Professional Documents
Culture Documents
Objective Compute Fundamentals by Er. G C Nayak PDF
Objective Compute Fundamentals by Er. G C Nayak PDF
(Fully Solved)
FIRST EDITION
(Fully Solved)
F I R S T E D I T I O N
Authored By
Gopal Chandra Nayak
(B.TECH in Electronics & Communication Engineering)
www.gcnayak.blogspot.com gopalnayak123@gmail.com
COPYRIGHT PAGE INTENTIONALLY REMOVED
Author
CONTENTS
1. Author‘s Note
2. Dedication
3. Basics ……………………………………………………………………………… 01
Introduction………………………………………………………………… 01
Generation of computer…………………………………………………….. 02
Computer Organization………………………………………………………..03
Input & Output Devices…………………………………………………...…..03
Hardware & Software Basics…………………………………………...……..05
Internet…………………………………………………………………...……07
Network Topologies…………………………………………………………...08
Information Security…………………………………………………………..12
The OSI Reference Model…………………………………………………….13
7. Abbreviations……………………………………………………………………….. 203
9. References…………………………………………………………………………... 220
AUTHOR’S NOTE
Utmost care has been taken to provide error free solutions, if any error found,
kindly bring to my notice at gopalnayak123@gmail.com. Your constructive suggestions for
improvement of this book will be highly appreciated.
To two precious diamonds of my life, my beloved Mother Snehalata Nayak and to my friend,
philosopher & Guide my Father Manmatha Nayak
INTRODUCTION
A Computer is a general purpose device that can be programmed to carry out a set of
arithmetic or logical operations automatically. Since a sequence of operations can be
readily changed, the computer can solve more than one kind of problem.
A general purpose computer has four main components →the arithmetic logic unit
(ALU), the control unit, the memory, and the input and output devices (collectively
termed I/O).
The data that is fed into a computer processor received into the computer by a keyboard
or other sources is called Input.
A computer is an electronic device that accepts data from the user (input), processes the
data by performing calculations and operations on it and generates the desired Output.
The device which is used with a computer to display or store data is called Peripherals.
The mechanical, magnetic, electronic and electrical components that comprises a
computer system such as the Central Processing Unit (CPU), monitor, keyboard, etc. is
known as Hardware.
A set of instructions that tells the computer about the tasks to be performed and how
these tasks are to performed, is known as Software.
An unprocessed collection or representation of raw facts represented in a manner suitable
for communication, interpretation or processing by humans or by automatic means, is
known as Data.
The result of processing, manipulating and organizing data in a way that adds to the
knowledge of the person receiving it, is known as Information.
The smallest unit of information, a computer can understand and process, is known as
Bit.
The primary goal of computer is to process information that it receives and output the
results. The process of control and alter information is known as. Processing.
The number system computer used to store data and perform calculation is Binary
Number System.
Computer Speed, Accuracy, Diligence, Storage Capability, Automation, Remembrance
Power and Versatility are the main Characteristics of Computer.
Self-Intelligence, Decision-Making power, Learning power, Self-care, Feelings are the
Limitations of Computer.
A Mainframe computer is a much larger computer that typically fills a room and may
cost many hundreds or thousands of times as much as a personal computer. They are
designed to perform large numbers of calculations for governments and large enterprises.
Read-only memory (ROM) is a storage medium used in computers and other electronic
devices. Data stored in ROM can only be modified slowly or with difficulty, or not at all.
ROM is non-volatile and the contents are retained even after the power is switched off. It
only allows reading. The types of ROM include PROM, EPROM and EEPROM.
Random Access Memory (RAM), allows the computer to store data for immediate for
1
immediate manipulation and to keep track of what is currently being processed. RAM is
Page
referred to as volatile memory and is lost when the power is turned off. It allows reading
and writing. The two main types of RAM are static RAM and Dynamic RAM.
SRAM retains data as long as power is provided to the memory chip and need not be
refreshed periodically. SRAM stands for Static Random Access Memory.
The data on DRAM continues to move in and out of the memory as long as power is
available and must be continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory.
Primary memory is computer memory that a processor or computer accesses first or
directly. For example: RAM, and Cache Memory.
Secondary memory (or secondary storage) is the slowest and cheapest form of
memory. It cannot be processed directly by the CPU. Secondary memory devices include
magnetic disks like hard drives and floppy disks, optical disks such as CDs and
CDROMs, and magnetic tapes, which were the first forms of secondary memory.
Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
Installation is the process of copying software programs from secondary storage media
to the hard disk.
A central computer that holds collections of data and programs for many PCs,
workstations and other computers is a Server.
GENERATIONS OF COMPUTER
The first general purpose computer, designed to handle both numeric and textual
information is Universal Automatic Computer (UNIVAC) (1951)
The first computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous, taking up entire rooms.
The UNIVAC and ENIAC computers are examples of first-generation computing
devices.
In first generation of computer, this operating system allowed only one program to run at
a time and a number of input jobs are grouped for processing. It is known as Batch
Processing.
Transistors replaced vacuum tubes and ushered in the second generation of computers.
The development of the integrated circuit was the hallmark of the third generation of
computers. Transistors were miniaturized and placed on silicon chips, called
semiconductors, which drastically increased the speed and efficiency of computers.
COMPUTER ORGANISATION
An Arithmetic Logic Unit (ALU) is a digital circuit that performs integer arithmetic and
logical operations. The ALU is a fundamental building block of the central processing
unit of a computer.
Control Unit is responsible for controlling the overall operations of computer. It
coordinates the sequence of execution of instructions and controls the overall functioning
of the computer.
The first computer architecture was introduced by John Von Neumann (1970)
Personal computers use a number of chips mounted on a main circuit board called
Motherboard.
The CPU is fabricated as a single Integrated Circuit (IC) chip. It is also known as the
Microprocessor.
Multiprocessing is the use of two or more central processing units (CPUs) within a
single computer system. The term also refers to the ability of a system to support more
than one processor and/or the ability to allocate tasks between them.
The organization and interconnection of the various components of a computer system is
known as Computer Architecture.
A CPU can directly understand the Machine Language (0, 1 format).
ribbon against the page, causing the ink to be deposited on the page in the shape desired.
Examples of Impact Printers are Character Printers and Dot Matrix Printers.
Non–Impact Printers do not touch the paper when creating an image. Examples of Non
- Impact Printers are Inkjet printers, Laser printers, Solid ink printers, Dye-sublimation,
Thermal wax printers, Thermal auto chrome printers.
A pen based output device, attached to a computer for making vector graphics, that is,
images created by a series of many straight lines is known as Plotters.
The number of pixels displayed on a screen is known as Resolution.
A Monitor is a TV-like display attached to the computer on which the output can be
displayed and viewed. It can either be a monochrome display or a color display.
The set of instructions, which control the sequence of operations, are known as Program.
It is a sequence of instructions, written to perform a specified task with a computer.
A Software instructs the computer what to do and how to do it. It is a set of instructions
that tells the computer about the tasks to be performed and how these tasks are to
performed.
One or more defects or problems that prevent the software from working as intended of
working at all is a Bug.
Software that contributes to the control and performance of the computer system and
permits the user to use the system more conveniently is termed as System Software.
Antivirus Software is used to scan the hard disk to remove the virus from them.
The assembly language program is translated into machine code by a separate program
known as an Assembler.
A Backup, or the process of backing up, refers to the copying and archiving of computer
data so it may be used to restore the original after a data loss event. It contains a copy of
every program data and system file on a computer.
An Operating System controls the way in which the computer system functions and
provides a means by which users can interact with the computer.
Loading of the Operating System is known as Booting. Restarting a computer that is
already on, is referred to as Warm Booting.
Basic Input – Output System (BIOS) is the part of operating system that manages the
essential peripherals such as the keyboard, screen, disk drives and parallel and serial
ports.
An Integrated Software is a single application that combines major features of several
types of application.
An Application Software is the program that makes the computer useful to the users.
Computer hardware is the collection of physical elements that constitutes a computer
system.
Computer hardware refers to the physical parts or components of a computer such as
the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit
(graphic cards, sound cards, memory, motherboard and chips), etc. all of which are
physical objects that can be touched.
The Motherboard is the main component of computer. It is a large rectangular board
with integrated circuitry that connects the other parts of the computer including the CPU,
5
Page
the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals
connected via the ports or the expansion slots.
Here are some common individual computer hardware components that you'll often find
inside a modern computer case:
Motherboard
Central Processing Unit (CPU)
Random Access Memory (RAM)
Power Supply
Video Card
Hard Drive (HDD)
Solid-State Drive (SSD)
Optical Drive (e.g. BD/DVD/CD drive)
Card Reader (SD/SDHC, CF, etc.)
Here are some common hardware that you might find connected to the outside of a
computer:
Monitor
Keyboard
Mouse
Battery Backup-UPS
Printer
Speaker
Here are some less common computer hardware, (either because these pieces are now
usually integrated into other devices or because they've been replaced with newer
technology):
Sound Card (e.g. MIDI)
Network Interface Card (NIC)
Expansion Card (Firewire, USB, Thunderbolt, etc.)
Hard Drive Controller Card
Analog Modem
Scanner
Floppy Disk Drive
Joystick
Webcam
Microphone
Tape Drive
Zip Drive
The following hardwires are referred to as network hardware and various pieces are often
part of a home or business network:
Digital Modem (e.g. Cable Modem, DSL Modem, etc.)
Router
Network Switch
Access Point
Repeater
Bridge
Print Server
6
Firewall
Page
INTERNET
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
It is a network of networks that consists of millions of private, public, academic,
business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless, and optical networking technologies.
The World Wide Web (abbreviated as WWW or W3, commonly known as the Web) is a
system of interlinked hypertext documents that are accessed via the Internet.
A Website, is a set of related web pages served from a single web domain.
A Home page, index page, or main page is a page on a website. A home page usually
refers to:
The initial or main web page of a website, sometimes called the "front
page" (by analogy with newspapers).
The first page that appears upon opening a web browser program, which is
also sometimes called the start page. This 'start page' can be a website or it
can be a page with various browser functions such as the visual display of
websites that are often visited in the web browser.
The web page or local file that automatically loads when a web browser
starts or when the browser's "home" button is pressed; this is also called a
"home page". The user can specify the URL of the page to be loaded, or
alternatively choose e.g. to re-load the most recent web page browsed.
A personal web page, for example at a web hosting service or a university
web site that typically is stored in the home directory of the user.
A Hyperlink is a reference to data that the reader can directly follow either by clicking or
by hovering or that is followed automatically
A web browser (commonly referred to as a browser) is a software application for
retrieving, presenting and traversing information resources on the World Wide Web.
The Uniform Resource Locator, abbreviated as URL is a specific character string that
constitutes a reference to a resource. In most web browsers, the URL of a web page is
displayed on top inside an address bar.
Downloading means to receive data to a local system from a remote system, or to initiate
such a data transfer
Uploading refers to the sending of data from a local system to a remote system such as a
server or another client with the intent that the remote system should store a copy of the
data being transferred
An Internet Protocol address (also known as an IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a computer network. It
acts as an identifier for a computer. It is a unique address for every computer.
An email attachment is a computer file sent along with an email message. One or more
files can be attached to any email message, and be sent along with it to the recipient.
Hotmail was co - founded by an Indian American entrepreneur Sabeer Bhatia along with
Jack Smith in July of 1996
7
Page
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another. The list of CCed recipients is visible to all other
recipients of the message.
An additional BCC (blind carbon copy) field is available for hidden notification;
recipients listed in the BCC field receive a copy of the message, but are not shown on any
other recipient's copy (including other BCC recipients)
The Drafts folder retains copies of messages that you have started but are not yet ready
to send.
The first email was sent by Ray Tomlinson to himself in 1971.
NETWORK TOPOLOGIES
Network topologies describe the ways in which the elements of a network are
mapped. They describe the physical and logical arrangement of the network nodes.
The physical topology of a network refers to the configuration of Cables, computers,
and other peripherals.
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
8
Page
Bus Topology:
All the nodes (file server, workstations, and peripherals) on a bus topology are connected
by one single cable.
A bus topology consists of a main run of cable with a terminator at each end. All nodes
(file server, workstations, and peripherals) are connected to the linear cable. Popular on
LANs because they are inexpensive and easy to install.
Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks.
Disadvantages of Bus Topology
• The cable length is limited. This limits the number of stations that can be
connected.
• A break in the cable will prevent all systems from accessing the network.
• This network topology can perform well only for a limited number of
nodes.
• Network disruption when computers are added or removed
Star Topology:
Page
Ring Topology:
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction.
A failure in any cable or device breaks the loop and can take down the entire network.
To implement a ring network we use the Token Ring technology
A token, or small data packet, is continuously passed around the network. When a device
needs to transmit, it reserves the token for the next trip around, then attaches its data
packet to it.
Advantage of Ring Topology
• Very orderly network where every device has access to the token and the
opportunity to transmit.
• Easier to Manage than a Bus Network
• Good Communication over long distances
• Handles high volume of traffic
Disadvantages of Ring Topology
• The failure of a single node of the network can cause the entire network to
fail.
• The movement or changes made to network nodes affects the performance
of the entire network.
10
In this topology, each node is connected to every other node in the network.
Implementing the mesh topology is expensive and difficult.
In this type of network, each node may send message to destination through multiple
paths.
While the data is travelling on the Mesh Network it is automatically configured to reach
the destination by taking the shortest route which means the least number of hops.
Advantage of Mesh Topology
• No traffic problem as there are dedicated links.
• It has multiple links, so if one route is blocked then other routes can be used
for data communication.
• Points to point links make fault identification easy.
Disadvantage of Mesh Topology
• There is mesh of wiring which can be difficult to manage.
• Installation is complex as each node is connected to every node.
• Cabling cost is high as a network of n nodes requires n(n-1)/2 cables.
Tree Topology
arranged in a hierarchy.
This tree has individual peripheral nodes which are required to transmit to and receive
Page
from one other only and are not required to act as repeaters or regenerators.
The tree topology arranges links and nodes into distinct hierarchies in order to allow
greater control and easier troubleshooting.
This is particularly helpful for colleges, universities and schools so that each of the
connect to the big network in some way.
Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
• All the computers have access to the larger and their immediate networks.
Disadvantages of a Tree Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
Hybrid Topology
INFORMATION SECURITY
12
A Computer Virus is a computer program or code that can replicate itself and spread
from one computer system to another system.
Page
A computer virus has the capacity to corrupt or to delete data on your computer and it can
utilize an e-mail program to spread the virus to other computer systems. In the worst case
scenario, it can even delete everything on your hard disk. The purpose of it to disrupt the
operation of the computer or the program. Some examples of Computer Virus are Trojan
viruses. Stealth viruses, worms, malware (malicious software), Disk Killer, Stone virus,
Sunday, Cascade, Nuclear, Word Concept, etc.
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of executable code, scripts, active content, and other software.
Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous antivirus software available are Avast!, Norton, Avira, Kaspersky, AVG,
Quick Heal etc.
The Creeper virus was the first virus detected on ARPANET, in the early 1970s.
A person who uses his or her expertise to gain access to other people‘s computers to get
information illegally or do damage is a Hacker.
Authorization is the function of specifying access rights to resources related to
information security and computer security in general and to access control in particular.
More formally, "to authorize" is to define an access policy.
Authentication is the act of confirming the truth of an attribute of a single piece of data
or entity. It might involve confirming the identity of a person by validating their identity
documents, verifying the validity of a website with a digital certificate, tracing the age of
an artifact by carbon dating, or ensuring that a product is what its packaging and labeling
claim to be. In other words, Authentication often involves verifying the validity of at least
one form of identification.
Phishing is the attempt to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
A Spoofing attack is a situation in which one person or program successfully represents
oneself as another by falsifying data and thereby gaining an illegitimate advantage.
Browser Sniffing is a set of techniques used in websites and web applications in order to
determine the web browser that a visitor is using, and to serve browser-appropriate
content to the visitor.
The top three layers of the OSI model are often referred to as the upper layers:
• Layer-7 - Application layer
• Layer-6 - Presentation layer
• Layer-5 - Session layer
The bottom four layers of the OSI model are often referred to as the lower layers:
• Layer-4 – Transport Layer
• Layer-3 – Network Layer
• Layer-2 –Data-link Layer
• Layer-1 –Physical Layer
Protocols that operate at these layers control the end-to-end transport of data
between devices, and are implemented in both software and hardware. The function of the
upper layers of the OSI model can be difficult to visualize. Upper layer protocols do not
always fit perfectly within a layer, and often function across multiple layers. The bottom
(or lower) four layers are more clearly defined, and terminology from those layers is still
prevalently used. Many protocols and devices are described by which lower layer they operate
at.
14
Page
Physical Layer:
It is the bottom layer of OSI Model. It is concerned with transmitting bits over a
communication channel. It is responsible for the actual physical connection between the
devices. Such physical connection may be made by using twisted pair cable or wireless. Some
of its functions are
Data-Link Layer:
It is responsible for node-to-node delivery of data. The Data-link layer packages the
higher- layer data into frames, so that the data can be put onto the physical wire.
This packaging process is referred to as framing or encapsulation. The Data-Link
layer consists of two sub layers:
(i) Logical Link Control (LLC) sub layer-It serves as the intermediary between the
physical link and all higher layer protocols. It ensures that protocols like IP can
function regardless of what type of physical technology is being used
additionally, the LLC sub layer can perform flow-control and error checking,
though such functions are often provided by Transport layer protocols, such as
TCP.
(ii) Media Access Control (MAC) sub layer-It Controls access to the physical
medium, serving as mediator if multiple devices are competing for the same
physical link. Data link layer technologies have various methods of
accomplishing this -Ethernet uses Carrier Sense Multiple Access with Collision
Detection (CSMA/CD), and Token Ring utilizes a token.
15
Page
Common Data-link layer technologies include following:
• Ethernet – the most common LAN data-link technology
• Token Ring – almost entirely deprecated
• FDDI (Fiber Distributed Data Interface)
• 802.11 Wireless
• Frame-Relay
• ATM (Asynchronous Transfer Mode)
The data-link frame contains the source and destination hardware (or physical) address.
The most common hardware address is the Ethernet MAC address.
Framing: DLL divides the bits received from N/W layer into frames. (Frame contains all
the
Addressing information necessary to travel from Source to Destination).
Physical addressing: After creating frames, DLL adds physical address of
sender/receiver (MAC address) in the header of each frame.
Flow Control: DLL prevents the fast sender from drowning the slow receiver using Buffer.
Access Control: When single communication Channel is shared by multiple devices,
MAC layer of DLL provides help to determine which device has control over the channel.
Error Control: It provides the mechanism of error control in which it detects &
retransmits damaged or lost frames.
Network Layer:
It is responsible for the source to destination delivery of a packet across multiple networks.
If two systems are attached to different networks with devices like routers, then N/W
layer is used.
Thus DLL overseas the delivery of the packet between the two systems on same network
and the network layer ensures that the packet gets its point of origin to its final destination.
Internetworking: It Controls internetwork communication
Logical Addressing: When packet is sent outside the network, N/W layer adds
Logical (network) address of the sender & receiver to each packet. Network addresses are
assigned to local devices by n/w administrator and assigned dynamically by special
server called DHCP (Dynamic Host Configuration Protocol)
Routing: When independent n/w are connected to create internetwork several routes
16
are available to send the data from S to D. These n/w are interconnected by routers &
gateways that route the packet to final destination.
Page
Two of the most common Network layer protocols are:
• Internet Protocol (IP)- IP version 4 (IPv4) and IP version 6 (IPv6)
• Novell‘s Internetwork Packet Exchange (IPX)-It Is Outdated Now.
Transport Layer:
The Transport layer (Layer-4) does not actually send data, despite its name.
Instead, this layer is responsible for the reliable transfer of data, by ensuring that
data arrives at its destination error-free and in order. Transport layer communication
falls under two categories:
• Connection-oriented – r e q u i r e s that a connection with specific
agreed-upon parameters be established before data is sent.
• Connectionless – requires no connection before data
is sent.
Connection-oriented protocols provide several important services:
• Segmentation and sequencing – data is segmented into smaller pieces for
transport. Each segment is assigned a sequence number, so that the receiving
device can reassemble the data on arrival.
• Connection establishment – connections are established, maintained, and
ultimately terminated between devices.
• Acknowledgments – receipt of data is confirmed through the
use of acknowledgment. Otherwise, data is retransmitted, guaranteeing
delivery.
• Flow control (or windowing) – data transfer rate is negotiated to
prevent congestion.
The TCP/IP protocol suite incorporates two Transport layer protocols:
• Transmission Control Protocol (TCP) – connection
oriented
• User Datagram Protocol (UDP) –
connectionless
Session Layer:
Application Layer:
18
NOTE:
1. As data is passed from the user application down the virtual layers of the OSI
model, each layer adds a header (and sometimes a trailer) containing protocol
information specific to that layer. These headers are called Protocol Data Units
(PDUs), and the process of adding these headers is called Encapsulation. Note that in
the TCP/IP protocol suite only the lower layers perform encapsulation. The PDU of
each layer is identified with a different term:
A web browser serves as a good practical illustration of the OSI model and the TCP/IP protocol
suite:
• The web browser serves as the user interface for accessing a website. The
browser itself does not function at the Application layer. Instead, the web browser
invokes the Hyper Text Transfer Protocol (HTTP) to interface with the remote
web server, which is why http:// precedes every web address.
• The Internet can provide data in a wide variety of formats, a function of the
Presentation layer. Common formats on the Internet include HTML, XML, PHP,
GIF, and JPEG. Any encryption or compression mechanisms used on a website are
also considered a Presentation layer function.
• The Session layer is responsible for establishing, maintaining, and terminating the
session between devices, and determining whether the communication is half-duplex
or full-duplex. However, the TCP/IP stack generally does not include session-layer
protocols, and is reliant on lower-layer protocols to perform these functions.
• HTTP utilizes the TCP Transport layer protocol to ensure the reliable delivery of
data.TCP establishes and maintains a connection from the client to the web server,
and packages the higher-layer data into segments. A sequence number is assigned to
each segment so that data Can be reassembled upon arrival.
• The best path to route the data between the client and the web server is determined
by IP, a Network layer protocol. IP is also responsible for the assigned logical
addresses on the client and server, and for encapsulating segments into packets.
• Data cannot be sent directly to a logical address. As packets travel from network to
network, IP addresses are translated to hardware addresses, which are a function of
the Data-Link layer. The packets are encapsulated into frames to be placed onto the
physical medium.
• The data is finally transferred onto the network medium at the Physical layer, in the
form of raw bits. Signaling and encoding mechanisms are defined at this layer, as is
the hardware that forms the physical connection between the client and the web server.
IP and Vs DoD
Model:
Despite the practicality of the DoD model, the OSI model is still the basis
for most network terminology.
21
The code for a Web page is written using →Hypertext Markup language
(HTML).But Modern web page design are going with CSS (Cascading Style Sheets) &
JAVA SCRIPT.
Operating Systems (OS), Drivers, Viruses are examples of →System software.
MS Office, Payroll System, Inventory System are examples of →Application Software.
WinZip, FrontPage, Notepad, Web Browsers are examples of →Utility Software.
The first computers were programmed using →Machine language (0-1 Format)/Object
Code. The language user write the program is Assembly language (Instruction Alphabet-
Numeric format)/Source Code. The source code translated into object code by an
Assembler/interpreter/compiler.
A Filename is a unique name that you give to a file of information.
Web surfing means exploring the internet
―Write‖ is a Text Editor.
The keyboard shortcut to turn on Sticky Keys is to press the SHIFT key 5 times. Sticky
keys let you use the SHIFT, CTRL, ALT, OR Windows logo keys by pressing one key at a
time.
The speed of supercomputer measured in →FLOP (Floating point operation per second)
Any data or instruction entered into the memory of a computer is considered as →Storage
The part of the computer displays the work done is →Monitor
A series of instructions that tells a computer what to do and how to do it is called a
→Program
The part of a computer that one can touch and feel is →Hardware
BIOS (Basic Input/output System) is a built in software that determines what a computer
can do without accessing programs from a disk.it also contains all the codes required to
control the keyboard, display screen, disk drives, serial comm. etc. BIOS is typically
placed on a ROM Chip, so called ROM BIOS. It helps computer in Booting (It
initiates operation of a computer & its function is to set up I/O Devices & load OS from
a disk, cassette or built in ROM. Cold Boot →Restarting computer after having turned
off power. Warm Boot →Restarting computer without having turned off the power).
Supercomputers (e.g. IBM Roadrunner, IBM Blue gene, Intel ASCI red, PRAM Padma
by C- DAC) refers to the fastest, biggest and most expensive computers
Executing is the process of carrying out commands
The rectangular area of the screen that displays a program, data & information is a
22
→Window.
Page
To instruct Word to fit the width of a column to the contents of a table automatically, click
the Auto size button and then point to Auto fit contents
In PowerPoint, the header & footer button can be found on the insert tab in Text Group.
LAN (Local area n/w) is usually privately owned & links devices in a single office,
building or campus. MAN (Metropolitan area n/w) is designed to extend over an entire
city e.g. Cable TV network. WAN (Wide area n/w) provides long distance transmission
of data over a large geographical area that may comprise a country/continent/world.
PAN (Personal area n/w) provides data transmission within 10m radius by following
principle of wireless connectivity e.g. Bluetooth.
A collection of programs that controls how your computer system runs and processes
information is called operating system (OS).
Device drivers are small, special-purpose programs
Transformation of input into output is performed by the CPU
A Character of information is represented by One byte.
Data is/are distinct item that don‘t have much meaning to you in a given context
A website address is a unique name that identifies a specific Link on the web
Modem (Modulator-Demodulator) is an example of a Telecommunications device. It
establish a connection of a computer with other computer or with the internet.
Highlight and delete is used to remove a paragraph from a report you had written.
Data and time are available on the desktop at Taskbar.
Phishing Trips are attempts by individual to obtain confidential information from you
by falsifying their identity.
In Excel, charts are created using chart wizard option
Microcomputer hardware consists of three basic categories of physical equipment system
unit, input/output, memory.
A tool bar contains buttons and menus that provide quick access to commonly
used commands
For creating a document, you use new command at File menu.
Input device is equipment used to capture information and commands.
A programming language contains specific rules and words that express the logical steps of
an Algorithm.
One advantage of Dial-up internet access is it utilizes existing Telephone security
Protecting data by copying it from the original source is Backup.
Network components are connected to the same cable in the Star topology
Two or more computers connected to each other for sharing information form a network.
A compute checks the database of Username and Passwords for a match before
granting access.
26
Computers that are portable and convenient for users who travel are known as Laptops.
Page
Network components are connected to the same cable in the Bus topology
Page
Download is the process of copying software programs from secondary storage media to
the hard disk.
Control key is used in combination with another key to perform a specific task
Scanner will translate images of text, drawings and photos into digital form
CPU is the brain of the computer
Something which has easily understood instructions is said to be User friendly
Information on a computer is stored as Digital data.
Previously answer sheets in bank PO‘s/Clerk‘s examinations are checked by using
Optical Mark Reader (OMR)
Electronic data exchange provides strategic and operational business opportunity
Digital signals used in ISDN (Integrated Service Digital N/W) have whole number values.
Assembler is language translation software.
Manual data can be put into computer by Scanner
In a bank, after computerization cheques (Are example of Near Money) are taken care of
by MICR (Magnetic Ink Character Recognition).
Microchip elements are unique to a smart card.
MS-DOS is a single-user & Character User Interface (CUI) based operating system but
MS- Windows is a multi-user & Graphical User Interface (GUI) based operating system.
Programs stored in ROM is Permanent & can‘t be erased so called Non-volatile Memory.
Ethernet is used for high speed telecommunications.
IP address (It is a unique set of numbers in 32-bit format used to locate a computer
on a network. within a closed n/w IP Address may be assigned at random, however IP
Address of web servers must be registered to avoid duplicates) can change even if the
Domain name remains same.
Each Directory entry can be of 32 bytes
In computer the length of a word can be measured by Byte
Byte is the unit of storage medium
Oracle is a database software. Lars Ellison is founder of Oracle Corporation.
Sequential circuit is Full adder.
Screen display is called by windows in Lotus Software.
Expanded form of IBM is International business machine.
IC (Integrated Circuits) chips are made of Silicon
India’s Silicon Valley situated at Bangalore.
LOTUS 1-2-3 is a Software.
Tables holds actual data in the database
Virus (Virtual Information Resource Under Seize)-(Is a program which alter the way
28
of a computers functioning.it is called virus because it can replicate itself. PC Viruses are
Page
3 types 1.Program Viruses-Infects program files & has extensions like .exe, .com,
.dll, .bat etc. 2.Boot sector virus-Infects the system area of disk i.e. boot record of
floppy or hard disk. These viruses attach themselves to the part of disks & activate when
the user attempts to start up from infected disk.3.Multipartite Viruses-Infects both
program files & boot records)e.g. Trojan Horses
Static keys make WEB insecure
Video signal needs highest Bandwidth.
Hardware that adds two numbers is arithmetic logical unit (ALU).
A data communication system requires terminal device, communication channel, protocols
Most common channel used by networks today is Satellite
Run Time is not a type of error
A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data
Computer viruses can be attached to an Executable programs.
The smallest space where information on a hard disk is kept-Cluster
Intelligence is not a characteristic of a computer
Private key is used to spend a digital signature
Negative numbers can be represented in binary
VDU (Visual Display Unit) is not an essential part of a computer
Speed of clock of CPU is measured in Megahertz (MHz).
Cache is not a secondary storage device
Disk can be used to store sequential files and random files
Windows is not an application
When taking the output information is produced in hardcopy (print out) & softcopy form.
Control unit’s function is to decode program instructions
GOTO statement is used in C, C++, basic language
File menu is selected to print
The name a user assigns to a document is called a Filename.
A Processor is an electronic device that processes data, converting it into information
Control words are words that a programming language has set aside for its own use
To access properties of an object, the mouse technique to use is Right-clicking
Connections to the internet using a phone line and a modem are called Dial-up connections
Dial-in is an internet account that can connect any stand-alone computer directly to
the internet. The account is used by having a computer based software application dial-
in to an ISP. The software connects with the ISP and establishes a TCP/IP link to the
internet that enables your software to access internet information.
To access a mainframe or supercomputer, users often use a Terminal
29
To make the number pad act as directional arrows, you press the Num lock key.
Page
an Extranet
The code that relational database management systems use to perform their database
Page
task is refer to as SQL (Structured Query Language).
A data base management system is a software system used to create, maintain and
provide controlled access to a database
The metal or plastic case that holds all the physical parts of the computer is known as
system unit not CPU.
Data integrity means that the data contained in the database is accurate and reliable
A characteristic of a file server is manages files operations and is shared on a network
The role of Blaze Pascal in the development of computer is addition and subtraction
of numbers
The inventor of computer is Charles Babbage.
The personal computer invented in 1981
1 Kilobyte is equal to 1024 bytes
LCD means liquid crystal display
UPS (Uninterruptable/Universal Power Supply) converts DC voltage into AC voltage
The word ZIP means Zone Information Protocol used for the compression of application
file.
With the help of Pal switch we can increase or decrease the speed of computer‘s processing.
SWIFT (Society for Worldwide Inter-bank Financial Telecommunication) networks
are used between banks.
Panda is a virus
USENET is a another name for internet Newsgroup
ULTRA-BOOK is a higher end type of sub note book defined by Intel
Boot sector is hardware
Low Level Languages can easily interact with Hardware.
Debug searches the fault of any software
The total printout of a program is called Listing
With the help of ZIP we can decrease the size of any programs
We can format the hard disk with the help of Booting
CANNED is called as readymade software
The process of creating third file by mixing two files is called as Mail merging
The figures and lines etc. made by computer is called as graphics
Each line represents 65 letters in a WordStar
Magnetic tape can store Large amount of data e.g. in Bank Cheque, Payroll Processing.
The first mechanical computer of Charles Babbage is known as punch card machine
TV broadcast and Keyboards-Monitor are the example of simplex transmission
31
COPY command in MS-DOS is used to copy one or more files in disk drive to another,
copy from one directory to another directory
REN command is Internal command
Tom Burners-Li propounded the concept of ―World wide web(WWW)‖
The memory address sent from the CPU to the main memory over a set of wires is
called Address bus
MODEM is an electronic device required the computer to connect to the INTERNET
DOS floppy disk does not have a boot record
The CPU in a computer comprises of Store, arithmetic and logical unit and control unit
In computer parlor a mouse is a screen saver
UNIVA is the name of the computer which was first used for programming and playing
Of Music.
Database management systems are comprised of tables that made up of rows called
records and columns called fields
Nano is equal to 10(to the power of -9)
Disk and tape drives are commonly used as hard copy
When computer is connected to LAN and data is sent across it for storage/processing is
Online processing
Data are raw facts and figures
Holding of all data and instructions to be processed is one of the functions of Storage unit.
To select the entire row in Excel, click mouse at Row heading
Database is known as Structured data
Normal view and outline view notes pane appears in power point
The user protection feature of an operating system is required in multi-user system only
In word, Ctrl + Del combination of keys press to delete an entire word
In MS-Word Double clicking a word selects the Word
Word document can be navigated in web layout view.
In Excel, addressing mode(s) that can be used in a formula is/are only absolute and relative
Note page views can you use to show just the slide and its content.
Plotters are very useful in applications such as computer aided design(CAD)
Corel DRAW is a graphic package
The print to file option creates .prn file.
The enhanced keyboard contains 101 keys.
Data processing cycle consists of input cycle, output cycle and processing cycle
Page Setup is not an option of Edit menu.
Radar chart is used to show a correlation between two data series
34
A typical computerized business application system will have both master and
Page
transaction file
Problem identification is taken first in designing a program
The purpose of the EXIT command is to get out of a condition loop
Employees details is a master file for the pay roll system
A slow memory can be connected to 8085 by using READY
A processor needs software interrupt to obtain system services which need execution
of privileged instructions
A CPU has two modes- privileged and non-privileged. In order to change the mode from
the privileged to the non-privileged, a software interrupt is needed.
Swap space resides at disk
The process of assigning load addressed to the various parts of the program and adjusting
the code and data in the program to reflect the assigned address is called relocation
1 Sector= 4096 bytes
Two stacks of size required to implement a queue of size n
1 Floppy = 6, 30,784 bytes or 308 KB
Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If
the page size is 4 KB, then size of the page table is 2 MB
Consider a virtual memory system with FIFO page replacement policy. For an arbitrary
page access pattern, increasing the number of page frames in main memory will always
decrease the number of page faults
Consider a scheme R (A, B, C, D) and functional dependencies A->B and C-> D. Then
the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless
join
Main memory requires a device driver
Two friends suitably arrange 4 blocks of different colors to exchange coded
information between them. 4 bits of information is one exchanging each time
The number 43 in 2‘s complement representation is 01010101
The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP
pin for ‗high‘ status at the end of each instruction fetch`
System design specifications do not include blueprint showing the layout of hardware
The results of arithmetic and logical operations are stored in an Accumulator
The input device that is closely related to touch screen is the light pen
F2 keys of control center specified below displays data, toggles browse/edit
A compiler breaks the source code into a uniform stream of tokens by lexical analysis
LET.BAS files are related to Microsoft word utility
A command in UNIX can have one or more arguments
A hard disk is logically organized according to cylinders and sectors
35
A frame can include text & graphics, tables & graphics, graphics
Page
All the formatting data for the paragraph is stored in the paragraph mark
We can define hypertext definition in notebooks using Macsyma 2.0
The addressing mode(s) that can be used in a formula is/are- absolute, relative and mixed
WINDOWS can work in Enhanced, Normal, Safe and Standard modes.
The part of a machine level instruction which tells the central processor what has to be
done is an operation code(OP-Code)
O-Matrix software packages do not have animation capabilities
Faster execution of programs is not an advantage of a subroutine
A small computer program embedded within an HTML document when a user retrieves
the web page from a web server is called an Applet.
Another name for systems implementation is transformation
The central host computer or file server in a star network maintains control with
its connecting devices through polling.
C++ does not check whether the index value is within scope
The browser uses uniform resource locator to connect to the location or address of
internet resources
Three types of compact disc include CD-ROM, CD-R, and CD-RW.
In the centralized computing architecture, the entire file is downloaded from the
host computer to the user‘s computer in response to a request for data
Popping or removing an element from an empty stack is called underflow
The ability to combine data and operations on that data in a single unit is known
as Polymorphism
A Router is a device that sites between your internal network and the internet and
limits access into and out of your network based on your organization‘s access policy
In C++, Private, Protected, and Public are reserved words and are called Member
Access Specifiers.
The integration of all kinds of media such as audio, video, voice, graphics and text into
one Coherent presentation combined is called Multimedia.
The Derived class can redefine the public member functions of the Base class
A technique for searching special databases, called Data warehouses, looking for
related information and patterns is called Data mining
Like the Quick sort the Merge sort uses the Divide and Conquer technique to sort a list
The use of Expert systems technology can greatly reduce the number of calls routed
to a customer service department
Building a list in the backward manner, a new node is always inserted at the beginning of
the list
Creating a web site is also called web authoring
36
Using the optimization analysis approach, the Expert system starts with a conclusion and
tries to verify that the rules, facts, and conclusion all match. If not, the expert system
Page
Throughput, turnaround time, response time, accuracy are measures of system performance
The binary equivalent of (40.125) suffix 10 is 101000.001
Kernel is the only art of an operating system that a user cannot replace or modify
COBOL programming language was initially developed for consumer electronics goods
Running, blocked, ready, terminated are different states of a process
Rational rose is an example of a modeling language
A WORM (Write-Once, Read-Many) is an example of optical devices. It is a high
density optical disk that can be programmed once, permanently saving a user‘s data
A RAID is a disk array
Compiling creates a Executable program
The ability of a program to divide a display screen into smaller sub-units which
permit portions of different sections of a program to be displayed on the screen, edited,
& copied independently is called Windowing
Winchester Drive is a HARD-DISK Drive
The first private internet service provider in India was Satyam Infoway
The maximum and minimum unsigned number which can be stored in a 8 bit word is 0
and 255
Stack is a part of memory
HIT RATIO is associated with cache(web browsers store accessed information in a
folder on your hard drive called cache. this saves time when a user goes to another page
on a site with the same graphics and make browsing faster) performance
Laser printer is a page printer
Storage capacity of a disk system depends upon number of recording surfaces and
number of sectors per track
Abstraction is associated with object oriented technology and database technology
The terms Opcode and Operand are associated with any high level
language/Assembly language instructions.
Dynamic binding is associated with object oriented programming(C++)
The term CHIP, JEWELLARY means a processor with high capacity
A watch point is associated with debugger
The concepts used for realization of virtual memory are swapping, demand paging and In-
line secondary storage
Oracle 8i is an example of OORDBMS
ALPHA, RIOS, SPARC are examples of RISC (Reduced Instruction Set
Computing) Processors.
Hierarchy is not a component of relational database
A two-way selection in C++ is the if…else
38
that has files or programs written on its surface) stored in a hard disk
Floppy disk does not generate a hardware interrupt
ADA language is a mathematically oriented high level language development by
the Department of Defense (DoD) & is associated with real time processing
MS DOS is usually supplied on a cartridge tape
Kernel of MS-DOS software resides in ROM
The UNIX operating system (available commercially) has been written in C language
MS-DOS has better file security system as compared to UNIX
UNIX is only a multiprogramming system
In UNIX, end-of-file is indicated by typing CTRL D
Abacus is said to be invented by Chinese
FAST drivers scientific software packages was developed under contract with NASA
FIF editor is a windows based application
Graphics is inserted in frame
A language translator is best described as a system software
The specification of a floppy is identified by TPI
In opening menu of word star C OPTION should be selected for protecting a file
The most advanced form of ROM is electronically erasable programmable
ROM(EEPROM)
Secondary storage device is needed to store large volumes of data and programs that
exceed the capacity of the main memory
MORE sends contents of the screen to an output device
NFS stands for N/W file system
We can create a simple web page by using front page express
The first line/bar on the word window where the name of the document is displayed is
called Title bar
The clock frequency of a Pentium processor is 50 MHz
The input device that is most likely to be used to play computer games is the Joystick
BIOS of MS-DOS resides in ROM
The sector size of a floppy disk varies from 128 bytes to 1024 bytes
A program type of errors is flagged by compilers
A floppy diskette is organized according to tracks and sectors
In word star, the maximum permissible length of search string is 65
C is a third generation high level language
A CPU has a 16-bit program counter. This means that the CPU can address 64 K
memory locations
40
is Zap.
The efficient and well-designed computerized payroll system would be on-line real
Page
time system
The scripts which are designed to receive value from Web users is CGI script
WAIS stands for - Wide Area Information Services. It searches large indexes of
information on the internet.
Token bus is the most popular LAN protocol for bus topology
Manipulating data to create information is known as analysis
A separate document form another program sent along with an E-mail message is known
as E-mail attachment
When you boot up a PC — portions of the operating system are copied from disk
into memory
A word processor would most likely be used to type a biography
A Database is an organized collection of data about a single entity
Mozilla Fire fox, Google Chrome, Internet explorer, Opera, Netscape navigator are
Web browsers
MOSAIC is the first web browser used for Macintosh, windows, UNIX.
The list of URLs saved within the Mosaic Web Browser is called HOTLIST
Most of the commonly used personal computers/laptops do not have a command key
known as Turnover
Full form of USB is known as Universal serial bus
The process by which two devices initiate communication is called Handshaking
The quickest and easiest way in Word to locate a particular word or phrase in a document
is to use the Find command
Checking that a pin code number is valid before it is entered into the system in an example
of Data validation
A program that works like a calculator for keeping track of money and making budgets
is spreadsheet
A Toolbar contains buttons and menus that provide quick access to commonly
used commands
Most of the commonly available personal computers/laptops have a keyboard
popularly known as QWERTY
Junk e-mail is also called Spam
Codes consisting of bars or lines of varying widths or lengths that are computer readable
are known as a Bar code
42
Page
E-commerce allows companies to conduct business over the internet.
M-commerce allows buying & selling goods/services through wireless handheld devices.
The most important or powerful computer in a typical network is Network server.
Data link layer of OSI reference model provides the service of Error detection and
Error control to the highest layer.
File Manager is not a part of a standard office suite
A Topology of computer network means cabling between PCs
In UNIX command ―Ctrl + Z‖ is used to suspend current process or command
Network layer of an OSI reference model is for Networking support
Telnet helps in remote login.
In case of MS-access, the rows of a Table correspond to records
In a SONET system, an add/drop multipliers removes noise from a signal and can
also add/remove headers.
The WWW standard allows programmers on many different computer platforms to show
the information on a server. Such programmers are called Web Browsers.
One of the oldest calculating device was Abacus
MS-Outlook Express is a e-mail client, scheduler, address book
The OS, Such as windows, Unix, Macintosh on which a computer is based called Platform
The first generation computers had vacuum tubes and magnetic drum
Office Assistant is an animated character that gives help in MSOffice
Spiders search engines continuously send out that starts on a homepage of a server
and pursue all links stepwise. Google, Ask, Bing are search engines
Artificial intelligence can be used in every sphere of life because of its ability to think
like human beings.
To avoid the wastage of memory, the instruction length should be of word size
which is multiple of character size
Electronic fund transfer is the exchange of money from one account to another
Format menu in MS Word can be used to change page size and type.
Assembly language programs are written using Mnemonics/Instructions.
DMA(Direct memory access) module can communicate with CPU through cycle stealing
A stored link to a web page, in order to have a quick and easy access to it later, is
called Bookmark
B2B type of commerce is characterized by low volume and high value transactions in
banking
43
Workstation is single user computer with many features and good processing power
History list is the name of list that stores the URL‘s of web pages and links visited in
Page
A character that changes its value throughout the program is called variables
Page
When an organization gives contract for development of a software, it has to give data to
the service provider. In such cases, the ownership of data should be with the
client/organization that outsource services
For optical fiber used in point to point transmission, the repeater (these are the devices
used to extend the length of the network without degrading the signal strength) spacing is
10-100 km
Favorites are accessible from the start menu
Task pre-emption, task priority and semaphores are not needed by server program from
an operation system
The objective of multiprogramming operating system is to maximize CPU utilization
The environment provided to ASP(Active server pages) is based on Client/server
HUB is layer1 device, central device, dumb device
QAM(Quadrature Amplitude Modulation ) is used in high speed modem
Frame Relay technique uses connection oriented
Bipolar always has a non-zero average amplitude
In a SONET system, an add/drop multipliers can remove signals from a path
The server on the internet is also known as Host
For multiple branching in ‗C‘ we use switch statement
Web site is a collection of HTML documents, graphic files, audio and video files
The first network that initiated the internet was ARPANET
In MODEMS a digital signal changes some characteristic of a carrier wave
The binary values are represented by two different frequencies in frequency shift keying
Messenger mailbox is present in Netscape communicator
Switching is a method in which multiple communication devices are connected to
one another efficiently
A bridge recognizes addresses of layer 3
―.TIF‖ extension name stands for tagged image format.
PICT is an image format
In programming languages the key word ―Void‖ means it does not return any value
when finished
The keyboard shortcut to restart your computer is Ctrl + Alt + Del i.e. Task Manager
MS-Excel is also known as spread sheet
Manchester encoding is used in Ethernet technology
The instruction of a program which is currently being executed are stored in main memory
In DOS environment, the command used to save the file is ^Z
In html coding <p> …… </p> tag is used to display a paragraph
45
In HTML coding, the following attributes color, size, face used in font tag
Page
WYSIWYG(what you see is what you get) as the page layout, page designs, words &
images will be displayed on the monitor as they will look on the printed page.
Page
In HTML coding, <UL> (Unordered list) is used to give bullets in your document
Transmission media are usually categorized as guided or unguided
A virtual circuit is the physical connection between an end point and a switch or between
two switches
Passing of the frame to next station can happen at a token ring station
In HTML coding <LI> tag is used for denoting items in a list of type <UL>
In MS-Word the keyboard shortcut F7 used for spelling and grammar check
In Dos, primary name of a file can have a maximum of 10 characters
du command is used to show file system disk usage in UNIX
Maximum length of a text file is 255 characters.
Frame format of CSMA/CD and Ethernet protocol differ in the block error control
On an Ethernet LAN implementation with 10 base 5 the maximum number of segments
can be five.
Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site.
The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem
A device operating at the Physical layer is called a Repeater
FORTRAN is a mathematically oriented languages used for scientific problems
If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
Datagram packet switching uses the entire capacity of a dedicated link
In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
SKYPE is a peer-to-peer (workstations with equivalent capabilities and responsibilities)
voice over internet protocol (VoIP) helps to make free internet phone calls.
Phishing-it is a form of criminal activity using social engineering techniques,
characterized by attempts to fraudulently acquire sensitive information, such as
passwords and credit cards details, by masquerading as a trustworthy person in an
apparently official electronic communication, such as E-mail or instant message.
Spoofing- It means to Fool. In networking the term is used to describe a variety of
ways in which hardware and software can be fooled. It is the creation if TCP/IP packets
using somebody else‘s IP address. Or in the context of network security, it is a situation
in which one person or program successfully masquerades as another by falsifying data
and thereby gaining an illegitimate advantage. Example E-mail spoofing involves
47
trickery that make a message appear as if it came from a legitimate business e-mail
address.
Page
Presentation layer of the OSI reference model is concerned with the syntax of
data exchanged between application entities.
Programs that extend the capabilities of a server are C41 scripts
The primary goal of ISDN (Integrated service digital n/w) is the integration of voice
services and non-voice services.
Flow control in OSI model is done by Transport layer.
The optical links between any two SONET devices is called a section.
The key fields which are tested by a packet filtering firewall are source IP
address, TCP/UDP source port, destination IP address.
The server on the internet is also known as Gateway
VBScript can perform calculation of data
In MS-Word, ‗Mail merge’ can be defined writing a letter once and dispatching it
to a number of recipients
Coaxial cables are good for digital transmission and long distance transmission
LRU is a page replacement policy used for memory management
Commercial TV is an example of distributive services with user control
The exact format of frame in case of synchronous transmission depends on
whether transmission scheme is either character oriented or bit oriented
Ring topology is mostly affected by addition/remove of a node or node failure.
To interconnect two homogenous WAN‘s we need a Router.
Co-axial cables provides data rates over 50 mbps
ISDN’s basic rate interface (BRI) is also known as 2D + B
The mode of data transmission of unshielded twisted pair cable is full duplex
Query is used to answer a question about a database
AM and FM are examples of analog to analog modulation
Redundancy is the concept of sending extra bits for use in Error Detection
The physical layer is concerned with transmission of bits over the physical medium
Stack is a LIFO structure
Program of a computer presented as a sequence of instructions in the form of binary
numbers is called machine language
Possible problems with java script can be security or limited graphics and
multimedia capabilities.
Design view would use to define a table and specify fields
In C++ programming, the extension of program is .cpp
In DOS, the command used to create a new file is called Copy con
In justified type of alignment, text gets aligned along both left and right margin
50
A data structure, in which an element is added and removed only from one end is known
Page
as Stack
In OSI model reference, layer 2 lies in between the physical layer and the network layer
CompuServe is a widely used online service that offers access to the internet as well
as proprietary content and information.
Mouse and joystick are graphic input devices
Netiquette is network etiquette which specifies internet rules of courtesy for writing e-
mails and participating in newsgroups.
A Directory in DOS Environment is equivalent to A Folder in Windows Environment.
Gateway uses the greatest number of layers in the OSI model
A set of standards by which servers communicate with external programs is called
common gateway interface
API allows a client/server relationship to be developed between an existing host
application and a PC client
Internet is network of networks
A set of devices or combination of hardware and software that protects the systems on
one side from system on the other side is Firewall
When bandwidth of medium exceeds the required bandwidth of signals to be transmitted
we use Frequency division multiplexing
In Word, Ctrl + Del combination of keys is pressed to delete an entire word
UNIX is both time sharing and multiprogramming system
Mother board holds the ROM, CPU, RAM and expansion cards
CD-ROM is as a Magnetic memory. It is an inexpensive way to store large amount of
data.
DBRM takes care of storage of data in a data base
Various input and output devices have a standard way of connecting to the CPU and
Memory. These are called Interface standards
The place where the standard interfaces are provided to connect to the CPU and
Memory is known as Port
Display capabilities of monitor are determined by Adapter card
1 MB is equivalent to 2 (to the power of 20 bytes)
Magnetic surface recording devices used in computers such as hard disks, floppy disks,
CD- ROMs are called secondary / auxiliary storage devices
Assembler is a translator which translates assembly language program into a machine
language program. Interpreter is a translator which translates high level language
program into a machine language program
53
Page
Most electronic devices today use some form of integrated circuits placed on printed
circuit boards thin pieces of Bakelite or fiberglass that have electrical connections etched
onto them is called Mother board
Fifth generation computing is based on Artificial intelligence
Assembly language is low-level language
In assembly language mnemonics are used to code operations, alphanumeric symbols are
used for address, language lies between high-level language and machine language
The computer‘s secondary memory is characterized by low cost per bit stored
Acoustic coupler is a communications device which allows an ordinary telephone to be
used with a computer device for data transmission
PC/AT is an example of Bi-directional keyboard interface
DIMM is not an I/O bus
PCI bus is often called as mezzanine bus.
A mother board should contain at least 4 memory sockets
A single zero bit is called starting bit
PnP stands for plug and play.it is a Hardware that are easily attached to computer and
can be played instantly.
Plug-in-This is a program that your browser uses to manipulate a download file. It
differs from a helper application in that the plug-in works inside the browser window`
Maximum RAM of XT type is 1 M
Mainly memories are divided into two types they are logical memories and physical
memories
Full form of EMS memory is excluded memory specification
Data on a floppy disk is recorded in rings called tracks
Peer to peer means computer to computer i.e. Computer in same hierarchical level
RLL refers to run length limits
A scanner is attached to LPT or SCSI host adapter port
Processor bus is the fastest speed bus in system
Resolution is the amount of detail that a monitor can render
Sound blaster is a family of sound cards sold by creative labs
MIDI is a family of sound cards sold by creative labs
MIDI is a standard for connecting musical instruments to PC‘s
The display technology used by monitor is CRT(Cathode Ray Tube)
It is best to use the game adaptor interface on the sound card and disable any other on
54
system
The number of sectors per track in 1.44 MB floppy disk is 18
Page
Pentium II system can address 62 G memory
The mouse was invented by Englebart
Latency is the average time that it takes for a sector to be a available after the heads
Each sector is having 512 bytes
DDD means digital diagnostic disk
The last 128k of reserved memory is used by mother board
There are 80 cylinders are there for an 1.44 m floppy
The storage capacity of a CDROM is 650 MB
XGB has 2048 K graphic memory.
Most sound boards generate sounds by using FM synthesis
Microscope helps you trouble shoot PS/2 system
General purpose of diagnostic program run in Batch mode
Operating system often called as kernel
IPC stands for Inter process communication
Buffering attempts to keep both CPU and I/O device busy all the time
Buffering in Printers is necessary because Computer is fast generating data for printing
then printer can print & there is not enough memory is provided with printer.
The most important aspect of job scheduling is the ability to Multiprogramming
―FIFO‖ stands for first in first out
In the two-level directory structure, each user has its own user file directory
The first implementation of UNIX was developed at Bell Telephone Laboratories in the
early 1970
A Connection less protocol is more dynamic
The Throughput is a measure of work for processor
FOXPRO is a package and programming language
Mostly used date format in computer is DD-MM-YY
Reservation of train ticket uses real time mode of processing
A floppy disk is a thin plastic disc coated with magnetic oxide
In binary addition 1+1 = 10
In COBOL programming characters length per line is 64
In FOXPRO, the maximum fields in a record are 128
QUIT command is used to come out of FOXPRO
Count Command is used to count the specified records in a file with or without condition
F1 key is pressed for help in FOXPRO
55
Cyber Crime: The act of stealing, cheating or otherwise defrauding an organization with
the use of a computer
Cryptography: Method used to protect privacy and security on the internet
Disk Mirroring: The data is written on two or more hard disks simultaneously over the
same channel
Disk Duple Xing: The data is written on two or more hard disks simultaneously over
the different channel
Dumb Terminals: Hardware configuration consisting of a keyboard and monitor
that is capable of sending and receiving information but has no memory or processing
capabilities.
Enterprise resource planning(ERP): An integrated system of operation application
combining logistics, production, contract and order management, sales forecasting and
financial and HR management.
In 802.4 token bus CO-AXIAL Cable is used.
The NEURAL NETS Data mining technique derives rules from real-world case examples.
The Operating System UNIX is typically used for web server
GDI stands for GRAPHICS DEVICE INTERFACE.
EOD Code is written into a serially accessed memory.
KERNING-The feature of Word that automatically adjusts the amount of space between
certain combination of characters so that an entire word looks more evenly spaced.
SCSI Is a set of standards for DATA TRANSFER. It is commonly used for hard disks
and tape drives.it can connect scanners, CD Drives etc.
KIOSK is a TOUCH SCREEN Based computer terminal which provides access to
information application for communication, E-Commerce, Entertainment & Education
57
All of the following are examples of real security and privacy risks EXCEPT:
A. Hackers.
B. Spam.
C. Viruses.
D. Identity theft.
The ability to recover and read deleted or damaged files from a criminal computer is
an example of a law enforcement specialty called:
A. Robotics.
B. Simulation.
58
C. Computer forensics.
D. Animation.
Page
Which of the following is NOT one of the four major data processing functions
of a computer?
A. Gathering data
B. Processing data into information
C. Analyzing the data or information
D. Storing the data or information
Tags, when placed on an animal, can be used to record and track in a
database all of the animal movements.
A. POS
B. RFID
C. PPS
D. GPS
Surgeons can perform delicate operations by manipulating devices through computers
instead of manually. This technology is known as:
A. Robotics.
B. Computer forensics.
C. Simulation.
D. Forecasting.
Press to move the insertion point to the Address box, or to highlight the URL in
the Address box.
Is the science that attempts to produce machines that display the same type
of intelligence that humans do?
A. Nanoscience
B. Nanotechnology
59
C. Simulation
Page
The name for the way that computers manipulate data into information is called:
A. Programming.
B. Processing.
C. Storing.
D. Organizing.
Computers gather data, which means that they allow users to data.
A. Present
B. Input
C. Output
D. Store
After a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is considered
A. Data.
B. Output.
C. Input.
D. The process.
C. Characters.
Page
D. Numbers.
In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:
A. Eight bytes.
B. Eight kilobytes.
C. Eight characters.
D. Eight bits.
B. A device
Page
C. A peripheral
D. An application
The , also called the Brain of the computer, is responsible for processing data.
A. Motherboard
B. Memory
C. RAM
D. Central processing unit (CPU)
B. Motherboard.
Page
C. Storage device.
D. Output device.
System software is the set of programs that enables your computer‘s hardware devices
and
Software to work together.
A. Management
B. Processing
C. Utility
D. Application
The PC (personal computer) and the Apple Macintosh (Mac) are examples of two different:
A. Platforms.
B. Applications.
C. Programs.
D. Storage devices.
Apple Macintoshes (Macs) and PCs use different to process data and
different operating systems.
A. Languages
B. Methods
C. CPUs
D. Storage devices
63
The difference between people with access to computers and the Internet
and those without this access is known as the:
A. Digital divide.
B. Internet divide.
C. Web divide.
D. Broadband divide.
C. 1,000
Page
D. 1
Which of the following is the correct order of the four major functions of a computer?
A. Process →Output →Input →Storage
B. Input →Output →Process →Storage
C. Process →Storage →Input →Output
D. Input →Process →Output →Storage
Controls the way in which the computer system functions and provides
a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Are specially designed computer chips that reside inside other devices,
such as your car or your electronic thermostat?
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
The steps and tasks needed to process data, such as responses to questions or clicking an
65
The metal or plastic case that holds all the physical parts of the computer is the:
A. System unit.
B. CPU.
C. Mainframe.
D. Platform.
A is a “plug in” to the browser that allows you to view interactive web pages
that contains games, movies, ads etc.
A. Quick time
B. Wizard
C. Shockwave
D. Flash Player
E. Terminal
Binary value of 45 is .
A. 11001
B. 101101
C. 100101
D. 101100
E. None of these
C. 254, 65536
D. 254, 64336
Page
E. None of these
Which of the following is not a language processor?
A. Compiler
B. Interpreter
C. Processor
D. Assembler
E. None of these
(C) Volts
Page
(D) Amp.
(E) None of these
Such types of printers, in which the printing head contacts with the paper in printing
process, are called as :
Which of the following meaning is used between CPU & RAM to speed up the
processing power of a CPU?
(C) CD
Page
Hackers
(A) All have the same motive
(B) Is another name for users
(C) May legally break into computers as long as they do not do any damage
(D) Are people who are allergic to computers
(E) Break into other people’s computers
Are distinct items that don‘t have much meaning to you in a given context?
(A) Fields
(B) Data
(C) Queries
(D) Properties
(E) Users
Storage that retains its data after the power is turned off is refereed as to -
(A) Volatile storage
(B) Sequential storage
(C) Direct storage
(D) Nonvolatile storage
(E) Mobile storage
(D) Integration
Page
(E) Speed
Which is considered a direct entry input device?
(A) Optical scanner
(B) Mouse
(C) Light pen
(D) Digitizer
(E) All of the above.
MS- DOS is a ?
(A) Single – user operating system
(B) Multi – user operating system
(C) Multi – tasking operating system
(D) All of the above
(E) None of these
Which among the following is responsible for allocating IP addresses and managing
73
The performance of a hard drive or other storage device, meaning how long it takes to
locate a file is called?
(A) Response Time
(B) Access Time
(C) Quick Time
(D) None of these
What is used in most programs that is a part of a program and guides the user through
certain steps?
(A) Software
(B) Wizard
(C) Wiki
(D) None
74
A generic name for Intel processors released after the original 8086 processor is ?
(A) Pentium
Page
(B) x86
(C) Pentium 286
(D) None of these
A network that is connected to the Internet, but uses encrypt ion to scramble all the data
sent through the Internet is called?
(A) My network
(B) Virtual private Network
(C) Social Network
(D) None of these
Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of ?
(A) Windows OS
(B) Mac OS
(C) Open Operating Systems
(D) None of these
A file which has not been altered, compressed, or manipulated in any way by the
computer is called?
(A) Temp File
(B) Raw file
(C) Permanent file
(D) None of these
Any piece of data can be returned in a constant time, regardless of its physical location
and whet her or not it is related to the previous piece of data using which of the following ?
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card (NIC)
Which Microsoft -based technology was built to link desktop applications to the World
Wide Web?
(A) Active channel
(B) Active desktop
76
(C) ActiveX
Page
(D) None
Which among the following key is used for checking grammar &
spelling?
[A]F3
[B]F5
[C]F7
[D]None of these
RUP Stands for "Rational Unified Process." RUP is a software development process
from Rational, a division of ?
[A]Microsoft
[B]IBM
[C]Compaq
[D]None
[D]None of these
year?
[A] 1977
[B] 1985
[C] 1988
77
[D]None of these
Page
32 bit operations were introduced for the first time by Microsoft in ?
[A]windows 95
[B]Windows 3.0
[C]Windows 3.11
[D]None of these
[D]None of these
(B) Form
(C) Query
[A]analog computer
[B]digital computer
[D]mainframe computer
Page
Structured programming languages such as C, COBOL and FORTRAN were used in
which of the following computers?
Which among the following statement is correct? (More than one options are correct )
The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of
the following?
[B]Laptops
[C]Super computers
BSNL, Reliance, Shaw cable, AOL, Tata Indicium all can be kept in which one of
the following groups?
[A]ISDN
79
[B]IRC
Page
[C]ISP
[D]Icons
following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers
[A] Printing [B] Queuing [C] Waiting Queue [D] Print Spooling [E] None of these
data? [A]Peripherals
[B]RAM
[C]ROM
[D]CPU
In a computer file systems which among the following is top or first in hierarchy?
[A]root directory
[B]parent directory
80
[C]home directory
Page
[D]working directory
[A]Recording of transactions
[C]Interest calculations
Now a days Vishing has become a criminal practice of using social engineering over
which of the following?
[B]Mobile
Phones
[C]E-mails
[D]Cyber cafés
When some unidentified / unknown person / firm sends you mail in a trust worthy
/lucrative way asking for sensitive banks and online payment information, this is a case of
[A]spam
[B]hacking
[C]Phishing
[D]Vishing
81
[B]gap between people having access to internet /IT and no internet /IT
[D]gap between people having access to internet banking and normal banking
Which among the following is the most common source of Viruses to the hard disk of
your computer?
[A]Incoming Email
[B]Outgoing Email
[C]CD ROMs
[D]Websites
[A]WWW Consortium
Which among the following is used for removing a software bug / defect which is
available for free of cost from the software provider?
[A]Version
[B]Update
[C]Help
[D]Patch
What is the name of the proposed software application that would allow users of
automated teller machines (ATMs) to alert the police of a forced cash withdrawal by
entering their personal identification number (PIN) in reverse order?
82
In the MICR Code Line Structure what do represent the first three digits of Sort field
number consisting of nine digits?
[A]City
[B]Bank
[C]Branch
[D]Account Type
Most of the internet banking sites provide which of the following feature to reduce the
risk of keystroke logging for the password entry?
[A]Virtual keyboard
[B]Finger Touching
[C]Touchscreen
[D]Shape Writer
ADSL data communications technology uses which of the following for faster data
transmission?
[B]Wireless Modem
[C]Copper telephone
Lines [D]Sockets
While browsing the internet, which of the following key is used for full screen
view?
[A]F3
83
[B]F5
Page
[C]F11
[D]F9
Which of the following is a suitable term for any programmable content of a hardware
device configurations and data for application-specific integrated circuits (ASICs),
programmable logic devices, etc.?
[A]Hardware
[B]Software
[D]Malware (Software, such as viruses, worms and Trojan horses that has a malicious
intent)
Most of the internet sites now a days use CSS primarily to enable the separation of
document content (written in HTML or a similar markup language) from document
presentation, including elements such as the layout, colors, and font s. What is full form?
What is the purpose of keeping electronic devices such as computers, televisions, and
remote controlled devices on Sleep mode?
[B]Back Up
Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for
Virtual PC?
[A]IBM
84
[B]Microsoft
Page
[C]Intel
[D]Google
[B]A software
Defragmentation?
[D]Reduce Power
consumption
[E]Create More Free Space is the main purpose however performance is also
improved in most cases.
Which among the following is a device that is used in computers to add external
components?
[B]Keyboard
[D]RAM
[A]Access time
Page
[B]Response time
[C]Entrance time
[D]Ping Time
The One-time password (OTPs) can be obtained by a customer, via which among
the following?
[B]SMS on Mobile
[D]All of above
The terms "push and pull services" in context with the Banking are used in which among
the following generally?
[A]Rural Banking
[C]Online Banking
[D]Mobile Banking
Consider the following in context with the CVV (Card Verification Code) of an ATM
or Credit Card:
1. Magnetic Stripe
3. Back of the card as a separate group of 3 digits to the right of the signature strip
[A]1 & 2
[B]2 & 3
[C]1 & 3
86
[D]1, 2 & 3
Page
[A]Segmentation
[B]Documentation
[C]Data Management
[D]Data History
Which among the following is an example of "Card not present Transaction" in context
with the Credit / Debit Cards?
[B]A person making an online purchase using his / her credit card
[A] Only 1
[B] 1 & 2
[C] 1, 2 & 3
[D]None of them
1. Software
2. Hardware
3. Internet Programs
The terms Bug and Debugging are generally used in which among the above?
[A] 1 & 2
[B] 2 & 3
[C] 1 & 3
[D] 1, 2 & 3
Technology?
[A]RTGS Transfers
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of t hem
The Clearing House Interbank Payment s System (CHIPS) is a clearing system for large
value transactions in which among the following countries /regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia
The terms Goodput, Throughput and Maximum throughput are most closely associated
with which among the following in computers?
[A]Bit Rate
[B]Response Time
88
[D]Random memory
Which among the following is the time period during which a computer is
malfunctioning or not operating correctly due to machine failures?
[A]Downtime
[B]Uptime
[C]Response time
[D]Runtime
Housing all hardware, software, storage and processing in one site location is called
A. Time-sharing
B. A Distributed system
C. Centralized Processing
D. A host Computer
E. None of these
A _______ Is a term used when a search engine returns a web page that matches the search?
(A) Blog
(B) Hit
(C) Link
(D) View
(E) Success
A sales clerk at a checkout counter scanning a tag on an item rather than keying it into
the system, is using
A. Input automation
B. Scanning automation
C. Source data automation
D. Item data automation
E. None of these
89
A. RAM
B. CPU
C. INTEL
D. Special function cards
E. All of these
Even if a disk drive fails, the computer application running and using it can
continue processing. This application is said to have been designed with a feature called
A. 100 percent up-time
B. Fault tolerance
C. High reliability
D. All of these
E. None of these
What would be the number of bytes, transferred at the rate of 1 Kilobit per
second?
[A] 100
[B] 108
[C] 125
[D] 140
What do we call the automatic execution of high-priority computer programs that have
been designed to pre-empt the use of computer resources?
[A]Foreground
processing.
[B]Background
processing.
90
Page
[C]Black processing.
[D]White processing.
[C]Debugging
What do we call a storage device where the access time is effectively independent of
the location of the data?
[D]Gateway Device
What do we call the pictorial representation that uses predefined symbols to describe
either the logic of a computer program or the data flow and processing steps of a system?
(A) Algorithm
(B) Flowchart
(C) Block Diagram
(D) Loop
The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS)
are used for measurement of?
(A) Bandwidth
processing jobs?
Page
2. Funds transfers between a customer's own transactional account and savings accounts
[A] 1, 2 & 3
[B] 2, 3 & 4
[C] 1, 3 & 4
[D] 1, 2, 3 & 4
[A] 2 G
[B] 3 G
[C] 4 G
[D] 5G
Which among the following has been standardized in the IEEE 802.3
specification?
[A]Bluetooth
[B]Ethernet
[C]WiMAX
92
[D]All of t hem
Page
While browsing internet, what do we call the area of storage that compensates for the
different speeds of data flow or timings of events by temporarily holding a block of data
that is waiting to be processed?
[A]Cache
[B]Buffer
[C]Flash
[D]T rash
A.FORTRN
B.C
C.COBOL
D.ALGOL
KEYBOARD
[C]Jokey
[D]Link Device
database
1. An individual
2. A server
3. A company
option:
[A]Only 1
[B] 1 & 2
[C] 2 & 3
[D] 1, 2 & 3
engine?
[A]Google
[B]Baidu
[D]Yahoo
Consider the following: 1. C 2. C++ 3. COBOL which among the above is/are high-
level languages (HLL)?
[A]Only 1
[B] 1 & 2
[C] 2 & 3
[D] 1, 2 & 3
Which of the following is the product of data processing
94
Software instruction intended to satisfy a user's specific processing needs are called
a. system software b. process software c. documentation d. application software
Which one of the following can produce the final product of machine processing in a
form usable by humans
a. storage b. control c. input device d. output device
General purpose computers are those that can be adopted to countless uses simply
95
by changing its
a. output device b. input device c. processor d. program
Page
The current generation of computers
a. Second b. fifth c. fourth d. third
A offline device is
a. a device which is not connected to CPU
b. a device which is connected to CPU
c. a device which is in breakdown stage
d. None of these
Memories in which any location can be reached in a fixed and short amount of time
after specifying its address is called
a. sequential access memory b. random access memory c. secondary memory d. mass
storage
The register which contains the data to be written into or read out of the addressed
location is known as
a. index register b. memory address register c. Memory Data Register d. program counter
The register which keeps track of the execution of a program and which contains the
memory address of the next instruction to be executed is known as
a. index register b. instruction register c. memory address register d. program counter
Which of the following is used as storage locations both in the ALU and in the control
section of a computer
a. accumulator b. register c. adder d. decoder
Accumulator is a
a. hardwired unit b. sequential circuit c. finite state machine d. register
In magnetic disks data is organized on the platter in a concentric sets or rings called
a. sector b. track c. head d. block
When we move from the outer most track to the innermost track in a magnetic disk,
the density
a. increases b. decreases c. remains the same d. either remains constant or decreases
Which of the following device can be used to directly input printed text
a. OCR b. Mouse c. MIC d. Joystick
In which storage device, recording is done by burning tiny pits on a circular disk
a. punched cards b. floppy disk c. magnetic tape d. optical disk
Which of the following printers uses light beam and electrostatically sensitive black powder
a. dot matrix printer b. daisy wheel printer c. chain printer d. laser printer
Scheduling is
a. allowing job to use the processor
b. unrelated performance considerations
c. quiet simple to implement, even on large main frames
d. the same regardless of the purpose of the system
Multiprogramming systems
a. are easier to develop than single programming systems
b. execute each job faster
c. execute more jobs in the same time period
d. use only one large mainframe computer
Impact printers
98
Which technique is preferable for transferring a large amount of data to and from a
memory in a short time
a. DMA b. Interrupt driven I/O c. programmed I/O d. None of these
The greatest negative number which can be stored in a computer that has 8-bit word
length and uses 2's complement arithmetic is
a. -256 b. -255 c. -128 d. -127
The OSI reference model defines the function for seven layers of protocols
a. including the user and communication medium.
b. not including the user or communication medium
c. including the communication medium but not the user
99
Base band is
a. transmission of signals without modulation
b. a signal all of whose energy is contained within a finite frequency range.
c. the simultaneous transmission of data to a number of stations
d. all of the above
To connect a computer with a device in the same room, you might be likely to use
a. a coaxial cable b. a dedicated time c. a ground station d. all of the above
Which of the following component of a computer system is the most important to a data
base management system
a. mouse b. high resolution video display c. printer d. high speed, large capacity disk
Which of the following contains complete record of all activity that affected the contents of
a database during a certain period of time
a. master file b. transaction file c. report d. query file
When changes occur in a data item, if every file which contains that field are not be
updated then, it leads to
a. data redundancy b. data inconsistency c. data security d. data loss
When the same data field is stored more than once in a file, then it leads to
a. data redundancy b. data inconsistency c. data dependency d. data independency
Firmware means
a. software b. hardware c. software available on hardware d. none of these
Which of the following controls the manner of interaction between the user and the
Page
operating system?
(A) User interface (B) Language translator(C) Platform (D) Screen saver(E) None of these
The blocks of code, included in the operating system, that software applications interact
with are known as:
(A) Application programming interfaces (APIs). (B) Complimentary metal-
oxide conductors (CMOS) (C) Device drivers. (D) Bootstrap loaders
A Spooler is a
(A) Location in memory that maintains the contents of a document until it prints out.
(B) Print job.
(C) Program that coordinates the print jobs that are waiting to print.
(D) Message sent from the printer to the operating system when a print job is completed
The issues that deal with the collection and use of data about individual is
A. Access
B. Publicity
C. Accuracy
D. Property
E. Privacy
C. Diagnostic Disk
D. Program Disk
E. None of these
Page
The purpose of a swap (or page) file is to:
(A) Maintain pages of documents that are being spooled to the printer.
(B) Hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) Prevent thrashing in a multitasking environment.
(D) Allow multiple print jobs to print their pages out simultaneously.
Which of the following is the correct sequence of actions that takes place during the boot-
up process?
(A) Load operating system? Activate BIOS? Perform POST? Check configuration settings
(B) Activate BIOS? Perform POST? Load operating system? Check configuration
settings
(C) Perform POST? Load operating system? Activate BIOS? Check configuration settings
(D) Activate BIOS? Check configuration settings? Perform POST? Load operating system.
All of the following are steps involved in the boot process EXCEPT:
(A) Load the operating system into RAM.
(B) The power-on self-test.
(C) Activate the basic input/output system (BIOS).
(D) Load application programs.
(A) BIOS (B) API (C) device driver (D) supervisor program
103
Page
Ensuring that the essential peripheral devices are attached and operational
is the process.
(A) configuration (B) CMOS (C) POST (power-on self-test) (D) ROM
Which of the following does NOT occur during the power-on self-test (POST)?
(A) The Scandisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
The contains data descriptions and defines the name, data type, and length
of each field in the database.
(A) data dictionary (B) data table(C) data record (D) data field(E) None of these
Granting an outside organization access to internet web pages is often implemented using
a(n)
(A) Extranet (B) intranet(C) internet (D) hacker (E) None of these
Which term identifies a specific computer on the web and the main page of the entire site
(A) URL (B) Web site address(C) Hyperlink (D) Domain name (E) None of these
Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
104
are specially designed computer chips that reside inside other devices, such
as your car or your electronic thermostat.
A. Servers B. Embedded computers C. Robotic computers D. Mainframes
The process of copying software programs from secondary storage media to the hard disk
is called
A. Configuration
B. Downloading
C. Storage
D. Uploading
E. Installation
The time taken by CPU to retrieve and interpret the instruction to be executed is called as :
(A) Instruction cycle (B) Fetch cycle
(C) Both (A) & (B) (D) All of these
(E) None of these
Which of the following tools is not normally used during systems analysis?
(A) Program Flow Chart (B) Grid Chart (C) System Flow Chart (D) Question Check-list
(E) none of these
Memory is made up of
105
(A) Set of wires (B) Set of circuits (C) Large number of cells (D) All of these
When a key is pressed on the keyboard, which standard is used for converting the
Page
keystroke into the corresponding bits
(A)ANSI (B) ASCII (C) EBCDIC (D) ISOA
Pixel is-
(A) A computer program that draws picture
(B) A picture stored in secondary memory
(C) The smallest resolvable part of a picture, also called Picture Element
(D) None of these
When entering text within a document, the Enter Key is normally pressed at the end
of every
A. Line B. Sentence C. Paragraph D. Word E. File
internet.
A. Extensible Markup Language (XML)
B. Extensible Business Reporting Language (XBRL)
C. Enterprise Application Integration (EAI)
D. Sales Force Automation (SFA)
Your business has contracted with another company to have thorn host and run an
application for your company over the internet. The company providing this service to
your business is called an
A. Internet Service Provider
B. Internet Access Provider
C. Application Service Provider
D. Application Access Provider
E. Outsource Agency
Companies use which of the following vendors to provide access to software and
services rather than purchasing the applications and maintaining the applications
themselves?
A. Open source vendors
B. Alliances
C. Application Service Provider
D. All of the above
E. None of the above
Which of the following devices has a limitation that we can only read it but cannot erase
or modify it?
A. Tap Drive
B. Hard Disk
C. Compact Disk
D. Floppy Disk
E. None of these
107
A uses pressure as a user press it with a stylus (a input device) to send signals.
A. Touchpad B. TrackPoint C. TrackPad D. Keyboard E. Graphics
Tablet
The permanently etched program in ROM that automatically begins executing the
computers instructions is the
A. BIOS B. ROM C. CMOS D. RAM E. None of these
Which type of software is distributed free (free version) but requires the user to pay
some amount for further use (full version by providing key)?
A. Freeware B. Malware C. Shareware D. Abandonware E. Public domain software
A Tuple is a
A. Column of table
B. Two dimensional table
C. Row of table
D. Key of table
E. None of these
B. Plagiarism
C. Software Piracy
D. Site-license Piracy
E. None of these
2. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless
network nodes.
(1) Wireless port
(2) Wireless access point
(3) Wireless adapter
(4) Wireless transceiver
(5) None of these
6. ASCII is a(n)________
(1) Numbering system for representing numbers with decimals.
(2) Character representation standard common in older mainframe computers.
(3) Encoding standard used to represent letters and characters.
(4) Symbolic programming language that directly represents machine instructions.
(5) None of these
7. A global network made up of thousands of privately owned computers and networks is called
the:
(1) World Wide Web.
(2) Internet.
(3) Specialized search engine.
(4) Internet2.
(5) None of these
2) ARPANET
3) Ethernet
4) Intranet
5) None of these
18. What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these
19. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware
2) Software
3) Firmware
4) ROM ware
5) None of these
21. Computer uses the_________number system to store data and perform calculations.
1) Binary
2) Octal
3) Decimal
4) Hexadecimal
5) None of these
25. Which of the following is used by the browser to connect to the location of the Internet
resources?
1) Linkers
2) Protocol
3) Cable
4) URL
5) None of these
26. ……….is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) None of these
27. What is the permanent memory built into your computer called?
(1) RAM
(2) Floppy
(3) CPU
(4) CO-ROM
(5) ROM
28. Which computer memory is used for storing programs and data currently being processed by
the CPU?
(1) Mass memory
(2) Internal memory
(3) Non-volatile memory
(4) PROM
(5) None of these
3) Modifying
4) Adjusting
Page
5) None of these
30. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
31. What is a popular program for creating documents that can be read on both a PC and a
Macintosh computer?
(1) Microsoft Word
(2) Adobe In Design
(3) Adobe Acrobat
(4) QuarkXPress
(5) None of these
34. What type of software creates a smaller file that is faster to transfer over the Internet?
(1) MPEG
(2) Unzipped
(3) Fragmentation
(4) Compression
(5) None of these
35. A unit of computer information that contains data as well as all the procedures or operations
is called:
(1) A method.
(2) Encapsulation.
(3) An object.
(4) An OOP
114
37. The most widely used type of database management system is the:
(1) Flat database.
(2) Network database.
(3) Relational database.
(4) Hierarchical database.
(5) None of these
38. What is the newest type of database, which is well suited for multimedia applications, called?
(1) Object-oriented database
(2) Client/server database
(3) Data warehouse
(4) Multimedia database
(5) None of these
40. The type of printer that prints by selectively unchanging static electricity from spots on a
metal drum is a(n):
(1) Plotter
(2) Dot-matrix printer
(3) Laser printer
(4) Ink-jet printer
(5) None of these
42. Setting fonts for the text in your document is an example of:
115
(1) Formatting.
(2) Formulas.
Page
43. ____________ is the file system used by the operating system to identify the physical
locations of files on the hard drive.
(1) RTOS
(2) GIF
(3) FAT
(4) POST
(5) None of these
44. ___________software allows the user to speak into the computer rather than type in text.
(1) Speech recognition
(2) CHAT
(3) Message
(4) All of the above
(5) None of these
50. What type of software must to be used to translate scanned text into a format that can be
manipulated?
(1) OCR
(2) CRT
(3) RGB
(4) MIDI
(5) None of these
54. Retail employees typically use ____________ terminals to process sales transactions.
(1) Sales processing
(2) Transaction point
(3) Automatic teller
(4) Point of sale
(5) None of these
117
55. The primary purpose of a computer is to process _____________ and convert it into
information.
Page
(1) Electricity
(2) Data
(3) Raw material
(4) A bit
(5) None of these
56. The simultaneous processing of two or more programs by multiple processors is _____
(1) Multiprogramming
(2) Multitasking
(3) Time-sharing
(4) Multiprocessing
(5) None of these
58. The……….folder retains copies of messages that you have started but are not yet ready to
send.
(1) Drafts
(2) Outbox
(3) Address Book
(4) Sent Items
(5) None of these
60. The ___________ records the name and exact location of every file on a disk.
(1) Partition master
(2) File allocation table
(3) Disk controller
(4) Boot sector
(5) None of these
118
61. Inheritance is the ability of an object to pass on its characteristics to its ____________.
Page
(1) Subclasses
(2) off-spring
(3) Super classes
(4) Parents
(5) None of these
63. Which of the following extends data across networks rather than store it in one central site?.
(1) PIM
(2) File manager
(3) Distributed database
(4) Data mining program
(5) None of these
66. What should be used if a company wants to include its company name and logo at the bottom
of every page of a brochure?
(1) Header
(2) Macro
(3) Footer
(4) Footnote
(5) None of these
(2) VB
(3) C++
Page
(4) Pascal
(5) None of these
73. A program that converts high level language to machine Language is _______
(1) Linker
(2) Assembler
(3) Compiler
(4) All of the above
(5) None of these
120
(3) Iron
(4) Copper
Page
82. A connection from one HTML document to another HTML document is called………...
(1) Hyper Link
(2) Connecting Link
(3) Icon
(4) All of these
(5) None of these
83. This device is used to connect your computer with a telephone line, so that can access
information from other servers and ordinary users too, said device is called ___________
(1) Modem
(2) Set Top Box
(3) LAN Card
(4) UPS
(5) None of these
84. Device on one network can communicate with devices on another network via_______
(1) File Server
(2) Utility Server
(3) Printer Server
(4) Gateway
(5) None of these
87. What are the units used to count the speed of a printer?
Page
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these
88. A computer that combines the characteristic of analog and digital computers_________
(1) Hybrid Computer
(2) Digital Computer
(3) Analog Computer
(4) Super Computer
(5) None of these
101. When more than one window is open, to switch to the next window — is the key
combination.
(1) CTRL+F5
(2) CTRL+F6
(3) CTRL+F7
(4) CTRL+F8
(5) None of these
102. Where are data and program stored when the processor uses them?
(1) Main memory
(2) Secondary memory
(3) Disk memory
(4) Program memory
(5) None of these
(2) 200%
(3) 400%
Page
(4) 500%
(5) None of these
111. A set of rules for creating markup languages that enables programming to capture specific
types of data by creating their own elements is called______
(1) XML
(2) HTML
(3) Ada
(4) XHTML
(5) None of these
112. Small plain text files that are written to your computer's hard disk by many of the Web sites
you visit are called_______
(1) RFIDs
(2) Web beacons
(3) GUIDs
126
(4) Cookies
(5) None of these
Page
113. Which of the following is the proper way to denote a cell in a spreadsheet?
(1) 5C
(2) C5
(3) 2-15
(3) C
(4) None of these
116. Which backup method only backs up files that have been modified since the last backup?
(1) Incremental backup
(2) Partial backup
(3) Selective backup
(4) Full backup
(5) None of these
119. A disk's content that is recorded at the time of manufacture and that cannot be changed or
127
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
122. Which key is used to delete one character to the left of the current position of the cursor?
(1) Backspace
(2) Delete
(3) Insert
(4) Esc
(5) Ctrl
123. If you want to connect to your own computer through the Internet from another location,
you can use………………
(1) E-mail
(2) FTP
(3) Instant message
(4) Telnet
(5) None of these
124. A(n) ……….is a special visual and audio effect applied in Power-point to text or content.
(1) Animation
(2) Flash
(3) Wipe
(4) Dissolve
(5) None of these
125. Where does most data go first with in a computer memory hierarchy?
(1) RAM
(2) ROM
128
(3) BIOS
(4) CACHE
Page
(2) ROM
(3) CPU
(4) PC
(5) None of these
133. Computers process data into information by working exclusively with ______
(1) Multimedia
(2) Words
(3) Characters
(4) Numbers
(5) None of these
136. ___________ Store data temporarily and pass it on as directed by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these
140. A device that is used to transmit data from one location to another is known as ________
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these
141. Programs developed by an outside supplier and provided to the user in a machine readable
form is known as___________.
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these
142. Which of the following describe one or more characteristics of a modem computer?
(1) An electronic device
(2) A mechanical device
(3) An electro-mechanical device
(4) All of the above
(5) None of these
148. Which process checks to ensure the components of the computer and operating are
connected properly?
(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these
149. What is the correct association between a hardware component and a computer function?
(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk > processing
(5) None of these
150. The sharing of a medium and its path by 2 or more devices is called ________.
(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these
156. Programming language built into user programs such as Word and Excel are known as
_______.
(1) 4GLs
(2) Macro languages
(3) Object-oriented languages
(4) Visual programming languages
(5) None of these
157. Codes consisting of lines of varying widths or lengths that are computer-readable are known
as______.
(1) An ASCII code
(2) A magnetic tape
(3) An OCR scanner
(4) A bar code
(5) None of these
133
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh
161. Which of the following can be used to select the entire document?
(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H
164. Instructions and data that are processed by the CPU are located in________
(1) CD-ROM
(2) RAM
134
166. The commonly used UNIX commands like date, ls, cat etc. are stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4) unix directory
(5) None of these
167. A circuit with about 100 transistors fabricated on a single chip is called _____
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these
170. Computers that are portable and convenient for users who travel are known as _____
(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these
135
172. The _____ tells the computer how to use its components.
(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these
173. When sending an e-mail, the _____ line describes the contents of the message.
(1) To
(2) Subject
(3) Contents
(4) CC
(5) None of these
177............ Is a method in which multiple communication devices are connected to one another
efficiently.
(1) Switching
(2) Redundancy
136
(3) Capacity
(4) Detecting
Page
181. Small application programs that run on a Web page and provide animation are known as
_________
(1) Flash
(2) Spiders
(3) Cookies
(4) Applets
(5) None of these
182. The errors that can be pointed out by the compiler known as ______.
(1) Syntax errors
(2) Semantic errors
(3) Logic errors
(4) System errors
(5) None of these
183. A _______ contains specific rules and words that express the logical steps of an algorithm?
(1) Syntax
(2) Programming structure
(3) Programming language
(4) Logic chart
137
185. Storage that retains its data after the power is turned off is referred to as?
(1) Volatile storage
(2) Non-volatile storage
(3) Sequential storage
(4) Direct storage
(5) None of these
188. Which is the part of a computer that one can touch and feel?
(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these
(2) Kick
(3) Boot
Page
(4) Kick-start
(5) None of these
192. The operating system that is self-contained in a device and resident in the ROM is ______
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these
195. ___________is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
196............. is the combination of keys to switch between the last four places that you have
edited.
(1) ALT + CTRL + Z
(2) ALT + CTRL + Y
(3) ALT + TAB + Z
(4) ALT + SHIFT + Z
139
198. Accessing data on tapes is much ....... than that accessing data on disks?
(1) Slower
(2) Faster
(3) Same
(4) All of the above
(5) None of these
199. Who amongst the following is called the father of modern computing?
(1) Charles Babbage
(2) Hollerith
(3) Gottfried von Leibnitz
(4) Joseph M. jacquard
(5) None of these
200. If you begin typing an entry into a cell and then realize that you don't want your entry
placed into a cell, you_________
(1) Press the Erase key
(2) Press Esc key
(3) Press the Enter button
(4) Press the Edit Formula button
(5) None of these
204. Holding the mouse button down while moving an object or text is known as ___
(1) Moving
(2) Dragging
(3) Dropping
(4) Highlighting
(5) None of these
207. What happens when we try to delete the fries on the floppy?
(1) The files get moved to the Recycle Bin
(2) Files on a floppy cannot be deleted
(3) The files get deleted and can be restored again from Recycle Bin
(4) The files get deleted and cannot be restored again
(5) The file gets copied on the Hard disk
208. An educational institution would generally have the following in its domain name......
(1) .org
(2) .edu
(3) .inst
(4) .com
(5) .sch
210. Which of the following can input graphical images and pictures for a computer?
(1) Plotter
(2) Scanner
(3) Mouse
(4) Printer
(5) Keyboard
216. For running WINDOW minimum disk free space required is?
142
(1) 8 MB
(2) 10 MB
Page
(3) 16 MB
(4) 32 MB
(5) None of these
220. In 1983, this person was the first to offer a definition of the term 'computer virus'?
(1) MC Fee
(2) Smiths
(3) Frederick Cohen
(4) Norton
(5) None of these
223. ________ deletes an item immediately without placing it in the recycle bin.
(1) Shift +enter
(2) Shift +delete
(3) Shift +right arrow
(4) Shift +left arrow
(5) None of these
233. What are the four main aspects of data handling with a computer?
(1) Input, processing, output, and storage
(2) Comparing, dividing, sorting, and organizing
(3) Decision making, sorting, correcting, and mapping
(4) Adding, subtracting, multiplying, and dividing
(5) None of these
234. Most cash registers are now computers that are known as ____________ terminals.
(1) POS
(2) DS
(3) UDC
(4) UPC
(5) None of these
237. If you change Windows 98 to Windows XP, you are actually performing...........
(1) Upstart
(2) Upgrade
(3) Update
(4) Patch
(5) None of these
244. When you save to this, your data will remain intact even when the computer is turned off–
(1) RAM
(2) Motherboard
(3) Secondary storage device
(4) Primary storage device
(5) None of these
245. A central computer that holds collections of data and programs for many PCs, workstations,
and other computers is a(n) –
(1) Supercomputer
(2) Minicomputer
(3) Laptop
(4) Server
(5) None of these
246. The piece of hardware that converts your computer's digital signal to an analog signal that
can travel over telephone lines is called a–
(1) Red wire
(2) Blue cord
(3) Tower
(4) Modem
(5) None of these
249. Which of the following is a storage device that uses rigid, permanently installed magnetic
disks to store data/information–
(1) Floppy diskette
(2) Hard disk
(3) Permanent disk
(4) Optical disk
(5) None of these
252. A computer program that converts an entire program into machine language at one time is
called a/ an ____
(1) Interpreter
(2) Simulator
(3) Compiler
(4) Numbers
(5) None of these
(3) Latency
(4) Access time
Page
264. Pascal is
(1) A high-level programming language
(2) Named after Blaise Pascal
(3) Named after mathematician that facilitates structured programming techniques
(4) All of the above
(5) None of these
265. Technique to implement virtual memory where memory is divided into units of fixed size
memory is–
(1) Paging
(2) De-fragments
(3) Segmentation
(4) All of the above
(5) None of these
266. An adder where all the bits of the two operands are added simultaneously–
(1) Parallel adder
(2) Half adder
(3) Full adder
(4) All of the above
(5) None of these
267. The point at which the flow of text in a document moves to the top of a new page–
(1) Page insert
(2) Page break
(3) Page format
(4) All of the above
(5) None of these
150
(2) Consisting of more than one input devices under common control
(3) Where many output devices under
(4) All of the above
(5) None of these
273. The computers which are relatively rare because of their cost and size are:
(1) Mini Computers
(2) Micro Computers
(3) Super Computers
(4) Laptops
(5) Mainframe Computer
278. A………is a collection of data that is stored electronically as a series of records in a table.
(1) Spreadsheet
(2) Presentation
(3) Database
(4) Web page
(5) None of these
279. As you create documents, graphs and pictures your computer holds the data in—
(1) Restore file
(2) Backup drive
(3) Clip board
(4) Memory
(5) None of these
281. ………processing is used when a large mail-order company accumulates orders and
152
(2) Online
(3) Real-time
(4) Group
(5) None of these
282. Computer programs are written in a high-level programming language; however, the human
readable version of a program is called—
(1) Cache
(2) Instruction set
(3) Source code
(4) Word size
(5) None of these
285. What is the short cut key to open the Open dialog box in Ms word?
(1) F12
(2) Shift F12
(3) Alt + F12
(4) Ctrl + F12
(5) None of these
292. The operating system that is self-contained in a device and resident in the ROM is.......
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these
294. .......... is the key to close a selected drop - down list; cancel a command and close a dialog
Page
box.
(1) TAB
(2) SHIFT
(3) ESC
(4) F10
(5) None of these
295. Which of the following is NOT one of the four major data processing functions of a
computer?
(1) Gathering data
(2) Processing data into information
(3) Analyzing the data or information
(4) Storing the data or information
(5) None of these
297. A ............ is an additional set of commands that the computer displays after you make a
selection from the main menu
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of the above
(5) None of these
298. A letter, memo, proposal or other file that is created using Microsoft Word is called as?
(1) Master
(2) Slide
(3) Document
(4) Worksheet
(5) None of these
(2) Calculator
(3) Series Computes
(4) Parallel Computers
(5) None of these
301. The ROM chip which can be rewritten several times and requires the action of ultraviolet
radiations to erase its contents is________
(1) Flash memory
(2) PROM
(3) EEPROM
(4) EPROM
(5) None of these
305. In which kind of disk does the read/write head physically touches the surface?
(1) Hard Disk
(2) Compact Disk
(3) Floppy Disk
(4) All of the above
(5) None of these
306. What is the correct syntax for typing a function into a cell?
(1) Equal sign, Function Name, Matching brackets
(2) Function Name, Equal sign, Matching brackets
156
309. The overall design, construction, organization and interconnecting of the various
components of a computer system is referred as–
(1) Computer Architecture
(2) Computer Flowchart
(3) Computer Algorithm
(4) All of the above
(5) None of these
312. A process of trying out a new product by independent users before it is finally
manufactured/developed–
(1) Alpha test
(2) Beta Test
(3) Gamma test
157
315. The technique where digital signals are converted to its analog form for transmission over
an analog facility is called–
(1) Modulation
(2) Digitization
(3) Multiprocessing
(4) All of the above
(5) None of these
322. Which of the following displays the contents of the active cell?
(1) Active cell
(2) Formula bar
(3) Menu bar
(4) Name box
(5) None of the above
324. What is the keyboard shortcut for creating a chart from the selected cells?
(1) F3
(2) F5
(3) F7
(4) F11
(5) None of the above
327. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these
329. What is defined as the number of bits that the CPU processes as a unit?
(1) A computer sentence
(2) A computer word
(3) A computer phrase
(4) A computer term
(5) None of these
330. _________ Systems use a light beam to scan input data and convert it into electrical signals,
which are sent to the computer for processing.
(1) Image recognition
(2) Optical recognition
(3) PDF
(4) Application
(5) None of these
331. _________ Devices accept the spoken word through a microphone and convert it into
binary code that can be understood by the computer.
(1) Speech recognition
(2) Handwriting recognition
(3) Peripheral
(4) All of the above
(5) None of these
160
333. _________ Means that a transaction is processed fast enough for the result to come back
and be acted upon right away.
(1) Real-time processing
(2) Records processing
(3) Batch processing
(4) All of the above
(5) None of these
334. _________ uses an area of memory to temporarily store data from disk that the program
might need soon.
(1) Data transferring
(2) DVD
(3) Disk caching
(4) All of the above
(5) None of these
335. What is a device that prevents electrical problems from affecting computer data files?
(1) An incremental backup
(2) A full backup
(3) A surge protector
(4) A differential backup
(5) None of these
336. What is any text that can be keyed in, such as a memo?
(1) A database
(2) A spreadsheet
(3) A text document
(4) A business presentation
(5) None of these
337. What type of program lets you produce professional-looking documents containing both
text and graphics?
(1) A page composer
(2) A thesaurus
(3) A desktop publisher
(4) A speller checker
(5) None of these
161
338. The letter and number of the intersecting column and row is the:
(1) Cell coordinates
Page
340. Which of the following are three fundamental characteristics that make a computer useful?
(1) Lightweight, inexpensive, and sturdy
(2) Speed, reliability, and storage capability
(3) Durable, connectible, and renewable
(4) All of the above
(5) None of these
342. Software used for database management can store data, update it, __________ it, retrieve it,
report it, and print it.
(1) Manipulate
(2) Download
(3) See
(4) All of the above
(5) None of these
344. Which of the following helps describe the Windows .NET Server?
(1) It is designed for different levels of network complexity.
(2) It is a direct upgrade from Windows NT.
162
346. The focus of the first phase of the systems development life cycle is to:
(1) Design what the new system should do
(2) Analyze and document the existing system
(3) Identify problems and opportunities
(4) Implement the new system
(5) None of these
347. Which of the following is a network in which computers are located physically close
together, often in the same building?
(1) WAN
(2) PAN
(3) MAN
(4) LAN
(5) None of these
350. In the OSI model, the actual transmission of data is handled in the ____________ layer.
(1) Data link
(2) Physical
(3) Network
(4) Transport
163
354. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered
(1) Data
(2) Input
(3) Output
(4) The process
(5) None of these
356. What is the main difference between a mainframe and a super computer?
(1) Super computer is much larger than mainframe computers
(2) Super computers are much smaller than mainframe computers
(3) Supercomputers are focused to execute few programs as fast as possible while
mainframe uses its power to execute as many programs concurrently
(4) Supercomputers are focused to execute as many programs as possible while mainframe uses
its power to execute few programs as fast as possible
(5) None of these
164
357. Programs such as Mozilla Firefox that serve as navigable windows into the Web are
Page
called..........
(1) Hypertext
(2) Networks
(3) Internet
(4) Web browsers
(5) None of these
(2) Press F2
(3) Press F4
Page
(4) Press F5
(5) None of these
364. You can convert existing Excel worksheet data and charts to HTML document by using the
(1) FTP Wizard
(2) Internet Assistant Wizard
(3) Intranet Wizard
(4) Import Wizard
(5) None of the above
368. Which of the following storage media provides sequential access only?
(1) Floppy disk
(2) Magnetic disk
(3) Magnetic tape
(4) Optical disk
(5) None of these
370. The set of parallel electrical conducting lines through which different components on the
Page
371. A PDA's memory contents remain intact when it is turned off because:
(1) A battery keeps current available for RAM
(2) The memory contents are synchronized with a desktop
(3) The memory contents are copied to flash cards
(4) The memory contents are stored in ROM
(5) None of these
375. Which of the following would NOT be performed with application software?
(1) Financial report sent to investors
(2) Hard disk cleanup
(3) Charts for a sales meeting presentation
(4) Customer list used for mailing invoices
(5) None of these
376. Which of the following statements is TRUE about the public switched telephone network
(PSTN)?
167
cable
(3) PSTN is exclusively a digital network system
(4) PSTN is only used for voice transmissions, while the Internet is used for data transmissions
(5) None of these
377. Which of the following best describes the difference between the Internet and the World
Wide Web?
(1) The Internet is the collection of computers, while the World Wide Web is the wiring and
transmission protocols that connect them
(2) The Internet carries traffic for schools, government offices, and other public organizations,
while the World Wide Web carries commercial traffic
(3) The Internet consists of software programs such as e-mail and IRC, while the World Wide
Web is a collection of Web pages
(4) The Internet is the physical network of global computers, while the World Wide Web is
many hypertext documents distributed globally over many computers
(5) None of these
378. Which of the following runs on a user's local computer and is used to request and display
Web pages?
(1) FTP
(2) Web browser
(3) Web server
(4) HTML
(5) None of these
380. Which of the following is the most frequently used input device?
(1) Microphone
(2) Scanner
(3) Touch screen
(4) Mouse
(5) None of these
386. Which type of network requires HPNA adapters for communication between network
nodes?
(1) Phone line
(2) Wireless
(3) Power line
(4) Ethernet
(5) None of these
387. To analyze vast quantities of scientific data and display underlying patterns, you would use
a:
(1) Mainframe
(2) Server
(3) Supercomputer
(4) Minicomputer
(5) None of these
169
388. The free, open-source operating system that is becoming popular is:
Page
(1) Mac OS X
(2) Microsoft Windows XP
(3) UNIX
(4) Linux
(5) None of these
389. What term is used to describe software that monitors your online computer activities?
(1) Snooper ware
(2) Spyware
(3) Tracker ware
(4) Travel ware
(5) None of these
390. Which of the following is a memory management technique that makes the random access
memory appear larger than it is?
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these
392. Which of the following may be necessary for you to do after you install new application
software?
(1) Turn the computer power switch off and then back on
(2) Do a cold boot
(3) Press Shift + Alt + Del
(4) Do a warm boot
(5) None of these
394. Input, processing, output, and storage are collectively referred to as:
170
396. An example of a wireless medium that sends data through the air or space is:
(1) Fiber-optic cable.
(2) Coaxial cable.
(3) Twisted pair.
(4) Microwaves.
(5) None of these
398. Information that comes from an external source and fed into computer software is
called................
(1) Output
(2) Input
(3) Throughput
(4) Reports
(5) None of these
399. The basic unit of a worksheet into which you enter data in Excel is called a–
(1) Tab
(2) Box
(3) Range
(4) Cell
(5) None of these
400. All of the following are examples of real security and privacy risks EXCEPT
(1) Hackers
(2) Viruses
(3) Spam
171
402. In Excel, this is a prerecorded formula that provides a shortcut for complex
calculations.........
(1) Value
(2) Data Series
(3) Function
(4) Field
(5) None of these
403. The process of trading goods over the Internet is known as..............
(1) e-selling-n-buying
(2) e-trading
(3) e-finance
(4) e-salesmanship
(5) e-commerce
404. A device that connects to a network without the use of cables is said to be–
(1) Distributed
(2) Free
(3) Centralized
(4) Open source
(5) None of these
405. Which of the following is a circuit that issue signals at regular intervals..........?
(1) Circuit board
(2) Clock
(3) Circuit card
(4) Gates
(5) None of these
407. The 0 and 1 in the binary numbering system are called binary digits or……....
(1) Bytes
Page
(2) Kilobytes
(3) Decimal bytes
(4) Bits
(5) Nibbles
411. Several views are available in MS Front Page. Which one of the following is NOT a valid
view?
(1) Design View
(2) Folders View
(3) Navigation View
(4) Web Server View
(5) None of these
412. One of the components of central processing unit (CPU) of the computer that performs
mathematical and logical operations is..........
(1) ALU (arithmetic logical unit)
(2) Address register
(3) Analog
(4) All of the above
(5) None of these
(2) TAB
(3) ENTER
Page
(4) CTRL
(5) None of these
415. When you insert an Excel file into a Word document, the data are
(1) Hyperlinked
(2) Placed in a word table
(3) Linked
(4) Embedded
(5) None of the above
421. A .......... shares hardware, software, and data among authorized users.
(1) Network
(2) Protocol
(3) Hyperlink
(4) Transmitter
(5) None of these
422. To produce a high - quality graphics (hardcopy) in color, you would want to use a
(1) Virtual Printer
(2) Laser Printer
(3) Ink - jet Printer
(4) Plotter
(5) RGB Monitor
425. What is the smallest and largest font size available in Font Size tool on formatting toolbar?
(1) 8 and 72
(2) 8 and 64
(3) 12 and 72
(4) None of above
(5) None of the Above
426. Aligns the selected text or line to justify the screen press-------
(1) Ctrl + c
(2) Ctrl + I
175
(3) Ctrl + J
(4) Ctrl + k
Page
428. When data changes in multiple lists and all lists are not updated, this causes?
(1) Data redundancy
(2) Information overload
(3) Duplicate data
(4) Data inconsistency
(5) None of these
429. Granting an outside organization access to internet web pages is often implemented using
a(n)?
(1) Extranet
(2) Intranet
(3) Internet
(4) Hacker
(5) None of these
432. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(1) An open folder.
(2) The folder contains subfolders.
(3) A text file.
(4) A graphics file
(5) None of these
176
433. All of the following statements concerning windows are true EXCEPT—
Page
434. The memory resident portion of the operating system is called the—
(1) Registry.
(2) API.
(3) CMOS.
(4) Kernel.
(5) None of these
439. Which key is used in combination with another key to perform a specific task?
(1) Function
(2) Control
177
(3) Arrow
(4) Space bar
Page
442. ___________ is a process that permits multiple computers to use the same IP address and
hide their actual IP addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these
444. Data representation is based on the………number system, which uses two numbers to
represent all data.
(1) Binary
(2) Biometric
(3) Bicentennial
(4) Byte
(5) None of these
445. To what temporary area can you store text and other data, and later paste them to another
location?
(1) The clipboard
(2) ROM
(3) CD-ROM
178
447. Which of the following correctly describes the CD-R and DVD-R discs?
(1) You may record data to the disc surface multiple times and can read the current contents at
any time.
(2) You may read data from the disc but may not alter its contents.
(3) You may record data to the disc surface multiple times but have no direct reading capability.
(4) You may record data to the disc surface once and then may only read its contents
(5) None of these
450. Use this when you want to make all letters capital without having to use the shift key for
each character………
(1) Shifter
(2) Upper case
(3) Caps lock key
(4) Icon
(5) None of these
451. -------------------is a program that has been physically etched onto a chip.
(1) Firmware
(2) Software
(3) Compiler
(4) Interpreter
(5) None of these
179
452. The type of memory that must have a constant power supply is:
Page
(1) SDRAM.
(2) PROM.
(3) ROM.
(4) EEPROM.
(5) None of these
453. What type of e-commerce is being used when a student buys a computer from Dell.com?
(1) B2B
(2) C2C
(3) B2E
(4) B2C
(5) None of these
455. The topology where all the nodes are attached in a circular wiring arrangement is called a:
(1) Star topology.
(2) Bus topology.
(3) Network topology.
(4) Ring topology
(5) None of these
458. Where are the Editing group and the Replace command found?
(1) On the Insert tab
(2) On the Review tab
180
465. Grouping and processing all of a firm's transactions at one time is called–
Page
469. -------------- Types of virus that stays permanently in the RAM memory
(1) Resident
(2) File infectors
(3) Boot virus
(4) Macro virus
(5) None of these
473. Which of the following is the advantage of Assembly language over Machine language?
(1) Easy to use
(2) Easy to understand
(3) Easy to modify
(4) All the above
(5) None of these
476. Which of the following memories can be read directly by the computer processor?
(1) Hard Disk
(2) Main Memory
(3) CD
(4) DVD
(5) None of these
477. The communication between a processor and other devices inside the computer is done
through?
(1) Bus
(2) Channel
(3) Network Cable
(4) Chip
(5) None of these
183
479. What is the difference between a check box and Radio button?
(1) No difference
(2) In radio buttons multiple options can be selected whereas in check boxes only single option
can be selected
(3) In check boxes as well as radio buttons multiple options can be selected, but radio buttons
can be used only twice
(4) In check boxes multiple options can be selected whereas in radio buttons only single
option can be selected
(5) None of these
483. During the ____________ operation, the control unit determines what the program is telling
the computer to do.
(1) Fetch
(2) Execute
(3) Decode
(4) Arithmetic
(5) None of these
184
484. _________ has a large storage capacity, up to 17 GB if both layers and both sides are used.
Page
(1) DVD-ROM
(2) CD-ROM
(3) Floppy
(4) RAM
(5) None of these
485. A __________ card connects each computer to the wiring in the network.
(1) Network interface
(2) PC interface
(3) Memory
(4) All of the above
(5) None of these
487. What is the term for a set of step-by-step instructions that direct a computer to perform its
tasks?
(1) Setup
(2) Program
(3) System
(4) Instruction manual
(5) None of these
488. To execute a given DOS program, you must type a(n) __________.
(1) Command
(2) Order
(3) Syntax
(4) All of the above
(5) None of these
489. PC cards, flash memory cards, and smart cards are all examples of:
(1) Removable hard disks.
(2) Digital video discs.
(3) Volatile memory devices.
(4) Solid state storage devices.
(1)CorelDraw (2) MS-Excel (3) MS-Word (4) all of the above (5) None of these
Page
500. What would you use for immediate, real-time communication with a friend?
(1) Instant Messaging (2) E-Mail (3) Usenet (4) Blog (5) None of these
503. Which operation you will perform if you need to move a block of text?
(1) Copy and Paste
(2) Cut and Paste
(3) Paste and Delete
(4) Paste and Cut
(5) None of the Above
506. A……….is the term used when a search engine returns a Web page that matches the search
criteria.
(1) Blog (2) Hit (3) Link (4) View (5) Success
187
507. In Excel……….allows users to bring together copies of work-books that other user have
Page
worked on independently.
(1) Copying (2) Merging (3) Pasting (4) Compiling (5) None of these
509. ---- Is the Virus that overwrites the files or a few parts being replaced?
(1) Resident (2) File infectors (3) Boot virus (4) Macro virus (5) None of these
515. The internet service that provides a multimedia interface to available resources is called-----
----------
(1) FTP
(2) World Wide Web
(3) Telnet
(4) VPN
(5) None of these
188
516. What is the short-cut key to display save -as dialog box in MS-Word?
(1) F1 (2) Alt + F1 (3) F12 (4) F5 (5) None of these
Page
517. Which of the following is not a web browser?
(1) Mozilla (2) IE (3) CE (4) Opera (5) Safari
519. Which of the following keyboard shortcuts is used to view the properties of a selected
object?
(1) Alt + Space
(2) Ctrl + Space
(3) Alt + Enter
(4) Ctrl + Enter
(5) None of these
(1) Mega Byte (2) Kilo Byte (3) Giga Byte (4) Byte (5) Terabyte
Page
528. Each Web address is actually a series of numbers, which is usually called as------------
(1) Domain Name
(2) URL
(3) Http
(4) HTML
(5) IP address
530. Which of the following is the short-cut key to close an active tab of a browser?
(1) Alt + F4 (2) Ctrl + C (3) Ctrl + F4 (4) Shift + C (5) Ctrl + W
532. Which of the following keyboard short-cut is used to center the paragraph?
(1) Ctrl + C (2) Ctrl + E (3) Ctrl + L (4) Ctrl + R (5) None of these
190
536. Which of the following Computer languages is used for Artificial Intelligence?
(1) FORTRAN (2) PROLOG (3) C (4) COBOL (5) None of these
542. A series 100 POST Error code indicates a problem with which of the following?
(1) Hard drive (2) RAM & ROM (3) System board (4) Video adaptor (5) None of these
543. Which type of protocol is used for accessing internet on Mobile phones?
(1) PPP (2) HTTP (3) FTP (4) WAP (5) SMTP
192
KEY FUNCTION
F1 Display HELP
F2 Rename the selected item
F3 Search for file folder
F4 Display address bar list/show item path
F5 Refresh the active window
F6 Cycle through screen element in a windows/Desktop
F10 Active the menu bar in active program
Ctrl + Esc Launch start menu
Ctrl + ( A/B/C/S/V/X/Y/Z ) Select all/Bold/Copy/Save/Paste/Cut/Redo/Undo
Ctrl + Shift + Esc launch Task manager
Alt + Ctrl + Del Launch Task Manager, Log off, Lock, Change password
Del Delete the selected item & move it to Recycle bin
Shift + Del Delete Permanently without moving to Recycle bin
Alt + Tab Switch among open items
Alt + Esc Cycle through items in the order they are opened in taskbar
Shift + F10 Equivalent to mouse right click on a selected item to view the
short Menu
Alt + F4 Close/Exit the active item
Ctrl + F4 Close the active document/program
Alt + Enter Key Display properties of the selected item
Alt + up arrow View the folder one level up in windows explorer ~ Back arrow
Shift + any arrow key Select more than one item in a window or select text within
a document
Ctrl + Shift + any arrow Select a block of text in a document /items in a desktop/window
Key ~ Ctrl + select(left click) &Drag using mouse
193
Ctrl + Any arrow key + Select multiple individual item in a window or the desktop ~
Spacebar Ctrl + select (left click) using mouse.
Page
(B) WINDOWS LOGO KEY KEYBOARD SHORTCUT KEYS
KEY FUNCTION
W(Windows Key) Launch start menu
KEYS FUNCTION
F1 For HELP
F8 Extend a Selection
Ctrl + M Indent a paragraph from left (to remove left indent use
195
Ctrl + Shift + M)
Ctrl + N To create new blank document
Page
Ctrl + O To display OPEN Dialog Box
Ctrl + Y Redo
Ctrl + Z Undo
Ctrl + = SUBSCRIPT
Ctrl + Shift + = SUPERSCRIPT
Ctrl + Right Arrow To move the cursor to the beginning of the next word
Ctrl + Left Arrow To move the cursor to the beginning of the previous word
Shift + Right arrow To select a character towards right from current curser
Shift + Left arrow To select a character towards left from current curser
196
Ctrl + Shift + Right arrow To select a word towards right from current cursor
Ctrl + Shift + Left arrow To select a word towards left from current curser
Page
Shift + End (Ctrl + End) To select the character up to the end of current line
from the current cursor position (for Text Box)
Shift + Home (Ctrl+ Home) To select the character up to the beginning of current
line from the current cursor position (for Text Box)
Shift + F3 To switch between the UPPERCASE, lowercase &
Sentence Case format of the selected text
Shift + F7 Open THESAURUS Dialog box which shows the
List of synonyms of the selected text.
Home To move cursor to the beginning of current line
KEY FUNCTION
Ctrl + shift + ( Unhide any hidden rows within the selection
Ctrl + shift + & Applies the outline border to the selected cells
Ctrl + shift + $ Applies the currency format with two decimal places
(negative numbers in parenthesis)
Ctrl + shift + % Applies the percentage format with no decimal places
Ctrl + shift + ^ Applies the exponential number format with two decimal
Places
Ctrl + shift + # Applies the date format with day, month, year
Ctrl + shift + @ Applies the time format with hour, minute ,AM,PM
Ctrl + shift +! Applies the number format with two decimal places ,
thousands separator, and minus sign for –ve numbers
Ctrl + shift + * Select the current region around the active cell (the data
area enclosed by blank rows and blank columns).In
a pivot table it selects the entire pivot table report
Ctrl + shift + ; Enters the current time
Ctrl + shift + “ Copies the value from the cell above the active cell into
the cell or Formula bar
Ctrl + shift + Plus(+) Display the INSERT dialog box to insert blank cells
Ctrl + Minus(-) Display the DELETE dialog box to delete selected cells
Ctrl + ; Enters the current date
Ctrl + ‘ Copies a formula from the cell above the active
cell into the cell or the formula bar
Ctrl + 1 Display the FORMAT CELLS dialog box
Ctrl + 2 Applies or removes BOLD Formatting
198
KEY FUNCTION
Ctrl + A Select all object on slide Tab/Select all slides in Slide
Sorter View/Select all text on Outline Tab
KEY FUNCTION
Alt + D To move the insertion point to the Address box, or to highlight
the URL in the Address box of a Browser./Select the Address
Bar
Ctrl + Tab Move forward through Tab
202
CC – Carbon Copy
CAD – Computer Aided Design
CORBA - Common Object Request Broker Architecture
CBT - Computer Based Training
COBOL – Common Business Oriented Language
CD – Compact Disc
CGA - Color Graphics Adapter.
CRT – Cathode Ray Tube
CSS-Cascading Style Sheet
CDR – Compact Disc Recordable
CDROM – Compact Disc Read Only Memory
203
Gb - Gigabit
GB – Gigabyte
GDI-Graphics Device Interface
GIF - Graphics Interchange Format
GUI- Graphic User Interface
GSM - Global System for Mobile Communication
Kb - Kilobit
KB - Kilobyte
KHz - Kilohertz
205
L
Page
LCD – Liquid Crystal Display
LED – Light Emitting Diode
LPI – Lines Per Inch
LAN-Local Area Network
LIS – Large Scale Integration
Mb – Megabit
MB – Megabyte
MAN-Metropolitan Area Network
MPEG – Moving Picture Experts Group
MMS – Multimedia Message Service
MICR – Magnetic Ink Character Recognition
MIPS – Million Instructions Per Second
VAR – Variable
VGA – Video Graphics Array
VSNL – Videsh Sanchar Nigam Limited
VDU – Visual Display Unit
VDD - Virtual Device Driver
VIRUS - Virtual Information Resource Under Seize
ZB – Zeta Byte
ZIP- Zone Information Protocol
208
Access time - The amount of time it takes for requested information to be delivered from disks and
memory.
Access – To store or retrieve data
Add-on: Circuits, systems, or hardware devices that can be attached to a computer to increase its
memory or improve its performance
Application: A system, such as a payroll, that has been defined to be suitable for electronic data
processing techniques
Archived file: A file that has been transferred to a lower level in the memory hierarchy, usually
from magnetic disc to magnetic tape, may be as a result of operations of appropriate resource
management
Array: A group of two or more logically related elements identified by a single name; generally
stored in consecutive storage locations in main memory
Audit trail: A permanent record of every transaction taken by a computer system, indicating for
example, when users log in and out, what transaction they perform, when files are accessed and the
type of access. Examination of this record provides a way of observing patterns of security
violation and/or serves as a deterrent to violations
Availability: The ratio of time a device is operating correctly to the total scheduled time for
operating
Antivirus software - A program designed to look for and destroy viruses that may infect the
memory of a computer or files stored on a computer.
Artificial intelligence (AI) - Computer systems that attempt to imitate human processes for
analyzing and solving problems.
Accumulator - A local storage area called a Register, in which the result of an arithmetic or logic
operation is formed.
Bit - It is basic unit of computers .It has two values 1 & 0 only.
Byte - Combination of 8 Bits.
Back office operations: Operation that does not involve direct interaction with customers
Back up: A resource that is, or can be used as a substitute when a primary resource fails or when a
file has been corrupted
209
Bar code: A printed machine readable code that consists of parallel bars of varied width and
spacing. The application most commonly observed is the coding on food and goods that is read at
Page
the checkout and translated into a line of print on the bill showing product and cost
Batch processing: A method of organizing work for a computer system, designed to reduce
overheads by grouping together similar jobs
Bug: An error or mistake in a program
Bandwidth: How much stuff you can send through a connection. Usually measured in bits per
second
Beta: Preliminary or testing stage of a software or hardware product: ―a beta version‖; ―beta
software‖
Basic Input Output System (BIOS) - Also known as ROM BIOS. It provides an abstraction layer
for the hardware, i.e., a consistent way for application programs and operating system to interact
with input/output devices.
Binary: This is a basic system of numbering using ones and zeroes.
Blue tooth: Radio technology that connects electronic devices without using a cable. Data and
voice can be exchanged at ranges of up to 10 meters without the need for devices to be lined up
together
Boot disk: A diskette from which you can boot your computer
Buffer: A place, especially in RAM, for the temporary storage of data for the purpose of speeding
up an operation such as printing or disk access
Browser: It is a software used for viewing pages on the web
Bus: A collection of wires through which data is transmitted from one part of a computer to
another.
Cookie - A packet of information that travels between a browser and the web server.
Crash - Your computer or application no longer works correctly and so you ―loose‖ all the work
you‘ve done since the last time you saved.
Character: An alphabetic letter, a digit or a special symbol. It is of 1 Byte.
CD-ROM: Compact Disc Read Only Memory – an optical storage medium that can hold about
700 MB of data and is accessed with lasers
CGA: Stands for Color Graphics Adapter. CGA allowed a maximum of four colors at a resolution
of 320 x 200 or two colors at 640 x 200.
Clock Speed: The clock speed is the frequency which determines how fast devices that are
connected to the system bus operate. The speed is measured in millions of cycles per second
Clustering: A technique in which two or more servers are interconnected and can access a
common storage pool
CMOS: Abbreviation of complementary metal oxide semiconductor. Pronounced seemoss; CMOS
210
Delete - To remove an item of data from a file or to remove a file from the disk.
Debugging - Locating and eliminating defects in a program.
Downtime: The period of time during which a computer is not functioning.
Dongle: it is a device that attaches to a computer to control access to a particular application.
Dummy: An artificial instruction, address etc. used only to fulfill specification in a program but
not actually performing a function
Duplex channel: A communication channel that allows data to be transmitted in both
directions simultaneously
Data bus: A group of parallel conductors found on the motherboard that is used by the CPU to
send and receive data from all the devices in the computer.
Data mining: Sorting through data to identify patterns and establish relationships
Decoder: A circuit or device that restores a coded signal to its original form based on knowledge
of the process used to code the signal
Decryption: It is the process of converting encrypted data back into its original form, so that it can
be understood
Dedicated line: It is a phone line meant specifically for one thing, like being attached to a
computer
Demodulation: It is the process of converting analog information into digital information
Domain name: A name that identifies one or more IP addresses
Driver: A program that controls a device. Every device, whether it can be a printer, disk drive, or
keyboard must have one driver program
Desktop - The electronic work area on a display screen.
Dots Per Inch (DPI) - It is defined as the measure of the resolution of a printer and scanner, or
211
monitor.
Domain Name - A unique name that identifies a particular website and represents the name of the
Page
Fax - A shortened form of the word facsimile. A copy of a document transmitted electronically
from one machine to another. It is an example of half-duplex communication.
File transfer protocol (FTP) - A set of guidelines or standards that establish the format in which
files can be transmitted from one computer to another.
Firewall - A security system usually consisting of hardware and software that prevents
unauthorized persons from accessing certain parts of a program, database, or network.
Flash Memory - It is a type of non-volatile computer storage chip that can be electrically erased
and reprogrammed. It was developed by EEPROM.
Icons - In a graphical user interface (GUI), a small, pictorial, on screen representation of an object,
such as a document, program, folder or disk drive that acts as an activation link when clicked on
Instant messaging (IM) - A chat program that lets people communicate over the Internet in real
time.
Internet protocol (IP) address - A unique set of numbers that identifies a computer over a
network.
Internet service provider (ISP) - An organization that provides access to the Internet for a fee.
Intranet - A private network established by an organization for the exclusive use of its employees.
Image: A copy in memory of data that exists elsewhere
Interface: A common boundary between two systems, devices or program
JPEG - Joint Photographic Experts Group. A format for storing complex graphics in compressed
form.
Justification - Aligning lines of text at the left margin, the right margin, both margins, or the
center. Text aligned at both margins is considered fully justified.
Java: A high level programming language developed by Sun Microsystems
Kilobyte - A measurement of the storage capacity of a device. One kilobyte represents 1024 bytes.
Page
L
LAN - A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a home, school, computer laboratory, or office building, using network media.
Laptop computer - A portable computer. Also known as a notebook computer.
Landscape Orientation – The positioning of the page so that the information is printed across the
long dimension of the page.
Liveware - It is a term to describe the human system, opposed to hardware or software in a
computer.
Lock: A key or other group of characters that allows access to specified storage locations or
software systems
Log-in: To enter the necessary information like personal identification number – PIN and/or
password to begin a session on a terminal.
LCD: Abbreviation of liquid crystal display, a type of display used in digital watches and many
portable computers
Linux: A version of UNIX that runs on a variety of hardware platforms. It is open source software,
which is freely available
Macro virus - A type of virus that attaches itself to documents or word processing templates.
Malware - Software that disrupts normal computer functions or sends a user‘s personal data
without the user‘s authorization.
Memory - The part of a computer that stores information.
Memory Cell - A circuit in memory that represents a single bit of information.
Mass Storage - Storage systems that provide access to hundreds of billions of bytes of stored data.
They are often referred to as Archival Storage because of the very large volumes of historical or
backup data they can store.
MIPS - An acronym derived from Millions of Instructions Per Second. Used to measure the speed
of a processor.
Morphing - The transformation of one image into another image.
M-Commerce - A form of e-commerce that has the ability to conduct monetary transactions via a
mobile device such as a cell phone.
Mozilla - a web browser and successor to Netscape Communicator.
Multitasking - The ability of a computer to execute more than one program at a time.
214
then be made by keying the single code. The method provides simple way of guiding a user
through a complex situation by presenting a sequence of simpler decisions
Main memory: Storage located in the computer for program, along with their data, while they are
being executed
MICR: Abbreviation for Magnetic Ink Character Recognition. A process in which data printed in
ink containing ferromagnetic particles is read by magnetic read heads
Modem: Acronym for modulator demodulator – a device that converts digital data output from
another device into analog data that can be transmitted over communication lines or vice versa.
Palmtop computer - A portable computer smaller than a notebook (or laptop) computer that fits
on the palm of your hand. Also called a handheld computer.
Password - A user‘s secret identification code, required to access stored material. A procedure
intended to prevent information from being accessed by unauthorized persons.
Piracy - The illegal copying of software or other creative works.
Peripherals - A connectable device that has an auxiliary function outside the permanent system
215
Query - An alternate pipe form of operating system, which handles data in the form of messages
rather than bytes.
Qwerty - It is one of the standard computer keyboard, with the character Q, W, E, R, T, Y on the
top row of letters on the keyboard.
Save As – Give the file a name and/or store the file in a certain place.
Save - Tell the computer to create a file on disk that has the information you‘ve put into the
216
document.
Serial Port: A port or interface that can be used for serial communication, in which only 1 bit is
Page
transmitted at a time
SMPS- Stands for switching mode power supply is used for converting raw input power to
stabilize DC power.
Scan: To examine sequentially all the records in a file in order to find those whose keys meet a
specified criterion
Spam: This is to transmit unwanted messages, usually over email, to a great many people
Spooling- The process of storing a device (e.g. Printer) output signal in a queue, while the device
can take on other actions. When the device is ready to take on other actions, it will draw from the
queue. The term spooling is derived from the acronym SPOOL-Simultaneous Peripheral Operation
On Line
Spoofing- Collecting personal information and effectively posing as another individual
SLIP: Serial Line Interface Protocol
Soft Copy: Output that is displayed on the screen of a video display unit
SWIFT: Society for Worldwide Inter-bank Financial Telecommunication
Switch: In networks, a device that filters and forwards packets between LAN segments. LANs that
use switches to join segments are called switched LANs or, in the case of Ethernet networks,
switched Ethernet LANs.
Scroll bar - Allows you to move around through your document.
Shut down - To quit all applications and turn off the computer.
Spam - unwanted repetitious messages, such as unsolicited bulk e-mail.
Scanner - An input device that can copy a printed page into a computer‘s memory, thus doing
away with the need to type the copy.
Screen saver - A program that changes the screen display while the user is away from the
computer.
Server - A computer that manages a shared resources and provides a set of shared user services to
the clients.
Search Engine - Software that searches, gathers and identifies information from a database based
on an index, keywords or titles.
Sort - To arrange fields, records, or files in a predetermined sequence.
Surfing the Net - Browsing through various Web sites on the Internet in search of interesting things
Trash - Place where you put files and folders that you want to delete or get rid of.
Topology - The structure of the network, including physical connections such as wiring schemes
and logical interactions between network devices.
Track - A ring on a disk where data can be written.
217
Telnet - A protocol for remote computing on the internet that allows a computer to act as a remote
terminal on another machine, anywhere on the internet.
Page
Touchpad - The device on a laptop computer that takes the place of a mouse.
Touch screen technology - The technology that permits a user to perform a function simply by
touching the screen on an appropriate spot.
TRACTOR-FEED-a pin-fed device for advancing continuous form paper through a Printer t
Track ball-input device that controls the position of the cursor on the screen & is mounted near
the keyboard, the movement controlled by moving a ball.
Uninterrupted Power Supply (UPS) - A Battery powered backup system that provides enough
electricity to a computer during a power outage so that a user can save files before shutting down
the computer.
Universal Serial Bus (USB) - A common standard for connecting multiple peripherals to a
computer as needed.
Upload - To transfer information from a client computer to a host computer.
Virus - A piece of computer code designed as a prank or malicious act to spread from one
computer to another by attaching itself to other programs.
WAP - Wireless Application Protocol is a specification for a set of communication protocol used
to allow wireless devices to access the internet and other utilities.
Web browser - Software that permits a user with a click of a mouse to locate, display, and
download text, video, audio, and graphics stored in a host computer on the Web. The most
common Web browsers now in use are Internet Explorer, Google Chrome and Mozilla Firefox.
Web site - One or more related pages created by an individual or an organization and posted on the
World Wide Web.
Wi-Fi (Wireless fidelity) - A process that permits high-speed wireless transmission of data.
Word processing - The electronic process of creating, formatting, editing, proofreading, and
printing documents.
Workstation - A desktop computer that runs applications and serves as an access point in a local
area network.
Weblog: This is publicly accessible personal journal for an individual. Similar to a personal diary,
but shared over the web. The activity of updating a blog is ―blogging‖ and someone who keeps a
218
Zombie - A computer that has been hijacked by a cracker without the owner‘s knowledge and used
to perform malicious tasks on the Internet.
ZIP: Stands for Zone Information Protocol. This is an application that allows for the compression
of application file.
219
www.google.com
www.wikipedia.com
www.gktoday.in
www.bankersadda.com
www.mahendras.org
www.bscacademy.com
www.careerpower.com
www.gcnayak.blogspot.com
www.nptel.com
http://www.gcnayak.blogspot.com
Copyright 2015©Gopal Chandra Nayak
Page