Arihant Computer General Awareness English
Arihant Computer General Awareness English
01
INTRODUCTION
df
_p
TO COMPUTER
na
ap
:@
The word ‘computer’ has been derived from the Latin word ‘computare’, which means ‘to calculate’. A
computer is an electronic device that manipulates information or data according to the set of instructions
TG
called programs. It has the ability to store, retrieve and process data.
Functions of Computer
n
1. Input Information or data that is entered into a computer is called input. It sends data and
O
meaningful to the user. It can be calculations, comparisons or decisions taken by the computer.
c
3. Output It makes processed data available to the user. It is mainly used to display the desired result to
ar
program execution and possible to get any type of information from it.
Features of Computer
1. Speed The computer can process data very fast at the rate of millions of instructions per second.
2. Accuracy Computers provide a high degree of accuracy. They respond to the user as per the input
instructions.
3. Storage Capacity Computers are capable to store huge amount of data, which depends on the
capacity of hard disk.
4. Versatility Computers can do different types of work simultaneously. They can perform multiple
tasks at a same time.
5. Diligence Unlike human beings, a computer is free from monotony, tiredness, lack of concentration,
etc., and can work for hours without creating any errors.
2 Learn, Revise & Practice ~ Computer Awareness
6. Secrecy Leakage of information is reduced by creating login system with password protection.
7. Reliability Computers are more reliable than human beings. Computers always produce exact results.
The possibility of errors occur only if the input is wrong, i.e. the computers never make mistakes of
their own accord.
8. Plug and Play Computers have the ability to automatically configure a new hardware and software
components.
History of Computer
Computer is not the creation of one day, rather it took a long period for the development of modern
computer.
df
History of computer is described in this table
_p
Inventions Inventors Characteristics Applications
■ First mechanical calculating device. ■ Used for addition and subtraction
Abacus
na
■ A horizontal rod represents the one, tens, operations.
1602 China
hundred, etc. ■ Calculation of square roots can also
ap be performed.
■ Three dimensional structure. ■ Perform multiplication of numbers.
Holding numbers from 0 to 9 only.
:@
■
Napier’s John Napier
Bones
■ Represent graphical structure of calculating
(Scotland) result.
1617 ■ Technology used for calculation called
TG
Rabdologia.
■ First mechanical adding machine. ■ Perform addition and subtraction of
■ This machine worked on the principle of two numbers.
Pascaline Blaise Pascal
n
pressure of liquid.
Joseph Marie It was first mechanical loom. Simplified the process of textiles.
h
■ ■
Jacquard’s
Loom Jacquard ■ Used punched card for the sequence of
c
Analytical Charles ■ First general-purpose computer. ■ It was a decimal machine used sign
Se
Engine Babbage ■ Stored program in the form of ‘pegs’ also and magnitude for representation of
1837 (London) called barrels. a number.
Tabulating Herman ■ It used punched cards for reading numbers. ■ It was used in the 1890 census.
Machine Hollerith ■ It was the first electromechanical machine.
1890 (America)
MARK-1 Howard ■ Consists of interlocking panels of small ■ Mainly used in the war effort during
1944 Aiken glass, counters, switches and control World War-II.
(America) circuits. ■ Magnetic drums are used for
■ Data can be entered manually. storage.
df
Mauchly
(America)
_p
IBM-650 ■ Provided input/output units converting ■ Payroll processing
IBM alphabetical and special characters to
Computer ■ Oil refinery design
na
Company two-digit decimal code.
1953 ■ Market research analysis
Generations of Computer
ap
:@
A generation refers to the state of improvement in the development of system. Each generation of
computer is characterised by a major technological development that fundamentally changed the way,
computers operate.
TG
■ ■
■ Non-portable.
c
Second Transistors Magnetic core Time sharing OS, ■ More reliable and less ■ Used for commercial
ar
Classification of Computer
Classification of Computer
df
schools to teach science to children.
Microcomputer
_p
This type of computer is the least powerful than Embedded Computer
other computers, which are based on size, yet the
na
It is a small size, powerful and easy to operate
most widely used and is also called portable electronic module, based on microcontroller/
computer. microprocessor and acts as a bridge between
Some types of microcomputer are as follows
ap
electronics hardware and computer software. e.g.
cellphone, camera, automotive system, digital watch,
(a) Desktop Computer or Personal
:@
etc.
Computer (PC) This is small and relatively
economical computer. This is based on the Quantum Computer
microprocessor technology (Integrated Quantum computer was first introduced by Richard
TG
is the smallest and is designed to fit into the engineering and Computer Aided Design (CAD)
c
df
computers.
laboratories.
_p
Some examples of supercomputer are described below Based on Purpose
(i) CRAY-1 was the world’s first supercomputer On the basis of purpose, computer is categorised as
na
introduced by Seymour R CRAY (Father of follows
Supercomputing) in 1976.
General Purpose Computer
ap
(ii) PARAM was the first supercomputer
General purpose computers are those computers,
developed by Vijay Bhatkar in India in 1991.
which are used to solve variety of problems by
:@
(iii) PARAM Siddhi is the latest machine in the changing the program or instructions.
series of PARAM made by C-DAC and released
on 16 November, 2020. For example, To make small database,
calculations, accounting, etc.
TG
fastest supercomputer.
Tit-Bits
Based on Work
Se
■
Charles Babbage is known as the father of
On the basis of work, computer is categorised as follows computer. Alan Turing is known as the father of
the modern computer.
Analog Computer ■
Siddhartha was the first computer developed in
India. First computer in India was installed in
These computers carry out arithmetic and logical Indian Statistical Institute (ISI), Kolkata.
operations by manipulating and processing of data. ■
Transistors were invented by Bell Laboratory.
For example, Speedometers, seismograph, etc. ■
In 1958, Jack St. Clair Kilby and Robert Noyce
Analog computer can perform several mathematical invented the first IC (Integrated Circuit).
operations simultaneously. It uses continuous
■
ENIAC (Electronic Numerical Integrator and
Computer) was the first electronic computer
variables for mathematical operations and utilises developed in Moore School of Engineering,
mechanical or electrical energy. USA.
6 Learn, Revise & Practice ~ Computer Awareness
QUESTION BANK
1. The word ‘computer’ has been derived from 10. Which among the following cycle consists
which of the following language? of input, processing, output and storage as
(1) Greek (2) English its constituents? [IBPS Clerk Mains 2017]
(3) Hindi (4) Latin (1) Processing (2) Output
(3) Input (4) Storage
2. Input, output and processing devices (5) Data
grouped together represent a(n)
(1) mobile device 11. ……… is data that has been organised and
df
(2) information processing cycle presented in a meaningful fashion.
(3) circuit board [IBPS Clerk Mains 2017]
_p
(4) computer system (1) A process (2) Software
(3) Storage (4) Information
3. Which of the following is the correct order
na
(5) Data
of the four major functions of a computer?
(1) Process, Output, Input, Storage 12. Data or information used to run the
(2) Input, Output, Process, Storage
apcomputer is called
(1) hardware (2) CPU
(3) Process, Storage, Input, Output
:@
(4) Input, Process, Output, Storage (3) peripheral (4) None of these
4. Collecting the data and converting it into 13. The steps and tasks needed to process data,
information is called such as responses to questions or clicking
TG
(1) processing (2) compiling an icon, are called [IBPS Clerk Mains 2017]
(3) importing (4) exporting (1) instructions
5. Computer cannot perform (2) the operating system
n
(3) Bake a cake (4) Division (3) difference engine (4) analytical engine
Se
7. Part number, description and number of parts 15. Abacus can perform
ordered are examples of (1) addition (2) subtraction
(1) control (2) output (3) multiplication (4) Both (1) and (2)
(3) processing (4) feedback
16. The Napier’s technology used for
8. Benefit(s) of computer is/are calculation is called
(1) very fast and can store huge amount of data (1) Naptologia (2) Vibologia
(2) provide accurate output either input is correct (3) Semiconductor (4) Rabdologia
or not
(3) think about the processing 17. Pascaline is also known as
(4) All of the above (1) abacus (2) adding machine
(3) division machine (4) difference machine
9. A collection of unprocessed items is
(1) information (2) data [SBI PO 2015] 18. Punched cards were first introduced by
(3) memory (4) reports (1) Powers (2) Pascal
(5) None of these (3) Jacquard (4) Herman Hollerith
Introduction to Computer 7
19. Punched card is also called [RRB NTPC 2016] 28. Computer size was very large in
A. Hollerith card B. Video Card (1) first generation
C. Sound Card D. Accelerator Card (2) second generation
Codes (3) third generation
(1) B (2) C (4) fourth generation
(3) A (4) D 29. First generation computers were based on
20. Which of the following is known as father (1) transistors (2) conductors
of computer? [SSC CGL 2015, UPSSSC 2016] (3) ICs (4) vacuum tubes
(1) Dennis Ritchie (2) Napier 30. Computer built before the first generation
(3) Charles Babbage (4) Alan Turing computer was
df
21. Who is known as the father of the modern (1) mechanical
computer? (2) electromechanical
_p
(1) Charles Babbage (2) Alan Turing (3) electrical
(3) Blaise Pascal (4) Jordan Murn (4) electronics
na
22. Analytical engine developed by 31. First generation computers used .........
(1) Blaise Pascal (2) Charles Babbage
aplanguage(s).
(3) Dennis Ritchie (4) Alan Turing (1) machine (2) assembly
23. The analytical engine developed during first (3) Both (1) and (2) (4) high level
:@
generation of computers used ......... as a 32. The second generation of computers was
memory unit. witnessed in the years from [UPSSSC 2018]
(1) RAM (2) floppies
TG
25. Who among the following created the (3) microprocessors (4) transistors
Electronic Discrete Variable Automatic
c
37. Integrated Circuits or ICs were started to be 45. Small and cheap computers built into
used from which generation of computers? several home appliances are of which type?
[IBPS PO 2016] [SSC (10+2) 2011]
(1) First generation (2) Second generation (1) Mainframes (2) Mini computers
(3) Third generation (4) Fourth generation (3) Micro computers (4) None of these
(5) Fifth generation
46. Desktop and personal computers are also
38. Chip is a common nickname for a(n) known as
[IBPS Clerk 2014, 15]
(1) supercomputers (2) servers
(1) transistor (2) resistor
(3) mainframes (4) microcomputers
(3) integrated circuit (4) semiconductor
(5) None of these 47. Computers that are portable and convenient
df
39. Integrated Circuit (IC) or chips used in to use for users who travel, are known as
computers are made with [IBPS Clerk 2014] (1) supercomputers
_p
(2) minicomputers
(1) copper (2) aluminium
(3) gold (4) silicon (3) mainframe computers
na
(5) silver (4) laptops
40. Who developed integrated chip? 48. Which of the following uses a handheld
(1) Robert Nayak (2) C Babbage
apoperating system?
(1) A supercomputer
(3) JS Kilby (4) CV Raman
:@
(2) A personal computer
41. A complete electronic circuit with (3) A laptop
transistors and other electronic components (4) A PDA
on a small silicon chip is called a(n)
TG
(5) transistors
be used by one person at a time?
c
df
(3) 2 and 3 (4) 1 and 2 (3) Venngage (4) Pixir
64. In 1991, India’s first indigenous
_p
54. A central computer that holds collection of
data and programs for many PCs, supercomputer named …… was developed
workstations and other computers is a by Vijay Bhatkar. [SSC CGL 2018]
na
(1) supercomputer (1) Prayas 3000 (2) Prayog 2000
(2) minicomputer (3) Param 8000 (4) Pragati 5000
(3) laptop
(4) server
ap
65. Who among the following is called the
father of supercomputing? [SSC CGL 2018]
:@
55. First mini computer was [UPSSSC 2016] (1) Ken Thompson (2) Alan Perlis
(1) PDP-8 (2) ENIAC (3) Seymour Cray (4) Vint Gerf
(3) UNISAC (4) EDVAC
TG
(5) Mainframe
(3) Indian Institute of Tropical Meteorology, Pune
57. The user generally applies ......... to access (4) Indian Institute of Technology, New Delhi
h
mainframe or supercomputer.
67. Choose the odd one out.
c
70. The …… computer is the most common type 73. Which of the following is not the example
of computer. It is used to process of special purpose computer?
information with quantities usually using (1) Automatic aircraft landing
the binary number system. [UPSSSC 2018] (2) Word processor
(1) Hybrid (2) Digital (3) Multimedia computer
(3) Analog (4) Complex (4) All of the above
71. Calculator works on which type of 74. Which type of computer is used in
computer’s work method? [UPSSSC 2015] automatic aircraft landing?
(1) Hybrid computer (1) General purpose computer
(2) Analog computer (2) Supercomputer
(3) Digital computer (3) Special purpose computer
df
(4) None of the above (4) Microcomputer
_p
72. Which of the following computer is mainly 75. Which of the following is the smallest and
related to convert analog output into digital fastest computer imitating brain working?
na
form? [UPSSSC 2016] (1) Supercomputer [IBPS PO 2016]
(1) Digital computer (2) Quantum computer
(2) Analog computer
(3) Hybrid computer
ap (3) Param-10000
(4) IBM chips
:@
(4) Mainframe computer (5) None of the above
ANSWERS
TG
1. (4) 2. (4) 3. (4) 4. (1) 5. (3) 6. (3) 7. (3) 8. (1) 9. (2) 10. (5)
11. (4) 12. (4) 13. (1) 14. (2) 15. (4) 16. (4) 17. (2) 18. (3) 19. (3) 20. (3)
21. (2) 22. (2) 23. (4) 24. (1) 25. (4) 26. (1) 27. (3) 28. (1) 29. (4) 30. (2)
n
31. (1) 32. (3) 33. (4) 34. (2) 35. (2) 36. (2) 37. (3) 38. (3) 39. (4) 40. (3)
O
41. (4) 42. (4) 43. (4) 44. (2) 45. (3) 46. (4) 47. (4) 48. (4) 49. (4) 50. (5)
51. (2) 52. (3) 53. (2) 54. (4) 55. (1) 56. (5) 57. (2) 58. (2) 59. (2) 60. (1)
h
61. (4) 62. (4) 63. (1) 64. (3) 65. (3) 66. (3) 67. (4) 68. (3) 69. (2) 70. (2)
c
71. (3) 72. (3) 73. (2) 74. (3) 75. (2)
ar
Se
Computer Architecture 11
C H A P T E R
02
COMPUTER
df
_p
ARCHITECTURE
na
ap
Computer architecture deals with the functional behaviour of a computer system as viewed by a
:@
programmer. It can also be described as the logical structure of the system unit that housed electronic
components. The first computer architecture was introduced in 1970, by John Von Neumann.
CPU
TG
Arithmetic
n
Primary
Input Memory Unit Output Control flow
h
Computer Architecture
Se
Components of Computer
1. Input Unit 2. Output Unit
3. Central Processing Unit 4. Memory Unit
Note System unit is a metal or plastic case that holds all the physical parts of the computer.
The components that process data are located in it.
Input Unit
The computer accepts coded information through input unit by the user. This unit is used to give required
information to the computer. For example, keyboard, mouse, etc.
An input unit performs the following functions
It accepts the instructions and data from the user.
It converts these instructions and data to computer acceptable format.
It supplies the converted instructions and data to the computer system for further processing.
12 Learn, Revise & Practice ~ Computer Awareness
df
It converts these coded results to readable form of registers vary from processor-to-processor.
which convenient to users.
_p
It produces the converted results to the user. Control Unit (CU)
CU coordinates with the input and output devices
na
Central Processing Unit (CPU) of a computer. It directs the computer to carry out
Central Processing Unit is often called the brain of stored program instructions by communicating
computer. The CPU is fabricated as a single
Integrated Circuit (IC) and is also known as
ap
with the ALU and the registers. It organises the
processing of data and instructions.
:@
microprocessor. The basic function of control unit is to fetch the
It consists a set of registers, arithmetic logic unit instruction stored in the main memory, identify the
and control unit, which together interpret and operations and the devices involved in it and
TG
The CPU executes the instructions in the stored memory (main memory) and secondary memory
sequence. (auxiliary memory).
h
When necessary, CPU transfers output data from The input data which is to be processed is brought
c
A CPU controls all the internal and external devices Another kind of memory is referred to as secondary
memory of a computer system. This unit is used to
and performs arithmetic and logic operations.
Se
df
All the other electronic devices and circuits of
place as an instruction is read from memory and
computer system are attached to this board like,
_p
executed.
ROM, RAM, expansion slots, PCI slots and USB
Fetch
ports. It also includes controllers for devices like
na
the hard drive, DVD drive, keyboard and mouse.
Components on Motherboard
(i) CMOS battery (ii) BIOS chip
ap Store
Instruction
Cycle Decode
:@
(iii) Fan (iv) Expansion slot
(v) SMPS (vi) PCI slot
(vii) Processor chip (viii) Buses Execute
TG
In other words, bus is a set of electronic signal In above steps, steps 1 and 2 instructions are same
ar
pathways that allows information and signals to and known as fetch cycle and steps 3 and 4
travel between components inside or outside of a instructions are different and known as execute cycle.
Se
computer.
A computer bus can be divided into two types Tit-Bits
1. Internal Bus The internal bus connects ■
UPS (Uninterruptible Power Supply) is an electrical
apparatus that provides emergency power to a
components inside the motherboard like CPU
load when the input power source or mains power
and system memory. It is also called the fails.
system bus. ■
Power strip is an electrical device that is used to
Internal bus includes following buses expand the capacity of a wall outlet in terms of the
number of devices it can accommodate.
(i) The command to access the memory or the ■
Instruction code is a group of bits that instruct the
I/O devices is carried by the control bus. computer to perform a specific operation.
Learn, Revise & Practice ~ Computer Awareness
QUESTION BANK
1. ............. forms the backbone for building 8. A(n) ......... device is any device that provides
successful computer system. information, which is sent to the CPU.
(1) Computer architecture (1) input (2) output
(2) Computer model (3) CPU (4) memory
(3) Computer instructions 9. Which of the following includes as a type of
(4) None of the above input?
2. The first computer architecture was (1) Data (2) Programs
df
introduced in (3) Commands (4) User response
(5) All of these
_p
(1) 1970 (2) 1968 (3) 1971 (4) 1973
3. Which circuit board is used in all electronic 10. Information that comes from external
source and fed into computer software is
na
systems such as computer, calculators,
digital system? called [IBPS RRB PO Mains 2017]
(1) Architecture (2) Printer (1) output (2) input
(3) Value (4) Register ap(3) throughout (4) reports
4. The system unit (5) process
:@
(5) Microprocessor
13. Output unit includes
c
16. Which instruction is used for loading data 25. Which part of the computer is used for
into CPU accumulator register from memory? calculating and comparing?
(1) Load (2) Storage (1) ALU (2) Control unit
(3) Machine (4) Access (3) Disc unit (4) Modem
17. Where does computer add and compare data? 26. Pick the one that is used for logical
(1) Hard disc (2) Floppy disc operations or comparisons such as less than,
(3) CPU (4) Memory chip equal to or greater than etc.
18. In computer, which of the following unit is (1) ALU (2) CU (3) Input unit (4) MU
responsible for processing and also known 27. What does ALU in computing denote?
as brain of computer? [SSC CGL 2019] [UPSSSC 2016, IBPS Clerk 2014]
(1) CPU (2) Keyboard (1) Application and Logic Unit
df
(3) Hard disk (4) RAM (2) Algorithm Logic Unit
_p
19. The main job of a CPU is to (3) Arithmetic Layered Unit
(1) carry out program instructions (4) Arithmetic Legal Unit
na
(2) store data/information for further use (5) Arithmetic Logic Unit
(3) process data and information 28. How many types of arithmetic operations
(4) Both (1) and (3) apdoes the ALU of computer perform?
(1) 4 (2) 2 (3) 5 (4) 8
20. The main purpose of time-sharing
:@
techniques used in computers is to make the 29. Processors contain a control unit and a/an
best use of the [SSC CGL 2016]
(1) CPU (2) peripherals (1) Control unit
TG
(3) secondary storage (4) floppy discs (2) Primary storage unit
(3) Input unit
21. The CPU is made up of two smaller (4) Arithmetic logic unit
components 30. Which of the following executes the
n
23. What is the responsibility of the logical unit numbers? [IBPS RRB PO Mains 2017]
in the CPU of a computer? [IBPS Clerk 2015] (1) BOU (2) AEU (3) CPU (4) ALU
(5) UPS
(1) To produce result
(2) To compare numbers 32. Internal memory in a CPU is nothing but
(3) To control flow of information (1) a set of registers (2) a set of ALU
(4) To do maths work (3) microprocessor (4) bus
(5) None of the above 33. Which among the following is a small set of
24. Which unit of computer helps in data holding place that is a part of the
communication between the memory and computer processor and may hold an
the arithmetic logical unit? instruction, a storage address, or any kind
[IBPS RRB PO Mains 2017] of data? [IBPS RRB PO Mains 2017]
(1) CMU (2) CCU (1) Register (2) WAN
(3) UPS (4) CPU (3) Bus (4) Address
(5) ALU (5) Processor
16 Learn, Revise & Practice ~ Computer Awareness
34. The portion of the CPU that coordinates the 43. The word ‘computer’ usually refers to the
activities of all the other computer central processing unit plus
components is the [SBI PO 2015] (1) external memory (2) internal memory
(1) motherboard (2) coordination board (3) input devices (4) output devices
(3) control unit (4) arithmetic logic unit 44. Who invent the first microprocessor?
(5) None of these (1) Vint Cerf (2) Terence Percival
35. Which among the following is an important (3) John Mauchly (4) Ted Hoff
circuitry in a computer system that directs 45. A microprocessor is the brain of the
the operation of the processor? computer and is also called a
[IBPS PO 2016] [RBI Grade B 2014]
(1) Memory (2) Address Bus (1) microchip (2) macrochip
df
(3) Accumulator (4) ALU (3) macroprocessor (4) calculator
(5) software
_p
(5) Control unit
36. The part of a computer that coordinates all its 46. Microprocessors can be used to make
(1) computer (2) digital system
na
functions, is called [IBPS Clerk Mains 2017]
(1) ROM program (2) System board (3) calculators (4) All of these
(3) Arithmetic logic unit (4) Control unit
(5) None of these
ap
47. High power microprocessor is
(1) Pentium, Pentium pro [UPSSSC 2019]
:@
37. The control unit controls other units by (2) Pentium II and III
generating (3) Pentium II
(1) control signal (2) timing signal (4) All of the above
TG
(3) transfer signal (4) command signal 48. The microprocessor of a computer
38. Control unit of a digital computer is often (1) does not understand machine language
(2) understands machine language and high level
called the language
n
(1) clock (2) nerve centre (3) understands only machine language
O
(3) Both (1) and (2) (4) IC (4) understands only high level languages
39. Memory unit that communicates directly 49. The CPU and memory are located in which
h
(1) main memory (2) secondary memory [IBPS Clerk Mains 2017]
ar
(3) auxiliary memory (4) register (1) Motherboard (2) Expansion board
40. CPU retrieves its data and instructions from (3) Storage device (4) Output device
Se
52. A …… is the main Printed Circuit Board (PCB) 59. A computer executes program in the
in a computer. [SSC CGL 2018] sequence of [RRB NTPC 2016]
(1) ROM (Read Only Memory) A. Execute, Fetch, Decode
(2) CPU (Central Processing Unit) B. Store, Fetch, Execute
(3) RAM (Random Access Memory) C. Fetch, Decode, Excecute
(4) Motherboard D. Decode, Fetch, Execute
53. Which one among the following is a main (1) D (2) A
system board of a computer? [SSC CGL 2017] (3) C (4) B
(1) CPU (2) Keyboard 60. Which is not an integral part of computer?
(3) Microchip (4) Motherboard [SBI Clerk 2012]
(1) CPU (2) Mouse
df
54. The communication line between CPU, (3) Monitor (4) UPS
memory and peripherals is called a (5) None of these
_p
(1) bus (2) line (3) media (4) All of these
61. A device that not only provides surge
55. A physical connection between the
na
protection, but also furnishes the computer
microprocessor memory and other parts of
with battery backup power during a power
the micro computer is known as
(1) path (2) address bus
apoutage is
(1) battery strip
[IBPS RRB PO Mains 2017]
57. The name of the location of a particular 62. What is a power strip? [UPSSSC 2019]
piece of data is its (1) It is an electrical device that is used to expand
(1) address (2) memory name the capacity of a wall outlet which can
n
ANSWERS
1. (1) 2. (1) 3. (1) 4. (2) 5. (1) 6. (3) 7. (1) 8. (1) 9. (5) 10. (2)
11. (2) 12. (3) 13. (4) 14. (3) 15. (3) 16. (1) 17. (3) 18. (1) 19. (4) 20. (1)
21. (1) 22. (2) 23. (2) 24. (4) 25. (1) 26. (1) 27. (5) 28. (1) 29. (4) 30. (3)
31. (4) 32. (1) 33. (1) 34. (3) 35. (5) 36. (4) 37. (1) 38. (2) 39. (1) 40. (3)
41. (2) 42. (1) 43. (1) 44. (4) 45. (1) 46. (4) 47. (4) 48. (3) 49. (1) 50. (2)
51. (4) 52. (4) 53. (4) 54. (1) 55. (2) 56. (2) 57. (1) 58. (4) 59. (3) 60. (4)
61. (2) 62. (1)
18 Learn, Revise & Practice ~ Computer Awareness
C H A P T E R
03
COMPUTER
df
_p
HARDWARE
na
ap
:@
Computer hardware refers to the physical components of a computer that can be seen and touched by the
user. The hardware component could be an electronic, electrical and mechanical devices used in the
TG
computer system.
Input Devices
n
An input device can be defined as an electro-mechanical device that allows the user to feed data into the
O
computer. This data is useful for analysis and storage and to give commands to the computer.
The data is entered into the main memory through these input devices. They accept instructions from the
h
Keyboard
Se
df
4. Cursor Control Keys include four directional
(left, right, up, down) arrow keys that are disables all the letters from being typed in
_p
arranged in a inverted T formation between the capital letters.
alphanumeric and numeric keypad. Apart from (viii) Num Lock Key It is used to enable and
na
the above arrow keys, there are four more keys disable the numeric keypad.
to control the cursor. (ix) Windows Key It is used to open the Start
These are as follows ap menu.
(i) Home It is used to return the cursor to the (x) Spacebar Key It provides space between
:@
beginning of the line or the beginning of a two words. It is the longest key on the
document. keyboard.
(ii) End It moves the cursor to the end of line. (xi) Tab Key It is used to move the cursor
TG
(iii) Page Up When it is pressed, the page view over the right to a pre-set point. In Word
will move up one page and cursor goes to document, tab is used to indent a paragraph.
the previous page. Note QWERTY keyboard contains total 104 keys.
n
operation as the combination with other A pointing device is used to communicate with
keys. For example, Ctrl + C is used for the computer by pointing to the location on the
copying. monitor. Movements of the pointing device are
(ii) Enter Key It is used to finish an entry echoed on the screen by movements of the pointer.
and begin a new entry in the document. Some commonly used pointing devices are described
Enter key is an alternative to press OK button. below
(iii) Shift Key Some keys on the keyboard
like numeric keys have a symbol printed on Mouse
their upper portion. Shift key is used to Mouse is a small handheld pointing device having
print these symbols. This key is also called two buttons on its upper side and also has a small
combination key, because it is always used wheel between these buttons. It was invented by
with other keys. For example, Shift + a, Douglas Engelbart at Stanford Research Centre in
converts small ‘a’ into capital ‘A’. 1963.
20 Learn, Revise & Practice ~ Computer Awareness
It provides to input data and commands in graphic moving the mouse. But with a joystick, the pointer
form through moving an arrow called pointer on continues moving in the previously pointing
monitor. direction. Joystick allows movements in all
The mouse may be used to position the cursor on directions (360°).
screen, move an object by dragging or select an
Light Pen
object by clicking.
Light pen is a handheld electro-optical pointing
Three types of mouse are as follows
device. It is used for making drawings, graphics
(i) Wireless mouse
and menu selection.
(ii) Mechanical mouse
The pen contains a photocell in a small tube. It
(iii) Optical mouse
senses the light from the screen when it becomes
df
Four actions of mouse are as follows closer and generates a pulse.
1. Click or Left Click It selects an item on the Light pen is used especially in Personal Digital
_p
screen. Assistants (PDA). It is very useful in identifying a
2. Double Click It is used to open a document specific location on the screen. However, it does
na
or program. not provide any information when held over a
3. Right Click It displays a list of commands on blank part of the screen.
the screen. Right click is used to access the
ap
Touch Screen
properties of the selected object.
:@
4. Drag and Drop It is used to move an item on Touch screen is an input device that accepts input
the screen. when the user places a fingertip on the computer
screen. Touch screens have an infrared beam that
TG
control room and sonar equipment on a ship or reader identifies the barcode
submarine. image by recognising special bars Barcode Reader
at both the ends of the image.
Joystick
A perfect example of a barcode reader is, to use it
Joystick is a device that moves in
in a super market where barcode scanner reads the
all directions and controls the
price of a product which is in the form of barcode.
movement of the cursor. Joysticks
A barcode is a machine readable representation of
are used in flight simulators,
Computer Aided Design/Computer information in the form of stripes of dark and light
Aided Manufacturing (CAD/CAM) ink.
system, etc.
A joystick is similar to a mouse Joystick
except that the movement of the 5050574807678
cursor on screen stops as soon as the user stops Barcode
Computer Hardware 21
df
Output
Stacker Smart Card Reader
_p
It is a device which is used to access the
microprocessor of a smart card.
na
Optical Mark Reader There are two kinds of smart card reader which are as
follows
The OMR interprets the pattern of marks into a
data record and sends this to the computer for
storage, analysis and reporting. OMR is widely
ap
Memory cards are the cards which contain only
non-volatile memory storage components and
some specific security logic.
:@
used to read the answer of objective type tests,
voting applications and other evaluation studies. Microprocessor cards contain volatile memory
and microprocessor components.
Optical Character Recognition
TG
storing the documents in their original form that Some of the commonly used output devices are
can be modified and manipulated later on. described below
Scanner stores images in both gray scale and color
mode. The most common types of scanners are as Monitor
follows It is also known as Visual Display Unit (VDU). The
(i) Handheld scanners monitor is provided alongwith the computer to
(ii) Flatbed scanners view display the result.
(iii) Drum scanners An image on the monitor is created by a
configuration of dots, also known as pixels.
Microphone (Mic) A monitor is of two kinds; monochrome display
We can send input to the computer through a monitor and colour display monitor.
df
special manual input device called microphone or A monochrome display monitor uses only one
mic. A mic converts the received sound into colour to display text and colour display monitor
_p
computer’s format, which is called Digitised can display 256 colours at a time.
Sound or Digital Audio.
na
The clarity of image depends on three factors which
To convert a voice into digital form, you need an
are as follows
additional hardware known as Sound Card. Sound
is used most often in multimedia. For example, we
can make our presentations more attractive using
ap
1. Resolution of Screen Resolution refers to
the number of pixels in horizontal and vertical
directions. The resolution of a monitor is
:@
recorded narration, music or sound effects.
higher when the pixels are closer together.
Now-a-days, microphones are also used with
speech recognition software. This means that we 2. Dot Pitch It refers to the diagonal distance
between two coloured pixels. The smaller the
TG
It is a video capturing device. Webcam is a digital display is able to draw a new image. The higher
O
camera attached to computer and can be used for the refresh rate, the more solid the image looks
video conferencing, online chatting, etc. on the screen. The refresh rate of monitor is
h
df
each individual pixel. transfers it onto the paper. The drum is coated
These TFTs act as individual switches that with photoreceptor materials.
_p
allow the pixels to change state rapidly, making Non-Impact Printer
them turn ON and OFF much more quickly.
na
This type of printer uses electrostatic chemicals
and inkjet technologies. They do not hit or impact a
Printers ribbon to print. It can produce high quality
A printer prints information and data from the
ap
graphics and often a wide variety of fonts than
computer onto a paper. It can print documents in impact printer.
:@
colour as well as in black and white. The quality of
The types of non-impact printer are as follows
a printer is determined by the clarity of the print.
1. Inkjet Printer It is a printer that places
The speed of a printer is measured in Characters
extremely small droplets of ink onto paper to
TG
Impact Printer fonts that is, type, styles and sizes. Laser printer
c
This type of printer strikes paper and ribbon uses laser beam onto photo sensitive surface for
ar
together to form a character, like a typewriter. printing. It prints high quality graphics.
Impact printer can print a character or an entire
Se
df
2. Drum plotter As a result, parallel ports provide high speed
data transmission. Parallel port is used to
_p
Speaker connect printer to the computer.
It is an output device that receives sound in the form 2. Serial Port It transmits one bit of data
na
of electric current. It needs a sound card connected through a single wire. Since, data is transmitted
to a CPU, that generates sound. serially as single bit. It provides slow speed data
ap
These are attached internally or externally to a transmission. It is used to connect external
computer system. modems, plotters, barcode reader, etc.
:@
These are used for listening music, for being audible 3. Universal Serial Bus (USB) It is a common
in seminars during presentations, etc. and popular external port available with
computers. Normally, two to four USB ports are
TG
Headphones provided on a PC. USB also has the plug and play
feature, which allows devices ready to be run.
These are a pair of small loudspeakers or less
commonly a single speaker, held close to a user’s 4. Firewire It is used to connect audio and video
n
ears and connected to a signal source such as an multimedia devices like video camera. Firewire
O
audio amplifier, radio, CD player or portable media is an expensive technology used for large data
player. They are also known as stereo phones, movement. Hard disk drive and new DVD
h
Projector
It is an output device which is used to project Tit-Bits
Se
QUESTION BANK
1. Any component of the computer you can 9. To move to the beginning of a line of text,
see and touch is [IBPS Clerk 2015] press the ...... key.
(1) software (2) peripheral (1) Page up (2) Shift
(3) storage (4) CPU (3) Home (4) Enter
(5) hardware 10. In a keyboard, left-right-up-down set of
2. Which of the following is not a hardware? keys facilitates which among the following
[SSC FCI 2012] functions? [IBPS RRB PO Mains 2017]
df
(1) Processor chip (2) Printer (1) Deleting data or modification
(3) Mouse (4) Java (2) Page scrolling to view a document
_p
(3) Launching Start Menu
3. A(n) …… device is any hardware component (4) Initiating Search and Help
that allows you to enter data and instructions
na
(5) Controlling RAM or process execution
into a computer. [SBI Clerk 2014]
11. Shift, Ctrl, Alt are examples of which among
(1) interaction (2) input apthe following category?
(3) communication (4) output
[IBPS RRB PO Mains 2017]
(5) terminal
:@
17. Which is the best position for operating the 25. .......... is generally used in applications like
mouse? ATM, hospitals, airline reservation, etc.
(1) Tail away from the user (1) Light pen (2) Touch screen
(2) Tail towards the user (3) Joystick (4) Trackball
(3) Tail facing the right
(4) Tail facing the left 26. Which one does not related to mobile phone
touch panel sensing methods?
18. Which button is called as middle button [RRB NTPC 2016]
used as third mouse button by pressing on A. Finger touch
it? [IBPS RRB PO Mains 2017] B. Voice recognition
(1) Right button (2) Scroll wheel C. Gloved touch
(3) Touch bar (4) Light bar D. Light transmittance
df
(5) Left button (1) B (2) A
19. Trackball is an example of a/an (3) D (4) C
_p
(1) programming device (2) pointing device 27. The pattern of printed lines on most
(3) output device (4) software device products are called
na
20. Which of the following is an input device (1) prices (2) OCR
used to enter motion data into computers or ap(3) scanners (4) barcodes
other electronic devices? [SSC CHSL 2019] 28. A barcode reader is an example of
(1) Plotter (2) Trackball
:@
(1) processing device (2) storage device
(3) Monitor (4) Joystick (3) input device (4) output device
21. A joystick is primarily used to/for …… . 29. An optical input device that interprets
TG
[SBI PO 2013]
pencil marks on paper media is ………
(1) control sound on the screen [IBPS RRB PO Mains 2017]
(2) computer gaming
(1) OMR (2) punch card reader
(3) enter text
n
22. Which of the following is a lever that can be 30. The OCR is used for the preparation of
h
monitor or similar display screen? (3) telephone bills (4) All of these
[SSC CHSL 2019] (5) None of these
Se
(1) MIDI devices (2) Optical mark reader 31. The OCR recognises the …… of the
(3) Visual display unit (4) Joystick characters with the help of light source.
23. Which one of the following is not an output (1) size (2) shape
device? [SSC CGL 2018] (3) colour (4) used ink
(1) Projector (2) Headphones 32. What does MICR stand for?
(3) Plotter (4) Joystick [IBPS Clerk 2014, RBI Grade B 2014]
24. CAD stands for [SSC CGL 2014] (1) Magnetic Ink Character Register
(1) Computer Automatic Design (2) Magnetic Ink Code Reader
(2) Computer Aided Decode (3) Magnetic Ink Code Register
(3) Computer Automatic Decode (4) Magnetic Ink Character Recognition
(4) Computer Aided Design (5) Magnetic Ink Cases Reader
Computer Hardware 27
33. Large amounts of cheques are processed by 42. Which of the following could be digital
using input devices for computers?
(1) OCR (2) MICR [RBI Grade B 2014]
(3) OMR (4) All of these (1) Digital camcorder
(2) Microphone
34. Which of the following device recognises (3) Scanner
physical traits of an individual? (4) All of the above
(1) Smart card (2) Biometric sensor (5) None of the above
(3) Barcode (4) MICR 43. Which of the following groups consists of
35. Which of the following consists of an only input devices?
electronic writing area and a special pen (1) Mouse, Keyboard, Monitor
df
that works with it? [SSC CHSL 2019] (2) Mouse, Keyboard, Printer
(1) Trackball (2) Plotters (3) Mouse, Keyboard, Plotter
_p
(3) Abacus (4) Graphics tablet (4) Mouse, Keyboard, Scanner
36. Which of the following converts analog 44. Results are obtained from computer through
na
information into digital form? its
(1) Barcode reader [SSC CHSL 2019] (1) input unit (2) ALU unit
(2) Optical mark reading
(3) Digitizer
ap(3) CU unit (4) output unit
45. After a picture has been taken with a digital
:@
(4) Gamepad camera and processed appropriately, the
37. A........ is used to read handwritten or actual print of the picture is considered as
printed text to make a digital image that is (1) data (2) output
TG
38. The input device to be used to get a printed (1) view or print data (2) modify data
O
diagram into a computer is the (3) store data (4) replicate data
[IBPS Clerk 2013, IBPS Clerk 2015] (5) enter data
h
(5) scanner
[IBPS RRB PO Mains 2017]
39. A scanner scans [SBI PO 2015]
Se
41. An example of an input device is 49. Soft copy refers to …… . [IBPS Clerk 2013]
[SSC CGL 2018] (1) printed output (2) digitising
(1) soundcard (2) headphones (3) music sounds (4) screen output
(3) projector (4) webcam (5) None of these
28 Learn, Revise & Practice ~ Computer Awareness
50. The higher the resolution of a monitor, the 60. An example of peripheral equipment is
(1) larger the pixels (1) printer
(2) less clear the screen is (2) CPU
(3) further apart the pixels (3) spreadsheet
(4) closer together the pixels (4) microcomputer
51. Screen or monitor device is [UPSSSC 2016] 61. Dot matrix printer is
(1) hard copy (2) soft copy (1) unidirectional (2) bi-directional
(3) input device (4) display device (3) sequential (4) random
52. The CRT is ……… in shape. 62. The impact printers are
[RBI Grade B 2013] (1) dot matrix (2) drum
df
(1) circular (2) rectangular (3) inkjet (4) Both (1) and (2)
(3) eclipse (4) conical
63. Drum printer is an example of
_p
(5) None of these
(1) input (2) output
53. CRT has a [RBI Grade B 2013] (3) processing (4) storage
na
(1) hollow tube (2) vacuum tube
64. The example of non-impact printers are
(3) long tube (4) round tube [RBI Grade B 2013]
(5) None of these ap(1) Laser-Dot matrix (2) Inkjet-Laser
54. The rate at which scanning is repeated in a (3) Inkjet-Dot matrix (4) Dot matrix
:@
55. …… provides hard copy output on paper. (2) CPM (Characters Per Minute)
[SBI Clerk 2015] (3) DPM
(1) Mouse (2) Keyboard (4) Any of the above
n
(3) processing device (4) storage device (1) magnetised (2) photosensitive
ar
(5) None of the above (3) magnetic (4) Either (1) or (2)
(5) None of these
Se
70. Who invented the 3D printer? 78. Which of the following are properties of
[SSC CGL 2016] USB? [IBPS Clerk Mains 2017]
(1) Nick Holonyak (1) Platform independent
(2) Elias Howe (2) Platform dependent
(3) Chuck Hull (3) Source dependent
(4) Christian Huygens (4) Software dependent
71. It is used to produce large drawings or (5) Software Independent
images such as construction plans, 79. The …… format reduces an audio file to
blueprints for mechnanical object, etc. about one-tenth of its original size, while
(1) Printer (2) Plotter preserving much of the original quality of
(3) MICR (4) OCR the sound. [SBI Clerk 2014]
df
72. What type of devices are computer speakers (1) DOC (2) PNG (3) GIF (4) MP3
_p
or headphones? [IBPS Clerk 2015] (5) VMEG
(1) Input (2) Input/Output 80. Peripheral devices such as printers and
na
(3) Software (4) Storage monitors are considered to be …… .
(5) Output [IBPS Clerk 2013]
73. Which is not an item of hardware? ap(1) hardware (2) software
[IBPS Clerk 2013] (3) data (4) information
(5) source code
:@
(1) An MP3 file (2) A keyboard
(3) A mouse (4) Printer 81. External devices such as printers, keyboards
(5) None of these and modems are known as [IBPS Clerk 2015]
TG
85. Input devices are used to provide the steps 86. For printing MICR characters, the ink used
and tasks the computer needs to process contains [RRB NTPC 2016]
data and these steps and tasks are called A. Lead oxide B. Graphite
[IBPS Clerk 2015] C. Cuprous oxide D. Iron oxide
(1) program (2) design (1) B (2) C
(3) information (4) instructions (3) D (4) A
(5) flow chart
ANSWERS
1. (5) 2. (4) 3. (2) 4. (3) 5. (2) 6. (4) 7. (3) 8. (2) 9. (3) 10. (2)
df
11. (1) 12. (4) 13. (3) 14. (1) 15. (1) 16. (4) 17. (2) 18. (2) 19. (2) 20. (2)
21. (2) 22. (4) 23. (4) 24. (4) 25. (2) 26. (1) 27. (4) 28. (3) 29. (1) 30. (4)
_p
31. (2) 32. (4) 33. (2) 34. (2) 35. (4) 36. (3) 37. (3) 38. (5) 39. (3) 40. (1)
41. (4) 42. (4) 43. (4) 44. (4) 45. (2) 46. (1) 47. (2) 48. (5) 49. (4) 50. (4)
na
51. (4) 52. (2) 53. (2) 54. (1) 55. (5) 56. (1) 57. (2) 58. (4) 59. (1) 60. (1)
61. (2) 62. (4) 63. (2) 64. (2) 65. (2) 66. (2) 67. (3) 68. (2) 69. (5) 70. (3)
71. (2)
81. (2)
72. (5)
82. (2)
73. (1)
83. (4)
74. (4)
84. (4)
75. (1)
85. (4)
ap
76. (5)
86. (3)
77. (3) 78. (1) 79. (4) 80. (1)
:@
TG
n
O
ch
ar
Se
Computer Hardware 31
C H A P T E R
04
COMPUTER
df
_p
MEMORY
na
ap
Computer memory stores data and instructions The two categories of RAM are as follows
:@
required during the processing of data and output (i) Dynamic RAM (DRAM) It is made up of
results. It also relates to many devices that are memory cells where each cell is composed
responsible for storing data on a temporary or a of one capacitor and one transistor.
TG
computer’s motherboard.
Primary Memory
O
The memory unit that communicates directly with (ii) Static RAM (SRAM) It retains the data
as long as power is provided to the
h
df
remain in the secondary storage as long as it is not
by exposure to strong ultraviolet light,
overwritten or deleted by the user. It is a permanent
_p
then rewritten. So, it is also known as
storage.
Ultraviolet Erasable Programmable ROM
(UVEPROM). Secondary memory devices include following types of
na
memory
(iii) Electrically Erasable Programmable
1. Magnetic Storage It is the manipulation of
ROM (EEPROM) It is similar to EPROM, apmagnetic fields on a medium in order to record
but it can be erased electrically, then
audio, video or other data. It includes hard disk
rewritten electrically and the burning
:@
drive, floppy disk and magnetic tape, which are
process is reversible by exposure to
described below
electric pulses. It is the most flexible type
of ROM and is now commonly used for (i) Hard Disk Drive (HDD) It is a non-volatile
TG
Apart from above memories, there are also some magnetic material.
other memories that help to primary memory, All programs of a computer are installed in
h
used more often, temporarily and makes it available recorded data. Each platter requires two
to CPU at a fast rate. Cache memory is a very high read/write heads, that are used to write and
speed memory placed in between RAM and CPU. It read information from a platter.
increases the speed of processing. All the read/write heads are attached to a
Flash Memory single access arm so that they cannot move
independently.
It is a kind of semiconductor based non-volatile
rewritable memory, used in digital camera, mobile
phone, printer, etc.
Sectors Tracks
Virtual Memory
It is a technique that allows the execution of
processes that are not completely in main memory.
One major advantage of this memory is that
programs can be larger than main memory. Tracks and Sectors
Computer Hardware 33
The information is recorded in bands; each storage device. DVDs offer higher storage
band of information is called a track. Each capacity than CDs while having the same
platter has the same number of tracks and a dimensions.
track location that cuts across all platters is Depending upon the disc type, DVD can
called a cylinder. The tracks are divided into store several gigabytes of data (4.7 GB-17.08
pie-shaped sections known as sectors. GB). DVDs are primarily used to store music
(ii) Floppy Disk (Diskette) Floppy disk is round or movies and can be played back on your
in shape and a thin plastic disk coated with television or computer too. They are not
iron oxide. It is used to store data but it can rewritable storage device.
store small amount of data and it is slower to DVDs come in three varieties are as follows
access than hard disks. DVD-ROM (Digital Video Disc-Read Only
df
Data is retrieved or recorded on the surface Memory)
of the disk through a slot on the envelope.
_p
DVD-R (DVD-Recordable)
Floppy disk is removable from the drive.
DVD-RW (DVD-Re-Writable)
Floppy disk is available in three sizes; 8 inch,
na
1 1 (iii) Blu-ray Disc It is an optical disc storage
5 inch and 3 inch. medium designed to re-capture the data
4 2
(iii) Magnetic Tape These tapes are made of a
ap normally in DVD format. Blu-ray disc (BD)
contains 25 GB (23.31 GB) per layer space.
plastic film-type material coated with
:@
magnetic materials to store data The name Blu-ray disc refers to the blue
permanently. Data can be read as well as laser used to read the disc, which allows
write. It is usually 12.5 mm to 25 mm wide information to be stored at a greater density
TG
and 500 m to 1200 m long. than the longer- wavelength red laser used
in DVDs.
Magnetic tapes hold the maximum data,
Blu-ray can hold almost 5 times more data
which can be accessed sequentially. They are
than a single layer DVD.
n
as an easy and small medium to transfer and minimising IT infrastructure costs and act as a
store the information from the computers. good option for handling peak loads on the
(ii) Memory Cards These are the data storage local infrastructure. A public cloud is meant to
devices in chip shaped. They are commonly serve multiple users, not a single customer.
used in many electronic devices, including 2. Private Cloud These are distributed systems
digital cameras, mobile phones, laptop, that work on a private infrastructure and
computers. They are small, re-recordable, providing the users with dynamic provisioning
easily portable and very light weighted. of computing resources.
Basic Units of Memory Measurements 3. Hybrid Cloud It is a heterogeneous
1 Bit = Binary Digit (0 or 1) distributed system resulted by combining
= 1 Nibble facilities of public cloud and private cloud. For
df
4 Bits
= 1 Byte = 2 Nibble
this reason, they are also called heterogeneous
8 Bits
clouds.
_p
1024 Bytes = 1 KB (KiloByte)
= 1 MB (MegaByte)
1024 KB Cloud Computing Services
na
1024 MB = 1 GB(GigaByte)
1. Infrastructure as a Service (IaaS) It is a cloud
1024 GB = 1 TB(TeraByte) computing model where virtualised
1024 TB = 1 PB(PetaByte)
apinfrastructure is offered to and managed for
1024 PB = 1 EB(ExaByte) business by external cloud providers. Some
:@
A byte can represent 256 (0-255 or 2 8) distinct subscription basis. Most common examples of
O
QUESTION BANK
df
1. …… stores data and instructions required 8. Which of the following is a correct
_p
during the processing of data and output definition of volatile memory?
results. (1) It does retain its contents at high temperature
na
(1) Memory (2) Architecture (2) It is to be kept in air-tight box
(3) Input (4) Output (3) It loses its content on failure of power supply
2. Where is data saved permanently? ap (4) It does not lose its content on failure of power
supply
(1) Memory (2) Storage
:@
(3) CPU (4) Printer 9. Cache and main memory will not be able to
hold their contents when the power is OFF.
3. Where are programs and data to be used by They are
the computer available? [SSC FCI 2012] (1) dynamic (2) static
TG
13. Which of the following is not true about 21. A disc’s content that is recorded at the time
RAM? [IBPS PO 2015, IBPS Clerk 2014] of manufacture and cannot be changed or
(1) RAM is the same as hard disk storage erased by the user is [IBPS Clerk 2013]
(2) RAM is a temporary storage area (1) memory only (2) write only
(3) RAM is volatile (3) once only (4) run only
(4) RAM is a primary memory (5) read only
(5) Other than those given as options
22. In the field of Information and
14. Virtual memory allocates hard disk space to Communication Technology (ICT), what is
supplement the immediate, functional the full form of EEPROM? [SSC CGL 2018]
memory capacity of [SBI PO 2014]
(1) Electrically Erasable Programmable Read
(1) ROM (2) EPROM Only Memory
df
(3) the registers (4) extended memory (2) Electrically Efficient Portable Read Only
(5) RAM Memory
_p
15. Storage that retains its data after the power (3) Electrically Efficient Programmable Read
is turned OFF is referred to as Only Memory
na
[SBI Clerk 2009] (4) Enhanced Electrical Portable Read Only
Memory
(1) volatile storage (2) non-volatile storage
(3) sequential storage
16. The advantage of DRAM is
(4) direct storage ap
23. The difference between memory and
storage is that memory is …… and storage is
……… .
:@
(1) it is cheaper than SRAM [IBPS Clerk 2015]
(2) it can store data more than that of SRAM (1) temporary; permanent
(3) it is faster than SRAM (2) permanent; temporary
(3) slow; fast
TG
(1) ALU (2) Cache memory and the main memory. [UPSSSC 2018]
O
(3) RAM (4) ROM (1) primary memory (2) cache memory
18. Permanent instructions that the computer use (3) secondary memory (4) RAM
h
when it is turned ON and that cannot be 25. Which of the following is a very high speed
c
(1) ROM (2) RAM (3) ALU (4) SRAM (1) Secondary memory (2) Main memory
(3) Primary memory (4) Cache memory
19. When you first turn on a computer, the
CPU is preset to execute instructions stored 26. What is the term used for temporarily
in the [IBPS PO 2015] stored data? [UPSSSC 2019]
(1) RAM (2) flash memory (1) Miscellaneous data (2) Cache data
(3) ROM (4) CD-ROM (3) Picked data (4) Tempo data
(5) ALU 27. ......... is having more memory addresses than
20. What is the full form of PROM? are physically available. [SBI PO 2014]
[SSC CHSL 2019] (1) Virtual memory
(1) Programmable Read Only Memory (2) System software
(2) Program Read Output Memory (3) Application software
(3) Program Read Only Memory (4) RAM
(4) Primary Read Only Memory (5) Vertical memory
Computer Hardware 37
28. ……… is the ability of a device to ‘jump’ directly 35. The storage device used to compensate for
to the requested data. the difference in rates of flow of data from
(1) Sequential access one device to another is termed as
(2) Random access (1) chip (2) channel
(3) Quick access (3) floppy (4) buffer
(4) All of the above 36. Which of the following is the magnetic
29. The ……… is the amount of data that a storage device?
storage device can move from the storage to (1) Hard disk (2) Compact disc
the computer per second. (3) Audio tapes (4) All of these
(1) data migration rate 37. Hard disk devices are considered ……
(2) data digitising rate storage.
df
[SBI Clerk 2014]
(3) data transfer rate
(1) flash (2) temporary
_p
(4) data access rate
(3) worthless (4) non-volatile
30. The main directory of a disk is called the (5) non-permanent
na
……… directory. [IBPS PO 2015]
38. The thick, rigid metal plotters that are
(1) network
capable of retrieving information at a high
(2) folder ap
(3) root
rate of speed are known as [SBI Clerk 2014]
(4) other than those given as options (1) hard disk (2) SAN
:@
store data but they cannot perform 40. The hard drive is normally located
(1) arithmetic operations (1) next to the printer [SBI PO 2014]
h
(2) logic operations (2) plugged into the back of the computer
(3) underneath the monitor
c
(4) All of the above (5) inside the system base unit
33. Where do you save the data that, your data
Se
44. The capacity of 3.5 inch floppy disk is 52. On a CD-RW, you can
(1) 1.40 MB (2) 1.44 GB (1) read and write information
(3) 1.40 GB (4) 1.44 MB (2) only read information
45. The most common storage device for the (3) only write information
personal computer is the [SBI Clerk 2014] (4) read, write and rewrite information
(1) floppy disk 53. Which of the following are advantages of
(2) USB personal computer CD-ROM as a storage media?
(3) mainframe [RBI Grade B 2014]
(4) a laptop
(5) None of these (1) CD-ROM is an inexpensive way to store large
amount of data and information
46. Which of the following has the smallest (2) CD-ROM discs retrieve data and information
df
storage capacity? [IBPS Clerk 2015] more quickly than magnetic disks
(1) Zip disk (2) Hard disk (3) CD-ROMs make less errors than magnetic media
_p
(3) Floppy disk (4) Data cartridge (4) All of the above
(5) CD (5) None of the above
na
47. FDD stands for 54. Which media has the ability to have
[SSC, CGL 2018, IBPS Clerk 2015] data/information stored (written) on them by
(1) Floppy Drive Detector
(2) Floppy Drive Demodulator
apusers more than once? [RBI Grade B 2014]
(1) CD-R discs
:@
(3) Floppy Disk Drive (2) CD-RW discs
(4) Floppy Demodulator Disc (3) Zip discs
(5) None of the above (4) Optical discs
TG
(1) Tracking (2) Formatting (1) They are the same—just two different terms
(3) Crashing (4) Allotting
O
df
(4) None of the above (4) Hexadecimal numbers
_p
60. A DVD is an example of a(n) (5) Binary numbers
[SBI Clerk 2014] 68. How many bits are equal to one byte ?
(1) optical device
na
[SSC CGL 2016]
(2) output device (1) 8 (2) 6 (3) 7 (4) 2
(3) hard disk
(4) solid state storage device
(5) None of the above
ap
69. Instructions and memory address are
represented by [IBPS Clerk 2015]
:@
(1) character code (2) binary codes
61. Which of the following discs can be read
(3) binary word (4) parity bit
only? [IBPS Clerk 2015]
(5) None of these
(1) DVD-R (2) DVD-ROM
TG
(3) DVR-RW (4) CD-R 70. Kilo Byte equals to how many bytes?
(5) None of these [SBI Clerk 2012]
(1) 1000 (2) 1035 (3) 100 (4) 1008
62. Which is not an external storage device? (5) 1024
n
63. …… is the smallest unit of data in a (3) mega byte (4) tera byte
c
(1) Gigabyte (2) Bit 72. What does the computer abbreviation ‘MB’
(3) Byte (4) Terabyte
Se
75. A … is approximately one billion bytes. 80. …… (HHDD) is a technology where the
[IBPS Clerk 2014, SBI PO 2015] conventional disk drive is combined with
(1) kilobyte (2) bit non-volatile flash memory, of typically
(3) gigabyte (4) megabyte 128 MB or more to cache data during
(5) None of these normal use. [SSC CGL 2017]
76. The term ‘gigabyte’ refers to [IBPS PO 2012] (1) Hyper Hard Disk Drive
(1) 1024 byte (2) Hybrid Hard Disk Drive
(2) 1024 kilobyte (3) Hybrid Helium Disk Drive
(3) 1024 megabyte (4) Hyper Helium Disk Drive
(4) 1024 gigabyte
(5) None of the above 81. Which of the following provides computing
and storage capacity services to heterogeneous
df
77. Which of the following is the largest unit of community of end recipients?
storage? [SBI PO 2015]
_p
(1) Cloud computing (2) Big data
(1) GB (2) KB
(3) FutureSkills (4) Robotics
(3) MB (4) TB
na
(5) None of these 82. What is/are characteristics of cloud
78. Which of the following is correct sequence computing?
of smallest to largest units of storage size?
ap (1) On demand self services
[SBI PO 2014] (2) Broad network access
:@
(3) Megabyte, Terabyte, Gigabyte, Kilobyte, Petabyte serve multiple users, not a single customer?
(4) Kilobyte, Megabyte, Petabyte, Terabyte, (1) Private cloud (2) Public cloud
Gigabyte (3) Hybrid cloud (4) None of these
n
79. How many gigabytes is equal to 1 petabyte? supply on demand environment for
[SSC CGL 2016]
developing software applications?
h
ANSWERS
Se
1. (1) 2. (2) 3. (3) 4. (4) 5. (5) 6. (4) 7. (1) 8. (3) 9. (3) 10. (1)
11. (4) 12. (3) 13. (1) 14. (5) 15. (2) 16. (1) 17. (4) 18. (1) 19. (3) 20. (1)
21. (5) 22. (1) 23. (1) 24. (2) 25. (4) 26. (2) 27. (1) 28. (2) 29. (2) 30. (3)
31. (3) 32. (4) 33. (3) 34. (4) 35. (4) 36. (1) 37. (4) 38. (1) 39. (3) 40. (5)
41. (4) 42. (5) 43. (3) 44. (4) 45. (1) 46. (3) 47. (3) 48. (2) 49. (5) 50. (2)
51. (4) 52. (4) 53. (1) 54. (2) 55. (1) 56. (2) 57. (3) 58. (4) 59. (3) 60. (1)
61. (2) 62. (4) 63. (2) 64. (3) 65. (1) 66. (4) 67. (1) 68. (1) 69. (2) 70. (5)
71. (3) 72. (3) 73. (3) 74. (2) 75. (3) 76. (3) 77. (4) 78. (5) 79. (4) 80. (2)
81. (1) 82. (4) 83. (2) 84. (3)
Data Representation 41
C H A P T E R
05
DATA
df
REPRESENTATION
_p
na
ap
Data representation refers those methods which Decimal Number System
:@
are used internally to represent information stored The number system that we use in our day-to-day
in a computer. Computer store lots of different life is decimal number system.
types of information as numbers, text, graphics,
TG
It is a technique to represent numbers in the Here, 10 represents the base of decimal number.
O
df
8 1000 — 8
= 8 + 4 + 0 + 1 + 0. 5 + 0 = 13.5
9 1001 — 9
_p
10 1010 — A Then, (1101.10) 2 → (13. 5)10
11 1011 — B
na
12 1100 — C
Binary to Octal
13 1101 — D
14 1110 — E To convert binary to octal, following steps are
ap
15 1111 — F involved
Step 1 Make the group of 3 bits from right to left. If the
:@
should be 0 or 1.
Step 3 If quotient ≠ 0, then again divide the Then, (110110100) 2 → (664 ) 8
h
df
B = 11 A = 10 8 1
↓ ↓ ↓ ↓
_p
Decimal to Hexadecimal
1011 1010 1000 0001
To convert decimal to hexadecimal, following steps
Then, ( BA81 )16 → (1011101010000001 ) 2
na
are involved
Step 1 Divide the given number by 16.
Decimal to Octal ap
Step 2 Note the quotient and remainder. Digits of
To convert decimal to octal, following steps are remainder will be 0 to 9 or A to F.
involved Step 3 If quotient ≠ 0, then again divide the
:@
process.
Example (929987)10 → (? )16
O
16 58124
Example (97647)10 → (?) 8
c
16 3632 0
ar
8 1525 5 0
8 190 6
8 23 7
8 2 2 MSD Then, (929987)10 → ( E 30 C 3)16
0
Hexadecimal to Decimal
Then, (97647)10 → (276557) 8 To convert hexadecimal to decimal, following steps
are involved
Octal to Decimal
Step 1 Multiply each digit of hexadecimal number
To convert octal to decimal, following steps are with powers of 16.
involved Step 2 These powers should be positive for integral
Step 1 Multiply each digit of octal number with part and negative for fractional part.
powers of 8.
Step 3 Add the all multiplying digits.
44 Learn, Revise & Practice ~ Computer Awareness
df
Step 1 Convert each digit of octal number to binary This system was developed by IBM. It is a number
number. system where four bits are used to represent each
_p
Step 2 Again, convert each binary digit to decimal digits.
hexadecimal number. BCD is a method of using binary digits to represent
na
Example (7632) 8 → (?)16 the decimal digits (0-9). In BCD system, there is no
Now, limit on size of a number.
7 6 3 2 ap
↓ ↓ ↓ ↓ American Standard Code for
111 110 011 010 Information Interchange (ASCII)
:@
(7632) 8 → (111110 011 010) 2 These are standard character codes used to store
data so that it may be used by other software
1111 1001 1010
programs.
TG
↓ ↓ ↓
15 9 10 Basically, ASCII codes are of two types, which are as
F A follows
(i) ASCII-7 It is a 7-bit standard ASCII code. It
n
or characters.
Hexadecimal to Octal
(ii) ASCII-8 It is an extended version of ASCII-7.
h
involved
unique symbols or characters.
ar
Logic
4. NAND Gate It is basically the inverse of
Inputs Output the AND gate. This gate is designed by
operation
combining the AND and NOT gates.
There are various types of logic gate as follows
It returns False only if the both conditions
1. AND Gate This gate is also represented by (⋅), or inputs are True otherwise it returns
i.e. ( A ⋅ B ). It returns True only if both the True.
conditions or inputs are True otherwise it A
X
returns False. B
A
X Truth Table of NAND Gate
B
A B X
Truth Table of AND Gate
df
0 0 1
A B X 0 1 1
_p
0 0 0 1 0 1
0 1 0 1 1 0
na
1 0 0 X = ( A ⋅ B) = A + B
1 1 1 ap
5. NOR Gate It is inverse of the OR gate. This
∴ X = A⋅B gate is designed by combining the OR and
:@
2. OR Gate This is represented by ( + ), i.e. NOT gates. It returns True only if both the
conditions or inputs are False otherwise it
( A + B ). It returns True if any one of the
returns False.
conditions or inputs is True and if both
TG
A B X
A B X 0 0 1
h
0 0 0 0 1 0
c
0 1 1 1 0 0
ar
1 0 1 1 1 0
1 1 1
Se
X = ( A + B) = A ⋅ B
∴ X=A+B
3. Inverter or NOT Gate This gate is also Note NAND and NOR gates are also called
represented by (′), i.e. A′. It returns True if universal gates.
the input is false and vice-versa. 6. Exclusive-OR or XOR Gate It performs
based on the operation of OR gate.
A X
It returns True only if one condition is true
from both the conditions otherwise it
Truth Table of NOT Gate returns False.
A X = A′
A
0 1 X
B
1 0
46 Learn, Revise & Practice ~ Computer Awareness
df
_p
QUESTION BANK
na
1. There are how many types of number system?
ap
7. Binary system is also called
(1) One (2) Two (3) Three (4) Four (1) base one system (2) base two system
:@
2. Modern computers represent characters and (3) base system (4) binary system
numbers internally using one of the 8. Which of the following is an example of
following number systems. binary number?
TG
(5) mantissa
(3) 8 characters (4) 8 bits
10. Decimal number system is the group of
Se
12. A hexadecimal number is represented by 22. The decimal equivalent of binary number
(1) three digits (2) four binary digits (1010 ) 2 is
(3) four digits (4) All of these (1) 8 (2) 9 (3) 10 (4) 11
13. Hexadecimal number system has .......... base. 23. The binary number 10101 is equivalent to
(1) 2 (2) 8 (3) 10 (4) 16 decimal number .............
14. Hexadecimal number system consists of (1) 19 (2) 12 (3) 27 (4) 21
(1) 0 to 9 (2) A to F 24. Which of the following is octal number
(3) Both (1) and (2) (4) Either (1) or (2) equivalent to binary number (110101) 2 ?
15. A hexadigit can be represented by (1) 12 (2) 65
[IBPS Clerk 2012]
(3) 56 (4) 1111
df
(1) three binary (consecutive) bits 25. Which of the following is a binary number
(2) four binary (consecutive) bits equivalent to octal number (.431) 8 ?
_p
(3) eight binary (consecutive) bits (1) (100011001)2 (2) (.100011001)2
(4) sixteen binary (consecutive) bits (3) (100110100)2 (4) (.100110001)2
na
(5) None of the above
26. To convert binary number to decimal,
16. Which of the following is invalid multiply the all binary digits by power of
hexadecimal number?
(1) A0XB (2) A0F6
ap(1) 0
(3) 4
(2) 2
(4) 6
:@
(3) 4568 (4) ACDB 27. Which of the following is hexadecimal
17. What type of information system would be number equivalent to binary number
recognised by digital circuits? ( 1111 1001 ) 2 ?
TG
18. The binary equivalent of decimal number 98 (1) (40)16 (2) (39 )16
is [IBPS Clerk 2012] (3) (49 )16 (4) (42)16
h
(1) 1110001 (2) 1110100 29. Which of the following is the correct binary
c
32. Determine the octal equivalent of (432267 )10 40. How will you represent ‘87’ in this code
(1) (432267 )8 (2) (346731)8 language?
(3) (2164432)8 (4) None of these (1) o∆∆∆o∆∆ (2) ∆o∆o∆∆∆
(3) ∆∆o∆∆∆∆ (4) ∆oo∆oo∆
33. Determine the decimal equivalent of (456 ) 8 (5) ∆∆o∆∆∆o
(1) (203)10 (2) (302)10 41. What will be the code for ∆∆ooo∆o ?
(3) (400)10 (4) (402)10
(1) 98 (2) 95 (3) 96 (4) 94
34. Conversion of octal number (3137 ) 8 to its (5) 99
decimal equivalent is
(1) (1631)10 (2) (1632)10 42. How many values can be represented by a
(3) (1531)10 (4) (1931)10 single byte?
df
(1) 4 (2) 16
35. Conversion of decimal number (15)10 to (3) 64 (4) 256
_p
hexadecimal number is 43. Which of the following is not a computer
(1) (14 )16 (2) (13)16 (3) ( F )16 (4) (7 F )16 code?
na
36. Which of the following is a hexadecimal (1) EBCDIC (2) ASCII
number equal to 3431 octal number? (3) CISC (4) UNICODE
(1) 197
(5) 719
(2) 917 (3) 791 (4) 971 ap
44. ASCII stands for [IBPS Clerk 2014, 2018]
(1) American Special Computer for Information
:@
37. The method used for the conversion of octal Interaction
to decimal fraction is (2) American Standard Computer for Information
(1) digit is divided by 8 Interchange
(3) American Special Code for Information
TG
(1) Long Significant Digit 46. Today’s mostly used coding system is/are
(2) Least Significant Digit (1) ASCII (2) EBCDIC
(3) Large Significant Digit (3) BCD (4) Both (1) and (2)
(4) Longer Significant Decimal
47. In EBCDIC code, maximum possible
Directions (40 and 41) Triangle represents ∆ (1) characters set size is
and circle represents o (0). If triangle appears in (1) 356 (2) 756
unit’s place then its value is 1. If it appears in (3) 556 (4) 256
10’s place its value is doubled to 2 like that it 48. Code ‘EBCDIC’ that is used in computing
continues. Using the given terminology answer stands for
the following questions.
(1) Extension BCD Information Code
For example,
(2) Extended BCD Information Code
∆ =1
(3) Extension BCD Interchange Conduct
∆o∆ = 4, 0, 1 = 4 + 0 + 1
(4) Extended BCD Interchange Conduct
∆o = 2 [IBPS PO Mains 2017]
Data Representation 49
49. Most commonly used codes for representing 56. Following diagram depicts which logic
bits are gate? [IBPS PO Mains 2017]
(1) ASCII (2) BCD
A A
(3) EBCDIC (4) All of these
50. The coding system allows non-english (1) NOR gate (2) NOT gate
characters and special characters to be (3) OR gate (4) NAND gate
represented (5) None of these
(1) ASCII (2) UNICODE
57. The NAND gate is AND gate followed by
(3) EBCDIC (4) All of these
......
51. Which of the following character set (1) NOT gate (2) OR gate
supports Japanese and Chinese fonts?
df
(3) AND gate (4) NOR gate
[IBPS Clerk Mains 2017]
58. The NOR gate is OR gate followed by ........
_p
(1) EBCDIC (2) ASCII
(3) BC (4) ECBI (1) AND gate (2) NAND gate
(5) UNICODE (3) NOT gate (4) OR gate
na
52. Two inputs A and B of NAND gate have 0 59. The NOR gate output will be high if the two
output, if inputs are
ap
(1) A is 0 (2) B is 0 (1) 00 (2) 01 (3) 10 (4) 11
(3) Both are zero (4) Both are 1 60. Which of following are known as universal
:@
(1) OR (2) NOT (1) XOR (2) XNOR (3) NOR (4) NAND
62. If ∆ represents ‘1’ and o represents ‘0’. What
O
ANSWERS
1. (4) 2. (5) 3. (4) 4. (4) 5. (3) 6. (1) 7. (2) 8. (2) 9. (1) 10. (2)
11. (1) 12. (2) 13. (4) 14. (3) 15. (4) 16. (1) 17. (3) 18. (3) 19. (4) 20. (2)
21. (4) 22. (3) 23. (4) 24. (2) 25. (2) 26. (2) 27. (4) 28. (3) 29. (1) 30. (4)
31. (4) 32. (4) 33. (2) 34. (1) 35. (3) 36. (5) 37. (2) 38. (2) 39. (2) 40. (2)
41. (1) 42. (4) 43. (3) 44. (5) 45. (1) 46. (4) 47. (4) 48. (2) 49. (4) 50. (2)
51. (5) 52. (4) 53. (3) 54. (2) 55. (2) 56. (2) 57. (1) 58. (3) 59. (1) 60. (1)
61. (1) 62. (2)
50 Learn, Revise & Practice ~ Computer Awareness
C H A P T E R
06
COMPUTER
df
_p
SOFTWARE
na
ap
Software is a collection of computer programs and related data that provide the instructions for telling a
:@
computer what to do and how to do. A software is an interface between the user and the computer
hardware. It is responsible for controlling, integrating and managing the hardware components of a
computer system and for accomplishing specific tasks.
TG
Types of Software
n
System Software
h
It consists of several programs, which are directly responsible for controlling, integrating and managing
c
the individual hardware components of a computer system. System software also provides the interface
ar
1. Operating System It consists of programs which control, coordinate and supervise the activities of
various components of a computer system. Its function is to provide link between the computer
hardware and the user. It provides an environment to run the programs. For example, MS-DOS,
Windows XP/2000/98, Unix, Linux, etc.
Operating system performs the following functions
(i) It recognises input from keyboard and sends output to the display screen.
(ii) It makes sure that programs running at the same time do not interfere with each other.
(iii) It is also responsible for security and ensures that unauthorised users do not access the system.
BIOS
The Basic Input/Output System (BIOS) is commonly known as System BIOS. BIOS controls various electronic
components within the main computer system. The initial function of BIOS is to initialise system devices such as
RAM, hard disk, CD/DVD drive, video display card and other hardwares.
Computer Software 51
2. Device Driver A software, which is written Word processors have the ability to create a
with the objective of making a device document and make changes anywhere in the
functional when it is connected to the document.
computer is called device driver. It is a system For example, Microsoft Word, WordPerfect
software that acts like an interface between the (Windows only), AppleWorks (Mac only),
device and the user. OpenOffice.org Writer, etc.
Every device, whether it is a printer, monitor, 2. Electronic Spreadsheets Spreadsheet
mouse or keyboard has a driver program applications are the computer programs that
associated with it for its proper functioning. accept data in a tabular form and allow you to
3. Language Translator It helps in converting create and manipulate spreadsheets
programming language to machine language. electronically.
df
The translated program is called object code. For example, Microsoft Excel, Corel Quattro
There are three different kinds of language
_p
Pro, Lotus 1-2-3, OpenOffice.org Calc, etc.
translator : Assembler, Compiler and Interpreter. 3. Presentation Software This software is used
na
for creation of the slides and to display the
Linker information in the form of presentation of
It is a system program that links together several slides.
object modules and libraries to form a single and
coherent program (executable). The main purpose
ap
For example, Microsoft PowerPoint, Corel
Presentations, Lotus Freelance Graphics,
:@
of linker is to resolve references among files.
OpenOffice.org Impress, etc.
Loader
It is a kind of system software which is responsible 4. Database Management System (DBMS) A
DBMS refers to the software that is responsible
TG
to perform single or multiple tasks. It is a set of create visual communications for professional
c
instructions or programs designed for specific use or desktop printing as well as for online or on
ar
or application, that enable the user to interact with screen electronic publishing.
a computer.
Se
df
used in departmental stores or in an
organisation to keep the records of the stock of maintenance of the computer system. These are the
_p
all the physical resources. packages which are loaded into computer during
the time of installation of operating system.
For example, Fishbowl, AdvancePro, etc.
na
They are used to support, enhance, expand and
2. Payroll Management System It is used by
secure existing programs and data in the computer
all modern organisations to encompass every
employee of the organisation who receives a
regular wages or other compensation.
ap
system.
System utility mainly consists of the following
:@
For example, Namely, UltiPro, etc. functions
3. Hotel Management System It refers to the 1. Disk Compression It increases the amount
management techniques used in the hotel of information that can be stored on a hard disk
TG
sector. These can include hotel administration, by compressing all information stored on it.
accounts, billing, marketing, housekeeping, For example, DiskDoubler, SuperStor Pro,
front office or front desk. DoubleDisk Gold , etc.
n
For example, Djubo, Aatithya HMS, Hotelogix 2. Disk Fragmenter It detects computer files
whose contents are broken across several
O
PMS, etc.
4. Reservation System A reservation system or locations on the hard disk and moves the
fragments to one location to increase efficiency.
h
df
modified and shared as its designed are publicly It is a software that is owned by an individual or a
accessible. company. There are always major restrictions on it
_p
Open Source Software (OSS) is any computer to use and its source code is always kept secret.
software that is distributed with its source code Proprietary software is copyrighted and bears
na
available for modification. limits against use, distribution and modification
that are imposed by its publisher, vendor or
Examples of Open Source Software are Linux, ap
developer.
Unix, MySQL, etc. To be considered as open source
software by the software development industry,
:@
Open source software is normally distributed with proprietary software for all updates, support
c
and fixes.
the source code under an open source license. The
ar
distribution terms of open source software must 5. Low level of customisation and adaptability.
comply with the following criteria
Se
QUESTION BANK
1. Which one of the following is defined as “a 8. The two broad categories of software are
set of instructions, data or programs used to (1) word processing and spreadsheet
operate computers and execute specific (2) transaction and application
tasks”? [SSC CGL 2018] (3) Windows and Mac OS
(1) Processor (2) Hardware (4) system and application
(3) Malware (4) Software 9. System software
2. The term used to describe the intangible (1) allows the user to diagnose and troubleshoot
df
instructions that tell the computer what to the device
(2) is a programming language
_p
do is [IBPS Clerk 2015]
(3) is a part of productivity suite
(1) hardware (2) software
(4) helps the computer manage internal resources
na
(3) storage (4) input/output
(5) None of these 10. A collection of various programs that helps
3. Software refers to apto control your computer is called
(1) the physical components that a computer is (1) system software [SBI Clerk 2015]
made of (2) application software
:@
4. Which of the following is software? 11. This type of software works with end-users,
[IBPS Clerk 2014] application software and computer hardware
(1) Keyboard (2) Internet Explorer to handle the majority of technical details.
n
6. Computer software is [SBI Clerk 2015] computer’s hardware device and application
(1) used only for output software to work together.
(2) a computer peripheral (1) Management
(3) used for input (2) Processing
(4) a set of instructions (3) Utility
(5) used only in operating systems (4) System software
7. The steps and tasks needed to process data, 13. A(n) ...... is a software that helps a computer
such as responses to questions or clicking control to operate efficiently and keep track
an icon, are called of data.
(1) instructions (1) application system
(2) the operating system (2) hardware system
(3) application software (3) software system
(4) the system unit (4) operating system
Computer Software 55
14. A computer cannot ‘boot’ if it does not have 22. ........ helps in converting programming
the language to machine language.
(1) compiler (2) loader (1) Operating system (2) Device driver
(3) operating system (4) assembler (3) Language translator (4) Linker
15. The ……… tells the computer how to use its 23. A linker program
components. (1) places the program in the memory for the
(1) utility (2) application purpose of execution
(3) operating system (4) network (2) relocates the program to execute from the
16. Operating system is a specific memory area allocated to it
(1) application software (3) links the program with other programs needed
(2) system software for its execution
df
(3) hardware (4) interfaces the program with the entities
(4) language generating its input data
_p
17. The ……… manual tells you how to use a 24. The main purpose of ……… is to resolve
software program. references among files.
na
[RBI Grade B 2012]
(1) documentation (2) programming (1) text editor (2) loader
(3) user (4) technical ap(3) antivirus (4) linker
(5) None of these
25. Which of the following system software
18. What does the acronym BIOS stand for? resides in main memory always?
:@
[SBI Clerk 2014, RBI Grade B 2013] (1) Text editor (2) Assembler
(1) Basic Input/Outer System (3) Linker (4) Loader
(2) Basic Internal Output System
TG
(1) loader
19. …… includes boot firmware and power
O
(2) linker
management. [SBI Clerk 2015]
(3) translator
(1) CD-ROM (2) Internal buses
h
[UPSSSC 2016]
(1) relative program
(1) Hardware (2) Malware
(2) application program
(3) Firmware (4) Utility
(3) appropriate program
21. In computer terminology, which of the (4) replicate program
following best describes a device driver? (5) logical program
[UGC NET 2019]
(1) Software that allows the user to control the 28. .......... is a software which is used to do
operating system particular task. [IBPS Clerk Mains 2017]
(2) Hardware that allows the user to control the (1) Operating system
operating system (2) Program
(3) Hardware that allows interaction between (3) Data software
peripheral devices and the operating system
(4) Data
(4) Software that allows interaction between
peripheral devices and the operating system (5) Application software
56 Learn, Revise & Practice ~ Computer Awareness
29. Software designed for a specific purpose/ 36. DTP is a tool for graphic designers and non-
application such as pay calculations, processing designers to create visual communications
of examination result, etc. are known as for professional. DTP stands for
(1) utility software (1) Device Transfer Protocol
(2) system software (2) Desktop Publishing
(3) application software (3) Device Transfer Programs
(4) customised software (4) All of the above
30. Application software 37. Corel Ventura, Illustrator are examples of
(1) is used to control the operating system (1) Word Processing (2) Graphic
(2) is designed to help programmers (3) Multimedia (4) DTP
(3) performs specific task for computer users
df
38. DirectX is a/an [RBI Grade B 2013]
(4) is used for making design only
(1) computer part
_p
31. The software that is used to create (2) user interface
text-based documents are referred to as (3) operating system
(4) software that drives graphic software
na
……… [SBI PO 2013]
(1) DBMS (5) None of the above
(2) suites 39. Which among the following is not an
ap
(3) spreadsheets example of system software?
(4) presentation software (1) Operating system
:@
(2) calculate employee commission payments 41. Which types of software is used in
ar
34. Which software is used to create (1) Enterprise Resource Planning (ERP) software
(2) Payroll Software
presentations to show to customers or staff
(3) Human resource planning software
members? (4) Inventory management software
(1) Report generation
(2) Graph generator 42. A software program that adds functionality
(3) Presentation software to your computer or help your computer
(4) Picture generator perform better is called as
35. Database software is used to [IBPS RRB PO Mains 2017]
(1) utility program
(1) discard sales records (2) function program
(2) store contacts list (3) specialised program
(3) keep customer records (4) manufacturer program
(4) generate report (5) compiling program
Computer Software 57
43. Which of the following techniques can be 50. Disk cleaner helps to free
used to store a large number of files in a (1) data (2) recycle bin
small amount of storage space? (3) space (4) information
(1) File adjustment 51. They can find files that are unnecessary to
(2) File copying computer operation, or take up considerable
(3) File compatibility amounts of space.
(4) File compression (1) Antivirus
44. What type of software creates a smaller file (2) Sweep
that is faster to transfer over the Internet? (3) Disk cleaner
[IBPS Clerk Mains 2017] (4) Disk Formatting
(1) Compression (2) Fragmentation 52. Which of the following Windows utilities
df
(3) Unzipped (4) Abstraction erase unneeded files?
_p
(5) Encapsulation (1) Backup or Restore Wizard
45. ....... is a Windows utility program that (2) Disk Cleanup
na
locates and eliminates unnecessary (3) Disk Defragmenter
fragments and rearranges files and unused (4) Antivirus
disk space to optimise operations.
[SBI PO 2013]
ap
53. Text editor is a/an
(1) application software
[RBI Grade B 2013]
47. It can make copies of all information stored (3) Disk compression software
on a disk or either restore the entire disk (4) Railway reservation system
h
58. Which of the following software is any 60. Which of the following is not an open
computer software that is distributed with source software? [UPSSSC 2018]
its source code available for modification? (1) Linux
[SSC CGL 2018] (2) Microsoft Office
(1) Application software (3) Mozilla Firefox
(2) System Software (4) Android
(3) Open Source Software 61. This software is copyrighted and bears the
(4) Proprietary Software limits against use. [SSC CGL 2017]
59. Example(s) of open source software is/are (1) Proprietary Software
[SSC CHSL 2019] (2) Open Source Software
(1) Linux (2) Unix (3) Application Software
df
(3) MySQL (4) All of these (4) System Software
_p
ANSWERS
na
1. (4) 2. (2) 3. (3) 4. (2) 5. (1) 6. (4) 7. (1) 8. (4) 9. (4) 10. (1)
11. (4)
21. (4)
12. (4)
22. (3)
13. (4)
23. (3)
14. (3)
24. (4)
15. (3)
25. (4)
ap
16. (2)
26. (1)
17. (3)
27. (2)
18. (5)
28. (5)
19. (3)
29. (3)
20. (3)
30. (3)
:@
31. (5) 32. (2) 33. (4) 34. (3) 35. (3) 36. (2) 37. (5) 38. (4) 39. (4) 40. (2)
41. (5) 42. (1) 43. (4) 44. (1) 45. (3) 46. (1) 47. (3) 48. (2) 49. (4) 50. (3)
51. (3) 52. (2) 53. (3) 54. (4) 55. (4) 56. (3) 57. (2) 58. (3) 59. (4) 60. (4)
TG
61. (1)
n
O
c h
ar
Se
Operating System 59
C H A P T E R
07
OPERATING
df
_p
SYSTEM
na
ap
An Operating System (OS) is a program which acts as an interface between the user and the computer
:@
hardware. The interface enables a user to utilise hardware resources very efficiently.
Operating system is an organised collection or integrated set of specialised programs that controls the
overall operations of a computer. It is a program that must be on any computer for proper booting.
TG
which operating system can control the planning, monitoring and performance of a CPU.
O
Memory Management It is a process of controlling and coordinating computer memory. It ensures that
all processes are able to access their memory or not.
h
File Management It is the main function of operating system. It manages all data files in a computer
c
ar
system. At the time of execution of a program, the operating system also performs the task of copying files
from secondary memory to primary memory.
Se
3. Multi User Operating System communicate with the applications and the
This OS allows multiple users to access a computer hardware.
system concurrently. It is used in computer The user can interact with the computer by using
networks that allow same data and applications to mainly two kinds of interface
be accessed by multiple users at the same time.
e.g. VMS. 1. Graphical User Interface (GUI)
It is a computer program that enables a person to
4. Multi-Tasking Operating System
communicate with a computer through the use of
In this operating system, more than one process symbols, visual metaphors and pointing devices. It
can be executed concurrently. It also allows the is best known for its implementation in Apple
user to switch between the running applications. products.
df
e.g. Linux, Unix, Windows 95.
The first graphical user interface was designed by
Multi-tasking OS further classified into two types
_p
Xerox Corporation in 1970s. GUIs can be found in
(i) Preemptive Multitasking OS It is a type of handheld devices such as MP3 players, portable
multitasking OS that allows computer
na
media players, gaming devices, etc.
programs to share operating system and
underlying hardware resources. 2. Character User Interface (CUI)
ap
(ii) Cooperative Multitasking OS It is the It is also known as Command Line Interface (CLI).
simplest form of multitasking. In it, each CUI is a mechanism of interacting with a computer
:@
program can control the CPU for as long as it system or software by typing commands to perform
need it. specific tasks.
TG
5. Time Sharing Operating System CUI only uses text types one after another just as
This operating system allows multiple programs to commands used in MS-DOS.
simultaneously share the computer resources. It
provides to each process to be run on. e.g. Mac OS.
n
Booting
O
They are often used in applications such as flight There are two types of booting
ar
reservation system, military applications, etc. This ■ Cold Booting When a computer is turned ON
type of operating system increases the availability after it has been completely shutdown.
Se
and reliability of the system. e.g. Linux. ■ Warm Booting When a computer is restarted by
There are two types of real time operating system pressing the combination of Ctrl + Alt + Del keys
or by Restart button.
(i) Hard Real Time OS In this RTOS, all the
tasks are required to be completed within the
specified time limit. Some Important
(ii) Soft Real Time OS In this RTOS, all the Operating Systems
tasks are not required to be completed within
Some popular operating systems are as follows
the specified time limit.
1. UNIX The first version of Unix was developed
User Interface in 1969 by Ken Thompson and Dennis Ritchie.
The system which provides the facility to the user It is primarily used to a server rather than a
to interact with the computer is called user work station and should not be used by anyone
interface. It allows users to easily access and who does not understand the system.
Operating System 61
2. Apple Macintosh (Mac OS) It was introduced 3. The MS-DOS. sys Program It is a collection
in January, 1984 by Steve Jobs and was initially of program routines and data tables that
named as system software, which was later provide high level programs such as application
renamed as Mac OS. programs.
Versions of Mac OSX are Yosemite, Mavericks, 4. The Command.com Program It provides a
Mountain Lion, Tiger, Tiger Panther, Jaguar, standard set of commands that gives users
etc. access to file management, configuration and
miscellaneous functions.
3. LlNUX The first Linux Kernel was released in
September, 1991 by Linus Torvalds. It is an Configuration of DOS
open source software. Config. sys, Autoexec. bat and their files provide the
Linux is similar to Unix in operations. It is environment to computer to set commands
df
difficult to understand by anyone. (i) Config. sys It adjusts the system acoording
_p
Kernel is the core of the operating system that to commands.
supports the process by providing a path to the (ii) Autoexec.bat When the system is powered
na
peripheral devices. ON, this file executes in automatically
4. Microsoft Windows It is an operating system, command line.
based on GUI, developed by Microsoft.
Microsoft first introduced an operating
ap Important Extensions and their Meanings
Extensions Meanings
:@
environment named Windows in November
.exe Executable files
1985.
.com Command files
MS-DOS (Microsoft-Disk .bat Batch files
TG
for micro computers. MS-DOS was the first .prg Program files
O
operating system which can be loaded in the main Types of MS-DOS Commands
ar
memory of the computer using a single disk. There are two types of MS-DOS commands as follows
Structure of DOS 1. Internal Commands These commands are
Se
There are four essential programs associated with the automatically loaded into main memory when
control of computer and the way it interacts with the booting process gets completed.
them e.g. DATE, TIME, VER, VOL, DIR, COPY, CLS,
1. Boot Record It includes loading the operating etc.
system into main memory. It is the main 2. External Commands These commands require
program of MS-DOS. external files to be loaded in the computer to
2. Basic Input/Output System (BIOS. sys) It run.
provides an interface between the hardware e.g. Checking disk, comparing disk, formatting,
and programs. etc.
62 Learn, Revise & Practice ~ Computer Awareness
Important Commands and their Uses different types of mobile applications. It has
Commands Uses built-in support for mobile multimedia formats.
CALL Call one batch program from another Some popular mobile operating systems are as
CD Change Directory-move to a specific follows
folder 1. Android It is a mobile OS developed by
CLS Clear the screen Google, which is based on Linux (main part of
COPY Copy one or more files to another operating system). It is basically designed for
location touch screen mobile devices like Tablets,
DATE Display or set the date Smartphones, etc. Now-a-days, it is most
DEL Delete one or more files widely used in mobile phones. The latest
DIR Display a list of files and folders version of Android is Android 11, which was
df
ERASE Delete one or more files released on 8th September, 2020.
_p
EDIT View and edit files 2. Symbian It is the OS developed and sold by
EXIT Quit the current script/routine and set an Symbian Ltd. It is an open source mobile OS
error level
na
designed for Smartphones.
FORMAT To erase and prepare the disk drive
It has been used by many major handset
IF Conditionally perform a command
MD Create new folders
apmanufacturers including Motorola, Nokia,
Samsung, Sony, etc. The latest version of
MOVE Move files from one folder to another Symbian is Nokia Belle, which was released on
:@
QUESTION BANK
1. Which of the following is the type of 7. The primary purpose of the Windows
software that controls the internal operating system is
operations in the computer? (1) to make the most efficient use of the computer
(1) Shareware hardware
(2) Public domain software (2) to allow people to use the computer
(3) Application software (3) to keep systems programmer’s employed
(4) Operating system software (4) to make computers easier to use
df
2. ......... controls the way in which the 8. Every computer has a(n) ……, many also
computer system does function and have …… [RBI Grade B 2014]
_p
provides a means by which users can (1) operating system; a client system
interact with the computer. (2) operating system; instruction sets
na
(1) Operating system (3) application programs; an operating system
(2) Motherboard (4) application programs; a client system
(3) Platform
(4) Application software
ap(5) operating system; application programs
9. Which of the following is/are function(s) of
:@
3. A collection of programs that controls how operating system?
your computer system runs and processes (1) User interface
information is called [IBPS Clerk 2014] (2) File system manipulation
TG
14. Grouping and processing all of a firm’s 21. Which of the following terms explains the
transactions at one time, is called execution of more than one file at the same
(1) a database management system on a single processor?
(2) batch processing (1) Single tasking (2) Multitasking
(3) a real time system (3) Scheduling (4) Multiprocessing
(4) on-time system 22. …… is a feature for scheduling and
15. ............ is used for very large files or where a multi-programming to provide an
fast response time is not critical. The files to economical interactive system of two or
be transmitted are gathered over a period more users. [IBPS Clerk 2012]
and then send together as a batch. (1) Time sharing (2) Multisharing
(1) Batch processing (2) Online processing (3) Time tracing (4) Multiprocessing
df
(3) File processing (4) Data processing (5) None of these
_p
16. Which of the following system is a function 23. The simultaneously processing of two or
of dedicated PCs? more programs by multiple processors, is
na
(1) Meant for a single user (1) multiprogramming (2) multitasking
(2) Meant for the single task (3) time sharing (4) multiprocessing
(3) Deal with single software
(4) Deal with only editing
ap
24. Real time systems must have
(1) pre-emptive kernels
:@
17. Windows operating system is ...... and ...... . (2) non-pre-emptive kernels
(1) multitasking, multi user (3) Both (1) and (2)
(4) Either (1) or (2)
(2) multi user, single tasking
TG
(2) multi user operating system concurrently are called [SSC CGL 2016]
c
29. Which process refers to the starting up of a 37. In computers, what does Yosemite,
computer and the loading of the required Mavericks, Mountain Lion, Lion Snow
parts of the operating system into the RAM? Leopard, Leopard, Tiger, Tiger Panther,
[SSC CGL 2018] Jaguar, Puma and Cheetah stand for?
(1) Swipping (2) Booting [RRB NTPC 2016]
(3) Mapping (4) Tagging A. Versions of Mac OSX
30. Which process checks to ensure the B. Types of storage servers
components of the computer are operating C. Macintosh clones
and connected properly? D. None of the above
(1) Booting (2) Processing (1) D (2) A
(3) Saving (4) Editing (3) C (4) B
df
31. What happens when you boot up a PC? 38. Which of the following is an operating
_p
[RBI Grade B 2012] system? [SBI Clerk 2014]
(1) Portions of the operating system are copied (1) Linux (2) Debugger
from disk into memory (3) Mozilla (4) Google Chrome
na
(2) Portions of the operating system are copied (5) Intel 8085
from memory onto disk 39. Linux is a type of …… software.
(3) Portions of the operating system are compiled
(4) Portions of the operating system are emulated
ap(1) shareware (2) commercial
(3) proprietary (4) open source
:@
(5) The PC gets switched off
40. Which one of the following is not an
32. What do you understand by the term operating system? [SSC CGL 2018]
booting? [RBI Grade B 2012]
TG
(4) The process of shut down the computer [SSC CGL 2018]
O
(3) shut down (4) logging off 42. Which of the following operating systems
was first developed by Microsoft?
Se
35. UNIX operating system is generally known 43. Which one of the following file names is
as [SSC CGL 2014]
invalid in DOS? [RBI Grade B 2013]
(1) Multi user operating system (1) RIT. bat (2) LISTEN.bin
(2) General application (3) RLUA.btt (4) TALK.bas
(3) Single user operating system (5) None of these
(4) Single user application program 44. Which one of the following DIR commands
36. Which is the programming tool in UNIX? lists a group of files? [RBI Grade B 2013]
[UPPSC Computer Assistant 2019] (1) DIR INVOICE.bas (2) DIR RESCUE.bas
(1) LINT (2) KERNEL (3) DIR PAYROLL.bas (4) DIR TOOL?.bas
(3) C-Shell (4) None of these (5) None of these
66 Learn, Revise & Practice ~ Computer Awareness
45. ‘DOS’ floppy disk/operating system does 55. Which commands are automatically loaded
not have [SBI PO 2014] into main memory?
(1) a boot record (2) a file allocation table (1) Internal (2) External
(3) a root directory (4) a virtual memory (3) Viral (4) Situational
(5) All of these 56. Which type of commands in MS-DOS needs
46. Which file in MS-DOS contains internal external files to perform their action?
commands that are loaded during booting (1) Internal commands
process? (2) External commands
(1) CONFIG.sys (2) MSDOS.sys (3) Batch commands
(4) Redirectories
(3) BIOS.sys (4) COMMAND.com
57. Which one of the following DOS commands
df
47. What is the name of the batch file that
sends contents of the screen to an output
automatically run when MS-DOS is booted?
device?
_p
[RBI Grade B 2013]
(1) Config.sys (2) Config. bat
(1) BREAK (2) DISK COPY
(3) Autoexe.bat (4) Run.bat
(3) MORE (4) ASSIGN
na
48. MS-DOS is usually supplied on a (5) None of these
(1) hard disk (2) cartridge tape 58. Which of the following is not an external
(3) CD ROM (4) floppy disk
apcommand of DOS?
49. Which of the following is the main program (1) LABEL (2) FORMAT
:@
(1) Windows (2) Linux command transfers a specific file from one
O
(3) run a program (4) run without power (1) delete files (2) delete directory
(3) delete lables (4) Both (1) and (2)
52. ‘>’ symbol in DOS commands is used to
Se
(1) compare two values (2) redirect input 62. This command is used to display a list of
(3) redirect output (4) filter data files and sub-directories that are in the
directory you specify.
53. Usually, in MS-DOS, the primary hard disk (1) DER (2) DIS
drives has the drive letter ......... . (3) DIR (4) DAR
[RBI Grade B 2012]
(1) A (2) B 63. The purpose of DISKCOPY command is to
(3) C (4) D [RBI Grade B 2014]
(5) None of these (1) format the disk if it is not formatted before a
write operation is initiated on it
54. Which of the following is not usual file (2) overwrite the existing contents of the destination
extension in DOS? [RBI Grade B 2012] disk as it copies the new information to it
(1) .exe (2) .bat (3) make an exact copy of a floppy disk
(3) .0 (4) .com (4) All of the above
(5) None of these (5) None of the above
Operating System 67
64. Which command is used to delete file from 69. Which of the following is not an internal
a directory in DOS? command of DOS?
(1) REN (2) DEL (3) CD (4) MD (1) VER (2) COPY
65. In MS-DOS, which of the following (3) FORMAT (4) VOL
commands is used to delete directory with 70. Which one of the following is an MS-DOS
all sub-directories and files? external command? [SSC CHSL 2012]
(1) Delete (2) Del (3) Deltree (4) Move (1) DIR (2) COPY
66. Which one of the following DOS command (3) FORMAT (4) PROMPT
sends contents of the screen to an output device? 71. A command, in DOS, used to set a name to a
(1) BREAK (2) DISK COPY disk, is
df
(3) MORE (4) ASSIGN (1) VOL (2) REN
(3) LABEL (4) CLS
67. In DOS, the DIR command is used to
_p
(1) display content of a file [SSC CGL 2013] 72. In DOS, the ‘label’ command is used to
(2) delete file (1) create the label of disk
na
(3) display list of files and sub-directories (2) change the label of disk
(4) copy files (3) remove the label of disk
68. The DOS command, which cannot be ap (4) Both (1) and (2)
73. Which among the following is not a mobile
executed with versions 1 and 2 is
:@
[RBI Grade B 2014, RBI Grade B 2013] operating system? [IBPS PO 2016]
(1) GRAPHICS (2) FIND (1) Android (2) Safari
(3) LABEL (4) MODE (3) Symbian (4) iOS
TG
ANSWERS
n
1. (4) 2. (1) 3. (1) 4. (2) 5. (3) 6. (5) 7. (4) 8. (5) 9. (4) 10. (1)
O
11. (2) 12. (3) 13. (3) 14. (2) 15. (1) 16. (1) 17. (3) 18. (1) 19. (2) 20. (1)
21. (2) 22. (1) 23. (4) 24. (1) 25. (1) 26. (2) 27. (4) 28. (3) 29. (2) 30. (1)
h
31. (1) 32. (1) 33. (2) 34. (1) 35. (1) 36. (2) 37. (2) 38. (1) 39. (4) 40. (3)
c
41. (2) 42. (4) 43. (3) 44. (4) 45. (5) 46. (3) 47. (3) 48. (1) 49. (1) 50. (4)
ar
51. (1) 52. (3) 53. (3) 54. (3) 55. (1) 56. (2) 57. (5) 58. (4) 59. (4) 60. (1)
61. (4) 62. (3) 63. (4) 64. (2) 65. (3) 66. (2) 67. (3) 68. (3) 69. (3) 70. (3)
Se
C H A P T E R
08
PROGRAMMING
df
_p
CONCEPTS
na
ap
:@
Program can be defined as a set of instructions There are two types of low level language, which are as
that need to be executed to accomplish a follows
computing task. A person who writes or performs 1. Machine Language It is the only language
TG
Note Ada Lovelace is regarded as the world’s first that the computer reads and interprets.
programmer.
2. Assembly Language It is a low level
h
Programming language must be simple, easy to easier than looking at binary codes.
learn and use. It must be consistent in terms of
syntax and semantics. Medium Level Language (MLL)
Programming languages are mainly categorised It serves as the bridge between raw hardware and
into three parts, which are as follows programming layer of a computer system. It is
designed to improve the translated code before it is
Low Level Language (LLL) executed by the processor. e.g. C.
These programming languages are more difficult High Level Language (HLL)
to understand. It is designed to operate and handle
the entire instruction set of a computer system It is an advanced computer programming language
directly which are generally used to write the that is not limited to one computer, designed for a
system software. specific job and is easier to understand.
Programming Concepts 69
The main advantages of high level languages over low level languages is that they are easier to read, write
and understand. e.g. BASIC, C, FORTRAN, Java, Python, etc.
Some High Level Languages and Their Application Areas
df
LISP (List Processing) 1958 John McCarthy at the Artificial intelligence Compiled and
Massachusetts Institute of Interpreted
_p
Technology (MIT)
COBOL (Common 1959 Grace Hopper Business management, Compiled
na
Business Oriented String oriented
Language)
BASIC (Beginner’s All
purpose Symbolic
1964
E. Kurtz at Dartmouth
ap
John G. Kemeny and Thomas Programming for
educational purpose
Interpreted
:@
Instruction Code) College in New Hampshire
Pascal 1970 Niklaus Wirth Education Compiled
C 1972 Dennis Ritchie at Bell Labs System programming Compiled
TG
Java Script 1995 Brendan Eich Games, animated 2D and Compiled and
ar
3D graphics Interpreted
Se
OOPs
OOPs stands for Object Oriented Programmings in which programs are considered as a
collection of objects. Each object is nothing but an instance of a class.
De-Bugging
It is the process of locating and fixing or bypassing bugs (errors) in computer program code.
70 Learn, Revise & Practice ~ Computer Awareness
df
Translator
(iii) The third generation languages or 3 GLs
are high level languages such as Java.
_p
(iv) The fourth generation languages or 4 GLs
The translated program is called the object code.
are the languages that consist of statements
na
Depending upon used programming languages,
similar to the statements of human language.
language translator is divided into three categories, 4 GLs are commonly used in database
which are as follows ap programming and scripting programming.
1. Assembler It converts a program written in (v) The fifth generation languages or 5 GLs are
assembly language into machine language.
:@
programming languages that contain visual
Assembly language consists of mnemonic code, tools, which help to develop a program. A good
which are difficult to learn and are machine example of 5 GLs is Visual Basic.
dependent.
TG
stops the execution of the program calculation and other related computer and
O
error is rectified by the user. Interpreter is A flow chart is a visual representation of the
ar
very useful for de-bugging and suitable for sequence of steps and decisions needed to perform a
process. Each step in the sequence is noted within a
Se
df
_p
QUESTION BANK
na
1. The instructions that tell a computer how to
carry out the processing tasks are referred
ap
5. Who is regarded as the world’s first
programmer? [RRB NTPC 2016]
:@
to as computer [IBPS PO 2015] A. Alan Turing
(1) programs (2) processors B. Ada Lovelace
(3) input devices (4) memory modules C. Tim Berners Lee
TG
[IBPS PO 2012]
(1) Procedural language
6. A factor in the selection of source language is
O
3. Which of the following contains specific 7. Languages which can easily interact with
rules and words that express the logical
Se
9. The use of combination of 1’s and 0’s is 17. Computer language used for calculation is
feature of which of the following type of (1) LOGO (2) FORTRAN
computer language? [IBPS PO 2016] (3) BASIC (4) C + +
(1) High Level Language 18. Which of the following computer language
(2) PASCAL is a mathematically oriented language used
(3) Machine Language for scientific problems? [UPSSSC 2015]
(4) C (1) FORTRAN (2) COBOL
(5) COBOL (3) LISP (4) PROLOG
10. Each model of a computer has a unique 19. FORTRAN stands for
(1) assembly of a computer (1) Formal Translation
df
(2) machine language (2) Formative Translation
(3) high level language (3) Formal Transaction
_p
(4) All of the above (4) Formula Translation
11. All computers execute 20. LISP is designed for
na
(1) BASIC programs (1) artificial intelligence (2) GUI
(2) COBOL programs (3) CUI (4) optical fibre
(3)
(4)
Machine language programs
FORTRAN programs
ap
21. LISP is the second oldest high level
programming language. Here, LISP stands
:@
13. Assembly language [IBPS Clerk 2011] 22. What does CO stand in COBOL?
(1) uses alphabetic codes in place of binary [UPSSSC 2015, IBPS Clerk 2012]
numbers used in machine language (1) Common Object (2) Common Oriented
n
(2) is the easiest language to write programs (3) Common Operating (4) Computer Oriented
O
(3) need not be translated into machine language (5) None of these
(4) All of the above
(5) None of the above
23. Which of the following is not characteristic
h
of COBOL?
c
15. ....... serves as the bridge between raw (3) It had limited facilities for mathematical
notation
hardware and programming layer of a
(4) It is very readable language
computer system.
(1) Medium level language 24. A computer program used for business
(2) Low level language application is
(3) High level language (1) LOGO (2) COBOL
(4) Both (1) and (2) (3) BASIC (4) FORTRAN
16. Which of the following is a machine 25. Who among the following invented the
independent program? computer language, COBOL? [CHSL 2018]
(1) High level language (1) Grace Murray Hopper
(2) Low level language (2) John McCarthy
(3) Assembly language (3) Guido Van Rossum
(4) Machine language (4) Brendan Eich
Programming Concepts 73
26. C programming language was developed by 36. Which of the following is not a computer
[SSC CGL 2017] language ? [UPSSSC 2016, SBI PO 2014]
(1) Charles Babbage (2) Larry Wall (1) BASIC (2) COBOL
(3) James Gosling (4) Dennis Ritchie (3) LOTUS (4) FORTRAN
(5) None of these
27. C + + language developed by
[IBPS Clerk 2012]
37. C, BASIC, COBOL and Java are examples of
(1) Dennis Ritchie (2) Charles Babbage ……… languages. [IBPS Clerk 2015]
(3) Niklaus Wirth (4) Bjarne Stroustrup (1) low level (2) computer
(5) John McCharthy (3) system programming (4) high level
(5) None of these
28. Python is a …… . [SSC CHSL 2019]
38. ……… is a written description of a computer
df
(1) low level language (2) high level language
(3) machine language (4) assembly language program’s functions. [SBI PO 2014]
_p
(1) Explanatory instructions
29. Java is referred to as a [SBI PO 2014] (2) Graphical user interface
(1) high level language (3) Plug and play
na
(2) complex language (4) README files
(3) hardware device driver (5) Documentation
(4)
(5)
low level language
programming mid level language
ap
39. De-bugging is the process of
[RRB NTPC 2016]
:@
language for creating special programs like (3) translation (4) translator
Applets? [IBPS Clerk 2012] (5) assembler
h
(1) Java (2) Cable 41. The ……… program is used to convert
c
33. Which is the official language for Android (3) FORTRAN (4) Assembler
development? [RRB NTPC 2016] 42. The function of an assembler is
A. Java B. COBOL (1) to convert basic language into machine
C. FORTRAN D. Ada language
(1) C (2) A (3) B (4) D (2) to convert high level language into machine
language
34. Who invented Java Script programming (3) to convert assembly language into machine
language? [SSC CGL 2016] language
(1) Brendan Eich (2) Willam Einthoven (4) to convert assembly language into low level
(3) George Eastman (4) Emil Erlenmeyer language
44. Which of the following is not true about an (1) Algorithm (2) Hardware program
assembler? (3) Software (4) Firmware program
(1) Translates instructions of assembly language (5) None of the above
in machine language 51. Error in a program is called
(2) It translates the C program (1) bug (2) debug
(3) It is involved in program’s execution (3) virus (4) noise
(4) It is a translating program
52. Error which occurs when program tried to
45. Compiler is a [UPSSSC 2015] read from file without opening it is
(1) computer program classified as
(2) part of software (1) execution error messages
(3) program for converting from high level to (2) built in messages
df
machine language (3) user defined messages
(4) All of the above (4) half messages
_p
46. Compiling creates a(n) [RBI Grade B 2012] (5) None of the above
(1) error-free program (2) program specification 53. ……… are words that a programming
na
(3) subroutine (4) algorithm language has set aside for its own use.
(5) executable program [IBPS PO 2011]
47. Computer programs are written in a high
ap(1) Control words (2) Control structures
level programming language, however the (3) Reserved words (4) Reserved keys
:@
(1) machine language (2) assembly language (5) None of the above
(3) Java (4) visual basic 55. In programming, repeating some statements
h
49. Which of the following generation is usually called [SSC CGL 2013]
c
ANSWERS
1. (1) 2. (5) 3. (3) 4. (5) 5. (3) 6. (3) 7. (2) 8. (4) 9. (3) 10. (2)
11. (3) 12. (2) 13. (1) 14. (2) 15. (1) 16. (1) 17. (2) 18. (1) 19. (4) 20. (1)
21. (3) 22. (2) 23. (2) 24. (2) 25. (1) 26. (4) 27. (4) 28. (2) 29. (1) 30. (2)
31. (3) 32. (1) 33. (2) 34. (1) 35. (1) 36. (3) 37. (4) 38. (5) 39. (1) 40. (5)
41. (4) 42. (3) 43. (3) 44. (2) 45. (4) 46. (5) 47. (2) 48. (2) 49. (4) 50. (1)
51. (1) 52. (1) 53. (3) 54. (1) 55. (1) 56. (1)
Microsoft Windows 75
C H A P T E R
09
MICROSOFT
df
_p
WINDOWS
na
ap
Microsoft Windows (MS-Windows) stands for Windows 95
:@
characters through the keyboard. (iii) It supports FAT32 File System, Multi-Display,
Web TV and the Internet Explorer.
h
Versions of MS-Windows
c
Windows NT (New Technology) plagued with programming errors but the Windows
A version of Windows NT was introduced in July, 98’s second edition came out later was much better
1993 and made specifically for businesses. It offers with many errors resolved.
better control over work station capabilities to Features
help network administrators.
(i) It supports Internet Explorer 4.0.1.
Features (ii) Windows 98 was the first operating system to
(i) It is based on High Level Language. use the Windows Driver Model (WDM).
(ii) It is able to run on DOS, Windows 3 and Win (iii) It includes a FAT32 converter utility for
32 applications. converting FAT16 drives to FAT32 without
(iii) It has a 32-bit Windows application. formatting the partition.
(iv) It provides higher stability and security. (iv) It also supports many peripheral devices (USB,
DVD, etc.).
76 Learn, Revise & Practice ~ Computer Awareness
Windows ME Features
Windows ME (Millennium Edition) launched in (i) It can be installed Pentium 4, higher, 512MB
June 2000, but it has been historically plagued RAM, 32 MB video card and 40 GB hard disk.
with programming errors which may be (ii) It enhances the features of visual style.
frustrating for home users.
Windows 7
Features It is an OS released by Microsoft on 22nd October,
(i) It is designed for single CPU. 2009. It is an upgrade of Windows XP and Vista. It
(ii) The minimum internal storage is 64 MB and does not include some standard applications like
maximum 4 GB. Windows Movie Maker, Windows Mail, etc.
df
(iii) It introduced Multilingual User Interface
Features
(MUI).
_p
(i) It supports 64-bit processor.
Windows XP (ii) It provides touch, speech, handwriting
recognition.
na
It is an OS produced by Microsoft for use on
personal computers. Microsoft released Windows (iii) It supports a playback of media in MP4.
XP on 25th October, 2001.
Some versions of Windows XP are as follows
ap
(iv) It includes Windows Bio-Metric framework.
(v) It provides multiple firewall.
:@
the total size of the disk is 19.5 GB. (iii) It is based on Microsoft’s Metro Design
c
(iv) It provides 1.5 GB of available space on the (iv) It supports new emerging technology like USB
hard disk. 3.0, cloud computing.
Se
Desktop
When we turn ON the computer then the first screen, which will be display on the computer is known as
desktop. The background image of desktop is called wallpaper.
A small arrow or blinking symbol, moving on the desktop, is called cursor. Desktop contains Start menu,
Task bar, icons, gadgets, etc.
df
_p
na
Dialog
Box
ap
:@
TG
Some important components of desktop are organised shortcuts. If we delete a file or folder then it
n
with program name is known as icon. Icons are Once the recycle bin is empty then we won’t be
c
small pictures that represent files, folders, able to restore those files and folders again.
ar
icons. If you move an icon on your desktop, this is the desktop is known as Task Bar. When we open a
called ‘dragging’ and after releasing it, it will be program or any window, then the button of that
called ‘dropping.’ program will be displayed on the task bar.
Some of the icons displayed on the desktop are as Generally, task bar consists of three parts
follows (i) Start button
1. Computer It is the most important icon on (ii) Middle section
the desktop, which contains icons of document
(iii) Notification area
folders, hard disk’s partition, each removable
disk drive. e.g. Floppy disk, CD, DVD, etc. It Start Menu
also allows the users to access drives, printers, This menu is the main gateway of our computer’s
removable disk or other system applications. program such as files, folders and settings. Start
2. Recycle Bin It is also a form of icon on the menu also contains most recently opened
desktop, which contains deleted files, folders or programs.
78 Learn, Revise & Practice ~ Computer Awareness
df
5. Find It searches for specific files or folders.
3. View menu contains options like Normal,
6. Log Off It provides a password to protect Toolbar, Print Layout, etc.
_p
from unauthorised access.
4. Insert menu contains options like Header,
7. Turn Off (Shut down) To shut down or
Footer, etc.
na
restart the system.
5. Help menu is used to provide information
Window apabout window.
Window is a rectangular area which provides an
Dialog Box
environment to run many programs.
:@
When we perform certain operation on our
Some parts of the window are as follows document and click on the Close button without
Title Bar saving the document then dialog box will be appear
TG
buttons, which are as follows is mainly used to suggest that what to do next.
O
Notepad
ar
helps to shrink the window. commonly used to edit or view text files. The file
format of Notepad files is .txt (text document).
3. Maximize Button It enlarges the window to
occupy the whole desktop. It expands the size To open Click on Start button → All Programs
of window fit to the desktop. → Accessories → Notepad
Scroll Bar
It appears at the right (or left) side or at the bottom WordPad
of the window. A window can display a document, It is an another text editor program including some
i.e. larger than the window area, so with the help of features such as complex formatting, pictures, etc.
scroll bar arrow, the user can scroll a document in The extension of WordPad file is .rtf (rich text
the window area to bring the view of hidden format).
portion of document.
To open Click on Start button → All Programs
There are two types of scroll bar; i.e. Horizontal → Accessories → WordPad
scroll bar and Vertical scroll bar.
Microsoft Windows 79
df
To open Click on Start button → All Programs can hold any number of files and additional
_p
→ Accessories → Calculator sub-folders.
Windows Library
na
Media Player
Windows media player is an easy-to-use interface A windows library can contain files and folders
to play digital media files, organise digital media
collection, burn CDs, etc.
ap
stored on the local computer. Users interact with
libraries in ways similar to how they would interact
with other folders.
:@
identifies the file type. arrange your digital music, such as songs, etc.
c
Some common file name extensions are as follows (iv) Video Library It is used to organise and
ar
df
active window Window + D To display the desktop
F2 Rename selected item Window + L To lock the keyboard
_p
na
QUESTION BANK ap
:@
1. In Windows NT, NT stands for 7. Windows 95, Windows 98 and Windows NT
(1) New Terminology (2) New Technique are known as what?
(3) New Technology (4) Normal Technique (1) Processors (2) Domain names
(3) Modems (4) Operating systems
TG
Windows 98?
Windows?
ar
13. The background image of desktop is called as 23. Generally, you access the recycle bin
(1) graphics (2) deskcover through an icon located
(3) wallback (4) wallpaper (1) on the desktop
14. The desktop of a computer refers to (2) on the hard drive
(1) the visible screen (3) on the shortcut menu
(2) the area around the monitor (4) in the properties dialog box
(3) the top of the mouse pad 24. Which of the following is used to access a
(4) the inside of a folder file from the computer store?
[IBPS Clerk Mains 2017]
15. A blinking indicator that shows you where
your next action will happen, is (1) Insert (2) Retrieve
(3) File (4) Print
df
(1) CPU (2) cursor
(3) toolbar (4) boot (5) Find
_p
16. Graphical pictures that represent an object 25. The taskbar is located
like file, folder, etc., are [RBI Grade B 2014] (1) on the start menu
na
(1) task bar (2) windows (2) at the bottom of the screen
(3) desktop (4) icons (3) on the quick launch toolbar
(5) None of these ap(4) at the top of the screen
26. In the split window mode, one title bar
17. A/An ......... contains programs that can be
:@
20. To display the contents of a folder in Windows (1) Click ‘Start’ then select ‘Shut down’
Explorer, you should …… . [SBI PO 2013] (2) Click ‘Start’ then select ‘Restart’
(1) click on it (2) collapse it (3) Click ‘Start’ then switch user
(3) name it (4) give it a password (4) Switch off monitor
(5) rename it
29. End menu is available at which button?
21. Factor making Windows popular is
(1) End (2) Start
(1) multitasking capacity (3) Turn off (4) Restart
(2) desktop features
(3) user friendly 30. When you install a new program on your
(4) being inexpensive computer, it is typically added to the menu
(1) All Programs
22. All the deleted files go to (2) Select Programs
(1) Recycle Bin (2) Task Bar (3) Start Programs
(3) Tool Bar (4) Computer (4) Desktop Programs
82 Learn, Revise & Practice ~ Computer Awareness
31. Why do you log-off from your computer 39. What is an on-screen display listing of
when going out from your office? available options of functions on a
[IBPS Clerk Mains 2017] computer? [SBI Clerk 2015]
(1) Someone might steal your files, passwords, etc. (1) Document (2) View
(2) In order to save electricity (3) Tool (4) Format
(3) Logging off is essential to increase performance (5) Menu
(4) Logging off is mandatory before you go out 40. Menus are the part of [RBI Grade B 2014]
(5) Logging off is a good exercise to perform (1) hardware (2) user interface
regularly
(3) status bar (4) monitor
32. Which of the following refers to the (5) None of these
rectangular area for displaying information
df
41. For creating a new document, you use
and running programs? [SBI PO 2013]
which command at File menu?
_p
(1) Desktop (2) Dialog box (1) Open (2) Close (3) New (4) Save
(3) Menu (4) Window
(5) Icon 42. What menu is selected to cut, copy and
na
paste?
33. Title bar, ribbon, status bar, views and
(1) File (2) Tools (3) Special (4) Edit
document workspace are components ap
of ......... program. 43. Help menu is available at which button?
(1) windows (2) browser (1) End (2) Start
:@
color toolbar that other open window (1) transforming (2) christening
(2) window that is currently open
(3) renaming (4) retagging
(3) Both (1) and (2)
n
(4) window that is last used 45. The steps involved to open a document are
[RBI Grade B 2013]
O
(4) drag it to the recycle bin (3) Both (1) and (2)
ar
48. ......... menu type is also known as a drop 58. A clipboard [RBI Grade B 2014]
down menu. (1) is used to save data on disk in the event of a
(1) Fly-down (2) Pop-down power failure
(3) Pop-up (4) Pull-up (2) is able to retain the contents even when
(5) Pull-down computer is switched OFF
(3) is available only in Microsoft Word
49. A .... is an additional set of commands that the (4) is a temporary storage in computer memory
computer displays after you make a selection. and temporarily stores the cutted or copied
(1) dialog box (2) sub menu data
(3) menu selecting (4) All of these (5) None of the above
50. Anything written on the screen is called 59. What is the command used to remove text or
(1) cursor (2) text graphics from a document, the information is
df
(3) folder (4) boot then stored on a clipboard so you can paste it?
_p
(5) None of these
(1) Chop (2) Cut
51. …… lets you leave a screen or program. (3) Clip (4) Cart away
na
(1) Boot (2) Programs 60. A saved document is referred to as a
(3) Exit (4) Text (1) file (2) word
52. A ......... is an icon on the desktop that
provides a user with immediate access to a
ap
(3) folder
(5) None of these
(4) project
:@
program or file. 61. The name given to a document by the user
(1) kernel (2) buffer is called
(3) shortcut (4) spooler (1) file name (2) program
TG
53. What is the full form of RTF? (3) data (4) record
[IBPS Clerk Mains 2017]
62. A ......... is a collection of information saved
(1) Richer Text-Formatting as a unit.
(2) Rich Text Format (3) Right Text Fishing
n
(1) Start button → All Programs → Accessories 64. Which of the following statements is a false
→ Calculator conceiving file names? [IBPS Clerk 2014]
(2) Start button → All Programs → Calculator (1) Every file in the same folder must have a
(3) Start button → Accessories → Calculator unique name
(4) All of the above (2) The file name comes before the dot (.)
56. ........ is an easy-to-use interface to play (3) File extension is another name for the type
digital media files. (4) The file extension comes before the dot (.)
followed by the file name
(1) WordPad (2) Notepad (5) Files may share the same name or the same
(3) Media player (4) Games extension, but not both at the same time
57. When you cut or copy information it gets 65. File extensions are used in order to
place in the …… . [IBPS Clerk 2013] (1) name the file
(1) clipart (2) clipboard (2) ensure the file name is not lost
(3) motherboard (4) Both (1) and (2) (3) identify the file
(5) None of these (4) identify the file type
84 Learn, Revise & Practice ~ Computer Awareness
66. Which of the following contained at the end 73. When embedding object into document, one
of the file name and help to determine the of the following occurs. [RBI Grade B 2014]
type of file? [SBI Clerk 2014] (1) Embedded object becomes a part of the
(1) File property (2) File type document
(3) File name (4) File subname (2) Embedded object remains outside object to the
(5) File extension document, but loaded with document
(3) Both becomes a zip file
67. What are .bas, .doc, .htm examples of in
(4) Both (1) and (2)
computing? [IBPS PO 2015]
(5) None of the above
(1) Extensions (2) Protocols
(3) Database (4) Domains 74. Which of the following shortcut keys
represents the correct sequence for copy,
df
(5) None of these
68. What is the default file extension for all paste and cut commands?
_p
(1) Ctrl + V; Ctrl+C; Ctrl+V
Word documents? [RBI Asstt. 2012]
(2) Ctrl + C; Ctrl+V; Ctrl+X
(1) WRD (2) TXT (3) DOC (4) FIL
na
(3) Ctrl + X; Ctrl+C; Ctrl+V
(5) WD
(4) Ctrl + C; Ctrl+X; Ctrl+V
69. You organise files by storing them in
[RBI Grade B 2012]
ap
75. Which of the following keys is used to
delete characters to the left of the cursor?
(1) archives (2) lists
[SBI PO 2014]
:@
(3) indexes (4) folders
(1) Alt + Delete (2) Shift
(5) None of these
(3) Esc (4) Delete
70. ......... may be included in other folder while (5) Backspace
TG
(5) Sections
[IBPS RRB PO Mains 2018]
72. You can keep your personal files/folders in (1) Alt+F4 (2) Ctrl+F4
Se
ANSWERS
1. (3) 2. (5) 3. (4) 4. (1) 5. (4) 6. (1) 7. (4) 8. (4) 9. (5) 10. (3)
11. (3) 12. (3) 13. (4) 14. (1) 15. (2) 16. (4) 17. (3) 18. (2) 19. (3) 20. (1)
21. (2) 22. (1) 23. (1) 24. (2) 25. (2) 26. (2) 27. (4) 28. (1) 29. (2) 30. (1)
31. (1) 32. (4) 33. (1) 34. (3) 35. (2) 36. (2) 37. (3) 38. (1) 39. (5) 40. (2)
41. (3) 42. (4) 43. (2) 44. (3) 45. (3) 46. (3) 47. (4) 48. (5) 49. (1) 50. (2)
51. (3) 52. (3) 53. (2) 54. (4) 55. (1) 56. (3) 57. (2) 58. (4) 59. (2) 60. (1)
61. (1) 62. (2) 63. (2) 64. (4) 65. (4) 66. (5) 67. (1) 68. (3) 69. (4) 70. (3)
71. (4) 72. (2) 73. (1) 74. (2) 75. (5) 76. (4) 77. (1)
Microsoft Office 85
C H A P T E R
10
MICROSOFT
df
_p
OFFICE
na
ap
:@
Microsoft Office (MS-Office) was developed by Microsoft in 1988. It is a collection of softwares, based on
specific purpose and mainly used in office work. You can start any software of MS-Office by using the
Start button.
TG
Microsoft Word
Se
MS-Word is a Word processing application which is one of the most important and widely used
applications found on computer. It provides tools for editing, formatting and printing of documents
smaller than 45 KB.
The document can be a poster, report, letter, brochure, web page, news letter, etc.
e.g. WordStar, Notepad for Windows.
To start the MS-Word software, we can follow any one method out of them
(i) Click on Start button and then click on Run option. Run dialog box will be appear on the screen.
Now, type winword on text box and press Enter key.
(ii) Click Start button → All Programs → Microsoft Office → Microsoft Word 2010.
It opens MS-Word with a blank document. By default, the name of the blank document is
Document1.docx, where. docx are the extensions of a MS-Word file.
86 Learn, Revise & Practice ~ Computer Awareness
Save Print
Button Preview Minimize Maximize
Menu Bar Title Bar
Formatting
Tool Bar
Close
Ribbon Help
Special
Features
Formatting
Toolbar
Cursor
Vertical
df
Scroll Bar
Text Area
_p
na
ap
:@
(i) Title Bar It shows the name of the application and name of the file. It consists of three control
O
buttons, i.e.
(a) Minimize (reduces the window but application still active)
h
(ii) Standard Tool Bar It displays the symbol for the common operations like Open, Print, Save, etc.
(iii) Ribbon It is a set of tools and commands across the top of the screen. It consists of a panel of
Se
df
as page number, current page, current
template, column number, line number, etc. arranged in ordered lists.
_p
(vii) Work Area It is the rectangular area of the (ix) Graphics It provides the facility of
document window that can be use to type the incorporating drawings in the documents
na
text. It is also called as workplace. which enhance their usefulness.
(viii) Cursor It is also called insertion pointer. (x) Object Linking and Embedding (OLE)
It denotes the place where text, graphics or
any other item would be placed when you
ap
It is a program integration technology that is
used to share information between programs
:@
type, overwrite or insert them. through objects. Object save entities like
charts, equations, video clips, audio clips,
Features of Microsoft Word pictures, etc.
TG
The features of MS-Word are described below (xi) Horizontal and Vertical Scroll Bars
(i) Text Editing It provides editing, adding They enable one to move up and down or left
and deleting text, modification of text and right across the window. The horizontal
n
content i.e. cut, copy and paste. scroll bar is located above the status bar. The
vertical scroll bar is located along the right
O
(ii) Format Text It offers to modify the text in (xii) Save a Document When we create a new
ar
any of the available hundreds of text designs. document, it will be saved into the hard drive.
It formats text in various styles such as bold, To save a document, user has three common
Se
df
Print Preview Ctrl + F2 Displays full pages as they are printed.
_p
Spelling F7 Checks the spelling in the active document.
Cut Ctrl + X Cuts the selected text and puts it on the clipboard.
na
Copy Ctrl + C Copies the selected text and puts it on the clipboard.
Paste Ctrl + V or Shift + Insert Insert the clipboard contents at the insertion point.
ap
Format Painter Ctrl + Shift + C Copies the formatting of the selected text to a specified location.
Ctrl + Z
:@
Undo Reverses certain commands.
Redo Ctrl +Y Reverses the action of the Undo button.
Help F1 Provides the help for working on MS -Word.
TG
Find Ctrl + F Opens Find & Replace dialog boxes with Find tab.
Insert Ctrl + K Insert link.
Delete Ctrl + Del Deletes word to the right of cursor.
n
Formatting Toolbar
c
ar
Microsoft Excel
A spreadsheet is a matrix of rows and columns similar to an accounting ledger.
An electronic spreadsheet is used for analysing, sharing and managing information for accounting
purpose performing mathematical calculations, budgeting, billing etc.
The spreadsheet program also provides tools for creating graphs, inserting pictures and chart, analysing
the data, etc.
e.g. Corel Quattro Pro, Visicalc, Lotus-1-2-3, Apple Numbers, etc.
To start MS-Excel software, we can follow any one method out of them
(i) Click on Start button and then click on Run option. Run dialog box will be appear on the screen.
Now, type Excel on Text box and press Enter key.
df
(ii) Click Start button → All Programs → Microsoft Office → Microsoft Excel 2010.
_p
It opens MS-Excel with a blank spreadsheet. By default, the name of the blank spreadsheet is Book1.xlsx,
where .xls and .xlsx are the extensions of a MS-Excel spreadsheet.
na
Menu Bar Title Bar Formula Bar Standard Toolbar
ap
:@
Ribbon
TG
Active Cell
n
O
Column
Heading
c h
Row Heading
Worksheet
ar
Window
Se
Sheet Tab
Scrolling Button
df
(i) Home Tab It consists of Clipboard, return maximum value from (A1 : A5)
_p
Font, Alignment, Number, Styles, Cells a list of arguments.
and Editing. MIN This function is used to = MIN
return minimum value from (A1 : A5 )
na
(ii) Insert Tab It consists of Tables,
a list of arguments.
Illustrations, Charts, Sparklines, Filter
Links, Text and Symbols.
(iii) Page Layout Tab It consists of Themes,
ap
where, A1 : A5 is a range between the cells of A1
and A5.
:@
Page Setup, Scale to Fit, Sheet Options Basic Terms of Spreadsheet
and Arrange. The basic terms of spreadsheet are as follows
(iv) Formulas Tab It consists of Function 1. A spreadsheet is a software tool that lets one
TG
Library, Defined Names, Formula enter, calculate, manipulate and analyse set of
Auditing and Calculation. numbers.
(v) Data Tab It consists of Get External 2. The intersection of each row and column is
n
Data, Connections, Sort & Filter, Data called cell. A cell is an individual container for
O
Views, Show, Zoom, Window and 3. An array of cells is called a sheet or worksheet.
Macros.
Se
Charts
Charts are the graphical and pictorial representation of worksheet data.
Types of Chart
1. Area Chart It emphasises the magnitude of change over time.
df
2. Column Chart It shows data changes over a period of time or illustrates comparisons among
items.
_p
3. Bar Chart It illustrates comparisons among individual items. Categories are organised vertically
and Values horizontally.
na
4. Line Chart It shows trends in data at equal intervals. It is useful for depicting the change in a value
over a period of time.
ap
5. Pie Chart It shows the proportional size of items that make up only one data series to the sum of
the items.
:@
6. XY (Scatter) Chart It shows the relationship among the numeric values in several data series or
plots two groups of numbers as series of XY coordinates. Scatter compares pairs of values.
TG
Components of Chart
1. Chart Area This is the total region surrounding the chart.
2. Plot Area The area where data is plotted. The plot area is bounded by axes in a 2D-Chart, whereas in
n
3. Chart Title The descriptive text aimed at helping user identify the chart.
4. Axis Title This is the title given to three axis, i.e. X, Y and Z.
h
5. Data Series A row or column of numbers that are plotted in a chart is called a data series.
c
6. Gridlines These are horizontal and vertical lines, which inserted in the chart to enhance its
ar
readability.
Se
Tit-Bits
■
$ Sign locks the cells location to a fixed position.
■
Stacked Bar Column shows the relationship of individual items to the whole.
■
Chart Wizard is used to create charts in MS-Excel.
■
Embedded Chart is a chart that is drawn on an existing sheet.
92 Learn, Revise & Practice ~ Computer Awareness
df
Ctrl + A Select all contents of the worksheet.
_p
Ctrl + B Bold highlighted selection.
Ctrl + I Italic highlighted selection.
na
Ctrl + K Insert link.
Ctrl + U Underline highlighted selection.
Ctrl + P
ap
Bring up the Print dialog box to begin printing.
Ctrl + Z Undo the last action.
:@
Ctrl + Page Up Move to the previous sheet between Excel worksheets in the same Excel document.
Ctrl + Page Down Move to the next sheet between Excel worksheets in the same Excel document.
Ctrl + Tab Move between two or more open Excel files.
n
Microsoft PowerPoint
Presentation is the practice of showing and explaining the contents of a topic to an audience or a learner
visually.
The application software that can create professional looking visual aids is called presentation graphics
software.
The presentation software is used for creation of the slides and to display the information in the form of
presentation of slides.
A presentation software provides tools like editor that allows insertion and formatting of text and
methods for inserting and manipulating graphics images along with sound and visual effects.
Microsoft Office 93
To start the MS-PowerPoint software, we need to
Click Start button → All Programs → Microsoft Office → Microsoft PowerPoint 2010.
By default, the name of the blank document is Presentation1. ppt, where .ppt or .pptx is the extension of a
PowerPoint file.
Quick Action Toolbar Control Button
Tabs Title Bar
Ribbon
Office Button
df
Group Box Button
Online Tab
_p
na
Slider Pen
ap Work Area
:@
TG
2. Ribbon It is same as Word and Excel, just few tabs are different like Animations, Slide Show, etc.
c
3. Slide It appears in the centre of the window. You can create your presentation by adding content to
ar
the slides.
Se
4. Slide Pane This area of PowerPoint window displays all the slides that are added in the
presentation.
5. Slide View Tab This tab displays a thumbnail view of all the slides.
6. Outline View Tab This tab displays the text contained in the presentation in an outline format.
7. Notes Section This section can be used for creating notes.
8. Status Bar It displays the number of the slide that is currently being displayed.
PowerPoint Views
Different types of views available in PowerPoint 2010 are explained below
1. Normal View This view is the main editing view, where you write and design your presentations,
i.e. actual screen which is displayed.
2. Slide Sorter View It provides a view of slides in thumbnail form. This view makes it easy to sort
and organise the sequence of the slides at the time of creating presentation.
94 Learn, Revise & Practice ~ Computer Awareness
3. Notes Page View In this view, the notes Shortcut Keys Descriptions
page is located just below the slide page. Ctrl + I Applies italic to the selected text.
Here, notes that apply to the current slide can Ctrl + M Inserts a new slide.
be typed. Later, these notes can be printed Ctrl + N Opens a new blank presentation.
and referred while giving actual presentation. Ctrl + O Opens the Open dialog box.
4. Slide Show View This view is used to Ctrl + T Opens the Font dialog box.
deliver a presentation to the audience. Slide Ctrl + U Applies underlining to the selected
Show View takes up the full computer screen, text.
like an actual presentation. To exit Slide Ctrl + V Paste the cutted or copied text.
Show View, press Esc key from the keyboard. Ctrl + W Closes the presentation.
5. Master View This view includes Slide Ctrl + Y Repeats or undo the last command
df
View, Handout View and Notes View. They entered.
_p
are the main slides that store information Home Moves cursor to the beginning of the
about the presentation, including background current line of the text.
color, fonts effects, placeholder sizes and End Moves cursor to the end of the
na
positions. current line of text.
Ctrl + Home Moves cursor in beginning of
Tit-Bits
ap
Ctrl + End
presentation.
Moves cursor to end of presentation.
Shift + Click
:@
■ Trigger is defined as an object or item that Selects more than one slide in a
performs on the slide when we click the mouse. each side presentation.
■ The MS-PowerPoint can maximum zoom to 400% F1 Opens the help dialog box.
only.
TG
F5 View the Slide Show. which allows the creating of database. Microsoft
c
Shift + Ctrl + Selects all text from the cursor to the Access is a Relational Database Management
ar
QUESTION BANK
1. Microsoft Office was developed by..…… in … 7. A Word processor would be used best to
(1) Microsoft Inc, 1970s (1) paint a picture
(2) Microsoft Inc, 1980s (2) draw a diagram
(3) Sun Microsoft, 1980s (3) type a story
(4) Sun Microsoft Inc, 1970s (4) work out income and expenses
2. Which of the following is a basic software 8. This program is made by Microsoft and
of MS-Office? embedded with Windows and used to view
df
(1) MS-Word (2) MS-Excel Web document. [RBI Grade B 2013]
(3) MS-PowerPoint (4) All of these (1) Netscape (2) Outlook Express
_p
3. MS-Word is a (3) Internet Explorer (4) MS-Word
(1) tabular data formatting software (5) None of these
na
(2) Word processing software
9. You can start Microsoft Word by using
(3) presentation software
(4) E-mail client which button?
4. What is MS-Word? [SBI Clerk 2015]
ap(1) New
(3) Program
(2) Start
(4) All of these
:@
(1) It is a calculating tool.
(2) It is a planning tool. 10. When you start MS-Word, the opening
(3) It is a chart. document has the name as
(4) It is a networking tool. (1) DOC1 (2) Document1
TG
Microsoft Office text files are stored [RBI Grade B 2012, IBPS Clerk 2014]
O
(5) WD
smaller than 64k, that do not require
c
(3) classified password that prevents (1) menu bar (2) status bar
unauthorised users from accessing a protected (3) title bar (4) formatting toolbar
Se
15. Microsoft Word is a word processor developed 24. To move to the beginning of a line of text,
by Microsoft. In MS-Word, Spelling Check is a press the … key.
feature available in which tab? (1) Page Up (2) A
(1) File (2) Home (3) Home (4) Enter
(3) Insert (4) Review
25. In which menu, we will find the command
16. MS-Word is a text or document editing document? [RBI Grade B 2013]
application program that comes in the (1) File (2) Insert
package of MS-Office Suite. Which among (3) Tools (4) Data
the given options is not related with (5) None of these
MS-Word? [IBPS PO 2016]
(1) Page Layout (2) Anti-virus 26. Which of the following is not a font style?
(1) Bold (2) Italic
df
(3) Mailings (4) Format Painter
(5) SmartArt (3) Regular (4) Superscript
_p
27. Portrait and landscape are
17. In order to choose the font for a sentence in
(1) page orientation (2) paper size
a Word document [IBPS Clerk 2011]
na
(3) page layout (4) page margin
(1) select Font in the Format menu
(2) select Font in the Edit menu 28. Which of the following should be used to
(3) select Font in the Tools menu apmove a paragraph from one place to
(4) select Font in the View menu another in a Word document?
(1) Copy and paste (2) Cut and paste
:@
(5) None of the above
(3) Delete and retype (4) Find and replace
18. When computer users …… a document, they
change its appearance. 29. To move the text from its original position to
another position without deleting it is called
TG
(1) File menu (2) Edit menu for changing text style, alignment and size?
O
21. Which bar is usually located below the title [UPPSC Computer Assistant 2019]
bar that provides categorised options? (1) Underline (2) U
(1) Menu bar (2) Status bar (3) I (4) P
(3) Tool bar (4) Scroll bar 32. Where we can insert a page number in
22. The process of making changes to an document?
existing document is referred to as [UPPSC Computer Assistant 2019]
[SBI Clerk 2014] (1) Header (2) Footer
(1) editing (2) changing
(3) modifying (4) creating (3) Both (1) and (2) (4) None of these
(5) adjusting 33. After selecting the ‘Replace’ option from the
23. Most of the editing tools are available Edit menu, the following dialog box will be
under which menu? appear.
(1) File (2) Format (1) Replace (2) Find
(3) Edit (4) All of these (3) Find & Replace (4) Edit
Microsoft Office 97
34. Which of the following justifications align (4) by changing the font size of your document
the text on both the sides, left and right of (5) None of the above
the margin? [IBPS Clerk 2012] 41. Where you can find the horizontal split bar
(1) Right (2) Justify on MS-Word screen?
(3) Both sides (4) Balanced (1) On the left of horizontal scroll bar
(5) None of these (2) On the right of horizontal scroll bar
35. Auto-text can be used to insert …. . in (3) On the top of vertical scroll bar
document. [RBI Grade B 2014] (4) On the bottom of vertical scroll bar
(1) Text (2) Graphics 42. In MS-Word, the default alignment for
(3) Either (1) or (2) (4) Both (1) and (2) paragraph is
(5) None of these (1) left aligned (2) centered
df
36. About margins [RBI Grade B 2014] (3) right aligned (4) justified
_p
(1) all sections in a document need to have same 43. Which of the following is not available on
margin the ruler of MS-Word screen?
na
(2) different sections can have different margins (1) Left indent (2) Right indent
(3) Word have pre-defined margins settings for (3) Centre indent (4) All of these
all documents ap
(4) can’t say, depend on the version of Word 44. You specify the save details of your file in
(5) None of the above
the [RBI Grade B 2013]
:@
(1) “Save as a file” dialog box
37. When entering text within a document, the (2) “Save the file as” dialog
Enter key is normally pressed at the end of (3) “File save” dialog box
every
TG
[IBPS PO 2011, IBPS Clerk 2013] (4) Any of (1) and (2)
(1) line (2) sentence (5) None of the above
(3) paragraph (4) word
(5) file
45. To save an existing document with a
n
df
(3) Shift + F1 (4) Shift + F2 organising and manipulating data?
_p
[UPSSSC 2018]
52. The shortcut key to print document is
[IBPS PO 2012] (1) Firefox (2) Excel
na
(1) Ctrl + D (2) Ctrl + A (3) Outlook (4) PowerPoint
(3) Ctrl + B (4) Ctrl + C 60. What kind of software would you most
(5) Ctrl + P aplikely use to keep track of a billing account?
[IBPS PO 2015]
53. Which of the following keys should be
(1) Web Authoring (2) Electronic Publishing
:@
pressed simiultaneously for highlighting the
text to the default font? [RRB NTPC 2016] (3) Spreadsheet (4) Word Processing
A. Ctrl + Home B. Ctrl + Space bar (5) PowerPoint
61. Excel worksheet data can be shared with
TG
working on MS-Word, which command is (3) link Excel data in a Word document
used? [IBPS Clerk 2014] (4) All of the above
h
64. The file responsible for starting MS-Excel is 73. All of the following terms are related to
[RBI Grade B 2013] spreadsheet software except
(1) MS.Excel (2) MS.exe (1) worksheet (2) cell
(3) Excel.exe (4) Excel.com (3) formula (4) virus detection
(5) None of these 74. Which of the following is an active cell in
65. Anything that is typed in a worksheet Excel?
appears [RBI Grade B 2013] (1) Current cell (2) Formula
(1) in the formula bar only (3) Range (4) Cell address
(2) in the active cell only 75. How is the data organised in a spreadsheet?
(3) in both active cell and formula bar (1) Lines and spaces
(4) All of the above (2) Layers and planes
df
(5) None of the above (3) Height and width
_p
66. Which one is the example of spreadsheet (4) Rows and columns
package? 76. The basic unit of a worksheet into which
na
(1) VisiCalc (2) Unity you enter data in Excel is called a
(3) Ada (4) Snowball (1) tab (2) cell
67. Which option will we use to give heading in
the form ?
ap(3) box (4) range
77. The advantage of using a spreadsheet is
:@
(1) Label (2) Text box (1) calculations can be done automatically
(3) Option group (4) Insert (2) changing data automatically updates
calculations
68. The extension of saved file in MS-Excel is (3) more flexibility
TG
70. In Excel, the intersection of a column and a (4) Both (2) and (3)
c
row is called [RBI Grade B 2014] 79. The default view in Excel is …… view.
ar
83. You can create hyperlinks from the Excel 91. The letter and number of the intersecting
workbook to column and row is the [IBPS PO 2012]
(1) a Web page on company Internet (1) cell location (2) cell position
(2) a Web page on the Internet (3) cell address (4) cell coordinates
(3) other Office 97 application documents (5) cell contents
(4) All of the above 92. Which of the following is not a valid formula
84. To select a column, the easiest method is to in Microsoft Excel? [IBPS Clerk 2014]
(1) double click any cell in the column (1) = A2 + A1 (2) = A2 + 1
(2) drag from the top cell in the column to the last (3) = 1 + A2 (4) = 1A + 2
cell in the column (5) = A1 + A2
(3) click the column heading 93. The function TODAY ( ) in Excel, enters the
df
(4) click the row heading current [RBI Grade B 2014]
_p
85. Which of the following groups is not (1) system time in a cell
present in the Insert tab of MS-Excel? (2) system date and time in a cell
(3) system date only
na
[UPSSSC Gram Panchayat Officer 2019]
(4) time at which the current file was opened
(1) Illustrations (2) Paragraph
(5) None of the above
(3) Links (4) Symbols ap
94. Which of the following characteristics is
86. Which of the following will you use as an
used to compute dynamically the results
option for saving a file?
:@
100. In Excel, an active cell can be represented by 111. The cell accepts your typing as its contents,
(1) 4A (2) A4 if you press
(3) A$4 (4) $A$4 (1) Enter (2) Ctrl + Enter
101. Three types of data can be entered in a (3) Tab (4) Insert
worksheet, as number/characters, text and 112. Which key is used in combination with
(1) formulas (2) functions another key to perform a specific task?
(3) logic (4) All of these (1) Function (2) Space bar
102. The physical arrangement of elements on a (3) Arrow (4) Control
page is referred to as a document’s 113. Which of the following commands in Office
(1) Features (2) Format 2010, can be used to go to the first cell in the
(3) Pagination (4) Grid
df
current row? [IBPS Clerk 2014]
103. Cell address $A4 in a formula means it is a (1) Tab (2) Shift + Tab
_p
(1) mixed cell reference (3) Esc + Home (4) Shift + Home
(2) absolute cell reference (5) Home
na
(3) relative cell reference 114. In a worksheet in MS-Excel, what is short-
(4) All of the above cut key to hide entire row? [SBI PO 2014]
104. In this chart, only one data series can be
plotted.
ap(1) Ctrl + 2
(3) Ctrl + N
(2) Ctrl + 9
(4) Ctrl + −
(5) Ctrl + N
:@
(1) Pie (2) Line
(3) Bar (4) Column 115. To select entire row, which shortcut is
105. This chart shows the relationship of parts to used? [SBI PO 2014]
TG
106. A chart placed in a worksheet is called 116. Which software is used to create
O
108. In Excel, charts are created using which Microsoft Office 2007?
option? (1) .ptp (2) .pptx (3) .ppx (4) .ptx
(1) Chart wizard (2) Pivot table
118. You can add any picture in your document
(3) Pie chart (4) Bar chart
from which menu?
109. Pie charts are typically created by using (1) File (2) Edit
which of the following? (3) Insert (4) Format
(1) Browser software 119. Which of the following should you use if
(2) Database software you want all the slides in the presentation
(3) Desktop publishing software to have the same ‘look’?
(4) Spreadsheet software (1) The slide layout option
110. To select the current column, press (2) Add a slide option
(1) Ctrl + Spacebar (2) Ctrl + B (3) Outline view
(3) Shift + Enter (4) Ctrl + Enter (4) A presentation design template
102 Learn, Revise & Practice ~ Computer Awareness
120. The ......... defines the appearance and shape 127. Which of the following views is the best
of letters, numbers and special characters. view to use when setting transition effects
(1) Font (2) Font size for all slides in presentation?
(3) Point (4) Paragraph formatting (1) Slide sorter view (2) Notes page view
121. ......... shows how the contents on printed (3) Slide view (4) Outline view
page will appear with margin, header and 128. Which PowerPoint view displays each slide
footer. of the presentation as a thumbnail and is
(1) Draft useful for re-arranging slides?
(2) Full screen reading [IBPS Clerk 2013]
(3) Outline (1) Slide sorter (2) Slide show
(4) Page layout (3) Slide master (4) Notes page
df
(5) Slide design
122. By default, on which page the header or
_p
footer is printed? [IBPS Clerk 2011] 129. Which is a feature included in Microsoft
(1) On first page (2) On alternative page PowerPoint software that allows the user to
na
(3) On every page (4) All of these see all the slides in a presentation at one
(5) None of these time? [IBPS PO 2016]
(1) Slide Sorter
ap (2) Slide Master
123. To find the paste special option, or use the (3) Handout Master (4) Slide Header
Clipboard group on the …… tab of Power
(5) Reading View
:@
Point. [IBPS Clerk 2013]
(1) Design (2) Slide Show 130. To add a header or footer to your handout,
(3) Page Layout (4) Insert you can use the
TG
(2) a tall to wide orientation (1) .wav files and .mid files
(3) a normal font size to a condensed one (2) .wav files and .gif files
(4) a condensed font size to a normal one (3) .wav files and .jpg files
(5) None of the above (4) .jpg files and .gif files
133. Which file format can be added to a
126. Which of the following controls the format
PowerPoint show?
and placement of the titles and text you on (1) .jpg (2) .giv
slides, as well as, background items and (3) .wav (4) All of these
graphics you want to appear on every slide?
[IBPS Clerk 2015]
134. PowerPoint provides .......... number of
(1) Slide (2) Copyright layouts for use with blank presentation.
(1) 20 (2) 22
(3) Layout (4) Design (3) 24 (4) 26
(5) None of these
Microsoft Office 103
135. In PowerPoint, the Header and Footer 138. Which of the following will not advance the
buttons can be found on the Insert tab in slides in a slide show view?
which group? [IBPS PO 2012, Clerk 2013] (1) Esc key
(1) Illustrations group (2) Object group (2) Spacebar
(3) Insert group (4) Tables group (3) Enter key
(5) None of these (4) Mouse button
136. Which command brings you to the first 139. Which of the following bypasses the Print
slide in your presentation? dialog box when printing individual slides
(1) Next slide button (2) Page up or an entire presentation?
(3) Ctrl + Home (4) Ctrl + End (1) File, Print preview
(2) Print button
137. Which of the following allows you to select
df
(3) File, Print
more than one slide in a presentation?
(4) Ctrl + P
_p
(1) Alt + click each slide
(2) Shift + drag each slide 140. Which key on the keyboard can be used to
(3) Shift + click each slide view slide show?
na
(4) Ctrl + click each slide (1) F1 (2) F2 (3) F5 (4) F10
ap
ANSWERS
:@
1. (2) 2. (4) 3. (2) 4. (5) 5. (2) 6. (4) 7. (3) 8. (4) 9. (2) 10. (2)
11. (3) 12. (3) 13. (4) 14. (2) 15. (4) 16. (2) 17. (1) 18. (1) 19. (2) 20. (4)
TG
21. (1) 22. (1) 23. (3) 24. (3) 25. (4) 26. (3) 27. (1) 28. (2) 29. (4) 30. (4)
31. (2) 32. (3) 33. (3) 34. (2) 35. (4) 36. (2) 37. (1) 38. (4) 39. (2) 40. (3)
41. (3) 42. (1) 43. (3) 44. (1) 45. (4) 46. (1) 47. (2) 48. (1) 49. (4) 50. (4)
n
51. (2) 52. (5) 53. (2) 54. (3) 55. (4) 56. (3) 57. (1) 58. (4) 59. (2) 60. (3)
O
61. (4) 62. (2) 63. (4) 64. (3) 65. (3) 66. (1) 67. (1) 68. (3) 69. (3) 70. (1)
71. (4) 72. (4) 73. (4) 74. (1) 75. (4) 76. (2) 77. (3) 78. (4) 79. (3) 80. (2)
c h
81. (4) 82. (2) 83. (4) 84. (2) 85. (2) 86. (4) 87. (3) 88. (2) 89. (1) 90. (3)
ar
91. (3) 92. (4) 93. (4) 94. (5) 95. (4) 96. (2) 97. (4) 98. (4) 99. (3) 100. (2)
101. (4) 102. (2) 103. (1) 104. (1) 105. (3) 106. (2) 107. (3) 108. (1) 109. (4) 110. (1)
Se
111. (1) 112. (4) 113. (3) 114. (2) 115. (1) 116. (3) 117. (2) 118. (3) 119. (4) 120. (1)
121. (4) 122. (4) 123. (5) 124. (2) 125. (1) 126. (3) 127. (1) 128. (1) 129. (1) 130. (3)
131. (3) 132. (1) 133. (4) 134. (3) 135. (5) 136. (3) 137. (3) 138. (1) 139. (4) 140. (3)
104 Learn, Revise & Practice ~ Computer Awareness
C H A P T E R
11
DATABASE
df
_p
CONCEPTS
na
ap
:@
A database is a collection of logically related data is organised in the form of tree with nodes.
information in an organised way so that it can be Nodes are connected via links.
easily accessed, managed and updated. 3. Relational Database This database is also
TG
Some other operations can also be performed on known as structured database in which data
database such as adding, updating and deleting is stored in the form of tables. Where, columns
data. define the type of data stored in the table and
n
that need to be processed such as digital A database consists of several different components.
Each component listed, is called an object.
c
2. Information When data is processed, organised, relation of any relational database model where
structured or presented in a given context to all the actual data is defined and entered.
make it useful or meaningful, it is called Different types of operation are done on the
information. tables such as storing, filtering, retrieving and
e.g. The class’s average score is the information editing of data. Tables consist of cells at the
that can be concluded from the given data. intersection of records (rows) and fields
(columns), which are described below
Types of Database (i) Field It is an area (within the record)
1. Network Database In this type of database, reserved for a specific piece of data.
data is represented as a collection of records and e.g. Customer number, Customer name,
relationships among data that are represented Street address, City, State, Phone number,
as links. Current address, etc. Field of a table is also
2. Hierarchical Database In this type of database, known as column.
Database Concepts 105
(ii) Record It is the collection of data items of MS-Access. The purpose of database management
all the fields pertaining to one entity, i.e. a system is to bridge the gap between information
person, company, transition, etc. Record of and data.
a table is also known as row or a tuple and The basic processes that are supported by DBMS are as
the number of records in a relation is called follows
the cardinality of that relation.
(i) Specification of data types, structures and
2. Queries These are basically questions based constraints to be considered in an application.
on the data available in a database. A query
(ii) Storing the data.
consists of specifications indicating which
fields, records and summaries a user wants to (iii) Manipulation of the database.
fetch from the database. (iv) Querying the database to retrieve desired
df
Queries allow you to extract data based on the information.
(v) Updating the content of the database.
_p
criteria that you define.
3. Forms Although you can enter and modify
Architecture of DBMS
na
data in datasheet view of tables but you neither
control the user’s action very well nor you can The architecture of DBMS is divided into three levels
do much to facilitate the data-entry process. To are as follows
overcome this problem, forms are introduced.
ap
1. Internal Level It is the lowest level of data
Like tables, forms can be used to view and edit abstraction that deals with the physical
:@
your data. However, forms are typically used to representation of the database on the
view the data in an underlying table, one record computer. It is also known as physical level.
at a time. It defines how the data is actually stored and
TG
e.g. A user can create a data entry form that organised in the storage medium.
looks exactly like a paper form. People generally User 1 User 2 User 3 User 4
prefer to enter data into a well-designed form,
n
Internal Level
Se
Database Management
System (DBMS) Storage
A DBMS is a collection of inter-related data and a
set of programs to retrieve data from the database. Architecture of DBMS
It is an organised collection of data viewed as a
whole, instead of a group of separate unrelated 2. Conceptual Level It is the overall view of
files. the database and includes all the information
that is going to be represented in the database.
The primary goal of DBMS is to provide an
It describes what type of data is stored in the
environment that is both convenient and efficient
database, the relationship among the data
for user to store and retrieve database information.
without effecting to the physical level. It is
e.g. MySQL, Oracle, FoxPro, dBASE, SyBase, also known as logical level.
106 Learn, Revise & Practice ~ Computer Awareness
3. External Level This is the highest level of DBMS an extremely complex piece of software.
data abstraction which describes the interaction Failure to understand the system can lead to
between the user and the system. bad design decisions, which can have serious
It permits the users to access data in a way that consequences for an organisation.
is customised according to their needs, so that 3. Cost of Staff Training Mostly DBMSs are
the same data can be seen by different users in often complex systems, so the training for
different ways, at the same time. It is also user to use the database is required. The
known as view level. organisation has to pay a lot of amount for the
training of staff to run the DBMS.
Advantages of DBMS 4. Appointing Technical Staff The trained
1. Reduction in Data Redundancy The technical persons such as database administrator,
df
duplication of data refers to data redundancy. application programmers, etc., are required to
_p
DBMS cannot make separate copies of the handle the database. You have to pay a lot of
same data. All the data is kept at a place and amount to these persons. Therefore, the system
different applications refer to data from
na
cost increases.
centrally controlled system. 5. Database Failure In most of the organisations,
2. Better Interaction with Users In DBMS, the ap
all data is integrated into a single database. If
availability of uptodate information improves database is corrupted due to power failure or it
the data to be access or respond as per user is corrupted on the storage media, then our
:@
integrity ensures that the data of database is 3. Universities For student information, course
accurate. In DBMS, data is centralised and used by registration, grades, etc.
h
many users at a time, it is essential to enforce 4 Credit Card Transaction For purchase of
c
df
These properties help us to further define and 2. Candidate Key The set of all attributes
describe relations which can uniquely identify each tuple (row)
_p
(i) Name The first property of a relation is its of a relation, is known as candidate key.
name, which is represented by the tide or Each table may have one or more candidate
na
the entity identifier. keys and one of them will become the
(ii) Cardinality The second property of a primary key. The candidate key of a relation
relation is its cardinality, which refers to
ap is always a minimal key.
the number of tuples (rows) in a relation. 3. Alternate Key From the set of candidate
:@
(iii) Degree The third property of a relation is keys after selecting one of the keys as
its degree, which refers to the number of primary key, all other remaining keys are
attributes (columns) in each tuple. known as alternate keys.
TG
referenced table.
4. Tuples The rows in a relation are also known
ar
deleting data from existing tables and same properties or attributes. e.g. Students are an
modifying existing data. entity set of all student entities in the database.
3. Data Control Language (DCL) These Entity set is of two types which are as follows
commands are used to assign security levels in 1. Strong Entity Set It has a primary key or can
database which involves multiple user setups. be easily distinguishable each attribute.
They are used to grant defined role and access 2. Weak Entity Set It does not posses sufficient
privileges to the users. attributes to form a primary key.
Relationship
Entity-Relationship It is an association among several entities. A
Model (E-R Model) relationship describes how two or more entities are
df
It represents the entities contained in the related to each other. It is represented by diamond
database. It is a diagrammatically representation of shape.
_p
entities and relationship between them. It is also Relationship can be divided into three parts
known as E-R Diagram.
na
(i) One-to-One This relationship tells us that a
Attributes Relationship single record in Table A is related to a single
Code Address ItemId Price
aprecord in Table B and vice-versa.
Customer Buys Items (ii) One-to-Many This entails one data in Table
Entity A to have links to multiple data in Table B.
:@
■
Dr. EF Codd represented 12 rules for Relational
rectangles”. e.g. Customer buys items, it means Database Management System (RDBMS) in 1970.
Customer and Items are entities. ■
Schema is a logical structure of the database.
h
Attributes ■
Instances are the actual data contained in the
c
■
Data Duplication wastes the space, but also
entity. In tables, attributes are represented by promotes a more serious problem called data
Se
QUESTION BANK
1. A ......... is a collection of data that is stored 8. Devices that could be used to input data into
electronically as a series of records in a a database are
table. (1) keyboard, fax roller ball
(1) Spreadsheet (2) Presentation (2) mouse, keyboard, monitor
(3) Database (4) Web page (3) mouse, keyboard, touch screen
(4) All of the above
2. A collection of interrelated records is
called a [RBI Grade B 2012] 9. In a relational database, a data structure that
df
(1) utility file organises the information about a single
_p
(2) management information system topic into rows and columns, is
(3) database (1) block (2) record (3) tuple (4) table
(4) spreadsheet
na
10. The smallest unit of information about a
(5) datasheet record in a database is called a
3. Which of the following is the organised ap(1) cell (2) field (3) record (4) query
collection of large amount of interrelated 11. ……… are distinct items that do not have
data stored in a meaningful way used for
:@
much meaning to you in a given context.
manipulation and updation? [SBI PO 2012]
[IBPS Clerk Mains 2017] (1) Fields (2) Data
(1) Database (2) File (3) Queries (4) Properties
TG
5. Which type of database, organised the data 13. Which of the following contains information
c
in the form of tree with nodes? about a single ‘entity’ in the database like a
ar
16. A program that generally has more 23. Which out of the following is not a DBMS
user-friendly interface than a DBMS is software?
called a (1) dBASE (2) FoxPro
(1) front end (2) repository (3) Oracle (4) Database 2000
(3) back end (4) form 24. In which, the database can be restored up to the
17. Which of the following object(s) is/are last consistent state after the system failure?
contained in database? (1) Backup (2) Recovery
(1) Table (2) Query (3) Redundancy (4) Security
(3) Form (4) All of these 25. ............ provides total solutions to reduce data
18. Which of the following places the common redundancy, inconsistency, dependency and
df
data elements in order from smallest to unauthorised access of data.
largest? (1) DBMS [IBPS Clerk 2012]
_p
(1) Character, File, Record, Field, Database (2) Tables
(2) Character, Record, Field, File, Database (3) Database
na
(3) Character, Field, Record, File, Database (4) Protection password
(4) Bit, Byte, Character, Record, Field, File, (5) Centralisation of data
Database
19. What is the overall term for creating,
ap
26. Periodically adding, changing and deleting
file records is called ......... file.
:@
editing, formatting, storing, retrieving a text (1) updating (2) upgrading
document? [IBPS PO 2012] (3) restructuring (4) renewing
(1) Word processing (2) Spreadsheet design 27. Architecture of database management can be
TG
(1) to be responsible for the technical aspects of describing data, relationships, semantics and
managing the information contained in
constraints is referred to as
organisational databases
h
aspects of decision regarding the information (3) data model (4) DBMS
ar
management
(5) None of these
(3) to show the relationship among entity classes
Se
31. Which of the following contains data 40. The purpose of the primary key in a
descriptions and defines the name, data database is to [IBPS Clerk 2015]
type and length of each field in the database? (1) unlock the database
(1) Data dictionary (2) Data table (2) provide a map of the data
(3) Data record (4) Data filed (3) uniquely identify a record
(4) establish constraints on database operations
32. An advantage of the database management
(5) None of the above
approach is
(1) data is dependent on programs 41. In case of entity integrity, the primary key
(2) data redundancy increases may be
(3) data is integrated and can be accessed by (1) not null (2) null
multiple programs (3) Both (1) and (2) (4) any value
df
(4) All of the above 42. In files, there is a key associated with each
_p
33. Which of the following is the drawback of record which is used to differentiate among
DBMS? different records. For every file, there is
na
(1) Improvement in data atleast one set of keys that is unique. Such a
(2) Backup and recovery key is called
(3) Complexity
(4) Maintenance of data integrity
ap
(1) unique key
(3) index key
(2) prime attribute
(4) primary key
:@
34. In which of the following, database is used? 43. Which of the following types of table constraints
(1) Banking (2) Finance will prevent the entry of duplicate rows?
(3) Sales (4) All of these (1) Primary key (2) Unique
TG
[SBI PO 2012]
(2) flat file database
(1) key field (2) primary field
O
48. Which database language is used to access 54. Relationship can be divided into
data in existing database? (1) One-to-one
(1) DDL (2) DML (2) Many-to-one
(3) DCL (4) None of these (3) One-to-many
(4) All of the above
49. An E-R diagram is a graphic method of
presenting [IBPS Clerk 2011] 55. Dr. E F Codd represented ......... rules that a
(1) primary keys and their relationships database must obey if it has to be considered
(2) primary keys and their relationships to truly relational. [IBPS Clerk 2012]
instances (1) 10 (2) 8
(3) entity classes and their relationships (3) 12 (4) 6
(4) entity classes and their relationships to
df
(5) 5
primary keys
56. A logical schema
_p
(5) None of the above
(1) is the entire database
50. In an E-R diagram, an entity set is (2) is a standard way of organising information
na
represented by into accessable part
(1) rectangle (2) square (3) describes how data is actually stored on disk
(3) ellipse (4) triangle
51. In an E-R diagram, attributes are
ap
(4) All of the above
57. Data duplication wastes the space, but also
:@
represented by promotes a more serious problem called
(1) rectangle (2) square (1) isolated [IBPS PO 2015]
(3) ellipse (4) circle (2) data inconsistency
TG
52. In E-R diagram, relationship type is (3) other than those given as options
represented by [IBPS Clerk 2012] (4) program dependency
(1) ellipse (2) dashed ellipse (5) separated data
n
(3) rectangle (4) diamond 58. When data changes in multiple lists and all
O
(3) simple entity set (4) primary entity set (4) Data consistency
Se
ANSWERS
1. (3) 2. (3) 3. (1) 4. (2) 5. (2) 6. (1) 7. (4) 8. (3) 9. (4) 10. (2)
11. (1) 12. (4) 13. (3) 14. (2) 15. (1) 16. (4) 17. (4) 18. (3) 19. (4) 20. (1)
21. (2) 22. (4) 23. (4) 24. (2) 25. (4) 26. (1) 27. (3) 28. (3) 29. (1) 30. (2)
31. (1) 32. (3) 33. (3) 34. (4) 35. (3) 36. (5) 37. (3) 38. (2) 39. (4) 40. (3)
41. (1) 42. (4) 43. (1) 44. (2) 45. (3) 46. (1) 47. (3) 48. (2) 49. (3) 50. (1)
51. (3) 52. (4) 53. (2) 54. (4) 55. (3) 56. (2) 57. (2) 58. (5)
Data Communication and Networking 113
C H A P T E R
12
DATA COMMUNICATION
df
AND NETWORKING
_p
na
The term ‘communication’ means sending or rules called protocols to be followed during
ap
receiving information. When we communicate, we communication. The communication media is also
share information or data. called transmission media.
:@
A communication system can be defined as the Five components of data communication are
collection of hardware and software that facilitates (i) Sender It is a computer or any such device
inter-system exchange of information between
TG
It is the exchange of data between two devices (ii) Receiver It is a computer or any such device
O
using some form of transmission media. which is capable or receiving data from the
network. It can be any computer, printer,
h
There are three types of signal (iii) Message It is the data or information that
needs to be exchanged between the sender and
1. Digital Signal In this signal, data is transmitted
the receiver. Messages can be in the form of
in electronic form, i.e. binary digits (0 or 1).
text, number, image, audio, video, multimedia,
2. Analog Signal In this signal, data is transmitted etc.
in the form of radiowaves like in telephone line.
(iv) Communication Media It is the path
3. Hybrid Signal These signals have properties through which the message travels between
of both analog signal and digital signal. source and destination. It is also called
Components of Data Communication medium or link which is either wired or
Whenever we talk about communication between wireless.
two computing devices using a network, five most (v) Protocol It is a set of rules that need to be
important aspects come to our mind. These are followed by the communicating parties in
sender, receiver, communication medium, the order to have successful and reliable data
message to be communicated and certain communication.
114 Learn, Revise & Practice ~ Computer Awareness
df
data becomes useless. Basically, they are divided into three categories
1. Ethernet Cable or Twisted Pair Cable
_p
Communication Channel In this cable, wires are twisted together which
The communication channel refers to the direction are surrounded by an insulating material and
na
of signal flow between two linked devices. an outer layer called jacket. One of the wires is
There are mainly three types of communication used to carry signals to the receiver and the
channels which are as follows
apother is used only as a ground reference.
1. Simplex Channel In this channel, the flow of E.g. Local area networks use twisted pair cable.
:@
data is always in one direction with no 2. Co-axial Cable It carries the signal of higher
capability to support response in other direction. frequency data through the network. It has a
This communication is uni-directional. Only single inner conductor that transmits electric
TG
one of the communicating devices transmits signals and the outer conductor acts as a
information and the other can only receive it. ground and is wrapped in a sheet of teflon or
E.g. Radio, Television, Keyboard, etc. PVC. Co-axial cable is commonly used in
n
in cities.
data can flow in both directions, but not at the
E.g. Cable TV network.
same time. When one device transmits
h
df
Wireless Technologies resources.
It is the transfer of information over a distance Computer network is a combination of hardware
_p
without the use of enhanced electrical conductors and software that allows communication between
or wires. When the computers in a network are computers over a network.
na
interconnected and data is transmitted through Note ARPANET stands for Advanced Research Projects
waves, then they are said to be connected through Agency Network. It was the first network developed
unguided media.
ap by Vint Cerf in 1969.
transmission. The frequencies range from 3Hz hard drives, etc., in a computer network.
O
LANs are typically owned, controlled and managed There are many types of computer network devices
by a single person or organisation. They also use used in networking. Some of them are described
certain specific connectivity technologies, primarily below
Ethernet and Token Ring. LAN provides a sharing 1. Repeater It has two ports and can connect two
of peripherals in an efficient or effective way. segments of a LAN. It amplifies the signals
when they are transported over a long distance
Wide Area Network (WAN)
so that the signal can be as strong as the
WAN is a geographically dispersed collection of
original signal. A repeater boosts the signal
LANs. A WAN like the Internet spans most of the
back to its original level.
world. A network device called a router connects
LANs to a WAN. Its speed is upto 150 Mbps. 2. Hub It is like a repeater with multiple ports
used to connect the network channels. It acts as
df
Like the Internet, most WANs are not owned by
a centralised connection to several computers
any one organisation, but rather exist under
_p
with the central node or server. When a hub
collective or distributed ownership and
receives a packet of data at one of its ports from
management. WANs use technology like ATM,
na
a network channel, it transmits the packet to all
Frame Relay and X.25 for connectivity.
of its ports to all other network channel.
Metropolitan Area Network (MAN) ap
3. Gateway It is an inter-connecting device,
It is a data network designed for a town or city. It which joins two different network protocols
connects an area larger than a LAN, but smaller together. They are also known as protocol
:@
than a WAN. Its speed is upto 100 Mbps. converters. It accepts packet formatted for one
Its main purpose is to share hardware and software protocol and converts the formatted packet into
another protocol.
TG
■ Server is a system that responds to requests A hub forwards each incoming packet (data) to
across a computer network to provide a network all the hub ports, while a switch forwards each
service. It can be run on a dedicated computer. It incoming packet to the specified recipient.
is one of the most powerful and typical computer.
5. Router It is a hardware device which is
■ File Server is a type of computer used on network designed to take incoming packets, analyse
that provides access to files. It allows users to
packets, moving and converting packets to the
share programs and data over LAN network.
another network interface, dropping the
packets, directing packets to the appropriate
Computer Network Devices locations, etc.
These devices are required to amplify the signal to 6. Bridge It serves a similar function as switches.
restore the original strength of signal and to A bridge filters data traffic at a network
provide an interface to connect multiple computers boundary. Bridges reduce the amount of traffic
in a network. on a LAN by dividing it into two segments.
Data Communication and Networking 117
df
Star Topology
Network Topology 3. Ring or Circular Topology This topology is
_p
The term ‘topology’ refers to the way a network is used in high-performance networks where
laid out, either physically or logically. Topology large bandwidth is necessary. The protocols
na
can be referred as the geometric arrangement of a used to implement ring topology are Token
computer system. Each computer system in a Ring and Fiber Distributed Data Interface
topology is known as node.
ap(FDDI). In ring topology, data is transmitted in
the form of token over a network.
The most commonly used topologies are described
:@
Node 1
below
1. Bus Topology It is such that there is a single
line to which all nodes are connected. It is
TG
Router
inter-connected topology. In mesh topology,
Se
Node 3 Node 2
Mesh Topology
118 Learn, Revise & Practice ~ Computer Awareness
df
between all types of computer systems. It mainly
consists of seven layers across a network.
_p
Seven Layers of OSI Model and their Functions
na
Name of the Layer Functions
Application Layer Re-transferring files of
Tree topology ap
[User-Interface] information, login, password
checking, packet filtering, etc.
Models of Computer
:@
Presentation Layer It works as a translating layer,
Networking [Data formatting] i.e. encryption or decryption.
There are mainly two models of computer networking Session Layer To manage and synchronise
TG
computing power at the edges of a connection Transport Layer It decides whether transmission
O
rather than in the network itself. [Transmission should be parallel or single path,
P2P network is used for sharing content like audio, Control Protocol multi-plexing, splitting or
h
transfer files. In peer-to-peer networking, each or Network Layer Routing of the signals, divide the
every computer can work as server or client. [Internet Protocol outgoing message into packets,
(IP) routers] to act as network controller for
2. Client-Server Network routing data.
The model of interaction between two application Data Link Layer Synchronisation, error detection
programs in which a program at one end (client) [Media Access and correction. To assemble
requests a service from a program at the other end Control (MAC) outgoing messages into frames.
switches]
(server).
Physical Layer Make and break connections,
It is a network architecture which separates the
[Signals-cables or define voltages and data rates,
client from the server. It is scalable architecture, operated by convert data bits into electrical
where one computer works as server and others as repeater] signal. Decide whether
client. Here, client acts as the active device and transmission is simplex, half
server behaves passively. duplex or full duplex.
Data Communication and Networking 119
In OSI model, physical layer is the lowest layer 3. Packet Switching It refers to the method
which is implemented on both hardware and of digital networking communication that
software and application layer is the highest layer. combined all transmitted data regardless of
content, type or structure into suitable sized
Computer Network Addressing blocks known as packets.
Network addresses are always logical, i.e. these are 4. Public Switched Telephone Network (PSTN)
software based addresses which can be changed by It is designed for telephone, which requires
appropriate configurations. modem for data communication. It is used for
A network address always points to host/node/ FAX machine also.
server or it can represent a whole network. 5. Integrated Services Digital Network (ISDN)
It is used for voice, video and data services. It
df
Network address is always configured on network
interface card and is generally mapped by system uses digital transmission and combines both
_p
with the MAC address of the machine for layer-2 circuit and packet switching.
communication. 6. Ethernet It is a widely used technology
na
There are different kinds of network addresses as employing a bus technology. An ethernet LAN
IP IPX AppleTalk consists of a single co-axial cable called Ether.
ap
It operates at 10 Mbps and provides a 48-bits
address. Fast ethernet operates at 100 Mbps.
Terms Related to
:@
7. Token It is a small message used to pass
Computer Network between one station to another.
1. Multi-plexing It is a technique used for
Tit-Bits
TG
transmitter is assigned a code to allow multiple navigation satellite system that provides location,
velocity and time synchronisation. GPS is
users to be multi-plexed over the same physical
Se
QUESTION BANK
1. ......... is the transmission of data between 9. Which of the following cables can transmit
two or more computers over data at high speed? [IBPS Clerk 2014]
communication links. (1) Flat cable (2) Co-axial cable
(1) Communication (2) Networking (3) Optic fibre cable (4) Twisted pair cable
(3) Data communication (4) Data networking (5) UTP cable
2. Communication channel having.........type(s). 10. Which Indian state decided to implement
df
(1) 1 (2) 2 (3) 3 (4) 4 Bharat Net Service which will connect all
3. In simplex channel, flow of data is the village panchayats through optical fibre?
_p
(1) always in one direction [RRB NTPC 2016]
(2) always in both direction A. Maharashtra B. Punjab
na
(3) in both direction, but one at a time C. Tamil Nadu D. Uttar Pradesh
(4) All of the above 1. D 2. B 3. A 4. C
4. Communication between a computer and a
keyboard involves ........ transmission.
ap
11. Networking using fibre optic cable is done
as [RBI Grade B 2012]
(1) it has high bandwidth
:@
[IBPS Clerk Mains 2017]
(1) Automatic (2) Half duplex (2) it is thin and light
(3) Full-duplex (4) Simplex (3) it is not affected by electro magnetic
interference/power surges, etc
TG
(1) Twisted pair cabling is a relatively low speed (3) Very resistant to interference
ar
15. Bandwidth refers to [RBI Grade B 2013] 21. What type of resource is most likely to be a
(1) the cost of the cable required to implement a shared common resource in a computer
WAN network? [Allahabad Bank Clerk 2010]
(2) the cost of the cable required to implement a (1) Printers
LAN (2) Speakers
(3) the amount of information a peer-to-peer (3) Floppy disk drives
network can store (4) Keyboards
(4) the amount of information a communication (5) None of the above
medium can transfer in a given amount of
time 22. The first network that has planted the seeds
(5) None of the above of Internet was
df
(1) ARPANET (2) NSFnet
16. Which of the following represents the
(3) V-net (4) I-net
fastest data transmission speed?
_p
[SBI Clerk 2012] 23. Pathways that support communication
(1) Bandwidth (2) bps among the various electronic components on
na
(3) gbps (4) kbps the system board are called [SBI PO 2014]
(5) mbps (1) network lines (2) processors
17. A(n) ......... is composed of several computers
ap(3) logic paths (4) bus lines
connected together to share resources and (5) gateway
:@
data. [RBI Grade B 2014] 24. What do we call a network whose elements
(1) Internet (2) Network may be separated by some distance? It
(3) Backbone (4) Hyperlink usually involves two or more network and
TG
28. Computer connected to a LAN can ……… . 36. A protocol is a set of rules governing a time
[IBPS Clerk 2013] sequence of events that must take place
(1) run faster (1) between peers (2) between an interface
(2) share information and/or share peripheral (3) between modems (4) across an interface
equipment
37. A ……… is an agreement between the
(3) go online
communication parties on how
(4) E-mail
communication is to proceed. [SSC CGL 2016]
(5) None of the above
(1) Path (2) SLA
29. ......... allows LAN users to share computer (3) Bond (4) Protocol
programs and data.
(1) Communication server
38. A device operating at the physical layer is
df
called a
(2) Print server
(1) bridge (2) router
_p
(3) File server
(3) repeater (4) All of these
(4) All of the above
39. Which of the following devices that joins
na
30. What is the use of bridge in network? multiple computers together within one
(1) To connect LANs
LAN?
(2)
(3)
To separate LANs
To control network speed
ap(1) Repeater
(3) Gateway
(2) Hub
(4) Switch
:@
(4) All of the above (5) Router
31. Which of the following items is not used in 40. Which of the following is used for
Local Area Network (LAN)? [SSC CGL 2012] modulation and demodulation?
TG
lines? [IBPS Clerk 2015] 41. What is the name of the derive that links
your computer with other computers and
O
33. Which of the following refers to a small, (3) URL (4) WAN
ar
44. Which of the following is not a network device? 53. Which is the highest reliability topology?
(1) Router (2) Switch [IBPS RRB PO Mains 2018]
(3) Bus (4) Bridge (1) Mesh topology (2) Tree topology
45. Geometric arrangement of devices on the (3) Bus topology (4) Star topology
network is called (5) None of these
(1) topology (2) protocol 54. P2P is a ......... application architecture.
(3) media (4) LAN [IBPS Clerk 2012]
(1) client/server (2) distributed
46. Which of the following topologies is not of
(3) centralised (4) 1-tier
broadcast type?
(5) None of these
(1) Star (2) Bus
df
(3) Ring (4) All of these 55. A packet filtering firewall operates at which
of the following OSI layers?
_p
47. Network components are connected to the
(1) At the application layer
same cable in the ......... topology. (2) At the transport layer
na
(1) star (2) ring (3) At the network layer
(3) bus (4) mesh (4) At the gateway layer
(5) tree ap
56. Encryption and decryption are the functions
48. Hub is associated with ……… network.
of
:@
[SBI Clerk 2011]
(1) transport layer (2) session layer
(1) bus (2) ring
(3) presentation layer (4) All of these
(3) star (4) mesh
57. Name the fourth layer of OSI model.
TG
to two other nodes? (1) Network layer (2) Data link layer
c
61. In IT networking, which of the following 65. How many bits are there in the ethernet
device is used in physical layer? address? [SBI Clerk 2011]
[SSC CGL 2016] (1) 64 bits (2) 48 bits
(1) Repeater (3) 32 bits (4) 16 bits
(2) Router (5) None of these
(3) Transport Gateway 66. Ethernet uses
(4) Bridge (1) bus topology
62. Multi-plexing involves ……… path(s) and (2) ring topology
……… channel(s). [SBI Clerk 2011] (3) mesh topology
(1) one, one (4) All of the above
df
(2) one, multiple 67. In networks, a small message used to pass
(3) multiple, one between one station to another is known as
_p
(4) multiple, multiple [SSC CGL 2016]
(5) None of the above (1) Token (2) Byte
na
63. A processor that collects the transmissions (3) Word (4) Ring
from several communication media and send 68. ISDN is a tele-communication technology,
them over a single line that operates at a
higher capacity is called [RBI Grade B 2013]
apwhere [UPSSSC 2016]
(a) Voice, video and data all are transmitted
:@
(1) multi-plexer (2) bridge simultaneously
(3) hub (4) router (b) Only sound is transmitted
(5) None of these (c) Only video is transmitted
TG
ANSWERS
ar
1. (3) 2. (3) 3. (1) 4. (4) 5. (3) 6. (4) 7. (5) 8. (2) 9. (3) 10. (4)
Se
11. (4) 12. (3) 13. (5) 14. (2) 15. (4) 16. (3) 17. (2) 18. (2) 19. (1) 20. (4)
21. (1) 22. (1) 23. (2) 24. (1) 25. (3) 26. (2) 27. (1) 28. (2) 29. (3) 30. (1)
31. (4) 32. (1) 33. (1) 34. (4) 35. (3) 36. (4) 37. (4) 38. (3) 39. (4) 40. (1)
41. (1) 42. (3) 43. (5) 44. (3) 45. (1) 46. (2) 47. (3) 48. (3) 49. (4) 50. (2)
51. (4) 52. (1) 53. (1) 54. (1) 55. (1) 56. (3) 57. (3) 58. (1) 59. (2) 60. (1)
61. (1) 62. (2) 63. (1) 64. (2) 65. (2) 66. (1) 67. (1) 68. (1) 69. (2)
Internet And Its Services 125
C H A P T E R
13
INTERNET AND
df
_p
ITS SERVICES
na
ap
:@
The Internet is a worldwide network of computers organisations and people started working to
that are able to exchange information with each build their own networks, which were later
TG
other. Internet stands for International Network, inter-connected with ARPANET and NSFnet to
which began in 1950’s by Vint Cerf known as the form the Internet.
Father of Internet.
Advantages of Internet
n
In 1969, the University of California at Los Angeles, Publishing documents on the Internet saves
paper.
Se
Unsuitable and undesirable material available outlet and the other to a computer. They
that sometimes is used by notorious people such provide transmission speed of 1.5 Mbps or
as terrorists. more.
Cyber frauds may take place involving Credit/ 3. Broadband over Power Line (BPL) BPL is
Debit card numbers and details. the delivery of broadband over the existing
low and medium voltage electric power
Internet Connections distribution network. Its transfer speed is upto
Bandwidth and cost are the two factors that help 3 Mbps.
you in deciding which Internet connection is to BPL is good for areas, where there are no
use. The speed of Internet access depends on the other broadband connections, but power
bandwidth. infrastructure exists. For example, rural areas.
df
Some of the Internet connections available for Internet
Wireless Connection
_p
access are as follows
Wireless broadband connects a home or business to
Dial-Up Connection the Internet using a radio link between the
na
Dial-up is a method of connecting to the Internet customer’s location and the service provider’s
using an existing telephone. When a user initiates a facility. Wireless broadband can be mobile or fixed.
dial-up connection, the modem dials a phone
number of an Internet Service Provider (ISP) that is
ap
Unlike DSL and cable, wireless broadband requires
neither modem nor cables. It can be easily
:@
designated to receive dial-up calls. established in areas where it is not feasible to
The ISP then establishes the connection, which deploy DSL or cable.
usually takes about ten seconds and is accompanied Some ways to connect the Internet wirelessly are as
TG
The term ‘broadband’ commonly refers to high radio frequencies to transfer data. Wi-Fi allows
O
speed Internet access that is always on and faster high speed Internet connections without the
than the traditional dial-up access. It uses a telephone use of cables or wires. Wi-Fi networks can be
h
line to connect to the Internet. The transfer speed use for public Internet access at ‘hotspot’ such
c
technologies such as
Access (WiMAX) WiMAX systems are
1. Digital Subscriber Line (DSL) It is a expected to deliver broadband access services
popular broadband connection. It provides to residential and enterprise customers in an
Internet access by transmitting digital data economical way.
over the wires of a local telephone network.
It has the ability to provide service even in
DSL is the most common type of broadband
areas that are difficult for wired infrastructure
service. It uses the existing copper telephone
to reach and the ability to overcome the
lines. Its transfer speed is 256 kbits.
physical limitations of traditional wired
2. Cable Modem This service enables cable infrastructure.
operators to provide broadband using the 3. Mobile Wireless Broadband Services These
same co-axial cables that deliver pictures and services are also becoming available from mobile
sound to your TV set. telephone service providers and others. These
Most cable modems are external devices that services are generally appropriate for mobile
have two connections, one to the cable wall customers and require a special PC card with a
Internet And Its Services 127
built-in antenna that plugs into a user’s 3. HyperText Transfer Protocol (HTTP) HTTP
computer. Generally, they provide lower defines how messages are formatted and
speeds in the range of several hundred kbps. transmitted and what actions should be taken
by the Web servers and browsers in response
Intranet is a private network for Internet tools, but
available within an organisation. In large
to various commands.
organisation, Intranet allows an easy access to
corporate information for employees. HyperText Markup Language (HTML)
Extranet is a private network that uses the Internet It is used for designing Web pages. A markup
protocol and the public tele-communication system language is a set of markup (angular bracket, <>)
to securely share part of a business information. tags which tells the Web browser how to display the
Podcast is a form of audio broadcasting on the web. Web page’s words and images for the user. Each
df
It can be listened to on the go, while commuting to individual markup code is referred to as an element
office or even while working. or tag.
_p
4. Telnet Protocol Telnet is a program that runs
Interconnecting Protocols
na
on the computer and connects PC to a server on
A protocol is a set of rules that govern data the network. Telnet session starts by entering
communications. It defines what is communicated, ap
valid username and password.
how it is communicated and when it is
communicated. 5. Usenet Protocol The usenet service allows a
:@
group of Internet users to exchange their
Some of the protocols generally used to communicate views/ideas and information on some common
via Internet are as follows topic that is of interest to all the members
1. Transmission Control Protocol/Internet
TG
which are then reassembled back into connection which transmits the data at 9600
c
df
that supports both text and graphic information
Web Page is known as graphical web browser. For
_p
The backbone of the world wide web is made of example, Internet Explorer, Firefox, Netscape,
files, called pages or Web pages, containing Safari, Google Chrome and Opera.
na
information and links to resources - both text and
Note The first graphical web browser was NCSA Mosaic.
multimedia - throughout the Internet. It is created
using HTML. Web Server
ap
There are basically two main types of web page i.e., A web server is a computer that runs websites. The
server computer will deliver those Web pages to
:@
static and dynamic. The main or first page of a
Website is known as home page. the computers that request them and may also do
Note Bookmarks are links to web pages that make it easy other processing with the Web pages. The web
to get back to your favourite page. browser is a client that requests HTML files from
TG
and are connected together with hyperlinks is by a web server. It stores information about the
ar
documents, primarily HTML files, that are linked A Web address identifies the location of a specific
together and that exist on the Web under the same Web page on the Internet, such as http://www.
domain.” learnyoga.com.
For example, http://www.carwale.com is a Website
On the Web, Web addresses are called URLs. It
while http://www.carwale.com/new/ is a Web
stands for Uniform Resource Locator. Tim Berners
page.
Lee created the first URL in 1991 to allow the
Web Browser publishing of hyperlinks on the world wide web.
It is a software application that is used to locate, For example, ‘‘http://www. google.com/services/
retrieve and display content on the world wide index.htm’’
web, including Web pages. Web browsers are http:// — Protocol identifier
programs used to explore the Internet. www — World Wide Web
google.com — Domain name
We can install more than one Web browser on a /services/ — Directory
single computer. The user can navigate through index.htm — Web page
Internet And Its Services 129
df
indicating the organisation and usually two-letter When a search engine returns the links to web
abbreviation indicates the country name. pages corresponding to the keywords entered is
_p
Most common domain abbreviations for called a hit, otherwise called a miss.
organisation are as follow Many search engines also have directories or lists
na
.info Informational organisation of topics that are organised into categories.
.com Commercial Browsing these directories, is also a very efficient
.gov
.edu
Government
Educational
ap
way to find information on a given topic.
Here are some of the most popular search engines
:@
.mil Military
.net Network resources Google http://www.google.com
.org Non-profit organisation AltaVista http://www.altavista.com
Some domain abbreviations for country are as Yahoo http://www.yahoo.com
TG
.nz New Zealand Note Project loan is a search engine project by Google for
.uk United Kingdom providing internet access to rural and remote areas
using high altitude helium filled balloons.
h
Services of Internet
DNS stores and associates many types of information
ar
with domain names, but most importantly, it An Internet user can access to a wide variety of
translates domain names (computers host names) to services such as electronic mail, file transfer,
Se
IP addresses. It also lists mail exchange servers interest group membership, multimedia displays,
accepting E-mail for each domain. DNS is an real-time broadcasting, shopping, etc.
essential component of contemporary Internet use. Some of the important services provided by the
Internet are described below
Blog
A blog is a Website or Web page in which an Chatting
individual records opinions and links to other site It is the online textual or multimedia conversation.
on regular basis. A typical blog combines text, It is a widely interactive communication process
images, and links to other blogs, web pages and that takes place over the Internet.
media related to its topic. Chatting, i.e. a virtual means of communication that
Most blogs are primarily textual, although some involves the sending and receiving of messages,
focus on art, photographs, videos, music and audio. sharing audio and video between users located in
These blogs are referred to as edublogs. The entries any part of the world.
of a blog is also known as posts. For example, Skype, Yahoo, Messenger, etc.
130 Learn, Revise & Practice ~ Computer Awareness
df
host name. E-Reservation (Electronic Reservation) means
E-mail is transmitted between computer systems, making a reservation for a service via Internet. You
_p
which exchange messages or pass them onto other need not personally go to an office or a counter to
sites according to certain Internet protocols or book/reserve railways and airways tickets, hotel
na
rules for exchanging E-mail. rooms, tourist packages, etc.
To use E-mail, a user must have an E-mail address.
Emoticons or smileys are used in an E-mail to
express emotions or feelings clearly. Storage area
ap
Social Networking
It is the use of Internet based social media programs
:@
for E-mail messages is called mail box. to make connections with friends, family,
classmates, customers, clients, etc. It can be for
Video-Conferencing social purposes, business purposes or both.
It is a communication technology that integrates
TG
video and audio to connect users anywhere in the Social networking has grown to become one of the
world as if they were in the same room. largest and most influential component of the web.
The most popular social networking sites are
This term usually refers to communication
n
Facebook allows you to upload photos and maintain It involves new technologies, services and business
photo albums that can be shared with your friends. models.
It supports interactive online chat and the ability to Note Mobile commerce was launched in 1997 by Kevin
Duffey.
comment on your friends’s profile pages to keep in
touch.
Tit-Bits
Twitter
■ Cluster is a group of servers that share work and
It is an American company which provides social may be able to back each other up if one server fails.
networking services. Besides this, Twitter also ■ With the Webmail Interface, E-mails are accessible
provides online news. from anywhere in the world.
Twitter was founded in 2006 by Jack Dorsey, Noah Rich Text Formatting helps the sender (of E-mail)
df
■
Glass, Biz Stone and Evan Williams. It enables the format the contents of his/her E-mail message by
_p
user to send and read short 280 characters applying font, size, bold, italic, etc.
messages called tweets.
Video-Conferencing Apps
na
Registered users can read and post tweets while
those who are not registered can only read them. 1. Zoom
It is a proprietary software developed by Zoom
ap
Instagram
Video Communications, in September, 2012. It is
It is a free, online photo sharing application and compatible with Windows, MacOs, iOS, Android,
:@
social network platform that was acquired by Chrome OS and Linux.
Facebook in 2012. Instagram allows users to edit
and upload photos and short videos through a This platform is free for video-conferences of upto
100 participants at once, with a 40 minutes time
TG
mobile app.
limit. For longer or larger conferences with more
Users can add a caption to each of their posts and features, paid subscriptions are available, costing
use hashtages and location based geotags to index $15-20 per month.
n
process of trading goods over the Internet. It is a video communciation service developed by
Electronic Data Interchange (EDI) is the electronic Google, in 2017. It can run seamlessly on Android,
transfer of a business transaction between sender iOS and Web platforms.
or receiver. It can have upto 100 free participants for a time
Note E-trading is the process of trading goods and items limit of 60 minutes. It can have 16 people on screen
over the Internet. at a particular time. It can cost between $6 and $12
M-Commerce per month for paid version.
M-Commerce (Mobile Commerce) provides the 3. Microsoft Teams
application for buying and selling goods or services It is a proprietary business communication platform
through wireless Internet enabled handheld developed by Microsoft, in 2017. It can schedule
devices.
132 Learn, Revise & Practice ~ Computer Awareness
unlimited number of meetings and for a limited August 2003. This app is compatible with Windows,
time i.e., upto 24 hours. It is compatible with Mac OS, Linux, Android, iOS, etc.
Windows, MaC, iOS and Android. Skype can support upto 50 participants on a single
Microsoft Teams requires a monthly subscription video-conference, which is free. If you want to
payment per user. invite more than 50 people on skype for meetings,
then you need to buy a paid subscription. The
4. Skype
maximum number of participants that can be a part
It is a proprietary tele-communications application
of the meeting is 250.
developed by Skype Technologies (Microsoft), in
QUESTION BANK
df
_p
1. The vast network of computers that 8. What does the acronym ISP stand for?
na
connects millions of people all over the [IBPS Clerk 2014]
(1) Internal Service Provider
world is called
(1) LAN
(3) Hypertext
(2) Web
(4) Internet
ap
(2) International Service Provider
(3) Internet Service Provider
(4) Internet Service Providing
:@
(3) website
(4) interconnected networks application for your company over the
Internet. The company providing this service
3. The Internet is to your business is called an
n
(2) view Web pages 11. ……… networks can be used for public
(3) connect to servers all around the world internet access at hotspot such as
(4) All of the above restaurants, coffee shops, etc.
5. Which of the following is an example of (1) Wi-Fi (2) WiMAX
connectivity? (3) DSL (4) BPL
(1) Internet (2) Floppy disk 12. The standard protocol of the Internet is
(3) Power cord (4) Data (1) TCP/IP (2) Java
6. Internet was developed in the (3) HTML (4) Flash
(1) 1950s (2) 1960s 13. In computing, IP address means
(3) 1970s (4) 1980s (1) International Pin
7. Which of the following is not a type of (2) Internet Protocol
broadband Internet connection? (3) Invalid Pin
(1) Cable (2) DSL (3) Dial-up (4) BPL (4) Insert Pin
Internet And Its Services 133
14. Each IP packet must contain 21. In HTML, tags consist of keywords enclosed
(1) only source address [IBPS Clerk 2011] within [SSC CHSL 2013]
(2) only destination address (1) flower brackets (2) angular brackets <>
(3) source and destination addresses (3) parentheses () (4) square brackets [ ]
(4) source or destination address
(5) None of the above 22. Telnet is a [SSC CHSL 2012]
(1) search engine (2) browser
15. An IP address is ……… bit number. (3) protocol (4) gateway
[SSC CGL 2017]
(1) 8 bit (2) 16 bit (3) 32 bit (4) 64 bit
23. The ……… service allows a group of Internet
users to exchange their views on some
16. FTP can transfer files between any common topic.
computers that have an Internet connection.
df
(1) nicnet (2) milnet
Here, FTP stands for
(3) telnet (4) usenet
_p
(1) File Transfer Protocol
(2) Fast Text Processing
24. Which protocol provides E-mail facility
among different hosts? [RBI Grade B 2014]
na
(3) File Transmission Program
(1) SMTP (2) FTP
(4) Fast Transmission Processor (3) TELNET (4) SNMP
17. Which of the following is the
communication protocol that sets the
ap(5) None of these
25. What is the full form of VoIP?
:@
standard used by every computer that [Clerk Mains 2017]
accesses Web-based information? (1) Voice of Internet Power
(1) XML (2) DML (3) HTTP (4) HTML (2) Voice over Internet Protocol
TG
18. What is the full form of HTTP? (3) Voice on Internet Protocol
[IBPS Clerk 2014]
(4) Very optimised Internet Protocol
(1) HyperText Transfer Protocol 26. Which of the following protocols is used to
n
30. What is a Website? [RBI Grade B 2014] (1) sharing voice on the net
(1) A place from where we can get information in (2) live textual conferencing
documents and files (3) live audio conferencing
(2) A site that is owned by any particular (4) live real time conferencing
company (5) None of the above
(3) A location on the world wide web 38. To view information on the Web, you must
(4) A place from where we can access Internet have a [RBI Grade B 2012]
(5) None of the above (1) cable modem
31. A Website address is a unique name that (2) web browser
identifies a specific ......... on the Web. (3) domain name server
(4) hypertext viewer
(1) Web browser (2) Website
df
(5) None of these
(3) PDA (4) link
39. Which key on a windows keyboard sets to
_p
32. A (n) ……… appearing on a Web page opens
full screen mode in most browsers?
another document when clicked. [RRB NTPC 2016]
na
[SBI PO 2013]
(1) anchor (2) URL A. F1 B. F10 C. F11 D. F12
(1) D (2) B
(3) hyperlink (4) reference ap(3) A (4) C
(5) heading
40. In a web browser, which of the following is
33. A reference to data that reader can directly
:@
used to save frequently visited websites?
follow by selecting or hovering is [RRB NTPC 2016]
(1) hypertext (2) hyperlink A. History B. Task Manager
(3) hyper media (4) hyper markup
TG
C. Favourites D. Save as
34. A Website is a collection of [IBPS Clerk 2012] (1) A (2) B (3) C (4) D
(1) graphics (2) programs
41. The ……… which contains billions of
(3) algorithms (4) web pages
n
44. An absolute ……… contains the complete 52. Which among the following is a search
address of a file on the internet. engine?
[SSC CGL 2017, (1) Internet Explorer (2) Flash
UPPS Computer Assistant 2019] (3) Google (4) Firefox
(1) JavaScript (2) URL 53. A ……… is the term used when a search
(3) SQL (4) String engine returns a Web page that matches the
45. Which of the following must be contained search criteria. [IBPS PO 2011]
in a URL? [IBPS PO 2012] (1) blog (2) hit (3) link (4) view
(1) A protocol identifier (5) success
(2) The letters, WWW 54. Project Loan is a search engine project by
(3) The unique registered domain name
df
…… for providing internet access to rural
(4) WWW and the unique registered domain name
and remote areas using high altitude helium
_p
(5) A protocol identifier, WWW and the unique
registered domain name
filled balloons. [RRB NTPC 2016]
A. Google B. Microsoft
46. URL identifies the location of a specific Web
na
C. Apple D. Yahoo
page on the Internet. Here URL stands for (1) D (2) C (3) B (4) A
(1) Uniform Read Locator ap
(2) Uniform Resource Locator
55. Which of the following is always a part of
(3) Unicode Research Location E-mail address?
:@
(4) United Research Locator (1) Period (.) (2) At rate (@)
(5) None of the above (3) Space () (4) Underscore (_)
(5) Angular Bracket (<)
47. Which among the following terms
TG
means/refers to web address of a page? 56. Which one of the following is not an e-mail
service provider?
(1) SMTP (2) IP (3) HTTP (4) URL
(1) Hotmail (2) Gmail
(5) MAC
(3) Bing (4) Yahoo mail
n
48. The last three letters of the domain name (5) Outlook
O
(3) server
58. Which of the following is a valid e-mail
ar
(4) protocol
address?
49. An educational institution would generally
Se
61. If you receive an E-mail from someone you 67. The process of trading goods over the
don’t know, what should you do? Internet is known as [IBPS Clerk 2012]
(1) Forward it to the police immediately (1) E-selling n buying (2) E-trading
(2) Delete it without opening it (3) E-finance (4) E-salesmanship
(3) Open it and respond to them saying you don’t (5) E-commerce
know them
(4) Reply and ask them for their personal 68. A cookie [IBPS Clerk 2012]
information (1) stores information about the user’s web
activity
62. Which of the following is not a term (2) stores software developed by the user
pertaining to E-mail? [IBPS Clerk 2015] (3) stores the password of the user
(1) PowerPoint (2) Inbox (4) stores the commands used by the user
df
(3) Sender (4) Receiver (5) None of the above
(5) None of these
_p
69. Which of the following is most commonly
63. Storage area for E-mail messages is called used to identify return visitors to a website?
(1) folder (2) file (1) Logged-in visitors
na
(3) mail box (4) directory (2) Digital certificates
64. An E-mail address typically consists of a (3) Electronic time stamping
User ID followed by the………sign and the ap (4) Cookies
domain name that manages the user’s 70. Which of the following terms is associated
:@
electronic post office box. with Internet E-mail? [SBI Clerk 2014]
(1) # (2) @ (1) Plotter (2) Slide Presentation
(3) & (4) $ (3) Bookmark (4) Pie Chart
TG
Website in India? [SSC CGL 2013] 72. A host on the Internet finds another host by
ar
ANSWERS
1. (4) 2. (4) 3. (4) 4. (4) 5. (1) 6. (1) 7. (3) 8. (3) 9. (1) 10. (4)
11. (1) 12. (1) 13. (2) 14. (3) 15. (3) 16. (1) 17. (3) 18. (1) 19. (5) 20. (3)
21. (2) 22. (3) 23. (4) 24. (1) 25. (2) 26. (4) 27. (2) 28. (2) 29. (2) 30. (3)
31. (2) 32. (3) 33. (2) 34. (4) 35. (2) 36. (2) 37. (4) 38. (2) 39. (4) 40. (3)
41. (1) 42. (3) 43. (4) 44. (2) 45. (5) 46. (2) 47. (4) 48. (1) 49. (2) 50. (1)
51. (5) 52. (3) 53. (2) 54. (4) 55. (2) 56. (3) 57. (5) 58. (3) 59. (2) 60. (4)
61. (2) 62. (1) 63. (3) 64. (2) 65. (4) 66. (2) 67. (2) 68. (1) 69. (4) 70. (3)
71. (2) 72. (3)
Computer Security 137
C H A P T E R
14
COMPUTER
df
_p
SECURITY
na
ap
:@
Computer security is also known as cyber security 3. E-mail Attachments These attachments are
or IT security. It is a branch of information the most common source of viruses. You must
technology known as information security, handle E-mail attachments with extreme care,
TG
which is intended to protect computers. especially if the E-mail comes from an unknown
sender.
Sources of Cyber Attack 4. Booting from Unknown CD When the
n
The most potent and vulnerable threat to computer computer system is not working, it is a good
O
users is virus attacks. A computer virus is a small practice to remove the CD. If you do not remove
software program that spreads from one computer the CD, it may start to boot automatically from
h
to another and that interferes with computer the disk which enhances the possibility of virus
c
operation. attacks.
ar
3. System and Security Administration It Some terms commonly used in cryptography are
performs offline procedures that make or break as follows
secure system. (i) Plain text is the original message that is an
4. System Design It takes advantage of basic input.
hardware and software security characteristics. (ii) Cipher is a bit-by-bit or character-by-
character transformation without regard to
Components of Computer the meaning of the message.
Security (iii) Cipher text is the coded message or the
Computer security is associated with many core encrypted data.
areas. (iv) Encryption is the process of converting plain
df
Basic components of computer security system are as text to cipher text, using an encryption
follows algorithm. The scrambling of code is known as
_p
encryption.
1. Confidentiality It ensures that data is not
accessed by any unauthorised person. (v) Decryption is the reverse of encryption, i.e.
na
converting cipher text to plain text.
2. Integrity It ensures that information is not
altered by any unauthorised person in such a
way that it is not detectable by authorised
ap
Malware
users. Malware stands for Malicious Software. It is a
:@
3. Authentication Verification of a login name broad term that refers to a variety of malicious
and password is known as authentication. It programs that are used to damage computer
ensures that users are the persons they claim to system, gather sensitive information or gain access
TG
6. Availability It ensures that systems work Under Siege. Computer viruses or perverse
ar
promptly and service is not denied to softwares are small programs that can negatively
authorised users. affect the computer. It obtains control of a PC and
Se
df
(vii) decrease partition size. Zlob Trojan, Keyloggers, etc.
_p
(viii) alter PC settings.
(ix) display arrays of annoying advertising. Symptoms of Malware Attack
There is a list of symptoms of malware attack which
na
(x) extend boot times.
indicates that your system is infected with a
(xi) create more than one partition.
computer malware.
Worm
ap
Some primary symptoms of malware attack are as
follows
:@
A computer worm is a standalone malware
computer program that replicates itself in order to (i) Odd messages are displaying on the screen.
spread to other computers. Often, it uses a (ii) Some files are missing.
(iii) System runs slower.
TG
For example, Bagle, I love you, Morris, Nimda, etc. (vii) Unexpected sound or music plays.
O
df
trojans, viruses, war-dialers, etc.
is who he or she claims to be, and to provide the
Note Cyber cracker is a person called who uses a
_p
computer to cause harm to people or destroy critical receiver with the means to encode a reply.
systems.
Digital Signature
na
5. Phishing It is characterised by attempting
to fraudulently acquire sensitive information It is an electronic form of a signature that can be
such as passwords, credit cards details, etc., used to authenticate the identity of the sender of a
ap
by masquerading as a trustworthy person. message or the signer of a document, and also
6. Spam It is the abuse of messaging systems ensure that the original content of the message or
:@
to send unsolicited bulk messages in the form document that has been sent is unchanged.
of E-mails. It is a subset of electronic spam
involving nearly identical messages sent to Firewall
TG
order to generate revenue for its author. The outgoing network traffic by analysing the data
term is sometimes used to refer the software
O
rule set.
designed to gain administrative level control
c
over a computer system without being A network’s firewall builds a bridge between an
ar
There are two common modes of password as follows 3. Patches It is a piece of software designed to fix
(i) Weak Password Easily remember just like problems with a computer program or its
names, birth dates, phone number, etc. supporting data.
(ii) Strong Password Difficult to break and a This includes fixing security vulnerabilities and
combination of alphabets and symbols. other bugs and improving the usability and
performance.
File Access Permission Note Vendor created program modifications are called
patches.
Most current file systems have methods of
assigning permissions or access rights to specific 4. Logic Bomb It is a piece of code intentionally
user and group of users. These systems control the inserted into a computer’s memory that will set
ability of the users to view or make changes to the off a malicious function when specified
df
contents of the file system. conditions are met. They are also called slag
_p
code and does not replicate itself.
File access permission refers to privileges that
allow a user to read, write or execute a file. 5. Application Gateway This applies security
na
There are three specific file access permissions as mechanisms to specific applications such as File
follows Transfer Protocol (FTP) and Telnet services.
(i) Read permission (ii) Write permission ap
6. Proxy Server It can act as a firewall by
responding to input packets in the manner of
(iii) Execute permission
:@
an application while blocking other packets.
It hides the true network addresses and used to
Terms Related to Security intercept all messages entering and leaving the
1. Eavesdropping The unauthorised real time
TG
network.
interception of a private communication such
as a phone call, instant message is known as
eavesdropping.
Tit-Bits
n
■
The legal right to use software based on specific
2. Masquerading The attacker impersonates an
O
QUESTION BANK
1. ……… is a branch of information technology 10. Viruses, trojan horses and worms are
known as information security. [IBPS Clerk 2012]
(1) Computer security (2) Cyber security (1) able to harm computer system
(3) IT security (4) All of these (2) unable to detect if present on computer
(3) user-friendly applications
2. It takes advantages of basic hardware and (4) harmless applications resident on computer
software security characteristics. (5) None of the above
(1) System design
df
(2) Data access control
11. It is a self-replicating program that infects
(3) System access control computer and spreads by inserting copies of
_p
(4) None of the above itself into other executable code or documents.
(1) Keylogger (2) Worm
3. Verification of a login name and password is
na
(3) Virus (4) Cracker
known as [IBPS Clerk 2014]
(1) configuration (2) accessibility
12. A computer virus is
(3) authentication (4) logging in
(5) Other than those given as options
ap(1) deliberately created
(2) created accidently
(3) produced as a result of some program error
:@
4. If you are allowing a person on the network (4) All of the above
based on the credentials to maintain the
13. …… are often delivered to a PC through a
security of your network, then this act
mail attachment and are often designed to
TG
5. The scrambling of code is known as (4) Other than those given as options
(1) encryption (2) firewalling (5) E-mail messages
h
(3) scrambling (4) deception 14. Which of the following refers to dangerous
c
6. The main reason to encrypt a file is to programs that can be ‘caught’ of opening
ar
(3) prepare it for backup (1) Utility (2) Virus (3) Honey Pot
(4) include it in the start-up sequence (4) Spam (5) App
7. Cracked softwares are another source of 15. A program designed to destroy data on your
(1) e-mail attack (2) virus attack computer which can travel to ‘infect’ other
(3) trojan horse (4) All of these computers is called a [RBI Grade B 2012]]
8. A malware is a (1) disease (2) torpedo
(1) program (2) hardware (3) hurricane (4) virus
(3) person (4) None of these (5) infector
9. Softwares such as viruses, worms and trojan 16. If your computer rebooting itself, then it is
horses that have a malicious content, is likely that [SBI Clerk 2012]
17. Computer virus is [IBPS Clerk 2011] 27. A computer virus normally attaches itself to
(1) a hardware (2) a windows tool another computer program known as a
(3) a computer program (4) a system software [IBPS PO 2015]
(5) None of the above (1) host program (2) target program
18. Which among the following is related to the (3) backdoor program (4) bluetooth
(5) trojan horse
internet and mail?
(1) Boot-Up 28. These are program designed as to seem to
(2) Magnetic Tapes being or be doing one thing, but actually
(3) Applications Software being or doing another.
(4) Virus (1) Trojan horses (2) Keyloggers
19. The first PC virus was developed in (3) Worms (4) Crackers
df
(1) 1980 (2) 1984 (3) 1986 (4) 1988 29. Viruses that fool a user into downloading
_p
20. Which was the first PC boot sector virus? and/or executing them by pretending to be
(1) Creeper (2) Payload useful applications are also sometimes called
na
(3) Bomb (4) Brain (1) trojan horses (2) keyloggers
(3) worms (4) crackers
21. The first computer virus is
(1) Creeper
(3) The Famous
(2) PARAM
(4) HARLIE
ap
30. A ......... is a small program embedded inside
of a GIF image.
(1) web bug (2) cookie
:@
22. The ......... of a threat measures its potential (3) spyware application (4) spam
impact on a system. [IBPS Clerk 2011]
(1) vulnerabilities (2) counter measures 31. Hackers often gain entry to a network be
pretending to be at a legitimate computer.
TG
df
(3) Cyber Cracker accordance with established rules) operators.
(1) Rootkit (2) Keylogger
_p
(4) Hacktivist
(5) Other than those given as options (3) Worm (4) Cracker
44. An anti-virus is a(n)
na
37. ......... are attempts by individuals to obtain
confidential information from you by (1) program code
(2) computer
falsifying their identity. [IBPS Clerk 2013]
(1) Phishing trips (2) Computer viruses
ap(3) company name
(4) application software
(3) Spyware scams (4) Viruses
:@
39. All of the following are examples of 47. To protect yourself from computer hacker
ar
50. A firewall operated by [SBI Clerk 2010] 56. Vendor created program modifications are
(1) the pre-purchase phase called [Allahabad Bank PO 2011]
(2) isolating intranet from extranet (1) patches (2) anti-viruses
(3) screening packets to/from the network and (3) hales (4) fixes
provide controllable filtering of network (5) overlaps
traffic
(4) All of the above 57. Which of the following is a computer’s
(5) None of the above memory, but unlike a virus, it does not
replicate itself ? [SBI PO 2011]
51. Coded entries which are used to gain access (1) Trojan Horse (2) Logic Bomb
to a computer system are called (3) Cracker (4) Firewall
(1) Entry codes (5) None of these
df
(2) Passwords
(3) Security commands 58. They are also called slag code and does not
_p
(4) Codewords replicate itself.
(1) Time (2) Anti-virus
52. Password enables users to
na
(3) Logic bomb (4) All of these
(1) get into the system quickly
(2) make efficient use of time 59. It hides the true network addresses and used
(3)
(4)
retain confidentiality of files
simplify file structure
ap
to intercept all messages entering and
leaving the network.
:@
53. Which of the following is the combination (1) Logic bomb (2) Firewall
(3) Patches (4) Proxy server
of numbers, alphabets along with username
used to get access to user account? 60. The legal right to use software based on
TG
ANSWERS
1. (4) 2. (1) 3. (3) 4. (1) 5. (1) 6. (2) 7. (2) 8. (1) 9. (1) 10. (1)
11. (3) 12. (1) 13. (3) 14. (2) 15. (4) 16. (1) 17. (3) 18. (4) 19. (3) 20. (4)
21. (1) 22. (3) 23. (4) 24. (2) 25. (1) 26. (2) 27. (5) 28. (1) 29. (1) 30. (3)
31. (3) 32. (1) 33. (1) 34. (2) 35. (4) 36. (3) 37. (1) 38. (2) 39. (2) 40. (1)
41. (4) 42. (3) 43. (1) 44. (4) 45. (3) 46. (3) 47. (1) 48. (1) 49. (1) 50. (3)
51. (2) 52. (3) 53. (1) 54. (2) 55. (2) 56. (1) 57. (2) 58. (3) 59. (4) 60. (2)
61. (2)
146 Learn, Revise & Practice ~ Computer Awareness
C H A P T E R
15
OVERVIEW OF FUTURE
df
_p
TECHNOLOGY
na
ap
:@
currently developing or that are expected to be monitoring sensor or it may be in the form of
available within the next 4 to 5 years. It is usually the video feed.
h
reserved for technologies that are creating, or 2. Connectivity All the collected data is sent to
c
expected to create, significant social or economic a cloud infrastructure. The sensors should be
ar
df
making them better.
which data is being created in real time.
2. Reduce Waste IoT offers real time information
_p
In a broader prospect, it comprises the rate of
leading to effective decision-making and
change and linking of incoming data sets at
management of resources.
na
varying speeds.
3. Improved Customer Engagement IoT
allows you to improve customer experience by 3. Volume Big data indicates huge volumes of
detecting problems and improving the process.
ap data that is being generated on a daily basis
from various sources like social media
4. Improved Data Collection Traditional data
:@
platforms, business processes, machines,
collection has its limitations and it’s designed
networks, etc.
for passive use. With the help of IoT, limitation
of data collection has reduced.
Applications of Big Data
TG
inter-connected and communicate over are harnessing and applying analytics to their
O
networks, the system offer little control big data, they have improvised a lot in terms
despite any security measures. It can reduce of managing utilities, running agencies,
h
the various kinds of network attacks. dealing with traffic congestion or preventing
c
of user, IoT system provides substantial 2. Heathcare Big data analytics had already
personal data in maximum detail. started to create a huge difference in the
Se
3. Complexity The designing, developing, healthcare sector. With the help of predictive
maintaining and enabling the large technology analytics, medical professionals can now able
to IoT system is quite complicated. to provide personalised healthcare services to
individual patient.
Big Data Analytics
3. Banking The banking sector relies on big
It is the process of collecting, organising and
data for fraud detection. Bit data tools can
analysing large sets of data to discover patterns and
efficiently detect fraudulent acts in real time
other useful information. Big data analytics can
such as misuse of credit/debit cards, etc.
help organisations to better understand the
information contained within the data and well 4. Manufacturing Using big data analytics,
also help to identify the data that is most important manufacturing industry can improve product
to the business and future business decisions. quality and output by minimising waste.
148 Learn, Revise & Practice ~ Computer Awareness
df
sight and sound. relating to the world. Artificial intelligence must
Virtual Reality (VR) technology is applied to have access to objects, categories, properties and
_p
advance fields of machine, engineering, education, relations between all of them to implement
design, training and entertainment. knowledge engineering.
na
Applications of Virtual Reality Types of Artificial Intelligence
1. In Gaming Virtual technology’s devices are
used for virtual gaming experiences. Along
ap
1. Weak AI It embodies a system designed to
carry out one particular job. Weak AI systems
:@
with this, devices such as Wi-Fi Remote, include video games such as the chess and
Playstation Move/Eye, Kinect are based on personal assistants such as Amazon’s Alexa.
virtual reality which track and send input of 2. Strong AI These are the systems that carry on
TG
the players to the game. the tasks considered to be human like. These
2. In Healthcare Healthcare is one of the tend to be more complex and complicated
applications where virtual reality could have systems. These kinds of systems can be found
n
df
3D printing is a manufacturing process where a 3D
Blockchain Technology
_p
printer creates three dimensional objects by
The blockchain is an encrypted, distributed depositing materials layer by layer in accordance to
database that records data. It is a digital ledger of
na
the object’s 3D digital model.
any transactions, contracts that need to be
independently recorded. It uses data Computer Aided Design (CAD)
In financial sector, with blockchain technology the
ap
software or 3D object scanners to direct hardware
to deposit material, layer upon layer, in precise
participants can interact directly and can make
:@
geometric shapes. As its name implies, additive
transactions across the internet without the
manufacturing adds material to create an object.
interference of a third party.
TG
With all the fraud resistant features, the blockchain How does 3D Printing Work?
technology holds the potential to revolutionise Here are the steps taken in creating a 3D object
various business sectors and make processes
1. Produce a 3D model using CAD or equivalent
smarter, secure, transparent and more efficient
n
3D design software.
compared to the traditional business processes.
O
1. It allows smart devices to speak to each other 3. Transfer the STL file to the computer that
ar
better and faster. controls the 3D printer. From there, you can
specify the size and orientation for printing.
Se
7. Performs any post processing needed, which 4. Financial Services Companies in the
may involve brushing off residue or washing financial services industry can use RPA for
the object. foreign exchange payments, automating
8. Use your new printed object. account opening and closing, managing audit
requests and processing insurance claims.
Examples of 3D Printing 5. Accounting Organisations can use RPA for
Architectural scale model and maquettes. general accounting, operational accounting,
Eyewear. transactional reporting and budgeting.
Dental Products.
Design (lamps, furniture, etc). Fifth Generation (5G)
Reconstructing bones and body parts in forensic 5G standard is for broadband cellular networks,
df
pathology. which cellular phone companies began deploying
_p
Reconstructing heavily damaged evidence. worldwide in 2019. It is designed to improve
retrieved from a crime scene. network connections by addressing the legacy
na
issues of speed, latency and utility, which the
Robotics Process earlier generations and the current generation of
Automation (RPA) ap
mobile networks could not address.
5G is promised to deliver data speed at a rate 100
RPA is the use of specialised computer programs,
:@
form of physical robots. Software robots mimic India, network operators like Airtel, Vodafone,
human activities by interacting with applications Idea, Reliance, Jio, etc., have already partnered with
in the same way that a person does. Robot process vendors like Ericsson, Huawai and Samsung for
n
automation enables business professionals to easily planned trials sometime by the end of year 2020,
O
configure software robots to automate repetitive, before the service’s forecast commercial rollout in
routine work between multiple systems, filling in 2020.
h
Applications of RPA
ar
offer better customer service by automating being able to enjoy a higher speed, we can
contact center tasks, including verifying access files, programs and remote applications
E-signatures, uploading scanned documents in direct without waiting.
and verifying information for automatic 2. Lower Latency Latency is the time that
approvals or rejections. elapses since we give an order on our device
2. Healthcare Medical organisation can use until the action occurs. In 5G, the latency will
RPA for handling patient records, claims, be ten times less than in 4G, being able to
customer support, account management, perform remote actions in real time.
billing, reporting and analytics. 3. Greater Number of Connected Devices
3. Supply Chain Management RPA can be With 5G, the number of devices that can be
used for procurement, automating order connected to the network increases greatly, it
processing and payments, monitoring will go to millionaire scale per square
inventory levels and tracking shipments. kilometer.
Overview of Future Technology 151
All connected devices will have access to disrupt or absorb the high frequency signals.
instant connections to the internet, which in To counter this setback, the telecom industry
real time will exchange information with each is extending cell towers to increase the
other. broadcast distance.
4. New Technology Options As speed of 2. Limitation of Rural Access While 5G might
network has improved, more and more tasks bring about real connectivity for the
are being transitioned to the world of smart predominantly urban areas, those living in the
devices from the world of computers. With rural area, they will not necessarily benefit
the rising network speeds, this could open from the connection.
new doors for smart devices that may not have 3. Battery Drain on Devices When it comes to
been available. cellular devices connected to 5G, it seems the
df
batteries are not able to operate for a
Disadvantages of 5G
_p
significant period of time. The battery
1. Obstruction can Impact Connetivity The technology needs to advance to allow for this
range of 5G connectivity is not great as the
na
enhanced connectivity, where a single charge
frequency waves are only able to travel a short will power a cellphone for a full day.
distance. Added to this setback is the fact that apAlongside depleted batteries, users are
5G frequency is interrupted by physical reporting that cellphones are getting
obstructions such as trees, towers, walls and increasing hot when operating on 5G.
:@
QUESTION BANK
n
O
1. Which of the following is a term generally 4. …… are key components that help you to
used to describe a new technology, but it collect live data from the surrounding
h
8. …… of big data analytics refers to structured, 15. Which of the following is an encrypted and
unstructured and semi-structured data that is distributed database that records data?
gathered from multiple sources. (1) Automation
(1) Feature (2) Analysis (2) Blockchain
(3) Privacy (4) Variety (3) Artificial intelligence
(4) Future skills
9. Virtual reality is primarily experienced
through …… of the five senses. 16. Blockchain mechanism brings everyone to
(1) Two (2) Three the highest degree of …… .
(3) Four (4) One (1) Accountability (2) Availability
(3) Performance (4) Analytics
10. Which technology devices is used for virtual
df
gaming experiences? 17. Additive manufacturing uses …… software.
(1) Future skills (2) Virtual (1) System (2) Application
_p
(3) Big data analytics (4) Blockchain (3) Utility (4) CAD
11. Virtual reality technology is applied to 18. Example(s) of 3D printing is/are
na
advance fields of (1) Eyewear
(1) medicine (2) engineering (2) Dental products
(3) education (4) All of these
ap(3) Architectural Scale Model
(4) All of the above
12. …… is an area of computer science that
:@
emphasises the creation of intelligent 19. RPA is the use of specialised computer
machines that work and react like humans. programs known as ……
(1) future skills
(1) Artificial intelligence
TG
ANSWERS
1. (1) 2. (4) 3. (2) 4. (1) 5. (2) 6. (4) 7. (3) 8. (4) 9. (1) 10. (2)
11. (4) 12. (1) 13. (1) 14. (4) 15. (2) 16. (1) 17. (4) 18. (4) 19. (3) 20. (4)
21. (1)
Miscellanceous 153
C H A P T E R
16
MISCELLANEOUS
df
_p
na
IT Gadgets 2. Smart Band
ap
A gadget is a device that has a specific function, in Smart bands are called smart bracelets or connected
:@
addition usually has small dimensions. bracelets. In most cases, they have a simple form
Some IT gadgets are as follows and their main function is to track and analyse your
movements during the day.
TG
df
4. Smart Watch 7. Spy Pen
_p
Smart watch is a wearable computing device that Spy pen is an ordinary pen with a hidden digital
closely resembles a wrist watch. Many smart camera concealed inside, allowing the user to
na
watches are connected to a smart phone that take video, images often with the pen placed in a
notifies the user of incoming calls, e-mail messages shirt pocket or held in a hand. This type of device is
and notifications from applications. ap
usually used for protection, safety and even
investigation.
Some smart watches are able to make calls. Smart
:@
Mobile Applications
c
5. Google Glass
ar
a head mounted display, in the form of eye glasses. devices such as smartphones and tablets.
The google glasses function as a hands free smart
phone, letting users access the mobile internet Most Widely used Mobile
browser, camera, maps, calendar and other apps by
voice commands.
Apps in India
1. BHIM (Bharat Interface for Money) App
This app is used to make simple, easy and quick
payment transactions using UPI (Unified Payment
Interface). BHIM app was launched by PM
Narendra Modi on 30th December, 2016.
6. Drone Camera It has been named after the architect of the India’s
It is the device that captured of still images and video Constitution Dr. B R Ambedkar, the BHIM app is an
by a remotely-operated or autonomous Unmanned aggregator of UPI services across various banks.
Miscellanceous 155
The aim to launch the BHIM app is to make These documents can be shared by residents with
cashless payments. governments or other registered organisations.
Key features of BHIM app 5. GARV (Grameen Vidyutikaran) App
Money can be transfered using mobile number or GARV app is used to monitor the progress of the
account number. rural electrification scheme and provide real-time
It helps to receive and transfer money directly updates.
into bank accounts.
This app was launched in October, 2015. GARV app
Its two factor authentication ensures your is an important part of the Digital India Initiative of
transactions are safe and secure. the Government and will contribute in further
It provides transaction history. development of the villages.
df
2. IRCTC Connect App Key features of GARV app
_p
IRCTC (Indian Railway Catering and Tourism Using this app, user can know that which village
Corporation) has released its official Android App will be electrified next.
na
called IRCTC Connect on 9th October, 2014. You can also check the progress status of any
Key features of IRCTC Connect app village.
User can check the schedule of trains.
User can check the availability of the seat in any
ap
6. mPassport Seva App
It is a easy to use app that provides all the functions
:@
train. as available over the Passport Seva Portal such as
It can keep the passengers up-to-date for their New User Registration, existing user login, etc.
train journey.
This app was launched on the occasion of Sixth
TG
Key features of MyGov app mPassport Seva app lets you check both passport
application status and RTI status.
h
It also gives you the opportunity to connect and This app provides the convenience to all the people
engage with government representatives through for finding their names in the electoral roll,
Se
df
on top of roads. Paytm is India’s largest mobile commerce platform
launched in 2010 by Vijay Shekhar Sharma. Paytm
_p
Digital Financial Tools Wallet, because of its amazing marketing and
operation strategies, has been able to capture
na
A new era of financial system in India was started. maximum market share of this industry.
In this era, efforts were made up to improve The wallet can be used to sent money directly to
methodology and responsibilities of financial
system.
ap
bank accounts as well. Paytm is the first company
in India to receive a license from the Reserve Bank
:@
Financial tools are terms used to describe of India (RBI) to start a payment bank.
organisations that deal with the management of Freecharge
money.
This service was launched in September, 2015 and
TG
Some terms that used in digital financial tools are has ever since introduced many attractive features.
This will enable all customers to send and receive
UPI (Unified Payment Interface) funds through the UPI system.
n
UPI has been launched by the National Payments It is a digital wallet that can be used for a number of
Corporation of India, also known as NPCI. In online payments including transferring money,
Se
conjunction with the Reserve Bank of India and accepting payments, mobile recharge, payment of
Indian Banks’ Association, NPCI has framed this utility bills, such as electricity, DTH, online
network. shopping, etc.
It is similar in mechanisms like the RuPay system Mobikwik has received an approval from the
through which debit and credit cards function. Reserve Bank of India (RBI) and has tied up with a
Note There are 4 or 6 digits required to set UPI pin. number of retails and online merchants in the country.
Oxigen
e-Wallet It is a digital wallet service through which users
e-Wallet (Mobile Wallet) is a type of prepaid can avail all the services offered by Oxigen. It is an
account in which a user can store his/her money application based service that can be used on all
for any future online transaction. An e-Wallet is types of smartphone such as Android, Windows
protected with a password. and IOs.
Miscellanceous 157
Oxigen wallet is a semi-closed wallet as per RBI It is a digital platform by which customers can
guidelines. You can transfer funds from your wallet simply send or ask money from any of their
to your bank account. contacts even if they do not have an SBI account.
Airtel Money PayZapp
Airtel Money is the Mobile Wallet from the PayZapp offered by HDFC bank is an ideal mobile
successful and popular telecom company Airtel. payment wallet.
It allows you to use your smartphone as an With PayZapp, you can shop on your mobile at
electronic wallet to make and receive payments. partner apps, bus and movie tickets, groceries,
Originally launched in 2012, this app offers book flight tickets and hotels, pay bills and
customers with an efficient alternative to cash recharge your mobile.
df
transactions. With the HDFC PayZapp e-Wallet app, customers
do not need to depend on card based transactions
_p
Citrus Wallet
and can enjoy secure and convenient payments.
It is an app that lets you send money to and receive
na
from anyone who has a phone number or E-mail. It PhonePe
lets your transfer money to friends, colleagues and
PhonePe wallet has launched by Sameer Nigam and
family members within seconds. ap
Rahul Chari.
You can pay canteen, movie, travel and party bills
It provides an online payment system based an
:@
with ease. You can even see all your past transactions
Unified Payments Interface (UPI), which is a new
and keep a track of your spending patterns.
process in electronic funds transfer launched by
SBI Buddy National Payments Corporation of India (NPCI).
TG
SBI had launched the Mobile Wallet Buddy in Using PhonePe, users can send and receive money,
August 2015, in 13 different languages in recharge mobile, data cards, buy gold and shop
collaboration with Master Card. online and offline.
n
O
QUESTION BANK
c h
ar
in addition usually has small dimensions. computing device which comes with a head
(1) Software (2) Gadget mounted display in the form of eyeglasses?
(3) Keyboard (4) Scanner (1) Google glass (2) Drone camera
(3) Spy pen (4) Smart goggle
2. Which of the following is an IT gadget?
(1) Keyboard (2) Wrist watch 5. This IT gadget is used for protection, safety
(3) Smart watch (4) Joystick and even investigation.
(1) Drone camera (2) Smart watch
3. Smart band is also known as
(3) Bluetooth speaker (4) Spy pen
(1) Smart bracelet
(2) Connected bracelet 6. Smart watches can be smart bands with
(3) Both (1) and (2) (1) pedometers (2) heart rate monitors
(4) Smart watch (3) Both (1) and (2) (4) None of these
158 Learn, Revise & Practice ~ Computer Awareness
7. Smart phone also offers capability(ies) such 16. e-Wallet is also known as ………… protected
as with a password.
(1) support for biometrics (1) Pocket wallet (2) Mobile wallet
(2) video chatting (3) Prepaid wallet (4) None of the above
(3) digital assistants
(4) All of the above
17. Which of the following facilities is available
under e-Wallet?
8. Bluetooth speakers work with the (1) Cash back (2) Rewards
(1) Wireless technology (3) Both (1) and (2) (4) None of the above
(2) Wired technology
(3) Both (1) and (2)
18. Which e-Wallet is the first company in India
to receive a license from RBI to start a
df
(4) None of the above
payment bank?
9. BHIM app is used to make simple, easy and
_p
(1) Freecharge (2) Mobikwik
quick payment transactions using (3) Airtel Money (4) Paytm
(1) Password (2) UPI
na
(3) Phone number (4) Aadhar number
19. Which bank offered the e-Wallet app
PayZapp?
10. App launched by IRCTC was known as ap(1) ICICI (2) HDFC
(1) IRCTC Connect (2) IRCTC App (3) SBI (4) PNB
(3) IRCTC Launcher (4) IRCTC Booking
:@
20. ………… provides an online payment system
11. Paytm is India’s largest mobile payment and based on Unified Payment Interface (UPI).
commerce platform founded by (1) PayZapp (2) PhonePe
(1) Aditya Sharma (2) Vijay Shekhar Sharma
TG
13. UPI has been launched by (1) Sameer Nigam (2) Rahul Chari
ar
(1) RBI (2) IFSC (3) Both (1) and (2) (4) None of these
(3) USSD (4) NPCI
23. Oxigen wallet is a …… wallet as per RBI
Se
ANSWERS
1. (2) 2. (3) 3. (3) 4. (1) 5. (4) 6. (3) 7. (4) 8. (1) 9. (2) 10. (1)
11. (2) 12. (2) 13. (4) 14. (1) 15. (4) 16. (2) 17. (3) 18. (4) 19. (2) 20. (2)
21. (1) 22. (3) 23. (4) 24. (2)
Practice Set 1 159
PRACTICE SET 1
1. Which of the following is an example of 9. Which of the following is not a property of
non-volatile memory? fibre optic cabling?
(1) ROM (2) RAM (3) LSI (4) VLSI (1) Transmits at faster speed than copper
cabling
2. Which of the following is a unit of (2) Easier to capture a signal from than copper
measurement used in computer system?
df
cabling
(1) Byte (2) Megabyte (3) Very resistant to interference
_p
(3) Gigabyte (4) All of these (4) Carries signals as light waves
3. Which command is used to copy files? 10. What does fibre use to transmit data?
na
(1) Copy (2) Disk copy (1) Vibrations (2) Sound
(3) Type (4) All of these (3) Electrical current (4) Light
4. Which of the following is/are fundamental
component(s) of IoT?
ap
11. To cut the selected text, these keys should be
pressed.
:@
(1) Sensors (2) Connectivity (1) Ctrl + C (2) Ctrl + D
(3) Data processing (4) All of these (3) Ctrl + V (4) Ctrl + X
5. Which is not an advantage of using 12. It is the abuse of messaging systems to send
TG
(2) Hold down the Shift key 14. The secondary storage devices can only
(3) Hold down the Alt key store data, but they cannot perform
Se
17. DEL command is used to 26. It performs basic tasks such as controlling
(1) delete files input and output devides, processing of
(2) delete directory instructions, controlling and allocating
(3) delete labels memory, managing files.
(4) delete contents of file (1) The platform
18. C++ language was developed by (2) Application software
(3) Operating system
(1) Dennis Ritchie
(4) The motherboard
(2) Charles Babbage
(3) Niklaus Wirth 27. Servers are computers that provide
(4) Bjarne Stroustroup resources to other computers connected to a
(1) mainframe (2) network
df
19. The bar which shows your current status in
(3) supercomputer (4) client
the document is called
_p
(1) status (2) standard 28. A Database Management System (DBMS) is a
(3) format (4) title (1) hardware system used to create, maintain
na
and provide controlled access to a database
20. You can delete one character to the left of
(2) hardware system used to create, maintain
cursor using …… key. and provide uncontrolled access to a database
(1) backspace
(3) edit
(2) delete
(4) format
ap(3) software system used to create, maintain and
provide uncontrolled access to a database
:@
21. You can use ……… alignment to centralise (4) software system used to create, maintain and
your text. provide controlled access to a database
(1) right (2) centre 29. When data changes in multiple lists and all
TG
(3) left (4) All of these lists are not updated, this causes
22. In MS-Word, Spell Check is under which (1) data redundancy
menu? (2) information overload
n
(1) Red (2) Green (1) Control words (2) Reserved words
(3) Control structures (4) Reserved keys
ar
35. Process to verify the username and 44. An operating system is said to be
password is known as multitasking if
(1) logic (2) checkin (1) more than one programs can run
(3) authentication (4) authorisation simultaneously
(2) more than one users can work
36. The unit of speed used for super computer is simultaneously
(1) KB (2) FLOPS (3) GB (4) EB (3) Either (1) or (2)
37. HTTP stands for (4) None of the above
(1) HyperText Transfer Protocol 45. What is E-commerce?
(2) HighText Transfer Protocol (1) Buying and selling takes place over Internet
(3) HyperTechnical Transfer Protocol (2) Buying and selling takes place over phone
df
(4) HyperText Test Protocol call
(3) Buying and selling takes place over both
_p
38. 23 will be written in binary as Internet and phone call
(1) 10111 (2) 11111 (4) Buying and selling takes place over either
na
(3) 10011 (4) 11011 Internet or phone call
39. Which one of the following is a good 46. The default extensions of Microsoft Word
password?
(1) My date of birth (2) My school name
ap
2007 and Microsoft Excel 2007 files are
(1) .doc,.xsl (2) .doc,.xml
(3) .docx,.xlsx (4) .docx,.xml
:@
(3) My name (4) Timepass_09
40. It is also known as temporary memory. 47. 30,000 bytes is nearly equal to
(1) ROM (2) RAM (1) 30 KB (2) 3MB
TG
communication protocol that sets the 49. Which command is used to permanently
c
accesses Web based information? (1) Shift + Delete (2) Ctrl + Delete
(1) XML (2) DML (3) Alt + Delete (4) Delete
Se
ANSWERS
1. (1) 2. (4) 3. (1) 4. (4) 5. (4) 6. (1) 7. (3) 8. (1) 9. (2) 10. (4)
11. (4) 12. (1) 13. (3) 14. (4) 15. (3) 16. (2) 17. (1) 18. (4) 19. (1) 20. (1)
21. (2) 22. (2) 23. (2) 24. (1) 25. (2) 26. (3) 27. (2) 28. (4) 29. (4) 30. (2)
31. (4) 32. (1) 33. (1) 34. (3) 35. (3) 36. (2) 37. (1) 38. (1) 39. (4) 40. (2)
41. (1) 42. (3) 43. (1) 44. (1) 45. (1) 46. (3) 47. (1) 48. (2) 49. (1) 50. (1)
162 Learn, Revise & Practice ~ Computer Awareness
PRACTICE SET 2
1. First Supercomputer developed in India was 10. Pointing device includes the following except
(1) PARAM (2) Aryabhatta (1) maouse (2) light pen
(3) Buddha (4) CRAY-1 (3) trackball (4) keyboard
2. Which of the following is an example of 11. The term ‘operating system’ means
computer software? (1) a set of programs which controls computer
df
(1) Impact printer (2) Console working
(3) Device driver (4) OCR (2) the way a user operates the computer system
_p
(3) conversion of high level language to machine
3. Programmers use a variety of ............. to language
communicate instructions to the computer. (4) the way computer operator works
na
(1) programming languages
12. The physical arrangement of elements on a
(2) system languages
appage is referred to as the document’s
(3) high level languages
(1) feature (2) format
(4) low level languages (3) pagination (4) grid
:@
4. Which of the following displays the 13. Most Websites have a main page,
contents of the active cell? the……which acts as a doorway to the rest
(1) Active cell (2) Formula bar of the Website pages.
TG
(3) Menu bar (4) Name box (1) search engine (2) home page
5. A software used to convert source program (3) browser (4) URL
instructions to object instructions is known 14. Input, output and processing devices
n
(3) silica (4) silicon 15. Which type of computer could be found in a
7. PhonePe Wallet launched by digital watch?
Se
17. All of the following are examples of real 26. When you connect to this service your
security and privacy risks except computer is communicating with a server at
(1) hackers (2) spam your Internet Service Provider (ISP). What
(3) viruses (4) identity theft does this refer?
18. What type of technology allows you to use (1) Modem (2) Internet
(3) Intranet (4) Server
your finger, eye or voice print to secure
your information resources? 27. A collection of related files is called a
(1) Haptics (2) Caves (1) character (2) field
(3) Biometrics (4) RFID (3) database (4) record
19. Main memory is 28. Hard disk drives and CD drives are
df
(1) Random Access Memory examples of
(2) Random Only Memory (1) backup (2) storing
_p
(3) Serial Access Memory (3) storage (4) All of these
(4) Storage Memory 29. You would useKK software to create
na
20. The smallest and fastest computer, imitating spreadsheets, type documents and edit
brain working is photos.
(1) Supercomputer
ap(1) application
(3) system
(2) utility
(4) operating
(2) Quantum computer
:@
(4) Server
23. First computer mouse was built by
ar
35. A ...... converts all the statements in a program 43. Computer virus is a
in a single batch and the resulting collection (1) hardware
of instructions is placed in a new file. (2) windows tool
(1) converter (2) compiler (3) a computer program
(3) interpreter (4) instruction (4) a system software
36. The advantages(s) of IoT is/are 44. Each model of a computer has a unique
(1) Technical optimisation (1) assembly language
(2) Improved data collection (2) machine language
(3) Reduce waste (3) high level language
(4) All of the above (4) All of the above
37. Which one of the following is not a
df
45. A website is a collection of
broadband communication medium? (1) graphics (2) programs
_p
(1) Microwave (2) Fibre optic cable (3) algorithms (4) web pages
(3) Twisted pair (4) Co-axial cable
46. To move the cursor to the end of the
na
38. Which of the following performs document, press
modulation and de-modulation? (1) Ctrl + Esc
(1) Co-axial cable
(3) Modem
(2) Satellite
(4) Optical fibre
ap
(2) Ctrl + End
(3) Ctrl + B
(4) Ctrl + C
:@
39. The earliest calculating device is
(1) Abacus (2) Difference Engine 47. The shortcut method to print documents is
(3) Clock (4) Pascaline (1) Ctrl + A (2) Ctrl + B
TG
ANSWERS
1. (1) 2. (3) 3. (1) 4. (2) 5. (4) 6. (4) 7. (1) 8. (4) 9. (2) 10. (4)
11. (1) 12. (2) 13. (2) 14. (4) 15. (3) 16. (3) 17. (2) 18. (3) 19. (1) 20. (2)
21. (2) 22. (1) 23. (1) 24. (4) 25. (3) 26. (2) 27. (4) 28. (4) 29. (1) 30. (4)
31. (1) 32. (3) 33. (3) 34. (2) 35. (2) 36. (4) 37. (1) 38. (3) 39. (1) 40. (1)
41. (2) 42. (4) 43. (3) 44. (2) 45. (4) 46. (2) 47. (3) 48. (1) 49. (4) 50. (1)
Practice Set 3 165
PRACTICE SET 3
1. What are the contents that are lost on 8. Press ......... to move the insertion point to
turning OFF the computer? the address box or to highlight the URL in
(1) Storage (2) Input the address.
(3) Output (4) Memory (1) Alt + D (2) Alt + A
(3) Shift + Tab (4) Tab + Ctrl
2. Assembly language is a
(1) machine language 9. In analog computer,
df
(2) high level programming language (1) input is first converted to digital form
(2) input is never converted to digital form
_p
(3) low level programming language
(4) language for assembling computers (3) output is displayed in digital form
(4) All of the above
na
3. The binary system is a number system to
10. VGA stands for
the base
(1) Video Graphics Array
(1) 2
(3) 8
(2) 4
(4) 10
ap(2) Visual Graphics Adapter
(3) Virtual Graphics Access
:@
4. Which of the following is not an example of (4) Volatile Graphics Adapter
hardware? 11. Which of the following memory chips is
(1) Scanner (2) Printer faster?
TG
(4) The files get deleted and cannot be restored (3) Lord Smith (4) Tim Shown
c
16. Video processor consists of ...... and ......, 26. Which of the following is a storage
which store and process images. device that uses rigid, permanently
(1) CPU and VGA (2) CPU and memory installed magnetic disks to store
(3) VGA and memory (4) VGI and DVI data/information?
(1) Floppy disk (2) Hard disk
17. ....... are specially designed computers that
(3) Permanent disk (4) Optical disc
perform complex calculations extremely
rapidly. 27. Which of the following contains chips
(1) Servers (2) Supercomputers connected to the system board and is also a
(3) Laptops (4) Mainframes holding area for data instructions and
information?
18. Which of the following domains is used by
df
(1) Program (2) Mouse
profit business?
(3) Internet (4) Memory
_p
(1) .com (2) .edu (3) .mil (4) .net
28. The smallest unit of information about a
19. To reload a Web page, press the …… button. record in a database is called a
na
(1) redo (2) reload
(1) cell (2) field
(3) restore (4) refresh (3) record (4) query
20. Where are you likely to find an embedded
operating system?
ap
29. A(n) .......... is a special visual and audio
effect applied in PowerPoint to text or
:@
(1) On a desktop operating system content.
(2) On a networked PC (1) animation (2) flash
(3) On a network server (3) wipe (4) dissolve
TG
(4) On a PDA
30. Which of the following is a programming
21. A popular way to learn about computers language for creating special programs like
without ever, going to a classroom is called Applets?
n
(1) Integrity (2) Authentication signal that can travel over telephone lines is
ar
35. Default paper size of Word documents is 43. Motherboard is also known as
(1) letter (2) A4 (1) electronic board
(3) A3 (4) Both (1) and (3) (2) Printed Circuit Board (PCB)
(3) combined device board
36. Which PowerPoint view displays each slide
(4) Both (1) and (3)
of the presentation as a thumbnail and is
useful for rearranging slides? 44. The collection of links throughout the
(1) Slide Sorter (2) Slide Show Internet creates an interconnected/network
(3) Slide Master (4) Notes Page called
37. Example of impact printer is (1) WWW (2) Web
(1) jet printer (3) World Wide Web (4) All of these
df
(2) thermal printer 45. Every computer has a(n) ....... many ......... .
(3) laser printer (1) operating system, client system
_p
(4) daisy wheel printer (2) operating system, instruction sets
38. Notification area is found on which side of (3) application programs, operating system
na
the desktop? (4) operating system, application programs
(1) Left (2) Right 46. ……… are basically questions based on the
(3) Centre (4) Both (1) and (2) ap
data available in a database.
39. Which shortcut key is used to search for a (1) Forms (2) Queries
:@
40. Which of the following is not a layer of OSI (1) binary (2) octal
model? (3) decimal (4) hexadecimal
(1) Host to network (2) Application 48. Cache is a
n
ANSWERS
1. (4) 2. (3) 3. (1) 4. (4) 5. (4) 6. (3) 7. (3) 8. (1) 9. (2) 10. (1)
11. (3) 12. (1) 13. (2) 14. (4) 15. (1) 16. (2) 17. (2) 18. (1) 19. (4) 20. (4)
21. (3) 22. (2) 23. (4) 24. (3) 25. (2) 26. (2) 27. (4) 28. (2) 29. (1) 30. (1)
31. (4) 32. (3) 33. (2) 34. (1) 35. (2) 36. (1) 37. (4) 38. (2) 39. (3) 40. (1)
41. (4) 42. (2) 43. (2) 44. (4) 45. (4) 46. (2) 47. (1) 48. (2) 49. (4) 50. (1)
168 Learn, Revise & Practice ~ Computer Awareness
PRACTICE SET 4
1. Devices that enter information and let you 9. In ER diagram, relationship type is
communicate with the computer are called represented by
(1) software (2) output devices (1) ellipse (2) dashed ellipse
(3) hardware (4) input devices (3) rectangle (4) diamond
2. Which among the following was the first 10. Which of the following will be used if a
df
graphical Web browser? sender of E-mail wants to bold, italic, etc.,
_p
(1) Mosaic (2) WAIS the text message?
(3) CERN (4) Gopher (1) Rich signature (2) Rich text
(3) Rich format (4) Both (2) and (3)
na
3. The free available known repair of
software bug on Internet is called 11. It is a set of one or more attributes that can
(1) version (2) add on apuniquely identify tuples within the relation.
(3) tutorial (4) patch (1) Primary key (2) Candidate key
(3) Foreign key (4) Alternate key
:@
4. The first computer virus is
(1) Creeper (2) PARAM 12. All of the logic and mathematical calculations
(3) The Famous (4) HARLIE done by the computer happen in/on the
TG
6. The feature that keeps track of the right (3) supercomputers (4) web servers
c
17. Computers use the …… number system to 25. Another name for a pre-programmed
store data and perform calculations. formula in Excel is
(1) binary (2) octal (1) range (2) graph (3) function (4) cell
(3) decimal (4) hexa-decimal
26. If your computer keeps re-booting itself,
18. …… are attempts by individuals to obtain then it is likely that
confidential information from you by (1) it has a virus
falsifying their identity. (2) it does not have enough memory
(1) Phishing trips (2) Computer viruses (3) there is no printer
(3) Spyware scams (4) Viruses (4) there has been a power surge
19. Why is it unethical to share copyrighted 27. A program for viewing web pages is called
df
files with your friends? (1) word processor (2) spreadsheet
(1) It is not unethical, because it is legal (3) protocol (4) a browser
_p
(2) It is unethical because the files are being 28. The term used to describe the instructions
given for free that tell the computer what to do is ……… .
na
(3) Sharing copyrighted files without permission
breaks copyright laws (1) hardware (2) software
(3) storage (4) input/output
(4) It is not unethical because the files are being
given for free
ap
29. Codes consisting of lines of varying widths
20. Google Meet can have upto 100 free or lengths that are computer-readable are
:@
21. The processor is a …… chip plugged onto 30. What type of keys are ‘Ctrl’ and ‘Shift’?
the motherboard in a computer system. (1) Adjustment (2) Function
(3) Modifier (4) Alpha-numeric
(1) LSI (2) VLSI
n
(3) ULSI (4) XLSI 31. In Word, you can change page margins by
O
36. What utility do you use to transfer files and 43. Supercomputers
exchange messages? (1) are smaller in size than mainframe computers
(1) Web browsers (2) WWW (2) are common in majority of households
(3) E-mail (4) Hypertext (3) contain thousands of microprocessors
(4) are rarely used by researchers due to their
37. Which unit controls the movement of lack of computing capacity
signals between CPU and I/O? 44. Which of the following is the second largest
(1) ALU (2) Control unit measurement of RAM?
(3) Memory unit (4) Secondary storage
(1) Terabyte (2) Megabyte
38. What are different views to display a table (3) Byte (4) Gigabyte
in MS-Access? 45. The systems BIOS and ROM chips are called
df
(1) Pivot table (2) Design view
(1) software (2) firmware
(3) Datasheet view (4) All of these
_p
(3) hardware (4) bootware
39. The three main parts of the processor are
46. Today, the common form of RAM is built with
(1) ALU, Control Unit and Registers
na
(1) transistors
(2) ALU, Control Unit and RAM
(2) vacuum tubes
(3) Cache, Control Unit and Registers
(4) Control Unit, Registers and RAM ap (3) semi-conductors ICs
(4) super conductors ICs
40. Portable computer, also known as laptop
:@
47. A modern electronic computer is a machine
computer, weighing between 4 and 10
that is meant for
pounds is called
(1) doing quick mathematical calculations
(1) PDA
TG
41. All the characters, that a device can use are 48. Speakers and headphones are .......... devices.
O
42. ……… is a technique that is used to send (1) ROM (2) RAM
(3) Cache (4) Static
Se
ANSWERS
1. (4) 2. (1) 3. (4) 4. (1) 5. (2) 6. (3) 7. (4) 8. (2) 9. (4) 10. (4)
11. (1) 12. (4) 13. (4) 14. (2) 15. (2) 16. (3) 17. (1) 18. (1) 19. (3) 20. (4)
21. (2) 22. (3) 23. (2) 24. (4) 25. (3) 26. (1) 27. (4) 28. (2) 29. (4) 30. (3)
31. (3) 32. (2) 33. (1) 34. (3) 35. (4) 36. (3) 37. (2) 38. (4) 39. (1) 40. (4)
41. (4) 42. (4) 43. (3) 44. (4) 45. (2) 46. (3) 47. (2) 48. (2) 49. (1) 50. (1)
Practice Set 5 171
PRACTICE SET 5
1. What is Telnet? 9. ……… provides process and memory
(1) Network or telephone management services that allow two or
(2) Television network more tasks, jobs or programs to run
(3) Remote login simultaneously.
(4) All of the above (1) Multi-tasking (2) Multi-threading
df
2. In Word, when you indent a paragraph, you (3) Multi-processing (4) Multi-computing
(1) push the text in with respect to the margin 10. Which ports connect special types of music
_p
(2) change the margins on the page instruments to sound cards?
(3) move the text up by one line (1) BUS (2) CPU
na
(4) move the text down by one line (3) USB (4) MIDI
3. How do you measure character size? 11. To insert a copy of the clipboard contents,
(1) Text
(3) Font
(2) Data
(4) File
apwhatever was last cutted or copied at the
insertion point, what is to be done?
:@
4. A key that will erase information from the (1) Paste (2) Stick in
computer’s memory and characters on the (3) Fit in (4) Push in
screen is 12. The contents of ……… are lost when the
TG
(3) monitor (4) portable (1) tab box (2) pop-up helper
7. Which keys enable the input of number (3) tab row (4) address bar
quickly? 15. The main memory of a computer can also
(1) Ctrl, Shift and Alt be called
(2) Function keys (1) primary storage
(3) The numeric keypad (2) internal memory
(4) Arrow keys (3) primary memory
8. To exit the program without leaving the (4) All of the above
application, what is to be done? 16. Junk e-mail is also called
(1) File (2) Edit (1) spam (2) spoof
(3) Copy (4) Close (3) sniffer script (4) spool
172 Learn, Revise & Practice ~ Computer Awareness
df
(2) data or information that has been entered
into the computer 28. The main job of a CPU is to
_p
(3) the transmission of data that has been input (1) carry out program instructions
into the computer (2) store data/information for future use
(4) Both (2) and (3)
na
(3) process data and information
19. What resides on the motherboard and (4) Both (1) and (3)
connects the CPU to other components on ap
29. Which of the following is an example of
the motherboard? optical disc?
(1) Input unit (2) System bus (1) Digital versatile discs
:@
(3) ALU (4) Primary memory (2) Magnetic disks
20. PayZapp offered by ............. is an ideal (3) Memory disks
mobile payment wallet. (4) Data bus disks
TG
(1) HDFC Bank (2) SBI Bank 30. The ……… folder retains copies of message
(3) ICICI Bank (4) PNB Bank that you have started but are not yet ready
21. In an ER diagram, attributes are represented to send.
n
22. The ………… performs simple mathematics or puts spaces in between words.
(1) Control key (2) Space bar
c
Web pages that contain related information that provides a shortcut for complex
is called calculations?
(1) dial-up (2) electronic commerce (1) Value (2) Data Series
(3) hyperlink (4) E-cash (3) Function (4) Field
24. A DVD is an example of a/an 33. Which of the following computer’s
(1) hard disk memories is characterised by low cost per
(2) optical disc bit stored?
(3) output device (1) Primary (2) Secondary
(4) solid-state storage device (3) Magnetic tape (4) All of these
25. Use this when you want to make all letters 34. To change written work already done, what
capital without having to use the Shift key for is to be used?
each character. What does this refer here? (1) File (2) Edit
(1) Shifter (2) Upper case (3) Cut (4) Close
(3) Caps lock key (4) Icon
Practice Set 5 173
35. …… is the process of dividing the disk into 43. Which of the following is not a function
tracks and sectors. category in Excel?
(1) Tracking (2) Formatting (1) Logical (2) Data series
(3) Crashing (4) Allotting (3) Financial (4) Text
36. All of the following terms are related to 44. A search engine is a program to search
spreadsheet software except (1) for information
(1) worksheet (2) cell (2) Web pages
(3) formula (4) virus detection (3) Web pages for specified index terms
37. The term used for set of instructions which (4) Web pages for information using specified
search terms
allow computer to perform more than one
45. A …… is a set of rules.
df
task, is
(1) hardware (2) software (1) resource locator (2) domain
_p
(3) humanware (4) firmware (3) hypertext (4) protocol
38. Which is a shortcut method to insert a new 46. Data or information used to run the
na
worksheet in MS-Excel? computer is called
(1) Ctrl+W (2) Ctrl+N (1) software (2) hardware
(3) Ctrl+IW (4) Shift+F11
ap(3) peripheral (4) CPU
39. How many bits are there in ASCII codes? 47. The device which helps you to
:@
(1) the computer and its associated equipment (1) present (2) store
(2) the instructions that tell the computer what (3) output (4) input
Se
to do
(3) computer components that act to accomplish 50. To be able to boot, the computer must have
a goal a/an
(4) an interface between the computer and the (1) compiler (2) loader
network (3) operating system (4) assembler
ANSWERS
1. (3) 2. (2) 3. (3) 4. (2) 5. (3) 6. (1) 7. (3) 8. (4) 9. (1) 10. (4)
11. (1) 12. (4) 13. (1) 14. (3) 15. (4) 16. (1) 17. (3) 18. (4) 19. (2) 20. (1)
21. (3) 22. (1) 23. (3) 24. (2) 25. (3) 26. (4) 27. (4) 28. (4) 29. (1) 30. (3)
31. (2) 32. (3) 33. (2) 34. (2) 35. (2) 36. (4) 37. (2) 38. (4) 39. (1) 40. (2)
41. (1) 42. (2) 43. (2) 44. (4) 45. (4) 46. (1) 47. (4) 48. (4) 49. (4) 50. (3)
174 Learn, Revise & Practice ~ Computer Awareness
ABBREVIATION
A C
ADC Analog to Digital Convertor Cc Carbon Copy
ARP Address Resolution Protocol CMOS Complementary Metal Oxide
Semi-conductor
AH Active Hub
CAD Computer Aided Design
AI Artificial Intelligence
COBOL Common Business Oriented Language
ALGOL Algorithmic Language
CD Compact Disc
df
ALU Arithmetic Logic Unit Centre for Development of Advanced
C-DAC
Computing
_p
APCI Application layer Protocol Control
Information CPU Central Processing Unit
API Application Program Interface Cathod Ray Tube
na
CRT
ARPANET Advanced Research Projects Agency CSS Cascading Style Sheet
Network
CU Control Unit
ASCII American Standard Code for Information
Interchange CTCP
ap Client-To-Client Protocol
CD-R Compact Disc Recordable
:@
ATM Automated Teller Machine
CD-ROM Compact Disc Read Only Memory
ADF Automatic Document Feeder
CD-RW Compact Disc ReWritable
B
TG
CLI
BMP Bitmap
Common Language Runtime
O
CLR
BASIC Beginner’s All purpose Symbolic
Instruction Code CDMA Code Division Multiple Access
h
Bin Binary
DBA Database Administrator
BIOS Basic Input/Output System
DBMS Database Management System
B2B Business-to-Business Data Control Language
DCL
Bit Binary Digit DFS Distributed File System
BLOG Web Log DFD Data Flow Diagram
BPI Bytes/Bits Per Inch DHTML Dynamic HyperText Markup Language
BPL Broadband over Power Line DMA Direct Memory Access
BPS Bits Per Second DNS Domain Name System
BHIM Bharat Interface for Money DPI Dots Per Inch
Abbreviation 175
df
HTTP HyperText Transfer Protocol
EBCDIC Extended Binary Coded Decimal
_p
Interchange Code I
E-Commerce Electronic Commerce IM Instant Message
na
EDP Electronic Data Processing Internet Message Access Protocol
IMAP
EDSAC Electronic Delay Storage Automatic iPhone Operating System
Calculator iOS
Facsimile
ar
df
MICR Magnetic Ink Character Recognition RPA Robotics Process Automation
_p
MIPS Million Instructions Per Second RAID Redundant Array of Independent Disks
MIDI Musical Instrument Digital Interface Random Access Memory
RAM
na
N RDBMS Relational Database Management System
RIP Routing Information Protocol
NFS Network File System
NIC Network Interface Card ROM
RPG
ap Read Only Memory
Report Program Generator
NOS Network Operating System
:@
RTOS Real Time Operating System
O RTF Rich Text Format
OCR Optical Character Recognition
S
TG
SP Service Pack
ar
P2P Peer-to-Peer
SQL Structured Query Language
PAN Personal Area Network
Se
df
WLL Wireless Local Loop
V
_p
WORM Write Once Read Many
VB Visual Basic
VDD Virtual Device Driver X
na
VGA Video Graphics Array
XHTML eXtensible HyperText Markup Language
VLAN Virtual Local Area Network
VM Virtual Memory
XML
ap eXtensible Markup Language
XNS Xerox Network Services
Video Memory System
:@
VMS
VPN Virtual Private Network XUL XML User interface Language
VT Video Terminal
Y
TG
VR Virtual Reality
VSNL Videsh Sanchar Nigam Limited YB Yottabyte
ZISC
W
c
GLOSSARY
Access Time The time interval between the instance at Attribute The characteristics of an entity are called its
which data is called from a storage device and the attributes.
instance when delivery begins. Authentication Any process by which a system verifies
Accumulator A local storage area called a register, in the identity of the user who wants to access it.
which the result of an arithmetic and the logic operations Auxiliary Memory It is also known as secondary
is formed. memory that is not directly addressable by the CPU.
Active Cell It refers to the currently selected cell in a Backspace Key This key is used to delete the text.
df
spreadsheet. It can be identified by a bold outline that Backspace will delete the text to the left of the cursor.
surrounds the cells.
Backup A copy of a file or other item of data made in
_p
Active Window It is the currently focused window in case the original is lost and damaged.
the current window manager.
Bandwidth The maximum amount of data that can
na
Algorithm In computing, an algorithm is a procedure travel in a communication path in a given time,
for accomplishing some tasks which given an initial measured in bits per second (bps).
state, will terminate in a defined end-state.
Alphanumeric A character set that contains letters, digits
ap
Bar Code It is a machine-readable representation of
information in a visual format on a surface.
and other special characters such as @, $, +, *, %, etc.
:@
Big Data Analytics It is the process of collecting,
Analog Computer A computer that operates on data organising and analysing large sets of data to discover
which is in the form of continuous variable physical patterns and other useful information.
quantities.
Blockchain It is an encrypted distributed database that
TG
digit from 0 to 9.
Antivirus It consists of computer programs that attempt
O
to identify threat and eliminate computer viruses and Bit It is the most basic information unit used in
other malicious software (malware). computing and information theory.
h
software that employs the capabilities of a computer the world wide web.
ar
directly to a task that the user wishes to perform. Bomb A type of virus designed to activate at a specific
Archive It provides backup storage. date and time on your computer.
Se
Arithmetic Logic Unit (ALU) It is a part of the Bluetooth It permits a wireless exchange of information
execution unit, a core component of all CPUs. ALUs are between computers, cell phones and other electronic
capable of calculating the results of a wide variety of devices.
basic arithmetical and logical computations. Booting It is a boot strapping process which starts the
Artificial Intelligence (AI) Fifth generation computing operating system when a computer is switched ON.
devices, based on artificial intelligence, are still Browser A special software that enables users to
in development, though there are some applications, read/view Web pages and jump from one Web page to
such as voice recognition, that are being used today. another.
ASCII (American Standard Code for Information Buffering The process of storing data in a memory
Interchange) It is a character set and a character device, allowing the devices to change the data rates,
encoding based on the Roman alphabet as used in perform error checking and error re-transmission.
Modern English and other Western European languages. Bug It is an error, flaw, failure, or fault in a computer
Assembler A program that translates mnemonic program or system that produces an incorrect or
statement into executable instructions. unexpected result.
Glossary 179
Bus A circuit that provides a communication path between Control Unit It is the part of a CPU that directs its
two or more devices of a digital computer system. operation. The output of this unit control the activity of
Byte It is commonly used as a unit of storage measurement the rest of the device.
in computers, regardless of the type of data being stored. Crawler It is an Internet bot that systematically browse
Cell A box in a spreadsheet, in which you can enter a the world wide web, typically for the purpose of Web
single piece of data. indexing. It is also called a Web spider.
Central Processing Unit (CPU) It performs the actual Cryptography The conversion of data into a secret code
processing of data. The CPU is generally called by its for transmission over a public network.
generic name ‘Processor’. It is also known as the brain of Cut To remove an object from a document.
computer. Data It is a collection of facts and figures which are not
Channel A communication channel can be a physical in directly usable form.
link, such as a cable that connects two stations in a
df
Database It is a collection of logically related information
network or it can consist of some electromagnetic in an organised way so that it can be easily accessed,
transmission.
_p
managed and updated.
Chatting Typing text into a message box on a screen to Data Entry Direct input of data in the appropriate data
engage in dialog with one or more people via the fields of a database known as data entry.
na
Internet or other network.
Database Management System (DBMS) It is a collection
Chip A tiny wafer of silicon containing miniature of various programs. It provides a systematic way to
electric circuits that can store millions of bits of
information.
ap
create, retrieve, update and manage data.
Data Processing Converting data into information, is
:@
Client-Server It is a network architecture which called data processing.
separates the client from the server. Each instance of the
client software can send requests to a server or Data Redundancy It is a condition created within a
application server. database or data storage technology in which the same
TG
browser and the web server. Display Unit A device with a screen that displays
characters or graphics representing data in a computer
Se
Domain Name A unique name that identifies a particular Execution Time The total time required to execute a
Website and represents the name of the server where the program on a particular system.
Web pages reside. Expansion Slot It is a socket on the motherboard that is
Dots Per lnch (DPI) It is defined as the measure of the used to insert an expansion card which provides
resolution of a printer, scanner or monitor. It refers to additional features to a computer.
the number of dots in one inch line. Extranet A technology that permits the users of one
Download It refers to the act of transmitting data from a organisation’s Intranet to enter portions of another
remote computer on the Internet or other network to organisation’s Intranet in order to conduct business
one’s own computer. transactions or collaborate on joint projects.
Drag and Drop In computer graphical user interface, Fax It stands for ‘Facsimile’. It is used to transmit a copy
drag and drop is the action of clicking on a virtual object of a document electronically.
and dragging it to a different location or onto another Field The attributes of an entity are written as fields in
df
virtual object. the table representation.
DVD It is an optical disc storage media format that can
_p
File A collection of information stored electronically and
be used for data storage including movies with high
treated as a unit by a computer. Every file must have its
quality video and sound.
own distinctive name.
na
Dynamic RAM (DRAM) It is a type of random access
File Allocation Table (FAT) It is the name of a
memory which stores each bit of data in a separate
computer file system architecture. The FAT file system
capacitor. ap
is a legacy file system which is simple and robust.
EBCDIC (Extended Binary Coded Decimal Interchange
File Manager It is an operating system utility that
Code) It is an 8-bit character encoding used on IBM
:@
provides a user interface to work with file systems.
mainframe operating systems, like Z/OS, S/390, AS/400
and i5/OS. Firewall A security system usually consisting of
hardware and software that prevents unauthorised
E-Commerce (Electronic Commerce) It is a type of
persons from accessing certain parts of a program
TG
df
Graphical User Interface (GUI) It is a method of Instant Messaging (IM) A chat program that lets people
_p
interacting with a computer through a metaphor of communicate over the Internet in real time.
direct manipulating of graphical images and widgets in Instruction A command or order given to a computer to
addition to text. perform a task.
na
Hacker A computer criminal who penetrates and Interface A device or program that helps a user to
tempers with computer programs or systems. communicate with a computer.
Hang To crash in such a way that the computer does not
respond to input from the keyboard or mouse.
ap
Interpreter A program that converts and executes the
source code into machine code line by line.
:@
Hard Copy It is a printed copy of information from a Internet A vast computer network linking smaller
computer. computer networks worldwide.
Hard Disk It is a non-volatile data storage device that Internet of Things (IoT) It is a network in which all
TG
stores data on a magnetic surface layered onto disk physical objects are connected to the Internet through
platters. network devices and exchange data.
Hardware The mechanical, magnetic, electronic and Internet Surfing To search something on Internet is
electrical components that comprises a computer system called Internet surfing.
n
such as CPU, monitor, keyboard, mouse, etc. Internet Service Provider (ISP) It is a business
O
High-Level Programming Language It is a organisation that offers users to access the Internet and
programming language that is more user-friendly, to related services.
h
some extent platform-independent and abstract from Integrated Circuits Multiple electronic components
c
Website. It refers to the Web page that identifies a Javascript It is an object oriented programming language
Website and contains the hyperlink to other Web pages used to create interactive effects in a Web browser.
in the Website.
JPEG (Joint Photographic Experts Group) It is a
Host Computer A computer that provides information commonly used method of lossy compression for digital
or a service to other computers on the Internet. Every photography.
host computer has its own unique host name.
Joystick It is a computer peripheral or general control
Hub A network device that connects multiple computers device consisting of a handheld stick that pivots about
on a LAN, so that they can communicate with one one end and transmits its angle in two or three
another. dimensions to a computer.
Hybrid Computer These computers are made by taking Kernel It is the fundamental part of a program, such as
the best features of the analog computer and digital an operating system, that resides in memory at all times.
computer.
Keyboard This is the standard input device attached to
Hyperlink An image or portion of text on a Web page all computers. The layout of keyboard is just like the
that is linked to another Web page. traditional typewriter of the type QWERTY.
182 Learn, Revise & Practice ~ Computer Awareness
df
seeming to draw directly on the screen. Mnemonic A symbolic label or code remainder that
assists the user in remembering a specific operation or
_p
Link A communication path between two nodes or
channels. command in assembly language.
LINUX It is an open source operating system, meaning Modem (Modulator/Demodulator) It refers to specific
na
that the source code of the operating system is freely equipment that provides a means of communication
available to the public. between two computer systems over conventional
List Processing (LISP) A high level programming
language suitable for handling logical operations and
ap
telephone lines.
Monitor The visual readout device of a computer
system. A monitor can be in several forms; a Cathode
:@
non-numeric applications.
Ray Tube (CRT), a Liquid Crystal Display (LCD), or a
Log In It is the process by which an individual gains flat-panel, full-color display.
access to a computer system by identifying and
authenticating themselves. Multitasking It can work with several programs or
TG
computers.
Multimedia Software programs that combine text and
Machine Language The language of computer also called graphics with sound, video and animation. A multimedia
h
binary language. Instructions in this language are PC contains the hardware to support these capabilities.
c
Malware It is a software that disrupts normal computers computer that allows it to talk to other computers via a
functions or sends a user’s personal data without the network protocol like TCP/IP.
user authorisation.
Nibble A sequence of four adjacent bits, or a half-byte. A
Mass Storage It is referred to storage where large hexa-decimal or BCD coded digit can be represented by
volume of backup/data is stored. a nibble.
Megabyte (MB) 1 Megabyte is equal to 1048576 bytes, Node The end point of a network branch or the junction
usually rounded off to one million bytes. It is also called of two or more branches.
a ‘meg’.
Non-Volatile Memory A memory where stored data
Memory Temporary storage for information, including remain undisturbed by the removal of electrical power.
applications and documents.
Notebook A portable computer, that can fit into a
Menu Bar The horizontal strip across the top of an briefcase. It is used as personal computer. It is also called
application’s window. Each word on the strip has a laptop.
context sensitive drop-down menu containing features
and actions that are available for the application in use. Object Something that contains both the data and the
application that operate on that data.
Merge Combining two or more files into a single file.
Glossary 183
Offline It refers to the state in which a computer is Read Only Memory (ROM) A semi-conductor memory
temporarily or permanently unable to communicate whose data cannot be erased, or overwritten; it can only
with another computer. be accessed (read) for use by the CPU.
Online It refers to the state of being connected to the Record A collection of all the information pertaining to a
networked computer system or the Internet. particular entity instance.
Operating System A set of instructions that tells a Register A temporary storage unit for quick, direct
computer how to operate when it is turned ON. It sets up accessibility of a small amount of data for processing.
a filing system to store files and tells the computer how to Remote Server A network computer that allows a user
display information on a video display. on the network from a distant location to access
Output Data that come out of a computer device. information.
Patch A small program that improves an existing piece Robotics Process Automation (RPA) It is the use of
of software or corrects an error in it. specialised computer programs, known as software
df
Personal Computer (PC) A single-user computer robots, to automate and standardise repeatable business
processes.
_p
containing a Central Processing Unit (CPU) and one or
more memory circuits. Router A network device that enables the network to
Piracy The illegal copying of software or other creative re-route messages it receives that are intended for other
na
works. networks. The network with the router receives the
message and sends it on its way exactly as received.
Pixels An acronym derived from picture element. The
smallest element (a dot) on a display screen.
ap
Routing The process of choosing the best path throughout
the LAN.
Plug-In This is a program that your browser uses
:@
to manipulate a downloaded file. Scanner An electronic device that uses light-sensing
equipment to scan paper images such as text, photos,
Portrait A term that designates the position of illustrations and translate the images into signals that
conventional printing across the width of a page. the computer can then store, modify, or distribute.
TG
Post Office Protocol (POP) A protocol that specifies Search Engine Software that makes it possible to look
how a personal computer can connect to a mail server on for and retrieve information on the Internet, particularly
the Internet and download E-mail. the Web. Some popular search engines are AltaVista,
n
Primary Key It is a key that uniquely identifies each Google, HotBot, Yahoo!, Web Crawler and Lycos.
tuple or row in a table.
O
Programming Language A vocabulary and set of Shareware A software that is not free but is available for
grammatical rules for instructing a computer to perform
Se
Static RAM It is a type of RAM, that contains its Video Tele-conferencing A remote ‘face-to-face chat,’
contents only whenever current supply is ON. when two or more people using a webcam and an
Sub-Program A particular part of a program that Internet telephone connection chat online. The webcam
complete the special work. enables both live voice and video.
Supercomputer The largest mainframe computer Virus A piece of computer code designed as a prank or
featuring exceptionally high speed operation while malicious act to spread from one computer to another by
manipulating huge amount of information. attaching itself to other programs.
Virtual Reality (VR) It is the use of computer technology
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is a large grouping of programs and standards that to create a simulated environment.
govern how information moves around the Internet. Volatile Memory A memory whose contents are
irretrievably lost when power is removed. If data in
Terabyte (TB) It is about a trillion bytes. Actually, it’s
40 RAM must be saved after power shutdown, back-up in
2 or 10095111627776 bytes.
df
non-volatile memory (magnetic disk, tape, or CD-R) is
Terminal This is what you look at when you are on the essential.
_p
Internet. It’s your computer screen. Website A collection of web pages or hyperlinked
Time Sharing It refers to the allocation of computer webpages which onwned by an individual, company or
na
resources in a time dependent fashion to run several an organisation.
programs simultaneously. Window A portion of a computer display used in a
Topology The structure of the network including
physical connection such as wiring schemes and logical
ap
graphical interface that enables users to select
commands by pointing to illustrations or symbols with a
interactions between network devices. mouse.
:@
Trackball Input device that controls the position of the Wide Area Network (WAN) It is a tele-communication
cursor on the screen. network or computer network that extends over a large
Uniform Resource Locator (URL) The specific Internet
geographical distance.
TG
address for a resource such as an individual or an Word Processor A computer system or program for
organisation. setting, editing, revising, correcting, storing and
printing text.
Unix This is an operating system developed by AT & T.
n
It is a big push that it allows one server to serve many World Wide Web (‘WWW’ or ‘Web’) A network of
different end users at one time. servers on the Internet that uses hypertext-linked
O
themselves.
network).
Workstation The work area and/or equipment used for
Se
UPS (Universal Power Supply or Uninterruptible Power computer operations, including Computer-Aided Design
Supply) An electrical power supply that includes a (CAD). The equipment generally consists of a monitor,
battery to provide enough power to a computer during keyboard, printer and/or plotter and other output
an outage to back-up data and properly shut down. devices.
User A person who uses or operates something. X-Y Plotter A computer-driven printing mechanism that
User-Friendly A software program that has been draws coordinate points in graph form.
designed to easily direct the user through the operation ZOOM The enlarging or reducing an image displayed on
or application of a program. a computer process of proportionately monitor.
Validation The process of making sure that the forms and ZIP (Zone Information Protocol) This is an application
documents from a particular transaction are correct. that allows for the compression of application files.