You are on page 1of 26

Q1. What is data and information?

Data can be defined as a representation of facts, concepts or instructions in a formalized


manner which should be suitable for communication, interpretation, or processing by human
or electronic machine.Data is represented with the help of characters like alphabets (A-Z,az), digits (0-9) or special characters(+,-,/,*,<,>,= etc.).
Information is organised or classified data which has some meaningful values for the
receiver. Information is the processed data on which decisions and actions are based.
Q2. What is Computer?
A computer is a general purpose device that can be programmed to carry out a set of
arithmetic or logical operations automatically. Since a sequence of operations can be readily
changed, the computer can solve more than one kind of problem.
Q3. Define Computer Network.
A computer network or data network is a telecommunications network that
allows computers to exchange data. In computer networks, networked computing devices
pass data to each other along data connections. Data is transferred in the form of packets.
The connections (network links) between nodes are established using either cable
media or wireless media. The best-known computer network is the Internet.
Q4. Define Internet and Intranet.
Internet- A means of connecting a computer to any other computer anywhere in the
world via dedicated routers and servers. When two computers are connected over the
Internet, they can send and receive all kinds of information such as text, graphics,
voice, video, and computer programs.

Intranet-It is Internal or private network of an organization based


on internet technology (such as hypertext and TCP/IP protocols) and accessed over the
internet. An intranet is meant for the exclusive use of the organization and
its associates (customers, employees, members, suppliers, etc.) and is protected
from unauthorized access with security systems such as firewalls.

Q5. Operating System


An operating system (OS) is software that manages computer hardware and software
resources and provides common services for computer programs. The operating system is an
essential component of the system software in a computer system. Application programs
usually require an operating system to function.
Q6. Define Booting
When we start our Computer then there is an operation which is performed automatically by
the Computer which is also called as Booting. In the Booting, System will check all the
hardwares and Softwares those are installed or Attached with the System and this will also
load all the Files those are needed for running a system.
Q7. Define memory.
Memory is the electronic holding place for instructions and data that your computer's
microprocessor can reach quickly. When your computer is in normal operation, its memory
usually contains the main parts of the operating system and some or all of the application
programs and related data that are being used.
Q8. Define Input and output devices.
Input devices- A component or peripheral device (such as a barcode reader, graphic tablet,
keyboard, magnetic-stripe reader, modem, mouse, scanner, or stylus) that feeds data or
instruction into a computer for display, processing, storage, or outputting or transmission.

Output devices- A display device is an output device that visually conveys text, graphics, and
video information. Information shown on a display device is called soft copy because the
information exists electronically and is displayed for a temporary period of time. Display
devices include CRT monitors, LCD monitors and displays, gas plasma monitors, and
televisions.

Q9. Define Process


In computing, a process is an instance of a computer program that is being executed. It
contains the program code and its current activity. A computer program is a passive collection
of instructions; a process is the actual execution of those instructions.
Q10. Functions performed on file and folders.
The various functions that can be performed on file and folders are as follows;
Cut
Copy
Delete
Rename
Share
Q11. DBMS
A database management system (DBMS) is a collection of programs that enables you to
store, modify, and extract information from a database. There are many different types of
DBMSs, ranging from small systems that run on personal computers to huge systems that run
on mainframes. The following are examples of database applications:
computerized library systems
automated teller machines
flight reservation systems
computerized parts inventory systems
Q.12 Define Software.
Software is a general term for the various kinds of programs used to operate computers and
related devices. (The term hardware describes the physical aspects of computers and related
devices.) Software can be thought of as the variable part of a computer and hardware the
invariable part. Software is often divided into application software (programs that do work

users are directly interested in) and system software (which includes operating systems and
any program that supports application software).
Q.13 Define computer language
A language is defined as the medium of expression of thoughts. All the human beings in this
world communicate with each other by a language. Similarly, computer also needs some
expression medium to communicate with others
A computer follows the instructions given by the programmer to perform a specific job.
1) FIRST GENERATION LANGUAGES 1GLs (Machine language)
2) SECOND GENERATION LANGAUAGES 2GLs (Assembly Language)
3) THIRD GENERATION LANGUAGES (3GLs ) (High Level Languages)
4) FOURTH GENERATION LANGUAGES (4GLs)
Q. 14 Difference between Compiler and interpreter.
A compiler is a piece of code that translates the high level language into machine language.
When a user writes a code in a high level language such as Java and wants it to execute, a
specific compiler which is designed for Java is used before it will be executed. The compiler
scans the entire program first and then translates it into machine code which will be executed
by the computer processor and the corresponding tasks will be performed.
Interpreter
Interpreters are not much different than compilers. They also convert the high level language
into machine readable binary equivalents. Each time when an interpreter gets a high level
language code to be executed, it converts the code into an intermediate code before
converting it into the machine code. Each part of the code is interpreted and then execute
separately in a sequence and an error is found in a part of the code it will stop the
interpretation of the code without translating the next set of the codes.
Q.15 Generation of computer
First Generation (1940-1956) Vacuum Tubes
Second Generation (1956-1963) Transistors

Third Generation (1964-1971) Integrated Circuits


Fourth Generation (1971-Present) Microprocessors
Fifth Generation (Present and Beyond) Artificial Intelligence

Q.16 what are the various types of computer?


Since the advent of the first computer different types and sizes of computers are offering
different services. Computers can be as big as occupying a large building and as small as a
laptop or a microcontroller in mobile & embedded systems.The four basic types of computers
are.
1. Super computer
2. Mainframe Computer
3. Minicomputer
4. Microcomputer
Q.17 Define Protocols.
In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify interactions
between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there are
protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level.
Q.18 What are the various devices in computer networking?
List of Computer Networking devices.
Gateway: device sitting at a network node for interfacing with another network that uses
different protocols. Works on OSI layers 4 to 7.

Router: a specialized network device that determines the next network point to which to
forward a data packet toward its destination. Unlike a gateway, it cannot interface different
protocols. Works on OSI layer 3.

Bridge: a device that connects multiple network segments along the data link layer. Works on
OSI layer 2.
Switch: a device that allocates traffic from one network segment to certain lines (intended
destination(s)) which connect the segment to another network segment. So unlike a hub a
switch splits the network traffic and sends it to different destinations rather than to all systems
on the network. Works on OSI
layer 2.

Hub: connects multiple Ethernet segments together making them act as a single segment.
When using a hub, every attached device shares the same broadcast domain and the same
collision domain. Therefore, only one computer connected to the hub is able to transmit at a
time. Depending on the network topology, the hub provides a basic level 1 OSI model
connection among the network objects (workstations, servers, etc). It provides bandwidth
which is shared among all the objects, compared to switches, which provide a dedicated
connection between individual nodes. Works on OSI layer 1.

Repeater: device to amplify or regenerate digital signals received while setting them from one
part of a network into another. Works on OSI layer 1.

Some hybrid network devices


Multilayer Switch: a switch which, in addition to switching on OSI layer 2, provides
functionality at higher protocol layers.

Protocol Converter: a hardware device that converts between two different types of
transmissions, such as asynchronous and synchronous transmissions.

Brouter: Combine router and bridge functionality and are therefore working on OSI layers 2
and

3.

Digital media receiver: Connects a computer network to a home theatre.

Hardware or software components that typically sit on the connection point of different
networks, e.g. between an internal network and an external network.

Proxy: computer network service which allows clients to make indirect network connections
to other network services.

Firewall: a piece of hardware or software put on the network to prevent some


communications forbidden by the network policy. Other hardware for establishing networks
or dial-up connections.

Multiplexer: device that combines several electrical signals into a single signal.

Network Card: a piece of computer hardware to allow the attached computer to communicate
by network.

Modem: device that modulates an analog "carrier" signal (such as sound), to encode digital
information, and that also demodulates such a carrier signal to decode the transmitted
information, as a computer communicating with another computer over the telephone
network.

ISDN terminal adapter (TA): a specialized gateway for ISDN.

Line Driver: a device to increase transmission distance by amplifying the signal. Base-band
networks only.

Q.19.Define MS Word
Microsoft Word is a word processor developed by Microsoft. It was first released in 1983
under the name Multi-Tool Word forXenix systems. Commercial versions of Word are
licensed as a standalone product or as a component of Microsoft Office,Windows RT or the
discontinued Microsoft Works suite. Freeware editions of Word are Microsoft Word
Viewer and Office Online, both of which have limited features.
Q.20 Define Window.
An enclosed, rectangular area on a display screen. Most moder noperating
systems and applications have graphical user interfaces(GUIs) that let you divide your
display into several windows. Within each window, you can run a different program or
display differentdata.
Windows are particularly valuable in multitasking environments , which allow you
to execute several programs at once. By dividing your display into windows, you can see
the output from all the programs at the same time. To enter input into a program, you
simply click on the desired window to make it the foregroundprocess.

Q.22What is a network topology


In communication networks, a topology is a usually schematic description of the arrangement
of a network, including its nodes and connecting lines. There are two ways of defining
network geometry: the physical topology and the logical (or signal) topology.
Q.23 Virus

A computer virus is a malware program that, when executed, replicates by


inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to be "infected".

Applications of internet
On-line communication
On-line Shopping
Video Conferencing Advertising and Publishing
Product Promotion
Technical Support or Customer Support Service
Feedback
Online Registration and Examination
Software Sharing
Group Discussion
Functions Of Operating System
1) to interprate the commands executed by the user.
2) to handle disk input/output settings.
3) loaded in the memory at bootup and remain in the memory at all time.
4) to provid the OS with the machanism in order to see the additional memory.
5) used to access the high memory area. (himem.sys )
6) it allows the rest of the OS and its programs to interact directry with the system
hardware and the system BIOS.
7) it sets particular values corresponding to the windows environment.
8) used to run particular programs during startup.
9) file management- it helps in creation, saving and deletion of files
10)environment management

Random Access Memory (RAM) is the best known form of Computer Memory. The
Read and write (R/W) memory of a computer is called RAM. The User can
write information to it and read information from it.With Ram any location can be
reached in a fixed ( and short) amount of time after specifying its address.
There are two basic types of RAM :
(i) Dynamic Ram- Dynamic RAM loses its stored information in a very short time (for milli
sec.) even when power supply is on. D-RAMs are cheaper & lower.

(ii) Static RAM- Static RAM uses a completely different technology. S-RAM retains stored
information only as long as the power supply is on. Static RAMs are costlier and consume
more power. They have higher speed than D-RAMs.

Some other RAMS are :

(a) EDO (Extended Data Output) RAM


(b) SDRAM (Synchronous DRAMS)
(c) DDR-SDRAM (Double Data Rate SDRAM)

Printers are Output devices used to prepare permanent Output devices on paper. Printers can
be divided into two main categories :
Impact Printers : In this hammers or pins strike against a ribbon and paper to print the text.
This mechanism is known as electro-mechanical mechanism. They are of two types.
Printers are Output devices used to prepare permanent Output devices on paper. Printers
can be divided into two main categories

(i) Character Printer

(ii) Line Printer

Character Printer : It prints only one character at a time. It has relatively slower speed. Eg. Of
them are Dot matrix printers.

Dot Matrix Printer : It prints characters as combination of dots. Dot matrix printers are the
most popular among serial printers. These have a matrix of pins on the print head of the
printer which form the character. The computer memory sends one character at a time to be

printed by the printer. There is a carbon between the pins & the paper. The words get printed
on the paper when the pin strikes the carbon. There are generally 24 pins.

Laser Printer is a type of printer that utilizes a laser beam to produce an image on a drum.
The light of the laser alters the electrical charge on the drum wherever it hits. The drum is
then rolled through a reservoir of toner, which is picked up by the charged portions of the
drum. Finally, the toner is transferred to the paper through a combination of heat and
pressure.

This is also the way copy machines work. Because an entire page is transmitted to a drum
before the toner is applied, laser printers are sometimes called page printers. There are two
other types of page printers that fall under the category of laser printers even though they do
not use lasers at all. One uses an array of LEDs to expose the drum and the other uses LCDs.
Once the drum is charged, however, they both operate like a real laser printer. One of the
chief characteristics of laser printers is their resolution how many dots per inch (dpi) they
lay down.

The available resolutions range from 300 dpi at the low end to 1,200 dpi at the high end. In
addition to text, laser printers are very adept at printing graphics, so you need significant
amounts of memory in the printer to print high-resolution graphics. To print a full-page
graphic at 300 dpi, for example, you need at least 1 MB (megabyte) of printer RAM. For a
600 dpi graphic, you need at least 4 MB RAM.
Because laser printers are non-impact printers, they are much quieter than dotmatrix or daisywheel printers. They are also relatively fast, although not as fast as some dot-matrix or daisywheel printers. The speed of laser printers ranges from about 4 to 20 pages of text per minute
(ppm). A typical rate of 6ppm is equivalent to about 40 characters per second (cps).
Non-Impact Printers : There printers use non-Impact technology such as ink-jet or laser
technology. There printers provide better quality of O/P at higher speed. These printers are of
two types :
Ink-Jet Printer : It prints characters by spraying patterns of ink on the paper from a nozzle or
jet. It prints from nozzles having very fine holes, from which a specially made ink is pumped

out to create various letters and shapes. The ink comes out of the nozzle in a form of vapors.
After passing through a reflecting plate, it forms the desired letter/shape at the desired place.

Hardware
Physical components of a computer system which we can touch and feel are called Hardware.
Hardware must required to run the Software.
Computer Hardware can be broadly categorized into 2 types. 1.Input / Output Devices 2.
Processing devices
Keyboard , Mouse, Monitor, Joystick etc.. which required to give input to the computer and
capable to display the output comes under Input / Output Devices. Processor, Mother Board,
Memory etc. responsible for background operations and processing comes under Processing
Devices.
Hardware understands only Binary Digits 0s(Zeros) and 1s(Ones) in the form of voltage
pulses.
Professional and Expert in Hardware is called Hardware Engineer.
Various metals, ceramics, plastics, semiconductors, and composites are used in the making of
Hardware. Eg. Silicon, copper Plastic polymers etc..
Software
Set of Instructions called programs responsible for running computer is called Software.
Software makes Hardware to run.
Computer Software can be broadly divided into two categories 1. System Software 2.
Application Software.
Operating System of the Computer which Manages all the devices, memory, softwares of the
computer comes under System Software.Examples of System Software are Windows , Lunux

Operating Systems etc. Where as Software used for specific applications like Word
Processing, Spread sheets maintaining is called Application Software. Examples of
Application Softwares are MS Word, Excel etc.
Software tells the Hardware everything in the form of Binary Digits 0s(Zeros) and 1s(Ones)
only.
Professional and Expert in Software is called Software Engineer.
Programming Languages are used to create Software. Eg. C, C++, Java etc..
Microsoft Access, also known as Microsoft Office Access, is a database management
system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software-development tools. It is a member of the Microsoft
Office suite of applications, included in the Professional and higher editions or sold
separately.
Access is now much more than a way to create desktop databases. Its an easy-to-use tool for
quickly creating browser-based database applications that help you run your business. Your
data is automatically stored in a SQL database, so its more secure than ever, and you can
easily share your applications with colleagues.
Information technology (IT) is the application of computers and telecommunications
equipment to store, retrieve, transmit and manipulate data,[1] often in the context of a business
or other enterprise.[2] The term is commonly used as a synonym for computers and computer
networks, but it also encompasses other information distribution technologies such as
television and telephones. Severalindustries are associated with information technology,
including computer hardware, software, electronics, semiconductors, internet,telecom
equipment, e-commerce and computer services
Security management is the identification of an organization's assets (including information
assets), followed by the development, documentation, and implementation of policies and
procedures for protecting these assets.

An organisation uses such security management procedures as information classification, risk


assessment, and risk analysis to identify threats, categorise assets, and rate system
vulnerabilities so that they can implement effective controls.
A hard disk drive (HDD)[b] is a data storage device used for storing and
retrieving digital information using rapidly rotating disks (platters) coated with magnetic
material.[2] An HDD retains its data even when powered off. Data is read in a randomaccess manner, meaning individual blocks of data can be stored or retrieved in any order
rather than sequentially. An HDD consists of one or more rigid ("hard") rapidly rotating disks
(platters) with magnetic heads arranged on a moving actuator arm to read and write data to
the surfaces.
Desktop
The desktop is the primary user interface of a computer. When you boot up your computer,
the desktop is displayed once the startup process is complete. It includes the desktop
background (or wallpaper) andicons of files and folders you may have saved to the desktop.
In Windows, the desktop includes a task bar, which is located at the bottom of the screen by
default.
Windows & Its Components
The main components of Windows when you start your computer are the Desktop, My
Computer,
Recycle Bin, Start Button, Taskbar, and shortcuts to applications.
After opening an application, you will also have a window with an active application which
will appear in your desktop and taskbar.

Microsoft Excel is a spreadsheet application developed by Microsoft for Microsoft


Windows and Mac OS. It features calculation, graphing tools, pivot tables, and
a macro programming language called Visual Basic for Applications. It has been a very
widely applied spreadsheet for these platforms, especially since version 5 in 1993, and it has
replaced Lotus 1-2-3 as the industry standard for spreadsheets.

Table insert Instructions


Start Microsoft Word and open a document or create a new one.
Select the "Table" button found beneath the standard toolbar at the top of the document as
seen in this image.
Highlight the number of columns and rows for your table by dragging your mouse over the
number of appropriate grids. For example, a table consisting of four columns and four rows
would look similar to the provided image.
Click the last highlighted grid box once you have selected the specified table cells to be
inserted into your document.

Enter your text and or data into the table.


Insert Clip Art
The following steps explain how to drop clip art into your document:
1. Move to the page on which you want to plaster the clip art.
2. Click the Insert tab on the Ribbon and then click the Clip Art button in the Illustrations
group.
After a brief moments hesitation, the Clip Art task pane pops up in its entire splendor.
3. Type a keyword in the Search For text box and then click the Go button.
For example, to search for pictures of animals, type animal in the Search.
For text box and then click Go. Word then searches the Clip Organizer to locate clip art that
depicts animals, and then it displays, in the Clip Art task pane, thumbnails of the pictures it
finds.
4. Click the picture you want to use.
The picture is inserted on the current page.
Notice that a special Ribbon Format tab with tools for working with pictures has appeared.
This Picture Tools Format tab appears whenever you select a picture object.
5. If youre finished inserting pictures, click the Clip Art task panes Close button

Steps to insert chart


1. Position your cursor where you would like to insert the chart
2. Open the Insert ribbon
3. Click Chart in the Illustrations section

4. Select the style of chart you would like to insert


5. Click OK
The chart will appear in your document. Additionally, an Excel worksheet opens. You can
enter your data in the worksheet. Use the handle to adjust the range of data that appears in the
chart. It will automatically update the chart in Word.
Once your chart is created, you can use the tools in Word to change the chart style, layout and
formatting options.

TRANSMISSION MEDIA
The means through which data is transformed from one place to another is called
transmission or communication media. There are two categories of transmission media used
in computer communications.

BOUNDED/GUIDED MEDIA

UNBOUNDED/UNGUIDED MEDIA

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol
suite (IP), and is so common that the entire suite is often called TCP/IP. TCP
provides reliable, ordered and error-checked delivery of a stream of octets between programs
running on computers connected to a local area network, intranet or the public Internet. It
resides at the transport layer.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol
suite for relaying datagrams across network boundaries. Its routing function
enables internetworking, and essentially establishes the Internet.
IP, as the primary protocol in the Internet layer of the Internet protocol suite, has the task of
delivering packets from the source host to the destination host solely based on the IP
addresses in the packet headers.

Memory management is the act of managing computer memory. The essential requirement of
memory management is to provide ways to dynamically allocate portions of memory to
programs at their request, and free it for reuse when no longer needed. This is critical to any
advanced computer system where more than a single process might be underway at any time.
Mail merge is a software function describing the production of multiple (and potentially large
numbers of) documents from a single template form and a structured data source. The letter
may be sent out to many "recipients" with small changes, such as a change of address or a
change in the greeting line. Both WordStar (via an ancillary program) and WordPerfect
offered this capacity for CP/M and MS-DOS systems. MS Word Mail Merge allows a user to
send letters or documents to many people simultaneously; users simply create one document
that contains the information that will be the same in each version, and then add placeholders
for the information that will be unique to each version.

Steps

1.

1
Click on the image or the text you would like to animate. To select a whole text box, click on
the border of the text box. It will automatically send in the text by paragraphs unless you
highlight all the text in the box, in which case it all comes in at the same time.

Ad
2.

Go to the "Animations" tab. In the 2007 and 2010 versions of PowerPoint, this tab is located
at the top of the page, next to "Transitions". You can either open the "Animation pane" in
2010, or use the drop down list. In 2007, use "Custom animation".
3.

Select the animation you would like. There are entrances, exits, emphasis, and paths.
4.

4
Specify whether you want your animation to start "On mouse click", "After previous" or
"With previous".

5.

5
Preview the effect by either going to slideshow mode. Click "preview", "play" or the F5 key
on your keyboard. It's now ready to go, or you can add as many more as you'd like to
your PowerPoint presentation.

Features of windows
1) Windows Easy Transfer
2) Windows Anytime Upgrade
3) Windows Basics
4) Searching and Organizing
5) Parental Controls
6) Ease of Access Center
7) Default Programs
8) Remote Desktop Connection

Charles Babbage, ( 26 December 1791 18 October 1871) was an English polymath. He


was a mathematician, philosopher, inventor and mechanical engineer, who is best
remembered now for originating the concept of a programmable computer.
Considered a "father of the computer",Babbage is credited with inventing the first mechanical
computer that eventually led to more complex designs.

Third Generation Computers computers are


1.

Third Generation Computers were based on integrated circuit (IC) technology.

2.

Third Generation Computers were able to reduce computational time from


microseconds to nanoseconds

3.

Third Generation Computers devices consumed less power and generated less heat. In
some cases, air conditioning was still required.

4.

The size of Third Generation Computers was smaller as compared to previous


computers

5.

Since hardware of the Third Generation Computers rarely failed, the maintenance cost
for it was quite low.

6.

Extensive use of high-level language became possible in Third Generation


Computers.

7.

Manual assembling of individual components was not required for Third


Generation Computers, so it reduced the large requirement of labor & cost. However, for the
manufacture of IC chips, highly sophisticated technologies were required

8.

Commercial production became easier and cheaper.

The fourth generation computers


1) The fourth generation computers have microprocessor-based systems.
2) They are the cheapest among all the computer generation.
3) The speed, accuracy and reliability of the computers were improved in fourth
generation computers.
4) Many high-level languages were developed in the fourth generation such as COBOL,
FORTRAN, BASIC, PASCAL and C language.
5) A Further refinement of input/output devices was developed.
6) Networking between the systems was developed

You might also like