Professional Documents
Culture Documents
• COMPUTER HARDWARE
• COMPUTER MEMORY
• NUMBER SYSTEM
(CONVERSION)
• SOFTWARE
• OPERATING SYSTEM
• DATABASE
• HISTORY & GENERATION
• NETWORK
• INTERNET
• MS WORD
• MS EXCEL
• MS POWEPOINT
• SHORTCUT KEYS
• FULL FORM
COMPLETE COMPUTER AWARENESS
• COMPUTER HARDWARE
COMPLETE COMPUTER AWARENESS
Category of hardware
• Internal hardware
• External hardware
COMPLETE COMPUTER AWARENESS
(input device)
•Keyboard
•Mouse
•Joy Stick
•Light pen
•Track Ball
•Scanner
•Graphic Tablet
•Microphone
•Magnetic Ink Character Recognition(MICR)
•Optical Character Recognition(OCR)
•Bar Code Reader
•Optical Mark Reader(OMR)
•Webcam
•Stylus
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
OUTPUT DEVICE
COMPLETE COMPUTER AWARENESS
TYPES OF PRINTER
COMPLETE COMPUTER AWARENESS
IMPACT VS NON-IMPACT
Types of Ports
Serial port(COM Port): Serial Port is used
to refer the interface that is compliant to
RS-232 standard.
COMPLETE COMPUTER AWARENESS
Types of Ports
Parallel Port - Parallel ports are generally used
for connecting scanners and printers
.
COMPLETE COMPUTER AWARENESS
Types of Ports
USB Type-A port is a 4 pin connector
Types of Ports
USB Type-A port is a 4 pin connector
Types of Ports
PS/2 Port:
COMPLETE COMPUTER AWARENESS
Types of Ports
VGA Port:
COMPLETE COMPUTER AWARENESS
Types of Ports
HDMI-Heigh definition multimedia
interface
COMPLETE COMPUTER AWARENESS
Types of Ports
COMPLETE COMPUTER AWARENESS
Types of Ports
•Parallel Advanced Technology Attachment (PATA)
•Serial Advanced Technology Attachment (SATA)
•Small Computer System Interface (SCSI)
COMPLETE COMPUTER AWARENESS
Internal hardware
COMPLETE COMPUTER AWARENESS
• Number system
COMPLETE COMPUTER AWARENESS
• Number system
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
TYPES OF NUMBERS
• BINARY NUMBER
• OCTAL NUMBER
• DECIMAL NUMBER
• HEXADECIMAL NUMBER
CONVERSION TYPES
()10-()2
()2-()10
()8-()2
()2-()8
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()16-()2
(AFC9) is a hexadecimal number equivalent to
which binary
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()2-()16
(10101010) is a hexadecimal number equivalent
to which binary
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()10-()16
(56) is a DECIMAL number equivalent to which
HEXADECIMAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()10-()8
(44) is a DECIMAL number equivalent to which
OCTAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()8-()16
(44) is a OCTAL number equivalent to which
HEXADECIMAL
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
()16-()8
(A8C) is a HEXADECIMAL number equivalent to
which OCTAL
COMPLETE COMPUTER AWARENESS
• Computer memory
COMPLETE COMPUTER AWARENESS
Computer Memory
It is a component of computer which is used to
store data and information.
यह कंप्यूटर का एक भाग है जिसका उपयोग डे टा और सूचना
को संग्रहीत करने के जिए जकया िाता है ।
COMPLETE COMPUTER AWARENESS
Computer Memory
COMPLETE COMPUTER AWARENESS
COMPUTER
MEMORY
PRIMAR SECONDARY
Y
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
CPU
CACHE MEMORY
MAIN MEMORY
HARD DISK
COMPLETE COMPUTER AWARENESS
Magnetic Disk
COMPLETE COMPUTER AWARENESS
Optical Disc
COMPLETE COMPUTER AWARENESS
Flash Memory
COMPLETE COMPUTER AWARENESS
• 1e3
COMPLETE COMPUTER AWARENESS
Abacus
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
Napier's Bones
It was a manually-operated
calculating device which was
invented by John Napier (1550-
1617) of Merchiston.
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
Pascaline
Leibnitz wheel
Difference Engine
1822,
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
Analytical Engine
1830
Charles Babbage
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
Mark I
1937
Howard Aiken
1944
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
•IBM-360 series
•Honeywell-6000 series
•PDP(Personal Data Processor)
•IBM-370/168
•TDC-316
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
•IBM-360 series
•Honeywell-6000 series
•PDP(Personal Data Processor)
•IBM-370/168
•TDC-316
Apply Code-Y706 to Enroll batch & Y706S for Test Series & E-book
• SOFTWARE
COMPLETE COMPUTER AWARENESS
SOFTWARE
software is a collection of programs, data, and supporting
materials that work together to provide a specific
functionality.
सॉफ्टवेयर प्रोग्राम, डे टा और सहायक सामसग्रयों का एक संग्रह है
जो एक सवसिष्ट काययक्षमता प्रदान करने के सिए एक साथ काम
करते हैं ।
COMPLETE COMPUTER AWARENESS
PROGRAM
SYSTEM SOFTWARE
Antivirus
Disk Defragmentation
Disk cleanup
Screen saver
Backup & restore
File Compression
Password manager
Registry Cleaners
Etc.
COMPLETE COMPUTER AWARENESS
DATABASE
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
TYPES OF KEYS
PRIMARY KEY
SUPER KEY
CANDIDATE KEY
FOREIGN KEY
SECONDARY KEY
COMPLETE COMPUTER AWARENESS
TYPES OF DATABASE
MODEL
COMPLETE COMPUTER AWARENESS
network
COMPLETE COMPUTER AWARENESS
COMMUNICATION MEDIUM
COMPLETE COMPUTER AWARENESS
NETWORK
COMPLETE COMPUTER AWARENESS
NETWORK
COMPLETE COMPUTER AWARENESS
NETWORK
COMPLETE COMPUTER AWARENESS
COMMUNICATION MODE
COMPLETE COMPUTER AWARENESS
OSI-ISO MODEL
IBPS RRB PO/CLERK -2023
Gateway-
A gateway is a network node used in
telecommunications that connects two networks
with different transmission protocols together....
IBPS RRB PO/CLERK -2023
MALWARE
Types of malware
• Virus
• Worm
• Trojan horse
• Ransomware
• Spyware
• Keylogger
• Botnet
• Adware
• Rootkit
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Virus
It is type of malware which can
attach itself
Viruses can be harmless or they can
modify or delete data.
Its not self replicant.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
worm
• It can run without host file
• It is not self replicant
• It can damage remotely
• It slow down the system
•
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Trojan horse
• Trojan horse is any malware that misleads users of its true
intent by disguising itself as a standard program
spyware
Ransomware
It is a type malware designed to deny a user or
organization access to files on their computer. By
encrypting these files and demanding a ransom amount
for the decryption key.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
keylogger
Keylogger basically capturing the
action of key stroke behavior .
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Rootkit
A rootkit is a type of malware that
provides privileged, root-level (i.e.,
administrative) access to a computer
.
रूटजकट एक प्रकार का मैििेयर है िो कंप्यूटर तक
जिशेषाजधकार प्राप्त, रूट-स्तरीय (यानी, प्रशासजनक) पहं च
प्रर्दान करता है
.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Adware
Adware is the type of malware
the term used for various pop-up
advertisements that show up on your
computer or mobile device.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Identity theft
Identity theft refers to the unauthorized
acquisition and use of someone else's personal
information, typically for financial gain. The goal
of identity theft is to assume the identity of the
victim and carry out fraudulent activities.
NETWORK SECURITY TERMINOLOGIES DAILY LIVE 2 PM
Spoofing:
Spoofing,, is a technique used to deceive or trick individuals or
computer systems by falsifying information.
It involves presenting false data or masquerading as someone or
something else to gain unauthorized access or manipulate others.
Phishing
Network Protocol
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
Types of cookies
Session cookies
Session cookies, also known as 'temporary
cookies', help websites recognize users and
the information provided when they navigate
through a website.
Session cookies only retain information about a
user's activities for as long as they are on the
website
COMPLETE COMPUTER AWARENESS
Types of cookies
Permanent cookies
Permanent cookies, also known as
'persistent cookies', remain in operation
even after the web browser has closed.
COMPLETE COMPUTER AWARENESS
Types of cookies
First-party cookies
First-party cookies are installed directly by
the website (ie domain) the user is visiting (ie
the URL shown in the browser's address
bar). These cookies enable website owners
to collect analytics data, remember language
settings, and perform other useful functions
that provide a good user experience.
COMPLETE COMPUTER AWARENESS
Types of cookies
Permanent cookies
Permanent cookies, also known as
'persistent cookies', remain in operation
even after the web browser has closed.
COMPLETE COMPUTER AWARENESS
Types of cookies
Third-party cookies
Third-party cookies are installed by third
parties with the aim of collecting certain
information from web users to carry out
research into, for example, behaviour,
demographics or spending habits.
COMPLETE COMPUTER AWARENESS
Types of cookies
Flash cookies
Flash cookies, also known as 'super cookies',
are independent of the web browser. They
are designed to be permanently stored on a
user's computer. These types of cookies
remain on a user's device even after all
cookies have been deleted from their web
browser.
COMPLETE COMPUTER AWARENESS
Types of cookies
Zombie cookies
Zombie cookies are a type of flash cookie that is automatically re-
created after a user has deleted them. This means they are difficult to
detect or manage. They are often used in online games to prevent
users from cheating but have also been used to install malicious
software onto a user's device.
COMPLETE COMPUTER AWARENESS
TYPES OF VIRUS
COMPLETE COMPUTER AWARENESS
Boot Sector Virus – It is a type of virus that infects the boot sector
of floppy disks or the Master Boot Record (MBR) of hard disks. The
Boot sector comprises all the files which are required to start the
Operating system of the computer
COMPLETE COMPUTER AWARENESS
Boot Sector Virus – It is a type of virus that infects the boot sector
of floppy disks or the Master Boot Record (MBR) of hard disks. The
Boot sector comprises all the files which are required to start the
Operating system of the computer
COMPLETE COMPUTER AWARENESS
TYPES OF FIREWALL
Stateful Firewall:
•This firewall keeps track of the state of active connections
and makes decisions based on the context of the traffic.
•It is more secure than packet filtering firewalls as it can
make decisions based on the state of a connection, not just
individual packets.
COMPLETE COMPUTER AWARENESS
Proxy Firewall:
•A proxy firewall acts as an intermediary between the
internal network and the external network.
•It can inspect and filter traffic at the application layer and
provide anonymity for internal users.
•It can also cache data to improve performance.
COMPLETE COMPUTER AWARENESS
MS WORD
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
COMPLETE COMPUTER AWARENESS
EXCEL
COMPLETE COMPUTER AWARENESS
1.SUM: The SUM function adds up a range of numbers. It's one of the
most basic and frequently used functions for performing calculations in
Excel.
2.AVERAGE: The AVERAGE function calculates the average of a range of
numbers. It's useful for finding the mean value of data.
3.COUNT: The COUNT function counts the number of cells in a range
that contains numbers. It's used to count data points or records.
4.IF: The IF function allows you to perform conditional calculations. It
returns one value if a condition is true and another value if it's false.
This is essential for data analysis and decision-making.
5.VLOOKUP: The VLOOKUP function searches for a value in a table and
returns a corresponding value from another column. It's commonly
used for data retrieval and lookup tasks.
COMPLETE COMPUTER AWARENESS
1.SUMIF and SUMIFS: These functions sum values based on specific criteria or conditions.
They're valuable for conditional summing of data.
2.COUNTIF and COUNTIFS: Similar to SUMIF and SUMIFS, these functions count cells that
meet specific criteria.
3.IFERROR: The IFERROR function helps handle errors in formulas by returning a specified
value when an error occurs.
4.ROUND: The ROUND function rounds numbers to a specified number of decimal places.
It's important for controlling the precision of calculations.
5.DATE: The DATE function creates a date value based on year, month, and day
components. It's useful for date-related calculations and date formatting.
6.TODAY: The TODAY function returns the current date, which is useful for dynamic date
calculations.
COMPLETE COMPUTER AWARENESS
1.NOW: The NOW function returns the current date and time.
2.PMT: The PMT function calculates the periodic payment for a
loan or investment based on interest rate, principal amount,
and number of payments.
3.SUMPRODUCT: SUMPRODUCT multiplies corresponding
components in arrays and returns the sum of those products.
It's used for more complex calculations involving arrays of data.
COMPLETE COMPUTER AWARENESS
1.Power point
COMPLETE COMPUTER AWARENESS
1.Power point
COMPLETE COMPUTER AWARENESS
• Number system