Important Computer Discoveries and Founders
Important Inventions
Important Points to Remember (महत्वपू बिं द)ु
Bus Topology (िस टो्ोलॉजी):
Important Point: Simple and cost-effective, but if the main
cable (bus) fails, the entire network fails.
Point to Remember: Suitable for small networks with limited
devices.
Hindi: साधारण और किफायती, लेकिन यदि मुख िेबल (बस) विफल हो
जाती है, तो पूरा नेटिि् प्ावित होता है। छोटे नेटिि् िे ललए उपयुक है।
Star Topology (स्ट टो्ोलॉजी):
Important Point: Easy to manage, if a device fails, the rest of
the network continues to work.
Point to Remember: Central hub or switch is critical; if it fails,
the whole network goes down.
Hindi: इसे पबरबधत िरना आसान है, यदि िोई उपिरण विफल हो जाता है तो
बािी नेटिि् िाम िरता रहता है। िेंीय हब या स्व महतपूण् है, यदि यह
विफल हो जाता है, तो पूरा नेटिि् प्ावित होता है।
Ring Topology (रटं ग टो्ोलॉजी):
Important Point: Data travels in one direction, and each
device acts as a repeater.
Point to Remember: If one device or connection fails, the
whole network is affected.
Hindi: डेटा एि दिशा मे याता िरता है और प्ेि उपिरण एि ररपीटर िे
रप मे िाय् िरता है। यदि िोई उपिरण या िनेकन विफल हो जाता है, तो
पूरा नेटिि् प्ावित होता है।
Mesh Topology (मेश टो्ोलॉजी):
Important Point: Highly reliable as multiple paths exist
between devices.
Point to Remember: Expensive and complex to implement
due to many connections.
Hindi: बहत विशसनीय है क्कि उपिरण् िे बीव िई रासे होते है। इसे
लागू िरना महरगा और जकटल हो सिता है, क्कि बहत से िनेकन होते है।
Tree Topology (टी टो्ोलॉजी):
Important Point: Combines the advantages of bus and star
topologies.
Point to Remember: If the root or backbone fails, large parts
of the network may be affected.
Hindi: यह बस और सार टोपोलॉजी िे ला्् िो जोडता है। यदि मुख रट
या बैिबोन विफल हो जाता है, तो नेटिि् िे बडे दहसे प्ावित हो सिते है।
Hybrid Topology (ह्इब्र टो्ोलॉजी):
Important Point: Combines two or more topologies to take
advantage of their strengths.
Point to Remember: Flexible and scalable, but complex and
expensive to design and maintain.
Hindi: िो या िो से अबधि टोपोलॉजी िा सरयोजन ताकि उनिे ला्् िा
फायिा उठाया जा सिे। लवीला और सेलेबल, लेकिन इसे कडजाइन और
बनाए रखना जकटल और महरगा हो सिता है।
SSL/TLS: Secures data transferred between devices,
typically for transactions like online banking.
VPN: Ensures secure communication over the internet,
commonly used by remote workers.
NTP: Keeps time synchronized across devices on a
network, which is important for applications that
require accurate timestamps.
Usage of Network Protocols (नेटवर्
प्ट्रोक रा उपय्ग)
HTTP & HTTPS: Used for web browsing, with HTTPS
providing a secure version of HTTP.
FTP: Commonly used for transferring files between
computers or accessing file servers.
SMTP, POP3, and IMAP: These protocols are used for
sending and retrieving emails.
TCP & UDP: These protocols ensure the transport of
data across the network, with TCP providing reliability
and order, while UDP is faster but less reliable.
DHCP: Automatically assigns IP addresses to devices on
the network, making network management easier.
DNS: Resolves human-readable domain names to
machine-readable IP addresses, enabling web browsing.
ARP: Resolves IP addresses to physical MAC addresses
in a local network, used for communication at the data
link layer.
SNMP: Used for monitoring and managing network
devices.
PHP: Widely used for server-side web development, PHP is a
key language for building dynamic websites. Many content
management systems like WordPress are built using PHP.
Swift and Kotlin: Modern languages designed for mobile app
development. Swift is for iOS, while Kotlin is used for Android,
both providing modern features and enhanced developer
productivity.
Go (Golang): Created by Google, Go is known for its simplicity
and efficiency, especially in cloud computing and
microservices. Its concurrency model makes it a favorite for
backend development.
R and MATLAB: Specially designed for statistical computing
and data analysis, both languages are extensively used in
research, machine learning, and data-driven applications.
Rust: Known for its focus on memory safety, Rust is gaining
popularity in systems programming and areas where
performance and reliability are essential, such as web servers
and game engines.
Haskell: A functional programming language used mostly in
academic research and financial systems, where mathematical
correctness is critical.
Key Facts about Programming Languages (प्रोग्रा भोषोओ
के बोरे ्े ्हत्वपूर तथ्)
Python: A highly readable, versatile language used for various
applications like web development, AI, data science,
automation, and more. Its simple syntax makes it a favorite
for beginners.
Java: Known for its "Write Once, Run Anywhere" philosophy,
it is widely used in building cross-platform applications,
including Android apps, enterprise software, and large-scale
systems.
C and C++: These are powerful, low-level languages widely
used for system programming, operating systems, and
applications where performance and direct hardware access
are crucial.
JavaScript: The dominant language for web development,
enabling dynamic and interactive web pages. It is an essential
tool for front-end development and has gained popularity in
back-end development as well.
Key Facts about Computer Viruses (कर प्पूर ्ो्रस के बोरे ्े
्हत्वपूर तथ्)
File Infector Viruses: These viruses attach to executable files
and are activated when these files are executed, often causing
system crashes and data corruption.
Macro Viruses: They infect applications that use macros,
especially office productivity software like Word, Excel, etc.,
and are activated when the document is opened.
Boot Sector Viruses: These viruses infect the master boot
record (MBR) of a system. When the system is restarted, the
virus executes before the operating system loads.
Polymorphic Viruses: These viruses modify their code each
time they spread, making it harder for antivirus software to
detect them. They are often used in attacks where a virus
needs to disguise itself.
Metamorphic Viruses: Similar to polymorphic viruses, but
these viruses completely rewrite themselves every time they
infect a system, making detection even more difficult.
Trojan Horse: Often disguised as useful software, trojans
perform harmful actions, like stealing data or granting
unauthorized access to the attacker.
Worm Viruses: These are self-replicating and spread through
networks without the need for a host file. They can cause
network congestion and disrupt services.
Ransomware: A particularly malicious type of malware, it
encrypts files on the victim’s computer and demands payment
in exchange for the decryption key.
Rootkit: These are designed to hide certain objects or
activities on a system, enabling attackers to maintain control
over the system without detection.
Spyware: Malicious software that secretly collects personal
data, often to monitor user activities or steal sensitive
information such as login credentials.
Finished.
Bihar Civil Court Previous year Questions Options: A. International Business Manufacturer, B. Informal
Business Machines, C. Indian Business Machines, D.
compilation (2016-22-23) International Business Machines
1. A virus that can access computer memory and sit dormant 14. Which of the following computer languages is written in
until a payload is delivered is considered as a _________. binary code only?
Options: A. Direct Action Virus, B. Browser Hijacker, C. File Options: A. PASCAL, B. Machine Language, C. C, D. C#
Infector Virus, D. Resident Virus 15. Communication between a computer and a keyboard
2. Which of the following does NOT belong to the category of typically involves ______.
software? Options: A. Protocol, B. Half Duplex, C. Full Duplex, D. Simplex
Options: A. Utilities, B. ALU, C. Language Processor, D. 16. Fifth-generation computers are based on parallel processing
Operating System hardware and __________.
3. 1 petabyte is equal to how many terabytes? Options: A. Machine language, B. Low-level language, C.
Options: A. 2048, B. 1024, C. 512, D. 256 Assembly language, D. Artificial intelligence
4. IBM is a leading American computer manufacturer. What is 17. The period of fourth-generation computers was mainly
the full form of IBM? ________.
Options: A. International Business Manufacturer, B. Informal Options: A. 1971–1980, B. 1957–1963, C. 1937–1940, D. 1940–
Business Machines, C. Indian Business Machines, D. 1956
International Business Machines 18. 1 petabyte is equal to how many terabytes?
5. Which of the following communication services is used to log Options: A. 2048, B. 1024, C. 512, D. 256
on to a remote computer connected to the internet? Networking and Communication
Options: A. Mailing Lists, B. Telnet, C. Newsgroups, D. Internet 19. Which network topology requires a central controller or
Relay Chat hub?
6. Which of the following functions of an operating system Options: A. Star, B. Mesh, C. Ring, D. Bus
involves coordination and assignment of compilers, 20. What is defined as a set of rules that governs data
interpreters, and other software resources? communications in computer networks?
Options: A. Security, B. File Management, C. Secondary-Storage Options: A. Accuracy, B. Security, C. Topology, D. Protocol
Management, D. Communication Management 21. Which of the following communication services is used to
7. ALGOL is a family of portable programming languages for log on to a remote computer connected to the internet?
scientific computations. What is the full form of ALGOL? Options: A. Mailing Lists, B. Telnet, C. Newsgroups, D. Internet
Options: A. Available Language, B. Adobe Language, C. Relay Chat
Algorithmic Language, D. Abacus Language 22. Which of the following protocols is used for remote login on
8. Which keyboard shortcut is used to open browser history in a the Internet?
new tab in Google Chrome? Options: A. FTP, B. Telnet, C. HTTP, D. SMTP
Options: A. Ctrl+F, B. Ctrl+J, C. Ctrl+H, D. Ctrl+O Software and Hardware
9. Which of the following offers a way to access documents 23. Which of the following does NOT belong to the category of
spread over several servers over the internet? software?
Options: A. World Wide Web, B. Internet Telephony, C. Options: A. Utilities, B. ALU, C. Language Processor, D.
Electronic Mail, D. Video Conferencing Operating System
10. What is the full form of CRT (in computer monitors)? 24. Which SQL command is used to change the structure of a
Options: A. Cathode Random Tube, B. Cathode Ray Tube, C. table after creation?
Cathode Ray Tool, D. Control Ray Tube Options: A. UPDATE, B. ALTER, C. DROP, D. TRUNCATE
11. A virus that can access computer memory and sit dormant 25. The SQL command to change the structure of a table is:
until a payload is delivered is considered as a _________. Options: A. UPDATE, B. ALTER, C. DROP, D. TRUNCATE
Options: A. Direct Action Virus, B. Browser Hijacker, C. File 26. What is the name of an eight-wire connector used to
Infector Virus, D. Resident Virus connect computers on a local area network?
12. What is the name of the most powerful computer as of Options: A. RJ10, B. RJ11, C. RJ35, D. RJ45
November 2021? 27. With reference to computer monitors, what is the full form
Options: A. America’s Sierra, B. India’s PARAM Siddhi-AI, C. of CRT?
Japanese supercomputer Fugaku, D. China’s Tianhe-2 Options: A. Cathode Random Tube, B. Cathode Ray Tube, C.
13. IBM is a leading American computer manufacturer. What is Cathode Ray Tool, D. Control Ray Tube
the full form of IBM? 28. Which keyboard shortcut is used to open browser history in
a new tab in Google Chrome?
Options: A. Ctrl+F, B. Ctrl+J, C. Ctrl+H, D. Ctrl+O 44. Communication between a computer and a keyboard
29. Which function key is commonly used to toggle full screen typically involves ______.
mode in web browsers? Options: A. Protocol, B. Half Duplex, C. Full Duplex, D.
Options: A. F5, B. F11, C. F12, D. F8 Simplex
Multimedia and Video Compression 45. Which of the following SQL commands is used to change the
30. Which video compression algorithm reduces the number of structure of a table after it has been created?
bytes for easy transmission? Options: A. UPDATE, B. ALTER, C. DROP, D. TRUNCATE
Options: A. MPEG, B. JPEG, C. PNG, D. TIFF 46. Which is a data communication technology allowing IP
31. Which of the following offers a way to access documents phones and computers to connect to telephones through PSTN
spread over several servers over the internet? and mobile networks?
Options: A. World Wide Web, B. Internet Telephony, C. Options: A. VPN, B. VoIP, C. None of these, D. TCP
Electronic Mail, D. Video Conferencing 47. What is the name of an eight-wire connector used to
Microsoft Office and Productivity Tools connect computers on a local area network?
32. The maximum number of rows in an MS Excel worksheet is: Options: A. RJ10, B. RJ11, C. RJ35, D. RJ45
Options: A. 65,534, B. 1,048,576, C. 10,68,576, D. Unlimited 48. Fifth-generation computers are based on ________.
33. Which network topology requires a central controller or Options: A. Machine Language, B. Low-level Language, C.
hub? Assembly Language, D. Artificial Intelligence
Options: A. Star, B. Mesh, C. Ring, D. Bus 49. The period of fourth-generation computers was mainly
34. What is defined as a set of rules that governs data ________.
communications in computer networks? Options: A. 1971–1980, B. 1957–1963, C. 1937–1940, D. 1940–
Options: A. Accuracy, B. Security, C. Topology, D. Protocol 1956
35. The period of ________ was mainly the time of fourth- 50. A set of rules that governs data communications in
generation computers. computer networks is known as ________.
Options: A. 1971-1980, B. 1957-1963, C. 1937-1940, D. 1940- Options: A. Accuracy, B. Security, C. Topology, D. Protocol
1956 51. What is the name of the most powerful computer as of
36. Fifth-generation computers are based on parallel processing November 2021?
hardware and __________. Options: A. America’s Sierra, B. India’s PARAM Siddhi-AI, C.
Options: A. Machine language, B. Low-level language, C. Japanese supercomputer Fugaku, D. China’s Tianhe-2
Assembly language, D. Artificial intelligence 52. Which function key is commonly used to toggle full screen
37. With reference to computer monitors, what is the full form mode in web browsers?
of CRT? Options: A. F5, B. F11, C. F12, D. F8
Options: A. Cathode Random Tube, B. Cathode Ray Tube, C. 53. How many rows are there in an MS Excel worksheet?
Cathode Ray Tool, D. Control Ray Tube Options: A. 65,534, B. 1,048,576, C. 10,68,576, D. Unlimited
38. The maximum number of rows in an MS-Excel worksheet is: 54. What is the shortcut key for closing an active window?
Options: A. 65,534, B. 1,048,576, C. 10,68,576, D. Unlimited Options: A. Alt + F3, B. Alt + F4, C. Ctrl + W, D. Ctrl + Q
39. Identify whether the given statements are true or false: 55. Which protocol is used for remote login on the Internet?
(i) Safari is a web browser developed by Apple Inc. Options: A. FTP, B. Telnet, C. HTTP, D. SMTP
(ii) Edge is not a web browser. 56. Which video compression algorithm reduces the number of
Options: A. (i) – False, (ii) – True, B. (i) – False, (ii) – False, C. (i) – bytes for easier transmission and decompression?
True, (ii) – True, D. (i) – True, (ii) – False Options: A. MPEG, B. JPEG, C. PNG, D. TIFF
40. Which key combination is used to close an active window? 57. What type of connector is used for connecting computers
Options: A. Alt + F3, B. Alt + F4, C. Ctrl + Shift + W, D. Ctrl + Q on a LAN?
41. Which of the following protocols is used for remote login on Options: A. RJ10, B. RJ11, C. RJ35, D. RJ45
the Internet? 58. Which SQL command changes the structure of a table after
Options: A. FTP, B. Telnet, C. HTTP, D. SMTP creation?
42. Which video compression algorithm compresses video data Options: A. UPDATE, B. ALTER, C. DROP, D. TRUNCATE
to reduce the number of bytes that can be easily transmitted? Answers
Options: A. MPEG, B. JPEG, C. PNG, D. TIFF 1. · D. Resident Virus
43. Which of the following computer languages is written in A virus that can access computer memory and sit
binary code only? dormant until a payload is delivered is considered a
Options: A. PASCAL, B. Machine Language, C. C, D. C# Resident Virus.
2. · · B. ALU 23. · · B. ALU
ALU (Arithmetic Logic Unit) is hardware, not software. ALU (Arithmetic Logic Unit) is hardware, not software.
3. · · B. 1024 24. · · B. ALTER
1 petabyte is equal to 1024 terabytes. The SQL command used to change the structure of a
4. · · D. International Business Machines table after creation is ALTER.
The full form of IBM is International Business Machines. 25. · · B. ALTER
5. · · B. Telnet The SQL command to change the structure of a table is
Telnet is used to log on to a remote computer connected ALTER.
to the internet. 26. · · D. RJ45
6. · · D. Communication Management RJ45 is an eight-wire connector used to connect
The coordination and assignment of compilers, computers on a local area network.
interpreters, and other software resources are part of 27. · · B. Cathode Ray Tube
Communication Management. CRT stands for Cathode Ray Tube.
7. · · C. Algorithmic Language 28. · · C. Ctrl+H
ALGOL stands for Algorithmic Language. In Google Chrome, Ctrl + H opens the browser history.
8. · · C. Ctrl+H 29. · · B. F11
In Google Chrome, Ctrl + H opens the browser history. F11 is commonly used to toggle full-screen mode in web
9. · · A. World Wide Web browsers.
The World Wide Web offers a way to access documents 30. · · A. MPEG
spread over several servers over the internet. MPEG is a video compression algorithm that reduces the
10. · · B. Cathode Ray Tube number of bytes for easy transmission.
CRT stands for Cathode Ray Tube. 31. · · A. World Wide Web
11. · · D. Resident Virus The World Wide Web offers a way to access documents
(This is a repeat of Question 1) The correct answer is spread over several servers over the internet.
Resident Virus. 32. · · B. 1,048,576
12. · · C. Japanese supercomputer Fugaku The maximum number of rows in an MS Excel worksheet
As of November 2021, Fugaku is the most powerful is 1,048,576.
computer. 33. · · A. Star
13. · · D. International Business Machines In a star topology, a central controller or hub is required.
The full form of IBM is International Business Machines. 34. · · D. Protocol
14. · · B. Machine Language A protocol is a set of rules that governs data
Machine Language is written in binary code. communications in computer networks.
15. · · D. Simplex 35. · · A. 1971-1980
Communication between a computer and a keyboard The period of fourth-generation computers was mainly
typically involves simplex (one-way communication). from 1971 to 1980.
16. · · D. Artificial Intelligence 36. · · D. Artificial Intelligence
Fifth-generation computers are based on parallel Fifth-generation computers are based on parallel
processing hardware and artificial intelligence. processing hardware and artificial intelligence.
17. · · A. 1971–1980 37. · · B. Cathode Ray Tube
The period of fourth-generation computers was mainly CRT stands for Cathode Ray Tube.
from 1971 to 1980. 38. · · B. 1,048,576
18. · · B. 1024 The maximum number of rows in an MS Excel worksheet
1 petabyte is equal to 1024 terabytes. is 1,048,576.
19. · · A. Star 39. · · D. (i) – True, (ii) – False
In a star topology, a central controller or hub is required. (i) Safari is a web browser developed by Apple Inc. (True)
20. · · D. Protocol (ii) Edge is a web browser. (False)
A protocol is a set of rules that governs data 40. · · B. Alt + F4
communications in computer networks. Alt + F4 is used to close an active window.
21. · · B. Telnet 41. · · B. Telnet
Telnet is used to log on to a remote computer connected Telnet is used for remote login on the Internet.
to the internet. 42. · · A. MPEG
22. · · B. Telnet MPEG is the video compression algorithm used for
Telnet is the protocol used for remote login on the reducing bytes for easier transmission.
internet.
43. · · B. Machine Language
Machine language is written in binary code.
44. · · D. Simplex
Communication between a computer and a keyboard
typically involves simplex (one-way communication).
45. · · B. ALTER
The SQL command used to change the structure of a
table after it has been created is ALTER.
46. · · B. VoIP
VoIP (Voice over IP) allows IP phones and computers to
connect to telephones through PSTN and mobile
networks.
47. · · D. RJ45
RJ45 is an eight-wire connector used to connect
computers on a local area network.
48. · · D. Artificial Intelligence
Fifth-generation computers are based on artificial
intelligence.
49. · · A. 1971–1980
The period of fourth-generation computers was mainly
from 1971 to 1980.
50. · · D. Protocol
A set of rules that governs data communications in
computer networks is known as a protocol.
51. · · C. Japanese supercomputer Fugaku
As of November 2021, Fugaku is the most powerful
computer.
52. · · B. F11
F11 is commonly used to toggle full-screen mode in web
browsers.
53. · · B. 1,048,576
The maximum number of rows in an MS Excel worksheet
is 1,048,576.
54. · · B. Alt + F4
Alt + F4 is used to close an active window.
55. · · B. Telnet
Telnet is used for remote login on the Internet.
56. · · A. MPEG
MPEG is the video compression algorithm used for
reducing bytes for easier transmission.
57. · · D. RJ45
RJ45 is the connector used for connecting computers on
a LAN.
58. · · B. ALTER
ALTER is the SQL command used to change the structure
of a table after creation.