You are on page 1of 24

COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

COMPUTER CAPSULE SBI PO/CLERK MAINS 2016


Dear Readers,
We are presenting you the Computer Capsule. Because the SBI clerk mains tend to be held in the end of this month so
as per our commitments towards the needs of every student, this capsule contains all the important facts and details that can
be asked in the Upcoming SBI clerk exam. We are starting this with the introduction of the Syllabus. Let us begin now :

Syllabus of The Computer Section operations, it can accept data, store data, retrieve data and
1. Fundamentals of the Computer : print data.
i) Hardware and Software Charles Babbage was known as father of computer. He
ii) Memory and Memory Units invented two machines in 1822 introduced Difference
iii) Number System Engine and in 1834, introduced Analytical engine.
2. Internet ENIAC was the first digital computer and it was invented
3. Microsoft Office (MS-Office) by J.Presper Eckert and John Mauchly at the university
4. Networking of Pennsylvania and began construction in 1943. It uses
5. DBMS (Database Management System) 18000 vacuum tubes as a storing device.
6. Full Forms/Abbreviations and Important Terms MIT introduces the whirlwind machine (first computer
7. Shortcut Keys with RAM)on march 8 1955.
8. Miscellaneous (Latest in Computers and Mobile First computer company was founded by J. Presper Eckert
Technology) and John Mauchly, initially named Electronic Controls
Computer i.e. a combination of two words “compute” company, later changed to The Eckert–Mauchly
+”er”. Compute means calculation and “er” means a device. Computer Corporation (EMCC) and released a series of
It can perform all type of mathematical and logical mainframe computer under the name of UNIVAC.

Hybrid computer used the combined feature of analog and


digital machine. you can see hybrid computer in geological
departments.
Microcomputer these are small relatively inexpensive
computer designed for personal and office use. It has lowest
storing and processing speed. These can be laptop or
desktop.
Minicomputer powerful as compare to microcomputer it
has higher memory provide faster operating speeds and
large storage capacities than microcomputers. It can be used
as a server and capable of supporting from 2 to 200 users.
Analog computer introduced by Lord Kelvin. Numerical Mainframe computer it has very high memory and
data are represented by measurable physical variables such processing speed and used as a server (can support
as electrical voltage. A thermometer is a simple analog thousands of users)
computer. Super computer can be used for complex type of application
Digital computer that accepts and process data in the form i.e. specific research, weather forecasting, Weapon designing
of numbers and all the character are converted into binary etc…..
code PARAM-8000 India’s first super computer developed by C-
ASCII code (American Standard Code for Information DAC pune in 1998.
Interchange) use as a standard to assign a numerical value to Tianhe-2 is china’s super computer and considered as
each character world’s fastest super computer.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


1
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

Shasra T is considered as India’s fastest super computer of Browser are program which installed on the user’s
India manufactured by Indian Institute of science. computer and help him to communicate or send request on
Server are dedicated computers that serve the needs or the network. In others word it help to access the internet.
request of other programs or computer.

Generation of computer hardware

Subject 1st generation 2nd generation 3rd generation 4th generation 5th generation
Period 1940-1956 1956-1963 1964-1971 1971-present present & beyond
Circuitry Vacuum tube Transistor Integrated chips Microprocessor (VLSI) ULSI (Ultra Large
(IC) Scale Integration)
technology
Memory Capacity 20 KB 128KB 1MB Semiconductor type VLSI and ULSI
and very high
Processing Speed 300 IPS inst. Per 300 IPS 1MIPS (1 million Faster than 3rd Very fast
sec. inst. Per sec.) generation
Programming Assembly High level C,C++ C,C++,Java All the Higher level
Language Language language languages,
(FORTRAN, Neural networks,
COBOL, ALGOL)
Example of UNIVAC, IBM 1401, IBM IBM 360 series, Pentium series Artificial
computers EDVAC 7094, CDC 3600, D 1900 series Multimedia, Intelligence,
UNIVAC 1108 Stimulation Robotics
ALGOL – Algorithm language. The mechanical, magnetic, electronic and electrical
COBOL- Common Business Oriented language components that comprises a computer system such as the
Computer fundamentals: Central Processing Unit (CPU), monitor, keyboard, etc. is
The device which is used with a computer to display or store known as Hardware.
data is called Peripherals.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


2
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

The data that is fed into a computer processor received into Drag and Drop refers to the action of clicking and holding
the computer by a keyboard or other sources is called Input down the mouse button, while moving the mouse and then
Examples of input devices include keyboards, mouse, releasing the mouse button.
scanners, digital cameras and joysticks
The first computer mouse was invented by Douglas
A keyboard is a typewriter-style device, which uses an Engelbart.
arrangement of buttons or keys, to act as mechanical levers
or electronic switches. Joystick is the device that moves in all directions and
controls the movement of a pointer.
Most of the commonly available personal computers have a
keyboard, popularly known as Qwerty. A Touch Screen is a type of display screen device that is
The keys labeled Fl to F12 on the keyboard are called placed on the computer monitor to allow direct selection or
Function Keys. activation of the computer when the user touches the screen.

The keys include the letter keys (0, 1, 2, ..., 9; A, B, Z), which Light Pen is the pen shaped device, which can sense light
are generally laid out in the same style as in typewriters are and is used to point at spots on a video screen.
known as Alphanumeric Keys.
A technology enables a high-speed reading of large
'Caps lock' and 'Num lock' keys are called as Toggle Keys quantities of data and transferring these data to the
because when pressed, they change their status from one computer without using a keyboard. It is referred as Optical
state to another. Mark Reader (OMR).

Numeric Keypad is a keypad located on the right hand side It uses a beam of light that is reflected on the paper with
of the keyboard. It consists of digits and mathematical marks, to capture presence and absence of marks.
operators. MICR reads the characters by examining their shapes in a
matrix form and the information is then passed `on to the
A Modifier key is a special key (or combination) on a computer. MICR stands for Magnetic Ink Character
computer keyboard that temporarily modifies the normal Reader. It provides a high level of security and is therefore
action of another key when pressed together. By themselves, used by the banking industry for faster processing of the
modifier keys usually do nothing; that is, pressing any of the cheques
Shift, Alt, or Ctrl keys alone does not (generally) trigger any
action from the computer. It is a machine readable code, which is represented by
parallel vertical lines with varying widths. For reading these
A Mouse is the most popular input device which is used bar-coded data, a device is used, which is known as a Bar
today for interactive processing and for the one line entry of Code Reader (BCR)
data for batch processing.
Optical Character Recognition (OCR) is used to scan the
document containing text. It is the mechanical or electronic
conversion of scanned or photographed images of
typewritten or printed text into machine-
encoded/computer-readable text.

A computer is an electronic device that accepts data from the


user (input), processes the data by performing calculations
and operations on it and generates the desired Output.

An output device is any piece of computer hardware


equipment used to communicate the results of data
processing carried out by an information processing system
(such as a computer) which converts the electronically
generated information into human-readable form

The printed form of output is referred as Hard Copy.


The form of output displayed on the screen is referred as
Soft Copy.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


3
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

The device that prints information from the computer onto The set of instructions, which control the sequence of
the paper is Printer. operations, are known as Program. It is a sequence of
Pages Per Minute (PPM) is the unit used to count the speed instructions, written to perform a specified task with a
of the printer. computer.
On the basis of technology, printers are categorized into Application software is a group of program designed
Impact and Non- Impact Printers. for fulfill the demand of end user i.e. MS office.
System software is a program which is created for the
Impact printers create an image by using some mechanism system and to make the system user friendly such as
to physically press an inked ribbon against the page, causing operating system or is a type of computer program that is
the ink to be deposited on the page in the shape desired. designed to run a computer's hardware and application
a) Dot matrix: The dot-matrix printer uses programs.
print heads containing from 9 to 24 pins. These pins Utility software designed to help analyze, configure,
produce patterns of dots on the paper to form the optimize or maintain a computer such antivirus software.
individual characters Operating system is a set of programs that help in
b) Daisy wheel: A hammer strikes a “petal” containing a controlling and managing the hardware and the software
character against the ribbon, and the character prints on resources of a computer system. Main functions of operating
the paper. Its speed is slow typically 25-55 characters system are :-
per second.  Process management
c) Line printer:- Line printers, or line-at-a-time printers,  Memory management
use special mechanism that can print a whole line at  File ,management
once; they can typically print the range of 1,200 to 6,000  Security
lines per minute  Command and interpretation.
d) Drum printer:- A drum printer consists of a solid,  Resource allocation
cylindrical drum that has raised characters in bands on
its surface. The number of print positions across the Types of OS.
drum equals the number available on the page. 1) Batch operating system data and program that need to
e) Chain printer:- A chain printer uses a chain of print be processed are bundled and collected as a batch and
characters wrapped around two pulleys executed together.
f) Band printer:- Band printer has a steel 2) Multiprogramming operating system it allows the
band divided into five sections of 48 characters each. instruction and data from two or more separate process
Non – Impact Printers do not touch the paper when to reside in primary simultaneously. Multiprogramming
creating an image. system are multitasking multiuser and multiprocessing
A) Ink-jet printers:- One or more nozzles in the print head operating system.
emit a steady stream of ink drops. Droplets of ink are 3) Single user it is designed for single user and a single
electrically charged after leaving the nozzle. The person use it at a time i.e. DOS window’s 95 etc.
droplets are then guided to the paper by electrically 4) Distributed operating system which manages a
charged deflecting plates collection of independent computers and makes them
B) Laser printers:- Laser printers use buffers that store an appear to the user of the system as a single computer.
entire page at a time. When a whole page is loaded, it 5) Real Time Operating System (RTOS) It is a computing
will be printed. environment that reacts to input within a specific time
C) Thermal printer:- is a digital printing process which period. It is used at those Places in which we Requires
produces a printed image by selectively heating coated higher and Timely Response.
thermo chromic paper, or thermal paper as it is
commonly known, when the paper passes over the
thermal print head.
A pen based output device, attached to a computer for
making vector graphics, that is, images created by a series of
many straight lines is known as Plotters.
The number of pixels displayed on a screen is known as
Resolution.
A Monitor is a TV-like display attached to the computer on
which the output can be displayed and viewed. It can either
be a monochrome display or a color display.

A set of instructions that tells the computer about the tasks


to be performed and how these tasks are to performed, is
known as Software.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


4
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

An Arithmetic Logic Unit (ALU) is a digital circuit that Interpreter converts high level language program into
performs integer arithmetic and logical operations. The ALU machine language. It is very slow because it convert program
is a fundamental building block of the central processing unit line by line.
of a computer Compiler it also translate the program from high level
Control Unit is responsible for controlling the overall language to machine language. It is very fast because it
operations of computer. It coordinates the sequence of convert the whole program into machine language.
execution of instructions and controls the overall functioning
of the computer. Assembler It is used for converting the code of low level
language (assembly language) into machine level language.
Instruction Execution: the program which is to be executed
is a set of instruction which are stored in memory. The CPU Low level language these are coded in a form which is easy
executes the instructions of program to complete a task and to understand by the processor.
this execution takes place inside the CPU with the help of
registers ALU(arithmetic logic unit) and CU(control unit). Machine language it is also a type of low level language
When the processor executes instructions, data is these can be develop in binary language (0 and 1) .
temporarily stored in small local memory location and these
are called registers ….. Assembly language it is also a type of low level language
Accumulator Register:- which stores the immediate result and using the human readable instruction of the CPU. It is
of arithmetic and logical operations. written as ‘MOV A.’
Memory address register (MAR) :- which contain the
address of memory location to which data is to be stored. High level language programmer can write code in simple
Program counter :- which contain the address of the next easy language, it is user friendly
instruction to process.
C language it is a middle level programming language and
Instruction register:- which contain the current instruction also known as procedural language
being processed C++ high level language uses the oops concept.
A Software instructs the computer what to do and how to Fortran it is known as formula translation .it is used for
do it. It is a set of instructions that tells the computer about scientific application
the tasks to be performed and how these tasks are to
performed COBOL (Common Business Oriented Language) used for
An unprocessed collection or representation of raw facts record keeping and data management in business
represented in a manner suitable for communication, organizations.
interpretation or processing by humans or by automatic BASIC (Beginner’s All Purpose Symbolic Instruction
means, is known as Data. Code) first language designed for non-professional
Personal computers use a number of chips mounted on a programmers.
main circuit board called Motherboard. PASCAL it is developed as a teaching tool for programming
The CPU is fabricated as a single Integrated Circuit (IC) concepts
chip. It is also known as the Microprocessor.

Multiprocessing is the use of two or more central


processing units (CPUs) within a single computer system.
The term also refers to the ability of a system to support
more than one processor and/or the ability to allocate tasks
between them

Program execution in computers:


Language processor (Translator) programmer write their
program in one of the high level language because it is much
easy to code in these language but computer does not
understand any of these language so it is necessary to
convert program into a machine language so translator do
this work.
Loader it load the code which is translated by translator into
the main memory and makes it ready to execute.
Linker is used to combine all the object files and convert
them into a final executable program.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


5
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

MEMORY MANAGEMENT

storage capacity compared to main memory. The hard disk is


8 bit 1 byte usually contained inside the case of a computer.
1024 B 1 KB (Kilo Byte) Read-only memory (ROM) is a storage medium used in
computers and other electronic devices. Data stored in ROM
1024 KB 1 MB (Mega Byte)
can only be modified slowly or with difficulty, or not at all.
1024 MB 1 GB (Giga Byte) ROM is non-volatile and the contents are retained even after
1024 GB 1 TB (Tera Byte) the power is switched off.
1024 TB 1 PB (Peta Byte) It only allows reading.
1024 PB 1 EB (Exa Byte) The types of ROM include PROM, EPROM and EEPROM.
1024 XB 1 ZB (Zeta Byte) Random Access Memory (RAM), allows the computer to
1024 ZB 1 YB (Yota Byte) store data for immediate manipulation and to keep track of
Primary memory what is currently being processed.
Primary storage, also known as main storage and it is the RAM is referred to as volatile memory and is lost when the
area in a computer in which data is stored for quick access power is turned off.
by the computer's processor. The terms random access It also known as read/write memory as information can be
memory (RAM) and memory are often as synonyms for read from and written onto it.
primary or main storage. Primary storage is volatile and can The two main types of RAM are static RAM and dynamic
be contrasted with non-volatile secondary storage, also RAM.
known as auxiliary storage.
Cache memory is a smaller, faster memory which stores SRAM retains data as long as power is provided to the
copies of the data from frequently used main memory memory chip and need not be refreshed periodically. It is
locations. A CPU cache is a hardware cache used by the often used as CPU Cache memory. SRAM stands for Static
central processing unit (CPU) of a computer to reduce the Random Access Memory.
average time to access data from the main memory.
Secondary memory is where programs and data are kept The data on DRAM continues to move in and out of the
on a long-term basis. Common secondary storage devices are memory as long as power is available and must be
the hard disk and optical disks. The hard disk has enormous continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
6
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

Virtual memory is memory on the hard disk that the CPU 6 0110 006 6
uses as an extended RAM 7 0111 007 7
8 1000 010 8
9 1001 011 9
10 1010 012 A
11 1011 013 B
12 1100 014 C
13 1101 015 D
14 1110 016 E
15 1111 017 F

INTERNET
The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite
(TCP/IP) to link several billion devices worldwide.
It is a network of networks that consists of millions of
Access Time Storage Cost per bit private, public, academic, business, and government
Capacity of storage networks, of local to global scope, that are linked by a broad
Primary Faster Smaller High array of electronic, wireless, and optical networking
memory technologies.
Secondary Slower Higher Low ARPANET adopted TCP/IP in 1983, and from there
memory researchers began to assemble the “network of networks”
that became the modern Internet.
Memory can also be categorized on the basis of their The World Wide Web (abbreviated as WWW or W3,
material commonly known as the Web) is a system of interlinked
Semiconductor memory: such as RAM, ROM, EPROM, and hypertext documents that are accessed via the Internet.
flash memory.
Magnetic memory:-such as hard disk, floppy disk and A Website is a set of related web pages served from a single
magnetic tapes. web domain.
Optical memory:-such as computer disk, DVD and blue-ray
disk. A Home page, index page, or main page is a page on a
A bus, in computing, is a set of physical connections (cables, website. A home page usually refers to:
printed circuits, etc.) which can be shared by multiple  The initial or main web page of a website, sometimes
hardware components in order to communicate with one called the "front page" (by analogy with newspapers).
another.  The first page that appears upon opening a web browser
The address bus (sometimes called the memory bus) program, which is also sometimes called the start page.
transports memory addresses which the processor wants to This 'start page' can be a website or it can be a page with
access in order to read or write data. It is a unidirectional various browser functions such as the visual display of
bus. websites that are often visited in the web browser.
The data bus transfers instructions coming from or going to  The web page or local file that automatically loads when a
the processor. It is a bidirectional bus. web browser starts or when the browser's "home" button
The control bus (or command bus) transports orders and is pressed; this is also called a "home page". The user can
synchonisation signals coming from the control unit and specify the URL of the page to be loaded, or alternatively
travelling to all other hardware components. It is a choose e.g. to re-load the most recent web page browsed.
bidirectional bus, as it also transmits response signals from  A personal web page, for example at a web hosting
the hardware. service or a university web site that typically is stored in
Number System the home directory of the user.
A Hyperlink is a reference to data that the reader can
Decimal, Binary, Octal and Hexadecimal directly follow either by clicking or by hovering or that is
Equivalents followed automatically
Decimal Binary Octal Hexadecimal
0 0000 000 0 A web browser (commonly referred to as a browser) is a
1 0001 001 1 software application for retrieving, presenting and
2 0010 002 2 traversing information resources on the World Wide Web.
3 0011 003 3
4 0100 004 4 Some of the famous browsers are Safari, Chrome, Firefox,
5 0101 005 5 Bolt, UC Browser and Internet Explorer
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
7
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

The Uniform Resource Locator, abbreviated as URL is a Simplex: This, communication is unidirectional i.e. one of
specific character string that constitutes a reference to a the two devices can transmit the data and the other can only
resource. In most web browsers, the URL of a web page is receive the data. For e.g. Radio broadcasting, television
displayed on top inside an address bar. broadcasting etc.
(i) An example of a typical URL would be
"http://www.bankersadda.com". Half duplex: This communication is bidirectional. Either of
Here the domain name is ‘bankersadda.com’ the devices can act as transmitter or receiver but only one
device can transmit the data at one time. For e.g. Walkie-
Downloading means to receive data to a local system from a Talkie.
remote system or to initiate such a data transfer
Full Duplex: Here the communication is in both directions
Uploading refers to the sending of data from a local system and both the devices can simultaneously transmit the data.
to a remote system such as a server or another client with For e.g. Telephone conversation.
the intent that the remote system should store a copy of the
data being transferred Different types of network are: LAN, MAN and WAN.
A LAN (local area network) is a group of computers and
An Internet Protocol address (also known as an IP network devices connected together, usually within the same
address) is a numerical label assigned to each device (e.g., building. By definition, the connections must be high speed
computer, printer) participating in a computer network. It and relatively inexpensive (e.g., token ring or Ethernet).
acts as an identifier for a computer. It is a unique address for A MAN (metropolitan area network) is a larger network that
every computer. usually spans several buildings in the same city or town.
A WAN (wide area network), in comparison to a MAN, is not
An email attachment is a computer file sent along with an restricted to a geographical location, although it might be
email message. One or more files can be attached to any confined within the bounds of a state or country. A WAN
email message, and be sent along with it to the recipient. connects several LANs, and may be limited to an enterprise
(a corporation or an organization) or accessible to the public.
Hotmail was co-founded by an Indian American The technology is high speed and relatively expensive. The
entrepreneur Sabeer Bhatia along with Jack Smith in July of Internet is an example of a worldwide public WAN.
1996
Networking Devices
CC (Carbon Copy) in e – mail indicates those who are to Modem: Modem stands for Modulator-Demodulator. It is
receive a copy of a message addressed primarily to another. used to connect computers for communication via telephone
The list of CC recipients is visible to all other recipients of the lines.
message. Hub: It works at the Physical layer. It just acts like a
connector of several computers i.e. simply connects all the
An additional BCC (blind carbon copy) field is available for devices on its ports together. It broadcasts all the data
hidden notification; recipients listed in the BCC field receive packets arriving at it with no filtering capacity.
a copy of the message, but are not shown on any other
recipient's copy (including other BCC recipients)

The Drafts folder retains copies of messages that you have


started but are not yet ready to send.
The first email was sent by Ray Tomlinson to himself in
1971.

DATA COMMUNICATION & NETWORKING


Data Communication deals with the transmission of digital
data from one device to another. Data is transferred through
a pathway called as communication channel which can be
physical wire connecting the devices or may be unguided
media like laser, microwave etc.
A communication channel has a source or transmitter at one
side and a designation or receiver at another side of the Switch: It works at the Data Link Layer. It is used for
network. The source of data origination is single but there dividing a network into segments called subnets. It provides
may be multiple receivers. A communication channel is of 3 filtering of data packets and prevents network traffic also.
types:

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


8
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

Repeater: It operates at the Physical Layer. It is used to There are 4 octet and in a octet 8 bit are present. now
amplify a signal that has lost its original strength so as to convert this into decimal which is equals to = 2 to the power
enable them to travel long distances. It can only join the 8
networks that transmit similar data packets. It does not have = 256 numbers
filtering capacity i.e. all data including noise is amplified and And if we count these from 0 so range is 0 to 255.
passed on in the network so don’t help in reducing network For class A range = 256/2
traffic. = 128
So range is 0 to 127.
Router: It works at the Network Layer and is used to For Class B range is starts from 128 because 127 is assigned
connect different networks that have different architectures to class A.
and protocols. It sends the data packets to desired Now the remaining numbers are 128
destination by choosing the best path available thus reducing For B class we can assign 128/2 = 64 numbers , add this to
network traffic. It routes the data packets using the routing final range of A
table that contains all the Information regarding all known =127+64 = 191
network addresses, possible paths and cost of transmission So class B range starts from 128 to 191
over them. Availability of path and cost of transmission Same process is apply for class C its range starts from 192.
decide sending of data over that path. It is of 2 types: static Now the remaining numbers are 64, so we can assign
(manual configuration of routing table is needed) and 64/2=32 numbers to class C
dynamic (automatically discovers paths). Class C final range is 192+32=223

Gateway: It operates in all the layers of the network Now the remaining 32 numbers are divided equally between
architecture. It can be used to connect two different D and E that is each class D and E have 16 numbers and these
networks having different architectures, environment and class are reserved for further use.
even models. It converts the data packets in form that is Class D –224 to 239(223+16=239)
suitable to the destination application. The two different Class E – 240 to 255(239 +16=255).
networks may differ in types of communication protocols
they use, language, data formats etc. INFORMATION SECURITY

Bridge: They are used two connect two LANs with the same A Computer Virus is a computer program or code that can
standard but using different types of cables. It provides an replicate itself and spread from one computer system to
intelligent connection by allowing only desired messages to another system. A computer virus has the capacity to corrupt
cross the bridge thus improving performance. It uses or to delete data on your computer and it can utilize an e-
physical addresses of the packets for this decision. It works mail program to spread the virus to other computer systems
on .In the worst case scenario, it can even delete everything on
your hard disk .The purpose of it is to disrupt the operation
IPv4 - 32 bits numeric address of the computer or the program.
IPv6 - 128 bits hexadecimal address
Some examples of Computer Virus are Trojan viruses.
IP addresses divide into 5 classes. the various classes of Stealth viruses, worms, malware (malicious software),
networks specify. Ipv4 have 4 octets. These designate the Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word
network id and host id. Concept, etc.
Class 1st octet 2nd octet 3rd octet 4th octet
Class A Net id Host id Host id Host id Malware, short for malicious software, is any software
Class B Net id Net id Host id Host id used to disrupt computer operation, gather sensitive
Class C Net id Net id Net id Host id information, or gain access to private computer systems. It
Class A range starts from 0.0.0.0 to 127.2555.255.255 can appear in the form of executable code, scripts, active
(starting binary digit 0) content, and other software.
Class B range starts from 128.0.0.0 to
191.255.255.255(starting binary digit 10) Antivirus Software is used to scan the hard disk to remove
Class C range starts from 192.0.0.0 to the virus from them. Some of the famous anti – viruses
223.255.255.255(starting binary digit 110) available are Avast, Norton, Avira, Kaspersky, AVG, etc.
Class D range starts from 224.0.0.0 to A person who uses his or her expertise to gain access to
239.255.255.255(starting binary digit 1110) other people’s computers to get information illegally or do
Class E range starts from 240.0.0.0 to damage is a Hacker.
255.255.255.255(starting binary digit 1111) Authorization is the function of specifying access rights to
resources related to information security and computer
TRICK TO LEARN THESE RANGES

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


9
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

security in general and to access control in particular. More A logic gate is an elementary building block of a digital
formally, "to authorize" is to define an access policy. circuit. Most logic gates have two inputs and one output. At
any given moment, every terminal is in one of the two binary
Authentication is the act of confirming the truth of an conditions low (0) or high (1)
attribute of a single piece of data or entity. It might involve There are seven basic logic gates:
confirming the identity of a person by validating their  AND
identity documents, verifying the validity of a website with a  OR
digital certificate, tracing the age of an artifact by carbon  XOR
dating, or ensuring that a product is what its packaging and  NOT
labeling claim to be. In other words, Authentication often  NAND
involves verifying the validity of at least one form of  NOR
identification.  XNOR
Phishing is the attempt to acquire sensitive information
such as usernames, passwords, and credit card details (and
sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.

A Spoofing attack is a situation in which one person or


program successfully represents oneself as another by
falsifying data and thereby gaining an illegitimate advantage.

The Open Systems Interconnection model (OSI) is a


conceptual model that characterizes and standardizes the
internal functions of a communication system by partitioning
it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International
Organization for Standardization (ISO).

Seven layers of OSI Model are:


 Application Layer
 Presentation Layer
 Session Layer
 Transport Layer
 Network Layer
 Data link Layer
 Physical Layer

Network topology is the arrangement of the various


elements (links, nodes, etc.) of a computer network. There DATABASE MANAGEMENT SYSTEM
are two basic categories of network topologies:  DBMS is the acronym of Data Base Management System.
 Physical topologies and Logical topologies. DBMS is a collection of interrelated data and a set of
Physical topology is the placement of the various programs to access this data in a convenient and
components of a network, including device location and efficient way. It controls the organization, storage,
cable installation, while Logical topology illustrates how retrieval, security and integrity of data in a database.
data flows within a network, regardless of its physical  Architecture of DBMS-The generalized architecture of
design. Various types of topologies are: DBMS is called ANSI/ SPARC model. The architecture is
 Bus Topology divided into three levels:
 Star Topology  External view or user view/View Level- It is the
 Ring Topology highest level of data abstraction. This includes only
 Mesh Topology those portions of database of concern to a user or
 Tree Topology Application program. Each user has a different external
Hybrid topology use a combination of any two or more view and it is described by means of a scheme called
topologies in such a way that the resulting network does not external schema.
exhibit one of the standard topologies.  Conceptual view/Logical Level- All the database
entities and the relationship among them are included.
LOGIC GATES One conceptual view represents the entire database
called conceptual schema.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
10
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

 Internal view/Physical Level- It is the lowest level of TFTP Trivial File Transfer Protocol
abstraction, closest to the physical storage method. It SFTP Secure File Transfer Protocol
describes how the data is stored, what is the structure of SMTP Simple Mail Transfer Protocol
data storage and the method of accessing these data. It is HTTP Hyper Text Transfer Protocol
represented by internal schema. HTTPS Hyper Text Transfer Protocol Secure
 Data model: A data model is a plan for building a UDP User Datagram Protocol
database. The model represents data conceptually, the ARP Address Resolution Protocol
way the user sees it, rather than how computers store it. Tel Net Telecommunication Networking
Data models focus on required data elements and POP3 Post Office Protocol Version3
associations. BGP Border Gateway Protocol
 Entity – Relationship Model P2P Point to Point Protocol
 Relational Model PPP Peer to Peer Protocol
 Entity: A thing (animate or inanimate) of independent IP Internet Protocol
physical or conceptual existence and distinguishable. In SNMP Simple Network Management Protocol
the University database context, an individual student, NTP Network Time Protocol
faculty member, a class room, are entities. SIP Session Initiation Protocol
 Attributes DHCP Dynamic Host Configuration Protocol
Each entity is described by a set of attributes/properties. IMAP4 Internet Message Access Protocol Version 4
Types of Attributes RARP Reverse Address Resolution Protocol
SSH Secure Shell
MIME Multipurpose Internet Mail Extension
SMIME Secure MIME
ALGOL Algorithmic Language
ANSI American National Standard Institute
ATM Asynchronous Transfer Mode
AS Autonomous System
BASIC Beginners All Purpose Symbolic Instruction
Code
BIOS Basic input Output System
BPS bit Per Second
DNS Domain Name Server
EDI Electronic Data Interchange
URL Uniform Resource Locator
GIF Graphics Interchange Format
ASCII American Standard Code for Information
Interchange
 Simple Attributes: having atomic or indivisible values: ASP Active Server Pages
a string of Phone Number – an eight digit number. BCC Blind Carbon Copy
 Composite Attributes: having several components in CC Carbon copy
the value. Example: Qualification with components CAD Computer Aided Design
(Degree Name, Year, University Name) CDMA Code Division Multiple Access
 Derived Attributes: Attribute value is dependent on GSM Global System for Mobile Communication
some other attribute. Example: Age depends on Date of CMOS Complementary Metal Oxide Semi-
Birth. So age is a derived attribute. Conductor
 Single-valued: having only one value rather than a set CMYK Cyan Magenta Yellow Block
of values. For instance, Place of Birth-single string GPS Global Positioning System
value. GUI Graphical User Interface
 Multi-valued: having a set of values rather than a HDMI High Definition Multimedia Interface
single value, for instance, Courses Enrolled attribute for GIGO Garbage in Garbage Out
student Email Address attribute for student Previous LIFO Last In First Out
Degree attribute for student. Attributes can be: simple FIFO First In First Out
single-valued, simple multi-valued, composite single- PING Packet Internet Gopher
valued or composite multi-valued. HDD Hard Disc Drive
NIC Network Interface Controller/Cord
FULL FORMS & ABBREVIATIONS HDTV High Definition Television
TCP Transmission Control Protocol ISP Internet Service Provider
FTP File Transfer Protocol JPEG Joint Picture Expert Group

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


11
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

LCD Liquid Crystal Display SRAM Static RAM


LED Light Emitting Diode DRAM Dynamic RAM
TFT Thin Film Transistor PROM Programmable ROM
CRT Cathode Ray Tube EPROM Electrically PROM
MIDI Musical Instrument Digital Interface EEPROM Electrically Erasable PROM
MPEG Moving Picture Expert Group HDD Hard Disc Drive
PDA Personal Digital Assistants FDD Floppy Disc Drive
PDF Portable Document Format CD Compact Disc
ARPANET Advanced Research Projects Agency DVD Digital Video/Versatile Disc
Network BRD Blu Ray Disc
SQL Structured Query Language HVD Holographic Versatile Disc
USB Universal Serial Bus ACID Atomicity Consistency Isolation Durability
VIRUS Vital Information Resource Under Siege WYSIWYG What you see is what you get
VOIP Voice Over Internet Protocol
IVR Interactive Voice Response GLOSSARY
WIFI Wireless fidelity A
WIMAX Worldwide Interoperability for Microwave  Access time - The amount of time it takes for requested
Access information to be delivered from disks and memory.
ADSL Asymmetric Digital Subscriber Line
 Antivirus software - A program designed to look for
API Application Program Interface and destroy viruses that may infect the memory of a
ARP Address Resolution Protocol
computer or files stored on a computer.
RARP Reverse ARP
 Artificial intelligence (AI) - Computer systems that
ICANN Internet Corporation of Assign Names &
attempt to imitate human processes for analyzing and
Numbers
solving problems.
DPI Dots Per Inch
 Accumulator - A local storage area called a Register, in
DSL Digital Subscriber Line
which the result of an arithmetic or logic operation is
FAT File Allocation Table
formed.
MANET Mobile Ad-Hoc Network
MIPS Million Instruction Per Second
BIPS Billion Instruction Per Second
B
TIPS Trillion Instruction Per Second
 BIT - It is basic unit of computers. It has two values 1 & 0
NAT Network Address Translation
only.
IEEE Institute of Electrical and Electronic
Engineer  BYTE - Combination of 8 Bits.
IMAP Internet Message Access Protocol  Basic Input Output System (BIOS) - Also known as
ISDN Integrated Servers Digital Network ROM BIOS. It provides an abstraction layer for the
ISO International Standard Organization/ hardware, i.e., a consistent way for application programs
International Org for Standardization and operating system to interact with input/output
DHTML Dynamic Hyper Text Markup Language devices.
MAC Media Access Control  Bug - A software bug is an error, flaw, failure, or fault in
CAN Campus Area Network a computer program or system produces an incorrect or
PAN Personal Area Network unexpected result.
SAN Storage Area Network  Bus - A pathway along which electronic signals travel
CNM Circulatory Network Mode between the components of a computer system.
IPV4 Internet Protocol Version 4
IPV6 Internet Protocol Version 6 C
DBMS Data Base Management System  Cookie - A packet of information that travels between a
MODEM Modulator Demodulator browser and the web server.
RAM Random Access Memory  Crash - Your computer or application no longer works
ROM Read Only Memory correctly and so you “loose” all the work you’ve done
SMPS Switch Mode Power Supply since the last time you saved.
OMR Optical Mark Reader / Recognition  Command - An instruction that causes a program or
OCR Optical Character Reader / Recognition computer to perform a function.
BCR Bar Code Reader  Cache - It is a memory storage area that keeps frequent
MICR Magnetic Ink Character Reader / use data readily available to the computer so that the
Recognition computer does not retrieve them from slow storage
PCB Printer Circuit Board devices.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


12
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

 Clock Speed - The speed of computer is measured in  Hard copy - Text or graphics printed on paper; also
clock speed. High clock speed is synonymous with high called a printout.
processing capability. It is measured in Megahertz  Hard disk - A rigid type of magnetic medium that can
(MHz). store large amounts of information.
 Column - A vertical block of cells in a table or  Hyperlink - An image or portion of text on a webpage
spreadsheet. which is linked to another webpage.
 Hub - A network device that connects multiple
D computers on a LAN so that they can communicate with
 Delete - To remove an item of data from a file or to another network and the internet.
remove a file from the disk.  Header - Repetitive information that appears at the top
 Debugging - Locating and eliminating defects in a (the head) of every page of a document.
program.  Hypertext transfer protocol (HTTP) - The protocol
 Desktop - The electronic work area on a display screen. used on the World Wide Web that permits Web clients
 Dots Per Inch (DPI) - It is defined as the measure of the (Web browsers) to communicate with Web servers
resolution of a printer and scanner, or monitor.
 Domain Name - A unique name that identifies a
particular website and represents the name of the server I
where the web pages reside.  Icons - In a graphical user interface (GUI), a small,
pictorial, on screen representation of an object, such as a
E document, program, folder or disk drive.
 Edit - To make certain changes in existing data.  Instant messaging (IM) - A chat program that lets
 Ethernet Card - A network adapter that enables a people communicate over the Internet in real time.
computer to connect to an Ethernet.  Internet protocol (IP) address - A unique set of
numbers that identifies a computer over a network.
F  Internet service provider (ISP) - An organization that
 Fax - A shortened form of the word facsimile. A copy of a provides access to the Internet for a fee.
document transmitted electronically from one machine
to another.  Intranet - A private network established by an
 File transfer protocol (FTP) - A set of guidelines or organization for the exclusive use of its employees.
standards that establish the format in which files can be Firewalls prevent outsiders from gaining access to an
transmitted from one computer to another. organization’s intranet
 Firewall - A security system usually consisting of
hardware and software that prevents unauthorized J
persons from accessing certain parts of a program,  JPEG - Joint Photographic Experts Group. A format for
database, or network. storing complex graphics in compressed form.
 Flash Memory - It is a type of non-volatile computer  Justification - Aligning lines of text at the left margin,
storage chip that can be electrically erased and the right margin, both margins, and the centre. Text
reprogrammed. It was developed by EEPROM. aligned at both margins is considered fully justified.

G K
 Gateway - A machine that links two networks using  Keyboard - The device used to enter information into a
different protocols. computer.
 Gigabyte - A measurement of the storage capacity of a  Kilobyte - A measurement of the storage capacity of a
device. One gigabyte represents 1024 megabytes. device. One kilobyte represents 1024 bytes.
 Google – search engine on the web.
 Gopher - A protocol used for locating and transferring L
information on the internet. It is an internet search tool  LAN - A local area network (LAN) is a computer network
that allows users to access textual information. that interconnects computers within a limited area such
 GUI - Graphical User Interface uses icons and menus to as a home, school, computer laboratory, or office
carry out commands such as opening files, delete files, building, using network media.
move files etc..  Laptop computer - A portable computer. Also known as
 Graphic Interchange Format (GIF) - A simple file a notebook computer.
format for pictures and photographs that are  Landscape Orientation – The positioning of the page so
compressed so that they can be sent quickly. that the information is printed across the long
dimension of the page.
H

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


13
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

 Liveware - It is a term to describe the human system,  Password - A user’s secret identification code, required
opposed to hardware or software in a computer. to access stored material. A procedure intended to
prevent information from being accessed by
M unauthorized persons.
 Macro virus - A type of virus that attaches itself to  Piracy - The illegal copying of software or other creative
documents or word processing templates. works.
 Malware - Software that disrupts normal computer  Peripherals - A connectable device that has an auxiliary
functions or sends a user’s personal data without the function outside the permanent system configuration
user’s authorization. such as plotters, printers and graphic displays.
 Memory - The part of a computer that stores  Phishing - A type of computer fraud that tries to trick
information. users into revealing their passwords and other
 Memory Cell - A circuit in memory that represents a confidential information.
single bit of information.  Pixel - A smallest picture element of a digital image. The
 Mass Storage - Storage systems that provide access to smaller the pixels, the higher the resolution.
hundreds of billions of bytes of stored data. They are  Port - An electrical connection on the computer into
often referred to as Archival Storage because of the very which a cable can be plugged so that the computer can
large volumes of historical or backup data they can store. communicate with other devices such as printer or
 MIPS - An acronym derived from millions of instructions modem.
per second. Used to measure the speed of a processor.  Protocol - A set of rules and regulations that
 Morphing - The transformation of one image into coordinates the exchange of information over the
another image. network.
 Mobile Commerce (m-Commerce) - A form of e-  Portrait orientation - Positioning paper so that
commerce that has the ability to conduct monetary information is printed across the short dimension of the
transactions via a mobile device such as a cell phone. paper.
 Mozilla - a web browser and successor to Netscape Q
Communicator.  Query - An alternate pipe form of operating system,
 Multitasking - The ability of a computer to execute which handles data in the form of messages rather than
more than one program at a time. bytes.
N  Qwerty - It is one of the standard computer keyboard,
 NIBBLE - Combination of four bits. with the character Q, W, E, R, T, Y on the top row of
 Network - A system of interconnected computers. letters on the keyboard.
They are of three types i. e. LAN, MAN, WAN. R
 Network Interface Card (NIC) - This is a part of the  Response time - The time a computer takes to execute a
computer that allows it to talk to other computers via a command.
network protocol like TCP/IP.  Retrieve - To call up information from memory or
 Node - A computer which is attached to the network. storage so that it can be processed in some way.
Each node has its own address on the network so that it  Record - A collection of all the information pertaining to
can be uniquely identified and can communicate with a particular subject.
other nodes on the same or different network.  Row - A horizontal block of cells in a table or
O spreadsheet.
 Offline - Refers to the state in which a computer is  Resolution - Measurement of the degree of sharpness of
temporarily or permanently unable to communicate a displayed image. It is defined as number of pixels per
with another computer. square inch on a computer generated display.
 Online - Refers to the state in which a computer is ready  Register - A temporary storage unit for quick, direct
to communicate with other computers. accessibility of a small amount of data for processing.
 Open source software - Software that makes the
underlying source code available to all users at no S
charge.  Save As – Give the file a name and/or store the file in a
 Operating system (OS) - Software that manages the certain place.
internal functions and controls the operations of a  Save - Tell the computer to create a file on disk that has
computer. the information you’ve put into the document.
P  Scroll bar - Allows you to move around through your
 Palmtop computer - A portable computer smaller than document.
a notebook (or laptop) computer that fits on the palm of  Shut down - To quit all applications and turn off the
your hand. Also called a handheld computer. computer.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


14
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

 Spam - unwanted repetitious messages, such as audio, and graphics stored in a host computer on the
unsolicited bulk e-mail. Web.
 Scanner - An input device that can copy a printed page The most common Web browsers now in use are
into a computer’s memory, thus doing away with the Internet Explorer, Google Chrome and Mozilla Firefox.
need to type the copy.  Web site - One or more related pages created by an
 Screen saver - A program that changes the screen individual or an organization and posted on the World
display while the user is away from the computer. Wide Web.
 Server - A computer that manages a shared resource  Wi-Fi (Wireless fidelity) - A process that permits high-
and provides a set of shared user services to the clients. speed wireless transmission of data.
 Search Engine - Software that searches, gathers and  Word processing - The electronic process of creating,
identifies information from a database based on an formatting, editing, proofreading, and printing
index, keywords or titles. documents.
 Spam - Unwanted repetitious messages, such as  Workstation - A desktop computer that runs
unsolicited bulk e-mail. applications and serves as an access point in a local area
 Soft copy - Information shown on the display screen. network.
 Sort - To arrange fields, records, or files in a Z
predetermined sequence.  Zombie - A computer that has been hijacked by a
 Surfing the Net - Browsing through various Web sites cracker without the owner’s knowledge and used to
on the Internet in search of interesting things. perform malicious tasks on the Internet.
T
 Trash - Place where you put files and folders that you
want to delete or get rid of.
 Topology - The structure of the network, including
physical connections such as wiring schemes and logical
interactions between network devices.
 Track - A ring on a disk where data can be written.
 Telnet - A protocol for remote computing on the
internet that allows a computer to act as a remote
terminal on another machine, anywhere on the internet.
 Touchpad - The device on a laptop computer that takes
the place of a mouse.
 Touch screen technology - The technology that permits
a user to perform a function simply by touching the
screen on an appropriate spot.
MICROSOFT OFFICE
U  Microsoft Office is an office suite of desktop
applications, servers and services for the Microsoft
 Uninterrupted Power Supply (UPS) - A Battery
powered backup system that provides enough electricity Windows and OS X operating systems. It was first
announced by Bill Gates of Microsoft on August 1, 1988
to a computer during a power outage so that a user can
save files before shutting down the computer. at COMDEX in Las Vegas.
 MS office primarily includes Word, Excel, PowerPoint,
 Universal Serial Bus (USB) - A common standard for
Access and Outlook. It also includes OneNote, Groove,
connecting multiple peripherals to a computer as
InfoPath and Publisher.
needed.
 Upload - To transfer information from a client computer
MS WORD
to a host computer.
V  Microsoft Word is a word processor developed by
Microsoft.
 Virus - A piece of computer code designed as a prank or
 It is used for creating, editing, formatting, storing,
malicious act to spread from one computer to another by
retrieving and printing of a text document.
attaching itself to other programs.
 Microsoft Word's native file formats are denoted either
W
by a .doc or .docx file extension.
 WAP - Wireless Application Protocol is a specification
 A Cursor is an indicator used to show the position on a
for a set of communication protocol used to allow
computer monitor or other display device that will
wireless devices to access the internet and other
respond to input from a text input or pointing device.
utilities.
 Web browser - Software that permits a user with a click
Basic Keys (Common Tasks)
of a mouse to locate, display, and download text, video,
Ctrl + N Create a new document
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
15
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

Ctrl + B Make letters bold F7 Choose the spelling command (Review tab)
Ctrl + I Make letters italic F8 Extend a selection
Ctrl + U Make letters underline F9 Update the selected fields
Ctrl + Shift+ < Decrease font size one value F10 Show key tips
Ctrl + Shift + > Increase the font size one value
F11 Go to the nest field
Ctrl + [ Decrease the font size by 1 point
F12 Choose the Save As command (Microsoft
Ctrl + ] Increase the font size by 1 point
Office Button).
Ctrl+ Spacebar Remove paragraph or character
formatting.
Ctrl + C Copy the selected text or object  Header and Footer option is used to display
Ctrl + X Cut the selected text or object information such as title and page number of the
Ctrl + V Paste text or an object document.
Ctrl + Alt + V Paste special  The bar at the top of the window that bears the name of
Alt+ Ctrl + S Split the document Window the window, is known as Title Bar.
Ctrl + Z Undo the last action  A screen element of MS Word that is usually located
Ctrl + Y Redo the last action below the title bar that provides categorized options, is
called Menu Bar.
 To create a document, we use New command at the  Auto Correct in word automatically corrects certain
menu. spelling, typing, capitalisation or grammar errors.
 Save as is used to save a document for the first time. It is  Thesaurus is used for finding a synonym for a word in
also used to change the destination of the saved file in the document.
the computer.  Word has extensive lists of bullets and numbering
 Print Preview is used to see the document before the features used for tables, lists, pages, chapters, headers,
printout is taken. footnotes, and tables of content.
 Cut and Paste options are used to move the data from
one part of the document to another. MS EXCEL
 Microsoft Excel is a spreadsheet application developed
Control Keys + Function keys by Microsoft for Microsoft Windows and Mac OS.
 It features calculation, graphing tools, pivot tables, and
Ctrl+F2 Choose the print preview command a macro programming language called Visual Basic for
(Microsoft office Button) Applications.
Ctrl+F3 Cut on the spike  The intersection of a row and column is called a Cell.
Ctrl+F4 Close the window  The cell in which we are currently working is known as
Active Cell.
Ctrl+F6 Go to the next window
 Microsoft Excel's native file formats are denoted either
Ctrl+F9 Insert an empty field by a .xls or .xlsx file extension.
Ctrl+F10 Maximise the document window  A Worksheet is made of columns and rows, wherein
columns run Vertically and rows run Horizontally.
Ctrl+F11 Lock a field  Up to Excel 2003, the standard amount of columns has
Ctrl+F12 Choose the Open command been 256 and 65,536 rows.
(Microsoft Office Button)  Excel 2007 onwards, the maximum number of rows per
worksheet increased to 1,048,576 and the number of
columns increased to 16,384.
 Portrait and Landscape options are available in
 Microsoft Excel has the basic features of all
Orientation category of Page Setup.
spreadsheets, using a grid of cells arranged in
 Alignment refers to the position of text between the
numbered rows and letter-named columns to organize
margins.
data manipulations like arithmetic operations
 Auto complete is a feature in word that
 The letter and number of the intersecting column and
automatically completes the spelling of days of the
row is the Cell Address.
week and months of the year that have more than
 Short cut key to insert a new worksheet in MS-Excel is
five letters in their names.
ALT + Shift + F1 + or F11.
 Sheet tab is the tab at the bottom of the worksheet
Function Keys window that displays the name of the worksheet.
F1 Get help or visit Microsoft office Online.  A Microsoft office document that contains one or more
F2 Move text or graphic. worksheets is known as a Workbook.
F4 Repeat the last action
F5 Choose the Go To command (Home tab). Shortcut Keys of MS-Excel
F6 Go to the nest pane or frame. Key Description
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
16
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

F2 Edit the selected cell C) It indicates whether Extended Selection mode is


F5 Go to a specific cell turned on or off
F7 Spell check selected text and/or D) None of above
document 5. What is the maximum number of lines you can set
F11 Create chart for a drop cap?
Ctrl + Shift + ; Enter the current time A) 3 B) 10
Ctrl + ; Enter the current date C) 15 D) 20
Shift + F3 Open the Excel insert function window 6. What is the default number of lines to drop for drop
Shift + F5 Bring up Find and Replace box. cap?
Ctrl + A Select all contents of the worksheet A) 3 B) 10
Ctrl + B Bold highlighted selection C) 15 D) 20
Ctrl + I Italic highlighted selection 7. What is the shortcut key you can press to create a
Ctrl + U Underline highlighted selection copyright symbol?
Ctrl + P Bring up the print dialog box to begin A) Alt+Ctrl+C B) Alt + C
printing C) Ctrl + C D) Ctrl + Shift + C
Ctrl + Z Undo last action 8. How many columns can you insert in a word
Ctrl + F9 Minimise current workbook document in maximum?
Ctrl + F10 Maximise currently selected workbook A) 35 B)63
Ctrl + F6 Switch between open C) 55 D) 65
workbooks/window 9. What is the smallest and largest font size available in
Ctrl + page up Move between Excel worksheet in the Font Size tool on formatting toolbar?
same Excel document. A) 8 and 72 B) 8 and 64
Ctrl + Page Move between Excel worksheets in the C) 12 and 72 D) None of above
Down same Excel document 10. What is the maximum font size you can apply for any
Ctrl + Tab Move between two or more open Excel character?
files A) 163 B) 1638
Alt + = Create a formula to sum all of the above C) 16038 D) None of above
cells 11. Which of the following is graphics solution for Word
Ctrl + ’ Insert the value of the above cell Processors?
into cell currently selected. A) Clipart B) WordArt
Ctrl + Arrow Move to next section to text C) Drop Cap D) All of above
key 12. The keystrokes Ctrl + I is used to
Ctrl + Space Select entire column A) Increase font size
Shift + Space Select entire row B) Inserts a line break
C) Indicate the text should be bold
Important Questions Based on Microsoft Word: D) Applies italic format to selected text

1. Pressing F8 key for three times selects 13. A character that is raised and smaller above the
A) A word B) A sentence baseline is known as
C) A paragraph D) Entire document A) Outlined B) Raised
2. What happens if you press Ctrl + Shift + F8? C) Superscript D) Subscript
A) It activates extended selection 14. What is the purpose of inserting header and footer
B) It activates the rectangular selection in document?
C) It selects the paragraph on which the insertion line is. A) To enhance the overall appearance of the document
D) None of above B) To mark the starting and ending of page
3. How can you disable extended selection mode? C) To make large document more readable
A) Press F8 again to disable D) To allow page headers and footers appear on
B) Press Del to disable document when printed
C) Press Esc to disable 15. Which of the following function key activates the
D) Press Enter to disable speller?
4. What does EXT indicator on status bar of MS Word A) F5 B) F7
indicate? C) F9 D) Shift + F7
A) It indicates whether the external text is pasted on 16. The minimum number of rows and columns in MS
document or not Word document is
B) It indicates whether extended add-ons are installed A) 1 and 1 B) 2 and 1
on MS Word or not C) 2 and 2 D) None of above
17. Thesaurus tool in MS Word is used for

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


17
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

A) Spelling suggestions B) Grammar options A) Tab stop buttons B) View buttons


C) Synonyms and Antonyms words C) Split buttons D) Indicators
D) All of above 29. Which file starts MS Word?
18. Why Drop Caps are used in document? A) Winword.exe B) Word.exe
A) To drop all the capital letters C) Msword.exe D) Word2003.exe
B) To automatically begin each paragraph with capital 30. How many ways you can save a document?
letter A) 3 B) 4
C) To begin a paragraph with a large dropped initial C) 5 D) 6
capital letter 31. If you want to keep track of different editions of a
D) None of above document which features will you use?
19. A bookmark is an item or location in document that A) Editions B) Versions
you identify as a name for future reference. Which of C) Track Change D) All of above
the following task is accomplished by using 32. Background color or effects applied on a document
bookmarks? is not visible in
A) To add anchors in web page A) Web layout view B) Print Layout view
B) To mark the ending of a paragraph of document C) Reading View D) Print Preview
C) To quickly jump to specific location in document 33. What is a portion of a document in which you set
D) To add hyperlinks in webpage certain page formatting options?
20. A word processor would most likely be used to do A) Page B) Document
A) Keep an account of money spent C) Section D) Page Setup
B) Do a computer search in media center 34. Borders can be applied to
C) Maintain an inventory A) Cells B) Paragraph
D) Type a biography C) Text D) All of above
21. Which of the following is not valid version of MS 35. Which of the following is not a type of page margin?
Office? A) Left B) Right
A) Office XP B) Office Vista C) Center D) Top
C) Office 2007 D) None of above 36. What is the default left margin in Word 2003
22. You cannot close MS Word application by document?
A) Choosing File menu then Exit submenu A) 1" B) 1.25"
B) Press Alt+F4 C) 1.5" D) 2"
C) Click X button on title bar 37. What is gutter margin?
D) From File menu choose Close submenu A) Margin that is added to the left margin when printing
23. The key F12 opens a B) Margin that is added to right margin when printing
A) Save As dialog box C) Margin that is added to the binding side of page
B) Open dialog box when printing
C) Save dialog box D) Close dialog box D) Margin that is added to the outside of the page when
24. What is the short cut key to open the Open dialog printing
box?
A) F12 B) Shift F12 38. Portrait and Landscape are
C) Alt + F12 D) Ctrl + F12 A) Page Orientation B) Paper Size
25. A feature of MS Word that saves the document C) Page Layout D) All of above
automatically after certain interval is available on 39. If you need to change the typeface of a document,
A) Save tab on Options dialog box which Tab will you choose?
B) Save As dialog box A) References B) View
C) Both of above C) Format D) Insert
D) None of above 40. Which of the following is not a font style?
26. Where can you find the horizontal split bar on MS A) Bold B) Italics
Word screen? C) Regular D) Superscript
A) On the left of horizontal scroll bar 41. What happens when you click on Insert >> Clip Art
B) On the right of horizontal scroll bar A) It inserts a clipart picture into document
C) On the top of vertical scroll bar B) It lets you choose clipart to insert into document
D) On the bottom of vertical scroll bar C) It opens Clip Art taskbar
27. Which of the following is not available on the Ruler D) None of above
of MS Word screen? 42. Which option is not available in Insert Table Auto fit
A) Tab stop box B) Left Indent behavior?
C) Right Indent D) Center Indent A) Fixed Column Width B) AutoFit to Contents
28. What is place to the left of horizontal scroll bar? C) Autofit to Window D) Autofit to Column

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


18
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

43. To autofit the width of column A) Regret B) Subdual


A) Double click the right border of column C) We regret to inform you that your submission has
B) Double click the left border of column been declined
C) Double click the column header D) 11
D) All of above 53. If you want to convert a symbol or several lines of
44. From which menu you can insert Header and Footer? text into an AutoCorrect entry, you should:
A) Insert Menu B) View Menu A) Insert the symbol or type the text in a Word
C) Format menu D) Tools Menu document first. Then, select the text or symbol and
45. After typing header text, how can you quickly enter go to the AutoCorrect dialog box.
footer text? B) Click the Tools menu and choose AutoCorrect
A) Press Page Down key and type the text for footer Options. Then, click the Insert menu and choose Symbol
B) Click on Switch between Header & Footer then (or click the Format menu and choose Paragraph) to add
type the text the symbol or paragraph to AutoCorrect.
C) Both of above D) None of above C) AutoCorrect can only accommodate one line of text. It
46. When inserting Page number in footer it appeared 1 is not possible to convert a symbol or multiple lines of
but you wish to show ‘a.’ How can you do that? text into an AutoCorrect entry.
A) From format menu choose bullets and Numbering D) Insert the symbol or type the text in a Word
and configure necessary setting document first. Then, select the text or symbol and click
B) From Insert menu choose Page Number and specify the Edit menu followed by Paste Special. Select New
necessary setting AutoCorrect Entry and then click OK.
C) Click on Page Number Format tool and specify 54. AutoCorrect was originally designed to replace
required setting _________ words as you type.
D) All of above A) Short, repetitive B) Grammatically incorrect
47. Which of the following statement is false? C) Misspelled words D) None of the above
A) You can set different header footer for even and odd 55. Which of the following is the second step in creating
pages a macro?
B) You can set different page number formats for A) Start recording
different sections B) Using your mouse or keyboard, perform the task you
C) You can set different header footer for first page of a want to automate
section C) Assign a keyboard shortcut to the macro
D) You can set different header and footer for last D) Give the macro a name
page of a section 56. If you will be displaying or printing your document
48. Where can you change the vertical alignment? on another computer, you’ll want to make sure and
A) Formatting toolbar B) Paragraph dialog box select the _____________ option under the ‘Save’ tab.
C) Page Setup dialog box D) Standard toolbar A) Embed Fonts B)Embed True Type
49. To get to the ‘Symbol’ dialog box, click on the ______ Fonts
menu and choose ‘Symbol’. C) Save True Type Fonts D) Save Fonts
A) Insert B) Format 57. In Word, the mailing list is known as the ____________.
C) Tools D) Table A) Data sheet B) Source
50. Which of the following symbol sets would be most C) Data source D) Sheet
likely to contain a mathematical symbol such as a
degree sign, greater than or equal to, or a Greek 58. Which of the following is not one of the three ‘Mail
letter? Merge Helper’ steps?
A) Wingdings B) Wingdings 3 A) Merge the two files
C) Webdings D) Symbol B) Create the main document
51. When assigning a shortcut key to a symbol, you C) Set the mailing list parameters
should always try to select a key or key combination D) Create the data source
that is: 59. Which of the following button will allow you to add,
A) Unassigned delete, or change records in your Data Source?
B) Located on the ten-key pad section of your keyboard. A) ‘Data Source’ button
C) Assigned to another task. B) ‘Edit’ button
D) From the same font family as the symbol. C) ‘Edit Data Source’ button
52. Suppose you wanted to create an AutoCorrect entry D) ‘Data editing’ button
that would type the words ‘We regret to inform you 60. It is possible to _______ a data source before
that your submission has been declined’ of the performing a merge.
following choices, which would be the best name you A) Create B) Modify
could assign to this entry? C) Sort D) all of the above

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


19
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

61. What is the default font size of a new Word A) By pressing Ctrl + ] B) By pressing Ctrl + [
document based on Normal template? C) By pressing Ctrl + } D) By pressing Ctrl + {
A) 10 pt B) 12 pt 72. Which of the following line spacing is invalid?
C) 14 pt D) None of above A) Single B) Double
62. What is the default font used in MS Word document? C) Triple D) Multiple
A) Times New Roman B) Arial 73. How can you apply exactly the same formatting you
C) Algerian D) Preeti did to another text?
63. Which tab in Font dialog box contains options to A) Copy the text and paste in new location. Then type the
apply font effects? new text again.
A) Font tab B) Character Spacing B) Copy the text and click on Paste Special tool on new
C) Text Effects D) Standard Toolbar place
64. If you need to double underline a word, how will you C) Select the text then click on Format Painter and
do that? select the new text
A) Go to Format menu and then Font option. Open D) All of above
Underline Style and choose Double Underline 74. What should you do if you require pasting the same
B) From Format menu choose Font option and then from format in many places?
Font tab open Underline Style and select Double A) Click the Format painter and go on pasting in many
Underline places holding Alt Key
C) Select the text then choose Format >> Font and on B) Double click the format painter then go on pasting
Font tab open Underline Style and choose Double in many places
Underline C) Click the format painter then go on pasting to many
D) Click double underline tool on formatting toolbar places holding Ctrl Key
65. Drop Cap means D) All of above
A) All Caps B) Small Caps 75. On which toolbar can you find Format Painter tool?
C) Title case D) None of the above A) Standard toolbar B)Formatting toolbar
66. What is the short cut key to open Font dialog box? C) Drawing Toolbar D) Picture Toolbar
A) Ctrl + F B) Alt + Ctrl + F 76. Which indent marker controls all the lines except
C) Ctrl + D D) Ctrl + Shift + D first line?
67. How can you access the font size tool on font dialog A) First Line Indent Marker
box? B) Left Indent Marker
A) Ctrl + S B) Ctrl + Shift + S C) Hanging Indent Marker
C) Ctrl + P D) Ctrl + Shift + P D) Right Indent Marker
68. How can you make the selected character 77. How can you remove tab stop markers from ruler?
superscripted? A) Double click the tab marker and choose Clear All
A) Ctrl + = B) Ctrl + Shift + = B) Drag the tab stop marker out of the ruler
C) Alt + Ctrl + Shift + = D) None of above C) Right click the tab stop marker and choose remove
69. What does Ctrl + = key effect? D) All of above
A) Superscript B) Subscript 78. Which operation you will perform if you need to
C) All Caps D) Shadow move a block of text?
70. What happens if you mark on Hidden check box of A) Copy and Paste B) Cut and Paste
Font dialog box after you select some text? C) Paste and Delete D) Paste and Cut
A) The text is deleted from document and you need to 79. What is the extension of Word files?
bring from Recycle Bin if required again. A) FIL B) DOT
B) The text is hidden and you need to bring it by C) DOC D) TXT
removing the check box if needed again 80. Which of the following option is not available in
C) The text is deleted and cannot be returned back Insert >> Illustrations?
D) The text is hidden and cannot be returned back A) Chart B) Word Art
71. How can you increase the font size of selected text by C) Clip Art D) Graph
one point every time?
COMPUTER MISCELLANEOUS QUESTIONS

1. What does ASCII stand for? (e) None of the above


(a) American Standard Code for Information Intelligence 2. Which of the following is a binary number?
(b) American Standard Code for Income Interchange (a) 10101000 (b) 245 (c) 200
(c)American Standard Code for Information (d) 02 3G stands for
Interchange (a) Third Generation
(d) American States Code for Intelligence Interchange (b) Trillion Gigabyte (c) Tenth Girdle

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


20
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

(d) Triple Generation (e) Third Game (a) Output (b) Terminal (c) Input
3. Which of the following terms is related to Internet (d) Communications (e) Interaction
connectivity? 17. What does the acronym BIOS stand for?
(a) IP (b) TCP (c) Gopher (a) Basic Input / Output Systemization
(d) Both (a) and (b) (e) All of the above (b) Basic Input / Output System
4. Which of the following is related to Internet? (c) Basic Internal Output System
(a) WWW (b) CPU (c) RAM (d) Basic Internal Output System
(d) Bus (e) Port (e) Basic Input / Output System
5. Which of the following is known as the Brain of 18. In the OS, software and data that the computer is
Computer? currently using are stored in
(a) CPU (b) RAM (c) DVD (a) PC (b) AGP (c) Scanner
(d) ROM (e) Control Panel (d) RAM (e) USB
6. Which of the following correctly explains Monitor? 19. Which of the following is a binary number?
(a) Electronic visual display (a) 12 (b) 34 (c) 45
(b) Input Device (d) 10 (e) 13
(c) Input around the desktop area 20. The process of making changes to an existing document
(d) Pixel based smart area is referred to as _______ it.
(e) Both (b) and (d) (a) Modifying (b) Adjusting (c) Changing
7. PC stands for (d) Creating (e) Editing
(a) Personnel Computer (b) Personalised Computer 21. Which of the following refers to containers used to store
(c) Personal Computer (d) Personnel Computing related documents located on the computer?
(e) Personalised Computing (a) Labels (b) Indexes (c) Programs
8. Mainframe is related to (d) Folders (e) Sections
(a) Computer (b) Super Computer 22. Which of the following refers to the means by which an
(c) Mini Computer (d) Micro Computer OS or any other programs interacts with the user?
(e) None of these (a) Program front-end (b) Programming interface
9. Which of the following is known as the page? (c) User login (d) User interface
(a) Windows page (b) Start page (e) User compatibility
(c) Memory page (d) Desktop page 23. The ______ format reduces an audio file to about one-
(e) Document page tenth of its original size while preserving much of the
10. In which part of CPU is arithmetic calculation done? original quality of the sound.
(a) ALU (b) CU (a) DOC (b) PNG (c) GIF
(c) Digital Signal Processor (d) MP3 (e) VMEG
(d) RISC (e) Both 1 and 2 24. The ______ which contains billion of documents called
11. Which of the following is important for connecting more web pages is one of the more popular services on the
than one system? internet.
(a) Wire (b) LAN (c) Bluetooth (a) Web server (b) Telnet (c) Web
(d) Wi-Fi (e) All of the above (d) Collection (e) News net
12. Software for organizing, storage, updating and retrieving 25. What type of device is a printer?
information is a(n)— (a) Output device (b) Input device
(a) Data warehouse (c) Processing device (d) Storage device
(b) Database management system (e) None of these
(c) Data mining (d) Operating system 26. Which of the following terms is associated with
(e) None of the above Internet/Email?
13. Which of the following is essential for opening a (a) Plotter (b) Slide presentation
webpage? (c) Bookmark (d) Pie Chart (e) Microsoft Excel
(a) Browser (b) Peripherals (c) Fast internet 27. Which of the following is contained at the end of the file
(d) Program (e) Mouse name and helps to determine the type of file?
14. What is the term for any device which is connected to (a) File property (b) The nomenclature
any computer system from outside? (c) The name (d) File subname
(a) Peripheral (b) RAM (c) Memory (e) File extension
(d) Bus (e) All of the above 28. What is Linux?
15. Which of the following is not an output Device? (a) Input Device (b) Operating system
(a) Plotter (b) Mouse (c) Monitor (c) Storage Device (d) Output Device
(d) Printer (e) Headphone (e) Processor
16. A (n) _____ device is any hardware component that allows 29. Which of the following is a small microprocessor-based
you to enter data and instructions into a computer. computer designed to be used by one person at a time?

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


21
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

(a) Netbook (b) Notebook (c) Supercomputer (e) None of these


(d) Personal computer (e) All-in-one 43. Which part of a computer cannot be touched?
30. Key-board and _______ are examples of input devices. (a) Mouse (b) Monitor (c) Hardware
(a) Monitor (b) Modem (c) Printer (d) Software (e) None of these
(d) Mouse (e) CPU 44. Manipulation of data in computer is called
31. Which among the following is the most prevalent (a) Boot (b) Processing (c) Simplification
storage device for personal computer? (d) Format (e) Clean disk
(a) Flash Drive (b) USB personal computer 45. Which computer bus connects the main memory to the
(c) Mainframe (d) Laptop memory controller in computer systems?
(e) None of these (a) Data Bus (b) Memory Bus
32. Website address is such a unique name which recognizes (c) I/O Bus (d) Both (b) and (c)
a specific ______ on web. (e) None of these
(a) Web browser (b) Website (c) PDA 46. _____ and _____ are the two types of computer memory.
(d) Link (e) None of these (a) RAM and CPU (b) ROM and CPU
33. A bit refers to ______. (c) RAM and ROM (d) RAM and BIOS
(a) A from of storage (e) BIOS and ROM
(b) A value equal to a kilobyte 47. What is the full from of CRT?
(c) The same things as a pixel (a) Cathode Ray Tube
(d) The smallest unit of digital information. (b) Computer Resolution and Transparency
(e) A value equal to megabyte (c) Cathode Resolution and Transparency
34. Hard disk drives are considered ______ storage. (d) Computer RAM Trash
(a) Flash (b) Non-volatile (e) None of these
(c) Temporary (d) Non-permanent 48. Which among the following is not hardware?
(e) Worthless (a) Motherboard (b) Operating system
35. In ______ back-up of any computer there is a copy of each (c) CPU (d) Keyboard
program, data and system file. (e) Hard disk drive
(a) Restoration (b) Boot strap (c) Differential 49. Which of the following is software?
(d) Full (e) None of these (a) Motherboard (b) CPU
36. Which of the following terms is associated with (c) Microsoft Windows
networks? (d) RAM (e) All of these
(a) Mouse (b) Plotter (c) MS Excel 50. In computing, a _____ is a directive to a computer
(d) MS Word (e) Connectivity program order to perform a specific task.
37. DVD is an example of (a) Hard boot (b) Hibernation
(a) Optical device (b) Output device (c) Command (d) Warm boot (e) Format
(c) Hard disk (d) Solid state storage device 51. Which of the following is/are modifier keys in a
(e) None of these computer?
38. What type of device is a computer monitor? (a) Ctrl (b) Alt (c) Shift
(a) Output (b) Input (c) Storage (d) Both 2 and 3 (e) All of the above
(d) Processing (e) Software 52. Which among the following is associated with Internet
39. What is Window Explorer? Mail?
(a) Personal Computer (b) Network (a) Inbox (b) Server (c) Trash
(c) File Manager (d) Drive (e) Web browser (d) Drop Box (e) One Drive
40. Binary Number system is also called _______. 53. What is a cursor?
(a) Base-2 number system (a) It is an indicator
(b) Base-1 number system (b) It shows the position on a computer monitor
(c) Base-3 number system (c) Cursor is Latin for ‘runner.
(d) Base-8 number system (d) Both 1 and 2
(e) Base-16 number system (e) All of the above
41. 30,000 bytes is equal to 54. Which among the following is not legitimate type of
(a) 30 KB (b) 3 MB (c) 3 GB computer virus?
(d) 3 TB (e) None of these (a) Boot Virus (b) File infector Virus
42. Terminal is a: (c) Resident Virus (d) Hangout Virus
(a) device to give power supply to computer (e) Macro Virus
(b) Point at which data enters or leaves the 55. __________ is a self-contained step-by-step set of
computer operations to be performed.
(c) The last instruction in a program (a) Algorithm (b) Application software
(d)any input /output device (c) Network topology (d) System Software

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


22
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

(e) Utility software 70. Which of the following is the name of an application
56. In computing, what is a tape drive? similar to MS Office?
(a) A data storage device (b) An OCR device (a) Libre Office (c) Open Office (c) Neo Office
(c) A pointing device (d) A multimedia device (d) Free Office (e) All of the above
(e) A text editing device 71. What is the full form of UNIVAC?
57. What does HTML stand for? (a) Universal Automatic Computer
(a) Hyper Text Making Links (b) Universal Array Computer
(b) Hyper Text Markup Language (c) Unique Automatic Computer
(c) Higher Textual Marking of Links (d) Unvalued Automatic Computer
(d) Hyper Text Mixer of Links (e) None of these
(e) None of these 72. The process of converting analog signals into digital
58. The short cut key Ctrl + R is used in Excel to signals so they can be processed by a receiving computer
(a) Right align the content of cell is referred to as
(b) Remove the cell contents of selected cells (a)Modulation (b) Demodulation
(c) Fill the selection with active cells to the right (c) Synchronizing (d) Digitizing
(d) Select multiple rows (e) Transmission
(e) None of these 73. Which of the following memory has stored data in large
59. ‘Linux’ is ______ operating system. number?
(a) Microsoft (b) Apple (c) Interface (a) RAM (b) ROM (c) Cache memory
(d) Android (e) Open source (d) Hard Disk (5) None of these
60. The full form of VDA is 74. Generally, web address is located by
(a) Virtual Desktop Access (a) Hyperlink (b) HTTP (c) URL
(b) Visual Desktop Array (c) Virtual Desktop Array (d) Locator (e) Browser
(d) Visual Desktop Access (e) None of these 75. Which of the following is more than TB ?
61. WAN stands for (a) MB (b) KB (c) PB
(a) Whole Area Network (b) Wide Area Network (d) Bit (e) Bytes
(c) Wide Array Net (d) Wireless Area Network 76. A web address is a unique name at identifies a specific
(e) None of these _______ on the internet.
62. Which among the following is an Input Device? (a) URL (b) HTML (c) CSS
(a) Monitor (b) Joystick (c) Plotter (d) Website (e) None of these
(d) Both 1 and 2 (e) All of the above 77. If you wish to extend the length of the network without
63. Which among the following is the largest computer? having the signal degrade, you would use a
(a) Mainframe computer (b) Personal Computer (a) Gateway (b) Router (c) Modem
(c) Laptop (d) Notebook (d) Repeater (e) Resonator
(e) Supercomputer 78. The ______ button on the Quick Access Toolbar allows you
64. ISDN stands for to cancel your recent commands or activities.
(a) Integral Service Dynamic Network (a) Search (b) Cut
(b) International Subscriber Dialup Network (c) Undo (d) Redo
(c) International Service Digital Network 79. The main folder on a storage device is called
(d) Integrated Service Digital Network (a) Platform (b) Interface
(e) None of these (c) Root Directory (d) Device Driver
65. _____kb is approximately equal to Megabyte. (e) None of these
(a) 10,000 (b) 1532 (c) 1000 80. The blinking symbol on the computer screen is called
(d) 100 (e) 10 (a) Mouse (b) Logo (c) Hand
66. Which of the following is not a binary number? (d) Cursor (e) Palm
(a) 110010 (b) 201020 (c) 101010 81. Which of the following is not a computer programming
(d) 100001 (e) 1011101 language?
67. Which of the following is an operating system? (a) Windows (b) PASCAL
(a) Compiler (b) Plotter (c) Mac (c) BASIC (d) COBOL
(d) Both 1 and 2 (e) All of the above 82. When you want to move some text from one page to a
68. Which of the following is not an operating system? different page, the best method is
(a) Android (b) Windows XP (c) iOS (a) Drag and drop (b) Cut and paste
(d) Compiler (e) None of these (c) Delete and retype (d) Find and replace
69. Which of the following is a base of hexadecimal number? (e) None of these
(a) 8 (b) 2 (c) 10 83. A _____ is example of an Input Device.
(d) 16 (e) 24 (a) Printer (b) Keyboard (c) Monitor
(d) Compiler (e) All of these

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


23
COMPUTER CAPSULE FOR SBI PO/CLERK MAINS -2016

84. What is the full form of MICR? 92. Which among the following is a disadvantage of an EDI
(a) Magnetic Ink Character Reader system?
(b) Magnetic Ink Code Reader (a) Speed (b) Errors (c) Expensive
(c) Magnetic Ink Cases Reader (d) Mismatch (e) None of these
(d) Magnetic Instant Code Recognition 93. A device that not only provides surge protection, but
(e) Magnetic Ink Code Recognition also furnishes the computer with battery backup power
85. Text in a column is generally aligned ______ . during a power outage is ______
(a) Justified (b) Right (c) Centre (a) Battery strip (b) UPS (c) Surge strip
(d) Left (e) None of these (d) USB (e) Memory
86. What does the term GUI in computing stands for ________ 94. Which of the following is a recent version of operating
(a) Graphical utility interface systems?
(b) Graphical user input (a) Windows XP (b) Windows 7 Basic
(c) Graphical user interface (c) Windows 8 (d) Windows 10
(d) Graphics user intake (e) Windows 2013
(e) Graphics user information 95. What is the full form of SMTP?
87. A saved document is referred to as _________ (a) Swift Mail Transmission Program
(a) file (b) folder (c) project (b) Simple Mail Transfer Protocol
(d) data (e) word (c) Swift Mail Transfer Program
88. Which of the following is not example of Utility (d) Spam Mail Trash Program
Software? (e) None of these
(a) Backup software (b) Antivirus software 96. A high speed device used in CPU for temporary storage
(c) Disk tools (d) Media Players during processing is called
(e) None of these (a) Register (b) Bus (c) Compiler
89. Example of telecommunication device is a ________ (d) Translator (e) Bus
(a) modem (b) printer (c) keyboard 97. Which of the following is used for establishing
(d) scanner (e) mouse connection to other document or locations within a
90. What is the full form of Internet communication protocol website?
TCP/IP ? (a) Hyperlink (b) Web link (c) CSS
(a) Transmission Control Practice/Internet Practice (d) Java query (e) HTML Link
(b) Transmission Control Protocol/Internet Protocol 98. When a computer is turned on, where does it get the first
(c) Transport Control Protocol/Internet Protocol instructions that it loads into RAM?
(d) Transport Component Practice/International (a) From RAM (b) From ROM
Practice (c) From the Hard Disk
(e) Telephone Call Protocol/International Protocol (d) From a CD (e) None of these
91. Chip is a common nickname for a(n) ______ 99. Which of the following is the coding of data so that is
(a) Transistor (b) Semi-conductor can’t be easily understood if intercepted?
(c) Resister (d) Hard disk (a) Barcode (b) Decoder (c) Encryption
(e) Integrated circuit (d) Mnemonics (e) None of the above

www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in


24

You might also like