Arihant CCC Courses - Removed

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 138

Authors

Neetu Gaikwad
Shweta Agarwal

ARIHANT PUBLICATIONS (INDIA) LIMITED


CONTENTS
1. Introduction to Computer 1-26

2. Introduction to Operating System 27-41

3. Word Processing (LibreOffice Writer) 42-67

4. Spreadsheet (LibreOffice Calc) 68-89

5. Presentation (LibreOffice Impress) 90-105

6. Introduction to Internet and WWW 106-122

7. E-mail, Social Networking and E-Governance Services 123-137

8. Digital Financial Tools and Applications 138-148

9. Overview of FutureSkills and Cyber Security 149-161

Ÿ Computer Abbreviations 162-165


Ÿ Computer Glossary 166-176
Ÿ Practice Sets (1-5) 177-200
01
Introduction to Computer
Some terms used in computer terminology
Objective of the Chapter are described below :
● Data Unprocessed raw facts and figures,
This chapter includes What is Computer, Evolution
of Computer, Classification of Computer and its like numbers, text on pieces of paper, are
Applications, Basics of Hardware and Software, known as data.
Open Source Software, Proprietary Software, ● Processing It is the sequence of actions

IT Gadgets and their Applications, Mobile taken on data to convert it into


Applications.
information.
● Information When data is processed,

organised, structured or presented in a


Introduction given context so as to be useful, then it is
A computer is an electronic device that called information.
manipulates information or data according to ● Instruction It is a command given to

the set of instructions called programs. a computer in the computer language


It has the ability to store, retrieve and by the user.
● Program It is a set of instructions given
process data.
to a computer in order to perform some
The term ‘computer’ is derived from the task.
Latin word ‘computare’, which means ‘to Monitor
calculate’. CPU
The basic functions of a computer system are
to accept the input, process the input, output Speaker
and to store data.

What is Computer?
Generally, computer is the combination of
hardware and software, which converts data Keyboard Mouse
into information. Computer
Generations/Evolution of Computer 2
A generation refers to the state of improvement in the development of system. Computers are made up of electromechanical,
before generation. Each generation of computer is characterised by a major technological development that fundamentally
changed the way.
Generation Year Switching Storage Speed Operating Language Characteristics Applications
Device Device Measured System
First 1940-56 Vacuum tubes Magnetic Milli Batch operating Machine language ● Fastest computing Used for
drums seconds system (Binary number 0 s device. scientific
and 1s) ● Generate large amount purpose
of heat. e.g. ENIAC,
● Non-portable, unreliable. UNIVAC,
EDVAC, etc.
Second 1956-63 Transistors Magnetic core Micro Timesharing Assembly language, ● More reliable and less Used for
technology seconds system, high level language prone to hardware commercial
Multitasking OS failure. production
● Portable and generate e.g. NCR 304,
less amount of heat. IBM-1401, IBM
● Smaller in size. 1000, etc.
Third 1964-71 Integrated Circuits Magnetic core Nano Real-time High level ● Consumed less power. Database
(ICs) as main seconds system languages ● Highly sophisticated management
storage (FORTRAN, technology required. system
COBOL) ● Fast and more reliable. e.g. PDP-8,
PDP-11, IBM
360, etc.
Fourth 1971- Very Large Scale Semi Pico Time sharing PASCAL, ADA, ● More reliable and Distributed
Present Integrated (VLSI) conductor seconds network, GUI COBOL-74 and portable. system,
circuit or Memory, interface FORTRAN IV ● This generation leads to e.g. IBM 4341,
Microprocessor Winchester better communication DEC 10, APPLE
disk and resource sharing. II, etc.
● Cheapest among all
generations.
Fifth Present Super Large Scale Optical disc — Knowledge Natural language ● Able to recognise image Artificial
and Integrated (SLSI) information and graphs. intelligence
Beyond chips or Bio chips processing ● Able to solve highly e.g. Robotics,
system complex problems like etc.
logical reasoning.
● Able to use more than
one CPU for faster
processing speed.
Course on Computer Concepts (CCC)
Introduction to Computer 3

Computer Aided Design (CAD)


Classification of Computer calculations. They are used as central
Computers are mainly classified based on computer, which is called server.
their different size and shapes : e.g. IBM-17, DEC PDP-11, HP-9000, etc.
Classification of Computer 3. Mainframe Computers These are the
computers having large internal memory
Based Based Based
on Size on Work on Purpose storage and comprehensive range of
softwares. These computers are bigger in
Analog Hybrid
size comparatively to mini computers but
Computer Computer smaller than supercomputers. Mainframe
Digital
Computer
computer serves as a backbone for the
entire business world. e.g. IBM-370,
Micro Super General Special IBM-S/390, UNIVAC-1110, etc.
Computer Computer Purpose Purpose
Mini Mainframe
4. Super Computers These are the fastest
Computer Computer and the most expensive computers. The
speed of supercomputers is measured in
FLOPS (Floating Point Operations Per
Based on Size Second). These are used for highly
On the basis of size, computers are calculation intensive tasks, such as
categorised as follows : weather forecasting, nuclear research,
1. Micro Computers These are the least business application, military agencies and
powerful, yet the most widely used and scientific research laboratories. ‘‘PARAM
fastest growing type of computers and are was the first super computer of India
also called portable computers. Some types introduced by C-DAC in Pune.’’ As of
of micro computers are given below : January 2018, Pratyush is the fastest
I. Desktop Computer or Personal super computer in India.
Computer (PC) These computers are
small and relatively inexpensive Based on Work
computers. These computers are based On the basis of work, computers are
on the microprocessor technology categorised as follows :
(Integrated Circuit). 1. Analog Computers These computers
II. Notebook These computers (also are the job oriented computers and work
known as ultra book or laptop) are on the supply of continuous electrical
portable and lightweight. First laptop pulses. These computers carry out
was developed by Alan Kay. Laptops arithmetic and logical operations by
consume less power than desktops and manipulating and processing of data. e.g.
include a rechargeable battery. speedometers, seismograph, etc.
III. Handheld Computers or Palmtops 2. Digital Computers These computers
These computers are the smallest and work by calculating the binary digits. A
are designed to fit into the palm. So, digital computer not only performs
these computers are also known as mathematical problems, but also combines
Palmtop/PDA. They use the pen for the bytes to produce desired graphics,
input instead of keyboard. sounds. e.g. desktop (PC).
2. Mini Computers These computers are 3. Hybrid Computers These computers are
smaller in size, faster and cost lower than the combination of analog and digital
mainframe computers. Initially, the mini computers. Machines used in hospitals like
computers were designed to carry out some ECG (Electrocardiography) and DIALYSIS
specific tasks, like engineering and are the commonly used hybrid computers.
4 Course on Computer Concepts (CCC)

Based on Purpose ● Multimedia It is the field concerned with the


computer controlled integration of texts,
On the basis of purpose, computers are
graphics, drawings, animation, audio and any
categorised as follows :
other media, where each type of information
1. General Purpose Computers These can be represented, stored, transmitted and
computers are used to solve variety processed digitally.
of problems by changing the program ● Banking Computers can be used in the
or instructions, e.g. to make small banks to keep the records of customer’s
database calculations, accounting, etc. accounts. Computers enhance customer
2. Special Purpose Computers These services like checking account status,
computers are used to solve a single transferring money, etc.
and dedicated type of problems,
e.g. automatic aircraft landing,
multimedia computer, etc.
Basics of Hardware
and Software
Applications of Computer A computer is a combination of hardware and
software. These two work combinedly and make
Now-a-days, computers have been
computer do for what it is instructed.
employed in almost all the aspects of
professional and personal life. Some of the Hardware
areas where computers being used are
given below : It refers to the physical components of a
computer that can be touched and seen.
● Education Computers have proved to be
Monitor, Keyboard, Hard Disk Drive, Mouse,
excellent teachers. Educational institutes
Printers, Memory, Motherboard, Graphic Cards,
are using computers in many ways like
tele-education, virtual classroom, online Sound Cards etc., are some hardware devices.
classes, etc. By the use of these hardware devices, it made
● Business Application Computers
very easy for the computer for processing its
play a vital role in business to keep data, store and retrieve.
records of employees, sold product Some hardware devices are as follows :
information and available resources 1. Input Devices (Unit)
are now easy. 2. Output Devices (Unit)
● Recreation and Entertainment
3. Central Processing Unit (CPU)
Computers can be found throughout the 4. Computer Memory/Memory Unit
entertainment industry. Computers are
used to create the special effects in 1. Input Devices
television advertisements, the colorful An input device is a hardware device that sends
displays on the score board at sport data into the computer system. These devices
arenas etc. are used to input (or enter) data and
● Government Various departments of
instructions into the computer system. All
the government use computer for their instructions are accepted by the CPU through
planning, controlling and law electrical pulses from various kind of input
enforcement activities. devices. Some of the input devices are
● Health Computer plays a very crucial Keyboard, Pointing Devices, Scanner, MICR,
role in this area. Activities like scanning, OCR, OMR, Barcode Reader, Microphone (Mic),
X-ray, tele-medicine, patient monitoring, Web Camera, Digital Camera, Biometric
patient records, diagnosis, etc., are Sensor, Smart Card Reader which explained as
performed with the help of computers. follows :
Introduction to Computer 5

I. Keyboard (i) Mouse It is a pointing


It is the most commonly used input device device that allows to
which uses an arrangement of buttons and control the movement of
keys. Both data and program can be entered pointer (also known as
into the computer through the keyboard. It is mouse pointer) on
an essential device for interactive processing screen. Mouse performs Wired Mouse
because the user can easily issue commands various functions by
to receive the data response immediately on detecting two-dimensional
the computer screen. motion relatively to its
Function keys supporting surface.
Generally, a mouse has Wireless Mouse
two buttons-right button
and left button.
Mouse also includes a scroll wheel
between these two buttons to scroll
Alphanumeric Cursor control Numeric down the application window and their
keys keys keypad contents also. These are three types of
Layout of a Keyboard mouse as – Wireless mouse, Mechanical
mouse, Optical mouse.
Types of keys on Keyboard
There are four actions of mouse as follows :
(i) Alphanumeric Keys All of the letters
(a) Click or Left click selects an item
and numbers on the keyboard are A-Z
on the screen.
and 0-9.
(b) Double click is used to open a
(ii) Punctuation Keys Such as comma,
document or program.
period, semicolon, brackets, parenthesis
and so on. (c) Right click displays a list of
commands on the screen. Right
(iii) Special Keys Such as Control keys,
clicking is used to access the
Arrow keys, Caps lock key, Delete key,
properties of selected object.
Alt key, Shift key etc.
(d) Drag and Drop is used to move an
(iv) Function Keys Keys labeled F1 to
item on the screen.
F12. These keys have different
meanings depends on running program. (ii) Joystick It is a pointing
device that moves in all
➥ Note Shift, Ctrl and Alt keys are also known as directions and controls the
modifier keys. movement of the cursor. A
II. Pointing Devices joystick is similar to a
A pointing device is used to communicate mouse excepts that the
with the computer by pointing to the movement of cursor on
Joystick
locations on the monitor. screen stops working as
soon as user stop moving the mouse.
It can also be used for
● sending command signals to the computer.
But with a joystick, the pointer
● selecting items on the screen.
continuous moving in the previously
pointing direction.
● selecting commands from command menu.

● drawing graphics, sketches, etc.


Commonly, joysticks are used for
playing computer games like flight
Some commonly used pointing devices are simulators but occasionally used for
mouse, joystick, light pen, graphics tablet, CAD/CAM systems and other
touch screen and trackball. applications.
6 Course on Computer Concepts (CCC)

(iii) Light Pen It is a handheld There are different types of touch


electro-optical pointing screens available with electronic devices
device, which is used for like capacitive touch screen, resistive
making drawings, graphics touch screen and gorilla glass touch
and for menu selection. It screen, etc.
senses the light from the (vi) Trackball It is designed
screen when it becomes Light Pen for computers, generally
closer and generates a serves as mouse
pulse. replacement. It is
Light pen is used especially in Personal primarily used to move
Digital Assistants (PDA). It is very the cursor on the screen.
Trackball
useful in identifying a specific location The trackball has a ball
on the screen. on its top. Trackball can be rolled with
(iv) Graphics Tablet A fingers and the internal rollers sense
graphics tablet (or the motion, which is transmitted to the
digitisers, digitising computer.
tablet, or simply Trackballs are common on CAD
tablet) is an input workstations and sometimes seen on
device that consists computerised special purpose work
of an electronic Graphics Tablet stations, such as the radar consoles in
writing area and a an air-traffic control room or sonar
special pen that works with it. equipment on a ship or submarine.
It allows artists to create hand-made III. Scanner
images and graphical images with motion It is an input device that
and action, similar to the way a person makes copies and reproduces
draws images with pencil and paper. text and images and convert
When user draws anything on the tablet it into a digital file, allowing
with the special pen, the drawing the computer to read or Scanner
appears on the screen. Graphics tablet display the scanned object. Scanners can be
may also be used to capture data or used for storing the documents in their
handwritten signatures. original form that can be modified and
(v) Touch Screen It is manipulated later on. It is mainly used to
an electronic visual convert a scanned document in a digital
display that can format. Scanners come in a variety of sizes
detect the presence from hand held models to desktop models as
and location of a Handheld scanners, Flatbed scanners and
touch within the Touch Screen Drum scanners.
display area. The term touch screen
IV. MICR (Magnetic Ink Character Recognition)
generally refers to touching the display
of the device with a finger or hand. It is a character recognition
technology which is primarily
The touch screen sends a signal to the used by the banking industry
computer. This signal gives the location to facilitate the processing of
on the screen, which has been touched. cheques. This technology
Touch screen is quick and simple to use. allows the computer to read MICR
Generally, smartphones have a information (such as account
high-resolution capacitive touch screen. numbers) on printed documents.
Introduction to Computer 7

MICR can read upto 2400 documents/min. answer of objective type tests, voting
The MICR coding system contains applications and other evaluations studies.
14 characters (4 special symbols and 10 VII. Barcode Reader
decimal digits). So, it can recognise these
It is an input device used for reading printed
14 characters only. The type font E-13 B, a bar codes (Universal Product Code) available
standard typographical style, is used to print on product to be sold. A barcode reader emits
the characters or identification marks. a beam of light, which reflects off the barcode
V. OCR (Optical Character Recognition) image. A light sensitive
It is used to translate detector in the barcode
scanned images of reader identifies the
handwritten, type-written, barcode image by
printed text or special type recognising special bars at
font printed on conventional both the ends of the image.
Barcode Reader
paper with conventional ink Once code is identified, it is
into machine-encoded text.
OCR converted into a numeric code. A perfect
OCR is widely used to convert books and example of a barcode reader is its use in a
documents into electronic files, to super market where barcode scanner reads
computerise a record-keeping system in an the price of a product.
office or to publish the text on a website. A barcode is a machine readable
An optical reader uses photoelectric devices representation of information in the form of
to scan the characters being read and convert stripes of dark and light ink.
the reflected light patterns of the data into
VIII. Microphone (Mic)
binary data suitable for computer input. The
We can send sound to the computer through
normal speed of an OCR is 1500 to 3000
a special manual input device called
characters per second.
microphone or mic. A mic converts the
The technology is being developed for greater received sound into computer’s format, which
accurate recognition and is also known as is called Digitised Sound or Digital Audio. To
Intelligent Character Recognition (ICR). convert a voice into digital form, an
VI. OMR (Optical Mark Reader) additional hardware is always needed which
is known as Sound Card.
OMR is the process of detecting the presence
of intended marked responses. OMR is Sound is used most often in multimedia,
mainly used to detect marks on a paper. It where user can make his/her presentation
uses a beam of light that is reflected on the more attractive using recorded narration,
paper with marks, to capture presence and music or sound effects.
absence of data (Marks). Microphone

Microphone
A microphone can be attached to a computer
OMR to record sound. Now-a-days, microphones are
also being used with speech recognition
The OMR reader interprets the patterns of software. This means that you do not have to
marks into a data record and sends this to type the document, rather just have to speak
the computer for storing, analysing and and the spoken words appear in your
reporting. OMR is widely used to read the document.
8 Course on Computer Concepts (CCC)

IX. Web Camera (Webcam) XII. Smart Card Reader


Webcam is a digital camera attached to It is a device which is
computers and can be used for video conferencing used to access the
or online chatting, etc. It is a video capturing microprocessor of a smart
device. Webcams are able to capture full motion card. There are two kinds
videos as well. A webcam connected to a of smart cards.
computer allows the user to view either a still Memory cards the cards
picture or motion video of a user or other object. which contain only Smart Card
Webcam non-volatile memory Reader
storage components and
some specific security logic.
Microprocessor cards contain volatile
memory and microprocessor components.
The card is made-up of plastic generally
PVC. Smart cards are used in large
Webcam Attached
companies and organisation for stronge
Webcam
with Computer security authentication.
Web Camera
2. Output Devices
Now-a-days, webcams are either embedded into
An output device is a part of computer
the display with laptops or connected via USB or
hardware equipment, used to
firewire port or Wi-Fi to the computer system.
communicate the results of data
After connecting webcam to a computer, you need
processing which are carried out by the
to install a required software or drivers.
information processing system (such as a
X. Digital Camera (Digicam) computer), to the outside world. Output
It is an input device that stores the devices carry the results of various
pictures or videos in an electronic operations performed by the user. Output
format instead of film. There are device makes it possible to view or print
several features that make digital data.
camera a popular choice, when Some of the devices, which are used to
compared to film cameras. Most display the processed result or output are
enjoyable feature is the LCD display Monitor, Printer, Plotter, Speaker,
on the digital camera. This display Headphone, Projector, Speech synthesizer
allows users to view and save photos Digital
which explained as below :
or videos after the picture or video Cameras
has been taken, that means, if you take a picture I. Monitor/VDU
and don’t like the results, you can delete it, or if A monitor (called a Visual Display Unit,
you like the picture, you can save it and easily VDU) is an electronic visual device used
show it to other people. to display the output. The rectangular
area of the monitor, its refresh rate and
XI. Biometric Sensor
dot pitch, all directly affect the resolution
It is a device which recognises of the display.
physical or behavioural traits of
an individual. Biometric A monitor is of two kinds : Monochrome
sensors are mainly used display monitor and Color display
Biometric Sensor monitor.
marking attendance of
employees/students in organisations /institutions. A monochrome display monitor uses only
Biometric sensors are working with accuracy, so one color to display text and color display
these can be widely used in security purpose. monitor can display 256 colors at a time.
Introduction to Computer 9

An image on the monitor is created by a LEDs usually produce


configuration of dots, also known as pixels. red light, but today’s
The clarity of image depends on three factors : LEDs can produce RGB
● Resolution of Screen Resolution refers to
(Red, Green and Blue)
light and white light LED
the number of pixels in horizontal and
as well.
vertical directions. The resolution of
monitor is higher when the pixels are (iv) 3-D Monitor It is a television that
closer together. conveys depth perception to the viewer.
● Dot Pitch It refers to the diagonal
3-D describes an image that provides
the perception of length. When 3-D
distance between two colored pixels. The
images are made interactive, user feels
smaller the dot pitch, the better the
involved with the scene and this
resolution.
experience is called virtual reality.
● Refresh Rate The refresh rate of a
(v) TFT (Thin Film Transistor) TFT and
monitor is the maximum number of times
Active-Matrix LCD (AMLCD) is a
the image on screen can be drawn or
Liquid Crystal Display (LCD). With
refreshed per second.
active-matrix display, each pixel is
The popular types of monitor are as follows :
controlled by one to four transistors
(i) CRT (Cathode Ray that can make the screen faster,
Tube) The CRT works brighter, more colourful than
in the same way as a passive-matrix and capable of being
television. It contains viewed at different angles. Because of
an electron gun at the this improved technology, active-matrix
back of the glass tube. screens are often more expensive but
This gun fires electrons CRT have better quality than a
in a group of phosphor dots, which is passive-matrix display.
coated inside the screen. When the
II. Printer
electrons strike the phosphor dots they
It is an output device which produces a hard
glow to give the colours.
copy of documents that are stored in an
(ii) LCD (Liquid Crystal electronic form on physical print media such
Display) These screens as paper or transparencies. So, printers are
are used in laptops and the primary output devices used to prepare
notebook sized PCs. A permanent documents.
special type of liquid is
The speed of a printer is normally rated
sandwiched between
either by Pages Per Minute (PPM) or by
two plates. It is a thin, LCD
Characters Per Second (CPS). Printer
flat and light weight screen made up of
resolution is a numerical measure of print
any number of colours or mono-chrome
quality that is measured in Dots Per Inch
pixels arranged in front of a light (DPI).
source. Long life, light weight, better
screen privacy, less eyestrain, reduced Printers can be classified into two broad
radiation are some of the major features categories as follows :
of LCD. (i)Impact Printers These printers rely on a
(iii) LED (Liquid/Light Emitting Diode) forcible impact to transfer ink to the print
LED is an electronic device that emits media, similar to the action of a
light when electrical current is passed typewriter. There is a mechanical contact
through it. between the paper and the print head.
10 Course on Computer Concepts (CCC)

There are various types of impact printers as (ii)Non-impact Printers These printers are
follows : much quieter than impact printers as their
(a) Line Printer It is a printing heads do not strike on the paper.
high speed printer These printers are comparatively faster
capable of printing an and produce high quality output. They can
entire line of text at once be used for printing text and graphics both
instead of one or more in black & white and colored.
characters at a time. The various types of non-impact printers
Print quality of line Line Printer are as follows :
printer is not high. (a) Electromagnetic Printer
(b) Drum Printer It is an old line printer Electrographic or electro-photographic
technology that is used to form printers are very fast printers and they
character images around a cylindrical fall under the category of page printers.
drum as its printing mechanism. They can produce documents at a speed
When the desired of over 20000 lines per minute i.e. more
character for the than 250 pages per minute.
selected position (b) Thermal Printer Thermal printer
rotated around the paper tends to darken over time due to
hammer line, the Drum Printer
exposure of sunlight or heat. The
hammer hits the standard of print produced is poor.
paper from behind and pushed it into Thermal printers are widely used in
the ribbon and onto the character. battery powered equipment such as
(c) Daisy Wheel Printer It can print one portable calculators.
character at a time. In daisy wheel (c) Electrostatic Printer These printers
printer, round disk extends a portion of
are generally used for large format
the wheel making contact with ink
printing.
ribbon that makes contact with paper
for creating the character. This They are favoured by large printing
procedure is repeated for each key when shops because of their ability to print
it is pressed. These printers are fitted fast and making low cost.
with unchangeable print heads called (d) Laser Printer In this
daisy wheels. To print each character, printer, the method of
the wheel is rotated and the appropriate printing is based on
stoke struck against an inked ribbon. principle of
Daisy wheel printers cannot produce electrophotography and
high quality print graphics. The speed use a beam of laser light Laser Printer
of this printer is about 100 CPS. as a photocopy machine.
(d) Dot Matrix Printer The term dot Resolution of laser printer is specified
matrix refers to the process of placing in term of DPI (Dots Per Inch).
dots to form an image. It uses print
The powdered ink (i.e. toner) is
heads to shoot ink or strike an ink
ribbon to place hundreds to thousands transferred to paper to form a text/an
of little dots to form text or images. It image pattern and then fixed by heat or
prints one character at a time. The pressure. When it is used to print bulk
speed of dot matrix printer lies between of papers, the laser printer produces the
200 to 600 CPS. cheapest cost per printout.
Introduction to Computer 11

(e) Inkjet Printer This IV. Speaker


printer fires extremely It is an output device that
small droplets of ink onto receives the sound in the
the paper to create form of electric current from
impression of text or the sound card and convert it
image. The printhead of into sound format. Speakers Speaker
inkjet printers, known as Inkjet Printer are used for listening music.
print cartridge, contains Computer speakers (multimedia speakers)
tiny nozzles (50 or more) through which are the speakers, which are attached
different coloured inks can be sprayed internally or externally to a computer system.
onto the paper to form the characters or V. Headphones
graphic images. These are a pair of small
Colour inkjet printers provide an loudspeakers or less commonly a
inexpensive way to print fully coloured single speaker, held close to a
documents. user’s ears and connected to a
signal source such as an audio
III. Plotter amplifier, radio, CD player or Headphones
It is an output device portable media player. They are
similar to a printer that also known as stereo phones, headsets
uses a pen, pencil, marker or cans.
or other writing tools to
make a design.
VI. Projector
Plotter
It is an output device which is used to project
Plotters are generally used to generate the information from a computer onto a large
map of building and shopping malls. A screen, so it can be viewed by a large group
plotter is a computer printing device for
of people simultaneously. Projectors are
printing vector graphics. In the past, plotters
widely used for classroom training or
were widely used in applications such as
conference holes with a large audience. It
Computer Aided Design (CAD) and other
provides a temporary output display.
printing jobs. Though, they have generally
been replaced with wide-format conventional VII. Speech Synthesizer
printers. It is used to produce sound from a text and
There are two basic types of plotters those can be implemented in software and
that use pens and those that do not. There hardware. A text-to-speech system converts
are two basic types of plotters as follows : normal language text into speech.
(i) Drum Plotter It contains a long
3. Central Processing Unit (CPU)
cylinder and a pen carriage. The output
paper is placed over the drum. The pen It is the part of a computer system that
is mounted horizontally on the carriage. carries out the instructions of a computer
Both the pen and drum move under the program, to perform the basic arithmetical,
computer’s control to produce the logical and input/output operations of the
desired drawing. system.
(ii) Flatbed Plotter It consists of a The CPU is also known as the brain of the
stationary horizontal flat surface on computer. The speed of CPU depends upon
which paper or any other medium is the type of microprocessor used and it is
fixed. The pen is mounted on a carriage measured in MegaHertz (MHz).
that can move along the horizontal and Two typical components of a CPU are
vertical axis. Arithmetic Logic Unit and Control Unit.
12 Course on Computer Concepts (CCC)

I. Arithmetic Logic Unit the processor and coordinates the activities of


In computing, an Arithmetic Logic Unit the other units within it. Control unit acts
(ALU) is a digital circuit that performs like human nerves system, which does not
arithmetic and logical operations. The ALU is process data but behaves as a central unit for
a fundamental building block of the central other data manipulating components.
processing unit of a computer. ALU uses
registers to hold the data that is being 4. Computer Memory
processed. Most ALUs can perform the The computer memory is one of the most
following operations : important elements in a computer system.
● Logical Operations (AND, NOT, OR, XOR)
It is the internal or external storage area,
which holds the data and instructions during
● Arithmetic Operations (addition,
processing in the form of binary numbers.
subtraction, multiplication and division)
● Bit-shifting Operations (shifting or
It also relates to many devices and
components that are responsible for storing
rotating a word by a specified number of
data and applications on a temporary or a
bits to the left or right, with or without
sign extension) permanent basis. Computer memory can be
classified into two types— Primary memory
● Comparison Operations (=, <, <=, >, >=)
and Secondary memory/Storage device.

Microprocessor and Register I. Primary Memory


It is also known as main memory. It is the
Register It is the internal part of CPU which internal memory used by computer to hold data
gives special purpose location to arithmetic
and instructions. The primary memory has
logic unit and control unit. These are used
limited storage capacity. Primary memory
to store intermediate results obtained
holds the data and programs needed at that
during the execution of instructions.
instant by CPU. Primary memory is volatile in
Microprocessor It is fabricated on a single IC
nature i.e. it requires constant power supply to
(Integrated Circuit). IC is a piece of silicon,
motion the current information.
composed by thousands of transistors.
There are two types of primary memory i.e.
RAM and ROM.
(i) RAM RAM stands for
Random Access Memory.
It is the internal memory
The first chip, Intel 4004, made by Intel in that can be read from as
1971 by scientist Ted Hoff and engineer
RAM
well as written to. This
Federico Faggin. Some of the popular
memory is often associated with volatile
microprocessors are i5, i3, Core 2 Dual Intel,
types of memory. It can hold data only on
Dual Core, Pentium IV, etc.
temporary basis because it requires a
continuous flow of electrical current.
II. Control Unit If current is interrupted, data is lost.
It coordinates the input and output devices of The two main forms of RAM are as follows :
a computer system. Control Unit (CU) fetches (a) Static RAM It is also written as
the instructions which are given in the form SRAM. It is a computer memory that
of micro-programs. It directs the operation of requires a constant power flow in order
other units by providing timing and control to hold information. SRAM is more
signals. In general, CU is a central part of expensive and requires more power
the computer that controls its operations and therefore, it is commonly used in cache
entire processing. The control unit is the and video card memory. It is faster
circuit that controls the flow of data through than DRAM.
Introduction to Computer 13

SRAM can be further classified as


● Non-volatile SRAM
Cache Memory
● Special SRAM It is a storage buffer that stores the data
● Asynchronous SRAM
that is used more often, temporarily and
● Synchronous SRAM
makes them available to CPU at a fast rate.
The data and instructions that are required
(b) Dynamic RAM It is also written as
during the processing of data are brought
DRAM. It stores information in a cell from the secondary storage devices and
containing a capacitor and transistor. stored in the RAM.
These cells must be refreshed with
Cache memory is a very high speed
electric impulses in few milliseconds.
memory placed in between RAM and CPU.
This process allows memory to keep
Cache memory increases the speed of
charge and hold the data as long as
processing.
needed. It can be further classified as
Cache memory is very expensive, so it is
● Synchronous DRAM
smaller in size. Generally, computers have
● Rambus DRAM
cache memory of sized 256KB to 2MB.
● Double Data Rate Synchronous

DRAM
II. Secondary Memory/Storage Device
(ii)ROM In ROM (Read Secondary memory, also known as Secondary
Only Memory), Storage or Auxiliary Memory, is the slower
information once stored and cheaper form of memory. It is a
remain fixed, i.e. it can permanent storage device. CPU does not
not be changed. So, ROM ROM access the secondary memory directly. The
can only be read and content in it must first be copied into the
used. The contents of ROM remain stored RAM to be processed. Secondary memory is
even if power is turned OFF. This memory non-volatile in nature, i.e. the information
is often associated with non-volatile types does not get erased even when the power is
of memory. ROM cannot be altered once switched OFF and data will not be destructed
the chip has been made. until and unless the user erases it.
ROM is further sub-divided into three types :
Secondary Memory Devices include
(a) PROM (Programmable Read Only
Memory) It is a computer memory chip Magnetic Disks Optical Discs Solid State
capable of being programmed after it Floppy Disk CD Pen/Flash Drive
has been created. But once the PROM Hard Disk Drive DVD
has been programmed, the information
Magnetic Tape Blu-ray Disc
written is permanent and cannot be
erased or deleted.
(i) Floppy Disk (Diskette) A Floppy Disk
(b) EPROM (Erasable Programmable Drive (FDD) is a computer disk drive
Read Only Memory) It is a computer that enables a user to save data on
memory chip on which the written removable diskettes. This portable
information can be changed by storage device is a rewritable media and
exposing to ultra voilet light. It is just can be reused a number of times. It is
like a small glass circle that expose the made of plastic with magnetic coating
chip that can be re-programmed. on it. It is round in shape and is
(c) EEPROM (Electrically Erasable covered by square plastic jacket. Floppy
Programmable Read Only Memory) It is disks are commonly used to move files
a PROM that can be erased and between different computers. Although
reprogrammed using an electrical charge. 8” disk drives made available in 1971
14 Course on Computer Concepts (CCC)

were the first real disk drives, the first applications that are based on sequential
widely used floppy disk drives were the data processing i.e. it is a sequential
1" data access medium.
4", 5 , which were later replaced with
4 Due to this (sequential data access)
1" nature, these tapes are not suitable for
3 floppy disk drive. However, today
2 data files that need to be revised or
these drives are replaced with CD-R updated often. They are generally used
and other writable disk drives and to store backup data or that type of data,
flash drives. which is not frequently used or to
(ii) Hard Disk Drive A Hard Disk Drive transfer data from one system to
(HDD) is a non-volatile and random another.
access digital data storage device. It is (iv) Compact Disc (CD) It is an optical
a data storage device used for storing media that is used to store digital data.
and retrieving digital information It is relatively cheap, small, portable and
using rotating disks (platters) coated round in shape storage medium which is
with magnetic material. All programs of made up of molded polymer. It consists
a computer are installed in hard disk of a circular disc, which is coated with a
within a particular drive. thin metal that is highly reflective.
Read/Write
Spindle
Laser beam technology is used for
head Sectors
recording/reading of data on the disc. It
Head arm Tracks is also known as laser disc or optical
laser disc, due to the use of laser beam
Platters technology. CD provides random access
medium for high capacity secondary
storage. The diameter of the CD ranges
Hard Disk Drive Tracks and Sectors
from 10cms to 30cms. One CD can store
It consists of a spindle that hold non- 600 MB to 750 MB.
magnetic flat circular disks, called Compact discs are categorised into three
platters, which hold the recorded data. parts as follows :
Each platter requires two read/write (a) Compact Disc-Read Only Memory
heads, that is used to write and read (CD-ROM)
the information from a platter. All the
(b) Compact Disc-Recordable (CD-R)
read/write heads are attached to a
single access arm so that they cannot (c) Compact Disc-Rewritable (CD-RW)
move independently. (v) Digital Video Disc (DVD) It is also
The information is recorded in bands, known as Super Density (SD) disc. A
each band of information is called a DVD is an optical disc storage media
track. Each platter has the same manufactured for the first time by
number of tracks and a track location Philips, Sony, Toshiba and Panasonic
that cuts across all platters is called a in 1995. DVDs offer higher storage
cylinder. The tracks are divided into capacity than compact discs while having
pie-shaped sections known as sectors. the same dimensions. Depending upon
(iii) Magnetic Tape It is a medium of data the disk type, DVD can store several
storage, made up of a magnetic Gigabytes of data (4.7 GB-17.08 GB).
material. It is a storage medium on a DVDs are primarily used to store music
large open reel or in a smaller or movies and can be played back on
cartridge or cassette (like a music your television or on the computer too.
cassette). It is used for those They are not rewritable media.
Introduction to Computer 15

DVDs come in three varieties : handheld devices. Capacity of memory


(a) DVD ROM (DVD-Read Only Memory) stick varies from 4 MB to 256 MB.
(b) DVD-R (DVD-Recordable)
(c) DVD-RW (DVD-Rewritable)
(vi) Blu-ray Disc (BD) It is an optical disc
Memory Stick
storage medium designed to recapture
the data normally in DVD format.
Blu-ray discs contain 25 GB (23.31 GB)
per layer space. The name blu-ray disc
Basic Units of Measurement
refers to the blue laser used to read the When user uses a RAM, ROM, Floppy disk or
disc, which allows information to be Hard disk, the data is measured using some
stored at a greater density. Blu-ray can units. In computer terminology, they are
hold almost 5 times more data than a called Nibble, Bit, Byte, Kilobyte, Gigabyte etc.
single layer DVD. The variations in the Units of Computer Memory Measurements
formats are as follows : Bit (Binary digit) The smallest unit of data.
(a) BD-ROM (Read only) for It is either 0 or 1.
pre-recorded content Nibble A group of 4 bits or half a byte.
(b) BD-R (Recordable) for PC data Byte A group of 8 bits. A byte can represent
storage 256 ( 28 ) distinct values, such as the integers
(c) BD-RW (Rewritable) for PC data from 0 to 255. Each keyboard character is
storage represented through atleast 1 byte.
(d) BD-RE (Rewritable) for HDTV 10
Kilobyte (KB) It is actually 2 bytes
recording or 1 KB = 1024 bytes.
(vii) Pen/Flash/Thumb 20
Megabyte (MB) It is actually 2 bytes
Drive A flash drive is a or 1 MB = 1024 KB.
data storage device that 30
Gigabyte (GB) It is actually 2 bytes
consists of flash
or 1 GB = 1024 MB.
memory (USB
40
memory/key memory) Terabyte (TB) It is actually 2 bytes
with an integrated, or 1 TB = 1024 GB.
Pen Drive
Universal Serial Bus Petabyte (PB) It is actually 2
50
bytes
(USB) interface. USB flash drives are or 1 PB = 1024 TB.
typically removable, rewritable and 60
Exabyte (EB) It is actually 2 bytes
physically much smaller than a floppy
disk. A USB flash drive, thumb drive or 1 EB = 1024 PB.
70
and a pen drive is a portable drive that Zettabyte (ZB) It is actually 2 bytes
is same as the size of your thumb that or 1 ZB = 1024 EB.
connects to the computer USB port. 80
Yottabyte (YB) It is actually 2 bytes
Today, flash drives are available in or 1 YB = 1024 ZB.
various storage capacities as 256 MB, 90
Brontobyte It is actually 2 bytes
512 MB, 1 GB, 4 GB, 16 GB, 64 GB, etc. or 1 Brontobyte = 1024 YB
Flash drives are widely used as an easy Geopbyte It is actually 2
100
bytes or
and small medium to transfer and store 1 Geopbyte = 1024 Brontobyte.
the information from the computers. Geopbyte is the highest and bit is the
(viii) Memory Stick It is USB-based flash smallest memory measurement unit.
memory drive. A family of flash memory
cards from Sony designed for digital
➥ Note
storage in cameras, camcorders and other
16 Course on Computer Concepts (CCC)

Peripherals are the external input-output devices acts like an interface between the device and
and storage media. the user.
Every device, whether it is a printer, monitor,
Software mouse or keyboard has a driver program
It is a collection of computer programs, associated with it for its proper functioning.
procedures and related data that provide the Device drivers are not independent programs,
instructions for telling a computer what to do they assist and are assisted by operating
and how to do it. system for the proper functioning.
It is responsible for controlling, integrating
and managing the hardware components of a
computer system and for accomplishing
Linker
specific tasks.
Software can be divided into following major It is a system program that links together
categories : several object modules and libraries to
form a single and coherent program
1. System Software (executable). The main purpose of linker is
2. Application Software to resolve references among files. Before
3. System Utilities execution of the program, modules and
required libraries are linked together using
1. System Software the linker software.
It consists of several programs, which are
directly responsible for controlling, Loader
integrating and managing the individual It is a kind of system software which is
hardware components of a computer system. responsible for loading and relocation of
System software also provides the interface the executable program in the main
between the user and components of the memory. It is a part of operating system
computer. Some common examples of system that brings an executable file residing on
software are as follows : disk into memory and starts its execution
process.
I. Operating System
It consists of programs, which control,
coordinate and supervise the activities of the III. Language Translator
various components of a computer system. Its It helps in converting programming
function is to provide link between the languages to machine language. The
computer hardware and the user. translated program is called object code.
Operating System (OS) performs all internal There are three different kinds of language
management functions (disk access, memory translators as follows :
management, task scheduling and user (i) Assembler It is used to convert the
interfacing) and ensures systematic assembly language into machine
functioning of a computer system. language (i.e. in the form of 0 or 1).
It provides an environment to run the This language consists of mnemonic
programs. e.g. MS-DOS, Windows codes, which are difficult to learn and is
XP/2000/98, Unix, Linux, etc. machine dependent.
(ii) Compiler It is used to convert the
II. Device Drivers source code (written in high level
A software, which is written with the language) into machine language.
objective of making a device functional when Compiler reads whole source code in a
it is connected to the computer is called single run and traps the errors and
device driver. It is a system software that inform to the programmer. For each
Introduction to Computer 17

high level language, the machine 3. System Utilities


requires a separate compiler. These programs perform tasks related to the
(iii) Interpreter This program converts a maintenance of the computer system. These
high level language program into are the packages which are loaded into
machine language by converting it computer during time of installation of
line-by-line and inform to the user as operating system.
an error occurs.
They are used to support, enhance, expand
2. Application Software and secure existing programs and data in the
It is a computer software designed to help the computer system. System utility mainly
user to perform singular or multiple tasks. consists of the following functions :
It is a set of instructions or programs I. Disk Compression
designed for specific uses or applications, that It increases the amount of information that
enable the user to interact with a computer. can be stored on a hard disk by compressing
Application softwares are also called the all information stored on a hard disk. This
end-user programs. There are two types of utility works automatically and the user does
application software as follows : not need to be aware of its existence.
I. General Purpose Software II. Disk Fragmenter
These softwares are used for any general It detects computer files whose contents are
purpose (or function). These softwares allow broken across several locations on the hard
users to do simple (general) computer tasks. disk and moves the fragments to one location
Some of the general purpose application to increase efficiency.
softwares are as follows :
III. Backup Utilities
● Word Processing Software
It can make a copy of all information stored
● Presentation Software
on a disk and restore either the entire disk or
● Electronic Spreadsheet
selected files.
● Database Management System
IV. Disk Cleaners
● Desktop Publishing Software
It is used to find files that have not been
● Graphics Software
used for a long time. This utility also serves
II. Specific Purpose Software to increase the speed of a slow computer.
These are created to execute one specific V. Antivirus or Virus Scanning
task. This type of application software It is the utility, which is used to scan
generally has one purpose to execute. computer for viruses and prevent the
Some of the specific purpose application computer system files from being corrupt. e.g.
softwares are described below : Norton, Quick heal, etc.
● Inventory Management System and

Purchasing System Open Source Software


● Payroll Management System
Open source refers to something that can be
● Hotel Management System
modified are shared as its designed publicly
● Reservation System
accessible.
● Report Card Generator Software
Open Source Software (OSS) is any computer
● Accounting Software
software that is distributed with its source
● HR Management System code available for modification.
● Attendance System

● Billing System
18 Course on Computer Concepts (CCC)

Examples of Open Source Software are Main Barriers for Using


Linux, Unix, MySQL etc. To be considered as
open source software by the software
Proprietary Software
development industry, certain criteria must 1. Licenses and maintenance of
be met as follows : proprietary software are very expensive.
● Software must be available free or at a low 2. It is developed for a single purpose,
cost. applications are separately packaged.
● Source code must be included. 3. Vendor support is conditional to
● Anyone must be allowed to modify the
maintenance subscription.
source code. 4. Users have to dependent on the
● Modified versions can be redistributed.
developer of proprietary software for all
updates, support and fixes.
Criteria for the Distribution 5. Low level of customization and
of OSS adaptability.
Open source software is normally distributed
with the source code under an open source IT Gadgets and their
license. The distribution terms of open source Applications
software must comply with the following
A gadget is a device that has a specific
criteria :
function, in addition usually has small
1. Free Redistribution The license shall dimensions. It is very practical and is always
not restrict any party from selling or in accordance with new technologies.
giving away the software distribution
Some IT gadgets are as follows :
containing programs from several
different sources. The license shall not
require a royalty or other fee for such
1. Tablet
sale. It is a wireless touch screen Personal
Computer (PC) that is smaller than a
2. Source Code The program must notebook but larger than a smart phone.
include source code and allows Earlier tablets used either a keyboard or a
distribution with source code as well as stylus for inputting but now mostly tablets
a compiled form. The source code must use touch screen to input the data or
be in the preferred form in which a information. Many tablets now support
programmer would modify the program. multi-touch input which allows you to
3. Integrity of The Author’s Source perform gesture with multiple fingers such as
Code The license may restrict source pinching an image to zoom out or spreading
code from being distributed in modified your fingers apart to zoom in.
form only if the license allows the
Most popular tablet computers are Apple Pad,
distribution of “patch files” with the
Samsung Galaxy tab etc.
source code for the purpose of modifying
the program at build time.

Proprietary Software
It is a software that is owned by an individual
or a company. There are almost always major
restrictions on it to use and its source code is
always kept secret. Proprietary software is
copyrighted and bears limits against use,
distribution and modification that are Tablet
imposed by its publisher, vendor or developer.
Introduction to Computer 19

2. Smartphone convenience and comfort of listening to music


or watching videos.
Smartphone is a cell phone that allows you to
do more than make phone calls and send text
messages. Smartphones use browsers and
other softwares like a computer system.
There is a touch screen in smartphone to
interact with user means use to enter data or
information.
In turn, a smartphone also offers capabilities
such as support for biometrics, video
chatting, digital assistants and much more.
Smartphones are run with the help of
mobile operating systems such as Android,
Symbian, iOS, BlackBerry and Windows Bluetooth Speakers
mobile.
5. Smart Watch
Smart watch is a wearable computing device
that closely resembles a wristwatch. Many
smart watches are connected to a smart
phone that notifies the user of incoming calls,
e-mail messages and notifications from
applications. Some smart watches are able to
make calls. Smart watches can be smart
Smart Phone bands with pedometers and heart rate
monitors to help users track their health.
3. Smart Band Smart watches available today include Sony
Smart bands are called smart bracelets or smart watch, Samsung Galaxy Gear, Nikefuel
connected bracelets. In most cases, they have and Pebble watch.
a simple form and their main function is to
track and analyse your movements during
the day. That’s why, most smart bands have
a pedometer and sometimes also an optical
heart rate sensor and various other sensors.

Smart Watch

6. Google Glass
It is a wearable computing device which
Smart Band comes with a head mounted display, in the
form of eyeglasses. The google glasses
4. Bluetooth Speakers function as a hands free smart phone, letting
Bluetooth speakers are a type of wireless users access the mobile internet browser,
speakers that are aimed at improving camera, maps, calendar and other apps by
20 Course on Computer Concepts (CCC)

voice commands. It is powered by Android


mobile operating system and compatibility
Mobile Applications
with both Android powered mobile devices Mobile applications (also known as mobile
and Apple iOS, powered devices . apps) are software programs developed for
mobile devices such as smartphones and
tablets. They turn mobile devices into
miniature powerhouses of functions and fun.
Some devices come preloaded with some
mobile app courtesy of their manufactures or
the mobile service providers with which they
Google Glass are associated (for example, Verizon, AT & T,
T-Mobile etc.), but many more apps are
7. Drone Camera available through device specific app stores
It is the captured of still images and video by (e.g. Google Play Store etc.).
a remotely-operated or autonomous Mobile apps are move away from the
Unmanned Aerial Vehicle (UAV), also known integrated software systems generally found
as Unmanned Aircraft System (UAS) or more on PCs. Instead, each app provides limited
commonly as a drone. and isolated functionality such as game,
calculator or mobile web browsing.

Mobile App Functions


The purpose of these apps run the approach
from utility, productivity and navigation to
entertainment, sports, fitness and just about
any other imaginable. Social media is one of
the most popular fields of mobile app
Drone Camera development and adoption. In fact, Facebook
is the most widely used app across all
8. Spy Pen platforms. Many online entities have both
Spy pen is an ordinary pen with a hidden mobile websites and mobile apps. In general,
digital camera concealed inside, allowing the the difference lies in purpose : An app is
user to take video, images often with the pen usually smaller in scope than a mobile
placed in a shirt pocket or held in a hand. website, offers more interactivity.
This type of device is usually used for
protection, safety and even investigation. Most Widely used Mobile Apps
Some spy pens have built-in memory in in India
various sizes and some have memory cards in
various sizes.
1. BHIM (Bharat Interface for Money) App
This app is used to make simple, easy and
quick payment transactions using UPI
(Unified Payment Interface). BHIM app was
launched by PM Narendra Modi on 30th
December, 2016. It has been named after the
architect of the India’s Constitution Dr B R
Ambedkar, the BHIM app is an aggregator of
UPI services across various banks. The aim
to launch the BHIM app to make cashless
Spy Pen payments.
Introduction to Computer 21

Key Features of BHIM App 4. MyGov App


● Money can be transfered using mobile
It is Government of India’s innovative citizen
number or account number. engagement platform direct citizen
● It helps to receive and transfer money participation in governance by providing an
directly into bank accounts. avenue for channelizing their ideas and
● Its two factor authentication ensures your comments. It was launched on 26th July,
transactions are safe and secure. 2014. Google became the first multinational
● It makes cashless digital India. firm to collaborate with MyGov.
● It provides transaction history. Key Features of MyGov App
● MyGov has various features and initiatives
● User can pay by scanning the QR code

through scan and pay. You can also that provide you a readymade interface to
generate your QR code. connect with the government on regular
basis.
2. IRCTC Connect App ● It also gives you the opportunity to connect

IRCTC (Indian Railway Catering and and engage with government


Tourism Corporation) has released its representatives through live chats.
officials Android App called IRCTC Connect
on 9th October, 2014 . 5. DigiLocker App
It can be downloaded from the Google Play It is a digital locker to store all official
Store. This app allows users to login to their documents that linked to both Aadhaar Card
IRCTC accounts and search, book, view and and cellphone numbers. It was launched by
cancel train tickets. Prime Minister on 1st July, 2015. Initially,
it had 100 MB space and was later increased
Key Features of IRCTC Connect App to 1 GB. According to latest statistics,
● User can check the schedule of train.
DigiLocker has 1.35 crore users with people
● User can check the availability of the seat using it for PAN Cards, marksheets, caste
in any train. certificate, birth certificates, ration cards, etc.
● It can keep the passengers upto date for
Key Features of DigiLocker App
their train journey. ● It provides an online account with 1GB

3. Paytm App storage space to Aadhaar holders.


● These documents can be shared by
Paytm is India’s largest mobile payments and
commerce platform. Paytm was founded on residents with governments or other
registered organisations.
August 2010 by its founder Vijay Shekar
● It ensures easy availability of documents
Sharma in Noida.
online.
Paytm app is best for individuals to make
● It reduces the use of physical documents
payments of DTH, mobile recharge, or send
money to other and services like Uber, Book and fake documents.
my show etc. 6. GARV (Grameen Vidyutikaran) App
Key Features of Paytm App GARV app is used to monitor the progress of
● User can shop on Paytm mall which is the rural electrification scheme and provides
available on Paytm App. real time updates. This app was launched in
● User can recharge their phone bills, October 2015. GARV app is an important
electricity bills, etc. part of the Digital India Initiative of the
● User can book train tickets, bus tickets,
Government and will contribute in further
movie tickets, etc., on Paytm App. development of the villages.
22 Course on Computer Concepts (CCC)

Key Features of GARV App 8. OnlineRTI


● Using this app, use can know that which
RTI India has launched a mobile application
village will be electrified next. for Android phones. This application works as
● You can see the total electrified or a cross between a social networking site and a
un-electrified villages on dashboard. RTI encyclopedic help book.
● You can also check the progress status of
Key Features of OnlineRTI
any village. ● Basic objective of this app is to empower the

7. mPassport Seva App citizens, promote transparency and


accountability in the working of Government.
It is a easy to use app that provides all the
● To secure access the information under the
functions as available over the Passport
Seva Portal such as New User Registration, control of public authorities.
● It preserves the confidentiality of sensitive
existing user login etc.
information.
This app was launched on the occasion of
Sixth Passport Seva Divas on 26th June, 9. Voter Helpline App
2018. mPassport Seva app is available in This app provides the convenience to all the
Android and iOS platforms and will have people for finding their names in the electoral
the facilities to apply, pay and schedule roll, submitting online forms, checking status
appointments for passport services. of the application, filling complaints and
Key Features of mPassport Seva App receiving the reply. Voter helpline app was
● Users are able to search for a Passport launched in February 2019. The main objective
Seva Kendra or District passport cell. of this app is to motivate and educate voters.
● mPassport Seva app lets you check Key Features of Voter Helpline App
both passport application status and ● It provides a single point of service and infor-

RTI status. mation delivery to voters across the country.


● Document advisor helps the user to find
● You can search for your name by in Electoral

out the required documents they need to Roll by EPIC Number or barcode of EPIC card.
carry while visiting passport office for ● Voter can register to vote for new voter
application submission.
registration.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. The basic functions of a computer system 9. A ........ is a large and expensive computer
are to accept the input, process the input, capable of performing scientific and
output and to business applications.
(a) digital form (b) memory (a) Super computer
(c) store data (d) compute (b) Mainframe computer
(c) Mini computer
2. ......... is a command given to a computer
(d) Handheld computer
in the computer language by the user.
(a) Instruction 10. Analog computer works on the supply of
(b) Information (a) continuous electrical pulses
(c) Program (b) electrical pulses but not continue
(d) Data (c) magnetic strength
3. Which generation of computer is covered (d) physical strength
by the period 1964-71? 11. Seismograph is an example of
(a) First (b) Second (a) Analog computer (b) Digital computer
(c) Third (d) Fourth (c) Hybrid computer (d) All of these
4. In third generation, ............... were used. 12. The presence of computers can be seen in
(a) Vacuum tubes (a) education (b) banking
(b) Integrated circuits (c) multimedia (d) All of these
(c) Transistors
(d) Large scale integrated circuits 13. Pointing device includes the following
except
5. Speed of third generation computers was (a) mouse (b) touch screen
measured in (c) trackball (d) keyboard
(a) millisecond (b) microsecond
(c) nanosecond (d) picosecond 14. A joystick is primarily used to
(a) control sound on the screen
6. PCs are considered fourth generation and (b) computer gaming
contain (c) enter text
(a) information (b) data (d) draw pictures
(c) vacuum tubes (d) microprocessors
15. A device, which is used for making
7. Artificial intelligence is an example of drawings, graphics and for menu selection.
(a) first generation computer (a) Keyboard (b) Mouse
(b) second generation computer (c) Touch Screen (d) Light Pen
(c) fourth generation computer
(d) fifth generation computer 16. A device that makes copies and
reproduces text and images is called
8. Laptops are (a) CPU (b) memory
(a) computers used in clinical laboratories (c) printer (d) scanner
(b) portable, light weight and can be fit into
17. In abbreviation MICR, C stands for
briefcase
(a) Code (b) Color
(c) hearing voice recognition system
(c) Computer (d) Character
(d) desktop
24 Course on Computer Concepts (CCC)

18. A barcode reader is an example of 30. Which of the following storage media
(a) processing device (b) storage device provides sequential access only?
(c) input device (d) output device (a) Floppy disk
19. What type of device is a digital camera? (b) Magnetic disk
(c) Magnetic tape
(a) Input (b) Output
(c) Software (d) Storage (d) Optical disc

20. What is the function of an output device? 31. Which one is a secondary storage device?
(a) To send data to the computer (a) CD-ROM
(b) To store data (b) RAM
(c) To give output to the user (c) Both (a) and (b)
(d) To do mathematical calculations (d) None of the above

21. The output devices make it possible to 32. ...... is the smallest memory measurement
(a) view or print data (b) store data unit.
(c) scan data (d) None of these (a) Bit (b) Nibble
(c) Byte (d) Mega
22. Which type of printer cannot produce
high quality print graphics? 33. 1 Mega byte is equal to
(a) Daisy wheel printer (a) 1000 KB (b) 1026 KB
(b) Laser printer (c) 1024 KB (d) 1000 KB
(c) Line printer 34. What is the name given to Input-Output
(d) Chain printer devices and external storage media
23. Which of the following produces high together?
quality output? (a) Hardware (b) Peripherals
(a) Impact printer (b) Non-impact printer (c) Software (d) Control unit
(c) Both (a) and (b) (d) Plotter 35. The part of software are
24. Resolution of laser printer is specified in (a) word processing and spreadsheet
terms of (b) transaction and application
(a) DPI (b) LPM (c) windows and Mac OS
(c) CPM (d) PPM (d) system and application
25. Which of the following is an output device? 36. Which of the following is not a system
(a) Keyboard (b) Biometric Sensor software?
(c) Trackball (d) Plotter (a) Operating system (b) Compiler
(c) Interpreter (d) MS-Office
26. Which of the following is a part of CPU?
(a) ALU (b) Control unit 37. Operating system is a
(c) Both (a) and (b) (d) Disk drive (a) application software
(b) system software
27. Arithmetic operations in ALU performs (c) hardware
(a) addition (b) subtraction
(d) language
(c) multiplication (d) All of these
38. Translator program used in assembly
28. Arithmetic logic unit and control unit language is called
sections have special purpose location
(a) compiler (b) interpreter
called
(c) assembler (d) translator
(a) registers (b) RAM
(c) BIOS (d) I/O 39. Which type of software is designed to
29. Which of the following is the magnetic perform specific, personal, business or
storage device? scientific processing tasks?
(a) Hard disk (b) Compact disc (a) System (b) Application
(c) Audio tapes (d) All of these (c) GUI (d) Compiler
Introduction to Computer 25

40. It is a set of instructions or programs 47. Smart band is also known as


designed for specific use or application (a) Smart bracelets
that enable the user to interact with a (b) Connected bracelets
computer are called (c) Both (a) and (b)
(a) application software (d) Smart watch
(b) operating system
(c) instructions 48. Which of the following is a wearable
(d) system unit
computing device which comes with a
head mounted display in the form of
41. Utility programs include eyeglasses?
(a) Virus scanning software (a) Google glass (b) Drone camera
(b) Backup software (c) Spy pen (d) Smart goggle
(c) Disk fragmenter
49. This IT gadget is used for protection,
(d) All of the above
safety and even investigation.
42. Which of the following software is any (a) Drone camera (b) Smart watch
computer software that is distributed (c) Bluetooth speaker (d) Spy pen
with its source code available for
50. BHIM app is used to make simple, easy
modification?
and quick payment transactions using
(a) Application software
(a) Password (b) UPI
(b) System software
(c) Phone number (d) Aadhar number
(c) Open source software
(d) Proprietary software 51. App launched by IRCTC was known as
(a) IRCTC Connect (b) IRCTC App
43. Example(s) of open source software
(c) IRCTC Launcher (d) IRCTC Booking
is/are
(a) Linux (b) Unix 52. Paytm is India’s largest mobile payment
(c) MySQL (d) All of these and commerce platform founded by
(a) Aditya Sharma
44. This software is copyrighted and bears
(b) Vijay Shekhar Sharma
the limits against use.
(c) Sidhartha Sharma
(a) Proprietary software
(d) Shekhar Verma
(b) Open source software
(c) Application software 53. This mobile app reduces the use of
(d) System software physical documents and fake documents.
What is this?
45. …… is a device that has a specific (a) GARV app
function in addition usually has small
(b) DigiLocker app
dimensions.
(c) MyGov app
(a) Software (b) Gadget
(d) OnlineRTI app
(c) Keyboard (d) Scanner
46. Which of the following is/are IT gadget? 54. RTI India has launched a mobile
application for …… phones.
(a) Keyboard (b) Wrist watch
(a) Android (b) Apple
(c) Smart watch (d) Joystick
(c) Symbian (d) BlackBerry
26 Course on Computer Concepts (CCC)

True/False
Identify True/False from the following statements.
55. Instruction is a command given to a 66. When a computer prints a report, this
computer in the computer language by output is called hard copy.
the user.
67. A plotter is used to generate the map of
56. Information is a set of instructions given building and shopping malls.
to a computer.
68. Antivirus software is used to allocate the
57. The first generation computers could not memory to the data.
do multitasking.
69. Open source software must be available
58. NCR 304, IBM-1401 are the examples free or at a low cost.
of second generation computer.
70. Licenses and maintenance of proprietary
59. The main characteristics of fourth software are very cheap.
generation was vacuum tubes.
71. Smart bands have a pedometer and
60. A scanner, trackball and joystick are
sometimes also an optical heart rate
examples of output devices.
sensor.
61. OCR is a device that scans written or
typed text and transforms it into 72. Google glass is powered by Android
computer readable form. mobile operating system.
62. A mic converts the received sound into 73. Drone camera is an example of mobile
computer’s format. app.
63. Output devices store instructions or data 74. The aim to launch the BHIM app to
that the CPU process. make cashless payments.
64. The number of pixels displayed on a 75. MyGov app is used to store all official
screen is known as resolution. documents.
65. In a CRT, an electron gun is used, which 76. Helpline app provides a single point of
fires electrons at groups of phosphor dots service and information delivery to voters
coating the inside of the screen. across the country.

Answers
1. (c) 2. (a) 3. (c) 4. (b) 5. (c) 6. (d) 7. (d) 8. (b) 9. (a) 10. (a)
11. (a) 12. (d) 13. (d) 14. (b) 15. (d) 16. (d) 17. (d) 18. (c) 19. (a) 20. (c)
21. (a) 22. (d) 23. (b) 24. (a) 25. (d) 26. (c) 27. (d) 28. (a) 29. (a) 30. (c)
31. (a) 32. (a) 33. (c) 34. (b) 35. (d) 36. (d) 37. (b) 38. (c) 39. (b) 40. (a)
41. (d) 42. (c) 43. (d) 44. (a) 45. (b) 46. (c) 47. (c) 48. (a) 49. (d) 50. (b)
51. (a) 52. (b) 53. (b) 54. (a) 55. True 56. False 57. True 58. True 59. False 60. False
61. True 62. True 63. False 64. True 65. True 66. True 67. True 68. False 69. True 70. False
71. True 72. True 73. False 74. True 75. False 76. True
Introduction to
Operating System
Functions of Operating System
Objective of the Chapter The main functions of an operating system
This chapter includes Basics of Operating System, are as follows :
User Interface for Desktop and Laptop, Operating 1. Process Management A process is an
System Simple Setting, Files and Folder
application or a program in running
Management, Types of File Extensions.
state. Process management is the
important part of an operating system
Introduction which enables the activities of
Operating system is the system software that planning, monitoring and performance
performs all the basic tasks of a computer of a CPU.
system. It works like an interface between 2. Memory Management As a memory
the user and the computer hardware resources. manager, the operating system handles
It actually controls the execution of all the the allocation and deallocation of
tasks that are performed in a computer. memory space as required by various
Some examples of operating systems are programs. Managing the primary
Unix, MS-DOS, Windows 98/2000/XP. memory, sharing and minimising
It enables a user to utilise hardware resources memory access time are the basic goals
very efficiently. So, operating system makes of the memory management.
it easy for a user to use computer system. 3. File Management The operating
“An operating system is a collection of system is responsible for creation and
programs that controls and coordinates all the deletion of files and directories. It also
tasks and functions in a computer system. takes care of other file related activities
It mediates between application programs and such as organising, storing, retrieving,
hardware components.”
naming and protecting the files.
Basics of Operating System 4. Input/Output Management The
input/output management module of an
Operating system is the main part of the operating system coordinates and
system software of any computer. It mainly
assigns different input and output
provides an environment to run the software
devices. It controls all input/output
and serves services to the computer
hardware. Basically, operating system has devices, keeps track of input/output
two objectives : managing the computer’s requests, issues commands to these
hardware and providing the interface. devices.
28 Course on Computer Concepts (CCC)

5. Security Management The operating system protects system resources and information
against destruction and unauthorised use, it keeps different programs and data in such a
manner that they do not interface with each other.
Types of Operating System
Types Features
Time Sharing Operating ● In this OS, a small amount of time is allocated for the processing simultaneously.
System ● It provides scheduling to each process to be run on.
e.g. Mac OS
Real-Time Operating ● It was designed to respond to an event within a predetermined time.
System ● It aims to execute real time applications such as auto pilot mechanism used in aircrafts.
● It has very little user-interface capability and no end-user utilities.
e.g. Windows CE, QNX, RTLINUX, Vx Works, Free RTOS, etc.
Single-User Operating ● It is designed for one user to effectively use a computer at a time.
System e.g. Windows 95/NT/2000, DOS, etc.
Multi-User Operating ● It allows many users to take advantage of the computer’s resources simultaneously.
System ● It ensures that problem with one user doesn’t affect the entire community of users.
e.g. Unix, VMS, Linux, Windows 2000, etc.
Single-Tasking ● It allows only a single program to run at a time.
Operating System e.g. Palm OS, etc.
Multi-Programming ● It allows to run several programs at a time using time sharing.
Operating System ● This operating system keeps several jobs in memory at a time.
e.g. Linux, Unix, etc.
Multi-Tasking Operating ● This operating system is the logical extension of multi-programming operating system.
System ● In this OS, more than one processes can be executed concurrently.
● It reduces CPU idle time.
e.g. Microsoft’s Windows and Apple’s Mac OS.
Distributed Operating ● It uses multiple central processors to serve multiple real time applications.
System ● It manages a group of independent computers and makes them appear to a single computer.
● Data processing jobs are distributed among the processors according to their efficiency.
e.g. LOCUS etc.
Batch-Processing ● Similar types of jobs are grouped under batch and these batches are executed without
Operating System user’s interruption.
● Jobs are processed in the order of submission, i.e. on First Come First Serve (FCFS) basis.
e.g. DOS, IBM OS/2, etc.
Multi-Processing ● Use of two or more CPUs within a single computer system.
Operating System ● Simultaneous processing of two or more programs by multiple processors.
e.g. Linux, Unix, Windows 2000, etc.

Operating Systems for Desktop and Laptop


Some commonly used operating systems for desktop and laptop are as follows :
1. UNIX
It is an operating system which was first developed in the 1969s. UNIX systems have a
Graphical User Interface (GUI) similar to different Microsoft Windows which provides an easy
way to use platform. It supports fully multi-tasking with protected memory which means
multiple users can run multiple programs at the same time without interfering with each other
or crashing the system. UNIX was one of the first operating system to be written in a high
level programming language, namely C.
Introduction to Operating System 29

This meant that it could be installed on II. Windows 95 It was developed in


virtually any computer for which a C August, 1995 by Microsoft. It is an
compiler existed. This natural portability operating system based on consumer
combined with its low price made it a popular oriented application. Although, it can
choice among universities. run older Windows and DOS
applications. It has essentially removed
2. Linux DOS as a underlying platform.
It is an open source operating system
III. Windows 98 It was released in 1998 by
designed primarily for the PCs and laptops.
Microsoft. It was produced in two main
Linux was designed considering Unix
versions, i.e. the first version was
compatibility. Its functionality list is quite
plagued with programming errors but
similar to that of Unix. One of the most
the second edition (which came out
valued advantage of Linux over the other
later) was much better with many
platforms lies with the high security levels. It
errors resolved.
is a virus free operating system.
IV. Windows 2000 It was released in
3. Mac OS (Apple Macintosh) February, 2000 by Microsoft. A better
It is an operating system which was version of the Windows NT OS, that
introduced on March 24, 2001 by Apple Inc works well both at home and as a
and was initially named as system software, workstation in a business.
which was later renamed as Mac OS. Most V. Windows ME (Millennium Edition) It
recent version of OS is based on Unix was released in September, 2000 by
because it has a good graphical interface. Microsoft. An upgraded version of
So, it is both stable (does not crash often or Windows 98 but it has been historically
has as many software problems as other plagued with programming errors,
systems may have) and easy to learn. which may be frustrating for home
One drawback of this system is that it users. It includes Internet Explorer 5.5,
can only be run on Apple produced Windows Media Player 7.
products. VI. Windows XP (eXPerience) It was
4. MS-Windows released in October 25, 2001 by
Microsoft. It is an OS produced for
It is a series of Graphical User Interface
personal computers. Two versions of
(GUI) operating systems developed, marketed
Windows XP are Windows XP Home
and sold by Microsoft. Microsoft introduced
Edition and Windows XP Professional
an operating environment named Windows
Edition.
on November 20, 1985 as an add-on to
MS-DOS in response to the growing interest VII. Windows Vista It was released in
in Graphical User Interfaces (GUIs). January, 2007 by Microsoft. It offers an
advancement in reliability , security,
The most popular versions of Windows for ease of deployment, performance and
personal computers, mobile devices and manageability over Windows XP.
server computers are as follows :
VIII. Windows 7 It was released in July 22,
I. Windows NT (New Technology) The 2009 by Microsoft. It is an upgrade of
first version of Windows NT was Windows XP and Vista. It does not
Windows NT 3.1 released in July 27, include some standard applications like
1993 by Microsoft. It is a processor Windows Movie Maker, Windows Mail,
independent, multi-processing, etc. Now-a-days, it is the most
multi-user operating system. commonly used operating system.
30 Course on Computer Concepts (CCC)

IX. Windows 8 It was released in August Operating Systems for Mobile


1, 2012 by Microsoft. It introduced
major changes to the operating
Phone and Tablets
system’s platform and user interface to It is an OS that operates on smartphones,
improve its user experience on tablets, tablets and digital mobile devices. A mobile
where Windows was now competing OS controls a mobile device and its design
with Mobile OS, including Android and supports wireless communication and different
iOS. types of mobile applications. It has built-in
support for mobile multimedia formats.
X. Windows 10 It was released to
manufacturing in July, 2015 by The most common operating systems for
Microsoft. It is a personal computer mobile phone and tablets are as follows :
operating system as a part of the
Windows NT family of operating
1. Android
systems. It is the most popular Linux based open
source software developed by Google in
5. Solaris September, 2008.
It is a free operating system originally It is basically designed for touch screen mobile
developed by Sun Microsystems in 1993. devices like tablets, smartphones, etc.
Oracle Solaris, as it is now known and Now-a-days, it is most common OS used in
owned by Oracle Corporation since Oracle’s mobile phones.
acquisitions of Sun in January 2010.
Solaris is known for its scalability, reduced 2. iOS
cost, protected investments in applications. It is the popular mobile operating system
It is a standard operating system with developed by Apple Incorporation. iOS was
excellent performance, system management introduced in June 29, 2007 when the first
and network functions. iPhone was developed. This operating system
is commonly used in Apple iPhone, iPod
6. MS-DOS Touch, iPad, Second Generation Apple TV, etc.
(Microsoft-Disk Operating System)
It is an operating system that runs on PC 3. BlackBerry
and developed by IBM corporation in 1981. This is the most secure operating system used
It was the most commonly used member of in leading smartphones developed by
the DOS family of operating system. BlackBerry company. BlackBerry was
Initially, MS-DOS was targeted at Intel introduced in January 19, 1999. It also
8086 processors running on computer supports WAP 1.2.
hardware using floppy disks to store and
access not only the operating system, but 4. Symbian
application software and user data as well. It was developed on 5th June, 1997 and sold
Ultimately, it was the key product in by Symbian Ltd. It is a mobile OS targeted at
Microsoft’s development from a mobile phones that offer a high level of
programming languages company to a integration with communication and Personal
diverse software development firm, Information Management (PIM) functionality.
providing the company with essential Symbian is an open source mobile OS designed
revenue and marketing resources. It is a for smart phones. It has been used by many
flexible operating system and consumes major handset manufacturers including
negligible installation space. Motorola, Nokia, Samsung, Sony, etc.
Introduction to Operating System 31

Features of Ubuntu
User Interface There are following features of Ubuntu :
The user interface is one of the most ● It supports the office suite called LibreOffice.

important parts of any operating system ● It is easy to find content on Ubuntu with

because it allows users to easily access the the smart searching facility.
applications and the hardware. It is set of ● There are also applications to manage videos
commands or menus. The user can interact
and it also allows the users to share videos.
with the computer by using mainly two
● There are a host of free applications for
kinds of interfaces:
users to view and edit photos.
1. Character User Interface (CUI) This is a
● Ubuntu has an in-built e-mail software
mechanism of interacting with a
computer system or software by typing called Thunderbird, which gives the user
commands to perform specific tasks. access to e-mail.
Programs with Character User Interface Ubuntu Desktop
are generally easier to automate via
scripting. CUI only uses text types one When you turn ON the computer then the visible
after another, just as commands used in screen, which will display on the computer is
MS-DOS. It is also known as Command known as desktop. A small arrow or blinking
Line Interface (CLI). symbol, moving on the desktop is called as cursor.
Icons or
2. Graphical User Interface (GUI) It is used as Launcher Notification Area
an interface between program and user.
This is a computer program that
enables a user to communicate with a
computer through the use of symbols,
visual metaphors and pointing devices.
The first graphical user interface was
designed by Xerox Corporation in 1970s.
GUIs can be found in hand-held devices
such as MP3 players, portable media
players, gaming devices, etc.

User Interface for Desktop Trash Desktop


Some important components of desktop are
and Laptop described below :
User interface for desktop and laptop allows
users to easily access the applications and Icons and Shortcut
hardware. A small image of a program shown on the
Here, we will discuss Ubuntu operating desktop with program name is known as icon.
system that provides user interface. Icons are small pictures that represent files,
folders, programs and other items. When user
Ubuntu Operating System click an icon, the associated program will be
Ubuntu is an open source operating system opened. Some of the icons displayed on
based on the Debian GNU/Linux distribution. desktop are as follows :
● Search Your Computer It is also known as
Ubuntu incorporates all the features of a
Unix OS with an added customizable GUI, dash. In this icon, with the help of search
which makes it popular in universities and box you can search any software in your
research organisations. Ubuntu is primarily system. By default, it represents
designed to be used on personal computers, Thunderbird Mail, Videos, Text Editor or
although a server editions does also exist. any file, folder which saved on desktop.
32 Course on Computer Concepts (CCC)

● Files This icon contains Desktop, ● Clock Indicator It provides the options
Documents, Downloads, Music, Pictures, related to current date or time, calendar
Public, Templates, Videos and Examples setting etc.
options. Network connection also displays ● Session Indicator ( ) It provides the options
in this icon. as system settings, log-out, shut-down, etc.
● Firefox With this icon, internet services
are provided in the system. Taskbar
● LibreOffice Writer This icon helps to Initially, the long horizontal bar at the bottom
create and manipulate text document. of our desktop is known as taskbar. By
There are various tools present in the default, there is no taskbar in Ubuntu but
LibreOffice Writer which are used to create you can add it from dash.
template, printing the document etc. Structure of a Window
● LibreOffice Calc This icon helps to create Window is a rectangular area which provides
spreadsheet document. Calc is a powerful an environment to run many programs. It
program that used for analysing, sharing allows a user to work with multiple programs
and managing information for accounting or view multiple programs at once. A window
purpose, performing mathematical includes title bar, menu bar, etc.
calculations. Control Buttons Title Bar
● LibreOffice Impress This icon helps to
create presentation. Impress is a
presentation software that used for

123
creation of the slides and to display the Left Right
Pane Pane
information in the form of presentation of
slides.
● Ubuntu Software This is used for adding
and removing softwares.
● System Settings This icon represents the
settings related to system, hardware and
personal. You can change the date and
time, display, printer of your system. Title Bar
● Trash It is like a recycle bin icon of It is the horizontal bar at the top of a window
Windows. Trash contains deleted files or that displays the name of the window or the
folders. program, which is currently being used.

Notification Area Control Buttons


Upper right corner of the window display the Title bar contains three small buttons on its
notification area, that communicate the left corner, i.e. minimize, maximize or restore
status of certain programs and computer down and close. These buttons are known as
settings. Notification area contains various control buttons.
options as : The minimize button, which looks like a
● Network Indicator (↑↓) It arranges the Small Dash (or minus sign). This button
network connection which connect your shrinks and place the window on the launcher
computer to network. while leaving the program running. To go
● Sound or Volume Indicator (m) It allows to
back to this window, click on launcher where
adjust the sound or volume in the system. it is shrinked.
● Text Entry Indicator (En) It represents The maximize button, which looks like a
the details of current keyboard layout and small window is used to enlarge a window to
related setting. cover the entire desktop.
Introduction to Operating System 33

After a window is maximized, the control Using Mouse and Changing


buttons are automatically hidden from
window.
its Properties
Mouse is a pointing device that allows to
To make them appear, just move your
control the movement of pointer, on screen.
mouse pointer to the menu bar. Clicking
Mouse performs various functions by detecting
the maximize button again will return the
two-dimensional motion relatively to its
window to its original size.
supporting surface.
The close button, which is represented by
To change the mouse related settings, follow the
cross sign. If you click on close button, the
given steps :
window will get closed.
1. Click on System Settings icon. A System
Left Pane Settings window will appear on the screen.
Left pane of window includes various
options as Desktop, Documents,
Downloads, Music, Pictures, Videos, Trash,
Network and Recent which has recently
opened programs.
Right Pane
It is a large pane. It displays that files or
programs which are currently used.
Running an Application
Application can run using following ways :
● If you want to run the application using

launcher, click on desired icon of


application. 2. Select the Mouse & Touchpad option under
From which, the window of that Hardware section. A Mouse & Touchpad
application will be shown on your screen. window will appear on the screen and its
● If you want to run the application using icon will display in launcher.
dash, click on Search Your Computer
icon. A window will be appear on your
screen, enter the name of application
which you want to be open in search bar
and press Enter key.
From which, the window of that
application will be appear.

Simple Setting
of Operating System
In Ubuntu, most of the changes are done 3. In General section, Primary button is used
in System Settings. Settings for the mouse, for changing the function of left and right
display, sound, network and keyboard button of mouse. You can also change the
represent just a few examples of what may speed of double-click as Slow or Fast.
be modified in System Settings. To go on 4. In Mouse section of Mouse & Touchpad
System Settings, click on System Settings window, you can change the pointer speed
icon. of mouse by Pointer speed option.
34 Course on Computer Concepts (CCC)

Changing System Date and Time 6. If you want to display only watch and
month’s calendar, click on Show a clock in
To change your computer’s date and time,
menu bar and Monthly calendar. If you
follow the given steps :
want to display weekday and date, click
1. Click on time on your Notification Area on Weekday, Date and month and Year.
of window’s right upper corner. A drop
7. You can select 12-hour time or 24-hour
down menu will appear. Select Time &
time for time format.
Date settings option from it. A Time &
Date window will appear on your
screen, and its icon will display on
Changing Display Properties
launcher or click on System Settings The display properties include the settings of
icon. A window will appear. In System wallpaper, screen-saver, color, font, etc. To change
section, select Time & Date option. the display settings, follow the given steps :
1. Click the System Settings and now
select Appearance icon under the
Personal section. Appearance window
will be appear on the screen.

2. In Time & Date tab, select the radio


button of Automatically from the
Internet under the Set the time. By
this, date and time will automatically
update.
3. If you want to change the date and time 2. Now, select the wallpaper in the
manually, select the radio button of Wallpapers section.
manually under Set the time. 3. If you want to change the resolution of
4. Select the location in Location option. the screen, select System Settings and
then choose Displays icon under the
5. If you want to represent the clock in
Hardware section. Displays window will
menu bar of desktop background, click
be appear on the screen.
on Clock tab. A following window will
appear.
Introduction to Operating System 35

4. Choose the appropriate settings and 3. Now, select the program which you
click on Apply button. want to add in your system. e.g. Click
5. If you want to change the text size, on Calendar icon.
select System Settings and then choose Calendar window will appear on screen.
Universal Access icon under the System
section. Universal Access window will
be appear on screen.

6. Choose the appropriate settings in the 4. Click on Install button. A calendar


Seeing tab. program will install in your system.

To Add or Remove Program To Remove a Program


To remove a program, follow the given steps :
and Features
1. Click on Ubuntu Software icon from
Ubuntu Software icon is used to add or
launcher.
remove new program in computer.
2. Select the Installed tab from the
To Add a Program toolbar, a list of programs will be
To add a program, follow the given steps : appear.
1. Click on Ubuntu Software icon from 3. Search that program which you want to
launcher. remove and click on Remove button.
2. Select the Installed tab from the A confirmation dialog box will appear.
toolbar, a list of programs will be
appear.

4. Click on Remove button. A program will


remove from your computer.

Adding, Removing and Sharing


Printers
To print a document, you need to connect a
printer directly to your computer.
Adding a Printer
To add a printer, follow the given steps :
1. Click on System Settings from launcher.
A window will appear.
36 Course on Computer Concepts (CCC)

2. Select Printers icon under the


Hardware section. Printers dialog box
will be appear.

3. Click on Add button, from which New 6. Click on Forward button. A New Printer
Printer dialog box will appear. dialog box will appear.
7. Click on Apply button.
Removing a Printer
To remove a printer, follow the given steps :
1. Click on System Settings from launcher.
A window will appear.
2. Select Printers icon under the Hardware
section. Printers dialog box will be appear.
3. Right click on that printer which you
want to remove and choose Delete button
from drop down menu that appear.
4. A confirmation dialog box will appear.

4. Click on Network Printer option,


by which a list of printers will
display.
5. Select the printer from list and then, 5. Click on Delete button.
click on Forward button.
Sharing a Printer
or
To share a printer, follow the given steps :
Enter URI in Enter device URI box 1. Click on System Settings from launcher.
and click on Forward button. A window will appear.
Installed Options dialog box will 2. Select Printers icon under the Hardware
appear. section. Printers dialog box will be appear.
Introduction to Operating System 37

3. Right click on that printer which you Folders


want to share and choose Properties It is a container which you can use to store
option from drop down menu that files. Folder can also store other folders,
appear. A Printer Properties dialog box i.e. sub folders. Sub folder may be included in
will appear. other folder while making hierarchical folder
4. Choose Policies option from the left pane. structure.
Creating New Folder
To create new folder, follow the given steps :
1. Go to the location where you want to
create a new folder.
2. Right click on a blank area.
3. Click the New Folder option. A new
folder will be created.
Naming and Renaming Files
and Folders
To rename a file or folder, follow the given steps :
5. Check the check boxes of Enabled, 1. Go to the file/folder that you want to
Accepting jobs and Shared. rename.
6. Click on OK button. 2. Right click on it, a drop down menu will
appear.
File and Folder Management 3. Click Rename option from this drop
down menu.
Files 4. With the name selected, type a new
Files are the collection of data stored on name, or click to position the insertion
auxiliary storage medium. Files are the basic point and then edit the name.
unit to store data. 5. Press Enter.
The name given to a file or document by user Opening Files and Folders
is called file name. Files are organised after
To open the files or folders, follow the given
storing in folder.
steps :
To view all the files and folders on your 1. Go to the folder/file that you want to open.
computer, Search Your Computer icon is
used. 2. Double or Right click on it.
3. Complete the desired task, you want to
Types of File Extensions do with that folder/file.
In Ubuntu operating system, various types of 4. When you’re done, click the Close button.
files are identified with various extensions.
Extension File Type
Copying and Moving Files or Folders
Ubuntu offers several ways of working with
.eml E-mail file
files and folders. Coping and moving are two
.odt Writer file useful techniques as follows :
.exe Executable file
Steps to Copy and Paste a File or Folder
.htm or .html HTML file
1. Open the location that contains the
.txt Text file
file/folder, which you want to copy.
.ods Spreadsheet file
2. Right click the file/folder and then choose
.odp Presentation file Copy option from the drop down menu.
38 Course on Computer Concepts (CCC)

3. Open the location where you want to 3. Choose Move to Trash option from the
store the copied file/folder. drop down menu. File or folder will be
4. Right click on a blank area with the deleted.
location and then choose Paste. If you want to delete file or folder permanently,
The copy of the original file is now stored in follow below steps :
the new location. 1. Select a file or folder which you want to
delete.
Steps to Move a File or Folder
1. Open the location that contains the 2. Press Shift + Delete shortcut from the
file/folder, which you want to move. keyboard.
2. Right click the file/folder and then A confirmation message dialog box will
choose Cut option from the drop down appear.
menu.
3. Open the location where you want to
store the cutted file/folder.
4. Right click on a blank area with the
location and then choose Paste.
Now, the original file is stored in the new
location. 3. Click on Delete button.
Delete Files and Folders To Restore Files and Folders
When you organise the contents of a folder, Sometimes, you delete a file or folder by mistake.
disk, or the desktop, you might find files and So, to restore a file/folder, follow these steps :
folders that you no longer need. You can delete 1. Double click the Trash icon from the
these items or remove them from the disk. We launcher.
follow some steps to delete files and folders : 2. Select the item which you want to restore.
1. Locate your file or folder. 3. Click Restore from drop down menu
2. Right click on the file or folder icon. that appear.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. Ubuntu is a/an 10. Which software is a series of graphical
(a) operating system (b) office suite user interface operating systems
(c) desktop application (d) browser developed by Microsoft?
(a) Mac OS (b) MS-Windows
2. The primary purpose of the operating
(c) Linux (d) Solaris
system is
(a) to make the most efficient use of the 11. Which operating system is developed by
computer hardware Apple Incorporation?
(b) to allow people to use the computer (a) iOS (b) BlackBerry
(c) to keep systems programmer’s employed (c) Android (d) Symbian
(d) to make computers easier to use 12. BlackBerry also supports
3. ........ is responsible for creation and (a) WAP 1.0 (b) WAP 1.2
deletion of files and directories. (c) WAP 1.5 (d) None of these
(a) Operating system (b) Application software 13. GUI stands for
(c) Programs (d) Peripherals (a) Graphical User Interface
4. It provides scheduling to each process to (b) Graphical Used Interface
be run on. (c) Great User Interface
(a) Time sharing OS (b) Distributed OS (d) None of the above
(c) Real-time OS (d) Single-user OS
14. GUI is used as an interface between
5. An operating system is said to be (a) hardware and software
multi-user, if (b) man and machine
(a) more than one programs can run (c) program and user
simultaneously (d) None of the above
(b) more than one users can work
simultaneously 15. It uses pictures (called icons) and menus
(c) Either (a) or (b) displayed on the screen to send
commands to the computer system.
(d) All of the above
(a) Command-based user interface
6. ............ provides process and memory (b) GUI
management services that allow two or (c) System Utility
more tasks, jobs or programs to run (d) API
simultaneously.
(a) Multi-tasking (b) Multi-threading 16. The ‘desktop’ of a computer refers to
(c) Multi-processing (d) Multi-computing (a) the visible screen
(b) the area around the monitor
7. The simultaneous processing of two or
more programs by multiple processors is (c) the top of the mouse pad
(a) multi-programming (b) multi-tasking (d) the inside of a folder
(c) time sharing (d) multi-processing 17. The image, displayed on the desktop of
8. ………… is an operating system which Ubuntu
was first developed in 1969. (a) main image (b) wallpaper
(a) Windows (b)Mac Os (c) Linux (d) Unix (c) desktop image (d) windows image
9. Linux is which type of operating system? 18. A blinking indicator that shows you
(a) Open-Source (b) Microsoft where your next action will happen, is
(c) Windows (d) Mac (a) CPU (b) cursor (c) toolbar (d) boot
40 Course on Computer Concepts (CCC)

19. A small figure shown on the desktop 30. Which tab is used to represent the clock
screen with a program name is called in menubar of desktop background?
(a) menu (b) photo (c) modem (d) icon (a) Time & Date (b) Clock
(c) Both (a) and (b) (d) Menu
20. When you want to move an icon on your
desktop, this is called 31. To open Time & Date dialog box, follow
(a) double clicking (b) highlighting which steps?
(a) System Settings ® System ® Time & Date
(c) dragging (d) pointing
option
21. All the deleted files go to (b) System Settings ® Hardware ® Time &
(a) trash (b) task bar Date option
(c) status bar (d) computer (c) System Settings ® Personal ® Time &
Date option
22. Date and time are available on the (d) None of the above
desktop at
(a) Keyboard (b) Recycle Bin 32. With the help of which option, you can
(c) My Computer (d) Notification Area change display properties?
(a) Display (b) Appearance
23. ………… represents the details of current (c) Wallpaper (d) Background
keyboard layout and related setting.
(a) Text entry indicator (b) Clock indicator
33. In which section, Displays icon is present?
(a) Hardware (b) Personal
(c) Session indicator (d) Network indicator
(c) System (d) Wallpaper
24. The long horizontal bar at the bottom of 34. By ………… icon from launcher, you can
desktop is known as add or remove softwares or programs.
(a) Status bar (b) Task bar (a) Search Your Computer
(c) Menu bar (d) Title bar (b) System Settings
(c) Trash
25. Left pane of the Ubuntu window includes
(d) Ubuntu Software
option(s) as
(a) Desktop (b) Documents 35. Which tab(s) is/are available in the
(c) Music (d) All of these Ubuntu Software window?
(a) All (b) Installed
26. To shrink a window to an icon, (c) Updates (d) All of these
(a) open a group window
(b) minimize a window 36. By which icon from launcher, printer can
(c) maximize a window be add?
(a) Search Your Computer
(d) restore a window
(b) Trash
27. Applications can be run using (c) System Settings (d) Ubuntu Software
(a) launcher 37. Which option from drop down menu is
(b) Search Your Computer used to share printer?
(c) Both (a) and (b) (a) Properties (b) Sharing
(d) None of the above (c) Shared (d) Networking
28. With the help of which icon in launcher, 38. A ............ is a collection of information
you can change mouse properties, display saved as a unit.
properties etc? (a) Folder (b) File
(a) Ubuntu Software (c) Path (d) File extension
(b) System Settings 39. What is a file?
(c) Search Your Computer (a) A file is a section of main storage used to
(d) Trash store data
(b) A file is a collection of information that has
29. Mouse & Touchpad option is available been given a name and have an extension
under which section of System Settings? (c) A file is the part of a program that is used
(a) Personal (b) Hardware to describe what the program should do
(c) System (d) Properties (d) A file can be saved only in CDs
Introduction to Operating System 41

40. Files are organised after storing in 43. A named area on a disk that is used to
(a) archives store related sub folders and files is
(b) folders called as a ............
(c) indices (a) desktop (b) folder
(d) lists (c) menu (d) window
41. File extensions are used in order to 44. ...... may be included in other folder while
(a) name the file making hierarchical folder structure.
(b) ensure the file name is not lost (a) Mini folder (b) Tiered folder
(c) identify the file (c) Sub folder (d) Object
(d) identify the file type 45. Which shortcut key is used to delete file
42. What is the file extension of Writer? permanently?
(a) .eml (b) .wrt (a) Shift + Delete (b) Ctrl + Delete
(c) .odf (d) .txt (c) Alt + Delete (d) Shift + Ctrl + Delete

True/False
Identify True/False from the following statements.
46. An operating system is an application 57. In Ubuntu, deleted files are stored in
software. CD-ROM.
47. Process management is a function of 58. Task bar consists of three parts start
operating system. button, middle section and notification
48. The operating system manages the area.
primary memory of the computer. 59. The name of the control button which is
49. Linux is a case sensitive operating system. clicked to enlarge a window to the size of
50. Ubuntu is an open source operating system. whole screen is minimize button.
51. Ubuntu does not support office suite 60. A title bar contains programs that can be
called LibreOffice. selected.
52. Search Your Computer is also known as 61. You can change the settings of wallpaper
Trash. screen saver etc, from Mouse properties.
53. Ubuntu Software icon is used for adding 62. You can remove the printer, if you have
and removing softwares. items in the print queue.
54. A user interface is a set of commands or 63. .exe is the extension of Executable file.
menus.
64. Folder is a container which you can use
55. CUI is also known as Command Line to store files.
Interface (CLI).
65. Ubuntu offers several ways of working
56. In GUI, you need to type commands to with files and folders.
perform specific tasks.

Answers
1. (a) 2. (d) 3. (a) 4. (a) 5. (b) 6. (a) 7. (d) 8. (d) 9. (a) 10. (b)
11. (a) 12. (b) 13. (a) 14. (c) 15. (b) 16. (a) 17. (b) 18. (b) 19. (d) 20. (c)
21. (a) 22. (d) 23. (a) 24. (b) 25. (d) 26. (b) 27. (c) 28. (b) 29. (b) 30. (b)
31. (a) 32. (b) 33. (a) 34. (d) 35. (d) 36. (c) 37. (a) 38. (b) 39. (b) 40. (b)
41. (d) 42. (c) 43. (b) 44. (c) 45. (a) 46. False 47. True 48. True 49. True 50. True
51. False 52. False 53. True 54. True 55. True 56. False 57. False 58. False 59. False 60. False
61. False 62. False 63. True 64. True 65. True
06
Introduction to
Internet and WWW
media. E-mailing, instant messaging and web
Objective of the Chapter pages all are dependent on communication
This chapter includes Basics of Computer Networks, that take place across an underlying
Network Topology, Internet, World Wide Web. ISP computer network.
and Role of ISP, Internet Protocol, Popular Web
Browsers, Popular Search Engines, Downloading Benefits of Computer Network
Web Pages, Printing Web Pages etc.
(Networking)
Computer network is very useful in modern
Introduction environment. Some of the benefits of network
The vast network of computers that connects are discussed here :
millions of people all over the world is called
Internet. Internet is a global computer 1. Data and File Sharing Networking of
network providing a variety of information computer helps the users to share data
and communication facilities, consisting of and files.
interconnected networks using standardized 2. Hardware Sharing Users can share
communication protocols. devices such as printers, scanners,
CD-ROM drives, hard drives, etc.
WWW (World Wide Web) is the most
important resource of Internet on which 3. Storage Capacity Users can access
information in bulk for each subject is files and multimedia, such as images
provided. It consists of all the public websites and music, which you store remotely on
connected to the Internet world wide, other machines or network attached
including the client devices (computers, cell storage devices.
phones, etc) that access web content. 4. Application Sharing Applications can
be shared over the network and this
Basics of Computer Network allows implementation of client/server
applications.
A computer network is a collection of two or
more computers which are connected together Components of Computer
to share information and resources. It is a
combination of hardware and software that Network
allows communication between computers Network components are those major parts
over a network. that are needed to install a network. Before
The computers may be connected via any that understand how data is transmitted on a
data communication link, like wires, cables, network, it is important to know various
satellite links and other communication components that compose a network.
Introduction to Internet and WWW 107

Some of them are discussed below : Metropolitan Area Network (MAN)


1. Client Any computer that is the part of It is a data network designed for a town
a common network other than the or city. It connects an area larger than a
server is called as client LAN, but smaller than a WAN, such as a
2. Server Any computer that holds shared city, with dedicated or high performance
files, programs and the network hardware. Its main purpose is to share
operating systems is called server. hardware and software resources by the
3. Network Cable These are the physical various users.
devices through which various Cable TV network is an example of
components of a computer network are metropolitan area network. The computers
connected with each other. This is also in a MAN are connected using co-axial
known as bus. cables or fiber optic cables.
4. Network Interface Card (NIC) It is
also known as adaptor. NIC regulates Wide Area Network (WAN)
the exchange of data between the It is a geographically dispersed collection
network and the computers. of LANs. The Internet can be considered
5. Protocol A set of rules is called protocol. as WAN as well. A WAN like Internet,
Network protocol is standardised set of can expand most of the world. A network
rules, used for transmission of data and/or device called a router connects LANs to
establish communication between them. a WAN.
6. Resources The hardwares that are These kinds of network use telephone lines,
available to a computer on a particular satellite links and other long range
network are known as resources. communication technologies to connect (as
communication media).
Types of Computer Network Like the LAN, most WANs are not owned
Computer network is broadly classified into by any one organisation, but rather exist
three types : under collective or distributed ownership
and management. WANs use technology
Local Area Network (LAN) like ATM, Frame Relay and X.25 for
LAN is a small and single site network. connectivity.
A LAN connects network devices over a
relatively short distance. It is a system in Differences between LAN, MAN and WAN
which computers are interconnected and the
Features LAN MAN WAN
geographical area such as home, office,
buildings, school may be within a building or Distance Limited Limited Unlimited
around 1 km. Speed High (normally Medium (normally Low (normally
All the terminals are connected to a main 1000 Mbps) from 100 to 1000 from 10 to100
computer called server. On most LANs, Mbps) Mbps)
cables are used to connect the computers. Media Twisted pair Twisted pair Twisted pair
LANs are typically owned, controlled and cable; Fiber cable, Fiber cable, Coaxial
managed by a single person or organisation. optic cable, optic cable cable, Fiber
Coaxial cable optic cable,
They also use certain specific connectivity
Wireless for
technologies, primarily Ethernet and Token satellite
Ring. Print server allows LAN users to share
compiler programs and data. Data transfer Nodes Normally Normally Normally
rate in LAN is 10 to 100 Mbps. LAN provides desktops desktops or mini desktops
computers
a sharing of peripherals in an efficient or
effective way.
108 Course on Computer Concepts (CCC)

Network Topology Mesh Topology


The term ‘topology’ refers to the way a It is also known as completely inter-
network is laid out, either physically or connected topology. In mesh topology, every
logically. Topology can be referred as the node has a dedicated Point-to-Point link to
geometric arrangement of a computer system. every other node. It provides a bi-directional
Each computer system in a topology is known link between each possible node.
as node. The most commonly used topologies Mesh topology is robust because the failure of
are described below: any one computer does not bring down the
entire network.
Bus Topology
A bus topology is such that there is a single
line at which all nodes are connected. In bus
topology, all the network components are
connected with a same (single) line. Ethernet
is commonly well protocol in networks
connected by bus topology. Mesh Topology

Ring or Circular Topology


Ring topology is used in high performance
Connecting networks where large bandwidth is
Line necessary.
The protocols used to implement ring
topology are Token Ring and Fiber
Bus Topology Distributed Data Interface (FDDI). In ring
topology, data is transmitted in the form of
Star Topology token over a network.
In this network topology, the peripheral After passing through each node, the data
nodes are connected to a central node returns to the sending node.
(hub/switch), which rebroadcasts all
transmissions received from any peripheral
node to all peripheral nodes across the
network. A star network can be expanded by
placing another star hub. If the central hub
fails, then whole network fails. The protocols
used in star topology are Ethernet, Token
Ring and Local Talk.
Node 2
Node 1 Node 3 Ring Topology

Tree Topology
HUB This is a network topology in which nodes
Node 5 Node 4 are arranged as a tree. The function of
the central node in this topology may be
distributed. Its basic structure is like an
inverted tree, where the root acts as a
Star Topology server.
It is least affected by additional/removal of a The tree topology simulates hierarchical
node. flow of data.
Introduction to Internet and WWW 109

It allows more devices to be attached to a kbits circuits. The goal of this project was to
single hub. connect computers at different universities
Server and US defence.
In mid 80s another federal agency,
the National Science Foundation, created a
new high capacity network called NSFnet,
which was more capable than ARPANET.
The only drawback of NSFnet was that it
allowed only academic research on its
network and not any kind of private
business on it.
Tree Topology
So, private organisations and people started
working to build their own networks, which
Internet were later interconnected with ARPANET
International and Network are those two and NSFnet to form the Internet.
terms that are combined to make a single
term Internet. It is a ‘network of networks’ World Wide Web (WWW)
that connects millions of computers together WWW was introduced on 13th March, 1989.
globally forming a network in which any The world wide web is a system of Internet
computer can communicate with any other servers that supports hypertext and
computer as long and they both are connected multimedia to access several Internet
to the Internet. protocols on single interface.
The world wide web is often abbreviated as
the web or WWW. The world wide web is a
way of exchanging information between
computers on the Internet, try to tie them
together into a vast collection of interactive
multimedia resources.
The world wide web (web) is only a portion of
what makes up the Internet, but it is the
Internet fastest growing part of the Internet. The web
Internet uses the TCP/IP (Transmission lets people, organisations and companies
Control Protocol/Internet Protocol) to serve publish information for other people to see.
billions of users world wide. So, TCP/IP can
be called as backbone of Internet. Web Page
The backbone of the world wide web is made
The Internet is a huge ocean of information
of files, called pages or web pages, containing
of resources and services such as interlinked
information and links to resources both text
hypertext documents of World Wide Web
and multimedia throughout the Internet. It is
(WWW), online chatting, online banking, file
created using HTML (HyperText Markup
transfer and sharing, online gathering, online
Language).
education and so on.
The web is a collection of large number of
History of Internet computer documents or web pages that are
In 1969, the University of California stored on computers around the world and
at Los Angeles, the University of Utah are connected to one another using
and some other universities were connected hyperlinks. These web pages can be seen by
as the beginning of the ARPANET (Advanced anyone through a web browser. To reload a
Research Projects Agency Network) using 50 webpage, press Refresh button.
110 Course on Computer Concepts (CCC)

Website e.g.
http://www.google.com/services/index.htm
A group of web pages that follow the same theme
and are connected together with hyperlinks is Here, http:// - protocol identifier
called a website. In other words, “A website is a www - World Wide Web
collection of digital documents, primarily HTML google.com - domain name
files, that are linked together and that exist on /services/ - directory
the Internet under the same domain”. index.htm - web page
Websites and web pages are written in a coding
language that makes it possible to add pictures,
Domain Name
sound and interactivity to plain old text, making Domain is a group of network resources
people’s reading experience more exciting. assigned to a group of users. A domain
The very first page of a website is called home name is a way to identify and locate
page of that website. computers connected to the Internet. A
domain name must be unique and always
e.g. http://www.carwale.com is a website while has two or more parts, separated by
http://www.carwale.com/new/ is a web page. periods dot(.)
e.g. google.com, yahoo.com, etc.
Web Server
It is a computer program that serves requested Domain Abbreviation
HTML pages or files. A web client is the Domains are organised by the type of
requesting program associated with the user. The organisations and by country. A
web browser is a client that request HTML files three-letter abbreviation indicating the
from web servers. The server computer delivers organisation and usually two-letter
those web pages to the client computers that are abbreviation indicating the country name.
requested. Every web server that is connected to Most common domain abbreviations for
the Internet is given a unique address i.e. IP organisations are :
address made up of a series of four numbers .info - Informational organisation
between 0 to 255 separated by periods(.).
.com - Commercial
e.g. 68.178.157.132 or 68.122.35.127.
.gov - Government
Web Address/URL .edu - Education
A web address identifies the location of a specific .mil - Military
web page on the Internet, such as .net - Network resources
http://www.learnyoga.com. On the web, web .org - Usually non-profitable
addresses are called URLs. URL stands for organisation
Uniform Resource Locator. It is the web address Some domain abbreviations for country are :
for a website or a web page. The basic purpose of .in - India
URL is to locate IP address. .au - Australia
The URL specifies the Internet address of a file .fr - France
stored on a host computer connected to the .nz - New Zealand
Internet. The URL contains the name of the .uk - United Kingdom
protocol to be used to access the file resource, a
domain name that identifies a specific computer Domain Name System (DNS)
on the Internet and a pathname, with It stores and associates many types
hierarchical description that specifies the location of information with domain names.
of a file in that computer. It translates domain names (computers

host names) to IP addresses. It also lists
Note Tim Berners Lee created the first URL in 1994
to allow the publishing of hyperlinks on the world mail exchange servers accepting E-mail
wide web. for each domain.
Introduction to Internet and WWW 111

DNS is an essential component of These business transactions occur


contemporary Internet use. The naming either business-to-business,
scheme by which servers are identified is business-to- consumer,
known as the domain name system. Another consumer-to-consumer or
method of addressing servers is based on consumer-to-business.
numbers. 6. Online Shopping It is the process of
buying goods and services from
Applications of Internet merchants who sell on the Internet.
There are various applications of Internet as Consumers can buy a variety of items
follows : from online stores.
1. E-mailing E-mail is an electronic Books, clothing, household appliances,
version of sending and receiving letters toys, hardwares, softwares and health
that can be done using Internet. The insurances are just some of the
person who communicates with you hundreds of products, consumers can
could be any other user on the Internet; buy from an online store.
someone using the computer system as
Some E-Shopping sites are Naaptol,
you or other computer system thousands
Flipkart, Homeshop 18 etc.
of miles away.
7. Job Search Nowadays, many people
2. Video Conferencing It is a
search for their jobs online as it is
communication technology that
quicker and there is a larger variety
integrates audio and video data to
of job vacancies present. People can
connect users anywhere in the world as
publish resume online for prospective
if they are in the same room. Each user
job.
or group of users who are participating
in a video conference typically must Some of the websites providing this
have a computer, a camera, a service are naukri.com, monster.com,
microphone, a video screen, a sound recruitmentindia.com etc.
system and Internet connection. 8. Social Networking It is the use of
3. E-Learning E-Learning (Electronic Internet based social media programs
Learning) is the mode of acquiring to make connections with friends,
knowledge by means of Internet and family, classmates, customers and
computer based training programs. It clients. These websites provide users
refers to the electronic mode of with simple tools to create a custom
delivering, learning, training or profile with text and pictures. The most
educational programs to users. popular sites are currently Facebook,
4. E-Reservation E-Reservation Twitter, LinkedIn, Myspace etc.
(Electronic Reservation) means making a 9. Chatting User can chat with their
reservation for a service via Internet. friends, relatives, colleagues etc., using
You need not go to an office or a counter Internet.
personally to book/reserve railways, Chatting is the online textual or
tickets airways tickets, hotel rooms, multimedia conversation. Chat with
tourist package etc. people using the Internet is some what
5. E-Commerce E-Commerce (Electronic similar to using telephone for the same
Commerce) includes sharing business purpose.
information, maintaining business It is a virtual means of communication
relationship and conducting business that involves the sending and receiving
transactions by means of of messages, share audio, and video
telecommunication networks or process between users located in any part of
of trading goods over the Internet. the world.
112 Course on Computer Concepts (CCC)

then establishes the connection, which


Preparing Computer usually takes about ten seconds and is
for Internet Access accompanied by several beeping and buzzing
Preparing your computer to access Internet, sounds.
we should have proper hardware, software,
a telephone line and a network connection.
Broadband Connection
To access Internet on a computer, you need The term broadband commonly refers to high
following : speed Internet access that is always ON and
faster than the traditional dial-up access. It
ISPs and Role of ISP uses a telephone line to connect to the
(Broadband/Dial-Up/Wi-Fi) Internet. Broadband access allows users to
connect to the Internet at greater speed than
ISP (Internet Service Provider) a standard 256 KB modem or dial-up access.
It refers to the company that provides Broadband includes several high speed
Internet connections to the users, usually for transmission technologies which are as
a fee. For a monthly fee, the service provider follows :
usually provides a software package, (i) Digital Subscriber Line (DSL) It is
username, password and access phone a popular broadband connection. It
number. The most common ways to connect provides Internet access by transmitting
to an ISP are by using a phone line (dial-up) digital data over wires of a local
or broadband connection (cable or DSL). telephone network.
Role of ISP DSL is the most common type of
broadband service. It uses the existing
Role of ISP are as follows :
copper telephone lines. A special modem
● As a medium that provides services to
is necessary in order to be able to use a
connect to the Internet. DSL service over a standard phone line.
● Connect customers to the nearest Internet
Faster forms of DSL typically available
gateway. to businesses include :
● Connecting information service to a user of
(a) High data rate Digital Subscriber
the World Wide Web. Line (HDSL)
● Allows a user to use the services of
(b) Very High data rate Digital
electronic mail. Subscriber Line (VHDSL)
● Provides a modem for dial-up.
(ii) Cable Modem Cable modem service
Internet Access Techniques enables cable operators to provide
broadband using the same coaxial
Some of the Internet connections available to cables that deliver pictures and sound
Internet access are as follows :
to your TV set. Most cable modems are
Dial-Up Connection external devices that have two
connections, one to the cable wall outlet,
A dial-up is a method of connecting to the
Internet using an existing telephone. Dial-up the other to a computer.
connection uses the telephone line to connect (iii) Fiber Optic Fiber optic technology
to the Internet. The modem connects the converts electrical signals carrying data
computer through the standard phone lines, to light and sends the light through
which serve as the data transfer medium. transparent glass fibers of about the
When a user initiates a dial-up connection, diameter of a human hair. Fiber
the modem dials a phone number of an transmits data at speed which is far
Internet Service Provider (ISP) that is exceeding than DSL or cable modem
designated to receive dial-up calls. The ISP speeds, typically by 10 or 100 Mbps.
Introduction to Internet and WWW 113

(iv) Broadband over Power Line (BPL) It would operate similar to Wi-Fi but at
is the delivery of broadband over the higher speed, over greater distances and
existing low and medium voltage for a greater number of users. WiMAX has
electric power distribution network. the ability to provide service even in areas
BPL speeds are comparable to DSL and that are difficult for wired infrastructure
cable modem speeds. BPLs can be to reach and the ability to overcome the
provided to homes using existing physical limitations of traditional wired
electrical connections and outlets. BPL infrastructure.
is good for areas, where there are no
other broadband connections, but power Other Mode of Connecting Internet
infrastructure exists, e.g. rural areas. LAN Cable
Wireless Connection It refers to the cables for carrying data in
computer networking. There are two main
Wireless broadband can connect a home or
types of LAN cable. One is the standard
business to the Internet using a radio link
straight through cable usually known as
between the customer’s location and the
Ethernet patch cable, which is used for
service provider’s facility. Wireless broadband
connecting computers to routers or switches.
can be mobile or fixed. Unlike DSL and cable,
wireless broadband requires neither a modem The other type is a crossover cable, which is
nor cables and as a result it can be easily used for connecting two computers directly
established in areas, where it is not feasible without routers, switches or hubs. As for
to deploy DSL or cable. straight through vs crossover cable, they use
different wiring standards in the connectors
Some ways to connect the Internet wirelessly
of the two ends. The two connectors of
are as follows :
straight through type use the same wiring
(i) Wireless Fidelity (Wi-Fi) It is a standards. either T568A or T568B. While
universal wireless networking technology connectors of crossover adopt different
that utilises radio frequencies to transfer standards, one connector uses T568A and the
data. Wi-Fi allows high speed Internet other one uses T568B.
connections without the use of cables or
wires. Wi-Fi networks can be designed for USB Tethering
private access within a home or business Tethering is the process of sharing your
or be used for public Internet access at phone’s mobile data to access the Internet on
hotspots such as restaurants, coffee other devices, like a laptop. USB tethering is
shops, hotels, airports, convention centers a simple application that shares Internet
and city parks. connection from your smartphone to your
computer through USB connection. It is the
Hotspot fastest and most effective way to share your
phone’s mobile data with other devices.
It is physical location where people can access
the Internet, typically using Wi-Fi, via a Wireless How to Setup USB Tethering?
Local Area Nework (WLAN) with a router Steps to setup USB tethering on Android
connected to an Internet service provider. device are as follows :
1. Open settings® Network & Internet ®
(ii) Worldwide Interoperability for
Hotspot & Tethering.
Microwave Access (WiMAX) It is one of
the popular broadband wireless techno- 2. Tap the USB Tethering option. The
logies around today. WiMAX systems are Hotspot & Tethering warning will
expected to deliver broadband access appear, informing you that continuing
services to residential and enterprise will interrupt any existing data transfer
customers in an economical way. WiMAX between your phone and PC.
is based on wireless MAX technology. It 3. Click OK to proceed.
114 Course on Computer Concepts (CCC)

Internet Protocol Telnet Protocol


It is a program that runs on the computer
A protocol is a set of rules that govern data
and connects PC to a server on the network.
communications. A protocol defines what is
This protocol is used on the Internet or Local
communicated, how it is communicated and
Area Network. Telnet session will started by
when it is communicated. Generally, some of
entering valid username and password.
protocols used to communicate via an
Internet are as follows : Usenet Protocol
Transmission Control Protocol/Internet The usenet service allows a group of Internet
Protocol (TCP/IP) users to exchange their views/ideas and
information on some common topic that is of
The details of TCP/IP are as follows :
interest to all the members belonging to that
1. Transmission Control Protocol (TCP) same group.
It provides reliable transport service, i.e.
Several such groups exist on the Internet are
it ensures that message sent from sender
to receiver is properly routed. TCP called newsgroups. Usenet has no central
converts messages into a set of packets at server or administration.
the source which are then reassembled Point-to-Point Protocol (PPP)
back into messages at the destination.
It is a dial account which puts your computer
2. Internet Protocol (IP) It allows directly on the Internet. A modem is required
different computers to communicate by for such connection which transmits the data
creating a network of networks. IP 9600 bits per second.
handles the dispatch of packets over the
network. It maintains the addressing of Simple Mail Transfer Protocol (SMTP)
packets with multiple standards. Each It is the standard protocol for E-mail services
IP packet must contain the source and on a TCP/IP network. It provides the ability
the destination addresses. to send and receive e-mail messages.
➥ Note An IP address is 32 bit number. Wireless Application Protocol (WAP)
It is a communication protocol that is used
File Transfer Protocol (FTP)
for wireless data access through most mobile
It can transfer files between any computers wireless networks.
that have an Internet connection and also
works between computers using totally WAP facilitates instant connectivity
different operating systems. between interactive wireless devices
and the Internet.
HyperText Transfer Protocol (HTTP)
Voice over Internet Protocol (VoIP)
It defines how messages are formatted and
transmitted and what actions should be It allows delivery of voice communication
taken by the Web servers and browsers in over Internet Protocol networks. e.g. IP calls.
response to various commands.
Identifying and Uses of IP/
HyperText Markup Language (HTML)
MAC/IMEI of Various Devices
It is used for designing web pages. A IP Address
markup language is a set of markup Internet Protocol (IP) address is a logical
(angular bracket, <>) tags which tell the numeric address that is assigned to every
web browser how to display a web pages single computer, printer, switch, router or
words and images for the user. Each any other device that is part of a TCP/IP
individual markup code is referred to as based network. It is used to uniquely identify
an element or a tag. every node in the network. It is similar to a
Introduction to Internet and WWW 115

mailing address, which identifies where IMEI Number


postal mail comes from and where it should
IMEI (International Mobile Equipment
be delivered.
Identity) is a unique number to identify
There are two versions of IP Internet Protocol GSM, WCDMA etc mobile phones as well as
version 4 (IPv4) and Internet Protocol version some satellite phones. Mostly phones have
6 (IPv6). IPv4 addresses are 32 bits (four one IMEI number, but in dual sim phones,
bytes) long. e.g. 216. 58.216.164. there are two IMEI numbers. The IMEI is
only used for identifying the device and has
How to Find IP Address no permanent or semi-permanent relation to
of Windows 7 Computer? the subscriber. It can be used for stopping a
Steps to find the IP address of Windows 7 stolen phone from accessing the network in
computer are as follows : that country.
1. Click Start button ®Control Panel®
Network and Internet® Network and
How to Find IMEI Number on Phone?
Sharing Center. Steps to find the IMEI number on phone are
as follows :
2. In the task list, click on Change
1. On Android phone, you can find the
Adapter settings. Highlight and right
IMEI number in setting menu as,
click the Local Area Connection icon.
Settings®About phone®Status.
A context menu will appear.
2. On iPhone, you can find the IMEI
3. Click on Status and select Details
number in setting menu as,
button. The IP address will display.
Settings®General®About.
MAC Address or
MAC (Media Access Control) address is The universal method for checking your
IMEI number, which will work on any
sometimes referred to as physical address
phone as Android, iPhone etc.
because it is physically embedded in the
interface. It is a 6-byte address that allows 3. Dial *#06#, a box should pop up with
IMEI number.
an NIC to be uniquely identified on the
network. The MAC address forms the basis of
network communication, regardless of the Web Browser
protocol used to achieve network connection. A web browser or simply browser is a special
MAC addresses are made up of six two digit software that enables the users to read/view
hexadecimal numbers separated by colons (:). web pages and jump from one web page to
another. It displays a web page and
e.g. an ethernet card may have a MAC
interprets its HTML codes. It is the software
address of 00:0d:83:b1:c0:8e.
that is needed to find, retrieve, view and
How To Find MAC Address send information over the Internet.
of Windows 7 Computer? Browsers are of two types :
Steps to find the MAC address of Windows 7 1. Text-Based Web Browsers are the
computer are as follows : web browsers that support text only, i.e.
1. Click on Start button. these browsers do not support graphics.
e.g. Lynx is a text browser.
2. Select Run and type cmd into the text
field. A command prompt will appear on 2. Graphical-Based Web Browsers
the screen. provide a Graphical User Interface
3. Type ipconfig / all (note the space (GUI) where the user can jump from
between g and /.MAC address is listed one web page to another by clicking on
the hyperlink on a web page. e.g.
as series of 12 digits under Physical
Chrome, Internet Explorer, Mozilla
Address.
Firefox, etc.
116 Course on Computer Concepts (CCC)

Popular Web Browsers Lynx


Some popular web browsers are given below : It is one of the oldest web browser developed
in 1992. It is a text based web browsing
Mozilla Firefox software which has been
It has been developed by a company developed in Kansas
called Mozilla Corporation. It is a free University of USA. It is
and open source web browser. It was basically used for Unix
initially released in September 2002. It was operating system.
earlier named Phoenix, Firebird and It does not support multimedia files so
eventually Firefox. It can be downloaded from you cannot see any graphics or other
www.mozilla.org. media files.
Google Chrome Netscape Navigator
This web browser was developed by Google. Netscape was introduced in 1994. It has
Its beta and commercial versions were been developed by Netscape
released in September 2008 for Communication Corporation of USA.
Microsoft Windows. Google Chrome is This program is available in many
the fastest and most secure web versions for various platforms such
browser for Windows. It supports various as Windows, Linux, Unix, Macintosh etc.
extensions to enhance its functionalities It can be downloaded from its official
according to user preference. It can be website: http://browser.netscape.com.
downloaded from www.google.com website.
Safari Surfing the Web
Surfing the Web means exploring the
It is a web browser developed by Apple
different web pages of one or more websites
incorporation and compatible with
on web browsers. The purpose of surfing can
Mac OSX, Microsoft Windows, and
be anything from getting information or just
iPhone OS. It was first released as a
for the sake of entertainment or grab the
public beta in January 2003. Safari
latest news.
provides good support for latest
technologies like XHTML, CSS2, etc. It can be Different people surf the Internet for various
downloaded from www.apple.com website. purposes and therefore their motive can
vary. But getting information is the most
Internet Explorer common idea behind surfing.
Internet Explorer (IE) is a product of
Microsoft Corporation USA. This is the most Search Engines
commonly used browser in the A search engine is a website that provides
universe. It is based on first web the required data on specific topics. Search
browser software Mosaic. This was engines turn the web into a powerful tool for
developed in 1994 and released in finding information on any topic. When you
1995. It can be easily downloaded from type any term in search bar, then the search
www.microsoft.com website. engine will look for matching websites from
Opera all over the web.
It is a web browser which is available Many search engines also have directories or
in market due to its fast, safe and lists of topics that are organised into
secure browsing. It was initial categories.
released in April 1995. It is available for PCs Browsing these directories, is also a very
and various mobile platforms as opera mini. efficient way to find information on a given
It can be downloaded from www.opera.com. topic.
Introduction to Internet and WWW 117

Popular Search Engines AltaVista


Some of the most popular search engines It was a web search engine
are given below : established in 1995. AltaVista
search engine has a spider called
Google Scooter that traverses the web
This is the world’s most popular search and usenet newsgroups.
engine. It began as a research project in
1997 by Larry Page and Sergey Brin. Dogpile
They developed a search It is one of the search engines,
engine algorithm that which has combined many search
ranked web pages not engines. Dogpile is a search engine
just by content and that fetches results from Google,
keywords, but by how many other web Yahoo!, etc. Dogpile began operation in
November 1996.
pages are linked to each page.
Yahoo! HotBot
This search engine is used to retrieve or index
It is one of the Internet’s leading search
the web documents. This web search engine
engines. It was launched on
currently owned by Lycos and launched in May
2nd March, 1995. Yahoo is
1996 by Hotwired.
also the largest web portal,
providing links to thousands of Searching on Internet
other websites. These links include sites
from the Yahoo! directory as well as news, Searching is characterised as a process in which
stories that are updated several times in user describes a request via a query and the
a day. system must generate information that satisfies
or matches the request. There are numerous
Lycos websites, which provide search facility for
It is a search engine searching the contents on Internet. For instance,
whose database is www.google.com is a website, which provides
very big. It contains search facility. As shown in the figure below, the
more than 66 million search facility remains available in the form of a
pages in its database. text box and a button titled ‘Search’.
It searches information on the basis of To get the information on any desired topic,
subjects. It was established in 1994. execute the following steps :
Lycos is the main search engine that do 1. Enter the search term in text box.
searching on the basis of directories. 2. When you enter the text, a program called
Search Engine will search its information
WebCrawler in database and find the links to the same.
WebCrawler has a powerful search 3. To go to the website that contains the
customisation and a information, click on any desired link of
good selection of site the hit list by mouse.
reviews. It is also called 4. After reaching the website, you can make
web spider or spider. WebCrawler
use of browser’s ‘Back’ button, to get back
It visits websites and reads their pages to the hit list.
and other information in order to create 5. Now, click the mouse on another link to
entries for a search engine index. It was get more information on the same topic but
launched on 20th April, 1994. from another website.
118 Course on Computer Concepts (CCC)

5. By default, web pages are saved in the


document folder. In the Save as type
box, do one of the following :
● Type a new name in the File name box.

● To save all the files associated with

the page, including graphics, frames


and style sheets in their original
format, select Web Page, complete.
● To save all information as a single file,

select Web Archive, single file (*.mht).


● To save just the current HTML page,

without graphics, sounds or other


Downloading the Web Pages files, select Web Page, HTML only.
● To save just the text from the current
Downloading is the process of saving some Web Page, select Text File.
data from Internet to your own computer.
To download or save some web pages in your 6. Click Save button.
computer, follow these steps :
1. Open Internet Explorer by clicking the Printing Web Pages
Start button. You can print an entire web page or its selected
2. Go to the web page that you want to save. part on a printer. To print web pages, using
Internet Explorer, we follow some steps :
1. Open the web page in Internet Explorer
window.
2. To print a web page, go to File menu
then click Print or click Print button on
command bar.
3. A Print dialog box will appear, do
necessary settings like choose the
printers, pages, number of copies, etc.

3. Click the File button and then click Save


As. A Save Web Page dialog box will appear.

4. Click Print button.


5. By this your web page will be printed
on printer.
You can also apply a shortcut key
4. In the Save in area, navigate that folder Ctrl+ P to print pages. After print, it will
where you want to save the Web Page. automatically close the Print dialog box.
Introduction to Internet and WWW 119

Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. The vast network of computers that 10. What is the central device in star
connects millions of people all over the topology?
world is called (a) STP server (b) Hub/Switch
(a) LAN (b) Web (c) PDC (d) Router
(c) HyperText (d) Internet
11. Which of the following topology, is least
2. Two or more computers connected to each affected by addition/removal of a node?
other for sharing information form a (a) Ring (b) Star
(a) network (b) router (c) Bus (d) Net
(c) server (d) tunnel
12. The …… topology simulates hierarchical
3. Computer network is flow of data.
(a) collection of hardware components and (a) Star (b) Ring
computers (c) Tree (d) Mesh
(b) interconnected by communication channels
13. …… allows more devices to be attached
(c) sharing of resources and information
to a single hub.
(d) All of the above (a) Star topology (b) Ring topology
4. The hardwares that are available to a (c) Tree topology (d) Mesh topology
computer on a particular network are 14. It is a network of networks that connects
known as…………. millions of computers.
(a) resources (b) clients
(a) LAN (b) MAN
(b) servers (d) protocols
(c) Internet (d) Network
5. The advantage of a LAN is 15. ARPANET stands for
(a) sharing peripherals
(a) Advance Research Project Agent Networks
(b) backing up your data
(b) Advance Research Project Agency Nodes
(c) saving all your data
(c) Actual Research Project Agency Networks
(d) accessing the web
(d) Advanced Research Projects Agency
6. Cable TV network is an example of Network
(a) LAN (b) MAN (c) WAN (d) PAN
16. The first computer network of the world is
7. Which type of network would use phone (a) iNet (b) NSFnet
lines? (c) ARPANET (d) Vnet
(a) WAN (b) LAN (c) WWAN (d) Wireless
17. The WWW is made up of the set of
8. Geometric arrangement of devices on the interconnected …… that are linked
network is called together over the Internet.
(a) topology (b) protocols (a) Electronic documents
(c) media (d) LAN (b) Web pages
(c) Files
9. Network components are connected to the (d) All of the above
same cable in the …… topology.
(a) Star (b) Ring 18. Web page is created using language
(c) Bus (d) Mesh (b) XML (b) Java (c) C (d) HTML
120 Course on Computer Concepts (CCC)

19. A website is a collection of 29. …… refers to the company that provides


(a) web server (b) web page Internet connections to the users, usually
(c) web browser (d) WWW for a fee.
(a) Broadband connection
20. Browsers are helpful to view
(b) Dial-up connection
(a) home pages (b) web pages
(c) ISP (Internet Service Provider)
(c) index pages (d) personal pages
(d) Wireless connection
21. URL stands for
(a) Uniform Resource Locator 30. Which of the following is not a type of
(b) United Resource Link
broadband Internet connection?
(a) Cable (b) DSL
(c) Unicast Retrieve Location
(c) Dial-up (d) Satellite
(d) Uniform Residence Link

22. ............ is the Web address for a website 31. DSL is an example of which connection?
(a) Network (b) Wireless
or a web page.
(c) Slow (d) Broadband
(a) Domain name
(b) E-mail account 32. Which of the following allows high speed
(c) Home page Internet connections without use of
(d) URL cables or wires?
(a) Wireless Fidelity (Wi-Fi)
23. The basic purpose of URL is to locate
(b) Fiber optic
(a) web server (b) IP address
(c) Cable modem
(c) web page (d) node
(d) Dial-up connection
24. An educational institution would
generally have the following in its 33. Standard straight through cable is used
domain name. for connecting computers with
(a) .org (b) .edu (a) router (b) switch
(c) .inst (d) .com (c) hub (d) All of these

25. Which is not the communication feature 34. ………… is the process of sharing your
of Internet? phone’s mobile data to access the
(a) E-mail (b) Newsgroup Internet on other devices like laptop.
(c) Chat (d) Designing (a) Protocol (b) Tethering
(c) Browser (d) Topology
26. Video conferencing is use for
(a) talking each other 35. A set of rules is called
(b) communicating purpose (a) resource (b) protocol
(c) live conversation (c) server (d) client
(d) All of the above 36. Which protocol allows different
27. .............. includes sharing business computers to communicate by creating a
information, maintaining business network of networks?
relationship and conducting business (a) TCP (b) FTP (c) IP (d) SMTP
transaction by means of tele
communication networks. 37. Which of the following protocol allows
(a) E-commerce delivery of voice communication over IP
(b) E-marketing
network?
(c) E-procurement (a) VoIP (b) FTP (c) TCP/IP (d) PPP
(d) E-business 38. ………… address is a logical numeric
28. Which of the following website is not address that is assigned to every single
used for job search? computer or device.
(a) Monster. com (b) Recruitment. com (a) MAC (b) IP
(c) Naukri.com (d) MySpace (c) IMEI (d) None of these
Introduction to Internet and WWW 121

39. Versions of IP (Internet Protocol) is /are 48. Which of the following is developed by
(a) IPv4 (b) IPv6 Apple incorporation?
(c) Both (a) and (b) (d) None of these (a) Lynx (b) Opera
(c) Safari (d) Mozilla
40. Which of the following is a 6-byte address
that allows NIC to be uniquely identified 49. Which of the following is a text based
on the network? web browser?
(a) MAC (b) IP (a) Opera (b) Lynx
(c) IMEI (d) TCP (c) Safari (d) Mozilla firefox
41. Which command is used to find MAC 50. A website that provides the required data
address of computer? on specific topics
(a) ipconfig/MAC/all (b) ipconfig /all (a) domain (d) e-mail client
(c) ipconfig/mac (d) ipconfig (c) modem (d) search engine
42. Full form of IMEI 51. Which of the following is a search engine?
(a) International Mobile Equipment Identity (a) Macromedia Flash
(b) International Mobile Equipment Identifier. (b) Google
(c) International Mobile Equipment (c) Netscape
Identification (d) Librarian’s index to the index
(d) International Message Equipment Identifier
52. There are numerous websites, which
43. How to find IMEI number on any phone? provide search facility for searching the
(a) *#04# (b) *#06# contents on
(c) *#06#* (d) #06# (a) Internet (b) website
(c) web page (d) LAN
44. A web browser is a software application
for accessing information on the 53. .............. is the process of saving some
(a) WWW (b) website data from Internet to your own computer.
(c) web page (d) URL (a) Conferencing (b) Downloading
(c) Uploading (d) None of these
45. A browser is
(a) the program to connect to Internet 54. By default, web pages are saved in the
(b) the program to create websites ………… folder.
(c) the program used to view sites on web (a) Download (b) Document
(d) All of the above (c) Picture (d) Music

46. Which of the following terms is used as a 55. Which of the following command is used
browser? to print a web page?
(a) Netscape (b) WWW (a) File (b) Edit
(c) Launcher (d) E-mail (c) Both (a) and (b) (d) Insert

47. Which of the following is based on first 56. To print the web pages, which of the
web browser software Mosaic? following shortcut key can be used?
(a) Opera (b) Netscape Navigator (a) Ctrl + P (b) Ctrl + V
(c) Internet Explorer (d) Google Chrome (c) Ctrl + C (d) Ctrl + S
122 Course on Computer Concepts (CCC)

True/False
Identify True /False from the following statements.
57. Networking of computer helps the users 65. Chatting is widely interactive text based
to share data. communication process that takes place
over the Internet.
58. LAN stands for Large Area Network.
66. A browser display a web page, but does
59. Internet uses the communication protocol not interprets its HTML code.
TCP/IP.
67. The process of using browser to view
60. WWW was introduced on 13th March, information on the Internet is known as
1869. surfing.
61. To reload a web page, press Refresh 68. Internet Explorer was developed by
button. Kansas University of USA.
62. The first page of a website is called home 69. The most popular social networking site
page. is Mozilla Firefox.
70. Dogpile is a search engine that fetches
63. Web server is a computer program that
results from Hotbot.
serves requested XML page.
71. Lycos is a famous web browser.
64. Address bar displays the URL of current
web page. 72. Web crawler is also called web spider or
spider.

Answers
1. (d) 2. (a) 3. (d) 4. (a) 5. (a) 6. (b) 7. (a) 8. (a) 9. (c) 10. (b)
11. (b) 12. (c) 13. (c) 14. (c) 15. (d) 16. (c) 17. (b) 18. (d) 19. (b) 20. (b)
21. (a) 22. (d) 23. (b) 24. (b) 25. (d) 26. (d) 27. (a) 28. (d) 29. (c) 30. (c)
31. (d) 32. (a) 33. (d) 34. (b) 35. (b) 36. (c) 37. (a) 38. (b) 39. (c) 40. (a)
41. (b) 42. (a) 43. (b) 44. (a) 45. (d) 46. (a) 47. (c) 48. (c) 49. (b) 50. (d)
51. (b) 52. (a) 53. (b) 54. (b) 55. (a) 56. (a) 57. True 58. False 59. True 60. False
61. True 62. True 63. False 64. True 65. True 66. False 67. True 68. False 69. False 70. False
71. False 72. True
07
E-Mail, Social Networking
and E-Governance Services
E-mails are routed to different E-mail
Objective of the Chapter accounts through E-mail server. E-mail
This chapter includes Structure of E-mail, Using servers accept, forward, deliver and store
E-mails, Social Networking, Introduction to Blogs, messages.
E-Commerce, Netiquettes, E-Governance,
E-mail may be defined as a system of world
Accessing E-Governance Services on Mobile using
UMANG App, Digital Locker. wide electronic communication in which a
computer user can compose a message at one
terminal that can be regenerated at the
Introduction recipient’s terminal when the recipient Login.
E-mail is a method of sending messages, Users can also read their E-mails offline.
data, video, voice and graphics over digital E-mails allow users to communicate with
communication link such as the Internet. each other in less time and at nominal cost
An E-mail message consists of three as compared to traditional phone or mail
components : Message envelope, Message services. There are many software platforms
header and Message body. Social networking available for sending and receiving E-mails.
is the use of internet-based social media
programs to make connections with friends, Advantages of E-Mail
family, classmates, customers and clients. 1. The delivery of messages is very fast.
Social networking can be done for both social 2. The cost of E-mailing is almost free as
and business purposes. E-Governance refers it involves negligible amount of
to the use of information technologies (such as telephone and Internet Service Provider
Internet and mobile computing) by government (ISP) charges.
agencies. 3. Multiple copies of the same message can
These technologies have the ability to be sent to a group of people at the same
transform relations with citizens, business time and can be sent as easily to a
and other arms of government. single person.
4. Pictures, documents and other files can
What is an E-Mail? also be attached to messages.
Sending some messages like letters to other
people through a network is called E-mail. Disadvantages of E-Mail
Electronic mail can be defined as a system 1. Viruses attached with an E-mail could
for sending and receiving messages seriously affect recipient’s computer.
electronically over a computer network. 2. E-mails cannot really be used for official
Today’s E-mail systems are based on a business documents. They may be lost
store-and-forward model. and you cannot find them.
124 Course on Computer Concepts (CCC)

3. E-mails may be intercepted by hackers The content of the E-mail can be varied
as E-mail, before it is delivered to the according to the different E-mail systems
recipient, ‘bounces’ between servers used by each user.
located in different parts of the world.
4. If an E-mail is too long or not drafted E-mail Addressing
properly by the sender, the reader may An E-mail address is composed of two
lose interest to read the mail till the end. separate parts :
1. Your personal identity or account name
Structure of an E-mail (user name) on that mail server.
There is a standard structure of an E-mail 2. The domain name of the mail server
whose parts are described below : computer on which you have an E-mail
1. Header account.
An E-mail address is generally of the form
The E-mail header gives us information about username@domain name. Some examples of
the message such as unique identity of the E-mail address are – arihant@gmail.com,
message. The E-mail header consists of the webmaster@yahoo.com, etc.
following parts :
In E-mail address, symbol ‘@’ is used as an
I. Subject It is a description of the topic
separator. It separates your account name
of the message and displays in most and mail server name.
E-mail systems that list E-mail message
individually. Applications or Using of an
II. Sender (From) This field specifies the
sender’s E-mail address. Usually, it will
E-mail
be the ‘reply to’ address. There are many applications to use of an
E-mail as follows :
III. Date and Time Received (on) This is
the date and time message received. Opening an E-mail Account
IV. Reply to This field describes the E-mail There are various web-portals (websites),
address that will become the recipients which allow you to create free E-mail
of the reply to the particular E-mail. account. e.g. www.gmail.com,
When you reply, it will go to this E-mail www.yahoo.com, www.hotmail.com,
address despite the sender E-mail www.rediffmail.com, www.msn.com, etc.
address. Some steps for opening an E-mail account are
V. Recipient (To) This is the first/last as follows :
name of E-mail recipient as configured 1. Enter the URL address as www.gmail.
by the sender. com. Gmail Homepage will appear.
VI. Recipient E-mail Address The E-mail
address of the recipient is specified here.
VII. Attachments Some E-mails could be
attached with files such as text, image,
audio, video etc. These files are
specified here.
2. Body
The actual content is stored in this part.
This will be in the format of text. This field
could also include signatures or text
generated automatically by the sender’s
E-mail system.
E-Mail, Social Networking and E-Governance Services 125

2. Click on Create an account hyperlink. Viewing an E-mail


The Registration Form will appear.
After the creation of an E-mail account, the
user can Sign in, means that user can open
his/her E-mail account and view his/her
mails. Enter your E-mail ID in E-mail text
box and password in the Password text box of
that E-mail ID. Click on Sign in button.
If your E-mail ID and password are correct
then the E-mail account of the user will open
E-mail Account Window.
Usually, the contents of Inbox folder will
display first which means that the list of
received mails will appear. These mails show
the date, sender’s name, subject information
of the received mails. To read a message just
3. Fill those details which are mandatory. bring the cursor on that message and click
You can also skip some of the personal there when the mouse pointer will convert
details. into hand sign.
4. After completing the registration form,
click on Next step button. Mailbox : Inbox and Outbox
A mailbox is the storage location of electronic
5. Create your public Google+ profile page
mail messages that is found on a remote
will appear. If you want to create a
server. Software E-mail commonly divide the
profile, click on Create your profile
mailbox into separate folders, notably the
button otherwise click on No thanks
inbox, outbox, sent items, deleted items, etc.
button.
Inbox A place where E-mail messages are
6. After the creation of an E-mail account,
received. The inbox is the default location for
the confirmation information will be all incoming mails unless rules have been
given to the user and the following web setup to forward messages to another
page will display on the browser. program or folder.
Outbox A term used to describe the location
or folder where E-mail is stored before being
sent. It gives the opportunity to the user to
review, edit and delete messages before they
are sent.
Drafts The drafts folder contains items that
have not yet been sent. An E-mail is saved to
the drafts folder when a user composes an
E-mail and then click the Save and Close
button.
Sent Items This folder contains all
items that have been sent but not deleted.
It saves all the messages that were
E-mail Account Window successfully sent.
126 Course on Computer Concepts (CCC)

Delete Items When an E-mail is deleted, it ● Bcc (Blind carbon copy) This is Cc, except
is automatically sent to the trash. Items in that the recipient does not see the list of
your Trash will remain there for people in the Bcc field.
approximately 30 days before it is ● Signature This is one of the basic elements
automatically emptied and permanently of an E-mail message. By this, you are often
deleted. able to set a signature, meaning a few lines
of text which will be added to the end of the
Creating and Sending a New document.
E-mail
After login, if a user wants to create an
Replying to an E-mail Message
E-mail click on COMPOSE button and New For replying to an E-mail message, follow
Message window will display on the screen. these steps :
1. Open the E-mail which you have to answer.
2. Click on Reply option.
3. Click on Reply to all option for answering
the all recipients of To and Cc boxes.
Forwarding an E-mail Message
To forward an E-mail message, follow these
steps :
1. Open the E-mail which a user wants to
forward.
2. Click on Forward option.
3. Enter the names of the recipients in To,
In this window, To text box carries the Cc and Bcc boxes.
E-mail address of the recipient, Subject 4. Click on Send button.
carries the heading for E-mail or subject of
the E-mail and the whole body of text Forward is used to send a copy of received
matter comes within the Body option. E-mail to someone else.
For sending an E-mail, click on Send Searching E-mails
button. E-mail delivers to the recipient’s end To search an E-mail, follow these steps :
instantly. 1. Firstly, enter the sender’s name, subject
Instead of this, if a user wants to send a file of the E-mail, etc on the top of the text
(.doc, .pdf, .jpg, etc.) then click on Attach box for that E-mail which a user wants to
files for the attachment of files. search.
There are various options which are 2. Click on Search button.
accessible within an E-mail like Text 3. After this, the list of the E-mails will
Formatting, Cc (Carbon Copy), Bcc (Blind display according to the searching action.
Carbon Copy) etc.
Sending Documents by E-mail/
Some of these are as follows :
● Cc (Carbon copy) This allows an E-mail
Attaching Files with E-mail
The files which are stored in computer can be
to be send to a large number of people by
sent through E-mail. With the help of Attach
writing their respective addresses
files option in New Message window, user can
separated by commas.
send .doc, .pdf and .jpg file.
E-Mail, Social Networking and E-Governance Services 127

To send a soft copy in the form of E-mail Signature


attachment, follow these steps :
An E-mail signature is a block of text
1. Click on COMPOSE button on Gmail appended to the end of an E-mail message
account window. New Message box will which often contains the sender’s name and
display on the screen. contact information. Use this space to share
2. Type the E-mail address of the recipient essential contact information and to advertise
in To: line or you can also select E-mail your business in a condensed form. To setup a
address from your address book. signature automatically added to e-mails you
3. Type the subject of the E-mail in the compose in Gmail follow below steps :
subject line. 1. Click the Settings in your Gmail toolbar.
2. Select Settings from the menu.
3. Go to General tab.
4. Under Signature block, type the desired
signature in the text field.

Attach files button 5. Click on Save Changes.

Social Networking
E-mail Message Window Social network is a way of making internet
based connections. People use social
4. To attach any soft copy, click on Attach networking sites to connect with their family,
files button ( ) and the Open dialog box friends, colleagues etc. Using these sites, they
will display on the screen. can share their information and ideas with
5. Select the file which you want to attach. the persons they want to connect.
After selecting the file, click on Open Through the social networking, we come to
button. know what is happening in all around the
world and we also can give our reaction
about it.

How Social Networks


can be Used Appropriately?
Social networking is something which we do
on daily basis. So, we should know the
appropriate use of social network so that we
can utilise it in best possible manner.
1. Always use appropriate language on
social network, because it will help you
to create good social image.
2. Think before posting on social
networking site because the activities
you perform on social networking site
6. When the file gets attached to E-mail,
create your digital foot print on web.
click on Send button.
128 Course on Computer Concepts (CCC)

3. On social media, you can follow the Instagram


person you admire. You can keep an It is a free, online photo sharing application
eye on their activities. and social network platform that was acquired
by Facebook in 2012. Instagram allows users to
Common Social Networking edit and upload photos and short videos
Sites through a mobile app.
Some common social networking sites are Users can add a caption to each of their posts
mentioned below : and use hashtages and location based geotags
to index these posts and make them searchable
LinkedIn by other users within the app.
It is founded by Reid Hoffman in 2002.
LinkedIn is an American site which
provides business and employment oriented
Instant Messaging
services. Instant Messaging (IM) is an Internet service
that allows people to communicate with each
LinkedIn is a platform that allows business
other in real time through an instant
people and professionals all over the world,
messaging software. Unlike E-mail, instant
regardless of their industry, to connect with
messaging allows message from one person to
other professionals.
appear right away on the other person’s
It’s great for meeting customers, getting in computer screen right after the send button is
touch with vendors, recruiting new pressed.
employees and keeping up with the latest in
Instant Messaging allows effective and efficient
business or industry news.
communication, allowing immediate receipt of
Facebook acknowledgement or reply. However, IM is
It is an American social networking which basically not necessarily supported by
was founded in 2004 by Mark Zuckerberg. transaction control.
Facebook is a social networking site which Many instant messaging services offer video
user uses to connect with their family, calling features, voice over IP and web
friends and one they know or want to know. conferencing services. Web conferencing service
Now a days, facebook is very popular can integrate both video calling and instant
among the people. messaging abilities.
Facebook allows you to upload photos and
maintain photo albums that can be shared
Common Instant Messaging
with your friends. It supports interactive Software
online chat and the ability to comment on Some common instant messaging softwares are
your friends’s profile pages to keep in touch. as follows :
Twitter WhatsApp
It is an American company which provides It was founded in 2009 by Brian Acton and Jan
social networking services besides this Koum former employees of Yahoo. WhatsApp
Twitter also provides online news. Twitter messenger is a cross platform instant
was founded in 2006 by Jack Dorsey, Noah messaging application that allows iPhone,
Glass, Biz Stone and Evan Williams. It BlackBerry, Android, Windows phone and
enables the user to send and read short 140 Nokia smartphone users to exchange text,
characters messages called tweets. image, video and audio messages for free. It is
especially popular with end users who do not
Registered users can read and post tweets
have unlimited text messaging. In addition to
while those who are not registered can only
basic messaging, WhatsApp provides group
read them.
chat and location sharing options.
E-Mail, Social Networking and E-Governance Services 129

Facebook Messenger Creating a Blog Account


It is an instant messaging feature built in WordPress
into Facebook that orignially launched in WordPress is a free personal publishing
2011. Facebook messenger is a mobile app platform. It is an easy to use, fast and flexible
that enables chat, voice and video blog script. It comes with a great set of features,
communications between the social media designed to make your experience as a
site’s web based messaging and publisher as pleasant as possible. The steps to
smartphone. create a Blog Account in WordPress are as
Telegram follows :
It is an online messaging app that works 1. Open a web browser e.g. Mozilla Firefox,
just like popular messaging apps Google Chrome etc., for creating a blog
WhatsApp and Facebook Messenger. This account.
means that you can use it to send 2. Type the URL www.wordpress.com in the
messages to your friends when connected address bar and press Enter key.
to Wi-Fi or your mobile data. 3. Now, click on Sign Up button and after
Telegram is cloud based and claims that is this, a page will appear.
prioritises security and speed, making it a
good alternative to other popular
messaging apps.
The service launched in 2013 and since
then it has reached 200 million active
monthly users.

Introduction to Blogs
A blog is a website or a web page, in which
an individual records opinion links to other
sites on regular basis. A blog content is
written frequently and added in a
chronological order. It is written online
and visible to everyone.
4. Above page shows different fields such as
A typical blog combines text, images and E-mail Address, Username, Password etc.
links to other blogs, web pages and other
● E-mail Address WordPress will sent an
media related to its topic. In education,
blogs can be used as instructional activation link to your E-mail id after
resources. These blogs are referred to as clicking on Create Blog button. So,
edublogs. The entries of blog are also provide a valid E-mail address.
● Username This name will manage your
known as posts.
blog.
A person who writes a blog or a weblog is
● Password You must use strong
known as blogger. Blogging is the act of
posting content on a blog. There are some password for securing purpose. You can
popular websites which offer blog service use uppercase and lowercase letter with
as follows : numbers and special symbols.
● Blog Address This address is used by
● Joomla ● WordPress.com

● Drupal ● Blogger
viewer to view your blog.
● Language Here, you can choose language
● Tumblr ● Weebly
in which you want to write a blog.
130 Course on Computer Concepts (CCC)

5. Click on Create Blog button. Common B2C E-Business models include


6. Now, you will get an activation link on E-Ships and E-mails. An example of a B2C
your E-mail account. Open your E-mail transaction would be a person buying a pair
and check to WordPress E-mail. of shoes from a retailer.
7. Open that E-mail and click on Confirm The transactions that led to the shoes being
Now link, your blog will be activated. available for purchase, which is the purchase
of the leather, laces, rubber etc. However, the
8. After activating the blog, WordPress
sale of the shoes from the shoemaker to the
Blog Account will appear on your
retailer would be considered a (B2C)
screen.
transaction.

E-Commerce Consumer-to-Business (C2B)


E-Commerce (Electronic Commerce or EC) is It applies to any consumer that sells a
the buying and selling of goods and services product or service to a business over the
on the Internet. Internet. One example of this E-Business
model is Priceline.com where customers set
E-Commerce draws on technologies such as
their prices for items such as airline tickets
mobile commerce, electronic funds transfer,
or hotel rooms and sellers decide whether
supply chain management, Internet
to supply them. The demand for C2B
marketing, online transaction processing,
E-Business will increase over the next few
electronic data interchange, inventory
years due to customer’s desire for greater
management systems and automated data
convenience at lower price.
collection systems. There is no special
software to install other than a web browser Consumer-to-Consumer (C2C)
and many banks do not charge for this
It involves the electronically facilitated
service.
transactions between consumers through
third party. A common example is the online
Types of E-Commerce auction, in which consumer posts an item for
E-Commerce business models can generally a sell and other consumer id to purchase it, a
be categorised into the following categories as third party generally charges a commission.
follows: E-Bay is the most successful C2C online
auction website.
Business-to-Business (B2B)
It applies to businesses buying from and Business-to-Government (B2G)
selling to each other over the Internet. Online B2G model is a variant of B2B model. Such
access of data, including expected shipping websites are used by governments to trade
date, delivery date and shipping status, and exchange information with various
provided either by the seller or a third party business organisations. Such websites are
provider is widely supported by B2B models. accredited by the government and provide a
It describes transactions between businesses, medium to businesses to submit application
such as a business between a manufacturer forms to the government.
and a wholesaler, or between a wholesaler
and a retailer.
Government-to-Business (G2B)
Governments use G2B model websites to
Business-to-Consumer (B2C) approach business organisations. Such
It describes activities of business serving and websites support auctions, tenders and
consumers with products and services. application submission functionalities.
E-Mail, Social Networking and E-Governance Services 131

Netiquettes Scope of E-Governance


The word netiquette is a combination of net Scope of E-Governance can be described as
(from Internet) and etiquette. It means below :
respecting other users, views and displaying 1. Government-to-Citizen (G2C) This
common etiquette when posting your views to relation is the most important aspect
online discussion groups. The need of of E-Governance. This relationship
netiquette arises mostly while sending or also describes facilities or services
distributing E-mail posting on usenet groups or provided by the government to citizen
chatting. like post, medical, education
It is short for ‘Internet etiquette’. Etiquette is a registration, passport etc.
code of polite behaviour in society, netiquette is 2. Government-to-Business (G2B)
a code of good behaviour on the Internet. This This relation tells all aspect of
includes several aspects of the Internet, such Government to business.
as E-mail, social media, online chat, web Business/corporate sectors pay taxes
forums, website comments and other types of to the government. These payments
online communication. Below are the rules to involve Information and
follow for good netiquette : Communication Technology (ICT). ICT
● Avoid posting inflammatory or offensive reduces time, cost and physically
comments online. activities to pay taxes and also helps
● Respect other’s privacy by not sharing in cross checking the funds.
personal information, photos or videos that
another person may not want published Benefits of E-Governance
online. The anticipated benefits of E-Governance
● Never spam others by sending large amounts include :
of unsolicited E-mail. ● It greatly simplifies the process of

● Do not troll people in web forums or website information accumulation for citizens and
comments by repeatedly nagging or annoying businesses.
them. ● It empowers people to gather information

● Do not use offensive language. regarding any department of government


● Do not trust others when you are new.
and get involved in the process of decision
making.
● Avoid replying to negative comments with
● E-Governance strengthens the very fabric
more negative comments.
of democracy by ensuring greater citizen
● Stick to the topic when posting in online
participation at all levels of governance.
forums or when commenting on photos or ● E-Governance leads to automation of
videos, such as Youtube or Facebook
services, ensuring that information
comments.
regarding every work of public welfare is
easily available to all citizens,
E-Governance eliminating corruption.
It refers to the use by government agencies of
information technologies (such as Internet and E-Governance in Railway
mobile computing) that have the ability to Reservation
transform relations with citizens, businesses An E-Ticket ( Electronic Ticket) is the
and other arms of government. Through digital ticket equivalent of a paper ticket.
E-Governance, government services are made IRCTC (Indian Railway Catering and
available to citizens in a convenient, efficient Tourism Corporation) is used to book and
and transparent manner. cancel rail tickets.
132 Course on Computer Concepts (CCC)

The ministry of railway has setup the IRCTC 6. Individual Registration page will appear,
for transferring all responsibility for tourism
and catering to this new corporation. This
has been done to ensure professionalism and
upgradation of service through private–public
collaborations.
To book the ticket on IRCTC, follow the given
steps :
1. Open the IRCTC site by www.irctc.co.in
address. The home page of IRCTC will
appear on the screen.

2. Enter in From and To fields, class type


and click on Find Trains option.
3. Search the train and click on Check
Availability and Fare to find the
availability of train and book now.
4. The following page will display.
7. Now, fill the details and click on
Register button.
8. After this, a window will appear as
shown below.

5. If you have an account on IRCTC, then


enter User Name and Password 9. Enter the required fields and click on
otherwise click on REGISTER button. Continue Booking.
E-Mail, Social Networking and E-Governance Services 133

10. Travelling Passengers page will be date of birth, the date of issue, date of expiry,
appear as shown below. passport number, photo and signature.
Follow the below steps to apply for passport
online:
1. Go to the Passport Seva Website and
click on Register now.

2. Login to the Passport Seva Online


Portal with the registration login id.
3. Click Apply for Fresh Passport/ Re-issue
of Passport link.
4. Fill in the required details in the form
11. Click on Continue Booking. Payment and submit.
options page will be display on the 5. Click the Pay and Schedule
screen. Select the appropriate option Appointment link on the view
and enter details. saved/submitted applications screen to
12. Payment Page will be appear as shown schedule an appointment.
below. 6. Online payment can be made using any
one of the following modes
● Credit card/Debit card

● Internet banking

● SBI bank challan

7. Click the ‘Print Application Receipt’ link


to print the application receipt
containing Application Reference
Number/Appointment Number.
8. Visit the Passport Seva Kendra (PSK)/
Regional Passport Office (RPO) where
appointment has been booked, along
with original documents.
13. Now, fill your bank details and click on
Proceed button. E-Hospital (ORS)
14. E-Ticket will be generated on screen as Online Registration System (ORS) is an
well as sent to your registered E-mail online portal where citizens having Aadhaar
ID. can enrol for appointments in hospitals
across various states and Union Territories of
Passport India. Through this service, getting an OPD
A passport is a travel document issued by a appointment, lab reports and blood
country ’s government to its citizens that availability in any government hospital has
verifies the identity and nationality of become online and easy.
the holder for the purpose of international ORS is one of the Digital India program
travel. launched by the Prime Minister Narendra
Passports are small booklets that typically Modi out of the 13 launches made at the
contain the bearer’s name, place of birth, Digital India Week.
134 Course on Computer Concepts (CCC)

As of September 2016, 46 hospitals covering The application will enable users to access
478 departments are providing this service. e-Government services from the central
government, the state government, local
bodies and their agencies.
UMANG App Key Features
UMANG App key features are as follows :
● It brings together all government
departments and their services on a single
platform to provide better and easier
E-Hospital (ORS) services to citizens.
● It provides seamless integration with
How to Book an Appointment Using
other digital India services like Aadhaar,
E-Hospital Portal? Digilocker, PayGov, etc.
1. The portal helps in booking ● It is designed to enable citizens to

appointments through online mode in discover, download, access and use all
different hospitals across various government services easily.
departments. One can book an ● It supports Aadhaar based and other
appointment.
authentication mechanisms for service
2. By using e-Know Your Customer (eKYC) access.
data of Aadhaar number, if the patient’s ● The sensitive profile data is saved in

mobile number is registered with the encrypted format and no one can view this
Unique Indentification Authority of information.
India (UIDAI).
3. If the mobile number of the patient is not How to use UMANG App?
registered with UIDAI, the portal uses Follow the below steps to use UMANG App
patient’s name. on your mobile :
4. Any new patient who is enrolling for the 1. Download UMANG App from Google
first time in the portal will get a Unique Play Store or Apple App Store.
Health Identification (UHID) number. 2. Create your profile by providing
5. In case if the Aadhaar number is already personal details such as name, mobile
linked with UHID number, then a new number, age, etc. There is also an
appointment number will be generated option to upload a profile photo.
and the UHID number will remain the 3. You can also link your Aadhaar
same. number to the app and other social
media accounts.
Accessing E-Governance Services 4. After profile creation, you can log in
on Mobile Using UMANG App and go to the sort and filter section to
Unified Mobile Application for New-age browse through the services and
Governance (UMANG) has been developed by categories.
National e-Governance Division (NeGD) and 5. Go to the search option to look for
Ministry of Electronics and Information particular services.
Technology (Meity) with the aim of driving
mobile governance in India. UMANG app is a Digital Locker/DigiLocker
unified application that can be used to avail a Prime Minister Narendra Modi on 1st July,
number of pan India e-Government Services 2015 launched digital locker facility to help
such as filing income tax, making Aadhaar citizens to digitally store their important
and provident fund queries, booking a gas documents like PAN card, passport, mark
cylinder, passport seva, among others. sheets and degree certificates.
E-Mail, Social Networking and E-Governance Services 135

With the help of this portal, the sharing of the How to use DigiLocker?
e-documents will be done through registered To use DigiLocker, follow the below steps :
repositories thereby ensuring the authenticity of
the documents online. 1. Go to DigiLocker website or
download DigiLocker app on your
On the other hand, organisations like the CBSE, phone. Using Aadhaar number and
Registrar office or Income Tax department can mobile number. You can create a
also push electronic copies of documents and user ID using an OTP. (One Time
certificates directly into your E-lockers.
Password)
2. If some organisation has
uploadedany of your e-document, you
can see it in the account. You can
also upload your own documents and
e-sign.
3. You also get the facility of sharing
documents with others by sharing a
Digilocker link to the e-document.

Model Questions
Multiple Choice Questions
Select the appropriate answer from choices given below.
1. Sending some messages like letter to 6. In E-mail, …… gives us information
other people through a network is called about the message such as unique
(a) E-mail (b) FTP identity of the message.
(c) Browsing (d) None of these (a) Subject (b) Header
(c) Body (d) Attachment
2. E-mails are routed to different E-mail
accounts through 7. Which of following is not an example of
(a) web server (b) E-mail server E-mail account?
(c) browser (d) None of these (a) www. gmail.com (b) www. msn.com
(c) www. yahoo.com (d) www. altavista. com
3. ............. attached with an E-mail could
seriously affect your computer. 8. The contents of ............. will display first
(a) Message (b) Virus which means that the list of received
(c) Worm (d) Trojan horse mails will appear.
(a) Inbox folder
4. An E-mail address is made up of ………
(b) Outbox folder
parts joined by an ‘@’ sign.
(c) Sent items folder
(a) Two (b) Three
(d) Delete items folder
(c) Four (d) None of these
5. Which of the following domain is used for 9. Your half finished messages are stored in
non-profit organisation? (a) Inbox (b) Outbox
(c) Drafts (d) None of these
(a) .com (b) .edu (c) .mil (d) .org
136 Course on Computer Concepts (CCC)

10. Which of the following folders are used to 21. WhatsApp was founded in 2009 by
keep E-mail messages sent but not deleted? (a) Mark Zuckerberg
(a) Inbox (b) Outbox (b) Steve Jobs
(c) Sent Items (d) Deleted (c) Brian Acton and Jan Kaum
11. Which of the following is one of the basic (d) Mark Zuckerberg and Steve Jobs
elements of an E-mail message? 22. Which instant messenger is cloud based
(a) Header (b) Message and claims that is prioritises security and
(c) Footer (d) Signature speed?
12. If user wants to reply to all the recipients (a) Telegram (b) Facebook
then he will click on (c) WhatsApp (d) Twitter
(a) Reply (b) All Reply 23. A/An …… is a website in which an
(c) Reply to all (d) None of these individual records opinion links to other
13. Which button (followed by Send) is used sites on regular basis.
to send a copy of received E-mail to (a) Blog (b) Message
someone else? (c) Memo (d) Advice
(a) Forward (b) Reply (c) Back (d) Reply All 24. A person who writes a blog or a weblog is
14. An E-mail …… is a block of text known as …… .
appended to the end of an E-mail (a) Blogs (b) Blogger
message which often contains the (c) Messenger (d) Writer
sender’s name and contact information. 25. Which of the following is a website which
(a) Header (b) Signature offer blog service?
(c) Attachment (d) Body (a) Joomla (b) WordPress
15. Which of the following is a way of (c) Drupal (d) All of these
making Internet based connections? 26. It is a buying and selling of goods and
(a) E-Commerce (b) Blog services on the Internet.
(c) E-Governance (d) Social Network (a) E-Commerce (b) E-Business
16. Which of the following is not a social (c) E-Governance (d) E-Service
networking site? 27. Which of the following describes
(a) Facebook (b) LinkedIn activities of business serving and
(c) Instagram (d) Telegram consumers with products and services?
17. Twitter enables user to send and read (a) C2B (b) B2B
short messages called …… . (c) B2C (d) C2C
(a) Tweets (b) Blogs (c) Messages (d) Posts 28. Rules of behaviour to be followed on
18. Which social networking site provides Internet communication are called
business and employment oriented (a) Netiquette (b) Protocol
services? (c) Regulation (d) None of these
(a) Facebook (b) Twitter 29. Netiquette is short for
(c) LinkedIn (d) Instagram (a) Net etiquette (b) Internet etiquette
19. Which social networking site was (c) Etiquette (d) None of these
acquired by Facebook in 2012? 30. E-Governance simplifies the process of
(a) Instagram (b) LinkedIn information accumulation for citizens and
(c) Youtube (d) Telegram (a) business (b) government
20. Which type of messaging is a software utility (c) schools (d) private offices
that connects users through Internet? 31. Government to citizen relationship is the
(a) Fast messaging (b) Instant messaging most important aspect of
(c) Immediate messaging (a) E-Commerce (b) E-Business
(d) Instant accessing (c) E-Governance (d) E-Citizen
E-Mail, Social Networking and E-Governance Services 137

32. Which of the following is a travel 34. Which App has been developed by NeGD
document issued by a country’s and Meity with the aim of driving mobile
government to its citizens? governance in India?
(a) Passport (a) UMANG (b) BHIM
(b) Aadhaar card (c) DigiLocker (d) All of these
(c) PAN card
35. Who launched digital locker facility to
(d) None of these
help citizens?
33. E-Hospital is also known as (a) Home Minister (b) Chief Minister
(a) Electronic Hospital (c) Health Minister (d) Prime Minister
(b) Digital Hospital 36. Which App is used to digitally store their
(c) Online Registration System (ORS) important documents like PAN card,
(d) Outpatient Department Passport etc.?
(a) DigiLocker (b) BHIM
(c) UMANG (d) PhonePe

True/False
Identify True/False from the following statements.
37. E-mail is a method of sending messages, 47. To specify multiple recipients of Carbon
data, video, voice and graphic. copy of same mail message, Cc: field is
used.
38. We can read our e-mails offline.
48. Always use appropriate language on
39. E-mail messages are usually addressed social network.
and delivered to only one or two people.
49. Instagram does not allow users to edit
40. In an E-mail address, the characters and upload photos.
following ‘@’ sign represents the name of
domain. 50. The entries of blog are also known as
posts.
41. The two parts of E-mail address is
separated by @. 51. WordPress is a free personal publishing
platform.
42. We can open our free E-mail accounts on
some web portals. 52. Do not reply to strangers is one of the
rules for Internet etiquettes.
43. A mailbox is the storage location of
electronic mail messages. 53. G2C relationship also describes
facilities provided by the government
44. All incoming E-mail messages are to be to citizens.
stored in the Outbox folder.
54. E-Hospital program is launched by Chief
45. An E-mail is deleted, it is automatically Minister.
sent to the Recycle Bin.
55. One popular chat service is known as
46. Type the subject of the E-mail in the Internet relational.
subject line.

Answers
1. (a) 2. (b) 3. (b) 4. (a) 5. (d) 6. (b) 7. (d) 8. (a) 9. (c) 10. (c)
11. (d) 12. (c) 13. (a) 14. (b) 15. (d) 16. (d) 17. (a) 18. (c) 19. (a) 20. (b)
21. (c) 22. (a) 23. (a) 24. (b) 25. (d) 26. (a) 27. (c) 28. (a) 29. (b) 30. (a)
31. (c) 32. (a) 33. (c) 34. (a) 35. (d) 36. (a) 37. True 38. True 39. False 40. True
41. True 42. True 43. True 44. False 45. False 46. True 47. True 48. True 49. False 50. True
51. True 52. True 53. True 54. False 55. False
138 Course on Computer Concepts (CCC)

08
Digital Financial Tools
and Applications
OTPs minimize the risk of fraudulent
Objective of the Chapter login attempts and thus the risk of stolen
This chapter includes Digital Financial Tools, Card data.
(Credit/Debit), eWallet, PoS, Internet Banking, Online OTP works through randomness algorithms
Bill Payment etc.
that generate a new and random password
each time they are used.

Introduction How to get a One Time Password?


A new era of financial system in India was When an unauthenticated user attempts to
started after independence. In this era, access a system or perform a transaction on a
efforts were made to improve methodology device, an authentication manager on the
and responsibilities of financial system for network server generates a number or shared
financial tools. Financial tools are term used secret, using one time password algorithms.
to describe organizations that deal with the The same number and algorithm are used by
management of money. the security token on the smart card or
Financial tools are generally not limited to device to match and validate the one time
the field of deposit-taking loan and investment password and user.
services, but also present in the fields of Many companies use Short Message Service
insurance, agency services and all forms of (SMS) to provide a temporary passcode via
financial intermediation including the text for a second authentication factor.
distribution of financial products.
QR (Quick Response) Code
OTP (One Time Password) A QR code is a type of two-dimensional bar
OTP is a string of characters or numbers code that is used to provide easy access to
automatically generated to be used for one information through a smartphone. It refers
single login attempt. OTP can be sent to the to the instant access to the information
user’s phone via SMS or push messaging and hidden in the code. QR codes are gaining
is used to protect web based service, private popularity because the technology is open
credentials and data. source i.e available for everyone.
Digital Financial Tools and Applications 139

QR code consists of black squares arranged in Such is not the case with UPI. Here, you can
a square grid on a white background. It can be simply transfer money anytime anywhere
read by an imaging device such as camera, without adding any beneficiary or bank details.
and processed using Reed-Solomon error
correction until the image can be appropriately How to Register for UPI?
interpreted. Steps to registration for UPI are as follows :
1. Download the BHIM (Bharat Interface for
Money) app/ bank’s app/ third party apps.
2. Create your profile by adding details such
as name, password, UPI Pin etc.
3. Link the bank account with the VPA
(Virtual Payment Address) to complete
the registration process.
Types of QR Code
There are two types of QR code as follows :
How to Generate UPI Pin?
● Static QR Code These codes are most
Steps to generate UPI Pin, are as follows :
common type of QR code which are used 1. Select the bank account in the app from
to disseminate information to the general which you want to carry out transactions.
public. They are often displayed in 2. Once you select the bank account, you
advertising materials in the environment, on will be asked to generate your UPI Pin.
television, in newspapers and magazines. 3. An OTP will be sent to your registered
● Dynamic QR Code These codes are
mobile number with the bank account.
sometimes referred to as unique QR codes that 4. Enter this OTP to generate your UPI Pin.
offer more functionality. The owner can edit
5. Create your 6 or 4 digits UPI Pin which
the code at anytime and can target a specific
will be required for making all
individual for personalized marketing.
transactions.
UPI (Unified Payment Interface) Benefits of UPI
UPI is a digital mode that helps you transfer Benefits of UPI for Customers
funds from one bank to another without using ● Transfer can be made instantly by it.
any account number, bank name, account type ● It is easy to use.
and IFSC code. It facilitates users to access ● It requires single click authentication.
multiple bank accounts with a single mobile
application. It combines merchant payments,
● It highly secured as no account detail is
numerous banking features and seamless fund shared.
routing to be accessed from a single place. Benefits of UPI for Banks
It eliminates the need to enter bank details ● It is safe and secure transaction system.
or other sensitive information each time a ● It requires single click with two factors
customer initiates a transaction. authentication.
UPI has been launched by the National ● Use of the existing infrastructure ensures
Payments Corporation of India also known as no additional cost is incurred by the bank.
NPCI. In conjunction with the Reserve Bank of
India and Indian Banks’ Association, NPCI Benefits of UPI for Merchants
has framed this network. It is similar in ● It provides instant receipt of fund.
mechanisms like the RuPay system through ● For this, there is no need for sharing bank
which debit and credit cards function. details.
If you want to transfer funds using Internet ● It is suitable for E-Commerce platforms.
banking then in most cases, the bank takes some ● CoD (Cash on Delivery) collection is made
time to update the new beneficiary details. easy with UPI payment.
140 Course on Computer Concepts (CCC)

How to Perform a UPI Transaction? Benefits of AEPS


Steps to transfer money using UPI are as The benefits associated with AEPS are :
follows : ● There is no requirement of a signature on

1. Open the UPI based app on your your debit card.


smartphone. ● It is safe and secure payment method.

2. Select the transfer/send money option. ● It is easy to use.

3. Enter the account details/mobile number. ● It increases the reach to rural areas as

4. Enter the amount to be transfer and enter banking executives.


the UPI Pin to confirm the payment. ● With AEPS, the only information required

5. Money will transferred instantly and to initiate a transaction is Aadhaar number


confirmation message is sent to the and biometric information.
user’s mobile number.
How to Use AEPS?
Steps to do bill payment using UPI are as Steps to use AEPS are as follows :
follows :
1. Go to a Micro-ATM or banking
1. Once logged into your UPI based app. correspondent.
2. You will have to add a bill details to 2. Provide Aadhaar number and bank name.
avail the service
3. Choose the type of transaction you want
3. Enter the amount that you have to pay to make.
the bill for.
4. Provide verification through fingerprint/
4. Enter the UPI Pin to make the payment. iris scan.
5. Your payment will be credited to the 5. Collect your receipt.
biller instantly.
USSD (Unstructured Supplementary
AEPS (Aadhaar Enabled Payment Service Data)
System) It is a communication protocol available on
AEPS is a type of payment system that is every GSM enabled mobile device. It is a
based on the Unique Identification Number session based text communication without
and allows Aadhaar Card holders to store and forward mechanism (unlike SMS)
seamlessly make financial transactions that is practical for interactive communication,
through Aadhaar based authentication. such as banking or education.
It helps all individuals carry out financial
USSD messages can have upto 182
transactions on a Micro-ATM. It helps in
alphanumeric characters and the time it
empowering all sections of the society by
takes from a request to a response is 2
making financial and banking services
seconds while it takes 6 seconds for an SMS
available through Aadhaar.
to reach a mobile phone.
This is simple, secure and user-friendly
USSD is characterised by short and combined
platform for financial transactions. This is
alphanumeric (#, 1-9 and *) codes that are
another initiative taken by the National
used by the mobile network. Its good example
Payments Corporation of India (NPCI) to
is to check your mobile prepaid balance or to
encourage cashless transactions in India.
initiate a mobile top-up using a USSD
Services offered by AEPS voucher code.
● Cash deposit and withdrawal To use USSD mobile banking, users will have
● Payment transaction ● Balance enquiry to simply dial * 99 # and use the interactive
● Fund transfer menu. There are many banks in India that
● Obtain a mini statement are currently providing the * 99 # service.
Digital Financial Tools and Applications 141

How to Send Money Using USSD *99#? Types of Credit Card


Follow the below steps to send money using There are four main types of credit card as
USSD *99 # are as follows : follows :
1. Dial *99# using registered mobile Reward Credit Card
number with bank account.
This type of credit card earns rewards on
2. The interface will appear and you can purchases. Some cards will pay out at a flat
type 3 letters of your bank short name rate of 1%–2%, while others will give an
or first 4 letters of bank, IFSC or 2 extra bonus in predetermined spending
digits bank numeric code and proceed to categories.
click Send.
3. Now, choose number ‘3’ to send money Low Interest Credit Card
and proceed key in payee/beneficiary These cards are best if you carry some credit
mobile number. card debt month to month. Depending on
your financial situation, you can choose a
4. Proceed to key in the beneficiary/payee card with a reliably low ongoing interest rate
MMID, transaction amount. or one that has no interest for an
5. Key in MPIN and last 4 digits of your introductory period.
bank account number.
Balance Transfer Credit Card
Information/Details Required These cards are meant for those who already
for USSD Fund Transfer have a lot of credit card debt. They allow you
● MMID ● MPIN
to shift your debt from your current card to a
new one and give you a period of 6-21 months
● Registered mobile number
to pay it off interest free. There is usually a
Features of USSD *99# Service one time balance transfer fee, though, of,
upto 5%.
● It is easy to use.
● It is works on all GSM handsets. Secured Credit Card
● It is highly secure interface. This type of card may be a good credit
building option for those with no credit
● It is works without data connection on a
history or poor credit.
basic phone.
Under this secured arrangement, the
Services offered by USSD cardholder agrees to deposit a certain amount
● Change MPIN ● Generate OTP onto the card before they start using it and
● Know MMID ● Funds transfer they can’t charge beyond that amount.
Because this reduces risk for the card issuing
● Balance enquiry ● Mini statement
bank as they can collect an up-front deposit
in case the cardholder can’t repay, secured
Credit Card cards are the easiest to be approved for.
It is a thin rectangular slab of plastic issued
by a financial company, that lets cardholders Debit Card
borrow funds with which to pay for goods and
It is a payment card that deducts money
services. Credit cards impose the condition
directly from a consumer’s account to pay for
that cardholders pay back the borrowed
a purchase. Debit cards eliminate the need to
money plus interest as well as any additional
carry cash to make purchases. In addition,
agreed upon charges.
debit cards, also called check cards, offer the
A credit card owner can borrow money from convenience of credit cards and many of the
the issuer of the credit card and will not have same consumer protections when issued by
to pay interest if the borrowed amount is major payment processors like Visa or
repaid within 30 days. Master Card.
142 Course on Computer Concepts (CCC)

Types of Debit Card Benefits of eWallet


There are following types of debit card as follows : ● It helps to reduce fraud. Mobile Wallets use
Online Debit Card random payment codes that cannot be used
again.
Online debit cards need electronic
authorization, every time a transaction is ● Pay quickly by eWallet. It can save time.
reflected in the user’s account. The ● It can trim wallet contents.
transaction of an online debit card is further ● Cash back or rewards facilities available
secured with a personal identification under eWallet.
number (PIN) verification system for added
safety. The PIN has to be validated during How Mobile Wallets Work?
each and every transaction. Steps showing how work mobile wallet app in
your mobile phone are :
Offline Debit Card
1. Download the Mobile Wallet app (or it may
This generally includes the logos of major
be already built into your mobile device).
cards such as Visa or Master Card. This type
of card requires the cardholder’s signature for 2. Add your credit card or debit card
validation during each and every transaction. information to the Mobile Wallet.
Offline debit cards usually have a daily limit 3. When you check out a participating
restricted to the value of transactions. merchants, access the Mobile Wallet
and choose your card.
Prepaid Debit Card
4. If you’re making an in-store purchase, just
These cards are also referred to as reloadable
hold your mobile device at the terminal.
debit cards. To use this type of debit card, the
user has to pay the entire amount in advance Mobile Wallet Security
and later use the money according to his/her
Before using a Mobile Wallet service, security
discretion.
measures provided by the wallet provides to
help protect card information should be
eWallet checked.
eWallet (Mobile Wallet) is a type of prepaid
account in which a user can store his/her With some mobile wallets your full card
money for any future online transaction. An number is not visible to merchants when you
eWallet is protected with a password. With make a purchase. Some Mobile Wallets also
the help of an eWallet, one can make have a way to disable the service if your card
payments for groceries, online purchases and or mobile device is lost or stolen.
flight tickets among others. An eWallet needs Types of eWallet
to be linked with the individual’s bank
There are various types of eWallet as follows :
account to make payments. The main
objective of eWallet is to make paperless Paytm Wallet
money transaction easier. Paytm is India’s largest mobile commerce
platform launched in 2010. Paytm Wallet,
eWallet Transaction Process because of its amazing marketing and
eWallet do not all have the same transactions operation strategies, has been able to capture
process. The process that each wallet uses, maximum market share of this industry.
depends on the software that makes its function.
The wallet can be used to sent money directly
With some eWallets, you have to insert your to bank accounts as well.
password to confirm a transaction.
Paytm is the first company in India to receive
While other eWallets, may give the user a a license from the Reserve Bank of India
unique identification code for each transaction. (RBI) to start a payment bank.
Digital Financial Tools and Applications 143

Freecharge Wallet SBI Buddy


This service was launched in September, SBI had launched the Mobile Wallet Buddy
2015 and has ever since introduced many in August 2015, in 13 different languages in
attractive features. This will enable all collaboration with Master Card. It is a digital
customers to send and receive funds through platform by which customers can simply send
the UPI system. Freecharge UPI will allow or ask money from any of their contacts even
users to initiate fund transfers instantly on a if they do not have an SBI account.
24/7 basis on all 365 days in a year, including
PayZapp
bank holidays.
PayZapp offered by HDFC bank is an ideal
Mobikwik mobile payment wallet. With PayZapp, you
It is a digital wallet that can be used for a can shop on your mobile at partner apps, bus
number of online payments including and movie tickets, groceries, book flight
transferring money, accepting payments, tickets and hotels, pay bills and recharge
mobile recharge, payment of utility bills, such your mobile.
as electricity, DTH, online shopping etc. With the HDFC PayZapp eWallet app,
Mobikwik has received an approval from the customers do not need to depend on card
Reserve Bank of India (RBI) and has tied up based transactions and can enjoy secure and
with a number of retails and online convenient payments.
merchants in the country.
PhonePe Wallet
Oxigen Mobile Wallet It provides an online payment system based
It is a digital wallet service through which an Unified Payments Interface (UPI), which
users can avail all the services offered by is a new process in electronic funds transfer
Oxigen. It is an application based service that launched by National Payments Corporation
can be used on all types of smartphones such of India (NPCI).
as Android, Windows and IOs. Oxigen wallet Using PhonePe, users can send and receive
is a semi-closed wallet as per RBI guidelines. money, recharge mobile, data cards, buy gold
You can transfer funds from your wallet to and shop online and offline.
your bank account.
Airtel Money PoS (Point of Sale)
Airtel money is the Mobile Wallet from the The Point of Sale (PoS) or Point of Purchase
successful and popular telecom company (PoP) is the time and place where a retail
Airtel. It allows you to use your smartphone transaction is completed.
as an electronic wallet to make and receive At the Point of Sale, the merchant would
payments. Originally launched in 2012, this calculate the amount owed by the customers
app offers customers with an efficient and indicate the amount. He may prepare an
alternative to cash transactions. invoice for the customer (which may be a
cash register printout), and indicate the
Citrus Wallet options for the customer to make payment.
It is an app that lets you send money to and PoS is also the point at which a customer
receive from anyone who has a phone number makes a payment to the merchant in
or E-mail. It lets your transfer money to exchange for goods or after provision of a
friends, colleagues and family members service.
within seconds.
The PoS transaction is completed by online
You can split canteen, movie, travel and payment gateways. The online payments are
party bills with ease. You can even see all enabled through own payment gateways or
your past transactions and keep a track of third party service providers called
your spending patterns. intermediaries.
144 Course on Computer Concepts (CCC)

PoS System Requirements Internet Banking Access


● PC or Laptop with standard human In this banking, customers access his/her
interface devices account from a browser that runs internet
— Keyboard banking programs resident on the bank’s
— Mouse World Wide Web (WWW) server.
— Monitor It provides an array of services including
● Browser: Current version functional budgeting and forecasting tools,
financial planning capabilities, investment
● USB port (for barcode scanner) analysis tools, loan calculators and equity
● LPT or USB port (for printer) trading platforms.
Types of PoS System Online accounts are easy to arrange and
They are generally classified into three require lesser information than a traditional
types as : bank account. Internet provides a variety of
attractive possibilities for remote account
Mobile PoS access, including
It is also known as mPoS that uses an ● World wide connectivity.

electronic device such as smartphone, tablet ● Availability of enquiry and transaction


or another mobile device as a terminal at service around the clock.
which you can attach a credit card reader.
● Easy access to transaction data, both recent
mPoS systems are used to process payments
and historical.
and may have other capabilities such as
● Direct customer control of international
inventory management.
movement of fund without intermediation
Terminal PoS of financial institution.
It is a software/hardware based system that
carries add-on peripherals such as barcode
scanners, credit card readers, receipt printers Password Security
and cash drawers.
Password security is must for Internet
Cloud PoS banking. After receiving password, do
It is an online or web based PoS which can change it and memorise it otherwise
be easily used with your existing hardware account may be misused by someone.
such as a computer, tablet and printer.
A cloud PoS system is installed in data
centers that are maintained by the PoS NEFT
vendor. (National Electronic Funds Transfer)
It is a nation wide system that facilitates
Internet Banking individuals, firms and corporates to
Internet banking allows the user to conduct electronically transfer funds from any bank
financial transactions via the internet. It is branch to any individual, firm or corporate
also known as online banking or web banking. having an account with any other bank
An Internet bank will offer customers just branch in the country.
about every service that is traditionally This retail funds transfer system started in
available through a local branch. November, 2005.
Through Internet banking, basic banking Such individuals who do not have a bank
transactions such as paying bills and account (walk-in customers) can also deposit
transferring funds between accounts can cash at the NEFT enabled branches with
easily be performed by the consumers. instructions to transfer funds using NEFT.
Digital Financial Tools and Applications 145

Pre-requisites for Originating to 6 PM for customer transactions and 7 AM


a NEFT Transaction to 7:45 PM for interbank transactions.
Following are the pre-requisites for putting IMPS (Immediate Payment Service)
through a fund transfer transaction using
IMPS is an instant interbank electronic fund
NEFT :
transfer service through mobile phones. The
● Originating and destination bank branches
major feature of IMPS is that it is available
must be part of the NEFT network. at all times for usage. It transfer funds
● Beneficiary name, account number, account
instantly and is a great banking platform in
type, name and IFSC of the beneficiary case of emergencies. Its service is available
bank branch, all the details of the 24×7, throughout the year including sundays
beneficiary, should be available with and any bank holidays.
remitter.
National Payments Corporation of India
● Some banks provide the facility to
(NPCI) is responsible for managing the IMPS
automatically pop-up the IFSC details for fund transfer mechanism.
net banking customers with destination
bank and branch. This mechanism is regulated by Reserve
Bank of India. One can define IMPS as an
Limits of the Fund Transfer by NEFT immediate, interbank real time fund transfer
There is no maximum limit of fund transfer mechanism enabled through electronic
through the NEFT. There is no minimum means.
limit of fund transfer also through the
NEFT. You can transfer any amount. The
Limits of the Fund Transfer by IMPS
timing of NEFT is from 8 AM to 7 PM Transaction charges of this platform are also
(Working days). very nominal and the transfer limit is also
considerable, approximately ` 2 lakhs per
RTGS (Real Time Gross Settlement) day.
RTGS system is a fund transfer mechanism
that transfer of money from one bank to Online Bill Payment
another on a ‘real time’ and on ‘gross basis’. Online bill payment system is an internet
Settlement in ‘real time’ means payment based method of processing economic
transaction is not subject to any waiting transactions. It allows a vendor to accept
period. The transactions are settled as soon payments over the web or over other internet
as they are processed. ‘Gross settlement’ connections such as direct database
means the transaction is settled on one to one connections between retail stores and their
basis without bunching with any other suppliers.
transactions. Online payment systems typically are run by
The RTGS system is primarily meant for third party corporations, such as PayPal,
large value transactions. This is the fastest Google, Click2Pay, etc.
possible money transfer system through the Online bill pay helps you organize bills and
banking channel. keep track of due dates. You can easily see
where your money is going, so you can make
Limits of the Fund Transfer by RTGS sure you have enough funds available to
There is a minimum limit of ` 2 lakhs for cover each payment. You receive and pay
RTGS transactions and there is no maximum your bills all through your bank-one list, in
limit as such. Timing of RTGS is from 7 AM one place.
146 Course on Computer Concepts (CCC)

Model Questions
Multiple Choice Questions
Select the appropriate answer from the choices given below.

1. ...... is a term used to describe 9. How many digits are there to set UPI Pin?
organizations that deal with the (a) 3 (b) 7 (c) 5 (d) 6
management of money.
10. Which of the following is a type of
(a) Financial tool (b) Economic tool
payment system that is based on the
(c) Financial product (d) None of these
Unique Identification Number?
2. Which of the following is a string of (a) USSD (b) AEPS
characters or numbers automatically (c) PoS (d) QR code
generated for single login attempt?
11. AEPS is another initiative taken by the
(a) Password (b) OTP
……… to encourage cashless transactions
(c) QR code (d) USSD code
in India.
3. Many companies use ………… to provide (a) NPCI (b) RBI
temporary passcode. (c) ICICI (d) HDFC
(a) Email (b) SMS
12. Which services are offered by AEPS?
(c) Phone Calls (d) None of these (a) Cash deposit
4. Which of the following refers to the (b) Payment transaction
instant access to the information hidden (c) Balance enquiry
in the code? (d) All of the above
(a) OTP (b) USSD code
13. ...... is a communication protocol available
(c) QR code (d) UPI
an every GSM enabled mobile device.
5. Which type of QR code is displayed in (a) USSD (b) AEPS
advertisting materials, on television and (c) UPI (d) NEFT
in newspapers?
14. To use USSD mobile banking, users will
(a) Static QR code (b) Dynamic QR code
have to simply dial ...... .
(c) Both (a) and (b) (d) None of these
(a) *99*# (b) *99 #
6. Which QR code can be edit at any time (c) *# 99 # (d) *999*#
by owner?
15. Which information/details are required
(a) Static QR code
for USSD fund transfer?
(b) Dynamic QR code
(a) MMID
(c) Automatic QR code
(b) MPIN
(d) Perfect QR code
(c) Registered mobile number
7. UPI has been launched by (d) All of the above
(a) RBI (b) IFSC
16. For this card, cardholders borrow funds
(c) USSD (d) NPCI
with which to pay for goods and services.
8. Which of the following is a system that (a) Credit Card (b) Debit Card
facilitates users to access multiple bank (c) ATM Card (d) None of these
accounts with a single mobile
17. Which Credit Cards are meant for those
application?
who already have a lot of credit card dept?
(a) UPI (b) AEPS
(a) Balance transfer (b) Secured
(c) USSD (d) OTP
(c) Low interest (d) Reward
Digital Financial Tools and Applications 147

18. Which of the following is/are type of 27. Which type of PoS is a software/
Credit Card? hardware based system that carries
(a) Reward (b) Low interest add-on peripherals?
(c) Secured (d) All of these (a) Terminal (b) Cloud
(c) Mobile (d) None of these
19. Debit Cards are also known as
(a) Credit Cards 28. Internet banking is also known as
(b) RuPay Cards (a) online banking (b) web banking
(c) Check Cards (c) Both (a) and (b) (d) None of these
(d) Shopping Cards 29. What is the meaning of N in NEFT?
20. ......... cards need electronic authorization, (a) Net (b) New
every time a transaction is reflected in (c) National (d) Next
the user’s account. 30. The timing of NEFT is from
(a) Online debit (b) Offline debit
(a) 9 AM to 6 PM (b) 9 AM to 7 PM
(c) Prepaid debit (d) All of these
(c) 10 AM to 8 PM (d) 8 AM to 7 PM
21. eWallet is also known as ………… 31. What is the meaning of T in RTGS?
protected with a password. (a) Time (b) Text
(a) Pocket wallet (b) Mobile wallet
(c) Term (d) Transfer
(c) Prepaid wallet (d) None of these
32. The minimum amount to be remitted
22. Which of the following facilities available through RTGS is
under eWallet?
(a) ` 1 lakh (b) ` 1.5 lakhs
(a) Cash back (b) Rewards
(c) ` 2 lakhs (d) ` 2.5 lakhs
(c) Both (a) and (b) (d) None of these
33. Which internet banking service is
23. Which eWallet is the first company in
India to receive a license from RBI to available 24×7 throughout the year?
start a payment bank? (a) RTGS (b) IMPS
(a) Freecharge (b) Mobikwik (c) NEFT (d) None of these
(c) Airtel Money (d) Paytm 34. In IMPS, the transfer limit is also
24. Which bank offered the eWallet app considerable approximately………per day.
PayZapp? (a) ` 50,000 (b) ` 1, 00, 000
(a) ICICI (b) HDFC (c) ` 1, 50, 000 (d) ` 2, 00, 000
(c) SBI (d) PNB 35. ...... is an internet based method of
25. ………… provides an online payment processing economic transactions.
system based on Unified Payments (a) Online bill payment
Interface (UPI). (b) eWallet
(a) PayZapp (b) PhonePe (c) USSD
(c) SBI Buddy (d) Citrus (d) All of the above
26. Which of the following is the time and place 36. Online payment systems typically are
where a retail transaction is completed? run by third party corporations such as
(a) Credit Card (b) Debit Card (a) PayPal (b) Google
(c) PoS (d) eWallet (c) Click2Pay (d) All of these
148 Course on Computer Concepts (CCC)

True/False
Identify True/False from the following statements.
37. A new era of financial system in India 45. Offline debit cards usually have a daily
was started after independence. limit restriced to the value of
38. OTP cannot be sent to the user’s phone transactions.
via SMS. 46. Mobile wallets are essentially digital
39. OTP works through randomness versions of traditional wallet.
algorithms that generate a new and 47. Airtel Money Wallet launched in 13
random password. different languages in collaboration with
40. Static QR codes are used to disseminate Master Card.
information to the general public. 48. Mobile PoS is also known as mPoS.
41. Using UPI, single click with single factor 49. There is no maximum and no
authentication is done. minimum limit of fund transfer
42. USSD helps all individuals carry out through the NEFT.
financial transactions on a Micro-ATM. 50. Timing of IMPS is from 9 AM to
43. Only SBI bank in India that is currently 4:30 PM.
providing the *99 # service. 51. RTGS mechanism is regulated by
44. Credit cardholder will not have to pay Reserve Bank of India.
interest if the borrowed amount is repaid 52. Online bill pay helps you organize bills
within 30 days. and keep track of due dates.

Answers
1. (a) 2. (b) 3. (b) 4. (c) 5. (a) 6. (b) 7. (d) 8. (a) 9. (d) 10. (b)
11. (a) 12. (d) 13. (a) 14. (b) 15. (d) 16. (a) 17. (a) 18. (d) 19. (c) 20. (a)
21. (b) 22. (c) 23. (d) 24. (b) 25. (b) 26. (c) 27. (a) 28. (c) 29. (c) 30. (d)
31. (a) 32. (c) 33. (b) 34. (d) 35. (a) 36. (d) 37. True 38. False 39. True 40. True
41. False 42. False 43. False 44. True 45. True 46. True 47. False 48. True 49. True 50. False
51. False 52. True
09
Overview of FutureSkills
and Cyber Security
journey by choosing job role and skills that
Objective of the Chapter interest you.
This chapter includes Internet of Things, Big Data Learner can either take a course and get
Analytics, Cloud Computing, Virtual Reality, Artificial certified through the hundreds of course
Intelligence, Social & Mobile, Blockchain available or follow some learning pathway
Technology, 3D Printing, Robotics Process created by the subject matter experts. The
Automation, Cyber Security, etc.
learning goals can be edited anytime you
want to ensure that the skills you have
Introduction to FutureSkills chosen, always interest you.
FutureSkills is meant for IT professionals The platform has the optional ability to
which will help them to upgrade their skills. award skill coins, which can be used for
With the increase use of technologies, there is course available on FutureSkills market
a need to realign the approaches of the place. FutureSkills is a simple yet powerful
industry. platform which can go a long way in future
proofing your career.
This platform will ensure that all the needs
are fulfilled. As the work of engineers already
involves the use of technology to a large Introduction to Internet
extent, the tech industry in particular, will of Things (IoT)
need to strategically implement FutureSkills IoT is a network in which all physical objects
which will help to adapt these changes.
are connected to the Internet through
How FutureSkills Work? network devices and exchange data. IoT
allows objects to be controlled remotely across
Journey of a person in the field of
existing network infrastructure. The goal of
FutureSkills begins as a learner by exploring
IoT is to extend to Internet connectivity from
the platform where he can search for
technologies, job roles yourself. He can follow standard devices like computer, mobile, tablet
technology to get daily learning insights. to relatively dumb devices like a toaster.
The contents are arranged to show a Advancements in medicine, power, gene
description of that job role through a job role therapies, agriculture, smart cities and smart
card and the skills required for the job role. homes are few examples where IoT is
There is an option to personalise learning strongly established.
150 Course on Computer Concepts (CCC)

Components of IoT 3. Improved Customer Engagement IoT


allows you to improve customer
There are four fundamental components of
experience by detecting problems and
IoT system as follows :
improving the process.
1. Sensors/Devices Sensors or devices are
4. Improved Data Collection Traditional
key components that help you to collect
data collection has its limitations and
live data from the surrounding
its design for passive use.
environment. All this data may have
various levels of complexities. It could
be a simple temperature monitoring
Disadvantages of IoT
sensor or it may be in the form of the There are following disadvantages of IoT as
video feed. follows :
2. Connectivity All the collected data is 1. Security As the IoT systems are
sent to a cloud infrastructure. The interconnected and communicate over
sensors should be connected to the cloud networks, the system offers little control
using various media of communication. despite any security measures. It can
These communication media include lead the various kinds of network
Mobile or Satellite networks, Bluetooth, attacks.
Wi-Fi, WAN, etc. 2. Privacy Even without the active
3. Data Processing Once the data is participation of the user, IoT system
collected and it gets to the cloud, the provides substantial personal data in
software performs processing on the maximum detail.
gathered data. This process can be just 3. Complexity The designing, developing,
checking the temperature, reading on maintaining and enabling the large
devices like AC or heaters. However, it technology to IoT system is quite
can sometimes also be very complex like complicated.
identifying objects using computer
vision on video. Big Data Analytics
4. User Interface The information made It is the process of collecting, organizing and
available to the end user in some ways. analysing large sets of data to discover
This can achieve by triggering alarms patterns and other useful information.
on their phones or notifying through Big data analytics can help organizations to
text or E-mails. Also, a user sometimes better understand the information contained
might also have an interface through within the data and will also help identify
which they can actively check in on the data that is most important to the
their IoT system. business and future business decisions.
Advantages of IoT Characteristics of Big Data
There are following advantages of IoT as Characteristics of big data are as follows :
follows :
1. Variety Variety of big data refers to
1. Technical Optimization IoT structured, unstructured and
technology helps a lot in improving semi-structured data, i.e. gathered from
technologies and making them better. multiple sources. While in the past,
2. Reduce Waste IoT offers real time data could only be collected from
information leading to effective spreadsheets and databases, today data
decision-making and management of comes in an array of forms such as
resources. E-mails, PDFs, Photos, etc.
Overview of FutureSkills and Cyber Security 151

2. Velocity It essentially refers to the


speed at which data is being created in
Servers
real-time.
In a broader prospect, it comprises the Applications
rate of change and linking of incoming Laptops Desktop

data sets at varying speeds.


Monitoring Carbonation
3. Volume Big data indicates huge Content Communication Finance
volumes of data that is being Platform
generated on a daily basis from various
Identity
sources like social media platforms, Object Runtime
Queue
Database
business processes, machines, storage
Infrastructure
networks, etc.
Compute Network
Applications of Big Data Phones
Block
Storage Tablet

Many applications of big data are as Cloud Computing


follows :
It entrusts services with a user’s data,
1. Government When government
software and computation over a network. It
agencies are harnessing and applying
has considerable overlap with Software as a
analytics to their big data, they have Service (SaaS).
improvised a lot in terms of managing
utilities, running agencies, dealing Essential Characteristics
with traffic congestion or preventing
the crimes.
of Cloud Computing
Some essential characteristics of cloud
2. Healthcare Big data had already
computing are as follows :
started to create a huge difference in
the healthcare sector. With the help of 1. On Demand Self Services Computer
predictive analytics, medical services such as E-mail, applications,
professionals can now able to provide network or server service can be
provided without requiring human
personalized healthcare services to
interaction with each service provider.
individual patient.
2. Broad Network Access Cloud
3. Banking The banking sector relies on
capabilities are available over the
big data for fraud detection. Big data network and accessed through standard
tools can efficiently detect fraudulent mechanisms that promote use by
acts in real time such as misuse of heterogeneous thin or thick client
credit/debit cards etc. platforms such as mobile phones,
4. Manufacturing Using big data laptops, PDAs, etc.
manufacturing industry can improve 3. Resource Pooling The provider’s
product quality and output while computing resources are pooled together
minimizing waste. to serve multiple consumers using
multiple-tenant model with different
Cloud Computing physical and virtual resources
It provides computing and storage capacity dynamically assigned and reassigned
according to consumer demand.
services to heterogeneous community of end
recipients. 4. Rapid Elasticity Cloud services can be
rapidly and elastically provisioned, in
The name comes from the use of clouds as some cases automatically, to quickly
an abstraction for the complex infrastructure scale IN/OUT and rapidly released to
it contains in system diagrams. quickly scale In.
152 Course on Computer Concepts (CCC)

5. Measured Service Cloud computing 2. Software as a Service (SaaS) It is a


resource usage can be measured, method for delivering software
controlled and reported providing applications over the Internet as per the
transparency for both the provider and demand and on a subscription basis.
consumer of the utilised service. Most common examples of SaaS are
6. Multi Tenacity It refers to the need MicrosoftOffice 360, Oracle CRM,
for policy-driven enforcement, Marketo, etc.
segmentation, isolation, governance, 3. Platform as a Service (PaaS) It refers
service levels and chargeback/billing to the supply an on-demand
models for different consumer environment for developing, testing,
constituencies. delivering and managing software
applications. Some key players offering
Types of Cloud Deployments PaaS are Bluemix, CloudBees,
There are three types of cloud deployments Salesforce.com, etc.
categorized based on an organization’s ability
to manage and secure assets as follows : Applications of Cloud Computing
1. Public Cloud These are managed by The applications of cloud computing are
third party which provides cloud limitless. With the right middleware,
services over the Internet to public. a cloud computing system could execute
They offer solutions for minimizing IT all the programs a normal computer
infrastructure costs and act as a good could run.
option for handling peak loads on the Potentially, everything from generic word
local infrastructure. A public cloud is processing software to customized computer
meant to serve multiple users, not a programs designed for a specific company
single customer. could work on a cloud computing system.
2. Private Cloud These are distributed There are some applications of cloud
systems that work on a private computing as follows :
infrastructure and providing the users 1. Clients would be able to access their
with dynamic provisioning of computing applications and data from anywhere at
resources. any time.
3. Hybrid Cloud It is a heterogeneous 2. It could bring hardware costs down. You
distributed system resulted by would not need a large hard drive
combining facilities of public cloud and because you’d store all your information
private cloud. For this reason, they are on a remote computer.
also called heterogeneous clouds. 3. Corporations that rely on computers
have to make sure they have the right
Cloud Computing Services software in place to achieve goals. Cloud
The most common and widely used cloud computing systems give these
computing services are : organisations company-wide access to
1. Infrastructure as a Service (IaaS) It is computer applications.
a cloud computing model where
The companies do not have to buy a set
virtualized infrastructure is offered to
of software or software licenses for
and managed for business by external
every employee.
cloud providers. Some examples of the
wide usage of IaaS are automated, Instead, the company could pay a
policy-driven operations such as backup, metered fee to a cloud computing
recovery, etc. company.
Overview of FutureSkills and Cyber Security 153

4. Servers and digital storage devices take virtual models to prepare them for
up space. Some companies rent physical working on a real body. Virtual reality
space to store servers and databases can also be used as a treatment for
because they do not have it available on mental health issues.
site. Cloud computing gives these 3. In Education Virtual reality has been
companies the option for storing data on adopted in education too. It improves
someone else’s hardware, removing the teaching and learning. With virtual
need for physical space on the front end. reality, a large group of students can
5. Corporations might save money on IT interact with one another within a
support. Streamlined hardware would, three-dimensional environment.
in theory, have fewer problems than a 4. In Engineering and Architecture
network of heterogeneous machines and Virtual reality plays a major role in
operating systems. simulating three-dimensional models of
infrastructures, designs which can
Virtual Reality provide a real-life experience of the
Virtual Reality is a computer interface which physical designs or infrastructures
tries to mimic real world beyond the flat before hand. This helps in reducing
monitor to give an immersive 3D visual considerable costs and expenses which
experiences. It is an artificial environment can be incurred in a prototype.
that is created with software and presented 5. In Entertainment Virtual reality is
to the user in such a way that the user being used in the entertainment
suspends belief and accepts it as a real industry to boost experiences with 360
environment. On a computer, virtural reality films and increase emotional connection
is primarily experienced through two of the with them and/or the characters.
five senses i.e., sight and sound. 6. In Business Virtual reality has also been
Virtual Reality (VR) technology is applied to adopted in business. It is now being used
advance fields of medicine, engineering, for virtual tours of a business
education, design, training and environment, training of new employees
entertainment. and this also gives new employees a 360
degree view of every product.
Applications of Virtual Reality
Virtual reality is one of the offshoots of Artificial Intelligence
mobile technology and it has impacted on Artificial Intelligence (AI) is an area of
human lives in many ways. There are several computer science that emphasizes the
applications of virtual reality technology in creation of intelligent machines that work
human lives some of them are discussed and react like humans.
below : The term may also be applied to any machine
1. In Gaming Virtual technology’s devices that exhibits traits associated with a human
are used for virtual gaming experiences. mind such as learning and problem-solving.
Along with this, devices such as Wi-Fi
Knowledge engineering is a core part of AI
Remote, PlayStation Move/Eye, Kinect
research. Machines can often act and react
are based on virtual reality which
like humans only if they have abundant
track and send input of the players
information relating to the world. Artificial
to the game.
intelligence must have access to objects,
2. In Healthcare Healthcare is one of the categories, properties and relations between
applications where virtual reality could all of them to implement knowledge
have the most significant impact. engineering.
Healthcare professionals can now use
154 Course on Computer Concepts (CCC)

Types of Artificial Intelligence 5. In Autonomous Vehicles Just like


humans, self driving cars need to
Artificial intelligence can be categorized into
have sensors to understand the world
two parts, which as follows :
around them and a brain to collect,
1. Weak AI It embodies a system designed processes and choose specific actions
to carry out one particular job. Weak AI based on information gathered.
systems include video games such as Autonomous vehicles are with advanced
the chess and personal assistants such tool to gather information, including
as Amazon’s Alexa. long range radar, cameras and LIDAR
2. Strong AI These systems are systems (Light Detection and Ranging).
that carry on the tasks considered to be 6. In Social Media In social media
human like. These tend to be more platforms like facebook, AI is used for
complex and complicated systems. face verification wherein machine
These kinds of systems can be found in learning and deep learning concepts are
applications like self-driving cars or in used to detect facial features and tag
hospital operating rooms. your friends.
Applications of Artificial
Intelligence Social Media
Social media is computer based technology
There are some applications of artificial
that facilitates the sharing of ideas,
intelligence as follows :
thoughts and information through the
1. In Business Robotic process automation building of virtual networks and
is being applied to highly repetitive communities. By design, social media is
tasks normally performed by humans. internet based and gives users quick
Machine learning algorithms are being electronic communication of content.
integrated into analytics and CRM
(Customer Relationship Management) Social media originated as a way to interact
platforms to uncover information on with friends and family but was later adopted
how to better serve customers. by businesses which wanted to take
advantages of a popular new communication
2. In Gaming Over the past few years,
method to reach out to customers. There are
AI has become an integral part of the
some popular social media tools and
gaming industry. In fact, one of the
platforms as follows :
biggest accomplishment of AI is in the
● Facebook It is a popular free social
gaming industry.
3. In Healthcare Companies are applying networking website that allows users to
create their profiles, upload photos and
machine learning to make better and
videos, send messages, etc.
faster diagnoses than humans. One of the
● Twitter It is a free microblogging service
best known technologies is IBM’s Watson.
It understands natural language and can that allows registered members to
respond to questions asked it. broadcast short posts called tweets.
● Pinterest It is a social curation website for
4. In Banking A lot of banks have
already adopted AI-based systems sharing and categorizing images found
to provide customer support, detect online.
anomalies and credit card frauds. Pinterest requires brief descriptions but the
AI solutions can be used to enhance main focus of the site is visual. Clicking on
security across a number of business an image will take you to the original
sector, including retail and finance. source.
Overview of FutureSkills and Cyber Security 155

● LinkedIn It is a social media designed Advantages of Blockchain


specifically for the business community.
The goal of the site is to allow registered Technology
members to establish and document There are some advantages of blockchain
networks of people they know and trust technology as follows :
professionally. 1. It allows smart devices to speak to each
other better and faster.
Blockchain Technology 2. It allows the removal of intermediaries
The blockchain is an encrypted, distributed that are involved in record keeping and
database that records data. It is a digital transfer of assets.
ledger of any transactions, contracts that 3. It provides durability, reliability and
need to be independently recorded. In longevity with decentralized network.
financial sector, with blockchain technology 4. The data that are entered in blockchain
the participants can interact directly and can based systems are immutable which
make transactions across the Internet without prevents against fraud through
the interference of a third party. manipulating transactions and the
With all the fraud resistant features, the history of data.
blockchain technology holds the potential to 5. It brings everyone to the highest degree
revolutionize various business sectors and of accountability.
make processes smarter, secure, transparent,
and more efficient compared to the traditional Challenges of Blockchain
business processes. Technology
How Blockchains Work? 1. To verify all the transactions huge
power, i.e. electricity is required.
When a new transaction or an edit to an
existing transaction comes into a blockchain, 2. Blocks in a chain must be verified by
generally a majority of the nodes within a the distributed network and it can take
blockchain implementation must execute time. So, transaction speed can be an
algorithms to evaluate and verify the history issue.
of the individual blockchain block that is
proposed. 3D Printing/Additive
If a majority of the nodes come to a consensus Manufacturing
that the history and signature is valid, the 3D printing is a manufacturing process
new block of transactions is accepted into the where a 3D printer creates three-dimensional
ledger and a new block is added to the chain objects by depositing materials layer by layer
of transactions. If a majority does not concede in accordance to the object’s 3D digital
to the addition or modification of the ledger model.
entry, it is denied and not added to the chain.
It uses data Computer Aided Design (CAD)
This distributed consensus model is what software or 3D object scanners to direct
allows blockchain to run as a distributed hardware to deposit material, layer upon
ledger without the need for some central, layer, in precise geometric shapes. As its
unifying authority saying that transactions name implies, additive manufacturing adds
are valid and which ones are not. material to create an object.
156 Course on Computer Concepts (CCC)

How does 3D Printing Work? Robotic process automation does not involve
any form of physical robots. Software robots
Here are the steps taken in creating a 3D object :
mimic human activities by interacting with
1. Produce a 3D model using CAD or applications in the same way that a person
equivalent 3D design software. does. Robotic process automation enables
2. Convert the drawing to the STL business professionals to easily configure
(Standard Tessellation Language) file software robots to automate repetitive,
format, which is a format developed for routine work between multiple systems,
3D printers. filling in automation gaps to improve
3. Transfer the STL file to the computer business processes.
that controls the 3D printer. From
there, you can specify the size and Business Benefits of RPA
orientation for printing. Some business benefits of RPA are as follows :
4. Prepare for a new print job based on the 1. Increased Accuracy Robots are
requirements of the 3D printer you are extremely accurate and consistent, they
using. This may include refilling are much less prone to make mistakes
whichever additive you are using to or typo than a human worker.
make your object. 2. No Interruption of Work Operations
5. Begin the building process. Since, each can be performed 24/7 as software
layer is usually about 0.1 mm thick, robots can work tirelessly and
this can take anywhere from hours to autonomously without requiring staff to
days to complete depending on the manually trigger bots to initiate
object’s size. business processes.
6. Remove the object from the printer and 3. Low Technical Barriers Programming
avoid any contact with toxins or hot skills are not necessary to configure a
surfaces. software robot. As a primarily code-free
7. Perform any post-processing needed, technology, any non-technical staff can
which may involve brushing off residue use a drag and drop process designer to
or washing the object. set up a robot.
8. Use your new printed object. 4. Increased Productivity Process cycle
times are more efficient and can be
Examples of 3D Printing completed at a faster speed compared to
● Architectural scale model and maquettes manual processes.
● Eyewear 5. Meet Regulatory Compliance
● Dental products Standards Robots only follow the
● Design (lamps, furniture, etc) instructions they have been configured
● Reconstructing bones and body parts in to follow and provide an audit trail
forensic pathology. history for each step.
● Reconstructing heavily damaged evidence
retrieved from a crime scene.
Applications of RPA
Some applications of RPA are as follows :
Robotics Process Automation 1. Customer Service RPA can help
companies offer better customer service
(RPA) by automating contact center tasks,
RPA is the use of specialized computer including verifying E-signatures,
programs, known as software robots, to uploading scanned documents and
automate and standardize repeatable verifying information for automatic
business processes. approvals or rejections.
Overview of FutureSkills and Cyber Security 157

2. Healthcare Medical organizations can These objectives are as follows :


use RPA for handling patient records,
claims, customer support, account Confidentiality
management, billing, reporting and It refers to protecting information from being
analytics. accessed by unauthorized parties. In other
3. Supply Chain Management RPA can words, only the people who are authorized to
be used for procurement, automating do so can gain access to sensitive data.
order processing and payments, A failure to maintain confidentiality means
monitoring inventory levels and that someone who should not have access has
tracking shipments. managed to get it, through intentional
4. Human Resources RPA can automate behavior or by accident.
HR tasks, including onboarding and off Integrity
boarding, updating employee
information and timesheet submission It refers to ensuring the authenticity of
processes. information that is not altered and source of
the information is genuine.
5. Financial Services Companies in the
financial services industry can use RPA Sensitive data should not be altered in
for foreign exchange payments, transit and security measures such as file
automating account opening and permissions and user access controls, should
closing, managing audit requests and be taken to make sure that it cannot be
processing insurance claims. modified by unauthorized users.
6. Accounting Organizations can use RPA Availability
for general accounting, operational It is the guarantee of reliable and constant
accounting, transactional reporting and access to your sensitive data by authorized
budgeting. people.
It is best guaranteed by properly maintaining
Cyber Security all hardware and software necessary to
Cyber security involves protecting ensure the availability of sensitive data. It is
information and systems from major cyber also important to keep up with system
threats, such as cyber terrorism, cyber upgrades.
warfare and cyber espionage.
Ensuring cyber security requires coordinated Securing PC
efforts throughout the information system. There are numerous ways to protect and
The cyber security specialization covers the remove malware from our computers. These
fundamental concepts underlying the are as follows :
construction of secure systems, from the 1. Install Firewall A firewall enacts the
hardware to software to the human computer role of a security guard. There are two
interface, with the use of cryptography to types of firewall: Software firewall and
secure interactions. hardware firewall. Each serves similar,
but different purposes. A firewall is the
Need of Cyber Security first step to provide security to the
The classic model for information security computer. It creates a barrier between
defines three objectives of security : the computer and any unauthorized
maintaining confidentiality, integrity and program trying to come in through the
availability. Internet.
158 Course on Computer Concepts (CCC)

2. Keep Your Windows Operating 1. Put a Strong Passcode This is the first
System Upto Date Probably the most step to keep your phone secure. Every
important step to do is checking for the phone lets you set a passcode lock for
latest security updates and patches security and most of them now come
available for your windows operating with a fingerprint scan for added
system. After checking for available security. For passcode, make sure you
updates for your windows operating choose a pattern or combination which
system, keep the automatic update is not easy to guess or find out such as
turned ON in order to download and your birth year, car number, home
install the important updates that can number, etc.
help to protect your PC against new
2. Install Security Apps Your
viruses or next generation malware.
smartphone is a susceptible to data
3. Install Antivirus Software Antivirus theft as your computer.
is one other means to protect the
Therefore, just like you have security
computer. It is software that helps to
apps installed on your computer, you
protect the computer from any
must also get one for your smartphone.
unauthorized code or software that
There are security apps available from
creates a threat to the system.
all known companies such as Avast,
Unauthorized software includes viruses,
McAfee, Norton, Kaspersky, etc.
keyloggers, trojans, etc.
3. Internet Browsing Be careful when
This might slow down the processing
accessing a web browser on your
speed of your computer, delete important
smartphone as it can be easy to accept
files and access personal information.
messages that pop-up.
Antivirus software plays a major role in
real time protection, its added advantage If any security warning pop-up when
of detecting threats helps computer and looking at a website, take note of it and
the information in it to be safe. leave the website if needed. You always
look at the URL and make sure the
4. Check on Security Settings of the
Browser Browsers have various security
‘http’ has an s at the end. This ensures
and privacy settings that you should that the URL you are using, is secure.
review and set to the level you desire. 4. Turn Off Geotagging Many
Recent browsers give you ability to tell smartphone social networking apps
websites to not track your movements, automatically upload photos to the
increasing your privacy and security. Internet. The problem with this is that
5. Use Complex and Secure Passwords many phones embed location tags called
Complex passwords are difficult for the geotags, right into the photo files
hackers to find. Use a password that is themselves.
at least 8 characters in length and 5. Update Phone and Apps Regularly
include a combination of numbers, App developers regularly add features
letters that are both upper and lower and security updates to their apps on
case and a special character. Hackers the play store.
use certain tools to break easy They even give details on what the new
passwords in few minutes. update adds to the app for users before
installing the update.
Securing Smartphone
We recommend that you regularly check
It is really important that your smartphone is
secure for many reasons. You may keep data the play store for updates and make
on it and if your phone was lost or stolen, sure that you have the latest version of
this would be lost. the app installed on your device.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. Which is meant for IT professionals 9. Which of the following provides
which will help them to upgrade their computing and storage capacity services
skills? to heterogeneous community of end
(a) FutureSkills (b) Technology recipients?
(c) Internet of Things (d) Processing (a) Cloud computing (b) Big data
(c) FutureSkills (d) Robotics
2. FutureSkills is a simple yet powerful
platform which can go a long way in 10. What is/are characteristics of cloud
……… your career. computing?
(a) Present proofing (b) Past proofing (a) On demand self services
(c) Future proofing (d) All of these (b) Broad network access
(c) Resource pooling
3. Which of the following objects to be (d) All of the above
controlled remotely across existing
network infrastructure? 11. Which type of cloud deployments is used
(a) FutureSkills (b) IoT to serve multiple users, not a single
(c) Cloud computing (d) SaaS customer?
(a) Private cloud (b) Public cloud
4. ...... are key components that help you to (c) Hybrid cloud (d) None of these
collect live data from the surrounding
12. Which cloud computing services refers to
environment.
supply on demand environment for
(a) Sensors (b) Connectivities
developing software applications?
(c) User interfaces (d) None of these
(a) SaaS (b) AaaS (c) PaaS (d) IaaS
5. IoT system provides substantial personal 13. Virtual reality is primarily experienced
data in ...... detail.
through ...... of the five senses.
(a) Minimum (b) Maximum
(a) Two (b) Three (c) Four (d) One
(c) Medium (d) All of these
14. Which technology devices is used for
6. Which of the following is the process of virtual gaming experiences?
collecting, organizing and analyzing large (a) FutureSkills (b) Virtual
sets of data to discover patterns and
(c) Big data (d) Blockchain
other useful information?
(a) FutureSkills (b) IoT 15. Virtual reality technology is applied to
(c) Big Data Analytics (d) User Interface advance fields of
(a) medicine (b) engineering
7. ...... of big data refers to structured,
(c) education (d) All of these
unstructured and semi-structured data
that is gathered from multiple sources. 16. ...... is an area of computer science that
(a) Feature (b) Analysis emphasizes the creation of intelligent
(c) Privacy (d) Variety machines that work and react like humans.
(a) Artificial Intelligence
8. Big data is used in .....
(b) Introduction of Things
(a) Government (b) Healthcare
(c) FutureSkills
(c) Banking (d) All of these
(d) Robotics
160 Course on Computer Concepts (CCC)

17. Which type of artificial intelligence 25. RPA is the use of specialized computer
embodies a system designed to carry out programs known as ......
one particular job? (a) FutureSkills
(a) Weak AI (b) User Interface
(b) Strong AI (c) Software Robot
(c) Both (a) and (b) (d) Artificial Intelligence
(d) None of the above
26. What is/are business benefit(s) of RPA?
18. AI is important because it can help to (a) Increased accuracy
solve immensely difficult issues in (b) No interruption of work
(a) entertainment (b) education (c) Low technical barriers
(c) health (d) All of these (d) All of the above
19. Which of the following originated as 27. ...... can help companies offer better
a way to interact with friends and customer service by automating contact
family? center tasks.
(a) Social Media (a) RPA (b) Interface
(b) Blockchain (c) Additive (d) Blockchain
(c) Automation
(d) Artificial Intelligence 28. Which of the following involves
protecting information and systems from
20. ...... is a social media designed specifically major cyber threats?
for the business community. (a) Cyber crime (b) Cyber security
(a) Pinterest (b) Twitter (c) Robotics (d) Virtual reality
(c) LinkedIn (d) Facebook
29. It is the guarantee of reliable and
21. Which of the following is an encrypted constant access to your sensitive data by
and distributed database that records authorized people.
data? (a) Confidentiality (b) Integrity
(a) Automation (c) Availability (d) None of these
(b) Blockchain
(c) Artificial Intelligence
30. ...... creates a barrier between the
computer and any unauthorized program
(d) FutureSkills
trying to come in through the Internet.
22. Blockchain mechanism brings everyone (a) Firewall (b) Integrity
to the highest degree of ....... . (c) Blockchain (d) Automation
(a) Accountability (b) Availability
31. There are security apps available from
(c) Performance (d) Analytics
all known companies such as
23. Additive manufacturing uses…… software. (a) Avast (b) McAfee
(a) System (b) Application (c) Norton (d) All of these
(c) Utility (d) CAD
32. It is a software that helps to protect the
24. Example(s) of 3D printing is/are computer from any unauthorized code or
(a) Eyewear software that creates a threat to the
(b) Dental products system.
(c) Architectural scale model (a) Antivirus (b) Password
(d) All of the above (c) Passcode (d) Firewall
Overview of FutureSkills and Cyber Security 161

True/False
Identify True/False from the following statements.
33. FutureSkills platform will ensure that all 42. Artificial Intelligence is a computer
the needs are fulfilled. interface which tries to mimic real world
beyond the flat monitor.
34. The goal of IoT is to extend the Internet
connectivity from standard devices like 43. Virtual reality has also been adopted in
computer. business.
35. Some data is sent to a cloud 44. Knowledge engineering is a core part of
infrastructure. AI research.
36. IoT technology does not help a lot in 45. Pinterest is a free microblogging service.
improving technologies and making them
better. 46. Blockchain technology does not provide
durability, reliability and longevity with
37. IoT offers real time information leading decentralized network.
to effective decision-making.
47. Additive manufacturing adds material to
38. In big data, volume refers to the speed at create an object.
which data is being created in real time.
48. Programming skills are not necessary to
39. The banking sector relies on big data for configure a software robot.
fraud detection.
49. Confidentiality refers to protecting
40. Hybrid cloud is combination of private information from being accessed by
cloud and public cloud. unauthorized parties.
41. Cloud computing could bring hardware 50. Complex passwords are simple for the
costs down. hackers to find.

Answers
1. (a) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (d) 8. (d) 9. (a) 10. (d)
11. (b) 12. (c) 13. (a) 14. (b) 15. (d) 16. (a) 17. (a) 18. (d) 19. (a) 20. (c)
21. (b) 22. (a) 23. (d) 24. (d) 25. (c) 26. (d) 27. (a) 28. (b) 29. (c) 30. (a)
31. (d) 32. (a) 33. True 34. True 35. False 36. False 37. True 38. False 39. True 40. True
41. True 42. False 43. True 44. True 45. False 46. False 47. True 48. True 49. True 50. False
162 Course on Computer Concepts (CCC)

Computer Abbreviations
A CLI Command Line Interface
CPS Characters Per Second
AEPS Aadhaar Enabled Payment System
CPU Central Processing Unit
AI Artificial Intelligence
CRT Cathode Ray Tube
ALU Arithmetic Logic Unit
CU Control Unit
AMLCD Active Matrix Liquid Crystal Display
ANSI American National Standards
Institute D
API Application Programming Interface
DB Database
ARPA Advanced Research Projects
DBA Database Administrator
Agency
DBMS Database Management System
ASP Application Service Provider
DDR SDRAM Double Data Rate Synchronous
ATM Asynchronous Transfer Mode/
Dynamic Random Access Memory
Automated Teller Machine
DFD Data Flow Diagram
DHTML Dynamic HyperText Markup
B Language
DMA Direct Memory Access
BBS Bulletin Board System
DNS Domain Name System
Bcc Blind carbon copy
DOS Disk Operating System
BCR Barcode Reader
DPI Dots Per Inch
BD Blu-ray Disc
DRAM Dynamic Random Access Memory
BHIM Bharat Interface for Money
DSL Digital Subscriber Line/Domain
BIOS Basic Input/Output System
Specific Language
Bit Binary Digit
DSN Data Source Name
BPI Bits Per Inch
DVD Digital Video Disc/Digital Versatile
BPL Broadband over Power Line Disc
BPS Bits Per Second DVD-R DVD-Recordable
DVD-ROM DVD-Read Only Memory
C DVD-RW DVD-Rewritable
DVR Digital Video Recorder
CAD Computer Aided Design
CAE Computer Aided Engineering
CAM Computer Aided Manufacturing E
Cc Carbon Copy E-Commerce Electronic Commerce
CD Compact Disc EDORAM Extended Data Output Random
C-DAC Centre for Development of Access Memory
Advanced Computing EDP Electronic Data Processing
CDMA Code Division Multiple Access EPROM Erasable Programmable Read Only
CD-R Compact Disc-Recordable Memory
CD-ROM Compact Disc-Read Only Memory EEPROM Electrically Erasable Programmable
Read Only Memory
CD-RW Compact Disc-ReWritable
E-Mail Electronic Mail
CGI Common Gateway Interface
EXE Executable
Computer Abbreviations 163

IRCTC Indian Railways Catering and


F Tourism Corporation
IMPS Immediate Payment Service
FAT File Allocation Table
IoT Internet of Things
FAQ Frequently Asked Questions
IS Information System
FDD Floppy Disk Drive
ISDN Integrated Services Digital Network
FDDI Fiber Distributed Data Interface
ISO International Organization for
FLOPS Floating Point Operations Per Standardization
Second
ISP Internet Service Provider
FTP File Transfer Protocol
IT Information Technology
FXP File eXchange Protocol

G J
JPEG Joint Photographic Experts Group
GARV Grameen Vidyutikaran
Gb Gigabit
GB Gigabyte K
GPS Global Positioning System Kb Kilobit
GUI Graphical User Interface KB Kilobyte
Kbps Kilobits per second
H KHz KiloHertz

HDD Hard Disk Drive


HD-DVD High Definition-DVD L
HTML HyperText Markup Language LAN Local Area Network
HTTP HyperText Transfer Protocol LASER Light Amplification by Stimulated
Emission of Radiation
I LCD Liquid Crystal Display
LED Light Emitting Diode
IaaS Infrastructure as a Service
LPM Lines Per Minute
IBM International Business Machines
LSI Large Scale Integration
ICMP Internet Control Message Protocol
ICT Information and Communication
Technology M
ICR Intelligent Character Recognition
MAC Media Access Control
IE Internet Explorer
MAN Metropolitan Area Network
IGMP Internet Group Management
Protocol Mb Megabit
IIS Internet Information Services MB Megabyte
IM Instant Messaging MDI Multiple Document Interface
IMAP Internet Message Access Protocol Meity Ministry of Electronics and
IMEI International Mobile Equipment Information Technology
Identity MHz MegaHertz
I/O Input/Output MICR Magnetic Ink Character Recognition
IP Internet Protocol MIDI Musical Instrument Digital Interface
IPC Inter-Process Communication MIPS Million Instructions Per Second
IPTV Internet Protocol Television MIME Multipurpose Internet Mail
IRC Internet Relay Chat Extensions
164 Course on Computer Concepts (CCC)

MODEM MOdulator-DEModulator PSK Passport Seva Kendra


MOS Metal Oxide Semiconductor PSTN Public Switched Telephone Network
MS-DOS Microsoft-Disk Operating System
MU Memory Unit Q
QoS Quality of Service
N QR Quick Response
NEFT National Electronic Funds Transfer
NeGD National e-Governance Division R
NFS Network File System
NIC Network Interface Card RAID Redundant Array of Independent
NNTP Network News Transfer Protocol Disks
NOS Network Operating System RAM Random Access Memory
NPCI National Payments Corporation of RBI Reserve Bank of India
India RDBMS Relational Database Management
NPS National Pension System System
NT New Technology (Windows) RPA Robotics Process Automation
RDRAM Rambus Dynamic Random Access
Memory
O RGB Red, Green and Blue
OCR Optical Character Recognition ROM Read Only Memory
OLE Object Linking and Embedding RPO Regional Passport Office
OMR Optical Mark Reader RTOS Real Time Operating System
OS Operating System RTGS Real Time Gross Settlement
OSS Open Source Software
ORS Online Registration System S
OTP One Time Password
SaaS Software as a Service
P SCSI Small Computer System Interface
SD Secure Digital
PaaS Platform as a Service SDRAM Synchronous Dynamic Random
P2P Peer-to-Peer Access Memory
PAN Personal Area Network /Permanent SMTP Simple Mail Transfer Protocol
Account Number SMS Short Message Service
PC Personal Computer SRAM Static Random Access Memory
PCI Peripheral Component Interconnect
PDA Personal Digital Assistant
PDF Portable Document Format
T
PIN Personal Identification Number TB Terabyte
PLA Programmable Logic Array TCP Transmission Control Protocol
POP Post Office Protocol TFT Thin Film Transistor
PoS Point of Sale
PPI Pixels Per Inch U
PPM Pages Per Minute
UAV Unmanned Aerial Vehicle
PPP Point-to-Point Protocol
UAS Unmanned Aircraft System
PPTP Point-to-Point Tunneling Protocol
UHID Unique Health Identification
PROM Programmable Read Only Memory
Computer Abbreviations 165

UMANG Unified Mobile Application for


New-age Governance W
UI User Interface
UIDAI Unique Identification Authority of WAIS Wide Area Information Servers
India WAN Wide Area Network
UPC Universal Product Code WAP Wireless Application Protocol
UPS Uninterruptible Power Supply Wi-Fi Wireless Fidelity
UPI Unified Payments Interface WiMAX Worldwide Interoperability for
URI Uniform Resource Identifier Microwave Access
URL Uniform Resource Locator WWAN Wireless Wide Area Network
USB Universal Serial Bus WWW World Wide Web
USSD Unstructured Supplementary
Service Data X
V XHTML eXtensible HyperText Markup
Language
VDU Visual Display Unit
VGA Video Graphics Array
VLAN Virtual Local Area Network
Y
VLSI Very Large Scale Integration Yb Yottabyte
VM Virtual Machine
VoIP Voice over Internet Protocol Z
VPN Virtual Private Network
VR Virtual Reality Zb Zettabyte
166 Course on Computer Concepts (CCC)

Computer Glossary
are capable of calculating the results of a wide
variety of basic arithmetical and logical
A computations.
Artificial Intelligence Fifth generation computing
Accumulator A local storage area called a register, devices, based on artificial intelligence, are still in
in which the result of an arithmetic and logic development, though there are some applications,
operation is formed. It contains a single data such as voice recognition, that are being used
register. today.
Active Cell It refers to the currently selected cell in Assembler A program that translates mnemonic
a spreadsheet. It can be identified by a bold outline statement into executable instruction.
that surrounds the cells.
Authentication Any process by which a system
Active Device The device that requires a source of varifies the identity of the user who wishes to
energy for its operation and has an output that is a access it.
function of present and past input signals.
Auxiliary Memory It is a non-volatile memory
Active Window It is the currently focused window which is not directly accessible by CPU. It is also
in the current window manager. known as secondary or external memory.
Alignment An arrangement or position of text in a
straight line or in parallel lines.
Algorithm In computing, an algorithm is a B
procedure for accomplishing some tasks which
given an initial state, will terminate in a defined Backspace Key This key is used on the keyboard
end-state. to delete the text. Backspace will delete the text to
Alphanumeric A character set that contains letters, the left of cursor.
digits and other special characters such as @, $, +, Backup A copy of a file or other item of data made,
*, %, etc. in case the original is lost and damaged.
Analog Computer A computer that operates on Bandwidth The maximum amount of data that can
data which is in the form of continuous variable travel in a communication path in a given time,
physical quantities. measured in bits per second (bps).
Android It is a LINUX based operating system Bar Code It is a machine-readable representation
designed primarily for touchscreen mobile devices of information in a visual format on a surface.
such as smartphones and tablet computers. Basic Input Output System (BIOS) It is also known
Antivirus Software It consists of computer as ROM BIOS. It provides an abstraction layer for
programs that attempt to identify threats and the hardware, i.e. a consistent way for application
eliminate computer viruses and other malicious programs and operating system to interact with
softwares (malware). input/output devices.

Application Software It is a subclass of computer Batch Processing It is a operating system, that


software that employs the capabilities of a process previously collected jobs in a single batch.
computer directly to a task that the user wishes to Biometric Device A device that identifies persons
perform. e.g. Word document, Spreadsheet, etc. seeking access to a computing system by
Arithmetic Logic Unit (ALU) It is a part of the determining their physical characteristics through
execution unit, a core component of all CPUs. ALUs fingerprints, voice recognition, retina pattern, etc.
Computer Glossary 167

Bit It is the most basic information unit used in the instructions contained in the software. The
computing and information theory. CPU is generally called by its generic name
Blog It is a discussion or informational site 'Processor' and also known as the brain of
published on the World Wide Web. computer.
Channel A medium for transferring information
Bluetooth It permits a wireless exchange of
which is also called a line or circuit. A
information between computers, cell phones and
communication channel can be a physical link,
other electronic devices.
such as a cable that connects two stations in a
Booting It is a bootstrapping process which starts network or it can consist of some electromagnetic
the operating system when a computer is switched transmission.
ON.
Chart Graphical and pictorial representation of
Broadband A high capacity transmission technique worksheet data.
using a wide range of frequencies, which enables a Chat Typing text into a message box on a screen
large number of messages to be communicated to engage in dialog with one or more people via the
simultaneously. Internet or other network.
Browser A special software that enables users to Chip A tiny wafer of silicon containing small
read/view Web pages and jump from one Web page electric circuits that can store millions of bits of
to another. information.
Buffering The process of storing data in a memory Client Computer A computer that retrieves
device, allowing the devices to change the data information or uses resources provided by the
rates, perform error checking and error server or main computer.
retransmission.
Client-Server It is a network architecture which
Bug It is an error, flaw, failure, or fault in a separates the client from the server. Each instance
computer program or system that produces an of the client software can send requests to a server
incorrect or unexpected result. or application server.
Bus A circuit that provides a communication path Clipboard A temporary storage area where
between two or more devices of a digital computer material out or copied from a file is kept for
system. pasting into another file.
Byte It is commonly used as a unit of storage ClipArt Simple pictures and symbols made
measurement in computers, regardless the type of available for computer users to add to their
data being stored. documents.
Coding The process of assigning a code to
C something for classification or identification.
Command A very specific instruction to a
Cache Memory It is a very high speed memory computer to perform some kind of action.
that is placed between the CPU and main memory,
to operate at the speed of the CPU. Command Line Interface (CLI) It is a method of
interacting with a computer by giving it lines of
CD-R A blank compact disc which can be recorded textual commands (i.e., a sequence of characters)
at once only. from the keyboard.
CD-RW A blank compact disc that can be Communication The transmission of data from one
recorded, erased and written many times. computer to another or from one device to another
Cell A box in a spreadsheet, in which you can is called communication.
enter a single piece of data. Compact Disc (CD) These discs are made of plastic
Central Processing Unit (CPU) It performs the and are coated with reflective metals. Their storage
actual processing of data. It is the part of a density is very high, storage cost is very low and
computer system that interprets and carries out access time is relatively fast.
168 Course on Computer Concepts (CCC)

Compile Conversion of high and low level


languages into machine language. D
Compiler It is a computer program that
translates a series of instructions from high level Data It is a collection of facts and figures which are
language to machine language. not in directly usable form.
Database A collection of data files integrated and
Computer A calculating device, that processes
organised into a single comprehensive file system
the instructions (given by user) and convert
which is arranged to minimise duplication of data
them into output.
and to provide convenient access to information
Computer Aided Design (CAD) A computer within that system to satisfy a wide variety of
software used by architects, engineers, artists user needs.
and others to create precision drawings or
Data Entry Direct input of data in the appropriate
technical illustrations. It is used to create
data fields of a database through the use of a human
two-dimensional or three-dimensional drawings.
data input device such as keyboard.
Computer Aided Manufacturing (CAM) It is an
DBMS It is a collection of programs that enable you to
application technology of computer software to
store, modify and extract information from a database.
control machine tools and related machinery in
the manufacturing of workpieces. Debugger A computer that assists in the detection and
correction of errors in other computer programs.
Computer Graphics These are visual presentations
Debugging It is a methodical process of finding and
on a computer screen. Examples are
reducing the number of bugs, or defects, in a
photographs, drawings, line arts, graphs,
computer program or a piece of electronic hardware,
diagrams, typography numbers, symbols,
thus making it behave as expected.
geometric designs, maps, engineering drawings
or other images. Demodulation The process is used at the receivers
end to recover the original signal coming from the
Computer Network It is a system for
sender end in modulating form.
communication among two or more
computers. The computer networks can be Desktop The area of a display screen where images,
broadly classified as 'Homogeneous' and windows, icons and other graphical items appear.
'Heterogeneous'. Device Driver (often called a driver) It is a computer
program that enables another program, typically, an
Computer Worm It is a self-replicating computer
operating system to interact with a hardware device.
program, similar to a computer virus.
Dialog Box A small area on screen in which the user is
Cookie A packet of information that travels prompted to provide information or select commands.
between a browser and the Web server.
Dial-up It belongs to a telephone connection which
Control Unit It is the part of a CPU that is established using a modem.
directs its operation. The outputs of this
Digital Computer A computer that operates with
unit control the activity of the rest of the
numbers expressed directly as digits.
device.
Direct Access It is the capability of the computer
CRT Monitor It contains millions of tiny red, equipment to obtain data from a storage device, or to
green and blue phosphorous dots that glow enter data into a storage device.
when struck by an electron beam that
Directory It is an entity in a file system which
travels across the screen to create a visible
contains a group of files and other directories. A
image.
directory contained inside another directory is called
Cursor A movable indicator on a computer a sub-directory of that directory.
screen identifying the point that will be affected Disk Drive A device which allows a computer to read
by input from the user. from and write on to computer disks.
Cut To remove an object from a document. Diskette Another term used for floppy.
Computer Glossary 169

Disk Operating System (DOS) An operating system EDO RAM (Extended Data Output RAM) This form
which contains the disk oriented commands and of dynamic RAM speeds access to memory
uses disk devices for permanent storage. locations by working on a simple assumption—the
Display Unit A device with a screen that displays next time memory is accessed, it will be at a
characters or graphics representing data in a contiguous address in a contiguous chunk of
computer memory. hardware.

Domain Name A unique name that identifies a EEPROM (Electrically Erasable Programmable Read
particular website and represents the name of the Only Memory) A special type of Programmable
server where the Web pages reside. Read Only Memory (PROM) that can be erased by
exposing it to an electrical charge. It retains its
Dot Matrix Printer It refers to a type of computer contents even when the power is turned OFF.
printer with a print head that runs back and forth
E-mail (Electronic mail) It is a method of
on the page and prints by impact, striking an
composing, sending, storing and receiving
ink-soaked cloth ribbon against the paper, much
messages over electronic communication systems.
like a typewriter.
End User Any individual who uses the information
Dot Pitch A measurement that indicates the
generated by a computer based system.
diagonal distance between like-colored phosphor
dots on a display screen. EPROM (Erasable Programmable Read Only
Memory) It is a type of computer memory chip that
Dots Per lnch (DPI) It is defined as the measure of
retains its data when its power supply is switched
the resolution of a printer, scanner or monitor.
OFF.
It refers to the number of dots in one inch line.
Ethernet It is a modern technique which is used to
Download It refers to the act of transmitting data connect local computers in LAN.
from a remote computer on the Internet or other
network to one’s own computer. Exe (.exe) It is a common filename extension
denoting an executable file (a program) in the DOS,
Drag Selecting some part of data and shifting it MS-Windows.
from one place to another is called dragging.
Execution Time Total time taken by computer to
Drag-and-Drop In graphical user interface, drag and process some program or instruction.
drop is the action of clicking on a virtual object
Extranet A technology that permits the users of
and dragging it to a different location or onto
one organisation’s intranet to enter portions of
another virtual object.
another organisation’s intranet in order to conduct
DVD It is an optical disc storage media format that business transactions or collaborate on joint
can be used for data storage including movies with projects.
high quality video and sound.
Dynamic RAM (Dynamic Random Access Memory) It F
is a type of random access memory which stores
each bit of data in a separate capacitor. Fax It stands for ‘Facsimile’. It is used to transmit
a copy of a document electronically.
Fiber Optics It is a cable made up of glass or fiber
E through which data can be transferred from one
place to another.
E-Commerce (Electronic Commerce) It is a type of
industry where buying and selling of product or File A collection of information stored
services is conducted over electronic systems such electronically and treated as a unit by a computer.
as the Internet and other computer network. Every file must have its own distinctive name.
File Allocation Table (FAT) It is the name of a
Editing The process of changing information by
computer file system architecture. The FAT file
inserting, deleting, replacing, rearranging and
system is a legacy file system which is simple
reformation.
and robust.
170 Course on Computer Concepts (CCC)

File Extension It is a suffix to the name of a


computer file applied to indicate the encoding of G
its contents or usage.
File Manager It is an operating system utility Gadget It is a device that has a specific function in
that provides a user interface to work with file addition usually has small dimensions.
systems. Garbage In Garbage Out (GIGO) It belongs to the
File Server A computer on a network that stores fact that most computer errors are not machine
the programs and data files shared by the users of errors, they are data errors caused by incorrect
the network. input data.

File Utilities These softwares are used to control Gigabyte It is a unit of information or computer
general activities of files. storage equal to approximately one billion bytes.

Firewall A security system usually consisting of GigaHertz (GHz) A measurement used to identify
hardware and software that prevents unauthorised the speed of the central processing unit. One
persons from accessing certain parts of a program gigahertz is equal to 1 billion cycles per second.
database or network. Gopher A protocol used for locating and
Flash Memory It is a type of non-volatile computer transferring information on the Internet. It is an
storage chip that can be electrically erased and Internet search tool that allows users to access
reprogrammed. It was developed using EEPROM. textual information.

Floppy disk It is a data storage device that is Graphic Interchange Format (GIF) A simple file
composed of a circular piece of thin, flexible (i.e. format for pictures and photographs, that are
floppy) magnetic storage medium encased in a compressed so they can be sent quickly.
square or rectangular plastic walled. Graphic Tablet It is an input device which is used
Font It is a fixed typeface of a particular size to create images, etc.
and style. Graphical User Interface (GUI) It is a method of
Formula An expression which calculates the interacting with a computer through a metaphor of
value of a cell. direct manipulating of graphical images and
widgets in addition to text.
Footer On a document, it is the bottom most
portion. Normally, page numbers and/or dates, etc.,
are written in this area. H
Format To set margins, tabs, font or line spacing
in layout of a document. Hang To crash in such a way that the computer
does not respond to input from the keyboard or
Fragmentation The data stored in memory is kept mouse.
in small parts, this partition is called
fragmentation. Hard Copy Printed version of soft copy of
information or data. It is the permanent output
Freeware A form of software distribution where provided by computer.
the author retains copyright of the software but
makes the program available to others at no cost. Hard Disk It is a non-volatile data storage device
that stores data on a magnetic surface layered onto
FTP This protocol is used to transfer files from disk platters.
one place to another on Internet.
Hardware The mechanical, magnetic, electronic
Function Predefined formula that performs and electrical components that comprise a
calculations using specific values in a particular computer system such as CPU, monitor, keyboard,
order. mouse, etc.
Computer Glossary 171

Header In a document, it is the top most portion. Instruction A command or order given to a
Normally date, page numbers etc, are written in computer to perform a task.
this area. Integrated Circuits Multiple electronic components
Home Page It refers to the Web page that combined on a silicon chip.
identifies a website and contains the hyperlink to Interface A device or program that helps a user to
other Web page in the website. communicate with a computer.
Hyperlink An image or portion of text on a Web Interpreter A program that converts and executes
page that is linked to another Web page. the source code into machine code line by line.
Hybrid Computer These computers are made by Internet (also known simply as the net) It is the
taking the best features of the analog computer worldwide, publicly accessible system of
and digital computer. interconnected computer networks that transmit
HyperText Markup Language (HTML) This language data by packet switching using the standard
is used to write Web page and for designing. Internet protocol.
HyperText Transfer Protocol (HTTP) It is an Internet Surfing To search something on Internet
important protocol used on the world wide web for is called Internet surfing.
moving hypertext files across the Internet. It Internet Protocol (IP) Address These addresses are
requires an HTTP client program on one end and assigned to each and every computer on a TCP/IP
HTTP server program on other end. network. It ensures that data on a network goes
where it is supported to go e.g. 192.168.2.250.
I Internet Service Provider (ISP) It is a business
organisation that offers users to access the
Icon A symbol (such as picture or a folder) that Internet and related services.
represents a certain function on your computer. Internet Protocol Suite It is the set of
When the user clicks on the icon, the appropriate communication protocols that implement the
function is executed. protocol stack on which the Internet and most
Impact Printers These printers transfer the image commercial networks run.
onto paper through a printing mechanism that
strikes the paper called ribbon.
J
Information It is the summarization of data
according to a certain pre-defined purpose. Joint Photographic Experts Groups (JPEG) It is a
Ink-Jet Printer In this printer, characters are commonly used method of lossy compression for
formed as a result of electrically charged or heated digital images particularly produced by digital
ink being sprayed in fine jets onto the paper. photography.
Individual nozzles in the printing head produce Joystick It is a computer peripheral or general
high resolution characters. control device consisting of a handheld stick that
Input In order to give instructions to a computer, pivots about one end and transmits its angle in
the information has to be supplied to it. This two or three dimensions to a computer.
information is given to the computers through
an input device such as keyboard, mouse,
scanner, etc.
K
Input Device These devices are used to put data Kernel It is the fundamental part of a program,
and instructions in computer. such as an operating system, that resides in
Instant Messaging (IM) A chat program that memory at all times.
lets people communicate over the Internet in Keyboard This is the standard input device
real time. attached to all computers. The layout of keyboard
172 Course on Computer Concepts (CCC)

is just like the traditional typewriter of the type MAC Address Hardware identification number that
QWERTY. It also contains some extra command uniquely identifies each device on a network.
keys and function keys. Mainframe Computer Sometimes it’s called a server
Key-Stroke To press a button in keyboard. or CPU. Mainframe computer or mainframe is used
Kilobyte It is a unit of information or computer in the large organization. It is bigger and much
storage equal to 1024 bytes. It is commonly more powerful.
abbreviated KB. Main Memory A volatile and speedy memory.
It is divided into two parts RAM and ROM.
L Malware It is a software that disrupts normal
computer functions or sends a users personal data
Landscape A printer feature, generally controlled without the users authorisation.
by software, which rotates the output image by 90° Mass Storage It is referred to storage where large
to print across the length rather than the width of volumes of backup/data is stored.
the paper.
Megabyte (MB) 1 Megabyte is equal to 1048576
Laptop It is a small, lightweight and portable bytes, usually rounded off to one million bytes.
battery-powered computer that can fit onto your
lap. They each have a thin, flat and liquid crystal Memory Temporary storage for information,
display screen. including applications and documents. Computer
memory is measured in terms of the amount of
Laser Printer A computer-driven photocopier that information it can store, commonly in megabytes
creates an original image of the text or graphics or gigabytes.
from the output of the computer onto a paper.
Menu The option list in some program or in
Light Pen A light sensitive style for forming software is called menu.
graphics by touching coordinates on a display
screen, thereby seeming to draw directly on Menu Bar The horizontal strip across the
the screen. top of an application’s window. Each word on the
strip has a context sensitive drop down menu
Link A communication path between two nodes or containing features and actions that are available
channels. for the application in use.
LINUX It is an open source operating system, Merge Combining two or more files into a
meaning that the source code of the operating single file.
system is freely available to the public.
Microcomputer A microprocessor-based computer,
Local Area Network (LAN) In LAN, the connected consisting of an CPU, internal semiconductor
computers are geographically close together. memory, input and output sections and a system
They are either in the same building or within a bus, all on one, or several monolithic IC chips
smaller area. inserted into one or several PC boards.
Login To start computer or some program is called Microprocessor A complete Central Processing
login. Unit (CPU) contained on a single silicon chip.
Log out Quitting the program, after completing
MIDI (Music Instrument Digital Interface) It allows
your work is known as log out.
a computer to store and replay a musical
instrument’s output.

M Million Instructions Per Second (MIPS) It is used to


measure the speed of a processor.
Macro A script that operates a series of Mini Computer It considered to be more capable
commands to perform a function. It is set up to than a microcomputer but less powerful than a
automate repetitive tasks. mainframe.
Computer Glossary 173

Minimize A term used in a GUI operating system


that uses Windows. It refers to reducing a window to N
an icon, or a label at the bottom of the screen,
allowing another window to be viewed. Network A group of two or more computers
Mobile Apps Software programs designed linked together in a way that they can share data
specifically for mobile devices such as smartphones and resources.
and tablets. Network Interface Card (NIC) This is a part of the
Mobile Wallet It is a way to carry your credit card or computer that allows it to talk to other computers
debit card information in a digital form on your via a network protocol like TCP/IP.
mobile device. Netiquette As a set of rules for acceptable online
Modem (Modulator-Demodulator) It refers to behaviour.
specific equipment that provides a means of Node The endpoint of a network branch or the
communication between two computer systems over junction of two or more branches.
conventional telephone lines.
Non-Impact Printer In this printer, chemical and
Modulation The conversion of digital signals into inkjet technique is used. By these printers, high
analog signals is modulation. quality images are printed.
Monitor The visual readout device of a computer Non-Volatile Memory A memory where stored
system. A monitor can be in several forms; a data remains undisturbed by the removal of
Cathode Ray Tube (CRT), a Liquid Crystal Display electrical power.
(LCD), or a flat-panel, full-color display.
Notebook A portable computer, that can fit into a
Motherboard Main circuit board of a micro briefcase. It is used as personal computer. It is
computer that contains the CPU, BIOS, memory, also called laptop.
mass storage interfaces, serial and parallel ports,
expansion slots and all the controllers required to
control standard peripheral devices such as display
screen, keyboard and disk drive.
O
Mouse A manually operated input device for Object Something that contains both the data
moving or entering positional information and other and the application that operate on that data.
data or commands by accessing (pointing to) images Offline It refers to the state in which a computer
on a monitor. is temporarily or permanently unable to
Multimedia Software programs that combine text and communicate with another computer.
graphics with sound, video and animation. A Online It refers to the state of being connected to
multimedia PC contains the hardware to support the networked computer system or the Internet.
these capabilities.
Operating System A set of instructions
Multitasking It can simultaneously work with that tell a computer how to operate
several programs or interrelated tasks that share when it is turned ON. It sets up a filling system to
memories, codes, buffers and files. store files and tells the computer how to display
Multithreading It is a facility available in an information on a video display.
operating system that allows multiple functions Open Source Software Any computer software
from the same application packages. that is distributed with its source code available
Multiplexer It is a device that combines multiple input for modification.
signals into an aggregate signal for transmission. Output Data that come out of a computer
Multiuser The term describing the capability of a device. e.g. information displayed on the monitor,
computer system to be operated at more than one sound from the speakers and information printed
terminal at the same time. on paper.
174 Course on Computer Concepts (CCC)

Protocol A set of rules that defines exactly how


P information is to be exchanged between two
systems over Internet.
Patch A small program that improves an existing Pseudocode It is a short hand way of describing
piece of software or corrects an error in it. a computer program.
Peripheral A term designating the various kinds of
machines and devices that work in conjunction with
a computer but are not necessarily part of the Q
computer structure. Typically, peripherals refer to
the hardware devices external to a computer. QWERTY It is one of the standard computer
Personal Computer (PC) A single-user computer keyboard, with the character Q, W, E, R, T and Y
containing a Central Processing Unit (CPU) and one on the top row of letters.
or more memory circuits.
Pitch The number of monospace characters (with R
same width) that will fit in a 1-inch line of text.
Random Access Memory (RAM) A volatile,
Pixels An acronym derived from picture element. semiconductor storage structure that accesses
The smallest element (a dot) on a display screen. temporary data with a random or direct
Port An input/output channel (either parallel or accessing method. It is accurately referred to as
serial), terminated at a connector on the computer. It ‘erasable read/write’ memory. Data in this
interconnects the computer’s input and/or output memory can be read by the CPU directly.
terminals to an appropriate source and/or Read Only Memory (ROM) A semiconductor
destination. memory whose data cannot be erased, or
Portrait A term that designates the position of overwritten; it can only be accessed (read) for use
conventional printing across the width of a page. by the CPU.
Post Office Protocol (POP) A protocol that specifies Reboot It is an act of booting a computer system
how a personal computer can connect to a mail again.
server on the Internet and download E-mail. Record A collection of all the information
Printer A mechanical device for printing a pertaining to a particular entity instance.
computer’s output on paper. Register A temporary storage unit for quick,
Process A collection of code, data and other system direct accessibility of a small amount of data for
resources including at least one thread of execution processing. Most computers include a set of
that performs a data processing task. internal registers that can be accessed more
quickly than the system’s main memory.
Processor A logic circuitry that responds to and
process the basic instructions that drive a computer.
Proprietary Software It is a software that is owned by S
an individual or a company.
Program A set of instructions to perform a specific Scanner An electronic device that uses
task. light-sensing equipment to scan paper images
such as text, photos and illustrations and
Programmer The person who makes software, does translates the images into signals that the
testing and work on computer. computer can then store, modify, or distribute.
Programmable Read Only Memory (PROM) A blank Search Engine Software that makes it possible to
Read Only Memory (ROM) that is programmed with look for and retrieve information on the Internet,
external programming equipment after manufacture. particularly the Web. Some popular search
Once programmed, it is not re-programmable and is engines are AltaVista, Google, HotBot, Yahoo!,
considered to be a ROM. Web Crawler and Lycos.
Computer Glossary 175

Secondary Memory It is a permanent and operating systems, assemblers, interpreters,


non-volatile memory that remains undisturbed by compilers, software debugging programs, text
the removal of electrical signals. editors, utilities and device drivers.
Sector A section of a recording track on a
magnetic disk. T
Sequential Access To read some data in sequential
manner, is called sequential access. Tab It is used to forward cursor five place further.
Server A computer that shares its resources and TCP/IP (Transmission Control Protocol/Internet
information with other computers on a network. Protocol) This is a large grouping of programs and
This is a mainframe computer that serves the other standards that govern how information moves
computers attached to it. around the Internet.
Shareware A software that is not free but is Template A pre-established format for a
available for a free trial period. document, stored in a computer.
Simplex Transmission of data in one direction Terabyte (TB) It’s about a trillion bytes. Actually
only. it’s 2 to the 40th power or 10095111627776 bytes.
Software The set of computer programs, Terminal This is what you look at when you’re on
procedures and associated documentation related the Internet. It’s your computer screen.
to the effective operation. Software includes: Text Group of words, numbers and symbols.
system software and application software.
Time Sharing It refers to the allocation of
Source Code (Source Program) A set of computer computer resources in a time dependent fashion
instructions in hard-copy or stored form. When to run several programs simultaneously.
written in a language other than machine language,
the source code requires translation by an Topology The structure of the network including
assembler, interpreter or compiler into object code. physical connection such as wiring schemes and
logical interactions between network devices.
Social network A way of making internet based
connections. Trackball Input device that controls the position
of the cursor on the screen; the unit is mounted
Spam Irrelevant or unsolicited messages sent over near the keyboard and movement is controlled by
Internet, typically to large number of users, for the moving a ball.
purpose of advertising, phishing, spreading
malwares, etc.
Spreadsheet Software that allows one to calculate U
numbers in a format that is similar to pages in a
conventional ledger. Ubuntu It is an open source operating system
based on the Debian GNU/Linux distribution.
Static RAM It is a type of RAM, that contains its
contents only whenever current supply is ON. Undo A feature of a computer program that allows a
user to cancel or reverse the last command executed.
Super Computer The largest mainframe computer
featuring exceptionally high speed operation while Uniform Resource Locator (URL) The specific
manipulating huge amounts of information. Internet address for a resource such as an
individual or an organization.
Synchronisation This method ensures that the
receiving end can recognise characters in order, in UNIX This is an operating system developed by
which the transmitting end sends them in a serial AT & T. It’s a big push that it allows one server to
data transmission. serve many different end users at one time.

System Software A general term for software that Upload The processes of transferring information
supervises, sequences and coordinates programs. from a computer to a website (or other remote
System software may include programs, such as: location on a network).
176 Course on Computer Concepts (CCC)

UPS (Universal Power Supply or Uninterruptible Webcam A video camera/computer setup that takes
Power Supply) An electrical power supply that live images and sends them to a Web browser.
includes a battery to provide enough power to a Web Browser An application or program which is
computer during an outage to back-up data and used to view and interact with Web pages and to
properly shut down. navigate between them.
User Someone attached to a server or host. Website A collection of Web pages or hyperlinked
User-Friendly Refers to anything that makes it Web page, which owned by an individual, company
easier for novices to use a computer. e.g. GUIs are or organization.
considered as user-friendly. Window A portion of a computer display used in a
User-Friendly Program A software program that graphical interface that enables users to select
has been designed to easily direct the user commands by pointing to illustrations or symbols
through the operation or application of a program. with a mouse.
A menu-driven program is considered to be Word The set of binary bits handled by a computer
‘user-friendly’. as a primary unit of data. Typically, each location in
Utility A software program designed to perform a memory contains one word.
computer system’s routine housekeeping Word Processing A program that enables to
functions, like copying, deleting files and/or compose a document within computer system with
providing techniques to simplify the execution of edit, store, format and print the specific document
a program. or insert, delete, copy and include text/graphics
from other files.
V Word Processor A computer system or program for
setting, editing, revising, correcting, storing and
Video Disc A disc on which movies, television printing text.
programs, etc. are recorded in order to be watched World Wide Web (‘WWW’ or ‘The Web’) A network of
on a computer or television screen. servers on the Internet that use hypertext-linked
Video Display Terminal A device for displaying databases and files.
input signals as characters on a screen, typically a Workgroup Persons sharing files and data between
monitor. themselves.
Video Teleconferencing A remote ‘face-to-face Workstation The work area and/or equipment used
chat,’ when two or more people using a webcam for computer operations, including Computer Aided
and an Internet telephone connection chat online. Design (CAD). The equipment generally consists of a
The webcam enables both live voice and video. monitor, keyboard, printer and/or plotter and other
Virus A piece of computer code designed as a output devices.
prank or malicious act to spread from one
computer to another by attaching itself to other
programs. X
Volatile Memory A memory whose contents are X-Y Plotter A computer-driven printing mechanism
irretrievably lost when power is removed. that draws coordinate points in graph form.

W Z
WAN A network of a large number of computers Zoom The enlarging or reducing an image
that cover a large area like a city, state or even a displayed on a computer process of proportionately
whole country. monitor.
Practice Set 1 177

CCC
Course on Computer Concepts

Practice Set 1
A. Select correct answer from given options.
1. The development of computers can be 8. The background screen and main area of
divided into ............. generations. windows where you can open and
(a) 3 (b) 4 (c) 6 (d) 5 manage files and programs is known as
(a) background
2. The unit of speed used for super (b) desktop
computer is
(c) wallpaper
(a) KB (b) FLOPS
(d) None of the above
(c) GB (d) EB
9. You can check spelling and grammatical
3. Which of the following is a word
mistakes by the ............. option.
processing software?
(a) Auto SpellCheck
(a) Perfect Work (b) Easy Processing
(b) Grammar and Auto SpellCheck
(c) Writer (d) All of these
(c) Spelling and Grammar
4. The fastest memory in a computer (d) SpellCheck
system is ............. .
(a) ROM (b) RAM
10. The IC chip used in computers is made of
(c) Cache (d) None of these (a) chromium (b) iron oxide
(c) silica (d) silicon
5. When a computer prints a report, this
output is called ............. . 11. A browser is
(a) Hard copy (b) Soft copy (a) a special folder on the Windows desktop
(c) COM (d) None of these used to keep documents up to date when
shared between computers.
6. It responds to an event within a (b) a line that delineates the edge of a program
predetermined time. window.
(a) Batch processing (c) a software program used for viewing web
(b) Online processing pages on the Internet.
(c) Real time processing (d) a window that is currently open.
(d) None of the above
12. An area of memory or disk that is
7. The slowest memory in a computer assigned to store E-mail messages sent
system is ....... . by other users.
(a) Hard disk (b) CD-ROM (a) Post-email (b) Post box
(c) Cache memory (d) Static RAM (c) E-mail box (d) Mail box
178 Course on Computer Concepts (CCC)

13. GARV app was launched in October 24. E-mail


(a) 2015 (b) 2016 (a) cannot address many users
(c) 2017 (d) 2018 (b) does not provide protection given to first
class mail
14. In Ubuntu, which of the following is also (c) always uses bridge to send messages in
known as dash? different networks
(a) Firefox
(b) Amazon (d) None of the above
(c) Search your computer 25. Alignment buttons are available on the
(d) Trash …… .
15. The Save As …... dialog box can be used (a) Review (b) Formatting toolbar
(a) for saving the file for the first time to save (c) Standard toolbar (d) None of these
(b) to save file by some alternative name 26. This shortcut key is used to cancel an
(c) to save file in a format other than word entry in the cell or formula bar.
(d) All of the above (a) Tab (b) Esc
(c) Home (d) None of these
16. The default page orientation in Calc is
(a) Landscape (b) Horizontal 27. The first network that planted the seeds
(c) Portrait (d) None of these of Internet was
(a) ARPANET (b) NSFnet
17. When you create a chart on a separate (c) Vnet (d) iNet
sheet in the same workbook it is called
a/an 28. Which of the following is presentation
(a) chart sheet (b) embedded chart graphic software?
(c) view sheet (d) view chart (a) MS-Windows (b) Impress
(c) Calc (d) Writer
18. The first graphical browser for the WWW
was named 29. For a small website, one needs to buy
(a) Netscape (b) Veronica space from the
(c) Mosaic (d) Lynx (a) network administrator
(b) telephone exchange
19. Which of the following is a function of
(c) ISP
operating system?
(d) None of the above
(a) Process Management
(b) Memory Management 30. ............. is used to create a set of
(c) Device Management documents, such as forms, letters or
(d) All of the above labels.
(a) Data source
20. DVD stands for (b) Main document
(a) Digital Video Disc (b) Double Video Drive
(c) Mail merge
(c) Disk Virtual Drive (d) None of these
(d) Merging document
21. The sensors should be connected to the 31. Which of the following is/are type(s) of
cloud using various media of credit card?
(a) communication (b) tele-communication
(a) Reward credit card
(c) networking (d) interface
(b) Low interest credit card
22. IPv4 addresses are ...... bits long. (c) Secured credit card
(a) 64 (b) 32 (c) 128 (d) 256 (d) All of the above

23. Pressing ............. is a quick way to center 32. The ............. of a system includes the
a paragraph. programs or instructions.
(a) Ctrl + L (b) Ctrl + E (a) Hardware (b) Icon
(c) Ctrl + R (d) Ctrl + J (c) Information (d) Software
Practice Set 1 179

33. Which of the following displays programs 42. A person who writes a blog or a weblog is
that are currently running? known as
(a) Menu bar (b) Task bar (a) Blogger (b) Writer
(c) Title bar (d) Status bar (c) Author (d) Twitter
34. Which type of debit cards include the 43. ORS stands for
logos of major cards such as Visa or (a) Online Registered System
Master card? (b) Online Regional System
(a) Online (b) Offline (c) Online Registration System
(c) Prepaid (d) None of these (d) Online Registration Secure
35. Which of the following can be used as a 44. When you activate the Spelling and
primary memory? Grammar checker
(a) Cartridge tape (b) Hard disk (a) it displays the misspelled words in the
(c) Optical disc (d) None of these dialog box
(b) it highlights the misspelled words in the
36. Which of the following can be embedded
document
into a slide?
(c) it allows you to correct the misspelled
(a) A web page (b) An audio clip
words manually
(c) A video clip (d) All of these
(d) All of the above
37. E-mail could be attached with files
such as 45. Which of the following memories must be
(a) text (b) image refreshed many times per second?
(a) Static RAM
(c) audio (d) All of these
(b) Dynamic RAM
38. A word processor is ............. . (c) ROM
(a) a program which processes the word, e.g. (d) EPROM
giving frequency of words, sorting of words,
etc. 46. In Print dialog box, you can select
(b) a program which provides the facility for (a) all pages in range (b) odd pages
creating, viewing, editing and (c) even pages (d) Any of these
manipulating text before printing. 47. By default, Calc positions text in a cell
(c) CPU microcomputer ............. .
(d) None of the above (a) left-aligned (b) right-aligned
39. It is an American site which provides (c) centered (d) justified
business and employment oriented 48. What will allow you to select entire
services. document?
(a) Twitter (b) LinkedIn (a) Select (b) Locate
(c) Facebook (d) Pinterest (c) Select all (d) None of these
40. Magnetic tape storage is primarily 49. In computer terminology, information
used for means
(a) backups (a) raw
(b) installing new programs (b) data
(c) rarely used software (c) data in more useful or intelligible form
(d) None of the above (d) alpha-numeric data program
41. GUI stands for 50. You can download UMANG app from
(a) Great User Interface (a) Google Play Store
(b) Geographical User Interface (b) Apple App Store
(c) Graphical User Interface (c) Both (a) and (b)
(d) None of the above (d) None of the above
180 Course on Computer Concepts (CCC)

B. Give the answer of the following statements in true or false.


51. E-mail message is not encoded in ASCII 71. The full form of ISP is Information
text. Source Provider.
52. It is possible to attach a file with your 72. You can stop using the spelling checker
E-mail. at any time.
53. When a URL points to main page of 73. The View menu in Writer is used to
website we can say informally that it create header and footer.
points to whole site. 74. The delivery of messages is very fast
54. Pages are permanently stored in a cache through E-mail.
memory. 75. E-ticket is the digital ticket equivalent to
55. Minimise, maximise and close buttons a paper ticket.
are on left side of the title bar. 76. Clicking on an icon with the mouse is a
56. Internet refers to inter-connected form of giving an instruction to the
networks that do not use TCP/IP computer.
protocols. 77. Email helps you to communicate with
57. You can set a time for each slide in a other people.
slide show. 78. You can print a Impress presentation in
58. In Writer, ruler appears on the top and landscape mode only.
right side of document window. 79. One can rename a Impress file when the
59. A workbook is a document that contains file is open.
one or more worksheets. 80. Writer Template does not include style
60. E-Shopping sites are Pinterest, formatting.
Whatsapp, etc. 81. Micro-computers are not programmed
61. Registers are used to store intermediate like conventional computers.
results obtained during the execution of 82. Different cells within a row can have
instruction. different heights.
62. A website is a collection of digital 83. Micro-computer systems may be used in
documents primarily HTML files. homes as well as offices.
63. The cell/range names are case sensitive. 84. The spelling and grammar check can
64. You can apply a color scheme to the only be done once the text is selected.
current slide or to all slides in your 85. In Writer, you can change the character
presentation. spacing from the toolbar.
65. Impress allows you to differentiate your 86. Avoid posting inframmatory or offensive
own animation effects. comments online.
66. Animation effects appear in the standard 87. Blog address is used by viewer to view
toolbar. your blog.
67. BIOS stands for Basic Integrated 88. After a picture has been taken with a
Operating System. digital camera and processed
68. Impress has more than twenty four slide appropriately, the actual print of the
layouts. picture is considered the process.
69. Bullets and numbering appears in the 89. Microcomputer is called micro because it
standard toolbar. consists of microprocessor.
70. 99 is a valid name for a cell or a range. 90. Usenet and Internet is the same thing.
Practice Set 1 181

91. A computer consists of Input and 96. The operating system is the most common
Output devices. type of application software.
92. The two parts of an E-mail address is 97. Two bits equal to one byte.
separated by @ symbol. 98. The binary language consists of only 2 digit(s).
93. HTML files are text files only. 99. With a wireless network, it is easier to
94. Ctrl+Y command is used to undo an relocate devices.
action. 100. The PC (Personal Computer) and the Apple
95. A byte can hold one kilobyte Macintosh are examples of two different
of data. programs.

Answers
1. (d) 2. (b) 3. (c) 4. (c) 5. (a) 6. (c) 7. (b) 8. (b) 9. (c) 10. (d)
11. (c) 12. (d) 13. (a) 14. (c) 15. (d) 16. (c) 17. (a) 18. (c) 19. (d) 20. (a)
21. (a) 22. (b) 23. (b) 24. (d) 25. (b) 26. (d) 27. (a) 28. (b) 29. (d) 30. (c)
31. (d) 32. (d) 33. (c) 34. (b) 35. (d) 36. (d) 37. (d) 38. (b) 39. (b) 40. (a)
41. (c) 42. (a) 43. (c) 44. (a) 45. (b) 46. (d) 47. (a) 48. (c) 49. (c) 50. (c)
51. True 52. True 53. True 54. False 55. False 56. False 57. True 58. False 59. True 60. False
61. True 62. True 63. False 64. True 65. True 66. False 67. False 68. False 69. False 70. False
71. False 72. True 73. False 74. True 75. True 76. True 77. True 78. False 79. False 80. False
81. False 82. False 83. True 84. False 85. False 86. True 87. True 88. False 89. True 90. False
91. True 92. True 93. True 94. False 95. False 96. False 97. False 98. True 99. True 100. False
182 Course on Computer Concepts (CCC)

CCC
Course on Computer Concepts

Practice Set 2
A. Select correct answer from given options.
1. Which of the following Ubuntu icons is 7. WWAN stands for
used for adding and removing softwares? (a) Wireless Wap Area Network
(a) Trash (b) Wireless Wide Area Network
(b) Ubuntu Software (c) Wireless Wide Array Network
(c) Firefox (d) Wireless World Area Network
(d) Search your computers
8. Which of the following is not a website
2. 1 MB is equal to which offers blog services?
(a) 500 GB (b) 1024 Byte (a) Joomla (b) Blogger
(c) 1000 KB (d) 1024 KB (c) Drupal (d) Telegram
3. Topology in computer network is 9. It is the set of computer instructions or
(a) organisation of a computer network programs that enables the hardware to
(b) speed of computer network perform different tasks.
(c) capacity of computer network (a) Software (b) Hardware
(d) volume flow in a computer network (c) Utility (d) Both (a) and (b)

4. All of the following are examples of 10. To select the entire document, use
storage devices except (a) Alt+F5 (b) Shift+A
(a) hard disk drives (b) printers (c) Ctrl+K (d) Ctrl+A
(c) floppy disk drives (d) CD drives
11. The operating system is the most
5. BHIM app was launched by ...... on 30th common type of
December, 2016. (a) communication software
(a) Narendra Modi (b) application software
(b) Rahul Gandhi (c) system software
(c) Manmohan Singh (d) word-processing software
(d) Yogi Aditya Nath
12. The steps and tasks needed to process
6. Computer software includes data, such as responses to questions or
(a) application programs clicking an icon, are called
(a) instructions
(b) operating system
(b) the operating system
(c) packaged programs
(c) application software
(d) All of the above
(d) the system unit
Practice Set 2 183

13. The two broad categories of software are 22. It is approximately one billion bytes.
(a) word processing and spreadsheet (a) Kilobyte (b) Bit
(b) transaction and application (c) Gigabyte (d) Megabyte
(c) windows and Mac OS
23. It is approximately one million bytes.
(d) system and application
(a) Gigabyte (b) Kilobyte
14. It is the program that manages the (c) Megabyte (d) Terabyte
hardware of the computer system
including the CPU, memory storage 24. This is the main editing view.
devices and input/output devices. (a) Normal view (b) Notes Page view
(a) Software (b) Operating system (c) Slide Sorter view (d) Master view
(c) Hardware (d) System software 25. Which of the rule mentioned below for
15. Input, output and processing devices range names is incorrect?
grouped together represent a(n) (a) Names cannot be the same as a cell
(a) mobile device reference
(b) information processing cycle (b) In a range name, you are allowed to use
(c) circuit board spaces or commas
(d) computer system (c) Range names can be directly used in
formulas
16. Which is not a basic function of a (d) None of the above
computer?
(a) Copy text (b) Accept input 26. Border can be applied to
(c) Process data (d) Store data (a) cells (b) paragraph
(c) text (d) All of these
17. ............ requires brief descriptions but
the main focus of the site is visual. 27. To start a slide show from beginning,
(a) Twitter (b) LinkedIn this shortcut key can be used.
(c) Pinterest (d) Facebook (a) F1 (b) F4
(c) F2 (d) F5
18. Mouse speed is
(a) adjustable through right click
28. In a worksheet, you can select
(b) not adjustable (a) the entire worksheet
(c) adjustable through control panel (b) rows
(d) None of the above (c) columns
(d) All of the above
19. Computers use which language to process
data? 29. Which area in a Calc window allows
(a) Processing (b) Kilobyte entering values and formulas?
(c) Binary (d) Representational (a) Title bar (b) Menu bar
(c) Formula bar (d) Standard toolbar
20. The output quality of a printer is
measured by 30. Which of the following is the oldest
(a) dots per unit (b) dots per inch spreadsheet package?
(c) dot per time (d) None of these (a) VisiCalc (b) Lotus 1-2-3
(c) Excel (d) StarCalc
21. EEPROM stands for
(a) Electrically Erasable Programmable Read
31. There can be many ways to insert page
Only Memory number in a document. Which of the
(b) Electronic Erasable Programmable Read
following lets you insert page number?
(a) Page Number from Insert Menu
Only Memory
(b) Page Setup from File Menu
(c) Easily Erasable Programmable Read Only
Memory (c) Footnote from Insert Menu
(d) None of the above (d) Both (a) and (c)
184 Course on Computer Concepts (CCC)

32. Where can you find the Draw Table 41. Magnetic disks are the most popular
option? medium for
(a) Pages tab (b) Table tab (a) Direct access (b) Sequential access
(c) Text tab (d) Symbols tab (c) Both (a) and (b) (d) None of these
33. Which of the following methods cannot be 42. In word document, alignment refers to
used to enter data in a cell? the position of text relative to the
(a) Pressing an Arrow key (a) margins (b) paragraphs
(b) Pressing the Tab key (c) header (d) footer
(c) Pressing the Esc key
43. After a table has been created, which of the
(d) Clicking the Enter button to the formula
following operations cannot be performed?
bar
(a) Insert rows in a table
34. Which statement is valid about magnetic (b) Delete and insert columns
tape? (c) Split the table into two tables
(a) It is a plastic ribbon. (d) None of the above
(b) It is coated on both sides with iron oxide.
44. Word processing, spreadsheet and photo
(c) It can be erased and reused.
(d) All of the above editing are examples of
(a) application software
35. Operating system (b) system software
(a) is an interface between the user and the (c) operating system software
computer (d) platform software
(b) manages all resources
(c) does all process management 45. It is also called the brain of the computer, is
(d) All of the above responsible for processing data.
(a) Motherboard
36. Embedded software is used in (b) Memory
(a) online railway information system (c) RAM
(b) mobile phones (d) Central Processing Unit (CPU)
(c) E-learning software
(d) multimedia movies
46. Cursor is a
(a) pointing device (b) thin blinking line
37. What do folders let you do? (c) pixel (d) None of these
(a) Organise the files on a disk
(b) Ensure that the computer starts properly
47. Undo is similar to
(a) Ctrl + X (b) Ctrl + C
(c) Names your files
(c) Ctrl + Z (d) None of these
(d) Creates a file allocation table
38. In a Spreadsheet, a statement that 48. The ............. effects are special types of
performs a calculation is called a/an effects that allow you to specify how you
(a) formula (b) reference to navigate from one slide to the other?
(c) argument (d) parameter (a) special (b) animation
(c) transition (d) All of these
39. It refers to protecting information from
being accessed by unauthorised parties. 49. How can you go back to previous slide
(a) Confidentiality during presentation?
(b) Integrity (a) Space bar (b) Left Arrow key
(c) Availability (c) Right Arrow key (d) Shift key
(d) Reliability 50. ....... option will first ask you that, Are
40. The device, utilised for connection of you sure you want to move this folder to
Internet is the Recycle Bin?
(a) modem (b) web browser (a) Paste (b) Cut
(c) Delete (d) Copy
(c) website (d) LAN
Practice Set 2 185

B. Give the answer of the following statements in true or false.


51. An image cannot be a hyperlink. 72. The firewall is not useful for preventing
52. The text editor is used to create, modify unauthorised users from accessing
and store the text file. internal networks.

53. Memory management is a main function 73. Character size in LibreOffice Impress is
of the operating system. measured in font size.

54. Term ‘security’ implies ‘cyber security’. 74. A web browser is a hardware that is
connected to your computer that allows it
55. A cell entry can be edited either in the to communicate with other devices on a
cell or in the formula bar. network.
56. Hard disk can store more information as 75. A computer is not the most efficient
compared to floppy disk. method for solving all types of problems.
57. Biometric scanners are used to detect 76. Download means to copy or save a file
illnesses. from your computer to another.
58. Microphones are used to capture video 77. Mouse is a pointing device.
into electronic form.
78. HTTP stands for HyperText Transfer
59. Keyboard is not a game controller. Protocol.
60. Microphones are connected directly to 79. Octal is a number system.
webcam using firewire and flash memory
cards. 80. Text can be wrapped around an image.
61. A computer is a mechanical machine 81. UMANG provides seamless integration
which is used only for record keeping. with other digital India services like
DigiLocker.
62. Barcode Reader is an input device to play
sound. 82. B2C means Business-to-Consumer.
63. Simple Mail Transfer Protocol is a 83. Using E-Commerce you can save time,
protocol which is used to send and money and efforts.
receive E-mails. 84. Chatting is one of the most important
64. There are 12 function keys on keyboard. facility of the Internet.

65. Wireless Local Area Network uses phone 85. Network is a group of computers setup to
lines or fiber optic cables. communicate with one another.

66. A program that manages all other 86. E-mail is a short form of Electronic mail.
programs in a computer is called 87. Make changes in an existing document is
operating system. called editing the document.
67. Cookie is a message given to a web 88. Tele-communication devices permit users
browser by a web server. to send and receive information to/from
68. In E-mail address me@example.com, another person or location.
domain name is “me”. 89. Software is the set of instructions that
69. A system can have more than one web your hardware executes to carry out a
browser installed at the same time. specific task.

70. Font size cannot be changed in writer. 90. OS is an application software.


71. Impress is a type of system software. 91. Operating system is also called language
manager.
186 Course on Computer Concepts (CCC)

92. eWallet do all have the same 96. Security system of LINUX is very strong.
transactions process. 97. Android belongs to the family of UNIX.
93. Table is a collection of rows and columns. 98. The computer and other devices that
94. Computers are fast machines but communicate with each other on a
inaccurate. network are called Hub.
95. The most common type of memory that 99. DVD is not a form of optical storage.
the computer uses to process data is 100. There is no minimum limit of fund
ROM. transfer through NEFT.

Answers
1. (b) 2. (d) 3. (a) 4. (b) 5. (a) 6. (d) 7. (b) 8. (d) 9. (a) 10. (d)
11. (c) 12. (a) 13. (d) 14. (b) 15. (d) 16. (a) 17. (c) 18. (c) 19. (c) 20. (b)
21. (a) 22. (c) 23. (c) 24. (a) 25. (b) 26. (d) 27. (d) 28. (d) 29. (c) 30. (a)
31. (a) 32. (b) 33. (c) 34. (a) 35. (d) 36. (b) 37. (a) 38. (a) 39. (a) 40. (a)
41. (c) 42. (a) 43. (c) 44. (a) 45. (d) 46. (b) 47. (c) 48. (c) 49. (b) 50. (c)
51. False 52. True 53. True 54. True 55. True 56. True 57. False 58. False 59. True 60. False
61. False 62. False 63. True 64. True 65. False 66. True 67. True 68. False 69. True 70. False
71. False 72. False 73. True 74. False 75. True 76. True 77. True 78. True 79. True 80. True
81. True 82. True 83. True 84. True 85. True 86. True 87. True 88. True 89. True 90. False
91. False 92. False 93. True 94. False 95. False 96. True 97. False 98. False 99. False 100. True
Practice Set 3 187

CCC
Course on Computer Concepts

Practice Set 3
A. Select correct answer from given options.
1. A communication port is used to 6. Which area in a Calc window allows you
(a) communicate with hard disks to enter values and formulas?
(b) download files (a) Title Bar (b) Menu Bar
(c) communicate with other computer (c) Formula Bar (d) Standard Toolbar
peripherals
(d) None of the above
7. To make the number pad act as directional
arrows, you can press the ....... key.
2. Connections to the Internet using a (a) Num Lock (b) Caps Lock
phone line and a modem are called .......... (c) Arrow Lock (d) Shift
connections.
(a) digital
8. What is Windows?
(a) Program for designing window
(b) dial-up
(b) An operating system
(c) broadband
(c) An application program
(d) Both (b) and (c)
(d) A game
3. To insert a new slide in a presentation,
9. Which one of the following is a valid
.......... key is used.
E-mail?
(a) Ctrl+N (b) Ctrl+S
(a) address?Enquiries.guilds.co.@.uk
(c) Ctrl+M (d) None of these
(b) sales@enquiries.guilds.co.uk
4. In which of the following fund transfer (c) @sales.enquiries@guilds.co.uk
mechanisms, can funds be moved from (d) sales.enquiries.guilds.co.uk
one bank to another and where the
transaction is settled instantly without
10. The fastest printer among the given
options is
being bunched with any other
(a) jet printer (b) laser printer
transaction?
(c) inkjet printer (d) daisy-wheel printer
(a) RTGS (b) NEFT
(c) TT (d) EFT 11. DMA stands for
5. Which of the following bars is not (a) Direct Memory Access
available in LibreOffice Writer? (b) Direct Module Access
(a) Toolbar (b) Formula bar (c) Distinct Memory Access
(c) Menu bar (d) All of these (d) Distinct Memory Allocation
188 Course on Computer Concepts (CCC)

12. What is one way to protect your 21. A cell is defined as


computer from viruses? (a) the intersection of a column and a row
(a) Do not use your computer (b) an input box
(b) Do not download unknown documents or (c) a rectangular marker
programs (d) All of the above
(c) Do not turn your computer on at night
(d) Do not use Microsoft Office Programs 22. Using LibreOffice Writer’s ‘Find and
Replace’ feature you can
13. Find the odd one out. (a) replace both text and formatting
(a) CU (b) ALU (b) replace text only
(c) Registers (d) Printer (c) replace formatting only
14. It is a communication protocol available (d) replace document’s name with a new name
on every GSM enabled mobile device. 23. Which of the following is not a storage
(a) USSD device?
(b) AEPS (a) Memory card (b) Pendrive
(c) NPCI (c) CD-ROM (d) RAM
(d) None of the above
24. A laser printer uses
15. What type of software is LINUX? (a) raster scan
(a) Compiler (b) camera lens
(b) System Software (c) heat sensitive paper
(c) Utility Software (d) None of the above
(d) Application Software
25. Which type of network uses telephone
16. These are the type(s) of ROM. lines?
(a) PROM (b) EPROM (a) WAN (b) LAN
(c) EEPROM (d) All of these (c) PAN (d) Wireless
17. What is the term used when you press 26. The name for the way that computers
and hold the left mouse key and move manipulate data into information is
the mouse around the side? called
(a) Highlighting (b) Dragging (a) programming (b) processing
(c) Selecting (d) Both (b) and (c) (c) storing (d) organising
18. Which of the following is correct about 27. When you connect to this service, your
WAN? computer is communicating with a server
(a) It is a data communication network, at your Internet Service Provider (ISP).
covering large geographical area (a) Modem (b) Internet
(b) It is a data communication network, (c) Intranet (d) Server
covering a limited geographical area
(c) In such a network, less than three 28. The term ‘gigabyte’ refers to
participants are separated by large (a) 1024 bytes
distance (b) 1024 kilobytes
(d) Both (a) and (c) (c) 1024 megabytes
(d) 1024 gigabytes
19. It is a set of computer programs used in
a computer to help to perform tasks. 29. It is any part of the computer that you
(a) An instruction (b) Software can physically touch.
(c) Memory (d) A processor (a) Hardware (b) A device
(c) A peripheral (d) An application
20. To print a document, press .......... then
press Enter. 30. Which of the following is the largest unit
(a) Shift + P (b) Ctrl + P of storage?
(c) Alt + P (d) Esc + P (a) GB (b) KB (c) MB (d) TB
Practice Set 3 189

31. The ........ tells the computer how to use 40. Which type of software manages the
its components. computer processes functioning as an
(a) Utility interface, connecting as an interface,
(b) Network connect user, application software and
(c) Operating system the hardware?
(d) Application program (a) Application software (b) Utility program
(c) Translator program (d) Operating system
32. Virtual memory is
(a) memory on the hard disk that the CPU 41. The most common input devices are the
uses as an extended RAM ........... and the ........ .
(b) in RAM (a) Microphone, Printer
(c) only necessary if you do not have any RAM (b) Scanner, Monitor
in your computer (c) Digital Camera, Speakers
(d) a backup device for floppy disks (d) Keyboard, Mouse

33. Which of the following is not transition 42. The ........... performs simple mathematics
effect? for the CPU.
(a) Cover down (b) Box in (a) ALU (b) DIMM (c) Bus (d) Register
(c) Slide sorter (d) Venetian blind 43. Hard disk drives are considered .............
34. When a computer displays a report on storage.
monitor, this output is called (a) Flash (b) Non-volatile
(a) hard copy (b) soft copy (c) Temporary (d) Non-permanent
(c) COM (d) None of these 44. …… is the introducer of Internet explorer.
35. A tree structured file directory system (a) Microsoft (b) IBM
(a) allows easy storage and retrieval of file (c) Intel (d) Pentium
names 45. The small pictures on desktop are called
(b) is a much debated unnecessary feature (a) bar (b) icons (c) view (d) cursor
(c) is not essential when we have millions
of files 46. ...... allows you to improve customer’s
(d) None of the above experience by detecting problems and
improving the process.
36. The basic unit of a worksheet into which (a) IoT (b) FutureSkills
you enter data in Calc is called as (c) VR (d) AI
(a) tab (b) box
(c) cell (d) range 47. A computer consists of
(a) a CPU (b) a memory
37. The name a user assigns to a document (c) I/O unit (d) All of these
is called a
(a) file name (b) program 48. The file extension of LibreOffice Writer
(c) record (d) data document is ......... .
(a) .docx (b) .odt
38. Something which has easily understood (c) Both (a) and (b) (d) .txt
instructions is said to be
(a) user friendly (b) information 49. A saved document is referred to as a
(c) word processing (d) icon (a) file (b) word (c) folder (d) project

39. Which of the following are commonly 50. A ........... is a collection of computers and
found on web pages? device connected together.
(a) Internet (b) Hyperlinks (a) Protocol (b) Memory card
(c) Intranet (d) All of these (c) Network (d) CPU
190 Course on Computer Concepts (CCC)

B. Give the answer of the following statements in true or false.


51. The name box is at the left end of the 72. A red wavy line points to all those words
formula bar. in your document that possibly have an
52. Ctrl + U selects the italic style for the incorrect spelling.
selected text. 73. A video camera is the most commonly
53. Internet is not a commercial information used input device for capturing video
service. data.

54. Output devices store instructions or data 74. In Impress, when you use Save As web
that the CPU processes. page, the presentation is turned into an
animated gif image.
55. Data can be a number, a word, a picture
or a sound. 75. Processed data is defined as that type of
data which is processed and represented
56. The design of the network is called the in a useful manner to the user.
network transmission.
76. The background of any web page is
57. Computers process data into information always white in color.
by working exclusively with numbers.
77. Web browser refers to a software
58. To maximise or restore a selected window application that allows you to interact
press Ctrl+F10. with the information on the WWW.
59. Cloud computing has considerable 78. ROM, which stands for Read Only
overlap with SaaS. Memory and is also known as firmware,
60. Dial-up is not a type of Broadband cannot be written on or erased by the
Internet Connection. computer user.
61. The name of the lowest strip of desktop 79. The data projector is portable and allows
is title bar. the presenter to place the slides onto any
surface.
62. Modern computers use the binary
number system. 80. The CPU and memory are located on a
special circuit board in the system unit
63. LINUX is a system software. called the motherboard.
64. The primary function of I/O peripherals 81. The default file extension for all Writer
is to facilitate computer-to-computer data document is .odt.
transmission.
82. PDA stands for Personal Digital
65. Ctrl + B is used to make the text bold in Assistant.
LibreOffice Writer.
83. Non-printing characters like spacebar,
66. Railway Ticket Reservation System is not enter key, tab key, etc., are not printed
an example of online processing system. on paper when you print a document.
67. Strictly defined, a computer is a data 84. Corporations might save money on IT
processing device. support.
68. You cannot open two different workbooks 85. The act of exploring web is known as
in Calc at the same time. surfing.
69. Data stored on magnetic disk can be 86. PlN has to be validated during each and
accessed directly. every transaction.
70. Print preview does not allow editing of 87. E-mail can be used to broadcast
the document. messages, but only within your own
71. Even and odd pages have different company.
footers in Writer. 88. 1 KB is equal to 1024 bytes.
Practice Set 3 191

89. Speech synthesiser converts text 95. A1 is an example of an absolute cell


information into spoken sentences. reference.
90. Laser printer is not a type of printer. 96. The Central Processing Unit(CPU), also
called the brain of the computer, is
91. In Writer, the easiest way to resize a responsible for processing data.
picture is by dragging its edges to match
the size and shape you want. 97. Icons are graphical objects used to
represent commonly used application.
92. Re-writable compact discs are now
available. 98. The main objects to form a network is
to share data and resources.
93. To be computer literate, you must be able
to write computer programs. 99. In Writer, a new column inserted in a
table retains the format of the column
94. The timing of NEFT is from 8 AM to 7 PM next to which it is inserted.
(All days). 100. Scanner is an example of an input device.

Answers
1. (c) 2. (d) 3. (c) 4. (a) 5. (b) 6. (c) 7. (a) 8. (b) 9. (b) 10. (b)
11. (a) 12. (b) 13. (d) 14. (a) 15. (b) 16. (d) 17. (b) 18. (a) 19. (b) 20. (b)
21. (d) 22. (b) 23. (d) 24. (d) 25. (a) 26. (b) 27. (b) 28. (c) 29. (a) 30. (d)
31. (c) 32. (a) 33. (c) 34. (b) 35. (a) 36. (c) 37. (a) 38. (a) 39. (b) 40. (d)
41. (d) 42. (a) 43. (a) 44. (a) 45. (b) 46. (a) 47. (d) 48. (d) 49. (a) 50. (c)
51. True 52. False 53. True 54. False 55. True 56. False 57. False 58. False 59. True 60. False
61. False 62. True 63. Ture 64. False 65. True 66. False 67. True 68. False 69. False 70. True
71. True 72. True 73. True 74. False 75. True 76. False 77. True 78. True 79. True 80. True
81. True 82. True 83. True 84. True 85. True 86. True 87. False 88. True 89. True 90. False
91. True 92. True 93. False 94. False 95. True 96. True 97. True 98. True 99. True 100. True
192 Course on Computer Concepts (CCC)

CCC
Course on Computer Concepts

Practice Set 4
A. Select correct answer from given options.
1. ........ are devices used to transmit data 8. Personal computers can be connected
over tele-communication lines. together to form a
(a) Drives (b) Drives bays (a) server (b) super computer
(c) Modems (d) Platforms (c) enterprise (d) network
2. An error is also known as 9. A word in a web page that when clicked,
(a) debug (b) bug opens another document is called
(c) cursor (d) None of these (a) anchor (b) hyperlink
(c) reference (d) URL
3. What difference does the fifth generation
computers have from other generation 10. The Delete key deletes the text
computers? (a) to the right of insertion point
(a) Use of artificial language (b) to the left of insertion point
(b) Use of OOP concepts (c) to the both sides of insertion point
(c) Both (a) and (b) (d) None of the above
(d) None of the above
11. Flash drive is a type of
4. In LibreOffice Writer, to cut something (a) ROM (b) software
which of the following shortcut keys is (c) hardware (d) memory
used?
(a) Ctrl + C (b) Ctrl + X 12. A dot or symbol placed at the front of
(c) Ctrl + V (d) None of these some text to highlight, is known as
(a) drop cap (b) bullets
5. Which is not a common feature of (c) symbol (d) None of these
software application?
(a) Menu (b) Windows (c) Help (d) Search 13. PROM in computer system stands for
(a) Programmable Read Only Memory
6. Dot-matrix, Inkjet and Laser are all (b) Pulse Read Only Memory
types of which computer peripherals? (c) Packet Read Only Memory
(a) Keyboards (b) Softwares
(d) Parallel Read Only Memory
(c) Monitors (d) Printers
14. Data gathering in computer means, they
7. NEFT stands for allow to use ............ data.
(a) National Electronic Funds Transfer (a) Present
(b) Negotiated Efficient Fund Transfer (b) Input
(c) National Efficient Fund Transfer (c) Output
(d) Non-Effective Fund Transfer (d) Store
Practice Set 4 193

15. Typical acronym of reusable optical 24. A ............ is a pre-designed format of text
storage will be and color scheme.
(a) CD (b) CD-RW (a) Template
(c) DVD (d) RPM (b) Slide
(c) Presentation
16. Storage which stores or retains data after
(d) None of the above
power off is called
(a) volatile storage (b) non-volatile storage 25. A computer program that converts entire
(c) sequential storage (d) direct storage program into machine language in a
single run is called a/an
17. You would use ............ software to create
(a) interpreter (b) simulator
spreadsheets, type documents and edit
(c) compiler (d) commander
photos.
(a) Application (b) Utility 26. In order to play and hear sound on a
(c) System (d) Operating computer one needs
(a) sound card and speaker
18. The term ‘operating system’ means
(b) a microphone
(a) a set of programs which controls computer
(c) Both (a) and (b)
working
(d) None of the above
(b) it is an interface between software and
hardware 27. The software that allows users to surf
(c) Both (a) and (b) the Internet is called a/an ............ .
(d) it is a programming language (a) Search engine
(b) Internet Service Provider (ISP)
19. Most websites have a main page, the
(c) Internet Surfing Provider
............ which acts as a doorway to the
(d) Web browser
rest of the website pages.
(a) Search engine (b) Home page 28. Which of the following is not a feature of
(c) Browser (d) URL Impress?
(a) Adding animations to the slides
20. ............ is a collection of many separate
networks. (b) Printing the speaker’s notes along with the
slide images
(a) A WAN (b) An Internet
(c) A LAN (d) None of these (c) Linking a slide transition with a laser
printer
21. Which of the following is the time and (d) Printing more than one slide on a single
place where a retail transaction is sheet
completed?
(a) PoS (b) IoT (c) AI (d) VR 29. Storage capacity of magnetic disk
depands on
22. Which of the following is not one of the (a) tracks per inch of surface
four major data processing functions of a (b) bits per inch of tracks
computer? (c) disk pack in disk surface
(a) Gathering data (d) All of the above
(b) Processing data into information
(c) Analyzing the data or information 30. This was the first network.
(d) Storing the data or information (a) CSNET (b) NSFNET
(c) ANSNET (d) ARPANET
23. Which of the following is not a
transmission medium? 31. A ............ is the term used when a search
(a) Modem engine returns a web page that matches
(b) Coaxial cables the search criteria.
(c) Telephone lines (a) Blog (b) Hit
(d) Microwave transmission (c) Link (d) None of these
194 Course on Computer Concepts (CCC)

32. The classic model for information 41. What is the full form of CD-R?
security defines objectives of security: (a) Collect Data-Readable
maintaining (b) Compact Disc-Recordable
(a) confidentiality (b) integrity (c) Cover Drink
(c) availability (d) All of these (d) Carbon Data
33. Which of the following looses its contents 42. A mouse, trackball and joystick are the
when the computer is turned OFF ? examples of
(a) RAM (b) ROM (a) pointing devices (b) pen input devices
(c) PROM (d) All of these (c) output devices (d) None of these
34. To close a presentation, you have to press 43. The utility which is used to increase the
(a) Ctrl+U (b) Ctrl+Shift speed of programs is called
(c) Ctrl+H (d) Ctrl+W (a) disk defragmenter (b) disk cleanup
35. HTML stands for (c) disk formatter (d) None of these
(a) HyperText Making Links 44. The mouse .... usually appears as an arrow.
(b) HyperText Markup Language (a) cursor (b) pointer
(c) Higher Textual Marking of Links (c) insertion line (d) None of these
(d) HyperText Mixer of Links
45. CU is a part of
36. What is a shell? (a) CPU (b) RAM
(a) It is a hardware component (c) ROM (d) None of these
(b) It is a command interpreter
(c) It is a part of computer 46. CPU reads the information from
(d) It is a tool in CPU scheduling secondary memory
(a) through cache
37. A computer program that translates one (b) first, information is transferred to main
program instructions at a time into a memory and from there, the CPU reads
machine language is called a/an (c) through DMA
(a) interpreter (b) CPU
(d) None of the above
(c) compiler (d) None of these
47. You can use the Tab key to
38. The instructions for starting the
(a) move a cursor across the screen
computer are stored in
(b) indent a paragraph
(a) Random Access Memory
(c) Both (a) and (b)
(b) CD-ROM
(d) move the cursor down the screen
(c) Read Only Memory Chip
(d) All of the above 48. ............ is done when the computer is
turned on and the operating system is
39. Which is not the search engine?
loading.
(a) altavista.com
(a) Booting (b) Flashing
(b) google.com
(c) Tracking (d) Taping
(c) facebook.com
(d) yahoo.com 49. This mobile App reduces the use of
physical documents and fake documents.
40. The term ‘user interface’ refers to (a) GARV App (b) Mygor App
(a) what the user sees on the screen and how (c) Digilocker App (d) Online RTI App
they can interact with it
(b) how the operating system responds to the 50. What is the full form of OMR?
user commands (a) Optical Mark Reader
(c) the means by which the user interacts with (b) Optical Marked Reading
the peripheral devices on the computer (c) Optical Moon Right
(d) None of the above (d) Optical Me Right
Practice Set 4 195

B. Give the answer of the following statements in true or false.


51. In the E-mail address Arihant@sou.edu, 71. The title bar displays the name of
‘‘Arihant’’ is the password. current active Writer document.
52. In digital computers, values are 72. Avoid replying to negative comments
measured by comparison. with more negative comments.
53. Refresh button is clicked to go to the 73. Multi-programming involves the
another website. “simultaneous” operation of many jobs on
54. MICR technology is used by banks for the computer.
faster processing of large volume of 74. Artificial Intelligence is the field of study
cheques. that enables computers to think like
55. Application software acts as an interface human beings.
between operating system and hardware. 75. Group of 8 bits is called a byte.
56. VDU can be both input and output 76. You can open a file or folder by clicking
devices. double.
57. Worm is also known as virus. 77. Properly arranged data is called
58. Word processing software is used information.
primarily with numbers to perform 78. Only one Calc Spreadsheet can be in a
calculations and create graphs. Calc Workbook.
59. RTI India has launched a mobile 79. Super computers are the fastest and
application for Android phones. most expensive computers.
60. ROM stands for Random Only Memory. 80. Machine language is independent of the
61. Servers are computers that provide type of micro-processor in a computer
resources to other computers connected to system.
a network. 81. A hand written application is an example
62. Hardware is the set of computer of a source document.
instructions or programs that enables the 82. Mainframes are computers that are able
software to perform different tasks. to execute many different computer
63. Blockchain mechanism brings everyone programs at the same time.
to the highest degree of accountability. 83. The data, which is available in the main
64. Keyboard, mouse and scanner are output memory is much faster than secondary
devices. memory.

65. AEPS does not increase the reach to 84. For sound recording, speaker is
rural areas as banking executives. necessary.

66. Scanner is an input device used to 85. The well known non-impact printers are
captures videos. inkjet laser printers.

67. A series of specially designed documents, 86. Headers and footers are displayed only
all linked together to be viewed on the on first page in a document.
Internet is known as World Wide Web. 87. Memory management is a main function
68. Pixel is the number of dots per inch. of CPU.

69. Most computer-related errors are the 88. Airtel Money is a wallet.
result of improperly entered data. 89. USB stands for Uniform Serial Bus.
70. CAPS LOCK key helps you in typing 90. Application software acts as an interface
letters in uppercase. between operating system and hardware.
196 Course on Computer Concepts (CCC)

91. Pen drive is a type of secondary 96. Cathode Ray Tube (CRT) and Liquid Crystal
memory data storage device. Display (LCD) are types of mouse available in
the market.
92. The data once stored in the CD-R
discs, cannot be erased. 97. An icon on the desktop that represents a
temporary holding place for files that are
93. The set of programs necessary to deleted is called as recycle bin.
carry out operations for a specified
job is called hardware. 98. DVD-ROM is an optical disc that is capable of
storing data from 4.7 GB to 17 GB.
94. Star topology requires a multi-point
connections. 99. When you turn on background printing, you can
continue working in Impress while you print.
95. Unit price is a valid name for a cell
or range. 100. Primary memory is also known as main
memory of the computer.

Answers
1. (c) 2. (b) 3. (a) 4. (b) 5. (b) 6. (d) 7. (a) 8. (d) 9. (b) 10. (a)
11. (d) 12. (b) 13. (a) 14. (d) 15. (b) 16. (b) 17. (a) 18. (c) 19. (b) 20. (b)
21. (a) 22. (c) 23. (a) 24. (a) 25. (c) 26. (a) 27. (d) 28. (c) 29. (d) 30. (d)
31. (b) 32. (d) 33. (a) 34. (d) 35. (b) 36. (b) 37. (a) 38. (c) 39. (c) 40. (a)
41. (b) 42. (a) 43. (a) 44. (b) 45. (a) 46. (b) 47. (b) 48. (a) 49. (c) 50. (a)
51. False 52. False 53. False 54. True 55. False 56. False 57. True 58. False 59. True 60. False
61. True 62. False 63. True 64. False 65. False 66. False 67. False 68. False 69. True 70. True
71. True 72. True 73. True 74. True 75. True 76. True 77. True 78. False 79. True 80. True
81. True 82. True 83. True 84. False 85. True 86. False 87. False 88. True 89. False 90. False
91. True 92. True 93. False 94. True 95. True 96. False 97. True 98. False 99. False 100. True
CCC
Course on Computer Concepts

Practice Set 5
A. Select correct answer from given options.
1. The ..... effects are used to apply movement 8. Which operation is not performed by
to the images and objects in slides. computer?
(a) Transition (b) Animation (a) Inputting (b) Processing
(c) Both (a) and (b) (d) None of these (c) Controlling (d) Understanding
2. The list of coded instructions is called 9. When you copy a formula
(a) computer program (b) algorithm (a) Calc edits cell references in the newly
(c) utility program (d) None of these copied formula
(b) Calc adjusts absolute cell references
3. The time computer takes to locate data
and instructions and make them (c) Calc erases the original copy of the formula
available to the CPU is known as (d) Calc doesn’t adjust relative cell references
(a) clock speed (b) a processing cycle 10. The maximum amount to be remitted
(c) CPU speed (d) access time through NEFT is
4. Which output device is used for (a) No limit (b) 10 Lacs (c) 5 Lacs (d) 2 Lacs
translating information from a computer 11. CD-ROM stands for
into pictorial form on paper? (a) Compactable Read Only Memory
(a) Mouse (b) Plotter (b) Compact Data Read Only Memory
(c) Punched cards (d) None of these (c) Compactable Disc Read Only Memory
5. A general purpose single user (d) Compact Disc Read Only Memory
micro-computer designed to be operated 12. Operating system is the most common
by one person at a time is type of .............. software.
(a) special purpose computer (a) Management (b) Application
(b) KIPS (c) System (d) Communication
(c) KB (d) PC
13. What is the meaning of G in RTGS?
6. With the help of Attach Files option in New (a) General (b) Gross (c) Great (d) Generate
Message window, user can send ...... file.
(a) .doc (b) .pdf 14. .............. is a form of permanent memory
(c) .jpg (d) All of these that holds all the instructions.
(a) Network Interface Card (NIC)
7. IT stands for (b) CPU
(a) Integrated Technology (c) RAM (d) ROM
(b) Interesting Technology
(c) Information Technology
15. Netiquette is a short form for
(a) Net Etiquette (b) Internet Etiquette
(d) Intelligent Technology
(c) Etiquette (d) None of these
198 Course on Computer Concepts (CCC)

16. A website address is a unique name that 27. Chief component of first generation
identifies a specific .............. on the Web. computer was
(a) Web browser (b) PDA (a) translators (b) vaccum tubes
(c) Website (d) Link (c) integrated circuits (d) None of these
17. Line spacing refers to 28. Which of the following is required to
(a) the space between the lines of text communicate between two computers?
(b) the height of lines (a) Communication software
(c) the length of lines (b) Protocol
(d) Both (a) and (c) (c) Communication hardware
(d) All of the above
18. A Calc workbook is a collection of
(a) workbooks (b) charts 29. In the URL, http://www.prenhall.com, the
(c) worksheets (d) Both (b) and (c) portion labelled http is the
(a) host (b) domain name
19. This platform will ensure that all the (c) protocol (d) top-level domain
needs are fulfilled.
(a) FutureSkills (b) IoT 30. A dedicated computer
(c) Blockchain (d) Robotics (a) is used by one person only
(b) is assigned one and only one task
20. Binary means (c) uses only one kind of software
(a) there are two possibilities: on and off (d) is meant for application software
(b) the same as a byte: 8 bits
(c) there are three options: 0, 1 and 2. 31. The number of pixels displayed on a
(d) that computers really need to have three or
screen is
(a) resolution (b) color depth
more options
(c) refresh rate (d) viewing size
21. To log on to the network, a user must
enter their 32. MAC address is a ……… byte address.
(a) money (a) 6 (b) 4 (c) 8 (d) 2
(b) username and password 33. Accidently, you made a mistake when
(c) full name working with your document. How can
(d) job profile you undo that action?
(a) Ctrl+X (b) Ctrl+Y (c) Ctrl+Z (d) Ctrl+U
22. LibreOffice Calc is a powerful
(a) word processing software 34. The ...... shows all the websites and pages
(b) spreadsheet package that you have visited over a period of time.
(c) DBMS package (a) Status bar (b) Task bar
(d) communication package (c) History list (d) Tool bar

23. BHIM app is used to make simple, easy 35. Which of the following is/are domain
and quick payment transactions using name suffixe(s)?
(a) Password (b) UPI (a) .com (b) .net
(c) Phone number (d) Aadhaar number (c) Both (a) and (b) (d) None of these

24. The hardware device commonly referred 36. A permanent memory, which holds data
to as the brain of the computer is the and instructions for start-up the computer
(a) RAM chip (b) data input and does not erase data after power off.
(c) CPU (d) secondary storage (a) NIC (b) CPU
(c) RAM (d) ROM
25. In which section , Display icon is present?
(a) Hardware (b) Personal 37. Each Calc file is called a workbook because
(c) System (d) Wallpaper (a) it can contain text and data.
(b) it can be modified.
26. Websites contain many pages that can be (c) it can contain many worksheets and
navigated using chartsheets.
(a) bars (b) threads (c) links (d) strings (d) None of the above
Practice Set 5 199

38. Which command is used to find MAC (b) collect signals from low speed terminals
address of computer? and transmit them over a single.
(a) ipconfig /MAC/ all (b) ipconfig /all (c) line modulate electrical digital signal into
(c) ipconfig / mac (d) ipconfig an analog signal.
(d) demodulate an analog signal into digital
39. An output device that uses words or signal.
message recorded on a magnetic medium
to produce audio response is 46. A(n) .............. is a private corporate
(a) magnetic tape (b) voice response unit network, used exclusively by company
(c) voice recognition unit employees.
(d) voice band (a) Internet (b) local area network
(c) peer-to-peer (d) intranet
40. A gigabyte is equal to
(a) 1024 GB (b) 1024 MB 47. The keystrokes Ctrl+I is used to
(c) 1024* 1024 MB (d) 1024 KB (a) increase font size
(b) insert a line break
41. Data is in form of (c) indicate the text show be bold
(a) numbers and characters
(d) applies italic format to the selected text
(b) images
(c) sound (d) All of the above 48. Which of the following is not a vaild data
type in Calc?
42. The term bit is short for (a) Number (b) Character
(a) megabyte (b) binary language (c) Label (d) Date/time
(c) binary digit (d) binary number
49. ............ allows LAN users to share
43. The Impress view that displays only text computer programs and data.
(title and bullet) is (a) Communication server
(a) slide show (b) slide sorter view (b) Print server
(c) notes page view (d) outline view (c) File server
44. RTGS stands for (d) None of the above
(a) Real Time Genocide Settlement 50. The E-Commerce domain that involves
(b) Regional Time Genocide Settlement business activity initiated by the consumer
(c) Real Time Gross Settlement and targeted to businesses is known as
(d) Real Time General Settlement (a) Consumer-to-Consumer (C2C)
45. The modem does not (b) Business-to-Business (B2B)
(a) produce sound similar to those you hear on (c) Consumer-to-Business (C2B)
the touch tone telephone. (d) Business-to-Consumer (B2C)

B. Give the answer of the following statements in true or false.


51. Computers work when instructions in 57. We can not delete the Recycle bin icon
any language are given to it. but we can make it invisible.
52. Tables can be drawn through Table tab 58. Linux and MS-Windows may be installed
in Writer. on one system.
53. Tracing or clearing cell content is same 59. Nibble is a collection of files.
as deleting a cell. 60. There is no limit on the amount of funds
54. WWW is a system of interlinked web that could be transferred using RTGS.
hypertext documents, unavailable on 61. Rows are vertical lines in table.
Internet.
62. The bits in a byte are normally
55. Computer program that helps to view numbered from zero to six.
WWW document is called Web browser.
63. Screensaver on your desktop appears
56. A font is a named set of characters that when computer is idle for a while.
have the same characteristics.
64. WWW stands for World Wide Web.
200 Course on Computer Concepts (CCC)

65. OMR is used for correction of MCQ 83. Debugging is the process of finding errors
paper. in software code.
66. KB stands for kit byte. 84. Computer is an electronic device.
67. There is only one way to start Writer, 85. File structure in Linux is hierarchical.
which is by Insert shortcut bar. 86. Ubuntu does not support office suite
68. ‘Add/remove tools’ is found in Accessories. called LibreOffice.
69. Super computer is a symbol of fifth 87. ‘Softcopy’ is a term applied to multiple
generation computer. pages of computer-printed reports.
70. Windows is the operating system of 88. By default, the hyperlink color is blue.
computer. 89. A cache memory is faster than main
71. In star topology, any node can memory.
communicate with any other node 90. 1 TB = 1024 MB
directly.
91. DBMS stands for Database Management
72. One of the advantages of a PC network is System.
that the access to the Internet is quicker.
92. Point to point connection, more than two
73. You can apply sound effects to your devices can share a single link.
slides in your presentation.
93. Full form of ‘E-Commerce’ is Electronic
74. The small pictures you see on the Commerce.
desktop are called Task bar.
94. Multimedia software helps you carry out
75. Motherboard is also known as system tasks, such as typing a document or
board. creating a spreadsheet.
76. RTOS stands for Real Time Operating 95. You can cut or copy and paste a table to
System. an other location in a document, just as
77. Computer cannot understand the binary you would text.
language. 96. Payroll is a type of application software.
78. RAM is a temporary memory. 97. The type of operating system software,
79. Audio output devices can output only music. you use depends on your computer’s
80. PPP is a dial account which puts your application.
computer directly on the Internet. 98. RAM is a volatile memory.
81. LibreOffice Impress is a spreadsheet 99. Word processing software is used to
software. create presentation.
82. Computer is a manual machine. 100. Drone camera is an example of mobile app.

Answers
1. (c) 2. (a) 3. (d) 4. (b) 5. (d) 6. (d) 7. (c) 8. (d) 9. (a) 10. (a)
11. (d) 12. (c) 13. (b) 14. (d) 15. (b) 16. (c) 17. (a) 18. (d) 19. (a) 20. (a)
21. (b) 22. (b) 23. (b) 24. (c) 25. (a) 26. (c) 27. (b) 28. (d) 29. (c) 30. (b)
31. (a) 32. (a) 33. (c) 34. (c) 35. (c) 36. (d) 37. (c) 38. (b) 39. (b) 40. (b)
41. (d) 42. (c) 43. (d) 44. (c) 45. (a) 46. (b) 47. (d) 48. (b) 49. (c) 50. (c)
51. False 52. True 53. False 54. False 55. True 56. True 57. True 58. True 59. False 60. False
61. False 62. False 63. True 64. True 65. True 66. False 67. False 68. False 69. False 70. True
71. False 72. False 73. True 74. False 75. True 76. True 77. False 78. True 79. False 80. True
81. False 82. False 83. True 84. True 85. True 86. False 87. False 88. True 89. True 90. False
91. True 92. True 93. True 94. False 95. True 96. True 97. False 98. True 99. False 100. False

You might also like