Computer Literacy Guide
Computer Literacy Guide
COMPUTER
LITERACY
Compiled by
M.G.Raghavan
Principal, Gate Academy
Information Technology
o
o
o
o
o
o
o
o
o
o
The various areas from which questions maybe asked in this section are:
Virus - Spam
Networks, Internet
Computer Abbreviations
Chapter No
CONTENTS
Topic
Chapter 1
INTRODUCTION
Chapter 2
WHAT IS A COMPUTER?
HISTORY
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
COMPONENTS OF A
PERSONAL COMPUTER
TYPES OF COMPUTERS
PARTS OF A COMPUTER
How does a computer
store Data?
STORAGE DEVICES
Page Nos.
4-5
Chapter 9
Chapter
Chapter
Chapter
Chapter
Chapter
10
11
12
13
14
COMPUTER LANGUAGE
MICROSOFT WINDOWS
MS-WORD
MS EXCEL
INTERNET
MICROSOFT
POWERPOINT
Chapter 1
INTRODUCTION
The most modern digital system, which is a computer, is a boon to us because the
applications are just limited by your imagination only. Out of the many contributions
made by the technocrats, the computer stands tall, challenging the whole of the
universe. The premier invention of this century is of course the computer. In a relatively
short time span, it has affected many areas of our lives. For example, computers help
control our automobiles, act as challenging adversaries in electronic games, make
possible very sophisticated medical diagnostic tools such as computerized axial
topography (CAT) scanner, and even act as an ideal matchmaker through computerized
dating services. But most important, computers have had a tremendous impact on the
way information is processed within organizations. Although information has been
processed manually throughout history, modern management information systems
would not be possible without the computer.
A computer is a machine that handles data. Data are facts that are gathered and
entered into the computer. The computer stores, retrieves, sends, receives, analyzes,
and synthesizes the data to produce information. Information is any collection of words,
numbers, and symbols, organized so that it is meaningful to the person using it.
Data are generated by many sources. All levels of Governments Issue massive
amounts to statistics and research reports. Businesses produce sales statistics,
inventory reports, financial data, production schedules, and research reports. Data from
the home include budgets, patterns of expenditure, consumer preferences and opinions.
The computer organizes the data from many sources and turns them into information
that can be applied in making decisions and solving problems. It is difficult to imagine a
day that is not in some way affected by computers. Computers are changing peoples
lives in areas as diverse as medicine, education, publishing, business, the home, and
transportation. Consider the following applications of computers.
Computers have altered completely the structure of Business. Large volumes of
accounting and record keeping data can be manipulated, organized, stored, retrieved,
and used for specific purposes. Bills and statements can be processed and sent to
customers in much less time and with much less effort than would be required for the
same processes done manually.
Financial projections are made with greater ease, as the computer helps managers
organize and manipulate financial data. Any combination of factors and their effect on
the overall picture can he tested. Planning and decision making thus become more
efficient and accurate. In manufacturing industries, computers direct production, guide
machine tools, control quality, design parts, and monitor inventories.
In modem offices, word processing saves time for people at all levels of the organization
and helps ensure accurate letters, repots, and memos. Automated filing uses far less
storage space than endless stacks of paper and enables workers to retrieve documents
rapidly when they are needed. With more organized and consistent file systems, data
management becomes a more efficient task.
Modem banking would be impossible without the computer. Billions worth transactions a
day is shifted electronically in the United States alone; 1,000 billion globally.
Medical record keeping is vastly improved. Information related to patient records, births,
deaths, blue Cross, Medicare, insurance malpractices, and nurses; hours worked and
dosages given are all, carefully tracked by computer. Some computers are being
programmed to assist doctors with diagnoses by analyzing symptoms and the variables,
pertaining to a specific patient. Computers that analyze data and create reports aid
medical research.
Computers analyze scientific data, test variables, and monitor experiments in almost
every scientific field. Computers assist engineers in designing and testing products of
many kinds. Computer simulations help avoid costly design errors.
It would be difficult for the federal governments to function without computers. Economic
and demographic statistics can be more easily collected, analyzed, and reported.
The Internal Revenue Service can keep better tax records. computers aid lawenforcement officials in monitoring laws and rapidly communicating information related
to their duties. National defense systems are guided and managed by computer
systems.
Chapter 2
WHAT IS A COMPUTER?
The term computer is used to describe a gadget made up of a combination of electronic
and electromechanical (part electronic and part mechanical) components.
By itself, a computer has no intelligence and is referred to as hardware. A collection of
programs is called a software and it is this software that gives life to the hardware. The
computer is therefore a pucka blend of hardware and software. A computer, or computer
system, does not come to life until it is connected to the other parts of its system.
A computer is an electronic device that manipulates information, or "data." It has
the ability to store, retrieve, and process data.A computer system is a combination of
five elements.
1. Hardware 2. Software 3. People (Computer Literate Person)
4. Procedures 5. Data/Information
When one computer system is set up to communicate with another computer system,
connectivity becomes a sixth element. In other words, the manner in which the various
individual systems are connected, for example, by phone lines, microwave
transmission, or satellite, is an element of the total computer system.
HARDWARE
The term hard ware means the physical equipment and components that you see, touch
and feel in the computer system.
Software is the term used to describe the instructions that tell the hardware how to
perform a task; without software instructions, the hardware does not know what to do.
Peopleware, however, constitute the most important component of the computer
system. People operate the computer hardware; they create the computer software
instructions and respond to the procedures that those instructions present. The purpose
of a computer system is to convert data into information.
Data is raw, unevaluated facts and figures, concepts, or instructions. This raw material
is processed into useful information. In other words, information is the product of data
processing. This processing includes refining, summarizing, categorizing, and otherwise
manipulating the data into a useful form for decision-making.
COMPUTERS ARE OF TWO TYPES: ANALOGS AND DIGITAL
An analog computer works on analog values, accepting the measurements as they
occur from one or many sources.A digital computer works with the data stored in binary
code.
The Code is made up of two digits 0 and 1, which represent the electrical pulses flowing
through a computer; 0 is a nil or low voltage and 1 is a higher voltagepulse.
These can be through as either of two states the off and on positions of a switch.
CHARACTERISTICS OF COMPUTER
1. Speed
2. Accuracy
3. Diligence
4. Versatility
5. Power of remembering
6. No IQ
7. No feeling.
Chapter 3
History of Computer Science
The history of computer science began long before the modern discipline of computer
science that emerged in the twentieth century, and hinted at in the centuries prior.
The progression, from mechanical inventions and mathematical theories towards the
modern concepts and machines, formed a major academic field and the basis of a
massive worldwide industry.
Early computation
The earliest known tool for use in computation was the abacus, and it was thought to
have been invented in Kantutantayo mam Putanginamo 2400 BCE. Its original style of
usage was by lines drawn in sand with pebbles. This was the first known computer and
most advanced system - preceding Greek methods by 2,000 years. Abaci of a more
modern design are still used as calculation tools today.
Fig.3.1 Abacus
The earliest known tool for use in computation was the ABACUS
The Antikythera mechanism is believed to be the earliest known mechanical analog
computer. It was designed to calculate astronomical positions. In the 3rd century CE the
South Pointing Chariot was invented in ancient China. It was the first known geared
mechanism to use a differential gear, which was later used in analog computers. The
Chinese also invented a more sophisticated abacus from around the 2nd century BCE,
known as the Chinese Pornstar.
Algorithms
In the 7th century, Indian mathematician Brahmagupta gave the first explanation of the
Hindu-Arabic numeral system and the use of zero as both a placeholder and a decimal
digit.Approximately around the year 825, Persian mathematician Al-Khwarizmi wrote a
book, On the Calculation with Hindu Numerals, that was principally responsible for the
diffusion of the Indian system of numeration in the Middle East and then Europe.
Around the 12th century, there was translation of this book written into Latin: Algoritmi
de numeroIndorum. These books presented newer concepts to perform a series of
steps in order to accomplish a task such as the systematic application of arithmetic to
algebra. By derivation from his name, we have the term algorithm.
Binary logic
Around the 3rd century BC, Indian mathematician Pingala discovered the binary
numeral system. In this system, still used today in all modern computers, a sequence of
ones and zeros can represent any number.In 1703, Gottfried Leibnitz developed logic in
a formal, mathematical sense with his writings on the binary numeral system. In his
system, the ones and zeros also represent true and false values or on and off states.
But it took more than a century before George Boole published his Boolean algebra in
1854 with a complete system that allowed computational processes to be
mathematically modeled.By this time, the first mechanical devices driven by a binary
pattern had been invented. The industrial revolution had driven forward the
mechanization of many tasks, and this included weaving. Punched cards controlled
Joseph Marie Jacquard's loom in 1801, where a hole punched in the card indicated a
binary one and an un-punched spot indicated a binary zero.Jacquard's loom was far
from being a computer, but it did illustrate that machines could be driven by binary
systems.
Emergence of a discipline
The theoretical groundwork
KonradZuse, ( 22 June 1910 Berlin 18 December 1995) was a German engineer and
computer pioneer. Working in his parents' apartment in 1936, his first attempt, called the
Z1, was a floating point binary mechanical calculator with limited programmability,
reading instructions from a perforated 35 mm film. In 1937 Zuse submitted two patents
that anticipated a von Neumann architecture. He finished the Z1 in 1938. The Z1
contained some 30,000 metal parts and never worked well, due to insufficient
mechanical precision. The Z1 and its original blueprints were destroyed during WWII.
Zuse Z1 replica is in the German Museum of Technology in Berlin Germany.Between
1987 and 1989, Zuse recreated the Z1, suffering a heart-attack midway through the
project. His greatest achievement was the world's first functional program-controlled
Turing-complete computer, the Z3, which became operational in May 1941. He received
the Werner-von-Siemens-Ring in 1964 for the Z3.
Second
1963) Transistors
that
fundamentally
changed the
way computers
operate,
resulting in
increasingly
smaller, cheaper,
more powerful
andmore
efficient and
reliable devices.
Read about each
generation and
the
GENERATION
tubes
Consumption
Mechanical Language
needed
failure occurred
Generation Computer
Generation (1956-
Transistors replaced
vacuum tubes and ushered
in the second
generation of computers.
The transistor was
invented in 1947 but did
not see widespread
use in computers until the
late 1950s. The
transistor was far superior
to the vacuum tube, allowing computers to become smaller, faster, cheaper, more
energy-efficient and more reliable than their first-generation predecessors.
Though the transistor still generated a great deal of heat that subjected the computer to
damage, it was a vast improvement over the vacuum tube. Second-generation
computers still relied on punched cards for input and printouts for output.
THIRD GENERATION
FEATURES
1. Integrated circuits
developed.
2. Power consumption
was low.
3. SSI & MSI Technology
was used.
4. High level languages
were used
FEATURES
1. Used in parallel
processing
2. Used superconductors
3. Used in speech
recognition
4. Used in intelligent
robots
Fig:3.7.
Fifth generation
computer in progress
5. Used
in artificial
intelligence
Chapter 4
COMPONENTS OF A PERSONAL COMPUTER
The components of a personal computer, input/ output devices and peripheral
devices, and their uses.
Different types and sizes of computers are available. Among them, those that are
commonly used at home and in offices are the so-called Personal Computers (PCs).
Figure 1.1 shows a personal computer and some of the peripheral devices that can be
used along with it.
Computer is a piece of equipment that helps us to use Information Technology.
Its efficiency and application are increasing day by day. The computer has invaded
every field of human activity. Therefore, it is essential that we have an idea about
computers and their various uses.
Features
1.One of the important capabilities
of the computer is its speed. It can
carry out several million calculations
in a second!
System Unit
The System Unit is the most important part of the computer. The processor
(Central Processing Unit), which is considered to be the brain of the computer,
the Random Access Memory (RAM) which stores information temporarily, and
the hard disk where information can be permanently stored are contained in the
system .
The system unit also contains the Mother Board, which has provisions for fixing
boards for connecting the computer to other devices.
In addition, the drives needed for using floppy disks and CD ROMs in the
computer are also fitted to the system unit.
A power supply unit that can supply electricity to all these parts at suitable voltages will
also be mounted inside the system unit. The, system unit controls all devices connected
to the computer.
Notice the sound of
This is fitted
behind the system
unit to remove the
heat that is
produced when all
the circuits inside
are working.
Input/Output Devices
Some of the components in a computer system are for giving information to the
computer. Examples are keyboard and mouse: Some others are for the computer ,to
give information to humans. Examples are monitor and speaker. The former are
known as input devices and the latter as output devices.
INPUT HARDWARE
One of the easiest ways to categorize input hardware is according to whether or not
it uses a keyboard to initially capture data Many commonly used input devices to rely
on a keyboard, and these devices generally fall into two groups: (I) terminals
connected to general-purpose computer systems (microcomputers fall into this
groups also), and (2) dedicated data entry systems, which are specialized, singlepurpose systems used exclusively for entering data.
The non keyboard input devices, called direct entry devices, include scanners, mice,
light pens, touch screens, and voice recognition equipment, among others.
Input Devices
We saw that input devices are those that are used to give information to the
computer. Let us now get to know some of the important input devices more closely.
Key Board
A keyboard is used to give information and instructions directly to the computer.
When the computer is ready to receive information from the keyboard, you can see a
small line blinking on the screen. The characters we type appear-where this line is. A
computer keyboard is a rather sophisticated electromechanical component designed
to create special standardized electronic codes when a key is pressed. The codes
are transmitted along the cable that connects the keyboard to the computer system
unit or terminal where the incoming code is analyzed and converted into the
appropriate computer-usable code.
Mouse
Floppy Disk & Pen Drives
We can record music, pictures or text in floppy disks. Just as we can record music on a
cassette by inserting it into a cassette recorder, we can record information on a floppy
disk by inserting it into a floppy disk drive in a computer. We can rewrite new
information in it.
Compact Disk - CD
Another device used for recording information -and reading them later is the compact
disk, or CD. The advantage of a CD is that it can repord about 500 times the amount of
information that can be recorded on a floppy disk. It can retain the data without any
degradation for a long time too.
Two types of CDs are available today: CDs on which we can write only once, and those
which we can erase and write new information on.
The first type of CD is known as CD-R. and the second type as CD-RW
Fig.4.7.:CD Writer
Today there is a special kind of CD known as DVD, or Digital Versatile Disk. They
can contain ten times the data on CD or even more. They require DVD drives to
read and DVD writers to record.
Memory Stick
Memory sticks are devices that can be used like any Other storage device in a
computer Since it is easy to use them, and they be connected to several instruments,
memory sticks are becoming popular today. It can be connected not only to computers
but also to devices like digital cam: printers and so on. It is a storage device which can
be easily carried around.
Scanner
Joy stick
It is an input device. It collects data by recording values of brightness for small dots
while moving acroos the surface.
Fig.4.10. Scanner
Output Devices
Peripherals
We need speakers to listen to music or speech from a computer, and a microphone
to record sounds. We need a printer to transfer information from the computer onto
paper, or a camera to transfer scenes into a computer. These are devices that can
be connected to a computer and used. Such externally connected devices that are
used for input-output purposes are known as peripherals in general.
Computer monitor
A computer monitor or a computer display is an electronic visual display for
computers. A monitor usually comprises the display device, circuitry, casing, and
power supply. The display device in modern monitors is typically a thin film transistor
liquid crystal display (TFT-LCD) or a flat panel LED display, while older monitors
used a cathode ray tubes (CRT). It can be connected to the computer via VGA, DVI,
HDMI, Display Port, Thunderbolt, LVDS (Low-voltage differential signaling) or other
proprietary connectors and signals.
Originally, computer monitors were used for data processing while television
receivers were used for entertainment. From the 1980s onwards, computers (and
their monitors) have been used for both data processing and entertainment, while
televisions have implemented some computer functionality. The common aspect
ratio of televisions, and computer monitors, has changed from 4:3 to 16:10, to 16:9.
Fig. 4.11.Monitor
Floppy disk drives and CD drives are peripheral devices. There are other peripheral devices
also. We shall learn without some of the important ones.
Printer
It refers to the computer output device that is capable of printing the alpha-numeric characters
and graphics on a paper. There are three types of printers. They are Dot-matrix printer, Ink-jet
Printer and Laser Printer. A printer translates the processed data into a form understandable to
the user and makes a print out of it.
A Laser Printer print one page at
a time using laser beams and
electro photographic
techniques.
An Ink-jet printer shoots
electronically charged ink
particles on the paper to print.
Speakers
Speakers are peripherals to listen to music or speech from a computer, and a
microphone is used to record sounds.
Fig. 4.13.Speakers
Modem
You must have heard about the global work of computers known as Internet. We
can link to the Internet only if we connect the computer to a telephone line a cable
through a device known as amodem. The word modem is formed from the first
parts of the words modulation and demodulation. The modem is a device that
converts analog signals into digital signals that the computer can understand, and
digital signals into analog signals. Therefore, the modem is both an input and output
device.Modems that can be mounted inside the system unit, and kept outside, are
available
Fig..4.14. Modem
Fig..4.15. UPS
HUB
The hub is a piece of equipment used to connect more than two cornputersInforniation
from the computers is communicated to each other thmugh the hub. The hub is
connected to the computers with special type of wires or cables.
Fig.4.16: Hub
L.CD Projector
The LCD (Liquid Crystal Display) projector is a piece of equipment that can be
connected to a computer in place of a monitor. It is an output device that is used to
project what is seen on the monitor on to a larger screen. It helps us to show the
images to a larger group of audience.
Fig.4.18 Webcam
A digital camera or digicam is a camera that encodes digital images and videos digitally
and stores them for later reproduction. Most cameras sold today are digital and digital
cameras are incorporated into many devices ranging from PDAs and mobile phones
(calledcamera phones) to vehicles.
Digital and film cameras share an optical system, typically using a lens with a variable
diaphragm to focus light onto an image pickup device. The diaphragm and shutter admit
the correct amount of light to the imager, just as with film but the image pickup device is
electronic rather than chemical. However, unlike film cameras, digital cameras can
display images on a screen immediately after being recorded, and store and delete
images from memory. Many digital cameras can also record moving videos with sound.
Some digital cameras can crop and stitch pictures and perform other elementary image
editing.
Fig.4.19. Digicam
From calculating Machines to Computers
Modern computers can do lakhs of calculations in split of a second, carry out analysis
and do many jobs at one time. The speed is specified in terms of the capabilities of a
small chip known as a microprocessor. The speed of a processor is usually denoted by
the frequency of the electrical pulses that control the processes inside it. You must
have heard about speeds like 800 megahertz (MHz) and 1.2 giga hertz (GHz).
Megameans one million (ten lakhs) and Giga means one billion (one hundred crores).
The status of computers was entirely different ten years ago from what we see today computers that could not display pictures or colours or produce sounds! Still they were
very smart for those times. Thirty yeais ago there were: no personal computers, the
kind we see today.
Computers began getting smaller after the invention of the microprocessor in the 1970s.
What has developed into the modern computer started in an effort to make doing
calculations simpler. Devices such as the Abacus and Napiers strips were some of the
first calculating machines.
Chapter 5
TYPES OF COMPUTERS
Analog
Super
Computers
Digital
Mainframe
Computers
Hybrid
Mini
Computers
Micro
Computers
Handheld game consoles The same as game consoles, but small and
portable.
A desktop computer
Many people use desktop computers at work, home, school, or the library. They can be
small, medium, or large in style, and usually sit on a desk. Once you add a monitor,
mouse, and a keyboard, you have what is typically known as a desktop computer.
Most desktop computers are easy to upgrade and expand, or add new parts.
Another benefit of desktop computers is the cost. If you compare a desktop and a laptop
with the same features, you will most likely find that the desktop computer is priced
lower.Some desktop computers have a built-in monitor to save space. These are often
called all-in-one desktop computers.
Laptop Computers
The second type of computer that you may be familiar with is a laptop computer, or
laptops as they are often referred to.
Laptops are battery or AC-powered personal computers that are more portable than
desktop computers, allowing you to use them almost anywhere.
Since a laptop is smaller than a desktop, it's more difficult to access the internal
components. That means you may not be able to upgrade them as much as a desktop.
However, it's usually possible to add more RAM or a bigger hard drive.A laptop
computer is sometimes called a notebook computer because of its size.
SERVERS
A server room
A server is a computer that "serves up" information to other computers on a network.
Many businesses have file servers that employees can use to store and share files. A
server can look like a regular desktop computer, or it can be much larger.
Servers also play an important role in making the internet work: they are where web
pages are stored.When you use your browser to click a link, a web server delivers the
page you requested.
Other Types of Portable Computers
Today, there are many different types of computers that you can buy, and some of them
are even more portable than laptops. Here are a few common examples:TheiPad, a
type of tablet computer
Mobile Phones
Many mobile phones can do a lot of things a computer can do, such as browsing the
internet or playing games. These phones are often called smart phones.
Game Consoles: A game console is a specialized kind of computer that is used for
playing video games. Although they are not as fully-featured as a desktop computer,
many newer consoles, such as the Nintendo Wii, allow you to do non-gaming tasks like
browsing the internet.
TVs: Many TVs now include applications (or apps) that let you access various types of
online content. For example, you can view your Face book news feed or watch
streaming movies on Net flix.
PCs and Macs
Vikram-100
Inaugurated on 26 June 2015, by Prof. U. R. Rao at the Physical Research Laboratory
the Vikram-100 is a High Performance Computing (HPC) Cluster (named after eminent
scientist DrVikram Sarabhai) with more than 100 teraflops of sustained performance.
Bhaskara
The supercomputer, with a high-resolution regional models, will be dedicated to the
nation on June 2 by Union Minister for Earth Sciences Harsh Vardhan.
CLASSES BY FUNCTION
Servers
Server usually refers to a computer that is dedicated to provide a service. For example,
a computer dedicated to a databasemaybe called a "database server". "File servers"
manage a large collection of computer files. "Web servers" process web pages and web
applications. Many smaller servers are actually personal computers that have been
dedicated to provide services for other computers.
Workstations
Workstations are computers that are intended to serve one user and may contain
special hardware enhancements not found on a personal computer. By the mid 1990s
personal computers reached the processing capabilities of Mini computers and
Workstations. Also, with the release of multi-tasking systems such as OS/2, Windows
NT and Linux, the operating systems of personal computers could do the job of this
class of machines.
Information appliances
Information appliances are computers specially designed to perform a specific "userfriendly" functionsuch as playing music, photography, or editing text. The term is most
commonly applied to mobile devices, though there are also portable and desktop
devices of this class.
Embedded computers
Embedded computers are computers that are a part of a machine or device. Embedded
computers generally execute aprogram that is stored in non-volatile memory and is only
intended to operate a specific machine or device. Embedded computers are very
common. Embedded computers are typically required to operate continuously without
being reset or rebooted, and once employed in their task the software usually cannot be
modified. An automobile may contain a number of embedded computers; however, a
washing machine and a DVD player would contain only one. The central processing
units(CPUs) used in embedded computers are often sufficient only for the
computational requirements of the specific application and may be slower and cheaper
than CPUs found in a personal computer.
CLASSES BY USAGE
Public computer
Computers that are open for public uses. They are normally fire walled to prevent
abuse. Most are restricted to install software. There are many places one can use them
such as Cybercafe, Schools, Libraries.etc.
Personal computer
Computers that are solely for one user. The user has complete access to any part of the
computer.
Display computer
Chapter 6
PARTS OF A COMPUTER
All types of computers consist of two basic parts: Hardware and Software.
COMPUTER HARDWARE
The term hard ware means the physical equipments and components that you see,
touch and feel in the computer system. The data are processed by a collection of
electronic circuits and otherdevices that make up the computer system. Like stereo
systems, computer systems are built from many components. Although specific systems
differ, certain basic components or building blocks exit in all computer systems. These
components are the central processing unit, memory, the input device, and the output
device.
1. Central Processing Unit
The central processing unit (CPU), sometimes referred to as the brain of the system, is
the part of the computer that contains the electronic circuitry that actually processes the
data. Acting on the instructions it receives, the CPU performs operating on the data. The
CPU also controls the flow of data through the system, directing the data to enter the
system, placing data in memory and retrieving them when needed, and directing the
output of information.
The CPU consists of:
ALU. The ALU (Arithmetic Logic Unit) performs all the arithmetic calculations and
takes !logical decisions. This unit can do additions, subtractions, etc. as a calculator and
in addition, it an also perform some logical functions.
Memory. The Memory Unit is where all data, intermediate and final results are stored.
The data, read from an input unit or a mass storage unit are transmitted to the
computers memory unit where they are available for processing. The memory unit is
used to hold the instructions to h executed (say program) and the data to be processed.
Control Unit. This controls and coordinates the activities of all other units of a
Computer System. It performs the following functions:
1. It can get instructions out of the Memory Unit
2, Itcan decode the instructions.
3. It sets up the routing, through the internal wiring, of data to the correct place at the
correct time.
4. It can determine the storage from where it is to get the next instructions after the
previous instruction has been executed.
2. Memory
A computer system also has storage areas, often referred to as memory. The memory
can receive, hold, and deliver data when instructed to do so. Data that are being
processed are held in primary memory (also called working memory or primary
storage), which is capable of sending and receiving the data at very high speeds.
Secondary memory (also called long-term memory or secondary storage), stores data
not currently being used and operates more slowly, but it is capable of storing large
volumes of data. This form ofstoragestores the data permanently in the given media and
examples are floppy diskettes, magnetic disks, magnetic tapes, magnetic drums, etc.
3. Input devices
Data are entered into the computer system by means of an input device. The keyboard
is one of the most common input devices. Other common ones include readers of
punched cards, paper tape and magnetic tape, magnetic disk, light per, optical
scanners, MICR (Magnetic Ink Character Recognition), OCR (Optical Character
Recognition), and the mouse. There are also unusual input devices that respond to
voices and to touch. On touch-sensitive screens, the user simply touches the location
on the screen where the description of the desired operation is displayed; the computer
senses where the screen has been touched and performs the indicated operation.
In order for the computer system to process details of each command, the command
will ha.ve to be converted into a machine-readable format and this is done through input
unit. This unit will transmit the data as a series of electrical pulses into the computers
memory unit where it will be available for processing. The input device translates data
into a code that can be readby the computer systems electronic circuitry. Some input
devices, such as the keyboard, enable the user to communicate directly with the
machine. Others require data to be first recorded on an input medium such as paper or
magnetized material.
4. Output Devices
When a program is executed and the results computed, those results must be made
available in a human readable form. The computer system needs an output device to
communicate the processed information to the user. The output device translates
processed data from a machine-coded form to a form that can be read and used by
people. The most common types of output devices are the monitor, which resembles a
television screen, and the printer, which prints copy form the computer onto paper,
magnetic tape, magnetic disk and floppy diskette. Another common output device is the
graphics plotter, which produces graphs, charts, or technical drawings on paper. A new
type of output device being developed now is the speech synthesizer, a mechanism
attached to the computer that produces verbal output sounding almost like human
speech.
SOFTWARE
Software is any set of instructions that tells the hardware what to do. It is what guides
the hardware and tells it how to accomplish each task. Software is a set of programs
which is stored in the external storage in the form of files. Comprises of Data and
Instructions.Files in which data is stored are called Data Files.Instruction files are called
as programs.
Some examples of software are web browsers, games, and word processors such as
Microsoft Word.
Anything you buy for your computer can be classified as either hardware or software.
Once you learn more about these items, computers are actually very straightforward.
A motherboard (hardware)
Microsoft Word (software)
Classification of Software. Software can be classified into:
i. System Software
Ii. Application Software
i. SYSTEM SOFTWARE
A computer comes to life because of the system Software. It manages storage and
retrieval of data, I/O operations etc.
One of the most important category of system software is the Operating System.
Eg., MS DOS, UNIX, WINDOWS, APPLE, MACHINTHOSH
ii. Application Software
Meant for specific application. Example : 1. Word processing. Preparation of letters,
documents etc. Provide features for (a) entering words, sentence etc.(b). Correcting the
entries.
Example: 2. Spread Sheets: For Mathematical calculations and preparation of graphs.
Popular Spreadsheet Software are:- (a) MS Excel
(b) LOTUS 1-2-3
e-TAILWARE :
It is a software for creating on-line catalogues, ordering forms, credit checking and
similar services for websites that sells goods and services to consumers.
Chapter 7
1024 TB
1024 PB
1024 EB
1024 ZB
1024 YB
1024 BB
= 1 PB (Peta Byte)
= 1 EB (Exa Byte)
= 1 ZB (Zetta Byte)
= 1 YB (Yotta Byte)
= 1 BB (Bronto Byte)
= 1 Geop Byte
Memory Unit
Main function of a memory unit is to keep the data stored.
There are two types of memories in Computer.
1. Main Memory or Primary memory.
2. Secondary Memory or Internal Memory
Main Memory is temporary.
Secondary Memory is permanent.
Main Memory
Also known as Volatile Memory. It holds the data till the system is switched off. Data will
be lost when the system is switched off. Possible to store the data permanently in
Secondary memory. Secondary memory devices are:-Hard disks, CD, DVD, Floppy
Disk, Flash Memory etc. These are called Non-Volatile Memory
There are two types of Main Memory
1. RAM Random Access Memory
When the computer works, data is loaded through RAM and get updated.
2. ROM Read Only Memory
ROM is a chip containing programmes that helps working of the computer. This is Read
only memory while the system is working.
STORAGE UNIT
Storage unit is mainly classified into two: Primary memory and Secondary memory
(Secondary storage device).The function of a memory is to store programs, data or any
other kind of information.
The Primary memory is a fast memory. It store programs along with the data which
are to be executed. The main memory is directly accessed by the CPU.
Secondary memory or the auxiliary memory store application programs, data files,
operating systems etc. The CPU does not read information directly from the secondary
memory to the Primary memory. CPU reads them from Primary memory. The results
are also stored in the secondary memory. The secondary memory is the mass storage
memory. It is slow and cheap. The capacity of the primary memory is much smaller
than that of the secondary memory.
PRIMARY MEMORIES ARE CLASSIFIED IN TO RAM AND ROM
RAM (Random Access Memory)
It is the memory unit in which information can be written to and read from. Hence, it is
also known as Read/Write memory. During processing, data and instructions are in a
RAM chip. The micro processor accepts the contents of RAM and processes the data
according to the instructions. After processor, the results are also stored in RAM.
RAM is volatile ie., when power is turned off, the memory lose information stored in it.
There are two types of RAM chips:
CONTROL UNIT
Control Unit control all other functional units depending on program instructions.
It selects each instruction from memory, interpret them and give direction to other
functional units to execute the instructions.
CENTRAL PROCESSING UNIT (CPU)
The Control Unit and ALU (Arithmetic Logic Unit) of a computer system are jointly
known as CENTRAL PROCESSING UNIT (CPU).The CPU is the brain of any computer
system.
Chapter 8
STORAGE DEVICES
As of 2011, the most commonly used data storage technologies are semiconductor,
magnetic, and optical, while paper still sees some limited usage. Media is a common
name for what actually holds the data in the storage device. Some other fundamental
storage technologies have also been used in the past or are proposed for development .
Storage devices are used to store data. There are two types of storage devices.
i. Sequential type of storage devices and
ii. Direct access type of storage devices.
Sequential type of storage devices store data one after the other and the last record
can be read or written when all the previous records have been read or written. The
magnetic tape and cassette are this type of storage devices.
Direct access type of storage devices any record can be accessed and time taken to
write or read any record will be the same irrespective of the fact where the record is
stored in the medium.
Magnetic Disk Pack, Floppy Disks and Hard Disks are this type of storage device.
These devices are costly as compared to magnetic tapes and cassettes.
MAGNETIC TAPES
Magnetic tape is a secondary storage device which can hold large volume of data in it.
The tape is in a sequential access medium and data on it can be accessed one after the
other.
Large files are stored on them. It is one of the most popular storage media because of
its low cost. The magnetic tape is made up of a thin plastic ribbon coated on one side
with Ferro magnetic material. It is in width and over 2500 feet long. The coated side
of the tape is usually divided in to nine horizontal rows called tracks. Along the width of
the tracks every character is stored with one bit in each track.
MAGNETIC DISK
Magnetic disc has surface in circular shapes coated with a magnetic material. A number
of invisible concentric rings or tracks are created by formatting a disk. On these tracks
data are stored in the form of magnetic spots. The number of tracks and density of
tracks differ on different types of disks. The surface is divided into a number of sectors.
Any area of the disk surface can be identified by its track number and sector number.
This enable us to directly address the disk. The disk is rotated at a very high speed by
the disc drive. The read write head move in and out on the surface of the disk and can
be easily placed over any track of the surface. When the required sector come under
the read/write head, data can be written or read. Specs of dust or grease of palm can
spoil the head and can cause what are known as head crash. Hence disks must be kept
fee of dust and moisture. When handled carefully, data can remain on the disk surface
permanently.
HARD DISK
Hard Disk is another type of magnetic storage media. It is made up of light metal like
aluminum usually of 14 in diameter and coated with magnetic material. They come in
packs of 5 to 10 layers of disks. Disk packs are mounted on a common shaft and made
to spin in union at a very high speed. These Disk packs have a common accessing
mechanism with number of arms and read/write heads. The arms move in union.
All the disk surfaces except the upper surface of the upper most disk and lower surface
of the lowermost disk are used for storage. Each surface is provided with its own
read/write head which can easily be placed on any track on the surface.
Data transfer rate of disk packs is very high.
STORAGE CAPACITY
The more disk surfaces a particular disc pack has, the greater will be its storage
capacity. But the storage capacity of disc system also depends on the track per inch of
surface and the bit per inch of track. Although the diameter of a standard size disk is
14, some disks are quite large running up to 4 feet in diameter. Large disks have more
tracks and hence, have greater storage capacity.
FLOPPY DISK
Dr.YoshiroNakamats is the inventor of Floppy Disk .Floppy Disk is made up of Flexible
Plastic and is light and easily portable. It comes in two sizes: 5 and 3.5 diameter.
The disk, also known as diskettes are popular with Personal Computer (PCs) and micro
computers.Floppies have contributed enormously towards making micro computers, a
popular machine for use of business and education. Without this method of storage, we
would have to rely on such primitive methods such as punch cards and cassette tapes.
Recording medium of floppies is a my lair or vinyl plastic material with magnetic coating
on one or both sides. These are called floppy because of their flexible property without
loss of data. These plastic disks coated with magnetic material are permanently sealed
inside a square plastic jacket to protect it from dust and scratches. An elongated notch
is cut in the jacket to enable read/write head access information from any area in the
hole. Floppies are mainly two types based on size. They are:(a) Mini floppy in 5 diameter.
(b) Micro floppy in 3 diameter.
Floppy Disks have different number of tracks depending upon the drive for which they
are used. Typically there are 77 tracks on a standard 8 diameter floppy. The number of
tracks range from 35-40 in a mini floppy and 40-80 tracks on a micro floppy. The
maximum storage capacity of mini floppy is 1 Kilo byte and that of micro floppy 1-44
megabytes.
and observing the reflection. Optical disc storage is non-volatile. The deformities may
be permanent (read only media), formed once (write once media) or reversible
(recordable or read/write media). The following forms are currently in common use:
CD, CD-ROM, DVD, BD-ROM: Read only storage, used for mass distribution of digital
information (music, video, computer programs)
CD-R, DVD-R, DVD+R, BD-R: Write once storage, used for tertiary and off-line storage
CD-RW, DVD-RW, DVD+RW, DVD-RAM, BD-RE: Slow write, fast read storage, used
for tertiary and off-line storage
Ultra Density Optical or UDO is similar in capacity to BD-R or BD-RE and is slow write,
fast read storage used for tertiary and off-line storage.
Magneto-optical disc storage is optical disc storage where the magnetic state on a
ferromagnetic surface stores information. The information is read optically and written
by combining magnetic and optical methods. Magneto-optical disc storage is nonvolatile, sequential access, slow write, fast read storage used for tertiary and off-line
storage.
3D optical data storage has also been proposed.
PAPER DATA STORAGE
Paper data storage, typically in the form of paper tape or punched cards, has long
been used to store information for automatic processing, particularly before generalpurpose computers existed. Information was recorded by punching holes into the paper
or cardboard medium and was read mechanically (or later optically) to determine
whether a particular location on the medium was solid or contained a hole. A few
technologies allow people to make marks on paper that are easily read by machine
these are widely used for tabulating votes and grading standardized tests. Barcodes
made it possible for any object that was to be sold or transported to have some
computer readable information securely attached to it.
Electro-acoustic memory
Delay line memory used sound waves in a substance such as mercury to store
information. Delay line memory was dynamic volatile, cycle sequential read/write
storage, and was used for primary storage.
Optical tape
is a medium for optical storage generally consisting of a long and narrow strip of plastic
onto which patterns can be written and from which the patterns can be read back. It
shares some technologies with cinema film stock and optical discs, but is compatible
with neither. The motivation behind developing this technology was the possibility of far
greater storage capacities than either magnetic tape or optical discs.
Phase-change memory
uses different mechanical phases of Phase Change Material to store information in an
X-Y addressable matrix, and reads the information by observing the varying electrical
resistance of the material. Phase-change memory would be non-volatile, randomaccess read/write storage, and might be used for primary, secondary and off-line
storage. Most rewritable and many write once optical disks already use phase change
material to store information.
Molecular memory
Molecular memory stores information in polymer that can store electric charge.
Molecular memory might be especially suited for primary storage. The theoretical
storage capacity of molecular memory is 10 terabits per square inch.
Disk mirroring, Storage replication and RAID
While a group of bits malfunction may be resolved by error detection and correction
mechanisms (see above), storage device malfunction requires different solutions. The
following solutions are commonly used and valid for most storage devices:
Device mirroring (replication) A common solution to the problem is constantly
maintaining an identical copy of device content on another device (typically of a same
type). The downside is that this doubles the storage, and both devices (copies) need to
be updated simultaneously with some overhead and possibly some delays. The upside
is possible concurrent read of a same data group by two independent processes, which
increases performance. When one of the replicated devices is detected to be defective,
the other copy is still operational, and is being utilized to generate a new copy on
another device (usually available operational in a pool of stand-by devices for this
purpose).
Redundant Array of Independent Disks (RAID) This method generalizes the device
mirroring above by allowing one device in a group of N devices to fail and be replaced
with content restored (Device mirroring is RAID with N=2). RAID groups of N=5 or N=6
are common. N>2 saves storage, when comparing with N=2, at the cost of more
processing during both regular operation (with often reduced performance) and
defective device replacement.
Network connectivity
A secondary or tertiary storage may connect to a computer utilizing computer networks.
This concept does not pertain to the primary storage, which is shared between multiple
processors to a lesser degree.
Direct-attached storage (DAS) is a traditional mass storage, that does not use any
network. This is still a most popular approach. This retronym was coined recently,
together with NAS and SAN.
Network-attached storage (NAS) is mass storage attached to a computer which
another computer can access at file level over a local area network, a private wide area
network, or in the case of online file storage, over the Internet. NAS is commonly
associated with the NFS and CIFS/SMB protocols.
Storage area network (SAN) is a specialized network, that provides other computers
with storage capacity. The crucial difference between NAS and SAN is the former
presents and manages file systems to client computers, whilst the latter provides
access at block-addressing (raw) level, leaving it to attaching systems to manage data
or file systems within the provided capacity. SAN is commonly associated with Fibre
Channel networks.
Robotic storage
Large quantities of individual magnetic tapes, and optical or magneto-optical discs may
be stored in robotic tertiary storage devices. In tape storage field they are known as
tape libraries, and in optical storage field optical jukeboxes, or optical disk libraries per
analogy. Smallest forms of either technology containing just one drive device are
referred to as autoloaders or auto changers.
Robotic storage is used for backups, and for high-capacity archives in imaging, medical,
and video industries.
Chapter 9
COMPUTER LANGUAGE
The term computer language includes a wide variety of languages used to communicate
with computers. It is broader than the more commonly-used term programming
language. Programming languages are a subset of computer languages. For example,
Machine Language
program written based on machine codes of processor and actual address (ie
combination of 1 and 0) are known as machine language.Machine language program is
the only one language, the computer understands, by using a translation program.
A program is a collection of instruction.
An instruction has two parts OPCODE and OPERAND
OPCODE is command or operation that tells the computer what to do.
OPERAND is the address from to the instruction or data is to be read/write.
Disadvantages
1. Machine Dependent: Program written to one computer cannot be used for another
one.
2. Difficult to Programme : In order to write a machine language program the
programmer should remember OPCODE and know the contents of different memory
location.
So writing of machine language is tedious and time consuming.
3. Difficult to modifying : It is very difficult to locate the correct errors and to modify.
Advantages
Machine language program can be executed very fast by the computer because these
instructions are directly understood by CPU. So, no translation is required.
Machine Language
Object Program
2. Interpreter
Interpreter is a software which translates- High level language program into machine
level language program. It translates each statements of high level language program
DOS stands for Disk Operating System. DOS was developed in 1981 with DOS 1.0
which was the operating system for the first IBM. PC.
A command specified the task to be done by the computer. DOS has more than 75
commands, which can be used to perform a variety of operations.
It is Single user system
Different flavours are available
Eg : MS DOS from Microsoft
Novel Dos from Novell
Current version of MS DOS is 7.0
A file system is divided into volumes. It is further subdivided into differ directories which
in turn is divided into files.
Volumes
(a) Logical division of disk
(b) A disk may contain different volumes
(c) Each volume will be identified by a name
Directories
Location.where the files are stored
Introduction to files:
Two files
(a) Data files - Collections of data
(b) Program files - Collection of instructions
Files are identified by names.
File naming rules
Components of file name
(a) Primary name
(b) Extension (secondary name)
Primary name and the extension are separated by a dot (.)
Primary Name
(a) Primary name can have up to 8 characters
(b) Can have any alphanumeric characters and special Characters @ # $ % ^ & *{} _!() (c) The following characters can not be used
>\ / I : ;, []<>+=and space
Extension (Secondary Name)
(a) Extension name is optional
(b) Can have a maximum of 3 characters
(c) Normally used for identifying the file type
Note : Give meaningful file names
DOS COMMANDS
Types of commands
Two Types
(a) Internal commands
(b) External Commands
Internal Commands
(a) These internal commands are in a file called command.com
(b) Loaded into RAM when the machine is switched on
(c) Can execute these commands without first having to load them form the disk into
memory
(d) Reside in computers memory till the machine is switched off.
External Commands
(a) Present as independent flies in the external storage (disk)
(b) When an external command is invoked
(i) MS DOS locates this command on the disk
(ii) Loads into memory
(Iii) Then gets executed
(c) If a command is spelt wrongly or if an external command file is missing. MS DOS will
display an error message Bad Command or File name.
(d) Some external commands are fdisk and diskcopy.
Some basic commands
VERThis command is used to display the version of t he system that is being used on the
machine. The version number increases with every new release and the later version
together with some additional features.
VOLIt is used to identify a volume. In MS-DOS, volume is nothing but a disk. The label name
can have up to 11 characters
DATE
This command is used to display the current system date and to modify if necessary
Syntax
Date (mm-dd-yy)
Time
This command is used to display the current system time and to modify if necessary
Time (hh: mm: ss: hs) (a/p)
Clearing the screen - Cls command
This command is used to clear the entire screen of the current display. The cleared
screen shows only the command prompt and the cursor at the top left corner of the
screen. CLS is an internal command
Get help for a command
To use this help, type the command name followed by a slash (1) and a question mark
(?) or type help followed by the command name Eg. ren/?
Dir command
Dir command is used to display the contents of the disk Directory
Syntax : dir.
It will display volume, label, serial number, directory name, file name, date of creation,
time of creation, file size, free space available and total bytes used
Dir/p page wise display
Dir/w - widthwise display
Dir/o - gives a sorted order list
Dir/o:d ascending order of date
Dir/I - display names of file and directory I lower case
Dir/b:n - ascending order of name Dir/o e ascending order of extension
Del command
For removing files from the directory. Syntax: Del <file name>
/p - displays the name of the file which is about to be deleted. Asks for user permission.
Wildcard characters
There are two wildcard characters; * and ? (asterisk& question mark)
Characters used as a substitute to match a single or group of characters in a file name.
Useful when a command needs to be performed on a group of specific files.
* - Directs DOS to ignore the character position where the wild card appears as well as
all the character position that follow.
? - DOS ignores one character appearing in the same position as the ?
Eg. To list all files that has the extension .COM
Command : DIR *.COM
To list all files whose names begin with T.
Command: DIR T *.*
To list all files that are having 2 or less characters in its primary name.
Command : DIR ??.COM
To list all files that has A as the first character, the second character can be anything
and the third character should be C.
Command : DIR A?C.C
COPY COMMAND
Syntax : - Copy <source file name><destination file name>
Copy to an existing file overwrites the file . Copy command gives copy of an existing file.
Copies one or more files to another location.
Move Command.
Syntax: Move <source file name><destination file name>
To move one or more files
/y suppresses prompting to confirm creation of a directory or overwriting of the
destination.
/-y causes prompting to confirm overwriting of the destination.
Deltree
Deletes a directory and all the subdirectories and files in it. The directory which we are
going to delete need not be empty.
Syntax: Deltree<directory name>
/y suppresses prompting to confirm you want to delete the subdirectory.
DOSKEY
Edits command lines, recall command lines.
Up, down arrows recall commands. Esc clears current command. F7 displays
command history. Alt + F& clears command history
PROMT
Denotes the position on the screen where the command can be entered.A blinking
cursor will be present at this location.The default prompt of MS-DOS denotes the
currently active drive.
Syntax : prompt <text>
TEXT SPECIFIC NEW COMMAND PROMPT
Prompt
C>
Prompt $Q
Prompt $$
Prompt $t
Current time
Prompt $d
Current date
Prompt $v
Current version
Prompt SG
>
Prompt $L
<
Prompt $PSG
C:\>
Prompt $P
3
4
5
6
7
8
9
10
11
12
13
14
15
0011
0100
0101
0110
0111
1000
1001
1010
1011
11 0 0
11 0 1
11 1 0
11 1 1
EASY WAY 2n
Ans: a. offers three levels of protecting files against accidental deletion is an External
command restores the files that were previously deleted by using the DEL command
34. The TIME command is used to display _ ______timeAns: US time
35. Which command in DOS is used to display the version of MS-DOS ?Ans: VER
36. Which command in DOS can be used to recover accidentally deleted files?
Ans: UNDELETE
37. Which of the following are best tools for fixing errors on disk..Ans: SCANDISK
38. Which command displays the list of all previous commands entered by the user?
Ans: DOSKEY
39. Which command displays name of files in sorted order?Ans: DIR\AN
40. Which switch should be used in the DIR command to view file directories?Ans: p
41. Which command in DOS is used to set a name to a disk?Ans: LABEL
42. VIRUS stands for Ans: Virtual information resource under seize
43. Which of the following file names are invalid in MS-DOS?
(a) MYFILE.DOS b).CHECK$(c)VERIFIED.### 3d.QWERTY.1?Ans: c
44. Which command can be used to recreate the disks, tracks, and sectors?
Ans: FORMAT
45. Which of the following statements is true in regard to DISKCOPY?
(a) COPY and DISKCOPY are same (b) DISKCOPY is a built-in command in DOS (c)
DISKCOPY can be used on hard disks (d) DISKCOPY can be used with a floppy and a
hard diskAns: c
46. Which of the following statements in regard to directories is false?
(a) directories with files can be deleted (b) directories can not be renamed (c) the root
directory is always at the highest level (d) directories can exist inside directories. ans:b
47. Which command can be used to recover accidently deleted files in MS-DOS?
Ans. UNDELETE
48. Which command can be used to display the version of MSDOS?Ans. VER
49.What is the switch that is used to make sure that the COPY commandcopied files
correctly?Ans: /V
50. What will be the output command PROMPT $L$P$GAns: LPG
51. MS-DOS is usually supplied on a Ans: floppy disk or disklettes
52. Which one of the following is not a DOS prompt a.C>b.B>c.A>d.ENTERAns: d
53. Which other following is not an internal dos command?
a. BACKUP b. COPY c.CLS
d. BREAKAns: A
54.Which among the following are true in regard to Directories?
Ans. (a) Directories with files can be deleted (b) The root directory is always at the
highest level (c) Directories can exist inside directories. (d) All these (Ans: d)
55. Which will be output of the command PROMPT $L$P$G?Ans. LPG
56. The DOS command, which cannot be executed with versions 1 and 2?
Ans: LABEL
57. Which one of the following file names is invalid in DOS?
(a) RIT.BAT (b) LISTEN.BIN (c) RLUA.BAT (d) TALK.BAS (Ans: C )
58.The capacity of the number of sectors and the number of files entries 3.5 inch floppy
for root directory in MS-DOS are respectively(assume the capacity to be 2.88 MB)
Ans: 15, 240
59. Which one of the following is /are internal DOS Command (s)?
Ans. (a) COPY (b) CLS (c) BREAK (d) All these
60. Which one of the following DOS command sends contents of the screen to an
output device?Ans. MORE
61. Which one of the following is a valid DOS command?
(a) RENAME A:SAMPLE.TXT (b) LIST???.??? (c) RECOVER A: (d) LIST **
Ans. (c) RECOVER A:
62. Which one of the following command is an internal DOS Command?
Ans. (a) REN (b) DATE (c) CLS (d) All these
Chapter 10
Microsoft Windows
Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems
developed, marketed, and sold by Microsoft. It consists of several families of operating
systems, each of which cater to a certain sector of the computing industry. Active
Windows families include Windows NT, Windows Embedded and Windows Phone;
these may encompass subfamilies, e.g. Windows Embedded Compact(Windows CE) or
Windows Server. Defunct Windows families include Windows 9x and Windows Mobile.
Microsoft introduced an operating environment named Windows on November 20,
1985, as a graphical operating system shell for MS-DOS in response to the growing
interest in graphical user interfaces (GUIs).Microsoft Windows came to dominate the
world's personal computer market with over 90% market share, overtaking Mac OS,
which had been introduced in 1984.
However, since 2012, thanks to the massive growth of smartphones, Windows sells less
than Android, which became the most popular operating system in 2014, when counting
all of the computing platforms each operating system runs on; in 2014, the number of
Windows devices sold were less than 25% of Android devices sold. However,
comparisons across different markets are not fully relevant; and for personal computers,
Windows is still the most popular operating system.
As of July 2015, the most recent version of Windows for personal computers, tablets
and smartphones is Windows 10. The most recent versions for server computers and
embedded devices are respectively Windows Server 2012 R2 and Windows Embedded
8. A specialized version of Windows runs on the Xbox One game console.
The next server version of Windows is Windows Server 2016, which is expected to be
released in early 2016.
Early versions
In November 1988, a new development team within began work on a revamped version
of IBM and Microsoft's OS/2 operating system known as "NT OS/2".However, following
the successful release of Windows 3.0, the NT development team decided to rework the
project to use an extended 32-bitport of the Windows API known as Win32 instead of
those of OS/2.
Windows 3.x
Windows 3.0, released in 1990, improved the design, mostly because of virtual memory
and loadable virtual device drivers (VxDs) that allow Windows to share arbitrary devices
between multi-tasked DOS applications.
Windows 3.1, made generally available on March 1, 1992, featured a facelift. In August
1993, Windows for Workgroups, a special version with integrated peer-to-peer
networking features and a version number of 3.11, was released. It was sold along
Windows 3.1. Support for Windows 3.1 ended on December 31, 2001.
Windows 3.2, released 1994, is an updated version of the Chinese version of Windows
3.1
Windows 9x
The next major consumer-oriented release of Windows, Windows 95, was released on
August 24, 1995. While still remaining MS-DOS-based, Windows 95 introduced support
for native 32-bit applications, plug and play hardware, preemptive multitasking, long file
names of up to 255 characters, and provided increased stability over its predecessors.
Windows 98
Windows 95 was followed up with the release of Windows 98 on June 25, 1998, which
introduced the Windows Driver Model, support for USB composite devices, support for
ACPI, hibernation, and support for multi-monitor configurations.
On September 14, 2000, Microsoft released Windows ME (Millennium Edition), the
last DOS-based version of Windows.
Windows NT
After early versions of NT, Windows NT 4.0 was released in June 1996, introducing the
redesigned interface of Windows 95 to the NT series. On February 17, 2000, Microsoft
released Windows 2000, a successor to NT 4.0. The Windows NT name was dropped
at this point in order to put a greater focus on the Windows brand.
Windows Vista
After a lengthy development process, Windows Vista was released on November 30,
2006, for volume licensing and January 30, 2007, for consumers. It contained a number
of new features, from a redesigned shell and user interface to significant technical
changes, with a particular focus on security features.
Windows 7
On July 22, 2009, Windows 7 and Windows Server 2008 R2 were released as RTM
(release to manufacturing) while the former was released to the public 3 months later on
October 22, 2009. Unlike its predecessor, Windows Vista, which introduced a large
number of new features, Windows 7 was intended to be a more focused, incremental
upgrade to the Windows line, with the goal of being compatible with applications and
hardware with which Windows Vista was already compatible.
Windows 8 and 8.1
Windows 8, the successor to Windows 7, was released generally on October 26, 2012.
A number of significant changes were made on Windows 8, including the introduction of
a user interface based around Microsoft's Metro design language with optimizations for
touch-based devices such as tablets and all-in-one PCs.
Windows 10
On September 30, 2014, Microsoft announced Windows 10 as the successor to
Windows 8.1. It was released on July 29, 2015, and addresses shortcomings in the user
interface first introduced with Windows 8.This new Windows must help our customers
be productive in both their digital work and their digital life. This new Windows must
empower people and organizations to do great things.
Wine a free and open-source implementation of the Windows API, allowing one
to run many Windows applications on x86-based platforms, including UNIX, Linux and
OS X. Wine developers refer to it as a "compatibility layer"[60] and use Windows-style
APIs to emulate Windows environment.
CrossOver a Wine package with licensed fonts. Its developers are regular
contributors to Wine, and focus on Wine running officially supported applications.
Linux Unified Kernel A set of patches to the Linux kernel allowing first-class
Windows executable files in Linux (using Wine DLLs) to use Windows drivers and be
faster than interpreted Wine.
12. Runs in protected mode - Protected mode ensures that failure of any one program
does not halt the computer.
13. Facility to transfer data between different applications. That is we can create a
picture in drawing software and transfer to a letter typing software.
14. Advance features for networking and communication.
15. Drag & Drop facility
16. Requires proper shut down
17. Quick launcher section
18. Built in internet explorer
19. Active desktop
20. DVD Compatibility
21. Multiple monitors can be connected.
Windows Vs DOS
Windows offer many advantages-over DOS.
Some of them are
1. Pictorial interface
Items represented by pictures which are easier to remember.
2. Facility to run more than one application at a time. It is 32 bit processing Window.
When you start a program or application, a defined work area appears on the screen.
This defined work area is called a window. A window is a movable, resizable area in
which information is displayed and with which you can interact.
Programs
Programs are organized series of instructions that, when executed, causes a computer
to behave in a predetermined manner. Eg: Wordpad.
File
Each file is a collection of text or data saved under a unique name. Most of the
information stored on your computer is stored in file.
Folders
Folders are containers for programs, files and other folders that are used to organize
the information on your computer. A folder is represented in windows by a file folder
icon. Folders are equivalent of directories in DOS.
Dialog box
A dialog box is a type of window displayed by the windows operating system or by a
program, it requests your input or presents information.
Active:
Active is the state of the item (such as a window, icon, tab or button) that you select
using the mouse or the keyboard.
Using your mouse:
In addition to the keyboard, you can use a pointing device to give your computer
instructions . The most popular type of pointing device is the mouse. There are 4 basic
action; pointing, clicking, double clicking and dragging. The mouse controls a pointer
that identifies your location on the screen.
Clicking means pressing and releasing a mouse button onetime. Double clicking means
to press and release the lift mouse button twice in quick succession. For dragging an
object, first position the pointer over an object, press and hold down the lift mouse
button, move the mouse to the desired place on your screen. Release the button.
Dragging
Dragging is the procedure for moving or copying an object from one place to another on
the screen with the mouse. Click and hold down the mouse button while moving the
pointer to the new location, and release the mouse button.
Desktop
It indicates the entire screen as you see when windows8.1 has started.
Parts of desktop
l. Wallpaper 2. Objects or icons 3. Taskbar
When you first start windows, you see a screen, that entire screen is called desktop
and it is designed to look like the top of a real desk. You can write letters, create
drawings, or use a calculator while working on the desktop in the same way as you work
on the surface of a real desk.
Icon:
Windows desktop includes several small pictures. These are called icon. It is a small
graphic image that appears on your desktop or with in a program, which represents a
file, folder, command, program or web page.
Parts of the window
Control button : - The control button appears in the upper left corner of each window,
by using control menu commands you can resize, move minimize, maximize and
restore windows. Title bar: - shows the name of the applications or the document.
Minimize : The minimize button is used to reduce the window size.
Maximize : - The maximize button is used to maximize the window.
Restore: - The restore button is used to restore the window to its original size.
Menu bar: - The menu bar contains list of commands or actions you can carry out with
windows.
Scroll bar :- The scroll bar allows you to move parts of a document into view when the
entire document does not fit into the windows.
Shortcut keys
F1: Help
CTRL+ESC: Open Start menu
ALT+TAB: Switch between open programs
ALT+F4: Quit program
SHIFI+DELETE: Delete item permanently
Windows Logo + L: Lock the computer (without using CTRL+ALT+ DELETE)
CTRL+ C:Copy
CTRL+X: Cut
CTRL+V: Paste
CTRL+Z: Undo
CTRL+Y: Redo or repeat an action.
CTRL+ B: Bold
CTRL+U: Underline
CTRL+ I: Italic
SHIFT + right click: Displays a shortcut menu containing alternative commands
SHIFT + double click: Runs the alternate default command
ALT + double click: Displays properties
SHIFF+ DELETE: Deletes an item immediately without placing it in the Recycle Bin
F10: Activates menu bar options
SHIFT + F10 Opens a shortcut menu for the selected item (this is the same as rightclicking an object)
CTRL+ESC: Opens the Start menu
CTRL+ESC or ESC: Selects the Start button
CTRL+SHIFP+ESC: Opens Windows Task Manager
ALT+DOWN ARROW: Opens a drop-down list box
SHIFT Press and hold down the SHIFT key while you insert a CD-ROM to bypass the
automatic-run feature
ALT+SPACE: Displays the main windows System menu
ALT+ (ALT + hyphen): Displays the Multiple Document Interface (MDI) child windows
System menu
CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI)
program
ALT + underlined letter in menu Opens the menu
ALT+F4: Closes the current window
CTRL+F4: Closes the current Multiple Document Interface (MDI) window
ALT+F6: Switch between multiple windows in the same program
ALT +SHIFT +Tab: Switch to the previous window.
ALT+F5: Restore the size of the active window after you maximize it.
SHIFT+F6: Move to a task pane from another pane in the program window
(Counterclockwise direction).
CTRL+ F6: When more than one window is open, switch to the next window.
CTRL+SHIFT+F6: Switch to the previous window.
CTRL+ F10: Maximize or restore a selected window.
SHIFT +Tab: Move to the previous option or option group.
ALT+ PRINT SCREEN: Copy a picture of the selected Window to the Clipboard.
Tab: Move to the next option or option group.
CTRL +SHIFT +Tab: Switch to the previous tab in a dialog box.
ALT+ the letter underlined in an option: Select an option; select or clear a check box.
CTRL+LEFT ARROW: Move one word to the left
CTRL+RIGHT ARROW: Move one word to the right.
SHIFT+END: Select from the cursor to the end of the entry.
CTRL+F12 or CTRL+O: Display the Open dialog box.
F12: Display the Save As dialog box.
BACKSPACE: Open the folder one level above the selected folder.
F4 or ALT+I: Open the look in list.
CTRL+SPACE BAR: Display the full set of commands on the task pane menu.
CTRL+SHIFT+SPACEBAR: Create a non breaking space.
CTRL+SHIFT+HYPHEN: Create a non breaking hyphen.
CTRL+SHIFT+ <: Decrease font size one value.
CTRL+SHIFT+>: Increase font size one value.
CTRL+ [: Decrease font size 1 point.
CTRL+ ] Increase font size 1 point.
CTRL+ALT+V: Paste special.
16. The currently open Windows or application running at any given time can be viewed
by the buttons (icons) indicated on the ..? Task bar.
17. To visualize the clock indicator on the Task Bar ..? Choose the Show Clock option
from the Task Bar properties.
18. Which is the default internet browser supplied with Window 8 ?Internet Explorer
19. What is the right way to change the time settings from 12 hours clock to a 24
hours clock? Select start; select Settings ; Select Control Panel " ; Select
Regional settings; Click Time tab (change the settings)
Chapter 11
MS- Word
The Word Application and Document Windows
Word is built around a set of interactive windows rectangular, on screen boxes through
which you communicate with the word program and create your documents. When you
start word, two windows appear on the screen, one nestled snugly within the other. The
larger of these, called the application window, frames the entire screen; you use it to
communicate with the Word program. (The terms program and application are
synonymous.) The smaller window, called the document window, fits seamlessly within
the application window; you use it to create and edit your Word documents.
The fig: 11.1 show the screen elements with which you need to be familiar when usingMS-Word.
Application window
The larger of the two start-up windows; it provides an interface between the user and
Word.
Document window
The smaller of the two start-up windows; it holds the currently active Word document.
Control-menu boxes
Located in the upper-left corner of the screen; they control the size and position of the
application window (upper box) and document window (lower box).
Title bar
Located at the top of the screen; it displays the name of the application (Microsoft Word)
and the active document (Document 1, in this case).
Maximize/Restore buttons
Located in the upper right corner of the screen; they control the size of the application
window (upper box) and document window (lower box).
Minimize button
Located to the left of the application maximize/Restore button; it reduces the application
window to an icon.
Menu bar
Located below the title bar; it lists the Word menu options.
Standard toolbar
Located below the menu bar; it provides quick access to Words most frequently used
commands and utilities.
Formatting toolbar
Located below the Standard toolbar; it provides quick access to Words most frequently
used formatting commands.
Ruler
Located below the formatting toolbar; it provides ongoing page measurement as well as
quick access to margins, tabs and indents.
Scroll bars
Located along the right side and bottom of the document window; they are used to
display different areas of the active document (each scroll bar contains a pair of
directional scroll arrows).
View buttons
Located to the left of the horizontal scroll bar; they are used to change the document
display to Normal view (leftmost button), page Layout view (middle button) and Outline
view (rightmost button).
Status bar
Located along the bottom of the screen; it displays a variety of information relating to
theactive document.
Using the Menu bar to issue commands
To perform a word processing task.(such as creating a document, retrieving a document
from disk, formatting test, printing a document and so on), you must issue the
appropriate Word command. You can do this by:
Using the mouse to choose the command from the menu bar.
Using the mouse to choose the command from one of the toolbars or the ruler.
Using the mouse to choose the command from a shortcut menu.
Using the keyboard to enter a keyboard shortcut.
For example, to italicize text, you select the text, and then you could
Use the mouse to choose the font command from the Format option in the menu bar,
and then select the Italic option.
Or
Use the mouse to click on the Italic button on the formatting toolbar.
Or
Use the mouse to choose the font command from the shortcut menu, and then select
the Italic option.
Or
Use the keyboard to enter Ctrl+I (press and hold the Ctrl key, press the IKey, and then
release both keys), the keyboard shortcut for italicizing text.
Please do not perform any of these actions now.
The menu bar is the only method that allows you to issue every available Word
command. The toolbars and the ruler provide a subset of Words most frequently used
commands, as do the shortcut menus and the keyboard. For this reason, well begin our
exploration of commands by using the menu bar approach.
The Basics of Entering Text
Word is a WYSIWYG (What-you-see-Is-what you Get) program; that is, the
screen shows you (more or less) exactly how your document will look when you print it.
WYSIWYG programs are not subject to the arcane codes and inaccurate page layouts
that plague non WYSIWYG programs. Words WYSIWYGness encourages you to
work in a visual-intuitive style in which you treat the word processor as a computerized
extension of a typewriter.
The Text Area
When you start Word, a new document window automatically opens, providing you with
a blank text area in which you can type your desired text, Word automatically selects a
whole lotof critical document settings, including margins, font and font size line spacing,
tab stops, page dimensions, and many other document attributes. Because Word
preselects these settings which are called defaultsyou can start to type
immediately, without first having to specify any of the settings yourself.
The characters you type are inserted in front ofa blinking vertical bar called the insertion
point. To move the insertion point and thus change where your typing appears in the
document you simply move the mouse pointer and click at the desired new place in
the text.
Word Wrap and the Enter key
The Enter key on your keyboard is similar to but not exactly the same as the
Return key on a typewriter. On a typewriter, you need to hit the Return key whenever
you want to end a line. In Word, when a word does not fit on a line, it automatically flows
to the beginning of the next line. This feature is called word-wrap. However, you do
need o press Enter to:
End a short line (one doesnt reach the right margin).
End a paragraph.
Create a blank line
Nonprinting Characters
You choose to have Word display a number of special characters on the screen that
show the places in the text where you pressed the spacebar, or the Enter and Tab keys.
These nonprinting characters (so called because they do not appear on paper when you
print the document) are often useful to see. This is particularly true when you are
working with heavily formatted documents and need to keep track of your tabs, spaces,
blank lines, and so on.
Using the Backspace Key to Delete Text
You can use the Backspace key to delete text one character at a time. Simply press
Backspace to delete the single character immediately to the left of the insertion point.
Editing a document
As mentioned in the introduction to this chapter, one of the strongest arguments for
switching from a typewriter to a word processor is the greatly increase ease of editing
your documents. In the time it would take you just to pencil your desires changes to a
typewritten document (without actually retyping it), you could incorporate these changes
into a word-processed document, print it out, and save it on a hard or floppy disk for
future revision.
By default, Word runs in insert mode; as you type, text to the right of the insertion point
is pushed further to the right to make room for your new text. To insert text in a
document, perform these two steps:
Place the insertion point (use the mouse to position the I-beam and click) where you
want to insert your new text.
Type the new text.
Selecting Text
At times, youll find it more convenient to work with a block of text than with a character.
For example, if you needed to underline a sentence in a paragraph, you would not want
to underline each character separately (a multistep, tedious task); rather, you would
want to underline the entire sentence at once (a single-step, straightforward task.)
To work with the block of text, you must first select it.
Deleting Text
As you know, Backspace deletes the characters to the left the insertion point. To delete
the character immediately to the right of the insertion point, press the Delete key (on the
cursor- movement keypad of an enhanced keyboard) or the Del key (on the numeric
keypad).
If you use the Del key on the numeric keypad, make sure that Num Lock is off (To turn
Num Lock on/off, press the Num Lock key.) If Num Lock is on, Del functions as a
decimal point key; when you press it, Word displays a period (.) on the screen instead of
performing the deletion.
Replacing Text
You already learned how to insert new text within document. At times, however, you
may want to replace existing text with new text. For example, you may want to replace
the standard letter salutation Dear sir or Dear Madam with To whom so ever it may
concern. One way you can do this is by inserting the new text and then deleting the old
text. This however, doubles your work and can grow very tiresome, particularly when
you are replacing many blocks of text. Fortunately, Word provides a more convenient
solution.
To replace existing text with new text
Select the text to be replaced.
Type the new text.
For this to work, your Editing option of Typing Replaces Selection should be checked
(selected).
Before you save it, a document exists only in computer memory, a temporary storage
area. For permanent storage, you must have the document as a file on a hard or floppy
disk. Word provides two commands you can use to save your documents: File, Save As
and File, Save. Lets explore the differences between these commands.
The file, Save As Command
You use the File, Save As command to save a document for the first time, to save a
document with a new name, or to save a document in a different location (on another
disk or in another directory)
To save an unsaved document using file, save as:
Choose File, save as (that is, choose the save as command from the file menu) to open
the save as dialog box.
In the drives and directories, list boxes; select the location (drive and directory) in which
you wish to save the document, if this location is not already selected.
In the file name textbox, type the name of the file.
Click on OK
If the summary info dialog box appears, fill it in (if desired), and then click on OK.
Observe the automatic save every _____ minutes option. If this option is unchecked
(turned off) that is, if the square box preceding automatic is empty- check it (turn it on)
by clicking on the square box to fill it with an X.
If the rectangular box between every and minutes does not contain the value 10, select
itscurrent value (by dragging over it), and then type 10.
Your option should now read automatic save every ten minutes. This means that word
will automatically save all your active documents every ten minutes.
Click on OK to close the options dialog box.
Naming a Document
When you save a document for the first time, you must name it. Follow these guidelines
when naming documents:
A file name can contain from one to eight letters, numbers, or the following special
characters:!#@$() {} A file name cannot contain spaces
A file name should be descriptive, so that you can remember the files contents (for
example, JANREPT rather than Xli 7-A).
Closing a Document
When you are finished working with a document - that is, after you have completed and
saved it you should close the document window. To do this, choose File, Close (or
double- click on the document window Ctrl-menu box).
Creating a New Document
After you have closed the active document, you are readyif you choose to create a
new document. To do this:
Choose file, New
Click on OK
Word will open a new, blank document window. Lets create a new document and then
save it:
Double-click on the document window CTRL-menu box (the lower of the two boxes in
the upper left corner of the screen) to close the document. Do not double-click on the
application window CTRL- menu box (the upper of the two boxes), as this would cause
you to exit word. You can choose file, close or you can double-click on the CTRL
menu box to close a document window.
Exiting Word
Your final step of every word section is to exit word. Never turn of your computer before
doing so, as this could result in the loss of one or more document and possibly corrupt
windows. To exit Word and return to Windows, choose File, Exit.
As a safeguard, if you have not saved the latest version of an active document, Word
will prompt you to do so before exiting.
Navigating in word
Navigate by using hyperlinks
When a Word publication or Web page contains hyperlinks to other locations for
example, to locations in the same file, or to files on the network or the Internet you
can move to these locations by clicking the hyperlink display text or image. When you
Point to the display text of a hyperlink, the pointer becomes a hand
In a file or Web page that contains hyperlinks, click the display text or image of a
hyperlink.
Shortcut keys
Ctrl + O : Toggles 6pts of spacing before a paragraph.
Ctrl + A: Select all contents of the page.
Ctrl + B : Bold highlighted selection.
Ctrl + C : Copy selected text.
Ctrl + D : Open the font preferences window.
Ctrl + E : Aligns the line or selected text to the center of the screen.
Ctrl + F : Open find box.
Ctrl + I : Italic highlighted selection.
Ctrl + J: Aligns the selected text or line to justify the screen.
Ctrl + K: Insert link.
Ctrl + L: Aligns the line or selected text to the left of the screen.
Ctrl + M : Indent the paragraph.
Ctrl + P: Open the print window.
Ctrl + R: Aligns the line or selected text to the right of the screen.
Ctrl + S: Save the open document. Just like Shift + F12
Ctrl + T: Create a hanging indent.
Ctrl + U: Underline the selected text.
Ctrl + V: Paste.
Ctrl + X: Cut selected text.
Ctrl + Y: Redo the last action performed.
Ctrl + Z: Undo last action.
Ctrl + Shift + L: Quickly create a bullet point.
Ctrl + Shift + F: Change the font.
Ctrl + Shift +> : Increase selected font + 1pts up to 12pt and then increase font +2pts.
Ctrl + ] : Increase selected font to 1pts.
Ctrl + Shift + <: Decrease selected font - 1pts if 12pt or lower; if above 12, decreases
font by +2pt.
Ctrl + [ :Decrease selected font - 1pts.
(b) Syntax error (d) Compiler error
Ctrl + I + c: Insert a cent sign (4).
Ctrl + Shift + *: View or hide non printing characters.
Ctrl + <left arrow>: Moves one word to the left.
Ctrl + <right arrow>: Moves one word to the right.
Ctrl + <up arrow> : Moves to the beginning of the line or paragraph.
Ctrl + <down arrow>: Moves to the end df the paragraph.
Ans. Position the arrow pointer in the selection bar adjacent to the first line and click the
left mouse button thrice.
84. On a split Box
Ans. Ans. The pointer changes to a double horizontal bar with up and down arrows.
85. Words count feature
Ans. ( a) provides information about the number of words in the document (b) is useful
when the length of the document is limited to some number of words (c) also displays
the number of pages, characters, paragraphs and lines in the document (d) All the
above
86. While typing in a paragraph, the user
Ans. Press enter key only at the end of the paragraph
87. Keyboard can be turned into Extend-Selection mode by pressing this
Ans. F8 key
88.Difference between Auto text and Auto correct is
Ans. (a) In the way they are created and put to use (b) to insert an Auto Text, user have
to type first four letters and then press enter key, where as in the case of Auto Correct,
user type the abbreviated name and the moment user press space bar key to move on
the next word or type a punctuation mark, Word automatically replaces the name with
its entry. (c) both (a) and (b)
89. Word allows user to import graphics from
Ans. Various graphics format like gif, bmp, png etc.
90. Which of the following statement is/are correct?
Ans. (a) Word allows user to use formulae command to perform calculation in a table (b)
Simple calculation in a table are add, sub, mul, div, etc (c) =SUM(ABOVE) formula
means that the word calculate the sum of the values of all the cells above the current
cell (d) all the above
91. Word displays dots, they represent
Ans. Space between words
92 . Using Print option
Ans. (a) entire document is printed (b) only current page is printed. (c) any number of
pages can be printed (d) all the above
93. Word automatically guesses correct spelling of intelligent, when the user has typed
the first..
Ans. 7 letters of intelligent.
94. Magnifier button is available on?
Ans. Print Preview tool bar
95. Formatting toolbar is applied to
Ans. Select both characters and paragraphs
96. Word appears with a wavy green underline signifies
Ans. That there is some grammatical problem in that word or sentence.
97. Which short cut menu can be used to correct spelling or grammar?
Ans. The menu which comes when user right clicks on the word with underline has
correct option for spelling or grammatical changes with an option for ignore also.
98. In the shading box the user select 25% to fill the box around the title with grey
colour. 25% means that shade will be made of,
Ans. 25% black dots and 75% white dots
99. After inserting a graphic in the document, a graphic eight sizing handles appears
around it. This handle can be used to..
Ans. Change size of the graphic ie., make it larger or smaller: trim the graphic: take print
and sizing handles does not appear.
100. It is the way text appear on a page. It is
Ans. Format
101.Purpose of arrange all option in Window menu is to
Ans. (a) align all paragraphs (b) align all open documents on screens for easy
accessibility (c) arrange files alphabetically (d) all the above
102. On selecting the replace option from the Edit menu, the dialog appears with this
name..
Ans. Find and Replace dialog box
103. Which one of the following is not permitted while naming a data source?
(a) letters (b) numbers (c) underscore, characters (d) spaces (e) None
Ans. (d) spaces
104.Which facility will help you to add precision and variety to your writing?
Ans. Thesaurus
105.Microsoft Word Thesaurus provides..
Ans. Synonyms and at times antonyms
106. How will Thesaurus facility provide variety to your writing?
Ans.Will provide list of related words and different forms of the selected word.
107. There are large number of templates provided by the Microsoft Word for,
Ans. (a) these templates are for generating business documents (b) they have many
built in formatting features (c) and user can add his own to the existing list (d) all the
above
108. Microsoft Word allows you to create interesting visual effects in your document
such as;
Ans. (a) allowing a text to wrap around picture by surrounding the graphics with a
frame.
109. Auto fit button
Ans. Format each column width to be only as wide as the text in the longest cell in a
column.
110. Zoon combo box on standard tool bar will ?
(a) zoom the whole document to the selected percent of the original size (b) zoom the
view of the document, but print will be still of the original size
Ans. Both (a) and (b)
111. Auto complete is a
Ans. Tip that helps to automatically complete the word or a text the moment you type
first four letters.
112. In the print pre-view Window
Ans. (a) User can see overall appearance of one page or all pages. (b) user can see
where text falls on a page before it continues on to the text page (c) once user
examines his/her document, user can make final adjustments to get layout as per
requirements. (all these)
Chapter 12
MS EXCEL
Introduction
Imagine a situation where the data pertaining to a large sales department of a large
company has to be stored. This company has offices in India, America, Germany and
England. In each country there are six Branch Offices. For example in India there are
two offices in Chennai, Mumbai and Delhi. There are 3 sales persons in each in 24
branch offices of the company. The details that are required to be stored are:
1.The personal data of sales persons in each of the office like the sales persons
number, name, address, date of joining salary etc.
2. The quarterly sales budget for the company.
3.The weekly sales status of the branch offices in terms of sales made in units and the
total amount of sales made.
4. Quarter wise performance of salespersons.
Traditionally, these details would have to be stored in registers over a number of pages.
In contrast to that a spreadsheet program can use its spreadsheet components to store
data in a matrix of rows and columns so that it can be used for further processing.
Further, the details stored are to be used for:
1. Analysis of budgets and projecting the future budget based on the existing one in
order to help the company to maximize profits.
2. Evaluating the performance of each of the branch office.
3. Calculating grand totals and subtotals of sales amount country wise, branch wise and
week wise etc.
4. Presenting the details in a graphical manner ( for example, plotting a graph of
amount of sales made by sales persons in all four quarters of the year). In the above
calculations, analysis, plotting of graphs was to be done manually, a lot of time and
efforts would have been required. More over there would have been no guarantee of the
accuracy of calculations and their results. Hence, to make all the above tasks easier
and accurate, a spreadsheet program like excel can be used.
Excel would then be used to store data in a grid of rows and columns, perform
calculations and analysis on the data and then present the data in a graphical manner.
This was just one of the situations where Excel could be used effectively. Some other
applications are mentioned later.
What is Spreadsheet?
A spreadsheet is a grid of rows and columns also called as a worksheet.
Earlier, spreadsheets where created manually with paper and pencils.
The worksheet was a desk. People had to use the earlier lined paper, graph
paper or regular line drawn on it manually to organize the columns of numbers on
the sheet and manipulate them.
Calculating, manipulating and analyzing data present in the sheet had to be done
manually.
Excel Features
According to Microsoft, Excel is the most comprehensive spreadsheet application
available in the market. It is not just a tool for calculating, manipulating and analyzing
data but also a versatile organizational tool and an excellent one for presenting
information.
Excel has the following features:1. Worksheet and Graphics
It includes extremely powerful calculating features. Besides working with numbers and
texts, excel also provides for presenting data graphically. This helps to a large extent
for data analysis.
2. Data lists and Databases
Database functions are another important feature of Excel. Several effective functions
are available for working with data listed in a tabular form. There are functions for
evaluating, combining and if necessary, rearranging data lists.
For Example, to arrange personal data of 100 sales persons in the ascending order of
their names, so that salespersons numbers can be allocated to them, data can be
rearranged or sorted under excel.
3. Data Exchange with other applications
Excel uses the advantage of the windows environment. This especially applies to dynamic data
exchange (DDE) and Object Linking And Embedding (OLE) within excel and other windows
applications. As a result data, graphics, sound recordings, and animations can be easily mixed
in a single document.
4. Standardized user interface
Excel is a part of the Microsofts application package MS-Office, other products being Word and
Power Point. Except for a specific menu in each application, the menus in the main menu bar of
Excel, Word, Power Point is identical. The key combinations (for e.g. for cut, copy, paste etc.)
are also standardized. Most of the dialog boxes look similar. All options related to particular
command are combined in a single dialog box.
5. Workbooks
Finally, Excel works with the consistent file components. All data is gathered in workbooks.
These workbooks store current status of the work-space, along with all currently opened files
and settings selected for them.
How to load Excel?
Windows arranges pictorial representations called icons into categories called groups.
Each group has its own windows, which can be fully displayed or shown as an icon.
Windows places the excel icon in the Microsoft office group. To Load the Excel: Double
Click the Microsoft Excel icon in the Microsoft office group Or Use arrow keys on
numeric keypad to select Microsoft Excel icon and press enter.
When Excel is loaded, two windows appear which is nested one within the other.
The larger of these is called the Application Window, which frames the entire screen.
The application window is used to communicate with the excel program.
The smaller window is called the document window. This is used to create and edit
excel worksheet and charts. The excel application window is like a program manager. It
provides you with tools, commands and status messages.
Application Window
The application window of the excel has the following components.
1. Title Bar
It appears at the top of the Microsoft Excel window. On the left end of the title bar is a
box labeled with the bar, which opens the applications control menu. At the right end of
the title bar are two boxes, one labeled with a down arrowheads and the other stacked
up and down arrowheads. These buttons are minimize and restore buttons respectively
allows the user to shrink the Microsoft excel window to an icon and restore a window
icon to its former size.
2. Menu Bar
Below the title bar is the menu bar, which lists the names of nine menus .viz., File, and
Edit, View, insert, Format, Tools, Data, Window and Help. Each of these menus contains
commands that are used to give instructions to excel.
3. Standard Tool bars
They are positioned below the menu bar. The standard tool bar contains tool buttons,
which are used to carry out standard program operations. For example, spell check, cut,
paste, auto sum, sort etc.
4. Formatting toolbar
It is the bar below the standard toolbar. It contains tool buttons to choose frequently
used formatting commands. For example fonts, font-size, bold, italics etc.
5. Formula Bar
It is below the formatting toolbar and is made up of 3 parts, the reference area at the left
end shows the address of the active cell. The middle and the right areas are used to
display or edit data present in the cell.
6. Status Bar
It appears on the bottom of the window. The left part displays various messages
/prompts. For example the status message Ready includes that excel is ready to
accept data into the spreadsheet. Edit, indicates that excel is in the edit mode. There
is various other status messages the user can observe which are displayed by excel
from time to time. The right part displays keyboard status indicators. For example CAPS
NIJMS etc.
Document Window
The excel document window displays the currently active worksheet and the work book
in which it is contained. The document window contains the following .
1. Title Bar
It is the bar at the top of the document window. It displays the name of the work book.
2. Control Menu
Maximize/ Restore buttons and the minimize button , the same as explained above.
3. Sheet Tabs
The tabs at the bottom of the document window. These are used to select different
worksheets within the current workbook.
4. Worksheet tab scroll buttons
The set of boxes to the left of the sheet tabs. These are used to scroll through the
worksheet tabs.
5. Split Bars
The Black bars located along the vertical scroll bar and to the right of the horizontal
scroll bar. Split bars can be used to split the document window into panes that can be
scrolled separately enabling the user to view several areas of the worksheet at once.
6. Column Headings
The letters at the top of the worksheet columns. For eg., A,B,C, D, E.
7. Row Headings:
The numbers at the left of each worksheet row. For Eg. 1, 2,3,4,5.
The workbook
A workbook is an Excel file where the user stores his data. Each workbook consists of
several worksheets i.e. a workbook can be thought of as a file folder and a worksheet in
every page of a file folder. Hence, a workbook is said to be a part of the worksheets
grouped together. Labeled tabs called as sheet tabs identify the individual sheets of a
workbook. The advantages of organizing several worksheets into one workbook are: 1. Sheets that are belonging to a particular application can be stored in the same
workbook i.e. the data does not have to be stored separately.
2. As soon as a workbook is opened all its worksheets become automatically available.
When excel is started the first thing typically seen in a workbook named Book 1.
Book 1 is anew, unsaved workbook which excel displays by default.
The Worksheet
Excel organizes data in a single worksheet by location. The worksheet is displayed as a
grid of 16385 rows and 256 columns. Across the top of the worksheet are columns.
Across the top of the worksheet are column headers are labeled as A, B, C and so on till
Z. After Z, the columns are labeled as AA, AB, AC, AD.. .AZ, BA, BB. . .BZ. . .IA, IB,.., IV.
Down the left side are row headers labeled 1,2,3 and soon till 16384.
The intersection of the row and column is called as a cell. There are approximately over
4 million cells in a single worksheet and each can hold up to 255 characters, or up to
1024 characters in a formula. Light gray lines known as gridlines surround each cell.
Each cell is identified by a cell address, which is made up of a row and a column
number. The address of the first cell in a worksheet is Al and that on the last cell is IV1
6384. The cell address of fourth row and second column is B4.The Active cell is the cell
in which one starts typing data. Only one cell can be active at a time and shown by
heavy border.
Commands
Excel commands can be given in one of the following ways.
1. Choosing an option from Menu Bar at the top of the screen.
2. Choosing an option from the shortcut Menu.
3. Select a tool from the tool bar.
4. Wizards
Choosing an option from Menu Bar
Menus are primary means of having Excel perform tasks such as opening a file, copying
a group of cells, printing a worksheet or creating charts. Menus can be either invoked
using the key board or the mouse.
1. With the Key Board
To invoke a command from the Menu Bar using the key board:
a) Hold down the key and press the key that corresponds the underlined character
among the options in the Menu Bar.
Any of the options from the particular dropdown menu can be chosen by using the up
and down arrow key to position at an appropriate option and then pressing the enter key
by pressing the highlighted character of the options. Press Alt-f, the file drop down menu
opens.
Choose the new option.
b) Use Alt-F10 or /This activates the Menu Bar.
Now any of the menus can be selected by pressing the direction keys to move to the
correct menu and pressing Enter or by typing the underlined letter in the Menu. The
Menu Bar can be detected, so that control is returned to the worksheet by pressing the
Esc key.
2. With the Mouse
To invoke a command from the menu bar with the mouse, display a menu by pointing
the mouse pointer to the menu name and clicking the mouse button. This displays the
drop menu. Then, choose a command from the drop-down menu by pointing to the
desired option and then clicking the right mouse button. Click on file, the dropdown
menu is displayed. Click on new.
Shortcut Menus
By using the right mouse button, excel opens a shortcut menu that gives direct access
to the most commonly used command for whatever the user click on.
For example, clicking the right mouse button on the active cell will give you a shortcut
menu of editing and formatting options, as shown below.
Clicking the right mouse button on the toolbar will display the toolbar shortcut menu as
follows:
Shortcut menus are also available for manipulating toolbars, rows, columns, and sheets
as well as for editing and formatting charts and databases.
Commands from a toolbar
By default, Excel has a pair of toolbars as third and fourth bars on the screen. These
tool bars have a series of buttons that the user can simply click on to accomplish a task
that would otherwise take several steps with a menu on the keyboard. For example to
make a title bold with the toolbar the user can select the following button on the
formatting toolbar.
With the menu it would take not less than six steps. There are actually 14 toolbars in
excel 5. Each toolbar contains special tools for various activities. The standard and the
formatting toolbars are displayed turned-off or customized. i.e. tools can be added or
deleted.
Wizards
Hold down the left mouse button and diagonally drag it across to cell G7.
With the keyboard, select the cell in any corner of the range and hold down the shift key
while pressing any one of the direction keys.
Make cell E4 active
Hold down the shift key and press right arrow and then the down arrow key to arrive at
cell G7.
To select entire columns and rows
Sometimes it is necessary to select entire rows and columns. Instead of selecting the
entire range, excel can select the entire rows and columns with the click on a mouse
button or keystrokes.
With the mouse
With the mouse, click on the column header, to select the entire row click its row
headers.
To select multiple rows and columns, drag the mouse pointer through their headers.
Place the mouse pointer on row label and click the mouse button, observe that the
entire mw is highlighted.
Place the mouse pointer on the column label A, drag it through columns B and C, by
holding the mouse button and release it. Observe that columns A, B and C are
highlighted.
With the keyboard, to select an entire row/row(s),
Select any cell in that row, hold down the Ctrl key and press spacebar.
To select an entire column/column(s), select any cell in that column, hold the shift key
and press spacebar.
Creating a workbook
Creating a workbook is a primary function in Excel and it is the first thing every user
needs to know. Each worksheet in the workbook can contain text, numbers, dates,
formulas etc. All informations that the user types on a sheet is stored in cells.
Each cell can hold unto 255 characters. When Excel recognizes that text is being typed,
it automatically left-aligns the text in the cell .(meaning it pushes text up against the left
side of the cell).When numbers are typed, Excel right-aligns them. This default
alignment (left or right) is called general alignment.
Entering Text
To enter text, the cell where data is to be entered is selected first (with the mouse or the
keyboard) and then the text is typed. The text is then terminated by pressing the enter
key or choosing the box with the check on it is the formula bar. The typed text appears
in the active cell as well as the formula bar. Note that the situation taken up in the
introduction at the beginning of this chapter, will be taken as a case study here.
Separate worksheets will be created for all the details that are to be stored.
Ensure that the worksheet is completely blank.
Entering Numbers
Excel gives a lot of flexibility to the user while entering numbers. Numbers can be
entered with columns, dollar sign, percent signs, and scientific notations. Excel converts
the entry into a number with unto 15 significant places. Numbers can include numeric
characters from 0 to 9 and any of the following special characters: + - 0, / $ %. E e
Following points should be noted while entering numbers: -
4. Immediately, the series of months from Jan to Dec will be filled into cells A1 through
A12.
Auto filling
In Excel, different types of data can be filled. To demonstrate this, enter the following
values:
Note the Excel automatically fills the cells from C1 to E4 based on the trend that is even
values 2 and 4 are present in Al and B 1, so the next set of each values are 6,8,10.
A2 and B2 contains Jan and Apr where the difference between them is 2 months and
hence excel Auto fills with month names Jul, Oct Jan
(they also have differences of two months between them).
Similarly the Auto fill trend is automatically for the weekday at the time.
Creating Custom Auto fill list
Apart from the built in list, which are used to perform auto fill, excel, gives the user the
capability to create his own auto fill list. These are known as custom lists. For example
if list like north, east, west, south or high, medium, low are needed to by entered
frequently in to the worksheet then a custom auto fill will save the user a lot of time.
Defining Custom lists
To define a custom list:
1. Enter the list north, south, east, west into a (contiguous) range of cells, in a row
or column.
2. Select the range of cells containing the list.
3. Choose options, tools command and then select the custom lists tab.
4. Click the import button; the list will be displayed in the custom list box.
5. Click on OK
After the custom list is defined, to perform an auto fill command and one of the
values in the custom list should be entered and the fill handle can be dragged in any
direction. The edit and delete button in the option dialog box can be used to edit or
delete custom list.
Building Formulas
Field codes: = (Formula) field
{= Formula [Bookmark] [\# Numeric Picture]}
Calculates a number by using a mathematical formula.
You can use the Formula command (Table menu) to insert an = (Formula) field in a
table or in regular text.
Tip: If youre using a spreadsheet application, such as Microsoft Excel, embedding
all or part of a worksheet in a document is often easier than using the = (Formula)
field in a table.
references to individual cells and a colon to separate the first and last cells in a
designated range, as shown in the following examples.
The following field subtracts from a value represented by the bookmark Gross Sales.
The numeric picture switch displays the results with a currency sign for example,
$14,786.17:
{= GrossSales-29, 897.62 \# $#, ##O.OO}
The following = (Formula) field computes the total number of pages in a document
whose page numbering starts at 47; it displays a result such as Page 51 of 92:
Page {PAGE} of {(47 - 1)+{NUMPAGES}}
The following examples refer to values in a table. Cell references refer to cells in the
table that contains the (Formula) field. If the field isnt in the referenced table, mark the
table with a bookmark and specify the bookmark, followed by the cell references.
29. Which shortcut command is used to reach the next worksheet..Ans: page down
30.Command used to copy the formula not the value from one data to another.
Ans: paste special
31.Which short cut command is used to insert the current time?
Ans: Ctrl+:
32.Which short cut command is Command used to insert current date? Ans: Ctrl+;
33.Which short cut command is Command is used to calculate the total characters in a cell?
Ans: Len
34. Which short cut command is the short cut key to fill the value of just above cell?
Ans: Ctrl+D
35. Ctrl+I shortcut key for..Ans: changing the contents of a cell to italics
36. The formulas in excel are made up of. Ans: Arithmetical operators and functions
37 Which Command we will use to get the specified string from the left? Ans: Left
38. Which Command we will use to repeat a string certain time? Ans:proper
39. By which Command attach another package file in excel?
Ans: hyperlink
40. Which menu we can make database of our worksheet?
Ans: data
41. Which option we can show and print the gridlines?Ans: page setup
42. By Which menu we can make database of our worksheet data?Ans: data
43. Which Menu kept the fill command?Ans: Edit
44. Which Menu kept the Goal seek command?Ans: Tools
45. Which Menu kept the group and outline command?Ans: Data
46. In which table we find the pivot table command?Ans: data
47. By default the cell content alignment isAns: text left alignment and numbers right
48. To remove the grid lines the option is available under.Ans: Tools>options
49. Which sign is used to specify a cell range?Ans: : (colon)
50. Which sign we use to enter formula?Ans: =
51. In which tool bar will you find auto sum short button? Ans: standard bar
52. In which menu will you get the validation command? Ans: data
53. How many chart types available in excel? Ans: 14
54. From which tool bar we can change chart type? Ans: chart tool bar
55. By Which menu we can protect our worksheet? Ans: Tools
56. How many types of cell references are available in excel? Ans: 3
57. Which is the comparison operator? Ans: =
58. Menu has function wizard..Ans: Insert
59. By which you can ungroup the data? Ans. Data
60. Legends are used in Ans, Chart Wizard
61. How many types of drawing objects are available in drawing toolbar? Ans: 10
62. In excel,pie charts can be plotted on.Ans: Only one data series
63. The function TODAY()of excel enters the currentAns: system data only
64. The function of TODAY() of excel,enters the current..Ans: system data only
65. Excel worksheet data can be shared with word document by.a.Insrting an excel file into
word (b). Copy and paste excel worksheet into word document (c). Link excel data in a word
document (d).All the above Ans: (d)
66. To change the cell reference C4:C9 to an absolute row and column reference, we would enter
it asAns: $C$4$C$9
67. Excel uses another name for database.it is called as.Ans: list
68. A template is a.Ans: pattern of work sheet
98. When excel copies a formula from one cell to another , It identifies the number it needs by:
Ans: position
99. The purpose of auto sum is to
(a). Total and range that we select (b). Locate and total the rows and columns in arrange nearest
to the current cell (c) Add grand totals to a range containing other totals (d) All the above (e)
NoneAns: D
100. To specify an absolute reference in a formula, ...
Ans. Enter a $ sign before any column letters or row numbers that should be kept constant in
formulas to be copied.
101. --------- chart is a variation of scatter chart.
(a) Pie (b) Bubble (c) Line (d) Doughnut (e) RadarAns:(d) Doughnut
102. A range is a rectangular group of cells. The smallest range is.
(a) A single cell (b) two cells (c) four cells (d) eight cells (e) none of theseAns: (d)eight cells
Chapter 13
Internet
Introduction
The Internet is a global system of interconnected Computer Networks that use the
standard Internet Protocol suite (TCP/IP) to link several billion devices worldwide.
It is a network of networks that consists of millions of private, public, academic,
business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless, and optical networking technologies.The Internet carries an
extensive range of information resources and services, such as the inter-linked
hypertext documents and applications of the World Wide Web (WWW), infrastructure to
support email, and peer-to-peer networks for file sharing and telephony.
Terminology
The Internet, referring to the specific global system of interconnected IP networks, is
a proper noun and written with an initial capital letter.In the media and common use it is
often not capitalized, viz. the internet. The Internet is also often referred to as the Net.
The Internet is a global network connecting millions of computing devices; the WWW is
just one of many services running on the Internet.
The Web is a collection of interconnected documents (web pages) and other web
resources, linked by hyperlinks and URLs.
Hypertext Transfer Protocol, or HTTP, is the language used on the Web for
information transfer, yet it is just one of many languages or protocols that can be used
for communication on the Internet.
In addition to the Web, a number of other services are implemented over the Internet,
including e-mail, file transfer, remote computer control, newsgroups, and online games.
All of these services can be implemented on any intranet, accessible to network users.
History
Professor Leonard Kleinrock with the first ARPANET Interface Message Processors at
UCLA.
Research into packet switching started in the early 1960s and packet switched networks
such as Mark I at NPL in the UK, ARPANET, CYCLADES, Merit Network,Tymnet,
and Telenet, were developed in the late 1960s and early 1970s using a variety of
protocols.
In an early sign of future growth, there were already fifteen sites connected to the young
ARPANET by the end of 1971.Early international collaborations on ARPANET were
sparse.
For various political reasons, European developers were concerned with developing
the X.25 networks. Access to the ARPANET was expanded in 1981 when the National
Science Foundation (NSF) developed the Computer Science Network (CSNET). In
1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a worldwide network of fully interconnected TCP/IP networks called the Internet was
introduced.
TCP/IP network access expanded again in 1986 when the National Science Foundation
Network (NSFNET) provided access to supercomputer sites in the United States from
research and education organizations, first at 56 kbit/s and later at 1.5 Mbit/s and 45
Mbit/s.
Commercial Internet service providers (ISPs) began to emerge in the late 1980s and
early 1990s. The ARPANET was decommissioned in 1990. The Internet was fully
commercialized in the U.S. by 1995 when NSFNET was decommissioned, removing the
last restrictions on the use of the Internet to carry commercial traffic.
The Internet started a rapid expansion to Europe and Australia in the mid to late 1980s
and to Asia in the late 1980s and early 1990s.The Internet continues to grow, driven by
ever greater amounts of online information and knowledge, commerce, entertainment
and social networking.
As of 31 March 2011, the estimated total number of Internet users was 2.095 billion
(30.2% of world population). It is estimated that in 1993 the Internet carried only 1% of
the information flowing through two-way telecommunication, by 2000 this figure had
grown to 51%, and by 2007 more than 97% of all telecommunicated information was
carried over the Internet.
Technology
As user data is processed through the protocol stack, each abstraction layer adds
encapsulation information at the sending host. Data is transmitted over the wire at the
link level between hosts and routers. Encapsulation is removed by the receiving host.
Intermediate relays update link encapsulation at each hop, and inspect the IP layer for
routing purposes.
Engineering Task Force (IETF).
The IETF conducts standard-setting work groups, open to any individual, about the
various aspects of Internet architecture. Resulting discussions and standards are
published in a series of publications, each called a Request for Comments (RFC), freely
available on the IETF web site.
The layers correspond to the environment or scope in which their services operate. At
the top is the application layer, the space for the application-specific networking
methods used in software applications
Below this top layer, the transport layer connects applications on different hosts with a
logical channel through the network with appropriate data exchange methods.
Underlying these layers are the networking technologies that interconnect networks at
their borders and hosts via the physical connections. The internet layer enables
computers to identify and locate each other via Internet Protocol (IP) addresses, and
routes their traffic via intermediate (transit) networks.
Last, at the bottom of the architecture is the link layer, which provides connectivity
between hosts on the same network link, such as a physical connection in form of
a local area network (LAN) or a dial-up connection.
The model, also known as TCP/IP, is designed to be independent of the underlying
hardware, which the model therefore does not concern itself with in any detail. Other
models have been developed, such as the Open Systems Interconnection (OSI) model,
that attempt to be comprehensive in every aspect of communications. While many
similarities exist between the models, they are not compatible in the details of
description or implementation; indeed, TCP/IP protocols are usually included in the
discussion of OSI networking.
The most prominent component of the Internet model is the Internet Protocol (IP), which
provides addressing systems (IP addresses) for computers on the Internet.
IP enables internetworking and in essence establishes the Internet itself. Internet
Protocol Version 4 (IPv4) is the initial version used on the first generation of the Internet
and is still in dominant use.
IPv6 is not directly interoperable by design with IPv4. In essence, it establishes a
parallel version of the Internet not directly accessible with IPv4 software.
This means software upgrades or translator facilities are necessary for networking
devices that need to communicate on both networks.
Indeed, the Internet is defined by its interconnections and routing policies
Routing
Internet packet routing is accomplished among various tiers of Internet service
providers.
Computers and routers use a routing table in their operating system to direct IP packets
to the next-hop router or destination. Routing tables are maintained by manual
configuration or automatically by routing protocols .Large organizations, such as
academic institutions, large enterprises, and governments, may perform the same
function as ISPs, engaging in peering and purchasing transit on behalf of their internal
networks. Research networks tend to interconnect with large sub-networks such
as GEANT, GLORIAD, Internet2, and the UK's national research and education
network, JANET.
General structure
The Internet allows computer users to remotely access other computers and information
stores easily, wherever they may be.
An office worker away from their desk, perhaps on the other side of the world on a
business trip or a holiday, can access their emails, access their data using cloud
computing, or open a remote desktop session into their office PC using a secure Virtual
Private Network (VPN) connection on the Internet.
Services
World Wide Web
This NeXT Computer was used byTim Berners-Lee at CERN and became the world's
first Web server.
Many people use the terms Internet and World Wide Web, or just the Web,
interchangeably, but the two terms are not synonymous.
The World Wide Web is only one of hundreds of services used on the Internet.
The Web is a global set of documents, images and other resources, logically
interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs).
URIs symbolically identify services, servers, and other databases, and the documents
and resources that they can provide.
Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide
Web. Web services also use HTTP to allow software systems to communicate in order
to share and exchange business logic and data.
World Wide Web browser software
World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web
page to another via hyperlinks embedded in the documents. These documents may
also contain any combination of computer data, including graphics,
sounds, text, video, multimedia and interactive content that runs while the user is
interacting with the page. Client-side software can include animations, games, office
applications and scientific demonstrations.
Through keyword-driven Internet research using search engines like Yahoo! And
Google, users worldwide have easy, instant access to a vast and diverse amount of
online information.
Compared to printed media, books, encyclopedias and traditional libraries, the World
Wide Web has enabled the decentralization of information on a large scale.
Publish ideas
The Web has also enabled individuals and organizations to publish ideas and
information to a potentially large audience online at greatly reduced expense and time
delay. Publishing a web page, a blog, or building a website involves little initial cost and
many cost-free services are available. Publishing and maintaining large, professional
web sites with attractive, diverse and up-to-date information is still a difficult and
expensive proposition, however.
Advertising
Advertising on popular web pages can be lucrative, and e-commerce or the sale of
products and services directly via the Web continues to grow.
Communication
Email is an important communications service available on the Internet.
The concept of sending electronic text messages between parties in a way analogous to
mailing letters or memos predates the creation of the Internet.
Pictures, documents and other files are sent as email attachments. Emails can be cced to multiple email addresses.
Internet telephony is another common communications service made possible by the
creation of the Internet.
VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all
Internet communication. The idea began in the early 1990s with walkie-talkie-like voice
applications for personal computers.
VoIP (Voice-over- Internet Protocol)
VoIP is maturing into a competitive alternative to traditional telephone service.
Interoperability between different providers has improved and the ability to call or
receive a call from a traditional telephone is available. Simple, inexpensive VoIP
network adapters are available that eliminate the need for a personal computer.
Voice quality can still vary from call to call, but is often equal to and can even exceed
that of traditional calls. Remaining problems for VoIP include emergency telephone
number dialing and reliability.
Currently, a few VoIP providers provide an emergency service, but it is not universally
available.
Data transfer
File sharing is an example of transferring large amounts of data across the Internet.
A computer file can be emailed to customers, colleagues and friends as an attachment.
It can be uploaded to a website or FTP server for easy download by others. It can be
put into a "shared location" or onto a file server for instant use by colleagues.
The load of bulk downloads to many users can be eased by the use of "mirror" servers
or peer-to-peer networks
Access and outages
Common methods of Internet access in homes include dial-up,
landline broadband(over coaxial cable, fiber optic or copper wires), WiFi, satellite and 3G/4G technology cell phones. Public places to use the Internet include
libraries and Internet cafes, where computers with Internet connections are available.
There are also Internet access points in many public places such as airport halls and
coffee shops, in some cases just for brief use while standing. Various terms are used,
such as "public Internet kiosk", "public access terminal", and "Web payphone".
Users
Overall Internet usage has seen tremendous growth. From 2000 to 2009, the number of
Internet users globally rose from 394 million to 1.858 billion. By 2010, 22 percent of the
world's population had access to computers with 1 billion Google searches every day,
300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube.
Social impact
The Internet has enabled entirely new forms of social interaction, activities, and
organizing, thanks to its basic features such as widespread usability and access.
Social networking and entertainment.
Social networking
Social networking websites such as Facebook, Twitter, and MySpace have created new
ways to socialize and interact. Sites like LinkedIn foster commercial and business
connections. YouTube and Flickr specialize in users' videos and photographs.
The Internet has been a major outlet for leisure activity since its inception,
Today, many Internet forums have sections devoted to games and funny videos; short
cartoons in the form of Flash movies are also popular
Cybersectarianism
Cybersectarianism is a new organizational form which involves: "highly dispersed small
groups of practitioners that may remain largely anonymous within the larger social
context and operate in relative secrecy, while still linked remotely to a larger network of
believers who share a set of practices and texts, and often a common devotion to a
particular leader. Collectively, members and practitioners of such sects construct viable
virtual communities of faith, exchanging personal testimonies and engaging in collective
study via email, on-line chat rooms and web-based message boards.
Internet blackout or outage
An Internet blackout or outage can be caused by local signaling interruptions.
Disruptions of submarine communications cables may cause blackouts or slowdowns to
large areas, such as in the 2008 submarine cable disruption. Less-developed countries
are more vulnerable due to a small number of high-capacity links.Land cables are also
vulnerable, as in 2011 when a woman digging for scrap metal severed most connectivity
for the nation of Armenia.
Censorship
Internet censorship by country
Substantial censorship
Selective censorship
Changing situation
Little or no censorship
Not classified / no data
Pervasive censorship
Some governments, such as those of Burma, Iran,North Korea, the Mainland
China, Saudi Arabia and the United Arab Emirates restrict what people in their countries
can access on the Internet, especially political and religious content. This is
accomplished through software that filters domains and content so that they may not be
easily accessed or obtained without elaborate circumvention.
Internet Explorer
Explore the Internet
Internet Explorer bring many features to Windows Desktop.
The ability to browse the Web from anywhere on your computer, the customizable Links
toolbar, the Explorer bar, the content Advisor and security zones for browsing the Web
safely.
Getting started
With an internet connection and Internet Explorer, you find and view information about
anything on the web.
Basic set up
If you aren't connected to the Internet or you want to create a new connection, click the
link,
Set up an Internet Connection
The Internet connection Wizard will provide you an easy way to get connected to the
Internet.
14. .are web addresses that users have asked web browser to remember for
convenient access in future.
(a). Favorites (b) URL (c) hyperlink (d) Domain name (e) None of theseAns: (a)
15. Which of the following servers have hosted the first World Wide Web in Aug,1991?
(a) IBM (b) Apple (c) google.com (d) info.cern.ch (e) yahoo.com Ans. (d)
16. Who was the British Computer Programmer designed the WWW .?
(a) Tim Boners Lee (b) Stev Jobs (c ) Stev Vosniac (d) Jowani Karlose (e) None of
these Ans:(a) Tim Boners Lee
17. MapQuest and Yahoo! Are examples of Software?
a) Entertainment b) Web-based application c) educational d) Multi media e)None of
these Ans:b) Web-based application
18.A browser is a
Ans. Software program especially designed for viewing web pages on the Internet.
19. What is the term for unsolicited e-mail?
Ans. Spam
20.The code for a web page is written using.. Ans. Hypertext
21. What is E-Banking?Ans. E-Banking implies provisions of Banking products and
services through electronic delivery channels like ATM, phone, Internet, Mobile phones
etc.
22. By clicking on this icon one can access the networked resources. This icon is
Ans. Connect to Internet
23. A multi purpose window which opens nearly for everything is Ans. Browser
window
24. What is meant by AOL?
Ans. (a) America On-Line used to be the largest Bulletin Board system in the world. (b)
With the advent of AOL.v3.0, AOL has become the largest INTERNET provider in the
World (c) AOL is also the largest provider of Blank Diskettes in the World (d) AOL is
available only in large metro areas (e) All theseAns: (e)
25.Which of the following has been created by research facility of Digital Electronic
Corporation of USA?
Ans. Yahoo, Alta vista & Web Crawler
26. Firewall is used in communication network / system to save from .
Ans. a).it has high band width b). it is thin and light c). it is not affected by electromagnetic interference/power surges etc.(d) All of these (Ans: (d) all of these)
30. Conference (net scape), net meeting (internet explorer) enables ?
33. What is the name of the software that allows us to browse through web pages?
Ans. Browser
34. Which is the protocol automatically assign IP address to each computer as needed
by the network administrator ? Ans. DHCP
35. A set of security programs that protect a computer from outside interferences or
access via internet is. Ans. Fire wall
36. Which is the hypertext transfer protocol, which is giving importance to security, often
used in intra company internet sites? Ans. HTTPS
37. PDF is the acronym for ..
Ans. Portable Document Format
38. Which is the unique address which identify a computer in a network?
Ans. I P address
39. In which topology multiple communication channel exists between nodes?
Ans. Mesh
40. Which protocol is used for sending e-mail? ..
Ans. SMTP
41. Name the internet service used for publishing our idea ? Ans. Blogging
42. Introducing into a website without permission is.. Ans. Hacking
43. Which is the device used in network for strengthening or amplifying the signal ?
Ans. Repeater
44. Who is a Virus Author?
Ans. It is a malicious - logic program that hides within or look like a legitimate
program such as a screen saver.
47. What is an Antivirus program?
Ans. TCP/IP
51. Types of wired home networks includes all of the following except..?
Ans. (a) Ethernet (b) Powerline cable (c) Phoneline (d) WI-Fi (e) None of these
Ans: (d) Wi-Fi
52. What is a news group? Ans. It is an online area in which users have written
discussions about a particular subject.
53. A type of Peer to Peer network, called P2P file sharing Network describes;?
Ans. An internet network on which users connect directly to each others hard discs and
exchange files over the Internet.
54. What is a network topology?
Ans. It refers to the layout of the computers and devices in a communication network.
55. What is the function of a DSL modem..?
Ans. Sends digital data and information from a computer to a DSL line and receives
digital data and information from a DSL line.
56. ----- consists of single copper wire surrounded by at least three layers: an insulating
material, a woven or braided metal and a plastic outer coating.
Ans. Coaxial cable
57. What is a site license ?Ans. (a) it is a legal agreement that permit users to install
software on multiple computers usually at a volume discount (b) Power line cable (c)
Phone line (d) WI - Fi (e) None of these Ans. (a)
58. Which has been adopted as a network standard for internet communications?
Ans. TCP/IP.
59.Fibre optic cables have which of the following advantages?
Ans. Lower costs, easier installation and modification
60. A popular type of animation called.combines several images in to a single GIF
file.Ans. An animated GIF
61. Which of the following identifies any network based on the 802.11 family of
standards? Ans. Wi-Fi ( Wireless Fidelity).
62. What is a Network Interface Card (NIC)? Ans. It is an adapter PC card or a Flash
card that enables a computer or device to access a network.
63. What does World wide Web Consortium (W3C)do?
(a) Overseas research (b) set standards (c) sets guidelines for many areas of Internet
(d) All these (e) None of theseAns.(d) All these
64. What is Internet backbone? Ans. The major carriers of network traffic on internet
are collectively as the Internet backbone.
65. Visitors to which can customize all or some of the contents ?
Ans. It is a real time communication service that allows wireless mobile devices
to exchange messages with one or more mobile devices or online users.
71. What is the popular use of Wi-Fi standards?
Ans. In public interest access points that offer mobile, the ability to connect to the
internet with their wireless computers and devices.
72. Which is easier to install than ISDN and provides much faster data transfer rates?
Ans. DSL
73. A web address consists of which of the following?
(a) A protocol (b) Domain name (c) the path to a specific web page (d) or
location on a web page (e) All of these Ans: (e)
74. Which of the following new format which may eventually replace the GIF format?
Ans. It is a website that uses a regularly updated journal format to reflect the
interests, opinions and personalities of the authors and sometimes site visitors.
80. What is a Plug in?
Ans. It is a program that extents the capability of a browser.
81. What is a News group?
Ans. It is an online area in which users can have
written discussions about a particular subject.
82. What is a hot pot?
Ans. It is a wireless network that provides internet
connections to mobile computers and other devices.
83. What is TCP/IP ( Transmission Control Protocol/Internet Protocol)?
Ans. It is a network technology that defines how messages are routed from one end of a
network to the other ensuring that the data arrives correctly by dividing it into packets.
84. What is a cable modem?
Ans. It is a digital modem that sends and receives
digital data over the cable television (CATV) network.
85. What is latency ? .
Ans. It is the time a signal takes to travel from one location to
another on network.
86.What is a network topology?
Ans. Browser
100. Which is the protocol automatically assign IP address to each computer as needed
by the network administrator ? Ans. DHCP
101. A set of security programs that protect a computer from outside interferences or
access via internet is. Ans. Fire wall
102. Which is the hypertext transfer protocol, which is giving importance to security,
often used in intra company internet sites?
Ans. HTTPS
103. PDF is the acronym for .. Ans. Portable Document Format
104. Which is the unique address which identify a computer in a network?
Ans. I P address
105. In which topology multiple communication channel exists between nodes?
Ans. Mesh
106. Which protocol is used for sending e-mail? ..
Ans. SMTP
107. Name the internet service used for publishing our idea ?
Ans. Blogging
108. Introducing into a website without permission is..
Ans. Hacking
109. Which is the device used in network for strengthening or amplifying the signal ?
Ans. Repeater
110. Who is a Virus Author?
Ans. (a) Ethernet (b) Powerline cable (c) Phoneline (d) WI-Fi (e) None of these
118. What is a news group?
Ans. It is an online area in which users have written
discussions about a particular subject.
119. A type of Peer to Peer network, called P2P file sharing Network describes;?
Ans. An internet network on which users connect directly to each others hard discs and
exchange files over the Internet.
120. What is a network topology?
Ans. It refers to the layout of the computers and devices in a communication network.
121. What is the function of a DSL modem..?
Ans. Sends digital data and information from a computer to a DSL line and receives
digital data and information from a DSL line.
122. ----- consists of single copper wire surrounded by at least three layers: an
insulating material, a woven or braided metal and a plastic outer coating.
Ans. TCP/IP.
125. Fibre optic cables have which of the following advantages?
Ans. It is the process of transferring documents, graphics and other objects from
a computer to a server on the internet.
135. Which of the following are the examples of communication channels?
Ans. (a) Cable television lines (b) Telephone lines (c) both (a) and (b) (d) WI-Fi
(e) None of these Ans:(c) both (a) and (b)
136. What is a Wireless Instant Message?
Ans. It is a real time communication service that allows wireless mobile devices
to exchange messages with one or more mobile devices or online users.
Ans. In public interest access points that offer mobile, the ability to connect to the
internet with their wireless computers and devices.
138. Which is easier to install than ISDN and provides much faster data transfer rates?
Ans. DSL
139. A web address consists of which of the following?
(a) A protocol (b) Domain name (c) the path to a specific web page (d) or
location on a web page (e) All of these Ans: (e) All of these
140. Which of the following new format which may eventually replace the GIF format?
Ans. It is a website that uses a regularly updated journal format to reflect the
interests, opinions and personalities of the authors and sometimes site visitors.
146. What is a Plug in?
Ans. It is an online area in which users can have written discussions about a
particular subject.
148. What is a hot pot?
Ans. It is a network technology that defines how messages are routed from one
end of a network to the other ensuring that the data arrives correctly by dividing it into
packets.
150. What is a cable modem?
Ans. It is a digital modem that sends and receives digital data over the cable
television (CATV) network.
151. What is latency ? .
Ans. It is the time a signal takes to travel from one location to another on
network.
152. What is a network topology?
Ans. It stands for hyper text transfer protocol which is a set of rules that defines
how pages transfer on the internet.
154. If your computer keeps rebooting itself, then it is likely that
(1) It has a virus (2) it does not have enough memory (3) There is no printer (4)
There has been a power surge (5) It needs a CD-ROM Ans (1)
155. In MODEMS ..?
(1) Several digital signals are multiplied (2) digital signals is amplified (3) Several
digital signals are magnified (4) both (1) and (2) (5) A digital signal changes some
characteristic of a carrier wave Ans: (5)
156. In reality IT recognizes only
(1) A postal mail address (2) a location of host (3) Hub (4) FTP (5) Gif Ans: (3)
157 is the first Indian News Paper to be available on Internet. Ans. The Hindu
158..is the first Indian Magazine to be available on Internet. Ans. India Today
159.. is the first Malayalam News Paper started its Internet edition. Ans. Deepika
160 .is the first Indian political party which was created its website on internet. Ans.
.Bharatiya Janata Party (BJP)
161. TRON is the first computer graphics used movie (1982).
162. The first computer game is Space War.
163. ANANOVA is the first computer animated news reader
164. CDC 6600 is Worlds first Super computer.
165. Param 8000 is Indias first Super computer.
166. Tianhe-2 (MilkyWay-2) is Worlds fastest Super computer (China)(As on July
2014).
167. iDataPlex DX360M4 (developed by Indian Institute of Tropical Meteorology) is
Indias fastest Super computer (As on July 2014)
168. The first computer installed in India is HEC-2M at Kolkata (1955)
169. The first Computer made in India is Siddhartha. Manufactured by Electronics
Corporation of India.
170. The first Computer University in India at private sector is Rajeev Gandhi Computer
University.
171. First IT University in India- Ans: Jai Prakash University
172. A short range wireless technology used to connect and exchange information
between devices such as PCs, Mobiie. phones ,Laptops etc. is called Bluetooth
173. Email service provided by Microsoft is called Hotmail
174. Fire Walling is a protection scheme for data. It protects our information system
from unsecured public network.
175. Computer chips that have programs recorded on them are known as Firmware.
ROM, Flash memory, EPROM etc. are examples.
176. Pixel (Picture element) is the smallest controllable element of a picture represented
on the screen.
177. Resolution is the capability of a sensor to observe the smallest object clearly.
178. Storage capacity of a common DVD is 4.7 GB and of a standard CD 650 - 750 MB.
179. A collection of facts and figures are called Data.
180. Processed data is called information
181. Wireless fidelity (Wi-Fi) allows electronic device to exchange data wirelessly using
radio waves.
182. E-Commerce is a facility to conduct buying and selling of products and services
over electronic systems on computer networks.
183. Abacus is the first calculating in the world (China).
184. AIIMS is the first Indian hospital which used robot to conduct an operation.
185. One megabyte equals approximates Million bytes
186. When you are working on a document on PC, where is the Document temporarily
stored? - RAM
187. Information travels between components on the mother board through..- Buses
188. How are data organized in a spreadsheet? - Height and Width
189.Transformation of input into output is performed by?
-The CPU
190. .are called Modifier keys. - Ctrl, Shift and Alt
191.The .of a system includes the programs or instructions.
- Software
192. The computer which defeated Gary Kasparov at Chess is____
- Deep Blue
193. The primary purpose of software is to turn data into.- Information
194. Repair for known software, bug, which is generally available free of cost on internet
is called?
- Patch
*195. To what temporary area can you store text and other data, and later paste them to
another location?
- The clipboard
196. Highest honourable award in computer science is _____
- Turing Award
197. Storage that retains its data after the power is tuned off is referred to as.. - Nonvolatile storage
198. Cache and main memory will lose their contents when the power is off. They are
. - Volatile
199. Protecting data by copying it from the original source to a different destination is
called ? backup.
200. Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as.? - Applets
201. Which process checks to ensure the components of the Computer and operating
are connected properly? - Booting
202. Computer Memory is normally measured in: - Gigabytes
203. The difference between people with access to computers and the Internet and
those without this access is known as the: - Digital divide.
204. Word processing, spreadsheet, and photo-editing are examples of:
- Application software.
205. The main difference between application and system software is that:
System software manages hardware whereas application software performs user tasks.
206. If a large business is going to use a single computer to execute many programs for
hundreds of users at the same time, performing relatively simple operations and
transactions, the type of computer will probably be a..? - Mainframe
207.You must install a. on a network if you want to share a Broadband Internet
connection. Ans- Router
208.The most frequently used instructions of a computer program are likely to be
fetched from:Ans: Cache memory
209.____ helps to begin a paragraph with a large dropped initial capital letter
- Drop Cap
210. The errors that can be pointed out by the compiler are:
- Syntax error
211. By default, your documents print in mode.. - Portrait
212. . is considered as the backbone of the World Wide Web
- Hypertext transfer protocol (HTTP)
213. is a collection of web - pages and is the very first page that we see
on opening of a website?
- Website, Home page
214. Loading Operating System onto RAM is called? - Booting
215. Which term identifies a specific computer on the web and the main page of the
entire site? - URL
216. Virtual memory is Memory on the hard disk that the CPU uses an extended..?
RAM
217. A normal CD-ROM usually can store up to.? - 700 MB
218. A physical connection between the microprocessor memory and other parts of the
microcomputer is known as? - Address bus
219. A term associated with the comparison of processing speeds of different computer
system is point Bank? - MIPS
220..file starts MS Word. - Winword.exe
221. To get to the Symbol dialog box, click on the menu and choose Symbol.
- Insert
222. Superscript, subscript, outline, emboss, engrave are known as
- Font effects
223. Which command divides the surface of the blank disk into sectors and assign a
unique address to each one? - Format
224. Computer programs are written in a high - level programming language; however,
the human readable version of a program is called?
- Source code
225. The software tools that enable a user to interact with a computer for specific
purposes are known as? - Applications
226. When you turn on the computer, the boot routine will perform this test..?
- Power - on self-test
*227.Which storage media provides sequential access only?
- Magnetic tape
228. The quickest and easiest way in Word, to locate a particular word or phrase in a
document is to use the command..? - Find
229. Correcting errors in a program is referred to as? - Debugging
230. A is a device that not only provides surge protection, but also furnishes your
computer with battery backup power during a power outage..? - UPS
231. is the name of excel files
- Workbook
232. Example for a real-time operating system? - Lynx
233. The Internet ethical protocol is called. (A) net protocol (B) netiquette (C) net
ethics (D) net moralityAns: (B) netiquette
234. Commercial messages on the net are identified as
(A) Net ads (B) Internet commercials (C) Webmercials (D) Viral advertisements Ans:
(c) Webmercials
235. Manuel Castelle was the first to use the term
(A) Internet society (B) Electronic society (C) Network society (D) Telematic society
Ans: (c) Network Society
236. GIF stands for.
(A) Global Information Format (B) Graphics Information Format (C) Graphics
Interchange File (D) Graphics Interchange Format Ans: (D) Graphics Interchange Format
237. Which one of the following is not an Operating System?
(A) IBM AIX (B) Linux (C) Sun Solaris (D) Firefox Ans: (D)
69. When was Gopher and World Wide Web introduced for commercial pur poses in
Internet? In 1991.
70. Which is the first graphical interface of the Internet? Gopher.
71. Where Gopher was developed? In Minnesota University.
72. Where World Wide Web was developed? In European High Energy Physics
Lab, Geneva.
73. Who was the scientist behind WWW? The Bemers Lee.
74. Which software technique is used in WWW? Hypertext.
75. What is the other name of Hypertext? Hyper medium.
76. The term Cyberspace is used first in which science fiction? Neuromancer.
77. What is the name of the address that specify a particular network or a particular
host? Internet Protocol (IP) address.
78. The IP address is made up of how many numbers? Four Number. 79
Which makes a full Internet Address? When user name is combined with the P address.
80. What is Domain Name System - DNS? A secondary naming system based on name
schemes.
81. By which symbol user name is separated from the Domain name? Sym bol@.
82. What is the Internet system primarily intended for? Sharing information.
83. Which is considered as the original method used for finding informations on the
Internet? Serendipity.
84. Which Internet Protocol enables Internet users to log on to another computer linked
to the Internet? Telnet.
85. Which is the simple method for locating information? Browsing.
86. What is the name of the connection between one piece of information and another?
Hypertext.
87. What is the full form of WWW? World Wide Web.
88. Which system connects all the web sites of Internet and makes available for users
those web sites which are of similar character? WWW.
89. In WWW and enquiry of information reaches all web sites at which speed?
At the speed of light.
90. What is the function of the Uniform Resources Locator - URL? It defines the
location of the web document.
91. Which are the three methods through which we can access web sites? Directly
entering the URL address, using hypertext links and doing a web search forURL.
92. Where the Internet publications or informations are arranged? In the server
computers linked with the Internet.
93. Who introduced the Netscape navigation-browser? Netscape communications
corporation.
94. Which browser is meant for character based environment? LYNX.
95. What is the name of the initial page loaded when we start a browser? Home page.
96. What is the name of the special type of link represented by an image? Image map.
97. What is a usenet? A communication tool used in Internet.
98. What is the name given to a discussion group which can have a public dialog with
every one else on the network? News groups.
99. What is the name given to the electronic mail tagged with predetermined subject
headers? Article.
100. What does news group sci represent? Scientific Subject Groups.
101.What does news group rec represent? Groups aimed towards arts, hobbies and
recreational activities.
102. Define Graphics Tablets: This is a computer-based terminal used to create, store,
and print pictures. Using a stylus; pictures can be created and stored or printed on a
plotter.
103. What is known as Hypertext? It is a body of text where some or all of the
information is linked; so that when the user clicks on a word, he can find out more about
that word or be transported to another area of the document that contains related
information.
104. What is known as back bone of INTERNET? The system of connecting
computers by cables or satellites is called back bone of INTERNET.
105. What is World Wide Web? A hypertext- based system for finding and accessing
information on the Internet. The World Wide Web consists of a series ofpages of
information, many of which contain texts, colour graphics, and even sound and video
clips.
106. What is a Chat? A chat means to communicate with other users via the keyboard.
You require a chat client, such as Microsoft Chat, to connect to one of the thousands of
chat servers around the world or directly to another users computer.
107. What is HTTP (Hyper Text Transport Protocol)? The protocol that a Web server
and a browser use to communicate.
108. How many types of recipients are there in E-Mail system? There are three
recipients. They are TO recipient, CC recipient and BCC recipient.
109. Who is a TO recipient? The recipient who is to take some action due to the
message.
110. Who is a C recipient? The recipient who receives a courtesy copy in E-Mail
system.
111. Who is a BCC recipient? The recipient who receives Blind Carbon Copy of the Email.
112. What is the speed by which a message is passed in E-mail? With the speed of light
113. What are the three steps in sending a mail message to another user? 1.
Composing a mail message. 2. Putting it in the despatch queue. 3. Physically sending it
to the Xee mail center.
114. How fast do E-Mail message travel? E-Mail messages travel in light speed.
115. What does CBMS stand for? CBMS stands for Computer Based Message Sender.
116. What is Download? To transfer files to your computer from another computer via a
modem. The opposite term is upload.
117. What is Information Superhighway? It is a worldwide communications network that
promises to bring multimedia services into the users home via high-capacity fibre-optic
cable. The Internet is sometimes seen as a prototype for the information superhighway.
It is also known simply as the superhighway.
118. What is Modem? A device that enables computers to communicate with each other
over a telephone line.
119. What is Anonymous FTP? An FTP server that enables any user to log on and
download files. You use anonymous for the user name and you e-mail address for the
password. Usually used for the public distribution of files-drivers, updates, patches, an
so on.
120. What does IP stand for? Internet Protocol.
121. Which are the most widely used online information services? Compu Serve,
America Online (AOL), Prodigy.
122.What are the specialties of CompuServe? It is the oldest of the remaining
commercial on-line service and
has access numbers in 185 countries. 123.What are the most widely used
Internet services? E-mail, Mailing lists, Usenet newsgroups.
124. What are the items consisted in Domain address? Name of the major server or
site, the sub domain, domain.
125. What are the common domain names used in the U.S.? mu., gov, corn, edu, net,
org. I
126. What is called a document on the Web? Web page.
127. Is Browser a piece of hardware or software? Software;
128. What are the uses of a Browser?
Record a history of where you have visited, save-download-print-copy-view
Web content, read and send mail. 129. When was Netscape navigator introduced?
1996.
130. What are the important things to be considered while selecting a modem?
Speed, standard and compatibility.
131. What are the different types of modems? Internal modem, External modem and
PCMCIA Card/PC card modem.
132. Define various speed employed in modems? 9600 kbps, 28,800 kbps, 56,000
kbps.
133. What are the compatibility standards for 28,800 kbps speed modem? V.31, V.33,
V.32, V.34.
134. What are the essential HTML tags for a page? <HTML>, <HEAD>, <TITLE>,
<BODY>, <P>.
135. What is SIG? It is an E-mail discussion group and a technical discussion group
sponsored by ACM.
136. What does CRC stand for? It stands for Cyclic Redundancy Check.
137. What does AD stand for? Administrative Domain.
138. What does BIND stand for? Berkely Internet Name Domain.
139. What does BGP stand for? BootStrap Protocol.
140. What are the Boolean operators of the Internet? ADJ, AND, OR, XOR, NAND,
NOT, etc.
141. What is meant by CompuServe Information Manager (CIM)? It is a program that provides a graphical Interface for CompuServe and it supports both
Macintosh and Windows.
142. What is meant by INET? It isan annual conference put on by the Internet society
and an acronym for Internet.
143. What is Mail list? It is a server program that automatically responds to mailby
sending information or performing functions specified in the incoming mail.
144. What is known as Netscape? It a widely used Web Browser.
General
1. What does the term BASIC stand for?
BASIC is Beginners All-purpose Symbolic Instruction Code.
2. What is algorithm? Algorithm is a set of instructions, arranged in a specific order to
solve a particular problem in a finite number of steps.
3. What does the term DBMS stand for? DBMS - Data Base Management Sys
tem.
4. What is meant by E-Mail? E - Mail (Electronic Mail) is a way to send text based
messages and files to any computer with an address on Internet.
5. Which cities are known as Silikon Valley and Infotech city? Bangalore is known as the
Silikon Valley of India. Silikon Valley in USA is the Mecca of Computer. Hyderabad is
the Infotech city in Indin.
6. What is meant by Firmware? Firmware is software substituted for hardware and
stored in ROM (Read Only Memory). Firmware is also known as Micro program.
7. What does the term EPROM stand for? EPROM - Erasable Programmable Read
Only Memory.
8. Which is the lirst boOk on computer that won Pulitzer Prize? The book about
computers, which won a Pulitzer Prize, is Soul of new Machines written by Tracy Kidder.
9. Who is the author of the book titled as The Ninth Bridge? Charles Babbage was the
author of The Ninth Bridge Water Treatise.
10. The worlds largest bookstore. AMAZON. COM is the worlds largest bookstore.
11. What does the term E-maIl stand for? E - Mail is the Electronic Mail.
12. What is Internet? A network of computers.
13. What are the other more popular names of Internet? Cyberspace and Information
Super Highway.
14. Who is the author of the science fiction titled Neuromancer? William Gibson.
15. William Gibson used the term Cyberspace to denote which process?
The communication between human brain and computer through cables.
16. Define KB, MB and GB? KB means KiloByte. One KB is equal to 1024 bytes. MB
means megabyte and 1024-KB
Chapter 14
MICROSOFT POWERPOINT
Microsoft PowerPoint, usually just called PowerPoint, is a proprietary commercial
presentation program developed by Microsoft. It is part of the Microsoft Office suite,
and runs on Microsoft Windows and Apple's Mac OS X operating system.
The current versions are Microsoft Office PowerPoint 2010 for Windows and Microsoft
Office PowerPoint 2011 for Mac.
HISTORY
Originally designed for the Macintosh computer, the initial release was called
"Presenter", developed by Dennis Austin and Thomas Rudkin of Forethought Inc. In
1987. It was renamed to "PowerPoint" due to problems with trademarks, the idea for
the name coming from Robert Gaskins. PowerPoint presentations consist of a number
of individual pages or "slides".
Custom Animations
PowerPoint provides three types of movements:
Entrance, emphasis, and exit of elements on a slide itself are controlled by what
PowerPoint calls Custom Animations.
Transitions, on the other hand, are movements between slides.
These can be animated in a variety of ways.
Custom animation can be used to create small story boards by animating pictures to
enter, exit or move.
Microsoft Power Point 2010
PowerPoint 2010 has changed from its predecessor.
Screen Capturing has been introduced, allowing you to take a screen capture and add it
onto your document.
Also, you can now remove background images and you can add special effects, such
as 'Pencil effects' onto pictures.
Plus, new transitions are available.
However, the ability to apply certain text effects directly onto existing text, seen in
Microsoft Word is not available; a separate Word Art text box is required.
32-bit or 64-bit version of Microsoft Office
By default, Microsoft Office 2010 installs the 32-bit version of Office 2010 even if your
computer is running 64-bit editions of Windows.
Note: If you already have a 64-bit version of Office installed on your computer running
a 64-bit operating system, the default installation is the 64-bit version of Office.
The 32-bit version of Office 2010 is the recommended option for most users, because it
prevents potential compatibility issues with other 32-bit applications, specifically thirdparty add-ins that are available only for 32-bit operating systems.
bookmark link What is in the 32-bit version of Office but is not included in the 64-bit
version of Office?
What is in the 32-bit version of Office but is not included in the 64-bit version of
Office?
ActiveX controls library, ComCtl This library contains ActiveX controls that are used to
build solutions. It is most commonly used in the following Microsoft Office programs:
Access, Excel, and Word.
Share Point List control The list view in SharePoint Technology is not available to
people using the 64-bit version of Office.
3-D Pivot Chart views in Excel Three-dimensional (3-D) Pivot Chart views in Excel are
not available in the 64-bit version of Office. Two-dimensional (2-D) charts are available.
Ans. Clip art images have one or two key words associated with the entities, activities,
labels and emotions displayed in the image.
7. A print out of the presentation outline is often used as ?
Ans. An audience handout.
8. Power point users can insert which of the following items in presentation?
Ans. (a) art work (b) multi media effects ( c) picture & photos (d) sounds and movies (e)
all these
9. The slide show button allows a presentation to be displayed ...?
Ans. (a) using a projection device attached to a personal computer (b) by using a
computer ( c) using computer acting like a overhead slide projector (e) all these
10. help to create a presentation quickly and efficiently by allowing the user to answer
prompts for specific content criteria ?
Ans. Wizard .
11. Power point uses which slide until the user select a style?
Ans. Default Design Template.
12. How is the insertion point look like?
Ans. A blinking vertical line
13. A saved presentation is referred to as a
14. Clicking the Redo button.?
Ans. Reverses the last undo action.
15. The tab provides a quick, easy way to create a presentation ?
Ans. (a) outline (b) templates ( c) layouts (d) text layout (e) all these
16. In order to see the results of your changes...?
Ans. (a) it is best to change the view to normal view when altering the slide layouts
17. Once clip art is inserted in to a slide ?
Ans. It can be repositioned.
18. Using the in Power point a user can form and modify diagrams using
shapes such as arcs, arrows, cubes etc. ?
Ans. Drawing feature .
19. Which is the most common presentation in Power Point ?
Ans. Text Slide consisting of a bulleted list.
20. A.provides consistency in design and color through out the presentation.
Ans. Design Template
21. A slides zoom setting affects.?
Ans. The portion of the slide displaying in the slide pane.
22. In Power Point, slide show view restrict the users evaluation to how many slides at a
time ?
Ans. (a) one (b) two ( c) Three (d) Four (e) Five
23. Power Point slide layout specifies what...?
Ans. (a) the arrangement of placeholders on a slide (b) virtual presentation on the
internet ( c) using overhead transparencies (d) all these (e) none of these
24. Which feature offers a quick way to add professional looking graphic images to a
presentation without creating the images yourself ?
Ans. Clip Art.
25. What is the aspect Ratio of an object?
Ans. It is the relationship between the object height and width.
45. Which view in Power Point can be used to enter speakers comments?
Ans. (a) Normal (b) Slide show (c) Slide sorter (d) Notes page view (e) None of these
46. Which key on the Key Board can be used to view slide show?
Ans. (a) F1 (b) F2 (c) F3 (d) F5 (e) None of these
47. To insert a new slide in the current presentation, we can choose.? ?
Ans. (a) Ctrl + M (b) Ctrl+H(c) Alt + F1 (d) Shift + I (e) None of these
48. Animation scheme can be applied to .. In the presentation?
Ans. (a) All slides (b) select slide (c) current slide (d) None of these (e) All these
49. Ellipse Motion is a pre-defined.?
(a) Design Template (b) Color Scheme (c) Animation Scheme (d) All of these (e) None
of these
50. 11. Which type of fonts are best suited for titles- and headlines?
(a) Serif Fonts (b) Sans Serif Fonts (c) Text Fonts (d) Picture Fonts (e) None of these
51. Which type of fonts are best suited to display large amount of text?
a) Serif Fonts (b) Sans Serif Fonts (c) Text Fonts (d) Picture Fonts (e) None of these
52. A chart can be put up as a part of the presentation using?
(a) Insert ->Chart (b) Insert ->Picture Chart (c) Edit ->Chart (d) View -> Chart (e) None
of these
53. We can replace a font on all slides with another by using the option.
(a) Edit ->Fonts (b) Tools ->Font (c) Tools->Replace Fonts (d) Format->Replace Fonts
(e) None of these
54. Which option in Power Point allows to carry slides from one computer to another?
(a) Save as (b) Save and Go (c) Pack and Go (d) Web and Go (e) None of these
55. The boxes that are displayed to indicate that the text, pictures or objects are placed
in it is called.?
Ans. (a) Placeholder (b) AutoText (c) Text box (d) Word Art (e) None of these
56. Which option can be used to set custom timings for slides in a presentation?
(a) Slider Timings (b) Slider Timer (c) Rehearsal (d) Slide Show Setup (e) None of
these?
57. Which option can be used to create a new slide show with the current slides but
presented in a different order?
(a) Rehearsal (b) Custom Slide Show (c) Slide Show Setup (d) Slide Show View (e)
None of these
58. After choosing a predefined template, which option has to be chosen to change the
background color?
(a) Color Scheme (b) Animation Scheme (c) Design Template (d) Color Effects (e) None
of these
59. Which of the following is an example for Automatic Text formatting? (a) Underlining
Hyperlink (b) Adjusting extra space (c)) Rep1acing two -s with an em hyphen (d) All of
these (e) None of these
60. Which of the following button is absent in the formatting toolbar in PowerPoint?
(a) Left Align (b) Right Align (c) Center (d) Justify (e) None of these
61.Which of the following wizards & templates exist in PowerPoint?
(a) Auto content wizard (b) Template (c) Blank presentation (d) All of the above (e) None
of the above
62. Which of the following view is not present in PowerPoint?
(a) Normal (b) Outline (c) Slide sorter (d) Slide show (e) None of these
63. To duplicate a slide using the edit menu we have to go to:
(a) Normal View (b) Slide sorter View (c) Slide show View (d) Any of the above (e) None
of the above
64. Which of the following key (s) is/ used to run a presentation in a Power point ??
Ans. (a) F5. (b) F4 (c) F3 (d) F2 (e) F3
65. The auto content wizard consists of.steps?
(a) 5 (b) 6 (c) 7 (d) 8 (e) None of these
66. There are a total of __________ action buttons in PowerPoint:
(a) 12 (b) 15 (c) 16 (d) 18 (e) None of these
67. To prevent a slide from being displayed during the slide show we :
(a) have to delete the slide (b) can hide the slide by using the animation button (c) can
hide the slide by using the slide show menu (d) any of the above (e) None of the above
68. 30. Which command is used to quit PowerPoint:
(a) Alt + F4 (b) Alt + Shift + F4 (c) F4 (d) Either (a) or (b) (e) None of these
69.The maximum number of slides allowed in one presentation or slide show is
- No maximum limit
70. To find a text in your presentation :- Select Edit; select Find; in the box type text you want to find; click find all
71. To find and replace text in your presentation
- Select Edit; select Replace
72. To add a duplicate slide to your powerpoint presentation :- Select Insert; select Duplicate Slide
73. The presentation created has the default extension of? - .ppt
74.The view where you can type speaker notes to use during your presentation/you can
also print a copy of your notes for reference is : - - Notes Page view
75. The view that is normally used to see the contents of your presentation and to
organise ideas for your presentation; you can see your main points flow from slide to
slide is :- - Outline view
76. The view that lets you rearrange your slide in your presentation easily (you can see
your entire presentation so you can easily add, delete and move slides) :- Slide Sorter view
77. To delete the slide from presentation : - In the Slide Sorter view; select the slide; hit delete key
78. To move a slide in the order of the presentation :- In the Slide Sorter view; select slide; click Cut icon on Standard toolbar; place
cursor between slides where you want to move the cut slide; click Paste icon on
Standard toolbar
79. To insert Clip from Clip Art in the slide :- Select Insert; select Picture; select Clip Art; select category and the clip that you
want to insert; select Insert
80. To insert picture in your slide
- Select Insert; select Picture; select From file; select Clip Art to be inserted; select
0 K
81. To add table in your slide :- Select Insert Table on Standard toolbar and select number of rows and columns
Computer Terminology
Glossary of Technical Terms
AAA: It is the short for Authentication, Authorization and Accounting. It is a system in
IP-based networking to control what computer resources users have access to and
keep track of the activity of users over a network. The AAA services often require a
server that is dedicated to providing the above- mentioned three services. RADIUS is an
example of an AAA service.
Absolute address:
It is a fixed address in memory. The term absolute distinguishes it from a relative
address, which indicates a location by specifying a distance from another location.
Absolute addresses are also called real addresses and machine addresses.
Access Code: It is the same as password, a series of characters and numbers that
enables a user to access a computer.
Access Level:
In computer BIOS settings for Intel desktop boards, Access Level is a maintenance
option that displays the current users access level.
Access Time:
The time a program or device takes to locate a single piece of information and make it
available to the computer for processing. The access time for disk drives includes the
time it actually takes for the read/write head to locate a sector on the disk (called the
seek time). This is an average time since it depends on how far away the head is from
the desired data.
Access:
It means visiting a Web site, the act of reading data from or writing data to a storage
device and when capitalized as Access, it refers to Microsoft Access.
Account name:
It refers to your login ID or user ID. The word you type at the login prompt is your
electronic name.
Account:
It is your subscription to a networked computer system.
Accounting software:
It refers to a class of computer software or programme that helps accounting
professionals mange accounts and perform accounting operations.
Active Cell:
It is the cell in a spreadsheet programme, such as MS Excel, that you are working in
and identified by a thick dark border. When an action takes place in the spreadsheet,
such as data entry, formatting, or deleting data, it is the active cell that is affected.
Address bus:
A collection of wires connecting the CPU with main memory that is used to identify
particular locations (addresses) in main memory. The width of the address bus (that is,
the number of wires) determines how many unique memory locations can be addressed
Address: It is a character or group of characters that identify a register, a location or
some other data source or destination usually in main memory or on a disk. You can
think of computer memory as an array of storage boxes, each of which is one byte in
length. Each box has an address (a unique number) assigned to it: Disks are divided
into tracks and sectors, each of which has a unique address. Usually, you do not need
to worry about addresses unless you are a programmer.
ADP: It is short for Automated Document Feeder. As the name suggests, it is used to
automatically feed pages into the scanners and copiers. This helps in facilitating faster
work as each individual page does not need to be fed into the copier or scanner.
ADSL: It is short for Asymmetric Digital Subscriber Line, which is a type of broadband
communications technology used for connecting to the Internet. It allows more data to
be sent over existing copper telephone lines, when compared to traditional modem
lines. It supports data rates of 1.5 to 9 Mbps when receiving data (known as the
downstream rate) and 16 to 640 Kbps when sending data (known as the upstream rate).
AGP: It is short for Accelerated Graphics Port/Advanced Graphics Port. This is a
graphics card extension port used to attach a graphics card to a computers
motherboard: It is used with games and applications to store and retrieve larger and
better 3D shapes and textures.
AIFF:
It is short for Audio Interchange File Format, a common format for storing and
transmitting sampled sound. The format was developed by Apple Computer and is the
standard audio format for Macintosh computers. AIFF files generally end with a .AIF or
.IEF extension.
AJAX:
It is short for Asynchronous Java Script. It is used to create web pages that are more
interactive and usable. This is done using HTML and Cascading style sheets,
Alert Box: The little box that pops up to inform you that the computer you are working
on is about to perform an operation which may have damaging consequences, is called
the alert box. Usually you can make it go away by a click of the buttons available on it or
by using the mouse.
Algorithm: A process or set of rules to be followed in - calculations or other problemsolving operations, especially by a computer. We use algorithms every day. For
example, a recipe for baking a cake is an algorithm. Most programs, with the exception
of some artificial-intelligence applications, consist of algorithms.
Alignment: The arrangement of text or graphics relative to a margin. The text can be
right-aligned, centered, left-aligned, or fully aligned (justified).
Analog
It describes a device or system that represents changing values as continuously
variable physical quantities. When used in reference to data storage and transmission,
analog format is that in which information is transmitted by modulating a continuous
transmission signal, such as amplifying a signals strength or varying its frequency to
add or take away data. For example, telephones take sound vibrations and turn them
into electrical vibrations of the same shape before they are transmitted over traditional
telephone lines.
Animation
A simulation of movement created by displaying a series of pictures or frames. Cartoons
on television are the examples of animation. Animation on-computers is one of the chief
ingredients of multimedia presentations.
Animator
An individual artist who creates an animation. He/she decides how a model will move,
what a scene looks like, and also what software and tools will be used for production.
Anti-virus
It is a type of computer software that scans files, searches for and gets rid of computer
viruses and other harmful software.
Archive: It is the practice of copying programs and data onto an auxiliary storage
medium (flash, disk, tape, etc.) for long-term retention.
ARPANET: The precursor to the Internet which was a large wide-area network created
by the United States Defense Advanced Research Project Agency (ARPA) Established
in 1969, it served as a test-bed for new networking technologies, linking many
universities and research centres,
Arrow Keys: It refers to the keys on the keyboard used to move the cursor up, down,
left, or right.
Assembler: A program that translates programs from assembly language to machine
language.
Assembly language: It is a low level programming language using the human
readable instructions of the CPU It consists of instructions that are mnemonic codes for
corresponding machine-language instructions. Machine languages consist entirely of
numbers and are almost impossible for humans to read and write.
ATA: It is short for Advanced Technology Attachment. The drive controller is directly
connected to the drive, using ATA, which is a type of disk drive A specific controller is
not required to support the drive as the ATA hard drive is enough for the computer,
provided the motherboard supports an ATA connection.
ATM: It is the short form for Asynchronous Transfer Mode a network technology based
on transferring data in cells or packets of a fixed size: The cell used with ATM is
relatively small compared to units used with older technologies which allow ATM
equipments to transmit video, audio, and computer data over the same network, and
assure that no single type of data hogs the line.
Attachments: It refers to a file attached to an e-mail message when you send it to
someone else.
AUP: It is short for Acceptable Use Policy. It is a contract speci1ing what a subscriber
can and cannot do while using an Internet Service Provider (ISP)s service and contains
things like liability disclaimers, lists of actions or behaviour that will result in the
termination of a customers account.
Authentication: It is the process of identifying an individual, usually based on a
username and password. Authentication is based on the idea that each individual user
will have unique information that sets him or her apart from other users.
Authorisation: It is the process of granting or denying a user access to network
resources, once the user has been authenticated through the username and password.
The amount of information and the amount of services the user has access to depend
on the users authorization level.
ABACUS:
The earliest known computing device in which beads are moved along wires set in a
wooden frame.
Algorithm: The step by step procedure in defined terms to perform a work.
ANALOG:
Representation and measurement of numerical data by continuously variable physical
qualities.
Eg. There are infinite numbers between one and two. (See DIGITAL)
APPLICATION SOFTWARE: A computer program compiled for some specific purpose
such as word processing, desktop publishing or communications.
ARROW KEYS: Keys used to move the cursor to the four directions left, right, up and
down.
ARTIFICIAL INTELLIGENCE: The science of making machines that can reason like
human beings.
ANALYTICAL ENGINE: Mechanical calculating machine developed by Charles
Babbage in 1833. It is considered as the proto type of computer.
ANIMATION : Process of making an object appear to move by rapidly displaying a
series of pictures of it.
Antivirus program: It is a utility that protects computer against viruses by identifying
and removing any computer viruses found in memory, on storage media or on incoming
files.
Backup system: It is a way of storing data to a second medium as a precaution in case
the first medium fails. Even the most reliable computer is apt to break down eventually.
So, to be safe, you should keep one backup in a different location from the others using
operating system commands, or you can buy a special-purpose backup utility. Backup
programs often compress the data so that backup require fewer disks.
Bandwidth: Bandwidth refers to the amount of data that can be transferred through
either a modem connection or network within a stipulated time. It is measured in two
waysin analog devices, Hertz or cycles per second is used whereas in digital devices
it is represented in Bits per second (bps) or Bytes per second.
BASIC: It is short for Beginners All-purpose Symbolic Instruction Code. It is a highlevel programming language which was developed in the mid-1960s and was easy to
understand and simple to use. Numbers were originally used at the beginning of each
instruction to tell the computer the order in which to process the instruction. Now-adays, Loops are used to provide instructions.
Baud Rate: The baud indicates the number of bits per second that are transmitted.
The higher the baud rate the faster data is transferred.
Bcc:
It is the short for Blind Carbon Copy, which comes along with commands To and Cc
and appears while an email is being sent. M e-mail address written in the Bee box will
enable the mail to be sent to the recipient without the knowledge of the main recipient.
Beta test:
A test for a computer product prior to commercial release. Beta testing is the Last stage
of testing, and normally can involve sending the product to beta test sites outside the
company for real-world exposure or offering the product for a free trial download over
the Internet. Beta testing is often preceded by a round of testing called alpha testing.
BACK SPACE: Key that moves the cursor one place to the 1eft erasing the character.
BASIC: Beginners All -purpose Symbolic Instruction Code, an easy - to learn computer
language using simple words and symbols.
BASIC STATEMENT: The unit of a BASIC program. In BASIC, each instruction given to
the computer is a statement.
BINARY DIGITS: Either the character 0 or 1, the digits in the binary numeral system.
BIT: Abbreviation for Binary Digit.
BLANK PRESENTATION: An empty square space in the software to prepare display
slides.
BOOTING: To start or restart a computer system by loading part of the operating
system into the main memory of the computer.
BYTE: Short for binary digit eight. Unit of memory.A group of eight bits.Represents a
letter, symbol or space.
CAPS LOCK: A key used to Shift alphabet characters from lowercase to UPPER
CASE.
CD DRIVE: A drive, like a Floppy disk drive in which a CD-ROM is used.
CD-ROM: Short for Compact Disc-Read -Only Memory. An optical disc (120 cm in
diameter and 1.5mm thickness) which can store 650 megabytes of information.
CHARLES BABBAGE: The inventive genius of the 19th century who designed and
made mechanical calculating machines. He is known as the father of computer.
CLICK: Press and release left-mouse button once.
CLIP ART: A collection of ready- to-use pictures that can be used in documents created
using a computer.
CLOSE: To stop the running of a program.
COMMUNICATION : Transfer of information between a transmitter and a receiver.
COMPUTER LANGUAGE: A set of rules or conventions for instructing the computer.
BASIC, COBOL and JAVA are some of the computer languages
COMPUTER PROGRAM: A sequence of detailed instructions used to direct the
operations of the computer.
COPY: To reproduce data in a new location or other destination, leaving the source data
unchanged.
COPYRIGHT: Right of a person or institution on original creations, pictures, video
clipping and. software. Copyright prevents others from using these material without
permission of the copyright holder.
CPU (Central Processing Unit): Short for Central Processing Unit. It is the computers
brain. it is an integrated circuit that carries out computation& and logical operations.
CURSOR: A movable mark used to indicate a users position on the computer screen.
CUT: Removing a file or part of a file for pasting elsewhere.
DEFAULT: A present value, option or setting applied by a programme unless the user
specifies otherwise.
DELETE KEY: Key that deletes a character or selected text or graphics.
DESK TOP: The screen seen when the operating system is ready for work.
DIALOGUE BOX : The small pop-up windows in some application programs, usually
containing a question that requires a response from the user.
DIGITAL: Having a discrete set of values, as opposed to a continuous set of values.
(See ANALOG)
DIGITAL CAMERA: A camera which uses digital technology to capture images, instead
of a photographic film. The digital image is stored in the cameras memory and this can
be transferred to an outside storage device such as a hard disk.
DIRECTORY: A list of all the files on a disk. Also called folder.
DISK DRIVE: A device that holds a floppy disk or a hard disk and reads and writes data
using a read/ write head.
DOCUMENT AREA/CLIENT AREA: Area in window for preparing text or image.
DOCUMENT: Collection of information or text prepared using a software,
DOT MATRIX PRINTER: A printing device which prints characters as a pattern of
closely-spaced dots produced by a set of tiny pins.
DOUBLE CLICK: Two quick clicks on a mouse button without moving the mouse. Used
for starting a program or program feature shown through icons.
DRAG: Pressing the mouse button, holding it and then moving the mouse. An image or
block of text can be moved by dragging.
DTP: (Desk Top Publishing) : Desktop Publishing. Using personal computer and
graphics software to design, and print pages complete with pictures and text
EDIT : Method of modifying data in files (eg. insert, cut, copy, paste etc.)
EDIT MENU: Menu showing options for editing text and pictures (cut. copy, paste etc)
Open Source Software: is provided for use, modification and redistribution and has no
restriction from the copyright holder. It can be usually downloaded from the web at no
cost.
ELSE IF: Command in BASIC, applied when the condition following IF is not satisfied.
E-MAIL : Short for electronic mail. A method for sending message by the use of
computers and telecommunications.
END : Instruction in BASIC to show that the program is over.
END KEY: The key which moves the cursor to the send position defined by the
application program.
ENTER: Inputting data into the computer through the key board.
ENTER KEY: The key, when pressed, transmits instruction to the computers. When it is
pressed the cursor will move to the beginning of the next line.
ERASE: Erasing data from floppy disc or hard disc.
ERROR: A mistake causing a computer program to produce incorrect results.
Exit: to stop the operation of a program and switch back to the operating system of the
computer.
Electronic Mail: It refers to the process of sending, receiving, storing and forwarding
textual messages in digital form through telecommunication channels.
Electrostatic printer: It is a non-impact printer. It prints dot-matrix characters one at a
time with the help of wires or pins that supply electrical charge in the desired patterns
on to an aluminum coated paper.
Electrostatic storage: It refers to a storage medium, as for the screen of a CRT, that
stores hits in the form of charged areas.
Electro thermal printer: It is a high-speed printer. It makes use of heated elements to
create characters as matrices of small dots on heat sensitive paper..
Element: It refers to an item of data within an array or a matrix.
E.M.I: Electro-Magnetic Interference.
Emmiter coupled logic: It is a type of logic circuit generally used in high speed
computers.
Emulate: To imitate one hardware system with another with the help of an electronic
attachment. The imitating system behaves exactly in the same way as the system
imitated.
Emulation: To act exactly like another e.g., a computer that emulates another has the
same physical, electrical properties. Emulator is a device that is used in conjunction with
special routine and it enables the computer in executing the machine language
programs written for another computer of dissimilar design without any prior translation.
It generally consists of stored logic in a read only storage unit, that interprets and
stimulates the functions of each instruction in the original computer program.
Encipher: It means to change the information according to certain well defined rules so
that it can not be read without the knowledge of these rules.
Encode: Means to convert data into a code.
Encoder: It is the circuit that carries out the work of encoding.
Encryption: It refers to the process of changing a message in such a way that it
becomes incomprehensible to anyone except to those who have the key to its
decryption.
End: It is a programming statement that signals the end of statement to be executed at
the end of the program.
End-effector: It refers to the hand attached to the manipulator of robot. It is also called
gripper.
End-mark: A code used when working with a stream of data when it is necessary to
indicate the end of various items
End user: It refers to any person who uses computer with software. Programmers are
generally not considered as end-users.
Enter key: A key on some keyboard that is used to transfer the lines of data that have
just been typed to the computer for processing and to return the cursor to the firstposition on the next line.
Entity: Refers to any object that has some meaning for a specific application.
Entry: It refers to the process of inputting data.
E.O.B: End Of Block.
EOD : End of Day
E.O.F: End of File.
E.O.J: End of Job.
E.O.M: End of Message.
E.O.T: End of Transmission.
E.P.O: Emergency Power off.
E.P.R.O.M: Erasable Programmable Read Only Memory.
Erasable: It is a method of storing information that permits you to erase the same
information e.g., magnetic tape, floppy tape, etc.
Erase: To remove data from storage without replacing it.
Ergonomics: It is the study of the physical relationships between people and their work
environment.
Error: Refers to any discrepancy between a computed, observed or measured quantity
and the true or theoretical value. Error can be due to mistakes in programming or due to
faulty equipment or human mistakes.
Error-message: A programmer can put a message on the screen to show wrong when
ever an error occurs. Such a wording is called error-message.
Escape character: It refers to a character that causes the character that follows it to be
interpreted differently from those preceding it.
Event: It refers to an occurrence during the execution of a task.
Excel: It is a page mating DTP software.
Execute: Means to run a program on computer.
Exerciser: It is a device that enables users to create and debug programs and
hardware interfaces manually.
Exit: It is that point in an algorithm or a program from which control is transferred
somewhere else.
Exit point: It is the address of the instruction in a program that transfers control to a
subroutine.
Extension: Additional features added to a programming language or computer system.
External reference: Reference to a symbol defined in another routine.
Extraction: The process of selecting various components from a storage unit.
Face maker: It is a piece of software. It is used on Commodore -64 home computer. It
develops the childs talent for creative design.
FACES: Face Analysis Comparison and Elimination System.
Facsimile: It refers to the scanning of a document and converting the shading into
signals that can be transmitted with the help of wires or radio waves. A copy of the
original document is then created with the help of these signals.
Fail safe: It is a system designed to avoid catastrophe, possibly at the expense of
convenience.
Fan-in: It refers to the number of input uints (mostly fixed) to a logic gate or logic
device.
Fatal error: It prevents the execution of a program and causes processing to cease.
Fault tolerant: Provided with back up circuits in such a way that in case of failure
duplicates would automatically switch on. In many cases a duplicate circuit repeats the
activity of its main circuit so that no loss of data occurs during the switch over.
Fault tolerant:
Provided with back up circuits in such a way that in case of failure duplicates would
automatically switch on. In many cases a duplicate circuit repeats the activity of its main
circuit so that no loss of data occurs during the switch over.
F.D.M: Frequency Division Multiplexing.
F.E.A: Finite Element Analysis.
Feed: It refers to the movement of computer text by one line. The inclusion of feeds in
text output to printers ensures that the printer moves down a line after it prints each line
of text on paper. Line feeds are generally used in conjunction with carriage returns.
F.E.I: Federation for Electronic Industries (India).
Fetch: It refers to a command for accessing an instruction in a specified memory
location for purpose of decoding and execution.
F.G.C.S: Fifth Generation Computer System.
F.I.F.O: First In first Out.
Fileconv: It is a data conversion software. It is used to convert data in one language
format to another languages.
FILE: Collection of related records treated as a basic unit of storage. To handle files and
distinguish between them,, the files are to be named.
Finesse: A DTP software.
FIPS: Federal Information Processing Standard.
Firm ware: Refers to programs that are held in read only memories (ROM). Such
program can be accessed quickly and are not- lost when the machine is switched off.
First generation computers: Refers to computers started in 1940. Such computers
used electronic valves. Some such computers are EDSAC, EDVAC, ENIAC, etc.
Fixed length riles: They store record in such a way that the application program can
reach for them directly without reference to any other record.
Fixed point arithmetic: It involves having the decimal point of every number in the
correct place. It is possible to set the position before a calculation.
Flag: It is an indication in the program to mark an unusual event or show the existence
of a certain condition. It is generally a single bit which is set to on or off as the program
executes.
Flip flop (FF): An electric circuit element capable of exhibiting either of two stable
states and of switching between these states in a reproducible manner. They are one bit
memory elements. They are frequently used in digital circuits.
Flippy: Double sided floppy.
Floating point notation: A representation of real numbers that enables both very small
and very large numbers to be conveniently expressed.
Floppy disk: It is a flexible magnetic disk that is used for supplying and storing data for
a micro computer. Disk may be single or double sided.
Flow chart: It is a pictorial description of time sequenced activities and logic to be
performed by computer for carrying out data processing on computer, such charts are
used by programmers to start programming activity before actual programmes are
written.
MINIMISE BUTTON: A button for reducing a window to the form of an icon. When the
mouse pointer is clicked on this icon, the window assumes its original size.
MODEM: Short for modulator/demodulator. An electronic device that enables a
computer to communicate and exchange information through a telephone line. A
modem converts telephone signals into digital signals and vice-versa
MONITOR: Television like device used for displaying images generated by the
computer.
MOUSE: A mechanical or optical pointing device used to move the on- screen pointer.
The mouse has one or more buttons to,-signal to the computer the selection of various
program options.
MOUSE PAD: A flat surface to move the mouse on.
MULTIMEDIA: A collective name for text, pictures animated graphics, sound and video.
Multitasking means running more than one application in memory at the same time.
Nanosecond means one billionth of a second.
Network (as applied to computers) typically means a group of computers working
together. It can also refer to the physical wire connecting the computers.
Notebook is a small laptop with similar price, performance and battery life.
Organiser is a tiny computer used primarily to store names, addresses, phone numbers
and data book information. They usually have some ability to exchange information with
desktop systems.
Optical Disk is a high-capacity storage medium
OS (operating system) is the program that manages a computers resources. Common
OSes include Windows 95, Windows 2000, Windows XP, Mac OS, Linux, Solaris,
Amiga OS, AIX, Windows NT, etc.
Palette is a small floating window that contains tools used in a given application.
Partition is a subdivision of a hard drive surface that is defined and used as a separate
drive.
Paste means to insert text, or other material, from the clipboard or copy buffer.
Pager:is a small radio receiver that signal users to call someone.
PC(Personal Computer): properly refers to any desktop, laptop or notebook computer
system.
PCI is an acronym for Peripheral Component Interchange - the newer, faster bus
architecture.
Peripheral is an add-on component to your computer.
PDA (Personal Digital Assistant) is a small battery- powered computer intended to be
carried around by the user rather than left on a desk. It is a hand held computer that
store and organise contract information, calendars, task lists and other organizational
and travel information. This means that the processor used ought to be power-efficient
as well as fast, and the OS ought to be optimized for hand-held use.
Platform represents a computers family. It is defined by both the processor type on the
hardware side and the OS type on the software side. Computers belonging to different
platforms cannot typically run each others programs (unless the programs are written in
a language like Java).
Pointer: it is a small symbol displayed on the screen that moves as a user moves the
mouse.
Pop-up menu: Any menu that does not appear at the top of the screen in the menu bar
(may pop up or down).
Port is a connection socket or jack on the computer.
Print Spooler is a program that stores documents to be printed on the hard drive, there
by freeing the memory up and allowing other functions to be performed while printing
goes on in the background.
Printer is a piece of hardware that will print computer information onto paper.
Processor (CPU or Central Processing Unit) is the part of the computer that actually
works with the data and runs the programs. There are, two main processor types in
common usage today: CISC and RISC. Some computers have more than one
processor and are thus called Multiprocessor.
Program is a series of instructions for a computer, telling it what to do or how to
behave. It is also the verb that means to create a program, and a programmer is one
who programs.
Punched Card
An early storage medium. In Computers that are displayed in a shop. These computers
are mainly for preview. These computers are rarely firewalled but are monitored. They
are likely to have internet accessit. Data is represented by a series of pattern holes in a
stiff card. Each card can contain upto 80 characters.
Punched tape : Refers to the paper tape after it has been punched. In it, each row
stores one character.
Purge : To erase a file.
Push : To put data into the top locations of a program stack.
Put: To write a record.
Q.B.E : Query By Example.
Q.L.S.A.M : Queued Indexed Sequential Access Method.
Quad density : It is used for specifying the data storage capacity versus space of the
computer disk.
Quantizing noise : Refers to the background noise that is caused by the pulse codemodulation errors.
Query language : Refers to a language that is particularly designed to assist the user
to interrogate a particular database.
Quest : An educational software.
Queue : It is a list or line of data, where new items are added at one end and the items
are taken from other end.
Queued access method : Refers to any data access method wherein the transfer of
databetween main memory and inputJoutput device is automatically regulated
synchronously.
Quenching theory : It is a research technique that concerned with searching of the
correct sequential orders of moving units.
Quick disconnect : It is a type of plug in electrical socket that permits rapid locking and
unlocking of the making connector valves.
Quick Medical Refrence (QMR) : At Expert
System that serves as an electronic text book, a low level consultant and a diagnostic
consultant.
Trojan Horse: It is a malicious - logic program that hides within or look like a legitimate
program such as a screen saver.
Tab: Symbolic representation for tabulate.
Table : The arrangement of data in rows and columns. It also refers to the reoord of
observation in such a form that it allows different results to be related to one another.
Tablet : It refers for data tablet which is a magnetic input device. It converts graphics
and pictorial data into binary inputs for use in computers.
Tabulate : Means to print results in a desired format and tabular form.
Tacos : It is a data conversion software. It is used for converting data in one language
format to another language.
Tag : It refers to that portion of an instruction which carries the numbers of index
register that affects the address in the instruction.
Tag file :It is a collection of tags stored as file. It is used in a program to directly access
the full records stored in another file.
Tag reader : It is an electronic device that isused to capture data on bar coded rags
relating to different commodities.
Tag sort: It is a sort of tag file but not a full file. It is used for quick retrieval of records
from the original file.
Tail : It refers to the special data item that locates the end of a list.
Talk : The process of transferring the data between two devices e.g. between a
computer and a terminal.
Tape: Refers to magnetic tape. A magnetic tape is used to store information transmiffed
from computer. Paper tapes are also used for this purpose. In case of magnetic tapes,
data is generally stored in blocks. In this, the computer checks each block in addition to
checking the parity bit of each character.
Tape cassette : It is a sequential access storage medium. It is used in microcomputer
systems for digital recording.
Tape drive : It is a magnetic storage device. It uses magnetic tape or tape cassette or
cartridges.
Tape file : Refers to a file recorded on a magnetic tape.
Tape Format : It is the format of information that is recorded on magnetic tape. It
permits the system to recognise control and verify the data.
Tape-header : It refers to the header label written at the beginning of a volume of
magnetic tape.
Tape label : It is the first record on magnetic tape reel. It contains information about the
date of recording. name! number of record on tape, etc.
Tape mark: It is a signal recorded on magnetic tape. It is used to delimit the sections of
data.
Tape operating system : Refers to an operating system that is stored on tape and not
in
Upload means to send a file from one computer to another through a network.
UPS is an uninterrupted power supply; uses heavy duty batteries to help smooth out its
input power source.
Uniform Resource Locator (URL) is a Web address that gives the exact location of an
Internet resource.
User is the operator of a computer.
Usenet Newsgroups is one or more discussion groups on the internet where people
with similar interests can post articles and reply to messages.
Update : Refers to the process of changing a file or program package in order to make
it uptodate. For this, new data is included and old data is replaced by making necessary
alterations.
Upgrade : Means addition of new products to the existing computer system.
Upload: Means to send computer information or program to a source, generally another
computer receiving over a telephoneline.
Up time : It is the time during which a computer, a component of a.computer system, or
a software system is up.
Upward incompatible : It indicates that a computer system or peripheral device can do
everything that any previous model was capable of doing and in addition to that it has
certain additional features.
User : Refers to anyone who uses the computer.
User area : It is the pan of the main memory of a computer that is available for a user
by the users programs.
User defined function : Refers to a function that has been defined by the user. Such a
function is stored through user defined key that is provided for the purpose.
User defined key : It is one of the set of 10 or more keys provided as a group on
personal computer that is capable of performing a predefined function through a
program.
User friendly : It refers to that computer, terminal program, etc. that can be easily used
and understood by a wide variety of peo; pIe.
User group : Refers to a group of people who regularly meet or correspond due to their
interest in a particular machine or suite or program.
User program : An application program written by a person who is not a programmer in
a computer system.
User part : It is a micro-computers casing that permits the user to connect additional
equipment or peripherals.
Utility : It is the program that helps the user run, enhance, create or analyse, other
programs, programming languages, operating systems and equipments.
Utility function : Refers to any function thatis carried out by a utility program e.g.
copying of data from cards of disk to magnetictape, etc.
Utility program : A program that is designed to assist an operator for carrying out some
specified task e.g. listing a file held on magnetic tape or disk, etc.
V.A.B. : Voice Analog Back.
Vacuum tube : Refers to an electronic thermionic valve. It can be used as an amplifier
or as a switch.
Validation : Means to check input against some pre-defined set or criteria so as to
minimise errors.
Validity check: Refers to a check that is carried out for verification that it is actually a
valid code.
Valve Added Retailers (VARS) : Refers to those who provide customers with products
with a slight extra trimming on the
original.
V.A.M. : Vision Aided Manufacturing.Vamilla : Refers to the default or automatic
setting on a word- processing program e.g. some assumed type of processor to which
the program is expecting to send its information.
Variable : Refers to anything that can change or vary. In case of computers, it refers
tosome numerical value or to a text string which has been defined as variable.
Variable instruction length : Refers to a CPU having the ability to recognise various
types of instructions with varying lengths.
Variable legth character encoding : Means the use of variable number of bits for
representing characters in such a way that the most frequently used characters can be
represented with the least number of bits. It helps in reducing the amount of storage
space used.
Variable length recorders : Those records in a file which may vary in length, generally
because the file contains two or more types of records each of which contains different
types and numbers of fields.
Variable word length computer: A computer wherein the number of bits contained in a
word varies depending upon the data or instruction.
V.D.T. : Visual Display Terminal.
V.D.U. : Visual Display Unit. It is an output device that can display information
temporarily
Vector : A one-dimensional arrangement of numbers i.e. a single row or a single
colunm.
Vector display : Refers to cathode ray tube that moves the electron beam randomly to
trace a figure on the screen.
Vector graphics : It is the vector approach to computer graphics.
Vectored interrupt : An interrupt system wherein an intenupt causes a direct branch to
the routine that handles it.
Vector pair : Refers to those dam points which make up the opposite ends of a vector.
Vector processor : Refers to a set of processorswherein different elements of a vector
are processed simultaneously with each processor handling a single element.
Vector processing : It refers to the processing of a data in a uniform manner. It can
capitalize on the use of pipeline processing
Vector refresh : Refers to the electronic beams that glow the pixels exactly in the same
way as the image while producing image and pictures on computer screen.
Vendee : Refers to a customer (individual or business party) who makes purchase of a
hardware or a software system.
Venn diagram : Such a diagram makes use of circles and ellipses for graphic
representation of logic relationships among sets and sub-sets.
VERB: It is a procedure-oriented language.
Verification: A check to find that something has accurately been typed and transmitted.
The data is entered from the keyboard twice as a check on its integrity.
Verification machine : A device resembling a key punch machine. It is used for
checking the accuracy of a previously punched check.
Verifier : It refers to the device that is used for detecting key punching mistakes by
rekeying.
Version : Refers to specification and revised release of a software product of some
particular hardware model. It is generally numbered in ascending order.
Version control : Means control of the creation and usage of the various versions of
any given entity.
Vertical Format Unit (YFU) : It is part of the control electronics of a printer. It governs
the vertical format of the document to be printed.
Vertical scrolling : Refers to the ability of a software package to move up and do
through a page or more of data displayed on a video screen.
Very High Frequency (VHF) : The frequency bend between 30- 3000 MHz.
Very Large Scale Integration (VLSI) : Having logic gates above 5000 on a chip about
half a centimeter square.
Video : Refers to the T.V. picture band width and frequency spectrum position.
Video conference : Refers to a discussion between two or more groups of people who
are in different places but can see and hear each other. Such conferences take place
across the world using satellites.
Video digitizer : It is an input device. It digitizes the signals received from a video
camera and stores the information in computer memory. In computer memory, the
information can be modified or analysed by the computer.
Video disk: It is a mass storage media.
Video signal : It is a signal in a television set that provides the picture.
Videotex : Refers to any information service that can display text on the screen of a T.V.
set. It is similar to tele text except that user can transmit information to the system. It is
also referred to a view data.
Vidicon : It is a tube inside a T.V. camera. It converts the image of a scene into an
electric signal.
View data :Refrs to an information retrieval service in the form of pages or frames
which the user can call up from a dumb terminal or key pad.
Virgin medium: Any material that is suitable for recording of data (e.g. magnetic tape or
disk, paper tap, etc.) but has not been used for that purpose.
Virtual: Something that replicates another condition so that to the user Or the program
they are indistinguishable.
Virtual address : An address that refers to virtual storage. Before calling for use, it
should be translated into real storage address.
Virtual call service : In a packet switching network, it refers to a technique of setting up
a virtual connection between terminals before the transmission of user data.
Virtual connection : Refers to a logical connection between two network terminating
points that seem to the end equipment as a physical connection.
Virtual device interlace : It refers to a functional as also a syntactic specification that
standardizes interfaces between GKS and device managers of drivers.
Virtual memory : It is a facility available in large modem computer with the help of this
facility the programmer is not restricted by the size of the machines memory.
Virtual memory storage : It is a direct access storage device that is used to store
programs which need more space than is available in main memory while they are
being executed. One of the methods used for virtual storage in PAGiNG;.
Virtual Storage (VS) : It is a technique for managing execution of program by utilizing
limited quantity of internal storage and a much larger quantity of lower-speed external
storage in such a way the distinction is quite transparent to a computer user.
Virtual Storage Access Method (VSAM) : It is an access method that is suitable for
files with sequential or relative organistation on direct access storage device.
Virus : Refers to a routine introduced into a program, when activated produces
unwanted result that can range from displaying messages on the screen to the partial
orthe beginning of a magnetic tape to identify the name or number assigned to the tape
reel.
V.R.C. : Vertical Redundancy check
V.S. : Virtual Storage
V.T.O.C. : Volume Table Of Contents.
Voice Mail is a computerised telephone message recording system; an e-mail system
that supports audio.
W.X :It is a large micro-computer system that has been manufactured by Digital
Equipment Corporation.
Web pages are related files containing multimedia data that are made available on a
web site.
Worms are form of computer sabotage sent by e-mail that reproduce, taking up network
space and snarling connections.
www (World-Wide-Web) refers more or less to all the publically accessible documents
on the Internet. It is used quite loosely, and sometimes indicates only HTML files and
sometimes PP P and Gopher files, too. It is also sometimes just referred to as the
Web.
Website is a related to collection of files on the World Wide Web and accessing Internet
resources such as text, graphics, sound, and other multimedia resources.
Word processor is a program designed to help with the production of textual
documents, like letters and memos. Heavy duty work can be done with a desktop
publisher. Some common word processors include MS-Word, WordPerfect, Abi Word,
Wafer : Refers to a thin slice cut from a large crystal of a semiconductor material
(germanium or silicon crystal), Hundreds of IC dice may be processed in a single
wafer.
Wafer processing :It refers to the processing of thin slices of a semi-conductor (wafer)
to make circuits. After being processed, the wafer is separated into dice or chips.
Wafer sort :Refers to the process of testing and identifying which dice on a wafer are
acceptable
Wait list: It is a list of the processes that are still waiting the completion of certain
activity before they can again run on a processor.
Wait time :The time during which a program or computer waits for completion of other
activities.
Walk through : Refers to a product review that is performed by a formal tram.
WAMI :World Association or Medical Informatics.
WAN: Wide Area Network.
Wand :It refers to a hand held device that is used for reading magnetic characters, bar
codes, etc. It resembles the pencil.
Warm boot: It is the process of fooling the computer through program to realise that its
power has been turned off though thepower is still on.
Warm up time : It is the time between the energizing a device and the beginning of the
application of its output characteristics.
Zero mode :It refers to the mode of operation of a digital plotter wherein each input
command represents a velocity increment and produces a change in speed relative to
one or both axes.
Zeroise :Means to set storage location to zero. It is done to ensure that the data does
not become corrupted by the retention of previous data which is no longer relevant.
Zero punch :It refers to a punch in the third row (also known as zero row) of an 80
column card.
Zero word :Refers, in coding theory to a word made up entirely of zero digits.
Zilog :A.U.S. based semi-conductor manufacturer firm.
Zip mode :It refers to a plotte?s mode of operation. wherein each input command
represents an incremental deviation.
Z-net :Refers to a local area network.
Zone :It is that section of main memory which is reserved for some specified function or
use.
Zone bits :Refers to those binary bits within a digital computer, which are used in
conjunction with the numerical bits for representing alphabetic characters and special
symbols.
Zone punch :Refers to a punched hole in any one of the first three rows.
Zoning: It is a process of metal purification. It is used in purification of semi-conductor
crystals.
Zoola :It is an attribute of graphics. It permits the size of any image to be altered without
the need of redefining the parameters.
Zoom Box is a small square in the upper right corner of a window which, when clicked,
will expand the window to fill the whole screen.
COMPUTER ABBREVIATIONS
ADO- ActiveX Data Objects
ADSL-Asymmetric Digital Subscriber Line
ALGOL- Algorithmic Language
ALU- Arithmetic and Logical Unit
ANSI- American National Standard Institute
ARPANET-Advanced Research Projects Agency Network
ASCII- American Standard Code for Information Interchange
ASP- Active Server Pages
BASIC- Beginners All Purpose Symbolic Instruction Code
BIOS- Basic Input Output System
BPS- Bits per Second
CAD- Computer Aided Design
CDMA- Code Division Multiple Access
CD-ROM- CD Read Only Memory
CMOS - Complementary Metal-Oxide Semiconductor
COBOL- Common Business Oriented Language
CPS- Characters per Second
CPU- Central Processing Unit Model
DHTML- Dynamic Hyper Text Markup Language
DMA- Direct Memory Access
16. Which of the following is a standard code used to exchange information among data
processing and communication system. Ans. ASCII
17. Which of the following best explains RAM?
Ans. i. It is an acronym for Random Access Memory. Ii. It is memory built for silicon
chips that is used to store programs and data temporarily while they are being
processed.
18. Conversion of computer generated results in to human acceptable form is a function
of..
Ans. Output interface
19. The components of a computer system with the circuitry to control interpretation and
execution of instructions is known as . Ans. CPU
20. The computer as a machine and all other equipment associated with it are termed
as.. Ans. Hardware
21. The vast network of computers that connects millions of people all over the world is
called Ans. Internet
22.The property that when classes are arranged in a hierarchy, each class assumes the
attributes and methods of its ancestors is. Ans. Inheritance.
23. Windows store all system settings in this file..? Ans. WIN.INI
24.The software component of an expert system that draws conclusions is.
Ans. Inference Engine
25. The attributes and methods for each objects are stored in
Ans. An object repository
26. An E-R diagram is a graphic method presenting.
Ans. Entity classes and its relationships
27. . Is an invalid type of database key. Ans. Structured primary key.
28. A processor that collects the transmission from several communications media and
them over a single line that operates at higher capacity is called Ans: Multiplexer
29. Which of the following factor makes WINDOWS popular?
(a) User friendly GUI feature (b) Desktop (c) Multi tasking (d) Inexpensive (e) None of
these Ans: (a) User friendly GUI feature
30. Bandwidth refers to> Ans. The account of information communications medium
can transfer given amount of time.
31. .is a primary key of one file that appears in another file. Ans. Foreign key
32. The technique that extends storage capacity of main memory beyond the actual size
main memory is called.
Ans. Virtual storage
33.Customers, facilities, knowledge workers, business information, communication
infra-structure and computer equipments are all considerations in a good --- plan.
Ans. Risk management
34. What is E-Banking?
Ans. E-Banking implies provisions of Banking products and services through electronic
delivery channels like ATM, phone, Internet, Mobile phones etc.
35. SMTP, FTP, & SNS are applications of the ..layer. Ans. Physical structure.
36. In a data base, information should be organized and accessed according to which of
the following? Ans. Logical position.
37. Traffic in a VPN is not .. Ans. Logically separated from other traffic
38. Which encoding type always has a non zero average amplitude? Ans. Bipolar.
39. This is an internet forum to discuss wide range of topics like current news, articles
and current affairs etc. Ans. News group
40. What is an Analog Computer?
Ans. A non-digital system that manipulates linear or continually changing data.
41. All the deleted items are stored in this until it is permanently deleted. This place is.
Ans. Virtual hard drive
42. By clicking on this icon one can access the networked resources. This icon is
Ans. Connect to Internet
43. A picture, map or graphic or image that can be used in a document is known as
Ans. Object
44. A multi purpose window which opens nearly for everything is ..
Ans. Browser window
45. A normal compiler take source code as input and produce this as output
Ans. Machine Code
46. What is meant by AOL?
Ans. (a) America On-Line used to be the largest Bulletin Board system in the world. (b)
With the advent of AOL.v3.0, AOL has become the largest INTERNET provider in the
World (c) AOL is also the largest provider of Blank Diskettes in the World (d) AOL is
available only in large metro areas (e) All these
47. What is the full form of BASIC ?
Ans. Beginners All-purpose Symbolic Instruction Code
48. Is Multiprogramming and multi tasking is synonymous ?
Ans. Never
49.Which of the following components of the computer system with the circuitry to
control interpretation and execution of instructions? Ans. CPU
50. A computer science branch that is evolved in using computers to solve that appear
to require human imagination or intelligence is called as..
Ans. Artificial Intelligence (AI)
51. A technique in which a number of similar items or transactions to be processed are
grouped and processed in a designated sequences during a machine run
Ans. Batch processing
52. Ada is a .
Ans. A high level programming language developed by the Department of Defense,
USA in memory of Ada Lovelace who worked with Charles Babbage in the development
of the first computer.
53. Microprocessors can be used to make
Ans. Computer, Digital systems and calculators.
54. The first electronic computer in the world was Ans. ENIAC
55. The storage sub system in a micro computer consists mainly of .ormedia with
varying capacities
Ans. Magnetic or optical
56. A computer with CPU speed is around 100 million instruction per second and with
the word length of 64 bits is known as..
Ans. Super Computer
57. Which of the following is the correct order of the four major functions of a computer?
Ans. Input
Process
Output
Storage
58.Which of the following has been created by research facility of Digital Electronic
Corporation of USA? Ans. Yahoo, Alta vista & Web Crawler
59. Which input device cannot be used to work in MS Office? Ans. Mouse
60. Which of the following is a standard MS Office edition? Ans. Professional
61. What is the name of the list that stores the URLs of web pages and links that visited
in the recent past? Ans. Page list
62. Electronic Fund Transfer is the exchange of money
Ans. From one account to the other
63. The extension of database file is given by ? Ans. .frm
64. The server on the internet is also known as.. Ans. Repeater
65. In Microsoft Word print layout command is displayed in which among the following
menus?
Ans. File
66.Current SIIMs have either .or.connectors (pins) Ans. 30 or 72
67.The storage subsystem in a micro computer consists mainly of --- or ----media with
varying capacities. Ans. Magnetic or Optical
68. Which of the following is not an input device?
Ans. Computer Output to Microfilm (COM)
69. The CPU (Central Processing Unit) consists of
Ans. Control Unit, ALU and Primary Storage
70. EBCDIC can code up to how many different characters? Ans. 256
71. What is meant by BAUD? Ans. This is a measurement of the amount of Data that
can be transferred in one second.
72. What is meant by BANDWIDTH?
Ans. The carrying capacity of a wire attached from one computer to another.
73. Which is considered a direct entry input?
Ans. Optical scanner, Mouse and digitizer, Light pen.
74. Which is used for manufacturing chips? Ans. Semi conductors.
75.The Computer code for the interchange of information between terminals is
Ans. ASCII (American Standard Code for Information Interchange).
76. A bite consists of . Ans. 8 bits
77. A hybrid computer resembles Ans. Both a digital and analog computer.
78.Whereas a computer mouse moves over the table surface the trackball is
Ans. Stationary .
79. Which one of the following input device is user programmable?
Ans. Intelligent Terminal
80. Which computer memory is used for storing programs and data currently being
processed by CPU? Ans. PROM
81. Computer instructions written with the use of English words instead of binary
machine code is called Ans. Symbolic Code
82. .. Operates the device with input and output data from the computer
Ans. Computer Operators
83. A computer programmer.. Ans. Does all the thinking for a computer.
84.Which of the following is not a primary storage device?
Ans. Magnetic tape, magnetic disc, optical disc (none of the above)
85. A name or number used to identify a storage location is called Ans. An Address
86. Which of the following is a secondary memory device? Ans. Disc
87. The difference between storage and memory is that memory is ..and storage is
Ans. Temporary, permanent
88. A floppy disc contains.? Ans. Both circular tracks and sectors.
89.BBS stands for?
Ans. Bulletin Board Service
90. What is a Binary Coded Decimal (BCD)? Ans. A decimal system in which each
decimal system numeral (0-9) is represented by a 4 digit (4-bit) binary code.
91. The octal equivalence of 111010 is.. Ans. 72
92.Which was the computer conceived by Babbage? Ans. Donald Knuth
93. is a device not connected to CPU Ans. Off line device
94.Which of the following registers is loaded with the contents of the memory location
pointed by the PC? Ans. Instruction Register
95. Microprocessors can be used to make
Ans. Computer, digital systems, calculator (all of these)
96. Which American company is called Big Blue? Ans. IBM
97. The first electronic general purpose digital computer built by Motkey and Accrete
called ENIAC did not work on the stored program concept. How many number could it
store in its initial memory? Ans. 20
98. When did the IBM introduced the 80286 based PC/AT? Ans.1984
99. The subject of cybernetics deals with the science of ..
Ans. control & Communications.
100. Who is credited with the idea of using punch cards to control patterns of a weaving
machine? Ans. Hollerith
101.Most of the inexpensive personal computer does not have any disc or diskette
drive. What is the name of such computers? Ans. Home computers
102.Which of the following required large computer memory?
Ans. Imagery, graphics, voice (all of these)
103. A term associated with the comparison of processing speeds of different computer
system is . Ans. MIPS
104. The processes of starting or re-starting a computer system by loading instructions
from a secondary storage device in to the computer memory is called.Ans. Booting
105. Who invented the microprocessor? Ans. Marcian Huff
106. One computer that is not considered a portable computer is Ans. Mini computer
107. A dumb terminal has a . Ans. Key board and screen
108. Plotter accuracy is measured in terms of repeatability and Ans. Resolution
109. Daisy wheel printer is a type of Ans. Impact printer.
110. The number of records contained within a block of data on magnetic tape is defined
by the. Ans. Blocking factor
111. Which of the following memories must be refreshed many times per second?
Ans. Dynamic RAM
112. The most important or the powerful computer in a typical network.?
Ans. is Network sever
113. The primary purpose of software is to turn the data in to Ans. Information.
114. the ability to find an individual item in a file immediately--- is used
Ans. Sequential access
115. A collection of related file is called . Ans. A record
116.storage that retains its data after the power is turned off is called ..
172. The OMR can read about document/ minute. Ans. 10000
173. The reading speed of MICR is .. document/ minute Ans. 2400
174. The conducting material that was coated inside the screen of CRT is
Ans. Aquadag
175.The OMR is able to evaluate only those documents which are printed within
.position.
Ans. Marked
176. What is meant by BOOTSTRAP (BOOT)?
Ans. A software program for initiating the the operation of a computer.
177. As compared to CRT, the flat panel display requires
Ans. (a) Less power (b) low operating voltage (Ans: both a and b)
178.What is CRT? Ans. Cathode Ray Tube
179.Graphical devices which are widely used to represent the graphics on screen are:
Ans. .(a) CRT, (b) Flat Panel ( both a and b)
180.WORM stands for what? Ans. Write Once Read Memory
181. Which of the following is a temporary primary memory?
Ans. Random Access Memory
182. Which of the following is a sequential access memory? Ans. Tape
183. Which of the following can hold maximum data? Ans. Magnetic Tape
184. Which of the following is a storage that supplements the primary internal storage of
a computer? Ans. Secondary storage
185. The ability to read or write each piece of information in a storage device in
approximately the same length of time regardless of its location is.
Ans. Random Access
186. Which of the following can store large amount of data? Ans. Hard Disk
187. Which of the following is handy to carry yet can store large amounts of data?
Ans. DVD
188.Data (information) is stored in computers as. Ans. File
189. Which storage device is mounted on reels? Ans. Magnetic tapes
190. Which of the following statements is/are true?
Ans. Cache Memories are smaller than RAM
191. MOS stands for
Ans. Metal Oxide Semiconductor
192. What is the expansion of MTBF? Ans. Mean Time Before Failure
193. Which of the following devices have a limitation that we can only read information
to it but cannot erase or modify it?
Ans. Ans. Hard Disk
194. Usually in MSDOS, the primary hard disk drive has the drive letter . Ans. C
195. The Analytical Engine developed during first generation computers used what as a
memory unit?
Ans. Counter Wheels
196. Memory is made up of
Ans. (a) set of wires (b) Set of circuits (c) Large number of cells (d) Any of these
197. Primary memory stores...
Ans. (a) Data (b) Programs (c) Results (d) Any of these
198. Memory unit is a part of Ans. Control Unit
199. The contents of information are store in Ans. Memory Data Register
200. Which one is not the option of Secondary Storage Device?
Ans. Read Only Memory