ar

(ii) Standard Tool Bar It displays the symbol for the common operations like Open, Print, Save, etc.
(iii) Ribbon It is a set of tools and commands across the top of the screen. It consists of a panel of
Se

commands which are organised into a set of tabs.


(iv) Tab On the ribbon, it contains the buttons needed to edit characters, text and layout.
There are various tabs as follows
(a) Home Tab It consists of Clipboard, Font, Paragraph, Styles, Editing.
(b) Insert Tab It consists of Pages, Tables, Illustrations , Links, Header & Footer, Text, Symbols.
(c) Page Layout Tab It consists of Themes, Page Setup, Page Background, Paragraph, Arrange.
(d) References Tab It consists of Table of Contents, Footnotes, Citations & Bibliography,
Captions, Index, Table of Authorities.
(e) Mailings Tab It consists of Create, Start Mail Merge, Write & Insert Fields, Preview Results,
Finish.
(f) Review Tab It consists of Proofing, Language, Comments, Tracking, Changes, Compare,
Protect.
(g) View Tab It consists of Document Views, Show, Zoom, Window, Macros.
Microsoft Office 87
(v) Ruler It appears on the top of the document (vi) Spell Check This facilitates automatic and
window. It allows to format the horizontal or manual checking of spelling mistakes and
vertical alignment of text in a document. also suggests a few possible alternate options
There are two types of ruler for incorrect spelt words.
(a) Horizontal Ruler It indicates the width (vii) Thesaurus It contains a comprehensive
of the document and is used to set left and dictionary and thesaurus feature that offers
right margins. the synonym options for a word.
(b) Vertical Ruler It indicates the height (viii) Bullets and Numbering A list of bullets
of the document and is used to set top
and numbering features is used for tables,
and bottom margins.
lists, pages and tables of content. Bullets are
(vi) Status Bar It displays the information such
arranged in unordered lists and numbering is

df
as page number, current page, current
template, column number, line number, etc. arranged in ordered lists.

_p
(vii) Work Area It is the rectangular area of the (ix) Graphics It provides the facility of
document window that can be use to type the incorporating drawings in the documents

na
text. It is also called as workplace. which enhance their usefulness.
(viii) Cursor It is also called insertion pointer. (x) Object Linking and Embedding (OLE)
It denotes the place where text, graphics or
any other item would be placed when you
ap
It is a program integration technology that is
used to share information between programs
:@
type, overwrite or insert them. through objects. Object save entities like
charts, equations, video clips, audio clips,
Features of Microsoft Word pictures, etc.
TG

The features of MS-Word are described below (xi) Horizontal and Vertical Scroll Bars
(i) Text Editing It provides editing, adding They enable one to move up and down or left
and deleting text, modification of text and right across the window. The horizontal
n

content i.e. cut, copy and paste. scroll bar is located above the status bar. The
vertical scroll bar is located along the right
O

When we cut any text in our document, it


will save in hard drive temporarily, till we side of the screen to move up and down the
document.
h

paste it on any other place.


c

(ii) Format Text It offers to modify the text in (xii) Save a Document When we create a new
ar

any of the available hundreds of text designs. document, it will be saved into the hard drive.
It formats text in various styles such as bold, To save a document, user has three common
Se

italic, underline, etc. ways


(iii) Indentation It denotes the distance (i) To click on Save option from File menu.
between text boundaries and page margins. It (ii) Select Save button from Standard toolbar.
offers three types of indentation-positive, (iii) Press Ctrl + S key.
hanging and negative.
(iv) Page Orientation It facilitates selection of Tit-Bits
typed text printed or visible in horizontal ■
MS-Word was first released in 1983 under the
view or vertical view on a specified size of the name Multi-Tool Word for Xenix Systems.
page. MS-Word offers Portrait–vertically ■
In MS-Word, a default alignment for the paragraph
oriented and Landscape–horizontally oriented. is left.
(v) Find & Replace This feature allows ■
MS-Word has a list of pre-defined typing, spelling,
flexibility and comfort to the user to replace a capitalisation and grammar errors that
text with a substituted text at all places. Auto-correct can detect and correct.
88 Learn, Revise & Practice ~ Computer Awareness

Shortcut Keys of MS-Word and their Descriptions


Standard Toolbar
Tool Name Shortcut Keys Description
New Ctrl + N Creates a new document.
Open Ctrl + O or Ctrl + F12 Opens an existing document.
Save Ctrl + S or Shift + F12 Saves the active document.
F12 Opens a Save As dialog box.
Select Ctrl + A Selects all contents of the page.
Print Ctrl + P or Ctrl + Shift + F12 Prints the active document.

df
Print Preview Ctrl + F2 Displays full pages as they are printed.

_p
Spelling F7 Checks the spelling in the active document.
Cut Ctrl + X Cuts the selected text and puts it on the clipboard.

na
Copy Ctrl + C Copies the selected text and puts it on the clipboard.
Paste Ctrl + V or Shift + Insert Insert the clipboard contents at the insertion point.
ap
Format Painter Ctrl + Shift + C Copies the formatting of the selected text to a specified location.
Ctrl + Z
:@
Undo Reverses certain commands.
Redo Ctrl +Y Reverses the action of the Undo button.
Help F1 Provides the help for working on MS -Word.
TG

Find Ctrl + F Opens Find & Replace dialog boxes with Find tab.
Insert Ctrl + K Insert link.
Delete Ctrl + Del Deletes word to the right of cursor.
n

Ctrl + Backspace Deletes word to the left of cursor.


O

Insert Alt + Shift + D Insert the current date.


Alt + Shift + T Insert the current time.
h

Formatting Toolbar
c
ar

Tool Name Shortcut Keys Description


Style Ctrl + Shift + S Applies a style or records a style.
Se

Font Ctrl + Shift + F Changes the font of the selected text.


Font Size Ctrl + Shift + P Changes the font size of the selected text.
Bold Ctrl + B Makes the selected text bold.
Italic Ctrl + I Makes the selected text italic.
Underline Ctrl + U Makes the selected text underline.
Aligned Left Ctrl + L Aligns the paragraph at left indent (By default).
Center Ctrl + E Centers the paragraph between the indents.
Aligned Right Ctrl + R Aligns the paragraph at right indent.
Justify Ctrl + J Aligns the paragraph at both right and left indents.
Line space Ctrl + 5 To increase line spacing.
Microsoft Office 89

Microsoft Excel
A spreadsheet is a matrix of rows and columns similar to an accounting ledger.
An electronic spreadsheet is used for analysing, sharing and managing information for accounting
purpose performing mathematical calculations, budgeting, billing etc.
The spreadsheet program also provides tools for creating graphs, inserting pictures and chart, analysing
the data, etc.
e.g. Corel Quattro Pro, Visicalc, Lotus-1-2-3, Apple Numbers, etc.
To start MS-Excel software, we can follow any one method out of them
(i) Click on Start button and then click on Run option. Run dialog box will be appear on the screen.
Now, type Excel on Text box and press Enter key.

df
(ii) Click Start button → All Programs → Microsoft Office → Microsoft Excel 2010.

_p
It opens MS-Excel with a blank spreadsheet. By default, the name of the blank spreadsheet is Book1.xlsx,
where .xls and .xlsx are the extensions of a MS-Excel spreadsheet.

na
Menu Bar Title Bar Formula Bar Standard Toolbar
ap
:@

Ribbon
TG

Active Cell
n
O

Column
Heading
c h

Row Heading
Worksheet
ar

Window
Se

Sheet Tab
Scrolling Button

Status Bar Worksheet Tab Horizontal Vertical


Scroll Bar Scroll Bar
Microsoft Excel Window
90 Learn, Revise & Practice ~ Computer Awareness

There are different types of functions


Components of Microsoft Excel
The components of MS-Excel are as follows Functions Descriptions Examples
1. Title Bar It shows the name of the application SUM It is used to add all the values = SUM
and name of the file. It consists of three control provided as argument. (A1 : A5)
buttons, i.e. Minimize, Maximize and Close. AVERAGE This function calculates the =
2. Ribbon It consists of a panel of commands average of all the values AVERAGE
provided as argument. (A1 : A5)
which is organised into a set of tabs.
3. Tab On the ribbon, it contains the buttons COUNT This function counts the = COUNT
number of cells that contain (A1 : A5)
needed to edit characters, text and layout. number.
There are 7 tabs in MS - Excel as follows MAX This function is used to = MAX

df
(i) Home Tab It consists of Clipboard, return maximum value from (A1 : A5)

_p
Font, Alignment, Number, Styles, Cells a list of arguments.
and Editing. MIN This function is used to = MIN
return minimum value from (A1 : A5 )

na
(ii) Insert Tab It consists of Tables,
a list of arguments.
Illustrations, Charts, Sparklines, Filter
Links, Text and Symbols.
(iii) Page Layout Tab It consists of Themes,
ap
where, A1 : A5 is a range between the cells of A1
and A5.
:@
Page Setup, Scale to Fit, Sheet Options Basic Terms of Spreadsheet
and Arrange. The basic terms of spreadsheet are as follows
(iv) Formulas Tab It consists of Function 1. A spreadsheet is a software tool that lets one
TG

Library, Defined Names, Formula enter, calculate, manipulate and analyse set of
Auditing and Calculation. numbers.
(v) Data Tab It consists of Get External 2. The intersection of each row and column is
n

Data, Connections, Sort & Filter, Data called cell. A cell is an individual container for
O

Tools and Outline. data. It may hold


(vi) Review Tab It consists of Proofing, (i) Numbers (Constants)
h

Language, Comments and Changes. (ii) Formulas (Mathematical equations)


c

(vii) View Tab It consists of Workbook (iii) Text (Labels)


ar

Views, Show, Zoom, Window and 3. An array of cells is called a sheet or worksheet.
Macros.
Se

A worksheet holds information presented in


4. Status Bar It displays information about the tabular format with text.
currently active worksheet. It includes page 4. A workbook is a document that contains one
number, view shortcuts, zoom slider, etc. or more worksheet. Each new workbook has
5. Formula Bar It is located below the ribbon. created three worksheets by default.
It is used to enter and edit worksheet data. 5. A row is given a number that identifies it starts
It includes from 1, 2, 3, 4, 5, … and so on.
(i) Name box displays the all references or 6. A column is given a letter that identifies it
column and row location of the active cell. starts from A … Z, AA … AZ, BA, BB … BZ and
(ii) Functions are pre-defined formulas that so on.
perform calculations by using specific 7. Active cell is a cell in which you are currently
values, called arguments. working.
Microsoft Office 91
8. A cell pointer is a cell-boundary that specifies which cell is active at that moment.
9. A formula is an equation that calculates the value to be displayed. A formula must begin with Equal
To ( = ) sign.
10. A cell address is used to specified the intersecting of row and column of the letter and number on the
worksheet.

Charts
Charts are the graphical and pictorial representation of worksheet data.
Types of Chart
1. Area Chart It emphasises the magnitude of change over time.

df
2. Column Chart It shows data changes over a period of time or illustrates comparisons among
items.

_p
3. Bar Chart It illustrates comparisons among individual items. Categories are organised vertically
and Values horizontally.

na
4. Line Chart It shows trends in data at equal intervals. It is useful for depicting the change in a value
over a period of time.
ap
5. Pie Chart It shows the proportional size of items that make up only one data series to the sum of
the items.
:@

6. XY (Scatter) Chart It shows the relationship among the numeric values in several data series or
plots two groups of numbers as series of XY coordinates. Scatter compares pairs of values.
TG

Components of Chart
1. Chart Area This is the total region surrounding the chart.
2. Plot Area The area where data is plotted. The plot area is bounded by axes in a 2D-Chart, whereas in
n

3D-Chart it is bounded by walls and floor.


O

3. Chart Title The descriptive text aimed at helping user identify the chart.
4. Axis Title This is the title given to three axis, i.e. X, Y and Z.
h

5. Data Series A row or column of numbers that are plotted in a chart is called a data series.
c

6. Gridlines These are horizontal and vertical lines, which inserted in the chart to enhance its
ar

readability.
Se

7. Legend It helps to identify various plotted data series.


8. Data Label It provides additional information about the data marker.
9. Data Table It is defined as a range of cells that is used for testing and analysing outcomes on a
large scale.

Tit-Bits

$ Sign locks the cells location to a fixed position.

Stacked Bar Column shows the relationship of individual items to the whole.

Chart Wizard is used to create charts in MS-Excel.

Embedded Chart is a chart that is drawn on an existing sheet.
92 Learn, Revise & Practice ~ Computer Awareness

Shortcut Keys of MS-Excel and their Descriptions


Shortcut Keys Descriptions
F2 Edit the selected cell.
F5 Go to a specific cell. e.g. C6.
F7 Checks the spellings.
F11 Create chart.
Ctrl + Shift + ; Enter the current time.
Ctrl + ; Enter the current date.
Alt + Shift + F1 Insert new worksheet.
Shift + F3 Opens the Insert Function window.
Shift + F5 Opens Find & Replace dialog boxes with Find tab.

df
Ctrl + A Select all contents of the worksheet.

_p
Ctrl + B Bold highlighted selection.
Ctrl + I Italic highlighted selection.

na
Ctrl + K Insert link.
Ctrl + U Underline highlighted selection.
Ctrl + P
ap
Bring up the Print dialog box to begin printing.
Ctrl + Z Undo the last action.
:@

Ctrl + F9 Minimise current workbook.


Ctrl + F10 Maximise currently selected workbook.
Ctrl + F6 Switch between open workbooks/ windows.
TG

Ctrl + Page Up Move to the previous sheet between Excel worksheets in the same Excel document.
Ctrl + Page Down Move to the next sheet between Excel worksheets in the same Excel document.
Ctrl + Tab Move between two or more open Excel files.
n

Alt + = Create a formula to sum all of the above cells.


O

Shift + Home Go to the first cell in the current row.


Ctrl + Shift + ! Format number in comma format.
h

Ctrl + Shift + $ Format number in currency format.


c

Ctrl + Shift + # Format number in date format.


ar

Ctrl + Shift + % Format number in percentage format.


Se

Ctrl + Shift + @ Format number in time format.


Ctrl + Space Select entire column.
Shift + Space Select entire row.

Microsoft PowerPoint
Presentation is the practice of showing and explaining the contents of a topic to an audience or a learner
visually.
The application software that can create professional looking visual aids is called presentation graphics
software.
The presentation software is used for creation of the slides and to display the information in the form of
presentation of slides.
A presentation software provides tools like editor that allows insertion and formatting of text and
methods for inserting and manipulating graphics images along with sound and visual effects.
Microsoft Office 93
To start the MS-PowerPoint software, we need to
Click Start button → All Programs → Microsoft Office → Microsoft PowerPoint 2010.
By default, the name of the blank document is Presentation1. ppt, where .ppt or .pptx is the extension of a
PowerPoint file.
Quick Action Toolbar Control Button
Tabs Title Bar

Ribbon
Office Button

Slide View Tab


Command Dialog

df
Group Box Button
Online Tab

_p
na
Slider Pen
ap Work Area
:@
TG

Note Section View Button Zoom Slider


Status Bar

Microsoft PowerPoint Window


n

Components of Microsoft PowerPoint


O

Various components of MS-PowerPoint 2010 window are described below


1. Title Bar It contains the name of currently opened file followed by software name.
h

2. Ribbon It is same as Word and Excel, just few tabs are different like Animations, Slide Show, etc.
c

3. Slide It appears in the centre of the window. You can create your presentation by adding content to
ar

the slides.
Se

4. Slide Pane This area of PowerPoint window displays all the slides that are added in the
presentation.
5. Slide View Tab This tab displays a thumbnail view of all the slides.
6. Outline View Tab This tab displays the text contained in the presentation in an outline format.
7. Notes Section This section can be used for creating notes.
8. Status Bar It displays the number of the slide that is currently being displayed.

PowerPoint Views
Different types of views available in PowerPoint 2010 are explained below
1. Normal View This view is the main editing view, where you write and design your presentations,
i.e. actual screen which is displayed.
2. Slide Sorter View It provides a view of slides in thumbnail form. This view makes it easy to sort
and organise the sequence of the slides at the time of creating presentation.
94 Learn, Revise & Practice ~ Computer Awareness

3. Notes Page View In this view, the notes Shortcut Keys Descriptions
page is located just below the slide page. Ctrl + I Applies italic to the selected text.
Here, notes that apply to the current slide can Ctrl + M Inserts a new slide.
be typed. Later, these notes can be printed Ctrl + N Opens a new blank presentation.
and referred while giving actual presentation. Ctrl + O Opens the Open dialog box.
4. Slide Show View This view is used to Ctrl + T Opens the Font dialog box.
deliver a presentation to the audience. Slide Ctrl + U Applies underlining to the selected
Show View takes up the full computer screen, text.
like an actual presentation. To exit Slide Ctrl + V Paste the cutted or copied text.
Show View, press Esc key from the keyboard. Ctrl + W Closes the presentation.
5. Master View This view includes Slide Ctrl + Y Repeats or undo the last command

df
View, Handout View and Notes View. They entered.

_p
are the main slides that store information Home Moves cursor to the beginning of the
about the presentation, including background current line of the text.
color, fonts effects, placeholder sizes and End Moves cursor to the end of the

na
positions. current line of text.
Ctrl + Home Moves cursor in beginning of
Tit-Bits
ap
Ctrl + End
presentation.
Moves cursor to end of presentation.
Shift + Click
:@
■ Trigger is defined as an object or item that Selects more than one slide in a
performs on the slide when we click the mouse. each side presentation.
■ The MS-PowerPoint can maximum zoom to 400% F1 Opens the help dialog box.
only.
TG

■ In MS-PowerPoint, we can add many types of


image and sound format such as .gif, .bmp, .png, Microsoft Access
.jpg, .giv, .wav, .mid, etc. A database is a collection of logically related and
similar data. Database stores similar kind of data
n

Shortcut Keys of Microsoft PowerPoint


for a specific purpose that is organised in such a
O

and their Descriptions


manner that any information can be retrieved from
Shortcut Keys Descriptions it, when needed. Microsoft Access is an application
h

F5 View the Slide Show. which allows the creating of database. Microsoft
c

Shift + Ctrl + Selects all text from the cursor to the Access is a Relational Database Management
ar

Home start of the active text box. System (RDBMS).


Shift + Ctrl + Selects all text from the cursor to the
Se

End end of the active text box.


S Stops the slide show press S again to
Microsoft Outlook
restart the slide show. It is an E-mail client and personal information
Esc Ends the slide show. manager that is available as a part of Microsoft
Ctrl + A Selects all items on the page or the Office suite.
active text box. Windows mobile devices are the version of
Ctrl + B Applies bold to the selected text. MS-Outlook, enables users to synchronise their
Ctrl + F Opens the Find and replace Dialog E-mails data to their smartphones.
box with Find tab. MS-Outlook can work with Microsoft exchange
Shift + click Selects more than one slide. server and Microsoft sharepoint server for multiple
each slide users in an organisation such as shared mail boxes,
Ctrl + H Opens the Find and replace Dialog calendars, exchange public folders, sharepoint lists
box with Replace tab. and meeting schedules.
Microsoft Office 95

QUESTION BANK
1. Microsoft Office was developed by..…… in … 7. A Word processor would be used best to
(1) Microsoft Inc, 1970s (1) paint a picture
(2) Microsoft Inc, 1980s (2) draw a diagram
(3) Sun Microsoft, 1980s (3) type a story
(4) Sun Microsoft Inc, 1970s (4) work out income and expenses
2. Which of the following is a basic software 8. This program is made by Microsoft and
of MS-Office? embedded with Windows and used to view

df
(1) MS-Word (2) MS-Excel Web document. [RBI Grade B 2013]
(3) MS-PowerPoint (4) All of these (1) Netscape (2) Outlook Express

_p
3. MS-Word is a (3) Internet Explorer (4) MS-Word
(1) tabular data formatting software (5) None of these

na
(2) Word processing software
9. You can start Microsoft Word by using
(3) presentation software
(4) E-mail client which button?
4. What is MS-Word? [SBI Clerk 2015]
ap(1) New
(3) Program
(2) Start
(4) All of these
:@
(1) It is a calculating tool.
(2) It is a planning tool. 10. When you start MS-Word, the opening
(3) It is a chart. document has the name as
(4) It is a networking tool. (1) DOC1 (2) Document1
TG

(5) It is a document typing tool. (3) Document (4) Workbook


5. Microsoft Office Word is a(n) 11. What is the default file extension for all
(1) area in the computer’s main memory in which Word documents?
n

Microsoft Office text files are stored [RBI Grade B 2012, IBPS Clerk 2014]
O

temporarily (1) WRD (2) TXT


(2) program included with Windows 2000 that (3) DOC (4) FIL
can be used only to create or edit text files,
h

(5) WD
smaller than 64k, that do not require
c

formatting 12. The first bar of MS-Word is


ar

(3) classified password that prevents (1) menu bar (2) status bar
unauthorised users from accessing a protected (3) title bar (4) formatting toolbar
Se

Microsoft Office item or document


(4) full featured Word processing program that 13. Editing a document that has been created
can be used to create and revise professional means [IBPS Clerk 2015]
looking documents easily (1) saving it (2) printing it
(3) scanning it (4) correcting it
6. A program which helps to create written
(5) None of these
documents and lets you go back and make
corrections as necessary. 14. A ...... is an additional set of commands that
(1) Spreadsheet the computer displays after you make a
(2) Personal writer selection from main menu.
(3) Word printer (1) Dialog box (2) Sub menu
(4) Word processor (3) Menu selection (4) All of these
96 Learn, Revise & Practice ~ Computer Awareness

15. Microsoft Word is a word processor developed 24. To move to the beginning of a line of text,
by Microsoft. In MS-Word, Spelling Check is a press the … key.
feature available in which tab? (1) Page Up (2) A
(1) File (2) Home (3) Home (4) Enter
(3) Insert (4) Review
25. In which menu, we will find the command
16. MS-Word is a text or document editing document? [RBI Grade B 2013]
application program that comes in the (1) File (2) Insert
package of MS-Office Suite. Which among (3) Tools (4) Data
the given options is not related with (5) None of these
MS-Word? [IBPS PO 2016]
(1) Page Layout (2) Anti-virus 26. Which of the following is not a font style?
(1) Bold (2) Italic

df
(3) Mailings (4) Format Painter
(5) SmartArt (3) Regular (4) Superscript

_p
27. Portrait and landscape are
17. In order to choose the font for a sentence in
(1) page orientation (2) paper size
a Word document [IBPS Clerk 2011]

na
(3) page layout (4) page margin
(1) select Font in the Format menu
(2) select Font in the Edit menu 28. Which of the following should be used to
(3) select Font in the Tools menu apmove a paragraph from one place to
(4) select Font in the View menu another in a Word document?
(1) Copy and paste (2) Cut and paste
:@
(5) None of the above
(3) Delete and retype (4) Find and replace
18. When computer users …… a document, they
change its appearance. 29. To move the text from its original position to
another position without deleting it is called
TG

(1) Edit (2) Create


(3) Save (4) Format (1) scrolling (2) searching
(3) moving (4) copying
19. In MS-Word, the Replace option is available
on 30. Which of the following displays the buttons
n

(1) File menu (2) Edit menu for changing text style, alignment and size?
O

(3) Insert menu (4) View menu (1) Standard toolbar


(2) Status bar
20. Which of the following is not an option of
h

(3) Drawing toolbar


Edit menu?
c

(4) Formatting toolbar


(1) Cut (2) Copy
ar

31. Which of the following commands is used


(3) Paste (4) Page Setup in MS-Word to underline the statement?
Se

21. Which bar is usually located below the title [UPPSC Computer Assistant 2019]
bar that provides categorised options? (1) Underline (2) U
(1) Menu bar (2) Status bar (3) I (4) P
(3) Tool bar (4) Scroll bar 32. Where we can insert a page number in
22. The process of making changes to an document?
existing document is referred to as [UPPSC Computer Assistant 2019]
[SBI Clerk 2014] (1) Header (2) Footer
(1) editing (2) changing
(3) modifying (4) creating (3) Both (1) and (2) (4) None of these
(5) adjusting 33. After selecting the ‘Replace’ option from the
23. Most of the editing tools are available Edit menu, the following dialog box will be
under which menu? appear.
(1) File (2) Format (1) Replace (2) Find
(3) Edit (4) All of these (3) Find & Replace (4) Edit
Microsoft Office 97

34. Which of the following justifications align (4) by changing the font size of your document
the text on both the sides, left and right of (5) None of the above
the margin? [IBPS Clerk 2012] 41. Where you can find the horizontal split bar
(1) Right (2) Justify on MS-Word screen?
(3) Both sides (4) Balanced (1) On the left of horizontal scroll bar
(5) None of these (2) On the right of horizontal scroll bar
35. Auto-text can be used to insert …. . in (3) On the top of vertical scroll bar
document. [RBI Grade B 2014] (4) On the bottom of vertical scroll bar
(1) Text (2) Graphics 42. In MS-Word, the default alignment for
(3) Either (1) or (2) (4) Both (1) and (2) paragraph is
(5) None of these (1) left aligned (2) centered

df
36. About margins [RBI Grade B 2014] (3) right aligned (4) justified

_p
(1) all sections in a document need to have same 43. Which of the following is not available on
margin the ruler of MS-Word screen?

na
(2) different sections can have different margins (1) Left indent (2) Right indent
(3) Word have pre-defined margins settings for (3) Centre indent (4) All of these
all documents ap
(4) can’t say, depend on the version of Word 44. You specify the save details of your file in
(5) None of the above
the [RBI Grade B 2013]
:@
(1) “Save as a file” dialog box
37. When entering text within a document, the (2) “Save the file as” dialog
Enter key is normally pressed at the end of (3) “File save” dialog box
every
TG

[IBPS PO 2011, IBPS Clerk 2013] (4) Any of (1) and (2)
(1) line (2) sentence (5) None of the above
(3) paragraph (4) word
(5) file
45. To save an existing document with a
n

different file name, click


38. In order to delete a sentence from a
O

(1) Save button on the Standard toolbar


document, you would use [IBPS Clerk 2015] (2) Save on the File menu
(1) highlight and copy
h

(3) Save As button on the Standard toolbar


(2) cut and paste (4) Save As on the File menu
c

(3) copy and paste


ar

46. In how many ways, you can save a


(4) highlight and delete
document? [SBI PO 2012]
Se

(5) select and paste


(1) 3 (2) 4
39. Soft page breaks [RBI Grade B 2013] (3) 5 (4) 6
(1) are induced by the user (5) 8
(2) are inserted by word automatically at the end 47. Word has a list of pre-defined typing,
of the page
spelling, capitalisation and grammar errors
(3) can be deleted
(4) are the one to show end of paragraph
that ........... can defect and correct.
(1) autoentry (2) autocorrect
(5) None of the above
(3) autoadd (4) autospell
40. In Word, you can force a page break
[IBPS PO 2011] 48. Where header appears?
(1) by positioning your cursor at the appropriate (1) Top (2) Bottom
place and pressing the F1 key (3) Centre (4) All of these
(2) by positioning your cursor at the appropriate
place and pressing the Ctrl+Enter 49. Keyboard shortcut for Cut command is
(3) by using the insert/section break
98 Learn, Revise & Practice ~ Computer Awareness

[SBI Clerk 2015]


57. Which of the following can be used to select
(1) Ctrl + W (2) Ctrl + Y the entire document? [IBPS Clerk 2013]
(3) Ctrl + Z (4) Ctrl + X (1) Ctrl + A (2) Alt + F5
(5) Ctrl + V (3) Shift + A (4) Ctrl + K
50. To increase the line spacing, use the ............. (5) Ctrl + H
shortcut keys. 58. What is the shortcut key for centering the
(1) Ctrl + L (2) Ctrl + E text selected by the user in Word?
(3) Ctrl + I (4) Ctrl + 5 (1) Ctrl + A (2) Ctrl + B
51. Shortcut for displaying the full page as they (3) Ctrl + C (4) Ctrl + E
are printed. 59. Which of the following is a computer
(1) Ctrl + F1 (2) Ctrl + F2 software program that is used for storing,

df
(3) Shift + F1 (4) Shift + F2 organising and manipulating data?

_p
[UPSSSC 2018]
52. The shortcut key to print document is
[IBPS PO 2012] (1) Firefox (2) Excel

na
(1) Ctrl + D (2) Ctrl + A (3) Outlook (4) PowerPoint
(3) Ctrl + B (4) Ctrl + C 60. What kind of software would you most
(5) Ctrl + P aplikely use to keep track of a billing account?
[IBPS PO 2015]
53. Which of the following keys should be
(1) Web Authoring (2) Electronic Publishing
:@
pressed simiultaneously for highlighting the
text to the default font? [RRB NTPC 2016] (3) Spreadsheet (4) Word Processing
A. Ctrl + Home B. Ctrl + Space bar (5) PowerPoint
61. Excel worksheet data can be shared with
TG

C. Ctrl + Shift + Z D. Ctrl + Alt + F2


Codes Word document by [RBI Grade B 2014]
(1) B (2) C (3) D (4) A (1) inserting an Excel file into Word
(2) copy and paste Excel worksheet into Word
n

54. To move to the bottom of a document while document


O

working on MS-Word, which command is (3) link Excel data in a Word document
used? [IBPS Clerk 2014] (4) All of the above
h

(1) Home key (5) None of the above


(2) End key
c

62. A worksheet is made of columns and rows,


(3) Ctrl + Page Down Key
ar

wherein [RBI Grade 2013]


(4) Insert key (1) columns run horizontally and rows run
Se

(5) Ctrl + End key vertically


55. To undo the last work, we have to use (2) columns run vertically and rows run
horizontally
which of the following Windows shortcut (3) the run is dependent on the application being
key? [SBI PO 2014] used
(1) Ctrl + P (2) Ctrl + U (4) Both (2) and (3)
(3) Ctrl + A (4) Ctrl + Z (5) None of the above
(5) Ctrl + W 63. Which of the following software
56. Shortcut key to go to last line in the applications would be the most appropriate
document. [SBI PO 2014] for performing numerical and statistical
(1) Ctrl + Last (2) Ctrl + L calculations? [RBI Grade B 2012]
(3) Ctrl + End (4) Alt + End (1) Database (2) Document processor
(5) Alt + L (3) Graphics package (4) Spreadsheet
(5) PowerPoint
Microsoft Office 99

64. The file responsible for starting MS-Excel is 73. All of the following terms are related to
[RBI Grade B 2013] spreadsheet software except
(1) MS.Excel (2) MS.exe (1) worksheet (2) cell
(3) Excel.exe (4) Excel.com (3) formula (4) virus detection
(5) None of these 74. Which of the following is an active cell in
65. Anything that is typed in a worksheet Excel?
appears [RBI Grade B 2013] (1) Current cell (2) Formula
(1) in the formula bar only (3) Range (4) Cell address
(2) in the active cell only 75. How is the data organised in a spreadsheet?
(3) in both active cell and formula bar (1) Lines and spaces
(4) All of the above (2) Layers and planes

df
(5) None of the above (3) Height and width

_p
66. Which one is the example of spreadsheet (4) Rows and columns
package? 76. The basic unit of a worksheet into which

na
(1) VisiCalc (2) Unity you enter data in Excel is called a
(3) Ada (4) Snowball (1) tab (2) cell
67. Which option will we use to give heading in
the form ?
ap(3) box (4) range
77. The advantage of using a spreadsheet is
:@
(1) Label (2) Text box (1) calculations can be done automatically
(3) Option group (4) Insert (2) changing data automatically updates
calculations
68. The extension of saved file in MS-Excel is (3) more flexibility
TG

(1) .xis (2) .xas (4) All of the above


(3) .xlsx (4) .xll
78. A ......... is rectangular grid of rows and
69. Alignment buttons are available on which
columns used to enter data.
n

toolbar? (1) cell


O

(1) Status (2) Standard (2) worksheet


(3) Formatting (4) All of these (3) spreadsheet
h

70. In Excel, the intersection of a column and a (4) Both (2) and (3)
c

row is called [RBI Grade B 2014] 79. The default view in Excel is …… view.
ar

(1) cell (2) grid (1) Work (2) Auto


(3) table (4) box (3) Normal (4) Roman
Se

(5) None of these


80. It is a software tool that lets one enter,
71. What does an electronic spreadsheet consist calculate, manipulate set of numbers.
of? (1) Speedsheet (2) Spreadsheet
(1) Rows (2) Columns (3) Slide sheet (4) All of these
(3) Cells (4) All of these
81. Borders can be applied to
72. A collection of worksheets is called (1) cells (2) paragraph
[RBI Grade B 2014, (3) text (4) All of these
UPPSC Computer Assistant 2019]
(1) Excel book (2) Worksheets 82. The cell having bold boundary is called
(3) Excel sheets (4) Workbook (1) relative (2) active
(5) None of these (3) absolute (4) mixed
100 Learn, Revise & Practice ~ Computer Awareness

83. You can create hyperlinks from the Excel 91. The letter and number of the intersecting
workbook to column and row is the [IBPS PO 2012]
(1) a Web page on company Internet (1) cell location (2) cell position
(2) a Web page on the Internet (3) cell address (4) cell coordinates
(3) other Office 97 application documents (5) cell contents
(4) All of the above 92. Which of the following is not a valid formula
84. To select a column, the easiest method is to in Microsoft Excel? [IBPS Clerk 2014]
(1) double click any cell in the column (1) = A2 + A1 (2) = A2 + 1
(2) drag from the top cell in the column to the last (3) = 1 + A2 (4) = 1A + 2
cell in the column (5) = A1 + A2
(3) click the column heading 93. The function TODAY ( ) in Excel, enters the

df
(4) click the row heading current [RBI Grade B 2014]

_p
85. Which of the following groups is not (1) system time in a cell
present in the Insert tab of MS-Excel? (2) system date and time in a cell
(3) system date only

na
[UPSSSC Gram Panchayat Officer 2019]
(4) time at which the current file was opened
(1) Illustrations (2) Paragraph
(5) None of the above
(3) Links (4) Symbols ap
94. Which of the following characteristics is
86. Which of the following will you use as an
used to compute dynamically the results
option for saving a file?
:@

from Excel data? [IBPS Clerk 2012]


(1) Save button on Standard toolbar
(1) Goto (2) Table
(2) Save option from File menu
(3) Pressing Ctrl + S (3) Chart (4) Diagram
TG

(4) All of the above (5) Formula and function


87. What function displays row data in a 95. Which area in an Excel window allows
column or column data in a row? entering values and formulas?
n

[RBI Grade B 2013]


(1) Hyperlink (2) Index
O

(1) Standard Toolbar (2) Menu Bar


(3) Transpose (4) Rows (3) Title Bar (4) Formula Bar
88. In Excel, ......... allows users to bring together (5) None of these
h

copies of workbooks that other users gave


c

96. = Sum (B1 : B10) is an example of a


worked on independently. [SBI Clerk 2011]
ar

(1) function (2) formula


(1) copying (2) merging (3) cell address (4) value
(3) pasting (4) compiling
Se

(5) None of these 97. You can copy data or formulas


(1) with the copy, paste and cut commands on the
89. Insert date, format page number and insert Edit menu
auto text are buttons on the ......... toolbar. (2) with commands on a shortcut menu
(1) formatting (2) header and footer (3) with buttons on the standard toolbars
(3) standard (4) edit (4) All of the above
90. On saving a worksheet, the ‘Save As’ dialog 98. A cell entry can be edited in the cell or in the
box [RBI Grade B 2013, 14] (1) menu bar (2) edit menu
(1) is used to open the saved Excel files (3) function bar (4) formula bar
(2) is used for saving the file for the first time
(3) is used for saving the file by some alternative 99. In Excel, this is a pre-recorded formula that
name provides a shortcut for complex calculations.
(4) Both (2) and (3) (1) Value (2) Data series
(5) None of the above (3) Function (4) Field
Microsoft Office 101

100. In Excel, an active cell can be represented by 111. The cell accepts your typing as its contents,
(1) 4A (2) A4 if you press
(3) A$4 (4) $A$4 (1) Enter (2) Ctrl + Enter
101. Three types of data can be entered in a (3) Tab (4) Insert
worksheet, as number/characters, text and 112. Which key is used in combination with
(1) formulas (2) functions another key to perform a specific task?
(3) logic (4) All of these (1) Function (2) Space bar
102. The physical arrangement of elements on a (3) Arrow (4) Control
page is referred to as a document’s 113. Which of the following commands in Office
(1) Features (2) Format 2010, can be used to go to the first cell in the
(3) Pagination (4) Grid

df
current row? [IBPS Clerk 2014]
103. Cell address $A4 in a formula means it is a (1) Tab (2) Shift + Tab

_p
(1) mixed cell reference (3) Esc + Home (4) Shift + Home
(2) absolute cell reference (5) Home

na
(3) relative cell reference 114. In a worksheet in MS-Excel, what is short-
(4) All of the above cut key to hide entire row? [SBI PO 2014]
104. In this chart, only one data series can be
plotted.
ap(1) Ctrl + 2
(3) Ctrl + N
(2) Ctrl + 9
(4) Ctrl + −
(5) Ctrl + N
:@
(1) Pie (2) Line
(3) Bar (4) Column 115. To select entire row, which shortcut is
105. This chart shows the relationship of parts to used? [SBI PO 2014]
TG

a whole. (1) Shift + space (2) Ctrl + space


(1) Pie (2) Line (3) Alt + space (4) None of these
(3) Stacked bar (4) Embedded (5) None of these
n

106. A chart placed in a worksheet is called 116. Which software is used to create
O

(1) formatting chart (2) embedded chart presentation?


(3) aligning chart (4) hanging chart (1) Microsoft Word
h

(2) Microsoft Excel


107. Scatter chart is also known as (3) Microsoft PowerPoint
c

(1) XX chart (2) YX chart (4) Microsoft Access


ar

(3) XY chart (4) YY chart


117. What is the extension of PowerPoint in
Se

108. In Excel, charts are created using which Microsoft Office 2007?
option? (1) .ptp (2) .pptx (3) .ppx (4) .ptx
(1) Chart wizard (2) Pivot table
118. You can add any picture in your document
(3) Pie chart (4) Bar chart
from which menu?
109. Pie charts are typically created by using (1) File (2) Edit
which of the following? (3) Insert (4) Format
(1) Browser software 119. Which of the following should you use if
(2) Database software you want all the slides in the presentation
(3) Desktop publishing software to have the same ‘look’?
(4) Spreadsheet software (1) The slide layout option
110. To select the current column, press (2) Add a slide option
(1) Ctrl + Spacebar (2) Ctrl + B (3) Outline view
(3) Shift + Enter (4) Ctrl + Enter (4) A presentation design template
102 Learn, Revise & Practice ~ Computer Awareness

120. The ......... defines the appearance and shape 127. Which of the following views is the best
of letters, numbers and special characters. view to use when setting transition effects
(1) Font (2) Font size for all slides in presentation?
(3) Point (4) Paragraph formatting (1) Slide sorter view (2) Notes page view
121. ......... shows how the contents on printed (3) Slide view (4) Outline view
page will appear with margin, header and 128. Which PowerPoint view displays each slide
footer. of the presentation as a thumbnail and is
(1) Draft useful for re-arranging slides?
(2) Full screen reading [IBPS Clerk 2013]
(3) Outline (1) Slide sorter (2) Slide show
(4) Page layout (3) Slide master (4) Notes page

df
(5) Slide design
122. By default, on which page the header or

_p
footer is printed? [IBPS Clerk 2011] 129. Which is a feature included in Microsoft
(1) On first page (2) On alternative page PowerPoint software that allows the user to

na
(3) On every page (4) All of these see all the slides in a presentation at one
(5) None of these time? [IBPS PO 2016]
(1) Slide Sorter
ap (2) Slide Master
123. To find the paste special option, or use the (3) Handout Master (4) Slide Header
Clipboard group on the …… tab of Power
(5) Reading View
:@
Point. [IBPS Clerk 2013]
(1) Design (2) Slide Show 130. To add a header or footer to your handout,
(3) Page Layout (4) Insert you can use the
TG

(5) None of these (1) Title master (2) Slide master


(3) Handout master (4) All of these
124. This is to insert an object, which is not
131. The maximum zoom percentage in
missprint to its originating document into a
MS-PowerPoint is
n

[IBPS Clerk 2009]


destination document? [RBI Grade B 2014]
(1) 100% (2) 200%
O

(1) Cell (2) Embed


(3) 400% (4) 500%
(3) Defaults (4) Any of these
(5) None of these
h

(5) None of these


c

132. In Microsoft PowerPoint, two kinds of


125. Selecting Portrait changes our page from
ar

[RBI Grade B 2014]


sound effect files can be added to the
(1) a wide to tall orientation
presentation are
Se

(2) a tall to wide orientation (1) .wav files and .mid files
(3) a normal font size to a condensed one (2) .wav files and .gif files
(4) a condensed font size to a normal one (3) .wav files and .jpg files
(5) None of the above (4) .jpg files and .gif files
133. Which file format can be added to a
126. Which of the following controls the format
PowerPoint show?
and placement of the titles and text you on (1) .jpg (2) .giv
slides, as well as, background items and (3) .wav (4) All of these
graphics you want to appear on every slide?
[IBPS Clerk 2015]
134. PowerPoint provides .......... number of
(1) Slide (2) Copyright layouts for use with blank presentation.
(1) 20 (2) 22
(3) Layout (4) Design (3) 24 (4) 26
(5) None of these
Microsoft Office 103

135. In PowerPoint, the Header and Footer 138. Which of the following will not advance the
buttons can be found on the Insert tab in slides in a slide show view?
which group? [IBPS PO 2012, Clerk 2013] (1) Esc key
(1) Illustrations group (2) Object group (2) Spacebar
(3) Insert group (4) Tables group (3) Enter key
(5) None of these (4) Mouse button
136. Which command brings you to the first 139. Which of the following bypasses the Print
slide in your presentation? dialog box when printing individual slides
(1) Next slide button (2) Page up or an entire presentation?
(3) Ctrl + Home (4) Ctrl + End (1) File, Print preview
(2) Print button
137. Which of the following allows you to select

df
(3) File, Print
more than one slide in a presentation?
(4) Ctrl + P

_p
(1) Alt + click each slide
(2) Shift + drag each slide 140. Which key on the keyboard can be used to
(3) Shift + click each slide view slide show?

na
(4) Ctrl + click each slide (1) F1 (2) F2 (3) F5 (4) F10
ap
ANSWERS
:@

1. (2) 2. (4) 3. (2) 4. (5) 5. (2) 6. (4) 7. (3) 8. (4) 9. (2) 10. (2)
11. (3) 12. (3) 13. (4) 14. (2) 15. (4) 16. (2) 17. (1) 18. (1) 19. (2) 20. (4)
TG

21. (1) 22. (1) 23. (3) 24. (3) 25. (4) 26. (3) 27. (1) 28. (2) 29. (4) 30. (4)
31. (2) 32. (3) 33. (3) 34. (2) 35. (4) 36. (2) 37. (1) 38. (4) 39. (2) 40. (3)
41. (3) 42. (1) 43. (3) 44. (1) 45. (4) 46. (1) 47. (2) 48. (1) 49. (4) 50. (4)
n

51. (2) 52. (5) 53. (2) 54. (3) 55. (4) 56. (3) 57. (1) 58. (4) 59. (2) 60. (3)
O

61. (4) 62. (2) 63. (4) 64. (3) 65. (3) 66. (1) 67. (1) 68. (3) 69. (3) 70. (1)
71. (4) 72. (4) 73. (4) 74. (1) 75. (4) 76. (2) 77. (3) 78. (4) 79. (3) 80. (2)
c h

81. (4) 82. (2) 83. (4) 84. (2) 85. (2) 86. (4) 87. (3) 88. (2) 89. (1) 90. (3)
ar

91. (3) 92. (4) 93. (4) 94. (5) 95. (4) 96. (2) 97. (4) 98. (4) 99. (3) 100. (2)
101. (4) 102. (2) 103. (1) 104. (1) 105. (3) 106. (2) 107. (3) 108. (1) 109. (4) 110. (1)
Se

111. (1) 112. (4) 113. (3) 114. (2) 115. (1) 116. (3) 117. (2) 118. (3) 119. (4) 120. (1)
121. (4) 122. (4) 123. (5) 124. (2) 125. (1) 126. (3) 127. (1) 128. (1) 129. (1) 130. (3)
131. (3) 132. (1) 133. (4) 134. (3) 135. (5) 136. (3) 137. (3) 138. (1) 139. (4) 140. (3)
104 Learn, Revise & Practice ~ Computer Awareness

C H A P T E R

11
DATABASE

df
_p
CONCEPTS
na
ap
:@

A database is a collection of logically related data is organised in the form of tree with nodes.
information in an organised way so that it can be Nodes are connected via links.
easily accessed, managed and updated. 3. Relational Database This database is also
TG

Some other operations can also be performed on known as structured database in which data
database such as adding, updating and deleting is stored in the form of tables. Where, columns
data. define the type of data stored in the table and
n

rows define the information about the data.


Fundamentals of Database
O

1. Data These are raw and unorganised facts


Components of Database
h

that need to be processed such as digital A database consists of several different components.
Each component listed, is called an object.
c

representation of text, numbers, graphical


ar

images or sound. Database components are described below


e.g. A student’s test score is one piece of data. 1. Tables These are the building blocks or
Se

2. Information When data is processed, organised, relation of any relational database model where
structured or presented in a given context to all the actual data is defined and entered.
make it useful or meaningful, it is called Different types of operation are done on the
information. tables such as storing, filtering, retrieving and
e.g. The class’s average score is the information editing of data. Tables consist of cells at the
that can be concluded from the given data. intersection of records (rows) and fields
(columns), which are described below
Types of Database (i) Field It is an area (within the record)
1. Network Database In this type of database, reserved for a specific piece of data.
data is represented as a collection of records and e.g. Customer number, Customer name,
relationships among data that are represented Street address, City, State, Phone number,
as links. Current address, etc. Field of a table is also
2. Hierarchical Database In this type of database, known as column.
Database Concepts 105

(ii) Record It is the collection of data items of MS-Access. The purpose of database management
all the fields pertaining to one entity, i.e. a system is to bridge the gap between information
person, company, transition, etc. Record of and data.
a table is also known as row or a tuple and The basic processes that are supported by DBMS are as
the number of records in a relation is called follows
the cardinality of that relation.
(i) Specification of data types, structures and
2. Queries These are basically questions based constraints to be considered in an application.
on the data available in a database. A query
(ii) Storing the data.
consists of specifications indicating which
fields, records and summaries a user wants to (iii) Manipulation of the database.
fetch from the database. (iv) Querying the database to retrieve desired

df
Queries allow you to extract data based on the information.
(v) Updating the content of the database.

_p
criteria that you define.
3. Forms Although you can enter and modify
Architecture of DBMS

na
data in datasheet view of tables but you neither
control the user’s action very well nor you can The architecture of DBMS is divided into three levels
do much to facilitate the data-entry process. To are as follows
overcome this problem, forms are introduced.
ap
1. Internal Level It is the lowest level of data
Like tables, forms can be used to view and edit abstraction that deals with the physical
:@

your data. However, forms are typically used to representation of the database on the
view the data in an underlying table, one record computer. It is also known as physical level.
at a time. It defines how the data is actually stored and
TG

e.g. A user can create a data entry form that organised in the storage medium.
looks exactly like a paper form. People generally User 1 User 2 User 3 User 4
prefer to enter data into a well-designed form,
n

rather than a table.


O

External External External External


Level Level Level Level
4. Reports When you want to print those
records which are fetched from your database,
h

design a report. Access even has a wizard to Conceptual Level


c

help produce mailing labels.


ar

Internal Level
Se

Database Management
System (DBMS) Storage
A DBMS is a collection of inter-related data and a
set of programs to retrieve data from the database. Architecture of DBMS
It is an organised collection of data viewed as a
whole, instead of a group of separate unrelated 2. Conceptual Level It is the overall view of
files. the database and includes all the information
that is going to be represented in the database.
The primary goal of DBMS is to provide an
It describes what type of data is stored in the
environment that is both convenient and efficient
database, the relationship among the data
for user to store and retrieve database information.
without effecting to the physical level. It is
e.g. MySQL, Oracle, FoxPro, dBASE, SyBase, also known as logical level.
106 Learn, Revise & Practice ~ Computer Awareness

3. External Level This is the highest level of DBMS an extremely complex piece of software.
data abstraction which describes the interaction Failure to understand the system can lead to
between the user and the system. bad design decisions, which can have serious
It permits the users to access data in a way that consequences for an organisation.
is customised according to their needs, so that 3. Cost of Staff Training Mostly DBMSs are
the same data can be seen by different users in often complex systems, so the training for
different ways, at the same time. It is also user to use the database is required. The
known as view level. organisation has to pay a lot of amount for the
training of staff to run the DBMS.
Advantages of DBMS 4. Appointing Technical Staff The trained
1. Reduction in Data Redundancy The technical persons such as database administrator,

df
duplication of data refers to data redundancy. application programmers, etc., are required to

_p
DBMS cannot make separate copies of the handle the database. You have to pay a lot of
same data. All the data is kept at a place and amount to these persons. Therefore, the system
different applications refer to data from

na
cost increases.
centrally controlled system. 5. Database Failure In most of the organisations,
2. Better Interaction with Users In DBMS, the ap
all data is integrated into a single database. If
availability of uptodate information improves database is corrupted due to power failure or it
the data to be access or respond as per user is corrupted on the storage media, then our
:@

requests. valuable data may be lost or whole system stop.


3. Improvement in Data Security DBMS can
allow the means of access to the database Applications of DBMS
TG

through the authorised channels. 1. Banking For customer information, accounts,


To ensure security, DBMS provides security loans and other banking transactions.
tools, i.e. username and password. 2. Reservation For reservation and schedule
n

4. Maintenance of Data Integrity Data information.


O

integrity ensures that the data of database is 3. Universities For student information, course
accurate. In DBMS, data is centralised and used by registration, grades, etc.
h

many users at a time, it is essential to enforce 4 Credit Card Transaction For purchase of
c

integrity controls. credit cards and generation of monthly


ar

5. Backup and Recovery The DBMS provides statements.


backup and recovery sub-system that is
Se

5. Tele-communication For keeping records


responsible to recover data from hardware and of calls made, generating monthly bill, etc.
software failures. 6. Finance For storing information about
holdings, sales and purchase of financial
Disadvantages of DBMS statements.
1. Cost of Hardware and Software A processor
7. Sales For customer, product and purchase
with high speed of data processing and
information.
memory of large size is required to run the
DBMS software. It means that you have to
upgrade the hardware used for file based Relational Database
system. Similarly, database software is also In a relational database, data is stored in different
very costly. tables with relationships to each other. In the case
2. Complexity The provision of the functionality of relational database, a Relational Database
that is expected from a good DBMS makes the Management System (RDBMS) performs this task.
Database Concepts 107

An important feature of this database system is that


Types of Key
a single database can be spread across several tables.
1. Primary Key It is a set of one or more
e.g. Base, Oracle, DB2, SyBase, Informix, etc. attributes that can uniquely identify tuples
(rows) within the relation. The primary key
Terms Related to Relational should be chosen in such a way, i.e. its value
Database must not be changed.
1. Relation It is a table with columns and rows There should not be duplicacy in the record
which represent the data items and relationships of primary key. Primary key can be atomic or
among them. It has three important properties, composite. The field chosen as primary key,
a name, cardinality and a degree. cannot accept null value.

df
These properties help us to further define and 2. Candidate Key The set of all attributes
describe relations which can uniquely identify each tuple (row)

_p
(i) Name The first property of a relation is its of a relation, is known as candidate key.
name, which is represented by the tide or Each table may have one or more candidate

na
the entity identifier. keys and one of them will become the
(ii) Cardinality The second property of a primary key. The candidate key of a relation
relation is its cardinality, which refers to
ap is always a minimal key.
the number of tuples (rows) in a relation. 3. Alternate Key From the set of candidate
:@

(iii) Degree The third property of a relation is keys after selecting one of the keys as
its degree, which refers to the number of primary key, all other remaining keys are
attributes (columns) in each tuple. known as alternate keys.
TG

2. Domain It is a collection of all possible values 4. Foreign Key It is a non-key attribute


from which the values for a given column or an whose value is derived from the primary key
attribute is drawn. A domain is said to be atomic, of the same or some another table. The
n

if elements are considered to be indivisible units. relationship between two tables is


O

established with the help of foreign key.


3. Attributes The heading columns of a table are
known as attributes. Each attribute of a table A table may have multiple foreign keys and
h

has a distinct name. each foreign key can have a different


c

referenced table.
4. Tuples The rows in a relation are also known
ar

as tuples. Each row or tuple has a set of


Database Languages
Se

permitted values for each attribute.


1. Data Definition Language (DDL) It is
used to define structure of your tables and
Key other objects in database. In DBMS, it is
A key is defined as the column or set of columns in a used to specify a database schema as a set of
table that is used to identify either row of data in a definitions.
table or establish relationship with another table.
2. Data Manipulation Language (DML) It
If a table has Id, name and address as the column provides various commands used to access
names, then each one is known as the key for that and manipulate data in existing database.
table. The keys are also used to uniquely identify This manipulation involves inserting data
each record in the database table. into database tables, retrieving existing data,
108 Learn, Revise & Practice ~ Computer Awareness

deleting data from existing tables and same properties or attributes. e.g. Students are an
modifying existing data. entity set of all student entities in the database.
3. Data Control Language (DCL) These Entity set is of two types which are as follows
commands are used to assign security levels in 1. Strong Entity Set It has a primary key or can
database which involves multiple user setups. be easily distinguishable each attribute.
They are used to grant defined role and access 2. Weak Entity Set It does not posses sufficient
privileges to the users. attributes to form a primary key.
Relationship
Entity-Relationship It is an association among several entities. A
Model (E-R Model) relationship describes how two or more entities are

df
It represents the entities contained in the related to each other. It is represented by diamond
database. It is a diagrammatically representation of shape.

_p
entities and relationship between them. It is also Relationship can be divided into three parts
known as E-R Diagram.

na
(i) One-to-One This relationship tells us that a
Attributes Relationship single record in Table A is related to a single
Code Address ItemId Price
aprecord in Table B and vice-versa.
Customer Buys Items (ii) One-to-Many This entails one data in Table
Entity A to have links to multiple data in Table B.
:@

E-R Diagram However, a single data in Table B, will have


Some terms related to E-R Model are described below link to a single data in Table A.
TG

(iii) Many-to-Many Each data in Table A is


Entity linked to all the data in Table B and vice-versa.
It is an object that has its existence in the real
world. It includes all those things about which the Tit-Bits
n

data are collected. “Entities are represented in


O


Dr. EF Codd represented 12 rules for Relational
rectangles”. e.g. Customer buys items, it means Database Management System (RDBMS) in 1970.
Customer and Items are entities. ■
Schema is a logical structure of the database.
h

Attributes ■
Instances are the actual data contained in the
c

database at a particular point of time.


It describes the characteristics or properties of
ar


Data Duplication wastes the space, but also
entity. In tables, attributes are represented by promotes a more serious problem called data
Se

columns. Attributes are drawn in elliptical shapes. inconsistency.


e.g. Items entity may contain ItemId and Price. ■
Data Mining is the process of sorting through
large data sets to identify patterns and establish
Entity Set relationships to solve problems through data
It is a set of entities of the same type that shares analysis.
Database Concepts 109

QUESTION BANK
1. A ......... is a collection of data that is stored 8. Devices that could be used to input data into
electronically as a series of records in a a database are
table. (1) keyboard, fax roller ball
(1) Spreadsheet (2) Presentation (2) mouse, keyboard, monitor
(3) Database (4) Web page (3) mouse, keyboard, touch screen
(4) All of the above
2. A collection of interrelated records is
called a [RBI Grade B 2012] 9. In a relational database, a data structure that

df
(1) utility file organises the information about a single

_p
(2) management information system topic into rows and columns, is
(3) database (1) block (2) record (3) tuple (4) table
(4) spreadsheet

na
10. The smallest unit of information about a
(5) datasheet record in a database is called a
3. Which of the following is the organised ap(1) cell (2) field (3) record (4) query
collection of large amount of interrelated 11. ……… are distinct items that do not have
data stored in a meaningful way used for
:@
much meaning to you in a given context.
manipulation and updation? [SBI PO 2012]
[IBPS Clerk Mains 2017] (1) Fields (2) Data
(1) Database (2) File (3) Queries (4) Properties
TG

(3) Folder (4) Data-mining (5) None of these


(5) None of these
12. A collection of related files is called a
4. Items such as names and addresses are [SBI PO 2011, IBPS Clerk 2013]
n

considered as (1) character (2) field


O

(1) input (2) data (3) database (4) record


(3) output (4) records (5) None of these
h

5. Which type of database, organised the data 13. Which of the following contains information
c

in the form of tree with nodes? about a single ‘entity’ in the database like a
ar

(1) Network Database person, place, event or thing?


(2) Hierarchical Database
Se

(1) Query (2) Form


(3) Relational Database (3) Record (4) Table
(4) Multiple Database
14. DBMS is comprised of tables that made up
6. The database stores information in of rows called ......... and columns called ....... .
(1) rows and columns (1) fields, records (2) records, fields
(2) blocks (3) address, fields (4) ranges, sheet
(3) tracks and sectors
(4) All of the above 15. What is a stored question about
information in a database? [SBI Clerk 2015]
7. To locate a data item for storage is (1) Query (2) Sort
(1) field (2) feed (3) Report (4) Record
(3) database (4) fetch (5) Field
110 Learn, Revise & Practice ~ Computer Awareness

16. A program that generally has more 23. Which out of the following is not a DBMS
user-friendly interface than a DBMS is software?
called a (1) dBASE (2) FoxPro
(1) front end (2) repository (3) Oracle (4) Database 2000
(3) back end (4) form 24. In which, the database can be restored up to the
17. Which of the following object(s) is/are last consistent state after the system failure?
contained in database? (1) Backup (2) Recovery
(1) Table (2) Query (3) Redundancy (4) Security
(3) Form (4) All of these 25. ............ provides total solutions to reduce data
18. Which of the following places the common redundancy, inconsistency, dependency and

df
data elements in order from smallest to unauthorised access of data.
largest? (1) DBMS [IBPS Clerk 2012]

_p
(1) Character, File, Record, Field, Database (2) Tables
(2) Character, Record, Field, File, Database (3) Database

na
(3) Character, Field, Record, File, Database (4) Protection password
(4) Bit, Byte, Character, Record, Field, File, (5) Centralisation of data
Database
19. What is the overall term for creating,
ap
26. Periodically adding, changing and deleting
file records is called ......... file.
:@
editing, formatting, storing, retrieving a text (1) updating (2) upgrading
document? [IBPS PO 2012] (3) restructuring (4) renewing
(1) Word processing (2) Spreadsheet design 27. Architecture of database management can be
TG

(3) Web design (4) Database management viewed as


(5) Presentation generation (1) two levels (2) four levels
20. The database administrator’s function in an (3) three levels (4) one level
n

organisation is 28. A collection of conceptual tools for


O

(1) to be responsible for the technical aspects of describing data, relationships, semantics and
managing the information contained in
constraints is referred to as
organisational databases
h

[IBPS Clerk 2012]


(2) to be responsible for the executive level (1) E-R model (2) database
c

aspects of decision regarding the information (3) data model (4) DBMS
ar

management
(5) None of these
(3) to show the relationship among entity classes
Se

in a data warehouse 29. ......... is one reason for problems of data


(4) to define which data mining tools must be integrity. [IBPS Clerk 2012]
used to extract data (1) Data availability constraints
21. The code that relational database (2) Data inconsistency
management systems use to perform their (3) Security constraints
database task is referred to as (4) Unauthorised access of data
(1) QBE (2) SQL (5) Data redundancy
(3) OLAP (4) Sequel Server 30. ......... means that the data contained in a
22. DBMS helps to achieve database is accurate and reliable.
(1) data independency (1) Data redundancy
(2) centralised control of data (2) Data integrity
(3) selection of data (3) Data reliability
(4) Both (1) and (2) (4) Data consistency
Database Concepts 111

31. Which of the following contains data 40. The purpose of the primary key in a
descriptions and defines the name, data database is to [IBPS Clerk 2015]
type and length of each field in the database? (1) unlock the database
(1) Data dictionary (2) Data table (2) provide a map of the data
(3) Data record (4) Data filed (3) uniquely identify a record
(4) establish constraints on database operations
32. An advantage of the database management
(5) None of the above
approach is
(1) data is dependent on programs 41. In case of entity integrity, the primary key
(2) data redundancy increases may be
(3) data is integrated and can be accessed by (1) not null (2) null
multiple programs (3) Both (1) and (2) (4) any value

df
(4) All of the above 42. In files, there is a key associated with each

_p
33. Which of the following is the drawback of record which is used to differentiate among
DBMS? different records. For every file, there is

na
(1) Improvement in data atleast one set of keys that is unique. Such a
(2) Backup and recovery key is called
(3) Complexity
(4) Maintenance of data integrity
ap
(1) unique key
(3) index key
(2) prime attribute
(4) primary key
:@

34. In which of the following, database is used? 43. Which of the following types of table constraints
(1) Banking (2) Finance will prevent the entry of duplicate rows?
(3) Sales (4) All of these (1) Primary key (2) Unique
TG

(3) Null (4) Foreign key


35. A database that contains tables linked by
common fields is called a 44. The particular field of a record that uniquely
(1) centralised database identifies each record is called the
n

[SBI PO 2012]
(2) flat file database
(1) key field (2) primary field
O

(3) relational database


(4) All of the above (3) master field (4) order field
(5) None of these
h

36. Oracle is a(n) [IBPS Clerk Mains 2017]


45. ......... is a primary key of one file that also
c

(1) hardware (2) high level language


appears in another file. [IBPS Clerk 2013]
ar

(3) operating system (4) system software


(5) RDBMS (1) Physical key (2) Primary key
Se

(3) Foreign key (4) Logical key


37. The cardinality property of a relation, refers (5) None of these
to the
46. ......... is an invalid type of database key.
(1) number of database
(1) Structured primary key [IBPS Clerk 2013]
(2) number of columns
(2) Atomic primary key
(3) number of rows
(3) Primary key
(4) number of tables
(4) Composite primary key
38. Rows of a relation are called (5) None of the above
(1) relation (2) tuples
47. Key to represent relationship between tables
(3) data structure (4) entities
is called [SBI Clerk 2010]
39. A set of possible data values is called (1) primary key (2) secondary key
(1) attribute (2) degree (3) foreign key (4) composite key
(3) tuple (4) domain (5) None of these
112 Learn, Revise & Practice ~ Computer Awareness

48. Which database language is used to access 54. Relationship can be divided into
data in existing database? (1) One-to-one
(1) DDL (2) DML (2) Many-to-one
(3) DCL (4) None of these (3) One-to-many
(4) All of the above
49. An E-R diagram is a graphic method of
presenting [IBPS Clerk 2011] 55. Dr. E F Codd represented ......... rules that a
(1) primary keys and their relationships database must obey if it has to be considered
(2) primary keys and their relationships to truly relational. [IBPS Clerk 2012]
instances (1) 10 (2) 8
(3) entity classes and their relationships (3) 12 (4) 6
(4) entity classes and their relationships to

df
(5) 5
primary keys
56. A logical schema

_p
(5) None of the above
(1) is the entire database
50. In an E-R diagram, an entity set is (2) is a standard way of organising information

na
represented by into accessable part
(1) rectangle (2) square (3) describes how data is actually stored on disk
(3) ellipse (4) triangle
51. In an E-R diagram, attributes are
ap
(4) All of the above
57. Data duplication wastes the space, but also
:@
represented by promotes a more serious problem called
(1) rectangle (2) square (1) isolated [IBPS PO 2015]
(3) ellipse (4) circle (2) data inconsistency
TG

52. In E-R diagram, relationship type is (3) other than those given as options
represented by [IBPS Clerk 2012] (4) program dependency
(1) ellipse (2) dashed ellipse (5) separated data
n

(3) rectangle (4) diamond 58. When data changes in multiple lists and all
O

(5) None of these lists are not updated. This causes


53. An entity set that does not have sufficient [RBI Grade B 2012]
h

attributes to form a primary key, is a (1) Data redundancy


(2) Information overload
c

[IBPS Clerk 2011]


(1) strong entity set (2) weak entity set (3) Duplicate data
ar

(3) simple entity set (4) primary entity set (4) Data consistency
Se

(5) None of these (5) Data inconsistency

ANSWERS
1. (3) 2. (3) 3. (1) 4. (2) 5. (2) 6. (1) 7. (4) 8. (3) 9. (4) 10. (2)
11. (1) 12. (4) 13. (3) 14. (2) 15. (1) 16. (4) 17. (4) 18. (3) 19. (4) 20. (1)
21. (2) 22. (4) 23. (4) 24. (2) 25. (4) 26. (1) 27. (3) 28. (3) 29. (1) 30. (2)
31. (1) 32. (3) 33. (3) 34. (4) 35. (3) 36. (5) 37. (3) 38. (2) 39. (4) 40. (3)
41. (1) 42. (4) 43. (1) 44. (2) 45. (3) 46. (1) 47. (3) 48. (2) 49. (3) 50. (1)
51. (3) 52. (4) 53. (2) 54. (4) 55. (3) 56. (2) 57. (2) 58. (5)
Data Communication and Networking 113
C H A P T E R

12
DATA COMMUNICATION

df
AND NETWORKING

_p
na
The term ‘communication’ means sending or rules called protocols to be followed during
ap
receiving information. When we communicate, we communication. The communication media is also
share information or data. called transmission media.
:@

A communication system can be defined as the Five components of data communication are
collection of hardware and software that facilitates (i) Sender It is a computer or any such device
inter-system exchange of information between
TG

which is capable of sending data over a


different devices. network. It can be a computer, mobile phone,
smartwatch, walkie-talkie, video-recording
Data Communication device, etc.
n

It is the exchange of data between two devices (ii) Receiver It is a computer or any such device
O

using some form of transmission media. which is capable or receiving data from the
network. It can be any computer, printer,
h

It includes the transfer of data or information and


the method of preservation of data during the laptop, mobile phone, television, etc. The
c

sender and receiver are known as nodes in a


ar

transfer process. Data is transferred from one place


to another in the form of signals. network.
Se

There are three types of signal (iii) Message It is the data or information that
needs to be exchanged between the sender and
1. Digital Signal In this signal, data is transmitted
the receiver. Messages can be in the form of
in electronic form, i.e. binary digits (0 or 1).
text, number, image, audio, video, multimedia,
2. Analog Signal In this signal, data is transmitted etc.
in the form of radiowaves like in telephone line.
(iv) Communication Media It is the path
3. Hybrid Signal These signals have properties through which the message travels between
of both analog signal and digital signal. source and destination. It is also called
Components of Data Communication medium or link which is either wired or
Whenever we talk about communication between wireless.
two computing devices using a network, five most (v) Protocol It is a set of rules that need to be
important aspects come to our mind. These are followed by the communicating parties in
sender, receiver, communication medium, the order to have successful and reliable data
message to be communicated and certain communication.
114 Learn, Revise & Practice ~ Computer Awareness

Characteristics of Data Transmission media can be divided into two broad


Communication categories
1. Delivery The data must be delivered from the
source device to the correct destination in the Guided Media or Wired
right order. Technologies
2. Accuracy The data must be delivered The data signal in guided media is bound by the
error-free. If there exists any inaccuracy during cabling system that guides the data signal along a
transmission, the data should be re-transmitted. specific path.
3. Timeliness The data must be delivered during It consists of a cable composed of metals like
the specified time period. The late delivered copper, tin or silver.

df
data becomes useless. Basically, they are divided into three categories
1. Ethernet Cable or Twisted Pair Cable

_p
Communication Channel In this cable, wires are twisted together which
The communication channel refers to the direction are surrounded by an insulating material and

na
of signal flow between two linked devices. an outer layer called jacket. One of the wires is
There are mainly three types of communication used to carry signals to the receiver and the
channels which are as follows
apother is used only as a ground reference.
1. Simplex Channel In this channel, the flow of E.g. Local area networks use twisted pair cable.
:@

data is always in one direction with no 2. Co-axial Cable It carries the signal of higher
capability to support response in other direction. frequency data through the network. It has a
This communication is uni-directional. Only single inner conductor that transmits electric
TG

one of the communicating devices transmits signals and the outer conductor acts as a
information and the other can only receive it. ground and is wrapped in a sheet of teflon or
E.g. Radio, Television, Keyboard, etc. PVC. Co-axial cable is commonly used in
n

transporting multi-channel television signals


2. Half Duplex Channel In this channel, the
O

in cities.
data can flow in both directions, but not at the
E.g. Cable TV network.
same time. When one device transmits
h

information, the other can only receive at that


c

point of time. E.g. Walkie –Talkie.


ar

3. Full Duplex Channel In this channel, the


Copper
Se

flow of data is in both directions at a time i.e.,


conductor
both stations can transmit and receive Di-electric
information simultaneously. Braid
PVC sheath
E.g. Wireless handset (mobile phone).
Co-axial Cable
Communication Media 3. Fibre Optic Cable It is made up of glass or
Communication media of a network refers to the plastic and transmits signals in the form of light
transmission media or the connecting media used from a source at one end to another.
in the network. It can be broadly defined as Optical fibres allow transmission over longer
anything that can carry information from a source distance at higher bandwidth which is not
to the destination. affected by electromagnetic field. The speed of
It refers to the physical media through which optical fibre is hundred times faster than
communication signals can be transmitted from co-axial cables.
one point to another.
Data Communication and Networking 115
Protective coating It works over long distances and allows fast
Protective
Core coating communication. It is used for communication
Core to ships, vehicles, planes and handheld terminals.
Cladding Note Bluetooth It is a short range wireless communication
Cladding technology that allows devices such as mobile
phones, computers and peripherals to transmit data
Fibre Optic Cable or voice wirelessly over a short distance.
Note Tamil Nadu, the Indian state decided to implement
Bharat Net Service which will connect all the village
panchayats through optical fibre. Computer Network
It is a collection of two or more computers, which
Unguided Media or are connected together to share information and

df
Wireless Technologies resources.
It is the transfer of information over a distance Computer network is a combination of hardware

_p
without the use of enhanced electrical conductors and software that allows communication between
or wires. When the computers in a network are computers over a network.

na
interconnected and data is transmitted through Note ARPANET stands for Advanced Research Projects
waves, then they are said to be connected through Agency Network. It was the first network developed
unguided media.
ap by Vint Cerf in 1969.

Some commonly used unguided media of transmission Benefits of Computer Network


:@

are as follows Some of the benefits of computer network are


1. Radiowave Transmission When two terminals discussed below
communicate by using radio frequencies than 1. File Sharing Networking of computer helps
TG

such type of communication is known as the users to share data/files.


radiowave transmission. This transmission is 2. Hardware Sharing Users can share devices
also known as Radio Frequency (RF) such as printers, scanners, CD-ROM drives,
n

transmission. The frequencies range from 3Hz hard drives, etc., in a computer network.
O

to 1GHz. These are omni-directional. Radio


3. Application Sharing Applications can be
waves, particularly those waves that propagate
shared over the network and this allows
h

in the sky mode, can travel long distances.


implementation of client/server applications.
c

2. Microwave Transmission Microwaves are


4. User Communication This allows users to
ar

electromagnetic waves having frequencies


communicate using E-mail, news groups,
range from 0.3 to 300 GHz. Microwaves are
Se

video-conferencing, etc. within the network.


uni-directional. It have higher frequency than
that of radiowaves. It is used in cellular
network and television broadcasting.
Types of Computer Network
Computer network is broadly classified into various
3. Infrared Wave Transmission Infrared waves
types which are as follows
are the high frequency waves used for
short-range communication. The frequencies Local Area Network (LAN)
range from 300 GHz to 400 THz. These waves LAN is a small and single-site network. It connects
can not pass through the solid-objects. They network devices over a relatively short distance.
are mainly used in TV remote and wireless
It is a system in which computers are inter-
speakers, etc.
connected in the geographical area such as home,
4. Satellite Communication The communication office, building, school, etc. which are within a
across longer distances can be provided by range of 1 km. Its speed is upto 1000 Mbps. On most
combining radio frequency transmission with LANs, cables are used to connect the computers.
satellites.
116 Learn, Revise & Practice ~ Computer Awareness

LANs are typically owned, controlled and managed There are many types of computer network devices
by a single person or organisation. They also use used in networking. Some of them are described
certain specific connectivity technologies, primarily below
Ethernet and Token Ring. LAN provides a sharing 1. Repeater It has two ports and can connect two
of peripherals in an efficient or effective way. segments of a LAN. It amplifies the signals
when they are transported over a long distance
Wide Area Network (WAN)
so that the signal can be as strong as the
WAN is a geographically dispersed collection of
original signal. A repeater boosts the signal
LANs. A WAN like the Internet spans most of the
back to its original level.
world. A network device called a router connects
LANs to a WAN. Its speed is upto 150 Mbps. 2. Hub It is like a repeater with multiple ports
used to connect the network channels. It acts as

df
Like the Internet, most WANs are not owned by
a centralised connection to several computers
any one organisation, but rather exist under

_p
with the central node or server. When a hub
collective or distributed ownership and
receives a packet of data at one of its ports from
management. WANs use technology like ATM,

na
a network channel, it transmits the packet to all
Frame Relay and X.25 for connectivity.
of its ports to all other network channel.
Metropolitan Area Network (MAN) ap
3. Gateway It is an inter-connecting device,
It is a data network designed for a town or city. It which joins two different network protocols
connects an area larger than a LAN, but smaller together. They are also known as protocol
:@

than a WAN. Its speed is upto 100 Mbps. converters. It accepts packet formatted for one
Its main purpose is to share hardware and software protocol and converts the formatted packet into
another protocol.
TG

resources by various users. Cable TV network is an


example of metropolitan area network. The The gateway is a node in a network which
computers in a MAN are connected using co-axial serves as a proxy server and a firewall system
cables or fibre optic cables. and prevents the unauthorised access.
n

4. Switch It is a small hardware device that joins


O

Personal Area Network (PAN)


multiple computers together within one LAN.
PAN refers to a small network of communication. It helps to reduce overall network traffic.
h

These are used in a few limited range, which is in


Switch forwards a data packet to a specific
c

reachability of individual person. Its speed is upto 3


route by establishing a temporary connection
ar

Mbps. Few examples of PAN are Bluetooth, Wireless


between the source and the destination. There
USB, Z-wave and Zig Bee.
is a vast difference between a switch and a hub.
Se

■ Server is a system that responds to requests A hub forwards each incoming packet (data) to
across a computer network to provide a network all the hub ports, while a switch forwards each
service. It can be run on a dedicated computer. It incoming packet to the specified recipient.
is one of the most powerful and typical computer.
5. Router It is a hardware device which is
■ File Server is a type of computer used on network designed to take incoming packets, analyse
that provides access to files. It allows users to
packets, moving and converting packets to the
share programs and data over LAN network.
another network interface, dropping the
packets, directing packets to the appropriate
Computer Network Devices locations, etc.
These devices are required to amplify the signal to 6. Bridge It serves a similar function as switches.
restore the original strength of signal and to A bridge filters data traffic at a network
provide an interface to connect multiple computers boundary. Bridges reduce the amount of traffic
in a network. on a LAN by dividing it into two segments.
Data Communication and Networking 117

Traditional bridges support one network Node 2

boundary, whereas switches usually offer four


Node 1 Node 3
or more hardware ports. Switches are sometimes
called multiport bridges.
7. Modem It is a device that converts digital signal
to analog signal (modulator) at the sender’s end Hub
and converts back analog signal to digital signal
(demodulator) at the receiver’s end, in order to
make communication possible via telephone
lines. Modem is always placed between a
Node 5 Node 4
telephone line and a computer.

df
Star Topology
Network Topology 3. Ring or Circular Topology This topology is

_p
The term ‘topology’ refers to the way a network is used in high-performance networks where
laid out, either physically or logically. Topology large bandwidth is necessary. The protocols

na
can be referred as the geometric arrangement of a used to implement ring topology are Token
computer system. Each computer system in a Ring and Fiber Distributed Data Interface
topology is known as node.
ap(FDDI). In ring topology, data is transmitted in
the form of token over a network.
The most commonly used topologies are described
:@
Node 1
below
1. Bus Topology It is such that there is a single
line to which all nodes are connected. It is
TG

usually used when a network installation is Node 5 Node 2


small, simple or temporary.
In bus topology, all the network components
n

are connected with a same (single) line.


O

Laser Node 4 Node 3


Printer Server Scanner
h

Ring or Circular Topology


c

4. Mesh Topology It is also known as completely


ar

Router
inter-connected topology. In mesh topology,
Se

every node has a dedicated point-to-point link


to every other node.
Bus Topology Server
2. Star Topology In this network topology, the
peripheral nodes are connected to a central Node 1
Node 4
node, which re-broadcasts all transmissions
received from any peripheral node to all
peripheral nodes across the network. A star
network can be expanded by placing another
star hub.

Node 3 Node 2
Mesh Topology
118 Learn, Revise & Practice ~ Computer Awareness

5. Tree Topology This is a network topology in


which nodes are arranged as a tree. The OSI Model
function of the central node in this topology Open System Inter-connection (OSI) is a standard
may be distributed. reference model for communication between two
end users in a network. In 1983, the International
Its basic structure is like an inverted tree, where
Standards Organisation (ISO) published a
the root acts as a server. It allows more devices
document called Basic Reference Model for Open
to be attached to a single hub. System Inter-connection, which visualises network
Server protocols as a Seven Layered Model.
OSI is a layered framework for the design of
network system that allows communication

df
between all types of computer systems. It mainly
consists of seven layers across a network.

_p
Seven Layers of OSI Model and their Functions

na
Name of the Layer Functions
Application Layer Re-transferring files of
Tree topology ap
[User-Interface] information, login, password
checking, packet filtering, etc.
Models of Computer
:@
Presentation Layer It works as a translating layer,
Networking [Data formatting] i.e. encryption or decryption.
There are mainly two models of computer networking Session Layer To manage and synchronise
TG

which are as follows [Establish and conversation between two


maintain systems. It controls logging ON
1. Peer-to-Peer Network connection] and OFF, user identification,
It is also known as P2P network. It relies on billing and session management.
n

computing power at the edges of a connection Transport Layer It decides whether transmission
O

rather than in the network itself. [Transmission should be parallel or single path,
P2P network is used for sharing content like audio, Control Protocol multi-plexing, splitting or
h

(TCP) accurate data] segmenting the data, to break


video, data or anything in the digital format. data into smaller units for
c

In P2P connection, a couple of computers are efficient handling, packet


ar

connected via a Universal Serial Bus (USB) to filtering.


Se

transfer files. In peer-to-peer networking, each or Network Layer Routing of the signals, divide the
every computer can work as server or client. [Internet Protocol outgoing message into packets,
(IP) routers] to act as network controller for
2. Client-Server Network routing data.
The model of interaction between two application Data Link Layer Synchronisation, error detection
programs in which a program at one end (client) [Media Access and correction. To assemble
requests a service from a program at the other end Control (MAC) outgoing messages into frames.
switches]
(server).
Physical Layer Make and break connections,
It is a network architecture which separates the
[Signals-cables or define voltages and data rates,
client from the server. It is scalable architecture, operated by convert data bits into electrical
where one computer works as server and others as repeater] signal. Decide whether
client. Here, client acts as the active device and transmission is simplex, half
server behaves passively. duplex or full duplex.
Data Communication and Networking 119

In OSI model, physical layer is the lowest layer 3. Packet Switching It refers to the method
which is implemented on both hardware and of digital networking communication that
software and application layer is the highest layer. combined all transmitted data regardless of
content, type or structure into suitable sized
Computer Network Addressing blocks known as packets.
Network addresses are always logical, i.e. these are 4. Public Switched Telephone Network (PSTN)
software based addresses which can be changed by It is designed for telephone, which requires
appropriate configurations. modem for data communication. It is used for
A network address always points to host/node/ FAX machine also.
server or it can represent a whole network. 5. Integrated Services Digital Network (ISDN)
It is used for voice, video and data services. It

df
Network address is always configured on network
interface card and is generally mapped by system uses digital transmission and combines both

_p
with the MAC address of the machine for layer-2 circuit and packet switching.
communication. 6. Ethernet It is a widely used technology

na
There are different kinds of network addresses as employing a bus technology. An ethernet LAN
IP IPX AppleTalk consists of a single co-axial cable called Ether.
ap
It operates at 10 Mbps and provides a 48-bits
address. Fast ethernet operates at 100 Mbps.
Terms Related to
:@
7. Token It is a small message used to pass
Computer Network between one station to another.
1. Multi-plexing It is a technique used for
Tit-Bits
TG

transmitting signals simultaneously over a


common medium. It involves single path and ■ Bandwidth determines the data transfer rate which is
multiple channels for data communication. measured in Cycle Per Second (CPS) or Hertz (Hz).
n

2. Code Division Multiple Access (CDMA) It ■


Throughput is the amount of data that is actually
O

transmitted between two computers. It is specified


is a channel access method used by various
in bits per second (bps). Giga bits per second
radio communication technologies. (Gbps) is the fastest speed unit per data
h

CDMA employs spread spectrum technology transmission.


c

and a special coding scheme, where each ■


GPS (Global Positioning System) is a global
ar

transmitter is assigned a code to allow multiple navigation satellite system that provides location,
velocity and time synchronisation. GPS is
users to be multi-plexed over the same physical
Se

everywhere. You can find GPS system in your car,


channel. your smartphone and your watch.
120 Learn, Revise & Practice ~ Computer Awareness

QUESTION BANK
1. ......... is the transmission of data between 9. Which of the following cables can transmit
two or more computers over data at high speed? [IBPS Clerk 2014]
communication links. (1) Flat cable (2) Co-axial cable
(1) Communication (2) Networking (3) Optic fibre cable (4) Twisted pair cable
(3) Data communication (4) Data networking (5) UTP cable
2. Communication channel having.........type(s). 10. Which Indian state decided to implement

df
(1) 1 (2) 2 (3) 3 (4) 4 Bharat Net Service which will connect all
3. In simplex channel, flow of data is the village panchayats through optical fibre?

_p
(1) always in one direction [RRB NTPC 2016]
(2) always in both direction A. Maharashtra B. Punjab

na
(3) in both direction, but one at a time C. Tamil Nadu D. Uttar Pradesh
(4) All of the above 1. D 2. B 3. A 4. C
4. Communication between a computer and a
keyboard involves ........ transmission.
ap
11. Networking using fibre optic cable is done
as [RBI Grade B 2012]
(1) it has high bandwidth
:@
[IBPS Clerk Mains 2017]
(1) Automatic (2) Half duplex (2) it is thin and light
(3) Full-duplex (4) Simplex (3) it is not affected by electro magnetic
interference/power surges, etc
TG

(5) None of these


(4) All of the above
5. Mobile phone is an example of which type (5) None of the above
of communication channel?
12. Which of the following is not a property of
n

(1) Simplex (2) Half duplex


(3) Full duplex (4) None of these fibre optic cabling? [IBPS Clerk Mains 2017]
O

(1) Transmits at faster speed than copper cabling


6. Which of the following is not a property of (2) Easier to capture a signal from the copper
h

twisted pair cabling? cabling


c

(1) Twisted pair cabling is a relatively low speed (3) Very resistant to interference
ar

transmission (4) Carries signals as light waves


(2) The wires can be shielded (5) Less attenuation
Se

(3) The wires can be unshielded


(4) Twisted pair cable carries signals as light 13. A device that connects to a network without
waves the use of cables is said to be
[IBPS Clerk 2012, RBI Grade B 2012]
7. In twisted pair, wires are twisted together, (1) distributed (2) cabled
which are surrounded by an insulating (3) centralised (4) open source
material and an outer layer called (5) wireless
(1) frame (2) cover
(3) disk (4) block 14. Which of the following is the fastest
(5) jacket
communication channel?
(1) Radiowave
8. Which of the following is the greatest (2) Microwave
advantage of co-axial cabling? (3) Optical fibre
(1) High security (2) Physical dimensions (4) All are operating at nearly the same
(3) Long distances (4) Easily tapped propagation speed
Data Communication and Networking 121

15. Bandwidth refers to [RBI Grade B 2013] 21. What type of resource is most likely to be a
(1) the cost of the cable required to implement a shared common resource in a computer
WAN network? [Allahabad Bank Clerk 2010]
(2) the cost of the cable required to implement a (1) Printers
LAN (2) Speakers
(3) the amount of information a peer-to-peer (3) Floppy disk drives
network can store (4) Keyboards
(4) the amount of information a communication (5) None of the above
medium can transfer in a given amount of
time 22. The first network that has planted the seeds
(5) None of the above of Internet was

df
(1) ARPANET (2) NSFnet
16. Which of the following represents the
(3) V-net (4) I-net
fastest data transmission speed?

_p
[SBI Clerk 2012] 23. Pathways that support communication
(1) Bandwidth (2) bps among the various electronic components on

na
(3) gbps (4) kbps the system board are called [SBI PO 2014]
(5) mbps (1) network lines (2) processors
17. A(n) ......... is composed of several computers
ap(3) logic paths (4) bus lines
connected together to share resources and (5) gateway
:@

data. [RBI Grade B 2014] 24. What do we call a network whose elements
(1) Internet (2) Network may be separated by some distance? It
(3) Backbone (4) Hyperlink usually involves two or more network and
TG

(5) Protocol dedicated high speed telephone lines.


[SBI Clerk 2015]
18. What do we call for the arrangement when
two or more computers physically (1) LAN (2) WAN
n

(3) URL (4) Server


connected by cables to share information or
O

(5) World Wide Web


hardware? [SBI Clerk 2015]
(1) URL (2) Network 25. LAN can use ......... architecture.
h

(3) Server (4) Internet (1) peer-to-peer


c

(5) Modem (2) client and server


ar

(3) Both (1) and (2)


19. A combination of hardware and software (4) Neither (1) nor (2)
Se

that allows communication and electronic


transfer of information between computers 26. Ethernet, token ring and token bus are types
is a [SBI Clerk 2012]
of [SBI Associates 2012, RBI Grade B 2014]
(1) WAN
(1) network (2) backup system
(2) LAN
(3) server (4) peripheral
(3) communication channels
(5) modem (4) physical media
20. Which of the following terms is associated (5) None of the above
with networks? [SBI Clerk 2014] 27. The advantage of LAN is [SBI Clerk 2012]
(1) MS-Excel (1) sharing peripherals
(2) Mouse (2) backing up your data
(3) Word (3) saving all your data
(4) Connectivity (4) accessing the web
(5) Plotter (5) automatic printing of data
122 Learn, Revise & Practice ~ Computer Awareness

28. Computer connected to a LAN can ……… . 36. A protocol is a set of rules governing a time
[IBPS Clerk 2013] sequence of events that must take place
(1) run faster (1) between peers (2) between an interface
(2) share information and/or share peripheral (3) between modems (4) across an interface
equipment
37. A ……… is an agreement between the
(3) go online
communication parties on how
(4) E-mail
communication is to proceed. [SSC CGL 2016]
(5) None of the above
(1) Path (2) SLA
29. ......... allows LAN users to share computer (3) Bond (4) Protocol
programs and data.
(1) Communication server
38. A device operating at the physical layer is

df
called a
(2) Print server
(1) bridge (2) router

_p
(3) File server
(3) repeater (4) All of these
(4) All of the above
39. Which of the following devices that joins

na
30. What is the use of bridge in network? multiple computers together within one
(1) To connect LANs
LAN?
(2)
(3)
To separate LANs
To control network speed
ap(1) Repeater
(3) Gateway
(2) Hub
(4) Switch
:@
(4) All of the above (5) Router
31. Which of the following items is not used in 40. Which of the following is used for
Local Area Network (LAN)? [SSC CGL 2012] modulation and demodulation?
TG

(1) Interface card (2) Cable (1) Modem (2) Protocols


(3) Computer (4) Modem (3) Gateway (4) Multi-plexer
(5) None of these
32. Which type of network would use phone
n

lines? [IBPS Clerk 2015] 41. What is the name of the derive that links
your computer with other computers and
O

(1) WAN (2) LAN


information services through telephone
(3) WWAN (4) Wireless lines? [SBI Clerk 2015]
h

(5) None of these (1) Modem (2) LAN


c

33. Which of the following refers to a small, (3) URL (4) WAN
ar

single-site network? (5) Server


Se

(1) PAN (2) DSL 42. What is the function of a modem?


(3) RAM (4) USB [RBI Grade B 2012]
(5) CPU (1) Encryption and decryption
(2) Converts data to voice and vice- versa
34. These servers store and manage files for (3) Converts analog signals to digital signals and
network users. vice-versa
(1) Authentication (2) Main (4) Serves as a hardware anti-virus
(3) Web (4) File (5) None of the above
35. ……… is the most important/powerful 43. The hardware device or software program
computer in a typical network. that sends messages between network is
[SBI PO 2013] known as a [IBPS Clerk 2014]
(1) Desktop (2) Network client (1) bridge (2) backbone
(3) Network server (4) Network station (3) router (4) gateway
(5) Network switch (5) Other than those given as options
Data Communication and Networking 123

44. Which of the following is not a network device? 53. Which is the highest reliability topology?
(1) Router (2) Switch [IBPS RRB PO Mains 2018]
(3) Bus (4) Bridge (1) Mesh topology (2) Tree topology
45. Geometric arrangement of devices on the (3) Bus topology (4) Star topology
network is called (5) None of these
(1) topology (2) protocol 54. P2P is a ......... application architecture.
(3) media (4) LAN [IBPS Clerk 2012]
(1) client/server (2) distributed
46. Which of the following topologies is not of
(3) centralised (4) 1-tier
broadcast type?
(5) None of these
(1) Star (2) Bus

df
(3) Ring (4) All of these 55. A packet filtering firewall operates at which
of the following OSI layers?

_p
47. Network components are connected to the
(1) At the application layer
same cable in the ......... topology. (2) At the transport layer

na
(1) star (2) ring (3) At the network layer
(3) bus (4) mesh (4) At the gateway layer
(5) tree ap
56. Encryption and decryption are the functions
48. Hub is associated with ……… network.
of
:@
[SBI Clerk 2011]
(1) transport layer (2) session layer
(1) bus (2) ring
(3) presentation layer (4) All of these
(3) star (4) mesh
57. Name the fourth layer of OSI model.
TG

(5) All of these


[SBI PO 2014]
49. In a ring topology, the computer in (1) Application layer (2) Data link layer
possession of the ......... can transmit data. (3) Transport layer (4) Session layer
n

(1) packet (2) data (5) None of these


O

(3) access method (4) token


58. In OSI network architecture, the routing is
50. In which topology, every node is connected performed by [IBPS Clerk 2012]
h

to two other nodes? (1) Network layer (2) Data link layer
c

[IBPS RRB PO Mains 2018]


(3) Transport layer (4) Session layer
ar

(1) Bus topology (2) Ring topology (5) None of these


(3) Star topology (4) Mesh topology
Se

(5) None of these


59. In the following list of devices which device
is used in network layer? [SSC CGL 2016]
51. Which is the name of the network topology (1) Repeaters
in which there are bi-directional links (2) Router
between each possible node? [SSC CGL 2012] (3) Application Gateway
(1) Ring (2) Star (4) Switch
(3) Tree (4) Mesh
60. Switches work on which OSI layer?
52. An alternate name for the completely (1) Data link layer
inter-connected network topology is (2) Physical layer
[SSC CGL 2012]
(3) Transport layer
(1) mesh (2) star
(4) Network layer
(3) tree (4) ring
(5) Application layer
124 Learn, Revise & Practice ~ Computer Awareness

61. In IT networking, which of the following 65. How many bits are there in the ethernet
device is used in physical layer? address? [SBI Clerk 2011]
[SSC CGL 2016] (1) 64 bits (2) 48 bits
(1) Repeater (3) 32 bits (4) 16 bits
(2) Router (5) None of these
(3) Transport Gateway 66. Ethernet uses
(4) Bridge (1) bus topology
62. Multi-plexing involves ……… path(s) and (2) ring topology
……… channel(s). [SBI Clerk 2011] (3) mesh topology
(1) one, one (4) All of the above

df
(2) one, multiple 67. In networks, a small message used to pass
(3) multiple, one between one station to another is known as

_p
(4) multiple, multiple [SSC CGL 2016]
(5) None of the above (1) Token (2) Byte

na
63. A processor that collects the transmissions (3) Word (4) Ring
from several communication media and send 68. ISDN is a tele-communication technology,
them over a single line that operates at a
higher capacity is called [RBI Grade B 2013]
apwhere [UPSSSC 2016]
(a) Voice, video and data all are transmitted
:@
(1) multi-plexer (2) bridge simultaneously
(3) hub (4) router (b) Only sound is transmitted
(5) None of these (c) Only video is transmitted
TG

64. To send data/message to and from (d) Only data is transmitted


computers, the network software puts the 69. What is the frequency range of data
message information in a transmission under computer system?
n

(1) NIC (2) packet [UPSSSC Village Panchayat Officer]


O

(3) trailer (4) header (a) Band (b) Bandwidth


(5) None of these (c) Byte (d) Bit
c h

ANSWERS
ar

1. (3) 2. (3) 3. (1) 4. (4) 5. (3) 6. (4) 7. (5) 8. (2) 9. (3) 10. (4)
Se

11. (4) 12. (3) 13. (5) 14. (2) 15. (4) 16. (3) 17. (2) 18. (2) 19. (1) 20. (4)
21. (1) 22. (1) 23. (2) 24. (1) 25. (3) 26. (2) 27. (1) 28. (2) 29. (3) 30. (1)
31. (4) 32. (1) 33. (1) 34. (4) 35. (3) 36. (4) 37. (4) 38. (3) 39. (4) 40. (1)
41. (1) 42. (3) 43. (5) 44. (3) 45. (1) 46. (2) 47. (3) 48. (3) 49. (4) 50. (2)
51. (4) 52. (1) 53. (1) 54. (1) 55. (1) 56. (3) 57. (3) 58. (1) 59. (2) 60. (1)
61. (1) 62. (2) 63. (1) 64. (2) 65. (2) 66. (1) 67. (1) 68. (1) 69. (2)
Internet And Its Services 125

C H A P T E R

13
INTERNET AND

df
_p
ITS SERVICES
na
ap
:@

The Internet is a worldwide network of computers organisations and people started working to
that are able to exchange information with each build their own networks, which were later
TG

other. Internet stands for International Network, inter-connected with ARPANET and NSFnet to
which began in 1950’s by Vint Cerf known as the form the Internet.
Father of Internet.
Advantages of Internet
n

Internet is a ‘network of networks’ that consists


The advantages of Internet are as follows
O

millions of private and public networks of local to


Allows you to easily communicate with other
global scope. Basically, network is a group of two
people.
h

or more computer systems linked together.


Global reach enables one to connect anyone on
c

History of Internet the Internet.


ar

In 1969, the University of California at Los Angeles, Publishing documents on the Internet saves
paper.
Se

and the University of Utah were connected for the


beginning of the ARPANET (Advanced Research A valuable resource for companies to advertise
Projects Agency Network) using 50 kbits circuits. It and conduct business.
was the world’s first operational packet switching Greater access to information reduces research
network. The goal of this project was to connect time.
computers at different universities and U.S. defence.
Disadvantages of Internet
In mid 80’s another federal agency, the National
The disadvantages of the Internet are as follows
Science Foundation, created a new high capacity
network called NSFnet, which was more capable It is a major source of computer viruses.
than ARPANET. Messages sent across the Internet can be easily
intercepted and are open to abuse by others.
The only drawback of NSFnet was that it allowed
only the academic research on its network and not Much of the information is not checked and may
any kind of private business on it. So, private be incorrect or irrelevant.
126 Learn, Revise & Practice ~ Computer Awareness

Unsuitable and undesirable material available outlet and the other to a computer. They
that sometimes is used by notorious people such provide transmission speed of 1.5 Mbps or
as terrorists. more.
Cyber frauds may take place involving Credit/ 3. Broadband over Power Line (BPL) BPL is
Debit card numbers and details. the delivery of broadband over the existing
low and medium voltage electric power
Internet Connections distribution network. Its transfer speed is upto
Bandwidth and cost are the two factors that help 3 Mbps.
you in deciding which Internet connection is to BPL is good for areas, where there are no
use. The speed of Internet access depends on the other broadband connections, but power
bandwidth. infrastructure exists. For example, rural areas.

df
Some of the Internet connections available for Internet
Wireless Connection

_p
access are as follows
Wireless broadband connects a home or business to
Dial-Up Connection the Internet using a radio link between the

na
Dial-up is a method of connecting to the Internet customer’s location and the service provider’s
using an existing telephone. When a user initiates a facility. Wireless broadband can be mobile or fixed.
dial-up connection, the modem dials a phone
number of an Internet Service Provider (ISP) that is
ap
Unlike DSL and cable, wireless broadband requires
neither modem nor cables. It can be easily
:@
designated to receive dial-up calls. established in areas where it is not feasible to
The ISP then establishes the connection, which deploy DSL or cable.
usually takes about ten seconds and is accompanied Some ways to connect the Internet wirelessly are as
TG

by several beeping and buzzing sounds. Its transfer follows


speed is 56 kbit/s. 1. Wireless Fidelity (Wi-Fi) It is a universal
Broadband Connection wireless networking technology that utilises
n

The term ‘broadband’ commonly refers to high radio frequencies to transfer data. Wi-Fi allows
O

speed Internet access that is always on and faster high speed Internet connections without the
than the traditional dial-up access. It uses a telephone use of cables or wires. Wi-Fi networks can be
h

line to connect to the Internet. The transfer speed use for public Internet access at ‘hotspot’ such
c

of broadband connection is 256 Kbit/s. as restaurants, coffee shops, hotels, airports,


ar

convention centers and city parks.


Broadband includes several high speed transmission
2. Worldwide Interoperability for Microwave
Se

technologies such as
Access (WiMAX) WiMAX systems are
1. Digital Subscriber Line (DSL) It is a expected to deliver broadband access services
popular broadband connection. It provides to residential and enterprise customers in an
Internet access by transmitting digital data economical way.
over the wires of a local telephone network.
It has the ability to provide service even in
DSL is the most common type of broadband
areas that are difficult for wired infrastructure
service. It uses the existing copper telephone
to reach and the ability to overcome the
lines. Its transfer speed is 256 kbits.
physical limitations of traditional wired
2. Cable Modem This service enables cable infrastructure.
operators to provide broadband using the 3. Mobile Wireless Broadband Services These
same co-axial cables that deliver pictures and services are also becoming available from mobile
sound to your TV set. telephone service providers and others. These
Most cable modems are external devices that services are generally appropriate for mobile
have two connections, one to the cable wall customers and require a special PC card with a
Internet And Its Services 127

built-in antenna that plugs into a user’s 3. HyperText Transfer Protocol (HTTP) HTTP
computer. Generally, they provide lower defines how messages are formatted and
speeds in the range of several hundred kbps. transmitted and what actions should be taken
by the Web servers and browsers in response
Intranet is a private network for Internet tools, but
available within an organisation. In large
to various commands.
organisation, Intranet allows an easy access to
corporate information for employees. HyperText Markup Language (HTML)
Extranet is a private network that uses the Internet It is used for designing Web pages. A markup
protocol and the public tele-communication system language is a set of markup (angular bracket, <>)
to securely share part of a business information. tags which tells the Web browser how to display the
Podcast is a form of audio broadcasting on the web. Web page’s words and images for the user. Each

df
It can be listened to on the go, while commuting to individual markup code is referred to as an element
office or even while working. or tag.

_p
4. Telnet Protocol Telnet is a program that runs
Interconnecting Protocols

na
on the computer and connects PC to a server on
A protocol is a set of rules that govern data the network. Telnet session starts by entering
communications. It defines what is communicated, ap
valid username and password.
how it is communicated and when it is
communicated. 5. Usenet Protocol The usenet service allows a
:@
group of Internet users to exchange their
Some of the protocols generally used to communicate views/ideas and information on some common
via Internet are as follows topic that is of interest to all the members
1. Transmission Control Protocol/Internet
TG

belonging to that group.


Protocol (TCP/IP) Several such groups exist on the Internet are
(a) Transmission Control Protocol (TCP) It called newsgroups. Usenet has no central
provides reliable transport service, i.e. it server or administration.
n

ensures that message sent (from sender to


O

6. Point-to-Point Protocol (PPP) It is a dial


receiver) is properly routed. TCP converts account which puts your computer directly on
messages into a set of packets at the source the Internet. A modem is required for such
h

which are then reassembled back into connection which transmits the data at 9600
c

messages at the destination.


bits per second.
ar

(b) Internet Protocol (IP) It allows different


7. Simple Mail Transfer Protocol (SMTP) It is
computers to communicate by creating a
Se

the standard protocol for E-mail services on a


network of networks. IP handles the
TCP/IP network. It provides the ability to send
dispatch of packets over the network. It
and receive E-mail messages.
maintains the addressing of packets with
multiple standards. Each IP packet must 8. Wireless Application Protocol (WAP) A
contain the source and the destination WAP browser is a commonly used Web browser
addresses. for small mobile devices such as cell phones.
Note An IP address is a 32 bit number. 9. Voice over Internet Protocol (VoIP) It allows
2. File Transfer Protocol (FTP) It can transfer delivery of voice communication over ‘IP’
files between any computers that have an networks. For example, IP calls.
Internet connection and also works between 10. Post Office Protocol version 3 (POP3) It is an
computers using totally different operating Internet standard protocol used by local email
systems. Some examples of FTP software are software clients to retrieve emails from a
FileZilla, Kasablanca, gFTP, Konqueror, etc. remote mail server over a TCP/IP connection.
128 Learn, Revise & Practice ~ Computer Awareness

files, folders and websites with the help of a


Terms Related to Internet browser.
World Wide Web (WWW) Note F11 key on a windows keyboard sets to full screen
The world wide web is a system of Internet servers mode in most browsers.
that supports hypertext and multimedia to access The two types of Web browser are as follow
several Internet protocols on a single interface. 1. Text Web Browser A Web browser that
WWW was introduced on 13th March, 1989. displays only text-based information is known
The world wide web is often abbreviated as the as text web browser. For example, Lynx, which
Web or WWW. The world wide web is a way of provides access to the Internet in the text mode
exchanging information between computers on the only.
Internet. 2. Graphical Web Browser A Web browser

df
that supports both text and graphic information
Web Page is known as graphical web browser. For

_p
The backbone of the world wide web is made of example, Internet Explorer, Firefox, Netscape,
files, called pages or Web pages, containing Safari, Google Chrome and Opera.

na
information and links to resources - both text and
Note The first graphical web browser was NCSA Mosaic.
multimedia - throughout the Internet. It is created
using HTML. Web Server
ap
There are basically two main types of web page i.e., A web server is a computer that runs websites. The
server computer will deliver those Web pages to
:@
static and dynamic. The main or first page of a
Website is known as home page. the computers that request them and may also do
Note Bookmarks are links to web pages that make it easy other processing with the Web pages. The web
to get back to your favourite page. browser is a client that requests HTML files from
TG

Hyperlink is a piece of text which connects Web servers.


different documents on a web page. It is a reference Every Web server that is connected to the Internet
data that the user can follow by simply clicking on is given a unique address, i.e. IP address, made up of
n

it. a series of four numbers between 0 to 255 separated


O

by periods (.). For example, Apache HTTP Server,


Website
Internet Information Services (IIS), Lighttpd, etc.
h

A group of Web pages that follow the same theme


Note Cookie is a small message given to a web browser
c

and are connected together with hyperlinks is by a web server. It stores information about the
ar

called Website. user’s web activity.


In other words, “A Website is a collection of digital Web Address and URL
Se

documents, primarily HTML files, that are linked A Web address identifies the location of a specific
together and that exist on the Web under the same Web page on the Internet, such as http://www.
domain.” learnyoga.com.
For example, http://www.carwale.com is a Website
On the Web, Web addresses are called URLs. It
while http://www.carwale.com/new/ is a Web
stands for Uniform Resource Locator. Tim Berners
page.
Lee created the first URL in 1991 to allow the
Web Browser publishing of hyperlinks on the world wide web.
It is a software application that is used to locate, For example, ‘‘http://www. google.com/services/
retrieve and display content on the world wide index.htm’’
web, including Web pages. Web browsers are http:// — Protocol identifier
programs used to explore the Internet. www — World Wide Web
google.com — Domain name
We can install more than one Web browser on a /services/ — Directory
single computer. The user can navigate through index.htm — Web page
Internet And Its Services 129

Domain Name Newsgroup


Domain is a group of network resources assigned A newsgroup is an online discussion forum
to a group of users. A domain name is a way to accessible through usenet, devoted to discussion on
identify and locate computers connected to the a specified topic.
Internet. A domain name must be unique. It always Online discussion group allows interaction through
have two or more parts, separated by period/dot (⋅). electronic bulletin board system and chat sessions.
For example, google.com, yahoo.com, etc.
Search Engine
Domain Abbreviation It is a Website that provides the required data on
Domains are organised by the type of organisations specific topics. Search engines turn the Web into a
and the country. A three-letter abbreviation powerful tool for finding information on any topic.

df
indicating the organisation and usually two-letter When a search engine returns the links to web
abbreviation indicates the country name. pages corresponding to the keywords entered is

_p
Most common domain abbreviations for called a hit, otherwise called a miss.
organisation are as follow Many search engines also have directories or lists

na
.info Informational organisation of topics that are organised into categories.
.com Commercial Browsing these directories, is also a very efficient
.gov
.edu
Government
Educational
ap
way to find information on a given topic.
Here are some of the most popular search engines
:@
.mil Military
.net Network resources Google http://www.google.com
.org Non-profit organisation AltaVista http://www.altavista.com
Some domain abbreviations for country are as Yahoo http://www.yahoo.com
TG

follow Hotbot http://www.hotbot.com


.in India Lycos http://www.lycos.com
.au Australia Excite http://www.excite.com
n

.fr France WebCrawler http://www.webcrawler.com


O

.nz New Zealand Note Project loan is a search engine project by Google for
.uk United Kingdom providing internet access to rural and remote areas
using high altitude helium filled balloons.
h

Domain Name System (DNS)


c

Services of Internet
DNS stores and associates many types of information
ar

with domain names, but most importantly, it An Internet user can access to a wide variety of
translates domain names (computers host names) to services such as electronic mail, file transfer,
Se

IP addresses. It also lists mail exchange servers interest group membership, multimedia displays,
accepting E-mail for each domain. DNS is an real-time broadcasting, shopping, etc.
essential component of contemporary Internet use. Some of the important services provided by the
Internet are described below
Blog
A blog is a Website or Web page in which an Chatting
individual records opinions and links to other site It is the online textual or multimedia conversation.
on regular basis. A typical blog combines text, It is a widely interactive communication process
images, and links to other blogs, web pages and that takes place over the Internet.
media related to its topic. Chatting, i.e. a virtual means of communication that
Most blogs are primarily textual, although some involves the sending and receiving of messages,
focus on art, photographs, videos, music and audio. sharing audio and video between users located in
These blogs are referred to as edublogs. The entries any part of the world.
of a blog is also known as posts. For example, Skype, Yahoo, Messenger, etc.
130 Learn, Revise & Practice ~ Computer Awareness

E-Mail (Electronic Mail) E-Shopping


E-mail is an electronic version of sending and E-Shopping (Electronic Shopping) or online
receiving letter. Electronic mail lets you send and shopping is the process of buying goods and
receive messages in electronic form. services from merchants who sell on the Internet.
E-mail address consists of two parts separated by @ Books, clothing, household appliances, toys,
symbol – the first part is user name and the second hardware, software and health insurance are just
part is host name (domain name). However, spaces some of the hundreds of products, consumers can
are not allowed within the E-mail address. buy from an online store. Some E-shopping sites are
For example, [email protected] Naaptol, Flipkart, Yebbi, Homeshop 18, etc.
Here, arihantbooks is a username and gmail.com is a E-Reservation

df
host name. E-Reservation (Electronic Reservation) means
E-mail is transmitted between computer systems, making a reservation for a service via Internet. You

_p
which exchange messages or pass them onto other need not personally go to an office or a counter to
sites according to certain Internet protocols or book/reserve railways and airways tickets, hotel

na
rules for exchanging E-mail. rooms, tourist packages, etc.
To use E-mail, a user must have an E-mail address.
Emoticons or smileys are used in an E-mail to
express emotions or feelings clearly. Storage area
ap
Social Networking
It is the use of Internet based social media programs
:@
for E-mail messages is called mail box. to make connections with friends, family,
classmates, customers, clients, etc. It can be for
Video-Conferencing social purposes, business purposes or both.
It is a communication technology that integrates
TG

video and audio to connect users anywhere in the Social networking has grown to become one of the
world as if they were in the same room. largest and most influential component of the web.
The most popular social networking sites are
This term usually refers to communication
n

Facebook, MySpace, Orkut, etc.


between three or more users who are in atleast two
O

locations. Each user or group of users who are


Common Social Networking
participating in a video-conference typically must
Sites
h

have a computer, a camera, a microphone, a video


c

screen and a sound system. LinkedIn


ar

E-Learning LinkedIn is an American site which provides


business and employment oriented services. It was
Se

E-Learning (Electronic Learning) refers to the


electronic mode of delivering learning, training or founded by Reid Hoffman in 2002.
educational programs to users. It is the mode of LinkedIn is a platform that allows business people
acquiring knowledge by means of the Internet and and professionals all over the world, regardless of
computer based training programs. their industry, to connect with other professionals.
It’s great for meeting customers, getting in touch
E-Banking
with vendors, recruiting new employees and
E-Banking (Electronic Banking) is also known as
keeping up with the latest updates in business or
Internet Banking or Online Banking.
industry news.
E-Banking means that any user with a personal
computer and a browser can get connected to his Facebook
bank’s website to perform any of the virtual Facebook is an American social networking site
banking functions. All the services that the bank which was founded in 2004 by Mark Zuckerberg. It
has permitted on the Internet are displayed in the helps the users to connect with their family, friends
menu. and one they know or want to know.
Internet And Its Services 131

Facebook allows you to upload photos and maintain It involves new technologies, services and business
photo albums that can be shared with your friends. models.
It supports interactive online chat and the ability to Note Mobile commerce was launched in 1997 by Kevin
Duffey.
comment on your friends’s profile pages to keep in
touch.
Tit-Bits
Twitter
■ Cluster is a group of servers that share work and
It is an American company which provides social may be able to back each other up if one server fails.
networking services. Besides this, Twitter also ■ With the Webmail Interface, E-mails are accessible
provides online news. from anywhere in the world.
Twitter was founded in 2006 by Jack Dorsey, Noah Rich Text Formatting helps the sender (of E-mail)

df

Glass, Biz Stone and Evan Williams. It enables the format the contents of his/her E-mail message by

_p
user to send and read short 280 characters applying font, size, bold, italic, etc.
messages called tweets.
Video-Conferencing Apps

na
Registered users can read and post tweets while
those who are not registered can only read them. 1. Zoom
It is a proprietary software developed by Zoom
ap
Instagram
Video Communications, in September, 2012. It is
It is a free, online photo sharing application and compatible with Windows, MacOs, iOS, Android,
:@
social network platform that was acquired by Chrome OS and Linux.
Facebook in 2012. Instagram allows users to edit
and upload photos and short videos through a This platform is free for video-conferences of upto
100 participants at once, with a 40 minutes time
TG

mobile app.
limit. For longer or larger conferences with more
Users can add a caption to each of their posts and features, paid subscriptions are available, costing
use hashtages and location based geotags to index $15-20 per month.
n

these posts and make them searchable by other


The highest plan supports upto 1000 concurrent
O

users within the app.


participants for meetings lasting upto 30 hours.
E-Commerce Zoom security features include password-protected
h

E-Commerce (Electronic Commerce) includes meetings, user authentication, waiting rooms,


c

sharing business information, maintaining business locked meetings, etc.


ar

relationships and conducting business transactions


by means of tele-communication networks or 2. Google Meet
Se

process of trading goods over the Internet. It is a video communciation service developed by
Electronic Data Interchange (EDI) is the electronic Google, in 2017. It can run seamlessly on Android,
transfer of a business transaction between sender iOS and Web platforms.
or receiver. It can have upto 100 free participants for a time
Note E-trading is the process of trading goods and items limit of 60 minutes. It can have 16 people on screen
over the Internet. at a particular time. It can cost between $6 and $12
M-Commerce per month for paid version.
M-Commerce (Mobile Commerce) provides the 3. Microsoft Teams
application for buying and selling goods or services It is a proprietary business communication platform
through wireless Internet enabled handheld developed by Microsoft, in 2017. It can schedule
devices.
132 Learn, Revise & Practice ~ Computer Awareness

unlimited number of meetings and for a limited August 2003. This app is compatible with Windows,
time i.e., upto 24 hours. It is compatible with Mac OS, Linux, Android, iOS, etc.
Windows, MaC, iOS and Android. Skype can support upto 50 participants on a single
Microsoft Teams requires a monthly subscription video-conference, which is free. If you want to
payment per user. invite more than 50 people on skype for meetings,
then you need to buy a paid subscription. The
4. Skype
maximum number of participants that can be a part
It is a proprietary tele-communications application
of the meeting is 250.
developed by Skype Technologies (Microsoft), in

QUESTION BANK

df
_p
1. The vast network of computers that 8. What does the acronym ISP stand for?

na
connects millions of people all over the [IBPS Clerk 2014]
(1) Internal Service Provider
world is called
(1) LAN
(3) Hypertext
(2) Web
(4) Internet
ap
(2) International Service Provider
(3) Internet Service Provider
(4) Internet Service Providing
:@

2. The Internet is a system of (5) Internet Service Provision


(1) software bundles
9. Your business has contracted with another
(2) web page
company to have them host and run an
TG

(3) website
(4) interconnected networks application for your company over the
Internet. The company providing this service
3. The Internet is to your business is called an
n

(1) a large network of networks (1) Internet Service Provider


O

(2) an internal communication system for a (2) Internet Access Provider


business
(3) Application Service Provider
(3) a communication system for the Indian
h

government (4) Application Access Provider


c

(4) All of the above 10. DSL is an example of which connection?


ar

4. The Internet allows to (1) Network (2) Wireless


(1) send electronic mail (3) Slow (4) Broadband
Se

(2) view Web pages 11. ……… networks can be used for public
(3) connect to servers all around the world internet access at hotspot such as
(4) All of the above restaurants, coffee shops, etc.
5. Which of the following is an example of (1) Wi-Fi (2) WiMAX
connectivity? (3) DSL (4) BPL
(1) Internet (2) Floppy disk 12. The standard protocol of the Internet is
(3) Power cord (4) Data (1) TCP/IP (2) Java
6. Internet was developed in the (3) HTML (4) Flash
(1) 1950s (2) 1960s 13. In computing, IP address means
(3) 1970s (4) 1980s (1) International Pin
7. Which of the following is not a type of (2) Internet Protocol
broadband Internet connection? (3) Invalid Pin
(1) Cable (2) DSL (3) Dial-up (4) BPL (4) Insert Pin
Internet And Its Services 133

14. Each IP packet must contain 21. In HTML, tags consist of keywords enclosed
(1) only source address [IBPS Clerk 2011] within [SSC CHSL 2013]
(2) only destination address (1) flower brackets (2) angular brackets <>
(3) source and destination addresses (3) parentheses () (4) square brackets [ ]
(4) source or destination address
(5) None of the above 22. Telnet is a [SSC CHSL 2012]
(1) search engine (2) browser
15. An IP address is ……… bit number. (3) protocol (4) gateway
[SSC CGL 2017]
(1) 8 bit (2) 16 bit (3) 32 bit (4) 64 bit
23. The ……… service allows a group of Internet
users to exchange their views on some
16. FTP can transfer files between any common topic.
computers that have an Internet connection.

df
(1) nicnet (2) milnet
Here, FTP stands for
(3) telnet (4) usenet

_p
(1) File Transfer Protocol
(2) Fast Text Processing
24. Which protocol provides E-mail facility
among different hosts? [RBI Grade B 2014]

na
(3) File Transmission Program
(1) SMTP (2) FTP
(4) Fast Transmission Processor (3) TELNET (4) SNMP
17. Which of the following is the
communication protocol that sets the
ap(5) None of these
25. What is the full form of VoIP?
:@
standard used by every computer that [Clerk Mains 2017]
accesses Web-based information? (1) Voice of Internet Power
(1) XML (2) DML (3) HTTP (4) HTML (2) Voice over Internet Protocol
TG

18. What is the full form of HTTP? (3) Voice on Internet Protocol
[IBPS Clerk 2014]
(4) Very optimised Internet Protocol
(1) HyperText Transfer Protocol 26. Which of the following protocols is used to
n

(2) HyperText Transition Protocol receive Email? [UPSSSC 2019]


O

(3) HyperText Transfer Program (a) SMTP (b) HTTP


(4) HyperText Transition Program (c) FTP (d) POP3
(5) HyperText Trivial Protocol
h

27. The Internet service that provides a


19. Documents converted to ......... can be
c

multimedia interface to available resources


published on the Web.
ar

[IBPS PO 2015] is called


(1) a doc file (1) FTP (2) world wide web
Se

(2) http (3) telnet (4) gopher


(3) other than those given as options
(4) machine language 28. The ………… uses an addressing scheme
(5) HTML known as URL indicate the location of files
on the web. [SSC CGL 2017]
20. HTML is used for designing Web pages. (1) java script (2) World Wide Web
Here, HTML stands for (3) SQL (4) String
[UPSSSC Junior Engineer 2015]
Or 29. The WWW is made up of the set of
interconnected ......... that are linked together
The web uses the ……… to request and serve
web pages and programs. [SSC CGL 2017] over the Internet.
(1) electronic documents
(1) High Transfer Machine Language
(2) High Transmission Markup Language (2) Web pages
(3) HyperText Markup Language (3) files
(4) Hyper Transfer Markup Language (4) All of the above
134 Learn, Revise & Practice ~ Computer Awareness

30. What is a Website? [RBI Grade B 2014] (1) sharing voice on the net
(1) A place from where we can get information in (2) live textual conferencing
documents and files (3) live audio conferencing
(2) A site that is owned by any particular (4) live real time conferencing
company (5) None of the above
(3) A location on the world wide web 38. To view information on the Web, you must
(4) A place from where we can access Internet have a [RBI Grade B 2012]
(5) None of the above (1) cable modem
31. A Website address is a unique name that (2) web browser
identifies a specific ......... on the Web. (3) domain name server
(4) hypertext viewer
(1) Web browser (2) Website

df
(5) None of these
(3) PDA (4) link
39. Which key on a windows keyboard sets to

_p
32. A (n) ……… appearing on a Web page opens
full screen mode in most browsers?
another document when clicked. [RRB NTPC 2016]

na
[SBI PO 2013]
(1) anchor (2) URL A. F1 B. F10 C. F11 D. F12
(1) D (2) B
(3) hyperlink (4) reference ap(3) A (4) C
(5) heading
40. In a web browser, which of the following is
33. A reference to data that reader can directly
:@
used to save frequently visited websites?
follow by selecting or hovering is [RRB NTPC 2016]
(1) hypertext (2) hyperlink A. History B. Task Manager
(3) hyper media (4) hyper markup
TG

C. Favourites D. Save as
34. A Website is a collection of [IBPS Clerk 2012] (1) A (2) B (3) C (4) D
(1) graphics (2) programs
41. The ……… which contains billions of
(3) algorithms (4) web pages
n

documents called Web pages, is one of the


(5) charts
O

more popular services on the Internet.


35. ……… is a collection of Web pages and ……… [SBI Clerk 2014]
is the very first page that we seen on
h

(1) Web server (2) Telnet


opening of Website. (3) Web (4) Collection
c

(1) Home page, Web page (5) None of these


ar

(2) Website, Home page


42. What is URL? [IBPS PO 2012]
Se

(3) Web page, Home page


(1) A computer software program
(4) Web page, Website
(2) A type of programming object
(5) None of the above
(3) The address of a document or ‘page’ on the
36. A browser is a [RBI Grade B 2013] world wide web
(1) tool for creating a database (4) An acronym for unlimited resource for
(2) software program to view Web pages on the learning
Internet (5) A piece of hardware
(3) printing device
43. Which of the following is used by the
(4) software program to delete a folder
(5) None of the above
browser to connect to the location of the
Internet resources? [IBPS Clerk 2011]
37. Conference (Netscape), Netmeeting (Internet (1) Linkers (2) Protocol
Explorer) enables (choose the option that best (3) Cable (4) URL
describes) [RBI Grade B 2012] (5) None of these
Internet And Its Services 135

44. An absolute ……… contains the complete 52. Which among the following is a search
address of a file on the internet. engine?
[SSC CGL 2017, (1) Internet Explorer (2) Flash
UPPS Computer Assistant 2019] (3) Google (4) Firefox
(1) JavaScript (2) URL 53. A ……… is the term used when a search
(3) SQL (4) String engine returns a Web page that matches the
45. Which of the following must be contained search criteria. [IBPS PO 2011]
in a URL? [IBPS PO 2012] (1) blog (2) hit (3) link (4) view
(1) A protocol identifier (5) success
(2) The letters, WWW 54. Project Loan is a search engine project by
(3) The unique registered domain name

df
…… for providing internet access to rural
(4) WWW and the unique registered domain name
and remote areas using high altitude helium

_p
(5) A protocol identifier, WWW and the unique
registered domain name
filled balloons. [RRB NTPC 2016]
A. Google B. Microsoft
46. URL identifies the location of a specific Web

na
C. Apple D. Yahoo
page on the Internet. Here URL stands for (1) D (2) C (3) B (4) A
(1) Uniform Read Locator ap
(2) Uniform Resource Locator
55. Which of the following is always a part of
(3) Unicode Research Location E-mail address?
:@
(4) United Research Locator (1) Period (.) (2) At rate (@)
(5) None of the above (3) Space () (4) Underscore (_)
(5) Angular Bracket (<)
47. Which among the following terms
TG

means/refers to web address of a page? 56. Which one of the following is not an e-mail
service provider?
(1) SMTP (2) IP (3) HTTP (4) URL
(1) Hotmail (2) Gmail
(5) MAC
(3) Bing (4) Yahoo mail
n

48. The last three letters of the domain name (5) Outlook
O

describes the type of [SSC FCI 2012]


57. Junk e-mail is also called [RBI Grade B 2012]
(1) organisation (domain name)
(1) crap (2) spoof (3) sniffer script
h

(2) connectivity (4) spool (5) spam


c

(3) server
58. Which of the following is a valid e-mail
ar

(4) protocol
address?
49. An educational institution would generally
Se

(1) name. Website@info@ed


have the following in its domain name. (2) name. [email protected]
[IBPS Clerk 2011]
(3) name. @Website.info.com
(1) .org (2) .edu (3) .inst (4) .com
(3) Website. [email protected]
(5) .sch
(5) [email protected]
50. Which of the following domains is used by 59. What is included in an E-mail address?
profit business? [SBI Clerk 2012] (1) Domain name followed by user’s name
(1) .com (2) .edu (3) .mil (4) .net (2) User’s name followed by domain name
(5) .org (3) User’s name followed by postal address
51. Specialised programs that assist users in (4) User’s name followed by street address
locating information on the Web are called (5) None of the above
[RBI Grade B 2012] 60. Which of the following elements are used in an
(1) information engines (2) locator engines e-mail to express emotions or feelings clearly?
(3) Web browsers (4) resource locators (1) Acronyms (2) Abbreviations
(5) search engines (3) Rich text (4) Emoticons or smileys
136 Learn, Revise & Practice ~ Computer Awareness

61. If you receive an E-mail from someone you 67. The process of trading goods over the
don’t know, what should you do? Internet is known as [IBPS Clerk 2012]
(1) Forward it to the police immediately (1) E-selling n buying (2) E-trading
(2) Delete it without opening it (3) E-finance (4) E-salesmanship
(3) Open it and respond to them saying you don’t (5) E-commerce
know them
(4) Reply and ask them for their personal 68. A cookie [IBPS Clerk 2012]
information (1) stores information about the user’s web
activity
62. Which of the following is not a term (2) stores software developed by the user
pertaining to E-mail? [IBPS Clerk 2015] (3) stores the password of the user
(1) PowerPoint (2) Inbox (4) stores the commands used by the user

df
(3) Sender (4) Receiver (5) None of the above
(5) None of these

_p
69. Which of the following is most commonly
63. Storage area for E-mail messages is called used to identify return visitors to a website?
(1) folder (2) file (1) Logged-in visitors

na
(3) mail box (4) directory (2) Digital certificates
64. An E-mail address typically consists of a (3) Electronic time stamping
User ID followed by the………sign and the ap (4) Cookies
domain name that manages the user’s 70. Which of the following terms is associated
:@
electronic post office box. with Internet E-mail? [SBI Clerk 2014]
(1) # (2) @ (1) Plotter (2) Slide Presentation
(3) & (4) $ (3) Bookmark (4) Pie Chart
TG

65. Video-conferencing is used for (5) Microsoft Excel


(1) talking to each other 71. A stored link to a Web page, in order to
(2) communicating purpose have a quick and easy access to is later, is
n

(3) live conversation called [RBI Grade B 2014]


(4) All of the above
O

(1) WP-Link (2) Bookmark


66. Who is the founder of ‘facebook’ which is (3) Field (4) Length
(5) None of these
h

currently the No. 1 social networking


c

Website in India? [SSC CGL 2013] 72. A host on the Internet finds another host by
ar

(1) Orkut Buycukkokten its [RBI Grade B 2014]


(2) Mark Zuckerberg (1) postal address (2) electronic address
Se

(3) Bill Gates (3) IP address (4) name


(4) Martin Cooper (5) None of these

ANSWERS
1. (4) 2. (4) 3. (4) 4. (4) 5. (1) 6. (1) 7. (3) 8. (3) 9. (1) 10. (4)
11. (1) 12. (1) 13. (2) 14. (3) 15. (3) 16. (1) 17. (3) 18. (1) 19. (5) 20. (3)
21. (2) 22. (3) 23. (4) 24. (1) 25. (2) 26. (4) 27. (2) 28. (2) 29. (2) 30. (3)
31. (2) 32. (3) 33. (2) 34. (4) 35. (2) 36. (2) 37. (4) 38. (2) 39. (4) 40. (3)
41. (1) 42. (3) 43. (4) 44. (2) 45. (5) 46. (2) 47. (4) 48. (1) 49. (2) 50. (1)
51. (5) 52. (3) 53. (2) 54. (4) 55. (2) 56. (3) 57. (5) 58. (3) 59. (2) 60. (4)
61. (2) 62. (1) 63. (3) 64. (2) 65. (4) 66. (2) 67. (2) 68. (1) 69. (4) 70. (3)
71. (2) 72. (3)
Computer Security 137

C H A P T E R

14
COMPUTER

df
_p
SECURITY
na
ap
:@

Computer security is also known as cyber security 3. E-mail Attachments These attachments are
or IT security. It is a branch of information the most common source of viruses. You must
technology known as information security, handle E-mail attachments with extreme care,
TG

which is intended to protect computers. especially if the E-mail comes from an unknown
sender.
Sources of Cyber Attack 4. Booting from Unknown CD When the
n

The most potent and vulnerable threat to computer computer system is not working, it is a good
O

users is virus attacks. A computer virus is a small practice to remove the CD. If you do not remove
software program that spreads from one computer the CD, it may start to boot automatically from
h

to another and that interferes with computer the disk which enhances the possibility of virus
c

operation. attacks.
ar

The sources of cyber attack can be as follows


Methods to Provide
Se

1. Downloadable Programs Downloadable


files are one of the best possible sources of Protection
virus. Any type of executable file like games, There are four primary methods to provide protection
screen saver are one of the major sources. 1. System Access Control It ensures that
If you want to download programs from the unauthorised users do not get into the system
Internet, then it is necessary to scan every by encouraging authorised users to be security
program before downloading them. conscious.
2. Cracked Software These softwares are 2. Data Access Control It monitors who can
another source of virus attacks. Such cracked access the data, and for what purpose. The
forms of illegal files contain virus and bugs that system determines access rules based on the
are difficult to detect as well as to remove. Hence, security levels of the people, the files and the
it is always a preferable option to download other objects in your system.
software from the appropriate source.
138 Learn, Revise & Practice ~ Computer Awareness

3. System and Security Administration It Some terms commonly used in cryptography are
performs offline procedures that make or break as follows
secure system. (i) Plain text is the original message that is an
4. System Design It takes advantage of basic input.
hardware and software security characteristics. (ii) Cipher is a bit-by-bit or character-by-
character transformation without regard to
Components of Computer the meaning of the message.
Security (iii) Cipher text is the coded message or the
Computer security is associated with many core encrypted data.
areas. (iv) Encryption is the process of converting plain

df
Basic components of computer security system are as text to cipher text, using an encryption
follows algorithm. The scrambling of code is known as

_p
encryption.
1. Confidentiality It ensures that data is not
accessed by any unauthorised person. (v) Decryption is the reverse of encryption, i.e.

na
converting cipher text to plain text.
2. Integrity It ensures that information is not
altered by any unauthorised person in such a
way that it is not detectable by authorised
ap
Malware
users. Malware stands for Malicious Software. It is a
:@

3. Authentication Verification of a login name broad term that refers to a variety of malicious
and password is known as authentication. It programs that are used to damage computer
ensures that users are the persons they claim to system, gather sensitive information or gain access
TG

be. to private computer systems.


4. Access Control It ensures that users access It includes computer viruses, worms, trojan horses,
only those resources that they are allowed to rootkits, spyware, adware, etc.
n

access. Some of them are described below


O

5. Non-Repudiation It ensures that originators


of messages cannot deny that they are not VIRUS
h

sender of the message. VIRUS stands for Vital Information Resources


c

6. Availability It ensures that systems work Under Siege. Computer viruses or perverse
ar

promptly and service is not denied to softwares are small programs that can negatively
authorised users. affect the computer. It obtains control of a PC and
Se

directs it to perform unusual and often destructive


7. Privacy It ensures that individual has the
actions.
right to use the information and allows another
to use that information. Viruses are copied itself and attached itself to other
8. Stenography It is an art of hiding the programs which further spread the infection. The
existence of a message. It aids confidentiality virus can affect or attack any part of the computer
and integrity of the data. software such as the boot block, operating system,
system areas, files and application programs.
9. Cryptography It is the science of writing
Note The first computer virus, creeper was a
information in a ‘hidden’ or ‘secret’ form and self-replicating program written in 1971 by Bob
in an ancient art. It protects the data during Thomas at VBN Technologies.
transmission and also the data stored on the The first boot sector PC virus named Brain, which
disk. was identified in the year 1986.
Computer Security 139

Effects of VIRUS Spyware


There are many different effects that viruses can It is a program which is installed on a computer
have on your computer, depending on the types system to spy on the system owner’s activity and
of virus. Some viruses can collects all the information which is misused
(i) monitor what you are doing. afterwards. It tracks the user’s behaviour and reports
(ii) slow down your computer’s performance. back to a central source.
(iii) destroy all data on your local disk. These are used for either legal or illegal purpose.
(iv) affect on computer networks. Spyware can transmit personal information to
(v) increase or decrease memory size. another person’s computer over the Internet.
(vi) display different types of error messages. For example, CoolWeb Search, FinFisher, Zango,

df
(vii) decrease partition size. Zlob Trojan, Keyloggers, etc.

_p
(viii) alter PC settings.
(ix) display arrays of annoying advertising. Symptoms of Malware Attack
There is a list of symptoms of malware attack which

na
(x) extend boot times.
indicates that your system is infected with a
(xi) create more than one partition.
computer malware.
Worm
ap
Some primary symptoms of malware attack are as
follows
:@
A computer worm is a standalone malware
computer program that replicates itself in order to (i) Odd messages are displaying on the screen.
spread to other computers. Often, it uses a (ii) Some files are missing.
(iii) System runs slower.
TG

computer network to spread itself, relying on


security failures on the target computer to access (iv) PC crashes and restarts again and again.
it. Worms are hard to detect because they are (v) Drives are not accessible.
invisible files. (vi) Anti-virus software will not run or installed.
n

For example, Bagle, I love you, Morris, Nimda, etc. (vii) Unexpected sound or music plays.
O

(viii) The mouse pointer changes its graphic.


Note Payload is a code designed in the form of a worm
and for the purpose of expanding on a larger scale (ix) System receives strange E-mails containing
h

than the worm. odd attachments or viruses.


c

(x) PC starts performing functions like opening or


ar

Trojan closing window, running programs on its own.


A Trojan, or Trojan Horse, is a non-self-replicating
Se

type of malware which appears to perform a Some Other Threats to


desirable function but instead facilitates
unauthorised access to the user’s computer system. Computer Security
There are some other threats to computer security, which
Trojans do not attempt to inject themselves into
are described below
other files like a computer virus. Trojan horses
may steal information, or harm their host 1. Spoofing It is the technique to access the
computer systems. unauthorised data without concerning to the
authorised user. It accesses the resources over
Trojans may use drive by downloads or install via the network. It is also known as Masquerade.
online games or Internet driven applications in
IP spoofing is a process or technique to enter in
order to reach target computers. Unlike viruses,
another computer by accessing its IP address.
Trojan Horses do not replicate themselves.
2. Salami Technique It diverts small amounts
For example, Beast, Sub7.Zeus, ZeroAccess of money from a large number of accounts
Rootkit, etc. maintained by the system.
140 Learn, Revise & Practice ~ Computer Awareness

3. Hacking It is the act of intruding into Some popular anti-viruses are


someone else’s computer or network. Hacking (i) Avast (ii) Avg
may result in a Denial of Service (DoS) attack. (iii) K7 (iv) Kaspersky
It prevents authorised users from accessing (v) Trend Micro (vi) Quick Heal
the resources of the computer. A hacker is (vii) Symantec (viii) Norton
someone, who does hacking process.
(ix) McAfee
4. Cracking It is the act of breaking into
computers. It is a popular, growing subject on Digital Certificate
Internet.
It is the attachment to an electronic message used
Cracking tools are widely distributed on the
for security purposes. The common use of a digital
Internet. They include password crackers,
certificate is to verify that a user sending a message

df
trojans, viruses, war-dialers, etc.
is who he or she claims to be, and to provide the
Note Cyber cracker is a person called who uses a

_p
computer to cause harm to people or destroy critical receiver with the means to encode a reply.
systems.
Digital Signature

na
5. Phishing It is characterised by attempting
to fraudulently acquire sensitive information It is an electronic form of a signature that can be
such as passwords, credit cards details, etc., used to authenticate the identity of the sender of a
ap
by masquerading as a trustworthy person. message or the signer of a document, and also
6. Spam It is the abuse of messaging systems ensure that the original content of the message or
:@

to send unsolicited bulk messages in the form document that has been sent is unchanged.
of E-mails. It is a subset of electronic spam
involving nearly identical messages sent to Firewall
TG

numerous recipients by E-mails. It can either be software based or hardware based


7. Adware It is any software package which and is used to help in keeping a network secure. Its
automatically renders advertisements in primary objective is to control the incoming and
n

order to generate revenue for its author. The outgoing network traffic by analysing the data
term is sometimes used to refer the software
O

packets and determining whether it should be


that displays unwanted advertisements.
allowed through or not, based on a pre-determined
8. Rootkit It is a type of malware that is
h

rule set.
designed to gain administrative level control
c

over a computer system without being A network’s firewall builds a bridge between an
ar

detected. internal network that is assumed to be secure and


trusted, and another network, usually an external
Se

(inter) network, such as the Internet, that is not


Solutions to Computer assumed to be secure and trusted. A firewall also
Security Threats includes or works with a proxy server that makes
Some safeguards (or solutions) to protect a computer network requests on behalf of work station users.
system from accidental access are described below
Password
Anti-virus Software It is a secret word or a string of characters used for
It is an application software that is designed to user authentication to prove identity or approval to
prevent, search for, detect and remove viruses and gain access to a resource.
other malicious softwares like worms, trojans, A password is typically somewhere between 4 to 16
adware and more. characters, depending on how the computer system
It consists of computer programs that attempt to is setup. When a password is entered, the computer
identify threats and eliminate computer viruses system is careful not to display the characters on
and other malware. the display screen, in case others might see it.
Computer Security 141

There are two common modes of password as follows 3. Patches It is a piece of software designed to fix
(i) Weak Password Easily remember just like problems with a computer program or its
names, birth dates, phone number, etc. supporting data.
(ii) Strong Password Difficult to break and a This includes fixing security vulnerabilities and
combination of alphabets and symbols. other bugs and improving the usability and
performance.
File Access Permission Note Vendor created program modifications are called
patches.
Most current file systems have methods of
assigning permissions or access rights to specific 4. Logic Bomb It is a piece of code intentionally
user and group of users. These systems control the inserted into a computer’s memory that will set
ability of the users to view or make changes to the off a malicious function when specified

df
contents of the file system. conditions are met. They are also called slag

_p
code and does not replicate itself.
File access permission refers to privileges that
allow a user to read, write or execute a file. 5. Application Gateway This applies security

na
There are three specific file access permissions as mechanisms to specific applications such as File
follows Transfer Protocol (FTP) and Telnet services.
(i) Read permission (ii) Write permission ap
6. Proxy Server It can act as a firewall by
responding to input packets in the manner of
(iii) Execute permission
:@
an application while blocking other packets.
It hides the true network addresses and used to
Terms Related to Security intercept all messages entering and leaving the
1. Eavesdropping The unauthorised real time
TG

network.
interception of a private communication such
as a phone call, instant message is known as
eavesdropping.
Tit-Bits
n


The legal right to use software based on specific
2. Masquerading The attacker impersonates an
O

restrictions is granted via Software License.


authorised user and thereby gain certain ■
Software Piracy means copying of data or
unauthorised privilege.
h

computer software without the owner’s permission.


c
ar
Se
142 Learn, Revise & Practice ~ Computer Awareness

QUESTION BANK
1. ……… is a branch of information technology 10. Viruses, trojan horses and worms are
known as information security. [IBPS Clerk 2012]
(1) Computer security (2) Cyber security (1) able to harm computer system
(3) IT security (4) All of these (2) unable to detect if present on computer
(3) user-friendly applications
2. It takes advantages of basic hardware and (4) harmless applications resident on computer
software security characteristics. (5) None of the above
(1) System design

df
(2) Data access control
11. It is a self-replicating program that infects
(3) System access control computer and spreads by inserting copies of

_p
(4) None of the above itself into other executable code or documents.
(1) Keylogger (2) Worm
3. Verification of a login name and password is

na
(3) Virus (4) Cracker
known as [IBPS Clerk 2014]
(1) configuration (2) accessibility
12. A computer virus is
(3) authentication (4) logging in
(5) Other than those given as options
ap(1) deliberately created
(2) created accidently
(3) produced as a result of some program error
:@

4. If you are allowing a person on the network (4) All of the above
based on the credentials to maintain the
13. …… are often delivered to a PC through a
security of your network, then this act
mail attachment and are often designed to
TG

refers to the process of [IBPS PO 2016]


do harm. [IBPS PO 2015]
(1) authentication (2) automation
(1) Portals
(3) firewall (4) encryption
(2) Spam
n

(5) None of these (3) Viruses


O

5. The scrambling of code is known as (4) Other than those given as options
(1) encryption (2) firewalling (5) E-mail messages
h

(3) scrambling (4) deception 14. Which of the following refers to dangerous
c

6. The main reason to encrypt a file is to programs that can be ‘caught’ of opening
ar

(1) reduce its size E-mail attachments and downloading


(2) secure it for transmission software from the Internet? [SBI PO 2014]
Se

(3) prepare it for backup (1) Utility (2) Virus (3) Honey Pot
(4) include it in the start-up sequence (4) Spam (5) App
7. Cracked softwares are another source of 15. A program designed to destroy data on your
(1) e-mail attack (2) virus attack computer which can travel to ‘infect’ other
(3) trojan horse (4) All of these computers is called a [RBI Grade B 2012]]
8. A malware is a (1) disease (2) torpedo
(1) program (2) hardware (3) hurricane (4) virus
(3) person (4) None of these (5) infector

9. Softwares such as viruses, worms and trojan 16. If your computer rebooting itself, then it is
horses that have a malicious content, is likely that [SBI Clerk 2012]

known as [IBPS Clerk 2014]


(1) it has a virus
(2) it does not have enough memory
(1) malicious software (malware) (3) there is no printer
(2) adware (3) scareware (4) there has been a power surge
(4) spyware (5) firewall (5) it needs a CD-ROM
Computer Security 143

17. Computer virus is [IBPS Clerk 2011] 27. A computer virus normally attaches itself to
(1) a hardware (2) a windows tool another computer program known as a
(3) a computer program (4) a system software [IBPS PO 2015]
(5) None of the above (1) host program (2) target program
18. Which among the following is related to the (3) backdoor program (4) bluetooth
(5) trojan horse
internet and mail?
(1) Boot-Up 28. These are program designed as to seem to
(2) Magnetic Tapes being or be doing one thing, but actually
(3) Applications Software being or doing another.
(4) Virus (1) Trojan horses (2) Keyloggers
19. The first PC virus was developed in (3) Worms (4) Crackers

df
(1) 1980 (2) 1984 (3) 1986 (4) 1988 29. Viruses that fool a user into downloading

_p
20. Which was the first PC boot sector virus? and/or executing them by pretending to be
(1) Creeper (2) Payload useful applications are also sometimes called

na
(3) Bomb (4) Brain (1) trojan horses (2) keyloggers
(3) worms (4) crackers
21. The first computer virus is
(1) Creeper
(3) The Famous
(2) PARAM
(4) HARLIE
ap
30. A ......... is a small program embedded inside
of a GIF image.
(1) web bug (2) cookie
:@
22. The ......... of a threat measures its potential (3) spyware application (4) spam
impact on a system. [IBPS Clerk 2011]
(1) vulnerabilities (2) counter measures 31. Hackers often gain entry to a network be
pretending to be at a legitimate computer.
TG

(3) degree of harm (4) susceptibility


(5) None of these (1) Spoofing (2) Forging
(3) IP spoofing (4) All of these
23. Which of the following is the type of
32. Attempt to gain unauthorised access to a
n

software that has self-replicating software


user’s system or information by pretending
O

that causes damage to files and system?


(1) Viruses (2) Trojan horses to be the user. [IBPS RRB PO 2018]
(3) Bots (4) Worms (1) Spoofing (2) Hacker
h

(3) Cracker (4) Phishing


c

24. Like a virus, it is also a self-replicating (5) None of these


ar

program. The difference between a virus


and it is that it does not create copies of 33. Which of the following enables to determine
how often a user visited a website?
Se

itself on one system it propagates through


[IBPS Clerk 2014]
computer networks.
(1) Hacker (2) Spammer
(1) Keylogger (2) Worm
(3) Phish (4) Identify theft
(3) Cracker (4) None of these (5) Cookie
25. A worm 34. A person who uses his or her expertise to
(1) can automatically move in network gain access to other people computers to get
(2) can only be transferred with human intervention
information illegally or do damage is a
(3) worms are harmless
[Allahabad Bank PO 2011]
(4) None of the above
Or
26. Worm is a program that infects computer A person who uses his expertise for
and spreads by inserting copies of itself into software. [IBPS RRB PO 2018]
other executable code or documents. (1) Spammer (2) Hacker
(1) Self- attach (2) Self-replicating (3) Instant messenger (4) All of these
(3) Non-self-replicating (4) Hacking (5) None of these
144 Learn, Revise & Practice ~ Computer Awareness

35. Hackers 42. Adware is something


(1) have the same motive (1) which is added to your computers
(2) is another name of users (2) by adding this performance of your computer
(3) many legally break into computer as long as increases
they do not do any damage (3) software that gets different advertisement
(4) break into other people’s computer (4) None of the above
36. What is a person called who uses a 43. It is a toolkit for hiding the fact that a
computer to cause harm to people or computer’s security has been compromised,
destroy critical systems? [IBPS Clerk 2014] is a general description of a set of programs
(1) Cyber Terrorist which work to subvert control of an
(2) Black-Hat-Hacker operating system from its legitimate (in

df
(3) Cyber Cracker accordance with established rules) operators.
(1) Rootkit (2) Keylogger

_p
(4) Hacktivist
(5) Other than those given as options (3) Worm (4) Cracker
44. An anti-virus is a(n)

na
37. ......... are attempts by individuals to obtain
confidential information from you by (1) program code
(2) computer
falsifying their identity. [IBPS Clerk 2013]
(1) Phishing trips (2) Computer viruses
ap(3) company name
(4) application software
(3) Spyware scams (4) Viruses
:@

(5) Phishing scams 45. Anti-virus software is an example of


(1) business software
38. Which of the following is a criminal activity (2) an operating system
TG

attempting to acquire sensitive information (3) a security


such as passwords, credit cards, debits by (4) an office suite
masquerading as a trustworthy person or 46. A digital signature is a/an [SBI Clerk 2011]
business in an electronic communication?
n

(1) scanned signature


[IBPS Clerk 2010]
O

(2) signature in binary form


(1) Spoofing (2) Phishing (3) encrypting information
(3) Stalking (4) Hacking (4) handwritten signature
h

(5) None of these (5) None of the above


c

39. All of the following are examples of 47. To protect yourself from computer hacker
ar

real-security and privacy risks except intrusions, you should install a


[IBPS Clerk 2014]
Se

[RBI Grade B 2012]


(1) hackers (2) spam (1) firewall (2) mailer
(3) viruses (4) identify theft (3) macro (4) script
(5) None of these (5) None of these
40. Junk E-mail is also called 48. Which one of the following is a key
[Union Bank of India 2011]
function of firewall? [SBI PO 2010]
(1) spam (2) spoof
(1) Monitoring (2) Deleting
(3) sniffer script (4) spool
(3) Copying (4) Moving
(5) None of these
(5) None of these
41. ……… is a type of electronic spam where 49. Mechanism to protect network from outside
unsolicited messages are sent by e-mail. attack is
(1) Trash mail (2) Cram mail
(1) firewall (2) anti-virus
(3) Draft mail (4) Spam mail
(3) digital signature (4) formatting
Computer Security 145

50. A firewall operated by [SBI Clerk 2010] 56. Vendor created program modifications are
(1) the pre-purchase phase called [Allahabad Bank PO 2011]
(2) isolating intranet from extranet (1) patches (2) anti-viruses
(3) screening packets to/from the network and (3) hales (4) fixes
provide controllable filtering of network (5) overlaps
traffic
(4) All of the above 57. Which of the following is a computer’s
(5) None of the above memory, but unlike a virus, it does not
replicate itself ? [SBI PO 2011]
51. Coded entries which are used to gain access (1) Trojan Horse (2) Logic Bomb
to a computer system are called (3) Cracker (4) Firewall
(1) Entry codes (5) None of these

df
(2) Passwords
(3) Security commands 58. They are also called slag code and does not

_p
(4) Codewords replicate itself.
(1) Time (2) Anti-virus
52. Password enables users to

na
(3) Logic bomb (4) All of these
(1) get into the system quickly
(2) make efficient use of time 59. It hides the true network addresses and used
(3)
(4)
retain confidentiality of files
simplify file structure
ap
to intercept all messages entering and
leaving the network.
:@
53. Which of the following is the combination (1) Logic bomb (2) Firewall
(3) Patches (4) Proxy server
of numbers, alphabets along with username
used to get access to user account? 60. The legal right to use software based on
TG

(1) Password (2) Username specific restrictions is granted via a


(3) Titlename (4) Host-Id [RBI Grade B 2012]
(1) software privacy policy
54. ……… refers to privileges that allow a user to
(2) software license
n

read, write or execute a file. (3) software password manager


O

(1) Authentication (4) software log


(2) File access permission (5) None of the above
(3) Password
h

(4) Firewall 61. …..… refers to the unauthorised copying and


c

distribution of software. [IBPS Clerk 2014]


55. The unauthorised real-time interception of a
ar

private communication such as a phone call, Or


Se

instant message is known as Illegal copying and distribution of software is


(1) replay [IBPS RRB PO 2018]
(2) eavesdropping (1) hacking (2) software piracy
(3) patches (3) software literacy (4) cracking
(4) payloads (5) copyright

ANSWERS
1. (4) 2. (1) 3. (3) 4. (1) 5. (1) 6. (2) 7. (2) 8. (1) 9. (1) 10. (1)
11. (3) 12. (1) 13. (3) 14. (2) 15. (4) 16. (1) 17. (3) 18. (4) 19. (3) 20. (4)
21. (1) 22. (3) 23. (4) 24. (2) 25. (1) 26. (2) 27. (5) 28. (1) 29. (1) 30. (3)
31. (3) 32. (1) 33. (1) 34. (2) 35. (4) 36. (3) 37. (1) 38. (2) 39. (2) 40. (1)
41. (4) 42. (3) 43. (1) 44. (4) 45. (3) 46. (3) 47. (1) 48. (1) 49. (1) 50. (3)
51. (2) 52. (3) 53. (1) 54. (2) 55. (2) 56. (1) 57. (2) 58. (3) 59. (4) 60. (2)
61. (2)
146 Learn, Revise & Practice ~ Computer Awareness

C H A P T E R

15
OVERVIEW OF FUTURE

df
_p
TECHNOLOGY
na
ap
:@

‘Future Technology’ is a term generally used to


Components of IoT
describe a new technology, but it may also refer to
1. Sensors Sensors or devices are key
the continuing development of an existing
TG

components that help you to collect real time


technology. It can have slightly different meaning
data from the surrounding environment.
when used in different areas, such as media,
business, science or education. All this data may have various levels of
n

complexities. It could be a simple temperature


This term commonly refers to technologies that are
O

currently developing or that are expected to be monitoring sensor or it may be in the form of
available within the next 4 to 5 years. It is usually the video feed.
h

reserved for technologies that are creating, or 2. Connectivity All the collected data is sent to
c

expected to create, significant social or economic a cloud infrastructure. The sensors should be
ar

effects. connected to the cloud using various media


of communication. These communication
Se

Introduction to Internet media include Mobile or Satellite networks,


Bluetooth, Wi-Fi, WAN, etc.
of Things (IoT) 3. Data Processing Once the data is collected
IoT is a network in which all physical objects are
and it gets to the cloud, the software performs
connected to the Internet through network devices
processing on the gathered data.
and exchange data. IoT allows objects to be
controlled remotely across existing network This process can be just checking the
infrastructure. temperature, reading on devices like AC or
heaters. However, it can sometimes also be
The goal of IoT is to extend to Internet connectivity
very complex like identifying objects using
from standard devices like computer, mobile, tablet
computer vision on video.
to relatively dumb devices like a toaster.
Overview of Future Technology 147

4. User Interface The information made


available to the end user in some ways, that
Characteristics of Big Data
can achieve by triggering alarms on their Analytics
phones or notifying through text or E-mails. 1. Variety Variety of big data analytics refers to
Also, a user sometimes might also have an structured, unstructured and semi-structured
interface through which he/she can actively data, i.e. gathered from multiple sources.
check in on their IoT system. While in the past, data could only be collected
from spreadsheets and databases, today data
Advantages of IoT comes in an array of forms such as E-mails,
1. Technical Optimisation IoT technology PDFs, Photos, etc.
helps a lot in improving technologies and 2. Velocity It essentially refers to the speed at

df
making them better.
which data is being created in real time.
2. Reduce Waste IoT offers real time information

_p
In a broader prospect, it comprises the rate of
leading to effective decision-making and
change and linking of incoming data sets at
management of resources.

na
varying speeds.
3. Improved Customer Engagement IoT
allows you to improve customer experience by 3. Volume Big data indicates huge volumes of
detecting problems and improving the process.
ap data that is being generated on a daily basis
from various sources like social media
4. Improved Data Collection Traditional data
:@
platforms, business processes, machines,
collection has its limitations and it’s designed
networks, etc.
for passive use. With the help of IoT, limitation
of data collection has reduced.
Applications of Big Data
TG

Disadvantages of IoT Analytics


1. Security As the IoT systems are 1. Government When government agencies
n

inter-connected and communicate over are harnessing and applying analytics to their
O

networks, the system offer little control big data, they have improvised a lot in terms
despite any security measures. It can reduce of managing utilities, running agencies,
h

the various kinds of network attacks. dealing with traffic congestion or preventing
c

2. Privacy Even without the active participation the crimes.


ar

of user, IoT system provides substantial 2. Heathcare Big data analytics had already
personal data in maximum detail. started to create a huge difference in the
Se

3. Complexity The designing, developing, healthcare sector. With the help of predictive
maintaining and enabling the large technology analytics, medical professionals can now able
to IoT system is quite complicated. to provide personalised healthcare services to
individual patient.
Big Data Analytics
3. Banking The banking sector relies on big
It is the process of collecting, organising and
data for fraud detection. Bit data tools can
analysing large sets of data to discover patterns and
efficiently detect fraudulent acts in real time
other useful information. Big data analytics can
such as misuse of credit/debit cards, etc.
help organisations to better understand the
information contained within the data and well 4. Manufacturing Using big data analytics,
also help to identify the data that is most important manufacturing industry can improve product
to the business and future business decisions. quality and output by minimising waste.
148 Learn, Revise & Practice ~ Computer Awareness

Virtual Reality Artificial Intelligence (AI)


It is a computer interface which tries to mimic real AI is an area of computer science that emphasises
world beyond the flat monitor to give an immersive the creation of intelligent machines that work and
3D visual experiences. react like humans.
It is an artificial environment that is created with The term may also be applied to any machine that
software and presented to the user in such a way exhibits traits associated with a human mind such
that the user suspends belief and accepts it as a real as learning and problem-solving.
environment. Knowledge engineering is a core part of AI
On a computer, virtual reality is primarily research. Machines can often act and react like
experienced through two of the five senses, i.e. humans only if they have abundant information

df
sight and sound. relating to the world. Artificial intelligence must
Virtual Reality (VR) technology is applied to have access to objects, categories, properties and

_p
advance fields of machine, engineering, education, relations between all of them to implement
design, training and entertainment. knowledge engineering.

na
Applications of Virtual Reality Types of Artificial Intelligence
1. In Gaming Virtual technology’s devices are
used for virtual gaming experiences. Along
ap
1. Weak AI It embodies a system designed to
carry out one particular job. Weak AI systems
:@
with this, devices such as Wi-Fi Remote, include video games such as the chess and
Playstation Move/Eye, Kinect are based on personal assistants such as Amazon’s Alexa.
virtual reality which track and send input of 2. Strong AI These are the systems that carry on
TG

the players to the game. the tasks considered to be human like. These
2. In Healthcare Healthcare is one of the tend to be more complex and complicated
applications where virtual reality could have systems. These kinds of systems can be found
n

the most significant impact. Healthcare in applications like self-driving cars or in


professional can now use virtual models to
O

hospital operating rooms.


prepare them for working on a real body.
3. In Education Virtual reality has been adopted Applications of Artificial
h

in education too. It improves teaching and Intelligence


c

learning process. With virtual reality, a large


ar

1. In Business Robotic process automation is


group of students can interact with one another being applied to highly repetitive tasks
Se

within a three dimensional environment. normally performed by humans.


4. In Entertainment Virtual reality is being 2. In Gaming Over the past few years, AI has
used in the entertainment industry to boost become an integral part of the gaming industry.
experiences with 3D films and increase Infact, one of the biggest accomplishments of
emotional connection with them and/or the AI is in the gaming industry.
characters.
3. In Healthcare Companies are applying
5. In Business Virtual reality has also been machine learning to make better and faster
adopted in business. It is now being used for diagnoses than humans. One of the best
virtual tours of a business environment,
known technologies is IBM’s Watson. It
training of new employees and this also gives
understands natural language and can
new employees a 360° view of every product.
respond to questions asked from it.
Overview of Future Technology 149

4. In Banking A lot of banks have already


Challenges of Blockchain
adopted AI based systems to provide customer
support, detect anomalies and credit card Technology
frauds. AI solutions can be used to enhance 1. To verify all the transactions, huge power, i.e.
security across a number of business sectors, electricity is required.
including retail and finance. 2. Blocks in a chain must be verified by the
5. In Autonomous Vehicles Just like humans, distributed network and it can take time. So,
self-driving cars need to have sensors to transaction speed can be an issue.
understand the world around them and a
brain to collect, processes and choose specific 3D Printing / Additive
actions based on information gathered. Manufacturing

df
3D printing is a manufacturing process where a 3D
Blockchain Technology

_p
printer creates three dimensional objects by
The blockchain is an encrypted, distributed depositing materials layer by layer in accordance to
database that records data. It is a digital ledger of

na
the object’s 3D digital model.
any transactions, contracts that need to be
independently recorded. It uses data Computer Aided Design (CAD)
In financial sector, with blockchain technology the
ap
software or 3D object scanners to direct hardware
to deposit material, layer upon layer, in precise
participants can interact directly and can make
:@
geometric shapes. As its name implies, additive
transactions across the internet without the
manufacturing adds material to create an object.
interference of a third party.
TG

With all the fraud resistant features, the blockchain How does 3D Printing Work?
technology holds the potential to revolutionise Here are the steps taken in creating a 3D object
various business sectors and make processes
1. Produce a 3D model using CAD or equivalent
smarter, secure, transparent and more efficient
n

3D design software.
compared to the traditional business processes.
O

2. Convert the drawing to the STL (Standard


Advantages of Blockchain Tessellation Language) file format, which is a
h

format developed for 3D printers.


Technology
c

1. It allows smart devices to speak to each other 3. Transfer the STL file to the computer that
ar

better and faster. controls the 3D printer. From there, you can
specify the size and orientation for printing.
Se

2. It allows the removal of intermediaries that


are involved in record keeping and transfer of 4. It prepare for a new print job based on the
assets. requirement of the 3D printer. This may
3. It provides durability, reliability and longevity include refilling whichever additive you are
with decentralised network. using to make your object.
4. The data that is entered in blockchain based 5. Begin the building process. Since, each layer is
systems is immutable which prevents against usually about 0-1 mm thick, this can be take
fraud through manipulating transactions and anywhere from hours to days to complete
the history of data. depending on the object’s size.
5. It brings everyone to the highest degree of 6. Remove the object from the printer and avoid
accountability. any contact with toxins or hot surfaces.
150 Learn, Revise & Practice ~ Computer Awareness

7. Performs any post processing needed, which 4. Financial Services Companies in the
may involve brushing off residue or washing financial services industry can use RPA for
the object. foreign exchange payments, automating
8. Use your new printed object. account opening and closing, managing audit
requests and processing insurance claims.
Examples of 3D Printing 5. Accounting Organisations can use RPA for
Architectural scale model and maquettes. general accounting, operational accounting,
Eyewear. transactional reporting and budgeting.
Dental Products.
Design (lamps, furniture, etc). Fifth Generation (5G)
Reconstructing bones and body parts in forensic 5G standard is for broadband cellular networks,

df
pathology. which cellular phone companies began deploying

_p
Reconstructing heavily damaged evidence. worldwide in 2019. It is designed to improve
retrieved from a crime scene. network connections by addressing the legacy

na
issues of speed, latency and utility, which the
Robotics Process earlier generations and the current generation of
Automation (RPA) ap
mobile networks could not address.
5G is promised to deliver data speed at a rate 100
RPA is the use of specialised computer programs,
:@

known as software robots, to automate and times faster than 4G networks.


standardise repeatable business processes. Globally, 5G network deployment is rapidly
Robotic process automation does not involve any moving from trials to early commercialisation. In
TG

form of physical robots. Software robots mimic India, network operators like Airtel, Vodafone,
human activities by interacting with applications Idea, Reliance, Jio, etc., have already partnered with
in the same way that a person does. Robot process vendors like Ericsson, Huawai and Samsung for
n

automation enables business professionals to easily planned trials sometime by the end of year 2020,
O

configure software robots to automate repetitive, before the service’s forecast commercial rollout in
routine work between multiple systems, filling in 2020.
h

automation gaps to improve business processes.


Advantages of 5G
c

Applications of RPA
ar

1. Greater Speed in Transmission Speed in


1. Customer Service RPA can help companies transmissions can approach 15 or 20 Gbps. By
Se

offer better customer service by automating being able to enjoy a higher speed, we can
contact center tasks, including verifying access files, programs and remote applications
E-signatures, uploading scanned documents in direct without waiting.
and verifying information for automatic 2. Lower Latency Latency is the time that
approvals or rejections. elapses since we give an order on our device
2. Healthcare Medical organisation can use until the action occurs. In 5G, the latency will
RPA for handling patient records, claims, be ten times less than in 4G, being able to
customer support, account management, perform remote actions in real time.
billing, reporting and analytics. 3. Greater Number of Connected Devices
3. Supply Chain Management RPA can be With 5G, the number of devices that can be
used for procurement, automating order connected to the network increases greatly, it
processing and payments, monitoring will go to millionaire scale per square
inventory levels and tracking shipments. kilometer.
Overview of Future Technology 151

All connected devices will have access to disrupt or absorb the high frequency signals.
instant connections to the internet, which in To counter this setback, the telecom industry
real time will exchange information with each is extending cell towers to increase the
other. broadcast distance.
4. New Technology Options As speed of 2. Limitation of Rural Access While 5G might
network has improved, more and more tasks bring about real connectivity for the
are being transitioned to the world of smart predominantly urban areas, those living in the
devices from the world of computers. With rural area, they will not necessarily benefit
the rising network speeds, this could open from the connection.
new doors for smart devices that may not have 3. Battery Drain on Devices When it comes to
been available. cellular devices connected to 5G, it seems the

df
batteries are not able to operate for a
Disadvantages of 5G

_p
significant period of time. The battery
1. Obstruction can Impact Connetivity The technology needs to advance to allow for this
range of 5G connectivity is not great as the

na
enhanced connectivity, where a single charge
frequency waves are only able to travel a short will power a cellphone for a full day.
distance. Added to this setback is the fact that apAlongside depleted batteries, users are
5G frequency is interrupted by physical reporting that cellphones are getting
obstructions such as trees, towers, walls and increasing hot when operating on 5G.
:@

buildings. The obtrusions will either block,


TG

QUESTION BANK
n
O

1. Which of the following is a term generally 4. …… are key components that help you to
used to describe a new technology, but it collect live data from the surrounding
h

may also refer to the continuing environment.


c

development of an existing technology? (1) Sensors (2) Connectivities


ar

(1) Future technology (3) User interfaces (4) None of these


(2) Future skills 5. IoT system provides substantial personal
Se

(3) IoT data in …… detail.


(4) Future processing (1) minimum (2) maximum
2. Future technology is usually reserved for (3) medium (4) All of these
……… that are creating, or expected to 6. Big data analytics is used in
create, significant social or economic effects. (1) government (2) healthcare
(1) processing (2) skills (3) banking (4) All of these
(3) things (4) technologies
7. Which of the following is the process of
3. Which of the following objects to be collecting, organising and analysing large
controlled remotely across existing network sets of data to discover patterns and other
infrastructure? useful information?
(1) Future skills (2) IoT (1) Future skills (2) IoT
(3) Cloud computing (4) Saas (3) Big data analytics (4) User interface
152 Learn, Revise & Practice ~ Computer Awareness

8. …… of big data analytics refers to structured, 15. Which of the following is an encrypted and
unstructured and semi-structured data that is distributed database that records data?
gathered from multiple sources. (1) Automation
(1) Feature (2) Analysis (2) Blockchain
(3) Privacy (4) Variety (3) Artificial intelligence
(4) Future skills
9. Virtual reality is primarily experienced
through …… of the five senses. 16. Blockchain mechanism brings everyone to
(1) Two (2) Three the highest degree of …… .
(3) Four (4) One (1) Accountability (2) Availability
(3) Performance (4) Analytics
10. Which technology devices is used for virtual

df
gaming experiences? 17. Additive manufacturing uses …… software.
(1) Future skills (2) Virtual (1) System (2) Application

_p
(3) Big data analytics (4) Blockchain (3) Utility (4) CAD
11. Virtual reality technology is applied to 18. Example(s) of 3D printing is/are

na
advance fields of (1) Eyewear
(1) medicine (2) engineering (2) Dental products
(3) education (4) All of these
ap(3) Architectural Scale Model
(4) All of the above
12. …… is an area of computer science that
:@

emphasises the creation of intelligent 19. RPA is the use of specialised computer
machines that work and react like humans. programs known as ……
(1) future skills
(1) Artificial intelligence
TG

(2) user interface


(2) Introduction to things
(3) software robot
(3) Future skills
(4) artificial intelligence
(4) Robotics
n

20. What is/are the business benefit(s) of RPA?


13. Which type of artificial intelligence
O

(1) Increased accuracy


embodies a system designed to carry out (2) No interruption of work
one particular job?
h

(3) Low technical barriers


(1) Weak AI (2) Strong AI
c

(4) All of the above


(3) Both (1) and (2) (4) None of these
ar

21. ……can help companies offer better


14. AI is important because it can help to solve customer service by automating contact
Se

immensely difficult issues in center tasks.


(1) entertainment (2) education (1) RPA (2) Interface
(3) health (4) All of these (3) Additive (4) Blockchain

ANSWERS
1. (1) 2. (4) 3. (2) 4. (1) 5. (2) 6. (4) 7. (3) 8. (4) 9. (1) 10. (2)
11. (4) 12. (1) 13. (1) 14. (4) 15. (2) 16. (1) 17. (4) 18. (4) 19. (3) 20. (4)
21. (1)
Miscellanceous 153

C H A P T E R

16
MISCELLANEOUS

df
_p
na
IT Gadgets 2. Smart Band
ap
A gadget is a device that has a specific function, in Smart bands are called smart bracelets or connected
:@
addition usually has small dimensions. bracelets. In most cases, they have a simple form
Some IT gadgets are as follows and their main function is to track and analyse your
movements during the day.
TG

1. Smartphone Most smart bands have a pedometer and sometimes


Smartphone is a cell phone that allows you to do also an optical heart rate sensor and various other
more than make phone calls and send text sensors.
n

messages. Smartphones use browsers and other


O

softwares like a computer system. There is a touch


screen in smartphone to interact with user means
h

use to enter data or information.


c

In turn, a smartphone also offers capabilities such


ar

as support for biometrics, video chatting, digital


assistants and much more.
Se

Smartphones are run with the help of mobile


operating systems such as Android, Symbian, iOS,
BlackBerry and Windows mobile.
3. Bluetooth Speaker
Bluetooth speakers are a type of wireless speakers
that are aimed at improving convenience and
comfort of listening to music.
These speakers work with the wireless technology.
They use short wavelength UHF radiowaves in the
ISM band from 2.4 to 2.485 GHz and builds Personal
Area Network (PAN).
154 Learn, Revise & Practice ~ Computer Awareness

Aerial Vehicle (UAV), also known as Unmanned


Aircraft System (UAS) or more commonly as a drone.

df
4. Smart Watch 7. Spy Pen

_p
Smart watch is a wearable computing device that Spy pen is an ordinary pen with a hidden digital
closely resembles a wrist watch. Many smart camera concealed inside, allowing the user to

na
watches are connected to a smart phone that take video, images often with the pen placed in a
notifies the user of incoming calls, e-mail messages shirt pocket or held in a hand. This type of device is
and notifications from applications. ap
usually used for protection, safety and even
investigation.
Some smart watches are able to make calls. Smart
:@

watches can be smart bands with pedometers and


heart rate monitors to help users track their health.
TG
n
O
h

Mobile Applications
c

5. Google Glass
ar

Mobile applications (also known as mobile apps)


It is a wearable computing device which comes with are software programs developed for mobile
Se

a head mounted display, in the form of eye glasses. devices such as smartphones and tablets.
The google glasses function as a hands free smart
phone, letting users access the mobile internet Most Widely used Mobile
browser, camera, maps, calendar and other apps by
voice commands.
Apps in India
1. BHIM (Bharat Interface for Money) App
This app is used to make simple, easy and quick
payment transactions using UPI (Unified Payment
Interface). BHIM app was launched by PM
Narendra Modi on 30th December, 2016.
6. Drone Camera It has been named after the architect of the India’s
It is the device that captured of still images and video Constitution Dr. B R Ambedkar, the BHIM app is an
by a remotely-operated or autonomous Unmanned aggregator of UPI services across various banks.
Miscellanceous 155

The aim to launch the BHIM app is to make These documents can be shared by residents with
cashless payments. governments or other registered organisations.
Key features of BHIM app 5. GARV (Grameen Vidyutikaran) App
Money can be transfered using mobile number or GARV app is used to monitor the progress of the
account number. rural electrification scheme and provide real-time
It helps to receive and transfer money directly updates.
into bank accounts.
This app was launched in October, 2015. GARV app
Its two factor authentication ensures your is an important part of the Digital India Initiative of
transactions are safe and secure. the Government and will contribute in further
It provides transaction history. development of the villages.

df
2. IRCTC Connect App Key features of GARV app

_p
IRCTC (Indian Railway Catering and Tourism Using this app, user can know that which village
Corporation) has released its official Android App will be electrified next.

na
called IRCTC Connect on 9th October, 2014. You can also check the progress status of any
Key features of IRCTC Connect app village.
User can check the schedule of trains.
User can check the availability of the seat in any
ap
6. mPassport Seva App
It is a easy to use app that provides all the functions
:@
train. as available over the Passport Seva Portal such as
It can keep the passengers up-to-date for their New User Registration, existing user login, etc.
train journey.
This app was launched on the occasion of Sixth
TG

3. MyGov App Passport Seva Divas on 26th June, 2018.


It was launched on 26th July, 2014. Google became Key features of mPassport Seva app
the first multinational firm to collaborate with Users are able to search for a Passport Seva
n

MyGov. Kendra or District passport cell.


O

Key features of MyGov app mPassport Seva app lets you check both passport
application status and RTI status.
h

MyGov provides you a readymade interface to


connect with the government on regular basis.
c

7. Voter Helpline App


ar

It also gives you the opportunity to connect and This app provides the convenience to all the people
engage with government representatives through for finding their names in the electoral roll,
Se

live chats. submitting online forms, checking status of the


4. DigiLocker App application, filling complaints and receiving the
reply.
It is a digital locker to store all official documents
that linked to both Aadhaar Card and cellphone Voter helpline app was launched in February, 2019.
numbers. The main objective of this app is to motivate and
educate voters.
It was launched by Prime Minister on 1st July, 2015.
Initially, it had 100 MB space and was later Key features of Voter Helpline app
increased to 1 GB. It provides a single point of service and
Key features of DigiLocker app information delivery to voters across the country.
It provides an online account with 1GB storage Voter can register to vote for new voter
space to Aadhaar holders. registration.
156 Learn, Revise & Practice ~ Computer Awareness

8. Google Maps With the help of an e-Wallet, one can make


It is a web based service that provides detailed payments for groceries, online purchases and flight
information about geographical regions and sites tickets among others. An e-Wallet needs to be
around the world. It offers satellite imagery, linked with the individual’s bank account to make
aerial photography, street maps, 360° interactive payments. The main objective of e-Wallet is to
panoramic views of streets, etc. make paperless money transaction easier.
Key features of Google Maps app Types of e-Wallet
Provides route planner, allowing users to find There are various types of e-Wallet as follows
available directions through driving, or walking.
Paytm
Began offering traffic data as a coloured overlay

df
on top of roads. Paytm is India’s largest mobile commerce platform
launched in 2010 by Vijay Shekhar Sharma. Paytm

_p
Digital Financial Tools Wallet, because of its amazing marketing and
operation strategies, has been able to capture

na
A new era of financial system in India was started. maximum market share of this industry.
In this era, efforts were made up to improve The wallet can be used to sent money directly to
methodology and responsibilities of financial
system.
ap
bank accounts as well. Paytm is the first company
in India to receive a license from the Reserve Bank
:@
Financial tools are terms used to describe of India (RBI) to start a payment bank.
organisations that deal with the management of Freecharge
money.
This service was launched in September, 2015 and
TG

Some terms that used in digital financial tools are has ever since introduced many attractive features.
This will enable all customers to send and receive
UPI (Unified Payment Interface) funds through the UPI system.
n

UPI is a digital mode that helps you transfer funds


Freecharge UPI will allow users to initiate fund
O

from one bank to another without using any


transfers instantly on a 24/7 basis on all 365 days in
account number, bank name, account type and
a year, including bank holidays.
h

IFSC code. It facilitates users to access multiple


c

bank accounts with a single mobile application. Mobikwik


ar

UPI has been launched by the National Payments It is a digital wallet that can be used for a number of
Corporation of India, also known as NPCI. In online payments including transferring money,
Se

conjunction with the Reserve Bank of India and accepting payments, mobile recharge, payment of
Indian Banks’ Association, NPCI has framed this utility bills, such as electricity, DTH, online
network. shopping, etc.
It is similar in mechanisms like the RuPay system Mobikwik has received an approval from the
through which debit and credit cards function. Reserve Bank of India (RBI) and has tied up with a
Note There are 4 or 6 digits required to set UPI pin. number of retails and online merchants in the country.
Oxigen
e-Wallet It is a digital wallet service through which users
e-Wallet (Mobile Wallet) is a type of prepaid can avail all the services offered by Oxigen. It is an
account in which a user can store his/her money application based service that can be used on all
for any future online transaction. An e-Wallet is types of smartphone such as Android, Windows
protected with a password. and IOs.
Miscellanceous 157

Oxigen wallet is a semi-closed wallet as per RBI It is a digital platform by which customers can
guidelines. You can transfer funds from your wallet simply send or ask money from any of their
to your bank account. contacts even if they do not have an SBI account.
Airtel Money PayZapp
Airtel Money is the Mobile Wallet from the PayZapp offered by HDFC bank is an ideal mobile
successful and popular telecom company Airtel. payment wallet.
It allows you to use your smartphone as an With PayZapp, you can shop on your mobile at
electronic wallet to make and receive payments. partner apps, bus and movie tickets, groceries,
Originally launched in 2012, this app offers book flight tickets and hotels, pay bills and
customers with an efficient alternative to cash recharge your mobile.

df
transactions. With the HDFC PayZapp e-Wallet app, customers
do not need to depend on card based transactions

_p
Citrus Wallet
and can enjoy secure and convenient payments.
It is an app that lets you send money to and receive

na
from anyone who has a phone number or E-mail. It PhonePe
lets your transfer money to friends, colleagues and
PhonePe wallet has launched by Sameer Nigam and
family members within seconds. ap
Rahul Chari.
You can pay canteen, movie, travel and party bills
It provides an online payment system based an
:@
with ease. You can even see all your past transactions
Unified Payments Interface (UPI), which is a new
and keep a track of your spending patterns.
process in electronic funds transfer launched by
SBI Buddy National Payments Corporation of India (NPCI).
TG

SBI had launched the Mobile Wallet Buddy in Using PhonePe, users can send and receive money,
August 2015, in 13 different languages in recharge mobile, data cards, buy gold and shop
collaboration with Master Card. online and offline.
n
O

QUESTION BANK
c h
ar

1. …… is a device that has a specific function, 4. Which of the following is a wearable


Se

in addition usually has small dimensions. computing device which comes with a head
(1) Software (2) Gadget mounted display in the form of eyeglasses?
(3) Keyboard (4) Scanner (1) Google glass (2) Drone camera
(3) Spy pen (4) Smart goggle
2. Which of the following is an IT gadget?
(1) Keyboard (2) Wrist watch 5. This IT gadget is used for protection, safety
(3) Smart watch (4) Joystick and even investigation.
(1) Drone camera (2) Smart watch
3. Smart band is also known as
(3) Bluetooth speaker (4) Spy pen
(1) Smart bracelet
(2) Connected bracelet 6. Smart watches can be smart bands with
(3) Both (1) and (2) (1) pedometers (2) heart rate monitors
(4) Smart watch (3) Both (1) and (2) (4) None of these
158 Learn, Revise & Practice ~ Computer Awareness

7. Smart phone also offers capability(ies) such 16. e-Wallet is also known as ………… protected
as with a password.
(1) support for biometrics (1) Pocket wallet (2) Mobile wallet
(2) video chatting (3) Prepaid wallet (4) None of the above
(3) digital assistants
(4) All of the above
17. Which of the following facilities is available
under e-Wallet?
8. Bluetooth speakers work with the (1) Cash back (2) Rewards
(1) Wireless technology (3) Both (1) and (2) (4) None of the above
(2) Wired technology
(3) Both (1) and (2)
18. Which e-Wallet is the first company in India
to receive a license from RBI to start a

df
(4) None of the above
payment bank?
9. BHIM app is used to make simple, easy and

_p
(1) Freecharge (2) Mobikwik
quick payment transactions using (3) Airtel Money (4) Paytm
(1) Password (2) UPI

na
(3) Phone number (4) Aadhar number
19. Which bank offered the e-Wallet app
PayZapp?
10. App launched by IRCTC was known as ap(1) ICICI (2) HDFC
(1) IRCTC Connect (2) IRCTC App (3) SBI (4) PNB
(3) IRCTC Launcher (4) IRCTC Booking
:@
20. ………… provides an online payment system
11. Paytm is India’s largest mobile payment and based on Unified Payment Interface (UPI).
commerce platform founded by (1) PayZapp (2) PhonePe
(1) Aditya Sharma (2) Vijay Shekhar Sharma
TG

(3) SBI Buddy (4) Citrus


(3) Sidhartha Sharma (4) Shekhar Verma
21. Who has launched the Paytm e-Wallet?
12. This mobile app reduces the use of physical (1) Vijay Shekhar Sharma
n

documents and fake documents. What is (2) Sameer Saxena


this?
O

(3) Sameer Nigam


(1) GARV app (2) DigiLocker app (4) Rahul Chari
(3) MyGov app (4) OnlineRTI app
h

22. PhonePe wallet has been launched by


c

13. UPI has been launched by (1) Sameer Nigam (2) Rahul Chari
ar

(1) RBI (2) IFSC (3) Both (1) and (2) (4) None of these
(3) USSD (4) NPCI
23. Oxigen wallet is a …… wallet as per RBI
Se

14. Which of the following is a system that guidelines.


facilitates users to access multiple bank (1) Open (2) Closed
accounts with a single mobile application? (3) Semi-closed (4) Semi-open
(1) UPI (2) AEPS
24. SBI Buddy has launched the Mobile Wallet
(3) USSD (4) OTP
Buddy in ……
15. How many digits are there to set UPI Pin? (1) 10 languages (2) 13 languages
(1) 3 (2) 7 (3) 5 (4) 6 (3) 17 languages (4) 22 languages

ANSWERS
1. (2) 2. (3) 3. (3) 4. (1) 5. (4) 6. (3) 7. (4) 8. (1) 9. (2) 10. (1)
11. (2) 12. (2) 13. (4) 14. (1) 15. (4) 16. (2) 17. (3) 18. (4) 19. (2) 20. (2)
21. (1) 22. (3) 23. (4) 24. (2)
Practice Set 1 159

PRACTICE SET 1
1. Which of the following is an example of 9. Which of the following is not a property of
non-volatile memory? fibre optic cabling?
(1) ROM (2) RAM (3) LSI (4) VLSI (1) Transmits at faster speed than copper
cabling
2. Which of the following is a unit of (2) Easier to capture a signal from than copper
measurement used in computer system?

df
cabling
(1) Byte (2) Megabyte (3) Very resistant to interference

_p
(3) Gigabyte (4) All of these (4) Carries signals as light waves
3. Which command is used to copy files? 10. What does fibre use to transmit data?

na
(1) Copy (2) Disk copy (1) Vibrations (2) Sound
(3) Type (4) All of these (3) Electrical current (4) Light
4. Which of the following is/are fundamental
component(s) of IoT?
ap
11. To cut the selected text, these keys should be
pressed.
:@
(1) Sensors (2) Connectivity (1) Ctrl + C (2) Ctrl + D
(3) Data processing (4) All of these (3) Ctrl + V (4) Ctrl + X
5. Which is not an advantage of using 12. It is the abuse of messaging systems to send
TG

computerised spreadsheets? unsolicited bulk messages in the form of


(1) Flexibility moving entries e-mails.
(2) Speed of calculation (1) Spam (2) Adware
(3) Ability to generate tables
n

(3) Hacking (4) Cracking


(4) Cost of initial setup
O

13. ……… is a software that is designed to


6. To select several cells or ranges that are not prevent, detect and remove viruses.
touching each other, what would you do
h

(1) Firewall (2) Digital certificate


while selecting?
c

(3) Anti-virus software (4) Password


(1) Hold down the Ctrl key
ar

(2) Hold down the Shift key 14. The secondary storage devices can only
(3) Hold down the Alt key store data, but they cannot perform
Se

(4) Hold down Ctrl + Shift key (1) arithmetic operations


(2) fetch operations
7. Which of the following are selected in
PowerPoint to play a PowerPoint slide show (3) logic operations
(4) All of the above
for previewing?
(1) View, Slide Sorter (2) View, Slide 15. Which of the following is/are the type(s) of
(3) View, Slide Show (4) View, Outline QR Code?
8. Which of the following are used in (1) Static QR Code (2) Dynamic QR Code
MS-PowerPoint, in order to see all the slides (3) Both (1) and (2) (4) None of these
on one screen? 16. In computer science, by information we mean
(1) View, Slide Sorter (1) any output coming out from computer
(2) View, Slide (2) processed data put in an intelligent form
(3) View, Master (3) a report printed by the computer
(4) View, Slide Show (4) plural of data
160 Learn, Revise & Practice ~ Computer Awareness

17. DEL command is used to 26. It performs basic tasks such as controlling
(1) delete files input and output devides, processing of
(2) delete directory instructions, controlling and allocating
(3) delete labels memory, managing files.
(4) delete contents of file (1) The platform
18. C++ language was developed by (2) Application software
(3) Operating system
(1) Dennis Ritchie
(4) The motherboard
(2) Charles Babbage
(3) Niklaus Wirth 27. Servers are computers that provide
(4) Bjarne Stroustroup resources to other computers connected to a
(1) mainframe (2) network

df
19. The bar which shows your current status in
(3) supercomputer (4) client
the document is called

_p
(1) status (2) standard 28. A Database Management System (DBMS) is a
(3) format (4) title (1) hardware system used to create, maintain

na
and provide controlled access to a database
20. You can delete one character to the left of
(2) hardware system used to create, maintain
cursor using …… key. and provide uncontrolled access to a database
(1) backspace
(3) edit
(2) delete
(4) format
ap(3) software system used to create, maintain and
provide uncontrolled access to a database
:@
21. You can use ……… alignment to centralise (4) software system used to create, maintain and
your text. provide controlled access to a database
(1) right (2) centre 29. When data changes in multiple lists and all
TG

(3) left (4) All of these lists are not updated, this causes
22. In MS-Word, Spell Check is under which (1) data redundancy
menu? (2) information overload
n

(1) Edit (2) Review (3) duplicate data


(4) data inconsistency
O

(3) Tool (4) Format


23. Grammatical errors are shown in which 30. Words that a programming language has
h

colour? set aside for its own use.


c

(1) Red (2) Green (1) Control words (2) Reserved words
(3) Control structures (4) Reserved keys
ar

(3) Blue (4) Black


24. This part of operating system manages 31. A ……… is a software program used to view
Se

the essential peripherals, such as the web pages.


keyboard, screen, disk drives and parallel and (1) Site (2) Host (3) Link (4) Browser
serial ports. 32. Mobile Wallet Buddy app had launched by
(1) Basic input/output system (1) SBI (2) HDFC
(2) Secondary input/output system (3) RBI (4) NPCI
(3) Peripheral input/output system 33. Which term identifies a specific computer
(4) Marginal input/output system on the Web and the main page of the entire
25. The following are all computing devices, site?
except (1) URL (2) Website Address
(1) notebook computers (3) Hyperlink (4) Domain Name
(2) cellular telephones 34. Which one of the following is a valid binary
(3) digital scanners number?
(4) personal digital assistants (1) 120 (2) 459 (3) 10101 (4) 10108
Practice Set 1 161

35. Process to verify the username and 44. An operating system is said to be
password is known as multitasking if
(1) logic (2) checkin (1) more than one programs can run
(3) authentication (4) authorisation simultaneously
(2) more than one users can work
36. The unit of speed used for super computer is simultaneously
(1) KB (2) FLOPS (3) GB (4) EB (3) Either (1) or (2)
37. HTTP stands for (4) None of the above
(1) HyperText Transfer Protocol 45. What is E-commerce?
(2) HighText Transfer Protocol (1) Buying and selling takes place over Internet
(3) HyperTechnical Transfer Protocol (2) Buying and selling takes place over phone

df
(4) HyperText Test Protocol call
(3) Buying and selling takes place over both

_p
38. 23 will be written in binary as Internet and phone call
(1) 10111 (2) 11111 (4) Buying and selling takes place over either

na
(3) 10011 (4) 11011 Internet or phone call
39. Which one of the following is a good 46. The default extensions of Microsoft Word
password?
(1) My date of birth (2) My school name
ap
2007 and Microsoft Excel 2007 files are
(1) .doc,.xsl (2) .doc,.xml
(3) .docx,.xlsx (4) .docx,.xml
:@
(3) My name (4) Timepass_09
40. It is also known as temporary memory. 47. 30,000 bytes is nearly equal to
(1) ROM (2) RAM (1) 30 KB (2) 3MB
TG

(3) DVD (4) CD (3) 3GB (4) 3TB


41. Which of the following is a correct syntax 48. EDI stands for
of URL? (1) Electronic Data Internet
n

(1) udinra.com (2) .udinra.com (2) Electronic Data Interchange


O

(3) udinra.html.com (4) @udinra. (3) Electric Device Internet


42. Which of the following is the (4) Electric Data Interchange
h

communication protocol that sets the 49. Which command is used to permanently
c

standard used by every computer that delete files or folders?


ar

accesses Web based information? (1) Shift + Delete (2) Ctrl + Delete
(1) XML (2) DML (3) Alt + Delete (4) Delete
Se

(3) HTTP (4) HTML


50. While working with MS-DOS, which
43. Which software will you use to write a command transfers a specific file from one
business letter? disk to another?
(1) MS-Word (2) MS-Excel (1) Copy (2) Diskcopy
(3) MS-PowerPoint (4) MS-Access (3) Time (4) Rename

ANSWERS
1. (1) 2. (4) 3. (1) 4. (4) 5. (4) 6. (1) 7. (3) 8. (1) 9. (2) 10. (4)
11. (4) 12. (1) 13. (3) 14. (4) 15. (3) 16. (2) 17. (1) 18. (4) 19. (1) 20. (1)
21. (2) 22. (2) 23. (2) 24. (1) 25. (2) 26. (3) 27. (2) 28. (4) 29. (4) 30. (2)
31. (4) 32. (1) 33. (1) 34. (3) 35. (3) 36. (2) 37. (1) 38. (1) 39. (4) 40. (2)
41. (1) 42. (3) 43. (1) 44. (1) 45. (1) 46. (3) 47. (1) 48. (2) 49. (1) 50. (1)
162 Learn, Revise & Practice ~ Computer Awareness

PRACTICE SET 2
1. First Supercomputer developed in India was 10. Pointing device includes the following except
(1) PARAM (2) Aryabhatta (1) maouse (2) light pen
(3) Buddha (4) CRAY-1 (3) trackball (4) keyboard
2. Which of the following is an example of 11. The term ‘operating system’ means
computer software? (1) a set of programs which controls computer

df
(1) Impact printer (2) Console working
(3) Device driver (4) OCR (2) the way a user operates the computer system

_p
(3) conversion of high level language to machine
3. Programmers use a variety of ............. to language
communicate instructions to the computer. (4) the way computer operator works

na
(1) programming languages
12. The physical arrangement of elements on a
(2) system languages
appage is referred to as the document’s
(3) high level languages
(1) feature (2) format
(4) low level languages (3) pagination (4) grid
:@

4. Which of the following displays the 13. Most Websites have a main page,
contents of the active cell? the……which acts as a doorway to the rest
(1) Active cell (2) Formula bar of the Website pages.
TG

(3) Menu bar (4) Name box (1) search engine (2) home page
5. A software used to convert source program (3) browser (4) URL
instructions to object instructions is known 14. Input, output and processing devices
n

as grouped together represent a(n)


O

(1) compiler (2) assembler (1) mobile device


(3) interpreter (4) language processor (2) information processing cycle
h

6. In computers, IC chip is used which is made of (3) circuit board


c

(1) chromium (2) iron oxide (4) computer system


ar

(3) silica (4) silicon 15. Which type of computer could be found in a
7. PhonePe Wallet launched by digital watch?
Se

(1) Sameer Nigam (2) Airtel (1) Mainframe computer


(3) HDFC (4) None of these (2) Supercomputer
(3) Embedded computer
8. Which of the following is a part of central (4) Notebook computer
processing unit?
16. Which of the following is not true about
(1) Printer (2) Keyboard
computer files?
(3) Mouse (4) ALU
(1) They are collection of data saved to a storage
9. Which of the following statements is wrong? medium
(1) Windows XP is an operating system (2) Every file has a file name
(2) Linux is owned and sold by Microsoft (3) A file extension is established by the user to
(3) Photoshop is a graphical design tool by Adobe indicate the file’s contents
(4) Linux is a free and open source software (4) Files usually contain data
Practice Set 2 163

17. All of the following are examples of real 26. When you connect to this service your
security and privacy risks except computer is communicating with a server at
(1) hackers (2) spam your Internet Service Provider (ISP). What
(3) viruses (4) identity theft does this refer?
18. What type of technology allows you to use (1) Modem (2) Internet
(3) Intranet (4) Server
your finger, eye or voice print to secure
your information resources? 27. A collection of related files is called a
(1) Haptics (2) Caves (1) character (2) field
(3) Biometrics (4) RFID (3) database (4) record
19. Main memory is 28. Hard disk drives and CD drives are

df
(1) Random Access Memory examples of
(2) Random Only Memory (1) backup (2) storing

_p
(3) Serial Access Memory (3) storage (4) All of these
(4) Storage Memory 29. You would useKK software to create

na
20. The smallest and fastest computer, imitating spreadsheets, type documents and edit
brain working is photos.
(1) Supercomputer
ap(1) application
(3) system
(2) utility
(4) operating
(2) Quantum computer
:@

(3) Param-1000 30. Which of the following is a computer that


(4) IBM chips support hundreds or thousands of users
21. A Compact Disc (CD) is which type of data simultaneously?
TG

storage? (1) Super (2) Macro


(1) Magnetic (2) Optical (3) Mini (4) Mainframe
(3) Electrical (4) Electro-mechanical 31. Which device is a microprocessor-based
n

22. Which of the following is not a language for computing device?


O

computer programming? (1) Personal computing


(1) Windows (2) Pascal (2) Mainframe
h

(3) Basic (4) Cobol (3) Workstation


c

(4) Server
23. First computer mouse was built by
ar

(1) Douglas Engelbart


32. An E-mail account includes a storage area,
(2) William English
often called a/an
Se

(3) Oaniel Coogher (1) attachment (2) hyperlink


(3) mailbox (4) IP address
(4) Robert Zawacki
24. Java Language was developed by 33. Data becomes……when it is presented in a
format that people can understand and use it.
(1) Ada Byron (2) Bill Gates
(3) Blaise Pascal (4) James Gosling (1) processed (2) graphs
(3) information (4) presentation
25. Which of the following is not one of the
four major data processing functions of a 34. A set of computer programs that helps a
computer? computer monitor itself and function more
efficiently is a/an
(1) Gathering data
(1) windows
(2) Processing data into information (2) system software
(3) Analysing the data or information (3) DBMS
(4) Storing the data or information (4) application software
164 Learn, Revise & Practice ~ Computer Awareness

35. A ...... converts all the statements in a program 43. Computer virus is a
in a single batch and the resulting collection (1) hardware
of instructions is placed in a new file. (2) windows tool
(1) converter (2) compiler (3) a computer program
(3) interpreter (4) instruction (4) a system software
36. The advantages(s) of IoT is/are 44. Each model of a computer has a unique
(1) Technical optimisation (1) assembly language
(2) Improved data collection (2) machine language
(3) Reduce waste (3) high level language
(4) All of the above (4) All of the above
37. Which one of the following is not a

df
45. A website is a collection of
broadband communication medium? (1) graphics (2) programs

_p
(1) Microwave (2) Fibre optic cable (3) algorithms (4) web pages
(3) Twisted pair (4) Co-axial cable
46. To move the cursor to the end of the

na
38. Which of the following performs document, press
modulation and de-modulation? (1) Ctrl + Esc
(1) Co-axial cable
(3) Modem
(2) Satellite
(4) Optical fibre
ap
(2) Ctrl + End
(3) Ctrl + B
(4) Ctrl + C
:@
39. The earliest calculating device is
(1) Abacus (2) Difference Engine 47. The shortcut method to print documents is
(3) Clock (4) Pascaline (1) Ctrl + A (2) Ctrl + B
TG

40. The function of Esc key is (3) Ctrl + P (4) Ctrl + C


(1) to end the action 48. Viruses, Trojan horses and worms are
(2) to go to last action
(1) able to harm computer system
(3) to repeat the last action
n

(4) to begin the action (2) unable to detect if affected on computer


O

(3) user-friendly applications


41. This device is usually used for protection, (4) harmless applications resident on computer
safety and even investigation.
h

49. Which of the following is used to browse


(1) Drone camera (2) Spy pen
c

(3) Tablet (4) All of these


Internet?
ar

(1) Skype (2) Facebook


42. The memory sizes in mainframe computers (3) Google (4) Firefox
Se

and advanced technology micro computers


are expressed as 50. Internet banking is done over
(1) bytes (2) kilobytes (1) Internet (2) mobile
(3) bits (4) megabytes (3) laptop (4) computer

ANSWERS
1. (1) 2. (3) 3. (1) 4. (2) 5. (4) 6. (4) 7. (1) 8. (4) 9. (2) 10. (4)
11. (1) 12. (2) 13. (2) 14. (4) 15. (3) 16. (3) 17. (2) 18. (3) 19. (1) 20. (2)
21. (2) 22. (1) 23. (1) 24. (4) 25. (3) 26. (2) 27. (4) 28. (4) 29. (1) 30. (4)
31. (1) 32. (3) 33. (3) 34. (2) 35. (2) 36. (4) 37. (1) 38. (3) 39. (1) 40. (1)
41. (2) 42. (4) 43. (3) 44. (2) 45. (4) 46. (2) 47. (3) 48. (1) 49. (4) 50. (1)
Practice Set 3 165

PRACTICE SET 3
1. What are the contents that are lost on 8. Press ......... to move the insertion point to
turning OFF the computer? the address box or to highlight the URL in
(1) Storage (2) Input the address.
(3) Output (4) Memory (1) Alt + D (2) Alt + A
(3) Shift + Tab (4) Tab + Ctrl
2. Assembly language is a
(1) machine language 9. In analog computer,

df
(2) high level programming language (1) input is first converted to digital form
(2) input is never converted to digital form

_p
(3) low level programming language
(4) language for assembling computers (3) output is displayed in digital form
(4) All of the above

na
3. The binary system is a number system to
10. VGA stands for
the base
(1) Video Graphics Array
(1) 2
(3) 8
(2) 4
(4) 10
ap(2) Visual Graphics Adapter
(3) Virtual Graphics Access
:@
4. Which of the following is not an example of (4) Volatile Graphics Adapter
hardware? 11. Which of the following memory chips is
(1) Scanner (2) Printer faster?
TG

(3) Monitor (4) Interpreter (1) There is no certainty


5. What happens when we try to delete the (2) DRAM
files on the floppy? (3) SRAM
(4) DRAM is faster for larger chips
n

(1) The files get moved to the recycle bin


12. An improvement on the ENIAC was made
O

(2) Files on a floppy cannot be deleted


(3) The files get deleted and can be restored possible with the help of the mathematician
again from Recycle Bin (1) John Von Neumann (2) Albert Federer
h

(4) The files get deleted and cannot be restored (3) Lord Smith (4) Tim Shown
c

again 13. A person who used his or her expertise to


ar

6. Paytm wallet was launched by gain access to other people’s computers to


Se

(1) Sameer Nigam get information illegally or to do damage is a


(2) Rahul Chari (1) spammer (2) hacker
(3) Vijay Shekhar Sharma (3) instant messenger (4) programmer
(4) Vijay Bhatkar 14. Which of the following is an example of
7. Computer system is comprised of storage devices?
(1) hardware, programs, information, people and (1) Magnetic disks (2) Tapes
network (3) DVDs (4) All of these
(2) hardware, software, procedures, networks 15. The basic computer processing cycle
and people consists of
(3) hardware, programs, information, people and (1) input, processing and output
procedures (2) systems and application
(4) hardware, programs, processors, procedures, (3) data, information and applications
networks and people (4) hardware, software and storage
166 Learn, Revise & Practice ~ Computer Awareness

16. Video processor consists of ...... and ......, 26. Which of the following is a storage
which store and process images. device that uses rigid, permanently
(1) CPU and VGA (2) CPU and memory installed magnetic disks to store
(3) VGA and memory (4) VGI and DVI data/information?
(1) Floppy disk (2) Hard disk
17. ....... are specially designed computers that
(3) Permanent disk (4) Optical disc
perform complex calculations extremely
rapidly. 27. Which of the following contains chips
(1) Servers (2) Supercomputers connected to the system board and is also a
(3) Laptops (4) Mainframes holding area for data instructions and
information?
18. Which of the following domains is used by

df
(1) Program (2) Mouse
profit business?
(3) Internet (4) Memory

_p
(1) .com (2) .edu (3) .mil (4) .net
28. The smallest unit of information about a
19. To reload a Web page, press the …… button. record in a database is called a

na
(1) redo (2) reload
(1) cell (2) field
(3) restore (4) refresh (3) record (4) query
20. Where are you likely to find an embedded
operating system?
ap
29. A(n) .......... is a special visual and audio
effect applied in PowerPoint to text or
:@
(1) On a desktop operating system content.
(2) On a networked PC (1) animation (2) flash
(3) On a network server (3) wipe (4) dissolve
TG

(4) On a PDA
30. Which of the following is a programming
21. A popular way to learn about computers language for creating special programs like
without ever, going to a classroom is called Applets?
n

(1) I-learning (2) isolated learning (1) Java (2) Cable


O

(3) E-learning (4) E-commerce (3) Domain name (4) Net


22. It ensures that data is not accessed by any 31. The piece of hardware that converts your
h

unauthorised person. computer’s digital signal to an analog


c

(1) Integrity (2) Authentication signal that can travel over telephone lines is
ar

(3) Confidentiality (4) Access control called a


23. In 5G, speed of transmission can approx (1) red wire (2) blue cord
Se

(3) tower (4) modem


(1) 5 or 7 Gbps (2) 7 or 10 Gbps
(3) 10 or 15 Gbps (4) 15 or 20 Gbps 32. Personal computers can be connected
24. Mobile commerce is best described as together to form a
(1) the use of kiosks in marketing (1) server (2) supercomputer
(2) transporting products (3) network (4) enterprise
(3) buying and selling goods/services through 33. You can keep your personal files/folders in
wireless handheld devices (1) My folder (2) My doucments
(4) using notebook PC’s in marketing (3) My files (4) My text
25. A(n) .......... is composed of several 34. Which of the following is a graphic
computers connected together to share package?
resources and data. (1) CorelDraw (2) MS-Word
(1) Internet (2) network (3) MS-Excel (4) All of these
(3) backbone (4) hyperlink
Practice Set 3 167

35. Default paper size of Word documents is 43. Motherboard is also known as
(1) letter (2) A4 (1) electronic board
(3) A3 (4) Both (1) and (3) (2) Printed Circuit Board (PCB)
(3) combined device board
36. Which PowerPoint view displays each slide
(4) Both (1) and (3)
of the presentation as a thumbnail and is
useful for rearranging slides? 44. The collection of links throughout the
(1) Slide Sorter (2) Slide Show Internet creates an interconnected/network
(3) Slide Master (4) Notes Page called
37. Example of impact printer is (1) WWW (2) Web
(1) jet printer (3) World Wide Web (4) All of these

df
(2) thermal printer 45. Every computer has a(n) ....... many ......... .
(3) laser printer (1) operating system, client system

_p
(4) daisy wheel printer (2) operating system, instruction sets
38. Notification area is found on which side of (3) application programs, operating system

na
the desktop? (4) operating system, application programs
(1) Left (2) Right 46. ……… are basically questions based on the
(3) Centre (4) Both (1) and (2) ap
data available in a database.
39. Which shortcut key is used to search for a (1) Forms (2) Queries
:@

file or a folder? (3) Tables (4) Reports


(1) F1 (2) F2 47. Which number system is used by computer
(3) F3 (4) F5 to store data and perfom calculations?
TG

40. Which of the following is not a layer of OSI (1) binary (2) octal
model? (3) decimal (4) hexadecimal
(1) Host to network (2) Application 48. Cache is a
n

(3) Network (4) Transport (1) permanent memory


O

41. Who invented Linux? (2) temporary memory


(3) storage device
(1) J Presper Eckert and John W Mauchly
h

(2) Dennis M Ritchie (4) Both (2) and (3)


c

(3) Seymour Papert 49. Zoom app is compatible with


ar

(4) Linus Torvalds (1) Windows (2) MacOS


42. Which command is used to search all the (3) iOS (4) All of these
Se

text files in any drive? 50. What is ‘Quick Heal’?


(1) File1.txt (2) *.txt (1) Antivirus (2) Vaccine
(3) _*.txt (4) File2.txt (3) Program (4) Software

ANSWERS
1. (4) 2. (3) 3. (1) 4. (4) 5. (4) 6. (3) 7. (3) 8. (1) 9. (2) 10. (1)
11. (3) 12. (1) 13. (2) 14. (4) 15. (1) 16. (2) 17. (2) 18. (1) 19. (4) 20. (4)
21. (3) 22. (2) 23. (4) 24. (3) 25. (2) 26. (2) 27. (4) 28. (2) 29. (1) 30. (1)
31. (4) 32. (3) 33. (2) 34. (1) 35. (2) 36. (1) 37. (4) 38. (2) 39. (3) 40. (1)
41. (4) 42. (2) 43. (2) 44. (4) 45. (4) 46. (2) 47. (1) 48. (2) 49. (4) 50. (1)
168 Learn, Revise & Practice ~ Computer Awareness

PRACTICE SET 4
1. Devices that enter information and let you 9. In ER diagram, relationship type is
communicate with the computer are called represented by
(1) software (2) output devices (1) ellipse (2) dashed ellipse
(3) hardware (4) input devices (3) rectangle (4) diamond
2. Which among the following was the first 10. Which of the following will be used if a

df
graphical Web browser? sender of E-mail wants to bold, italic, etc.,

_p
(1) Mosaic (2) WAIS the text message?
(3) CERN (4) Gopher (1) Rich signature (2) Rich text
(3) Rich format (4) Both (2) and (3)

na
3. The free available known repair of
software bug on Internet is called 11. It is a set of one or more attributes that can
(1) version (2) add on apuniquely identify tuples within the relation.
(3) tutorial (4) patch (1) Primary key (2) Candidate key
(3) Foreign key (4) Alternate key
:@
4. The first computer virus is
(1) Creeper (2) PARAM 12. All of the logic and mathematical calculations
(3) The Famous (4) HARLIE done by the computer happen in/on the
TG

(1) system board


5. What is the function of the central
(2) central control unit
processing unit of a computer? (3) motherboard
(1) Creates invoices (4) central processing unit
n

(2) Performs calculations and processing


13. The operating system called UNIX is
O

(3) Deletes data


typically used for
(4) Corrupts the data
(1) desktop computers (2) laptop computers
h

6. The feature that keeps track of the right (3) supercomputers (4) web servers
c

margin is 14. The …… file format is a method of encoding


ar

(1) find and replace (2) wordwrap pictures on a computer.


(3) right justified (4) left justified
Se

(1) HTML (2) JPEG


7. When a real-time telephone call between (3) FTP (4) URL
people is made over the Internet using
computers, it is called 15. Which of the following is a program that
(1) a chat session uses a variety of different approaches to
(2) an e-mail identify and eliminate spam?
(3) an instant message (1) Directory search
(4) internet telephony (2) Anti-spam program
(3) Web server
8. An electronic device, operating under the
control of information, that can accept data, (4) Web storefront creation package
process the data, produce output and store 16. To access properties of an object, the mouse
the results for future use, is called technique to use is
(1) input (2) computer (1) dragging (2) dropping
(3) software (4) hardware (3) right-clicking (4) shift-clicking
Practice Set 4 169

17. Computers use the …… number system to 25. Another name for a pre-programmed
store data and perform calculations. formula in Excel is
(1) binary (2) octal (1) range (2) graph (3) function (4) cell
(3) decimal (4) hexa-decimal
26. If your computer keeps re-booting itself,
18. …… are attempts by individuals to obtain then it is likely that
confidential information from you by (1) it has a virus
falsifying their identity. (2) it does not have enough memory
(1) Phishing trips (2) Computer viruses (3) there is no printer
(3) Spyware scams (4) Viruses (4) there has been a power surge
19. Why is it unethical to share copyrighted 27. A program for viewing web pages is called

df
files with your friends? (1) word processor (2) spreadsheet
(1) It is not unethical, because it is legal (3) protocol (4) a browser

_p
(2) It is unethical because the files are being 28. The term used to describe the instructions
given for free that tell the computer what to do is ……… .

na
(3) Sharing copyrighted files without permission
breaks copyright laws (1) hardware (2) software
(3) storage (4) input/output
(4) It is not unethical because the files are being
given for free
ap
29. Codes consisting of lines of varying widths
20. Google Meet can have upto 100 free or lengths that are computer-readable are
:@

participants for a time limit of known as


(1) 20 minutes (2) 30 minutes (1) an ASCII code (2) a magnetic tape
(3) 40 minutes (4) 60 minutes (3) an OCR scanner (4) a bar code
TG

21. The processor is a …… chip plugged onto 30. What type of keys are ‘Ctrl’ and ‘Shift’?
the motherboard in a computer system. (1) Adjustment (2) Function
(3) Modifier (4) Alpha-numeric
(1) LSI (2) VLSI
n

(3) ULSI (4) XLSI 31. In Word, you can change page margins by
O

(1) dragging the scroll box on the scroll bars


22. To change selected text to all capital letters,
(2) deleting the margin boundaries on the ruler
click the Change Case button, then click
h

(3) dragging the margin boundaries on the ruler


(1) Sentence Case
c

(4) clicking the right mouse button on the ruler


(2) Lower case
ar

32. Assembly instructions are in the form of


(3) Upper case
(1) binary digits (2) mnemonics
Se

(4) Capitalise each word


(3) general english (4) All of these
23. An online discussion group that allows
direct ‘live’ communication is known as 33. The speed of clock frequency or
microprocessor is measured in
(1) web crawler
(2) chat group (1) hertz (2) baud rate
(3) regional service provider (3) cps (4) bits
(4) hyperlink 34. UPI (Unified Payment Interface) has been
24. The cost of a given amount of computing launched by
power has……dramatically with the (1) RBI (2) HDFC
(3) NPCI (4) SBI
progress of computer technology.
(1) stayed the same 1
35. What type of device is a3 inch floppy drive?
(2) changed proportionally with the economy 2
(3) increased (1) Input (2) Output
(4) decreased (3) Software (4) Storage
170 Learn, Revise & Practice ~ Computer Awareness

36. What utility do you use to transfer files and 43. Supercomputers
exchange messages? (1) are smaller in size than mainframe computers
(1) Web browsers (2) WWW (2) are common in majority of households
(3) E-mail (4) Hypertext (3) contain thousands of microprocessors
(4) are rarely used by researchers due to their
37. Which unit controls the movement of lack of computing capacity
signals between CPU and I/O? 44. Which of the following is the second largest
(1) ALU (2) Control unit measurement of RAM?
(3) Memory unit (4) Secondary storage
(1) Terabyte (2) Megabyte
38. What are different views to display a table (3) Byte (4) Gigabyte
in MS-Access? 45. The systems BIOS and ROM chips are called

df
(1) Pivot table (2) Design view
(1) software (2) firmware
(3) Datasheet view (4) All of these

_p
(3) hardware (4) bootware
39. The three main parts of the processor are
46. Today, the common form of RAM is built with
(1) ALU, Control Unit and Registers

na
(1) transistors
(2) ALU, Control Unit and RAM
(2) vacuum tubes
(3) Cache, Control Unit and Registers
(4) Control Unit, Registers and RAM ap (3) semi-conductors ICs
(4) super conductors ICs
40. Portable computer, also known as laptop
:@
47. A modern electronic computer is a machine
computer, weighing between 4 and 10
that is meant for
pounds is called
(1) doing quick mathematical calculations
(1) PDA
TG

(2) input, storage, manipulation and outputting


(2) Supercomputer of data
(3) Mainframe computer (3) electronic data processing
(4) Notebook computer (4) performing repetitive tasks accurately
n

41. All the characters, that a device can use are 48. Speakers and headphones are .......... devices.
O

called its (1) Input (2) Input/Output


(1) skill set (3) Software (4) Output
h

(2) character alphabet


(3) characters codes 49. Which type of memory holds the program
c

(4) character set to start up the computer?


ar

42. ……… is a technique that is used to send (1) ROM (2) RAM
(3) Cache (4) Static
Se

more than one call over a single line.


(1) Digital transmission 50. The PC (Personal Computer) and the Apple
(2) Infrared transmission Macintosh are examples of two different
(3) Digitising (1) platforms (2) applications
(4) Multi-plexing (3) programs (4) storage devices

ANSWERS
1. (4) 2. (1) 3. (4) 4. (1) 5. (2) 6. (3) 7. (4) 8. (2) 9. (4) 10. (4)
11. (1) 12. (4) 13. (4) 14. (2) 15. (2) 16. (3) 17. (1) 18. (1) 19. (3) 20. (4)
21. (2) 22. (3) 23. (2) 24. (4) 25. (3) 26. (1) 27. (4) 28. (2) 29. (4) 30. (3)
31. (3) 32. (2) 33. (1) 34. (3) 35. (4) 36. (3) 37. (2) 38. (4) 39. (1) 40. (4)
41. (4) 42. (4) 43. (3) 44. (4) 45. (2) 46. (3) 47. (2) 48. (2) 49. (1) 50. (1)
Practice Set 5 171

PRACTICE SET 5
1. What is Telnet? 9. ……… provides process and memory
(1) Network or telephone management services that allow two or
(2) Television network more tasks, jobs or programs to run
(3) Remote login simultaneously.
(4) All of the above (1) Multi-tasking (2) Multi-threading

df
2. In Word, when you indent a paragraph, you (3) Multi-processing (4) Multi-computing
(1) push the text in with respect to the margin 10. Which ports connect special types of music

_p
(2) change the margins on the page instruments to sound cards?
(3) move the text up by one line (1) BUS (2) CPU

na
(4) move the text down by one line (3) USB (4) MIDI
3. How do you measure character size? 11. To insert a copy of the clipboard contents,
(1) Text
(3) Font
(2) Data
(4) File
apwhatever was last cutted or copied at the
insertion point, what is to be done?
:@

4. A key that will erase information from the (1) Paste (2) Stick in
computer’s memory and characters on the (3) Fit in (4) Push in
screen is 12. The contents of ……… are lost when the
TG

(1) edit key (2) delete key computer turns OFF.


(3) backspace key (4) shift key (1) storage (2) input
5. Logic chip is also known as (3) output (4) memory
n

(1) Program 13. Tangible, physical computer equipment that


O

(2) Memory can be seen and touched, is called


(3) Microprocessor (1) hardware (2) software
h

(4) ROM (3) storage (4) input/output


c

6. A removable magnetic disk that holds 14. The………enables you to simultaneously


ar

information is keep multiple Web pages open in one


(1) floppy disk (2) hard drive browser window.
Se

(3) monitor (4) portable (1) tab box (2) pop-up helper
7. Which keys enable the input of number (3) tab row (4) address bar
quickly? 15. The main memory of a computer can also
(1) Ctrl, Shift and Alt be called
(2) Function keys (1) primary storage
(3) The numeric keypad (2) internal memory
(4) Arrow keys (3) primary memory
8. To exit the program without leaving the (4) All of the above
application, what is to be done? 16. Junk e-mail is also called
(1) File (2) Edit (1) spam (2) spoof
(3) Copy (4) Close (3) sniffer script (4) spool
172 Learn, Revise & Practice ~ Computer Awareness

17. Internet requires 26. A device that reads the information


(1) an international agreement to connect contained on a disk and transfers it to the
computers computer’s memory. What is it?
(2) a local area network (1) Monitor (2) Screen
(3) a commonly agreed set of rules to (3) Keyboard (4) Disk drive
communicate between computers
(4) a world wide web 27. Which of the following is not the major
function of a computer?
18. When speaking of computer input and (1) Processing data into information
output, input refers to (2) Storing data or information
(1) any data processing that occurs from new (3) Accepting data
data input into the computer (4) Analysing data or information

df
(2) data or information that has been entered
into the computer 28. The main job of a CPU is to

_p
(3) the transmission of data that has been input (1) carry out program instructions
into the computer (2) store data/information for future use
(4) Both (2) and (3)

na
(3) process data and information
19. What resides on the motherboard and (4) Both (1) and (3)
connects the CPU to other components on ap
29. Which of the following is an example of
the motherboard? optical disc?
(1) Input unit (2) System bus (1) Digital versatile discs
:@
(3) ALU (4) Primary memory (2) Magnetic disks
20. PayZapp offered by ............. is an ideal (3) Memory disks
mobile payment wallet. (4) Data bus disks
TG

(1) HDFC Bank (2) SBI Bank 30. The ……… folder retains copies of message
(3) ICICI Bank (4) PNB Bank that you have started but are not yet ready
21. In an ER diagram, attributes are represented to send.
n

by (1) inbox (2) outbox


O

(1) rectangle (2) square (3) drafts (4) sent items


(3) ellipse (4) triangle 31. …… moves the cursor one space to the right
h

22. The ………… performs simple mathematics or puts spaces in between words.
(1) Control key (2) Space bar
c

for the CPU.


(3) Printer (4) Mouse
ar

(1) ALU (2) DIMM (3) Bus (4) Register


23. Connection or link to other documents or 32. In Excel, which one is a pre-recorded formula
Se

Web pages that contain related information that provides a shortcut for complex
is called calculations?
(1) dial-up (2) electronic commerce (1) Value (2) Data Series
(3) hyperlink (4) E-cash (3) Function (4) Field
24. A DVD is an example of a/an 33. Which of the following computer’s
(1) hard disk memories is characterised by low cost per
(2) optical disc bit stored?
(3) output device (1) Primary (2) Secondary
(4) solid-state storage device (3) Magnetic tape (4) All of these
25. Use this when you want to make all letters 34. To change written work already done, what
capital without having to use the Shift key for is to be used?
each character. What does this refer here? (1) File (2) Edit
(1) Shifter (2) Upper case (3) Cut (4) Close
(3) Caps lock key (4) Icon
Practice Set 5 173

35. …… is the process of dividing the disk into 43. Which of the following is not a function
tracks and sectors. category in Excel?
(1) Tracking (2) Formatting (1) Logical (2) Data series
(3) Crashing (4) Allotting (3) Financial (4) Text
36. All of the following terms are related to 44. A search engine is a program to search
spreadsheet software except (1) for information
(1) worksheet (2) cell (2) Web pages
(3) formula (4) virus detection (3) Web pages for specified index terms
37. The term used for set of instructions which (4) Web pages for information using specified
search terms
allow computer to perform more than one
45. A …… is a set of rules.

df
task, is
(1) hardware (2) software (1) resource locator (2) domain

_p
(3) humanware (4) firmware (3) hypertext (4) protocol
38. Which is a shortcut method to insert a new 46. Data or information used to run the

na
worksheet in MS-Excel? computer is called
(1) Ctrl+W (2) Ctrl+N (1) software (2) hardware
(3) Ctrl+IW (4) Shift+F11
ap(3) peripheral (4) CPU

39. How many bits are there in ASCII codes? 47. The device which helps you to
:@

(1) 8 (2) 10 (3) 12 (4) 16 communicate with computer is called


(1) input device (2) output device
40. The basic unit of a worksheet into which (3) software device (4) Both (1) and (2)
you enter data in Excel is called a
TG

48. In order to avoid memorising E-mail


(1) tab (2) cell
(3) box (4) range address you should use
(1) browser
41. You can use …… to copy selected text and
n

(2) search engine


…… to paste it in a document.
O

(3) list of birth date


(1) Ctrl+C, Ctrl+V (2) Ctrl+C, Ctrl+P (4) address book
(3) Ctrl+S, Ctrl+S (4) Shift+C, Alt+P
h

49. Computers gather data, which means they


c

42. Computer software can be defined as allow users to …… data.


ar

(1) the computer and its associated equipment (1) present (2) store
(2) the instructions that tell the computer what (3) output (4) input
Se

to do
(3) computer components that act to accomplish 50. To be able to boot, the computer must have
a goal a/an
(4) an interface between the computer and the (1) compiler (2) loader
network (3) operating system (4) assembler

ANSWERS
1. (3) 2. (2) 3. (3) 4. (2) 5. (3) 6. (1) 7. (3) 8. (4) 9. (1) 10. (4)
11. (1) 12. (4) 13. (1) 14. (3) 15. (4) 16. (1) 17. (3) 18. (4) 19. (2) 20. (1)
21. (3) 22. (1) 23. (3) 24. (2) 25. (3) 26. (4) 27. (4) 28. (4) 29. (1) 30. (3)
31. (2) 32. (3) 33. (2) 34. (2) 35. (2) 36. (4) 37. (2) 38. (4) 39. (1) 40. (2)
41. (1) 42. (2) 43. (2) 44. (4) 45. (4) 46. (1) 47. (4) 48. (4) 49. (4) 50. (3)
174 Learn, Revise & Practice ~ Computer Awareness

ABBREVIATION
A C
ADC Analog to Digital Convertor Cc Carbon Copy
ARP Address Resolution Protocol CMOS Complementary Metal Oxide
Semi-conductor
AH Active Hub
CAD Computer Aided Design
AI Artificial Intelligence
COBOL Common Business Oriented Language
ALGOL Algorithmic Language
CD Compact Disc

df
ALU Arithmetic Logic Unit Centre for Development of Advanced
C-DAC
Computing

_p
APCI Application layer Protocol Control
Information CPU Central Processing Unit
API Application Program Interface Cathod Ray Tube

na
CRT
ARPANET Advanced Research Projects Agency CSS Cascading Style Sheet
Network
CU Control Unit
ASCII American Standard Code for Information
Interchange CTCP
ap Client-To-Client Protocol
CD-R Compact Disc Recordable
:@
ATM Automated Teller Machine
CD-ROM Compact Disc Read Only Memory
ADF Automatic Document Feeder
CD-RW Compact Disc ReWritable
B
TG

CD-R/W Compact Disc-Read/Write


CG Computer Graphics
BINAC Binary Automatic Computer
CGI Common Gateway Interface
Bcc Blind Carbon Copy
Command Line Interface
n

CLI
BMP Bitmap
Common Language Runtime
O

CLR
BASIC Beginner’s All purpose Symbolic
Instruction Code CDMA Code Division Multiple Access
h

BCD Binary Coded Decimal


D
c

BCR Bar Code Reader


ar

DAC Digital to Analog Convertor


BD Blu-ray Disc
DB Database
Se

Bin Binary
DBA Database Administrator
BIOS Basic Input/Output System
DBMS Database Management System
B2B Business-to-Business Data Control Language
DCL
Bit Binary Digit DFS Distributed File System
BLOG Web Log DFD Data Flow Diagram
BPI Bytes/Bits Per Inch DHTML Dynamic HyperText Markup Language
BPL Broadband over Power Line DMA Direct Memory Access
BPS Bits Per Second DNS Domain Name System
BHIM Bharat Interface for Money DPI Dots Per Inch
Abbreviation 175

DRAM Dynamic Random Access Memory GPU Graphics Processing Unit


DSL Digital Subscriber Line GSM Global System for Mobile communication
DTP Desktop Publishing GUI Graphical User Interface
DVD Digital Video Disc/Digital Versatile Disc
DVD-R Digital Video Disc-Recordable H
DVD-Read Only Memory HLL High Level Language
DVD-ROM
DVD-RW DVD-Rewritable HPFS High Performance File System
DVR Digital Video Recorder HDD Hard Disk Drive
DOS Disk Operating System HSM Hierarchical Storage Management
HTML HyperText Markup Language
E

df
HTTP HyperText Transfer Protocol
EBCDIC Extended Binary Coded Decimal

_p
Interchange Code I
E-Commerce Electronic Commerce IM Instant Message

na
EDP Electronic Data Processing Internet Message Access Protocol
IMAP
EDSAC Electronic Delay Storage Automatic iPhone Operating System
Calculator iOS

EEPROM Electrically Erasable Programmable Read IP


apInternet Protocol
Only Memory ISDN Integrated Services Digital Network
:@

E-Mail Electronic Mail ISOC Internet Society


ENIAC Electronic Numerical Integrator And ISP Internet Service Provider
Computer
ISR Interrupt Service Routine
TG

EOF End Of File


IT Information Technology
EPROM Erasable Programmable Read Only
Memory IMEI International Mobile Equipment Identity
Internet of Things
n

EXE Executable IoT


O

EDI Electronic Data Interchange


J
F JPEG Joint Photographic Experts Group
h

FAT File Allocation Table JRE Java Runtime Environment


c

Facsimile
ar

FAX JS Java Script


FDC Floppy Disk Controller
K
Se

FDD Floppy Disk Drive


FIFO First In First Out Kb Kilobit
FORTRAN Formula Translation KB Kilobyte
FPU Floating Point Unit KHz Kilohertz
FTP File Transfer Protocol Kbps Kilobit Per Second
FXP File Exchange Protocol
FLOPS Floating Point Operations Per Second L
LAN Local Area Network
G LCD Liquid Crystal Display
Gb Gigabit Liquid Display Unit
LDU
GB Gigabyte Light Emitting Diode
LED
GIF Graphics Interchange Format Lines Per Inch
LPI
GIGO Garbage In Garbage Out
LISP List Processing
176 Learn, Revise & Practice ~ Computer Awareness

M PROM Programmable Read Only Memory


MAN Metropolitan Area Network PSTN Public Switched Telephone Network
Mb Megabit PSU Power Supply Unit
MB Megabyte POST Power On Self Test
MBR Master Boot Record
MAC Media Access Control Q
MPEG Moving Picture Experts Group QoS Quality of Service
MMS Multimedia Messaging Service QBE Query By Example
MIME Multipurpose Internet Mail Extensions QR Quick Response
MSN Microsoft Network
MDI Multiple Document Interface R

df
MICR Magnetic Ink Character Recognition RPA Robotics Process Automation

_p
MIPS Million Instructions Per Second RAID Redundant Array of Independent Disks
MIDI Musical Instrument Digital Interface Random Access Memory
RAM

na
N RDBMS Relational Database Management System
RIP Routing Information Protocol
NFS Network File System
NIC Network Interface Card ROM
RPG
ap Read Only Memory
Report Program Generator
NOS Network Operating System
:@
RTOS Real Time Operating System
O RTF Rich Text Format
OCR Optical Character Recognition
S
TG

OMR Optical Mark Reader


Object Oriented Programming SaaS Software as a Service
OOP
OS Operating System SAN Storage Area Network
n

OSS Open Source Software SCSI Small Computer System Interface


O

OLE Object Linking and Embedding SDL Simple DirectMedia Layer


OTP One Time Password SMTP Simple Mail Transfer Protocol
h

SNOBOL String Oriented and Symbolic Language


P
c

SP Service Pack
ar

P2P Peer-to-Peer
SQL Structured Query Language
PAN Personal Area Network
Se

SRAM Static Random Access Memory


PAP Password Authentication Protocol
Personal Computer SNMP Simple Network Management Protocol
PC
Pen Drive SIM Subscriber Identification Module
PD
PCL Printed Command Language
T
PDF Portable Document Format
TCP Transmission Control Protocol
PDL Program Design Language
TDMA Time Division Multiple Access
PIO Programmed Input/Output
TTA True Tap Audio
PLA Programmable Logic Array
Plug and Play TTF True Type Font
PnP
Point Of Sales TTS Text-To-Speech
POS
PPM Pages Per Minute TTY Tele Type
PPP Point-to-Point Protocol TFT Thin-Film Transistor
PPTP Point-to-Point Tunneling Protocol TB Terabytes
Abbreviation 177

U Wi-Fi Wireless Fidelity


UI User Interface WiMAX Worldwide Interoperability for Microwave
Access
UPS Uninterruptible Power Supply
WINS Windows Internet Naming Service
URI Uniform Resource Identifier
Uniform Resource Locator WLAN Wireless Local Area Network
URL
Uniform Resource Name WMA Wireless Media Audio
URN
Universal Serial Bus WMV Wireless Media Video
USB
ULSI Ultra Large Scale Integration WPA Wi-Fi Protected Access

UNIVAC Universal Automatic Computer WWAN Wireless Wide Area Network


UAS Unmanned Aircraft System WWW World Wide Web

df
WLL Wireless Local Loop
V

_p
WORM Write Once Read Many
VB Visual Basic
VDD Virtual Device Driver X

na
VGA Video Graphics Array
XHTML eXtensible HyperText Markup Language
VLAN Virtual Local Area Network
VM Virtual Memory
XML
ap eXtensible Markup Language
XNS Xerox Network Services
Video Memory System
:@
VMS
VPN Virtual Private Network XUL XML User interface Language

VT Video Terminal
Y
TG

VR Virtual Reality
VSNL Videsh Sanchar Nigam Limited YB Yottabyte

VDU Visual Display Unit


Z
n

VoIP Voice over Internet Protocol


ZIFS Zero Insertion Force Socket
O

VLSI Very Large Scale Integration


ZIP Zone Information Protocol
VRAM Video Random Access Memory
Zone Instruction Set Computer
h

ZISC
W
c

ZMA Zone Multicast Address


ar

WAN Wide Area Network ZNA Zone Network Administration


WAP Wireless Application Protocol ZB Zettabyte
Se
178 Learn, Revise & Practice ~ Computer Awareness

GLOSSARY
Access Time The time interval between the instance at Attribute The characteristics of an entity are called its
which data is called from a storage device and the attributes.
instance when delivery begins. Authentication Any process by which a system verifies
Accumulator A local storage area called a register, in the identity of the user who wants to access it.
which the result of an arithmetic and the logic operations Auxiliary Memory It is also known as secondary
is formed. memory that is not directly addressable by the CPU.
Active Cell It refers to the currently selected cell in a Backspace Key This key is used to delete the text.

df
spreadsheet. It can be identified by a bold outline that Backspace will delete the text to the left of the cursor.
surrounds the cells.
Backup A copy of a file or other item of data made in

_p
Active Window It is the currently focused window in case the original is lost and damaged.
the current window manager.
Bandwidth The maximum amount of data that can

na
Algorithm In computing, an algorithm is a procedure travel in a communication path in a given time,
for accomplishing some tasks which given an initial measured in bits per second (bps).
state, will terminate in a defined end-state.
Alphanumeric A character set that contains letters, digits
ap
Bar Code It is a machine-readable representation of
information in a visual format on a surface.
and other special characters such as @, $, +, *, %, etc.
:@
Big Data Analytics It is the process of collecting,
Analog Computer A computer that operates on data organising and analysing large sets of data to discover
which is in the form of continuous variable physical patterns and other useful information.
quantities.
Blockchain It is an encrypted distributed database that
TG

Animation It is the process of making the illusion of records data.


motion and change by means of the rapid display of a
sequence of static image that minimally differ from each Binary Coded Decimal (BCD) A coding system in
other. which a 4 digit binary number represents each decimal
n

digit from 0 to 9.
Antivirus It consists of computer programs that attempt
O

to identify threat and eliminate computer viruses and Bit It is the most basic information unit used in
other malicious software (malware). computing and information theory.
h

Application Software It is a sub-class of computer Blog It is a discussion or informational site published on


c

software that employs the capabilities of a computer the world wide web.
ar

directly to a task that the user wishes to perform. Bomb A type of virus designed to activate at a specific
Archive It provides backup storage. date and time on your computer.
Se

Arithmetic Logic Unit (ALU) It is a part of the Bluetooth It permits a wireless exchange of information
execution unit, a core component of all CPUs. ALUs are between computers, cell phones and other electronic
capable of calculating the results of a wide variety of devices.
basic arithmetical and logical computations. Booting It is a boot strapping process which starts the
Artificial Intelligence (AI) Fifth generation computing operating system when a computer is switched ON.
devices, based on artificial intelligence, are still Browser A special software that enables users to
in development, though there are some applications, read/view Web pages and jump from one Web page to
such as voice recognition, that are being used today. another.
ASCII (American Standard Code for Information Buffering The process of storing data in a memory
Interchange) It is a character set and a character device, allowing the devices to change the data rates,
encoding based on the Roman alphabet as used in perform error checking and error re-transmission.
Modern English and other Western European languages. Bug It is an error, flaw, failure, or fault in a computer
Assembler A program that translates mnemonic program or system that produces an incorrect or
statement into executable instructions. unexpected result.
Glossary 179
Bus A circuit that provides a communication path between Control Unit It is the part of a CPU that directs its
two or more devices of a digital computer system. operation. The output of this unit control the activity of
Byte It is commonly used as a unit of storage measurement the rest of the device.
in computers, regardless of the type of data being stored. Crawler It is an Internet bot that systematically browse
Cell A box in a spreadsheet, in which you can enter a the world wide web, typically for the purpose of Web
single piece of data. indexing. It is also called a Web spider.
Central Processing Unit (CPU) It performs the actual Cryptography The conversion of data into a secret code
processing of data. The CPU is generally called by its for transmission over a public network.
generic name ‘Processor’. It is also known as the brain of Cut To remove an object from a document.
computer. Data It is a collection of facts and figures which are not
Channel A communication channel can be a physical in directly usable form.
link, such as a cable that connects two stations in a

df
Database It is a collection of logically related information
network or it can consist of some electromagnetic in an organised way so that it can be easily accessed,
transmission.

_p
managed and updated.
Chatting Typing text into a message box on a screen to Data Entry Direct input of data in the appropriate data
engage in dialog with one or more people via the fields of a database known as data entry.

na
Internet or other network.
Database Management System (DBMS) It is a collection
Chip A tiny wafer of silicon containing miniature of various programs. It provides a systematic way to
electric circuits that can store millions of bits of
information.
ap
create, retrieve, update and manage data.
Data Processing Converting data into information, is
:@
Client-Server It is a network architecture which called data processing.
separates the client from the server. Each instance of the
client software can send requests to a server or Data Redundancy It is a condition created within a
application server. database or data storage technology in which the same
TG

piece of data is held in two separate places.


Command It is a directive to a computer program acting
as an interpreter of some kind, in order to perform a Debugging A methodical process of finding and
specific task. reducing the number of bugs, or defects are known as
debugging.
n

Compile It is the process of converting high level


Degree The number of fields associated with the
O

language to machine language.


database table or relation.
Compiler It is a computer program that translates a series
Desktop Publishing (DTP) It combines a personal
h

of instructions from high level language to machine


language. computer, page layout software and a printer to create
c

publications on small economic scale.


Cookie A packet of information that travels between a
ar

browser and the web server. Display Unit A device with a screen that displays
characters or graphics representing data in a computer
Se

Communication Protocol It is a system of rules that memory.


allow two or more entities of a communication system to
transmit information. Device Driver It is a computer program that enables
another program, typically, an operating system to
Computer Network It is a system for communication interact with a hardware device.
among two or more computers.
Dial-up Line A line through which communication
Computer Graphics These are visual presentations on a established.
computer screen. Examples are photographs, drawings,
line arts, graphs or other images. Digital Computer A computer that operates with
numbers expressed directly as digits.
Control Panel It is the part of Windows menu,
accessible from the Start menu, which allows users to Direct Access It is the capability of the computer
view and manipulate basic system settings and controls. equipment to obtain data from a storage device.
Computer Worm It is a self-replicating computer Directory In computing, a directory is an entity in a file
program, similar to a computer virus. system which contains a group of files and other
directories.
180 Learn, Revise & Practice ~ Computer Awareness

Domain Name A unique name that identifies a particular Execution Time The total time required to execute a
Website and represents the name of the server where the program on a particular system.
Web pages reside. Expansion Slot It is a socket on the motherboard that is
Dots Per lnch (DPI) It is defined as the measure of the used to insert an expansion card which provides
resolution of a printer, scanner or monitor. It refers to additional features to a computer.
the number of dots in one inch line. Extranet A technology that permits the users of one
Download It refers to the act of transmitting data from a organisation’s Intranet to enter portions of another
remote computer on the Internet or other network to organisation’s Intranet in order to conduct business
one’s own computer. transactions or collaborate on joint projects.
Drag and Drop In computer graphical user interface, Fax It stands for ‘Facsimile’. It is used to transmit a copy
drag and drop is the action of clicking on a virtual object of a document electronically.
and dragging it to a different location or onto another Field The attributes of an entity are written as fields in

df
virtual object. the table representation.
DVD It is an optical disc storage media format that can

_p
File A collection of information stored electronically and
be used for data storage including movies with high
treated as a unit by a computer. Every file must have its
quality video and sound.
own distinctive name.

na
Dynamic RAM (DRAM) It is a type of random access
File Allocation Table (FAT) It is the name of a
memory which stores each bit of data in a separate
computer file system architecture. The FAT file system
capacitor. ap
is a legacy file system which is simple and robust.
EBCDIC (Extended Binary Coded Decimal Interchange
File Manager It is an operating system utility that
Code) It is an 8-bit character encoding used on IBM
:@
provides a user interface to work with file systems.
mainframe operating systems, like Z/OS, S/390, AS/400
and i5/OS. Firewall A security system usually consisting of
hardware and software that prevents unauthorised
E-Commerce (Electronic Commerce) It is a type of
persons from accessing certain parts of a program
TG

industry where buying and selling of products or


database or network.
services is conducted over electronic systems such as the
Intranet and other computer network. Flowcharts These are the means of visually representing
the flow of data through an information processing
n

Editing The process of changing information by inserting,


system, the operations performed within the system and
deleting, replacing, rearranging and reformation.
O

the sequence in which they are performed.


Electronic Data Processing (EDP) A data processing
Foreign Key A field in a database table, which links it to
through equipment that is predominantly electronic
h

another related table.


such as digital computer.
c

Format To set margins, tabs, font or line spacing in


Electronic Mail (E-Mail) It is a method of composing,
layout of a document.
ar

sending, storing and receiving messages over electronic


communication systems. FORTRAN It stands for Formula Translation. The language
Se

was designed at IBM for scientific computing.


Encryption In cryptography, encryption is the process of
encoding messages (or information) in such a way that Freeware A form of software distribution where the
hackers cannot read it, but the authorised users can author retains copyright of the software but makes the
access it. program available to others at no cost.
End User Any individual who uses the information File Transfer Protocol (FTP) This protocol is used to
generated by a computer based system. transfer files from one place to another on Internet.
Entity It is something that has certain attributes or Function Key A special key on a computer keyboard or a
properties which may be assigned values. terminal devices keyboard that is used to perform
Error Message It is information displayed when an specific functions. Many keyboards have function keys
unexpected condition occurs usually on a computer or labelled from F1 to F12.
other device. Gadget It is a device that has a specific function in
Excel It allows users to create spreadsheets much like addition usually has small dimensions.
paper ledgers that can perform automatic calculations. Garbage In Garbage Out (GIGO) It pertains to the fact
Exe (.exe) It is a common filename extension denoting an that most computer errors are not machine errors, they
executable file (a program) in the DOS, MS-Windows. are data errors caused by incorrect input data.
Glossary 181
Gateway A device that is used to join together two HyperText Markup Language (HTML) It is mainly used
networks having different base protocols. for designing Websites.
Gigabyte (GB) It is a unit of information or computer HyperText Transfer Protocol (HTTP) It is an
storage equal to approximately one billion bytes. important protocol used on the world wide web for
Gigahertz (GHz) A measurement unit used to identify moving hypertext files across the Internet.
the speed of the central processing unit. One gigahertz is Icon A symbol (such as picture or a folder) that represents a
equal to 1 billion cycles per second. certain function on your computer. When the user clicks
Graphics Interchange Format (GIF) A simple file on the icon, the appropriate function is executed.
format for pictures and photographs, that are Information It is the summarisation of data according to
compressed so they can be sent quickly. a certain pre-defined purpose.
Graphic Tablet It is an input device which is used to Input In order to give instructions to a computer, the
create images, etc. information has to be supplied to it.

df
Graphical User Interface (GUI) It is a method of Instant Messaging (IM) A chat program that lets people

_p
interacting with a computer through a metaphor of communicate over the Internet in real time.
direct manipulating of graphical images and widgets in Instruction A command or order given to a computer to
addition to text. perform a task.

na
Hacker A computer criminal who penetrates and Interface A device or program that helps a user to
tempers with computer programs or systems. communicate with a computer.
Hang To crash in such a way that the computer does not
respond to input from the keyboard or mouse.
ap
Interpreter A program that converts and executes the
source code into machine code line by line.
:@
Hard Copy It is a printed copy of information from a Internet A vast computer network linking smaller
computer. computer networks worldwide.
Hard Disk It is a non-volatile data storage device that Internet of Things (IoT) It is a network in which all
TG

stores data on a magnetic surface layered onto disk physical objects are connected to the Internet through
platters. network devices and exchange data.
Hardware The mechanical, magnetic, electronic and Internet Surfing To search something on Internet is
electrical components that comprises a computer system called Internet surfing.
n

such as CPU, monitor, keyboard, mouse, etc. Internet Service Provider (ISP) It is a business
O

High-Level Programming Language It is a organisation that offers users to access the Internet and
programming language that is more user-friendly, to related services.
h

some extent platform-independent and abstract from Integrated Circuits Multiple electronic components
c

low-level computer processor operations such as combined on a silicon chip.


memory accesses.
ar

Java A programming language, used to create mobile


Home Page A starting point or a doorway to the applications, softwares, etc.
Se

Website. It refers to the Web page that identifies a Javascript It is an object oriented programming language
Website and contains the hyperlink to other Web pages used to create interactive effects in a Web browser.
in the Website.
JPEG (Joint Photographic Experts Group) It is a
Host Computer A computer that provides information commonly used method of lossy compression for digital
or a service to other computers on the Internet. Every photography.
host computer has its own unique host name.
Joystick It is a computer peripheral or general control
Hub A network device that connects multiple computers device consisting of a handheld stick that pivots about
on a LAN, so that they can communicate with one one end and transmits its angle in two or three
another. dimensions to a computer.
Hybrid Computer These computers are made by taking Kernel It is the fundamental part of a program, such as
the best features of the analog computer and digital an operating system, that resides in memory at all times.
computer.
Keyboard This is the standard input device attached to
Hyperlink An image or portion of text on a Web page all computers. The layout of keyboard is just like the
that is linked to another Web page. traditional typewriter of the type QWERTY.
182 Learn, Revise & Practice ~ Computer Awareness

Key Stroke It is the process of pressing button in Microcomputer A microprocessor-based computer,


keyboard. consisting of CPU, internal semi-conductor memory,
Kilobyte (KB) It is a unit of information or computer input and output sections and a system bus, all on one, or
storage equal to 1024 bytes. several monolithic IC chips inserted into one or several
PC boards.
LAN (Local Area Network) In LAN, the connected
computers are geographically close together. They are Microprocessor A complete Central Processing Unit
either in the same building or within a smaller area. (CPU) contained on a single silicon chip.
Laptop It is a small, lightweight and portable battery- MIDI (Music Instrument Digital Interface) It allows a
powered computer that can fit onto your lap. They each computer to store and replay a musical instrument’s
have a thin, flat and liquid crystal display screen. output.
Light Pen A light sensitive style for forming graphics by Minicomputer Considered to be more capable than a
touching coordinates on a display screen, thereby microcomputer but less powerful than a mainframe.

df
seeming to draw directly on the screen. Mnemonic A symbolic label or code remainder that
assists the user in remembering a specific operation or

_p
Link A communication path between two nodes or
channels. command in assembly language.
LINUX It is an open source operating system, meaning Modem (Modulator/Demodulator) It refers to specific

na
that the source code of the operating system is freely equipment that provides a means of communication
available to the public. between two computer systems over conventional
List Processing (LISP) A high level programming
language suitable for handling logical operations and
ap
telephone lines.
Monitor The visual readout device of a computer
system. A monitor can be in several forms; a Cathode
:@
non-numeric applications.
Ray Tube (CRT), a Liquid Crystal Display (LCD), or a
Log In It is the process by which an individual gains flat-panel, full-color display.
access to a computer system by identifying and
authenticating themselves. Multitasking It can work with several programs or
TG

interrelated tasks simultaneously that share memories,


Log Off It is a process of withdrawal from function after codes, buffers and files.
performing program.
Multithreading It is a facility available in an operating
Low Level Language It is a assembly language which is
n

system that allows multiple functions from the same


used in computer. It was mostly used in first generation application packages.
O

computers.
Multimedia Software programs that combine text and
Machine Language The language of computer also called graphics with sound, video and animation. A multimedia
h

binary language. Instructions in this language are PC contains the hardware to support these capabilities.
c

written as a sequence of 0’s and 1’s.


Network It is an inter-connection of two or more than
ar

Main Memory A volatile and speedy memory. It is two computers.


divided into two parts RAM and ROM.
Network Interface Card (NIC) This is a part of the
Se

Malware It is a software that disrupts normal computers computer that allows it to talk to other computers via a
functions or sends a user’s personal data without the network protocol like TCP/IP.
user authorisation.
Nibble A sequence of four adjacent bits, or a half-byte. A
Mass Storage It is referred to storage where large hexa-decimal or BCD coded digit can be represented by
volume of backup/data is stored. a nibble.
Megabyte (MB) 1 Megabyte is equal to 1048576 bytes, Node The end point of a network branch or the junction
usually rounded off to one million bytes. It is also called of two or more branches.
a ‘meg’.
Non-Volatile Memory A memory where stored data
Memory Temporary storage for information, including remain undisturbed by the removal of electrical power.
applications and documents.
Notebook A portable computer, that can fit into a
Menu Bar The horizontal strip across the top of an briefcase. It is used as personal computer. It is also called
application’s window. Each word on the strip has a laptop.
context sensitive drop-down menu containing features
and actions that are available for the application in use. Object Something that contains both the data and the
application that operate on that data.
Merge Combining two or more files into a single file.
Glossary 183
Offline It refers to the state in which a computer is Read Only Memory (ROM) A semi-conductor memory
temporarily or permanently unable to communicate whose data cannot be erased, or overwritten; it can only
with another computer. be accessed (read) for use by the CPU.
Online It refers to the state of being connected to the Record A collection of all the information pertaining to a
networked computer system or the Internet. particular entity instance.
Operating System A set of instructions that tells a Register A temporary storage unit for quick, direct
computer how to operate when it is turned ON. It sets up accessibility of a small amount of data for processing.
a filing system to store files and tells the computer how to Remote Server A network computer that allows a user
display information on a video display. on the network from a distant location to access
Output Data that come out of a computer device. information.
Patch A small program that improves an existing piece Robotics Process Automation (RPA) It is the use of
of software or corrects an error in it. specialised computer programs, known as software

df
Personal Computer (PC) A single-user computer robots, to automate and standardise repeatable business
processes.

_p
containing a Central Processing Unit (CPU) and one or
more memory circuits. Router A network device that enables the network to
Piracy The illegal copying of software or other creative re-route messages it receives that are intended for other

na
works. networks. The network with the router receives the
message and sends it on its way exactly as received.
Pixels An acronym derived from picture element. The
smallest element (a dot) on a display screen.
ap
Routing The process of choosing the best path throughout
the LAN.
Plug-In This is a program that your browser uses
:@
to manipulate a downloaded file. Scanner An electronic device that uses light-sensing
equipment to scan paper images such as text, photos,
Portrait A term that designates the position of illustrations and translate the images into signals that
conventional printing across the width of a page. the computer can then store, modify, or distribute.
TG

Post Office Protocol (POP) A protocol that specifies Search Engine Software that makes it possible to look
how a personal computer can connect to a mail server on for and retrieve information on the Internet, particularly
the Internet and download E-mail. the Web. Some popular search engines are AltaVista,
n

Primary Key It is a key that uniquely identifies each Google, HotBot, Yahoo!, Web Crawler and Lycos.
tuple or row in a table.
O

Sector A section of a recording track on a magnetic disk.


Process A collection of code, data and other system Sequential Access It is a class of data storage device that
resources including atleast one thread of execution that
h

reads stored data in a sequence.


performs a data processing task.
c

Server A computer that shares its resources and


Program A set of instructions to perform a specific task. information with other computers on a network.
ar

Programming Language A vocabulary and set of Shareware A software that is not free but is available for
grammatical rules for instructing a computer to perform
Se

a free trial period.


specific tasks.
Simplex Transmission of data in one direction only.
Printer A mechanical device for printing a computer’s
output on paper. Software The set of computer programs, procedures and
associated documentation related to the effective
Protocol A set of rules that defines exactly how operation.
information is to be exchanged between two systems
over Internet. Source Code (Source Program) A set of computer
instructions in hard-copy or stored form.
Pseudocode It is a short hand way of describing a
computer program. Spam Irrelevant or unsolicited messages sent over
Internet, typically to large number of users, for the
Query A request for information from a database. purpose of advertising, phishing, spreading malwares,
Random Access Memory (RAM) A volatile, semi- etc.
conductor storage structure that accesses temporary Spreadsheet Software that allows one to calculate
data with a random or direct accessing method. Data in numbers in a format that is similar to pages in a
this memory can be read by the CPU directly. conventional ledger.
184 Learn, Revise & Practice ~ Computer Awareness

Static RAM It is a type of RAM, that contains its Video Tele-conferencing A remote ‘face-to-face chat,’
contents only whenever current supply is ON. when two or more people using a webcam and an
Sub-Program A particular part of a program that Internet telephone connection chat online. The webcam
complete the special work. enables both live voice and video.
Supercomputer The largest mainframe computer Virus A piece of computer code designed as a prank or
featuring exceptionally high speed operation while malicious act to spread from one computer to another by
manipulating huge amount of information. attaching itself to other programs.
Virtual Reality (VR) It is the use of computer technology
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is a large grouping of programs and standards that to create a simulated environment.
govern how information moves around the Internet. Volatile Memory A memory whose contents are
irretrievably lost when power is removed. If data in
Terabyte (TB) It is about a trillion bytes. Actually, it’s
40 RAM must be saved after power shutdown, back-up in
2 or 10095111627776 bytes.

df
non-volatile memory (magnetic disk, tape, or CD-R) is
Terminal This is what you look at when you are on the essential.

_p
Internet. It’s your computer screen. Website A collection of web pages or hyperlinked
Time Sharing It refers to the allocation of computer webpages which onwned by an individual, company or

na
resources in a time dependent fashion to run several an organisation.
programs simultaneously. Window A portion of a computer display used in a
Topology The structure of the network including
physical connection such as wiring schemes and logical
ap
graphical interface that enables users to select
commands by pointing to illustrations or symbols with a
interactions between network devices. mouse.
:@

Trackball Input device that controls the position of the Wide Area Network (WAN) It is a tele-communication
cursor on the screen. network or computer network that extends over a large
Uniform Resource Locator (URL) The specific Internet
geographical distance.
TG

address for a resource such as an individual or an Word Processor A computer system or program for
organisation. setting, editing, revising, correcting, storing and
printing text.
Unix This is an operating system developed by AT & T.
n

It is a big push that it allows one server to serve many World Wide Web (‘WWW’ or ‘Web’) A network of
different end users at one time. servers on the Internet that uses hypertext-linked
O

databases and files. It was developed in 1989 by Tim


Upgrade The process of improve hardware and software
Berners-Lee, a British computer scientist and is now the
functionality.
h

primary platform of the Internet.


c

Upload The process of transferring information from a


Workgroup Persons sharing files and data between
computer to a Website (or other remote location on a
ar

themselves.
network).
Workstation The work area and/or equipment used for
Se

UPS (Universal Power Supply or Uninterruptible Power computer operations, including Computer-Aided Design
Supply) An electrical power supply that includes a (CAD). The equipment generally consists of a monitor,
battery to provide enough power to a computer during keyboard, printer and/or plotter and other output
an outage to back-up data and properly shut down. devices.
User A person who uses or operates something. X-Y Plotter A computer-driven printing mechanism that
User-Friendly A software program that has been draws coordinate points in graph form.
designed to easily direct the user through the operation ZOOM The enlarging or reducing an image displayed on
or application of a program. a computer process of proportionately monitor.
Validation The process of making sure that the forms and ZIP (Zone Information Protocol) This is an application
documents from a particular transaction are correct. that allows for the compression of application files.

You might also like