Professional Documents
Culture Documents
Computer Capsule Ibps Po 2014 PDF
Computer Capsule Ibps Po 2014 PDF
This Computer Capsule has been prepared by Career Power Institute Delhi (Formerly Known as Bank
Power). This document consists of all important notes for IBPS PO Exam 2014.
INTRODUCTION
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
DATA REPRESENTATION
Memory Units:
4 bit = 1 nibble
8 bit = 1 byte
1024 B = 1 KB (Kilo Byte)
1024 KB = 1 MB (Mega Byte)
1024 MB = 1 GB (Giga Byte)
1024 GB = 1 TB (Tera Byte)
1024 TB = 1 PB (Peta Byte)
1024 PB = 1 XB (Exa Byte)
1024 XB = 1 ZB (Zeta Byte)
1024 ZB = 1 YB (Yota Byte)
bit < Byte < KB < MB < GB < TB < PB < XB < ZB < YB
bit (b)
Byte (B)
Mbps mega bits per sec.
MBps mega Bytes per sec.
The information you put into the computer is
called Data
Information of a computer is stored as Digital
Data
A number system defines a set of values that is
used to represent Quantity
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
GENERATIONS OF COMPUTER
Which was the first general purpose computer,
designed to handle both numeric and textual
www.bankersadda.com
COMPUTER ORGANISATION
An Arithmetic Logic Unit (ALU) is a digital circuit
that performs integer arithmetic and logical
operations. The ALU is a fundamental building
block of the central processing unit of a computer.
Control Unit is responsible for controlling the
overall operations of computer. It coordinates the
sequence of execution of instructions and controls
the overall functioning of the computer.
The first computer architecture was introduced by
John Von Neumann (1970)
Personal computers use a number of chips
mounted on a main circuit board called
Motherboard.
The CPU is fabricated as a single Integrated Circuit
(IC) chip. It is also known as the Microprocessor.
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
man-readable form
The printed form of output is referred as Hard
Copy.
The form of output displayed on the screen is
referred as Soft Copy.
The device that prints information from the
computer onto the paper is Printer.
Pages Per Minute (PPM) is the unit used to count
the speed of the printer.
On the basis of technology, printers are
categorised into Impact and Non- Impact
Printers.
Impact printers create an image by using some
mechanism to physically press an inked ribbon
against the page, causing the ink to be deposited
on the page in the shape desired.
Examples of Impact Printers are Character
Printers and Dot Matrix Printers.
Non Impact Printers do not touch the paper
when creating an image.
Examples of Non - Impact Printers are Inkjet
printers, Laser printers, Solid ink printers, Dyesublimation, Thermal wax printers, Thermal auto
chrome printers.
A pen based output device, attached to a computer
for making vector graphics, that is, images created
by a series of many straight lines is known as
Plotters.
The number of pixels displayed on a screen is
known as Resolution.
A Monitor is a TV-like display attached to the
computer on which the output can be displayed
and viewed. It can either be a monochrome
display or a colour display.
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
INTERNET
The Internet is a global system of interconnected
computer networks that use the standard Internet
protocol suite (TCP/IP) to link several billion
devices worldwide.
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
Type
Com
Edu
Gov
Mil
Net
Org
Domain Types
Description
Commercial
and
for
profit
organizations
Education
Provider,
college,
Universities
Federal Government Agencies
US military sites
Internet infrastructure and service
providers
Miscellaneous
and
non-profit
organizations
DATA COMMUNICATION
&
NETWORKING
Data
Communication
deals
with
the
transmission of digital data from one device to
another. Data is transferred through a pathway
called as communication channel which can be
physical wire connecting the devices or may be
unguided media like laser, microwave etc.
A communication channel has a source or
transmitter at one side and a designation or
receiver at another side of the network. The
source of data origination is single but there may
be multiple receivers.
A communication channel is of 3 types:
Simplex: In this, communication is
unidirectional i.e. one of the two devices
can transmit the data and the other can
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
Advantages:
Better performance: Star topology
prevents the passing of data packets
through an excessive number of nodes. At
most, 3 devices and 2 links are involved in
any communication between any two
devices.
Isolation of devices: Each device is
inherently isolated by the link that
connects it to the hub. This makes the
isolation
of
individual
devices
straightforward
and
amounts
to
disconnecting each device from the others.
This isolation also prevents any noncentralized failure from affecting the
network.
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
Advantages:
Data can be transmitted from different
devices simultaneously. This topology can
withstand high traffic.
Even if one of the components fails there is
always an alternative present. So data transfer
doesnt get affected.
Expansion and modification in topology can
be done without disrupting other nodes.
Disadvantages:
There are high chances of redundancy in
many of the network connections.
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
Hybrid Topology
Internetworking Devices
These are used to connect different devices in the
network or to connect two or more different
networks.
Following devices are used for interconnection:
Modem
Hub
Switch
Repeater
Router
Gateway
Bridge
Modem: Modem stands for ModulatorDemodulator. It is used to connect computers for
communication via telephone lines.
Hub: It works at the Physical layer. It just acts
like a connector of several computers i.e. simply
connects all the devices on its ports together. It
broadcasts all the data packets arriving at it with
no filtering capacity.
Switch: It works at the Data Link Layer. It is
used for dividing a network into segments called
subnets. It provides filtering of data packets and
prevents network traffic also.
Repeater: It operates at the Physical Layer. It is
used to amplify a signal that has lost its original
strength so as to enable them to travel long
distances. It can only join the networks that
transmit similar data packets. It does not have
filtering capacity i.e. all data including noise is
amplified and passed on in the network so dont
help in reducing network traffic.
Router: It works at the Network Layer and is
used to connect different networks that have
different architectures and protocols. It sends the
data packets to desired destination by choosing
the best path available thus reducing network
traffic. It routes the data packets using the routing
table that contains all the Information regarding
all known network addresses, possible paths and
cost of transmission over them. Availability of
path and cost of transmission decide sending of
www.bankersadda.com
INFORMATION SECURITY
A Computer Virus is a computer program or code
that can replicate itself and spread from one
computer system to another system.
A computer virus has the capacity to corrupt or to
delete data on your computer and it can utilize an
e-mail program to spread the virus to other
computer systems.
In the worst case scenario, it can even delete
everything on your hard disk.
The purpose of it is to disrupt the operation of the
computer or the program.
Some examples of Computer Virus are Trojan
viruses. stealth viruses, worms, malware
(malicious software), Disk Killer, Stone virus,
Sunday, Cascade, Nuclear, Word Concept, etc.
Malware, short for malicious software, is any
software used to disrupt computer operation,
www.careerpower.in
www.careeradda.co.in
Ctrl + Shift +
Spacebar
Ctrl + B
Ctrl + I
Ctrl + U
Ctrl + Shift+ <
Ctrl + Shift +
>
Ctrl + [
Ctrl + ]
Ctrl +
Spacebar
Ctrl + C
Ctrl + X
Ctrl + V
Ctrl + Alt + V
Ctrl + Shift +
V
Ctrl + Z
Ctrl + Y
Basic Keys
Common Tasks
Create a non breaking space
Make letters bold
Make letters italic
Make letters underline
Decrease font size one value
Increase the font size one
value
Increase the font size by 1
point
Decrease the font size by 1
point
Remove paragraph or
character formatting.
Copy the selected text or
object
Cut the selected text or
object
Paste text or an object
Paste special
Paste formatting only
Undo the last action
Redo the last action
MICROSOFT OFFICE
Control Keys + Function keys
www.bankersadda.com
Ctrl+F2
Ctrl+F3
Choose
the
print
preview
command (Microsoft office Button)
Cut on the spike
Ctrl+F4
Ctrl+F6
Ctrl+F9
Ctrl+F10
Ctrl+F11
Lock a field
Ctrl+F12
Choose the
Open command
(Microsoft Office Button)
www.careerpower.in
www.careeradda.co.in
F1
F2
F4
F5
F6
F7
F8
F9
F10
F11
F12
Function Keys
Get help or visit Microsoft office
Online.
Move text or graphic.
Repeat the last action
Choose the Go To command (Home
tab).
Go to the nest pane or frame.
Choose the spelling command
(Review tab)
Extend a selection
Update the selected fields
Show key tips
Go to the nest field
Choose the Save As command
(Microsoft Office Button).
www.bankersadda.com
Key
F2
F5
F7
F11
Ctrl +
Shift + ;
Ctrl + ;
Shift + F3
Shift + F5
Ctrl + A
Ctrl + B
Ctrl + I
Ctrl + U
Ctrl + P
Ctrl + Z
Ctrl + F9
Ctrl + F10
Ctrl + F6
Ctrl +
page up
Ctrl +
Page
Down
Ctrl +
Tab
Alt + =
Ctrl +
www.careerpower.in
www.careeradda.co.in
Ctrl +
Arrow
key
Ctrl +
Space
Shift +
Space
MICROSOFT POWERPOINT
www.bankersadda.com
by
set
of
Types of Attributes
Simple Attributes: having atomic or
indivisible values: Dept a string Phone
Number an eight digit number.
Composite Attributes: having several
components in the value. Example:
Qualification with components (Degree
Name, Year, University Name)
Derived Attributes: Attribute value is
dependent on some other attribute.
Example: Age depends on Date of Birth. So
age is a derived attribute.
Single-valued: having only one value rather
than a set of values. For instance, Place of
Birth-single string value.
Multi-valued: having a set of values rather
than a single value, for instance, Courses
Enrolled attribute for student Email
Address attribute for student Previous
Degree attribute for student.
www.careerpower.in
www.careeradda.co.in
NOTE:
Diagrammatic Notation for Entities
entity rectangle
attribute ellipse connected to rectangle
multi-valued attribute double ellipse
composite attribute- ellipse connected to ellipse
Keys in DBMS:
A super key of an entity set is a set of one or more
attributes whose values uniquely determine each
entity.
A candidate key of an entity set is a set of fields
from which primary key can be selected. It is an
attribute or a set of attributes that can act as a
primary key for a table to uniquely identify each
record in a table.
Although several candidate keys may exist, one of
the candidate keys is selected to be the primary
key.
Primary key is a candidate key that is most
appropriate to become main key of the table. It is
a key that uniquely identifies each record in the
table.
LOGIC GATES
A
Al Artificial intelligence
ALGOL Algorithimic Language
ARP Address resolution Protocol
ASCII American Standard Code for Information
Interchange
B
BINAC - Binary Automatic Computer
BCC Blind Carbon Copy
Bin Binary
BASIC - Beginners All-purpose
Instruction Code
BIOS Basic Input Output System
Bit Binary Digit
BSNL Bharat Sanchar Nigam Limited
Symbolic
www.bankersadda.com
CC Carbon Copy
www.careerpower.in
www.careeradda.co.in
J
JPEG - Joint Photographic Experts Group
D
DBA Data Base Administrator
DBMS Data Base Management System
DNS Domain Name System
DPI Dots Per Inch
DRAM Dynamic Random Access Memory
DVD Digital Video Disc/Digital Versatile Disc
DVDR DVD Recordable
DVDROM DVD Read Only Memory
DVDRW DVD Rewritable
DVR Digital Video Recorder
DOS Disk Operating System
K
Kb - Kilobit
KB - Kilobyte
KHz - Kilohertz
Kbps - Kilobit Per Second
L
LCD Liquid Crystal Display
LED Light Emitting Diode
LPI Lines Per Inch
LIS Large Scale Integration
M
Mb Megabit
MB Megabyte
MPEG Moving Picture Experts Group
MMS Multimedia Message Service
MICR Magnetic Ink Character reader
MIPS Million Instructions Per Second
E
EBCDIC Extended Binary Coded Decimal
Interchange Code
e-Commerce Electronic Commerce
EDP Electronic Data Processing
EEPROM Electronically Erasable Programmable
Read Only Memory
ELM/e-Mail Electronic Mail
ENIAC - Electronic Numerical Integrator and
Computer
EOF - End Of File
EPROM - Erasable Programmable Read Only
Memory
EXE - Executable
F
FAX - Far Away Xerox/ facsimile
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FORTRAN - Formula Translation
FS - File System
FTP - File Transfer Protocol
G
Gb - Gigabit
GB - Gigabyte
GIF - Graphics Interchange Format
GSM - Global System for Mobile Communication
H
HDD - Hard Disk Drive
HP - Hewlett Packard
HTML - Hyper Text Markup Language
HTTP - Hyper Text Transfer Protocol
I
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
N
NIC Network Interface Card
NOS Network Operating System
O
OMR Optical Mark Reader
OOP Object Oriented Programming
OSS Open Source Software
P
PAN Personal Area Network
PC Personal Computer
PDA - Personal Digital Assistant
PDF Portable Document Format
S
SMTP Simple Mail Transfer Protocol
SQL Structured Query Language
SRAM Synchronous Random Access Memory
SNMP Simple Network Management Protocol
SIM Subscriber Identification Module
T
TCP Transmission Control Protocol
TB Tera Bytes
U
UPS Uninterrupted Power Supply
URI Uniform Resource Identifier
URL Uniform Resource Locator
USB - Uniform Serial Bus
ULSI - Ultra Large Scale Integration
UNIVAC - Universal Automatic Computer
V
VAR Variable
VGA Video Graphics Array
VSNL Videsh Sanchar Nigam Limited
VDU Visual Display Unit
W
Wi-Fi Wireless Fidelity
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access
WWW World Wide Web
WORM Write Once Read Memory
X
XHTML eXtensible Hyper text Markup Language
XML - eXtensible Markup language
ZB Zeta Byte
www.bankersadda.com
GLOSSARY
A
Access time - The amount of time it takes for
requested information to be delivered from disks
and memory.
Antivirus software - A program designed to look
for and destroy viruses that may infect the memory
of a computer or les stored on a computer.
Articial intelligence (AI) - Computer systems
that attempt to imitate human processes for
analyzing and solving problems.
Accumulator - A local storage area called a
Register, in which the result of an arithmetic or
logic operation is formed.
B
BIT - It is basic unit of computers. It has two values
1 & 0 only.
BYTE - Combination of 8 Bits.
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
J
JPEG - Joint Photographic Experts Group. A format
for storing complex graphics in compressed form.
Justication - Aligning lines of text at the left
margin, the right margin, both margins, or the
centre. Text aligned at both margins is considered
fully justied.
K
Keyboard - The device used to enter information
M
Macro virus - A type of virus that attaches itself to
documents or word processing templates.
Malware - Software that disrupts normal
computer functions or sends a users personal data
without the users authorization.
Memory - The part of a computer that stores
information.
Memory Cell - A circuit in memory that represents
a single bit of information.
Mass Storage - Storage systems that provide
access to hundreds of billions of bytes of stored
data. They are often referred to as Archival Storage
because of the very large volumes of historical or
backup data they can store.
MIPS - An acronym derived from millions of
instructions per second. Used to measure the speed
of a processor.
Morphing - The transformation of one image into
another image.
Mobile Commerce (m-Commerce) - A form of ecommerce that has the ability to conduct monetary
transactions via a mobile device such as a cell
phone.
Mozilla - a web browser and successor to Netscape
Communicator.
Multitasking - The ability of a computer to execute
more than one program at a time.
N
NIBBLE - Combination of four bits.
Network - A system of interconnected computers.
They are of three types i. e. LAN, MAN, WAN.
Network Interface Card (NIC) - This is a part of
the computer that allows it to talk to other
computers via a network protocol like TCP/IP.
Node - A computer which is attached to the
network. Each node has its own address on the
network so that it can be uniquely identified and
can communicate with other nodes on the same or
different network.
O
Ofine - Refers to the state in which a computer is
temporarily
or
permanently
unable
to
communicate with another computer.
Online - Refers to the state in which a computer is
ready to communicate with other computers.
Open source software - Software that makes the
underlying source code available to all users at no
charge.
Operating system (OS) - Software that manages
the internal functions and controls the operations
of a computer.
P
Palmtop computer - A portable computer smaller
than a notebook (or laptop) computer that ts on
the palm of your hand. Also called a handheld
computer.
Password - A users secret identication code,
required to access stored material. A procedure
into a computer.
Kilobyte - A measurement of the storage capacity
of a device. One kilobyte represents 1024 bytes.
L
LAN - A local area network (LAN) is a computer
network that interconnects computers within a
limited area such as a home, school, computer
laboratory, or office building, using network media.
Laptop computer - A portable computer. Also
known as a notebook computer.
Landscape Orientation The positioning of the
page so that the information is printed across the
long dimension of the page.
Liveware - It is a term to describe the human
system, opposed to hardware or software in a
computer.
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in
W
WAP - Wireless Application Protocol is a
specification for a set of communication protocol
used to allow wireless devices to access the
internet and other utilities.
Web browser - Software that permits a user with
a click of a mouse to locate, display, and download
text, video, audio, and graphics stored in a host
computer on the Web.
The most common Web browsers now in use are
Internet Explorer, Google Chrome and Mozilla
Firefox.
Web site - One or more related pages created by
an individual or an organization and posted on the
World Wide Web.
www.bankersadda.com
www.careerpower.in
www.careeradda.co.in