You are on page 1of 128

 COMPUTER

KNOWLEDGE
Very useful for
IBPS / SBI / RBI &
Sachivalayam Exams
Turning Point
Head Office Branch Office
KADAPA (A.P.) CHENNAI (T.N)
Rayachoty Road, Sembakkam
Utukuru, Kadpa. 9677166270
868 80 80 80 2 9677166210


Excellent Coaching For

BANKS / SSC / RRB / SI /


Constables / Groups /
Sachivalayam
 cONteNts

 cOMPuter basics
.. Evolution / History
Generations
. Input & Output Devices
.. Types of Computers
Memory & Types of Memory
. Low Level & High Level Languages
. Terms Related Programming
 sOFtWares & tyPes
.. Operating Systems
Application Softwares
. Utility Softwares
 Ms - OFFice & shOrt cuts

. MS Word . MS Power Point . MS Excel . MS Access

 Data base MaNaGeMeNt systeM

 NuMber systeMs - cONversiONs

 NetWOrKiNG & iNterNeNt


.. Types - LAN, MAN, WAN, PAN


Topologies
.. Data Transmission
OSI Reference model - PROTOCOLS
 security threats & virus

best 22 test series & 5 quiz tests


MS -WORD WINDOW
Title Bar  File Name X

Menu Bar  File Edit Format Tools Review Table

Standard  Print Save New Doc Formating


Font Size Font Name Text alignment 
Tool Bar Tool Bar

Ruler Bar  SCALE

Turning Point  Scroll Bar

Studycircle

Status Bar  Page count Line count

Task Bar  Start File Name  Customized


Icons
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
INTRODUCTION

CALCULATOR : The device that performs mathematical operations but it has no storage capacity
COMPUTER : The device that works in electric medium and performs both mathematical and logical
operations with storage capacity.

Basic Functions of Computer :

pa
Accepts input (data)
Processes the given data
Produces output (information)
Stores the output for future use.

a
Properties that determine power & cost of Computer :

ad
i) Speed : Computer peforms billions of instructions per second (also MIPS)
ii) user friendly : Very easy to use a computer by humans
iii) Reliability
iv) Accuracy
:
:
:K
It does not commit mistake / error
It produces the correct results with given input

Input  Data  Processing  Information  output


  
main memory Storage
nt
Fig : functioning of computer.
Evolution of Computer
* ABACUS  It is the first computer introduced in 2000 BC
oi

* 1617  John naphier introduced napier's bones for calculation


* 1642  Blaise Pascal invented PASCAL's calculator

P

* 1823 ­ 34 Charles Babbage developed Analytical Engine, difference Engine.


He is called father of Computers.
 Counter wheels are memory components for Analytical Engine.
ng

* 1801  Joseph Jaquard introduced Punched cards that were used in cotton looms &
Weaving patterns to store data
* 1941  JP Eckert & JW Mauchly invented ENIAC.
ni

ENIAC  Electronic Numeric Integrator and Calculator.


 First commercial electronic Computer
* 1947  John Von Neumann introduced EDSAC with storage capacity
r

EDSAC  Electronic Delayed Storage Automatic Computer


Tu

* 1951  Mauchly & Eckert also invented UNIVAC.


UNIVAC  Universal Automatic Computer
* 1950  EDVAC introduced (Electronic Discrete variable Automatic Computer)
* Micro processor is invented by MARCIAN HOFF
 So, Electronic Computers Started in 1940's .So generations will start from here.
1 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
GENERATIONS

Generation Years Chief Components Memory Operating Language Examples


Elements System
Ist 1940­55 Vaccum Tubes/ Magnetic drums ­ No ­ Machine ENIAC
Electronic valves language EDSAC
EDVAC
UNIVAC

pa
2nd 1956­63 Transistors Magnetic cores ­ No ­ Assembly IBM 700/1401
Magnetic Tapes Language, IBM 7030
FORTRAN,
COBOL

a
3rd 1964­71 Integrated RAM, DISKS LINUX ALGOL CDC 6600/760
Circuits C, C++ IBM 360

ad
JAVA IBM 370
SQL CRAY­1
4th 1972­ LSI/VLSI All Primary, Windows SQL All PC's &
Present Very Large Scale Secondary DOS, ORACLE Desktops,

5th Develo­
Integrators

Artificial
:K
Storage devices LINUX CRAYX­MP

pment Intelligence,
Phase. Robotics & Knowledge Information Processing Systems
Nano Science.
nt
Note : Now we are in 4G and using 4 G technology only.
Artificial Intelligence : The Intelligence (science) involved and used by machines to perform the human
activities such as writing, reading and all the human activities.
oi

Nano Science : The Science / technology which involves in observation & deals with particals of
1­100nm size itself.
NM indicates Nanometer, which is the least measurement
P

Robotics : The Sensitive operations in human body are performed through Rod like structures
that acts according to machine instructions & these technology is called Robotics.
SYSTEM ARCHITECTURE
ng

The computers architecture is mainly divided into three types of devices as


a) Input Devices : The devices which gives instructions to the computer are Input devices.
Examples : Mouse, keyboard, Microphone, Scanner, CD­Drive, Joystick, Barcode Readers, Reel
ni

Camera, OCR, OMR, Webcam, MICR Device etc.,


b) Output Devices : The devices which gives output data to users are output devices.
Examples : Monitor, Speakers, Printers & Plotters etc.
r

c) Processing Device : CPU


* Peripherals : Devices that are connected to CPU ( Both input and output devices)
Tu

INPUT DEVICES
a) Mouse : It is the Pointing device
­ It works on principle of drag & drop icons (objects)
­ To get Properties of any object, we have to press Right button of mouse
­ The Scroller is present b/w two buttons of mouse.
­ Ball mouse & optical mouse are two types of mouse.
2 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
b) Key Board : The most widely using device for Input
­ We use QWERTY keypad boards.
­ Each press on key of key board is " keystroke"
­ key stroke is first converted into ANSI Code.
­ ANSI ­ American National Standard Institute
IMP. KEYS :
* Capslock : It is used to change the letter case of Text
* Function keys : F1 to F12 are 12 functional keys.
* NumLock : It locks the Number pad and change the numbers into directional keys.

pa
* Modifier keys : Alt , Ctrl , Shift
* Task manager keys : Alt + Ctrl+ Del. (Turnoff user accounts)
* End : To bring cursor to the end of current line.

a
* Tab key : To indent (initialise) the paragraph
* Toggle keys : Key which performs 2 different actions on Pressing.

ad
Ex: Caps Lock, Num Lock
c) Scanner : The electrical device that converts hard copy of text / image into a computer photographic
image that can be stored in the computer memory.
 TWAIN is related to scanner (verify fullforms)

c) Barcode Readers :
:K
d) Joystick : The device used in computer for playing games as an directional device.

Barcode : The lines of different length and width found on tags / products and this code is
recognized by computer system.
Barcode Reader : Through Input Automation, these readers take the rate/cost of product automatically
at POS (point of sale) Systems
nt
f) MICR Device :
MICR ­ Magnetic Ink character Recognition
­ This technique used for cheque clearance in Banks.
oi

­ MICR Code is of 9 digits ­ 896 786 123


City Bank Brach codes
* First 3 digits indicates city code
P

* Middle 3 digits indicates Bank code


* Last 3 digits indicates Branch code
Example : 896 786 123
ng

Kadapa SBI Seven Roads Branch


g) OMR : Optical mark recognition
h) OCR : Optical character recognition
OUTPUT DEVICES
ni

a) MONITOR : The device mostly used for viewing output.


­ It is also called visual Display Unit (VDU)
­ Monitors clarity is based on its Resolution
r

­ Resolution is measured in Dpi ( dots per inch)


­ Each dot is called pixel.
Tu

­ As the number of pixels increases, screen clarity is increased.


CRT  Cathode Ray Tube Screen  Low clarity
LCD  Liquid Crystal Display Screen  Medium
LED  Light Emitting Diode screen  High clarity..
* as the number of dots increases on screen, the space between dots is decresed
Note : IBM is called BIG BLUE
3 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
b) PRINTERS : Devices which produces the hard copy are called printers
Printers

Impact printers Non ­ Impact Printers


 
Daisy wheel printers Inkjet printers
Dot matrix printers LASER printers
Chain & Band printers Thermal printers

pa
Fig : Printers classification
i) Impact Printers : This type of printer strikes paper and ribbon together to form character on paper.
­ Graphics cannot be printed by using these printers
* Daisy wheel : These are typewriters & slow printing Only for text.

a
­ Petals are typewriter keys
* Dot matrix : These are called pin printers.

ad
­ These are bidirectional printers
­ used in railway ticket printing
* Band Printer : Very fast, expensive & sound making.
­ Used in printing current Bills, Bus Tickets etc.,
:K
ii) Non-Impact Printers : ( Speed measured in characters per second)
­ It does not strike the paper but uses ink spray or toner powder.
* InkJet : ­ Used for colour printing
­ It uses ink to spray on paper
­ These are replaced with Laser printers.
* Laser :
nt
­ It prints more number of pages per minute, than other printers.
­ It prints high resolution on paper
­ It prints high quality graphics
oi

­ Now a days widely using printers


* Thermal Printer :
- It uses heat on chemically treated paper
P

­ Fax machines are example.


c) PLOTTER : It is a printer, accuracy measured in terms of repeatability and resolution.
­ It is most widely used for large size colour printing (Graphics)
ng

­ It has penlike structures which prints graphics on flex according to computer instructions
Ex : Movie Banners Printing.
Spooling : The process of maintaining on order of pages that has to be printed in sequence.
­ The order of sequence is maintained by the spooler (special numeric code)
ni

DEVICES ACTING AS BOTH I/P & O/P DEVICES


­ Few devices that gives input and also show/get the out put through same device.
Examples : MODEM, FAX, Touch Screen, AT ­ Headset, Digital camera.
r

i) MODEM : Modulator and Demodulator is full form for it.


Tu

Modulator ­ Converts Binary Signal into Analog wave


Demodulator ­ Converts Analog wave into Binary signals.
ii) FAX : It is also called Facsimile (Far Away Xerox)
* It consists scanner for paper scanning as input to send.
* It has printer to print on paper which is recieved as FAX message
­ So FAX takes input and produces output also.

4 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
iii) Touch Screen :
­ The touch screen is used for both input & output.
Ex : Touch screen Mobiles.
iv) Digital Camera :
­ This camera takes / captures the image (input)
­ Same image can be seen on camera screen (output)
v) AT - Head set : Advanced Technology Headset
­ Headset (Mic and Speakers) is used for talking & hearing the voice

pa
Ex: Mobile phone Headset
TYPES OF COMPUTERS BASED ON DATA TAKEN & OUTPUT
i) Digital : The computers count data or signals as "on" or "off" in binary digits only
ii) Analog : It recognises data as continuous measurement in wave form by continuous electrical pulses.

a
iii) Hybrid : Combination of measurement and wave signals forms hybrid computers

ad
Ex : Computers in Hospitals
* The DIGITAL COMPUTERS are divided into 4 types based on speed.

Super Computers Cost Speed



Mainframe Computers

:K Decreases
Mini Computers Top to
Bottom

nt
Micro Computers
i) Super Computers :  
­ The high speed & fast computers designed to perform Complex Instructions.
oi

­ Seymour cray invented the super computer


­ High expensive
­ Applications : Weather forecasting
P

Engineering Testing & Design


Aircraft maintainance
ng

Scientific & Biomedical Research.


Examples : CRAY (1,2) , PARAM series, PACE series.
* PARAM PADMA is Super Computer of India.
ii) Mainframe Computers :
ni

­ It serves as backbone for Business World


­ Air condition Rooms are mandatory for maintanance
­ Huge number of people at network can use the server at a time with Mainframes.
r

­ Applications : ­ Servers for Banks & Railways.


Tu

Ex : IBM ­ 3000 series, UNIVAC ­ 1180


iii) Mini Computer :
­ These are early days Pc's used in CAD
CAD ­ Computer Aided Design.
­ These are replaced with personal / micro computers in Banks and Insurance Companies.
Ex: VAX ­ II
5 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
iv) Micro / Personal Computers :-
­ Size of micro computers varies from PDA to desktop computers.
­ In 5G, Pc's are going to replace the mainframes
Ex: Desktops or Pc's
PORTABLE DEVICES
a) Laptops : The small computers that can be carried any where and can be for personal use and business
purpose

pa
­ Instead of mouse, touchpad is present on Laptop.
­ These are portable, so can be carried any where
b) Palmtops : The devices that are smaller than Laptops but can perform same works.
­ Mostly used for surfing Internet only.

a
­ These are also called personal digital assistants (PDA)

ad
Ex: Samsung tabs, Note pads, Note books.
c) Smartphones : Devices used for both making calls and surfing Internet.
d) Small keypad mobiles :
­ WAP is the protocol that provides internet facility for small mobile phones.
­ WAP ­ Wirless Application protocol
Ex: Nokia classic mobile.
:K
CENTRAL PROCESSING UNIT (CPU):

­ It has various names as * Processor, System unit


nt
* Computer tower
* Brain of computer
CPU Hard ware :
oi

* The CPU is containing many hardware components that combinely called as system unit.
What is Hard ware & Software ?
P

Hardware : The physical components of a Computer that we can see and touch.
Ex : CPU, Monitor, Keyboard, Hard disk, Floppy Disk, CD etc.
Software : It refers to the programs which are required to operate the computer, we cannot touch & see
ng

Ex: DOS, Windows7, MS­Office, Operating System etc.,


CPU - HARDWARE COMPONENTS
i) Motherboard :
ni

­ It is also called system board


­ It contains RAM, ROM, Expansion slots, CMOS Battery, BIOS Chip, SMPS, FAN etc.,
­ The communication b/w all these components is passed through BUSES.
r

* CMOS Battery :
Tu

­ It stands for complimentary metal oxide semiconductor Battery


­ It is made of lithium metal
­ Its main functions are
a) To maintain RTC ( Real Time Clock) in the computer system
b) To wake up the BIOS ( Basic Input Output System) to perform the POST (Power on Self Test).

6 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
BUSES : The communication lines between the components on the mother board are called buses.

Type of Buses Address Bus


Data Bus
* Address Bus :
­ It carries only address from Hard disc to RAM
­ It is unidirectional bus.

pa
* Data Bus :
­ It sends the data from RAM to Hard disk and recieves data from Hard disk to RAM
­ It is Bidirectional Bus
* BIOS CHIP : (Basic Input Output System)

a
­ It is the ROM chip on mother board

ad
­ BIOS chip is hardware and it contains BIOS software files so it is called FIRMWARE.
­ BIOS memory cannot be deleted because it is ROM.
* FAN : It is the cooling agent for mother board components and CPU.
* Expansion slots :
:K
­ These are slots provided to install the extra cards such as video graphics cards & multimedia cards.
­ These slots are present on mother board.
* SMPS : Switch Mode Power Supply
­ It supplies power to CPU by converting AC to DC. (AC ­ Alternate Current, DC ­ Direct current)
* PCI Slot : Peripheral component interface slots ( connecting external devices)
nt
* Processor Chip :
­ Processor converts the input to output and made up of silicon metal
­ So Computers are called as silico Sapiens.
oi

­ Processor speed is measured in Hertz


­ Examples : Intel ­ core, core 2duo, pentium series, i5 , i7 etc.,
P

­ Speed of processor MHz = 1 Million cycles per second


GHz = 1 Billion cycles per second
­ We have CISC & RISC type of processors
ng

CISC RISC
­ Complex Instruction Set Computer ­ Reduced Instruction set computer
­ It allows more number of ­ It allows small & limited number of signals
ni

micro electronic signals


­ It uses complex addressing modes ­ It uses simple addressing modes
Ex: Pentium Pro, II, III Ex: IBM RS ­ 6000, MC­88100
r

* Random Access Memory (Read and write memory) (RAM) :


Tu

­ It is volatile memory because it loses data when system is turned off.


­ It can perform operations in Random
­ It is a hardware device in Rectangle shape.
­ Its size varies from 256 MB to 8 GB
­ RAM is called system memory, Internal memory or memory.

7 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
TYPES OF RAM :
i) SRAM : Static Random Access memory
­ It is the high speed RAM ( It has 6 Transistors in it )
­ It can continue to work / process with out refreshing the system
­ It is costly in price
ii) SDRAM : Synchronus Dynamic RAM
­ To reduce the cost of SRAM, this SDRAM was invented

pa
­ It has the same properties as SRAM only.
iii) DRAM : Dynamic Random Access memory
­ It is low in speed of Access ( It has 1 Transistor & 1 Capacitor)
­ It requires many number of times to refresh the system

a
Market Availability of RAM :
1) SIMM - Single Inline memory module

ad
­ It has 30 or 72 pins
­ It supports 16 & 32 bit data transfer Rates
2) DIMM ­ Dual Inline Memory Module.
­ It has 168 pins
­ It supports 64 Bit data transfer Rate
:K
Ex: DDR 1, 2, 3 ( DDR = Double Data Rate), DDR 3 is the fastest RAM
Note : Above are the important CPU components on mother boards.
 Read Only Memory (ROM) :
nt
­ It is non volatile memory and permanent memory.
­ It cannot be erased. It is read only memory but not write to it.
* TYPES of ROM :
oi

i) PROM : Programmable ROM (It is Empty chip to add any program to it)
ii) EPROM : Erasable Programmable ROM
iii) EEPROM : Electrically Erasable Programmable ROM
P

 PORTS :
* MIDI PORT : Musical Instruments digital input
ng

­ These ports present on CPU front or Back side


­ These ports are used to connect speakers, MIC, Head Sets.
Parallel Port :
­ These ports present on Backside of the CPU
ni

­ These ports are used to connect printers & Scanners in previous days & now also
* USB Port : Universal Serial Bus.
­ This port is to connect all external devices with the cable
r

­ Now pendrives & data cables are connected to this port only.
Tu

 Hard Disk :
­ The storage point of computer is the hard disk
­ It stores operating system, softwares & Data etc.
­ Memory varies from GB's to TB's in size for Hard disk capacity.
Note: System requires more memory to save voice, graphics, images when compared to text data.

8 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
TYPES OF MEMORY & DEVICES

Memory

Main (primary) Secondary Cache


memory memory memory
 
RAM CD'S

pa
DVD'S
memory cards
floppy disks

a
i) Primary Memory :
­ It is system's main memory called RAM

ad
­ It is the memory used only for processing data not for storing the data
­ It is temporary & volatile memory or Internal memory.
ii) Cache memory :
­ The fastest memory in computer & it is volatile
­ It holds the previous instructions of computer
­ These chips are very costly.
:K
iii) Secondary memory :
­ The memory which is stored for further or future use is secondary memory.
nt
­ The memory is non ­ volatile but it can be mainpulated ( changed)
­ It is also called Auxillary memory or External memory.
­ Examples of secondary storage devices
oi

­ CD'S , floppy disks


­ DVD'S, memory cards
­ Flash cards & magnetic Tapes
P

Secondary Storage Devices


ng

Optical storage Magnetic storage


 
CD, DVD Harddisk, floppy disk
ni

Bluray Disc Magnetic Tapes.


­ We will study one by one clearly.
* Floppy Disk :
r

­ It is a magnetic storage component


Tu

1 1
­ Its size varies in length of 3 , 5 , 8 inch disks
2 4

1
­ The memory size of 3 inch floppy disk is 1.44 MB
2
­ The memory deleted from floppy disk cannot be retained back from computer.
9 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
* CD : Compact Disc.
­ Its memory capacity is 700 MB
­ Invented by James Russel in 1965
­ It is written or read by laser beam of light
* DVD : Digital versatile disc
­ Its memory size is 4.7 GB
* Bluray Disc : 25 GB & 50 GB memory disks are called Bluray discs
­ Bluray Discs are used to store high definition quality videos only.

pa
ACRONYMS PRESENT ON CD & DVD'S
i) ROM - Read Only Memory, we cannot write data to it. (built in Soft Ware Disc)
ii) R - Recordable - Write once, Read many times (WORM), cannot Rewrite data to this disc.

a
iii) RW - Re write data for many times & we can delete data many times.

ad
* Magnetic Tapes :
­ These are magnetic storage medium components
­ These follows sequential access medium principle
­ Every time we have to read data from beginning Part only, no skipping.
Ex: Cinema Reels in olden days. :K
* Disk formating : Formation of Tracks and sectors on any disk is called Disk formating
­ UDF : Universal Disk Format (FAT / NTFS)
­ Clusters on disk holds the data.
4) Flash devices / Flash memory :
nt
­ The devices like digital camera, ipods are connected through cables to access their memory in computers
­ These type of devices are flash devices & has non ­ volatile memory.
­ Memory accessed through cables is called flash memory
oi

5) Virtual memory :
When ever the RAM memory is not sufficient to hold the processing data, it uses hard disk memory as
P

hidden memory to process the specific task. So the memory utilised from hard disk is called virtual memory.
­ virtual memory is present in hard disk.
Example : When installing operating system (3.2 GB) , if the RAM is 2GB size, it uses hard disk during
ng

Installation process only.


Memory Cards : memory cards are used in digital cameras, mobile phones etc.
­ SD cards are used in all these devices
­ Here SD stands for secure digital memory cards (SDMC, SDHC)
ni

Note : With this we complete the types of memory & devices of different types.
CPU Processing units :
r

ALU
Tu


INPUT  CU  OUTPUT

MU
CPU mainly divided its processing into ALU, CU & MU
10 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
i) ALU : Arithmetic and Logic Unit
­ It performs all the arithmetic & Logical processing of CPU
­ The registers are present in ALU, that holds very small memory & performs Simple math operations
* Accumulator : It holds the processing data & output result to display
* Program counter : It holds the next instruction that has to be performed by ALU or Registers
* Data Register : It holds the complete data on the hard disk while Processing.
ii) CU : Control Unit

pa
­ The Control unit controls & Coordinates all the parts of computers (system components)
­ Control pins are present and that controls all the components of computer.
iii) MU : Memory Unit
­ It contains RAM, ROM, Hard Disk ( already explained)

a
LANGUAGES AND SPECIFICATION

ad
* FORTRAN
- Formula Translation (1957)
­ Coding used for scientific research / Calculations
* COBOL
­ Common Business Oriented Language (1957)
­ Used in business computations
:K
* ALGOL : Algorithmic Language
­ The language that given a scope for developing the C, C++ & Java languages
* HTML : Hyper Text Markup Language.
nt
­ The web pages are saved or viewed in HTML format only
* JAVA : Applets can be created by this language.
­ The language used for webpage creation, websites hosting
oi

­ developed by sun micro systems, invented by James Gosling & his Team
* C++
P

­ The computer games (Basic) were developed using this language, invented by Bjarne Stroustrup (1983)
* XML : eXtended Markup Language (world wide web consortium)
* PHP : Personal Home Page. ( Designed by Rasmus Lerdorf ­ 1995)
ng

*C
­ Invented by Dennis MacAlistair Ritchie in 1972
­ This language coding replaced by Java now
­ Printf takes the output statements in code
ni

­ Scanf takes input data in code


* SQL
r

­ Structured Query Language.


­ Used for database tables creation
Tu

* .NET
­ The language came in recent days for programming (web designing)
Note : The computers cannot understand any of the above languages, it needs only machine language or Binary
code to understand.
­ Binary code means 0's & 1's
11 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Programming Language Translators :
­ Computer can understand only binary code / machine code
­ So, we are writing our program in Java, C & C ++ or Assembly language, so to convert this code in to
Binary code we need translator.
Translator : The translator converts the given code in to machine code or binary code.

Assembly language 

pa
Assembler

Binary / machine code

a

High level languages  Interpreter / Compiler

ad
Fig : Translators of Languages.
i) Assembler :
­ It converts the Assembly Language code into machine code
ii) Interpreter : :K
­ It Compiles the program code line by line & checks for errors
­ It consumes more time because it checks code line by line
iii) Compiler :
­ It compiles the entire program code in a single time for errors
nt
­ It is a time saving translator.
­ It cannot execute the programs but converts source code into object code
Terms Related to Programming Language :
oi

i) Instruction : Any single text given to computer is called instruction


Ex : 0 or 1
ii) Program : The combination of 'n' number of instructions is called a program.
P

* Set of Programs are also called as softwares


iii) Algorithm : The step by step instructions of a program written in sequence order is called algorithm
Ex: Sum of 2 numbers.
ng

Step 1 : start
Step 2 : Take a,b,c
Step 3 : Calculate C = a + b
ni

Step 4 : Print C
Step 5 : Stop
iv) Flow chart :
r

The graphical (pictorial) representation of the pseudocode or algorithm are called flowchart
Symbols used in flowchart
Tu

 - Flow Direction (Arrow mark)


­ Start / stop (Ellipse)
­ Input / output ( parallelogram)  connector to next page (circle)
­ Processing data (Rectangle)
­ Decission making ( Rhombus)
12 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Different types of Languages :
i) Low level Languages : Machine understandable languages
Ex : Assembly Language, COBOL, PASCAL, BASIC.
ii) High level Languages : Human understandable languages
Ex : C++, Java, SQL, VB.
­ Assembly Languages uses MNEMONICS as code in symbols.
* C language is High level Language with some features of low level language.

pa
Important terms
* Control structures : The Conditions and Loops written in source code
* Reserved Words : The words that are kept aside for its use by programming language.
* Bug : It is also called error ( mistake in program code) or Glitch.

a
* Testing : Finding errors in the software.
* Debugging : The process of correcting the errors in the software code.

ad
* Platform : The combination of operating system and processor is called platform
Example : Apple macintosh & PC'S are 2 different platforms
* Patch : The vendor ­ created programs that are available through Internet to repair software is called patch.
:K
* API'S : Application program Interfaces are the small program codes that are present in the operating system
* Executing : The process of carrying out commands is called executing
Types of Errors
i) Logical errors :
­ The fault in the logic of program code causes to get wrong outputs / Results.
nt
­ In this case program is executed to get result
Ex: Correct logic  C = A + B ;
Mistake logic  A = C + B ;
oi

* We get output for A in place of C due to logical error


ii) Syntax Errors :
P

­ The fault / mistake in the syntax (structure) of the program code cause failure to execute it
­ In this case program is not executed
Ex: Missing of semicolons in the code
ng

Correct syntax  C = A + B ;
Mistake syntax  A = C + B
* We will not get output
* A functional Language reflects the way people think in mathematical way.
ni

* A programming Language consists of set of Rules & Syntax and structure.


It is the Intermediate between human language and machine language
r

SDHC : Secure digital high capacity


Tu

SDMC : Secure digital memory cards

13 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
LOGIC GATES : These are the basic building blocks of IC'S (Imp)
­ We have 3 Logic gates mainly as AND, OR, NOT.
- A digital circuit result in output based on states of input signals
AND  All input must be in '1', to produce '1' as output
OR  Any one input or more is '1' to produce '1' as output
NOT  It is also called inverter
 It has only one input one output

pa
If input is '1', the output is '0', viceversa
NOR  Any one input or more is '1' to produce '0' as output
NAND  All input must be in '1', to produce '0' as output
XOR  If any one input is '1' , but not if 2 or more input are '1', the out put is '1'

a
Memory Measurement :
* Memory in computer is measured in Bits

ad
Bit  Binary digit ( either 0 or 1)
4 Bits  Nibble
8 Bits  1 Byte
1 Kilobyte  1024 bytes  103  210 Bytes
Megabyte  1024 KB  1 million Bytes  106  220 Bytes
:K
Giga byte  1024 MB  1 Billion Bytes  109  230 Bytes
Terabyte  1024 GB  1 Trillion Bytes  1012  240 Bytes
nt
Peta Byte  1024 TB  1015  250 Bytes  1 Quadrillion Bytes
* Exabyte, Zettabyte, Yottabyte are the next higher measurement
oi

1 character ( ASCII)
1 Byte 256 numeric values ( 0 to 255)
P

KBPS  Kilobytes per second


Kbps  Kilo bits per second
" Always 'B' represents Byte, 'b' represents bit
ng

Portable platform : The program written in any or language can be run on portable platform.
Booting : The process of loading operating system from disk to RAM is called Booting
­ Without booting, computer cannot perform any task
i) Warm booting : The process of restarting / turning on the computer, which is under on / working
ni

position
ii) Cool Booting : The process of starting / turning on the system which is under off position
r

* Sequence of operations in Booting :


Load BIOS  Perform POST  Load operating System  Check configurations settings
Tu

Here i) POST  Power on self test


 Checks whether all CPU components are connected in proper way or not.
 POST performed by BIOS only..
Note : C language is high level language with some features of low level language.

14 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
SOFTWARES
SOFTWARE : The set of programs written by programmers to perform some specific tasks is called software
­ Software is a set of programs.

Types of Softwares

System Application Utility

pa
software software software
  
Operating Spread sheet s/w Disk Backup s/w
system Word processors s/w Disk Restore s/w

a
Graphics presentation s/w Disk Checkup s/w

ad
Database management s/w Disk Format s/w
Antivirus s/w
i) System Software :-
­ The software which performs various types of functions in order to manage & organise files of computer
­ It is mandatory software to run a computer. :K
* Operating system is the system software and supervisor of computer functions
­ It creates interface between user and computer
Examples of operating system : i) Windows
ii) LINUX
nt
iii) MS­DOS
iv) SOLARIES
v) Apple Macintosh
oi

vi) Mobile phone operating systems


i) Windows Operating System :
P

­ Introduced in 1985 by microsoft corporation. It supports GUI (Graphical User Interface) mode.
­ It is not a free operating system ( Commercial Software), supports multi tasking
­ Windows 95, 98, ME, XP, 7, Server, 8, vista are few examples
ng

ii) LINUX Operating System :


­ It is a free operating system
­ It is a multi ­ user operating system, supports multiprogramming (time sharing)
­ It was introduced in 3rd Generation
ni

iii) MS - DOS :
­ DOS stands for disk operating system DOS Commands
r

­ It is command driven operating system ls ­ list of directories


­ It is single user operating system mkdir ­ make new directory
Tu

­ Directories are storage files.


* Directory within (Root) Directory is sub directory
Ex: Main (D Drive)  Songs
 
Root Directory Sub Directory
15 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Examples for few DOS Files :
 . exe ­ Executable files
 . com ­ Command files
 . Bat ­ Batch Files
 . Prg ­ Program files
 . Sys ­ System files
iv) Apple macintosh :

pa
­ This operating system is only for Apple Products.
­ Steve jobs is the founder.
v) Mobile Phone o/s :
Ex : Bada, Symbion, Android, Windows 8, IOS (Inter Networking Operating System for Apple Phones)

a
­ Smartphones uses this operating system for Google Applications
Functions of Operating System :

ad
* Memory Management
* User Interface
* Input / output management
* Information Management
* Process Management
Classification of operating System :
:K
i) Multi - User o/s : It allows 2 or more users to run the programs at the same time.
Ex: UNIX / LINUX
nt
ii) Multi Tasking o/s : It allows more than one program to run concurrently
Ex : UNIX, WINDOWS ( Few versions)
* Example of multitasking : Surfing Internet & Listen to Songs at a time
oi

iii) Multi Processing : It supports running a program on more than one CPU or processor
iv) Multi threading : It supports different parts of a single program to run concurrently on system.
P

2) Application Software :
­ These are the end ­ user programs that do real work for users.
ng

­ It cannot run without system software


­ These are created for user convenience only
Examples :
Word Processor s/w  MS Word, words star, softword, word perfect
ni

Graphics Presentation s/w  MS Power point, Corel Idraw, Flash


Spread sheet s/w  MS Excel.
Database Managment s/w  MS Access.
r

* System software and Application software are two basic types of softwares
Tu

Syntax : Set of Rules in programming Language

FAT : File Allocation Table


NTFS : New Technology File System

16 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
3) Utility Softwares :
­ These are the soft wares that maintain & check for health of computer by scanning and managing data
­ These softwares performs a single & specific task
Examples :
i) Disk Backup s/w  creates backup of system files & data
ii) Disk Restore s/w  Restores the backup files to system from backup image
iii) Disk checkup s/w  It checks the data of disk
iv) disk format s/w  Formation of tracks and sectors on disk

pa
v) Antivirus s/w  It detects & deletes the virus in system

4) Firmware :

a
­ The hardware chip that is having storage of software is called firmware
Ex : BIOS operating system is stored on BIOS chip.

ad
5) Embedded Software :
­ The software that is used for specific devices such as car, TV, Washing Machine & Watch etc.
is called Embedded Software
Availability of Software in Market :
a) Commercial Software :
:K
­ The pre­packaged software available for money in the market
­ It is not free, we have to buy from market
Example : Windows, MS ­ Office
nt
b) Open - source Software :
­ It is also called free ware
­ It is available at free of cost in Internet or open market
oi

Example : Winzip and LINUX.


c) Share ware s/w :
­ The trial version of software that is available for users to share in the market and internet at free of cost.
P

­ The trial versions are released for promotion of the product only.
Ex: PDF converters online.
ng

d) Proprietary s/w : It is a custom s/w, developed to address the specific needs of a company is known as
proprietary s/w
­ Softwares with copy rights protected are called proprietary
Device Drivers : The special and specific programs written to perform task by specific devices only.
ni

Example : Printer drivers


Webcam drivers
Scanner drivers
r

* Windows ME : In this, ME stands for Millenium Edition


Tu

* Crash : When your computer stops working suddenly without any instruction, this is called crash.
­ Backup prevents data from system failure or crash
* Backup : It creates a restore point for all the system files and data
­ It creates a separate copy of system data base
IBM introduced personal computer in 1981

17 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
DESKTOP
Hibernate Mode : The highest power saving mode when compared to sleep mode.
Sleep / Standby Mode : The power saving mode of computer
­ The files under process are not disturbed in this sleep mode.
GUI :  Graphical user Interface
 It creates Icons for applications, which we are able to see on the desktop.
 Desktop Icons are due to GUI Only
Recycle Bin : When ever we delete some files using delete command, the file will reach Recycle Bin

pa
­ If we want delete directly, without moving to Recycle Bin, we have to press ' Shift + Delete" Command
Rename Icon :
­ To Rename the Icon we have to select Icon and Press F2

a
­ Other wise, select Icon & Press Right button of mouse and select Rename option
Help Menu :

ad
­ Help is a command available in start menu
Desktop : The home screen of computer which displays Icons on it for user applications
Cursor : The blinking Indicator that show you where your next action will happen.
­ This is the Insertion pointer.
Prompt & Dialogue Box :
:K
­ A symbol or question on the screen that prompts you to take an action and tell the computer
what to do next
Example : Do you want to save ? Yes/No
nt
­ It mainly appears due to human / user actions only
Interrupt : The instruction or unique signal generated by a device, that tells the operating system that it is in
need of immediate attention is called Interrupt.
oi

Ex: During drivers Installation, It asks for to press " Next" to continue.
Windows Explorer :
­ First, it is different from Internet Explorer
P

­ Windows Explorer is a file manager, where as Internet Explorer is a web browser.


* It displays the computer data in folder wise format
ng

Example : + Local Disc D


+ Songs.
BILLA
Here + Symbol Indicates that folder contains some sub folders
ni

Window : The Rectangular area on screen that displays a program, text or information is called window.
Speech Recognition Software : This software is used to take voice input where hands are not used to
give input to the computer.
r

RFID : Radio Frequency Identification


Tu

­ It is the technology that detects the humans / animals location in forest / any where by tracking system
­ RFID Devices are inserted in to human / animals body's
Screen saver : It configured correctly, the screen saver will prevent interaction with your computer
after a specified time period.
Interface : The remote control that is used to turn on or off some machine is also called Interface.

18 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
12. The contents of _____ are lost when the computer
IMPORTANT QUESTIONS ON BASICS
turns off.
01. DOS stands for what? 1) Output 2) ROM
1) Dynamic operating system 3) Input 4) Memory
2) Disk operating system 13. The frequently used instructions of a computer
3) Default operating system are fetched from?
4) Disk originating system 1) Cache memory 2) Hard disk
02. What was the last version of MS­DOS that 3) Registers 4) RAM

pa
recently released (stand alone version)? 14. Which of the following is microprocessor based
1) 6.11 2) 6.22 device?
3) 6.0 4) 6.33 1) Server 2) Personal computer
03. In MS­DOS , MD command used for what? 3) Super computer 4) Mainframe

a
1) Move directory 2) Create directory 15. The common pointing input device?
3) Make folder 4) All of these

ad
1) Trackball 2) Touchpad
04. Which of the following is best tool for fixing 3) Mouse 4) Keyboard
errors on disk? 16. External devices such as printer, scanner and
1) CHKDSK 2) SCANDISK keyboard are called?

05.
3) CHKDKS 4) FDISK
Which command used for setting name to a
DISK in DOS?
:K 1) Add on devices
3) Peripherals
2) Expansion slots
4) All of these
17. Which of the following is not hardware?
1) DISKLABEL 2) NAMELABEL 1) Compiler 2) Monitor
3) LABEL 4) NLABEL 3) Light pen 4) Joystick
06. Which computer memory used for storing 18. Storage that remains after the power is turned
nt
currently processing data? off is referred to as?
1) ROM 2) Internal memory 1) RAM 2) ROM
3) Non­volatile memory 4) CD 3) Non­volatile memory 4) Both 2 & 3
oi

07. The detailed description of the program cycle, 19. Which of the below is first electronic computer?
and program along with the result in printout 1) EDSAC 2) Abacus
form is called ?
P

3) ENIAC 4) UNIVAC
1) Report 2) Output 20. The difference between memory and storage
3) Folder 4) Documentation is, that memory is____ and storage is ___?
08. The term used to describe the instructions that
ng

1) Permanent, Temporary
tell the computer what to do is called? 2) Temporary, Permanent
1) Software 2) Storage 3) Slow, fast
3) Input 4) Output 4) Fast, slow
ni

09. The action taken on data to get information? 21. What is the permanent memory built into
1) Compiling 2) Terminating computer?
3) Processing 4) Changing 1) ROM 2) RAM
r

10. What kind of computer you find in digital watch? 3) Hard disk 4) CPU
1) Mainframes 22. COMPUTER wor d derived from which
Tu

2) Embedded computer language?


3) Notebook 1) Greek 2) Latin
4) Super computer 3) Spain 4) English
11. Which is not a basic function of computer? 23. The large size computers were in which
1) Copy text 2) Accept Input generation?
3) Process data 4) Store data
19 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
1) 1G 2) 2G 1) Page up 2) Enter
3) 3G 4) 4G 3) Begin 4) Home
24. The Complete processing in computer done at? 36. Which key is used in combination with other key
1) RAM 2) ROM to perform some function?
3) Monitor 4) CPU 1) Ctrl 2) Shift
25. Which of the following are software types? 3) Alt 4) All of these
1) System software 2) Application software 37. Which of the below is special device for playing
3) Utility software 4) All of these games in computer ?

pa
26. RAM is a type of which memory? 1) Mouse 2) Keyboard
1) Volatile 2) Temporary 3) Joystick 4) Light pen
3) Primary 4) All of these 38. Alt, Ctrl, Shift are called which type of keys?
27. Printed copy is often called as? 1) Modifier 2) Function

a
1) Hard copy 2) Soft copy 3) Adjustment 4) Numeric
3) Blank copy 4) Text copy 39. Which keys are used to restart the computer

ad
28. Which of the following is collection of facts with keyboard?
which are not in sequence? 1) Del+Ctrl 2) Alt+ Ctrl+ Shift
1) File 2) Record 3) Alt+ Ctrl+ Del 4) All of these

29.
3) Data 4) Information
Which device is used to send information into
computer?
:K
40. Which of the following is a multidirectional and
pointing device?
1) Keyboard 2) Mouse
1) CPU 2) Input devices 3) Joystick 4) Light pen
3) Output devices 4) Memory devices
30. Which of the following are direct entry input 41. Visual/video display unit is example of ?
nt
devices? 1) Input device 2) Output device
1) Barcode reader 2) Light pen 3) Both 1 & 2 4) All of these
3) Mouse 4) Optical scanner 42. FAX is a ?
oi

5) All of these 1) Input device 2) Output device


31. Which of the following is required when more 3) Both 1 & 2 4) We can’t say
than person uses Central server at a time? 43. In which of the printer, embossed steel band used
P

1) Light pen 2) Terminal for printing letters on paper?


3) Mouse 4) Keyboard 1) Band printer 2) Chain printer
32. An input/output device at which data enters or 3) Laser printer 4) Dot matrix
ng

leaves a computer system is? 44. The display size of a monitor is measured in
1) Printer 2) Mouse which direction?
3) Terminal 4) Keyboard 1) Horizontally 2) Vertically
ni

33. Multiuser systems provided cost savings by 3) Diagonally 4) Zigzag


connecting many of— to the CPU? 5) All of these
1) PC’s 2) Dumb terminal 45. A Dot on Monitor screen is called?
r

3) Main frames 4) Super computers 1) Ink 2) Pixel


34. POS stands for? 3) Dpi 4) All of these
Tu

1) Paid on sale 2) Post on speed 46. Which of the following used for displaying
3) Point of sale 4) Place of sale information in public places?
35. To move cursor to the beginning of line in text, 1) Monitors 2) Overhead projectors
which key we press? 3) Both of 1 & 2 4) Kiosk

20 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
47. Which of the following is bidirectional printer? 58. Which of following is process of dividing disk
1) Laser 2) Inkjet into tracks and sectors?
3) Daisywheel 4) Dot­matrix 1) Tracking 2) Sectoring
48. Which of the below printer cannot be used for 3) Allotting 4) Formatting
graphics printing? 59. What is the memory size of 3.5 inch floppy disk?
1) Inkjet 2) Daisywheel 1) 1.8 MB 2) 1.4 MB
3) Laser 4) All of these 3) 2.4 MB 4) 4.7 GB
5) None of these 60. Which of the following is not valid size of floppy

pa
49. Which of the following is not output device? disk?
1) VDT 2) VDU 1) 3.5 inch 2) 8 inch
3) CRT 4) LCD 3) 5.25 inch 4) 5.5 inch
5) None of these 61. Computers use which number system to store

a
50. Clarity of screen is measured in ? data and perform calculations?
1) Rotation 2) Reflection 1) Binary 2) Octal

ad
3) Resolution 4) Refraction 3) Decimal 4) Hexa decimal
51. In ALU, Which of the following performs 62. Keystroke is using which code to convert into
arithmetic calculations? the corresponding bits?

52.
1) Pins
3) RAM
2) Registers
4) ROM
Which of the following software satisfy who
:K
63.
1) ASCII Code
3) EBCDIC
2) ANSI Code
4) ISO
What is the value for binary number 1001000?
can’t use their hands for computer input? 1) 24 2) 62
1) Video conferencing 3) 72 4) 84
2) Speech recognition 64. What is total count that we can get with 8bits?
nt
3) Digitizer 1) 255 2) 256
4) Pinner 3) 32 4) 72
53. Which of the following is Primary storage 65. What is the last value that we can get with 8bits?
oi

device? 1) 255 2) 256


1) RAM 2) CD 3) 32 4) 72
3) DVD 4) All of these 66. If we convert 72 into different number systems,
P

54. Which of the following is magnetic storage which will get highest number of digits in it?
device? 1) Binary 2) Octal
1) Magnetic tape 2) Hard disk 3) Decimal 4) Hexa decimal
ng

3) Magnetic drums 4) All of these 67. Which of the following device acts as both input
55. The main directory of a disk is? and output devices?
1) Root directory 2) Sub directory 1) FAX 2) MODEM
ni

3) Folder 4) Mini directory 3) Digital camera 4) All of these


56. HDD is full form of? 68. The terminal (device) which contains only
1) High disk drive 2) Hard disk drive keyboard and screen without processing unit is
r

3) Hard digital disk 4) High digital disk called?


57. UDF stands for? 1) Active terminal 2) Dumb terminal
Tu

1) Universal disk format 3) Computer 4) Screen


2) Universal data format 69. What are chief components of 3G computers?
3) Updated disk format 1) LSI 2) IC’s
4) All of these 3) Transistors 4) All of these

21 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
70. Which of the following is sequential access medium 83. The common type of storage devices in computer
device? are?
1) CD 2) DVD 1) optical 2) Magnetic
3) Magnetic tape 4) All of these 3) Flash 4) Cache
71. Which metal is used in processors? 84. Which of the following has the smallest storage
1) Lithium 2) Silicon capacity?
3) Gold 4) Platinum 1) CD 2) DVD
72. In control unit, what are the functioning elements 3) Floppy disk 4) Pen drive

pa
to control system components? 85. Which of the following is single user operating
1) Registers 2) Control pins system?
3) CU 4) Controllers 1) LINUX 2) UNIX
73. CPU can directly understand which language? 3) Windows 4) DOS

a
1) JAVA 2) C+++ 86. In flowchart Rectangle represents which
3) SQL 4) Assembly function?

ad
74. Which language directly understood by 1) Input 2) Processing
computer? 3) Decision 4) Output
1) High level 2) Machine 87. To make a notebook as desktop model , the note
3) Low level 4) Middle level
75. Which of the following is used for scientific
calculations?
:K can be connected to a ___which is connected
to a Monitor another devices.
1) Bay 2) Bus
1) FORTRAN 2) COBOL 3) Docking station 4) Network
3) SQL 4) ALGOL 88. Gigabyte is the 2 to the power of ?
76. The process of finding errors is called____? 1) 10 2) 20
nt
1) Testing 2) Debugging 3) 30 4) 40
3) Translation 4) Conversion 89. Information on mother board components
77. The process of rectifying errors is called___ ? travelled through?
oi

1) Testing 2) Debugging 1) Bays 2) Buses


3) Translation 4) Correction 3) Wires 4) RAM
78. One million bytes is equal to? 90. Binary code will have how many choice?
P

1) Kilobyte 2) Megabyte 1) 0 2) 1
3) Gigabyte 4) Terabyte 3) 2 4) 3
79. One trillion bytes is equals to ? 91. Restarting computer which is running is called ?
ng

1) Kilobyte 2) Megabyte 1) Cool booting 2) Warm booting


3) Gigabyte 4) Terabyte 3) Both of these 4) Buses
80. The machine cycle includes which functions? 92. VGA is full form for?
ni

1) Fetch 2) Decode 1) Video Graphic Array


3) Execute 4) Store 2) Visual Graphic Array
5) All of these 3) Video Graph Application
r

81. The simultaneous performance of two or more 4) All of these


tasks in single CPU? 93. In MICR, First 3 digits of code represents?
Tu

1) Multitasking 2) Multiprogramming 1) City code 2) Bank code


3) Multi processing 4) All of these 3) Branch code 4) All of these
82. Reusable optical storage will typically have the 94. Who is the inventor of C Language?
acronym? 1) Charles babbage 2) Dennis Ritchew
1) CD 2) DVD 3) Blaise Pascal 4) All of these
3) RAM 4) RW
22 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
95. Widows operating introduced in which year? 1) Logic gates 2) Basic gates
1) 1965 2) 1975 3) Dupli gates 4) All of these
3) 1985 4) 1995 108. Which of the following are Logic gates?
96. In Kbps, b stands for what? 1) AND 2) OR
1) Byte 2) Bit 3) NOT 4) All of these
3) Any of these 4) Both of these 109. Which of the following is bidirectional bus on
97. Who’s idea was to introduce storage capacity mother board?
in computers at earlier stages? 1) Address bus 2) Data bus

pa
1) Eckert 2) Von Neumann 3) Logic bus 4) Gate bus
3) Mauchley 4) Dennis ritchew 110. APPLE Macintosh and Desktop PC are two
98. Which of the below item performs POST? types of _____
1) RAM 2) HD

a
1) Platforms 2) Processors only
3) BIOS 4) CD 3) OS only 4) Gates
99. CRAY 1 is which type of computer?

ad
111. The vendor created program available for free
1) Super 2) Mainframe are called?
3) Mini 4) Micro 1) Repair 2) Patch
100. Virtual memory is present in? 3) Resource 4) Puncter

101.
1) CD
3) Hard disk
2) DVD
4) RAM
Which of the following code maintains Order in
:K
112. The property of Desktop icons to open a new
window or application is due to ?
1) Software 2) GUI
PRINTING devices? 3) Network 4) All of these
1) Binary code 2) Spooler 113. The unique signal generated by any device, that
3) Phisher 4) Pins
nt
it is need of immediate action is called?
102. Which protocol provides INTERNET connection 1) Event 2) Prompt
for keypad(small) mobile phones? 3) Interrupt 4) Signal
1) TCP 2) IP 114. In windows explorer, the + Symbol before the
oi

3) HTTP 4) WAP folder indicates that, it has ____?


103. Which of the following are forms of RAM in 1) Commands 2) Events
market?
P

3) Sub directory 4) Sub folders


1) SIMM 2) DIMM 115. Graphics presentation software’s are which type
3) Both 1 & 2 4) MIMM of software?
104. Which of the following in Register holds next
ng

1) System software 2) Application software


instruction of Accumulator or ALU? 3) Utility software 4) Embedded software
1) ROM 2) RAM 116. To rename a folder on desktop, which function
3) Program counter 4) All of these key is used ?
ni

105. Which of the following translator compiles the 1) F1 2) F2


source code line by line? 3) F3 4) F4
1) Compiler 2) Interpreter 117. The pictorial representation of algorithm called?
r

3) Assembler 4) All of these 1) Algorithm 2) Source code


106. Which type of error does not allow source code
Tu

3) Flowchart 4) All of these


to produce output? 118. In flowchart, CIRCLE indicates which function?
1) Logical 2) Syntax 1) Flow of data 2) Input data
3) Both 4) Any of these 3) Connector 4) Processing
107. What are the basic building blocks of registers
in CPU?

23 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
119. Which of the programming code used in 131. Which of the following is Non­impact printer?
COMPUTER GAMES Development from early 1) Inkjet 2) Laser
days? 3) Thermal 4) All of these
1) C 2) C++ 132. Intel Pentium is a________?
3) JAVA 4) NET 1) Operating system 2) RAM
120. Which of the following technology used in 5G 3) ROM 4) Processor
computers? 133. Who designed the first electronic computer
1) Artificial Intelligence 2) Nano science ENIAC?

pa
3) Robotics 4) All of these 1) van Neumann
121. The technology of sending rod like structures 2) Joseph m. jaquard
into human body for delegated operations is? 3) Charlessbabbage
1) Robotics 2) Laser 4) J.P. Eckert and J.W.Mauchly

a
3) Nano science 4) All of these 134. Who invented the C++ language?
122. Which of the following is freeware/open source 1) Bjarne stroustrup 2) Columbus

ad
operating system? 3) Dennis M.Ritchie 4) Karl marx
1) Windows 2) LINUX 135. The keystroke is converted to which code of
3) Macintosh 4) All of these standard bits?
123. Application Programming Interfaces are built in?
1) RAM 2) ROM
3) Operating system 4) Software
:K 1) ANSI
3) Binary
2) ASCII
4) All of these
136. The information stored in CD­ROM is in the
124. The software required for printer, scanner etc..to form of?
connecting to computer are called ? 1) Digital 2) Analog
1) Device drivers 2) Operating system 3) ANSI 4) Text
nt
3) Unknown Software 4) Free ware 137. Which technology is used in CD­ROM drive?
125. What is total number of choices given by 1) Mechanical 2) Optical
hexadecimal code ? 3) Laser 4) Density
oi

1) 2 2) 7 138. Which of the below company is leader in hard


3) 10 4) 16 disk manufacturing?
126. What will the maximum number( from 0 to 9) is 1) IBM 2) HP
P

present in Octal code numbering? 3) Segate 4) Samsung


1) 2 2) 7 139. Hard disk can have ______ heads.
3) 8 4) F 1) 1 2) 2
ng

127. 23A4 is example for which number system 3) 0 4) More than 2


representation ? 140. EEPROM stands for?
1) Binary 2) Octal 1) Electrically erasable Permanent Read Only
ni

3) Decimal 4) Hexadecimal Memory


128. What is the binary code for decimal number 72? 2) Electrically engaged Programmable Read
1) 1001000 2) 1011000 Only Memory
r

3) 1000100 4) 11001100 3) Erasable erasable Permanent Read Only


129. Which of the following is not a hexadecimal Memory
Tu

number? 4) Electrically erasable Programmable Read


1) A23F 2) A24G Only Memory
3) 2345 4) 453A 141. Memory unit is a part of ?
130. Barcode readers are used at _____ systems. 1) CU 2) ALU
1) PDS 2) PPS 3) CPU 4) Register
3) POS 4) PRS
24 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
142. Which of the following is only a readable cannot 1) Back­end storage 2) Secondary storage
be modified? 3) RAM 4) All of these
1) Floppy disk 2) CD­ROM 155. In MICR , C stands for what ?
3) Hard disk 4) All of these 1) Code 2) Computer
143. Which of the following is the memory unit for 3) Character 4) Control
analytical engine? 156. Which of the following device is virus free?
1) Counter wheels 2) RAM 1) CD 2) DVD
3) ROM 4) Hard disk 3) Floppy disk 4) None of these

pa
144. SMPS Converts ? 157. Resolution of laser printer is measured with?
1) DC to AC 2) AC to DC 1) LPI 2) CDM
3) RAM to ROM 4) All of these 3) MHz 4) DPSI
145. In MS­DOS , The primary hard disk has the 158. Speed of line printer is limited by the speed of ?

a
drive letter of? 1) Cartridge used 2) Current bills
1) C 2) A 3) Paper movements 4) All of these

ad
3) B 4) D 159. The OMR is able to evaluate only those
146. MOS stands for? documents which printed within___ position.
1) Method Organ System 1) Special 2) Marked
2) Metal Oxide Semiconductor
3) Mother Of System 4) Most
147. Which storage device is mounted on REELS?
:K 3) Magnified 4) Scanned
160. Which of the following input device used for
playing the video games in computer?
1) Hard disk 2) Floppy disk 1) Joystick 2) Track ball
3) Magnetic Tapes 4) CD 3) Mouse 4) Printer
148. Primary memory stores which of the following? 161. The keys of the keyboard are?
nt
1) Programs 2) Data 1) Alphanumeric keys 2) Functional keys
3) Result 4) All of these 3) Arrow keys 4) All of these
149. Data is stored in computer as? 162. The device that draws the pictures or diagrams
oi

1) Matter 2) CD’s under computer control is?


3) Data 4) Files 1) Printer 2) Light pen
150. Which of the below can easily carried in hand, 3) Plotter 4) All of these
P

and stores large amount of data? 163.Which of the following is a CRT?


1) Floppy 2) CD 1) Printer 2) Monitor
3) DVD 4) RAM 3) Scanner 4) Mouse
ng

151. Which of the following can store large amount of 164. TWAIN is related which of the following device?
data? 1) Scanner 2) Printer
1) DVD 2) Hard disk 3) MICR 4) Joystick
ni

3) CD 4) Processor 165. The light sensitive device that converts printed


152. Which of the following is temporary memory? text or other images into digital form is?
1) RAM 2) ROMM 1) Scanner 2) Printer
r

3) PROM 4) All of these 3) Mouse 4) MICR


153. Which of the following is a sequential access 166. Which of the following is not input device?
Tu

device? 1) MICR 2) VDU


1) Magnetic Tape 2) CD 3) Light pen 4) Keyboard
3) DVD 4) All of these 167. COMPARE is which type of function?
154. The supplement of the primary internal storage 1) Arithmetic 2) Functional
of a computer is? 3) Logical 4) All of these

25 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
168. What are the arithmetic functions of ALU? 174. What the chief components of 3rd generation
1) Add ,substract, move, Compare computers?
2) Divide, compare, multiply, add 1) VLSI 2) IC’S
3) Add, substract, multiply, compare 3) LSI 4) Vacuum tubes
4) Divide, multiply, add. Substract 175. Windows operating system introduced in which
169. Peripheral devices are : generation?
1) Apart of CPU 2) Only output devices 1) 1st 2) 2nd 3) 4th 4) 3rd
3) Input devices 4) Both 2 & 3 176. IBM 7030 belongs to which generation?

pa
170. Basic Parts of CPU are ? 1) 1ST 2) 3RD 3) 4TH 4) 2ND
1) ALU,RAM,ROM 2) ALU,CU,RAM 177. Processor speed is measured in terms of?
3) ALU,CU,MU 4) ALU,RAM,MU 1) Hertz 2) MHz
171. The first calculating device was? 3) GHz 4) All of these

a
1) Clock 2) ABACUS 178. Accumulator register holds which of the following
3) ENIAC 4) Calculator data?

ad
172. Who built the first mechanical calculator? 1) Result 2) Processing data
1) Blaisepascal 2) JAQUARD 3) Both of these 4) RAM
3) John maucheley 4) All of these 179. Which of the following will perform the POST
173. Punched cards were introduced by?
1) Jaquard
3) Charless
2) Pascal
4) Madhan
:K operation?
1) RAM 2) BIOS 3) CAD 4) HDD
180. Which of the following is impact printer?
1) Daisywheel 2) Dot­matrix
3) Chain printer 4) All of these
nt
Answers
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
2 2 2 2 3 2 4 1 3 2 1 4 1 2 3 3 1 2 3 2
oi

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
1 2 1 4 4 4 1 3 2 5 2 3 2 3 4 4 3 1 3 2
P

41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
2 3 1 3 2 3 4 2 5 3 2 2 1 4 1 2 1 4 2 4
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
ng

1 2 3 2 1 1 4 2 2 3 2 2 4 2 1 1 2 2 4 5
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
1 4 2 3 4 2 3 3 2 3 2 1 1 2 3 2 2 3 1 3
ni

101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
2 4 3 3 2 2 1 4 2 1 2 2 3 4 2 2 3 3 2 4
r

121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
Tu

1 2 3 1 4 2 4 1 2 3 4 4 4 1 1 1 2 3 4 4
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
3 2 1 2 1 2 3 4 4 3 2 1 1 2 3 4 4 3 2 1
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180
4 3 2 1 1 2 3 4 4 3 2 1 1 2 3 4 4 3 2 4
26 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
M.S. OFFICE
How to start MS Office Components :
Step 1 : Click on start button
Step 2 : Select All programs
Step 3 : Next click on MS office
Step 4 : Select the component you need as Word, Power point or Excel etc.,

pa
Before looking into M.S.Office components, we will see some basic concepts that related to M.S. Office
Instruction : The input data of any thing either '0' or '1' is called Instruction
Command : The predefined Instruction to the computer

a
Ex : Print
Menu : The command which shows you different choices

ad
Ex : File
­ The commands are used in menu's also.
File : The collection of related information stored and deal with it as a unit called file.

­ We have to press Ctrl + C command


:K
Copying : The process of taking a copy of the existing thing (may be text / file / folder etc.)

Editing : The process of making changes or correcting the existing document is called editing
Save : The process of saving a file with required name ( moving from RAM to Hard disk)
Save As : The process of saving the file with some other name
nt
­ It can be done when we need 2 or more copies for same file.
Clipboard : When ever we cut / copy the text, first it is placed / stored temporarily on clip board.
MICROSOFT WORD
oi

­ It is word processor and an application software


­ We have recent versions of M.S.Office 2003, 2007 and 2010 & 2013 which gives us the different options
in different way.
P

­ So, we see the M.S. Office 2003 which is the basic version & used widely.
* File Extension : The file extension is the dot extension created automatically when we create / save a file.
­ It shows identification for the type of file.
ng

­ In MS Word,  For 2003 Version  For 2007, 2010, 2013


 
.doc .doc x
ni

­ Always the file extension is followed after the file name with dot extension only
Ex: turningpoint.doc
r

Different bars present in M.S. Office:


i) Title Bar : The title or file name is displayed on the title bar
Tu

­ It has the options to minimize, maximize and close options.


­ It is present on top place of any window / Screen
­  minimize  It minimizes the current window but not closed.
+  maximize  It maximize the minimized windows. Minimized files are shown in taskbar
x  close  It closes the current application / window (exit)

27 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
ii) Taskbar : This bar present at the bottom of screen
­ It contains minimized applications & names
­ It has start menu option
­ The IST ( Time ) displayed at corner of taskbar
­ The volume control Icon present on taskbar only.
* The file name is displayed in title bar & task bar
iii) Menu Bar : The bar that shows different menus that are present in the applicaiton

pa
Ex : File, Edit, View etc.,
­ Menu gives the choice of commands / options to select
iv) Standard tool bar : The bar which has some standard tools . Such as open, save, print, send etc.
­ The buttons are placed in this bar

a
v) Format Tool bar : The bar which contains format text options is called format tool bar.
­ It contains buttons & options to change font style, font size & changing page styles etc.

ad
­ It contains options to perform on text of page
­ It contains alignment tools (Left, Right, Center alignment)
vi) Status Bar :
­ The Bar that is present just above the task bar :K
­ It shows the current page number, line number & text number.
* Text indicates all numbers, Alphabets, Special Symbols & Spaces etc.
vii) Ruler Bar : This bar helps in maintaining vertical Alignment
viii) Scroll Bar : This bar helps in moving the pages to up & down
nt
Now we will see the menu bar and its options clearly that, which are important. It is menu of M.S. Office
(Word) ­2003.
File Edit View Insert Format Tools Table
oi

      
New Cut Normal Break Font Word count Formula
P

Open (page break) hide gridlines


Save Copy Web layout Hyperlink Paragraph Protect/document
Save As Paste Print layout Diagram Background letter & mailing
ng

page setup Find Header & Date & Time Styles & Mail merge
footer formating Spelling & grammer
Print Replace Zoom Picture Change case Macro
File search Goto Full screen Drop Cap.
ni

Note : We will clearly see all the options / commands one by one in M.S. Word only
­ In M.S. Excel and M.S. power point we will see important & remaining commands.
r

Default Margins of M.S. Word Page :


M.S. Word 2003 MS Word - 2007
Tu

1 All sides are 1


1 inch In this case top &bottom
1 page 1 1 inch = 2.54 cm margin is 1 inch
­ In this case, Top & Bottom, left Left & Right margins
1 & Right margins are 1 inch only 1 is 1.25 inch
28 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
1) File menu : Alt + F is shortcut key
a) Open : This command is used to open an existing document / file
 ctrl + o is the shortcut key to open the existing document in the memory / storage
b) New : This command is used to open a new document
 ctrl + N is the short cut key
c) Save : To save the current document with required name
 ctrl + S is the shortcut key
d) Save As : To save the existing document with some other file name

pa
 F12 is the function key to get save as option / dialogue box
e) Page Setup: This command is used to change the page margins and page size.
 A4 size paper measurement  21.0 x 29.7 cm

a
f) Print Preview (Ctrl + F2) : This option is used to see the page how it appears after taking the print out
on paper.

ad
g) Print : This command is used for print dialogue box
 ctrl + p is the shortcut
h) Exit : This command is used to leave the current page / document
2) EDIT MENU : Alt + E is the shortcut key
:K
a) Undo : The undo operation performs the last actions to be taken back
 ctrl + z is the shortcut key
Ex: By mistake if you delete 2 paragraphs and not yet saved, you can use this Undo operation to
retrieve the paragraphs back
b) Redo : This command can only repeat the last undo action that performed.
nt

Ex: If we had deleted one word & after some time another word, if you press Redo it bring back
only single word.
 ctrl + y is the short cut key
oi

c) Cut : The command when pressed, after selecting some text, it is removed & copied to the clipboard
 Ctrl + x is the short cut key..
P

d) Copy : This command pressed after selecting some text it can only copy the same text but can not
delete the text
­ The text is copied to clipboard
ng

­ ctrl + c is the shortcut key


* If we want to select entire document to copy,
We have to press Ctrl = A  Select All, and next Ctrl + C  Copy
ni

e) Paste : This command pastes the selected text through cut or copy command
­ The data from clipboard is pasted here
­ Ctrl + V is the short cut key
r

f) Select All : To select all the contents of page / document we have to press Ctrl + A
Tu

g) Find : To find any specific word / Letter by giving some key words of that letter, we use find option
­ Ctrl + F is the short cut key
Ex: If we have " Computer Awareness" word in a page, if you press Ctrl + F and give just "Comp",
than press enter.
­ It displays all words starting with comp only.
Magnifier Range is from 10% to 500%
29 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
h) Goto : This command opts you to enter in to any page by just giving the page number
­ Ctrl + G is the shortcut key
Ex : Press Ctrl + G and enter '7' inspace provided, you will be directed to 7th page of document
i) Replace : This command is used to replace any word or letter with some other word / letter you want
to do.
 Ctrl + H is the shortcut key
Ex : If suppose, you have typed " Test' as "Tast" in all the pages of document

pa
­ If you want to correct all the pages with same word than press Replace and given from as Tast &
Change it to "Test", it changed for whole document.
3) View : Alt + V is the short cut key.
a) Normal Layout : In this layout graphic pictures cannot be displayed

a
­ Only text data is displayed.
b) Page layout : In this layout graphic pictures can be displayed.

ad
c) out line layout : In this layout rulers are provided to adjust page margins / sizes.
d) Tool bars : This is very important command under view menu
 To select whether to show / hide some standard tool bar, this option is needed.
e) Header & Footer : :K
Header : The content / title that has to be displayed on top of the all pages of a document is kept
with the help of Header
Ex: Title.
Footer : The content on Bottom side of page for all the pages of documents can be kept by using
nt
footer option
Ex : page number or date etc.,
f) Zoom : This option is used to increase / decrease the size of the document to clearly view the contents
oi

of page / file
­ With this option we can see all the pages of document in the single window by reducing zoom level to
minimum
P

­ 100% is the normal view of a print layout page.


­ 10% to 500% zoom is available in MS Word.
ng

4) Insert :
a) Break : By clicking on Break you can select page Break.
Page Break : To Break the 2 paragraphs or single page in to 2 pages to separate the content, we use
page break option.
ni

 By placing the cursor at division point on document press Ctrl + Enter or select Pagebreak
 Ctrl + Enter is short cut for Pagebreak
b) Picture : We can insert any picture from Gallery to word document by pressing on picture command
r

and selecting any picture / photo


Tu

c) We can insert Date & Time, Page numbers & Symbols by selecting from Insert menu.
5) Format :
­ This menu is used to change fonts, borders & styles.
­ This is very important menu for text formating ( called as powerful menu in MS Word)
a) Font : Ctrl + D is the short cut key
­ It is used to change font style, size and calligraph.
30 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
b) Paragraph : Here we can change the distance b/w words & lines & paragraphs.
c) Bullets & Numbering :

Ex :  , .
­ To highlite some points of the document, this option provides special bullets & numbers
, etc
d) Background : We can change the background clour of the document with this option.
e) Change case : After selecting the text, we can change the selected text in below styles types.
Ex : " Letter" is word selected

pa
* Upper case : All the text is converted into capital letter
Ex: LETTER
* Lower case : All the text is converted into small letters
Ex: letter

a
* Sentence Case : After every line ended with fullstop(.), the next letter becomes a capital letter
Ex : Letter sent. The people

ad
* Title case : The every first letter of the word in any line is converted into capital letter
Ex : Letter Sent. The People
f) Drop Cap : A drop cap is a large capital letter at the beginning of a text block that has the depth of two

6) Tools :
or more lines of regular text. :K
This menu is used to access spell check, macros, mail merge etc.
a) Spelling and Grammar :
­ F7 is the shortcut function key
nt
­ we can check the spelling mistakes in the document
b) Word Count :
­ We can count the number of words in specified line or page or paragraph
oi

c) Auto correct :
­ To auto correct the spelling mistakes & alignments in any paragraph we use this option.
d) Protect Document :
P

­ This provides the security to the document by creating an authentication password


­ Password restricts the access of unauthorized users to use the document
ng

e) Mail merge :
­ This option is useful to send same letter to different address or many people with different names
­ Here the content of letter is same
­ We can send same letter to many people with their address at a time
ni

f) Letter wizard :
­ This wizard tells us steps to creates a letter in step by step manner
­ Its like helping window to users to create a letter
r

g) Macro :
Tu

­ The specially created commands that can be used to perform some specific functions by users
itself
7) TABLE :
a) Insert table : We can create tables in MS Word document by selecting number of columns & Rows.
b) Hide Gridlines : To hide the lines & Show only content of table, this option is useful & used.

31 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
IMPORTANT TERMS IN MS WORD : KEY & TASKS.
i) Alt and Ctrl : These two command keys are used in combination with another key or with mouse
Ex : Ctrl + C used to copy the selected text.
ii) ESC : it is used to cancel selection in a menu
iii) Back space : Pressing this key deletes the character to the left of the cursor
iv) Delete : This key deletes the character to the right of the cursor.
v) To select entire paragraph, we have to press the mouse continuously for 4 times

pa
­ To select entire line, we have to press the mouse continuosly for 3 times
­ To select single word, we have to press the mouse 2 times, by placing cussor at that word only.
vi) In MS word ­ 2007 version, the print, save options are found in HOME menu, not in file menu
­ because there is no file menu in menu bar for version 2007.

a
vii) Vertical Alignment :
­ By using the Ruler Bar, we can justify the page with vertical alignment

ad
­ All the lines kept in uniform length vertically
viii)  .doc & .docx are default file extensions of 2003 & 2007 version but, Document1is the default file name
ix) Bold : To standout any word, we select the word / text and apply Bold style to it.
 ctrl + B is the shortcut key.. :K
x) Italic ( Ctrl + I) : To change the text into Italic font we need to select 'I' symbol on format tool bar
xi) Underline : To underline the text ( may be selected text)
 ctrl + U is the shortcut key..
xii) Home key : This command takes the cursor to the starting letter of the same line
nt
xiii) End key : This command takes the cursor to the last letter of the line
xiv) ctrl + End : This commands takes the cursor to the last letter of the whole document
xv) ctrl + Home : This commands takes the cursor to the first letter of the whole document
oi

xvi) The Red underline appeared automatically, indicates that the word not present in word dictionary.
MS - POWER POINT
 It is Graphics presentation software.
P

 Here we will see only important aspects regarding power point


Slides : The individual page in power point is called slide
ng

­ data representation is done through slides only


Template : It is a professionally designed empty document that can be adopted for user needs.
­ In these templates, with provided styles, we can manipulate the data.
Slide master : The house of all these predesigned templates of different styles
ni

Slide sorter : The seperate window structure, which shows all the slides and give us a chance to rearrange the
slides in required order.
File extension:
r

 .ppt & .pptx are default file extensions for MS­PPT of 2003 & 2007 respectively
Tu

 other extensions in powerpoint


Version - 2003 Version 2007, 2010, 2013
* PPS (Power Point Show) * PPSX ( Power Point Show)
* Pot ( Template) * POT X ( Template)
AMD is the Processor's Manufacturing Company

32 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Multimedia : The data having any type of text / image / audio/ motion picuture data is called multimedia.
 In powerpoint slides, we can insert multimedia contents.
New slide :  To get the new slide we have to select from file menu
 Ctrl + M is the shortcut key for new slide
Note, Handouts & Outlines : The small size slides in page that give idea of any special content to audience
 These look like Note points in corners
Default size of slide :

pa
3 inch  It is called 4 : 3 inch
4 inch
Fig : slide measurements

a
 ENTER key is pressed at end of every line in slide

ad
Graphics

Animation Transition

Applied to
 :K
Applied to slides
text in slides
 we can add audio files to the slides
i) Animations :
nt
 it is selected from custom animation menu
 There are 3 types of Animations : 1) Entrance 2) Emphasis 3) Exit
 Animation widely used for text with in a slide
oi

ii) Transitions :
 These graphics is applied between different slides that has to be appeared indifferent way
P

 Transition can not be applied to text in slide


Formats used in slides :
i) Audio File formats : . wav, . mp3
ng

ii) Video file format : . mpeg, .3gp


iii) Image file format : .bmp, . Jpeg,. tiff
Note : All these extensions are given at end of the book.
ni

Slide show : The full size / full screen view of the slides, without any menu bars and options
 It creates a full screen size slides
 We can select from view menu
r

 F5 is the shortcut key


 To get out from the slideshow, we have to press "ESC' Key
Tu

Hide Slide : To hide the unwanted slides in the slide show which are not to be deleted from power point file.
 This command present in slide show menu
AWT : Abstract Window Toolkit (provides frames in JAVA)
XBRL : eXtensible Business Reporting Language

33 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MS EXCEL
1.3
 MS Excel is a spreadsheet application Software
 The data representation is in the form of Rows and columns page 1.9 inch
 The data base stored here in the form of tables
Default Page margins
1.3
Left, Right margin  1.9 inch
2.5 inch
Top, Bottom margin  2.5 inch

pa
 here 1.3 inch, in top & bottom margin
is reserved for Header & Footer.
File Entensions :

a
 . xls is the default file extension for MS­Excel 2003 version
 .xlsx is the default file extension for MS­Excel 2007, 2010, 2013 versions

ad
 . xlsm (macro), xlsb (binary) are also file extensions here
Purpose of Spreadsheets :
 Effective tool used for creation of tables and to perform calculations

Important terms :
:K
 VBA applications are performed through these spreadsheets

* Cell : It is the basic unit of worksheet where text is entered. (Intersection of Row & Column).
* Worksheet : The combination of Rows & columns in a tabular form is called worksheet
* Work book : The combination of 2 or more worksheets is called a work book
nt
Gridlines : The lines that makes to form the Rows and columns are called Gridlines
Spreadsheet : It is a software tool that lets the users to enter, calculate & manipulate wath set of numbers
Active cell : The current cell / processing cell where the cursor placed is called Active cell
oi

­ Active cell content is displayed in formula bar.


Range of cell : The selection of more than 2 cells which are consecutive is called Range of cell
Cell Address : The coordinate points of column & Row of a cell is called cell Address
P

Ex: A4  A is column, 4 is Row


* We have to represent column number followed by Row number only.
ng

Row : The horizontal gridlines are formed as rows


­ Rows are numberd from 1 to 65536
­ 65536 is equal to (256)2
Column : The vertical gridlines are formed as columns
ni

­ Total we have 256 columns.


­ Columns are represented with Alphabets
­ Columns Series Starts from A to Z, AA to AZ, BA to BZ, CA to CZ ______ IA to IV only
r

­ IV is the last column in work sheet.


Tu

Formula : The sequence of values, Functions & arguments are used in formula to produce a new value from
existing values
Example: = Sum (A1 : A2)
Here sum is a function
A1 & A2 are arguments
* Always formula starts with '=' operator
34 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
CELL REFERENCING : The Reference of a cell address in formulas through its column and row labels
 cell referencing may be done in 3 ways
i) Absolute Referencing : The address of cell is shown with addres values of both column & Row
exactly
Ex: $ B $ 7 $  is address
ii) Relative Referencing : The address of cells is not specified exactly
Ex: B 7

pa
iii) Mixed Referencing :
 It is combination of Absolute & Relative referencing. The address of cell is shown with any
one of the label either column or row
Ex : $ B7, B $ 7

a
Arguments : The values passed into functions through paranthesis.
­ Arguments may contain numbers, text, constants and Alphabets etc.

ad
Functions : The predefined commands that can perform specific calcuations in worksheet by passing
arguments through them.
Ex: i) Sum  To get Sum of values
ii) Min  To get the minimum value
iii) Max  To get the maximum value
iv) Avg  To get average of the numbers
:K
v) Count  To count the non­empty cells (numeric)
Special Features of MS - Excel :
nt
i) Auto Sum : It helps you to add the contents of a cluster of adjacent cells
ii) List Autofill : It automatically extends cell formatting when a new item is added to the end of a list
iii) Auto fill : It allows you to quickly fill cells with repetitive or sequential data such as dates or numbers or text
oi

iv) Auto Shapes toolbar : It will allow you to draw a number of geometrical shapes, arrows, flowchart
elements, stars etc.
v) Wizard : It guides you to work effectively while you work by displaying various helpful tips and techniques
P

based on what you are doing


vi) Charts : Features will help you to present a graphical representation of your data in the form of Pie, Bar &
ng

Line charts.
vii) Pivot Table : It sums data in seconds and allow you to perform data analysis
 Pivot table helps in generating reports like periodic financial statments, statistical reports etc.
 Users can also analyze complex data relationships graphically..
ni

vii) Formula Bar : The current data which we are typing in the Active cell is displayed in the formula bar
ix) Spell check : To perform Spell check we have to press F7 key
x) Goto : To goto a specific cell, we have to press F5 Key
r

Ex: goto B7, it takes cursor to B7 Cell only.


Tu

xi) Print screen key : It is the key in keyboard which takes the snapshot of current screen / window, so that
we can paste image any where required.
xii) Merging : The process of combining two or more cells / tables into single table / worksheet is called
merging.
xiii) Transpose : The function that display row data in column & column data in row.

35 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
SHORT CUTS:
WINDOWS KEYS
SHORTCUT KEY FUNCTION
Windows+ M Minimize all the windows
Windows+F1 Display the Microsoft windows help
Windows++ Zoom in – increase page zoom
Windows—­ Zoom out­ decrease the zoom of page

pa
Windows+ space bar Show desktop without closing current page
CTRL+ALT+DEL Bring windows task manager
F1 Help window of program
F2 To rename the selected icon

a
F5 To refresh contents or system

ad
Alt+ F4 To close the current program
MS EXCEL KEYS
Home Moves to the beginning of the row
F1 Opens excel help task pane
F2
F3
:K
Edits the current cell and its content
Displays paste name dialogue box
F4 Repeats last action/command
F5 Go to box for a specific cell
F7 Spell check box
nt
F11 Creates chart of the data in current range
F12 Display save as dialogue box
Ctrl+Shift+& Applies the outline border for selected cells
oi

Ctrl+Shift+~ Applies general number format


Ctrl+Shift+# Applies date format with day month and year
P

Ctrl+Shift+^ Applies exponential number format with two decimal places


Ctrl+Shift+@ Applies the Time format with hour and minute,and AM or PM
Ctrl+Shift+: ENTERS THE CURRENT TIME
ng

Ctrl+ ; Enters the current date


Ctrl+Spacebar To select entire column
Shift+Spacebar To select entire row
ni

Ctrl + Shift + % Apply Percentage format with no decimal places

MS POWER POINT KEYS


r

Ctrl+M New slide


Tu

F5 SLIDE SHOW
SPACE BAR Next slide
Esc End slideshow
Alt+U Mute the sound in slide

36 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MS-WORD SHORTCUTS
Shortcut key Description
Ctrl+ A Select ALL content of the page
Ctrl+ B BOLD the selected text
Ctrl+ C COPY Selected text
Ctrl+ D Open the FONT dialogue box
Ctrl+ E Aligns text to CENTER of the screen
Ctrl+ F Open FIND dialogue box

pa
Ctrl+ G Open GOTO dialogue box
Ctrl+ H Open REPLACE dialogue box
Ctrl+ I ITALIC the selected text
Ctrl+ J Aligns the text to justify the screen

a
Ctrl + K To insert hyperlink
Ctrl + L Left Alignment in a paragraph

ad
Ctrl+ M Indent the paragraph
Ctrl+ N Create NEW document
Ctrl+ O OPEN an saved / existing document
Ctrl+ P Open the PRINT dialogue box
Ctrl + Q
Ctrl+ R
Ctrl+ S
:K
Remove Paragraph formating
Aligns selected text to the RIGHT of the screen
It SAVES the document
Ctrl + T Creating Hanging Intend
Ctrl+ U It UNDERLINES the selected text
Ctrl+ V PASTE the text/ file / folder
nt
Ctrl+ W To CLOSE the current document
Ctrl+ X To CUT the selected text
Ctrl+ Y REDO the last action performed
oi

Ctrl+ Z UNDO last action


End Moves cursor to the end of line
CTRL+ End Moves cursor to the end of document
P

Home Moves cursor to beginning of line


CTRL+ Home Moves cursor to beginning of Document
CTRL+ 5 To maintain 1.5 line spaacing
ng

F1 Open HELP Dialogue box


F5 Open FIND,REPLACE,GOTO dialogue box
F7 Spell and grammar check to selected text
F12 Opens a SAVE AS dialogue box
ni

Shift+ F12 It SAVES the document


Shift+ F3 Changes letter case or to Title case Of Selected text
Ctrl+ Shift+ F12 PRINTS the document
r

Alt+ Shift+ D Insert the current DATE in the document


Alt+ Shift+ T Insert the current TIME in the document
Tu

Mouse double click To select a complete word


Mouse triple click To select a complete line
Ctrl + Shift + < Decrease Font Size
Ctrl + Shift + > Increase Font Size
Ctrl + Shift + + Superscript

37 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Structure of Functions :
­ It begins with function name, opening Paranthesis, arguments and closing paranthesis.
Types of charts :
i) Barchart : It emphasis on comparisions among individual items (multiple data series)
 Categories are organized vertically and values horizontally
ii) Line chart : It shows trends in data at equal intervals
 Usefull to depict the change in a value over a period of time

pa
iii) Piechart : It shows the proportional size of items that make up a data series to the sum of the items.
- Created for single data series.
MS - ACCESS & DBMS

a
 Microsoft Access works only in windows operating system
 It cannot work in Apple macintosh system

ad
 MS access works along with RDBMS.
 RDMBS ­ Relational Database management system
Data base : The data of a particular type stored in form of tables and retrieved when ever required.
Different ways of Database storage : :K
i) Array : The linear data structure which store a single data type elements only
Ex: Array int [10]
 It can stores only 10 integer values, but not characters
ii) Stack : The data insertion (push), deletion (pop) are from single side only
nt
 The deletion is performed on below principle
 LAST IN FIRST OUT  LIFO
Ex : Rings arranged to a fixed Rod on Floor
oi

iii) Queue :
 The elements are inserted (front) in one side & deleted from other side (rear) in queue.
 It follows FIRST IN FIRST OUT  FIFO
P

Ex : Q lines for tickets at Box office


Note : Array is only the linear data structure.
ng

Data base Table :


i) Tuples  The Rows in database table called tuple
ii) Attribute  The columns in the data base table is called Attribute
ni

 Tuple
r
Tu


Attribute
* Primary key :
­ The key which uniquely Identify a Record
­ Each table have only one primary key

38 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
* The sequence of elements in data base are
Character  field  Record  file  Data base
Here
­ Characters are entered into the filed
­ Combination of fields is called Record
­ Combination of Records is called file
­ All these files are stored in Database
* Foreign Key : A field in this table which is primary key in another table

pa
* Queries : These are used in SQL to create and retrieve the data from data base table
* Data Redundancy :Maintaining 2 or more duplicate copies of the same file in database is called data redundancy
* Data Inconsistency :
When we are maintaining data redundancy, by keeping many copies of same file at different locations in

a
data base, If there is any updation or correction in data, we have to update / correct all multiple copies, other
wise It causes data In consistency

ad
 Dat Inconistency is caused due to data redundancy only..
Ex: If we have list of one class students names.
 making 5 copies and storing in all 4 drives and desktop also
:K
 If any student added into class, the data has to be updated in all 5 copies, but we update on only
desktop file, So it cause data Inconsistancy.
SQL  Structure Query Language.
i) DDL ­ Data definition Language
­ Used for creating the tables
Ex: Create, Alter, Drop,Rename.
nt
­ Here we are defining or creating a new table by using queries.
ii) DML  Data manipulation Language
­ DML commands are not used to create the table, but only to modify the data in tables.
oi

Ex: Select, Update,Insert,Delete,Merge commands.


iii) TCL : Transaction Control Language ( COMMIT, ROLL BACK )
iv) DCL : Data Control Language ( Grant, Revoke)
P

RELATIONAL DATA BASES


i) Relation ships : When ever we are creating relation between two different tables having some data it
is called Relationship
ng

 Relationships are created by using primary key & foreign keys

Ex : Employee Name Emp.ID


ni

Emp. ID Salary
r

Table­1
Tu

Table ­2
Emp. ID Work

Table ­ 3 Fig: Relational Model


39 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
From Figure :
­ Here Emp ID is primary key in Tbale 1
­ Emp ID is foreign key in Tbale 2 & Table 3
* These type of models creating entity relationships are called E­R models.
* Primary key is specified with underline to the entity (Entity is the real world object)
 A is Primary key  A is entity only
Emples for database Access Tools :
* MS Access

pa
* d BASE
* ORACLE
­ Above 3 are the database access tools
Data mining : The technique used by business men to see the trends in market by comparing values from

a
past history.
Data ware house : The storage house of different types of data to be retrived by data mining technique

ad
­ It stores multiple type of data base.
Sorting Data : Arranging the data in an logical order in data base storage.
NUMBER SYSTEMS

1)
Basically there are 4 types of number systems
Binary Number system have 0, 1 so only 2 choice.
:K
 Computer data stored in Binary format only
 Base is 2
2) Decimal Number system 0 to 9
nt

 No Alphabets are used in this number systam


 Base is 10
oi

3) Octal Number system  0 to 7


 There is no 8 or 9 in the octal number code.
 Base is 8.
P

4) Hexa Decimal Number System


 we use 0 to 9 and A to F in the number coding
Here A = 10 D = 13
ng

B = 11 E = 14
C = 12 F = 15
 The Base is 16
ni

CONVERSIONS :
1) Binary to decimal Number
Convert 1 1 0 0 1 0 to Decimal number
r
Tu

23x0 20x0
21x1
25x1 24x1
22x0

 So add (21x1) + (24x1) + (25x1), We get 2 + 16 + 32  50 as Answer..


40 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
2) Decimal to Binary Code
Convert 50 to Binary Code
2 50
2 25 ­ 0 1) Divided given number with 2 until we get dividend as 1
2 12 ­ 1 2) Write from Bottom to Top, we get 110010(2)
2 6 ­ 0
2 3 ­ 0

pa
1 ­ 1

3. Binary to Octal Code :


Convert 110010 to octal code

a
* Divide the given binary code into 3 digits segment from Right side, so weget

ad
1 1 0 0 1 0

Now Subsitute in values for standard code 8421, weget


Step 1: 8 4 2 1
0 1 0
:K
 take same value in 1's place
0+2+0 = 2  take 0 value in 0's place and add them

For 010, we got 2


nt
Step 2 : 8 4 2 1
1 1 0
4+2+0 =6
oi

for 110, we got 6


Now merge 110, 010 so we get
P

62  Its base is 8.
4) Binary to Hexadecimal code :
Convert 110010 to Hexadecimal Code
ng

* Divide binary code into 4 digits segment from right side, so we get
11 0010
Step 1 : Substitute in standard code 8421, weget
ni

8 4 2 1 Step 2 : 8 4 2 1
0 0 1 0 0 0 1 1
0+0+2+0 =2 0+0+2+1=3
r

Step 3 : Merge 11,0010 into single number, we get 32 base (16)


Tu

One more Ex: Binary to Hexa Decimal number


Convert 11111100110011 in to Hexa decimal.
Step 1 : Divide code in to 4 deigits segment from right side
1 1111 0011 0011
(d) (c) (b) (a)

41 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Step 2 : Now substitute code in standard code 8421
a) 8 4 2 1 b) 8 4 2 1 c) 8 4 2 1
0 0 1 1 0 0 1 1 1 1 1 1
0+0+2+1=3 0+0+2+1=3 8+4+2+1=15
d) 8 4 2 1
0 0 0 1
0+0+0+1 = 1

pa
Step 3 : Merge all these numbers from Right sides into single number
Here 15 is to be converted in to Alphabet
15 = F
Finally weget result as

a
1 F 33 (16)

ad
Note : For the examination point part I is very important which consists of maximum questions
IMPORTANT QUESTIONS - MS OFFICE
1. What tool works best for word processing?
1) ms­ppt
3) ibm word
2) typewriter
4) microsoft word
:K
9. What option is used to use a paragraph at another
place after removing it completely from 1stplace?
1) rotate 2) cut­paste
2. MS­Word allows creation of ____type of 3) delete 4) move
documents by default? 10. To standout(Highlight) a word, what option can
1) .DOC 2) .WPF be used?
nt
3) .TXT 4) .DOT 1) standout 2) delete
3. Outlook express is a ____? 3) print 4) bold
1) email client 2) scheduler 11. Which option may be used to change page­size
oi

3) address book 4) all of the above & margins?


4. What program is used in MS­Word to check the 1) page­setup 2) view
spellings? 3) tools 4) data
P

1) spellpro 2)spellcheck 12. Which of the following is the latest version of


3) outlook express 4) all of these MS­WORD?
5. Which of the following are valid min. 1) Word­97 2) word­98
ng

&max.zoom sizes in MS­OFFICE? 3) word­ME 4) word­13


1) 10,100 2) 10,1000 13. Which of the following is not a valid version of
3) 20,250 4) 10,500 MS­Office?
6. Which key should be pressed to start a new 1) office 95 2) office 97
ni

paragraph in MS­Word? 3) office 99 4) office 2000


1) down cursor key 2) enter key 14. Aletter,memo,report or other file prepared by
3) shift+enter 4) control +enter Microsoft word is called a?
r

7. Which of these toolbars allows changing fonts 1) worksheet 2) slide


and their sizes? 3) document 4) database
Tu

1) standard 2) formatting 15. The contents of a clip board remain the same
3) print preview 4) all of these until?
8. What option is used to use a paragraph at another 1) you copy other text
place without removing it from the first place? 2) you cut other text
1) rotate 2) copy­paste 3) you shut down your computer
3) delete 4) move 4) all of above
42 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
16. Name of a newly created document is? 28. Option designed to automatically save a backup
1) document 1 2) word copy of your document at specified intervals is?
3) DOC 4) file 1) close button 2) create data source
17. in MS word, RTF stands for ? 3) auto save 4) save as
1) real time formatting 2) real time fonts 29. It is family of types styles such as
3) rich text format 4) really text files arial,Geneva,modern etc. it is?
18. Which toolbar in MS Word,allows you to direct 1) format 2) font
access internet while working in a word 3) form letter 4) form
document? 30. It is the way text appears on a page.it is?

pa
1) main tool bar 2) web tool bar 1) format 2) font
3) standard tool bar 4) graphics tool bar 3) form letter 4) form
19. On how many documents you can work 31. It refers to a title for a part of document?

a
simultaneously in MS word? 1) header 2) heading
1) one 2) two 3) indent 4) leader characters

ad
3) more than two 4) any number 32. It refers to the distance between text boundaries
20. User can use___button to cancel the last editing? and page margins?
1) ctrl+u 2) undo 1) header 2) heading
3) redo 4) shit+u 3) indent 4) leader characters
21. New selected font is applied to?
1) full document
2) all the text above the current cursor position
:K
33. Which key used for centre alignment for text in
MS­WORD?
1) Ctrl+C 2) Ctrl+ l
3) the selected text 3) Ctrl+ E 4) Ctrl+ V
4) only to headings 34. Which of the following page orientation have
22. MS Word automatically changes the font color more letters for line in the document?
nt
of these? 1) Portrait 2) Landscape
1) email address 2) web address 3) Same for both 4) Can’t say
3) mail address in US 4) both 1 & 2 35. To delete text right side of the cursor , which
oi

23. Auto­text can be used to insert____in a command is pressed?


document? 1) Backspace 2) Delete
1) text 2) graphics 3) All of these 4) Any of these
P

3) any of the above two 4) both of the above 36. To goto specific page which command key is
24. Macros stored in the global macro sheet can be pressed?
used? 1) F2 2) F4
1) in the current document only
ng

3) F5 4) F6
2) in any document 37. Page count and word count is displayed in which
3) can be used only local bar?
4) not consistent behavior 1) Tool bar 2) Formula bar
ni

25. Redo button is used to? 3) Task bar 4) Status bar


1) reverse a redo action 2) users choices 38. Title of the document is displayed in Title bar
3)reverse an undo action 4) all the above and _____ ?
26. Magnifier button is available on?
r

1) Status bar 2) Tool bar


1) print preview toolbar 3) Task bar 4) Menu bar
Tu

2) standard toolbar 3) formatting toolbar 39. Page break is found in which menu?
4) both on 1 & 3 1) File 2) Edit
27. One of the following is not permitted while 3) Insert 4) Tools
naming a data source? 40. What is the key combination for page break ?
1) letters 2) numbers 1) Ctrl+Enter 2) Ctrl+ Shift
3) underscores characters 4) spaces 3) Ctrl+ END 4) CTRL+ home
43 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MS-EXCEL 13. By default the text alignment in the cell is?
1) Left 2) Right
1. Which of the following is the latest version of 3) Center 4) Justify
Excel? 14. By default the numbers aligned in the cells to
1) Excel 2003 2) Excel 2013 which side?
3) Excel 2015 4) Excel 2007 1) Left 2) Right
2. The default MS­Excel file extension is ? 3) Center 4) Justify
1) .doc 2) .ppt 15. Which sign is used to specify a cell range?
1) ; 2) “”

pa
3) .xls 4) .exe
3. The maximum number Rows in worksheet are? 3) : 4) –
1) 225 2) 256 16. Which sign we use to enter formula?
3) 65536 4) 65336 1) __ 2) =

a
4. The maximum number of columns in worksheet 3) ++ 4) —
are ? 17. In which menu, we get the validation command?

ad
1) 225 2) 256 1) File 2) Edit
3) 65536 4) 65336 3) Format 4) Data
5. In worksheet, the intersection of column and row 18. In which bar, we find Autosum button?
is called? 1) Formula Bar 2) Formatting bar

6.
1) Grid
3) Cell
2) Table
4) Box
The collection of worksheets is called?
:K
19.
3) Status BAR 4) Standard tool bar
Protect document is found in which menu?
1) File 2) Edit
1) Excel book 2) Excel sheet 3) Tools 4) Format
3) Workbook 4) Work table 20. How many types of cell references are there in
7. Which of the following is not cell address? MS­Excel ?
nt
1) C7 2) CA77 1) 4 2) 3
3) TC21 4) AB23 3) 2 4) 1
8. By default how many worksheets are present 21. By which menu we can ungroup the data?
oi

in the workbook? 1) Data 2) Insert


1) 4 2) 3 3) Edit 4) View
3) 2 4) 1 22. In Excel, pie charts can be plotted on ___?
P

9. Anything that we type in active cell is displayed 1) One data series 2) Two data series
in which bar? 3) Three data series 4) All of these
1) Formula bar 2) Title bar 23. Which of the following represents ABSOLUTE
ng

3) Task bar 4) All of these cell referencing?


10. Which of the key opens window for GOTO 1) $C$9 2) $C9
specific cell ? 3) C$9 4) C9
1) F4 2) F5 24. Which of the following represents RELATIVE
ni

3) F6 4) F7 cell referencing?
11. Which shortcut command insert the current 1) $C$9 2) $C9
date? 3) C$9 4) C9
r

1) Ctrl+; 2) Ctrl+, 25. Which of the following represents MIXED cell


3) Ctrl+ : 4) CTRL+” referencing?
Tu

12. Which shortcut command inserts the current 1) $C9 2) C$9


time? 3) Both of 1&2 4) C9
1) Ctrl+: 2) Ctrl+; 26. A pattern of worksheet which has predesigned
3) Ctrl+.. 4) Ctrl+” formulas but empty cells for user’s work directly?
1) Slide 2) Template
3) Document 4) All of these
44 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
27. Comments put in cells are called: 39. Which of the following chart formed in 360" angle
1) Good tip 2) Cell tip in circular form?
3) Nice tip 4) All of these 1) Bar chart 2) Line chart
28. Getting data from a cell located in different sheet 3) XY Chart 4) Pie chart
is called? 40. What is the function key for creating chart?
1) Referencing 2) Addressing 1) F11 2) F9
3) Accessing 4) Updating 3) F7 4) F5
29. Which key used for spell check in work sheet?
1) F2 2) F4 MS-POWERPOINT

pa
3) F7 4) F12
30. To get SAVE AS dialogue box , what function 1. The maximum ZOOM percentage in MS­Power
key is pressed? point is?

a
1) F6 2) F8 1) 100% 2) 200%
3) F10 4) F12 3) 300% 4) 400%

ad
31. The process of bringing different workbooks 2. What is the shortcut key for slideshow?
together to form as single workbook? 1) F2 2) F3
1) Pasting 2) Merging 3) F4 4) F5
3) Pasting 4) Adding 3. Which keys will produce a new slide in Power
32. In Excel , charts are prepared by which option?
1) Pivot table
3) Pie chart
2) Chart wizard
4) Create chart
:K point?
1) Ctrl+N
3) Ctrl+S
2) Ctrl+M
4) Ctrl+N+M
33. Which of the following is not a function name in 4. Which key is pressed to exit from the slideshow?
EXCEL ? 1) End 2) Home
1) Min 2) Max 3) Esc 4) Finish
nt
3) Sum 4) Avg 5. What is the file extension for MS­PPT file?
5) None of these 1) .ppt 2) .pptx
34. The cell address passed into ____ are called as 3) Both 1 & 2 4) .doc
oi

arguments ? 6. The predesigned empty slide with different styles


1) Function 2) Sum is called?
3)Table 4) Sheet 1) Slide 2) Template
P

35. The predefined command functions in MS­Excel 3) Ready slide 4) Folder slide
are called ? 7. The arrangement of slides can be done from ?
1) Templates 2) Macros 1) Slide master 2) Slide sorter
3) Memos 4) Makers
ng

3) Slide Arranger 4) Slide Changer


36. Which function key used for editing the current 8. Which of the following is graphics presentation
cell in worksheet? software ?
1) F1 2) F2 1) MS­PPT 2) Adobe photoshop
ni

3) F3 4) F4 3) Corel IDraw 4) All of these


37. Which of the following performs data analysis 9. In slideshow , which menu is appeared?
in EXCEL tables? 1) File 2) Edit
1) Macros 2) Memos
r

3) Format 4) Tools
3) Pivots 4) All of these 5) None of these
Tu

38. The cursor placed cell is called? 10. Which of the following are graphics options in
1) Active cell 2) Missed cell Power Point?
3) Cell address 4) Cell ordinance 1) Animations 2) Transitions
3) Both of 1&2 4) Layers

45 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MS-ACCESS 1) Foreign key 2) Primary key
3) Null key 4) Data key
1. Which of the following is DBMS software? 14. Maintaining more than 2 copies of same data
1) Word 2) Powerpoint files is called?
3) Excel 4) Access 1) data hiding 2) Data filter
2. Attributes can be defined for ? 3) Data redundancy 4) Data filter
1) Pages 2) Menus 15. Creating table is which type of command ?
3) Entity 4) All of these 1) DDL 2) DML
3) DAL 4) DSL

pa
3. Which option is used for giving the heading in
the form ? 16. The situation of not updating all the same copies
1) Textname 2) Head of files with latest data causes___?
3) LABEL 4) HEADING 1) Data hiding 2) Data consistency

a
4. Queries can be saved in database as______? 3) Data redundancy 4) Data filter
1) Filters 2) Objects 17. DDL and DML commands used in which

ad
3) Database 4) All of these language?
1) JAVA 2) C++
5. Is it possible to open 2 databases at a time ? 3) SQL 4) All of these
1) yes 2) No 18. Which of the following is the query language?

6.
3) Our choice 4) We can’t say
What is the shortcut key for REFRESH?
1) F2 2) F3
:K
19.
1) HQL
3) MQL
2) DQL
4) SQL
MS­Access is which type of DBMS?
3) F4 4) F5 1) RDBMS 2) DDBMS
7. The collection of data arranged in tables is 3) OODBMS 4) MDBMS
called? 20. Through _______ formation among tables we
nt
1) Database 2) Datasheet can merge the data in them?
3) RDBMS 4) DDBMS 1) Negations 2) Relationships
8. The process of summarizing data from more than 3) Both 1 & 2 4) Database
oi

one source is called? 21. Which of the following are 3G Languages?


1) Data hiding 2) Data merging 1) SQL 2) C++
3) Data consolidation 4) Data filter 3) Java 4) All of these
P

9. The function that display the records which 22. Which of the following is not a translator for
meets a particular condition? program code conversion?
1) Data hiding 2) Data merging 1) Compiler 2) Assembler
ng

3) Data consolidation 4) Data filter 3) Terminator 4) Interpreter


10. Which of the data item follows LAST IN FIRST 23. JAVA language is ?
OUT for deletion of data in them? 1) Low level language
1) Array 2) Stack 2) 4G Language
ni

3) Queue 4) All of these 3) High level language


11. _____is a technique used for reading trends in 4) All of these
market from past history? 24. Which of the following is Low Level Language?
r

1) data hiding 2) Data mining 1) C++ 2) BASIC


3) Data filter 4) All of these 3) JAVA 4) SQL
Tu

12. Which of the following is a linear data structure? 25. Which of the following converts high level
1) Array 2) Graph language code into machine language?
3) Tree 4) Sets 1) Interpreter 2) Compiler
13. The key which uniquely identifies the record in 3) Assembler 4) Both 1&2
DBMS table?

46 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
28. Which of the following holds largest memory?
26. Which of the following convertsassembly
1) Kilobyte 2) Tera byte
language code into machine language?
3) Mega byte 4) Giga byte
1) Interpreter 2) Compiler
29. To get the properties of an object(icon/ folder) ,
3) Assembler 4) Both 1&2
which button of mouse is clicked?
27. One Trillion bytes is equals to ?
1) Left 2) Right
1) Kilo byte 2) Mega byte
3) Middle 4) Reddy
3) Giga byte 4) Tera byte
30. Cache memory is?
1) Fastest 2) Temporary

pa
3) Slow memory 4) Both 1&2

MS-WORD KEY

a
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

ad
4 1 4 2 4 2 2 2 2 4 1 4 3 3 4 1 3 2 4 2
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3 4 4 2 3 1 4 3 2 1 2 3 3 2 2 3 4 3 3 1

MS-EXCEL KEY
:K
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
nt
2 3 3 2 3 3 3 2 1 2 1 1 1 2 3 2 4 4 3 2
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
1 1 1 4 3 2 2 3 3 4 2 2 5 1 2 2 3 1 4 1
P oi

MS-PPT KEY
1 2 3 4 5 6 7 8 9 10
ng

4 4 2 3 3 2 2 4 5 3
ni

MS-ACCESS KEY
1 2 3 4 5 6 7 8 9 10
4 3 3 2 2 4 1 3 4 2
r

11 12 13 14 15 16 17 18 19 20
Tu

2 1 2 3 1 2 3 4 1 2
21 22 23 24 25 26 27 28 29 30
4 3 3 2 4 3 4 2 2 4

47 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
NET WORKING
NETWORK : The group of computers connected together either physically or in wire less medium
 We can share the files & Information, software, hardware (CPU) through network
* Internet is the popular network which allows millions of users to share information
Node : Every computer in network is called Node
­ Both clients and servers are said to be Nodes.
TYPES OF NETWORK

pa
1) PAN : Personal Area Network
 The sharing of files / information between two computers by connecting them with cable / bluetooth /
infrared Rays
 By using PAN, we can also share internet connection

a
 It is limited to a Room only

ad
2) LAN : Local Area Network
 The small and single site network which connects the computers in a building and also to adjacent
building
 HUB is the connecting device used in connecting computers in the LAN
Example : Internet cafes, college Labs etc
* See PAN is not considered as small network to compare.
:K
3) MAN : Metropolitan Area Network
 The network that connects between different metro politan areas (Ex : Holland to Sydney)
 Cable TV is the best example
nt
 Satellite signals also used in MAN.
4) WAN : Wide Area Network
 This is the network geographically dispersed collection of LAN'S
oi

 To connect WAN, It uses X.25 protocol technology that widens the signal strength.
 X.25 is a communication oriented protocol
P

Ex: Internet, www


* LAN and Topology both are same meaning
Types of LAN or Topologies :
ng

Topology : The way of computers arrangement in connecting the LAN or Network is called Topology.
Wehave generally 6 topologies : i) Bus Topology
ii) Ring Topology
ni

iii) Star Topology


We will see special features iv) Mesh Topology
of one by one seperately. v) Tree Topology
r

vi) Hybrid Topology


i) BUS Topology :
Tu

 The computers are arranged in such a way that Bus seats are arranged in general life Bus.
Client
. . . . . . .. .. . Server

Terminator Central Cable


48 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups

The central cable in this topology is called Back bone of Network
If the Backbone fails, the entire network failures.

Data Sent in Packets from server to the destination Computer (client)

Terminators will absorbs the signals sent by server to clients.
ii) Ring Topology :

Node

pa
 In Ring LAN, all the nodes are connected in a circular path
 Here, there is no central server in the network

a
 To avoid collisions in data transmission, the tokens are provided to all the nodes
 When the token time comes to a specific node, it can transmit data to remaining systems / nodes.

ad
 Failure in single node causes entire network failure
 It contains n nodes & n connections in number
iii) Star Topology :

Client
:K
Server
nt

 The central Server sends data and receives data to / from all the clients
 If one node fails, entire network does not fails
oi

 If central server fails, entire network will fail.


 Very easy for fault diagnosis
* Fail in network means loses its connectivity
P

 Star topology is the best topology to connect in Real life.


 Low cost for construction of star topology
ng

 It contains n nodes & n­1 connections


iv) Mesh Topology :
ni

 Very high cost in construction of mesh Topology


r

 Each node have connection with all the remaining nodes.


Tu

 Very difficult for fault diagnosis


Fault Diagnosis : Finding the disconnected wire or node in the network is called fault diagnosis.
BIO METRICS : Creating Login Pass Word through human body interaction.
Ex : Breath Scan, eye scan, finger print, retina scan.

49 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
v) Tree Topology :
 Server

 Both server & client

 Client

 The computers are connected from one to another

pa
 The possibility for a node to act both as client & server is only in tree topology..
Client : The active member of the network
 It always sends request to server & waits for response from the server

a
Server : The passive ( sleeping) member of the network
 It waits for client requests & gives the response to them.

ad
* So, in tree topology the middle nodes are acting as both client and server.
vi) Hybird Topology : The connection of nodes with the combination of any of the two topologies is called
as Hybrid Topology
Ex: Bus topology + star topology
star topology + Ring topology
:K
HUB's  are the connecting devices in LAN / topology..
Docking station : The station to which the laptops are connected to make them for converting as projectors or
big screens like desktop & LCD' Screens.
nt
TYPES OF WAN'S
* In exam point of view, it is not important and it is only for Reference only
* The below are the public networks, authorized & run by telecommunication Authorities.
oi

a) PSTN : Public Switched Telephone Networks


 Designed for telephone, which requires modem connection
 It is used in FAX machine
P

 It is analog transmission
 It is low speed transmossion
ng

b) PSDN : Public Service Digital Network


 This network connects public with private networks through e­mail services and chating
 It is high Reliable and quality communication
c) VAN : Value added Network
ni

 It provides Electronic Data Interchange (EDI)


 The owner rentout network for subscribers
Ex: Invoice and sale purchase order.
r

d) ISDN : Integrated Services Digital Network


Tu

 It uses both modems and multiplexers


 It is for limited distance only..
Network Architecture : The construction of nodes (Computers) to form as network structure is called
network Architecture

50 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MULTIPLEXING
The process of combining many number of input signals into single out put signal to send.
Radio waves
Ex: Air medium
Telephone signals
Demultiplexing : The process of separating single output signal into many number of signals to receive.
TYPES OF MULTIPLEXING

pa
i) FDM : Frequency Division Multiplexing
 It uses analog data transmission
 Band pass filters are used in separating channels.
ii) SDM : Space Division multiplexing

a
 It divides channels through space division

ad
Ex: Stereo Headset.
iii) TDM : Time Division Multiplexing
 It divides channels through time division
 It uses digital transmission of signals
iv) CDM : Code Division multiplexing
 It divides channels based on their code
:K
Ex: CDMA mobiles are separate from GSM mobiles
Note : CDM & SDM are not important for exams.
TYPES OF DATA TRANSMISISON
nt
* Data Transmission is the process of communication of data between source (sender) and destination
(Reciever)
a) Simplex Transmission :
oi

Source Data  Destination


Sender Reciever
P

 In this type, the communication is processed only in one direction from sender to Reciever
 Receiver cannot respond to the sender..
Example : Radio channels
ng

* We can only listen songs, we cannot Reply them through radio


b) Half Duplex Transmission :
Source Data Destination
 Data
ni

 The communication between source and destination is bidirectional in this type


 But, the communication is possible one after another not simultaneously..
r

Ex: Walky Talky, FAX machine.


* Here the sender will send information to Receiver and waits for Receiver response.
Tu

 Same thing happens from receiver side, both of them cannot transmit data at a time.
c) Full Duplex Transmission :
 The communication of signals between source (sender) and receiver (destination) at a time.
 They need not wait for one another to send request or response

51 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Sender Data
  Reciever
Ex: Telephones, Chating, messages etc.
Note : Examples are not important for types of transmission, only definitions are to be understood.
Different elements used for Data Transmission :
i) Coaxial Cables : The cable TV's are connected through this cables
ii) Optical Fibres : These are very reliable Rest free & very high speed data transfer

pa
iii) Wireless Medium : Using different ways of wireless medium also data transmission takes place

INTERNET

a
Terms Relating Internet :

ad
* Intranet : The network of systems with in an organisation and not able to accessed by the outside organizations.
Ex: Database in CID (Crime Investigation Dept.)
* Extranet : The organization given permission to outside another organization to access their data, this is
possible through extranet
:K
* Protocol : The set of governing rules on network are called protocols
* TelNet : It is a protocol that allows the system to connect remote computer for accessing data & internet
Ex : If A & B are two systems having Telnet protocol, only A is having Internet facility than through Telnet,
B also can use internet facility.
Evolution of Interent :
nt

ARPANET : The first intranet /Internet developed in 1969 by US Defence for the internal communication.
 Full form is Advanced Research Projects Agency Network
 Vinton cerf is the father of Internet
oi

OSI REFERENCE MODEL


 It stands for open systems Inter connection Model
P

 It has divided model into 7 Layers


 The communication from sender to receiver & Viceversa happens in network through this OSI reference
model only.
ng

The 7 Layers of OSI model are : 7) Application Layer


6) Presentation Layer
5) Session Layer
ni

4) Transport Layer
3) Network Layer
2) Data link Layer
r

1) Physical Layer
Tu

* The physical layer is the first Layer in OSI model


* Application Layer is the seventh (last) layer in OSI model
Note : Generally we don't know what is the process that happens, after sending email from our side to any
friend. the process is hidden in the form of OSI reference model
* Layers 7 to 4 deals with end to end communication between data source and destination
* Layers 3 to 1 deals with communications between network devices such as Routes, Switch, bridge etc.
52 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
OSI Reference Model Table
No Layer Application Protocols Devices

7 Application Layer * Input & out put of Data HTTP, SMTP, SNMP Gateway
* User Interface Layer FTP, POP, DNS

6 Presentation Layer * Coding & Decoding ­ NO ­ Gateway

pa
*Compression & De Compression
* Encryption & Decryption

5 Session Layer * Maintains User Sessions ­ NO ­ Gateway

a
* Host Communication

ad
4 Transport Layer * Provides Acknowledgement TCP, UDP Gateway

3 Network Layer * Packets Formation IP, ICMP, ARP Router

2 Data Link Layer


* Network Connection

* Frames Formation
:K ­ Not Switch,
* Error Detection & Required Bridge
Correction
nt

1 Physical Layer * Data Converted in to ­ Not Repeater


electrical, electromechanical Required
oi

and Digital Signals

7) Application Layer :
P

 This is the 7th or Last layer in OSI model (for user interface with network)
 It defines interface between users data and data transfer communication in network
ng

 The user sending / receiving e­mail is work done in this layer


* FTP, SMTP, DNS, HTTP, POP3 are the important protocols involved in the application layer
Here
a) FTP : File Transfer Protocol
ni

 It send & receives the data (files and attachments) in network


b) SMTP : Simple mail Transfer Protocol
 It is the protocol involved in sending any mail.
r

c) POP3 : Post office protocol version 3


Tu

 It is the protocol involved in Receiving any email


d) HTTP : Hyper Text Transfer Protocol
 The protocol which connect the webpage / URL to the web server (communication protocol)
e) DNS : Domain Name system
 It connects the web site address to the particular domain in web server
53 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
6) Presentation Layer :
 It specifies the architecture for independent data transfer
 It encodes & decodes the data
 It Encrypts & decrypts the data
 It compress & decompress the data
* No protocols are involved in presentation Layer
* CODEC's are used for compression and de compression

pa
a) Encryption : The process of converting normal text into cipher text is called encryption
* Text is converted into numbers & Alphabets
b) Decryption : The process of converting cipher text into its original form of Normal message / text is
called decryption

a
* Cipher text is converted into original message
5) Session Layer :

ad
 It manages & Controls users session & dialogues
 It reports the upper layer errors
* No protocols involved in this session Layer
 Here only Host communication is processed
4) Transport Layer :
:K
 It manages end to end message delivery in network by giving acknowledgement to users
 It provides sequential packet delivery through error recovery and flow control mechanisms.
 It provides connection less oriented packet delivery
nt
 Multiplexing and segmenting done here.
* TCP, UDP are the protocol involved in this layer
a) TCP - Transmission control protocol
oi

b) UDP - User Datagram Protocol


Gateway : Networking device for data transmission in above 4 layers
3) Network Layer :
P

 It determines the data transfer mechanism between network devices


 It determines the path for flow control of data
ng

 Data is divided in to packets


* Internet Protocol (IP) is involved in Network Layer
Router : It works on single protocl and determines the next network point to which to forward a data
packet towards its destination.
ni

2) Data link Layer :


 Its main role to detect & correct the packets transmit errors.
 It determines procedure for operating the communication links
r

 It divides data packets into Frames


Tu

* Switch and Bridge are used for connecting network segments


1) Physical Layer :
 It is the first layer in OSI Reference model
 It interfaces between network medium and devices
 It converts data into optical, mechanical & electrical characteristics.
* Repeater used to strengthen the signals.
54 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
TCP / IP Model :
* TCP / IP is the internet connecting protocol suit
 The model is a part of OSI Reference model but have only 4 layers of it
 The presentation layer & session layer are absent in TCP / IP Model
 Data link layer & network layer are taken as single part in TCP/ IP Model
Note : Now we will see who provides the Internet & ways of connecting to Internet
ISP : Internet service Provider

pa
 It provides the Internet facility through world wide web.
 It is the authority to permit client / individual for connecting to Internet
 In return it takes the IP adderss of the system of users to connect to the network

a
IP Address : Internet Protocol Address
 This address is unique address provided by ISP to the single / Individual system on the network.

ad
* After obtaining permission, we require the Internet connection
Ex: 162.200 . 20.61 is an IP address
Internet Protocol Versions :
Based on Address length and speed of access, we have 2 Internet protocol versions
a) IPV6  Internet Protocol Version 6
 It supports 128 Bit address length
:K
 for future use
b) IPV4  Internet Protocol Version 4
 It supports 32 bit address length
nt
 for current generation use
From To From To
Class ­ A 0.0.0.0 127.255.255.255 Class ­ D 224.0.0.0 239.255.255.255
oi

Class ­ B 128.0.0.0. 191.255.255.255 Class ­ E 240.0.0.0 247.255.255.225


Class ­ C 192.0.0.0 223.255.255.255
P

TYPES OF INTERNET CONNECTION


1) Dialup Connection :
 The connection of Internet by using existing / new telephone line connection
ng

 It requires the MODEM to connect to computer


 Its low in speed, so it is not broad band connection
2) DSL Connection :
ni

 It stands for Digital subscriber line (not link)


 It requires an existing / new telephone line connection
 It provides high speed internet access, compared to dial up connection (due to replacement of copper
r

wires in cable)
 So, it is a type of broadband connection
Tu

3) Broad band Connection :


 It does not require a telephone line connection
 It is optional to have telephone line connection
 It provides high speed data access to Internet
 Routers are used in this connection to clear the data traffic & provide high speed access.
 Though it is costly to connect, It is used widely by the people in world.
55 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
4) WIFI : Wireless Fidelity
 It does not requires any cable connection
 It provides high speed Interent access so it is also broad band connection
 It is a Wireless connection to network
 It is limited to a small distance only
Note : Above 4 types of connections are basic types of internet connections. We have another type of
Internet connection

pa
5) WIMAX : World wide Interoperability for microwave Access
 When compared to wifi, It has capacity to cover larger distance.
Example : If suppose, wifi is connected up to 500 metres, wimax can be connected upto 2 kilometers.
 Both are used for connecting to Internet only

a
Web Browser :
 The program written to view the web pages

ad
 Web Browser is a software that is used to view the web pages.
LOGIN : The process of authentication for connecting to Internent by providing user name and pass word
Authentication : The process of verifying valid username and password, that is given by the user.
:K
Licence / End user Agreement : Accepting the terms and conditions of any software / licencing authority
to use their products for our personal use
Web Site : The collection of web pages in a single place, that is called website.
Homepage : The first page of the website that appeared after entering URL in the addres bar.
URL : It is word based address of IP address
nt
 Its full form is uniform Resource locator
 It holds the websites address name
 It is a unique address for any website.
oi

Ex: http:// www.google.com.html


Important Years
Here :
PASCAL'S Calculator ­ 1642
i) http: Hypertext transfer protocol
P

ARPANET ­ 1969
 It links / connects website to web server C Language ­ 1972
ii) www: World wide web
IBM PC ­1981
ng

iii) google : It is the website name not address


Windows Operating System ­ 1985
iv) .Com : It is the domain Name
v) html : hypetext markup Language
we will see one by one clearly
ni

HTML : Hypertext means text, image, audio & video etc.,


 Web pages are saved & viewed in HTML format only
Domains : The host / server of the website category is called domain
r

Ex : .gov  Government
Tu

. Com  Commercial
. Net  Network
. edu  Education
. org  organization
. In  India www developed by Tim Berners Lee

56 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Examples for Web Browsers :
. Netscape Navigator . Mozila firefox . opera
. Mosaic . UC Browser . Dolphin Browser
. Internet Explorer . Google chrome
Upload : The process of data transmission from client / local system to the server is called upload
 Sending attachments is upload
Download: The process of fetching / receiving data from server to local system is called download
 downloading songs is a download.

pa
Attachment : The paper, music, video file that is sent as a soft copy and that can be modified at receiver
side is called Attachment.
TYPES OF WEBSITES

a
i) Static website : The webpages or information on website is not changed from /for long time
ii) Dynamic website : The webpages or information on website is changed from / for regular time / daily.

ad
Now we have system, internent connection, web browser, so we see the services provided by internet
SERVICES OF INTERNET
1) E ­ Mail 2) Chat 3) Video conferencing 4) Social Networking
1) E - Mail : :K
 It is also called Electronic mail, It is similar to writing a letter to reciptents but transmitted in
electronic medium ( Invented by Ray Tomlinson in 1971)
 ASCII Code : American standard code for Information Interchange
 The text in mail is first converted from normal text to ASCII code (not ANSI Code)
nt
 Each character in ASCII code is 1 Byte or 8 Bits of data.
Protocols for E-Mail :
 SMTP : Simple Mail Transfer Protocol
oi

 It is used to sending an mail


 POP : Post Office Protocol
 It is used to recieve the mail
P

 POP3 is the version 3 protocol using now a days


* G­Mail is a Google product.
ng

E-MAIL COMPONENTS
a) Sign Up : Creating an account by providing our details to the server for their confirmation
 The process of creating account is called signup process.
b) Captcha Code : The program that can generate and grade tests that humans can pass but current
ni

computer programs cannot pass.


 Distorted text is used as captcha code
 We have to enter this code while creating Account for verification.
r

c) Authentication : The process of verifying the username & password is called Authentication
Tu

d) Compose : The command to create /send a new mail to others from sender side.
e) Inbox : The recieved emails to our e­mail account are stored in this place.
f) Drafts : The important documents / mails/ Data / Attachments can be stored here
 The created mail which is not sent is also stored in Drafts only..

57 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
g) Sent Box : The sent mails are stored in this place.
h) Mail box : For all the above 3 components, this is the storage house of e­mail account
 Mail box is called storage house of e­mail.
i) Trash : The deleted items from mail box is moved to trash
 It is similar to Recycle Bin, but Trash is online memory where as Recycle bin is system memory..
j) Spam : The un solicated & Junk mails are stored in this place
 The lottary mails recieved by un known persons are stored here.
 Spam is considered as not an security threat.

pa
Note : Whenever you receive an unknown mail ( mails from un known person), you should not open it &
you have to directly delete it.
k) Forward : The content / mail already present in mail box and it is sent to another person through this option

a
 To avoid creating a new mail, we can use this command
l) Subject : The main headline (contents) of email is written in this space

ad
m) Address book : The mail addresses of friends & others are saved here
n) BCC : Blind Carbon Copy
 Sender address writen in BCC is not displayed in remaining receivers inbox / mail.
o) CC : Carbon Copy :K
 Sender address writen in CC is displayed in remaining receivers inbox / mail.
Automatically Generated Components :
 While we are sending mail, 2 components are automaticaly generated, that we need not give in mail
at receiver side only
nt
 Those are sender Email address and Time with Date of email sent.
 These 2 components are seen only at receiver side
E_Mail Address :
oi

Ravindra reddy.engg@gmail.com
 No space are allowed / accepted in email address
 @ is the separator between username and domain name
P

 here Ravindra reddy.engg is the username.


website Address : www. turningpointstudycircle.com
ng

 No spaces are allowed / accuted in website address


 No @ or special symbols are allowed here
 Domain name seperated with (dot) in URL
2) Chat :
ni

 We have many online chatting websites, which provides text conversation between people on Internet.
Ex: Yahoo messenger
Google Talk
r

Rediff Messanger
Tu

3) Video Conferencing :
 The service provided by Internet, for meeting people & talk directly in video conference from different
places around the world.
 It Requires camera and also Head set (optional)
 Teleconferencing is also electronic meeting (Audio chat) Provided by networking
58 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
4) Social Networking :
 The way of connecting people around the world at one place to share their views & ideas
through Internet
 These are creating maximum awareness about social issues around the world
Ex: Facebook orkut Twitter Google +
Linked In Badoo meetup Ning
* Facebook is the largest using social networking site around the world.

pa
* Linked In is used for business awareness & market strategy
* orkut is Google product, Before Introduction of Facebook it was used widely.
Web mail Interface : It allows you to access your email from any where in the world, by just having
user name and password.

a
Types of E-mail Text :

ad
 In E­mails we see plaintext, Images, colour text, tables and different graphics. so we have 3
types of text used in emails
a) Plain Text : It does not support Bold, Italic & Coloured text or fonts
b) HTML Text : It allows fonts, Bullets & colours also
:K
c) Rich Text : It supports Bullets, Images & alignment
Instant messaging : The contacts shown / referred by the email mailing list of people who regularly
participate in discussion topics is called Instant messaging
 Frequently messaged users names are displayed here.
Search Engines :
nt
 The tools to launch a search on the web or Internet are called search Engines
 The keywords are taken by search Engine to provide the links that relates to the key words
Ex : Google, Lycos, Yahoo, Delta etc.
oi

Link : The complete website Address / URL of a website is called link


 It is shared any where to open specific page / image.
Hit : The count that provides the number of visitors to that particular web site or webpage
P

Ex: Likes given to photos in face book.


Other services Provided by Internet ;
ng

i) E­ Commerce 2) M­commerce 3) Internet Banking


1) E - Commerce : The online shopping ( Both selling & purchasing) of products and services is called
E­ commerce
 It is also called Electronic Commerce.
ni

Ex : Buying Apparals from online sites such as ebay, flipkart, snapdeal etc.
2) M- Commerce : The store that combines online shopping and physical presence is called Mobile Commerce
r

 Here the physical presence is mandatony


 It is also called mobile commerce
Tu

Ex: Providing security passwords by physical presence through mobiles


Note : both are almost same, except physical presence is required in M­ Commerce
* IRC ­ Internet Relay Chat
* EDI ­ Electronic Data Interchange
* RAR File ­ Roshal ARchieve File.

59 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
3) Internet Banking :
 The facility provided by banks to do online transactions through computers and Internet facility
 on line transactions Refers to
* Paying Bills
* Donations to charities from our Bank Account
* Transacting amount to other accounts
 To maintain this account, user must have Account in Bank and also get an user ID & Password

pa
Virtual Keypad : The key board provided by specific websites such as Online banking websites to reduce the
risk of key stroke threats while entering username & Password.
 Virtual keypad is visible on screen only..
Flash : The small size animation pictures on webpages

a
 These requires flash player to view
Reloading webpage :

ad
 To reload any web page we click on " Refresh" Button or on " Reload" option only
 We have no Reload button on tool Bar, We have only Refresh Button on Tool Bar..
Cookies : These are the components that store the web history performed by user on specific computer.
:K
Bookmark : The web pages saved by users to see even when there is no Internet connectivity also.
History : The URL of webpages opened in computer are stored here.
Favourites : The frequently opening URL ( websites) can be saved here.
TYPES OF SERVERS ON INTERNET
nt
1) Web server : The program that using client / server model and WWW with HTTP.
2) Client server architecture: It is network architecture which separates the client from server.
 It allows clients to send requests to the servers.
oi

3) Proxy server :
 It provides the webpages from servers to clients
 It also serves as firewall to prevent from unauthorised access.
P

WAP : Wireless Application Protocol


 It is used as web browser for small mobile devices
 It provides only few applications such as
ng

* Sports Results
* E­Mail
* News Headlenes
ni

* Music Down loads


NIC : Network Interface card (Ethernet Card) ­ RJ 45 port in CPU board.
 It connects a local system to the network
r

Ethernet Cables : It is the IEEE standard cable, used for connecting a system to the network point.
Tu

 It is hard wired device connected to CPU for network connection.


 It carries / allows 48 bits address length
Note : NIC and Ethernet card both are same and present in CPU board.
FAT : File Allocation Table
­ It contains info. about the sizes of files stored and also about its clusters

60 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
NETWORKING DEVICES

The devices that are used as mediators in connecting to the network are called Networking devices
1) Bridge : It connects multiple network segments along with data link layer
 It works on data link layer
2) Switch : The device splits the network traffic and sends it to different destinations (within LAN)
 It works on Data link Layer, uses MAC address to transmit data.

pa
3) Repeater : The device that regenerate digital signals received while transmitting from one part to another
 It works in physical Layer
4) Router : The device used in data traffic clearance in Internet Protocol ( connects 2 different networks)

a
 It is the device used in Broad band Internet Connection
 It works in Network Layer to connect internet.

ad
5) Gateway : The device setting at a network node for interfacing with another network that uses
different protocols.
 It works on all 4 layers from Transport Layer to Application Layer
 The only device that works in 4 layers is Gateway..
:K
6) Brouter : Hybrid device that combines features of Bridge & Router.
Connecting Devices :
1) MODEM : It is combination of both modulator and Demodulator
 It is used in Dial ­up connection along with the telephone line
2) HUB : The connecting device used in connecting ethernet segments in LAN'S
nt

 It holds the connection from All the nodes


 It works on physical Layer only..
Types of HUB's :
oi

a) Active Hub : The signal is Amplified, so they work as Repeaters.


­ So it requires power supply
P

b) Passive Hub : The signal is forwarded as it is.


­ So it does not require power supply.
Digital Banking :
ng

 It is different from online Banking


 The transactions / Bill Payments using mobile phones is called digital Banking
 Internet & Telephone both may be used in digital Banking
ni

Junk Mail : The Advertisement mails sentout by specific sites for which, we have given our email Id.
 These are also considered as spam only..
Meta Search Engine : A metasearch engine is a search tool that sends user requests to several other
r

search engines and/or databases and aggregates the results into a single list or displays
Tu

them according to their source.


Stylus : A stylus (plural: styli or styluses) is a writing utensil, or a small tool for some other form of marking or
shaping, for example in pottery.
Hot Keys : A hot key is a key or a combination of keys on a computer keyboard that, when pressed at one time,
performs a task (such as starting an application) more quickly than by using a mouse or other input
device.
61 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
COMPUTER VIRUS

VIRUS : Vital Information Resource Under seize.


 It is a program designed to spread itself & infects executable files / hard disks and makes
virus copies it self.
 Virus attacks computer and corrupts / removes the data.
TYPES OF VIRUS

pa
1) Boot Sector Virus :
 The virus persent in the boot devices like disk / diskdrive or floppy disk
 Brain virus is an boot sector virus
2) Worm : The self replicating computer program that always harm the network

a
 It has two programs in it.
3) Trojan Horse : The harmful virus, which is a writen program that harms the computer.

ad
 Creeper is the trojan horse virus
4) Bomb : The virus which has some payload to destroy files on computer.
Logic Bomb : It occurs when user of computer takes action that triggers the bomb.
 It requires the human action :K
Time Bomb : It occurs to blast payload in computer at specific time or data written in program
 It does not require human action.
Virus hoax : The false email message warning, the recipient of a virus is going around.
5) Micro virus : It spreads in only application software
nt
* Trend micro is the anti virus program to kill it in the computer.
Scanning : The process of searching for known virus present in the system files is called scanning
6) Spyware : The malicious software that collects information about users without their knowledge.
oi

7) Malware : It is a superset of virus, worms, trojan horses, root kits and spyware etc.
SECURITY THREATS
1) Phishing / Spoofing : The attempts made fraudently to acquire sensitive information such as passwords,
P

credit card details etc by acting as a trust worthy person


 Attempts here called as phishing trips.
ng

2) Hacker : A person who uses his or her expertise to gain access to other people's computers to get information
illegally or do damage is called Hacker
3) Identity Theft : Collecting personal information and effectively posing (acting) as another individual
is known as crime of Identity theft.
ni

 Here the person uses some others identity to get the information.
4) Cyber Crime: The theft or frauds through online ( Internet) is called cyber crime.
* Malicious Hacker : The Hacker who involved in the hacking process with intension.
r

* Non - malicious Hacker : The Hacker who involved in the hacking process with no knowledge &
Tu

for time pass only.


Spam : It is the unsolicited and bulk mails in the e­mail
* This is not a security threat.
Ethical Hacking : The hacking done by department to retrieve the status of thief or criminal.

62 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
PREVENTION TECHNIQUES
1) Digital Signatures :
 The private key is maintained with Encryption and public key maintained at Decryption
 All the users can not change data, but they can only access data in data base.
2) Ceaser cipher : It is the method of shifting every plain text messages replaced with nth successive Alphabet
 text is converted into antother alphabets
3) Firewall : It is a software or hardware based device to permit or deny network transmission based on

pa
set of rules and used to protect network from unauthorized access
 Firewall is also an hardware device
 Firewall is also having software to act
ANTIVIRUS : The program written by programmers to catch and kill the computer virus is called Antivirus.

a
Ex : Trend micro Antivirus
Anti Spyware 2010

ad
Kaspersky Antivirus 2010
MCA fee Antivirus 2010
Norton Antivirus 2010
Symantic Antivirus 2010
Avast Antivirus 2013
Examples for VIRUS :
:K
* Creeper * Morris worm * I Love You * Code Red
* Sasser * Blaster * Nimade * Melissa
nt
* Elk cloner
* Spoofing and phishing are both techniques follow same strategy so both are same threats only.
Note : We have started with history & Generations and Ended with Antivirus.
oi

IMPORTANT QUESTIONS - INTERNET & NETWORKING


P

1. The first network that planted the seeds of 5. Which of the following is not network device ?
network was ? 1) Router 2) Switch
1) ARPANET 2) NSF net 3) Modem 4) Bridge
ng

3) I net 4) V net 6. which of the following is not an application


02. Acronym www in www.yahoo.com stands for? protocol in TCP/IP suit ?
1) world word in wonder 1) FTP 2) SMTP
2) world wide web 3) SNMP 4) MRTP
ni

3) world web widening 7. which protocol provides e­mail facility among


4) wonderful world web different hosts ?
03. we often use _____for world wide web ? 1) smtp 2) ftp
r

1) network 2) server 3) Telnet 4) SNMP


Tu

3) web 4) E­resource 8. 192.9.200.153 is an ?


4. An inter­company network which is used to 1) Ethernet address 2) IP Address
distribute information,documents files and 3) Computeradderss 4) All of the above
database is called as ? 9. which is the other name for LAN card ?
1) LAN 2) Extranet 1) NIC 2) Networkconnector
3) WAN 4) MAN 3) Modem 4) Internet card

63 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
10. What is the address given to computer 1) A connection to the internet
connected to a network ? 2) A web browser
1) System address 2) SYSID 3) Web Server
3) Process ID 4) IP address 4) All the above
11. WEB site is a COLLETION OF ? 22. Which of the following topology is least affected
1) HTML Document by addition\removing the nodes ?
2) Graphic files 1) Ring 2) Bus
3) Audio and Vedio Files 3) Star 4) NET
4) All the above 23. Host differs from desktop computers in that they

pa
12. Which of the following protocol used for can handle ?
webSrver connection ? 1) Multiple connection
1) HTTP 2) FTP 2) Single connection

a
3) W3C 4) UDC 3) No Connection
13. the Communication protocol used by the internet 4) All of the above

ad
is ? 24. Favourites are accessible from the _____
1) HTTP 2) TCP/IP menu?
3) www 4) All the above 1) Start 2) Title
14. The first page that you view normally in web 3) Stop 4) File
site is ?
1) Google Page
3) Banner Page
2) Master Page
4) Home page
:K
25. the new favorite entry will be named ____ to
the title of the web page ?
1) Field 2) Long Run
15. For connection of internet you will need ? 3) Short­cut 4) All the above
1) An IP Address 2) TCP/IP connection 26. In which type of network the systems are
3) An ISP 4) All the above connected either with infrared rays or blue tooth?
nt
16. A user can get files from the another computer 1) PAN 2) LAN
on the internet by using ? 3) MAN 4) WAN
1) FTP 2) UTP 27. Which of the following can be share through
oi

3) HTTP 4) All the above network?


17. in reality internet protocol recognizes only ? 1) Database 2) Information
1) IP Address 3) Files 4) All of these
P

2) A postal mail address 28. Which of the following small, single site
3) A location of the host network?
4) Server 1) LAN 2) MAN
18. The ground station in VSAT communication
ng

3) PAN 4) WAN
called ? 29. Cable TV is example for which type of network?
1) HTTP 2) MULTIPLEXER 1) PAN 2) LAN
3) Hub 4) Repeater 3) MAN 4) WAN
ni

19. For a small website one need to buy space from 30. Internet and WWW is examples for which
the ? network ?
1) Network administrator 1) PAN 2) MAN
2) Telephone Exchange
r

3) LAN 4) WAN
3) ISP 31. Which version protocol is used in connection to
Tu

4) Internet society WAN ?


20. A host on the internet finds another hosts by its? 1) X.21 2) X.22
1) Postal Address 2) Electronic address 3) X.25 4) X.26
3) IP Address 4) Name 32. X.25 is a
21. What do u need to put yours web pages in 1) Connectionless protocol
WWW ? 2) Connection oriented protocol
64 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
3) Connection terminator 44. Which of the following is a connection medium
4) All of these in the network?
33. Which of the following is not a topology? 1) Cables 2) Optical fibers
1) Bus LAN 2) Star LAN 3) Wireless medium 4) All of these
3) Ring LAN 4) Mesh LAN 45. The type of network, where outside organization
5) None of these not allowed for database access is called?
34. In which LAN , The central passing cable acts 1) Intranet 2) Extranet
as Backbone of Network? 3) Public network 4) All of these
46. The type of network, where outside organization

pa
1) Bus LAN 2) Star LAN
3) Mesh LAN 4) Tree LAN is permitted for database access is called?
35. In which topology, n nodes will have n­1 1) Intranet 2) Extranet
connections between them? 3) Public network 4) All of these

a
1) Bus LAN 2) Star LAN 47. Which of the following software allows you to
3) Mesh LAN 4) Tree LAN connect to the remote server on network?

ad
36. In which topology, the tokens are issued to all 1) Intranet 2) Ethernet
the nodes for data transmission? 3) Telnet 4) Mallet
1) Bus LAN 2) Star LAN 48. Which of the following is set of rules that governs
3) Ring LAN 4) Tree LAN the network?
37. In which LAN , Each node will have the
connection with all the remaining nodes in the
network?
:K
49.
1) Ethernet
3) Monocot
2) Protocol
4) All of these
ARPANET came into existence for use, in
1) Bus LAN 2) Star LAN which year?
3) Mesh LAN 4) Tree LAN 1) 1949 2) 1959
38. In which topology, the same node(system) acts 3) 1969 4) 1989
nt
as both client and server in the network? 50. How many layers are present in OSI reference
1) Bus LAN 2) Star LAN model ?
3) Mesh LAN 4) Tree LAN 1) 7 2) 8
oi

39. Which of the device is used in LAN connection? 3) 9 4) 10


1) MODEM 2) HUB 51. In OSI Model, OSI Stands for?
3) ROUTER 4) Gateway 1) Open system interface
P

40. Which of the following is a type of Wide Area 2) Open system interconnection
Network Connection? 3) Open Source Interface
1) PSTN 2) PSDN 4) Open source interconnection
ng

3) VAN 4) ISDN 52. Which of the following is first layer in OSI


5) All of these model?
41. In FDM, which of the following used for 1) Application layer 2) Transport layer
separating the channels in network? 3) Data link layer 4) Physical layer
ni

1) RAM 2) ROM 53. Which of the following protocols are working in


3) Gateway 4) Band pas filters application layer?
42. Which type of data transmission is two way 1) SMTP 2) FTP
r

communication but not simultaneously in 3) DNS 4) POP


network? 5) All of these
Tu

1) Simplex 2) Half duplex 54. Which protocol is worked in receiving E­Mail in


3) Full duplex 4) All of these the web?
43. Telephone communication is which type of data 1) SMTP 2) POP
transmission? 3) FTP 4) DNP
1) Simplex 2) Half duplex
3) Full duplex 4) All of these
65 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
67. Which of the following 2 items created by server
55. Encryption to the data done in which layer?
while sending mail to others?
1) Application layer 2) Physical layer
1) Sender name , time
3) Transport layer 4) Presentation layer
2) Sender mail address, Time
56. In encryption, the plain text is converted into ?
3) Subject , body
1) Normal text 2) Cipher text
4) All of these
3) English text 4) Data text
68. Which is the storage house for e­mail
57. Acknowledgement provision is available in which
components online?
layer?
1) Inbox 2) Mail box

pa
1) Application layer 2) Physical layer
3) Sent box 4) Trash
3) Transport layer 4) Presentation layer
69. The deleted messages from e­mail box are
58. The network device that connects different
moved to ?
networks and different protocols is?

a
1) Recycle bin 2) Trash
1) MODEM 2) HUB
3) Inbox 4) Delete box
3) ROUTER 4) Gateway

ad
70. The email address of friends in e­mail are saved
59. Which device used in network layer of OSI
to ?
model?
1) E­mail box 2) Address book
1) MODEM 2) HUB
3) Phone list 4) Contact list
3) ROUTER 4) Gateway
60. The error detection and correction is done in
which layer of OSI model?
1) Application layer 2) Transport layer
:K
71. Which of this is not accepted in email address?
1) Spaces
3) Text
2) Underscore
4) Numbers
72. Which internet protocol version supports 128 bit
3) Data link layer 4) Physical layer
address length?
61. Which of the following network devices works
1) IPV3 2) IPV4
in data link layer?
nt
3) IPV5 4) IPV6
1) Switch 2) Bridge
73. The technology involved in taking the class room
3) Both 1&2 4) Router
teaching in computer without going to class
62. Which of the network device prevents data
oi

room?
signal from Attenuation?
1) E­Commerce 2) E­Governance
1) Repeater 2) HUB
3) E­Learning 4) All of these
3) ROUTER 4) Gateway
P

74. The small size animated pictures moving on


63. Which of the following is high speed internet
webpages are called?
connection?
1) Media 2) Flash
1) Dial up 2) DSL
ng

3) Podcast 4) Krish
3) Net 4) Node
75. Which button we press to reload a webpage ?
64. Which of the network device clears data traffic
1) Reload 2) Regenerate
in network and provides broadband internet
3) Refresh 4) All of these
Connection ?
ni

76. Which of the following is not a security threat?


1) MODEM 2) HUB
1) Virus 2) Worm
3) ROUTER 4) Gateway
3) Trojan horse 4) Spam
65. The process of authentication for connecting to
r

77. The self­replicated virus that can copy multiple


internet is called?
copies by itself is called?
1) Accessing 2) Login
Tu

1) Trojan horse 2) Logic bomb


3) Security 4) Scanning
3) Worm 4) All of these
66. Which of the following is a domain name?
78. Which of the following spreads when user takes
1) .NET 2) .ORG
action that triggers the bomb?
3) .GOV 4) .IN
1) Worm 2) Time bomb
5) All of these
3) Logic bomb 4) Micro virus
66 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
79. The superset of virus, worms, Trojan horse and 91. HTTP stands for
spyware is called? 1) Hyper Text Trend Protocol
1) Virus 2) Malware 2) Hyper Text Transfer Protocol
3) Freeware 4) Firmware 3) Hyper Text Trade Protocol
80. In digital signatures, the____ key will be with 4) Haryana Text Transfer Protocol
owners to manipulate the data base? 92. OCR Stands for ?
1) Private key 2) Public key 1) Optical Character Reader
3) Both of these 4) Secure key 2) Optical Code Reader
81. Which technique is used by hacker to get 3) Optical Character Recognition

pa
confidential details of others? 4) Optics Code Recognition
1) Siting 2) Watching 93. What is the full form of POP?
3) Phishing 4) Humming 1) PostOffice Protocol

a
82. Which of the following is antivirus program? 2) Point of Port
1) Anti­spyware 3) Point Of Protocol

ad
2) Trend micro antivirus 4) All of these
3) Norton 94. Which of the following are social networking
4) All of these sites?
83. Firewall is used to prevent unauthorized access 1) Linked in 2) Facebook
form both the sides as software and____?
1) Hardware
3) Spyware
2) Malware
4) Freeware
:K 3) Tweeter 4) All of these
95. Which of the following is Chatting Provider in
internet?
84. The property of involving intentionally for hacking 1) Yahoo messenger 2) Google Talk
the data is called? 3) Rediff Messenger 4) All of these
1) Time pass 2) Non malicious 96. Which of the below text does not support colored
nt
3) Malicious 4) Dragon text or fonts in E­Mail Text ?
85. The way of getting the deleted data from the 1) Plain text 2) HTML Text
cybercrime committed person system is? 3) Rich text 4) All of these
oi

1) Computer forensics 2) Malpractice 97. Which are the memory components that store
3) Hacking 4) All of these the web history on computer?
86. Opera, Mozilla, netscape navigator, safari are 1) Clouds 2) Cookies
P

examples for? 3) Clocks 4) Google


1) Webpages 2) System software 98. The IEEE standard cables that are used to
3) Web browsers 4) All of these connect computers to the network are called?
87. Which of the following is a search engine on
ng

1) Telnet 2) Ethernet
web? 3) Intranet 4) Extranet
1) Google 2) Yahoo 99. The process of searching for known virus in the
3) Delta 4) All of these system is called?
ni

88. Webpages are saved in ____ format ? 1) Shimming 2) Scanning


1) HTTP 2) HTML 3) Scamming 4) Finding
3) RTF 4) PDF 100. The unsolicited and bulk mails in E­Mail is called?
89. Antivirus is
r

1) Spam 2) Scam
1) System software 2) Application software 3) Storm 4) Virus
Tu

3) Utility software 4) Embedded software


90. Which allows you to view the websites on
internet?
1) Web browser 2) Search engine
3) Ethernet 4) Telnet

67 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
ANSWERS

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
1 2 3 1 3 4 1 2 1 4 4 1 2 4 4 1 1 2 3 3
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
4 1 1 1 3 1 4 1 3 4 3 2 5 1 2 3 3 4 2 5

pa
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
4 2 3 4 1 2 3 2 3 1 2 4 5 2 4 2 3 4 3 3
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80

a
3 1 2 3 2 5 2 2 2 2 1 4 3 2 3 4 3 3 2 1

ad
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
3 4 1 3 1 3 4 2 3 1 2 3 1 4 4 1 2 2 2 1

:K
IMPORTANT ABBREVIATIONS

AES  Advanced Encryption Standard


AI  Artifical Intelligence
ALGOL  Algorithmic Language
ALU  Arithmetic Logic Unit
nt

ANSI  American National Standard Institute


API  Application Programming Interface
ARPANET  Advance Research Projects Agency Network
oi

ASCII  American Standard Code for Information Intercahnge.


ASP  Application Service Provider
P

ATM  Asynchronus Transfer Mode


ATM  Automated Teller Machine
AWT  Abstract window toolkit
ng

BASIC  Beginer’s All purpose Symbolic Instruction Code


BCD  Binary Code Decimal
BFS  Breadth First Search
BIOS  Basic Input out put Systems
ni

BIT  Binary Digit


BMP  Basic Multilingual Plane (BITMAP)
CAD  Computer Aided Design
r

CASE  Computer Aided Software Engineering


Tu

CD  Compact Disc
CDR  CD Recordable
CDMA  Code Division Multiple Access
CDROM  Compact Disc Read only Memory
CDRW  CD Rewritable
CGI  Computer Generated Imagery
68 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
CISC  Complex Instruction Set Computer
CMOS  Complimentory Metal Oxide Semiconductor
COBOL  Common Business Oriented Language

Unreliable for Message Delivery


CPU  Central Processing Unit
CRT  Cathode Ray Tube.

Connection Less Protocol


CU  Control Unit

Ex : Televesion Broadcasting
User Datagram Protocol
DBMS  Data Base Management System
DDL  Data Definition Language

pa
DFS  Depth First Search

UDP
DML  Data Manipulation Language
DNS  Domain Name System
DPI  Dots Per Inch

a
DRAM  Dynamic Random Access memory
DSL  Digital Subscriber Line

ad
DSS  Decision support system
DVD  Digital Versatile Disc
DVI  Digital Visual Interface

Reliable for Message Delivery


Transmission Control protocol
Connection Oriented Protocol
DVR  Digital Video Recorder :K
EBCDIC  Extended Binary Code Decimal Interchange Code
EDI  Electronic Data Interchange
EDSAC  Electronic Delayed storage Automatic Computer
EDVAC  Electronic Discrete variable Automatic Computer.. TCP
EEPROM  Electronically Erasable Programmable Read only memory
nt

Ex : E ­ mails
E­MAIL  Electronic Mail
ENIAC  Electronic Numerical Integrator and Calculator
EPROM  Erasable Progeammable Read only memory
oi

ERM  Entity Relationship Model


EXE  Executable
FDMA  Frequency Division multiple Access
P

FIFO  First In First Out


FORTRAN  Formula Translation
FTP  File Transfer Protocol
ng

GB  Giga Byte
Gb  Gigabit
GHZ  Giga Hertz
ni

GIF  Graphics Interchange Format


GPRS  General Packet Radio Service
GPS  Global Positioning System
r

GSM  Global System for mobile telecommunication


GUI  Graphical User Interface
Tu

HDD  Hard Disk Drive


HDV  High Definition Video
HLL  High Level Language
HP  Hewlett packard
HTML  Hyper Text Markup Language

69 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
HTTP  Hyper Text Transfer Protocol
IBM  International Business Machine
IC  Integrated Chip (circuit)
ICMP  Internet control message protocol
IE  Internet Explorer
IMAP  Internet Message Access Protocol
IP  Internet Protocol
IPV  Internet Protocol Version

pa
IRC Internet relay chat
ISDN  Integrated Services Digital Network
ISO  International Standardization Organization
ISP  Internet Service Provider

a
IT  Information Technology
ITU  International Telecommunication Union

ad
JPEG  Joint Photographic Experts Group
JSP  Java Server Pages
Kb  Kilobit
KB  KiloByte
Kbps  Kilo bits Per second
KBPS  Kilo Bytes Per Second
:K
KYC  Know Your Customer
LAN  Local Area Network
LASER  Light Amplification by Stimulated Emission of Radiation
nt
LCD  Liquid Crystal Display
LED  Light Emitting Diode
LIFO  Last In First Out
oi

LISP  List Processing


LSI  Large Scale Integrator
MAC  Media Access Control
P

MAN  Metropolition Area Network


MANET  Moble Ad­Hoc Network
MB  Mega Byte
ng

Mb  Megabit
MbPS  Mega bits per Second
MBPS  Mega bytes Per Second
ni

MCA  Micro Channel Architecture


MHZ  Mega Hertz
MICR  Magnetic Ink character Recognization
r

MIDI  Music Instrument Digital Inferface


MIME  Multipurpose Internet Mail Extension
Tu

MIPS  Million Instructions Per Second


MMS  Multimedia Message Service
MODEM  Modulator Demodulator
MPEG  Moving Pictures Experts Group
MSDOS  Microsoft Dos

70 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MU  Memory Unit
NACS  Netware Asynchronous communication services
NIC  Network Interface Card
NT  New Technology
OCR  Optical Character Recognition
OMR  Optical Mark Recognition
OOP  Object Oriented Programming
ORG  Organization

pa
OS  Operating System
OSI  Open System Interconnection
P2P  Peer to Peer
PAN  Personal Area Network

a
IMPORTANT PERSONS
PC  Personal Computer
Micro Processor ­ Marcian Hoff
PDA  Personal Digital Assistant

ad
PDF  Portable Document Format Father of Computer ­ Charles Babbage
POP  Post Office Protocol C Language ­ Dennis Ritchew
POST  Power on Self Test Microsoft Founder ­ Bill Gates
PPI  Pixels Per Inch
PPP  Point to Point Protocol
PPT  Power Point Presentation
:K
Apple Company Founder ­
Father of Internet ­
Steve Jobs
Vinton Cerf

PROM  Programmable Read Only memory


PSDN  Public Service Digital Network
PSTN  Public Switched Telephone Network
nt
RAID  Redundant Array of Independent Disks
RAM  Random Access Memory
RATS  Regression Analysis of Timeseries
oi

RDBMS  Relational Database Management System


RISC  Reduced Instruction Set Computer
ROM  Read Only Memory
P

SATA  Serial Advanced Technology Attachment


SDM  Space Division Multiplexing
SDMC  Secure Digital Memory Card
ng

SDRAM  Synchronus Dynamic Random Access Memory


SIM  Subscriber Identity Module
SMPS  Switch Mode Power Supply
ni

SMS  Short messaging Service


SMTP  Simple Mail Transfer Protocol
SNMP  Simple network management protocol
r

SP2  Service Pack 2


SQL  Structure Querry Language
Tu

SRAM  Static Random Access Memory


STP  Shielded Twisted Pair Cables
TB  Tera Byte
TCP  Transmission Control Protocol
TDM  Time Division multiplexing

71 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
TIFF  Tagged image file format
TRAI  Telephone Regulatory Authority of India
TTL  Transistor Transistor Logic
TV  Television
UDP  User Datagram Protocol
UPS  UnInterruptible Power Supply
URL  Uniform Resource Locator
USB  Universal Serial Bus

pa
VAN  Value Added Network
VB  Visual Basic
VGA  Video Graphics Array
VIRUS  Vital Information Resource Under Seize

a
VLSI  Very Large Scale Integrator
VM  Virtual Memory

ad
VOIP  Voice Over Internet Protocol
VPN  Virtual Private Network
VT  Video Terminal
WAN  Wide Area network
WAP  Wireless Application Protocol
Wi Max  World wide Inter operability for Microwave Access
:K
Wi­fi  Wireless Fidelity
Windows Me  Windows Millenium
Windows NT  Windows New Technology
nt
WWW  World Wide Web
XHTML  Extensible Hypertext Markup Language
XML  Extensible Markup Language
oi

ZIP  Zone Information Protocol.


P

FILES & EXTENSIONS


File : The memory in computer is stored in files & they have file names
File Extension : The suffix of the file name, that indicates the fype of format & its contents.
ng

Note : We see different File extensions separately


i) Text files :
. doc  document File ( MS Office Word 2003)
. docx  document file (MS Office Word 2007/10/13)
ni

.RTF  Rich Text Format


. txt  Plain text file (Note Pad)
r

2) Image files :
. jpg (or) .jpeg  joint photographic experts group
Tu

. bmp  bitmap
. gif  Graphics Interchange Format
. Png  Portable Network Graphics.
. tif  Tagged Image file

72 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
3) Audio Files :
. mp3  media player 3
. amr  for small GSM mobiles
. wma  windows media Audio file
. midi  MIDI file
.aac  Advanced Audio Codio (MPEG­4)
4) Video Files :
. flv  Flash video

pa
. 3gp  used in GSM mobiles (Small mobiles)
. mp4  MPEG ­4 Video file
. wmv  windows media video file

a
. mpeg  moving pictures experts group
5) Other Files :

ad
. pdf = Portable document format
. PMD = Page maker Document file
. SYS = System Files
. exe = executable file
. torrent = bit torrent file
:K
IMPORTANT TERMS
nt
1) UPS : Uninterruptible Power Supply
 The device which gives continuity to process work even when power off's
 It provides Battery power to the attached / connected devices.
oi

Ex : for Computers, Fans,Tv's, Printers etc, We connect the UPS


2) MCA : Micro channel Architecture
 It is the chip architecture developed by IBM
P

 It allows 16­32 Bit address length


3) Instructions in Processor & Their types :
ng

 We can divide processor into CISC & RISC based on ther complexity in Instructions
CISC RISC
­ Complex Instruction Set Computer ­ Reduced Instruction set computer
­ It allows more number of ­ It allows small & limited number of signals
ni

micro electronic signals


­ It uses complex addressing modes ­ It uses simple addressing modes
Ex: Pentium Pro, II, III Ex: IBM Rs ­ 6000, MC­88100
r
Tu

4) RAID : Redundant Array of Independent Disk


 It combines multiple diskdrive components into Logical unit
 It consists many number of copies having same data to provide fault tolerance.
5) Surge Protector : Appliance used to protect electrical devices from voltage spikes.
* Voltage spikes means high voltage & low voltages.

73 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
6) Instruction Cycle : It is the base processing cycle of computer
 process starts from fetch cycle and ends with execute cycle
[ fetch instruction  Decode  evaluate Address  Fetch operands  execute  Store]
tore]
7) OOP : Object Oriented Programming
The concepts / objects of oop are : 1) Class
2) Object
3) Data Abstraction

pa
4) Data Encapsulation
5) Polymorphism
6) Inheritance
7) Overloading

a
8) Message Passing
Note : Basic oop concepts are only 5, which are numbered from 3 to 7 in list.

ad
Here
Polymorphism : Existing two or more forms for a single class
Inheritance : Acquiring features of parent class to the child class
8) Logic gate families : DTL, TTL, ECL, etc.,
* ECL is the fastest logic family
:K
9) POS Terminals / Systems :
 POS stands for point of sale
nt
 The POS systems or terminals are used in super markets and shopping complex for billing the
products through bar code Readers
oi

 Through Bar code itself, they even find the offers & discounts on the special products in PSS systems.
10) MS Paint :
P

 The basic free painting tool prodvided by windows to draw the pictures.
 This is found in all systems where they are using windows operating system.
11) Spooling:
ng

 The process of maintaining order of printing pages in printer device


 It is maintained by spooler (Numeric code)
12) Tab Key : To indent (represent) the paragraph
ni

13) Podcast : The files of image, text, audio, video in the internet ready to download
14) Access Time : Time read data from a peripheral data storage
r

15) Adder : The digital logic circuits that implements adding process in ALU for 2 or more binary numbers
Tu

16) Alpha Numeric Data : A to Z and 0 to 9


17) Applet : The java application downloaded by webserver and runs on users computer
Ex: Financial Calculators
18) Band Width : The amount of data that sents through network connction
 Internet speed depends on band with
74 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
19) Baud Rate : Measuring amount of data transfered in one second
 Modem speed is measured through baud rate
20) Bluray Disk : Red laser beem to read and write data on disk
 Single layer disk up to 25 GB
 Double layer disk up to 50 GB
21) C Language : Developed in AT and T labs

pa
22) CAD : Computer Aided Design
 Civil Engineers use CAD to Draw Building Plans in Computer
23) CODEC : Compression and DE compression

a
Ex: Cinepak and MPEG

ad
24) Crash : The Hardware or Software problem that causes information to be lost on computer or to shutdown
automatically
25) DDR : Double Data Rate (RAM) A type of SDRAM to fast delivery of data.
EX : DDR­2, DDR­3
26) Directory: List of files stored in computer
:K
27) Documentation : The documents that contain code, flowchart, algorithm, result in written form
28) Ethernet Card (NIC) : Network interface card, it is a board in CPU, to connect network cables
29) HTML : Hypertext Markup Language
nt

 Web pages are saved in HTML Format


30) IP Address : It is divided in to four segments with 32 bit address Length
oi

Ex: 162.150.20.15
31) Logic Gates : A digital circuit result in output based on states of input signals
P

AND  All input must be in '1', to produce '1' as output


OR  Any one input or more is '1' to produce '1' as output
ng

NOT  It is also card inverter


 It has only one input one output
 If input is '1', the out put is '0', viceversa
ni

NOR  Any one input or more is '1' to produce '0' as output


NAND  All input must be in '1', to produce '0' as output
XOR  If any one input is '1' , but not if 2 or more input are '1', the out put is '1'
r

32) LOOP : The repetition of program instruction until a conditional exit is occured
Tu

33) Surfing : Exploring (browsing) the Internet


34) Syntax : A set of grammatical rules defining valid use of specific commands & Instructions in a Computer
Language.

75 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
35) Telnet : It is an IP (Internet Protocol) that let you to connet computer as remote server to any where in the
world & to use that computer as if you were logged on locally.
36) TRACK : A ring on surface of magnetic disk
37) TWAIN : Technology Without An Interesting Name
 It is related to scanner
38) ZOOM : Process of enlarging or reducing image size displayed on computer monitor.

pa
39) ZIP : Zonal Information Protocol
 Compression of application files.
40) Mobile Phone Software : android, symbian, ios, bada, etc.,

a
41) Digitization : Process of converting voice, text, audio, video in to digital form

ad
42) Veronica : It is a place where Gopher Protocol is applied
43) Circuit Switching : Method used in PSTN system where there is a direct connection between communicating
devices.
44) Skype : Application for video chat through internet. :K
45) Peripherals : except CPU, remaining connecting devices to computer
Ex: Pendrives, Printers, Scanners, etc.,
46) E-learning : The process of attending class through online in computer without going to class room
47) MOSAIC : First browser in web
nt

48) Sector : Section of recording track on magnetic disk


49) Spider : The process followed by search Engine to investigate new pages on website & collect the
oi

information that needs to be put in their index


50) Streaming : Taking packets of information (Audio or Video) from internet & storing it in temproary files to
P

allow it to play in continuous flow.


51) Toggle Key : The key which performs two actions
ng

ex: Caps lock Key


52) IMEI : International Mobile Equipment Identity
r ni
Tu

76 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 1 10. The talk or music,that is available on internet in
digital form for automatic download is?
01. A person who uses his expertise to gainaccessto (1) wiki (2) Broadcast
others computers to get information illegally is: (3) Podcast (4) VIDEOCAST
(1) analyst (2) Hacker 11. What is the name given to those applications that
(3) Spammer (4) Programmer combine text,sound and graphics,video..?
02. _____allows users to upload files to an online (1) Multidata (2) File
site so that they can be viewed and edited from (3) Multi audio (4) Multimedia
12. A_____Language reflects the way people think

pa
Otherdestination.
(1) Microsoft outlook mathematically?
(2) Web­hosted technology (1) 3G (2) 4G
(3) Office live (3) Functional (4) Mathematical

a
(4) None of these 13. When entering text in a document,the ENTER
03. What feature adjusts the top and bottom margins key is pressed at the end of every?

ad
that the text is centered vertically on the Printed (1) Line (2) Word
page? (3) Letter (4) Paragraph
(1) Vertical centering 14. The real time telephone call between users by
(2) Horizontal Centering using computers is called?

04.
(3) Dual centering
(4) all of these
The letter and number of the intersecting column
:K
15.
(1) Chatting
(3) Instant message
(2) E­mail
(4) Internet telephony
Which of the following software could assist
and row is the … someone who cannot use their hands for
(1) Cell referencing computer input ?
(2) Cell address (1) Audio digitizer (2) Voice recognization
nt
(3) Cell coordinates (3) Synthesizer (4) Voice acceptor
(4) Cell contents 16. Which memory holds the currently processing
05. A detailed written description of programming by CPU?
oi

cycle and the program, along with the test results (1) Mass memory (2) Cache memory
and Printout of the program is … (3) Internal memory (4) External memory
(1) report (2) directory 17. What refers to a set of characters of a particular
P

(3) Output (4) Documentation design ?


06. In power point, the Header and footer are present (1) Calligraph (2) Style
on INSERT tab in what group? (3) Typestyle (4) Format data
ng

(1) Tables group (2) Objects group 18. Which language used by public and private
(3) Text group (4) Not present companies to publish and share financial info.
07. To find the paste special option , you use the With each other and industry analysis across all
clipboard group on the ___ tab of PPT? platforms and the internet ?
ni

(1) Home (2) Edit (1) XML (2) HTML


(3) Find (4) Format (3) XBRL (4) Java
(5) Not found 19. Which type of internet connection require
r

08. A________Program is one that is ready to run telephone line but provides faster access than
and does not need to be altered in any way? dial up ?
Tu

(1) interpreter (2) High level (1) Cable access (2) DSL
(3) Executable (4) Compiler (3) Broadband (4) Modem
09. __________store the visited data of internet 20. What is the significance of a faded(dimmed)
websites on your computer? command in pull down menu?
(1) RAM (2) ROM (1) The command is working
(3) cookies (4) CMOS (2) Command is selected
77 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
(3) The command is currently not accessible (1) Ctrl+ Shift (2) Ctrl+ Enter
(4) All of these (3) Shift+ Enter (4) Shift+ Break
21. Which of these allows you to access your email 33. Grouping and processing all of a firm’s
from anywhere? transactions at one time is called ?
(1) Forum (2) Blog (1) Real time system
(3) Message board (4) Webmail interface (2) Batch processing
22. Which of the following you find on LINKEDIN? (3) Online system
(1) Connections (2) ChatC.Games (4) Combine system
(3) Mails (4) Links 34. A central computer that holds collections of data

pa
23. Which is a technique used to send more than and programs for many PC’s, workstations, and
one call over a line? Other computers is an ….
(1) Multithreading (2) Multiplexing (1) Minicomputer (2) Microcomputer

a
(3) Streaming (4) Transmission (3) Server (4) Laptop
24. Which of the following information systems 35. You can______ a search by providing keywords

ad
focuses on making manufacturing processes and information is provided by search engine
more efficient and of higher quality ? (1) Refine (2) Expand
(1) CAD (2) CIM (3) Query (4) Load
(3) Computer aided software Engineering 36. The contents of which lost when the computer

25.
(4) Computer aided system Engineering
A mistake in algorithm that causes incorrect
results is ?
:K turns off .
(1) Storage
(3) Output
(2) Input
(4) Memory
(1) logical error (2) Syntax error 37. The _____enables you to simultaneously keep
(3) both of these (4) None of these multiple web pages open in one browser window?
26. What is the device for changing the connection (1) Tab box (2) Pop up window
nt
on a connector to a different configuration? (3) Tab row (4) Address bar
(1) Converter (2) Component 38. A DVD is an example of an
(3) Voltchanger (4) Adapter (1) hard disk (2) Optical disk
oi

27. Codes containing lines of various width and length (3) Output device (4) All of these
that are readable by computer are ? 39. _____ is the process of dividing the disk into
(1) OCR Scanner (2) ASCII Code tracks and sectors .
P

(3) Bar code (4) Binary code (1) Formatting (2) Tracking
28. Block number, block description and number of (3) Allotting (4) Crashing
parts are example of? 40. Which ports connect special types of music
(1) Output (2) Input
ng

instruments to sound cards?


(3) Data (4) Both 2 and 3 (1) CPU (2) BUS
29. Computers use_____ number system to store (3) USB (4) MIDI
data and perform calculations. Answers
ni

(1) Binary (2) Octal 1) 2


2) 2 3) 1 4) 2
(3) Decimal (4) Mathematical 5) 4
6) 3 7) 1 8) 3
30. ________ Are the attempts made by individuals
9) 3
10) 3 11) 4 12) 3
to obtain confidential information from you by
r

Falsifying their identity? 13) 4


14) 4 15) 2 16) 3
Tu

(1) Spyware scams (2) Phishing trips 17) 1


18) 3 19) 2 20) 3
(3) Virus (4) Identity theft 21) 4
22) 1 23) 2 24) 3
31. The default view in MS­Excel is_______ view 25) 1
26) 4 27) 3 28) 4
(1) Work (2) Auto 29) 1
30) 2 31) 4 32) 2
(3) Roman (4) Normal
32. What is the key combination for page break?
33) 2
34) 3 35) 1 36) 4
37) 3
38) 2 39) 1 40) 4
78 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 2 12. In computer most processing takes place
in________
01. Which function key is used for file renaming (1) Memory (2) CMOS
option by selecting it with single click? (3) Mother board (4) CPU
(1) F3 (2) F4 13. Which option is correct to erase the data in a
(3) F5 (4) F2 range of cells that are selected using menu ?
02. In excel ___ allows users to bring together (1) Select the cells, choose edit and select
copies of workbooks that are separately clear, than all
(2) Select the cells and press delete

pa
made?
(1) Copying (2) Pasting (3) Select the cells and press backspace
(3) Merging (4) Compiling (4) We cannot delete all cells at a time
03. Which of below provides you to connect your 14. If we need to link MS­Excel sheet to MS­PPT,

a
computer from remote system to use internet? Which is correct option from menu ?
(1) E­mail (2) Telnet (1) Edit, paste (2) Edit ,paste special

ad
(3) FTP (4) Instant message (3) Edit, copy (4) File copy paste
04. ____are words that a programing language 15. Which of the following is hardware but not
has set aside for its own usage? software?
(1) Control structures (2) Reserved words (1) BIOS (2) Excel

05.
(3) Special words (4) No words
To reload a web page , press _____ button?
(1) Redo (2) Reload
:K
16.
(3) Control Unit (4) Operating system
The ALU Performs_______ operations
(1) Log based (2) ASCII
(3) Restore (4) Refresh (3) Algorithm based (4) Arithmetic
06. When the pointer is positioned on a ____ .it is 17. To get the save as option which is the function
shaped into hand symbol key is to be used?
nt
(1) Grammar error (2) Spell mistake (1) F2 (2) F6
(3) Hyperlink (4) Interrupt (3) F8 (4) F12
07. In computer language Kb Stands for? 18. If we press F8 for three times, which of the
oi

(1) Kilo byte (2) Kilo bit below is selected in document?


(3) Kernel Byte (4) kilo binary (1) Letter (2) Word
08. Which of the below is a special visual effect (3) Line (4) Entire document
P

applied in slides? 19. Nibble is of how many bits?


(1) Animation (2) Flash (1) 8 (2) 4
(3) Wipe (4) Dissolve (3) 2 (4) 1
ng

09. Which of the following is a magnetic disk and 20. In windows ME, M stands for?
storage device? (1) Millennium (2) Micro
(1) Hard disk (2) CD (3) Macro (4) Multi
(3) DVD (4) Pen drives 21. Which of the following is required to create
ni

10. The device which converts digital signal into HTML document?
analog that can travel through telephone lines (1) Browser (2) Internet
is ? (3) Search engine (4) Text editor
r

(1) Router (2) MODEM 22. A_____ uses pressure as a user presses it
(3) Converter (4) CPU with a stylus to send signals?
Tu

11. The process of storing large number of files in (1) TrackPoint (2) Track pad
a small amount of storage space? (3) Mouse (4) Touchpad
(1) File format (2) File depriving 23. A partially completed workbook that contains
(3) File compression (4) None of these formulas and formatting, but no data is called?
(1) Model (2) Prototype
(3) Template (4) Function
79 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
36. The set of values that you want prepare chart
24. To open find+ replace dialogue box , what is
in MS­Excel are called?
the shortcut key?
(1) Objects (2) Data series
(1) Ctrl+ F (2) Ctrl+G
(3) Numbers (4) Formulas
(3) Ctrl+H (4) ALL OF THESE
37. Before you can send e­mail, you must have
25. The open, print ,and save buttons are all
an?
located on the __
(1) Browser (2) Modem
(1) Formatting tool bar
(3) Account (4) Scanner
(2) Standard tool bar
38. The button that displays the window over the

pa
(3) Title bar
entire screen is?
(4) None of these
(1) Minimize (2) Downsize
26. The name of ms­office document is displayed
(3) Big size (4) Maximize
in both the_______ and task bar..

a
39. Computers process data into information by
(1) Title bar (2) Status bar
working exclusively with?
(3) Format bar (4) Tool bar

ad
(1) Multimedia (2) Words
27. The higher the resolution of a monitor, the
(3) Characters (4) Numbers
(1) Lesser the pixels number
40. Java is example of
(2) Less clear the screen
(1) Machine language (2) High level language
(3) Further apart the pixels

28.
(4) Closer together the pixels
To select a word , we click mouse on it for
(1) Once (2) Thrice
:K
Answers
(3) 4G language (4) None of these

(3) Twice (4) 4 TIMES


29. Expansion cards are inserted into 1) 4 2) 3 3) 2 4) 2
(1) CPU (2) Slots
nt
5) 4 6) 3 7) 2 8) 1
(3) Back of computer (4) We cannot do
30. A pixel is a 9) 1 10) 2 11) 3 12) 4
(1) Dot on the screen (2) Point of ink 13) 1 14) 2 15) 3 16) 4
oi

(3) Light beam (4) Ray of light


31. The file that created through word processing 17) 4 18) 3 19) 2 20) 1
is a
21) 4 22) 4 23) 3 24) 4
P

(1) database file (2) Storage file


(3) Worksheet (4) Document file 25) 2 26) 1 27) 4 28) 3
32. Web pages are saved in __________ format
29) 2 30) 1 31) 4 32) 3
ng

(1) HTTP (2) DOC


(3) HTML (4) JAVA 33) 2 34) 1 35) 1 36) 2
33. The wheel between two standard buttons of a
37) 3 38) 4 39) 4 40) 2
mouse is used to?
ni

(1) Shut down (2) Scroll


(3) Jump to next window (4) No use
34. Which type of software used to design
r

products, structures, civil engineering, drawing


etc?
Tu

(1) CAD (2) MSPAINT


(3) JAVA (4) Adobe
35. What is the term for calculations used within
spreadsheets?
(1) Formulas (2) Ranges
(3) Arguments (4) Values
80 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 3 12. The device that connects to a network without
01. When computer is working on the given the use of cables is said to be?
instructions it is called ? (1) Cabled (2) Centralized
(1) Processing (2) Output (3) Distributed (4) Wireless
(3) Input (4) Storage 13. Menus are a part of ?
02. An input device that is widely used in (1) Hardware (2) Status bar
supermarkets for billing the items is? (3) User interface (4) Monitor
(1) Keyboard (2) Bar code reader 14. Program that is used to view the web pages is
called ?

pa
(3) Mouse (4) Trackball
03. Which of the following converts source program (1) Word processor (2) Web viewer
into object code? (3) Search engine (4) Web browser
(1) Mouse (2) CPU 15. Tool bars contain small outlined areas called ___

a
(3) Compiler (4) Tester that provide shortcuts for quick access to
04. ____ is a cross between a human language and Commonly used commands.

ad
a programing language? (1) Bullets (2) Numbers
(1) Compiler (2) Java (3) Buttons (4) Dials
(3) JVM Machine (4) Pseudo code 16. A business customer records and payrolls would
05. The components that process data are located best to be stored as___ file
in the ?
(1) Input device
(3) Output device
(2) System unit
(4) Monitor
:K
17.
(1) Worksheet
(3) Database
(2) Document
(4) Presentation
A microprocessor is brain of computer and also
06. In the binary language each letter of the alphabet, called?
each number and each special character is made (1) Macrochip (2) Microchip
of unique combination of ? (3) Macroprocessor (4) Calculator
nt
(1) 8 kb (2) 8 MB (5) None of these
(3) 8 bits (4) 8 bytes 18. Storage and memory differ with respect to which
07. Which software works with end­users, of the following characteristics?
oi

application software and computer hardware to (1) Speed (2) Reliability


handle all technical works in computer? (3) Price (4) All of these
(1) Utility software (2) Backup software (5) None of these
P

(3) System Software (4) All of these 19. What are the examples of freeware?
08. which type of computers are least powerful, but (1) Shareware and file sharing
widely used and fastest growing type? (2) MS­Word and Google Chrome
ng

(1) Mainframes (2) Supercomputers (3) Win Zip and Linux


(3) Mini computers (4) Microcomputers (4) All of these
09. Vendor­created program modifications are 20. The feature of ignorance by any application even
called________? when the disk drive fails and still under
ni

(1) Program (2) Punctur processing. The feature of application is called?


(3) Patch (4) Repair (1) Fault tolerance (2) Reliability
10. Graphical pictures that represent an object file, (3) Duality (4) All of these
r

folder..are called? 21. What are the four important requirements to


(1) Desktop (2) Icons (3) Windows connect to internet?
Tu

(4) Taskbar (5) Menus (1) Telephone line, Modem ,Computer and
11. The internet service that provides a multimedia communication software
interface to avail resources is? (2) Telephone line , Modem, Mouse and
(1) Telnet (2) WWW communication software
(3) FTP (4) Browser (3) Telephone line, computer, modem
(4) None of these
81 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
22. Which of the following not performed by (3) Process data into information
SERVERS? (4) Both 1 & 3
(1) Email processing (2) Word processing (5) None of these
(3) Database sharing (4) Website processing 32. Which of the following is a processing device?
23. Storage media such as a CD can read and write (1) MICR (2) Tablet PC
information using_________? (3) Scanners (4) Keyboard
(1) Magnetic strips 33. A___ is a set of governing rules in network?
(2) Magnetic dots (1) URL (2) Domain
(3) Laser beam of red light (3) Protocol (4) Hypertext

pa
(4) None of these 34. Which of the following is a format for encoding
24. Cache and RAM will lose their contents when pictures on a computer?
the power is off. They are called? (1) HTML (2) DOC
(3) MP3 (4) JPEG

a
(1) Dynamic (2) Volatile
(3) Static (4) Faulty (5) MPEG

ad
(5) Weak 35. Which is the shortcut to search word in
25. In general Every computer have one_____ and bookmarks that are saved in web browser ?
many of _________ as programs? (1) Ctrl+A (2) Ctrl+ C
(1) Application program And Operating system (3) Alt+D (4) Shift+D
(2) Utility software and application s/w
(3) Operating system and Application programs
(4) Mouse and monitors
:K
36. Which of the keys used to open the OPEN
Dialogue box ?
(1) F12 (2) Ctrl+F12
26. Main memory works with conjunction (3) Alt+F12 (4) Shift+F12
with_______. 37. Which of the following keys create symbol
(1) RAM (2) CPU copyright as ©?
nt
(3) Intel (4) All of these (1) Alt+ctrl+d (2) Alt+shift+c
27. A sales clerk at billing counter scans a tag on an (3) CRTL+ALT+C (4) ALT+DEL+C
item rather than entering price in system, that 38. Portrait and landscape are two types of?
(1) Page orientation (2) Paper size
oi

is?
(1) Input automation (3) Pge layout (4) Printing page
(2) Item data automation 39. Macros are present in MS­Word under which
P

(3) Scanning automation menu?


(4) None of these (1) Insert (2) Format
28. Microsoft office is example of? (3) Tools (4) Data
(1) Open source s/w 40. What is the default margin for MS­Word
ng

(2) Closed source s/w document in 2007 and 2003 Version ?


(3) Horizontmaket S/W (1) 1.0 and 1.7 (2) 1.0 and 1.25
(4) Vertical market s/w (3) 1.25 and 1.0 (4) as our wish
Answers
ni

29. We use ______ bar to enter URL of a web


page in computer? 1) 1 2) 2 3) 3 4) 4
(1) Menu (2) Title 5) 2 6) 3 7) 3 8) 4
(3) Web (4) Address
r

9) 3 10) 2 11) 2 12) 4


30. A popular way to providing online government 13) 3 14) 4 15) 3 16) 1
Tu

serves is 17) 2 18) 4 19) 3 20) 1


(1) I­LEARNING (2) E­Learning
21) 1 22) 2 23) 3 24) 2
(3) E­governace (4) Distance education
25) 3 26) 2 27) 1 28) 2
31. The main function of CPU is to?
(1) Carry out instructions 29) 4 30) 3 31) 4 32) 2
(2) Store data for future use 33) 3 34) 4 35) 3 36) 2
37) 3 38) 1 39) 3 40) 3
82 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 4 (1) CPU (2) slice of time
(3) stack (4) event
01. When you quickly press and releases the left 10. The blocks of code, included in the operating
mouse button twice , you are— system, that software applications Interact with
(1) Primary­clicking (2) pointing are known as :
(3) Double­clicking (4) Secondary­clicking (1) application programming interfaces (APIs).
02. The horizontal and vertical lines on a worksheet (2) complimentary metal­oxide conductors
are called— (CMOS).
(3) device drivers.

pa
(1) cells (2) sheets
(3) block lines (4) gridlines (4) bootstrap loaders.
03. To delete an incorrect character in a 11. MS­DOS is a __________ operating system.
document,________to erase to the right of (1) point­and­click (2) user­friendly

a
The insertion point. (3) command­driven (4) Mac
(1) end (2) delete 12. A spooler is a(n):

ad
(3) backspace (4) both b and c (1) location in memory that maintains the
(4) none of these contents of a document until it prints out.
04. The operating system does all of the following (2) print job.
EXCEPT: (3) program that coordinates the print jobs that
(1) provide a way for the user to interact with
the computer.
(2) manage the central processing unit (CPU).
:K are waiting to print.
(4) message sent from the printer to the operating
system when a print job is completed.
(3) manage memory and storage. 13. Virtual memory is typically located:
(4) enable users to perform a specific task such (1) on a floppy disk. (2) in the CPU.
as document editing. (3) in a flash card. (4) on the hard drive.
nt
05. During the boot process, the____________ 14. The purpose of a swap (or page) file is to:
looks for the system files. (1) maintain pages of documents that are being
(1) CD (2) BIOS spooled to the printer.
oi

(3) CPU (4) DVD (2) hold a program’s data or instructions in virtual
06. _________ is the ability of an operating system memory when it can’t fit in RAM.
to control the activities of multiple Programs at (3) prevent thrashing in a multitasking
P

the same time. environment.


(1) Multitasking (2) Streamlining (4) allow multiple print jobs to print their pages
(3) Multiuser (4) Simulcasting out simultaneously.
ng

07. The unique signal, generated by a device, that 15. The definition of thrashing is:
tells the operating system that it is in Need of (1) swapping data between virtual memory and
immediate attention is called an : RAM too frequently.
(1) action. (2) event. (2) insufficient hard disk space.
ni

(3) interrupt. (4) activity (3) too many processors being managed by the
08. An interrupt handler is a(n): operating system.
(1) location in memory that keeps track of (4) inaccurate information stored in the registry
r

recently generated interrupts. 16. All of the following are TRUE of Safe Mode
(2) peripheral device. EXCEPT:
Tu

(3) utility program. (1) Safe Mode is a special diagnostic mode.


(4) special numeric code that indicates the (2) Safe Mode loads all nonessential icons.
priority of a request. (3) Safe Mode allows users to troubleshoot
09. The operating system controls access to the errors.
processor by assigning a(n) ____________ to (4) Safe Mode loads only the most essential
each task requiring the processor’s attention. devices.
83 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
17. Verification of a login name and password is (3) more than one window can be open at a time.
known as: (4) toolbars and scrollbars are features of
(1) configuration. (2) accessibility. windows.
(3) authentication. (4) logging in. 25. All of the following statements concerning files
18. The combination of the operating system and the are true EXCEPT—
processor is referred to as the Computer’s: (1) A file is a collection of related pieces of
(1) CPU. (2) platform. information stored together for easy
(3) BIOS. (4) CMOS Reference.
(2) Files can be generated from an application.

pa
19. Which of the following is the correct sequence
of actions that takes place during the Boot­up (3) Files are stored in RAM.
process? (4) Files should be organized in folders.
(1) Load operating system ? Activate BIOS ? 26. Using Windows Explorer, a plus (+) sign in front

a
Perform POST ? Check configuration Settings of a folder indicates—
(2) Activate BIOS ? Perform POST ? Load (1) an open folder.

ad
operating system ? Check configuration (2) the folder contains subfolders.
Settings (3) a text file. (4) a graphics file.
(3) Perform POST ? Load operating system? 27. In Windows XP, if you want to see the file size
Activate BIOS ? Check configuration Settings and modified dates of all files in a Folder, the
(4) Activate BIOS ? Check configuration
settings? Perform POST ? Load operating
System
:K best viewing option is the __________ view.
(1) List
(3) Details
(2) Thumbnails
(4) Icon
20. All of the following are steps involved in the boot 28. All of the following are examples of real security
process EXCEPT: and privacy risks Except _____
(1) load the operating system into RAM. (1) hackers (2) spam
nt
(2) the power­on self­test. (3) viruses (4) identify theft
(3) activate the basic input/output system 29. The OSI model is divided into _______
(BIOS). processes called layers.
oi

(4) load application programs. (1) five (2) six


21. The _______, stored on a ROM chip, is (3) seven (4) eight
responsible for loading the operating System from 30. System software is the set of programs that
P

its permanent location on the hard drive into enables your computer’s hardware and ______
RAM. software to work together.
(1) BIOS (2) API (1) management (2) processing
ng

(3) device driver (4) supervisor program (3) utility (4) application
22. The basic input/output system (BIOS) is stored 31. ________ are specially designed computer
in : chips reside inside other devices, such as Your
(1) RAM. (2) ROM. car or your electronic thermostat.
ni

(3) the CPU. (4) the hard drive. (1) Servers


23. Ensuring that the essential peripheral devices are (2) Embedded computers
attached and operational is the_______ process. (3) Robotic computers
r

(1) configuration (2) CMOS (4) Mainframes


(3) POST (4) ROM 32. The following are all computing devices ,
Tu

24. All of the following statements concerning except.........


windows are true EXCEPT— (1) notebook computers
(1) windows is an example of a command driven (2) cellular telephones
environment. (3) digital scanners
(2) windows can be resized and repositioned on (4) personal digital assistants
the desktop.
84 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
33. In a ring topology , the computer in possession Answers
of the ______ can trasmit data 1) 3 2) 4 3) 2 4) 4
(1) packet (2) data 5) 2 6) 1 7) 3 8) 4
(3) access method (4) token
9) 2 10) 1 11) 3 12) 3
34. ________ Viruses are often transmitted by a
floppy disk left in the floppy drive 13) 4 14) 2 15) 1 16) 2
(1) Trojan horse (2) Boot sector 17) 3 18) 2 19) 2 20) 4
(3) Script (4) Logic bomb 21) 1 22) 2 23) 3 24) 1
35. URL stands for ........ 25) 3 26) 2 27) 3 28) 2

pa
(1) Universal Research List 29) 3 30) 3 31) 2 32) 3
(2) Universal Resource List 33) 4 34) 2 35) 3 36) 4
(3) Uniform Resource Locator
37) 2 38) 4 39) 1 40) 1

a
(4) Uniform Research Locator
36. A database management system (DBMS) is
Test - 5

ad
a.......
(1) hardware system used to create,maintain and 01. Which term identifies a specific computer on the
provide controlled access to a DB web and the main page of the entire Site ?
(2) hardware system used to create, (1) Link (2) Web site address
maintain,and provide uncontrolled access
to DB
(3) software system used to create,maintain,and
:K
02.
(3) Hyperlink (4) Domain name
The code that relational database management
systems use to perform their Database task is
provide uncontrolled access to a DB referred to as .....
(4) software system used to create, maintain, (1) QBE (2) SQL
and provide controlled access to a DB (3) OLAP (4) Sequel Server
nt
37. A Proxy server is used for which of the 03. The purpose of the primary key in a database is
following? to :
(1) To provide security against unauthorized (1) unlock the database
oi

users (2) provide a map of the data


(2) To process client requests for web pages (3) uniquely identify a record
(3) To process client requests for database (4) establish constraints on database operations.
P

access 04. The design of the network is called the network:


(4) To provide TCP/IP (1) architecture (2) server
38. When data changes in multiple lists and all lists (3) transmission (4) type
are not updated, this causes:
ng

05. The most frequently used instructions of a


(1) data redundancy computer program are likely to be fetched
(2) information overload From :
(3) duplicate data (1) the hard disk (2) cache memory
ni

(4) data inconsistency (3) RAM (4) registers


39. You must install a (n) ____________ on a 06. Personal logs or journal entries posted on the
network if you want to share a broadband Web are known as:
Internet connection.
r

(1) listservs (2) Webcasts


(1) router (2) modem (3) blogs (4) subject directories
Tu

(3) node (4) cable 07. A(n) _______ uses pictures (called icons) and
40. Granting an outside organization access to menus displayed on the screen to Send
internet web pages is often implemented commands to the computer system.
Using a (n) ____ (1) command ­ based user interface
(1) extranet (2) intranet (2) GUI (3) system utility
(3) internet (4) hacker (4) API
85 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
08. The _____ manual tells you how to use a (3) a communication system for the Indian
software program. government
(1) documentation (2) programming (4) All of these
(3) technical (4) user 18. Which of the following would most likely NOT
09. Which of the following is a type of broadband be a symptom of a virus?
Internet connection? (1) Existing program files and icons disappear.
(1) Cable (2) DSL (2) The CD­ROM stops functioning.
(3) Dial­up (4) Satellite (3) The Web browser opens to an unusual home

pa
10. Software, such as viruses, worms and Trojan page.
horses, that has a malicious intent, is Known as: (4) Odd messages or images are displayed on
(1) spyware (2) adware the screen.
(3) spam (4) malware 19. How many options does a binary choice offer ?

a
11. Making a field ______ means : that it cannot be (1) None (2) One
left blank. (3) Two

ad
(1) numeric (2) required (4) It depends on the amount of memory in the
(3) calculated (4) validated computer
12. _________ is the process of finding errors in (5) It depends on the speed of the computer’s
software code. Processor

13.
(1) Debugging
(3) Testing
(2) Compiling
(4) Running
_____are viruses that are triggered by the
:K
20. How many numeric values can be represented
by a single byte ?
(1) 4 (2) 16 (3) 64
passage of time or on a certain date. (4) 256 (5) 512
(1) Boot­sector viruses 21. Device drivers are—
(2) Macro viruses (1) Tiny power cords for external storage devices
nt
(3) Time bombs (2) Experts who know how to maximize the
(4) Worms performance of devices
14. Linux is a (n) ____________ operating system. (3) Small, special­purpose programs
oi

(1) open­source (2) Microsoft (4) The innermost part of the operating system
(3) Windows (4) Mac (5) Substitutes for operating system
15. What is a backup? 22. Which of the following refers to a small, single
P

(1) Restoring the information for backup site network?


(2) An exact copy of a system’s information (1) LAN (2) MAN
(3) The ability to get a system up and running in (3) WAN (4) USB
ng

the event of a system crash orfailure 23. A set of instructions telling the computer what
(4) All of these to do is called—
(5) None of these (1) Mentor (2) Instructor
16. Which of the following places the common data (3) Compiler (4) Program
ni

elements in order from smallest to Largest 24. If you receive an e­mail from someone you don’t
(1) character, file, record, field, database know, what should you do?
(2) character, record, field, database, file (1) Forward it to the police immediately
r

(3) character, field, record, file, database (2) Delete it without opening it
(4) Bit, byte,character,record,field, database (3) Open it and respond to them saying you don’t
Tu

17. The internet is ...... know them


(1) a large network of networks (4) Reply and ask them for their personal
(2) an internal communication system for a information
business (5) Reply and tell them you want to keep in touch
with them

86 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
25. Computers connected to a LAN (Local Area 35. Which of the following is NOT one of the four
Network) can— major data processing functions of a Computer?
(1) Run faster (1) Gathering data
(2) Go on line (2) Processing data into information
(3) Share information and/or share peripheral (3) Analyzing the data or information
equipment (4) Storing the data or information
(4) E­mail 36. Surgeons can perform delicate operations by
26. Which of the following refers to the memory in manipulating devices through Computers instead
your computer ? of manually. This technology is known as :

pa
(1) RAM (2) DSL (1) robotics.
(3) USB (4) LAN (2) Computer forensics.
27. Information travels between components on the (3) simulation.

a
motherboard through— (4) Forecasting
(1) Flash memory (2) CMOS 37. _______ is the study of molecules and structures

ad
(3) Bays (4) Buses whose size ranges from 1 to 100 nanometers.
28. One megabyte equals approximately— (1) Nanoscience (2) Microelectrodes
(1) 1,000 bits (2) 1 Billion bytes (3) Computer forensics (4) Artificial intelligence
(3) 1 million bytes (4) 1 million bits 38. ________ is the science that attempts to produce
29. When you are working on a document on a PC,
where is the document temporarily Stored ?
(1) RAM (2) ROM
:K machines that display the Same type of
intelligence that humans do.
(1) Nanoscience
(3) cache memory (4) Flash memory (2) Nanotechnology
30. How are data organized in a spreadsheet ? (3) Simulation
(1) Lines and spaces (2) Layers and planes (4) Artificial intelligence (AI)
nt
(3) Height and width (4) Rows and columns 39. ________ is data that has been organized or
31. Magnetic tape is not practical for applications presented in a meaningful Fashion.
where data must be quickly recalled Because (1) A process (2) Software
oi

tape is— (3) Storage (4) Information


(1) A random­access medium 40. The name for the way that computers manipulate
(2) A sequential­access medium data into information is called:
P

(3) A read­only medium (1) Programming. (2) Processing.


(4) Fragile and easily damaged (3) Storing. (4) Organizing
(5) An expensive storage medium
32. A process known as ____________ is used by Answers
ng

large retailers to study trends. 1) 2 2) 2 3) 3 4) 1


(1) Data mining (2) Data selection 5) 2 6) 3 7) 2 8) 4
(3) POS (4) Data conversion
9) 2 10) 4 11) 2 12) 2
ni

33. ________terminals (formerly known as cash


registers) are often connected to Complex 13) 3 14) 1 15) 4 16) 3
inventory and sales computer systems. 17) 4 18) 2 19) 3 20) 4
(1) Data (2) Point­of­sale (POS) 21) 3 22) 1 23) 4 24) 2
r

(3) Sales (4) Query 25) 3 26) 1 27) 4 28) 3


Tu

34. The ability to recover and read deleted or 29) 1 30) 4 31) 2 32) 1
damaged files from a criminal’s computer is An 33) 2 34) 3 35) 3 36) 1
example of a law enforcement specialty called :
37) 1 38) 4 39) 4 40) 2
(1) Robotics. (2) Simulation.
(3) Computer forensics. (4) Animation

87 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 6 11. The difference between people with access to
computers and the Internet and those Without
01. After a picture has been taken with a digital this access is known as the :
camera and processed appropriately, Actual print (1) Digital divide. (2) Internet divide.
of the picture is considered : (3) Web divide. (4) Broadband divide
(1) Data. (2) Output. 12. Which of the following is correct order of the
(3) Input. (4) The process four major functions of a computer?
02. Computers use the _______ language to (1) Process Output Input Storage

pa
process data. (2) Input Output Process Storage
(1) Processing (2) Kilobyte (3) Process Storage Input Output
(3) Binary (4) Representational (4) Input Process Output Storage
03. In the binary language each letter of the alphabet, 13. Data in RAM are :

a
each number and each special Character is made (1) Volatile in nature
up of a unique combination of : (2) Non­volatile in nature

ad
(1) Eight bytes. (2) Eight kilobytes. (3) Both 1 & 2
(3) Eight characters. (4) Eight bits (4) None of these
04. The term bit is short for: 14. RAM in its commercial forms are available as :
(1) SIMM (2) DIMM

05.
(1) Megabyte.
(3) Binary digit.
(2) Binary language.
(4) Binary number
All of the following are examples of storage
devices EXCEPT:
:K
15.
(3) Both (1) & (2) (4) CPSB
Which of the following requires refreshing during
retaining the data?
(1) Hard disk drives. (2) MICR’s. (1) DRAM (2) SRAM
(3) Floppy disk drives. (4) CD drives (3) Virtual Memory (4) FDD
nt
06. Word processing, spreadsheet, and photoediting 16. Processor Speed and Refresh Rate of monitor
are examples of: is measured in :
(1) Application software. (1) Hertz(Hz) (2) Meter
(2) System software. (3) Volts (4) Amp
oi

(3) Operating system software. 17. Which of the following is lowest in memory
(4) Platform software. hierarchy from low speed to high speed ?
07. ______ is a set of computer programs used on (1) Cache memory (2) Secondary memory
P

a computer to help perform tasks. (3) Registers (4) RAM


(1) An instruction (2) Software 18. Which of the following is a GUI device :
(3) Memory (4) A processor (1) Keyboard (2) Mouse
ng

08. The PC (personal computer) and Apple (3) Track Ball (4) Both (2) & (3)
Macintosh are examples of two different: (5) All of These
(1) Platforms. (2) Applications. 19. Such types of printers, in which the printing head
(3) Programs. (4) Storage devices contacts with the paper in printing Process, are
ni

09. Smaller and less expensive PC­based servers called as :


are replacing ________ in many Businesses. (1) Impact Printer (2) Non­Impact Printer
(1) Supercomputers (2) Clients (3) Laser Printer (4) All of these
r

(3) Laptops (4) Mainframes 20. Which of the following is a type of optical media?
Tu

10. DSL is an example of a(n) ________ (1) FDD (2) HDD


connection. (3) CD (4) Magnetic Tape
(1) Network (2) Wireless 21. Basic building block for a digital circuit is :
(3) Slow (4) Broadband (1) Word (2) Logic Gate
(3) Processor (4) BUS

88 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
22. Which of the following is a logic gate? (1) user friendly (2) information
(1) AND (2) OR (3) word processing (4) icon
(3) CPU (4) Both (1) & (2) 36. Which of follow displays buttons for changing
23. Who is called as “Father of Computers’’? text style, alignment and size ?
(1) Charles Babbage (2) Blaise Pascal (1) Standard toolbar (2) Status bar
(3) john Neumann (4) All of these (3) Drawing toolbar (4) Formatting toolbar
24. The first electronic Computer introduced, was 37. Arranging of data in a logical sequence is known
named as : as—

pa
(1) Univac (2) Mark­I (1) Classifying (2) Searching
(3) ENIAC (4) All of these (3) Sorting (4) Reproducing
25. First Generation Computers contain : 38. A single application that combines the major
(1) Transistors (2) Vacume Tubes features of several types of Applications is

a
(3) LSI (4) VLSI called—
26. CD ROM Drive is a ........ (1) integrated software (2) a suite

ad
(1) input (2) output (3) a combo package (4) a mixed software
(3) both (1) and (2) (4) None of these 39. Primary memory stores
27. 2nd Generation Computers are made of : (1) Data alone (2) Programs alone
(1) Vaccume Tubes (2) Transistors (3) Results alone (4) All of these

28.
(3) LSI (4) VLSI
IV Generation Computers contain :
(1) LSI (2) Vaccume Tubes
:K
40. Which technology is used to read data from
Compact disks?
(1) Mechanical (2) Electrical
(3) All Technology (4) Transistors (3) Electro Magnetic (4) Laser
29. Computers, combine both measuring and
counting, are called : Answers
nt
(1) Analog (2) Digital 1) 2 2) 3 3) 4 4) 3
(3) Hybrid (4) All of these 5) 2 6) 1 7) 2 8) 1
30. A computer can perform, which of the following
9) 4 10) 4 11) 1 12) 4
oi

tasks?
(1) Computation (2) Communication
13) 1 14) 3 15) 1 16) 1
(3) Processing (4) All of these 17) 1 18) 4 19) 1 20) 3
P

31. PARAM is an example of : 21) 2 22) 4 23) 1 24) 3


(1) Super computer (2) PC 25) 2 26) 1 27) 2 28) 1
(3) Laptop (4) PDA 29) 3 30) 4 31) 1 32) 2
ng

32. Who developed the analytical engine’? 33) 1 34) 4 35) 1 36) 4
(1) Jacquard loom (2) Charles Babbage 37) 3 38) 1 39) 4 40) 4
(3) Shannon (4) IBM
33. GUI stands for :
ni

(1) Graphical User Interface


(2) Graph Use Interface
(3) Graphical Universal Interface
r

(4) All of these


34. The ……… of a system includes the programs
Tu

or instructions.
(1) hardware (2) icon
(3) information (4) software
35. Something which has easily understood
instructions is said to be………

89 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 7 (3) computer consultant
01. The programs which are permanent as (4) corporate trainer
hardware, stored in ROM is known as 12. Which of the following groups consist of only
(1) Hardware (2) Software output devices ?
(3) Firmware (4) ROM ware (1) Scanner, Printer, Monitor
02. Which device can understand difference (2) Keyboard, Printer, Monitor
between data & programs? (3) Mouse, Printer, Monitor
(1) Input device (2) Output device (4) Plotter, Printer, Monitor

pa
(3) Memory (4) Microprocessor 13. A(n)………contains commands that can be
03. Algorithm and Flow chart help us to selected.
(1) Know the memory capacity (1) pointer (2) menu
(2) Identify the base of a number system (3) icon (4) button

a
(3) Direct the output to a printer 14. An error is also known as—
(4) Specify the problem completely and clearly (1) bug (2) debug

ad
04. Which of the following is not a valid size of a (3) cursor (4) icon
Floppy Disk? 15. Arithmetic Operations—
(1) 8" (2) 5 1/4" (1) involve matching one data item to another to
(3) 3 1/2" (4) 5 1/2" determine if the first item is greater
05. A keyboard is this kind of device—
(1) black
(3) output
(2) input
(4) word Processing
:K Than, equal to, or less than the other item
(2) sort data items according to standard,
predefined criteria in ascending order or
06. Which of following refers the fastest, biggest Descending order
and most expensive computers ? (3) use conditions with operators such as AND,
(1) Personal Computers OR and NOT
nt
(2) Supercomputers (4) include addition, subtraction, multiplication
(3) Laptops and division
(4) Notebooks 16. Sending an e­mail is similar to—
oi

07. A collection of related information sorted and (1) picturing an event (2) narrating a story
dealt with as a unit is a— (3) writing a letter (4) creating a drawing
(1) disk (2) data 17. Microsoft Word is an example of—
P

(3) file (4) floppy (1) an operating system


08. The process of a computer receiving information (2) a processing device
from a server on the Internet is Known as— (3) application software
ng

(1) pulling (2) pushing (4) an input device


(3) downloading (4) transferring 18. A series of instructions that tells a computer what
09. Which part of the computer helps to store to do and how to do is called ?
information ? (1) program (2) command
ni

(1) Hard Disk drive (2) Keyboard (3) user response (4) processor
(3) Monitor (4) Printer 19. Which is the part of a computer that one can
10. ………………is the process of carrying out touch and feel ?
r

commands. (1) Hardware (2) Software


(1) Fetching (2) Storing (3) Programs (4) Output
Tu

(3) Executing (4) Decoding 20. Processing involves—


11. The role of a………generally is to determine a (1) inputting data into a computer system
buyer’s needs and match it to the Correct (2) transforming input into output
hardware and software. (3) displaying output in a useful manner
(1) computer Scientist (4) providing relevant answers
(2) computer sales representative
90 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
21. Digital Banking Can be possible through? (1) Home Page (2) Browser Page
(1) Mobile phone (2) Internet (3) Search Page (4) Bookmark
(3) Both 1 & 2 (4) None of these 33. Changing an existing document is called ………
22. If text was highlighted and from ‘Edit’ menu the document.
‘Copy’ was clicked, what would happen ? (1) creating (2) deleting
(1) Text would be removed from the document (3) editing (4) adjusting
and placed in the clipboard 34. The information stored in CD ROM is in the form
(2) Text would be copied from the document and of .......

pa
placed in the clipboard (1) Binary (2) Digital
(3) Text from the clipboard would be placed in (3) Analog (4) Codes
the document at the place where the Cursor (5) All of these
is blinking 35. Hard disk can have ........... heads (pins)

a
(4) Only (2) and (3) (5) None of these (1) One (2) Two
23. The blinking point which shows your position in (3) More than Two (4) No heads

ad
the text is called— 36. In a spreadsheet program the ………… contains
(1) Blinker (2) Cursor related worksheets and Documents.
(3) Causer (4) Pointer (1) workbook (2) column
24. A directory within in directory is called— (3) cell (4) formula

25.
(1) Mini Directory
(3) Part Directory
(2) Junior Directory
(4) Sub Directory
Which of the following controls the manner of
:K
37. ‘ATM’ stands for—
(1) Anywhere Marketing
(2) Any Time Marketing
interaction between the user and the Operating (3) Any Time Money
system ? (4) Automated Teller Machine
(1) User interface (2) Language translator 38. If a word is typed that is not in Word’s dictionary,
nt
(3) Platform (4) Screen saver a_______ colored underline Appears below the
26. Computer language used on the Internet is— word.
(1) BASIC (2) COBOL (1) red (2) green (3) blue (4) black
oi

(3) Java (4) Pascal 39. The_____button on the quick access Toolbar
27. You click at B to make the selected text into— allows you to cancel your Recent commands or
(1) Italics (2) Underlined actions.
P

(3) Italics and Underlined (4) Bold (1) Search (2) Cut
28. A disk’s content that is recorded at the time of (3) Document (4) Undo
manufacture and that cannot be Changed or 40. In Excel any set of characters containing a
ng

erased by the user is — letter,hyphen,or space is considered


(1) Memory­only (2) Write­only (1) a formula (2) text
(3) Read­only (4) Run­only (3) a name (4) a title
29. Help Menu is available at which button ? Answers
ni

(1) End (2) Start 1) 3 2) 4 3) 1 4) 4


(3) Turnoff (4) Restart 5) 2 6) 2 7) 3 8) 3
30. You can keep your personal files/folders in— 9) 1 10) 3 11) 2 12) 4
r

(1) My Folder (2) My Documents 13) 2 14) 1 15) 4 16) 3


(3) My Files (4) My Text
Tu

17) 3 18) 1 19) 1 20) 2


31. A central computer that holds collections of data
21) 3 22) 2 23) 2 24) 4
and programs for many pcs, Workstations, and
other computers is a(n)— 25) 1 26) 3 27) 4 28) 3
(1) Supercomputer (2) Minicomputer 29) 2 30) 2 31) 4 32) 1
(3) Laptop (4) Server 33) 3 34) 2 35) 3 36) 1
32. A Website’s main page is called its— 37) 4 38) 1 39) 4 40) 2
91 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 8 11.what is the language used for business purpose
calculations?
01. A ____________represent approximately one (1) PASCAL (2) COBOL
billion memory locations. (3) JAVA (4) ALGOL
(1) kilobyte (2) megabyte 12. To get the properties of any object on the
(3) gigabyte (4) terabyte screen,which part of mouse we have to click?
02. ____________cells involves creating a single (1) left click (2) Double left click
cell by combining two or more Selected cells. (3) Right click (4) double right click
13. When we press keystroke it is converted first

pa
(1) Formatting (2) Merging
(3) Embedding (4) Splitting into which code?
(5) None of these (1) ASCII Code (2) ANSI Code
03. Computers that control, processes, accept data (3) Binary Code (4) Machine Code

a
in a continuous loop 14. Which of the following are modifier keys ?
(1) Data highway (2) Data traffic pattern (1) Alt+Ctrl+Del (2) Alt+Ctrl+Shift

ad
(3) infinite loop (4) waiting loop (3) Alt+Ctrl+Space (4) Alt+Shift+Del
04. The speed of which of the following memory 15. In MICR Code , the first 3 digits of code
chip is faster? represents which of the below?
(1) DRAM (1) City code (2) Bank Code
(2) SRAM
(3) Both are same speed
(4) None of these
:K (3) Branch code (4) Machine Code
16. Which of the following are NON IMPACT
Printers ?
05. Instead of remembering e­mail address which (1) Dot matrix (2) Daisy wheel
of following should you use? (3) Band printer (4) None of these
(1) Address Book (2) Name list 17. Plotter is a ..............
nt
(3) email list (4) None of these (1) Printing device (2) Output Device
06. Identify the fastest memory from below given? (3) Both (1) & (2) (4) Input Device Only
(1) RAM (2) Hard disk 18. Processors or Made of which metal?
oi

(3) Cache Memory (4) Virtual Memory (1) Lithium (2) Mercury
07. The free program available in internet for repaired (3) Silicon (4) Iron
software or application ? 19. Which of the following is the fastest RAM?
P

(1) Repair (2) Freeware (1) SRAM (2) DRAM


(3) Patch (4) hit (3) Both are same (4) Both are slow
08. you can edit the existing ms excel data by 20. On memory Cards SD stands for:
ng

pressing which key? (1) Synchronus Dynamic


(1) F1 Key (2) F2 Key (2) Secure Digital
(3) F3 key (4) F4 key (3) Scan Disk
(5) None of these (4) Small Disc
ni

09. In ——topology ,n­1 lines are required for 21. Which of the following RAM formats available
connecting n nodes in Market?
(1) Ring (2) bus (1) SIMM (2) DIMM
r

(3) Star (4) Tree (3) Both (1) & (2) (4) None of these
10. what is the default left margin of ms excel 22. What is the memory allocation size of 3.5 inch
Tu

document? Floppy Disc ?


(1) 1.5 cm (2) 1.6 cm (1) 2MB (2) 4 MB
(3) 1.9 cm (4) 1.8 cm (3) 1.44MB (4) 2.44 MB
23. Who invented the CD?
(1) Charless (2) James Russell
(3) Issac Newton (4) Pascal
92 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
24. The devices that allow users both for calling and 36. Which of the below show the current page
surfing internet are number and line number in ms­word Document?
(1) Calculators (2) Desktops (1) Task Bar (2) Standard tool bar
(3) Smart Phones (4) Nokia 1100 phones (3) Status bar (4) Page bar
25. The software that performs only a single task 37. In ms­word ,to get every first letter of word
are called Which case we have select from menu?
(1) System (2) Appliocation (1) Sentence Case (2) Title Case
(3) Utility (4) None of these (3) Toggle Case (4) Upper case
26. Which of the following is a FIRMWARE? 38. Which of the keys produces a new slide in

pa
(1) RAM (2) ROM ms­ppt ?
(3) BIOS (4) CMOS (1) Ctrl+N (2) Ctrl+S
27. The trial version softwares that can be shared (3) Ctrl+M (4) Ctrl+D

a
are : 39. Which is the function key for Slideshow?
(1) Commercial (2) Open source (1) F4 (2) F5

ad
(3) Shareware (4) None of these (3) F6 (4) F7
28. Which of the language developed by IBM in 1957 40. A symbol or question on the screen that prompts
for Scientific Research? you to take an action and tell Computer what to
(1) PASCAL (2) COBOL do next is ?

29.
(3) FORTRAN (4) JAVA
Which of the following is not a Operating
System?
:K (1) Interrupt
(3) Dialogue
(2) Prompt
(4) Request

(1) Windows (2) Solaris Answers


(3) dos (4) Moss 1) 3 2) 2 3) 2 4) 2
(5) Both 2 & 4 5) 1 6) 3 7) 3 8) 2
nt
30. What is the decimal value for 1010?
9) 3 10) 3 11) 2 12) 3
(1) 10 (2) C
(3) 12(8) (4) None of these 13) 2 14) 2 15) 1 16) 4
17) 3 18) 3 19) 1 20) 2
oi

31. What is the function key for spell check in ms


word document? 21) 3 22) 3 23) 2 24) 3
(1) F3 (2) F4 25) 3 26) 3 27) 3 28) 3
P

(3) F5 (4) F7 29) 4 30) 1 31) 4 32) 3


(5) F12 33) 2 34) 2 35) 3 36) 3
32. When we cut or copy the text it is temporarily
37) 2 38) 3 39) 2 40) 2
stored in
ng

(1) ROM (2) PROM


(3) clipboard (4) Clipart
33. Change of font style or size in ms word is through
ni

which menu?
(1) Edit (2) Format
(3) Styles (4) Size
34. In ms word ,to get the rulers which view is to be
r

selected?
Tu

(1) Web Layout (2) Outline View


(3) Normal layout (4) None of these
35. What is the default file extension of MS­Word
2007 format file that is saved?
(1) doc (2) xls
(3) docx (4) Both (1) & (3)
93 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
13. What are the dimensions of A4 Paper/
Test - 9 (1) 21.6 x 29.0 (2) 21.0 x 29.7
(3) 21.6 x 28.7 (4) 21.0 x 29.0
01. What is the total number of rows in a 14. Which type of network connected through
worksheet? Bluetooth/infrared rays?
(1) 65336 (2) 65536 (1) LAN (2) MAN
(3) 65636 (4) 65556 (3) WAN (4) PAN
02. What is the last alphabet series of column 15. In LAN , Which are the network device used
representation in a worksheet for node and server connection?

pa
(1) AZ (2) IZ (1) Router (2) HUB
(3) IV (4) IF (3) Bridge (4) Modem
03. Which of the following is example for mixed 16. which of the following is most expensive for
referencing?

a
construction?
(1) $2$C (2) $C2 (1) BUS Lan (2) Ring LAN
(3) $2C (4) C2

ad
(3) Mesh LAN (4) Star Lan
04. To goto a specific cell in the worksheet ,whats 17. Tokens are issued among the nodes in which
the required function key? Topology for Data transmission/
(1) F5 (2) F7 (1) Ring (2) BUS

05.
(3) F9 (4) F11
The process of combining 2 cells into a single
cell is called?
(1) Sorting (2) Adding
:K
18.
(3) Mesh (4) Tree
The best way of connecting systems for easy
fault diagnosis and simple onstruction of LAN ?
(1) BUS (2) RING
(3) Merging (4) Digging (3) STAR (4) MESH
06. The current cell content in worksheet is visible 19. Cable TV connection is example for which type
nt
in which bar/ of network/
(1) Formula bar (2) Status bar (1) WAN (2) LAN
(3) Title bar (4) Menu bar (3) MAN (4) WLAN
07. Array is a
oi

20. The point of connection which makes notebook


(1) Linear data structure into desktop through LCD/TV?
(2) Non linear data structure (1) conjent station (2) Docking station
(3) Both A&B
P

(3) Dog sation (4) None of these


(4) None of these 21. WANS uses which protocol for network
08. Row structure in batabase table are called? connection technologically?
(1) Attribute (2) Tuple
ng

(1) X.15 (2) X.35


(3) Gridline (4) Primary key (3) X.25 (4) None of these
09. How many types of encoding forms are available 22. X.25 is Which type of protocol?
in Unicode ? (1) Connection less (2) Connection Oriented
(1) Two (2) Three
ni

(3) wireless (4) None of these


(3) Four (4) One 23. In client server network, which is actively
10. IBM 7030 Belongs to which generation? working and send request?
(1) First (2) Second
r

(1) Server (2) Client


(3) Third (4) Four (3) MODEM (4) MIDI
Tu

11. To format a number in data format,press 24. Half Duplex Data Transmission is
(1) Ctrl+Shift+@ (2) Ctrl+Shift+# (1) One way communication
(3) Ctrl+Shift+% (4) Ctrl+Shift+$ (2) Two way communication, at a time
12. Which register holds the data to be operated upon (3) Two way communication , one by one
and result of processing/ (4) None of these
(1) Accumulator (2) Program counter
(3) Instruction (4) None of these
94 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
25. The device which maintains same strength signals 36. Which of the following is not a domain name?
at both sender and receiver side? (1) EDU (2) GOV
(1) MODEM (2) BUS (3) IN (4) NET
(3) Repeater (4) Router (5) None of these
26. Which are the network devices used in 37. Which of following services are provided by
Broadband connection? INTERNET ?
(1) Router (2) Modem (1) Email (2) Chat
(3) Repeater (4) Bridge (3) Video chat (4) Live chat

pa
27. ARPANET was introduced in which year? (5) All of these
(1) 1949 (2) 1959 38. Email message sare encoded into which code
(3) 1969 (4) 1979 while sending?
28. Which layer of OSI model performs Encryption (1) ANSI (2) ASCII

a
and Decryption? (3) ANSCI (4) ANSII
(1) Network layer (2) Session layer 39. The process of authentication to internet

ad
(3) Presentation layer (4) None of these connection is
29. Which layer of OSI model divide data into (1) Sign in (2) LOGIN
Packets and segments? (3) Connect in (4) Account creation
(1) Network layer (2) Session layer (5) None of these

30.
(3) Presentation Layer (4) None of these
Which is the first layer of OSI model?
(1) Application layer (2) Physical layer
:K
40. Which of the 2 fields are automatically created
by server for gmail user/
(1) Subject and date
(3) Network layer (4) No layer (2) Body and from address
31. The property cursor changing into hand symbol (3) From address and time
when placed on few keywords ,because keyword (4) Time and receiver address
nt
is (5) None of these
(1) Hypertext (2) Networklink
(3) Hyperlink (4) Blog Answers
oi

32. Modems are used in which type of internet 1) 2 2) 3 3) 2 4) 1


connection/
5) 3 6) 1 7) 1 8) 2
(1) Broadband (2) DSL
9) 1 10) 2 11) 2 12) 1
P

(3) Dial up (4) WIFI


33. WIMAX stands for: 13) 2 14) 4 15) 2 16) 3
(1) wireless maximum 17) 1 18) 3 19) 3 20) 2
ng

(2) Wireless redundancy 21) 3 22) 2 23) 2 24) 3


(3) Worldwide interopearability for microwave 25) 3 26) 1 27) 3 28) 3
access 29) 1 30) 2 31) 3 32) 3
(4) Wireless max life 33) 3 34) 2 35) 2 36) 5
ni

34. The protocol that allows browser to connect to


the server is:
37) 5 38) 2 39) 2 40) 3
(1) TCP (2) HTTP
r

(3) DNS (4) SMTP


35. The protocol that gives internet facility for small
Tu

mobile devices?
(1) HTTP (2) WAP
(3) TCP (4) MAP

95 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
13. Which IPVersion is high speed and support 128
Test - 10 bit address?
(1) IPV3 (2) IPV5
01. which of the following is not allowed in email (3) IPV6 (4) IPV7
address? 14. Which protocol is used for receiving email?
(1) @ (2) _ (3) SPACE (1) SMTP (2) POP
(4) NUMBER (5) all are allowed (3) HTTP (4) HTTPS
02. The storage point of all data in email account at 15. In flowcharts , which shape represents
internet is processing data?

pa
(1) Trash (2) Mail box (1) Square (2) Rectangle
(3) Sent items (4) Hard disc (3) Rhombus (4) Arrow
03. Online shopping both selling and buying refered 16. The code which is provided by website to prevent
to

a
form security threat and
(1) M­Commerce (2) E­Commerce recognisation of humans on system—
(3) Both A&B (4) F­Commerce

ad
(1) Relay code (2) captcha code
04. Which type of virus reside in booting devices ? (3) Secure code (4) Almani code
(1) Worm (2) Trojan horse 17. CRAY­1 belongs to ___ generation
(3) Boot sector virus (4) None of these (1) 1ST (2) 2ND (3) 3RD
05.

06.
The harmfull virus that is a written program is
(1) Worm
(3) Logic bomb
(2) Trojan horse
(4) None of these
Which virus spreads in application programs or
:K
18.
(4) 4 TH
(5) 5TH

When we run a program in HTML coding _____


is used as backend and __ works as front­end.
(1) Notepad ­ Internet­Explorer
softwares? (2) Notepad ­ Msn­messenger
(1) Worm (2) Micro virus (3) MS­Word ­ Internet Explorer
nt
(3) Both (4) None of these (4) Both (A) and (B)
07. The malicious software that collects information (5) None of these
without users knowledge is : 19. The first computers were programmed using ___
(1) Malware (2) Spyware
oi

(1) Assembly language


(3) Phishing (4) Firewall (2) Machine language
08. Band pass filters are used in which type of (3) Source code
multiplexing?
P

(4) Object code


(1) CDM (2) FDM (5) Spaghetti code
(3) SDM (4) TDM 20. What is the process of copying software
09. Which of the following is bidirectional BUS? programs from secondary storage media to the
ng

(1) Data bus (2) Address bus hard disk called?


(3) Serial BUS (4) all of these (1) Configuration (2) Download
10. Which is protocol software athat allow users to (3) Storage (4) Upload
connect for remote server?
ni

(5) Installation
(1) Ethernet (2) Intranet 21. Office LANs that are spread geographically
(3) TELNET (4) Dialnet apart on a large scale can be connected using a
11. Which technology used to detect the animals corporate _____
r

exact location in forest? (1) CAN (2) LAN


Tu

(1) RFID (2) CMOS (3) DAN (4) WAN


(3) BIOS (4) DIFR (5) TAN
12. The appliance designed to protect electrical 22. A computer checks the _____ of user names
devices from voltage spikes is and passwords for a match before granting
(1) Serve protector (2) Surge protector access.
(3) E­Protector (4) Survey protector

96 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
(1) Website (2) Network (3) Formatting text
(3) Backup file (4) Data base (4) Proofing documents
23. Network components are connected to the same 32. The.........performs simple mathematics for the
cable in the _____ topology. CPU.
(1) Star (2) Ring (1) ALU (2) DIMM
(3) Bus (4) Mesh (3) BUS (4) ROM
(5) Mixed 33. Reusable optical storage will typically have the
24. Which grouping do you work with when name on CD —
formatting text in word? (1) CD (2) RW

pa
(1) Tables, paragraphs and indexes (3) DVD (4) ROM
(2) Paragraphs, indexes and sections 34. A word in a web page that, when clicked, opens
(3) Characters, sections and paragraphs another document is called—

a
(4) Indexes, characters and tables (1) Anchor (2) Hyperlink
25. ......... are words that a programming language (3) Reference (4) URL

ad
has set aside for its own use. (5) None of these
(1) Control Words (2) Reserved words 35. The most important or powerful computer in a
(3) Reserved keys (4) Control structures typical network—
(5) None of these (1) desktop (2) network client
26. Connections to the Internet using a phone line and
a modem are called.........connections.
(1) Digital (2) Dial­up
:K
36.
(3) network server
(5) None of these
(4) network station

To make a notebook act as a desktop model, the


(3) Broadband (4) Dish notebook can be connected to a ... which
(5) None of these is connected to a monitor and other devices.
27. To access a mainframe or supercomputer, users (1) bay (2) docking station
nt
often use a— (3) port (4) network
(1) Terminal (2) Node (5) None of these
(3) Desktop (4) Handheld 37. You can use the tab key to—
oi

(5) None of these (1) Move a cursor across the screen


28. A Website address is a unique name that (2) Indent a paragraph
identifies a specific......... on the Web. (3) Move the cursor down the screen
P

(1) Web browser (2) PDA (4) Only (1) and (2)
(3) Website (4) Link 38. A collection of related files is called a—
29. Every component of your computer is either— (1) character (2) field
(1) Hardware or software
ng

(3) database (4) record


(2) Software or CPU/RAM (5) None of these
(3) Application software or system software 39. ... is the process of finding errors in software.
(4) Input devices or output devices (1) Compiling (2) Testing
ni

30. To make the number pad act as directional (3) Running (4) Debugging
arrows, you press the.........key. (5) None of these
(1) Numlock (2) Caps lock 40. A ... contains specific rules and words that
(3) Arrow lock (4) Shift
r

express the logical steps of an algorithm.


(5) None of these (1) syntax
Tu

31. When creating a word­processed document, this (2) programming structure


step involves the user changing how words on (3) programming language
the page appear, both on the screen and in printed (4) logic chart
form?
(1) Editing text
(2) Inserting tables and indexes
97 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Answers (1) present (2) input
1) 3 2) 2 3) 2 4) 3 (3) output (4) store
5) 2 6) 2 7) 2 8) 2 (5) None of these
07. Which of the following terms is just the
9) 1 10) 3 11) 1 12) 2
connection of networks that can be joined
13) 3 14) 2 15) 2 16) 2 together?
17) 3 18) 1 19) 2 20) 5 (1) virtual private network
21) 4 22) 4 23) 2 24) 1 (2) internet
25) 2 26) 2 27) 1 28) 3 (3) intranet

pa
29) 1 30) 1 31) 3 32) 1 (4) extranet
33) 2 34) 2 35) 3 36) 2 08. A store that combines online and physical
presence is called?
37) 2 38) 3 39) 2 40) 3

a
(1) E­Commerce (2) M­Commerce
(3) Window shopping (4) None of these
Test - 11

ad
09. Which of the following is used to search
information on www?
01. To move to the beginning of a line of text, press (1) web server (2) web site
the ... key. (3) Search engine (4) file search
(1) home
(3) pageup
(5) None of these
(2) a
(4) enter
:K
10. which of the following key is not available on
keyboard of laptop?
(1) shift (2) Alt
02. ................is when the more power­hungry (3) turn (4)enter
components, such as the monitor and the hard (5) insert
drive, are put in idle. 11. Afirewall is a
nt
(1) Hibernation (1) software (2)Hardware
(2) Power down (3)Virus program (4) Both (1) & (2)
(3) Standby mode 12. Which of the following are windows products?
oi

(4) The shutdown procedure (1) MS Silverlight (2) Windows CE


03. The...............key and the.........key can be used (3) Surface tablet (4) Windows live
in combination with other keys to perform (5) All of these
P

shortcuts and special tasks. 13. Are all open source software comes for free of
(1) Control, Alt cost ?
(2) Function, toggle (1) yes (2) NO
(3) Delete, Insert
ng

(3) few come for free (4) All come for free
(4) Caps Lock, Num Lock 14. CAD full form is
04. To save an existing file with a new name or to a (1) Computer algorithm for design
new location, you use the...... command. (2) Computer application in design
ni

(1) Save (2) Save and Replace (3) Computer aided design
(3) Save As (4) New File (4) All of these
(5) None of these 15. Who is the father of apple computers?
05. In a database............fields store numbers used
r

(1) Bill gates (2) Charles babbage


to perform calculations. (3) Jaquard (4) Steve jobs
Tu

(1) next (2) key 16. Who is responsible for “traffic directing” on
(3) alphanumeric (4) numeric internet ?
(5) None of these (1) Hub (2) Repeater
06. Computers gather data, which means that they (3) Router (4) Switch
allow users to..................data.

98 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
17. In windows, which command used to get list of
directories in a specific directory? 26. Find the Mis­Matched pair ?
(1) list (2) dir 1) Chrome ­ Google
(3) ls (4) no command 2) Opera ­ Opera Software
18. Secondary memory also called as 3) Internet Explorer ­ Microsoft
(1) Auxiliary memory 4) Safari ­ Net Scape Commu­nications
(2) Dynamic memory 5) None of these
(3) Second pass memory 27. In order to save an existing document with a
(4) None of these different name you need to?

pa
19. Which of the following is default drawing 1) Retype the document and give it a different
program in windows? name
(1) photoshop (2) mspaint 2) Use the Save as command
3) Copy it to a new folder and then save

a
(3) Mpeg (4) all of these
20. Convert decimal 16 into hexadecimal value? 4) Use Windows Explorer to save
5) None of these

ad
(1) 12 (2 )10
(3) 16 (4) 8 28. Which of the following is a graphics package?
(5) Can not be found 1) Adobe page maker
21. The _______of a system includes the 2) Acrobat Reader
3) Microsoft word
program or instructions.
1) Hardware
3) Information
2) Icon
4) Software
:K
29.
4) Corel Draw
5) None of these
Plotter is very useful in applications such as?
5) None of these
22. In order to save a word document as a web 1) Computer aided design
page you need to_______ 2) Word processing
3) Financial accounting
nt
1) Put the appropriate graphic and links on the
document 4) Spell checking
2) Save the document in the simple text format 5) None of these
30. Data processing cycle consists of _______?
oi

3) Use your web browser as an editor and save


as URL 1) Input and output
4) Save as HTML 2) Output and processing
3) Input, processing and output
P

5) None of these
23. Something which is easily understood 4) Only input
instructions is said to be_______ 5) None of these
1) User friendly 2) Information 31. ‘MICR’ technology used for clearance of
ng

3) Word processing 4) Icon cheques by banks refers to


5) None of these 1) Magnetic Ink Character Recognition
24. The copy command saves the data to which of 2) Magnetic Intelligence Chara­cter Recognition
3) Magnetic Information Cable Recognition
ni

the following?
1) The desktop 2) The clipboard 4) Magnetic Cable Recognition
3) Microsoft word 4) Paste 5) None of these
5) None of these 32. All the information collected during database
r

25. Arranging the data in a sequence is known development is stored in a...?


1) Repository 2) Data warehouse
Tu

as_______
1) Classifying 2) Searching 3) RAD 4) CASE
3) Sorting 4) Reproducing 5) None of these
5) None of these

99 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
33. _______ is a type of RAM that stores each Answers
bit of data in a separate capacitor within an
integrated circuit making it an efficient way to
1) 1 2) 3 3) 1 4) 3
store data in memory. 5) 4 6) 2 7) 2 8) 2
1) DRAM 2) PRAM 3) NRAM 9) 3 10) 3 11) 4 12) 5
4) NORAM 5) None of these 13) 2 14) 3 15) 4 16) 3
34. What is the symbol for attachments in yahoo 17) 2 18) 1 19) 2 20) 2
mail: 21) 4 22) 4 23) 1 24) 2
1) Envelope 2) Letter A

pa
25) 3 26) 4 27) 2 28) 4
3) Paper Clip 4) Pen
5) None of these
29) 1 30) 3 31) 1 32) 2
35. To Recover files from a backup you 33) 1 34) 3 35) 4 36) 5
37) 2 38) 1 39) 4 40) 1

a
perform_______ option
l) Scan 2) Move 3) Copy

ad
4) Restore 5) None of these Test - 12
36. The internet began with the development of 01. To open a new file in MS Word, the shortcut key
1) Ethernet 2) Internet is
3) USENET 4) Extranet (1) Ctrl + X (2) Ctrl + N (3) Ctrl + Y

37.
5) ARPANET
Select the odd man out
1) Interpreter 2) Programmer
:K
02.
(4) Ctrl + V (5) None of these
Which extension is given to Word document by
default?
3) Operating system 4) Assembler (1) .ext (2) .com (3) .doc
5) Utility (4) None of these (5) All of these
38. The number of pixels displayed on a screen is 03. Mark the most appropriate option statement.
nt
known as the screen_______? (1) Mail Merge can be used to print the form
1) Resolution 2) Color depth letters
3) Refresh rate 4) Viewing size (2) Mail Merge can be used to print the form
oi

5) None of these letters and mailing labels


39. Firewall in parlance of computer science is a (3) Mail Merge can be used to print envelopes
method of:_______? (4) All of the above
P

1) Stopping unauthorized access (5) None of the above


2) Making network more secure against banking 04. What is the term used for the word processing
attempts programs that show you directly on the PC screen
3) Filtering the data that is going out of the
ng

the appearance of your final document as you


network and coming in the network. might expect on the paper?
4) All the above (1) Search and Replace (2) Pagination
5) None of these (3) Soft Copy (4) WYSIWYG
ni

40. Encryption is used in computers to :_______? (5) None of the above


1) Protect data from unauthorized access 05. Creating form letters using Mail Merge involves
2) Protect data from damaging (1) creating the main document
3) Prevent the computer from unauthorized users
r

(2) creating the main document and data source


4) All the above (3) inserting merge fields in the main document
Tu

5) None of these and merging the main document with data


source
(4) Both ‘2’ and ‘3’
(5) None of the above

100 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
06. Which of the following gives the status of your 16. After selecting the ‘Replace’ option from the Edit
document like page numbers, number of pages? menu, the following dialog box appears
(1) Status bar (2) Standard toolbar (1) Replace (2) Find
(3) Formatting toolbar (4) None of these (3) Find and Replace (4) Edit
(5) All of these (5) None of these
07. Alignment buttons are available on which toolbar? 17. MS­Word can insert/import the graphics
(1) Status (2) Standard (3) Formatting (1) created in paintbrush
(4) All of these (5) None of these (2) created by using autoshapes
08. Header is (3) from clipArt gallery

pa
(1) any text printed at the top of every page (4) All of the above
(2) any graphics printed at the top of every (5) Both ‘2’ and ‘3’
page 18. You can use the following objects created in MS­

a
(3) any text or graphics printed at the top of a Word in a web page
particular page (1) autoshapes (2) bullets

ad
(4) any text or graphics printed at the top of every (3) tables and charts (4) All of these
page (5) None of these
(5) None of the above 19. Blinking point which shows your position in the
09. This case converts first character of first word of text is called
selected sentence to capital
(1) sentence (2) upper
(4) title (5) None of these
(3) toggle
:K
20.
(1) Cursor
(4) Status
(2) Blinker
(5) Place
Spacebar is used for
(3) Position

10. Which of the following is not an option of edit (1) giving space (2) deleting space
menu? (3) moving next line (4) All of these
(1) Cut (2) Copy (3) Paste (5) None of these
nt
(4) Page setup (5) None of these 21. You can start Microsoft Word by using which
11. Which of the following will you use as an option button?
for saving a file ? (1) New (2) Start (3) Program
oi

(1) Save button on Standard toolbar (4) All of these (5) None of these
(2) Save option from File menu 22. It is a software tool that lets one to enter,
(3) Pressing Ctrl + S calculate, manipulate set of numbers
P

(4) All of the above (1) speed sheet (2) spread sheet
(5) None of the above (3) slide sheet (4) All of these
12. A file name cannot contain in MS­Word database (5) None of these
file
ng

23. It is a grid of cells made up of horizontal and


(1) a letter (2) number (3) underscore vertical columns
(4) space (5) None of these (1) worksheet (2) sheet (3) spreadsheet
13. When you start MS­Word, the opening document (4) page (5) work book
ni

has the name as 24. It is a group of worksheets


(1) DOC 1 (2) Document 1 (3) Document (1) folder (2) document (3) work book
(4) Work book (5) Task book (4) books (5) files
14. The following shortcut keys are used for selecting
r

25. Three types of data can be entered in a


the whole document worksheet are number/characters, text and ?
Tu

(1) Ctrl + A (2) Ctrl + S (3) Ctrl + W (1) formulas (2) functions (3) logic
(4) Ctrl + X (5) Ctrl + Alt (4) All of these (5) None of these
15. ‘Replace’ option is available in 26. To select the current row press
(1) Edit menu (2) File menu (3) Tools menu (1) Shift + Enter (2) Shift + Spacebar
(4) Insert menu (5) None of these (3) Ctrl + Spacebar (4) Ctrl + C
(5) Ctrl + B
101 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
27. To select the current column press 39. Cell address $A$4 in a formula means it is a
(1) Ctrl + Spacebar (2) Ctrl + B (1) mixed cell reference
(3) Shift + Enter (4) Ctrl + Enter (2) absolute cell reference
(5) Ctrl + Shift (3) relative cell reference
28. To select the entire worksheet (4) All of the above
(1) Ctrl + B (2) Ctrl + V (3) Ctrl + A (5) None of the above
(4) Ctrl + C (5) Ctrl + X 40. Cell address $A4 in a formula means it is a
29. The Extension of saved file in MS­Excel (1) mixed cell reference
(2) absolute cell reference

pa
(1) .XIS (2) .XAS (3) .XLS
(4) .XLL (5) .LXS (3) relative cell reference
30. All formula start with, which sign in MS­Excel? (4) All of the above
(1) + (2) ­ (3) @ (5) None of the above

a
(4) = (5) = =
31. For creating an absolute cell reference, which Answers

ad
sign is used? 1) 2 2) 3 3) 4 4) 3
(1) $ (2) @ (3) #
(4) ! (5) None of these
5) 4 6) 1 7) 3 8) 4
32. A cell entry can be edited in the cell or in the 9) 1 10) 4 11) 4 12) 4
(1) menu bar
(3) function bar
(5) None of these
(2) edit menu
(4) formula bar
:K 13) 2
17) 4
21) 2
14) 1
18) 5
22) 2
15) 1
19) 1
23) 1
16) 3
20) 1
24) 3
33. In this chart, only one data series can be plotted 25) 3 26) 2 27) 1 28) 3
(1) pie (2) line (3) bar 29) 3 30) 4 31) 1 32) 4
(4) column (5) None of these 33) 1 34) 2 35) 3 36) 3
nt
34. A chart placed in a worksheet is called
37) 2 38) 3 39) 2 40) 1
(1) formatting chart (2) embedded chart
(3) aligning chart (4) hanging chart
oi

(5) None of the above


35. This chart shows the relationship of parts to a
whole
P

(l) pie (2) line (3) stacked Bar


(4) embedded (5) None of these
36. Scatter chart is also known as
ng

(1) XX chart (2) YX chart (3) XY chart


(4) YY chart (5) XZ chart
37. The cell having bold boundary is called
(1) Belative (2) Active (3) Absolute
ni

(4) Mixed (5) Passive


38. Cell address A4 in a formula means it is a
(1) mixed cell reference
r

(2) absolute cell reference


(3) relative cell reference
Tu

(4) All of the above


(5) None of the above

102 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Test - 13 9. The 2’s compliment of a binary no. is obtained
01. Which computer has been designed to be as by adding..............to its 1’s compliment.
compact as possible? 1) 0 2) 1 3) 10
1) Mini 4) 12 5) 13
2) Super computer 10. With respect to a network interface card, the
3) Micro computer term 10/100 refers to
4) Mainframe 1) protocol speed
5) None of the above 2) a fiber speed

pa
02. The symbols used in an assembly language are 3) megabits per seconds
1) Codes 2) Mnemonics 4) minimum and maximum server speed
3) Assembler 4) Literals 5) data capacity
5) All of the above 11. The terms “ red book”, “ yellow book”, and

a
03. Portrait and Landscape are “orange book” refer to :
1) Page Orientation 1) SCSI 2) IDE

ad
2) Paper Size 3) Floppy drive technology
3) Page Layout 4) CD­ROM standards
4) Margin type 5) SATA
5) All of the above 12. In ROM BIOS, the acronym BIOS stands for :
04. Any storage device added to a computer
beyond the immediately usable main storage is
known as
:K 1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
1) Floppy disk 2) Hard disk 4) Basic Industry Operating System
3) Backing store 4) Punched card 13. Which DOS command will format a floppy
disk and transfer the system files
nt
5) Magnetic Tape
5. Which output device is used for translating 1) SYSC : A : 2) SYS A :
information from a computer into pictorial form 3) FORMAT A : /S
on paper 4) FORMAT A : /T 5) SYS C:
oi

1) Mouse 2) Plotter 14. Which command will be used to display file


3) Touch panel 4) Card punch and directory names only, without size, date,
5) Keyboard and time information ?
P

6. A computer assisted method for the recording 1) DIR/W 2) DIR A :


and analyzing of existing or hypothetical 3) DIR/B 4) DIR/S
systems is 5) DIR
ng

1) Data transmission 15. Which of the following is not a logical data


2) Data flow base structure?
3) Data capture 1) tree 2) relational
4) Data processing 3) network 4) chain
ni

5) Data validation 5) None of the above


7. Which access method is used for obtaining a 16. Updating a database means
record from a cassette tape ? 1) revising the file structure
r

1) Direct 2) Sequential 2) reorganizing the database


3) modifying or adding record occurrences
Tu

3) Random 4) ISAM
5) VSAM 4) Sorting
8. Find the ODD one. 5) Indexing
1) JAVA 2) Cobol 3) Fortran
4) Linux 5) ADA

103 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
17. Any and every command can be found on the 3) slow, fast
1) Drawing toolbar 4) big, Small
2) Formatting toolbar 5) None of the above
3) Standard toolbar 26. Offline device is
4) Menu bar 1) A device which is not connected to
5) View toolbar CPU
18. Which of the following should be used when 2) A device which is connected to CPU
you want to add a slide to an existing 3) A direct access storage device
presentation? 4) An I/O device

pa
1) File, add a new slide 2) Insert, new slide 5) None of the above
3) File, open 4) File, new 27. Which of the following registers is used to keep
5) None of the above track of address of the memory location where

a
19. Which of the following items are examples of the next instruction is located ?
storage devices ? 1) Memory address register

ad
1) Floppy disks 2) CD­ROMs 2) Memory data register
3) Tape devices 4) Hard Disk 3) Instruction register
5) All of the above 4) Program counter
20. The original ASCII code used ... bits of each 5) Flag Register
byte, reserving that last bit for error checking
1) 5
4) 8
2) 6
5) 16
3) 7
:K
28. Which American Computer Company is called
Big Blue ?
1) Microsoft 2) Compaq Corp
21. Word length of a computer is measured in 3) IBM 4) Tandy Stevenson
1) Bytes 2) Millimeters 5) DELL
3) Meters 4) Bits 29. A term associated with the com­parison of
nt
5) All the above processing speeds of different computer
22. Which type of computers uses the 8­bit code system is:
called EBCDIC ? 1) EFTS 2) MPG 3) MIPS
oi

1) Minicomputers 4) CFPS 5) Bps


2) Microcomputers 30. Daisy wheel printer is a type of
3) Mainframe computers 1) Matrix printer
P

4) Super Computer 2) Impact printer


5) Lap Tops 3) Laser printer
23. ATM terminals are example for 4) Manual printer
1) Smart Terminals
ng

5) Non impact printer


2) Intelligent terminals 31. Serial access memories are useful in
3) Dumb terminals applications where
4) Offline terminals 1) Data consists of numbers
ni

5) None of the above 2) Short access time is required


24. In ROM BIOS, the acronym BIOS stands for : 3) Each stored word is processed differently
1) Basic Intuitive Output Set 4) Data naturally needs to flow in and out in a
2) Basic Input Organizational System
r

serial form
3) Ab address 5) Data naturally needs to flow in and out in a
Tu

4) An instruction Random form


5) All of above 32. One of the main feature that distinguish
25. The difference between memory and storage microprocessors from micro computers is
is that memory is .... and storage is 1) Words are usually larger in
1) temporary, permanent 2) Words are shoreter in micro processors
2) permanent, temporary
104 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
3) Microprocessor does not contain I/O devices Answers
4) Exactly the same as the machine cycle time 1) 3 12) 3 23) 1 34) 1
5) None of these 2) 2 13) 3 24) 5 35) 2
33. Example of non­numeric data is ..... 3) 1 14) 3 25) 1 36) 1
1) Employee Name 2) Test score 4) 3 15) 4 26) 1 37) 3
3) Bank Account No 4) Phone No 5) 2 16) 3 27) 4 38) 3
5) All the above
6) 2 17) 4 28) 3 39) 3
34. Numbers in table columns are usually...
1) right aligned 2) left­aligned 7) 2 18) 2 29) 3 40) 1

pa
3) justified 4) centered 8) 4 19) 5 30) 2
5) None of the above 9) 2 20) 3 31) 4
35. Most Web sites have a main page known as 10) 3 21) 4 32) 3
11) 4 22) 3 33) 1

a
which acts as a doorway to the rest of the
Website pages.

ad
1) search engine 2) home page
3) browser 4) URL Test - 14
5) Domain 01. Memory, also called Random Access Memory,
36. A software program that extends the or RAM
capabilities of your browser in a specific way
is known as
1) Plugin
:K 1) contains the electronic circuit that cause
processing to occur.
2) makes the information resulting from
2) Browser software processing available for use
3) Cookies 3) allows data, program, commands, and user
4) Applets responses to be entered into a computer
nt
5) None of the above 4) consist of electronic components that store
37. Internet is example of data
1) LAN 2) MAN 3) WAN 5) None of these
oi

4) SAN 5) CAN 2. Correcting errors in a program is referred to as


38 ............. refers to maintaining and assuring the 1) debugging 2) bugging 3) rectifying
accuracy and consistency of data 4) modifying 5) None of these
P

1) Data redundancy 3. An assembler is used to translate a program


2) Data inconsistency written in
3) Data integrity 1) a low level language
4) Data independence 2) machine language
ng

5) All the above 3) a high level language


39 ............ is a data model for describing a 4) assembly language
database in an abstract way 5) None of these
ni

1) Data Flow Diagram 4. The capability of operating system to enable two


2) Flow chart or more than two programs to execute
3) ER­Diagram simultaneously in a single computer system by
4) System chart using a single processor is
r

5) Network chart 1) Multiprocessing 2) Multitasking


Tu

40. Mechanism to protect private network from 3) Multiprogramming 4) Multiexecution


outside attack is 5) None of these
1) Firewall 2) Antivirus 5. The basic goal of computer process is to convert
3) Digital Signature 4) Formatting data into
5) Tunneling 1) information 2) table
3) files 4) graphs
5) None of these
105 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
6. A hard copy of documents is 4) Analysing data or information
1) stored in the hard disk 5) None of these
2) stored in the floppy 16. A disk on which you store information .....
3) Stored on a CD 1) plate 2) data disk 3) peper disk
4) Printed on the printer 4) TV disk 5) None of these
5) None of these 17. ......... is used to print document on printer.
7. Find the odd man out? 1) ribbon 2) mnitor 3) go now
1) plotter 2) printer 3) scanner 4) control +P 5) None of these

pa
4) monitor 5) None of these 18. Easy to use means .......
8. Which key combination is used for special tasks? 1) user friendly 2) select
1) Insert, Delete 2) Ctrl, Shift 3) helpful 4) ever­ready
3) Left Arrow, Right Arrow 19. When your computer stops working suddenly it

a
4) Page up, Page Down 5) None of these is referred to as a .....
9. Which is the part of a computer that one can 1) crash 2) die 3) death

ad
touch and feel? 4) penality 5) None of these
1) Programs 2) Software 3) Hardware 20. The smallest item of useful in information a
4) Output 5) None of these computer can handle .........
10. A store that combines online and physical 1) bite 2) byte 3) bit
presence is called a(n)store.
1) brick­and­mortar 2) click­and­mortar
3) combination 4) e­commerce
:K
21.
4) belt 5) None of these
Device that let the computer communicate with
you .........
5) M commerce 1) input 2) output 3) type
11. The main processing unit of computer is known 4) print 5) None of these
as 22. Device that allows you to put information into
nt
1) CD­run on memory the computer ....
2) Central Processing Unit 1) input 2) output 3) type
3) Call powers Up 4) print 5) None of these
oi

4) Create Program User 23. The different style of lettering in a word


5) None of these processing program ........
12. move the cursor one space to the right or puts 1) font 2) calligraphy 3) writing
P

spaces in between words. 4) manuscript 5) None of these


1) Control key 2) space bar 3) printer 24. Any letter, number or symbol found on the
4) mouse 5) None of these keyboard that you can type into the computer
ng

13. Which key has to be used to type all letters capital 1) output 2) character 3) type
without using the shift key for each character ... 4) print 5) None of these
1) shifter 2) upper case 25. A symbol or question on the screen that prompts
3) caps lock key 4) Icon you to take an action and tell the computer what
ni

5) None of these to do next


14. A device that reads the information contained 1) scanner
on a disk and transfer it to the computer’s 2) questionnaire
r

memory ......... 3) prompt on dialog box


1) monitor 2) screen 3) keyboard 4) information seeker
Tu

4) disk drive 5) None of these 5) None of these


15. Which of the following is not the major function 26. Choices are referred to as
of a computer ? 1) options 2) exit 3) boot
1) Processing data into information 4) folder 5) None of these
2) Stroing data or information
3) Gathering data
106 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
27. The OSI model is divid­ed into how many 38. To encourage repeat customers, e­commerce
Processes called layers? sites recommend users create a(n) ........
1) Five 2) Six 3) Seven 1) profile 2) account 3) Survey
4) Eight 5) None of these 4) wish list 5) None of the above
28. ........... lets you leave a screen or program 39. A removable magnetic disk that holds information
1) boot 2) programs 3) exit is.........
4) text 5) None of these 1) floppy disk 2) hard drive 3) monitor
29. A place that a user can create and keep files .. 4) portable 5) None of these
1) cursor 2) test 3) folder 40. A command that saves what you are working

pa
4) boot 5) None of these on into the hard drive, or onto a disk ?
30 .......... is start or restart the computer. 1) view 2) hold 3) save
1) exit 2) kick 3) boot 4) go 5) None of these

a
4) kick­start 5) None of these
31. A blinking indicator that shows you where your
Answers

ad
next action will happen is...........
1) CPU 2) cursor 3) tool bar 1) 4 11) 2 21) 2 31) 2
4) boot 5) None of these 2) 1 12) 2 22) 1 32) 1
32. Commands at the top of a screen such FILE­ 3) 4 13) 3 23) 1 33) 4
EDIT­FONT­TOOLS to operate and change
things within programs is........
1) menu bar 2) tool bar
:K
4) 2 14) 4
5) 1 15) 4
6) 4 16) 2
24) 2
25) 3
26) 1
34) 2
35) 2
36) 1
3) user friendly 4) word processor 7) 3 17) 4 27) 3 37) 2
5) None of these 8) 2 18) 1 28) 3 38) 2
33. CD­ROM stands for .........
9) 3 19) 1 29) 3 39) 1
nt
1) Central processing unit
2) CD­remote open mouse 10) 5 20) 3 30) 3 40) 3
3) CD resizer or minimize
oi

4) CD­read only memory


5) None of these
34. To change written work already done
P

1) find 2) edit 3) cut


4) close 5) None of these
35. A key that will erase information from the
computer ’s memory and characters on the
ng

screen
1) edit 2) delete key 3) dummy out
4) trust key 5) None of these
ni

36. To insert copy of the clipboard contents,


whatever was last cut or copied at the insertion
point ......
1) paste 2) stick in 3) fit in
r

4) push in 5) None of these


Tu

37. The command used to remove text or graphics


from a document. (The inforamtion is then stored
on a clipboard so you can paste it)
1) chop 2) cut 3) clip
4) chart away 5) None of these

107 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
09. How are data organised in a spreadsheet?
Test - 15 1) Lines and spaces
2) Layers and Planes
01. A collection of related information sorted and 3) Height and Width
dealt with as a unit is called a 4) Rows and Columns
l) disk 2) data 3) file 5) None of these
4) floppy 5) None of these 10. The blinking symbol on the computer screen is
02. The role of a ________ is to determine a called
buyer’s needs and match it to the correct 1) mouse 2) logo 3) hand

pa
hardware and software. 4) palm 5) cursor
1) computer scientist 11. The_______ becomes of different shapes,
2) computer sales representative depending on the task you perform.
3) computer consultant

a
1) active tab 2) insertion point
4) corporate trainer 3) mouse pointer 4) ribbon
5) None of these

ad
5) None of these
03. _______function displays, row data in a column 12. By default, Excel positions a text in a cell
or column data in a row. 1) left­aligned 2) right­al igned
1) Index 2) Rows 3) Hyperlink 3) centered 4) justified
4) Transpose 5) Columns
04. PARAM is an example of a
1) Super computer
3) Laptop
2) PC
4) PDA
:K 5) None of these
13. Compiling creates a(n)
1) program specification 2) algorithm
3) executable program 4) subroutine
5) None of these 5) None of these
05. Which keys can be used together with other keys 14. A character of information is represented by a(n)
nt
for special tasks? l) byte 2) bit 3) field
1) Insert, Delete 4) attribute 5) None of these
2) Ctrl, Shift 15. One advantage of dial­up Internet access is
3) Left Arrow, Right Arrow
oi

1) it utilises broadband technology.


4) Page up, Page Down 2) it utilises existing telephone service.
5) None of these 3) it uses a router for security.
06. Eight bits of data are called
P

4) modem speed is very fast.


l) octabit 2) word 3) sentence 5) None of these
4) byte 5) None of these 16. What is backup?
07. A kind of serial dot­matrix printer that forms
ng

1) Adding more components to your network


characters with magnetically­charged­ink­ 2) Protecting data by copying it from the original
sprayed­dots is called source to a different destination
1) Laser printer 2) Ink­jet printer 3) Filtering old data from the new data
3) Drum printer 4) Chain printer
ni

4) Accessing data on tape


5) None of these 5) None of these
08. Which of the following printers is very 17. While sending an e­mail, the line describes the
commonly used for desktop publishing?
r

contents of the message.


1) Laser printer l) To 2) Subject 3) Contents
Tu

2) Ink­jet printer 4) CC 5) None of these


3) Daisywheel printer 18. Which groupings do you work with when
4) Dot­matrix printer formatting text in Word ?
5) None of these 1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
108 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
4) Indexes, characters and tables 28. ........... is designed to perform a computer
5) None of these system’s routine house­keeping functions.
19. Which of the following is true? 1) Operating system 2) Interpreter system
1) Byte is a single digit in a binary number. 3) Compiler 4) Utility
2) Bit represents a grouping of digital numbers. 5) Microprocessor
3) An eight­digit binary number is called a byte. 29. What kind of files do we care about the most?
4) An eight­digit binary number is called a bit. (letters, pictures, memos, etc.)
5) None of these 1) Document files 2) Application files
20. If 20 people need to communicate using 3) System files 4) User files

pa
symmetric­key cryptography_______ symmetric 5) None of these
keys are needed. 30. In which of the following was artificial
1) 190 2) 200 3) 20 intelligence introduced?

a
4) 19 5) 210 1) First generation 2) Second generation
21. Rules of a programming language are called 3) Third generation 4) Fourth generation

ad
1) procedures 2) calls 3) methods 5) Fifth generation
4) login 5) syntax 31. Which network architecture is defined in IEEE
22. A primary key can also be called a_______. 802.3 standard?
1) super key 2) candidate key 1) Token ring 2) FDDI

23.
3) alternate key 4) secondary key
5) foreign key
IEEE _______ is the standard of token bus.
:K 3) Fiber
5) None of these
32. PDA stands for
4) Ethernet

1) 802.3 2) 802.4 3) 802.5 1) Portable Digital Assistant


4) 802.2 5) 802.6 2) Personal Digital Assistant
24. Plotter accuracy is measured in terms of 3) Personal Duplex Assistant
nt
repeatability and 4) All the above
1) buffer size 2) resolution 5) None of these
3) vertical dimension 4) intelligence 33. The name of the way with which computers
oi

5) None of these manipulate data into information is called


25. Restore command in data base is used to 1) programming 2) processing
1) restore files from disks using the backup 3) storing 4) organising
P

command. 5) None of these


2) restore files which have been deleted. 34. Computers gather data, which means that they
3) restore files which have been deleted allow users to _______ data.
recently.
ng

1) present 2) input 3) output


4) restore files from recycle bin. 4) store 5) None of these
5) None of these 35. All the deleted items are stored in this place until
26. For opening and closing of file in Excel, you can they are permanently deleted. This place is called
ni

use _______bar. 1) Mail Box


1) formatting 2) standard 2) Temporary Folders
3) title 4) formatting or title 3) Virtual Hard Drive
5) None of these
r

4) Recycle Bin
27. Zone information protocol is used for 5) None of these
Tu

1) copying file 2) deleting file 36. A multi­purpose window which opens nearly for
3) editing file 4) pasting file everything is called
5) None of these 1) Main desktop 2) Explorer Window
3) Browser Window 4) Error Window
5) None of these

109 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
37. Moving processes between main memory and
5. What are the circles on disk are called?
disk is called
1. tracks 2. Cylinders
1) Caching 2) Swapping 3) Spooling
3.segments 4. Holes
4) Transferring 5) Scheduling
6. Which of the following IP Address reserved for
38. Which of the following is an absolute cell
future use?
reference?
1. class B 2. Class C
1) !A!1 2) $A$1 3) #A#1
3. Class D 4. Class E
4) A1 5)_A_1
7. The time during which a job is produced by a
39. For the realisation of virtual memory we use

pa
computer is called?
_______ concept(s).
1. Delay time 2. Real time
1) on­line secondary storage
3. Execution time 4. Down time
2) swapping
8. _______is capable of operating at electronic

a
3) demand paging
speed.
4) None of these
1. magnetic disk 2. Semi­conductor memory

ad
5) All of the above
3. Magnetic drum 4. Magnetic tape
40. Font size is measured in
9. _____ refers to the degree to which data in a
1) numbers 2) digits 3) dots
database system are accurate and correct?
4) points 5) decimals 1. data security 2. Data integrity

Answers
:K
10.
3. Data reducity 4. Data validity
which key launches the start button?
1. windows 2. Shift
1) 3 11) 3 21) 5 31) 4 3. Shortcut 4. Esc
2) 2 12) 1 22) 2 32) 2 11. extension of .bmp is used by?
3) 4 13) 3 23) 2 33) 2 1. ms­excel 2.ms­ppt
nt

4) 1 14) 1 24) 2 34) 2 3.text editor 4.ms­paint


5) 2 15) 2 25) 1 35) 4 12. which of the following is collection of
unprocessed items?
6) 4 16) 2 26) 2 36) 2
oi

1. memory 2.reports
7) 2 17) 2 27) 5 37) 2
3.data 4. Information
8) 1 18) 1 28) 4 38) 2 13. the collection of computer files that can be
P

9) 4 19) 3 29) 1 39) 5 packaged together for backup is called?


10) 5 20) 1 30) 5 40) 4 1. folder 2.archive
3.hidden files 4. System files
ng

Test - 16 14. ____ symbol is used to remove theattribute from


ATTRIB external command?
1. Storage and memory differ with respect to which 1.” 2.+
of the following characteristics ? 3. * 4.?
ni

1. Price 2. Reliability 3. Speed 15. ___ file starts ms­word?


4. All of these 5.None of these 1. word.exe 2.word2003.exe
2. ________ is converted into Information. 3.word2007.exe 4.winword.exe
r

1. Numbers 2. Processor 16. ____ is a group of data elements grouped


3. Input 4. Data together under one name.
Tu

3. Foxpro is an example of ? 1. cluster 2.data structure


1. RDBMS 2. DBMS 3.data type 4. Group
3.OODBMS 4.DDBMS 17. A______ offers a computer network service to
4. To open the format cells dialog box, we press allow clients to make indirect network
1. shift+1 2. Ctrl+1 connections to network services.
3. Alt+1 4. F2
110 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
30. A______ is the term used when a search engine
1. Client server 2. Web server web page that matches the search criteria?
3. Proxy server 4.app server 1. blog 2. Hit
18. PC, AC and IR are types of? 3. Link 4.all of these
1.Transistors 2.registers 31. A____ system is a small, wireless handled
3. CPU 4.all of these computer that scans items,tags and pulls up the
19.How many documents can be opened at a time in current price as you shop (with offer price) .
computer? 1. PSS 2.POS
1. one 2. Less than 3 3. Inventory 4. Tata

pa
3. Only 7 4. As many as memory can hold 32. The RDBMS technology for a row is called?
20. assembly language is a division of? 1. degree 2. Attribute
1. middle level 2. High level 3 . relation 4. Tuple
3. Low level 4. All of these

a
33. Dijkstra’s bankar’s algorithm is a_________?
21. In E­R diagram line is used to show? 1. cache
1. relationship 2. Connection

ad
2. Deadlock avoidance
3. To start 4. Process 3. Deadlock recovery
22. when integrating MS­Word and Excel , word is 4. Exclusion
usually acts as? 34. which of the following SMPS shutsdown
1. server 2. Base
3. Client 4. All of these
23. A language based on graphics for use in education
is called?
:K automatically?
1. AT
3.ATX
2.ATY
4.none of these
35. The most dangerous risk involved in leaking of
1. PROLOG 2. LOGO information is ?
3. COBOL 4. PASCAL 1. access to online terminals
nt
24. Borders can be applied to ? 2. Online processing of data
1. paragraph 2. Text 3. ignorance about existence of risk
3. Cell 4. All of these 4. All of these
25. ________ is used to produce graphic outputs.
oi

36. The______ data mining technique derives rules


1. VDU 2. PLOTTER from real­world examples.
3. SLOTTER 4. DISK 1. neural nets 2. Signal nets
26. Which is the popular direct access to secondary
P

3.data nets 4. All of these


storage of a computer? 37. ____ are used to identify the user who returns
1. Magnetic disk 2. RAM to a website.
3.ROM 4. PROM
ng

1. plug­ins 2. Cookies
27. The data in RDBMS is stored in database objects 3. Scripts 4. ASP’s
called? 38. The distance between text boundaries and page
1. directory 2. Tables margins is called?
3. Records 4. Fields
ni

1. tab 2. Margin
28. The operating system that allows different parts 3. Indent 4. Space
of a software program to run concurrently? 39. In 802.4 token bus _______ cable is used.
1. multi tasking 2. Multi threading
r

1. TP 2. Co­axial
3. Multi user 4. All of these 3. Fibre 4. All of these
Tu

29. The engineer ing discipline that involves 40. which technology used to protect E­Commerce
construction of computing devices of the size of page?
molecule is called? 1. HTTP 2. HTML
1. molecular process 3. ETP 4.SSL
2. Nanoscience
3. Nanotechnology
4. All of these
111 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
KEY 10. _________ is the term that describes a user’s
1 2 3 4 5 6 7 8 9 10 participation with a multimedia presentation.
4 4 2 2 1 4 3 2 4 1 1. Hyperactivity 2. Interactivity
11 12 13 14 15 16 17 18 19 20 3. Inactivity 4. Reactivity
4 3 2 1 4 2 3 2 4 3 11. which of the following operations is not performed
21 22 23 24 25 26 27 28 29 30 by a computer?
1 3 2 4 2 1 2 2 3 2 1. inputing 2. Controlling
31 32 33 34 35 36 37 38 39 40 3. Understanding 4. All of these
1 4 2 3 3 1 2 3 2 4 12. The time taken by CPU to retrieve and interpret

pa
the the instructions to be executed is called?
TEST-17 1. fetch cycle 2. Code cycle
1. When your computer suddenly stops working , it 3. Develop cycle 4. Instruction cycle

a
is called? 13. A_____ is not a form of biometrics.
1. crash 2. Die 1.fingerprint 2. Retina scan

ad
3. Death 4. Penalty 3. Breath scan 4. Password
2. The UNIX operating system typically used in? 14. _______ technology is typically used by intranet
1. Desktops 2. Web servers and extranet.
3. Laptops 4. Super computers 1. protocol 2. Paradigm
3. The ____ enables you to simultaneously keep
multiple web pages open in single browser
Window .
:K 3. Internet 4. Ethernet
15. A thing present in real world in physical form is
called?
1.tab box 2. Pop helper 1. DBMS 2. Entity
3. Tab row 4. Address bar 3. Module 4. All of these
4. Smart card is a? 16. Who invented PHP?
nt
1. special purpose card 1. rasmus lerdorf 2. Charless babage
2. Process unit for software handling 3. Dennis ritchew4. James gosling
3. money card 17. When we want draw a perfect shape____
oi

4. Microprocessor card should be used as key.


5. an example of a telecommunication device is a 1. shift 2. Ctrl
1. modem 2. Mouse 3. Alt 4. All of these
P

3.keyboard 4. All of these 18. Which of the following might prevent a program
6. Arrange the order of cables according to from being modified in future?
increasing order of speeds : twisted pair(T), co 1. pseudocode
ng

axial( C) , Fibre optics(F)… 2. Lack of program documentation


1.F<C<T 2. T<C<F 3. Logic errors
3. C<F<T 4. All have same speed 4. None of these
7. For National Informatics Centre , which is the 19. A device used with interactive graphics to control
ni

domain? cursor’s position on the screen is called?


1. .in 2. .co.in 1. light pen 2. Joystick
3. .nic 4. .mil 3. Trackball 4. None of these
r

8. A person who enjoys using computer is called a? 20. An email address consists of ?
1. hacker 2.user friendly 1. domain name followed by user name
Tu

3. Booster 4. Computer enthusiast 2. User name followed by domain name


9. ______ is a special character that can be used 3. username , space @follows domain name
in a file name. 4. Username @followed by domain name
1. hyphen 2. Colon 21. In MS­Word, a menu item in dim colour(gray)
3. Minus 4. Asterisk indicates that the item is?

112 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
1. toogle menu 2. More used menu 1.plates 2. Relays
3. Under process 4. Unavailable now 3. Tracks 4. Platters
22. Which of the following option used to exit the 33. A good practice, before installing new software,
program without leaving the application? is to make sure your____ software is up to
1. File 2. Edit date.
3. Close 4. None of these 1. Web browser 2. Domains
23. A 5G computer is also called as? 3. Control panel 4. Utility
1. laptop 34. image editors are used for creating and editing .
2.knowledge information Processing system 1. bitmap images

pa
3. PC 2. Vector images
4.PDA 3. Text
24. A set of rules that a computer on a network uses 4. none of these

a
to communicate with each other is called? 35. which protocol is used by the operating system
1. protocol 2. Ruler to generate error messages like “host

ad
3. King 4. None of these Unavailable” over a TCP/IP network?
25. computers send data to peripherals with the help 1. HTTP/0.1 2. ICMP
of ? 3. PPP 4. ICGM
1. parallel I/O interface 2. Modem 36. The memory which forgets everything when you

26.
3. Serial I/O interface
Microsoft Office is a
1. shareware
4. All of these :K switch off the power is known as
1. corrupt
3. Volatile
2.non volatile
4. Random access
2. Application suite 37. _______ is the measurement of things such as
3. Open source software fingerprints and retinal scans used for security
4 all of these access.
nt
27. what do you press to enter the current DATE in 1. Biomeasurement 2. Security
a cell? 3. Reasonality 4. Biometrics
1. ctrl+: (colon) 2. Ctrl+date 38. AMD manufactures which of the following?
oi

3. Ctrl+;(semicolon) 4. All of these 1. PC’s 2. Hard disks


28. What is the maximum number of columns that 3. Processors 4. None of these
can be inserted in a word2003 document? 39. _____is the act of copying pr downloading a
P

1. 25 2.35 program from a network and making multiple


3. 40 4.45 copies of it.
29. How many layers are there in TCP/IP model? 1. Network piracy 2. Software piracy
1. four 2. Five
ng

3. Licence piracy 4. None of these


3. Six 4. Seven 40. _____ are symbols that represent any character
30. A walky talky is an example of_____ system. or combination of characters.
1. simplex 2. Half duplex 1. wildcards 2. Private keys
ni

3. Full duplex 4. All of these 3. Public keys 4. None of these


31. All of the below storage media have read and KEY
write capability except for? 1 2 3 4 5 6 7 8 9 10
1. flash memory cards 1 2 3 4 1 2 3 4 1 2
r

2. Floppy disk 11 12 13 14 15 16 17 18 19 20
Tu

3. CD­ROM’S 3 4 4 3 2 1 1 2 3 4
4. Hard disk 21 22 23 24 25 26 27 28 29 30
32. A hard drive consists of spinning_____ madeup 4 3 2 1 1 2 3 4 1 2
of aluminium or ceramic that is coated with 31 32 33 34 35 36 37 38 39 40
magnetic media. 3 4 4 1 2 3 4 3 2 1

113 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
12. which of the following command is used to go to
TEST-18
home directory?
1. Most of the commonly used PC’S/laptops do not
1. cd…. 2. Cd/
have a command key known as?
3. Cd** 4. Cd
1. turnover 2. Shift 3. Alt
13. ___ symbol in flowchart indicates the beginning
4. Ctrl 5. None of these
and end in logic flow.
2. Which storage device is mounted on “reels”?
1. terminal 2. Flowline
1. floppy disk 2. Magnetic tape
3. Connector 4. Rectangle
3. Plastic tape 4. Malbar café
14. worm is made up of how many programs?

pa
3. A print program keeps track of every _______
1. 2 2. 3
placed on the screen.
3. 4 4. 1
1. image 2. Object
15. Integrated Service Digital Network(ISDN) lines
3. Pixel 4. Paper

a
provide
4. The stack pointer in 8085 microprocessor is a
1. voice circuits 2. Data circuits
1. 16 bit accumulator

ad
3. Both of these 4. None of these
2. Memory location on stock
16. Technologies like PCS, TDMA, CDMA and
3. any of 1 and 2
GSM are associated with
4. 16­bit register that points t stock memory
1. Monitor 2. Printers
location
5. The human readable version of a program is
called____
1. source code 2. Program code
:K 3. Mobile phones 4. None of these
17. ______ is a primary key of one file that also
appears in another file.
1. primary key 2. Foreign key
3. Human code 4. All of these
3. Private key 4. All of these
6. ________is called as the core of UNIX
18. Firewalls are used to protect against
operating system .
nt
1. authorized access
1. utility 2. Kernel
2. Unauthorized access
3. Device 4. Shell
3. Virus
7. In EXCEL, template is a
oi

4. Antivirus
1. title 2. Heading
19. To access a mainframe or supercomputer, users
3. Pattern 4. None of these
often use a
8. A person who writes a program for running the
P

1. node 2. Desktop
hardware of a computer is called
3.DTP 4. Terminal
1. system analyst 2. Data processor
20. Collecting personal information by effectively
3. Designer 4. Programmer
ng

posing as another individual is known as the


9. Which option not found in WORD’S page setup
crime of
dialog box?
1. Spooling 2. Spoofing
1. header and footer
3. Sniffing 4. Identity theft
2. Margins
ni

21. “Spelling and Grammar” check option in WORD


3. Sheets
2007 available in_____ menu.
4. Page orientation
1. review 2. Mailing
10. What is the maximum number of lines that you
r

3. View 4. File
can set for a drop cap?
22. ______contains data in oracle database.
1. 3 2. 10
Tu

1. extents 2. Datablocks
3. 5 4. 15
3. Tables 4. Segments
11. Which of the following do multimedia PC’s
23. To run desktop OS and applications inside virtual
contain?
machine _______is used.
1.scanner 2. Lan card
1. VGA 2. DVI
3. Sound card 4. None of these
3. VDI 4.VGS
114 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
24. which of the following is a low level language? 36. Which of the following is not an option under
1. BASIC 2. ALGOL change case of text in WORD?
3. COBOL 4. All of these 1. Indent case 2. Toggle case
25. Assembly instructions are in the form of 3. Upper case 4. Sentence case
1. binary 2. Digital 37. WAV,WMA, and AIFF are examples of which
3. English 4. None of these file format ?
26. To indicate an decision point in a program, an 1. audio 2. Video
_____ symbol is used. 3. Text 4. All of these
1. circle 2. Rectangle 38. What is the name of logic circuit which can add

pa
3. Diamond 4. Ellipse more than 2 binary digits ?
27. Thesaurus option in WORD2007 , is available 1. half adder 2. Full adder
at which menu? 3. Parallel adder 4. Serial adder

a
1. page layout 2. Review 39. The system unit of PC typically contains all of
3. File 4. Edit following except?

ad
28. Turnoff dialog box does not contain _____ option. 1. microprocessor 2. Disk controller
1. switch user 2. Standby 3. Modem 4. Serial interface
3. Restart 4. Turnoff 40. The view that shows maximum amount of
29. To handle “lost” and “ out of sequence” packet, information about each file in My Computer is
which layer is responsible?
1. transport layer 2. Network layer
3. Session layer 4. Physical layer
:K
KEY
1. small icons
3. Big icons
2. Medium icons
4. Details

30. Which of the following terms is used to describe 1 2 3 4 5 6 7 8 9 10


the connection of networks that can be 1 2 3 4 1 2 3 4 1 2
Joined together? 11 12 13 14 15 16 17 18 19 20
nt
1. Intranet 2. Internet 3 4 1 1 3 3 2 2 4 4
3. Extranet 4. Ethernet 21 22 23 24 25 26 27 28 29 30
31. Which of the below is a type of virus that modifies 1 2 3 4 4 3 2 1 1 2
oi

its program code each time it attaches 31 32 33 34 35 36 37 38 39 40


Itself to another program or file. 3 4 4 3 2 1 1 2 3 4
1. Worm
P

2. Trojan TEST-19
3. Polymorphic virus 1.Error messages in EXCEL sheet start with _____
4. Antispyware symbol.
32. The equipment which holds the screen of a
ng

1. @ 2. $
computer is_____ 3.= 4.#
1. modem 2. Printer 2. Video processor consists of____ and____ ,
3. Mouse 4. Monitor which store and process images.
ni

33. which of the following is 1G cellular technology? 1. CPU and VGA


1. GSM 2. CDMA 2. VGI and DVI
3. DAMPS 4. AMPS 3. VGA and Memory
34. A container used to display a set of tabbed pages
r

4. All of these
of elements is known as_____ 3. FAX is an example of _______ channel.
Tu

1. tab row 2. Address bar 1. Full duplex 2. Half duplex


3.tab box 4. File 3. Simplex 4. All of these
35. The most common binary code used today 4. Which of the following is key function of a
is_____ firewall?
1. ANSI 2. ASCII 1. Monitoring 2. Deleting
3. EBCDIC 4. BCD 3. Copying 4. Moving
115 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
5. _______ is a program that works like a 1. keyboard 2. Modem
calculator for keeping track of money and making 3. Mouse 4. Printer
Budgets. 16. The process of preparing a disk for use is called?
1. Calculator 2. Budgeter 1. formatting 2. Translating
3. Financer 4. Spreadsheet 3. Parsing 4. Assembling
6. The ability to recover and read deleted or 17. C language is
damaged files from criminal’s computer is an 1. High level language
Example of a law enforcement specially called? 2. High level with some features of low level
1. Simulation 2. Robotics 3. low level language

pa
3. Computer forensics 4. Animation 4. High level and low level
7. ____ server stores and manages files for network 18. The integrated circuits are made of which metal?
users. 1. Al 2. Mg

a
1. main 2. File 3.Si 4. All of these
3. Web 4. Attached 19. URL has how many parts in it?

ad
8. Database that spreads information across 1. many 2. One
different tables while maintaining links between 3. Two 4. Three
them referred as 20. All windows settings are stored in which file?
1. Relational Database 1. Win.INI 2.Windows.INI
2.Rotational database
3. Both of these
4. None of these
:K 3. Windows.set 4. None of these
21. CPU can directly understood which language?
1.C 2. C++
9. Custom software, developed to address the 3.JAVA 4.Assembly Language
specific needs of a company, is known as____ 22. Alternate key is considered as a part of _____
Software. key.
nt
1.proprietary 2. Custom 1. Primary 2. Foreign
3. Relation 4. Copyrighted 3. Candidate 4. Composite
10. Clicking special areas called_____ activates 23. Compression and decompression of message data
oi

various features of a multimedia presentation. done in which layer of OSI model?


1. starts 2. Buttons 1. application 2. Presentation
3. Stars 4. Planets 3. Session 4. Transport
P

11. The creation of storyboard is essential to the 24. ______ is the language used to write animation
development of the project. This is___ step of for WWW.
Development. 1. Java 2. C
1.designing 2. Creating
ng

3. C++ 4. COBOL
3. Planning 4. Coding 25. The database schema is written in which
12. Who is the founder of ORACLE corporation? commands?
1. Bill gates 2. Dennis ritchew 1. DDL 2. DML
ni

3. Linux torwards4. Larry Ellison 3.DDML 4. DCL


13. Which of the following is the fastest memory? 26. To move along the panes in windows explorer
1. DDR RAM 2. DDR1 RAM we press?
3.DDR2 RAM 4.DDR3 RAM
r

1. F4 2.F6
14. What is the name of an application program that 3.F8 4.F10
Tu

gathers user information and sends it to 27. In ____ topology each node os having direct link
someone through internet. with remaining all nodes in network?
1. Virus 2. Bomb 1. Bus 2. Star
3. Spybot 4. Malware 3. Mesh 4. Ring
15. Which of the following is example of
telecommunication device?
116 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
28. _____ is a method of storing data on two or more 40. 8085 microprocessor is an example of _____bit
hard drives that work in combination to do processor.
The job for larger drive. 1. 32 2. 16
1. DAID 2. Casting 3. 12 4. 8
3. Merging 4. RAID KEY
29. A Robot consists of 3 basic components :Power 1 2 3 4 5 6 7 8 9 10
Supply, Memory and? 4 3 2 1 4 3 2 1 1 2
1. Arms 2. Software 11 12 13 14 15 16 17 18 19 20
3. Cable 4. None of these 3 4 4 3 2 1 2 3 4 1

pa
30. Dvorak is used with reference to 21 22 23 24 25 26 27 28 29 30
1. mouse 2. Keyboard 4 3 2 1 1 2 3 4 1 2
3. Printer 4. Scanner 31 32 33 34 35 36 37 38 39 40

a
31. The simplest and commonly used error detection 3 4 4 3 2 1 1 2 3 4
code is called ?

ad
1. hamming bit 2. Odd bit TEST-20
3. Parity bit 4. None of these 1. Which of the following program is no a popular
32. Housing all hardware, software, storage and DTP program?
processing in one location is called? 1. Adobe page maker
1. time sharing 2. Data sharing
3. Frame design 4. Centralized processing
33. The process of getting access to the computer is
:K 2. MS Publisher
3.QuarkXPress
4. Lotus AmiPro
called? 2. AVERAGE is an example for
1. sign in 2. Enter 1. formula 2. Field
3. Log off 4. Log in 3. Table 4. Function
nt
34. _____ are used to Add some new features from 3. ____ are specially designed computer chips that
internet to an allready installed application reside inside other devices such as car or
1. plug ins 2. Flash Electronic thermostat.
oi

3. Add­ons 4. None of these 1. Servers


35. The extension name of a flash file is? 2. Clients
1. .fls 2. .swf 3. Embedded computers
P

3. .pmd 4. .aws 4. None of these


36. WIMAX technology is based on the IEEE____ 4. Which of the following describes database fields?
standard. 1. structures 2. Field makers
1. 802.16 2. 802.15
ng

3. Field names 4. Field labels


3. 802.14 4. 802. 13 5. A______ is a small program that helps automate
37. When you install a new program on your a frequently used series of commands in most
computer, it is typically added to the menu at? productivity software tools.
ni

1. All programs 2. Select program 1. Template 2. Macro


3. Start program 4. None of these 3. Starter 4. Thermal
38. Information in a memory that’s no longer valid 6. _____ is called as a supervisor of computer
or wanted is known as ?
r

activities.
1. volatile 2. Garbage 1. memory 2. Operating System
Tu

3. Surplus 4. Non­volatile 3. CU 4. ALU


39. To request data from the DBMS,______ is used 7. ____ are the summarized version of slides that
in application programs. display only titles and main text.
1. DDL 2. DDML 1. outlines 2. Handouts
3. DML 4. None of these 3. Notes 4. Slide sorter

117 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
8. In_____ , the cells are referred by their fixed 21. Which multiplexing technique Is used in ATM?
position in the worksheet. 1. FDM 2. SDM
1. absolute referencing 2. Cell referencing 3. WDM 4. Asynchronous TDM
3. Relative referencing 4. None of these 22. Data division is the third division of a ______
9. Machine code is which level language code? program.
1.high level 2. Software level 1. LISP 2. FORTRAN
3. Middle level 4. Low level 3. COBOL 4. BASIC
10. The default lines to drop cap is ? 23. Which of the following is a processing language?
1. 1line 2.2 lines 1. COBOL 2. LISP

pa
3.3lines 4.4 lines 3. FORTRAN 4. BASIC
11. In Database, the collection information is entered 24. ________file is created in Microsoft Excel.
in which place? 1. Data 2. Program

a
1. table 2. Field 3. Folder 4. Local
3. Tuple 4. None of these 25. Which of the following is an example of Toggle

ad
12. A picture, map or graphics or image that can be Keys?
used in a document is called as? 1. Scroll lock 2. Del key
1. object 2. Clip 3. Page up key 4. None of these
3. Clipboard 4. None of these 26. Which type of memory is in pendrive?
13. Protect document option available in WORD
2007 , at which menu?
1. Review 2. File
:K 1. cache memory 2. Flash memory
3. ROM 4. RAM
27. In a sequence of events that take place in an
3. Edit 4. View instruction cycle, the second cycle is called?
14. Master file contain data of ____ nature. 1. fetch cycle 2. Code cycle
1. temporary 2. Permanent 3. Decode cycle 4. Execute cycle
nt
3. Local 4. Global 28. IRC stands for what?
15. Which view of the start menu has turn off option? 1. Inter Relay chat
1. modern 2. Advanced 2. Internal relay chat
oi

3. Classic 4. Normal 3. Internet reliable chat


16. The ____ component is used by the data analyst 4. Internet relay chat
to create the queries that access the database. 29. The Intel 8085 is an____microprocessor
P

1. Data mining 2. Data extraction introduced in year of_____.


3. Data store 4. End­user query tool 1. 16­bit,1976 2. 16­bit,1977
17. ______ is written for those who do not know 3. 8­bit, 1976 4. 8­bit, 1977
very much about computer.
ng

30. CAD software is most likely to be used by


1. tutorial 2. Patch 1. web designers
3. Version 4. None of these 2. Project managers
18. In Windows XP, which key used to cycle through 3. Civil engineers
ni

opened items in taskbar? 4. None of these


1. ctrl+tab 2. Alt+tab 31. MS­Movie Maker and Apple Imovie­HD are
3. Ctrl+esc 4. Alt+esc examples of____ software?
19. Network interface card is housed in which
r

1. web design 2. Digital video editing


place? 3. Painting 4. None of these
Tu

1. CPU 2.ALU 32. A disk storage medium in the form of an assembly


3. Mother board 4. RAM containing a single rigid magnetic disk
20. _____ command is used to clear the screen in permanently is called____
DOS. 1. Disk cartridge 2. Fixed disk
1. clear 2. Cl screen 3. Card reader 4. Card writer
3. Clear screen 4. Cls
118 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
33. Retail employees typically use ____ terminals TEST - 21
for sales transactions.
1. POS 2. PDS 1. While running DOS on PC, which of the following
3. PRS 4. PQS used to duplicate the entire diskette?
34. A device that is connected to the mother board 1. COPY 2. DISKCOPY
is_____ 3. CHKDSK 4. TYPE
1. peripheral 2. The following are components of database except:
2. Connected using ribbon cable 1. user data 2. Meta data

pa
3. Adjunt device 3. Reports 4. Indexes
4. None of these 3. DOS cannot retrieve any data from a disk if a
35. A device that is connected to the CPU is____ computer virus corrupts the___ of computer.
1. adjunt device 1. directory 2. Data

a
2. Connected using ribbon cable 3. Batch file 4. FAT
3. Peripheral 4. Salami attack is a type of attack that operates on

ad
4. None of these which data?
36. The process of a computer receiving information 1. confidential 2. Company
from a server on the internet is known as? 3. Employee 4. Financial
1. pulling 2. Pushing 5. IPV6 address is of how many bits?
3. Uploading 4. Downloading
37. For selecting or highlighting, which device used
generally?
:K 1. 256
3. 128
2. 512
4. 64
6. The fastest logic family is ?
1. Icon 2. Keyboard 1. TTL 2.ECL
3. Disk 4. Mouse 3. DT 4. RTL
38. The different styles of lettering in a word 7. Which language used for artificial intelligence?
nt
processing program: 1. FORTRAN 2. PROLOG
1. writing 2. Calligraphy 3. C 4. COBOL
3. Font 4. Manuscript 8. In ____ topology, each node has 2
oi

39. The record produced in audit trail is known as: communicating subordinates but no master node.
1. job file 2. Journal tape 1. star 2. Bus
3. Journal stream 4. Job tape 3. Ring 4. Mesh
P

40. A collection of graphics programs and supporting 9. _____ is used by kiosks to simplify the interface.
data files is called as: 1. track pad 2. Mouse
1. graphics suite 2. Shareware 3. Projector 4. Touch screen
ng

3. Groupware 4. Shared program 10. In a ring topology, the computer in procession of


KEY ____ can transmit data.
1 2 3 4 5 6 7 8 9 10 1. packet 2. Token
4 4 3 3 2 2 1 1 4 3 3. Position 4. Access
ni

11 12 13 14 15 16 17 18 19 20 11. X.21 protocol consists of:


2 1 1 2 3 4 1 2 3 4 1. Physical levels 2. Frame and packet levels
21 22 23 24 25 26 27 28 29 30 3. Both 1&2 4. Only packets
r

4 3 2 1 1 2 3 4 4 3 12. The word function that corrects text as you type


31 32 33 34 35 36 37 38 39 40 is referred to as:
Tu

2 1 1 2 3 4 4 2 2 1 1. auto summarize 2. Auto insert


3. Au correct 4. Auto correct
13. Window registry consists of___ and____ files.
1. user.dat, win.ini
2. User.dat, system.dat
3. Win.dat, user.dat 4. All of these
119 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
14. A machine which converts mnemonic code to 3. domain name system
machine code is called: 4. Direct name system
1. interpreter 2. Compiler 27. Multiple calculations can be done by a single
3. Assembler 4. Mnemoner formula using:
15. What is the range of an IP Address? 1. complex formula
1. 1­255 2. 1­300 2. Array formula
3. 0­256 4. 0­255 3.smart formula
16. You can group non­contiguous worksheets with? 4. Standard formula
28. _____ is not a mode in starting windows.

pa
1. alt key, mouse 2. Ctrl key, mouse
3. Alt+ enter 4. Ctrl+enter 1. safe mode
17. Which of the following is not an option in the 2. Turbo mode
spelling dialogue box? 3. Command prompt

a
1. ignore 2. Ignore all 4. Normal mode
3. Edit 4. Change all 29. In the OSI model, which layer work as interface

ad
18. A kind of serial dot­matrix printer that forms between user and the network?
characters with magnetically –charged­ink­ 1. transport layer
sprayed­dots is called : 2. Data link layer
1. Laser 2. Drum printer 3. Application layer
3. Daisywheel 4. Ink­jet printer
19. If 20 people need to communicate using
symmetric­key cryptography, how many
:K 4. Network layer
30. After a user has saved and deleted many files,
many scattered areas of stored data remain that
symmetric Keys are needed? are too small to be used efficiently, causing:
1. 200 2. 20 1. Disorder 2. Disarray
3.19 4.190 3. Formatting 4. Fragmentation
nt
20. Rules of programming language are called: 31. EBCDIC can code up to how many different
1. method 2. Error characters?
3. Syntax 4. Procedure 1. 256 2. 128 3.64
oi

21. A primary key can also be called_____ 4. 32 5. 8


1. super key 2. Candidate key 32. Which of the following is graphics solution for word
3. Alternate key 4. Foreign key processors?
P

22. moving process between main memory and disk 1. wordart 2. Clipart
is called: 3. Dropcap 4. All of these
1. caching 2. Swapping 33. UNIX operating system was developed by
ng

3. Spooling 4. Spoofing 1. waiter baatain 2. Charles


23. All the information collected during database 3. Ken Thompson 4. Blaise pascal
development is stored in a: 34. Airlines reservation system is a typical example
1. repository 2. Disk of
ni

3. Data ware house 4. CD 1. batch processing


24. ____ Gate is used to invert the input signal. 2. On­line processing
1. AND 2. NOR 3. Real­time processing
r

3. OR 4.NOT 4. All of these


25. How many types of view are present in power 35. Which of the following files plays important role
Tu

Point? in booting DOS?


1. 1 2. 2 1. MSCDEX.EXE
3.3 4.4 2. DOSKEY.EXE
26. DNS stands for: 3. CONFIG.SYS
1. Domain name service 4. DRIVER.SYS
2. Domain network system
120 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
36. CRAYX­MP belongs to ____ generation. 1. word length 2. Density
1. 5th 2. 4th 3. 3rd 3. Field 4. Data density
4. 2nd 5. 1st 4. .RAR stands for:
37. In MS­Access, screens used for displaying data 1. Roshal Archive
from and inputting data into your tables are 2. Read and right
called: 3. Right attributes
1. Reports 2. Modules 4. All of these
3. Forms 4. Tables 5. The format for musical data communication
38. A data type used for non­textual data like between 2 devices such as computer and

pa
pictures, sound and videos is called: Synthesizer, is called:
1. Complex 2. video 1. MP3 2. MIDI
3. Audio 4. OLE object data type 3. MPEG 4. HTML

a
39. Which of the following is a feature of UNIX? 6. An entity set that does not have sufficient
1. multi tasking 2. Multi­user attributes to form a primary key is a:

ad
3. Reliable 4. All of these 1. strong entity set
40. KDE and GNOME are two main 2. Simple entity set
1. Operating system 3. Weak entity set
2. System boards 4. Primary entity set

KEY
3. GUI
4. All of these
:K
7. IPV6 is written in___ notation.
1. binary
3. Decimal
2. Octal
4. Hexa decimal
8. The third step in the transaction processing cycle
1 2 3 4 5 6 7 8 9 10 is:
2 3 4 4 3 2 2 3 4 2 1. adult 2. Field op
nt
11 12 13 14 15 16 17 18 19 20 3. Op field 4. Database operation
3 4 2 3 4 2 3 4 4 3 9. Functions such as multiplexing and segmenting
21 22 23 24 25 26 27 28 29 30 of the data are performed by__ layer.
oi

2 2 3 4 4 3 2 2 3 4 1. application 2. Physical
31 32 33 34 35 36 37 38 39 40 3. Network 4. Transport
1 2 3 4 3 2 3 4 4 3 10. Application software is designed to accomplish
P

1. computer works
TEST-22 2. Gaming tasks
3. Real­world tasks
ng

1. The first line of the “C” program contains a____, 4. OS tasks


indicated by “#include”. 2 11. Based on display documents feature, how many
1. processing directive types of word processing packages are Available?
2. Preprocessing directive 1. One 2. Two
ni

3. Main directive 3. Three 4. Four


4. All of these 12. How many types of encoding forms are available
2. Find the correct set of 3 types data found in a in UNICODE?
1. Three 2. Four
r

spreadsheet.
1. data, words, numbers 3. Five 4. Two
Tu

2. Words, numbers, labels 13. Which of the following protocols is used to locate
3. numbers, formulas, labels the hardware address of a local device?
4. None of these 1. ARP 2. PONG
3. The number of characters that can be stored in 3. PING 4. RARP
a given physical space is called:

121 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
14. In analog computer: 23. _____ use the entire capacity of a dedicated link?
1. input converted into digital form 1. Circuit aswitching
2. Input never converted into digital form 2. Virtual Circuit Packet Switching
3. output displayed in digital form 3. Datagram Packet Switching
4. Output displayed in both forms 4. All of the above
15. Human beings are referred as Homo sapiens, 5. None of the above
which device called silico sapiens? 24. The instruction given by the computer operator
1. Robot 2. Hardware is called :
3. Computer 4. Monitor 1. File 2. Data

pa
16. The storage subsystem in a microcomputer 3. Instructions 4. Processing
consists mainly of ___ media with varying 5. Command
Capacities ? 25. A half byte is known as :

a
1. Optical or memory 1. Bit 2. Data
2. Memory or video 3. Nibble 4. Half byte

ad
3. Video or magnetic 5. Double byte
4. Magnetic or optical 26. ____ refers to maintaining and assuring the
17. The computer that processes both analog and accuracy and consistency of data ?
digital is called? 1. Data interpretation
1. mainframe
3. Analog
2. Digital
4. Hybrid
18. The components that process data are located in
:K 2. Data independence
3. Data integrity
4. Data redundancy
the? 5. All of the above
1. Internal memory 2. Printer 27. A telephone number, a birth date and a customer
3. System unit 4. Monitor name are examples of ___?
nt
19. Which of the following device can be used to 1. A record 2. Data
directly image the printed text? 3. File 4. Database
1. MICR 2. OCR 5. Project
oi

3. OMR 4. Smart card 28. Why is the Caps Lock Key referred to as a Toggle
20. The device which is not connected to CPU is key?
called: 1. Because it cannot be used to delete
P

1. offline device 2. Online device 2. Because it cannot be used for entering number
3. Peripheral 4. Reddy device 3. Because it cannot be used to insert
21. A spooler is a(n): 4. Because it's funcation goes back and forth
(1) Location in memory that maintains the
ng

every time it is pressed


contents of a document until it prints out. 5. None of these
(2) Print job 29. A sales clerk at a checkout countres scanning a
(3) Program that coordinates the print jobs that tag on an item rather than keying it into the system,
ni

are waiting to print. is using?


(4) Message sent from the printer to the operating 1. Item date automation
system when a print job is completed 2. Input automation
(5) All of the above
r

3. Scanning automation
22. Which protocol is used by operating system to 4. Source data automation
Tu

generate error message like 'Host Unreachable' 5. None of these


over a TCP/IP network ? 30. Amazon.com comes under the following business
(1) HTTP/1.1 (2) ICMP (3) PPP model :
(4) ICGM (5) TCP/IP 1. B2B 2. B2C 3. C2C
4. C2D 5. B2D

122 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
31. Binary equivalent of 10 is ? 37. Total height of a line of text including extra
1. 1110 2. 1010 3. 1011 spacing is known as :
4. 0111 5. 1001 1. Alignment 2. Indent
32. Which one of the following input device is user ­ 3. Break spacing 4. Line spacing
programmable? 5. Margin
1. Dumb terminal 38. From which menu you can insert header and
2. Smart terminal footer ?
3. VDT 1. Insert 2. View 3. Format
4. Intelligent terminal 4. Tools 5. Add

pa
5. None of these 39. Printer and scanner are called ?
33. The language used for children and kids for 1. input devices 2. output devices
drawing graphic line diagrams : 3. peripherals 4. both 1 & 2

a
1. PROLOG 2. LOGO 3. COMAL 5. None of these
4. ALCOL 5. ALOGE 40. Which of the following is a formating method ?

ad
34. A computer intensive problem runs a ___ 1. NIC 2. NTSS 3. BTS
1. server 2. mainframe 4. NTFS 5. None of these
3. super computer 4. super PC
5. None of these KEY
35. Which of the following is the lates processor ?
1. 15 2. 17
4. Core to dual 5. None of these
3. 13
1
2
:K 2
3
11 12
3
4
13
4
1
14
5
2
15
6
3
16
7
4
17
8
4
18
9
4
19
10
3
20
36. In MS word the margins, indents and tabs are 2 1 1 2 3 4 4 3 2 1
set by : 21 22 23 24 25 26 27 28 29 30
1. Status bar 2. Ruler bar 3. Toll bar 5 2 3 5 3 3 2 4 2 2
nt
4. Menu bar 5. Title bare 31 32 33 34 35 36 37 38 39 40
2 4 2 2 2 2 4 2 3 4
P oi

oi n t ...
ng P
ng

i
TurnWishes You...
est ...!
B
ni

he
All t
r
Tu

123 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in


Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
TEST YOUR COMPUTER KNOWLEDGE 05. What is the latest processor name from Intel ?
06. One million bytes can be called as ?
Quiz - 1
07. What are basic building blocks of IC's ?
01. Who is father of Computers ? 08. Windows & macintosh are two different ?
02. What are chief components of 1G Computers? 09. Which is multiuser operating system ?
03. Analytical Engine runs on which memory? 10. In DOS, what is command for list of
04. In which year IBM PC introduced? directories?

pa
05. What is the first electronic computer ? Quiz - 4
06. Barcode Readers takes product cost
01. What is shortcut for open dialogue box ?
automatically through which mechanism?
02. What is shortcut for save as dialogue box ?

a
07. What is the measurement of Resolution for
03. What is shortcut for spell check in MS Word?
monitor?

ad
04. What is shortcut for Date formation in current
08. The process of priority in printer is maintained
cell of worksheet?
by which code ?
05. What is shortcut for Slide show in MS ­
09. Instructions given by computer operator called

10.
as ?
Which language used by children for drawing
:K
06.
Power point ?
What is shortcut for page Justify / Vertical
centering in Document?
graphic images ?
07. The cut or copied text stored temporarily in ?
08. Thesarus present in which menu of MS Word
Quiz - 2
nt
09. Portrait & Landscape pertains to what?
01. Who performs POST in computer? 10. Line count & Page count of document present
02. Which Protocol Provides internet for mobiles? at which bar ?
oi

03. virtual memory present in which location of


Quiz - 5
computer?
P

04. Full form of PCI 01. Which protocol responsible for message
05. In MICR, C stands for what ? delivery in Internet?
06. Full form of NIC 02. WWW full form ?
ng

07. Which storage medium used widely in computer 03. NNTP full form ?
( magnetic / optical ) ? 04. In TCP & UDP which is connection oriented
08. What is fullform of SD Memory cards? protocol?
ni

09. Who is the supervisor of system compnents? 05. Which is small & single site network?
10. Who is the supervisor of system functions? 06. Which device used in FDM for seperation of
r

Channels?
Quiz - 3
07. Unsolicited & Junk mails are stored in which
Tu

01. Which language used in scientific calculations?


folder ?
02. Java is high level or low level language?
08. What is the storage house of e­mail contents?
03. Which translator compiles program code line
09. Full form of ARPANET ?
by line ?
10. Full for of HTML ?
04. What is binary code for 10 ?
124 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
QUIZ ANSWERS : Quiz - 4
Quiz - 1 01. Ctrl + F12
02. F 12
01. Charles Babbage
03. F7
02. Vaccum Tubes / Electronic Valves
04. Ctrl + Shift + #
03. Counter Wheels
05. F5
04. 1981
06. Ctrl + J

pa
05. ENIAC
07. Clipboard
06. Input Automation
08. REVIEW
07. DPI ­ Dots Per Inch
09. Page orientation

a
08. Spooler ( Numeric Code)
10. Status Bar
09. Commands

ad
10. LOGO
Quiz - 5
Quiz - 2
01. TCP
01. BIOS
02.
03.
WAP ­ Wireless Application Protocol
Hard Disk
:K
02.
03.
World Wide Web
Network News Transfer Protocol
04. TCP
04. Peripheral Component Interface
05. LAN
05. Character
06. Band Pass Filters
nt
06. Network Interface Card
07. SPAM
07. Magnetic Medium
08. Mail box
08. Secure Digital
oi

09. Advanced Research Projects Agency Network


09. Control Unit
10. Hypertext Markup Language
10. Operating System
P

Quiz - 3
ng

01. FORTRAN
02. High level Language
03. Interpreter
oi n t ...
ng P
04. 1010
ni

i
TurnWishes You...
05. I7
06. Mega Byte
...!
r

07. Logic Gates


e B est
All t h
Tu

08. Platforms
09. LINUX
10. ls

125 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in

You might also like