You are on page 1of 151

IBPS RRB PO/CLERK MAINS-2023 DAILY 2 PM

IBPS RRB PO/CLERK MAINS-2023 DAILY 2 PM


COMPLETE COMPUTER AWARENESS
• IMPORTANT TOPIC

• COMPUTER HARDWARE
• COMPUTER MEMORY
• NUMBER SYSTEM
(CONVERSION)
• SOFTWARE
• OPERATING SYSTEM
• DATABASE
• HISTORY & GENERATION
• NETWORK
• INTERNET
• MS WORD
• MS EXCEL
• MS POWEPOINT
• SHORTCUT KEYS
• FULL FORM
COMPLETE COMPUTER AWARENESS

• COMPUTER HARDWARE
COMPLETE COMPUTER AWARENESS

Category of hardware
• Internal hardware
• External hardware
COMPLETE COMPUTER AWARENESS

(input device)
•Keyboard
•Mouse
•Joy Stick
•Light pen
•Track Ball
•Scanner
•Graphic Tablet
•Microphone
•Magnetic Ink Character Recognition(MICR)
•Optical Character Recognition(OCR)
•Bar Code Reader
•Optical Mark Reader(OMR)
•Webcam
•Stylus
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS

OUTPUT DEVICE
COMPLETE COMPUTER AWARENESS

TYPES OF PRINTER
COMPLETE COMPUTER AWARENESS

IMPACT VS NON-IMPACT

Impact printers create pictures Non-impact printers create


and figures by hitting a device figures and pictures without any
such as a wheel or a print connection between the printing
hammer against an inked device and the paper.
ribbon.
Impact printers are low in terms Non-impact printers are
of speed. comparatively fast in speed
The print quality of impact
printers is lower.
In impact printers, printing is In non-impact printers, printing
executed by hammering a is executed by dropping ink on
character dye or metal pin. paper in any manner.
COMPLETE COMPUTER AWARENESS

Types of Ports
Serial port(COM Port): Serial Port is used
to refer the interface that is compliant to
RS-232 standard.
COMPLETE COMPUTER AWARENESS

Types of Ports
Parallel Port - Parallel ports are generally used
for connecting scanners and printers
.
COMPLETE COMPUTER AWARENESS

Types of Ports
USB Type-A port is a 4 pin connector

The port of USB Type – C consists of 24 pins.


COMPLETE COMPUTER AWARENESS

Types of Ports
USB Type-A port is a 4 pin connector

The port of USB Type – C consists of 24 pins.


COMPLETE COMPUTER AWARENESS

Types of Ports
PS/2 Port:
COMPLETE COMPUTER AWARENESS

Types of Ports
VGA Port:
COMPLETE COMPUTER AWARENESS

Types of Ports
HDMI-Heigh definition multimedia
interface
COMPLETE COMPUTER AWARENESS

Types of Ports
COMPLETE COMPUTER AWARENESS

Types of Ports
•Parallel Advanced Technology Attachment (PATA)
•Serial Advanced Technology Attachment (SATA)
•Small Computer System Interface (SCSI)
COMPLETE COMPUTER AWARENESS

Internal hardware
COMPLETE COMPUTER AWARENESS

• Number system
COMPLETE COMPUTER AWARENESS

• Number system
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

TYPES OF NUMBERS
• BINARY NUMBER
• OCTAL NUMBER
• DECIMAL NUMBER
• HEXADECIMAL NUMBER

CONVERSION TYPES
()10-()2
()2-()10
()8-()2
()2-()8
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

TODAY SESSION HIGHLIGHT


CONVERSION TYPES
()16-()2
()2-()16
()10-()8
()10-()16
()8-()16
()16-()8
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()16-()2
(AFC9) is a hexadecimal number equivalent to
which binary
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()2-()16
(10101010) is a hexadecimal number equivalent
to which binary
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()10-()16
(56) is a DECIMAL number equivalent to which
HEXADECIMAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()10-()8
(44) is a DECIMAL number equivalent to which
OCTAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()8-()16
(44) is a OCTAL number equivalent to which
HEXADECIMAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

()16-()8
(A8C) is a HEXADECIMAL number equivalent to
which OCTAL
COMPLETE COMPUTER AWARENESS

• Computer memory
COMPLETE COMPUTER AWARENESS

Computer Memory
It is a component of computer which is used to
store data and information.
यह कंप्यूटर का एक भाग है जिसका उपयोग डे टा और सूचना
को संग्रहीत करने के जिए जकया िाता है ।
COMPLETE COMPUTER AWARENESS

Computer Memory
COMPLETE COMPUTER AWARENESS

Types of computer memory based in


Characteristics
जिशेषताओं के आधार पर कंप्यूटर मेमोरी के प्रकार
• Volatile memory
• Non –volatile memory
COMPLETE COMPUTER AWARENESS

Volatile memory(temporary memory)-अस्थायी स्मृजत


Those memory which store data on temporary
basis.
and loss our content(data) when system is turn off
Comes under this category.

इस श्रेणी में वे मेमोरी आता है ।जो डे टा को अस्थायी आधार पर


स्टोर करती हैं और ससस्टम बंद होने पर डे टा को खो दे ती है
COMPLETE COMPUTER AWARENESS

Example-RAM, Cache memory , register


COMPLETE COMPUTER AWARENESS

Non Volatile memory(permanent memory)-स्थायी स्मृजत


Those memory which store data on permanent basis.
and does not loss our content(data) when system is turn
off
Comes under this category.

इस श्रेणी में वे मेमोरी आता है ।जो डे टा को अस्थायी आधार पर स्टोर करती


हैं और ससस्टम बंद होने पर डे टा को खो दे ती है
COMPLETE COMPUTER AWARENESS

Examples of non-volatile memory


ROM, Hard disk, floppy disk CD, DVD, HVD, pen drive, SD
card etc.
COMPLETE COMPUTER AWARENESS

Types of memory based on access


एक्सेस के आधार पर कंप्यूटर मेमोरी के प्रकार
Primary memory Secondary memory tertiary memory
COMPLETE COMPUTER AWARENESS

COMPUTER
MEMORY

PRIMAR SECONDARY
Y
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS

CPU

CACHE MEMORY

MAIN MEMORY

HARD DISK
COMPLETE COMPUTER AWARENESS

• Primary memory /Main Memory / Internal memory


COMPLETE COMPUTER AWARENESS

• Secondary Memory/Auxiliary Memory/ Backup


Memory/External Memory
COMPLETE COMPUTER AWARENESS

• Secondary Memory/Auxiliary Memory/ Backup


Memory/External Memory

Magnetic Disk
COMPLETE COMPUTER AWARENESS

• Secondary Memory/Auxiliary Memory/ Backup


Memory/External Memory

Optical Disc
COMPLETE COMPUTER AWARENESS

• Secondary Memory/Auxiliary Memory/ Backup


Memory/External Memory

Flash Memory
COMPLETE COMPUTER AWARENESS

• Secondary Memory/Auxiliary Memory/ Backup


Memory/External Memory
COMPLETE COMPUTER AWARENESS

• 1e3
COMPLETE COMPUTER AWARENESS

• History & generation


Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Abacus
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Napier's Bones

It was a manually-operated
calculating device which was
invented by John Napier (1550-
1617) of Merchiston.
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Pascaline

It was invented between 1642-


and 1644 by a French
mathematician-philosopher
Biaise Pascal.
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Leibnitz wheel

It was developed by a German


mathematician-philosopher
Gottfried Wilhelm Leibnitz in
1673.
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

It was developed by a German


mathematician-philosopher
Gottfried Wilhelm Leibnitz in
1673.
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Difference Engine

1822,
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Analytical Engine

1830

Charles Babbage
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Mark I
1937

Howard Aiken

1944
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

First Generation Computers


The first generation (1946-1959)

•ENIAC ( Electronic Numerical Integrator and Computer)


•EDVAC ( Electronic Discrete Variable Automatic Computer)
•UNIVACI( Universal Automatic Computer)
•IBM-701
•IBM-650
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Second Generation Computers


The second generation (1959-1965) was the era
of the transistor computers.
• magnetic cores were used as the
primary memory and magnetic disc
and tapes were used as the secondary
storage.
•IBM 1620
•IBM 7094
•CDC 1604
•CDC 3600
•UNIVAC 1108
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Third Generation Computers


1960s to the 1970s

•he third generation computers used


integrated circuits (ICs)

•IBM-360 series
•Honeywell-6000 series
•PDP(Personal Data Processor)
•IBM-370/168
•TDC-316
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Third Generation Computers


1960s to the 1970s

•he third generation computers used


integrated circuits (ICs)

•IBM-360 series
•Honeywell-6000 series
•PDP(Personal Data Processor)
•IBM-370/168
•TDC-316
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book

Fifth Generation Computers

•In fifth generation (1980-till date)


computers, the VLSI technology was
replaced with ULSI (Ultra Large Scale
Integration).
COMPLETE COMPUTER AWARENESS

• SOFTWARE
COMPLETE COMPUTER AWARENESS

SOFTWARE
software is a collection of programs, data, and supporting
materials that work together to provide a specific
functionality.
सॉफ्टवेयर प्रोग्राम, डे टा और सहायक सामसग्रयों का एक संग्रह है
जो एक सवसिष्ट काययक्षमता प्रदान करने के सिए एक साथ काम
करते हैं ।
COMPLETE COMPUTER AWARENESS

PROGRAM

a program is a specific set of instructions written in a programming


language.

एक प्रोग्राम एक प्रोग्राजमंग भाषा में जिखे गए जनर्दे शों का एक जिजशष्ट सेट


है ।
COMPLETE COMPUTER AWARENESS

SYSTEM SOFTWARE

System software is a type of computer software that is designed to


run a computer's hardware and application programs

जसस्टम सॉफ़्टिेयर एक प्रकार का कंप्यूटर सॉफ़्टिेयर है जिसे कंप्यूटर के


हाडड िेयर और एप्लिकेशन प्रोग्राम चिाने के जिए जडजाइन जकया गया है
COMPLETE COMPUTER AWARENESS
Example of system
software
• Operating system
• Compiler
• Interpreter
• Assembler
• Device driver
• Debugger
• Firmware
• Linker
• Loader
COMPLETE COMPUTER AWARENESS
Application software

Application software, also known as


"applications" or "apps," is a software that
are designed to perform specific tasks or
provide specific functionalities for end-users.
एप्लिकेशन सॉफ़्टिेयर, जिसे "एप्लिकेशन" या "ऐप्स" के रूप में
भी िाना िाता है , एक ऐसा सॉफ़्टिेयर है िो जिजशष्ट कायों को
करने या अंजतम उपयोगकताडओ ं के जिए जिजशष्ट कायडक्षमता प्रर्दान
करने के जिए जडजाइन जकया गया है ।
COMPLETE COMPUTER AWARENESS
Utility software

Antivirus
Disk Defragmentation
Disk cleanup
Screen saver
Backup & restore
File Compression
Password manager
Registry Cleaners
Etc.
COMPLETE COMPUTER AWARENESS

OTHER CATEGORIES OF SOFTWARE


COMPLETE COMPUTER AWARENESS

DATABASE
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS

TYPES OF KEYS
PRIMARY KEY
SUPER KEY
CANDIDATE KEY
FOREIGN KEY
SECONDARY KEY
COMPLETE COMPUTER AWARENESS

TYPES OF DATABASE
MODEL
COMPLETE COMPUTER AWARENESS

network
COMPLETE COMPUTER AWARENESS

COMMUNICATION MEDIUM
COMPLETE COMPUTER AWARENESS

NETWORK
COMPLETE COMPUTER AWARENESS

NETWORK
COMPLETE COMPUTER AWARENESS

NETWORK
COMPLETE COMPUTER AWARENESS

COMMUNICATION MODE
COMPLETE COMPUTER AWARENESS

OSI-ISO MODEL
IBPS RRB PO/CLERK -2023

NIC- A network interface card is a


hardware component that enables
a computer to connect to a
network.
IBPS RRB PO/CLERK -2023

Access Point - An access point is a device that


enables wireless devices to connect to a network
by creating a wireless local area network (WLAN).
IBPS RRB PO/CLERK -2023

Bridge-A bridge is a networking device that


connects two or more networks together
and forwards data packets between them.
IBPS RRB PO/CLERK -2023

Repeater-A repeater is a device that


amplifies or regenerates network signals
to extend the range of a network.
IBPS RRB PO/CLERK -2023

Modem:-A modem is a device that


converts digital signals to analog signals
and vice versa, allowing devices to connect
to the internet through a phone or cable
line.
IBPS RRB PO/CLERK -2023

Switch - A switch is a device that connects


multiple devices in a local area network
(LAN) and directs data traffic between
them.
IBPS RRB PO/CLERK -2023

Hub - A switch is a device that connects


multiple devices in a local area network
(LAN)
IBPS RRB PO/CLERK -2023

Router -A router routes various


data packets via a similar set
of networks.
IBPS RRB PO/CLERK -2023

Gateway-
A gateway is a network node used in
telecommunications that connects two networks
with different transmission protocols together....
IBPS RRB PO/CLERK -2023

VSAT- very small aperture terminal (VSAT) is a small-


sized earth station used in the transmit/receive of
data, voice and video signals over a satellite
communication network, excluding broadcast
television
IBPS RRB PO/CLERK -2023

VSAT- very small aperture terminal (VSAT) is a small-


sized earth station used in the transmit/receive of
data, voice and video signals over a satellite
communication network, excluding broadcast
television
IBPS RRB PO/CLERK -2023
IBPS RRB PO/CLERK -2023
NETWORK SECURITY TERMINOLOGIES
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

MALWARE

It is a type of malicious program or software which


can damage your system
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Types of malware

• Virus
• Worm
• Trojan horse
• Ransomware
• Spyware
• Keylogger
• Botnet
• Adware
• Rootkit
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Virus
It is type of malware which can
attach itself
Viruses can be harmless or they can
modify or delete data.
Its not self replicant.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

worm
• It can run without host file
• It is not self replicant
• It can damage remotely
• It slow down the system

NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Trojan horse
• Trojan horse is any malware that misleads users of its true
intent by disguising itself as a standard program

• A Trojan (or Trojan Horse) disguises itself as legitimate


software with the purpose of tricking you into executing
malicious software on your system ...

• Trojan horse does not replicate itself.

• The main objective of Trojan horse is to steal the


information.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

spyware

Spyware is a kind of malware that secretly gathers


information about a person or organization and relays
this data to other parties without your knowledge or
permission.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Ransomware
It is a type malware designed to deny a user or
organization access to files on their computer. By
encrypting these files and demanding a ransom amount
for the decryption key.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

keylogger
Keylogger basically capturing the
action of key stroke behavior .
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Rootkit
A rootkit is a type of malware that
provides privileged, root-level (i.e.,
administrative) access to a computer
.
रूटजकट एक प्रकार का मैििेयर है िो कंप्यूटर तक
जिशेषाजधकार प्राप्त, रूट-स्तरीय (यानी, प्रशासजनक) पहं च
प्रर्दान करता है
.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Adware
Adware is the type of malware
the term used for various pop-up
advertisements that show up on your
computer or mobile device.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Identity theft
Identity theft refers to the unauthorized
acquisition and use of someone else's personal
information, typically for financial gain. The goal
of identity theft is to assume the identity of the
victim and carry out fraudulent activities.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Spoofing:
Spoofing,, is a technique used to deceive or trick individuals or
computer systems by falsifying information.
It involves presenting false data or masquerading as someone or
something else to gain unauthorized access or manipulate others.

Spoofing can be applied to various forms of communication, such


as email, phone calls, websites, or IP addresses.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM

Phishing

Phishing is a type of cyber attack in which an attacker


attempts to deceive individuals or organizations into
divulging sensitive information, such as login
credentials, credit card details, or personal
information,
COMPLETE COMPUTER AWARENESS

Network Protocol
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS

Cookies are small text files placed on a user’s


computer (or smartphone), which are
commonly used to collect personal data. Most
website operators place cookies on the
browser or hard drive of their user's computer.

Cookies can gather information about the use


of a website or enable the website to recognise
the user as an existing customer when they
return to the website at a later date.
COMPLETE COMPUTER AWARENESS

Types of cookies

Session cookies
Session cookies, also known as 'temporary
cookies', help websites recognize users and
the information provided when they navigate
through a website.
Session cookies only retain information about a
user's activities for as long as they are on the
website
COMPLETE COMPUTER AWARENESS

Types of cookies

Permanent cookies
Permanent cookies, also known as
'persistent cookies', remain in operation
even after the web browser has closed.
COMPLETE COMPUTER AWARENESS

Types of cookies

First-party cookies
First-party cookies are installed directly by
the website (ie domain) the user is visiting (ie
the URL shown in the browser's address
bar). These cookies enable website owners
to collect analytics data, remember language
settings, and perform other useful functions
that provide a good user experience.
COMPLETE COMPUTER AWARENESS

Types of cookies

Permanent cookies
Permanent cookies, also known as
'persistent cookies', remain in operation
even after the web browser has closed.
COMPLETE COMPUTER AWARENESS

Types of cookies

Third-party cookies
Third-party cookies are installed by third
parties with the aim of collecting certain
information from web users to carry out
research into, for example, behaviour,
demographics or spending habits.
COMPLETE COMPUTER AWARENESS

Types of cookies

Flash cookies
Flash cookies, also known as 'super cookies',
are independent of the web browser. They
are designed to be permanently stored on a
user's computer. These types of cookies
remain on a user's device even after all
cookies have been deleted from their web
browser.
COMPLETE COMPUTER AWARENESS

Types of cookies

Zombie cookies
Zombie cookies are a type of flash cookie that is automatically re-
created after a user has deleted them. This means they are difficult to
detect or manage. They are often used in online games to prevent
users from cheating but have also been used to install malicious
software onto a user's device.
COMPLETE COMPUTER AWARENESS

TYPES OF VIRUS
COMPLETE COMPUTER AWARENESS

Boot Sector Virus – It is a type of virus that infects the boot sector
of floppy disks or the Master Boot Record (MBR) of hard disks. The
Boot sector comprises all the files which are required to start the
Operating system of the computer
COMPLETE COMPUTER AWARENESS

Boot Sector Virus – It is a type of virus that infects the boot sector
of floppy disks or the Master Boot Record (MBR) of hard disks. The
Boot sector comprises all the files which are required to start the
Operating system of the computer
COMPLETE COMPUTER AWARENESS

Direct Action Virus – When a virus attaches itself directly to a .exe


or .com file and enters the device while its execution is called a
Direct Action Virus. If it gets installed in the memory, it keeps itself
hidden. It is also known as Non-Resident Virus.
COMPLETE COMPUTER AWARENESS

Resident Virus – A virus which saves itself in the


memory of the computer and then infects other
files and programs when its originating program
is no longer working. This virus can easily infect
other files because it is hidden in the memory
and is hard to be removed from the system.
COMPLETE COMPUTER AWARENESS

Multipartite Virus – A virus which can attack


both, the boot sector and the executable files of
an already infected computer is called a
multipartite virus. If a multipartite virus attacks
your system, you are at risk of cyber threat.
COMPLETE COMPUTER AWARENESS

Overwrite Virus – One of the most harmful


viruses, the overwrite virus can completely
remove the existing program and replace it with
the malicious code by overwriting it. Gradually it
can completely replace the host’s programming
code with the harmful code.
COMPLETE COMPUTER AWARENESS

File Infector Virus – As the name suggests, it first


infects a single file and then later spreads itself to
other executable files and programs. The main
source of this virus are games and word
processors.
COMPLETE COMPUTER AWARENESS

Macro Virus – A virus written in the same macro


language as used in the software program and
infects the computer if a word processor file is
opened. Mainly the source of such viruses is via
emails.
COMPLETE COMPUTER AWARENESS

TYPES OF FIREWALL

Packet Filtering Firewall:


•This is the most basic type of firewall.
•It filters network packets based on predefined rules (such
as source and destination IP addresses, port numbers, and
protocols).
•It can be stateless (examines each packet in isolation) or
stateful (maintains a record of the state of active
connections).
COMPLETE COMPUTER AWARENESS

Stateful Firewall:
•This firewall keeps track of the state of active connections
and makes decisions based on the context of the traffic.
•It is more secure than packet filtering firewalls as it can
make decisions based on the state of a connection, not just
individual packets.
COMPLETE COMPUTER AWARENESS

Proxy Firewall:
•A proxy firewall acts as an intermediary between the
internal network and the external network.
•It can inspect and filter traffic at the application layer and
provide anonymity for internal users.
•It can also cache data to improve performance.
COMPLETE COMPUTER AWARENESS

Application Layer Firewall (Proxy Server):


•This firewall operates at the application layer (Layer 7) of
the OSI model.
•It can understand and filter traffic based on specific
applications and protocols, making it highly customizable.
•It's often used for content filtering and deep packet
inspection.
COMPLETE COMPUTER AWARENESS

MS WORD
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS

EXCEL
COMPLETE COMPUTER AWARENESS

1.SUM: The SUM function adds up a range of numbers. It's one of the
most basic and frequently used functions for performing calculations in
Excel.
2.AVERAGE: The AVERAGE function calculates the average of a range of
numbers. It's useful for finding the mean value of data.
3.COUNT: The COUNT function counts the number of cells in a range
that contains numbers. It's used to count data points or records.
4.IF: The IF function allows you to perform conditional calculations. It
returns one value if a condition is true and another value if it's false.
This is essential for data analysis and decision-making.
5.VLOOKUP: The VLOOKUP function searches for a value in a table and
returns a corresponding value from another column. It's commonly
used for data retrieval and lookup tasks.
COMPLETE COMPUTER AWARENESS

1.HLOOKUP: Similar to VLOOKUP, HLOOKUP performs a horizontal


lookup in a table.
2.INDEX and MATCH: These functions are often used together to
perform more flexible and powerful lookup operations than VLOOKUP
or HLOOKUP alone.
3.CONCATENATE (or CONCAT): The CONCATENATE function combines
multiple text strings into one. It's essential for data cleaning and text
manipulation.
4.TEXT: The TEXT function allows you to format numbers and dates as
text. It's useful for presenting data in a specific way.
5.LEFT, RIGHT, MID: These functions extract characters from text
strings. They're helpful for splitting and manipulating text.
COMPLETE COMPUTER AWARENESS

1.SUMIF and SUMIFS: These functions sum values based on specific criteria or conditions.
They're valuable for conditional summing of data.

2.COUNTIF and COUNTIFS: Similar to SUMIF and SUMIFS, these functions count cells that
meet specific criteria.

3.IFERROR: The IFERROR function helps handle errors in formulas by returning a specified
value when an error occurs.

4.ROUND: The ROUND function rounds numbers to a specified number of decimal places.
It's important for controlling the precision of calculations.

5.DATE: The DATE function creates a date value based on year, month, and day
components. It's useful for date-related calculations and date formatting.

6.TODAY: The TODAY function returns the current date, which is useful for dynamic date
calculations.
COMPLETE COMPUTER AWARENESS

1.NOW: The NOW function returns the current date and time.
2.PMT: The PMT function calculates the periodic payment for a
loan or investment based on interest rate, principal amount,
and number of payments.
3.SUMPRODUCT: SUMPRODUCT multiplies corresponding
components in arrays and returns the sum of those products.
It's used for more complex calculations involving arrays of data.
COMPLETE COMPUTER AWARENESS

1.Power point
COMPLETE COMPUTER AWARENESS

1.Power point
COMPLETE COMPUTER AWARENESS

• Number system

You might also like