Professional Documents
Culture Documents
Computer Awareness Lyst6787
Computer Awareness Lyst6787
❖ Data – It consists of raw facts, which the computer stores and reads in the form of numbers.
Mother Board – It is the main Printed Circuit Board (PCB) of a computer that carries the Central
Processing Unit (CPU) chip, Read Only Memory (ROM), Random Access Memory (RAM) and the Basic
Input Output System (BIOS) chip.
CHARACTERISTICS OF COMPUTER
Computer are the foundation of business, travel and leisure of life today. The common characteristics
that makes computers of all sizes such a powerful machine are speed, accuracy and reliability, storage
capacity, ability to operate automatically, diligence, scientific approach and versatility.
❖ Speed – Computer provide the processing speed required by all facets of society. The quick
service we expect at the bank, at the grocery store, on the stock exchange and on the Internet
are dependent on the speed of computers. The speed of a computer is measured in the
following time units for the access time or instructions per second.
Milli second (1ms) A thousandth of a second or 10-3
Micro second (1µs) A millionth of a second or 10-6
Nano second (1ns) A thousand millionth of a second or 10-9
Pico second (1ps) A million millionth of a second or 10-12
KIPS Kilo Instructions Per Second
MIPS Million Instructions Per Second
❖ Accuracy and Reliability – Computers are quite accurate and extremely reliable as well. They
are only a machine and do not make errors on their own. Errors are caused by humans, not by
computers.
has to be given to the computer. A computer cannot take any decision on its own.
❖ Prone to Virus – The computer sometimes malfunctions and results in loss of data if some
virus attacks.
❖ Dependency – It functions as per the user’s instruction; thus, it is fully dependent on humans.
❖ Environment – The operating environment of the computer should be dust free and suitable.
Abacus was the first counting device which was developed in China. It consists of a rectangular
wooden frame and beads. The wooden frame contains horizontal rods and the beads which are
passed through the rods. The beads of counters represent digits. The device is used to perform simple
addition and subtraction.
Napier’s Bones
Babbage invented the Difference Engine to solve algebraic expressions and mathematical tasks
accurately. Later, he designed some improvements to his first computer. The modified machine is
called the Analytical Engine. He intended to design a machine with a collection of the four basic
arithmetic functions. The design principle of the Analytical Engine can be divided into Input, Output,
Memory, Central Processing Unit. The parts and working principle of an Analytical engine are the
same as today’s computer. Hence, Charles Babbage is known as the Father of Computer.
Hollerith Machine
A Hollerith machine was incorporated with the tabular and punched cards.
The machine could census the punched holes, recognize the number and make the required
calculation and store the data of census. The machine was invented by Herman Hollerith.
Mark I Computer
The fourth-generation computers are used Very Large Scale Integrated (VLSI)
circuits. Semi-conductor devices are used as primary memory. Magnetic disks are used as secondary
storage. Problem-oriented fourth generation languages (4GL) are used. Multi-processing and
multiprogramming operating systems are used.
Example – Apple series – I & II, IBM 4341, DEC 10, STAR 1000, PUP 11.
Fifth Generation Computers (1980 – Present)
Mainframe is very large in size and is an expensive computer capable of supporting hundreds or even
thousands of users simultaneously. Mainframe executes many programs concurrently and supports
many simultaneous executions of programs.
Mini Computer
Minicomputers possess most of the features and capabilities of a large computer but are smaller in
physical size. They are used as small or midrange operating business and scientific applications
Micro Computer
Microcomputers are small, inexpensive computer for personal use. They are popularly used at homes
for playing games and surfing the Internet.
Personal Computer (PC)
A personal computer is a cost-effective computer that is designed for a single end-user. PC is
dependent on microprocessor technology, which allows PC makers to set the entire central
processing unit (CPU) on a single chip.
7|P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Based on Utility
General Purpose Computer
A general-purpose computer can perform an extensive variety of operations. It can store and execute
different programs in its internal storage. All mainframes, servers, laptop and desktop computers,
smartphones and tablets are general-purpose devices.
Special Purpose Computer
Special purpose computers are designed to solve specific problems. The instructions are pre-
programmed permanently in the computer. It completely controlled by automated manufacturing
processes. Example – Aircraft control system, Electronic voting machines etc.
Based on mode of Use
Client and Server
The server is a device that manages the sharing of network resources to the users. An Application
server, File server, Virtual server, Mail server are some types of server. A client is the receiving end of
the service which made by the server. It requests the server and gains access with the server.
Workstation
Workstation (WS) is faster than Personal Computer. It is designed for a user or group of users with
better multitasking capability, additional Random-Access Memory, Higher-speed graphics adapters
and drive capacity.
Information Appliances
Information appliances are the portable or handy devices designed to perform simple operations like
calculations, games, etc. They have limited memory and limited operations capabilities and software.
Example – Mobile phones, Tablets, etc.
Embedded Computers
Embedded computers are used in other machines to serve limited requirements. It executes program
in the non-volatile memory to operate an intended machine or electronic device. They cannot be
rebooted unlike normal computers, required to operate continuously. Embedded computers are used
widely in day-to-day life. Example – Washing Machine, DVD player, etc.
USES OF COMPUTER
Computers are used to control large and small machines which in the past were controlled by humans.
❖ Distance Learning – Distance learning is a new learning methodology. The computer plays the
key role in this kind of learning. Many institutes are providing distance learning programs. The
student does not need to come to the institute. The institute provides the reading material
and the student attends virtual classroom.
❖ Online Examination – The trend of online examination is becoming popular. Different
examination like GRE, GMAT and SAT are conducted online all over the world. The questions
are marked by computer. It minimizes the chance of mistakes. It also enables to announce the
result in time.
❖ Computer Games – An important use of computers at home is playing games. Different types
of games are available. These games are a source of entertainment and recreation. Many
games are available that are specially developed to improve your mental capability and
thinking power.
10 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – EDSAC is first generation of computer. EDSAC. The Electronic Delay Storage
Automatic Calculator (EDSAC), developed at Britain's Cambridge University, ran its first
programs in 1949. It became the first stored-program computer in regular use, heralding the
transition from test to tool.
7. What does ‘S’ stands for in ULSI?
a) Scale
b) Storage
c) Scientific
d) Script
Answer – a) Scale
Explanation – ULSI stands for Ultra Large-Scale Integration
8. IC is made up of
a) Microprocessors
b) Vacuum tubes
c) Transistors
d) None of the above
Answer – c) Transistors
Explanation – An Integrated Circuit (IC) is a minuscule electronic circuit that consists of active
and passive components as well as interconnections. These components include transistors,
diodes, capacitors and resistors.
9. Who among the following is known as Father of Computers?
a) Charles Babbage
b) Alan Turing
c) Ted Hoff
d) None of the above
Answer – a) Charles Babbage
Explanation – Charles Babbage – Father of Computers
Alan Turing – Father of Modern Computers
Ted Hoff – One of the inventors of Microprocessor
10. Desktop and Personal computers are also known as
a) Super Computers
b) Quantum Computers
c) Mainframe Computers
d) Micro Computers
Answer – d) Micro Computers
Explanation – Microcomputers are also known as Personal Computers and these include
Desktop Computers, Laptops, Notebooks, Mini Tower Microcomputers and Full Tower
Microcomputers.
11. Which of the following is not a type of computer on the basis of operation?
a) Remote Computer
b) Hybrid Computer
c) Analog Computer
d) Digital Computer
Answer – a) Remote Computer
11 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – There are three types of computers basically on the basis of operation –
Analog, Digital and Hybrid.
12. A computer that operates on digital data is called
a) Remote Computer
b) Hybrid Computer
c) Analog Computer
d) Digital Computer
Answer – d) Digital Computer
Explanation - The digital computer uses binary number system in which there are only two
digits 0 and 1. Each one is called a bit.
13. Which computer is mostly used for automatic operations?
a) Remote Computer
b) Hybrid Computer
c) Analog Computer
d) Digital Computer
Answer – b) Hybrid Computers
Explanation – Hybrid Computer is mostly used with automatic operations of complicated
physical processes and the machines.
14. Which computers are used for solving complex application such as Global Weather
Forecasting?
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
Answer – a) Super Computers
Explanation - Super Computers are used with complex applications like Global Weather
Forecasting, Creating Graphic Images, Engineering Design and Testing, Space Exploration, etc.
15. The invention of _______________ gave birth to the much cheaper micro-computers
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
Answer – c) Microprocessors
Explanation – The invention of microprocessor (also called as single chip CPU) gave birth to
the much cheaper micro-computers.
16. Which computers are lower to mainframe computers in terms of speed and storage capacity?
a) Mini Computers
b) Super Computers
c) Mainframes Computers
d) Hybrid Computers
Answer – a) Mini Computers
Explanation – Mini computers are lower as compared to mainframe computers in terms of
1. Speed
2. Storage Capacity
12 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
17. Which generation is based on VLSI microprocessor?
a) First
b) Second
c) Third
d) Fourth
Answer – d) Fourth
Explanation – The fourth generation was VLSI (Very Large-Scale Integration) microprocessor
based. The period of fourth generation: 1971-1980.
18. In which generation batch processing was mainly used?
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation
Answer – b) Batch Processing
Explanation - Batch Processing was mainly used in the Second generation. In this generation
Punched cards, Paper tape, Magnetic tape, Input and Output device were used.
19. Which is an emerging branch in computer science, which interprets means and method of
making computers think like human beings?
a) Block chain
b) VR
c) AI
d) Cloud computing
Answer – c) AI
Explanation – AI (Artificial Intelligence) is an emerging branch in computer science, which
interprets means and method of making computers think like human beings.
20. In which generation time sharing, real time, networks, distributed operating system was used?
a) First
b) Second
c) Third
d) Fourth
Answer – d) Fourth
Explanation – The fourth generation of computers is marked by the use of Very Large Scale
Integrated (VLSI) circuits. In this generation time sharing, real time, networks, distributed
operating system was used.
21. The circuitry that includes the CPU and memory chips is located on the
a) System unit
b) Operating system
c) Motherboard
d) Computer
Answer – c) Motherboard
Explanation - The Motherboard is the main circuit board for the computer, containing both
soldered, non-removable components along with sockets or slots for components that can be
removed. The motherboard holds the CPU, RAM and ROM chips, etc.
22. A computer that combines the characteristic of analog and digital computer
13 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
a) Hybrid Computer
b) Digital Computer
c) Analog Computer
d) Super Computer
Answer – a) Hybrid Computer
Explanation – Hybrid Computers are computers that exhibit features of analog computers and
digital computers.
23. Which is not a basic function of a computer?
a) Copy text
b) Accept input
c) Process data
d) Store data
Answer – a) Copy text
Explanation –
15 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
COMPUTER ORGANIZATION AND DATA
PROCESSING CYCLE
COMPUTER ORGANIZATION
The basic diagram of the computer consists of Input Unit, Central Processing Unit, Storage Unit and
Output Unit.
Input Unit
The Input Unit is used for giving instructions and data by using input devices. It accepts (or reads)
instructions and data from outside, converts them to the computer acceptable format and supplies
the converted instructions and data to the computer system for further processing.
Central Processing Unit
The Central Processing Unit (CPU) performs most of the processing inside a computer. CPUs have
been constructed on a single integrated circuit called a microprocessor. It consists of the Control Unit,
the Arithmetic Logical Unit (ALU), and the Memory Unit.
Control Unit
The Control Unit (CU) is a component of a computer's Central Processing Unit (CPU) that directs the
operation of the processor. It tells the computer's memory, Arithmetic Logical Unit (ALU) and input
and output devices how to respond to the instructions that have been sent to the processor.
Arithmetic Logical Unit
The ALU can perform Arithmetic and Logical operations. The set of arithmetic operations that an ALU
supports to addition, subtraction and more complex mathematical operations. Logic operations
involve Boolean logic like AND, OR, XOR, and NOT. These can be useful for creating complicated
conditional statements.
Storage Unit
Computer main memory consists of primary and secondary memory.
16 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Primary Memory
It is volatile (losses data on power dissipation). It is used to hold running program instruction, data
intermediate results and results of ongoing processing of jobs.
Secondary Memory
It is non-volatile (retains data even without power). It is used to hold stored program instructions and
a large volume of information.
Output Unit
The Output Unit provides the information from the computer to an external device. It accepts the
results produces by the CPU, converts these coded results to human acceptable form and supplies
the converted results to outside world. It presents a soft/ hard copy of the information which can be
readable by the users.
DATA PROCESSING CYCLE
Introduction
Data
Data can be defined as a representation of facts, concepts, or instructions in a formalized manner,
which should be suitable for communication, interpretation, or processing by human or electronic
machine.
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or special
characters (+, -, /, *, <, >, = etc.)
Information
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following characteristics −
❖ Timely − Information should be available when required.
Data Processing
Data processing refers to the transformation of raw data into meaningful output. Data can be done
manually using a pen and paper, mechanically using simple devices e.g. typewriter or electronically
using modern data processing tools e.g. computers.
Stages of Data Processing
These four stages constitute the data processing cycle:
17 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Input Processing Output Storage
Stage Stage Stage Stage
Data Collection
Performing
Decoding Storing data
instructions
Data Capture
Encoding
Data
Transform raw
Transmission Presenting data
data into Retrieve data
to user
information
Data
Communication
Input Stage
This is the feeding of raw and sieved data for processing. If the input is not done properly or done
wrong, then the result will be adversely affected. This is because software follows the rule of “Garbage
in – garbage out (GIGO)”. Utmost care should be taken to provide the right data.
Input stage contains the following activities:
❖ Data Collection – Gathering data from the environment and preparing it for input. • The
system.
❖ Encoding – Converting data into a form that is easier to input into a data processing system.
Example: Date as DD/MM/YYYY. This saves a lot of time and reduces error.
❖ Data Transmission – Sending input data to the processor and carrying it across its various
components. It also involves carrying data from the processor to the output devices.
❖ Data Communication – Set of activities that allow data to be sent from one data-processing
system to another.
Processing Stage
This is the stage where data is processed by electronic data processing, mechanical processing or
automated means. The processed data is one which gives information to the user and can be put to
use. The raw data cannot be understood and thus needs processing which is done in this stage.
Processing of data may take time depending on the complexity of the data and the volume of input
data.
Output Stage
The result of the proceeding processing stage is collected. The particular form of the output data
depends on the use of the data. For example, output data may be pay-checks for employees.
❖ Decoding – Decoding is the process of converting code into plain text or any format that is
useful for subsequent processes. Decoding is the reverse of encoding. It converts encoded data
communication transmissions and files to their original states.
Storage Stage
This is the outcome, and the raw data provided in the first stage is now “processed,” and the data is
useful and provides information and no longer called data. The data that has been processed is stored
18 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
for later processing or reading. Storage can be done on external hard disk, inbuilt hard disk, pen
drives, micro SD cards, compact disks or even in registers.
Types of Data Processing
Manual Data Processing
This method of data processing involves human intervention. The manual process of data entry
implies many opportunities for errors, such as delays in data capture, as every single data field has to
be keyed in manually, a high amount of operator misprints or typos, high labor costs from the amount
of manual labor required. Manual processing also implies higher labor expenses in regards to
spending for equipment and supplies, rent, etc.
Electronic Data Processing (EDP)
Electronic data processing (EDP) can refer to the use of automated methods to process commercial
data. Typically, this uses relatively simple, repetitive activities to process large volumes of similar
information.
Online Processing
This processing method is a part of automatic processing method. This method at times known as
direct or random-access processing. Under this method the job received by the system is processed
at same time of receiving. This can be considered and often mixed with real-time processing. This
system features random and rapid input of transaction and user defined/ demanded direct access to
databases/content when needed.
Real time processing
In a real-time processing, there is a continual input, process and output of data. Data has to be
processed in a small stipulated time period (real time), otherwise it will create problems for the
system. For example, when a bank customer withdraws a sum of money from his or her account it is
vital that the transaction be processed and the account balance updated as soon as possible, allowing
both the bank and customer to keep track of funds.
Batch processing
In a batch processing group of transactions collected over a period of time is collected, entered,
processed and then the batch results are produced. Batch processing requires separate programs for
input, process and output. It is an efficient way of processing high volume of data. For example:
Payroll system, Examination system and billing system.
Distributed Processing
This method is commonly utilized by remote workstations connected to one big central workstation
or server. ATMs are good examples of this data processing method. All the end machines run on a
fixed software located at a particular place and make use of exactly same information and sets of
instruction.
Multi-Processing
This type of processing perhaps the most widely used types of data processing. It is used almost
everywhere and forms the basis of all computing devices relying on processors. Multi-processing
makes use of CPUs (more than one CPU). The task or sets of operations are divided between CPUs
available simultaneously thus increasing efficiency and throughput. The result and benefit of this type
of processing is the reduction in time required and increasing the output.
Time sharing
19 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Time based used of CPU is the core of this data processing type. The single CPU is used by multiple
users. All users share same CPU but the time allocated to all users might differ. The processing takes
place at different intervals for different users as per allocated time. Since multiple users can uses this
type it is also referred as multi access system.
INSTRUCTION CYCLE
A program residing in the memory unit of a computer consists of a sequence of instructions. These
instructions are executed by the processor by going through a cycle for each instruction.
Each computer's CPU can have different cycles based on different instruction sets, but will be similar
to the following cycle -
Fetch
The CPU fetches the instruction from main memory via the data bus, and it is then placed into the
CIR. the Program Counter is instructed to contain the address of the next instruction.
Decode
The instruction decoder interprets instructions. If an instruction has an indirect address, the effective
address is read from main memory. and any required data is fetches from main memory to be
processed and then placed into data registers.
Execute
The CU passes the decoded information as a sequence of control signals to the relevant function units
of the CPU to perform the actions required by the instruction, such as reading values from registers,
passing them the ALU to perform mathematical or logic functions on them, and writing the result
back into a register. If the ALU is involved, it sends a condition signal back to the CPU.
Store
The result generated by the operation is stored in the main memory, or sent to an output device.
Based on the condition of any feedback from the ALU, Program Counter may be updated to a different
address from which the next instruction will be fetched. The cycle is then repeated.
MULTIPLE CHOICE QUESTIONS
1. When an instruction is read from the memory, it is called
a) Memory Read cycle
b) Fetch cycle
c) Instruction cycle
d) Memory write cycle
Answer – b) Fetch Cycle
Explanation - Fetch means read instruction from memory
2. Information travels between components of motherboard through
a) Flash memory
b) CMOS
20 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
c) Buses
d) Peripherals
Answer – c) Buses
Explanation - Information travels between components on the mother board through Buses.
3. Which of the following is not a type of data processing?
a) Multi-user processing
b) Multi-processing
c) Batch Processing
d) Real time processing
Answer – a) Multi-user processing
Explanation – Other than a), all are the types of data processing
4. Which one of these is not a characteristic or a function of computer?
a) Data collection
b) Data storage
c) Data processing
d) Data copy
Answer – d) Data copy
Explanation – Data collection, processing and storage are the functions of a computer.
5. Which part of CPU coordinates all functions of computer and other components?
a) Motherboard
b) Coordination board
c) Control Unit
d) ALU
Answer – c) Control Unit
Explanation - The Control Unit (CU) is a component of a computer's Central Processing Unit
(CPU) that directs the operation of the processor. It tells the computer's memory, Arithmetic
Logical Unit (ALU) and input and output devices how to respond to the instructions that have
been sent to the processor.
6. Which part of computer does addition, subtraction, multiplication, division and comparison?
a) ALU
b) Memory
c) Control Unit
d) None of the above
Answer – a) ALU
Explanation - The ALU can perform Arithmetic and Logical operations. The set of arithmetic
operations that an ALU supports to addition, subtraction and more complex mathematical
operations.
7. ___________represents raw facts whereas ________ is meaning data.
a) Information, reporting
b) Data, information
c) Information, bits
d) Records, bytes
Answer – b) Data, information
21 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – A computer accepts raw data as input and provides information as output after
processing.
8. ________________ is the process of carrying out commands.
a) Fetching
b) Storing
c) Decoding
d) Executing
Answer – d) Executing
Explanation – The process of carrying out commands is called executing.
9. Computer manipulate data in many ways, and this manipulation is called
a) utilizing
b) batching
c) upgrading
d) processing
Answer – d) processing
Explanation - Data processing refers to the transformation of raw data into meaningful output.
Data can be done manually using a pen and paper, mechanically using simple devices e.g.
typewriter or electronically using modern data processing tools e.g. computers.
10. What does ‘C’ stand in CPU?
a) Central
b) Common
c) Computer
d) Convenient
Answer – a) Central
Explanation – CPU stands for Central Processing Unit
11. On the motherboard, the connection points for chips are referred to as
a) Slots
b) Sockets
c) Ports
d) Lines
Answer – b) Sockets
Explanation – Slots – for board plug
Sockets – connection points for chips
Ports – Connectors or cable plugs
12. Which of the following is a part of central processing unit?
a) Printer
b) Keyboard
c) Mouse
d) Arithmetic Logical Unit
Answer – d) Arithmetic Logical Unit
Explanation – The two typical components of a CPU include the following:
The arithmetic logic unit (ALU), which performs arithmetic and logical operations.
The control unit (CU), which extracts instructions from memory and decodes and executes
them, calling on the ALU when necessary.
22 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
13. A group of bits that tells the computer to perform a specific operation is known as
a) Instruction code
b) Micro-operation
c) Accumulator
d) Register
Answer – a) instruction code
Explanation – An instruction code is a group of bits that instruct the computer to perform a
specific operation.
14. Which of the following controls the machine cycle?
a) Control Unit
b) Memory Unit
c) Logic Unit
d) Arithmetic Unit
Answer – a) Control Unit
Explanation – The control unit (CU) is a component of a computer's central processing unit
(CPU) that directs the operation of the processor. It tells the computer's memory, arithmetic
and logic unit and input and output devices how to respond to the instructions that have been
sent to the processor.
15. The communication line between CPU, memory and peripherals is called a
a) Bus
b) Line
c) Media
d) None of these
Answer – a) Bus
Explanation – The bus is a device that is called for a wire which is used to transfer the signal
on a computer. A computer is a machine that can understand only machine language which is
in the form of electric signals.
23 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
HARDWARE
INTRODUCTION
Hardware, which is abbreviated as HW, refers to all physical components of a computer system,
including the devices connected to it. You cannot create a computer or use software without using
hardware. The screen on which you are reading this information is also a hardware.
INPUT DEVICES
Introduction
Input devices serve as a link between a user and the computer. It allows users to feed instructions
and data to computers for processing, display, storage and/or transmission.
Input Devices
Keyboard
A computer keyboard is an input device that allows a person to enter
letters, numbers, and other symbols (these are called characters in
a keyboard) into a computer. Using a keyboard to enter lots of data
is called typing. A keyboard contains many mechanical switches or
push-buttons called "keys".
Some important keys in a keyboard are:
❖ Toggle Keys – It is used to change the input mode of a group of keys on a keyboard. Caps Lock,
action of another key when pressed together. Shift, Alt, Ctrl, Fn are modifier keys.
Shift – used for capitalizing letters and entering different types of symbols.
Function (Fn) – Other functions such as brightness and volume control.
Control (Ctrl) – used for entering keyboard shortcuts, such as Ctrl+S, Ctrl+P etc.
Alt – used in combination with the numeric keys and the Control key for entering keyboard
shortcuts.
❖ Function Keys – A key on a computer keyboard, distinct from the main alphanumeric keys, to
which software can assign a function. F1 - F12 keys are known as function keys and each key
performs a different function. It may be used as single key commands (e.g., F5) or combined
with one or more modifier keys (e.g., Alt+F4).
❖ Escape Key – It is located in the upper left corner of a computer keyboard. It is often used to
24 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It is used to move the cursor position on a monitor screen. It is mainly used in
Computer Aided Design (CAD) and playing games on the computer. It can also be helpful as an input
device for people with movement disabilities.
Track Ball
A trackball is a pointing device consisting of a ball held by a socket containing
sensors to detect a rotation of the ball about two axes—like an upside-down
mouse with an exposed protruding ball. Users roll the ball to position the on-
screen pointer, using their thumb, fingers, or commonly the palm of the hand
while using the fingertips to press the mouse buttons.
Scanner
The scanner uses the pictures and pages of text as input. It scans the picture or a document. The
scanned picture or document then converted into a digital format or file and is displayed on the screen
as an output. It uses optical character recognition techniques to convert images into digital ones.
Some of the common types of scanners are as follows:
Types of Scanner:
Flatbed Scanner
It has a glass pane and a moving optical CIS or CCD array. The light illuminates the pane,
and then the image is placed on the glass pane. The light moves across the glass pane and scans the
document and thus produces its digital copy. You will need a transparency adapter while scanning
transparent slides.
Handheld Scanner
It is a small manual scanning device which is held by hand and is rolled over a flat image
that is to be scanned. The drawback in using this device is that the hand should be steady while
scanning; otherwise, it may distort the image. One of the commonly used handheld scanners is the
barcode scanner which you would have seen in shopping stores.
Sheetfed Scanner
In this scanner, the document is inserted into the slot provided in the scanner. The main
components of this scanner include the sheet-feeder, scanning module, and calibration sheet. The
light does not move in this scanner. Instead, the document moves through the scanner. It is suitable
for scanning single page documents, not for thick objects like books, magazines, etc.
25 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Drum Scanner
Drum scanner has a photomultiplier tube (PMT) to scan images. It does not have
a charge-coupled device like a flatbed scanner. The photomultiplier tube is extremely sensitive to
light. The image is placed on a glass tube, and the light moves across the image, which produces a
reflection of the image which is captured by the PMT and processed. These scanners have high
resolution and are suitable for detailed scans.
Photo Scanner
It is designed to scan photographs. It has high resolution and color depth, which are
required for scanning photographs. Some photo scanners come with in-built
software for cleaning and restoring old photographs.
Barcode Reader
It is an electronic device for reading printed barcodes. A light sensor in the barcode
reader can read the barcode and translates optical impulses into electrical impulses to
store the data into the computer. It is an important tool for warehouse management
and operations.
Magnetic Ink Character Recognition (MICR)
A light pen is a computer input device in the form of a light-sensitive wand used
in conjunction with a computer's cathode-ray tube display. It allows the user to point to displayed
objects or draw on the screen in a similar way to a touchscreen but with greater positional accuracy.
OUTPUT DEVICES
Introduction
An output device is any piece of computer hardware equipment which converts information into
human-readable form. It can be text, graphics, tactile, audio, and video.
Output Devices
Monitor
Monitors are the main output device of a computer. It forms images from tiny
dots that are arranged in a rectangular form. The sharpness of the image
depends on the number of pixels. There are two kinds of viewing screens used
for monitors.
❖ Cathode-Ray Tube (CRT) - The CRT display is made up of small picture
elements called pixels. CRT tube creates an image on the screen using a beam of electrons.
27 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Flat- Panel Display - The flat-panel display refers to a class of video devices that have reduced
volume, weight and power requirement in comparison to the CRT.
❖ Liquid Crystal Display (LCD) Monitor - LCD monitors use compact fluorescent tubes to
illuminate and brighten the image on the screen and produce good image quality, resolution
and contrast levels.
❖ Light Emitting Diode (LED) Monitor - LED monitors use new backlighting technology to
improve picture quality. The LED monitor is more lifelike and accurate due to the improved
contrast ratios and colour saturation over LCD.
❖ Organic Light Emitting Diode (OLED) Monitor – This type of monitor made up of some organic
material (containing carbon, like wood, plastic or polymers) that is used to convert the electric
current into light. They are directly used to produce the correct colour and there is no need
for backlight which saves power and space.
Printer
Printers are output devices that prints information in the form of text/images on a paper. Impact
Printers and Non-impact printers are the two types of printers.
❖ Impact Printer
The impact printers print the characters by striking them on the ribbon which is then pressed
on the paper. Examples: Dot-Matrix Printers, Line Printers, Daisy wheel printer, Drum printer,
Chain printer, Band printer.
Dot-Matrix Printer – It prints characters as a combination of dots. They have a matrix of pins
on the print head of the printer which form the character. They generally have 9-24 pins. Their
speed is measured in cps (Character Per Second).
Line Printer – A line printer is an impact printer which can print one line of text at a time. It is
also known as a bar printer.
❖ Non-Impact Printer
28 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Non-impact printers print the characters on the paper without using ribbon. These printers
print a complete page at a time, so they are also called as page printers. Examples - Laser
Printers, Inkjet Printers etc.
Laser Printers – A laser printer is a popular type of personal computer printer that uses a non-
impact photocopier technology. The type of ink used in a laser printer is dry. It gives high-
quality output. The resolution of laser printers is measured in dpi (dots-per inch).
Inkjet Printers – Inkjet printers work by spraying ink on a sheet of paper. The type of ink used
in an inkjet printer is wet.
❖ Other Types
Solid Ink Printer – It is a type of colour printer. It works by melting the solid ink that applies the
images to the paper. It is non-toxic and convenient to handle.
LED Printer – This type of printer uses a light emitting diode instead of a laser. It starts by
creating a line-by-line image of the page.
Plotter
A plotter is an output device used to produce hard copies of large graphs and designs on paper, such
as construction drawings, architectural plans, and business charts. Drum plotters and Flatbed plotters
are the types of plotters.
❖ Drum plotter – It is a pen plotter that wraps the paper around a drum with a pin feed
attachment. The drum then rotates the paper as pens move across it and draw the image. It is
used to produce continuous output, such as plotting of earthquake activity. It is also known as
Roller Plotter.
❖ Flatbed plotter - It plots on paper that is spread and fixed over a rectangular flatbed table. It
is used in the design of cars, ships, aircrafts, buildings, highways etc. It is also known as Table
Plotter.
Speaker
Speaker is one of the output devices used with computers. They are transducers that convert
electromagnetic waves into sound waves.
29 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Digital Projectors
Projector is a device that connects with a computer and projects the output onto a white screen or
wall.
MOTHERBOARD
Introduction
The motherboard is generally a thin circuit board that holds together almost all parts of a computer
except input and output devices. All crucial hardware like CPU, memory, hard drive, and ports for
input and output devices are located on the motherboard. It is the biggest circuit board in a computer
chassis.
It allocates power to all hardware located on it and enables them to communicate with each other.
Each component that runs the computer or improves its performance is a part of the motherboard or
connected to it through a slot or port.
Components of Motherboard
CPU Slot
It is provided to install the CPU. It is a link between a microprocessor and a motherboard. It facilitates
the use of CPU and prevents the damage when it is installed or removed.
RAM Slot
It is a memory slot or socket provided in the motherboard to insert or install the RAM (Random Access
Memory). There can be two or more memory slots in a computer.
Expansion Slot
It is also called the bus slot or expansion port. It is a connection or port on the motherboard, which
provides an installation point to connect a hardware expansion card, for example, you can purchase
a video expansion card and install it into the expansion slot.
Capacitor
It is made of two conductive plates, and a thin insulator sandwiched between them. These parts are
wrapped in a plastic container.
Inductor (Coil)
It is an electromagnetic coil made of a conducting wire wrapped around an iron core. It acts as an
inductor or electromagnet to store magnetic energy.
Northbridge
It is an integrated circuit that allows communications between the CPU interface, AGP, and memory.
Furthermore, it also allows the southbridge chip to communicate with the RAM, CPU, and graphics
controller.
USB Port
30 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It stands for Universal Serial Bus. It allows you to connect hardware devices like mouse, keyboard to
your computer.
PCI Slot
It stands for Peripheral Component Interconnect slot. It allows you to connect the PCI devices like
modems, network hardware, sound, and video cards.
AGP Slot
It stands for Accelerated Graphics Port. It provides the slot to connect graphics cards.
Heat Sink
It absorbs and disperses the heat generated in the computer processor.
Power Connector
It is designed to supply power to the motherboard.
CMOS battery
It stands for Complementary Metal-Oxide-Semiconductor. It is a memory that stores the BIOS settings
such as time, date, and hardware settings.
MULTIPLE CHOICE QUESTIONS
1. Which of the following is a pointing and drop device?
a) Scanner
b) Printer
c) Keyboard
d) Mouse
Answer – d) Mouse
Explanation - Point and draw Devices - A pointing device is an input interface that allows a
user to input spatial (i.e., continuous and multi-dimensional) data to a computer. Movements
of the pointing device are echoed on the screen by movements of the pointer (or cursor) and
other visual changes.
2. External devices such as printers, keyboards and modems are known as
a) Special Buys
b) Add on Devices
c) Peripherals
d) All of the above
Answer – c) Peripherals
Explanation - A peripheral or peripheral device is ancillary device used to put information into
and get information out of the computer. All the input and output devices are termed as
peripheral devices.
3. In laser printers, printing is achieved by deflecting laser beam on to __________ surface of a
drum.
a) Magnetic
b) Electric
c) Photosensitive
d) None of the above
Answer – c) photosensitive
Explanation - "Not Required, the answer is self-explanatory"
4. Which of the following is not a hardware?
31 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
a) Processor
b) Printer
c) Mouse
d) Java
Answer – d) Java
Explanation – Java is a general-purpose programming language that is class-based, object-
oriented, and designed to have as few implementation dependencies as possible
5. The transfer of data from a CPU to peripheral devices of computer is achieved through
a) Modem
b) Interface
c) Buffer
d) I/O ports
Answer – d) I/O ports
Explanation - The transfer of the data from a CPU to peripheral devices of a computer is
achieved through Computer ports (also called I/O ports).
6. A thin plate or board that contains electronic components is called
a) Hard Disk
b) RAM
c) ROM
d) Circuit Board
Answer – d) Circuit Board
Explanation – Circuit Board also called Printed Circuit Board (PCB), a thin plate on which chips
and other electronic components are placed. Computers consist of one or more boards, often
called cards or adapters.
7. Which is used to create a digital representation of a printed document or photograph?
a) Video Digitizer
b) Scanner
c) Monitor
d) None of the above
Answer – b) Scanner
Explanation - A scanner is a device that optically scans images, printed text, handwriting or an
object and converts it to a digital image.
8. The wheel located between the two standard buttons on a mouse is termed as
a) roller wheel
b) scroll wheel
c) pointer wheel
d) tyre
Answer – b) scroll wheel
Explanation –
A scroll wheel (or mouse wheel) is a hard plastic or rubbery disc (the "wheel") on
a computer mouse that is perpendicular to the mouse surface. It is normally located between
the left and right mouse buttons.
32 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
9. Bar-code readers use light to read
a) UPCs
b) UPSs
c) POSs
d) Optical Marks
Answer – a) UPCs
Explanation – UPC code, are generally linear black and white spaces of varying widths. They
will have close to 12 characters.
33 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
c) Light Pen
d) Digitizer
Answer – d) Digitizer
Explanation – A plotter is a computer hardware device much like a printer that is used for
printing vector graphics.
A trackball is a pointing device consisting of a ball held by a socket containing sensors to detect
a rotation of the ball about two axes—like an upside-down.
A light pen is a light-sensitive pointing input device commonly used to select or otherwise
modify text or data on a screen. Used with a CRT monitor, these devices were an early form of
manipulating and highlighting data on the screen.
A digitizer is a hardware device that receives analog information, such as sound or light, and
records it digitally. Usually, the information is stored in a file on a computing device. This
process is called digitization.
20. Which of the following is/are non-emissive display?
a) LED
b) LCD
c) Both (a) and (b)
d) None of the above
Answer – b) LCD
Explanation – LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid
crystals in its primary form of operation.
21. Which input device is used to read information on a credit card?
a) Graphic Tablet
b) Numeric Keyboard
c) Bar Code Reader
d) Magnetic Stripe Reader
Answer – d) Magnetic Stripe Reader
Explanation – A magnetic stripe reader, also called a magstripe reader, is a hardware device
that reads the information encoded in the magnetic stripe located on the back of a plastic
badge (credit/debit cards).
22. In which part of computer, the work done by a computer operator is displayed?
a) PU
b) VDU
c) ALU
d) None of the above
Answer – b) VDU
Explanation – VDU Stands for "Visual Display Unit." A VDU displays images generated by a
computer or other electronic device.
23. Which device involves photo scanning of the text character by character, analysis of the
scanned image, and then translation of the character image into character code?
a) OCR
b) OMR
c) Bar Code Reader
d) MICR
34 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Answer – a) OCR
Explanation – Optical Character Recognition or Optical Character Reader is the electronic or
mechanical conversion of images of typed, handwritten or printed text into machine-encoded
text, whether from a scanned document, a photo of a document, a scene-photo or from
subtitle text superimposed on an image.
24. In OCR processing, when a character is recognized, it is converted into
a) Binary Code
b) ASCII Code
c) Both (a) and (b)
d) None of the above
Answer – b) ASCII Code
Explanation – ASCII is the acronym for the American Standard Code for Information
Interchange. It is a code for representing 128 English characters as numbers, with each letter
assigned a number from 0 to 127.
25. TFT stands for
a) Thick Film Transmitter
b) Thin Film Transistor
c) Thick Film Transistor
d) Thin Film Transmitter
Answer – b) Thin Film Transmitter
Explanation – A Thin Film Transistor (TFT) is a type of field-effect transistor that is usually used
in a liquid crystal display (LCD).
26. Which of the following input device is used in banks to read magnetized characters on a
cheque?
a) OCR
b) MICR
c) Bar Code Reader
d) Magnetic Stripe Reader
Answer – b) MICR
Explanation – Magnetic Ink Character Recognition (MICR) is the line of numbers that appears
at the bottom of a cheque. The MICR line is a group of three numbers, which are the cheque
number, account number, and bank routing number.
27. The refresh rate of monitor is measured in
a) byte
b) seconds
c) Hertz
d) Kips
Answer – c) Hertz
Explanation – A refresh rate is the number of times your monitor updates with new images
each second. For example, a 60 Hz refresh rate means the display updates 60 times per second
28. __________ transmits one bit of data through a single wire.
a) Serial Port
b) Fire wire
c) Parallel Port
35 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
d) Other than those given in the options
Answer – a) Serial Port
Explanation – A serial port is a serial communication interface through which information
transfers in or out sequentially one bit at a time. This is in contrast to a parallel port which
communicates multiple bits simultaneously in parallel.
29. ________ is a high-speed real-time interface for serial bus and it has data transfer up to 400
Mbps.
a) Serial Port
b) FireQire
c) Parallel Port
d) Other than those given in the options
Answer – b) FireWire
Explanation – FireWire is a method of transferring information between digital devices,
especially audio and video equipment. Also known as IEEE 1394, FireWire is fast -- the latest
version achieves speeds up to 800 Mbps.
30. __________ is an interface for connecting eight or more data wires.
a) Serial Port
b) Fire wire
c) Parallel Port
d) Other than those given in the options
Answer – c) Parallel Port
Explanation – A parallel port is a type of interface found on computers for connecting
peripherals. The name refers to the way the data is sent; parallel ports send multiple bits of
data at once, as opposed to serial interfaces that send bits one at a time.
31. MICR reads the characters by examining their shapes in _________ form.
a) Binary
b) ASCII
c) Matrix
d) None of the above
Answer – c) Matrix
Explanation – The MICR is a device that can recognize human readable characters printed on
documents such as cheques using a special magnetic ink. The reader reads these characters by
36 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
examining their shapes. Characters are printed in a special font. Each character is formed by a
7 x 10 matrix.
32. Which among the device that converts computer output into a form that can be transmitted
over a telephone line?
a) Teleport
b) Multiplexer
c) Concentrator
d) Modem
Answer – d) Modem
Explanation – Modem is short for "Modulator-Demodulator." It is a hardware component that
allows a computer or another device, such as a router or switch, to connect to the Internet. It
converts or "modulates" an analog signal from a telephone or cable wire to digital data (1s and
0s) that a computer can recognize.
33. Which of the following groups consists of only input devices?
a) Mouse, Keyboard, Monitor
b) Mouse, Keyboard, Printer
c) Mouse, Keyboard, Plotter
d) Mouse, Keyboard, Scanner
Answer – d) Mouse, Keyboard, Scanner
Explanation – Computer Input Devices:
❖ Keyboard
❖ Mouse
❖ Joy Stick
❖ Light pen
❖ Track Ball
❖ Scanner
❖ Graphic Tablet
❖ Microphone
34. The individual dots that form the image on a monitor are called
a) particles
b) frames
c) pixels
d) none of the above
Answer – c) pixels
Explanation – The pixel (a word invented from "picture element") is the basic unit of
programmable color on a computer display or in a computer image.
35. The pattern of printed lines on most products are called
a) OCR
b) Bar code
c) MICR
d) PATTERN
Answer – b) Bar code
37 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – A barcode or bar code is a method of representing data in a visual, machine-
readable form. Initially, barcodes represented data by varying the widths and spacings of
parallel lines.
36. Which of the following devices would require the use of a stylus?
a) Graphic tablet
b) Digital Notebook
c) Bar-code Reader
d) None of the above
Answer – a) Graphic Tablet
Explanation – A Graphic tablet (also known as a digitizer, drawing tablet, drawing pad, digital
drawing tablet, pen tablet, or digital art board) is a computer input device that enables a user
to hand-draw images, animations and graphics, with a special pen-like stylus, similar to the
way a person draws images with a pencil and paper.
37. Which of the following is not a point-and-draw device?
a) Keypad
b) Trackball
c) Mouse
d) Touch Screen
Answer – a) Keypad
Explanation – Examples of pointing devices include mice, trackballs, joysticks, touchpads, and
light pens.
38. The unattended interactive information systems such as Automatic Teller Machine or ATM is
called as
a) Kiosks
b) Sioks
c) Cianto
d) Kiaks
Answer – a) Kiosks
Explanation – An interactive kiosk is a computer terminal featuring specialized hardware and
software that provides access to information and applications for communication, commerce,
entertainment, or education.
38 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
39 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
MEMORY
INTRODUCTION
The computer memory holds the data and instructions needed to process raw data and produce
output. The computer memory is divided into large number of small parts known as cells. Each cell
has a unique address which varies from 0 to memory size minus one.
MEMORY HIERARCHY
The memory is characterized on the basis of two keys factors; capacity and access time. The lesser
the access time, the faster is the speed of memory. The computer uses a hierarchy of memory that is
organized in a manner to enable the fastest speed and largest capacity of memory.
CPU
Register
Cache Memory
Storage Speed
(Low to High) (Low to High)
Main Memory
Magnetic Disk
Magnetic Tape
❖ Register can set flip- flops. These are very close to the CPU. The register is the fastest memory.
❖ Cache memory can store important data, i.e., highly executed data. It is the fast and smallest
memory.
❖ It stores the data for immediate manipulations.
MEMORY MANAGEMENT
Following are the memories of a computer:
Register Memory
Cache Memory
Primary memory
Secondary memory
40 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Register DRAM
Memory
RAM SRAM
SDRAM
Primary
Memory
PROM
ROM EPROM
EEPROM
Memory
Floppy Disk
Magnetic
Hard Disk
Memory
Register Memory
Register memory is the smallest and fastest memory in a computer. It is not a part of the main
memory and is located in the CPU in the form of registers, which are the smallest data holding
elements. A register temporarily holds frequently used data, instructions, and memory address that
are to be used by CPU.
Types and Functions of Computer Registers:
❖ Data Register – It is a 16-bit register, which is used to store operands (variables) to be operated
by the processor. It temporarily stores data, which is being transmitted to or received from a
peripheral device.
❖ Program Counter (PC) – It holds the address of the memory location of the next instruction,
which is to be fetched after the current instruction is completed. So, it is used to maintain the
path of execution of the different programs and thus executes the programs one by one, when
the previous instruction gets completed.
❖ Instructor Register – It is a 16-bit register. It stores the instruction which is fetched from the
main memory. So, it is used to hold instruction codes, which are to be executed. The Control
Unit takes instruction from Instructor Register, then decodes and executes it.
❖ Accumulator Register – It is a 16-bit register, which is used to store the results produced by
the system. For example, the results generated by CPU after the processing are stored in the
AC register.
❖ Address Register – It is a 12-bit register that stores the address of a memory location where
instructions or data is stored in the memory.
❖ I/O Address Register – Its job is to specify the address of a particular I/O device.
❖ I/O Buffer Register – Its job is to exchange the data between an I/O module and the CPU.
41 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Cache Memory
Cache memory is a type of memory used to hold frequently used data. Cache memory is relatively
small but very fast. Most web browsers use a cache to load regularly viewed web pages fast. The most
important type of cache memory is the CPU cache. Once the data is stored in cache, it can be used by
accessing the cached copy rather than recomputing the original data.
Primary Memory
Primary memory is also called as the main memory of the computer. It stores the instructions,
operating system and data which required to run the computer. The primary memory includes RAM
and ROM.
Random Access Memory (RAM)
RAM performs both read and writes operations on memory. It stores data for temporally. If power
failures happened in systems during memory access then you will lose your data permanently. So,
RAM is a volatile memory.
RAM categorized into following types.
❖ Dynamic RAM – Dynamic Random-Access Memory (DRAM) is a type of random-access
memory used in computing devices. It is made up of capacitors and transistors. DRAM must
be constantly refreshed, or it loses its contents. This type of memory is more economical.
❖ Static RAM – Static Random-Access Memory (SRAM) is a type of RAM that holds data in a static
form, i.e., as long as the memory has power. Unlike dynamic RAM, it does not need to be
refreshed.
❖ Synchronous Dynamic RAM – A type of DRAM that can run at much higher clock speeds
contained a pre-programmed set of data or instructions. These kinds of ROMs are known as
Masked ROMs which are inexpensive.
❖ Programmable Read Only Memory (PROM) – PROM is read-only memory that can be
modified only once by a user. The user buys a blank PROM and enters the desired contents
using a PROM program. Inside the PROM chip, there are small fuses which are burnt open
during programming. It can be programmed only once and is not erasable.
❖ Erasable Programmable Read Only Memory (EPROM) – EPROM can be erased by exposing it
to ultra-violet light. Usually, an EPROM eraser achieves this function. During programming, an
electrical charge is trapped in an insulated gate region. The charge is retained for more than
10 years because the charge has no leakage path. For erasing this charge, ultra-violet light is
passed through a quartz crystal window (lid). This exposure to ultra-violet light dissipates the
charge.
❖ Electrically Erasable Programmable Read Only Memory (EEPROM) – EEPROM is programmed
and erased electrically. It can be erased and reprogrammed about ten thousand times. Both
erasing and programming take about 4 to 10 ms (millisecond). In EEPROM, any location can be
42 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
selectively erased and programmed. EEPROMs can be erased one byte at a time, rather than
erasing the entire chip. Hence, the process of reprogramming is flexible but slow.
Secondary Memory
Secondary memory is also known as external memory or non-volatile. It is slower than the main
memory. These are used for storing data/information permanently. CPU directly does not access
these memories, instead they are accessed via input-output routines. The contents of secondary
memories are first transferred to the main memory, and then the CPU can access it. For example,
disk, CD-ROM, DVD, etc.
Floppy Disk
Floppy disk is composed of a thin, flexible magnetic disk sealed in a square
plastic carrier. Floppy disks were widely used to distribute software, transfer
files, and create backup copies of data. To read and write data from a floppy
disk, a computer system must have a floppy disk drive (FDD).
Floppy Disks come in three basic sizes:
▪ 8-inch
1
▪ 5 -inch
4
1
▪ 3 -inch
2
Hard drive
It is a non-removable storage device containing magnetic disks or platters rotating at high speeds.
The hard drives store data in segments of concentric circles. It may spin at 5,400 to 15,000 RPM.
The following figure shows the parts of a hard disk.
Magnetic Tape
Magnetic Tape was often used for digital data storage, because of its low cost and
ability to store large amounts of data. The technology essentially consisted of a magnetically thin
coated piece of plastic wrapped around wheels. Its relative slowness and unreliability compared to
other data storage solutions has resulted in it now being largely abandoned as a media.
Compact Disc (CD)
43 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
A compact disc is a portable storage medium that can be used to record,
store data in digital form. They are fragile and prone to scratches. Compact disc read-only memory
(CD-ROM) - It is a storage device that can be read but can’t change or delete it.
Digital Video Disc (DVD)
A device currently used to store data in large amounts and accepts high
definition material. A two-layered DVD can hold approximately 17 gigabytes of video, sound, or other
data.
Blue-ray Disc
The upgraded version of CD and DVD discs and drives are the Blu-ray discs. It is
commonly known as BD-ROM. The Maximum capacity of BD disc is 25GB if single layer and 50 GB if
dual layer.
USB Flash Drives
USB Flash drives are small, ultra-portable storage device. USB refers to the USB
connection that allows users to plug the device into the USB port of a computer.
They are often referred to as pen drives, thumb drives, or jump drives. Mostly
they have a storage capacity from 8 GB to 64 GB.
Zip Disks
44 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
MEMORY MEASUREMENT
The data is measured in term of bits in the memory.
❖ A Bit is a single binary value that may be 0 or 1.
Name Size
1 bit Single digit 0 or 1
1 nibble 4 bits
1 byte 8 bits
1 Kilobyte (KB) 1024 Bytes
1 Megabyte (MB) 1024 KB
1 Gigabyte (GB) 1,024 MB
1 Terabyte (TB) 1,024 GB
1 Petabyte (PB) 1,024 TB
1 Exabyte (EB) 1,024 PB
1 Zetta byte (ZB) 1,024 EB
1 Yotta Byte (YB) 1,024 ZB
46 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Read only memory (ROM) is the permanent memory which is used to store these
important control programs and systems software to perform functions such as booting up or
starting up programs. ROM is non-volatile. That means the contents are not lost when the
power is switched off.
8. A Winchester disk is a_________.
a) disk stack
b) removable disk
c) flexible disk
d) All of these
Answer – a) disk stack
Explanation – A Winchester disk is a Disk Stack. Another term for hard disk drive. The term
Winchester comes from an early type of disk drive developed by IBM that had 30MB of fixed
storage and 30MB of removable storage
9. When we work on any document on PC, it is stored temporarily on-
a) RAM
b) ROM
c) CPU
d) Flash memory
Answer – a) RAM
Explanation – RAM (Random Access Memory) is the hardware in a computing device where
the operating system (OS), application programs and data in current use are kept so they can
be quickly reached by the device's processor.
10. Which of the following is used to hold ROM, RAM, CPU and expansion cards?
a) Computer bus
b) Motherboard
c) Cache memory
d) All of these
Answer – b) Motherboard
Explanation – Motherboard is specifically refers to a PCB with expansion capability and as the
name suggests, this board is often referred to as the "mother" of all components attached to
it, which often include peripherals, interface cards, and daughtercards: sound cards, video
cards, network cards, hard drives, or other forms of persistent storage; TV tuner cards, cards
providing extra USB or FireWire slots and a variety of other custom components.
11. Where, data will remain intact even when the computer is turned off?
a) RAM
b) Mother board
c) Secondary storage device
d) Primary storage device
Answer – c) Secondary Storage device
Explanation – A secondary storage device refers to any non-volatile storage device that is
internal or external to the computer. It can be any storage device beyond the primary storage
that enables permanent data storage.
12. Virtual memory is_______.
a) memory on the hard disk that the CPU uses as an extended RAM
47 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
b) in RAM
c) only necessary if you do not have any RAM in your computer
d) a backup device for floppy disk
Answer – a) memory on the hard disk that the CPU used as an extended RAM.
Explanation – Virtual memory is the memory on the hard disk that the CPU uses an extended
RAM.
13. Technique of placing software/programs in a ROM semiconductor chip is called ______
a) PROM
b) EPROM
c) Firmware
d) None of the above
Answer – c) Firmware
Explanation – Firmware is data that is stored on a computer or other hardware device's ROM
(read-only memory) that provides instruction on how that device should operate.
14. _____________ is the process of locating the noncontiguous fragments of data into which a
computer file may be divided as it is stored on a hard disk, and rearranging the fragments and
restoring them into fewer fragments or into the whole file.
a) Paging
b) Defragmentation
c) Segmentation
d) None of the above
Answer – b) Defragmentation
Explanation – In the maintenance of file systems, defragmentation is a process that reduces
the degree of fragmentation. It does this by physically organizing the contents of the mass
storage device used to store files into the smallest number of contiguous regions (fragments,
extents).
15. Which of the following is an example of optical disk?
a) Magnetic disk
b) Memory disk
c) Digital Versatile Disk
d) None of the Above
Answer – c) Digital Versatile Disk
Explanation – Digital versatile disk is an example of an optical disk. Compact disks (CD), digital
versatile/video disks (DVD) and Blu-ray disks are currently the most commonly used forms of
optical disks.
16. Cache and main memory will not be able to hold their contents when the power is off. They
are ________
a) Static
b) Dynamic
c) Non-Volatile
d) Volatile
Answer – d) Volatile
48 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Volatile memory is computer storage that only maintains its data while the
device is powered. Most RAM (random access memory) used for primary storage in personal
computers is volatile memory.
17. The term ‘giga byte’ equals to ________
a) 1024 byte
b) 1024 KB
c) 1024 GB
d) 1024 MB
Answer – d) 1024 MB
Explanation –
❖ Bit – A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a
❖ Kilobyte – KB stands for Kilobyte. A kilobyte is 1024 bytes so 1KB equal to 1024 x 8 =
18. Which of the following memories uses a MOS capacitor as its memory cell?
a) SRAM
b) DRAM
c) ROM
d) FIFO
Answer – b) DRAM
Explanation – Dynamic random-access memory (DRAM) is a type of random access
semiconductor memory that stores each bit of data in a memory cell consisting of a tiny
capacitor and a transistor, both typically based on metal-oxide-semiconductor (MOS)
technology.
19. A byte can represent any number between 0 and _______
a) 312
b) 255
c) 1024
d) 1025
Answer – b) 255
Explanation – A bit is the most basic unit and can be either 1 or 0. A byte is not just 8 values
between 0 and 1, but 256 (28) different combinations (rather permutations) ranging from
00000000 via e.g. 01010101 to 11111111. Thus, one byte can represent a decimal number
between 0(00) and 255.
20. What is the name given to the memory which works on time sharing principle in order to create
an illusion of infinite memory space?
a) Cache memory
b) Register
49 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
c) Virtual memory
d) Primary memory
Answer – c) Virtual Memory
Explanation – Virtual memory is a memory management technique that provides an "idealized
abstraction of the storage resources that are actually available on a given machine" which
"creates the illusion to users of a very large memory".
21. The location of a unit of data in a memory array is called its
a) Storage
b) Address
c) RAM
d) Data
Answer – b) Address
Explanation – Address - A location of data, usually in main memory or on a disk. Disks are
divided into tracks and sectors, each of which has a unique address. Usually, you do not need
to worry about addresses unless you are a programmer.
22. Which of the following is not a type of memory?
a) RAM
b) ROM
c) FPROM
d) EEPROM
Answer – c) FPROM
Explanation –
RAM – Random Access Memory
ROM – Read Only Memory
EEPROM – Electrically Erasable Programmable Read Only Memory
23. Data is written to and read from the disk via a magnetic ________ head mechanism in the
floppy drive.
a) Cylinder
b) Read/ write
c) Recordable
d) Cluster
Answer – b) Read/Write
Explanation –
25. Which of the following are normally used to initialize a computer system's hardware?
a) Bootstrap Memory
b) Volatile Memory
c) External Mass Memory
d) Static Memory
Answer – a) Bootstrap Memory
Explanation – A Bootstrap Memory can be defined as a read-only memory which contains
various basic instructions which are needed for starting up the computer. It helps the
computer to load additional programs, i.e. the operating system after starting up.
26. DOS floppy disk does not have
a) A boot record
b) File allocation table
c) Virtual memory
d) BIOS
Answer – b) BIOS
Explanation – BIOS software is stored on a non-volatile ROM chip on the motherboard.
27. A memory in which the information is stored last is on top & is retrieved first is known as
____________
a) PROM
b) Buffer
c) Stack Memory
d) RAM
Answer – c) Stack Memory
Explanation – Stack Memory is a memory usage mechanism that allows the system memory
to be used as temporary data storage that behaves as a first-in, last-out buffer.
28. Which of the following floppy sizes exists?
a) 5.25 inches
b) 4.75 inches
c) 6 inches
51 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
d) None of the above
Answer – a) 5.75 inches
Explanation – There are two types of Floppy Disk –
1. 5.25 inches (1.25 MB)
2. 3.5 inches (1.44 MB)
29. Memory which forgets everything when you switch off the power is known as
a) Corrupted
b) Volatile
c) Non-volatile
d) Non-corrupted
Answer – b) Volatile
Explanation – Volatile memory is computer storage that only maintains its data while the
device is powered. Most RAM (random access memory) used for primary storage in personal
computers is volatile memory.
30. The _____________ is a section of RAM where your computer stores copied data.
a) Clipboard
b) Copy Area
c) Binary Number
d) Other than those given in the options
Answer – a) Clipboard
Explanation – The clipboard is a buffer that some operating systems provide for short-term
storage and transfer within and between application programs. The clipboard is usually
temporary and unnamed, and its contents reside in the computer's RAM. The clipboard is
sometimes called the paste buffer.
52 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
SOFTWARE
INTRODUCTION
Software, which is abbreviated as SW or S/W, is a set of programs that enables the hardware to
perform a specific task. All the programs that run the computer are software.
The software can be of three types
System Software
Application Software
Programming Software.
System Software
The system software is the main software that runs the computer. When you turn on the computer,
it activates the hardware and controls and coordinates their functioning. It serves as an interface
between a computer user, computer hardware and application software. The application programs
are also controlled by system software.
There are four types of system software
❖ Operating System
❖ Utility Programs
❖ Device drivers
❖ Language Translators
Operating System
An operating system is the system software that works as an interface to enable the user to
communicate with the computer. It manages and coordinates the functioning of hardware and
software of the computer. The commonly used operating systems are Microsoft Windows, Linux, and
Apple Mac OS X.
Utility Programs
Utility Programs help to manage, maintain and control computer resources. They are also known as
service programs. Examples of utility programs are antivirus software, backup software, disk
defragment, backup, disk clean etc.
Disk Compression – It increases the amount of information that can be stored on a hard disk by
compressing all information stored on a hard disk. This utility works automatically and the user does
not need to be aware of its existence, e.g. DiskDoubler, SuperStor Pro, DoubleDisk Gold, etc.
Disk Defragment – It detects computer files whose contents are broken across several locations on
the hard disk and moves the fragments to one location to increase efficiency. It can be used to
rearrange files and unused space on your hard disk. e.g. MyDefrag, Diskeeper, Defraggler, etc.
Backup Utilities – It can make a copy of all information stored on a disk and restore either the entire
disk or selected files.
Disk Cleaner – It is used to find files that have not been used for a long time. This utility also serves
to increase the speed of a slow computer, e.g. Bleach Bit cleaner, etc.
Anti-virus – It is the utility which is used to scan computer for viruses and prevent the computer
system les from being corrupt, e.g. Kaspersky, AVG, McAfee, Avira, etc.
Text Editor – It is a program that facilitates the creation and correction of text. It is used to type only
text which can be stored for future reference. A text editor supports special commands for text
editing, i.e. you can write, delete, find and replace words, lines, paragraphs, etc. e.g. MS-Word,
53 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
WordPad, Notepad etc. in which Notepad is the most popular text editor.
Device Drivers
A device driver is designed to enable interaction with hardware devices. It controls a device that is
attached to your computer. Printers, Displays, CDROM readers, Disk drives etc. are the examples of
the device driver.
Language Translator
Language Translator translates the high-level language program (input) into an equivalent machine
language program (output). It also detects and reports the error during translation.
Assembler, Compiler, Interpreter are types of a Language Translator.
❖ Assembler – It converts assembly language program into machine language.
54 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It is used to create presentations of slides containing text and graphics. It typically includes three
major functions – an editor that allows text to be inserted and formatted, methods for inserting and
manipulating graphic images and a slideshow system to display the content e.g. MS PowerPoint.
Multimedia Software
This software is developed to perform editing of video, audio, and text. It allows you to combine texts,
videos, audio, and images. Thus, you can improve a text document by adding photos, animations,
graphics, and charts through multimedia software. For example, VLC player, Window Media Player,
etc.
Desktop Publishing Software
DTP Software is used to produce high publications at low cost. It takes in text created on a word
processor direct to the DTP system and combine this electronically with a graphic element and the
resulting completed pages are then printed using high resolution output devices.
Database Package Software
Database software is a software program or utility used for creating, editing and maintaining database
files and records. This type of software allows users to store data in the form of structured fields,
tables and columns, which can then be retrieved directly and/or through programmatic access.
Programming Software
It is a set or collection of tools that help developers in writing other software or programs. It assists
them in creating, debugging, and maintaining software or programs or applications. We can say that
these are facilitator software that helps translate programming language such as Java, C++, Python,
etc., into machine language code. So, it is not used by end-users. For example, compilers, linkers,
debuggers, interpreters, text editors, etc. This software is also called a programming tool or software
development tool.
Some examples of programming software include:
❖ Eclipse – It is a java language editor.
❖ Sublime text – It is a cross-platform code editor for Linux, Mac, and Windows.
COMPUTER LANGUAGE
A Computer Language is the means by which instructions and data are transmitted to computers.
Languages are divided into two categories:
Low level language
Machine language
In machine language programs can be develop in binary language (0 or 1). It is also known as binary
language.
Assembly language
It is known as symbolic language. It is a low-level language programming language using the human
readable instruction of the CPU. It is written as:
move ab, cd
move ax, 50
55 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
High level Language
Programmer can write code in simple English language. It is very user friendly as compare to low level
language. e.g.: C, C++, PASCAL, FORTRAN, COBOL, BASIC, PROLOG, JAVA etc
BASIC
Beginner's All-purpose Symbolic Instruction Code (BASIC) was developed for students to write simple
computer programs. It was designed by John Kemeney and Thomas Kurtz in 1963.
ALGOL
ALGOL is a short form of ALGOrithmic Language. It is a family of portable programming languages for
scientific computations.
PROLOG
Prolog is used widely for artificial intelligence applications, particularly expert systems.
PASCAL
It is used to teach programming techniques. It was developed by Niklaus Wirth.
FORTRAN
It is a programming language designed for numeric computation and scientific computing. FORmula
TRANslation is an acronym of FORTRAN.
COBOL
Common Business Oriented Language is the full form of COBOL. It is used for business and
administrative purposes. It can be read like regular English.
C
It is a general-purpose language which is used in many scientific programming situations.
C++
C++ is an object-oriented programming language and incorporates all the features offered by C.
Object Oriented Languages
Object-oriented programming (OOP) is a software programming model built around objects. This
model classifies data into objects and describes object contents and performance through the
declaration of classes.
Simula is the first object-oriented programming language.
The examples of object-oriented programming languages are Java, Python, JavaScript, C++, C#, PHP,
Perl, .NET, Ruby Curl, Visual Basic, Smalltalk, Delphi, and Eiffel.
Java
Java is used for developing Mobile, Desktop, web, server-side and dynamic web applications.
JavaScript
JavaScript is designed for styling HTML Pages, interactivity to HTML Pages, Server-Side Scripting
Operation, executing query related to DB on Serve.
Python
Python is a general-purpose programming language. It is used for developing complex scientific,
numeric applications, data analysis, and visualization.
C++
C++ is a general-purpose language was designed by Microsoft to be used for developing apps on the
Microsoft platform.
PHP
56 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
PHP stands for Hypertext Pre-processor. It is a scripting language used for the development of web
applications.
.Net
Net is a programming framework developed by Microsoft, which can be used to build different types
of applications such as Windows, Web application and Mobile based applications etc.
❖ Visual Basic - Visual Basic is an approachable language with a simple syntax for building type-
a cold booting. During a cold boot, the computer runs self-tests on its hardware and loads its
operating system before it's ready for you to use.
57 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Warm Booting – When you restart the system without interrupting power, it's a warm booting.
We also call it a RESTART.
Firmware
Firmware is a software program that is written to a hardware device. It allows the hardware to be
updated. The contents are saved when a hardware device is turned off or loses its external power
source.
Middleware
Middleware is a software layer situated between applications and operating systems. It enables
communication and data management for distributed applications.
Power On Self Test
A power-on self-test is a process performed by firmware or software routines immediately
after a computer or other digital electronic device is powered on. The results of the POST
may be displayed on a panel that is part of the device, output to an external device, or
stored for future retrieval by a diagnostic tool.
Device driver
This system software controls hardware devices connected to a computer. It enables the computer
to use the hardware by providing an appropriate interface. The kernel of a Computer's CPU
communicates with different hardware through this software. Operating systems generally come with
most of the device drivers. If the operating system does not have a device driver for hardware, you
have to install the device driver before using that hardware device.
Server Programs
Server programs are dedicated computer programs that run as services and serve the needs or
request of other programs. These services may run on a dedicated hardware or on the same computer
as the requesting programs.
Some common example of server programs is:
❖ Web Server – For hosting websites.
❖ File server – manages the storage and retrieval of shared computer files
Loader
Loader is a set of programs that loads the machine language translated by the translator into the main
memory and makes it ready for execution.
Linker
58 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
A Linker or link editor is a program that takes one or more objects file code generated by a compiler
and combine them into a single executable program. Linker is used to combine all the objects files
and converts them into a final executable program.
Object Code
Execution
Linker
Results
External
Libraries
59 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Interpreter converts the programs in a high-level language to low-level
language. It translates line by line and reports the error once after completing the translation
process.
4. The primary purpose of software is to turn data into
a) Websites
b) Information
c) Programs
d) Objects
Answer – b) Information
Explanation – The primary purpose of software is to turn data into Information. When that
data is processed into sets according to context, it provides information. Data refers to raw
input that when processed or arranged makes meaningful output. Information is usually the
processed outcome of data.
5. Software designed for a specific purpose/ application such as pay calculations, processing of
examination result, etc. are known as
a) utility software
b) system software
c) application software
d) customized software
Answer – c) application software
Explanation – An application is any program, or group of programs, that is designed for the
end user. Applications software (also called end-user programs) include such things as
database programs, word processors, Web browsers and spreadsheets.
6. Which of the following is included in Utility Programs?
a) Virus scanning software
b) Backup software
c) Disk defragmenter
d) All of the above
Answer – d) All of the above
Explanation – Utility Programs help to manage, maintain and control computer resources.
They are also known as service programs. Examples of utility programs are antivirus software,
backup software, disk defragment, backup, disk clean etc.
7. Which of the following is not related to an application software?
a) Word processor
b) DBMS
c) Operating system
d) Railway reservation system
Answer – c) Operating System
Explanation - The difference between operating system and application software is that an
operating system is a system software that works as the interface between the user and the
hardware while the application software is a program that performs a specific task.
8. Which one of the following is a set of instructions that tells the hardware how to perform the
tasks?
a) Compiler
60 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
b) Software
c) Hardware
d) CPU
Answer – b) Software
Explanation – Software is a set of instructions that tells the hardware what to do. People,
however, are the most important component of a computer system - people use the power of
the computer for some purpose.
9. Which of the following describe an Operating Software?
a) Application software
b) System software
c) Language
d) Program
Answer – b) System Software
Explanation – An operating system (OS) is system software that manages computer hardware,
software resources, and provides common services for computer programs.
10. Which software takes control of computer system on startup?
a) Compiler
b) Operating system
c) Application software
d) System software
Answer – b) Operating System
Explanation – Operating system software takes control of computer system on startup
An Operating System (OS) is an interface between a computer user and computer hardware.
An operating system is a software which performs all the basic tasks like file management,
memory management, process management, handling input and output, and controlling
peripheral devices such as disk drives and printers.
11. A kind of system software, which is responsible for loading and relocating of the executable
program in the main memory
a) Loader
b) Linker
c) Translator
d) Presentation software
Answer – a) Loader
Explanation – In computer systems a loader is the part of an operating system that is
responsible for loading programs and libraries. It is one of the essential stages in the process
of starting a program, as it places programs into memory and prepares them for execution.
12. The steps and tasks needed to process data, such as responses to questions or clicking an icon,
are called
a) instructions
b) operating system
c) application software
d) the system unit
Answer – a) instructions
61 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Computer instructions are a set of machine language instructions that a
particular processor understands and executes. A computer performs tasks on the basis of the
instruction provided.
13. Which of the following is a system software?
a) Database programs
b) Word processors
c) Spreadsheets
d) Device drivers
Answer – d) Device drivers
Explanation – Device drivers is an example of system software. All others i.e. database
programs, word processors and spreadsheets are the examples of application software.
14. Corel ventura, illustrator are the examples of
a) Word Processing
b) Graphic
c) Multimedia
d) DTP
Answer – d) DTP
Explanation – Desktop publishing is the creation of documents using page layout software on
a personal computer. It was first used almost exclusively for print publications, but now it also
assists in the creation of various forms of online content.
15. DTP is a tool for graphic designers and non-designers to create visual communications for
professional. DTP stands for
a) Device Transfer Protocol
b) Desktop Publishing
c) Device Transfer Programs
d) None of the above
Answer – b) Desktop Publishing
Explanation – Desktop publishing (DTP) is the creation of documents using page layout
software on a personal computer. It was first used almost exclusively for print publications,
but now it also assists in the creation of various forms of online content.
16. ______________ is a set of computer programs used on a computer to help perform tasks.
a) An instruction
b) Software
c) Memory
d) A processor
Answer – b) Software
Explanation – Software is a set of instructions, data or programs used to operate computers
and execute specific tasks. Opposite of hardware, which describes the physical aspects of a
computer, software is a generic term used to refer to applications, scripts and programs that
run on a device.
17. The programs designed to govern the computer hardware system are called the
a) system software
b) application software
c) utility software
62 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
d) All of these
Answer – a) System Software
Explanation – System software is the program which is designed in order to govern the
hardware system of the computer. It helps in providing a platform to the other software.
Basically, hardware and software are interchangeable, without any one the entire system stops
working.
18. The ____________ tells the computer how to use its components.
a) utility
b) application
c) operating system
d) network
Answer – c) Operating system
Explanation – An operating system is a system of programs that controls the computer's input
and output devices; coordinates the processing of computer tasks, sometimes performing
more than one task at once (multitasking); allocates and monitors the use of the computer
memory and other resources.
19. Which of the following system software resides in main memory always?
a) Text editor
b) Assembler
c) Linker
d) Loader
Answer – d) Loader
Explanation – Loader is the part of an operating system that is responsible for loading
programs and libraries. It is one of the essential stages in the process of starting a program, as
it places programs into memory and prepares them for execution.
20. The main purpose of _________ is to resolve references among files.
a) Text editor
b) Loader
c) Antivirus
d) Linker
Answer – d) Linker
Explanation – Linker is a computer program that takes one or more object files generated by
a compiler and combines them into one, executable program. Computer programs are usually
made up of multiple modules that span separate object files, each being a compiled computer
program.
21. Programs designed to perform specific tasks related to managing computer resources are
called
a) system software
b) operating system
c) utility software
d) application software
Answer – d) application software
Explanation – An application is any program, or group of programs, that is designed for the
end user. Applications software (also called end-user programs) include such things as
63 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
database programs, word processors, Web browsers and spreadsheets. Image: Application
Software Diagram.
22. What does the acronym BIOS stand for?
a) Basic Internal Output System
b) Basic Inner/Output System
c) Basic Input/output Systemization
d) Basic Input/output System
Answer – d) Basic Input/ Output System
Explanation – BIOS (Basic Input/ Output System) is the program a personal computer's
microprocessor uses to get the computer system started after you turn it on. It also manages
data flow between the computer's operating system and attached devices such as the hard
disk, video adapter, keyboard, mouse and printer.
23. The software that is used to create text-based documents are referred to as
a) Suites
b) Spreadsheets
c) presentation software
d) Word processor
Answer – d) Word processor
Explanation – A word processor is software or a device that allows users to create, edit, and
print documents. It enables you to write text, store it electronically, display it on a screen,
modify it by entering commands and characters from the keyboard, and print it.
24. ________ is a Windows utility program that locates and eliminates unnecessary fragments and
rearranges les and unused to disk space to optimize operations.
a) Backup
b) Disk cleanup
c) Disk defragmenter
d) Restore
Answer – c) Disk defragmenter
Explanation – The process of defragmentation moves the data blocks on the hard drive around
to bring all the parts of a file together. Defragmentation reduces file system fragmentation,
increasing the efficiency of data retrieval and thereby improving the overall performance of
the computer.
25. In computer terminology ‘CAD’ stands for
a) Computer Applied Design
b) Computer Algorithm and Design
c) Computer Application Design
d) Computer Aided Design
Answer – d) Computer Aided Design
Explanation – Computer-Aided Design (CAD) is a computer technology that designs a product
and documents the design's process. CAD may facilitate the manufacturing process by
transferring detailed diagrams of a product's materials, processes, tolerances and dimensions
with specific conventions for the product in question.
64 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
OPERATING SYSTEM
INTRODUCTION
An operating system is a type of software without which you cannot operate or run a computer. It
acts as an intermediary or translation system between computer hardware and application programs
installed on the computer. In other words, you cannot directly use computer programs with computer
hardware without having a medium to establish a connection between them.
Examples – Linux (Ubuntu), Windows (Windows XP, Windows 7, Windows 8, Windows 10 etc.), DOS,
Apple IOS (MacOS 10.15), etc.
Kernel
A kernel is the central part of an operating system. It manages the operations of the computer and
the hardware, most notably memory and CPU time.
FUNCTIONS OF OPERATING SYSTEM
Memory management
It manages both the primary and secondary memory such as RAM, ROM, hard disk, pen drive, etc. It
checks and decides the allocations and deallocation of memory space to different processes. When a
user interacts with a system, the CPU is supposed to read or write operations, in this case, OS decides
the amount of memory to be allocated for loading the program instructions and data into RAM. After
this program is terminated, the memory area is again free and is ready to be allocated to other
programs by the OS.
Processor Management
65 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It facilitates processor management, where it decides the order for the processes to access the
processor as well as decides the processing time to be allocated for each process. Besides this, it
monitors the status of processes, frees the processor when a process is executed then allocates it to
a new process.
Device/Hardware management
The operating system also contains drivers to manage devices. A driver is a type of translation
software that allows the operating system to communicate with devices, and there are different
drivers for different devices as each device speaks a different language.
Run software applications: It offers the environment to run or use software applications developed
to perform specific tasks, for example, MS Word, MS Excel, Photoshop, etc.
Data management
It helps in data management by offering and displaying directories for data management. You can
view and manipulate files, folders, e.g., you can move, copy, name, or rename, delete a file or a folder.
Evaluates the system's health
It gives us an idea about the performance of the hardware of the system. For example, you can see
how busy the CPU is, how fast the data is retrieved from the hard disk, etc.
Provides user interface
It acts as an interface between the user and the hardware. It can be a GUI where you can see and click
elements on the screen to perform various tasks. It enables you to communicate with the computer
even without knowing the computer's language.
I/O management
It manages the input output devices and makes the I/O process smooth and effective. For example, it
receives the input provided by the user through an input device and stores it in the main memory.
Then it directs the CPU to process this input and accordingly provides the output through an output
device such as a monitor.
Security
It has a security module to protect the data or information stored in the memories of the computer
against malware and unauthorized access. Thus, it not only manages your data but also helps to
protect it.
Time Management
It helps CPU in time management. The Kernel OS keeps checking the frequency of processes that
requests CPU time. When two or more processes that are equally important compete for the CPU
time, then the CPU time is sliced into segments and allocated to these processes in a round-robin
fashion to prevent a single process from monopolizing the CPU.
Deadlock Prevention
Sometimes a resource that is supposed to be shared by two or more processes is held by one process
due to which the resource cannot continue. This situation is known as deadlock. The OS does not let
this situation arise by carefully distributing the resources among the different processes.
Interrupt Handling
OS also responds to interrupts, which are signals generated by a program or a device to seek the
attention of the CPU. The OS checks the priority of the interrupt, and if it is more important than the
currently running process, it stops the execution of the current process and preserves this state of
66 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
CPU then executes the requested process. Thereafter the CPU returns to the same state where it was
stopped.
TYPES OF OPERATING SYSTEM
Batch Processing Operating System
The interaction between a user and the computer does not occur in this system. The user is required
to prepare jobs on punch cards in the form of batches and submit them to the computer operator.
The computer operator sorts the jobs or programs and keeps similar programs or jobs in the same
batch and run as a group to speed up processing. It is designed to execute one job at a time. Jobs are
processed on a first-come, first-serve basis, i.e., in the order of their submission without any human
intervention.
Multiprogramming Operating System
Multi programming operating system which in addition to supporting multiple concurrent process
allows the instruction and data from two or more separate process to reside in primary memory
simultaneously. Multiprogramming System are multitasking, multiprocessing and multiuser operating
System
Multitasking Operating System
Multitasking is the ability of a computer to run more than one program, or task, at the same time. A
multitasking operating system supports two or more active processes simultaneously.
Multiprocessors Operating System
A multiprocessing operating system is one that can run on computer systems that contain more than
one processor.
Single User Operating System
A single User OS as the name suggests is designed for one user to effectively use a computer at a time.
e.g. DOS, Windows 95/98 etc
Multi-user Operating System
This type of OS allows multiple users to simultaneously use the system, while here as well, the
processor splits its resources and handles one user at a time, the speed and efficiency at which it does
this makes it apparent that users are simultaneously using the system, some network systems utilize
this kind of operating system. e.g. Windows XP, Vista, 7 etc.
67 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Time Sharing Operating System
It enables multiple users located at different terminals to use a computer system and to share the
processor's time simultaneously. In other words, each task gets time to get executed, and thus all
tasks are executed smoothly.
Each user gets the processor's time as they get while using a single system. The duration of time
allocated to a task is called quantum or time slice; when this duration is over, OS starts the next task.
Distributed Operating System
It uses or runs on multiple independent processors (CPUs) to serve
multiple users and multiple real-time applications. The communication
between processors is established through many communication lines
such as telephone lines and high-speed buses. The processors may differ
from each other in terms of size and function.
Real-Time Operating System
It is developed for real-time applications where data should be processed in a fixed, small duration of
time. It is used in an environment where multiple processes are supposed to be accepted and
processed in a short time. RTOS requires quick input and immediate response.
68 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Network Operating System
This OS connects computers and devices to a local area network and manages
network resources. The software in a NOS enables the devices of the network
to share resources and communicate with each other. It runs on a server and
allows shared access to printers, files, applications, files, and other networking
resources and functions over a LAN. Besides this, all users in the network are
aware of each other's underlying configuration and individual connections.
Examples: Ms Windows Server 2003 and 2008, Linux, UNIX, Novell NetWare,
Mac OS X, etc.
User Interface
An operating system provides an interface between the computer user and the hardware.
The user interface is one of the most important parts of any operating system because it allows users
to easily access and communicate with the applications and the hardware.
The user can interact with the computer by using mainly two kinds of interfaces
Graphical User Interface (GUI)
It is a computer program that enables a person to communicate with a computer through the use of
symbols, visual metaphors and pointing devices. It is best known for its implementation in Apple
products.
The first graphical user interface was designed by Xerox Corporation in 1970s. GUIs can be found in
handheld devices such as MP3 players, portable media players, gaming devices, etc.
Character User Interface (CUI)
It is also known as Command Line Interface (CLI). CUI is a mechanism of interacting with a computer
system or software by typing, commands to perform specific tasks. Programs with character user
interface are generally easier to automate via scripting. CUI only uses text types one after another
just as commands used in MS-DOS.
SOME IMPORTANT OPERATING SYSTEM
Some popular operating systems are as follows
UNIX
The first version of Unix was developed in 1969 by Ken-Thompson and Dennis Ritchie at AT & T Bell
Laboratories. It is primarily used to a server rather than a workstation and should not be used by
anyone who does not understand the system.
Apple Macintosh (Mac OS)
It was introduced in January, 1984 by Steve Jobs and was initially named as system software, which
was later renamed as Mac OS. Most recent version of OS is based on Unix because it has a good
graphical interface.
LINUX
The first Linux Kernel was released in October, 1991 by Linus. It is an open source software, means
anyone can download it and use it without any fees. Linux is similar to Unix in operations. It is difficult
to understand by anyone who does not understand the system and can be difficult to learn.
SOLARIS
It is a free UNIX based OS developed by Sun Microsystems. The rst version of Sun Microsystems was
published in 1992 and coined as SunOS.
69 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
BOSS (Bharat Operating System Solutions)
BOSS GNU/Linux (or simply BOSS) developed by C-DAC (Centre for Development of Advanced
Computing) was initially released in 2007 and derived from Debian for enhancing the use of
Free/Open Source Software throughout India. BOSS Linux provides GUI to the user.
Microsoft Windows
It is an operating system, based on GUI, developed by Microsoft. Microsoft first introduced an
operating environment named Windows in November 1985 in response to the growing interest in
GUIs.
Mobile Operating System
This OS operates on Smartphones, Tablets and Digital Mobile devices. It controls mobile devices and
its design supports wireless communication and different types of mobile applications. It has built-in
support for mobile multimedia formats
Some popular mobile operating systems are as follows:
❖ Android – It is a mobile OS developed by Google, which is based on Linux Kernel. It is basically
designed for touch screen mobile devices like Tablets, Smartphones, etc. Now-a-days, it is
most common as used in mobile phones. The latest version of Android is Nougat which was
released on 22 August, 2016.
❖ Symbian – It is the OS developed and sold by Symbian Ltd. It is an open source mobile OS
designed for Smartphones. It has been used by many major handset manufacturers including
Motorola, Nokia, Samsung, Sony, etc. The latest version of Symbian is Nokia Belle which was
released in October 2012.
❖ iOS – It is the popular mobile operating system developed by Apple Incorporation. This
operating system is commonly used in Apple iPhone, iPod Touch, iPad, etc. The latest version
of iOS is iOS 13.5
❖ BlackBerry – It is the most secure operating system used in leading Smartphones developed
by BlackBerry company. It also supports WAP 1.2. The latest version of Blackberry is BlackBerry
OS 10.3.3.
MS-DOS (MICROSOFT-DISK OPERATING SYSTEM)
The DOS OS was developed by Microsoft in 1980 for microcomputers. MS-DOS was the first operating
system that run on PC developed by IBM corporation in 1981. DOS is a single user operating system.
It is only operating system, which can be loaded in the main memory of the computer using a single
disk.
Structure of DOS
There are four essential programs associated with the control of computer and the way it interacts
with them.
❖ Boot Record – It includes loading the operating system into main memory. It is the main
program of MS-DOS.
❖ Basic Input/ Output System (BIOS) – It provides an interface between the hardware and
programs.
❖ MSDOS.sys Program – It is a collection of program routines and data tables that provides high
70 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Configuration of DOS
Config.sys, Autoexec.bat provide the environment to computer to set commands.
❖ Config.sys – It adjusts the system according to commands.
❖ Auto Exec.bat – When the system is powered On, this file executes in automatically command
line.
Types of DOS Commands
There are two types of DOS command
❖ Internal Commands – These commands are automatically loaded into main memory when the
booting process gets completed e.g. DATE, TIME, VER, VOL, DIR, COPY, etc
❖ External Commands – These commands require external file to be loaded in the computer to
MICROSOFT WINDOWS
1
It can’t remove a directory which contains sub-directory or files
71 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Introduction
Microsoft Windows stands for ‘Microsoft – Wide Interactive Network Development for Office Work
Solution’. Microsoft Windows is a series of graphical interface operating system developed, marked
and sold by Microsoft. It enables you to work with a wide variety of programs on your computer,
often simultaneously.
Versions of MS-Windows
Some important versions of MS-Windows are as follows:
Windows NT (New Technology)
A version of Windows introduced in July, 1993 and made specifically for businesses offering better
control over workstation capabilities to help network administrators.
Features
❖ It is based on High Level Language.
Windows 95
It is a graphical user interface-based operating system. It was released on 24th August, 1995 by
Microsoft.
Features
❖ It is a mixed of 16-bit/32-bit Windows operating system.
❖ It is consumer-oriented.
❖ It supports FAT32 file system, multi-display, Web TV and the Internet Explorer.
Windows 98
It was developed in 1998. This was produced in two main versions. The first Windows 98 version was
plagued with programming errors but the Windows 98 second edition came out later was much better
with many errors resolved.
Features
❖ It supports Internet Explorer 4.0.1.
❖ It has Intel 80486DX2/66 MHz or a compatible CPU with a Math coprocessor (Pentium
processor recommended).
❖ Windows 98 was the first operating system to use the Windows Driver Model (WDM).
❖ It includes a FAT32 converter utility for converting FAT16 drives to FAT32 without formatting
the partition.
❖ It also supports many peripherals devices (MX, USB, DVD).
Windows ME
An upgraded version from Windows 98 (Millennium Edition) launched in June 2000, but it has been
historically plagued with programming errors which may be frustrating for home users.
Features
❖ It is designed for single CPU or SMP 32-bit Intel X86 computer.
72 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Windows XP
It is an OS produced by Microsoft for use on personal computers. Microsoft released Windows XP on
25th October, 2001.
Some versions of Windows XP are as follows
❖ Windows XP Home edition is a version made for home users.
Features
❖ It has various users with independent proles.
❖ It has 3.75 GB free space on the disk and that the total size of the disk is 19.5 GB.
❖ It includes video adapter and monitor with Super VGA (800 X 600) or higher resolution.
Windows Vista
It is an operating system by Microsoft for use on personal computers, including home and business
desktops, laptops, tablet PCs and media center PCs. It was released worldwide on 30th January, 2007.
Features
❖ It can be installed Pentium 4, higher, 512MB RAM, 32 MB video card and 40 GB hard disk.
Windows 7
It is an OS released by Microsoft on 22nd July, 2009. It is an upgrade of Windows XP and Vista. It does
not include some standard applications like Windows Movie Maker, Windows Mail, etc.
Features
❖ It supports 64-bit processor.
Windows 8
It is a part of Windows NT family as personal OS developed by Microsoft and released on 1st August,
2012.
Features
❖ It is a 64-bit logical CPU.
Windows 10
It is a personal computer operating system developed and released by Microsoft as part of the
Windows NT family of operating system. The first version of the operating system entered a public
beta testing process in October 2014, leading up to its consumer released on 29 July, 2015.
Features
❖ It is easy to used social media sites like Facebook, Twitter.
73 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Windows 10 will also include a “game DVR” mode to allow recordings of the last 30 seconds
of play, all better for the social gaming.
❖ Windows 10 interface to adapt based on the hardware it is running on.
Desktop
When we turn ON the computer then the first screen, which will be display on the computer is known
as desktop. The background image of desktop is called wallpaper. A small arrow or blinking symbol,
moving on the desktop, is called cursor. Desktop contains Start menu, Task bar, icons, gadgets, etc.
Some important components of desktop are organized as follows:
Icons
A small image of a program, shown on the desktop with program name is known as icon. Icons are
small pictures that represent files, folders, programs and other items. Users can open these programs
by double click on the icons. If you move an icon on your desktop, this is called ‘dragging’ and after
releasing it, it will be called ‘dropping.’
Some of the icons displayed on the desktop are as follows
❖ Computer – It is the most important icon on the desktop, which contains icons of document
folders, hard disk’s partition, each removable disk drive, e.g. floppy disk, CD, DVD, etc. It also
allows the users to access drives, printers, removable disk or other system applications. It is
the main part of our Windows where all the programs and software backup are stored.
❖ Recycle Bin – It is also a form of icon on the desktop, which contains deleted files, folders or
shortcuts. If we delete a file or folder then it goes to recycle bin. From recycle bin, we can
restore the deleted files or folders on proper place. It is like a dustbin of the computer. Once
the recycle bin is empty then we won’t be able to restore those files and folders again.
❖ Network – It consists of all network connections, which make possible to connect the
folder contains all types of le format Word processor, Spreadsheet, PowerPoint, image, etc.
Structure of Window
Task Bar
Initially, the long horizontal box at the bottom of our desktop is known as Task bar. When we open a
program or any window, then the button of that program will be displayed on the task bar. Middle
Section of the taskbar contains the button of programs or documents which are currently being used
by the user. Notification and the right end of the task bar, consists of clock-date and time, icons of
certain programs, computer setting, sound and icons of removable disk, i.e. pen drive.
Start Menu
This menu is the main gateway of our computer’s program such as files, folders and settings. Start
menu also contains most recently opened program.
Start menu have following options
❖ Program – It contains a list of installed programs. When we installed any software, it
74 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Log Off – End access to a computer system or a website.
❖ Turn Off (Shut down) - To shut down or restart the system.
Window
Some parts of the Windows are as follows
Title Bar
It is located at the top of window or any dialog box, which displays the name of the window or
software program. Title bar contains at least three small buttons
Close Button – At the right edge of the title bar, there is a square containing a [X] called the Close
button. It helps to terminate the running program.
Minimize Button – It reduces to window to a button on the task bar. It helps to shrink the window.
Maximize Button – It enlarges the window to occupy the whole desktop. It expands the size of
window t to the desktop.
Scroll Bar
It appears at the right (or left) side or at the bottom of the window. A window can display a document,
i.e. larger than the window area, so with the help of scroll bar arrow, the user can scroll a document
in the window area to bring the view of hidden portion of document.
There are two types of scroll bars
1. Horizontal scroll bar
2. Vertical scroll bar.
Menu Bar
Each window contains its own menu which performs specific actions when they have been selected.
The menu bar consists of several options as follows
❖ File Menu – Contains options like New, Open, Close, Save, Save As and Print, etc.
❖ Edit Menu – Contains options like Undo, Cut, Copy, Paste, Clear, etc.
Dialog Box
When we perform certain operation on your document and click on the Close button without save
your document then dialog box will be appear on the screen. Generally, dialog box contains message,
Close button, Yes button, No button and Cancel button. It is mainly used to suggest that what to do
next.
Main Programs Inside the Window
Notepad
It is a text editor program. Notepad is most commonly used to the edit or view text files. The extension
of Notepad files is .txt (text document).
To open Click on
Start menu —> All Programs —> Accessories —> Notepad
WordPad
It is another text editor program including some few features such as complex formatting, pictures,
etc. The extension of WordPad le is .rtf (rich text format).
To open Click on
Start menu —> All Programs —> Accessories —> WordPad
Paint
75 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It is a drawing program, used to create drawing or edit digital pictures (images). The extension of paint
file is .png or. jpg or. bmp.
To open Click on
Start menu —> All Programs —> Accessories —> Paint
Calculator
It performs addition, subtraction, multiplication, division, etc.
To open Click on
Start menu —>All Programs —>Accessories —> Calculator
Media Player
Windows media player is an easy-to-use interface to play digital media files, organize digital media
collection, burn CDs, etc.
To open Click on
Start menu —> All Programs —> Windows Media Player
Games
Windows have some games like Chess titans., Hearts, Freecell, Mahjong titans, Purble place, Solitaire,
Spider solitaire, etc.
To open Click on
Start menu —> All Programs —> Games
Files
These are the collection of data stored on auxiliary storage media. In Windows, files are the basic unit
to store data. The name given to a file or document by the user is called file name. Filename is used
to identify the type of file format. Each file has a specific filename and has a file extension that
identifies the file type.
Some common filename extensions are as
.doc
MS – Word Document
.docx
.xls
MS-Excel file
.xlsx
.htm
HTML file (Web page)
.html
.ppt
MS – PowerPoint Presentation
.pptx
Folders
These are containers that you can use to store files. Folders can also store other folders, i.e. sub-
folders. You can create any number of sub-folders and each can hold any number of files and
additional subfolders.
2
Executable File When a file contains instructions that can be carried out by the computer, it is often called an executable file.
76 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Different types of library are as follows
❖ Documents Library
It is used to organize and arrange your digital pictures. By default, it is saved in the Pictures
folder.
❖ Music Library
It is used to organize and arrange your digital music, such as songs, etc. By default, it is saved
to the Music Library folder.
❖ Videos Library
It is used to organize and arrange your videos, such as clips, recording, etc. By default, it is
stored in My Videos folder.
MS-Windows Shortcut Keys
Keys Description
F3 Search for a file or folder in Windows Explorer
Alt + F4 Close the active item or quit the active program
Alt + Spacebar Opens the shortcut menu for the active window
F2 Rename the selected item
Ctrl + Right arrow Move the insertion point to the beginning of the next word
Ctrl + Left arrow Move the insertion point to the beginning of the previous word
Ctrl + Down arrow Move the insertion point to the beginning of the next paragraph
Move the insertion point to the beginning of the previous
Ctrl + Up arrow
paragraph
Ctrl + Alt + Del Restart the computer
Ctrl + Esc Display the Start Menu
F5 Refresh the active window
Esc Cancel the current task
Window key To display or hide the start menu
Window + D To display the desktop
Window + M To minimize all open window
Window + L To lock the keyboard
Windows + E To open Window Explorer
77 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
d) Peripherals
Answer – a) Operating system
Explanation – An Operating System (OS) is an interface between a computer user and
computer hardware. An operating system is a software which performs all the basic tasks like
file management, memory management, process management, handling input and output,
and controlling peripheral devices such as disk drives and printers.
2. Which one of the following DOS commands sends contents of the screen to an output device?
a) BREAK
b) DISKCOPY
c) MORE
d) ASSIGN
Answer – b) DISKCOPY
Explanation – DISKCOPY is a command used on a number of operating systems for copying the
complete contents of a diskette to another diskette.
3. Which of the following operating systems is also known as single user operating system?
a) Windows
b) Linux
c) Unix
d) DOS
Answer – DOS
Explanation – MS DOS is a Single User operating System. It is a Command line interface.
4. Which of the following is not an operating system?
a) Windows
b) DOS
c) Linux
d) All of the above
Answer – d) All of the above
Explanation – Most common operating systems are Microsoft Windows, MS DOS, Apple
macOS, Linux, Android and Apple's iOS.
5. In MS-DOS, which of the following commands is used to delete directory with all sub-directions
and files?
a) DELETE
b) DEL
c) DELTREE
d) MOVE
Answer – c) DELTREE
Explanation – DELTREE is a command line command that recursively deletes an entire
subdirectory of files.
6. Which of the following is not an external command of DOS?
a) LABEL
b) FORMAT
c) CHKDSK
d) CLS
Answer – c) CLS
78 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Internal Commands are – CLS< REN, VOL, PROMPT, VER, COPY, PATH, TIME, DEL,
DATE, TYPE, PAUSE, MD, DIR, CD, etc.
External commands are – BACKUP, COPY CON, RESTORE, PRINT, LABEL, MOVE, TREEE,
DISKCOPY, FORMAT, CHKDSK, FORMAT, etc.
7. Which commands are automatically loaded into main memory are known as
a) internal
b) external
c) viral
d) situational
Answer – a) internal
Explanation – Internal commands are automatic loaded into the memory when operating
system is loaded into the memory. Thus, these are also called memory-resident commands.
The command available are all combined together and are stored in Command.com file, which
is a executable command file. These internal commands are further grouped according to their
properties
8. Which type of commands in MS-DOS needs external files to perform their action?
a) Internal commands
b) External commands
c) Batch commands
d) Re directories
Answer – b) External commands
Explanation – An external command is an MS-DOS command that is not included in
command.com. External commands are commonly external either because they require large
requirements or are not commonly used commands. The illustration shows each of the
external commands are separate files.
9. Which of the following is not an internal command of DOS?
a) VER
b) COPYCON
c) FORMAT
d) VOL
Answer – c) FORMAT
Explanation – – Internal Commands are – CLS< REN, VOL, PROMPT, VER, COPYCON, PATH,
TIME, DEL, DATE, TYPE, PAUSE, MD, DIR, CD, etc.
External commands are – BACKUP, COPY CON, RESTORE, PRINT, LABEL, MOVE, TREEE,
DISKCOPY, FORMAT, CHKDSK, FORMAT, etc.
10. A command, in DOS, used to set a name to a disk, is
a) VOL
b) REN
c) LABEL
d) CLS
Answer – c) LABEL
Explanation – The label command is used to view or change the label (name) of a computer's
drives.
11. Which of the following is/are function of operating system?
79 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
a) User interface
b) File system manipulation
c) Resources allocation
d) All of the above
Answer – d) All of the above
Explanation - The functions of an Operating System include:
❖ Memory Management
❖ Device Management
❖ Processor Management
❖ File Management
❖ Security
❖ Error Detection
❖ Job accounting
80 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
b) Multithreading
c) Multiprocessing
d) Multicomputing
Answer – a) Multitasking
Explanation – Multitasking, in an operating system, is allowing a user to perform more than
one computer task (such as the operation of an application program) at a time. The operating
system is able to keep track of where you are in these tasks and go from one to the other
without losing information.
16. The simultaneous processing of two or more programs by multiple processors is
a) multi programming
b) multitasking
c) time sharing
d) multiprocessing
Answer – d) multiprocessing
Explanation – Multiprocessing is the use of two or more central processing units (CPUs) within
a single computer system. The term also refers to the ability of a system to support more than
one processor or the ability to allocate tasks between them.
17. Which file is the batch file that is read while booting a computer?
a) Autoexec.bat
b) Auto-batch
c) Autoexecutive.bat
d) Auto.bat
Answer – a) Autoexec.bat
Explanation – Autoexec. bat is a startup file used with MS-DOS and early versions of Microsoft
Windows operating systems (Windows 3. x and Windows 95). It contains commands that are
to be executed by the operating system when the computer first boots.
18. The restart of computer is called ……. when computer is already ON.
a) cold booting
b) warm booting
c) shut down
d) logging off
Answer – b) warm booting
Explanation – A warm boot (also called a "soft boot") is the process of restarting a computer.
It may be used in contrast to a cold boot, which refers to starting up a computer that has been
turned off. Warm boots are typically initiated by a "Restart" command in the operating system.
19. Grouping and processing all of a firm’s transactions at one time, is called
a) a database management system
b) batch processing
c) a real time system
d) an on-time system
Answer – b) batch processing
Explanation – Batch processing is a technique in which an Operating System collects the
programs and data together in a batch before processing starts.
81 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
20. Which process checks to ensure the components of the computer are operating and
connected properly?
a) Booting
b) Processing
c) Saving
d) Editing
Answer – a) Booting
Explanation – POST stands for "Power On Self Test." It is a diagnostic program built into the
computer's hardware that tests different hardware components before the computer boots
up. The POST process is run on both Windows and Macintosh computers.
21. ____________is a feature for scheduling and multi-programming to provide an economical
interactive system of two or more users.
a) Time sharing
b) Multi-sharing
c) Time tracing
d) Multi-processing
Answer – a) Time sharing
Explanation – Time-sharing is a technique which enables many people, located at various
terminals, to use a particular computer system at the same time.
22. Which of the following commercial software products are examples of operating system
software and application software, respectively?
a) Microsoft Window XP and Microsoft Word
b) Microsoft Windows Vista and Microsoft Windows XP
c) MS DOS and Microsoft Windows XP
d) UNIX and LINUX
Answer – a) Microsoft Window XP and Microsoft Word
Explanation – Windows XP is an operating system introduced in 2001 from Microsoft's
Windows family of operating systems. Microsoft Word or MS-WORD (often called Word) is an
application program that users can type with.
23. Which of the following is an usual file extension in DOS?
a) .exe
b) .bat
c) .class
d) All are the examples of file extension
Answer – d) All are the examples of file extension
Explanation – .exe – Executable file
.bat – Batch file
.class – JAVA class file
24. What do you understand by the term ‘booting’?
a) The process of starting the computer from the power-off position
b) Connecting computer of the electric switch
c) Increasing the memory of the computer
d) The process of shut down the computer
Answer – a) The process of starting the computer from the power off position
82 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation – Booting is the process of starting a computer. It can be initiated by hardware
such as a button press, or by a software command. After it is switched on, a computer's central
processing unit has no software in its main memory, so some process must load software into
memory before it can be executed.
25. MS-DOS is __________ operating system.
a) user friendly graphical
b) graphical user interface
c) real time GUI
d) command line interface
Answer – d) command line interface
Explanation – MS-DOS is a non-graphical command line operating system derived from 86-
DOS that was created for IBM compatible computers.
26. Which of the following refers to the means by which an OS or any other program interacts with
the user?
a) Program front-end
b) Programming interface
c) User login
d) User interface
Answer – d) User interface
Explanation – A user interface, also called a "UI" or simply an "interface," is the means in which
a person controls a software application or hardware device. A good user interface provides a
"user-friendly" experience, allowing the user to interact with the software or hardware in a
natural and intuitive way.
27. Which of the following is an operating system?
a) Linux
b) Debugger
c) Mozilla
d) Google Chrome
Answer – a) Linux
Explanation – Linux – An Operating system
Debugger – A computer program
Mozilla & Google Chrome – Browser Program
28. Which among the following is not a mobile Operating System?
a) Android
b) Safari
c) Symbian
d) iOS
Answer – b) Safari
Explanation – Safari is a graphical web browser developed by Apple, based on the WebKit
engine.
29. The background image of desktop is called as
a) Desktop
b) Wallback
c) Wallpaper
83 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
d) Desk cover
Answer – c) Wallpaper
Explanation – A wallpaper or background (also known as a desktop wallpaper, desktop
background, desktop picture or desktop image on computers) is a digital image (photo,
drawing etc.) used as a decorative background of a graphical user interface on the screen of a
computer, smartphone or other electronic devices.
30. Date and Time are available on the desktop at
a) Recycle Bin
b) My computer
c) Start
d) Task Bar
Answer – d) Task Bar
Explanation – The date and time are also shown on the desktop, in the notification area on
the taskbar.
84 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
COMPUTER NETWORK
INTRODUCTION
A computer network is a group of two or more computers connected together to share information
and resources. A computer network permits sharing of resources among devices communicated in
the network.
ARPANET is the first network developed by Robert Kahn and Vinton Cart in 1969.
COMPONENTS OF COMPUTER NETWORK
The five components of a computer network are:
❖ Sender (Device)
❖ Receiver (Device)
Sender
Sender is a device that sends a message which can consist of text, numbers, pictures etc. It is also
called source or transmitter.
Sender Equipment
The encoder is a device that converts digital signals in a form that can pass through a transmission
medium.
Communication Channel
It is the physical path that connects the sender and the receiver. It is used to transmit data. It is also
called Medium. The channel can be a copper wire, a fiber optic cable, microwaves etc.
Receiving Equipment
The decoder is a device that converts the encoded signals into digital form. The receiver can
understand the digital form of message.
Receiver
Receiver is a device that receives the message. It is also called a sink. It must be capable of accepting
the message.
NETWORK DEVICES
Network Interface card (NIC)
NIC is a device that helps the computer to communicate with another device. The network interface
card contains the hardware addresses, the data-link layer protocol uses this address to identify the
system on the network so that it transfers the data to the correct destination.
There are two types of NIC:
❖ Wireless NIC – All the modern laptops use the wireless NIC. In Wireless NIC, a connection is
made using the antenna that employs the radio wave technology.
❖ Wired NIC – Cables use the wired NIC to transfer the data over the medium.
Hub
85 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Hub is a central device that splits the network connection into multiple devices. When computer
requests for information from a computer, it sends the request to the Hub. Hub distributes this
request to all the interconnected computers.
Switch
Switch is a networking device that groups all the devices over the network to transfer the data to
another device. A switch is better than Hub as it does not broadcast the message over the network,
i.e., it sends the message to the device for which it belongs to. Therefore, we can say that switch
sends the message directly from source to the destination.
Cables and connectors
Cable is a transmission media that transmits the communication signals.
There are three types of cables:
❖ Twisted pair cable – It is a high-speed cable that transmits the data over 1Gbps or more.
❖ Coaxial cable – Coaxial cable resembles like a TV installation cable. Coaxial cable is more
expensive than twisted pair cable, but it provides the high data transmission speed.
❖ Fiber optic cable – Fiber optic cable is a high-speed cable that transmits the data using light
beams. It provides high data transmission speed as compared to other cables. It is more
expensive as compared to other cables, so it is installed at the government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used to connect the
distinct networks or connect the internet to multiple computers.
Modem
Modem connects the computer to the internet over the existing telephone line. A modem is not
integrated with the computer motherboard. A modem is a separate part on the PC slot found on the
motherboard.
Gateway
A gateway is a network node that connects two dissimilar networks using different protocols
together.
Repeaters
It is an electronic device that magnifies the signal it receives. It is implemented in computer networks
to explant the coverage area of the network. It is also known as signal boosters.
Firewall
A firewall is a network security system that monitors and controls overall incoming and outgoing
network traffic based on advanced and a defined set of security rules.
COMPUTER NETWORK ARCHITECTURE
Computer Network Architecture is defined as the physical and logical design of the software,
hardware, protocols, and media of the transmission of data. Simply we can say that how computers
are organized and how tasks are allocated to the computer.
The two types of network architectures are used:
❖ Peer-To-Peer network
❖ Client/Server network
86 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Peer-To-Peer network
Peer-To-Peer network is a network in which all the computers are linked together with equal privilege
and responsibilities for processing the data. It is useful for small environments, usually up to 10
computers. It has no dedicated server. Special permissions are assigned to each computer for sharing
the resources, but this can lead to a problem if the computer with the resource is down.
Client/Server Network
Client/Server network is a network model designed for
the end users called clients, to access the resources
such as songs, video, etc. from a central computer
known as Server. The central controller is known as a
server while all other computers in the network are
called clients. A server performs all the major
operations such as security and network management
and is responsible for managing all the resources such
as files, directories, printer, etc. All the clients communicate with each other through a server.
TYPES OF NETWORK
A computer network is mainly of four types:
❖ Personal Area Network (PAN)
87 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Personal Area Network is a network arranged within an individual person, typically within a range of
10 meters. Personal Area Network is used for connecting the computer devices of personal use is
known as Personal Area Network. Thomas Zimmerman was the first research scientist to bring the
idea of the Personal Area Network. Personal Area Network covers an area of 30 feet. Personal
computer devices that are used to develop the personal area network are the laptop, mobile phones,
media player and play stations.
There are two types of Personal Area Network:
❖ Wired Personal Area Network
a mobile network moves with a person. Suppose a person establishes a network connection
and then creates a connection with another device to share the information.
❖ Offline Network : An offline network can be created inside the home, so it is also known as a
home network. A home network is designed to integrate the devices such as printers,
computer, television but they are not connected to the internet.
❖ Small Home Office : It is used to connect a variety of devices to the internet and to a corporate
88 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Last mile: A telecom company is used to provide the internet services to the customers in
hundreds of cities by connecting their home with fiber.
❖ Private network: A bank provides a private network that connects the 44 offices. This network
is made by using the telephone leased line provided by the telecom company.
INTERNETWORK
Introduction
An internetwork is defined as two or more computer network LANs or WAN or computer network
segments are connected using devices, and they are configured by a local addressing scheme. This
process is known as internetworking. An interconnection between public, private, commercial,
industrial, or government computer networks can also be defined as internetworking. An
internetworking uses the internet protocol. The reference model used for internetworking is Open
System Interconnection (OSI).
Types of Internetwork:
Extranet
An extranet is a communication network based on the internet protocol such as Transmission Control
protocol and internet protocol. It is used for information sharing. The access to the extranet is
restricted to only those users who have login credentials. An extranet is the lowest level of
internetworking. It can be categorized as MAN, WAN or other computer networks. An extranet
cannot have a single LAN, atleast it must have one connection to the external network.
Intranet
An intranet is a private network based on the internet protocol such as Transmission Control protocol
and internet protocol. An intranet belongs to an organization which is only accessible by the
organization's employee or members. The main aim of the intranet is to share the information and
resources among the organization employees. An intranet provides the facility to work in groups and
for teleconferences.
NETWORK TOPOLOGY
Topology defines the structure of the network of how all the components are interconnected to each
other. There are two types of topology: physical and logical topology.
Physical topology is the geometric representation of all the nodes in a network.
Bus Topology
The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable. Each node
is either connected to the backbone cable by drop cable or directly
connected to the backbone cable. When a node wants to send a
message over the network, it puts a message over the network. All the
stations available in the network will receive the message whether it has
been addressed or not.
The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. The configuration
of a bus topology is quite simpler as compared to other topologies. The backbone cable is considered
as a "single lane" through which the message is broadcast to all the stations. The most common
access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
89 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Ring Topology
Ring topology is like a bus topology, but with connected ends. The node
that receives the message from the previous computer will retransmit
to the next node. The data flows in one direction, i.e., it is
unidirectional. The data flows in a single loop continuously known as an
endless loop. It has no terminated ends, i.e., each node is connected to
other node and having no termination point. The data in a ring topology
flow in a clockwise direction. The most common access method of the
ring topology is token passing.
Token passing: It is a network access method in which token is passed from one node to another
node.
Token: It is a frame that circulates around the network.
Star Topology
Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer. The central
computer is known as a server, and the peripheral devices attached to
the server are known as clients. Hubs or Switches are mainly used as
connection devices in a physical star topology.
Tree topology
Tree topology combines the characteristics of bus topology and star
topology. A tree topology is a type of structure in which all the
computers are connected with each other in hierarchical fashion. The
top-most node in tree topology is known as a root node, and all other
nodes are the descendants of the root node. There is only one path
exists between two nodes for the data transmission. Thus, it forms a
parent-child hierarchy.
Mesh topology
Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections. There are multiple paths from one
computer to another computer. It does not contain the switch, hub
or any central computer which acts as a central point of
communication. The Internet is an example of the mesh topology.
Mesh topology is divided into two categories:
❖ Fully connected mesh topology
Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers
available in the network.
Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to
those computers with which they communicate frequently.
90 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Hybrid Topology
The combination of various different topologies is known as Hybrid
topology. A Hybrid topology is a connection between different links
and nodes to transfer the data. When two or more different
topologies are combined together is termed as Hybrid topology and
if similar topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology in one
branch of ICICI bank and bus topology in another branch of ICICI
bank, connecting these two topologies will result in Hybrid topology.
TRANSMISSION MODES
The way in which data is transmitted from one device to another device is known as transmission
mode. The transmission mode is also known as the communication mode. Each communication
channel has a direction associated with it, and transmission media provide the direction. Therefore,
the transmission mode is also known as a directional mode. The transmission mode is defined in the
physical layer.
The Transmission mode is divided into three categories:
❖ Simplex mode
❖ Half-duplex mode
❖ Full-duplex mode
Simplex mode
In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction. A device
can only send the data but cannot receive it or it can receive the data but cannot send the data. The
radio station is a simplex channel as it transmits the signal to the listeners but never allows them to
transmit back. Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the screen.
Half-Duplex mode
In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the data
as well. Messages flow in both the directions, but not at the same time. The entire bandwidth of the
communication channel is utilized in one direction at a time.
91 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
A Walkie-talkie is an example of the Half-duplex mode.
Full-duplex mode
In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions.
Both the stations can send and receive the message simultaneously. Full-duplex mode has two
simplex channels. One channel has traffic moving in one direction, and another channel has traffic
flowing in the opposite direction. The Full-duplex mode is the fastest mode of communication
between devices. The most common example of the full-duplex mode is a telephone network.
COMPUTER NETWORK MODEL
A communication subsystem is a complex piece of Hardware and software. Early attempts for
implementing the software for such subsystems were based on a single, complex, unstructured
program with many interacting components. The resultant software was very difficult to test and
modify. To overcome such problem, the ISO has developed a layered approach. In a layered approach,
networking concept is divided into several layers, and each layer is assigned a particular task.
Therefore, we can say that networking tasks depend upon the layers.
Layered Architecture
The main aim of the layered architecture is to divide the design into small pieces. Each lower layer
adds its services to the higher layer to provide a full set of services to manage communications and
run the applications.
The number of layers, functions, contents of each layer will vary from network to network. However,
the purpose of each layer is to provide the service from lower to a higher layer and hiding the details
from the layers of how the services are implemented.
The basic elements of layered architecture are services, protocols, and interfaces.
❖ Service – It is a set of actions that a layer provides to the higher layer.
❖ Protocol – It defines a set of rules that a layer uses to exchange the information with peer
entity. These rules mainly concern about both the contents and order of the messages used.
❖ Interface – It is a way through which the message is transferred from one layer to another
layer.
OSI Model
OSI stands for Open System Interconnection is a reference model that describes how information
from a software application in one computer moves through a physical medium to the software
application in another computer.
OSI consists of seven layers, and each layer performs a particular network function.
Characteristics of OSI Model:
92 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ The OSI model is divided into two layers: upper layers and lower layers.
❖ The upper layer of the OSI model mainly deals with the application related issues, and they are
implemented only in the software. The application layer is closest to the end user. Both the
end user and the application layer interact with the software applications.
❖ The lower layer of the OSI model deals with the data transport issues. The data link layer and
the physical layer are implemented in hardware and software. The physical layer is the lowest
layer of the OSI model and is closest to the physical medium. The physical layer is mainly
responsible for placing the information on the physical medium.
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different functions
93 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Physical layer
It is the first layer that physically connects the two systems that need to communicate. It transmits
data in bits and manages simplex or duplex transmission by modem. It also manages Network
Interface Card’s hardware interface to the network, like cabling, cable terminators, topography,
voltage levels, etc.
Protocols used are ATM, RS232, and Ethernet.
Data-Link Layer
It is the firmware layer of Network Interface Card. It assembles datagrams into frames and adds start
and stop flags to each frame. It also resolves problems caused by damaged, lost or duplicate frames.
Protocols used are HDLC, LSL, and ATM
It has two sub-layers.
Media Access Control (MAC) – It is responsible to the physical address of the sender and/or receiver
in the header of each frame. CSMA/CD, Ethernet are used as protocol.
Logical Link Control (LLC) – It is responsible for frame management, error checking, and flow control
of data.
Network Layer
94 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
It is concerned with routing, switching and controlling flow of information between the workstations.
It also breaks down transport layer datagrams into smaller datagrams.
Protocols used are IPX, TCP/IP
Transport Layer
Till the session layer, file is in its own form. Transport layer breaks it down into data frames, provides
error checking at network segment level and prevents a fast host from overrunning a slower one.
Transport layer isolates the upper layers from network hardware.
Session Layer
This layer is responsible for establishing a session between two workstations that want to exchange
data.
Protocols used are RPC, PPTP, SCP, SDP
Presentation Layer
This layer is concerned with correct representation of data, i.e. syntax and semantics of information.
It controls file level security and is also responsible for converting data to network standards.
95 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Application Layer
It is the topmost layer of the network that is responsible for sending application requests by the user
to the lower levels. Typical applications include file transfer, E-mail, remote logon, data entry, etc.
Protocols used are – HTTP, FTP, Telnet, SMTP and DNS.
TCP/IP model
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of layered protocols
used for communication over the Internet. The communication model of this suite is client-server
model. A computer that sends a request is the client and a computer to which the request is sent is
the server.
Functions of TCP/IP layers:
96 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is being
sent over the network.
Application Layer
An application layer is the topmost layer in the TCP/IP model. It is responsible for handling high-level
protocols, issues of representation.
This layer allows the user to interact with the application. When one application layer protocol wants
to communicate with another application layer, it forwards its data to the transport layer.
NETWORK PROTOCOLS
Transmission Control Protocol (TCP)
TCP is a popular communication protocol which is used for communicating over a network. It divides
any message into series of packets that are sent from source to destination and there it gets
reassembled at the destination.
Internet Protocol (IP)
IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets
help in routing them through different nodes in a network until it reaches the destination system.
TCP/IP is the most popular protocol connecting the networks.
User Datagram Protocol (UDP)
UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily
for creating loss-tolerating and low-latency linking between different applications.
Post Office Protocol (POP)
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that
extracts and retrieves email from a remote mail server for access by the host machine. POP is an
application layer protocol in the OSI model that provides end users the ability to fetch and receive
email.
Simple Mail Transport Protocol (SMTP)
SMTP is a set of communication guidelines that allow software to transmit an electronic mail over the
internet is called Simple Mail Transfer Protocol. It is a program used for sending messages to other
computer users based on e-mail addresses.
File Transfer Protocol (FTP)
The File Transfer Protocol is a standard network protocol used for the transfer of computer files
between a client and server on a computer network. FTP is built on a client-server model architecture
using separate control and data connections between the client and the server.
Hyper Text Transfer Protocol (HTTP)
HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for
creating links. These links may be in any form like text or images. HTTP is designed on Client-server
principles which allow a client system for establishing a connection with the server machine for
making a request. The server acknowledges the request initiated by the client and responds
accordingly.
Hyper Text Transfer Protocol Secure (HTTPS)
HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the
communication among two computers one using the browser and other fetching data from web
97 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
server. HTTP is used for transferring data between the client browser (request) and the web server
(response) in the hypertext format, same in case of HTTPS except that the transferring of data is done
in an encrypted format. So it can be said that https thwart hackers from interpretation or modification
of data throughout the transfer of packets.
Telnet
Telnet is a set of rules designed for connecting one system with another. The connecting process here
is termed as remote login. The system which requests for connection is the local computer, and the
system which accepts the connection is the remote computer.
Gopher
Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents
from isolated sites. Gopher also works on the client/server principle.
ARP (Address Resolution Protocol)
The Address Resolution Protocol (ARP) is a protocol used by the Internet Protocol (IP) [RFC826],
specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol.
The protocol operates below the network layer as a part of the interface between the OSI network
and OSI link layer.
DHCP (Dynamic Host Configuration Protocol)
The Dynamic Host Configuration Protocol is a network management protocol used on Internet
Protocol networks whereby a DHCP server dynamically assigns an IP address and other network
configuration parameters to each device on a network so they can communicate with other IP
networks.
IMAP4 (Internet Message Access Protocol)
IMAP4 stands for Internet Mail Access Protocol version 4, is an Internet standard protocol for storing
and retrieving messages from Simple Mail Transfer Protocol (SMTP) hosts.
SIP (Session Initiation Protocol)
The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and
terminating real-time sessions that include voice, video and messaging applications.
RTP (Real-Time Transport Protocol)
The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP
networks. RTP is used extensively in communication and entertainment systems that involve
streaming media, such as telephony, video teleconference applications, television services and web-
based push-to-talk features.
RLP (Resource Location Protocol)
The Resource Location Protocol is a simple request/reply procedure. The querying host constructs a
list of resources which it would like to locate and sends a request message on the network.
RAP (Route Access Protocol)
RAP is a protocol that utilizes port 38 and is used for distributing routing information at all levels of
the Internet. RAP is further defined in RFC 1476.
L2TP (Layer Two Tunnelling Protocol)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP)
used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN)
over the Internet.
PPTP (Point To Point Tunnelling Protocol)
98 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
The Point-to-Point Tunneling Protocol is an obsolete method for implementing virtual private
networks. PPTP has many well-known security issues. PPTP uses a TCP control channel and a Generic
Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of
UDP for this same functionality.
SNMP (Simple Network Management Protocol)
Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and
monitor network devices and their functions. SNMP provides a common language for network devices
to relay management information in a local area network (LAN) or wide area network (WAN)
TFTP (Trivial File Transfer Protocol)
Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler
to use than the File Transfer Protocol (FTP) but less capable. It is used where user authentication and
directory visibility are not required.
INTERNET
Introduction
The Internet is generally defined as a global network connecting millions of computers More than 190
countries are linked into exchanges of data, news, and opinions. A protocol is a standard procedure
used to connect two data communication devices.
The Internet is a massive network of networks. Packet switching is a digital networking
communication method used for transmitting data. Internet Knowledge and Protocols Internet
Knowledge and Protocols.
A Unique Resource Locator (URL) is a link that is used to access a website on the Internet. Each
site has a unique URL.
History of Internet:
ARPANET is the first Internet network. ARPANET stands for Advanced Research Projects Agency
Networks.
ARPANET was introduced by the United States. ARPANET has made the TCP/IP correspondences
standard, which characterizes information exchange on the web. In 1972, E-mail was adapted by Ray
Tomlinson of BBN to ARPANET. In this, Ray has included @ symbol as address. TCP/IP was introduced
in 1982.
In 1978, the British post office telnet, DATAPAC and TRANSPAC teamed up to make the main
worldwide packet-switched system service, and this was referred to as the IPSS.
The abbreviation of IPSS is International Packet Switched Service. Network control program was
developed by a group called “the network working group”.
NSF, abbreviated as the National Science Foundation, is mainly used to create the similar and parallel
network called NSFnet.
Basic Internet Knowledge
World Wide Web (WWW)
A web server is a computer that provides web services to the client. A page hosted on the internet is
known as web page. It can be viewed by a browser.
A browser can help locate a website on the internet. The World Wide Web (WWW) permits user to
view multi-media-based documents like graphics, animations, audios and/or videos and any subject.
In 1990, the World Wide Web was introduced by Tim Berners-Lee of CERN.
99 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Web Server
A web server stores, processes and delivers web pages to the users. The intercommunication between
users and servers is done using Hypertext Transfer Protocol (HTTP).
Web Page
It is a document was written in HTML that can be accessed through the internet by using the web
browser. It is identified by Uniform Resource Locator.
Web Browser
It is a software application that allows users to access the websites. Internet Explorer, Google Chrome,
Opera, Mozilla Firefox, UC Browser, Apple Safari are some examples of a web browser.
Home Page
Homepage is the default page of the website.
Hypertext Mark-up Language (HTML)
HTML is used to create web pages that are displayed on the Internet.
Hypertext Transfer Protocol (HTTP)
This protocol is used to transfer data over the web. It runs on top of the TCP/IP set of protocols. It
uses a server-client model.
Transmission Control Protocol/Internet Protocol (TCP/IP)
It is a set of communication protocols which is used to access the internet. TCP/IP was developed
by Bob Kahn and Vint Cerf in 1978.
ISP
Internet service provider which connect us to internet and charges amount for its services. ISP has
computers called servers which remains permanently connected to other computers on net. ISP
provides us user name and password to connect to internet.
Internet Host
Host is a computer or application which is used to transfer the data on the internet. Each host has a
unique IP address called Hostname.
Internet Protocol Address (IP Address)
It is a logical numeric address that is used to identify the host over the internet network.
❖ The stable version of IP – IPv4 (32 bits). It is written in decimal and separated by periods.
❖ Latest Version of IP – IPv6 (128 bits). It is written in Hexadecimal and separated by colons.
❖ Compose – this link opens the page where you write the message for sending to others
Advantages Disadvantages
8. In which channel the data can flow in both directions but not at same time?
a) Duplex Channel
b) Half Duplex Channel
c) Simplex Channel
d) None of the above
Answer – b) Half Duplex Channel
Explanation – There are three different types of telecommunication and computer networking
channels - Simplex, Half-Duplex, and Full-Duplex.
❖ Simplex – Allows the sending of information in one direction only, which is similar to a
one-way street.
❖ Half-Duplex – Information can be sent in both directions, but it does not allow both
22. __________ is a specific kind of network topology in which all of the various devices in the
network are connected to a single cable or line.
a) Star topology
b) Bus topology
c) Mesh topology
d) Ring topology
Answer – b) Bus topology
Explanation – A bus topology is a topology for a Local Area Network (LAN) in which all the
nodes are connected to a single cable. The cable to which the nodes connect is called a
"backbone". If the backbone is broken, the entire segment fails.
23. In the ________ topology, each workstation is connected directly to each of the others.
a) full mesh
b) Partial mesh
c) Both a) and b)
d) None of the above
Answer – a) full mesh
Explanation – With full mesh, each node is directly connected to every other node. This
enables a message to be sent along many individual routes. With partial mesh, not all nodes
are connected directly to each other.
24. The size of an IP address in IPv6 is
a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits
Answer – b) 128 bits
108 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Explanation - An IPv6 address is 128 bits or 16 bytes long. Therefore, 2128 i.e. 340 undecillion
addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a
brilliant alternative in case IPv4 runs out of possible new addresses.
25. The protocol(s) used in star topology is/are ___________
a) Ethernet
b) Token Ring
c) Both a) and b)
d) None of the above
Answer – c) Both a) and b)
Explanation –
Protocol Cable Topology
Ethernet Twisted Pair, Coaxial, Fiber Linear Bus, Star, Tree
Fast Ethernet Twisted Pair, Fiber Star
LocalTalk Twisted Pair Linear Bus or Star
Token Ring Twisted Pair Star-Wired Ring
FDDI Fiber Dual Ring
ATM Twisted Pair, Fiber Linear Bus, Star, Tree
26. World Wide Web was proposed by:
a) Bill Gates
b) Bill Rogers
c) Tim Berners Lee
d) None of These
Answer – c) Tim Berners Lee
Explanation – In 1989, while working at CERN, Tim Berners-Lee, a British scientist, invented
the World Wide Web (WWW). It was developed to meet the demand for automated
information-sharing between scientists in universities and institutes around the world.
27. Which of the following must be contained in a URL?
a) A protocol identifier
b) www
c) unique registered domain
d) all of the above
Answer – d) All of the above
Explanation –
28. Which is a text field near the top of a Web browser window that displays the URL of the current
webpage?
a) Formula Bar
b) Scroll Bar
c) Address Bar
d) None of the above
17. Which of the following is an example of binary number? [IBPS Clerk 2011]
a) 6AH1
b) 100101
c) 005
d) ABCD
Answer – b) 100101
Explanation – A binary number is a number expressed in the base-2 numeral system or binary
numeral system, which uses only two symbols: typically, "0" (zero) and "1" (one).
18. The most widely used code that represents each character as a unique 8-bit code is
a) ASCII
b) UNICODE
c) BCD
d) EBCDIC
Answer – a) ASCII
Explanation – ASCII is an 8-bit code. That is, it uses eight bits to represent a letter or a
punctuation mark. Eight bits are called a byte. A binary code with eight digits, such as 1101
10112, can be stored in one byte of computer memory.
Ribbon Bar
Sub-menu Bar
Dialog Box Launcher
Cursor
View Toolbar
Status Bar
Scroll Bar
Title Bar
The title Bar is located at the top of a windows that displays the name of the window or document
being used. It shows the name of the file on which you are working. It also consists of three buttons,
e.g.,
❖ Minimize button reduces the window to an icon but word still remains active.
❖ Restore button again brings word window to the maximum original size.
Menu Bar
It consists of various commands which can be accesses by clicking at the menu options under these
menus’ heads.
Quick Access Tool Bar
The quick access toolbar is a small and customizable toolbar at the top of the document window. It
contains a set of commands that are independent of the tab on the ribbon that is currently displayed.
It usually contains buttons to save, undo, redo, and print. to do’
Status Bar
A Status Bar is a horizontal window at the bottom of parent window. It displays the various kinds of
status information of the document.
Dialog Box Launcher
A button in the corner of a group that launches a dialog box containing all the options within that
group.
View Toolbar
121 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
A toolbar that enables, adjusts and displays different views of a document. It is located at the bottom
left corner of the window.
Ribbon
The Ribbon is a cluster of toolbars in Microsoft Office which are used for writing, designing, formatting
and reviewing different styles, adaptations, add-ins, themes etc. Every tab in the top of a given word
file window displays the Ribbon toolbar.
File tab
The File tab is a colored tab, for example, a blue tab in Word, located in the upper-left corner of
Microsoft Office programs.
When you click the File tab, you see many of the same basic commands that you saw when you clicked
the Microsoft Office Button or on the File menu in earlier releases of Microsoft Office, such as
Open, Save, and Print.
Home Tab
The Home tab is the default tab in Microsoft Word, Microsoft Excel, Microsoft PowerPoint and other
Microsoft Office products. It allows changing document settings such as the font properties by using
control groups on the tab. The control groups and keys are
❖ Clipboard Group – Copy (only one item at a time), Paste, Cut, Format Painter.
❖ Font Group – Font Style, Colour and Size, Bold, Underline, Strikethrough etc.
❖ Paragraph Group – Bullets and Numbering, Alignment, Shading, Borders, Line spacing.
❖ Style Group – Listed Styles
❖ Editing Group – Find, Replace etc.
Insert Tab
The Insert Tab is used different features such as tables, pictures, clip art, shapes, charts, page
numbers, word art, headers and footers etc. into a document. The availed groups and keys under this
tab are:
❖ Document Formatting Group – Themes (to change colors, fonts and effects for the document
all at once), Style Set gallery (to change the styles), Colors, Fonts, Paragraph spacing, Effects
❖ Page Background Group – Watermark, Page Color, Page Borders
Layout Tab
The Layout Tab holds the buttons which are used to arrange document pages. The control groups and
keys under layout tabs are:
❖ Page Setup Group – Margins, Orientation, Breaks, Line numbers, Hyphenation, Size of the
page, Columns
❖ Paragraph Group – Paragraph Indentation, Spacing
❖ Arrange Group – Position, Wrap Text, Bring Forward, Align Rotate etc.
References Tab
References Tab allows to now create a table of contents, footnotes, citations, cross-references. The
availed control groups and keys in this tab are:
❖ Views Group – Read mode, Print Layout, Web Layout Outline, Draft
❖ Immersive Group – Immersive Reader
❖ Page Movement Group – Vertical, Side to Side
❖ Show Group – Ruler, Gridline, Navigation Pane
❖ Zoom Group – Zoom (10% to 500%), Page width, Multiple pages
❖ Window Group – New Window, Arrange and Split window, Switch windows etc.
❖ Macros group – Macros
❖ SharePoint Group - Properties
Help Tab
The users can get help by using F1 function key anytime, Help tab and ‘Tell me what you want to do
Title Bar
Displays the name of the application and the file currently in use
Ribbon
Displays the numerous functions and tools available to work with data
❖ Formulas Library – Insert Function, AutoSum, Financial & Logical Function, Date & Time, Maths
& Trig, Lookup & Reference, Text, More Function (Statistical, Engineering, Cube etc.)
❖ Defined Names Group – Name Manager, Define Name, Use in Formula, Create from selection
❖ Formula Auditing - Trace Precedents & Dependents, Error Checking, Evaluate Formula, Watch
window
❖ Calculation Group – Calculate sheet, options
Data Tab
Data Tab is used for importing a large amount of data. Importing Data can be done by connecting with
the server, automatically from the web, MS Access etc., It makes easy to read vast data.
❖ Get & Transform Data Group – Get Data, From Text/CSV, Web, Table/Range, Existing
Connections
❖ Queries & Connection Group – Refresh All, Properties, Edit Links, Queries, Connections
3
Charts – There are eight types of charts. Column or Bar Chart, Hierarchy Chart, Line Chart or Area
Chart, Combo Chart, Statistic Chart, Bubble Chart, Pie Chart, Waterfall, Funnel, Stock, Surface or Radar
Chart.
129 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
❖ Sort & Filter Group – Sort, Filter, Reapply, Clear, Advanced
❖ Data Tools Group – Text to columns, Flash Fill, Remove Duplicates, Data Validation,
Consolidate, Manage Data Mode, Relationships
❖ Forecast Group – What-If Analysis, Forecast Sheet
❖ Outline Group – Group, Ungroup, Subtotal
Review Tab
It contains the editing feature, comments, track changes and workbook protection options. It makes
to share the data easily with the proper information and ensuring the security of data.
❖ Workbook Views Group – Normal, Page Break Preview, Page Layout & Custom View
❖ Show Group – Ruler, Formula Bar, Gridlines, Headings
❖ Zoom Group – Zoom (10% - 400%), 100%, Zoom to Selection
❖ Window Group – New Window, Arrange All, Freeze Panes, View side by side, Synchronous
Scrolling, Reset Windows, Show/Hide, Switch Windows
❖ Macros Group – Macros
Help Tab
The user can get help using this tab, by tapping F1 key.
Title Bar
Displays the name of the application and the file currently in use.
Ribbon
Displays the numerous functions and tools available to work with your presentation.
Quick Access Toolbar
Enables you to customize the toolbar to contain the commands you use most frequently.
File tab (Backstage View)
Provides access to basic commands such as New, Open, Save, Print and Share plus access to customize
the application.
Slides pane
Displays a thumbnail version of each slide within the presentation.
Slide
The area which will be displayed as full screen when viewed in Slide Show mode.
Status Bar
❖ Start Slide Show Group – From Beginning, From Current Slide, Present Online, Custom
Slideshow
❖ Set up Group – Set up slideshow, Hide slide, Rehearse timings, Record Slide Show
❖ Monitors Group – Automatic, Use Presenter View
Review Tab
Review tab is used to check spelling, to collaborate by adding comments, and to access editor tools.
The groups are:
Long Text This data type is used for lengthy text or Maximum 63, 999 characters.
alphanumeric data.
OLE objects OLE objects can store audio, video, other Up to 2 GB data can be stored.
Binary Large Objects.
Hyperlink Text or combinations of text and numbers Each part of a Hyperlink data
stored. That text is used as hyperlink type allows you to store a
address. maximum 2048 characters.
Calculated Helps you to create an expression that uses You can create an expression
data from one or more fields. which uses data from one or
more fields.
MICROSOFT OUTLOOK
Introduction
Microsoft Outlook being a part of Microsoft's Office Suite family is widely used as desktop email client
to communicate over internet. Many organizations and business users utilize MS Outlook in combined
with Microsoft Exchange Server and Share point Server to send or receive emails, coordinate meetings
and calendars etc.
Outlook can be easily expended with Smartphone's allowing users to access their email data
anywhere around the world. Only they have to synchronize their mailbox with device by providing
user ID and password. In addition, for those users who are not availed with this facility into their
devices can download numerous Add-ons available into internet market.
not only the text of a slide but also any graphics, sounds, and animations that might be
included on the slide.
❖ Outline View – Shows the contents of your presentation in outline format. This view is
view is best when you want to rearrange the order of your slides or just want to see
each slide in your presentation with the formats and colors you have chosen. In Slide
Sorter View you can't edit the contents of a slide, but you can quickly switch to Slide
View where you can edit the contents.
❖ Notes Page View – Shows one slide at a time with speaker's notes. This view is best
when you are entering or reviewing the notes you made for slides.
❖ Slide Show View – Shows your presentation as it will look to the audience when you
run it. This view displays one slide at a time in full-screen mode
19. Objects on the slide that hold text are called
a) Placeholders
b) Object holders
c) Auto-Layouts
d) Text holders
Answer – a) Placeholders
Explanation – A placeholder is a container that is used to display content, such as text, table,
picture, movies, sound, clip art, chart, SmartArt etc.
When using PowerPoint, we use Auto layouts to help position text and objects in a manner
that looks more professional.
20. The slide that is used to introduce a topic and set the tone for the presentation is called the
a) Table Slide
b) Graph Slide
c) Bullet Slide
d) Title Slide
Answer – d) Title Slide
Explanation – A title slide in PowerPoint can take on many different definitions, but in most
cases, it is the first slide in the slide deck and appears in the PowerPoint workspace when that
presentation is opened. By default in PowerPoint, the title slide offers two text boxes for a title
and subtitle.
21. Which of the following is not a font style?
a) Bold
b) Italics
27. When the user puts the data in word from excel, the data is ________.
a) Hyperlinked
b) Indexed
c) Transposed
d) Get into rows
Answer – b) Indexed
Explanation – An excel file is always formed of grids with rows & columns handling data
whereas a word document handles data in standard word form. When an excel sheet is
inserted into the latter, it is transformed into an indexed data.
28. Text-styling feature of MS word is
a) WordColor
b) WordFont
c) WordArt
d) WordFill
Answer – c) WordArt
Explanation – The text styling feature of MS Word is known as WordArt. It allows users to
make the text more noticeable and flashier.
Example of WordArt
number, customer name, street address, city, state, phone number, current address, etc. Field
of a table is also known as column.
cannot make separate copies of the same data. All the data is kept at a place and different
applications refer to data from centrally controlled system.
❖ Better Interaction with Users – In DBMS, the availability of up to date information improves
the authorised channels. To ensure security, DBMS provides security tools, i.e. username and
password.
❖ Maintenance of Data Integrity – Data integrity ensures that the data of database is accurate.
In DBMS, data is centralised and used by many users at a time, it is essential to enforce integrity
controls.
❖ Ease of Application Development – The application programmer needs to develop the
application programs according to the user’s need. The other issues like concurrent access,
security, data integrity, etc. are handled by database itself. This makes the application
development an easier task.
❖ Backup and Recovery – The DBMS provides backup and recovery subsystem that is responsible
of large size is required to run the DBMS software. It means that you have to upgrade the
hardware used for file-based system. Similarly, database software is also very costly.
❖ Complexity – The provision of the functionality that is expected from a good DBMS makes the
DBMS an extremely complex piece of software. Failure to understand the system can lead to
bad design decisions, which can have serious consequences for an organisation.
❖ Cost of Staff Training – Mostly DBMS are often complex systems so the training for user to use
the database is required. The organisation has to pay a lot of amount for the training of staff
to run the DBMS.
❖ Credit Card Transaction – For purchase of credit cards and generation of monthly statements.
❖ Telecommunication – For keeping records of calls made, generating monthly bill, etc.
❖ Finance – For storing information about holdings, sales and purchase of financial statements.
RELATIONAL DATABASE
In a relational database, data is stored in different tables with relationships to each other. These
tables communicate and share information, which facilitates data search ability, organisation and
reporting. In the case of relational database, a Relational Database Management System (RDBMS)
performs these tasks. An important feature of this database system is that a single database can be
spread across several tables, e.g. Base, Oracle, DB2, SAP SyBase, Informix, etc.
TERMS RELATED TO DATABASE
Various terms related to relational database are as follows:
Relation
It is a table with columns and rows which represent is the data items and relationships among them.
Relation have three important properties a name, cardinality and a degree. These properties help us
to further define and describe relations.
❖ Name – The first property of a relation is its name, which is represented by the tide or the
entity identifier.
❖ Cardinality – The second property of a relation is its cardinality, which refers to the number
relation. It identifies unique records within a table. The primary key should be chosen in such
a way, i.e. its value must not be changed. There should not be duplicacy in the record of
primary key. Primary key can be atomic or composite. The field chosen as primary key, cannot
accept null value.
❖ Candidate Key – The set of all attributes which can uniquely identify each tuple of a relation,
are known as candidate keys. Each table may have one or more candidate keys and one of
them will become the primary key. The candidate key of a relation is always a minimal key.
❖ Alternate Key – From the set of candidate keys after selecting one of the keys as primary key,
or some another table. The relationship between two tables is established with the help of
foreign key. A table may have multiple foreign keys and each foreign key can have a different
referenced table. Foreign keys play an essential role in database design, when tables are
broken apart then foreign keys make it possible for them to be reconstructed.
DATABASE LANGUAGES
There are various types of database languages:
Data Definition Language (DDL)
DDL is used to dene structure of your tables and other objects in database. In DBMS, it is used to
specify a database schema as a set of definitions.
Data Manipulation Language (DML)
DML provides various commands used to access and manipulate data in existing database. This
manipulation involves inserting data into data base tables, retrieving existing data, deleting data from
existing tables and modifying existing data.
Data Control Language (DCL)
DCL commands are used to assign security levels in database which involves multiple user setups.
They are used to grant defined role and access privileges to the users.
ENTITY - RELATIONSHIP MODEL (E-R MODEL)
It represents the entities contained in the database. It is a diagrammatically representation of entities
and relationship between them. It is also known as E-R diagram.
❖ Weak entity set – It does not possess sufficient attributes to form a primary key.
Relationship
It is an association among several entities. A relationship describes how two or more entities are
related to each other. It is represented by diamond shape.
Relationship can be divided into three parts
❖ One to one
❖ Many to one
❖ One to many
Actions, which are represented by diamond shapes, show how two entities share information
in the database.
Attributes, which are represented by ellipse (ovals). A key attribute is the unique,
distinguishing characteristic of the entity. For example, an employee's social security number
might be the employee's key attribute.
Connecting lines, solid lines that connect attributes to show the relationships of entities in the
diagram.
Cardinality specifies how many instances of an entity relate to one instance of another entity.
12. An advantage of the database management approach is
a) data is dependent on programs
b) data redundancy increases
c) data is integrated and can be accessed by multiple programs
d) All of the above
Answer – c) data is integrated and can be accessed by multiple programs
Explanation - Advantages of Database Management System (DBMS)
155 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
Improved data sharing.
❖
Actions - are represented by diamond shapes, show how two entities share information in the
database.
Attributes, are represented by ellipse (ovals). A key attribute is the unique, distinguishing
characteristic of the entity. For example, an employee's social security number might be the
employee's key attribute.
Gigabyte – A gigabyte is a unit of information or computer storage equal to approximately one billion
bytes
❖ Gigahertz (GHz) – A measurement used to identify the speed of the central processing unit. One
❖ Gopher – A protocol used for locating and transferring information on the internet. It is an internet
computer through a metaphor of direct manipulating of graphical images and widgets in addition
to text.
ANSWER
1 2 3 4 5 6 7 8 9 10
a b a d a a b b b e
11 12 13 14 15 16 17 18 19 20
b a d b b d b c c d
21 22 23 24 25 26 27 28 29 30
b c b a e c c d c b
31 32 33 34 35 36 37 38 39 40
b c d b b b a b c c
41 42 43 44 45 46 47 48 49 50
b d a b a a a c c b
ANSWER
1 2 3 4 5 6 7 8 9 10
b b d c d c c d b c
11 12 13 14 15 16 17 18 19 20
b b a a c d d d b d
21 22 23 24 25 26 27 28 29 30
b a a b d b a a d b
31 32 33 34 35 36 37 38 39 40
a a c d c b d b d a
41 42 43 44 45 46 47 48 49 50
d c b b b c a a b c
ANSWER
1 2 3 4 5 6 7 8 9 10
c c d d a c s b d e
11 12 13 14 15 16 17 18 19 20
a a c c c d b d b c
21 22 23 24 25 26 27 28 29 30
b e c e a e a b a d
229 | P a g e WWW.EDUTAP.CO.IN QUERY-HELLO@EDUTAP.CO.IN/8146207241
31 32 33 34 35 36 37 38 39 40
c b d d c d c d c c
41 42 43 44 45 46 47 48 49 50
a a a c a b c b c c