Professional Documents
Culture Documents
KNOWLEDGE
Very useful for
IBPS / SBI / RBI &
Sachivalayam Exams
Turning Point
Head Office Branch Office
KADAPA (A.P.) CHENNAI (T.N)
Rayachoty Road, Sembakkam
Utukuru, Kadpa. 9677166270
868 80 80 80 2 9677166210
Excellent Coaching For
cOMPuter basics
.. Evolution / History
Generations
. Input & Output Devices
.. Types of Computers
Memory & Types of Memory
. Low Level & High Level Languages
. Terms Related Programming
sOFtWares & tyPes
.. Operating Systems
Application Softwares
. Utility Softwares
Ms - OFFice & shOrt cuts
Topologies
.. Data Transmission
OSI Reference model - PROTOCOLS
security threats & virus
Studycircle
CALCULATOR : The device that performs mathematical operations but it has no storage capacity
COMPUTER : The device that works in electric medium and performs both mathematical and logical
operations with storage capacity.
pa
Accepts input (data)
Processes the given data
Produces output (information)
Stores the output for future use.
a
Properties that determine power & cost of Computer :
ad
i) Speed : Computer peforms billions of instructions per second (also MIPS)
ii) user friendly : Very easy to use a computer by humans
iii) Reliability
iv) Accuracy
:
:
:K
It does not commit mistake / error
It produces the correct results with given input
* 1801 Joseph Jaquard introduced Punched cards that were used in cotton looms &
Weaving patterns to store data
* 1941 JP Eckert & JW Mauchly invented ENIAC.
ni
pa
2nd 195663 Transistors Magnetic cores No Assembly IBM 700/1401
Magnetic Tapes Language, IBM 7030
FORTRAN,
COBOL
a
3rd 196471 Integrated RAM, DISKS LINUX ALGOL CDC 6600/760
Circuits C, C++ IBM 360
ad
JAVA IBM 370
SQL CRAY1
4th 1972 LSI/VLSI All Primary, Windows SQL All PC's &
Present Very Large Scale Secondary DOS, ORACLE Desktops,
5th Develo
Integrators
Artificial
:K
Storage devices LINUX CRAYXMP
pment Intelligence,
Phase. Robotics & Knowledge Information Processing Systems
Nano Science.
nt
Note : Now we are in 4G and using 4 G technology only.
Artificial Intelligence : The Intelligence (science) involved and used by machines to perform the human
activities such as writing, reading and all the human activities.
oi
Nano Science : The Science / technology which involves in observation & deals with particals of
1100nm size itself.
NM indicates Nanometer, which is the least measurement
P
Robotics : The Sensitive operations in human body are performed through Rod like structures
that acts according to machine instructions & these technology is called Robotics.
SYSTEM ARCHITECTURE
ng
INPUT DEVICES
a) Mouse : It is the Pointing device
It works on principle of drag & drop icons (objects)
To get Properties of any object, we have to press Right button of mouse
The Scroller is present b/w two buttons of mouse.
Ball mouse & optical mouse are two types of mouse.
2 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
b) Key Board : The most widely using device for Input
We use QWERTY keypad boards.
Each press on key of key board is " keystroke"
key stroke is first converted into ANSI Code.
ANSI American National Standard Institute
IMP. KEYS :
* Capslock : It is used to change the letter case of Text
* Function keys : F1 to F12 are 12 functional keys.
* NumLock : It locks the Number pad and change the numbers into directional keys.
pa
* Modifier keys : Alt , Ctrl , Shift
* Task manager keys : Alt + Ctrl+ Del. (Turnoff user accounts)
* End : To bring cursor to the end of current line.
a
* Tab key : To indent (initialise) the paragraph
* Toggle keys : Key which performs 2 different actions on Pressing.
ad
Ex: Caps Lock, Num Lock
c) Scanner : The electrical device that converts hard copy of text / image into a computer photographic
image that can be stored in the computer memory.
TWAIN is related to scanner (verify fullforms)
c) Barcode Readers :
:K
d) Joystick : The device used in computer for playing games as an directional device.
Barcode : The lines of different length and width found on tags / products and this code is
recognized by computer system.
Barcode Reader : Through Input Automation, these readers take the rate/cost of product automatically
at POS (point of sale) Systems
nt
f) MICR Device :
MICR Magnetic Ink character Recognition
This technique used for cheque clearance in Banks.
oi
pa
Fig : Printers classification
i) Impact Printers : This type of printer strikes paper and ribbon together to form character on paper.
Graphics cannot be printed by using these printers
* Daisy wheel : These are typewriters & slow printing Only for text.
a
Petals are typewriter keys
* Dot matrix : These are called pin printers.
ad
These are bidirectional printers
used in railway ticket printing
* Band Printer : Very fast, expensive & sound making.
Used in printing current Bills, Bus Tickets etc.,
:K
ii) Non-Impact Printers : ( Speed measured in characters per second)
It does not strike the paper but uses ink spray or toner powder.
* InkJet : Used for colour printing
It uses ink to spray on paper
These are replaced with Laser printers.
* Laser :
nt
It prints more number of pages per minute, than other printers.
It prints high resolution on paper
It prints high quality graphics
oi
It has penlike structures which prints graphics on flex according to computer instructions
Ex : Movie Banners Printing.
Spooling : The process of maintaining on order of pages that has to be printed in sequence.
The order of sequence is maintained by the spooler (special numeric code)
ni
pa
Ex: Mobile phone Headset
TYPES OF COMPUTERS BASED ON DATA TAKEN & OUTPUT
i) Digital : The computers count data or signals as "on" or "off" in binary digits only
ii) Analog : It recognises data as continuous measurement in wave form by continuous electrical pulses.
a
iii) Hybrid : Combination of measurement and wave signals forms hybrid computers
ad
Ex : Computers in Hospitals
* The DIGITAL COMPUTERS are divided into 4 types based on speed.
pa
Instead of mouse, touchpad is present on Laptop.
These are portable, so can be carried any where
b) Palmtops : The devices that are smaller than Laptops but can perform same works.
Mostly used for surfing Internet only.
a
These are also called personal digital assistants (PDA)
ad
Ex: Samsung tabs, Note pads, Note books.
c) Smartphones : Devices used for both making calls and surfing Internet.
d) Small keypad mobiles :
WAP is the protocol that provides internet facility for small mobile phones.
WAP Wirless Application protocol
Ex: Nokia classic mobile.
:K
CENTRAL PROCESSING UNIT (CPU):
* The CPU is containing many hardware components that combinely called as system unit.
What is Hard ware & Software ?
P
Hardware : The physical components of a Computer that we can see and touch.
Ex : CPU, Monitor, Keyboard, Hard disk, Floppy Disk, CD etc.
Software : It refers to the programs which are required to operate the computer, we cannot touch & see
ng
* CMOS Battery :
Tu
pa
* Data Bus :
It sends the data from RAM to Hard disk and recieves data from Hard disk to RAM
It is Bidirectional Bus
* BIOS CHIP : (Basic Input Output System)
a
It is the ROM chip on mother board
ad
BIOS chip is hardware and it contains BIOS software files so it is called FIRMWARE.
BIOS memory cannot be deleted because it is ROM.
* FAN : It is the cooling agent for mother board components and CPU.
* Expansion slots :
:K
These are slots provided to install the extra cards such as video graphics cards & multimedia cards.
These slots are present on mother board.
* SMPS : Switch Mode Power Supply
It supplies power to CPU by converting AC to DC. (AC Alternate Current, DC Direct current)
* PCI Slot : Peripheral component interface slots ( connecting external devices)
nt
* Processor Chip :
Processor converts the input to output and made up of silicon metal
So Computers are called as silico Sapiens.
oi
CISC RISC
Complex Instruction Set Computer Reduced Instruction set computer
It allows more number of It allows small & limited number of signals
ni
pa
It has the same properties as SRAM only.
iii) DRAM : Dynamic Random Access memory
It is low in speed of Access ( It has 1 Transistor & 1 Capacitor)
It requires many number of times to refresh the system
a
Market Availability of RAM :
1) SIMM - Single Inline memory module
ad
It has 30 or 72 pins
It supports 16 & 32 bit data transfer Rates
2) DIMM Dual Inline Memory Module.
It has 168 pins
It supports 64 Bit data transfer Rate
:K
Ex: DDR 1, 2, 3 ( DDR = Double Data Rate), DDR 3 is the fastest RAM
Note : Above are the important CPU components on mother boards.
Read Only Memory (ROM) :
nt
It is non volatile memory and permanent memory.
It cannot be erased. It is read only memory but not write to it.
* TYPES of ROM :
oi
i) PROM : Programmable ROM (It is Empty chip to add any program to it)
ii) EPROM : Erasable Programmable ROM
iii) EEPROM : Electrically Erasable Programmable ROM
P
PORTS :
* MIDI PORT : Musical Instruments digital input
ng
These ports are used to connect printers & Scanners in previous days & now also
* USB Port : Universal Serial Bus.
This port is to connect all external devices with the cable
r
Now pendrives & data cables are connected to this port only.
Tu
Hard Disk :
The storage point of computer is the hard disk
It stores operating system, softwares & Data etc.
Memory varies from GB's to TB's in size for Hard disk capacity.
Note: System requires more memory to save voice, graphics, images when compared to text data.
Memory
pa
DVD'S
memory cards
floppy disks
a
i) Primary Memory :
It is system's main memory called RAM
ad
It is the memory used only for processing data not for storing the data
It is temporary & volatile memory or Internal memory.
ii) Cache memory :
The fastest memory in computer & it is volatile
It holds the previous instructions of computer
These chips are very costly.
:K
iii) Secondary memory :
The memory which is stored for further or future use is secondary memory.
nt
The memory is non volatile but it can be mainpulated ( changed)
It is also called Auxillary memory or External memory.
Examples of secondary storage devices
oi
1 1
Its size varies in length of 3 , 5 , 8 inch disks
2 4
1
The memory size of 3 inch floppy disk is 1.44 MB
2
The memory deleted from floppy disk cannot be retained back from computer.
9 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
* CD : Compact Disc.
Its memory capacity is 700 MB
Invented by James Russel in 1965
It is written or read by laser beam of light
* DVD : Digital versatile disc
Its memory size is 4.7 GB
* Bluray Disc : 25 GB & 50 GB memory disks are called Bluray discs
Bluray Discs are used to store high definition quality videos only.
pa
ACRONYMS PRESENT ON CD & DVD'S
i) ROM - Read Only Memory, we cannot write data to it. (built in Soft Ware Disc)
ii) R - Recordable - Write once, Read many times (WORM), cannot Rewrite data to this disc.
a
iii) RW - Re write data for many times & we can delete data many times.
ad
* Magnetic Tapes :
These are magnetic storage medium components
These follows sequential access medium principle
Every time we have to read data from beginning Part only, no skipping.
Ex: Cinema Reels in olden days. :K
* Disk formating : Formation of Tracks and sectors on any disk is called Disk formating
UDF : Universal Disk Format (FAT / NTFS)
Clusters on disk holds the data.
4) Flash devices / Flash memory :
nt
The devices like digital camera, ipods are connected through cables to access their memory in computers
These type of devices are flash devices & has non volatile memory.
Memory accessed through cables is called flash memory
oi
5) Virtual memory :
When ever the RAM memory is not sufficient to hold the processing data, it uses hard disk memory as
P
hidden memory to process the specific task. So the memory utilised from hard disk is called virtual memory.
virtual memory is present in hard disk.
Example : When installing operating system (3.2 GB) , if the RAM is 2GB size, it uses hard disk during
ng
Note : With this we complete the types of memory & devices of different types.
CPU Processing units :
r
ALU
Tu
INPUT CU OUTPUT
MU
CPU mainly divided its processing into ALU, CU & MU
10 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
i) ALU : Arithmetic and Logic Unit
It performs all the arithmetic & Logical processing of CPU
The registers are present in ALU, that holds very small memory & performs Simple math operations
* Accumulator : It holds the processing data & output result to display
* Program counter : It holds the next instruction that has to be performed by ALU or Registers
* Data Register : It holds the complete data on the hard disk while Processing.
ii) CU : Control Unit
pa
The Control unit controls & Coordinates all the parts of computers (system components)
Control pins are present and that controls all the components of computer.
iii) MU : Memory Unit
It contains RAM, ROM, Hard Disk ( already explained)
a
LANGUAGES AND SPECIFICATION
ad
* FORTRAN
- Formula Translation (1957)
Coding used for scientific research / Calculations
* COBOL
Common Business Oriented Language (1957)
Used in business computations
:K
* ALGOL : Algorithmic Language
The language that given a scope for developing the C, C++ & Java languages
* HTML : Hyper Text Markup Language.
nt
The web pages are saved or viewed in HTML format only
* JAVA : Applets can be created by this language.
The language used for webpage creation, websites hosting
oi
developed by sun micro systems, invented by James Gosling & his Team
* C++
P
The computer games (Basic) were developed using this language, invented by Bjarne Stroustrup (1983)
* XML : eXtended Markup Language (world wide web consortium)
* PHP : Personal Home Page. ( Designed by Rasmus Lerdorf 1995)
ng
*C
Invented by Dennis MacAlistair Ritchie in 1972
This language coding replaced by Java now
Printf takes the output statements in code
ni
* .NET
The language came in recent days for programming (web designing)
Note : The computers cannot understand any of the above languages, it needs only machine language or Binary
code to understand.
Binary code means 0's & 1's
11 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
Programming Language Translators :
Computer can understand only binary code / machine code
So, we are writing our program in Java, C & C ++ or Assembly language, so to convert this code in to
Binary code we need translator.
Translator : The translator converts the given code in to machine code or binary code.
Assembly language
pa
Assembler
Binary / machine code
a
High level languages Interpreter / Compiler
ad
Fig : Translators of Languages.
i) Assembler :
It converts the Assembly Language code into machine code
ii) Interpreter : :K
It Compiles the program code line by line & checks for errors
It consumes more time because it checks code line by line
iii) Compiler :
It compiles the entire program code in a single time for errors
nt
It is a time saving translator.
It cannot execute the programs but converts source code into object code
Terms Related to Programming Language :
oi
Step 1 : start
Step 2 : Take a,b,c
Step 3 : Calculate C = a + b
ni
Step 4 : Print C
Step 5 : Stop
iv) Flow chart :
r
The graphical (pictorial) representation of the pseudocode or algorithm are called flowchart
Symbols used in flowchart
Tu
pa
Important terms
* Control structures : The Conditions and Loops written in source code
* Reserved Words : The words that are kept aside for its use by programming language.
* Bug : It is also called error ( mistake in program code) or Glitch.
a
* Testing : Finding errors in the software.
* Debugging : The process of correcting the errors in the software code.
ad
* Platform : The combination of operating system and processor is called platform
Example : Apple macintosh & PC'S are 2 different platforms
* Patch : The vendor created programs that are available through Internet to repair software is called patch.
:K
* API'S : Application program Interfaces are the small program codes that are present in the operating system
* Executing : The process of carrying out commands is called executing
Types of Errors
i) Logical errors :
The fault in the logic of program code causes to get wrong outputs / Results.
nt
In this case program is executed to get result
Ex: Correct logic C = A + B ;
Mistake logic A = C + B ;
oi
The fault / mistake in the syntax (structure) of the program code cause failure to execute it
In this case program is not executed
Ex: Missing of semicolons in the code
ng
Correct syntax C = A + B ;
Mistake syntax A = C + B
* We will not get output
* A functional Language reflects the way people think in mathematical way.
ni
pa
If input is '1', the output is '0', viceversa
NOR Any one input or more is '1' to produce '0' as output
NAND All input must be in '1', to produce '0' as output
XOR If any one input is '1' , but not if 2 or more input are '1', the out put is '1'
a
Memory Measurement :
* Memory in computer is measured in Bits
ad
Bit Binary digit ( either 0 or 1)
4 Bits Nibble
8 Bits 1 Byte
1 Kilobyte 1024 bytes 103 210 Bytes
Megabyte 1024 KB 1 million Bytes 106 220 Bytes
:K
Giga byte 1024 MB 1 Billion Bytes 109 230 Bytes
Terabyte 1024 GB 1 Trillion Bytes 1012 240 Bytes
nt
Peta Byte 1024 TB 1015 250 Bytes 1 Quadrillion Bytes
* Exabyte, Zettabyte, Yottabyte are the next higher measurement
oi
1 character ( ASCII)
1 Byte 256 numeric values ( 0 to 255)
P
Portable platform : The program written in any or language can be run on portable platform.
Booting : The process of loading operating system from disk to RAM is called Booting
Without booting, computer cannot perform any task
i) Warm booting : The process of restarting / turning on the computer, which is under on / working
ni
position
ii) Cool Booting : The process of starting / turning on the system which is under off position
r
Types of Softwares
pa
software software software
Operating Spread sheet s/w Disk Backup s/w
system Word processors s/w Disk Restore s/w
a
Graphics presentation s/w Disk Checkup s/w
ad
Database management s/w Disk Format s/w
Antivirus s/w
i) System Software :-
The software which performs various types of functions in order to manage & organise files of computer
It is mandatory software to run a computer. :K
* Operating system is the system software and supervisor of computer functions
It creates interface between user and computer
Examples of operating system : i) Windows
ii) LINUX
nt
iii) MSDOS
iv) SOLARIES
v) Apple Macintosh
oi
Introduced in 1985 by microsoft corporation. It supports GUI (Graphical User Interface) mode.
It is not a free operating system ( Commercial Software), supports multi tasking
Windows 95, 98, ME, XP, 7, Server, 8, vista are few examples
ng
iii) MS - DOS :
DOS stands for disk operating system DOS Commands
r
pa
This operating system is only for Apple Products.
Steve jobs is the founder.
v) Mobile Phone o/s :
Ex : Bada, Symbion, Android, Windows 8, IOS (Inter Networking Operating System for Apple Phones)
a
Smartphones uses this operating system for Google Applications
Functions of Operating System :
ad
* Memory Management
* User Interface
* Input / output management
* Information Management
* Process Management
Classification of operating System :
:K
i) Multi - User o/s : It allows 2 or more users to run the programs at the same time.
Ex: UNIX / LINUX
nt
ii) Multi Tasking o/s : It allows more than one program to run concurrently
Ex : UNIX, WINDOWS ( Few versions)
* Example of multitasking : Surfing Internet & Listen to Songs at a time
oi
iii) Multi Processing : It supports running a program on more than one CPU or processor
iv) Multi threading : It supports different parts of a single program to run concurrently on system.
P
2) Application Software :
These are the end user programs that do real work for users.
ng
* System software and Application software are two basic types of softwares
Tu
pa
v) Antivirus s/w It detects & deletes the virus in system
4) Firmware :
a
The hardware chip that is having storage of software is called firmware
Ex : BIOS operating system is stored on BIOS chip.
ad
5) Embedded Software :
The software that is used for specific devices such as car, TV, Washing Machine & Watch etc.
is called Embedded Software
Availability of Software in Market :
a) Commercial Software :
:K
The prepackaged software available for money in the market
It is not free, we have to buy from market
Example : Windows, MS Office
nt
b) Open - source Software :
It is also called free ware
It is available at free of cost in Internet or open market
oi
The trial versions are released for promotion of the product only.
Ex: PDF converters online.
ng
d) Proprietary s/w : It is a custom s/w, developed to address the specific needs of a company is known as
proprietary s/w
Softwares with copy rights protected are called proprietary
Device Drivers : The special and specific programs written to perform task by specific devices only.
ni
* Crash : When your computer stops working suddenly without any instruction, this is called crash.
Backup prevents data from system failure or crash
* Backup : It creates a restore point for all the system files and data
It creates a separate copy of system data base
IBM introduced personal computer in 1981
pa
If we want delete directly, without moving to Recycle Bin, we have to press ' Shift + Delete" Command
Rename Icon :
To Rename the Icon we have to select Icon and Press F2
a
Other wise, select Icon & Press Right button of mouse and select Rename option
Help Menu :
ad
Help is a command available in start menu
Desktop : The home screen of computer which displays Icons on it for user applications
Cursor : The blinking Indicator that show you where your next action will happen.
This is the Insertion pointer.
Prompt & Dialogue Box :
:K
A symbol or question on the screen that prompts you to take an action and tell the computer
what to do next
Example : Do you want to save ? Yes/No
nt
It mainly appears due to human / user actions only
Interrupt : The instruction or unique signal generated by a device, that tells the operating system that it is in
need of immediate attention is called Interrupt.
oi
Ex: During drivers Installation, It asks for to press " Next" to continue.
Windows Explorer :
First, it is different from Internet Explorer
P
Window : The Rectangular area on screen that displays a program, text or information is called window.
Speech Recognition Software : This software is used to take voice input where hands are not used to
give input to the computer.
r
It is the technology that detects the humans / animals location in forest / any where by tracking system
RFID Devices are inserted in to human / animals body's
Screen saver : It configured correctly, the screen saver will prevent interaction with your computer
after a specified time period.
Interface : The remote control that is used to turn on or off some machine is also called Interface.
pa
recently released (stand alone version)? 14. Which of the following is microprocessor based
1) 6.11 2) 6.22 device?
3) 6.0 4) 6.33 1) Server 2) Personal computer
03. In MSDOS , MD command used for what? 3) Super computer 4) Mainframe
a
1) Move directory 2) Create directory 15. The common pointing input device?
3) Make folder 4) All of these
ad
1) Trackball 2) Touchpad
04. Which of the following is best tool for fixing 3) Mouse 4) Keyboard
errors on disk? 16. External devices such as printer, scanner and
1) CHKDSK 2) SCANDISK keyboard are called?
05.
3) CHKDKS 4) FDISK
Which command used for setting name to a
DISK in DOS?
:K 1) Add on devices
3) Peripherals
2) Expansion slots
4) All of these
17. Which of the following is not hardware?
1) DISKLABEL 2) NAMELABEL 1) Compiler 2) Monitor
3) LABEL 4) NLABEL 3) Light pen 4) Joystick
06. Which computer memory used for storing 18. Storage that remains after the power is turned
nt
currently processing data? off is referred to as?
1) ROM 2) Internal memory 1) RAM 2) ROM
3) Nonvolatile memory 4) CD 3) Nonvolatile memory 4) Both 2 & 3
oi
07. The detailed description of the program cycle, 19. Which of the below is first electronic computer?
and program along with the result in printout 1) EDSAC 2) Abacus
form is called ?
P
3) ENIAC 4) UNIVAC
1) Report 2) Output 20. The difference between memory and storage
3) Folder 4) Documentation is, that memory is____ and storage is ___?
08. The term used to describe the instructions that
ng
1) Permanent, Temporary
tell the computer what to do is called? 2) Temporary, Permanent
1) Software 2) Storage 3) Slow, fast
3) Input 4) Output 4) Fast, slow
ni
09. The action taken on data to get information? 21. What is the permanent memory built into
1) Compiling 2) Terminating computer?
3) Processing 4) Changing 1) ROM 2) RAM
r
10. What kind of computer you find in digital watch? 3) Hard disk 4) CPU
1) Mainframes 22. COMPUTER wor d derived from which
Tu
pa
26. RAM is a type of which memory? 1) Mouse 2) Keyboard
1) Volatile 2) Temporary 3) Joystick 4) Light pen
3) Primary 4) All of these 38. Alt, Ctrl, Shift are called which type of keys?
27. Printed copy is often called as? 1) Modifier 2) Function
a
1) Hard copy 2) Soft copy 3) Adjustment 4) Numeric
3) Blank copy 4) Text copy 39. Which keys are used to restart the computer
ad
28. Which of the following is collection of facts with keyboard?
which are not in sequence? 1) Del+Ctrl 2) Alt+ Ctrl+ Shift
1) File 2) Record 3) Alt+ Ctrl+ Del 4) All of these
29.
3) Data 4) Information
Which device is used to send information into
computer?
:K
40. Which of the following is a multidirectional and
pointing device?
1) Keyboard 2) Mouse
1) CPU 2) Input devices 3) Joystick 4) Light pen
3) Output devices 4) Memory devices
30. Which of the following are direct entry input 41. Visual/video display unit is example of ?
nt
devices? 1) Input device 2) Output device
1) Barcode reader 2) Light pen 3) Both 1 & 2 4) All of these
3) Mouse 4) Optical scanner 42. FAX is a ?
oi
leaves a computer system is? 44. The display size of a monitor is measured in
1) Printer 2) Mouse which direction?
3) Terminal 4) Keyboard 1) Horizontally 2) Vertically
ni
1) Paid on sale 2) Post on speed 46. Which of the following used for displaying
3) Point of sale 4) Place of sale information in public places?
35. To move cursor to the beginning of line in text, 1) Monitors 2) Overhead projectors
which key we press? 3) Both of 1 & 2 4) Kiosk
pa
49. Which of the following is not output device? disk?
1) VDT 2) VDU 1) 3.5 inch 2) 8 inch
3) CRT 4) LCD 3) 5.25 inch 4) 5.5 inch
5) None of these 61. Computers use which number system to store
a
50. Clarity of screen is measured in ? data and perform calculations?
1) Rotation 2) Reflection 1) Binary 2) Octal
ad
3) Resolution 4) Refraction 3) Decimal 4) Hexa decimal
51. In ALU, Which of the following performs 62. Keystroke is using which code to convert into
arithmetic calculations? the corresponding bits?
52.
1) Pins
3) RAM
2) Registers
4) ROM
Which of the following software satisfy who
:K
63.
1) ASCII Code
3) EBCDIC
2) ANSI Code
4) ISO
What is the value for binary number 1001000?
can’t use their hands for computer input? 1) 24 2) 62
1) Video conferencing 3) 72 4) 84
2) Speech recognition 64. What is total count that we can get with 8bits?
nt
3) Digitizer 1) 255 2) 256
4) Pinner 3) 32 4) 72
53. Which of the following is Primary storage 65. What is the last value that we can get with 8bits?
oi
54. Which of the following is magnetic storage which will get highest number of digits in it?
device? 1) Binary 2) Octal
1) Magnetic tape 2) Hard disk 3) Decimal 4) Hexa decimal
ng
3) Magnetic drums 4) All of these 67. Which of the following device acts as both input
55. The main directory of a disk is? and output devices?
1) Root directory 2) Sub directory 1) FAX 2) MODEM
ni
pa
to control system components? 85. Which of the following is single user operating
1) Registers 2) Control pins system?
3) CU 4) Controllers 1) LINUX 2) UNIX
73. CPU can directly understand which language? 3) Windows 4) DOS
a
1) JAVA 2) C+++ 86. In flowchart Rectangle represents which
3) SQL 4) Assembly function?
ad
74. Which language directly understood by 1) Input 2) Processing
computer? 3) Decision 4) Output
1) High level 2) Machine 87. To make a notebook as desktop model , the note
3) Low level 4) Middle level
75. Which of the following is used for scientific
calculations?
:K can be connected to a ___which is connected
to a Monitor another devices.
1) Bay 2) Bus
1) FORTRAN 2) COBOL 3) Docking station 4) Network
3) SQL 4) ALGOL 88. Gigabyte is the 2 to the power of ?
76. The process of finding errors is called____? 1) 10 2) 20
nt
1) Testing 2) Debugging 3) 30 4) 40
3) Translation 4) Conversion 89. Information on mother board components
77. The process of rectifying errors is called___ ? travelled through?
oi
1) Kilobyte 2) Megabyte 1) 0 2) 1
3) Gigabyte 4) Terabyte 3) 2 4) 3
79. One trillion bytes is equals to ? 91. Restarting computer which is running is called ?
ng
pa
1) Eckert 2) Von Neumann 3) Logic bus 4) Gate bus
3) Mauchley 4) Dennis ritchew 110. APPLE Macintosh and Desktop PC are two
98. Which of the below item performs POST? types of _____
1) RAM 2) HD
a
1) Platforms 2) Processors only
3) BIOS 4) CD 3) OS only 4) Gates
99. CRAY 1 is which type of computer?
ad
111. The vendor created program available for free
1) Super 2) Mainframe are called?
3) Mini 4) Micro 1) Repair 2) Patch
100. Virtual memory is present in? 3) Resource 4) Puncter
101.
1) CD
3) Hard disk
2) DVD
4) RAM
Which of the following code maintains Order in
:K
112. The property of Desktop icons to open a new
window or application is due to ?
1) Software 2) GUI
PRINTING devices? 3) Network 4) All of these
1) Binary code 2) Spooler 113. The unique signal generated by any device, that
3) Phisher 4) Pins
nt
it is need of immediate action is called?
102. Which protocol provides INTERNET connection 1) Event 2) Prompt
for keypad(small) mobile phones? 3) Interrupt 4) Signal
1) TCP 2) IP 114. In windows explorer, the + Symbol before the
oi
pa
3) Robotics 4) All of these 1) van Neumann
121. The technology of sending rod like structures 2) Joseph m. jaquard
into human body for delegated operations is? 3) Charlessbabbage
1) Robotics 2) Laser 4) J.P. Eckert and J.W.Mauchly
a
3) Nano science 4) All of these 134. Who invented the C++ language?
122. Which of the following is freeware/open source 1) Bjarne stroustrup 2) Columbus
ad
operating system? 3) Dennis M.Ritchie 4) Karl marx
1) Windows 2) LINUX 135. The keystroke is converted to which code of
3) Macintosh 4) All of these standard bits?
123. Application Programming Interfaces are built in?
1) RAM 2) ROM
3) Operating system 4) Software
:K 1) ANSI
3) Binary
2) ASCII
4) All of these
136. The information stored in CDROM is in the
124. The software required for printer, scanner etc..to form of?
connecting to computer are called ? 1) Digital 2) Analog
1) Device drivers 2) Operating system 3) ANSI 4) Text
nt
3) Unknown Software 4) Free ware 137. Which technology is used in CDROM drive?
125. What is total number of choices given by 1) Mechanical 2) Optical
hexadecimal code ? 3) Laser 4) Density
oi
pa
144. SMPS Converts ? 157. Resolution of laser printer is measured with?
1) DC to AC 2) AC to DC 1) LPI 2) CDM
3) RAM to ROM 4) All of these 3) MHz 4) DPSI
145. In MSDOS , The primary hard disk has the 158. Speed of line printer is limited by the speed of ?
a
drive letter of? 1) Cartridge used 2) Current bills
1) C 2) A 3) Paper movements 4) All of these
ad
3) B 4) D 159. The OMR is able to evaluate only those
146. MOS stands for? documents which printed within___ position.
1) Method Organ System 1) Special 2) Marked
2) Metal Oxide Semiconductor
3) Mother Of System 4) Most
147. Which storage device is mounted on REELS?
:K 3) Magnified 4) Scanned
160. Which of the following input device used for
playing the video games in computer?
1) Hard disk 2) Floppy disk 1) Joystick 2) Track ball
3) Magnetic Tapes 4) CD 3) Mouse 4) Printer
148. Primary memory stores which of the following? 161. The keys of the keyboard are?
nt
1) Programs 2) Data 1) Alphanumeric keys 2) Functional keys
3) Result 4) All of these 3) Arrow keys 4) All of these
149. Data is stored in computer as? 162. The device that draws the pictures or diagrams
oi
151. Which of the following can store large amount of 164. TWAIN is related which of the following device?
data? 1) Scanner 2) Printer
1) DVD 2) Hard disk 3) MICR 4) Joystick
ni
pa
170. Basic Parts of CPU are ? 1) 1ST 2) 3RD 3) 4TH 4) 2ND
1) ALU,RAM,ROM 2) ALU,CU,RAM 177. Processor speed is measured in terms of?
3) ALU,CU,MU 4) ALU,RAM,MU 1) Hertz 2) MHz
171. The first calculating device was? 3) GHz 4) All of these
a
1) Clock 2) ABACUS 178. Accumulator register holds which of the following
3) ENIAC 4) Calculator data?
ad
172. Who built the first mechanical calculator? 1) Result 2) Processing data
1) Blaisepascal 2) JAQUARD 3) Both of these 4) RAM
3) John maucheley 4) All of these 179. Which of the following will perform the POST
173. Punched cards were introduced by?
1) Jaquard
3) Charless
2) Pascal
4) Madhan
:K operation?
1) RAM 2) BIOS 3) CAD 4) HDD
180. Which of the following is impact printer?
1) Daisywheel 2) Dotmatrix
3) Chain printer 4) All of these
nt
Answers
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
2 2 2 2 3 2 4 1 3 2 1 4 1 2 3 3 1 2 3 2
oi
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
1 2 1 4 4 4 1 3 2 5 2 3 2 3 4 4 3 1 3 2
P
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
2 3 1 3 2 3 4 2 5 3 2 2 1 4 1 2 1 4 2 4
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
ng
1 2 3 2 1 1 4 2 2 3 2 2 4 2 1 1 2 2 4 5
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
1 4 2 3 4 2 3 3 2 3 2 1 1 2 3 2 2 3 1 3
ni
101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
2 4 3 3 2 2 1 4 2 1 2 2 3 4 2 2 3 3 2 4
r
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
Tu
1 2 3 1 4 2 4 1 2 3 4 4 4 1 1 1 2 3 4 4
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
3 2 1 2 1 2 3 4 4 3 2 1 1 2 3 4 4 3 2 1
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180
4 3 2 1 1 2 3 4 4 3 2 1 1 2 3 4 4 3 2 4
26 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
M.S. OFFICE
How to start MS Office Components :
Step 1 : Click on start button
Step 2 : Select All programs
Step 3 : Next click on MS office
Step 4 : Select the component you need as Word, Power point or Excel etc.,
pa
Before looking into M.S.Office components, we will see some basic concepts that related to M.S. Office
Instruction : The input data of any thing either '0' or '1' is called Instruction
Command : The predefined Instruction to the computer
a
Ex : Print
Menu : The command which shows you different choices
ad
Ex : File
The commands are used in menu's also.
File : The collection of related information stored and deal with it as a unit called file.
Editing : The process of making changes or correcting the existing document is called editing
Save : The process of saving a file with required name ( moving from RAM to Hard disk)
Save As : The process of saving the file with some other name
nt
It can be done when we need 2 or more copies for same file.
Clipboard : When ever we cut / copy the text, first it is placed / stored temporarily on clip board.
MICROSOFT WORD
oi
So, we see the M.S. Office 2003 which is the basic version & used widely.
* File Extension : The file extension is the dot extension created automatically when we create / save a file.
It shows identification for the type of file.
ng
Always the file extension is followed after the file name with dot extension only
Ex: turningpoint.doc
r
pa
Ex : File, Edit, View etc.,
Menu gives the choice of commands / options to select
iv) Standard tool bar : The bar which has some standard tools . Such as open, save, print, send etc.
The buttons are placed in this bar
a
v) Format Tool bar : The bar which contains format text options is called format tool bar.
It contains buttons & options to change font style, font size & changing page styles etc.
ad
It contains options to perform on text of page
It contains alignment tools (Left, Right, Center alignment)
vi) Status Bar :
The Bar that is present just above the task bar :K
It shows the current page number, line number & text number.
* Text indicates all numbers, Alphabets, Special Symbols & Spaces etc.
vii) Ruler Bar : This bar helps in maintaining vertical Alignment
viii) Scroll Bar : This bar helps in moving the pages to up & down
nt
Now we will see the menu bar and its options clearly that, which are important. It is menu of M.S. Office
(Word) 2003.
File Edit View Insert Format Tools Table
oi
New Cut Normal Break Font Word count Formula
P
page setup Find Header & Date & Time Styles & Mail merge
footer formating Spelling & grammer
Print Replace Zoom Picture Change case Macro
File search Goto Full screen Drop Cap.
ni
Note : We will clearly see all the options / commands one by one in M.S. Word only
In M.S. Excel and M.S. power point we will see important & remaining commands.
r
pa
F12 is the function key to get save as option / dialogue box
e) Page Setup: This command is used to change the page margins and page size.
A4 size paper measurement 21.0 x 29.7 cm
a
f) Print Preview (Ctrl + F2) : This option is used to see the page how it appears after taking the print out
on paper.
ad
g) Print : This command is used for print dialogue box
ctrl + p is the shortcut
h) Exit : This command is used to leave the current page / document
2) EDIT MENU : Alt + E is the shortcut key
:K
a) Undo : The undo operation performs the last actions to be taken back
ctrl + z is the shortcut key
Ex: By mistake if you delete 2 paragraphs and not yet saved, you can use this Undo operation to
retrieve the paragraphs back
b) Redo : This command can only repeat the last undo action that performed.
nt
Ex: If we had deleted one word & after some time another word, if you press Redo it bring back
only single word.
ctrl + y is the short cut key
oi
c) Cut : The command when pressed, after selecting some text, it is removed & copied to the clipboard
Ctrl + x is the short cut key..
P
d) Copy : This command pressed after selecting some text it can only copy the same text but can not
delete the text
The text is copied to clipboard
ng
e) Paste : This command pastes the selected text through cut or copy command
The data from clipboard is pasted here
Ctrl + V is the short cut key
r
f) Select All : To select all the contents of page / document we have to press Ctrl + A
Tu
g) Find : To find any specific word / Letter by giving some key words of that letter, we use find option
Ctrl + F is the short cut key
Ex: If we have " Computer Awareness" word in a page, if you press Ctrl + F and give just "Comp",
than press enter.
It displays all words starting with comp only.
Magnifier Range is from 10% to 500%
29 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
h) Goto : This command opts you to enter in to any page by just giving the page number
Ctrl + G is the shortcut key
Ex : Press Ctrl + G and enter '7' inspace provided, you will be directed to 7th page of document
i) Replace : This command is used to replace any word or letter with some other word / letter you want
to do.
Ctrl + H is the shortcut key
Ex : If suppose, you have typed " Test' as "Tast" in all the pages of document
pa
If you want to correct all the pages with same word than press Replace and given from as Tast &
Change it to "Test", it changed for whole document.
3) View : Alt + V is the short cut key.
a) Normal Layout : In this layout graphic pictures cannot be displayed
a
Only text data is displayed.
b) Page layout : In this layout graphic pictures can be displayed.
ad
c) out line layout : In this layout rulers are provided to adjust page margins / sizes.
d) Tool bars : This is very important command under view menu
To select whether to show / hide some standard tool bar, this option is needed.
e) Header & Footer : :K
Header : The content / title that has to be displayed on top of the all pages of a document is kept
with the help of Header
Ex: Title.
Footer : The content on Bottom side of page for all the pages of documents can be kept by using
nt
footer option
Ex : page number or date etc.,
f) Zoom : This option is used to increase / decrease the size of the document to clearly view the contents
oi
of page / file
With this option we can see all the pages of document in the single window by reducing zoom level to
minimum
P
4) Insert :
a) Break : By clicking on Break you can select page Break.
Page Break : To Break the 2 paragraphs or single page in to 2 pages to separate the content, we use
page break option.
ni
By placing the cursor at division point on document press Ctrl + Enter or select Pagebreak
Ctrl + Enter is short cut for Pagebreak
b) Picture : We can insert any picture from Gallery to word document by pressing on picture command
r
c) We can insert Date & Time, Page numbers & Symbols by selecting from Insert menu.
5) Format :
This menu is used to change fonts, borders & styles.
This is very important menu for text formating ( called as powerful menu in MS Word)
a) Font : Ctrl + D is the short cut key
It is used to change font style, size and calligraph.
30 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
b) Paragraph : Here we can change the distance b/w words & lines & paragraphs.
c) Bullets & Numbering :
Ex : , .
To highlite some points of the document, this option provides special bullets & numbers
, etc
d) Background : We can change the background clour of the document with this option.
e) Change case : After selecting the text, we can change the selected text in below styles types.
Ex : " Letter" is word selected
pa
* Upper case : All the text is converted into capital letter
Ex: LETTER
* Lower case : All the text is converted into small letters
Ex: letter
a
* Sentence Case : After every line ended with fullstop(.), the next letter becomes a capital letter
Ex : Letter sent. The people
ad
* Title case : The every first letter of the word in any line is converted into capital letter
Ex : Letter Sent. The People
f) Drop Cap : A drop cap is a large capital letter at the beginning of a text block that has the depth of two
6) Tools :
or more lines of regular text. :K
This menu is used to access spell check, macros, mail merge etc.
a) Spelling and Grammar :
F7 is the shortcut function key
nt
we can check the spelling mistakes in the document
b) Word Count :
We can count the number of words in specified line or page or paragraph
oi
c) Auto correct :
To auto correct the spelling mistakes & alignments in any paragraph we use this option.
d) Protect Document :
P
e) Mail merge :
This option is useful to send same letter to different address or many people with different names
Here the content of letter is same
We can send same letter to many people with their address at a time
ni
f) Letter wizard :
This wizard tells us steps to creates a letter in step by step manner
Its like helping window to users to create a letter
r
g) Macro :
Tu
The specially created commands that can be used to perform some specific functions by users
itself
7) TABLE :
a) Insert table : We can create tables in MS Word document by selecting number of columns & Rows.
b) Hide Gridlines : To hide the lines & Show only content of table, this option is useful & used.
pa
To select entire line, we have to press the mouse continuosly for 3 times
To select single word, we have to press the mouse 2 times, by placing cussor at that word only.
vi) In MS word 2007 version, the print, save options are found in HOME menu, not in file menu
because there is no file menu in menu bar for version 2007.
a
vii) Vertical Alignment :
By using the Ruler Bar, we can justify the page with vertical alignment
ad
All the lines kept in uniform length vertically
viii) .doc & .docx are default file extensions of 2003 & 2007 version but, Document1is the default file name
ix) Bold : To standout any word, we select the word / text and apply Bold style to it.
ctrl + B is the shortcut key.. :K
x) Italic ( Ctrl + I) : To change the text into Italic font we need to select 'I' symbol on format tool bar
xi) Underline : To underline the text ( may be selected text)
ctrl + U is the shortcut key..
xii) Home key : This command takes the cursor to the starting letter of the same line
nt
xiii) End key : This command takes the cursor to the last letter of the line
xiv) ctrl + End : This commands takes the cursor to the last letter of the whole document
xv) ctrl + Home : This commands takes the cursor to the first letter of the whole document
oi
xvi) The Red underline appeared automatically, indicates that the word not present in word dictionary.
MS - POWER POINT
It is Graphics presentation software.
P
Slide sorter : The seperate window structure, which shows all the slides and give us a chance to rearrange the
slides in required order.
File extension:
r
.ppt & .pptx are default file extensions for MSPPT of 2003 & 2007 respectively
Tu
pa
3 inch It is called 4 : 3 inch
4 inch
Fig : slide measurements
a
ENTER key is pressed at end of every line in slide
ad
Graphics
Animation Transition
Applied to
:K
Applied to slides
text in slides
we can add audio files to the slides
i) Animations :
nt
it is selected from custom animation menu
There are 3 types of Animations : 1) Entrance 2) Emphasis 3) Exit
Animation widely used for text with in a slide
oi
ii) Transitions :
These graphics is applied between different slides that has to be appeared indifferent way
P
Slide show : The full size / full screen view of the slides, without any menu bars and options
It creates a full screen size slides
We can select from view menu
r
Hide Slide : To hide the unwanted slides in the slide show which are not to be deleted from power point file.
This command present in slide show menu
AWT : Abstract Window Toolkit (provides frames in JAVA)
XBRL : eXtensible Business Reporting Language
pa
here 1.3 inch, in top & bottom margin
is reserved for Header & Footer.
File Entensions :
a
. xls is the default file extension for MSExcel 2003 version
.xlsx is the default file extension for MSExcel 2007, 2010, 2013 versions
ad
. xlsm (macro), xlsb (binary) are also file extensions here
Purpose of Spreadsheets :
Effective tool used for creation of tables and to perform calculations
Important terms :
:K
VBA applications are performed through these spreadsheets
* Cell : It is the basic unit of worksheet where text is entered. (Intersection of Row & Column).
* Worksheet : The combination of Rows & columns in a tabular form is called worksheet
* Work book : The combination of 2 or more worksheets is called a work book
nt
Gridlines : The lines that makes to form the Rows and columns are called Gridlines
Spreadsheet : It is a software tool that lets the users to enter, calculate & manipulate wath set of numbers
Active cell : The current cell / processing cell where the cursor placed is called Active cell
oi
Formula : The sequence of values, Functions & arguments are used in formula to produce a new value from
existing values
Example: = Sum (A1 : A2)
Here sum is a function
A1 & A2 are arguments
* Always formula starts with '=' operator
34 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
CELL REFERENCING : The Reference of a cell address in formulas through its column and row labels
cell referencing may be done in 3 ways
i) Absolute Referencing : The address of cell is shown with addres values of both column & Row
exactly
Ex: $ B $ 7 $ is address
ii) Relative Referencing : The address of cells is not specified exactly
Ex: B 7
pa
iii) Mixed Referencing :
It is combination of Absolute & Relative referencing. The address of cell is shown with any
one of the label either column or row
Ex : $ B7, B $ 7
a
Arguments : The values passed into functions through paranthesis.
Arguments may contain numbers, text, constants and Alphabets etc.
ad
Functions : The predefined commands that can perform specific calcuations in worksheet by passing
arguments through them.
Ex: i) Sum To get Sum of values
ii) Min To get the minimum value
iii) Max To get the maximum value
iv) Avg To get average of the numbers
:K
v) Count To count the nonempty cells (numeric)
Special Features of MS - Excel :
nt
i) Auto Sum : It helps you to add the contents of a cluster of adjacent cells
ii) List Autofill : It automatically extends cell formatting when a new item is added to the end of a list
iii) Auto fill : It allows you to quickly fill cells with repetitive or sequential data such as dates or numbers or text
oi
iv) Auto Shapes toolbar : It will allow you to draw a number of geometrical shapes, arrows, flowchart
elements, stars etc.
v) Wizard : It guides you to work effectively while you work by displaying various helpful tips and techniques
P
Line charts.
vii) Pivot Table : It sums data in seconds and allow you to perform data analysis
Pivot table helps in generating reports like periodic financial statments, statistical reports etc.
Users can also analyze complex data relationships graphically..
ni
vii) Formula Bar : The current data which we are typing in the Active cell is displayed in the formula bar
ix) Spell check : To perform Spell check we have to press F7 key
x) Goto : To goto a specific cell, we have to press F5 Key
r
xi) Print screen key : It is the key in keyboard which takes the snapshot of current screen / window, so that
we can paste image any where required.
xii) Merging : The process of combining two or more cells / tables into single table / worksheet is called
merging.
xiii) Transpose : The function that display row data in column & column data in row.
pa
Windows+ space bar Show desktop without closing current page
CTRL+ALT+DEL Bring windows task manager
F1 Help window of program
F2 To rename the selected icon
a
F5 To refresh contents or system
ad
Alt+ F4 To close the current program
MS EXCEL KEYS
Home Moves to the beginning of the row
F1 Opens excel help task pane
F2
F3
:K
Edits the current cell and its content
Displays paste name dialogue box
F4 Repeats last action/command
F5 Go to box for a specific cell
F7 Spell check box
nt
F11 Creates chart of the data in current range
F12 Display save as dialogue box
Ctrl+Shift+& Applies the outline border for selected cells
oi
F5 SLIDE SHOW
SPACE BAR Next slide
Esc End slideshow
Alt+U Mute the sound in slide
pa
Ctrl+ G Open GOTO dialogue box
Ctrl+ H Open REPLACE dialogue box
Ctrl+ I ITALIC the selected text
Ctrl+ J Aligns the text to justify the screen
a
Ctrl + K To insert hyperlink
Ctrl + L Left Alignment in a paragraph
ad
Ctrl+ M Indent the paragraph
Ctrl+ N Create NEW document
Ctrl+ O OPEN an saved / existing document
Ctrl+ P Open the PRINT dialogue box
Ctrl + Q
Ctrl+ R
Ctrl+ S
:K
Remove Paragraph formating
Aligns selected text to the RIGHT of the screen
It SAVES the document
Ctrl + T Creating Hanging Intend
Ctrl+ U It UNDERLINES the selected text
Ctrl+ V PASTE the text/ file / folder
nt
Ctrl+ W To CLOSE the current document
Ctrl+ X To CUT the selected text
Ctrl+ Y REDO the last action performed
oi
pa
iii) Piechart : It shows the proportional size of items that make up a data series to the sum of the items.
- Created for single data series.
MS - ACCESS & DBMS
a
Microsoft Access works only in windows operating system
It cannot work in Apple macintosh system
ad
MS access works along with RDBMS.
RDMBS Relational Database management system
Data base : The data of a particular type stored in form of tables and retrieved when ever required.
Different ways of Database storage : :K
i) Array : The linear data structure which store a single data type elements only
Ex: Array int [10]
It can stores only 10 integer values, but not characters
ii) Stack : The data insertion (push), deletion (pop) are from single side only
nt
The deletion is performed on below principle
LAST IN FIRST OUT LIFO
Ex : Rings arranged to a fixed Rod on Floor
oi
iii) Queue :
The elements are inserted (front) in one side & deleted from other side (rear) in queue.
It follows FIRST IN FIRST OUT FIFO
P
Tuple
r
Tu
Attribute
* Primary key :
The key which uniquely Identify a Record
Each table have only one primary key
pa
* Queries : These are used in SQL to create and retrieve the data from data base table
* Data Redundancy :Maintaining 2 or more duplicate copies of the same file in database is called data redundancy
* Data Inconsistency :
When we are maintaining data redundancy, by keeping many copies of same file at different locations in
a
data base, If there is any updation or correction in data, we have to update / correct all multiple copies, other
wise It causes data In consistency
ad
Dat Inconistency is caused due to data redundancy only..
Ex: If we have list of one class students names.
making 5 copies and storing in all 4 drives and desktop also
:K
If any student added into class, the data has to be updated in all 5 copies, but we update on only
desktop file, So it cause data Inconsistancy.
SQL Structure Query Language.
i) DDL Data definition Language
Used for creating the tables
Ex: Create, Alter, Drop,Rename.
nt
Here we are defining or creating a new table by using queries.
ii) DML Data manipulation Language
DML commands are not used to create the table, but only to modify the data in tables.
oi
Emp. ID Salary
r
Table1
Tu
Table 2
Emp. ID Work
pa
* d BASE
* ORACLE
Above 3 are the database access tools
Data mining : The technique used by business men to see the trends in market by comparing values from
a
past history.
Data ware house : The storage house of different types of data to be retrived by data mining technique
ad
It stores multiple type of data base.
Sorting Data : Arranging the data in an logical order in data base storage.
NUMBER SYSTEMS
1)
Basically there are 4 types of number systems
Binary Number system have 0, 1 so only 2 choice.
:K
Computer data stored in Binary format only
Base is 2
2) Decimal Number system 0 to 9
nt
B = 11 E = 14
C = 12 F = 15
The Base is 16
ni
CONVERSIONS :
1) Binary to decimal Number
Convert 1 1 0 0 1 0 to Decimal number
r
Tu
23x0 20x0
21x1
25x1 24x1
22x0
pa
1 1
a
* Divide the given binary code into 3 digits segment from Right side, so weget
ad
1 1 0 0 1 0
62 Its base is 8.
4) Binary to Hexadecimal code :
Convert 110010 to Hexadecimal Code
ng
* Divide binary code into 4 digits segment from right side, so we get
11 0010
Step 1 : Substitute in standard code 8421, weget
ni
8 4 2 1 Step 2 : 8 4 2 1
0 0 1 0 0 0 1 1
0+0+2+0 =2 0+0+2+1=3
r
pa
Step 3 : Merge all these numbers from Right sides into single number
Here 15 is to be converted in to Alphabet
15 = F
Finally weget result as
a
1 F 33 (16)
ad
Note : For the examination point part I is very important which consists of maximum questions
IMPORTANT QUESTIONS - MS OFFICE
1. What tool works best for word processing?
1) msppt
3) ibm word
2) typewriter
4) microsoft word
:K
9. What option is used to use a paragraph at another
place after removing it completely from 1stplace?
1) rotate 2) cutpaste
2. MSWord allows creation of ____type of 3) delete 4) move
documents by default? 10. To standout(Highlight) a word, what option can
1) .DOC 2) .WPF be used?
nt
3) .TXT 4) .DOT 1) standout 2) delete
3. Outlook express is a ____? 3) print 4) bold
1) email client 2) scheduler 11. Which option may be used to change pagesize
oi
1) standard 2) formatting 15. The contents of a clip board remain the same
3) print preview 4) all of these until?
8. What option is used to use a paragraph at another 1) you copy other text
place without removing it from the first place? 2) you cut other text
1) rotate 2) copypaste 3) you shut down your computer
3) delete 4) move 4) all of above
42 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
16. Name of a newly created document is? 28. Option designed to automatically save a backup
1) document 1 2) word copy of your document at specified intervals is?
3) DOC 4) file 1) close button 2) create data source
17. in MS word, RTF stands for ? 3) auto save 4) save as
1) real time formatting 2) real time fonts 29. It is family of types styles such as
3) rich text format 4) really text files arial,Geneva,modern etc. it is?
18. Which toolbar in MS Word,allows you to direct 1) format 2) font
access internet while working in a word 3) form letter 4) form
document? 30. It is the way text appears on a page.it is?
pa
1) main tool bar 2) web tool bar 1) format 2) font
3) standard tool bar 4) graphics tool bar 3) form letter 4) form
19. On how many documents you can work 31. It refers to a title for a part of document?
a
simultaneously in MS word? 1) header 2) heading
1) one 2) two 3) indent 4) leader characters
ad
3) more than two 4) any number 32. It refers to the distance between text boundaries
20. User can use___button to cancel the last editing? and page margins?
1) ctrl+u 2) undo 1) header 2) heading
3) redo 4) shit+u 3) indent 4) leader characters
21. New selected font is applied to?
1) full document
2) all the text above the current cursor position
:K
33. Which key used for centre alignment for text in
MSWORD?
1) Ctrl+C 2) Ctrl+ l
3) the selected text 3) Ctrl+ E 4) Ctrl+ V
4) only to headings 34. Which of the following page orientation have
22. MS Word automatically changes the font color more letters for line in the document?
nt
of these? 1) Portrait 2) Landscape
1) email address 2) web address 3) Same for both 4) Can’t say
3) mail address in US 4) both 1 & 2 35. To delete text right side of the cursor , which
oi
3) any of the above two 4) both of the above 36. To goto specific page which command key is
24. Macros stored in the global macro sheet can be pressed?
used? 1) F2 2) F4
1) in the current document only
ng
3) F5 4) F6
2) in any document 37. Page count and word count is displayed in which
3) can be used only local bar?
4) not consistent behavior 1) Tool bar 2) Formula bar
ni
2) standard toolbar 3) formatting toolbar 39. Page break is found in which menu?
4) both on 1 & 3 1) File 2) Edit
27. One of the following is not permitted while 3) Insert 4) Tools
naming a data source? 40. What is the key combination for page break ?
1) letters 2) numbers 1) Ctrl+Enter 2) Ctrl+ Shift
3) underscores characters 4) spaces 3) Ctrl+ END 4) CTRL+ home
43 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
MS-EXCEL 13. By default the text alignment in the cell is?
1) Left 2) Right
1. Which of the following is the latest version of 3) Center 4) Justify
Excel? 14. By default the numbers aligned in the cells to
1) Excel 2003 2) Excel 2013 which side?
3) Excel 2015 4) Excel 2007 1) Left 2) Right
2. The default MSExcel file extension is ? 3) Center 4) Justify
1) .doc 2) .ppt 15. Which sign is used to specify a cell range?
1) ; 2) “”
pa
3) .xls 4) .exe
3. The maximum number Rows in worksheet are? 3) : 4) –
1) 225 2) 256 16. Which sign we use to enter formula?
3) 65536 4) 65336 1) __ 2) =
a
4. The maximum number of columns in worksheet 3) ++ 4) —
are ? 17. In which menu, we get the validation command?
ad
1) 225 2) 256 1) File 2) Edit
3) 65536 4) 65336 3) Format 4) Data
5. In worksheet, the intersection of column and row 18. In which bar, we find Autosum button?
is called? 1) Formula Bar 2) Formatting bar
6.
1) Grid
3) Cell
2) Table
4) Box
The collection of worksheets is called?
:K
19.
3) Status BAR 4) Standard tool bar
Protect document is found in which menu?
1) File 2) Edit
1) Excel book 2) Excel sheet 3) Tools 4) Format
3) Workbook 4) Work table 20. How many types of cell references are there in
7. Which of the following is not cell address? MSExcel ?
nt
1) C7 2) CA77 1) 4 2) 3
3) TC21 4) AB23 3) 2 4) 1
8. By default how many worksheets are present 21. By which menu we can ungroup the data?
oi
9. Anything that we type in active cell is displayed 1) One data series 2) Two data series
in which bar? 3) Three data series 4) All of these
1) Formula bar 2) Title bar 23. Which of the following represents ABSOLUTE
ng
3) F6 4) F7 cell referencing?
11. Which shortcut command insert the current 1) $C$9 2) $C9
date? 3) C$9 4) C9
r
pa
3) F7 4) F12
30. To get SAVE AS dialogue box , what function 1. The maximum ZOOM percentage in MSPower
key is pressed? point is?
a
1) F6 2) F8 1) 100% 2) 200%
3) F10 4) F12 3) 300% 4) 400%
ad
31. The process of bringing different workbooks 2. What is the shortcut key for slideshow?
together to form as single workbook? 1) F2 2) F3
1) Pasting 2) Merging 3) F4 4) F5
3) Pasting 4) Adding 3. Which keys will produce a new slide in Power
32. In Excel , charts are prepared by which option?
1) Pivot table
3) Pie chart
2) Chart wizard
4) Create chart
:K point?
1) Ctrl+N
3) Ctrl+S
2) Ctrl+M
4) Ctrl+N+M
33. Which of the following is not a function name in 4. Which key is pressed to exit from the slideshow?
EXCEL ? 1) End 2) Home
1) Min 2) Max 3) Esc 4) Finish
nt
3) Sum 4) Avg 5. What is the file extension for MSPPT file?
5) None of these 1) .ppt 2) .pptx
34. The cell address passed into ____ are called as 3) Both 1 & 2 4) .doc
oi
35. The predefined command functions in MSExcel 3) Ready slide 4) Folder slide
are called ? 7. The arrangement of slides can be done from ?
1) Templates 2) Macros 1) Slide master 2) Slide sorter
3) Memos 4) Makers
ng
3) Format 4) Tools
3) Pivots 4) All of these 5) None of these
Tu
38. The cursor placed cell is called? 10. Which of the following are graphics options in
1) Active cell 2) Missed cell Power Point?
3) Cell address 4) Cell ordinance 1) Animations 2) Transitions
3) Both of 1&2 4) Layers
pa
3. Which option is used for giving the heading in
the form ? 16. The situation of not updating all the same copies
1) Textname 2) Head of files with latest data causes___?
3) LABEL 4) HEADING 1) Data hiding 2) Data consistency
a
4. Queries can be saved in database as______? 3) Data redundancy 4) Data filter
1) Filters 2) Objects 17. DDL and DML commands used in which
ad
3) Database 4) All of these language?
1) JAVA 2) C++
5. Is it possible to open 2 databases at a time ? 3) SQL 4) All of these
1) yes 2) No 18. Which of the following is the query language?
6.
3) Our choice 4) We can’t say
What is the shortcut key for REFRESH?
1) F2 2) F3
:K
19.
1) HQL
3) MQL
2) DQL
4) SQL
MSAccess is which type of DBMS?
3) F4 4) F5 1) RDBMS 2) DDBMS
7. The collection of data arranged in tables is 3) OODBMS 4) MDBMS
called? 20. Through _______ formation among tables we
nt
1) Database 2) Datasheet can merge the data in them?
3) RDBMS 4) DDBMS 1) Negations 2) Relationships
8. The process of summarizing data from more than 3) Both 1 & 2 4) Database
oi
9. The function that display the records which 22. Which of the following is not a translator for
meets a particular condition? program code conversion?
1) Data hiding 2) Data merging 1) Compiler 2) Assembler
ng
12. Which of the following is a linear data structure? 25. Which of the following converts high level
1) Array 2) Graph language code into machine language?
3) Tree 4) Sets 1) Interpreter 2) Compiler
13. The key which uniquely identifies the record in 3) Assembler 4) Both 1&2
DBMS table?
pa
3) Slow memory 4) Both 1&2
MS-WORD KEY
a
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
ad
4 1 4 2 4 2 2 2 2 4 1 4 3 3 4 1 3 2 4 2
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3 4 4 2 3 1 4 3 2 1 2 3 3 2 2 3 4 3 3 1
MS-EXCEL KEY
:K
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
nt
2 3 3 2 3 3 3 2 1 2 1 1 1 2 3 2 4 4 3 2
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
1 1 1 4 3 2 2 3 3 4 2 2 5 1 2 2 3 1 4 1
P oi
MS-PPT KEY
1 2 3 4 5 6 7 8 9 10
ng
4 4 2 3 3 2 2 4 5 3
ni
MS-ACCESS KEY
1 2 3 4 5 6 7 8 9 10
4 3 3 2 2 4 1 3 4 2
r
11 12 13 14 15 16 17 18 19 20
Tu
2 1 2 3 1 2 3 4 1 2
21 22 23 24 25 26 27 28 29 30
4 3 3 2 4 3 4 2 2 4
pa
1) PAN : Personal Area Network
The sharing of files / information between two computers by connecting them with cable / bluetooth /
infrared Rays
By using PAN, we can also share internet connection
a
It is limited to a Room only
ad
2) LAN : Local Area Network
The small and single site network which connects the computers in a building and also to adjacent
building
HUB is the connecting device used in connecting computers in the LAN
Example : Internet cafes, college Labs etc
* See PAN is not considered as small network to compare.
:K
3) MAN : Metropolitan Area Network
The network that connects between different metro politan areas (Ex : Holland to Sydney)
Cable TV is the best example
nt
Satellite signals also used in MAN.
4) WAN : Wide Area Network
This is the network geographically dispersed collection of LAN'S
oi
To connect WAN, It uses X.25 protocol technology that widens the signal strength.
X.25 is a communication oriented protocol
P
Topology : The way of computers arrangement in connecting the LAN or Network is called Topology.
Wehave generally 6 topologies : i) Bus Topology
ii) Ring Topology
ni
The computers are arranged in such a way that Bus seats are arranged in general life Bus.
Client
. . . . . . .. .. . Server
Node
pa
In Ring LAN, all the nodes are connected in a circular path
Here, there is no central server in the network
a
To avoid collisions in data transmission, the tokens are provided to all the nodes
When the token time comes to a specific node, it can transmit data to remaining systems / nodes.
ad
Failure in single node causes entire network failure
It contains n nodes & n connections in number
iii) Star Topology :
Client
:K
Server
nt
The central Server sends data and receives data to / from all the clients
If one node fails, entire network does not fails
oi
Client
pa
The possibility for a node to act both as client & server is only in tree topology..
Client : The active member of the network
It always sends request to server & waits for response from the server
a
Server : The passive ( sleeping) member of the network
It waits for client requests & gives the response to them.
ad
* So, in tree topology the middle nodes are acting as both client and server.
vi) Hybird Topology : The connection of nodes with the combination of any of the two topologies is called
as Hybrid Topology
Ex: Bus topology + star topology
star topology + Ring topology
:K
HUB's are the connecting devices in LAN / topology..
Docking station : The station to which the laptops are connected to make them for converting as projectors or
big screens like desktop & LCD' Screens.
nt
TYPES OF WAN'S
* In exam point of view, it is not important and it is only for Reference only
* The below are the public networks, authorized & run by telecommunication Authorities.
oi
It is analog transmission
It is low speed transmossion
ng
pa
i) FDM : Frequency Division Multiplexing
It uses analog data transmission
Band pass filters are used in separating channels.
ii) SDM : Space Division multiplexing
a
It divides channels through space division
ad
Ex: Stereo Headset.
iii) TDM : Time Division Multiplexing
It divides channels through time division
It uses digital transmission of signals
iv) CDM : Code Division multiplexing
It divides channels based on their code
:K
Ex: CDMA mobiles are separate from GSM mobiles
Note : CDM & SDM are not important for exams.
TYPES OF DATA TRANSMISISON
nt
* Data Transmission is the process of communication of data between source (sender) and destination
(Reciever)
a) Simplex Transmission :
oi
In this type, the communication is processed only in one direction from sender to Reciever
Receiver cannot respond to the sender..
Example : Radio channels
ng
Same thing happens from receiver side, both of them cannot transmit data at a time.
c) Full Duplex Transmission :
The communication of signals between source (sender) and receiver (destination) at a time.
They need not wait for one another to send request or response
pa
iii) Wireless Medium : Using different ways of wireless medium also data transmission takes place
INTERNET
a
Terms Relating Internet :
ad
* Intranet : The network of systems with in an organisation and not able to accessed by the outside organizations.
Ex: Database in CID (Crime Investigation Dept.)
* Extranet : The organization given permission to outside another organization to access their data, this is
possible through extranet
:K
* Protocol : The set of governing rules on network are called protocols
* TelNet : It is a protocol that allows the system to connect remote computer for accessing data & internet
Ex : If A & B are two systems having Telnet protocol, only A is having Internet facility than through Telnet,
B also can use internet facility.
Evolution of Interent :
nt
ARPANET : The first intranet /Internet developed in 1969 by US Defence for the internal communication.
Full form is Advanced Research Projects Agency Network
Vinton cerf is the father of Internet
oi
4) Transport Layer
3) Network Layer
2) Data link Layer
r
1) Physical Layer
Tu
7 Application Layer * Input & out put of Data HTTP, SMTP, SNMP Gateway
* User Interface Layer FTP, POP, DNS
pa
*Compression & De Compression
* Encryption & Decryption
a
* Host Communication
ad
4 Transport Layer * Provides Acknowledgement TCP, UDP Gateway
* Frames Formation
:K Not Switch,
* Error Detection & Required Bridge
Correction
nt
7) Application Layer :
P
This is the 7th or Last layer in OSI model (for user interface with network)
It defines interface between users data and data transfer communication in network
ng
pa
a) Encryption : The process of converting normal text into cipher text is called encryption
* Text is converted into numbers & Alphabets
b) Decryption : The process of converting cipher text into its original form of Normal message / text is
called decryption
a
* Cipher text is converted into original message
5) Session Layer :
ad
It manages & Controls users session & dialogues
It reports the upper layer errors
* No protocols involved in this session Layer
Here only Host communication is processed
4) Transport Layer :
:K
It manages end to end message delivery in network by giving acknowledgement to users
It provides sequential packet delivery through error recovery and flow control mechanisms.
It provides connection less oriented packet delivery
nt
Multiplexing and segmenting done here.
* TCP, UDP are the protocol involved in this layer
a) TCP - Transmission control protocol
oi
pa
It provides the Internet facility through world wide web.
It is the authority to permit client / individual for connecting to Internet
In return it takes the IP adderss of the system of users to connect to the network
a
IP Address : Internet Protocol Address
This address is unique address provided by ISP to the single / Individual system on the network.
ad
* After obtaining permission, we require the Internet connection
Ex: 162.200 . 20.61 is an IP address
Internet Protocol Versions :
Based on Address length and speed of access, we have 2 Internet protocol versions
a) IPV6 Internet Protocol Version 6
It supports 128 Bit address length
:K
for future use
b) IPV4 Internet Protocol Version 4
It supports 32 bit address length
nt
for current generation use
From To From To
Class A 0.0.0.0 127.255.255.255 Class D 224.0.0.0 239.255.255.255
oi
wires in cable)
So, it is a type of broadband connection
Tu
pa
5) WIMAX : World wide Interoperability for microwave Access
When compared to wifi, It has capacity to cover larger distance.
Example : If suppose, wifi is connected up to 500 metres, wimax can be connected upto 2 kilometers.
Both are used for connecting to Internet only
a
Web Browser :
The program written to view the web pages
ad
Web Browser is a software that is used to view the web pages.
LOGIN : The process of authentication for connecting to Internent by providing user name and pass word
Authentication : The process of verifying valid username and password, that is given by the user.
:K
Licence / End user Agreement : Accepting the terms and conditions of any software / licencing authority
to use their products for our personal use
Web Site : The collection of web pages in a single place, that is called website.
Homepage : The first page of the website that appeared after entering URL in the addres bar.
URL : It is word based address of IP address
nt
Its full form is uniform Resource locator
It holds the websites address name
It is a unique address for any website.
oi
ARPANET 1969
It links / connects website to web server C Language 1972
ii) www: World wide web
IBM PC 1981
ng
Ex : .gov Government
Tu
. Com Commercial
. Net Network
. edu Education
. org organization
. In India www developed by Tim Berners Lee
pa
Attachment : The paper, music, video file that is sent as a soft copy and that can be modified at receiver
side is called Attachment.
TYPES OF WEBSITES
a
i) Static website : The webpages or information on website is not changed from /for long time
ii) Dynamic website : The webpages or information on website is changed from / for regular time / daily.
ad
Now we have system, internent connection, web browser, so we see the services provided by internet
SERVICES OF INTERNET
1) E Mail 2) Chat 3) Video conferencing 4) Social Networking
1) E - Mail : :K
It is also called Electronic mail, It is similar to writing a letter to reciptents but transmitted in
electronic medium ( Invented by Ray Tomlinson in 1971)
ASCII Code : American standard code for Information Interchange
The text in mail is first converted from normal text to ASCII code (not ANSI Code)
nt
Each character in ASCII code is 1 Byte or 8 Bits of data.
Protocols for E-Mail :
SMTP : Simple Mail Transfer Protocol
oi
E-MAIL COMPONENTS
a) Sign Up : Creating an account by providing our details to the server for their confirmation
The process of creating account is called signup process.
b) Captcha Code : The program that can generate and grade tests that humans can pass but current
ni
c) Authentication : The process of verifying the username & password is called Authentication
Tu
d) Compose : The command to create /send a new mail to others from sender side.
e) Inbox : The recieved emails to our email account are stored in this place.
f) Drafts : The important documents / mails/ Data / Attachments can be stored here
The created mail which is not sent is also stored in Drafts only..
pa
Note : Whenever you receive an unknown mail ( mails from un known person), you should not open it &
you have to directly delete it.
k) Forward : The content / mail already present in mail box and it is sent to another person through this option
a
To avoid creating a new mail, we can use this command
l) Subject : The main headline (contents) of email is written in this space
ad
m) Address book : The mail addresses of friends & others are saved here
n) BCC : Blind Carbon Copy
Sender address writen in BCC is not displayed in remaining receivers inbox / mail.
o) CC : Carbon Copy :K
Sender address writen in CC is displayed in remaining receivers inbox / mail.
Automatically Generated Components :
While we are sending mail, 2 components are automaticaly generated, that we need not give in mail
at receiver side only
nt
Those are sender Email address and Time with Date of email sent.
These 2 components are seen only at receiver side
E_Mail Address :
oi
Ravindra reddy.engg@gmail.com
No space are allowed / accepted in email address
@ is the separator between username and domain name
P
We have many online chatting websites, which provides text conversation between people on Internet.
Ex: Yahoo messenger
Google Talk
r
Rediff Messanger
Tu
3) Video Conferencing :
The service provided by Internet, for meeting people & talk directly in video conference from different
places around the world.
It Requires camera and also Head set (optional)
Teleconferencing is also electronic meeting (Audio chat) Provided by networking
58 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
4) Social Networking :
The way of connecting people around the world at one place to share their views & ideas
through Internet
These are creating maximum awareness about social issues around the world
Ex: Facebook orkut Twitter Google +
Linked In Badoo meetup Ning
* Facebook is the largest using social networking site around the world.
pa
* Linked In is used for business awareness & market strategy
* orkut is Google product, Before Introduction of Facebook it was used widely.
Web mail Interface : It allows you to access your email from any where in the world, by just having
user name and password.
a
Types of E-mail Text :
ad
In Emails we see plaintext, Images, colour text, tables and different graphics. so we have 3
types of text used in emails
a) Plain Text : It does not support Bold, Italic & Coloured text or fonts
b) HTML Text : It allows fonts, Bullets & colours also
:K
c) Rich Text : It supports Bullets, Images & alignment
Instant messaging : The contacts shown / referred by the email mailing list of people who regularly
participate in discussion topics is called Instant messaging
Frequently messaged users names are displayed here.
Search Engines :
nt
The tools to launch a search on the web or Internet are called search Engines
The keywords are taken by search Engine to provide the links that relates to the key words
Ex : Google, Lycos, Yahoo, Delta etc.
oi
Ex : Buying Apparals from online sites such as ebay, flipkart, snapdeal etc.
2) M- Commerce : The store that combines online shopping and physical presence is called Mobile Commerce
r
pa
Virtual Keypad : The key board provided by specific websites such as Online banking websites to reduce the
risk of key stroke threats while entering username & Password.
Virtual keypad is visible on screen only..
Flash : The small size animation pictures on webpages
a
These requires flash player to view
Reloading webpage :
ad
To reload any web page we click on " Refresh" Button or on " Reload" option only
We have no Reload button on tool Bar, We have only Refresh Button on Tool Bar..
Cookies : These are the components that store the web history performed by user on specific computer.
:K
Bookmark : The web pages saved by users to see even when there is no Internet connectivity also.
History : The URL of webpages opened in computer are stored here.
Favourites : The frequently opening URL ( websites) can be saved here.
TYPES OF SERVERS ON INTERNET
nt
1) Web server : The program that using client / server model and WWW with HTTP.
2) Client server architecture: It is network architecture which separates the client from server.
It allows clients to send requests to the servers.
oi
3) Proxy server :
It provides the webpages from servers to clients
It also serves as firewall to prevent from unauthorised access.
P
* Sports Results
* EMail
* News Headlenes
ni
Ethernet Cables : It is the IEEE standard cable, used for connecting a system to the network point.
Tu
The devices that are used as mediators in connecting to the network are called Networking devices
1) Bridge : It connects multiple network segments along with data link layer
It works on data link layer
2) Switch : The device splits the network traffic and sends it to different destinations (within LAN)
It works on Data link Layer, uses MAC address to transmit data.
pa
3) Repeater : The device that regenerate digital signals received while transmitting from one part to another
It works in physical Layer
4) Router : The device used in data traffic clearance in Internet Protocol ( connects 2 different networks)
a
It is the device used in Broad band Internet Connection
It works in Network Layer to connect internet.
ad
5) Gateway : The device setting at a network node for interfacing with another network that uses
different protocols.
It works on all 4 layers from Transport Layer to Application Layer
The only device that works in 4 layers is Gateway..
:K
6) Brouter : Hybrid device that combines features of Bridge & Router.
Connecting Devices :
1) MODEM : It is combination of both modulator and Demodulator
It is used in Dial up connection along with the telephone line
2) HUB : The connecting device used in connecting ethernet segments in LAN'S
nt
Junk Mail : The Advertisement mails sentout by specific sites for which, we have given our email Id.
These are also considered as spam only..
Meta Search Engine : A metasearch engine is a search tool that sends user requests to several other
r
search engines and/or databases and aggregates the results into a single list or displays
Tu
pa
1) Boot Sector Virus :
The virus persent in the boot devices like disk / diskdrive or floppy disk
Brain virus is an boot sector virus
2) Worm : The self replicating computer program that always harm the network
a
It has two programs in it.
3) Trojan Horse : The harmful virus, which is a writen program that harms the computer.
ad
Creeper is the trojan horse virus
4) Bomb : The virus which has some payload to destroy files on computer.
Logic Bomb : It occurs when user of computer takes action that triggers the bomb.
It requires the human action :K
Time Bomb : It occurs to blast payload in computer at specific time or data written in program
It does not require human action.
Virus hoax : The false email message warning, the recipient of a virus is going around.
5) Micro virus : It spreads in only application software
nt
* Trend micro is the anti virus program to kill it in the computer.
Scanning : The process of searching for known virus present in the system files is called scanning
6) Spyware : The malicious software that collects information about users without their knowledge.
oi
7) Malware : It is a superset of virus, worms, trojan horses, root kits and spyware etc.
SECURITY THREATS
1) Phishing / Spoofing : The attempts made fraudently to acquire sensitive information such as passwords,
P
2) Hacker : A person who uses his or her expertise to gain access to other people's computers to get information
illegally or do damage is called Hacker
3) Identity Theft : Collecting personal information and effectively posing (acting) as another individual
is known as crime of Identity theft.
ni
Here the person uses some others identity to get the information.
4) Cyber Crime: The theft or frauds through online ( Internet) is called cyber crime.
* Malicious Hacker : The Hacker who involved in the hacking process with intension.
r
* Non - malicious Hacker : The Hacker who involved in the hacking process with no knowledge &
Tu
pa
set of rules and used to protect network from unauthorized access
Firewall is also an hardware device
Firewall is also having software to act
ANTIVIRUS : The program written by programmers to catch and kill the computer virus is called Antivirus.
a
Ex : Trend micro Antivirus
Anti Spyware 2010
ad
Kaspersky Antivirus 2010
MCA fee Antivirus 2010
Norton Antivirus 2010
Symantic Antivirus 2010
Avast Antivirus 2013
Examples for VIRUS :
:K
* Creeper * Morris worm * I Love You * Code Red
* Sasser * Blaster * Nimade * Melissa
nt
* Elk cloner
* Spoofing and phishing are both techniques follow same strategy so both are same threats only.
Note : We have started with history & Generations and Ended with Antivirus.
oi
1. The first network that planted the seeds of 5. Which of the following is not network device ?
network was ? 1) Router 2) Switch
1) ARPANET 2) NSF net 3) Modem 4) Bridge
ng
pa
12. Which of the following protocol used for can handle ?
webSrver connection ? 1) Multiple connection
1) HTTP 2) FTP 2) Single connection
a
3) W3C 4) UDC 3) No Connection
13. the Communication protocol used by the internet 4) All of the above
ad
is ? 24. Favourites are accessible from the _____
1) HTTP 2) TCP/IP menu?
3) www 4) All the above 1) Start 2) Title
14. The first page that you view normally in web 3) Stop 4) File
site is ?
1) Google Page
3) Banner Page
2) Master Page
4) Home page
:K
25. the new favorite entry will be named ____ to
the title of the web page ?
1) Field 2) Long Run
15. For connection of internet you will need ? 3) Shortcut 4) All the above
1) An IP Address 2) TCP/IP connection 26. In which type of network the systems are
3) An ISP 4) All the above connected either with infrared rays or blue tooth?
nt
16. A user can get files from the another computer 1) PAN 2) LAN
on the internet by using ? 3) MAN 4) WAN
1) FTP 2) UTP 27. Which of the following can be share through
oi
2) A postal mail address 28. Which of the following small, single site
3) A location of the host network?
4) Server 1) LAN 2) MAN
18. The ground station in VSAT communication
ng
3) PAN 4) WAN
called ? 29. Cable TV is example for which type of network?
1) HTTP 2) MULTIPLEXER 1) PAN 2) LAN
3) Hub 4) Repeater 3) MAN 4) WAN
ni
19. For a small website one need to buy space from 30. Internet and WWW is examples for which
the ? network ?
1) Network administrator 1) PAN 2) MAN
2) Telephone Exchange
r
3) LAN 4) WAN
3) ISP 31. Which version protocol is used in connection to
Tu
pa
1) Bus LAN 2) Star LAN
3) Mesh LAN 4) Tree LAN is permitted for database access is called?
35. In which topology, n nodes will have n1 1) Intranet 2) Extranet
connections between them? 3) Public network 4) All of these
a
1) Bus LAN 2) Star LAN 47. Which of the following software allows you to
3) Mesh LAN 4) Tree LAN connect to the remote server on network?
ad
36. In which topology, the tokens are issued to all 1) Intranet 2) Ethernet
the nodes for data transmission? 3) Telnet 4) Mallet
1) Bus LAN 2) Star LAN 48. Which of the following is set of rules that governs
3) Ring LAN 4) Tree LAN the network?
37. In which LAN , Each node will have the
connection with all the remaining nodes in the
network?
:K
49.
1) Ethernet
3) Monocot
2) Protocol
4) All of these
ARPANET came into existence for use, in
1) Bus LAN 2) Star LAN which year?
3) Mesh LAN 4) Tree LAN 1) 1949 2) 1959
38. In which topology, the same node(system) acts 3) 1969 4) 1989
nt
as both client and server in the network? 50. How many layers are present in OSI reference
1) Bus LAN 2) Star LAN model ?
3) Mesh LAN 4) Tree LAN 1) 7 2) 8
oi
40. Which of the following is a type of Wide Area 2) Open system interconnection
Network Connection? 3) Open Source Interface
1) PSTN 2) PSDN 4) Open source interconnection
ng
pa
1) Application layer 2) Physical layer
3) Sent box 4) Trash
3) Transport layer 4) Presentation layer
69. The deleted messages from email box are
58. The network device that connects different
moved to ?
networks and different protocols is?
a
1) Recycle bin 2) Trash
1) MODEM 2) HUB
3) Inbox 4) Delete box
3) ROUTER 4) Gateway
ad
70. The email address of friends in email are saved
59. Which device used in network layer of OSI
to ?
model?
1) Email box 2) Address book
1) MODEM 2) HUB
3) Phone list 4) Contact list
3) ROUTER 4) Gateway
60. The error detection and correction is done in
which layer of OSI model?
1) Application layer 2) Transport layer
:K
71. Which of this is not accepted in email address?
1) Spaces
3) Text
2) Underscore
4) Numbers
72. Which internet protocol version supports 128 bit
3) Data link layer 4) Physical layer
address length?
61. Which of the following network devices works
1) IPV3 2) IPV4
in data link layer?
nt
3) IPV5 4) IPV6
1) Switch 2) Bridge
73. The technology involved in taking the class room
3) Both 1&2 4) Router
teaching in computer without going to class
62. Which of the network device prevents data
oi
room?
signal from Attenuation?
1) ECommerce 2) EGovernance
1) Repeater 2) HUB
3) ELearning 4) All of these
3) ROUTER 4) Gateway
P
3) Podcast 4) Krish
3) Net 4) Node
75. Which button we press to reload a webpage ?
64. Which of the network device clears data traffic
1) Reload 2) Regenerate
in network and provides broadband internet
3) Refresh 4) All of these
Connection ?
ni
pa
confidential details of others? 4) Optics Code Recognition
1) Siting 2) Watching 93. What is the full form of POP?
3) Phishing 4) Humming 1) PostOffice Protocol
a
82. Which of the following is antivirus program? 2) Point of Port
1) Antispyware 3) Point Of Protocol
ad
2) Trend micro antivirus 4) All of these
3) Norton 94. Which of the following are social networking
4) All of these sites?
83. Firewall is used to prevent unauthorized access 1) Linked in 2) Facebook
form both the sides as software and____?
1) Hardware
3) Spyware
2) Malware
4) Freeware
:K 3) Tweeter 4) All of these
95. Which of the following is Chatting Provider in
internet?
84. The property of involving intentionally for hacking 1) Yahoo messenger 2) Google Talk
the data is called? 3) Rediff Messenger 4) All of these
1) Time pass 2) Non malicious 96. Which of the below text does not support colored
nt
3) Malicious 4) Dragon text or fonts in EMail Text ?
85. The way of getting the deleted data from the 1) Plain text 2) HTML Text
cybercrime committed person system is? 3) Rich text 4) All of these
oi
1) Computer forensics 2) Malpractice 97. Which are the memory components that store
3) Hacking 4) All of these the web history on computer?
86. Opera, Mozilla, netscape navigator, safari are 1) Clouds 2) Cookies
P
1) Telnet 2) Ethernet
web? 3) Intranet 4) Extranet
1) Google 2) Yahoo 99. The process of searching for known virus in the
3) Delta 4) All of these system is called?
ni
1) Spam 2) Scam
1) System software 2) Application software 3) Storm 4) Virus
Tu
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
1 2 3 1 3 4 1 2 1 4 4 1 2 4 4 1 1 2 3 3
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
4 1 1 1 3 1 4 1 3 4 3 2 5 1 2 3 3 4 2 5
pa
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
4 2 3 4 1 2 3 2 3 1 2 4 5 2 4 2 3 4 3 3
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
a
3 1 2 3 2 5 2 2 2 2 1 4 3 2 3 4 3 3 2 1
ad
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
3 4 1 3 1 3 4 2 3 1 2 3 1 4 4 1 2 2 2 1
:K
IMPORTANT ABBREVIATIONS
CD Compact Disc
CDR CD Recordable
CDMA Code Division Multiple Access
CDROM Compact Disc Read only Memory
CDRW CD Rewritable
CGI Computer Generated Imagery
68 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
CISC Complex Instruction Set Computer
CMOS Complimentory Metal Oxide Semiconductor
COBOL Common Business Oriented Language
Ex : Televesion Broadcasting
User Datagram Protocol
DBMS Data Base Management System
DDL Data Definition Language
pa
DFS Depth First Search
UDP
DML Data Manipulation Language
DNS Domain Name System
DPI Dots Per Inch
a
DRAM Dynamic Random Access memory
DSL Digital Subscriber Line
ad
DSS Decision support system
DVD Digital Versatile Disc
DVI Digital Visual Interface
Ex : E mails
EMAIL Electronic Mail
ENIAC Electronic Numerical Integrator and Calculator
EPROM Erasable Progeammable Read only memory
oi
GB Giga Byte
Gb Gigabit
GHZ Giga Hertz
ni
pa
IRC Internet relay chat
ISDN Integrated Services Digital Network
ISO International Standardization Organization
ISP Internet Service Provider
a
IT Information Technology
ITU International Telecommunication Union
ad
JPEG Joint Photographic Experts Group
JSP Java Server Pages
Kb Kilobit
KB KiloByte
Kbps Kilo bits Per second
KBPS Kilo Bytes Per Second
:K
KYC Know Your Customer
LAN Local Area Network
LASER Light Amplification by Stimulated Emission of Radiation
nt
LCD Liquid Crystal Display
LED Light Emitting Diode
LIFO Last In First Out
oi
Mb Megabit
MbPS Mega bits per Second
MBPS Mega bytes Per Second
ni
pa
OS Operating System
OSI Open System Interconnection
P2P Peer to Peer
PAN Personal Area Network
a
IMPORTANT PERSONS
PC Personal Computer
Micro Processor Marcian Hoff
PDA Personal Digital Assistant
ad
PDF Portable Document Format Father of Computer Charles Babbage
POP Post Office Protocol C Language Dennis Ritchew
POST Power on Self Test Microsoft Founder Bill Gates
PPI Pixels Per Inch
PPP Point to Point Protocol
PPT Power Point Presentation
:K
Apple Company Founder
Father of Internet
Steve Jobs
Vinton Cerf
pa
VAN Value Added Network
VB Visual Basic
VGA Video Graphics Array
VIRUS Vital Information Resource Under Seize
a
VLSI Very Large Scale Integrator
VM Virtual Memory
ad
VOIP Voice Over Internet Protocol
VPN Virtual Private Network
VT Video Terminal
WAN Wide Area network
WAP Wireless Application Protocol
Wi Max World wide Inter operability for Microwave Access
:K
Wifi Wireless Fidelity
Windows Me Windows Millenium
Windows NT Windows New Technology
nt
WWW World Wide Web
XHTML Extensible Hypertext Markup Language
XML Extensible Markup Language
oi
2) Image files :
. jpg (or) .jpeg joint photographic experts group
Tu
. bmp bitmap
. gif Graphics Interchange Format
. Png Portable Network Graphics.
. tif Tagged Image file
pa
. 3gp used in GSM mobiles (Small mobiles)
. mp4 MPEG 4 Video file
. wmv windows media video file
a
. mpeg moving pictures experts group
5) Other Files :
ad
. pdf = Portable document format
. PMD = Page maker Document file
. SYS = System Files
. exe = executable file
. torrent = bit torrent file
:K
IMPORTANT TERMS
nt
1) UPS : Uninterruptible Power Supply
The device which gives continuity to process work even when power off's
It provides Battery power to the attached / connected devices.
oi
We can divide processor into CISC & RISC based on ther complexity in Instructions
CISC RISC
Complex Instruction Set Computer Reduced Instruction set computer
It allows more number of It allows small & limited number of signals
ni
pa
4) Data Encapsulation
5) Polymorphism
6) Inheritance
7) Overloading
a
8) Message Passing
Note : Basic oop concepts are only 5, which are numbered from 3 to 7 in list.
ad
Here
Polymorphism : Existing two or more forms for a single class
Inheritance : Acquiring features of parent class to the child class
8) Logic gate families : DTL, TTL, ECL, etc.,
* ECL is the fastest logic family
:K
9) POS Terminals / Systems :
POS stands for point of sale
nt
The POS systems or terminals are used in super markets and shopping complex for billing the
products through bar code Readers
oi
Through Bar code itself, they even find the offers & discounts on the special products in PSS systems.
10) MS Paint :
P
The basic free painting tool prodvided by windows to draw the pictures.
This is found in all systems where they are using windows operating system.
11) Spooling:
ng
13) Podcast : The files of image, text, audio, video in the internet ready to download
14) Access Time : Time read data from a peripheral data storage
r
15) Adder : The digital logic circuits that implements adding process in ALU for 2 or more binary numbers
Tu
pa
22) CAD : Computer Aided Design
Civil Engineers use CAD to Draw Building Plans in Computer
23) CODEC : Compression and DE compression
a
Ex: Cinepak and MPEG
ad
24) Crash : The Hardware or Software problem that causes information to be lost on computer or to shutdown
automatically
25) DDR : Double Data Rate (RAM) A type of SDRAM to fast delivery of data.
EX : DDR2, DDR3
26) Directory: List of files stored in computer
:K
27) Documentation : The documents that contain code, flowchart, algorithm, result in written form
28) Ethernet Card (NIC) : Network interface card, it is a board in CPU, to connect network cables
29) HTML : Hypertext Markup Language
nt
Ex: 162.150.20.15
31) Logic Gates : A digital circuit result in output based on states of input signals
P
32) LOOP : The repetition of program instruction until a conditional exit is occured
Tu
pa
39) ZIP : Zonal Information Protocol
Compression of application files.
40) Mobile Phone Software : android, symbian, ios, bada, etc.,
a
41) Digitization : Process of converting voice, text, audio, video in to digital form
ad
42) Veronica : It is a place where Gopher Protocol is applied
43) Circuit Switching : Method used in PSTN system where there is a direct connection between communicating
devices.
44) Skype : Application for video chat through internet. :K
45) Peripherals : except CPU, remaining connecting devices to computer
Ex: Pendrives, Printers, Scanners, etc.,
46) E-learning : The process of attending class through online in computer without going to class room
47) MOSAIC : First browser in web
nt
pa
Otherdestination.
(1) Microsoft outlook mathematically?
(2) Webhosted technology (1) 3G (2) 4G
(3) Office live (3) Functional (4) Mathematical
a
(4) None of these 13. When entering text in a document,the ENTER
03. What feature adjusts the top and bottom margins key is pressed at the end of every?
ad
that the text is centered vertically on the Printed (1) Line (2) Word
page? (3) Letter (4) Paragraph
(1) Vertical centering 14. The real time telephone call between users by
(2) Horizontal Centering using computers is called?
04.
(3) Dual centering
(4) all of these
The letter and number of the intersecting column
:K
15.
(1) Chatting
(3) Instant message
(2) Email
(4) Internet telephony
Which of the following software could assist
and row is the … someone who cannot use their hands for
(1) Cell referencing computer input ?
(2) Cell address (1) Audio digitizer (2) Voice recognization
nt
(3) Cell coordinates (3) Synthesizer (4) Voice acceptor
(4) Cell contents 16. Which memory holds the currently processing
05. A detailed written description of programming by CPU?
oi
cycle and the program, along with the test results (1) Mass memory (2) Cache memory
and Printout of the program is … (3) Internal memory (4) External memory
(1) report (2) directory 17. What refers to a set of characters of a particular
P
(1) Tables group (2) Objects group 18. Which language used by public and private
(3) Text group (4) Not present companies to publish and share financial info.
07. To find the paste special option , you use the With each other and industry analysis across all
clipboard group on the ___ tab of PPT? platforms and the internet ?
ni
08. A________Program is one that is ready to run telephone line but provides faster access than
and does not need to be altered in any way? dial up ?
Tu
(1) interpreter (2) High level (1) Cable access (2) DSL
(3) Executable (4) Compiler (3) Broadband (4) Modem
09. __________store the visited data of internet 20. What is the significance of a faded(dimmed)
websites on your computer? command in pull down menu?
(1) RAM (2) ROM (1) The command is working
(3) cookies (4) CMOS (2) Command is selected
77 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
(3) The command is currently not accessible (1) Ctrl+ Shift (2) Ctrl+ Enter
(4) All of these (3) Shift+ Enter (4) Shift+ Break
21. Which of these allows you to access your email 33. Grouping and processing all of a firm’s
from anywhere? transactions at one time is called ?
(1) Forum (2) Blog (1) Real time system
(3) Message board (4) Webmail interface (2) Batch processing
22. Which of the following you find on LINKEDIN? (3) Online system
(1) Connections (2) ChatC.Games (4) Combine system
(3) Mails (4) Links 34. A central computer that holds collections of data
pa
23. Which is a technique used to send more than and programs for many PC’s, workstations, and
one call over a line? Other computers is an ….
(1) Multithreading (2) Multiplexing (1) Minicomputer (2) Microcomputer
a
(3) Streaming (4) Transmission (3) Server (4) Laptop
24. Which of the following information systems 35. You can______ a search by providing keywords
ad
focuses on making manufacturing processes and information is provided by search engine
more efficient and of higher quality ? (1) Refine (2) Expand
(1) CAD (2) CIM (3) Query (4) Load
(3) Computer aided software Engineering 36. The contents of which lost when the computer
25.
(4) Computer aided system Engineering
A mistake in algorithm that causes incorrect
results is ?
:K turns off .
(1) Storage
(3) Output
(2) Input
(4) Memory
(1) logical error (2) Syntax error 37. The _____enables you to simultaneously keep
(3) both of these (4) None of these multiple web pages open in one browser window?
26. What is the device for changing the connection (1) Tab box (2) Pop up window
nt
on a connector to a different configuration? (3) Tab row (4) Address bar
(1) Converter (2) Component 38. A DVD is an example of an
(3) Voltchanger (4) Adapter (1) hard disk (2) Optical disk
oi
27. Codes containing lines of various width and length (3) Output device (4) All of these
that are readable by computer are ? 39. _____ is the process of dividing the disk into
(1) OCR Scanner (2) ASCII Code tracks and sectors .
P
(3) Bar code (4) Binary code (1) Formatting (2) Tracking
28. Block number, block description and number of (3) Allotting (4) Crashing
parts are example of? 40. Which ports connect special types of music
(1) Output (2) Input
ng
pa
made?
(1) Copying (2) Pasting (3) Select the cells and press backspace
(3) Merging (4) Compiling (4) We cannot delete all cells at a time
03. Which of below provides you to connect your 14. If we need to link MSExcel sheet to MSPPT,
a
computer from remote system to use internet? Which is correct option from menu ?
(1) Email (2) Telnet (1) Edit, paste (2) Edit ,paste special
ad
(3) FTP (4) Instant message (3) Edit, copy (4) File copy paste
04. ____are words that a programing language 15. Which of the following is hardware but not
has set aside for its own usage? software?
(1) Control structures (2) Reserved words (1) BIOS (2) Excel
05.
(3) Special words (4) No words
To reload a web page , press _____ button?
(1) Redo (2) Reload
:K
16.
(3) Control Unit (4) Operating system
The ALU Performs_______ operations
(1) Log based (2) ASCII
(3) Restore (4) Refresh (3) Algorithm based (4) Arithmetic
06. When the pointer is positioned on a ____ .it is 17. To get the save as option which is the function
shaped into hand symbol key is to be used?
nt
(1) Grammar error (2) Spell mistake (1) F2 (2) F6
(3) Hyperlink (4) Interrupt (3) F8 (4) F12
07. In computer language Kb Stands for? 18. If we press F8 for three times, which of the
oi
09. Which of the following is a magnetic disk and 20. In windows ME, M stands for?
storage device? (1) Millennium (2) Micro
(1) Hard disk (2) CD (3) Macro (4) Multi
(3) DVD (4) Pen drives 21. Which of the following is required to create
ni
10. The device which converts digital signal into HTML document?
analog that can travel through telephone lines (1) Browser (2) Internet
is ? (3) Search engine (4) Text editor
r
(1) Router (2) MODEM 22. A_____ uses pressure as a user presses it
(3) Converter (4) CPU with a stylus to send signals?
Tu
11. The process of storing large number of files in (1) TrackPoint (2) Track pad
a small amount of storage space? (3) Mouse (4) Touchpad
(1) File format (2) File depriving 23. A partially completed workbook that contains
(3) File compression (4) None of these formulas and formatting, but no data is called?
(1) Model (2) Prototype
(3) Template (4) Function
79 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
36. The set of values that you want prepare chart
24. To open find+ replace dialogue box , what is
in MSExcel are called?
the shortcut key?
(1) Objects (2) Data series
(1) Ctrl+ F (2) Ctrl+G
(3) Numbers (4) Formulas
(3) Ctrl+H (4) ALL OF THESE
37. Before you can send email, you must have
25. The open, print ,and save buttons are all
an?
located on the __
(1) Browser (2) Modem
(1) Formatting tool bar
(3) Account (4) Scanner
(2) Standard tool bar
38. The button that displays the window over the
pa
(3) Title bar
entire screen is?
(4) None of these
(1) Minimize (2) Downsize
26. The name of msoffice document is displayed
(3) Big size (4) Maximize
in both the_______ and task bar..
a
39. Computers process data into information by
(1) Title bar (2) Status bar
working exclusively with?
(3) Format bar (4) Tool bar
ad
(1) Multimedia (2) Words
27. The higher the resolution of a monitor, the
(3) Characters (4) Numbers
(1) Lesser the pixels number
40. Java is example of
(2) Less clear the screen
(1) Machine language (2) High level language
(3) Further apart the pixels
28.
(4) Closer together the pixels
To select a word , we click mouse on it for
(1) Once (2) Thrice
:K
Answers
(3) 4G language (4) None of these
pa
(3) Mouse (4) Trackball
03. Which of the following converts source program (1) Word processor (2) Web viewer
into object code? (3) Search engine (4) Web browser
(1) Mouse (2) CPU 15. Tool bars contain small outlined areas called ___
a
(3) Compiler (4) Tester that provide shortcuts for quick access to
04. ____ is a cross between a human language and Commonly used commands.
ad
a programing language? (1) Bullets (2) Numbers
(1) Compiler (2) Java (3) Buttons (4) Dials
(3) JVM Machine (4) Pseudo code 16. A business customer records and payrolls would
05. The components that process data are located best to be stored as___ file
in the ?
(1) Input device
(3) Output device
(2) System unit
(4) Monitor
:K
17.
(1) Worksheet
(3) Database
(2) Document
(4) Presentation
A microprocessor is brain of computer and also
06. In the binary language each letter of the alphabet, called?
each number and each special character is made (1) Macrochip (2) Microchip
of unique combination of ? (3) Macroprocessor (4) Calculator
nt
(1) 8 kb (2) 8 MB (5) None of these
(3) 8 bits (4) 8 bytes 18. Storage and memory differ with respect to which
07. Which software works with endusers, of the following characteristics?
oi
(3) System Software (4) All of these 19. What are the examples of freeware?
08. which type of computers are least powerful, but (1) Shareware and file sharing
widely used and fastest growing type? (2) MSWord and Google Chrome
ng
(4) Taskbar (5) Menus (1) Telephone line, Modem ,Computer and
11. The internet service that provides a multimedia communication software
interface to avail resources is? (2) Telephone line , Modem, Mouse and
(1) Telnet (2) WWW communication software
(3) FTP (4) Browser (3) Telephone line, computer, modem
(4) None of these
81 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
22. Which of the following not performed by (3) Process data into information
SERVERS? (4) Both 1 & 3
(1) Email processing (2) Word processing (5) None of these
(3) Database sharing (4) Website processing 32. Which of the following is a processing device?
23. Storage media such as a CD can read and write (1) MICR (2) Tablet PC
information using_________? (3) Scanners (4) Keyboard
(1) Magnetic strips 33. A___ is a set of governing rules in network?
(2) Magnetic dots (1) URL (2) Domain
(3) Laser beam of red light (3) Protocol (4) Hypertext
pa
(4) None of these 34. Which of the following is a format for encoding
24. Cache and RAM will lose their contents when pictures on a computer?
the power is off. They are called? (1) HTML (2) DOC
(3) MP3 (4) JPEG
a
(1) Dynamic (2) Volatile
(3) Static (4) Faulty (5) MPEG
ad
(5) Weak 35. Which is the shortcut to search word in
25. In general Every computer have one_____ and bookmarks that are saved in web browser ?
many of _________ as programs? (1) Ctrl+A (2) Ctrl+ C
(1) Application program And Operating system (3) Alt+D (4) Shift+D
(2) Utility software and application s/w
(3) Operating system and Application programs
(4) Mouse and monitors
:K
36. Which of the keys used to open the OPEN
Dialogue box ?
(1) F12 (2) Ctrl+F12
26. Main memory works with conjunction (3) Alt+F12 (4) Shift+F12
with_______. 37. Which of the following keys create symbol
(1) RAM (2) CPU copyright as ©?
nt
(3) Intel (4) All of these (1) Alt+ctrl+d (2) Alt+shift+c
27. A sales clerk at billing counter scans a tag on an (3) CRTL+ALT+C (4) ALT+DEL+C
item rather than entering price in system, that 38. Portrait and landscape are two types of?
(1) Page orientation (2) Paper size
oi
is?
(1) Input automation (3) Pge layout (4) Printing page
(2) Item data automation 39. Macros are present in MSWord under which
P
pa
(1) cells (2) sheets
(3) block lines (4) gridlines (4) bootstrap loaders.
03. To delete an incorrect character in a 11. MSDOS is a __________ operating system.
document,________to erase to the right of (1) pointandclick (2) userfriendly
a
The insertion point. (3) commanddriven (4) Mac
(1) end (2) delete 12. A spooler is a(n):
ad
(3) backspace (4) both b and c (1) location in memory that maintains the
(4) none of these contents of a document until it prints out.
04. The operating system does all of the following (2) print job.
EXCEPT: (3) program that coordinates the print jobs that
(1) provide a way for the user to interact with
the computer.
(2) manage the central processing unit (CPU).
:K are waiting to print.
(4) message sent from the printer to the operating
system when a print job is completed.
(3) manage memory and storage. 13. Virtual memory is typically located:
(4) enable users to perform a specific task such (1) on a floppy disk. (2) in the CPU.
as document editing. (3) in a flash card. (4) on the hard drive.
nt
05. During the boot process, the____________ 14. The purpose of a swap (or page) file is to:
looks for the system files. (1) maintain pages of documents that are being
(1) CD (2) BIOS spooled to the printer.
oi
(3) CPU (4) DVD (2) hold a program’s data or instructions in virtual
06. _________ is the ability of an operating system memory when it can’t fit in RAM.
to control the activities of multiple Programs at (3) prevent thrashing in a multitasking
P
07. The unique signal, generated by a device, that 15. The definition of thrashing is:
tells the operating system that it is in Need of (1) swapping data between virtual memory and
immediate attention is called an : RAM too frequently.
(1) action. (2) event. (2) insufficient hard disk space.
ni
(3) interrupt. (4) activity (3) too many processors being managed by the
08. An interrupt handler is a(n): operating system.
(1) location in memory that keeps track of (4) inaccurate information stored in the registry
r
recently generated interrupts. 16. All of the following are TRUE of Safe Mode
(2) peripheral device. EXCEPT:
Tu
pa
19. Which of the following is the correct sequence
of actions that takes place during the Bootup (3) Files are stored in RAM.
process? (4) Files should be organized in folders.
(1) Load operating system ? Activate BIOS ? 26. Using Windows Explorer, a plus (+) sign in front
a
Perform POST ? Check configuration Settings of a folder indicates—
(2) Activate BIOS ? Perform POST ? Load (1) an open folder.
ad
operating system ? Check configuration (2) the folder contains subfolders.
Settings (3) a text file. (4) a graphics file.
(3) Perform POST ? Load operating system? 27. In Windows XP, if you want to see the file size
Activate BIOS ? Check configuration Settings and modified dates of all files in a Folder, the
(4) Activate BIOS ? Check configuration
settings? Perform POST ? Load operating
System
:K best viewing option is the __________ view.
(1) List
(3) Details
(2) Thumbnails
(4) Icon
20. All of the following are steps involved in the boot 28. All of the following are examples of real security
process EXCEPT: and privacy risks Except _____
(1) load the operating system into RAM. (1) hackers (2) spam
nt
(2) the poweron selftest. (3) viruses (4) identify theft
(3) activate the basic input/output system 29. The OSI model is divided into _______
(BIOS). processes called layers.
oi
its permanent location on the hard drive into enables your computer’s hardware and ______
RAM. software to work together.
(1) BIOS (2) API (1) management (2) processing
ng
(3) device driver (4) supervisor program (3) utility (4) application
22. The basic input/output system (BIOS) is stored 31. ________ are specially designed computer
in : chips reside inside other devices, such as Your
(1) RAM. (2) ROM. car or your electronic thermostat.
ni
pa
(1) Universal Research List 29) 3 30) 3 31) 2 32) 3
(2) Universal Resource List 33) 4 34) 2 35) 3 36) 4
(3) Uniform Resource Locator
37) 2 38) 4 39) 1 40) 1
a
(4) Uniform Research Locator
36. A database management system (DBMS) is
Test - 5
ad
a.......
(1) hardware system used to create,maintain and 01. Which term identifies a specific computer on the
provide controlled access to a DB web and the main page of the entire Site ?
(2) hardware system used to create, (1) Link (2) Web site address
maintain,and provide uncontrolled access
to DB
(3) software system used to create,maintain,and
:K
02.
(3) Hyperlink (4) Domain name
The code that relational database management
systems use to perform their Database task is
provide uncontrolled access to a DB referred to as .....
(4) software system used to create, maintain, (1) QBE (2) SQL
and provide controlled access to a DB (3) OLAP (4) Sequel Server
nt
37. A Proxy server is used for which of the 03. The purpose of the primary key in a database is
following? to :
(1) To provide security against unauthorized (1) unlock the database
oi
(3) node (4) cable 07. A(n) _______ uses pictures (called icons) and
40. Granting an outside organization access to menus displayed on the screen to Send
internet web pages is often implemented commands to the computer system.
Using a (n) ____ (1) command based user interface
(1) extranet (2) intranet (2) GUI (3) system utility
(3) internet (4) hacker (4) API
85 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
08. The _____ manual tells you how to use a (3) a communication system for the Indian
software program. government
(1) documentation (2) programming (4) All of these
(3) technical (4) user 18. Which of the following would most likely NOT
09. Which of the following is a type of broadband be a symptom of a virus?
Internet connection? (1) Existing program files and icons disappear.
(1) Cable (2) DSL (2) The CDROM stops functioning.
(3) Dialup (4) Satellite (3) The Web browser opens to an unusual home
pa
10. Software, such as viruses, worms and Trojan page.
horses, that has a malicious intent, is Known as: (4) Odd messages or images are displayed on
(1) spyware (2) adware the screen.
(3) spam (4) malware 19. How many options does a binary choice offer ?
a
11. Making a field ______ means : that it cannot be (1) None (2) One
left blank. (3) Two
ad
(1) numeric (2) required (4) It depends on the amount of memory in the
(3) calculated (4) validated computer
12. _________ is the process of finding errors in (5) It depends on the speed of the computer’s
software code. Processor
13.
(1) Debugging
(3) Testing
(2) Compiling
(4) Running
_____are viruses that are triggered by the
:K
20. How many numeric values can be represented
by a single byte ?
(1) 4 (2) 16 (3) 64
passage of time or on a certain date. (4) 256 (5) 512
(1) Bootsector viruses 21. Device drivers are—
(2) Macro viruses (1) Tiny power cords for external storage devices
nt
(3) Time bombs (2) Experts who know how to maximize the
(4) Worms performance of devices
14. Linux is a (n) ____________ operating system. (3) Small, specialpurpose programs
oi
(1) opensource (2) Microsoft (4) The innermost part of the operating system
(3) Windows (4) Mac (5) Substitutes for operating system
15. What is a backup? 22. Which of the following refers to a small, single
P
the event of a system crash orfailure 23. A set of instructions telling the computer what
(4) All of these to do is called—
(5) None of these (1) Mentor (2) Instructor
16. Which of the following places the common data (3) Compiler (4) Program
ni
elements in order from smallest to Largest 24. If you receive an email from someone you don’t
(1) character, file, record, field, database know, what should you do?
(2) character, record, field, database, file (1) Forward it to the police immediately
r
(3) character, field, record, file, database (2) Delete it without opening it
(4) Bit, byte,character,record,field, database (3) Open it and respond to them saying you don’t
Tu
pa
(1) RAM (2) DSL (1) robotics.
(3) USB (4) LAN (2) Computer forensics.
27. Information travels between components on the (3) simulation.
a
motherboard through— (4) Forecasting
(1) Flash memory (2) CMOS 37. _______ is the study of molecules and structures
ad
(3) Bays (4) Buses whose size ranges from 1 to 100 nanometers.
28. One megabyte equals approximately— (1) Nanoscience (2) Microelectrodes
(1) 1,000 bits (2) 1 Billion bytes (3) Computer forensics (4) Artificial intelligence
(3) 1 million bytes (4) 1 million bits 38. ________ is the science that attempts to produce
29. When you are working on a document on a PC,
where is the document temporarily Stored ?
(1) RAM (2) ROM
:K machines that display the Same type of
intelligence that humans do.
(1) Nanoscience
(3) cache memory (4) Flash memory (2) Nanotechnology
30. How are data organized in a spreadsheet ? (3) Simulation
(1) Lines and spaces (2) Layers and planes (4) Artificial intelligence (AI)
nt
(3) Height and width (4) Rows and columns 39. ________ is data that has been organized or
31. Magnetic tape is not practical for applications presented in a meaningful Fashion.
where data must be quickly recalled Because (1) A process (2) Software
oi
34. The ability to recover and read deleted or 29) 1 30) 4 31) 2 32) 1
damaged files from a criminal’s computer is An 33) 2 34) 3 35) 3 36) 1
example of a law enforcement specialty called :
37) 1 38) 4 39) 4 40) 2
(1) Robotics. (2) Simulation.
(3) Computer forensics. (4) Animation
pa
process data. (2) Input Output Process Storage
(1) Processing (2) Kilobyte (3) Process Storage Input Output
(3) Binary (4) Representational (4) Input Process Output Storage
03. In the binary language each letter of the alphabet, 13. Data in RAM are :
a
each number and each special Character is made (1) Volatile in nature
up of a unique combination of : (2) Nonvolatile in nature
ad
(1) Eight bytes. (2) Eight kilobytes. (3) Both 1 & 2
(3) Eight characters. (4) Eight bits (4) None of these
04. The term bit is short for: 14. RAM in its commercial forms are available as :
(1) SIMM (2) DIMM
05.
(1) Megabyte.
(3) Binary digit.
(2) Binary language.
(4) Binary number
All of the following are examples of storage
devices EXCEPT:
:K
15.
(3) Both (1) & (2) (4) CPSB
Which of the following requires refreshing during
retaining the data?
(1) Hard disk drives. (2) MICR’s. (1) DRAM (2) SRAM
(3) Floppy disk drives. (4) CD drives (3) Virtual Memory (4) FDD
nt
06. Word processing, spreadsheet, and photoediting 16. Processor Speed and Refresh Rate of monitor
are examples of: is measured in :
(1) Application software. (1) Hertz(Hz) (2) Meter
(2) System software. (3) Volts (4) Amp
oi
(3) Operating system software. 17. Which of the following is lowest in memory
(4) Platform software. hierarchy from low speed to high speed ?
07. ______ is a set of computer programs used on (1) Cache memory (2) Secondary memory
P
08. The PC (personal computer) and Apple (3) Track Ball (4) Both (2) & (3)
Macintosh are examples of two different: (5) All of These
(1) Platforms. (2) Applications. 19. Such types of printers, in which the printing head
(3) Programs. (4) Storage devices contacts with the paper in printing Process, are
ni
(3) Laptops (4) Mainframes 20. Which of the following is a type of optical media?
Tu
pa
(1) Univac (2) MarkI (1) Classifying (2) Searching
(3) ENIAC (4) All of these (3) Sorting (4) Reproducing
25. First Generation Computers contain : 38. A single application that combines the major
(1) Transistors (2) Vacume Tubes features of several types of Applications is
a
(3) LSI (4) VLSI called—
26. CD ROM Drive is a ........ (1) integrated software (2) a suite
ad
(1) input (2) output (3) a combo package (4) a mixed software
(3) both (1) and (2) (4) None of these 39. Primary memory stores
27. 2nd Generation Computers are made of : (1) Data alone (2) Programs alone
(1) Vaccume Tubes (2) Transistors (3) Results alone (4) All of these
28.
(3) LSI (4) VLSI
IV Generation Computers contain :
(1) LSI (2) Vaccume Tubes
:K
40. Which technology is used to read data from
Compact disks?
(1) Mechanical (2) Electrical
(3) All Technology (4) Transistors (3) Electro Magnetic (4) Laser
29. Computers, combine both measuring and
counting, are called : Answers
nt
(1) Analog (2) Digital 1) 2 2) 3 3) 4 4) 3
(3) Hybrid (4) All of these 5) 2 6) 1 7) 2 8) 1
30. A computer can perform, which of the following
9) 4 10) 4 11) 1 12) 4
oi
tasks?
(1) Computation (2) Communication
13) 1 14) 3 15) 1 16) 1
(3) Processing (4) All of these 17) 1 18) 4 19) 1 20) 3
P
32. Who developed the analytical engine’? 33) 1 34) 4 35) 1 36) 4
(1) Jacquard loom (2) Charles Babbage 37) 3 38) 1 39) 4 40) 4
(3) Shannon (4) IBM
33. GUI stands for :
ni
or instructions.
(1) hardware (2) icon
(3) information (4) software
35. Something which has easily understood
instructions is said to be………
pa
(3) Memory (4) Microprocessor 13. A(n)………contains commands that can be
03. Algorithm and Flow chart help us to selected.
(1) Know the memory capacity (1) pointer (2) menu
(2) Identify the base of a number system (3) icon (4) button
a
(3) Direct the output to a printer 14. An error is also known as—
(4) Specify the problem completely and clearly (1) bug (2) debug
ad
04. Which of the following is not a valid size of a (3) cursor (4) icon
Floppy Disk? 15. Arithmetic Operations—
(1) 8" (2) 5 1/4" (1) involve matching one data item to another to
(3) 3 1/2" (4) 5 1/2" determine if the first item is greater
05. A keyboard is this kind of device—
(1) black
(3) output
(2) input
(4) word Processing
:K Than, equal to, or less than the other item
(2) sort data items according to standard,
predefined criteria in ascending order or
06. Which of following refers the fastest, biggest Descending order
and most expensive computers ? (3) use conditions with operators such as AND,
(1) Personal Computers OR and NOT
nt
(2) Supercomputers (4) include addition, subtraction, multiplication
(3) Laptops and division
(4) Notebooks 16. Sending an email is similar to—
oi
07. A collection of related information sorted and (1) picturing an event (2) narrating a story
dealt with as a unit is a— (3) writing a letter (4) creating a drawing
(1) disk (2) data 17. Microsoft Word is an example of—
P
(1) Hard Disk drive (2) Keyboard (3) user response (4) processor
(3) Monitor (4) Printer 19. Which is the part of a computer that one can
10. ………………is the process of carrying out touch and feel ?
r
pa
placed in the clipboard (1) Binary (2) Digital
(3) Text from the clipboard would be placed in (3) Analog (4) Codes
the document at the place where the Cursor (5) All of these
is blinking 35. Hard disk can have ........... heads (pins)
a
(4) Only (2) and (3) (5) None of these (1) One (2) Two
23. The blinking point which shows your position in (3) More than Two (4) No heads
ad
the text is called— 36. In a spreadsheet program the ………… contains
(1) Blinker (2) Cursor related worksheets and Documents.
(3) Causer (4) Pointer (1) workbook (2) column
24. A directory within in directory is called— (3) cell (4) formula
25.
(1) Mini Directory
(3) Part Directory
(2) Junior Directory
(4) Sub Directory
Which of the following controls the manner of
:K
37. ‘ATM’ stands for—
(1) Anywhere Marketing
(2) Any Time Marketing
interaction between the user and the Operating (3) Any Time Money
system ? (4) Automated Teller Machine
(1) User interface (2) Language translator 38. If a word is typed that is not in Word’s dictionary,
nt
(3) Platform (4) Screen saver a_______ colored underline Appears below the
26. Computer language used on the Internet is— word.
(1) BASIC (2) COBOL (1) red (2) green (3) blue (4) black
oi
(3) Java (4) Pascal 39. The_____button on the quick access Toolbar
27. You click at B to make the selected text into— allows you to cancel your Recent commands or
(1) Italics (2) Underlined actions.
P
(3) Italics and Underlined (4) Bold (1) Search (2) Cut
28. A disk’s content that is recorded at the time of (3) Document (4) Undo
manufacture and that cannot be Changed or 40. In Excel any set of characters containing a
ng
pa
(1) Formatting (2) Merging
(3) Embedding (4) Splitting into which code?
(5) None of these (1) ASCII Code (2) ANSI Code
03. Computers that control, processes, accept data (3) Binary Code (4) Machine Code
a
in a continuous loop 14. Which of the following are modifier keys ?
(1) Data highway (2) Data traffic pattern (1) Alt+Ctrl+Del (2) Alt+Ctrl+Shift
ad
(3) infinite loop (4) waiting loop (3) Alt+Ctrl+Space (4) Alt+Shift+Del
04. The speed of which of the following memory 15. In MICR Code , the first 3 digits of code
chip is faster? represents which of the below?
(1) DRAM (1) City code (2) Bank Code
(2) SRAM
(3) Both are same speed
(4) None of these
:K (3) Branch code (4) Machine Code
16. Which of the following are NON IMPACT
Printers ?
05. Instead of remembering email address which (1) Dot matrix (2) Daisy wheel
of following should you use? (3) Band printer (4) None of these
(1) Address Book (2) Name list 17. Plotter is a ..............
nt
(3) email list (4) None of these (1) Printing device (2) Output Device
06. Identify the fastest memory from below given? (3) Both (1) & (2) (4) Input Device Only
(1) RAM (2) Hard disk 18. Processors or Made of which metal?
oi
(3) Cache Memory (4) Virtual Memory (1) Lithium (2) Mercury
07. The free program available in internet for repaired (3) Silicon (4) Iron
software or application ? 19. Which of the following is the fastest RAM?
P
09. In ——topology ,n1 lines are required for 21. Which of the following RAM formats available
connecting n nodes in Market?
(1) Ring (2) bus (1) SIMM (2) DIMM
r
(3) Star (4) Tree (3) Both (1) & (2) (4) None of these
10. what is the default left margin of ms excel 22. What is the memory allocation size of 3.5 inch
Tu
pa
(1) RAM (2) ROM msppt ?
(3) BIOS (4) CMOS (1) Ctrl+N (2) Ctrl+S
27. The trial version softwares that can be shared (3) Ctrl+M (4) Ctrl+D
a
are : 39. Which is the function key for Slideshow?
(1) Commercial (2) Open source (1) F4 (2) F5
ad
(3) Shareware (4) None of these (3) F6 (4) F7
28. Which of the language developed by IBM in 1957 40. A symbol or question on the screen that prompts
for Scientific Research? you to take an action and tell Computer what to
(1) PASCAL (2) COBOL do next is ?
29.
(3) FORTRAN (4) JAVA
Which of the following is not a Operating
System?
:K (1) Interrupt
(3) Dialogue
(2) Prompt
(4) Request
which menu?
(1) Edit (2) Format
(3) Styles (4) Size
34. In ms word ,to get the rulers which view is to be
r
selected?
Tu
pa
(1) AZ (2) IZ (1) Router (2) HUB
(3) IV (4) IF (3) Bridge (4) Modem
03. Which of the following is example for mixed 16. which of the following is most expensive for
referencing?
a
construction?
(1) $2$C (2) $C2 (1) BUS Lan (2) Ring LAN
(3) $2C (4) C2
ad
(3) Mesh LAN (4) Star Lan
04. To goto a specific cell in the worksheet ,whats 17. Tokens are issued among the nodes in which
the required function key? Topology for Data transmission/
(1) F5 (2) F7 (1) Ring (2) BUS
05.
(3) F9 (4) F11
The process of combining 2 cells into a single
cell is called?
(1) Sorting (2) Adding
:K
18.
(3) Mesh (4) Tree
The best way of connecting systems for easy
fault diagnosis and simple onstruction of LAN ?
(1) BUS (2) RING
(3) Merging (4) Digging (3) STAR (4) MESH
06. The current cell content in worksheet is visible 19. Cable TV connection is example for which type
nt
in which bar/ of network/
(1) Formula bar (2) Status bar (1) WAN (2) LAN
(3) Title bar (4) Menu bar (3) MAN (4) WLAN
07. Array is a
oi
11. To format a number in data format,press 24. Half Duplex Data Transmission is
(1) Ctrl+Shift+@ (2) Ctrl+Shift+# (1) One way communication
(3) Ctrl+Shift+% (4) Ctrl+Shift+$ (2) Two way communication, at a time
12. Which register holds the data to be operated upon (3) Two way communication , one by one
and result of processing/ (4) None of these
(1) Accumulator (2) Program counter
(3) Instruction (4) None of these
94 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
25. The device which maintains same strength signals 36. Which of the following is not a domain name?
at both sender and receiver side? (1) EDU (2) GOV
(1) MODEM (2) BUS (3) IN (4) NET
(3) Repeater (4) Router (5) None of these
26. Which are the network devices used in 37. Which of following services are provided by
Broadband connection? INTERNET ?
(1) Router (2) Modem (1) Email (2) Chat
(3) Repeater (4) Bridge (3) Video chat (4) Live chat
pa
27. ARPANET was introduced in which year? (5) All of these
(1) 1949 (2) 1959 38. Email message sare encoded into which code
(3) 1969 (4) 1979 while sending?
28. Which layer of OSI model performs Encryption (1) ANSI (2) ASCII
a
and Decryption? (3) ANSCI (4) ANSII
(1) Network layer (2) Session layer 39. The process of authentication to internet
ad
(3) Presentation layer (4) None of these connection is
29. Which layer of OSI model divide data into (1) Sign in (2) LOGIN
Packets and segments? (3) Connect in (4) Account creation
(1) Network layer (2) Session layer (5) None of these
30.
(3) Presentation Layer (4) None of these
Which is the first layer of OSI model?
(1) Application layer (2) Physical layer
:K
40. Which of the 2 fields are automatically created
by server for gmail user/
(1) Subject and date
(3) Network layer (4) No layer (2) Body and from address
31. The property cursor changing into hand symbol (3) From address and time
when placed on few keywords ,because keyword (4) Time and receiver address
nt
is (5) None of these
(1) Hypertext (2) Networklink
(3) Hyperlink (4) Blog Answers
oi
mobile devices?
(1) HTTP (2) WAP
(3) TCP (4) MAP
pa
(1) Trash (2) Mail box (1) Square (2) Rectangle
(3) Sent items (4) Hard disc (3) Rhombus (4) Arrow
03. Online shopping both selling and buying refered 16. The code which is provided by website to prevent
to
a
form security threat and
(1) MCommerce (2) ECommerce recognisation of humans on system—
(3) Both A&B (4) FCommerce
ad
(1) Relay code (2) captcha code
04. Which type of virus reside in booting devices ? (3) Secure code (4) Almani code
(1) Worm (2) Trojan horse 17. CRAY1 belongs to ___ generation
(3) Boot sector virus (4) None of these (1) 1ST (2) 2ND (3) 3RD
05.
06.
The harmfull virus that is a written program is
(1) Worm
(3) Logic bomb
(2) Trojan horse
(4) None of these
Which virus spreads in application programs or
:K
18.
(4) 4 TH
(5) 5TH
(5) Installation
(1) Ethernet (2) Intranet 21. Office LANs that are spread geographically
(3) TELNET (4) Dialnet apart on a large scale can be connected using a
11. Which technology used to detect the animals corporate _____
r
pa
(1) Tables, paragraphs and indexes (3) DVD (4) ROM
(2) Paragraphs, indexes and sections 34. A word in a web page that, when clicked, opens
(3) Characters, sections and paragraphs another document is called—
a
(4) Indexes, characters and tables (1) Anchor (2) Hyperlink
25. ......... are words that a programming language (3) Reference (4) URL
ad
has set aside for its own use. (5) None of these
(1) Control Words (2) Reserved words 35. The most important or powerful computer in a
(3) Reserved keys (4) Control structures typical network—
(5) None of these (1) desktop (2) network client
26. Connections to the Internet using a phone line and
a modem are called.........connections.
(1) Digital (2) Dialup
:K
36.
(3) network server
(5) None of these
(4) network station
(1) Web browser (2) PDA (4) Only (1) and (2)
(3) Website (4) Link 38. A collection of related files is called a—
29. Every component of your computer is either— (1) character (2) field
(1) Hardware or software
ng
30. To make the number pad act as directional (3) Running (4) Debugging
arrows, you press the.........key. (5) None of these
(1) Numlock (2) Caps lock 40. A ... contains specific rules and words that
(3) Arrow lock (4) Shift
r
pa
29) 1 30) 1 31) 3 32) 1 (4) extranet
33) 2 34) 2 35) 3 36) 2 08. A store that combines online and physical
presence is called?
37) 2 38) 3 39) 2 40) 3
a
(1) ECommerce (2) MCommerce
(3) Window shopping (4) None of these
Test - 11
ad
09. Which of the following is used to search
information on www?
01. To move to the beginning of a line of text, press (1) web server (2) web site
the ... key. (3) Search engine (4) file search
(1) home
(3) pageup
(5) None of these
(2) a
(4) enter
:K
10. which of the following key is not available on
keyboard of laptop?
(1) shift (2) Alt
02. ................is when the more powerhungry (3) turn (4)enter
components, such as the monitor and the hard (5) insert
drive, are put in idle. 11. Afirewall is a
nt
(1) Hibernation (1) software (2)Hardware
(2) Power down (3)Virus program (4) Both (1) & (2)
(3) Standby mode 12. Which of the following are windows products?
oi
shortcuts and special tasks. 13. Are all open source software comes for free of
(1) Control, Alt cost ?
(2) Function, toggle (1) yes (2) NO
(3) Delete, Insert
ng
(3) few come for free (4) All come for free
(4) Caps Lock, Num Lock 14. CAD full form is
04. To save an existing file with a new name or to a (1) Computer algorithm for design
new location, you use the...... command. (2) Computer application in design
ni
(1) Save (2) Save and Replace (3) Computer aided design
(3) Save As (4) New File (4) All of these
(5) None of these 15. Who is the father of apple computers?
05. In a database............fields store numbers used
r
(1) next (2) key 16. Who is responsible for “traffic directing” on
(3) alphanumeric (4) numeric internet ?
(5) None of these (1) Hub (2) Repeater
06. Computers gather data, which means that they (3) Router (4) Switch
allow users to..................data.
pa
19. Which of the following is default drawing 1) Retype the document and give it a different
program in windows? name
(1) photoshop (2) mspaint 2) Use the Save as command
3) Copy it to a new folder and then save
a
(3) Mpeg (4) all of these
20. Convert decimal 16 into hexadecimal value? 4) Use Windows Explorer to save
5) None of these
ad
(1) 12 (2 )10
(3) 16 (4) 8 28. Which of the following is a graphics package?
(5) Can not be found 1) Adobe page maker
21. The _______of a system includes the 2) Acrobat Reader
3) Microsoft word
program or instructions.
1) Hardware
3) Information
2) Icon
4) Software
:K
29.
4) Corel Draw
5) None of these
Plotter is very useful in applications such as?
5) None of these
22. In order to save a word document as a web 1) Computer aided design
page you need to_______ 2) Word processing
3) Financial accounting
nt
1) Put the appropriate graphic and links on the
document 4) Spell checking
2) Save the document in the simple text format 5) None of these
30. Data processing cycle consists of _______?
oi
5) None of these
23. Something which is easily understood 4) Only input
instructions is said to be_______ 5) None of these
1) User friendly 2) Information 31. ‘MICR’ technology used for clearance of
ng
the following?
1) The desktop 2) The clipboard 4) Magnetic Cable Recognition
3) Microsoft word 4) Paste 5) None of these
5) None of these 32. All the information collected during database
r
as_______
1) Classifying 2) Searching 3) RAD 4) CASE
3) Sorting 4) Reproducing 5) None of these
5) None of these
pa
25) 3 26) 4 27) 2 28) 4
3) Paper Clip 4) Pen
5) None of these
29) 1 30) 3 31) 1 32) 2
35. To Recover files from a backup you 33) 1 34) 3 35) 4 36) 5
37) 2 38) 1 39) 4 40) 1
a
perform_______ option
l) Scan 2) Move 3) Copy
ad
4) Restore 5) None of these Test - 12
36. The internet began with the development of 01. To open a new file in MS Word, the shortcut key
1) Ethernet 2) Internet is
3) USENET 4) Extranet (1) Ctrl + X (2) Ctrl + N (3) Ctrl + Y
37.
5) ARPANET
Select the odd man out
1) Interpreter 2) Programmer
:K
02.
(4) Ctrl + V (5) None of these
Which extension is given to Word document by
default?
3) Operating system 4) Assembler (1) .ext (2) .com (3) .doc
5) Utility (4) None of these (5) All of these
38. The number of pixels displayed on a screen is 03. Mark the most appropriate option statement.
nt
known as the screen_______? (1) Mail Merge can be used to print the form
1) Resolution 2) Color depth letters
3) Refresh rate 4) Viewing size (2) Mail Merge can be used to print the form
oi
pa
(1) any text printed at the top of every page (4) All of the above
(2) any graphics printed at the top of every (5) Both ‘2’ and ‘3’
page 18. You can use the following objects created in MS
a
(3) any text or graphics printed at the top of a Word in a web page
particular page (1) autoshapes (2) bullets
ad
(4) any text or graphics printed at the top of every (3) tables and charts (4) All of these
page (5) None of these
(5) None of the above 19. Blinking point which shows your position in the
09. This case converts first character of first word of text is called
selected sentence to capital
(1) sentence (2) upper
(4) title (5) None of these
(3) toggle
:K
20.
(1) Cursor
(4) Status
(2) Blinker
(5) Place
Spacebar is used for
(3) Position
10. Which of the following is not an option of edit (1) giving space (2) deleting space
menu? (3) moving next line (4) All of these
(1) Cut (2) Copy (3) Paste (5) None of these
nt
(4) Page setup (5) None of these 21. You can start Microsoft Word by using which
11. Which of the following will you use as an option button?
for saving a file ? (1) New (2) Start (3) Program
oi
(1) Save button on Standard toolbar (4) All of these (5) None of these
(2) Save option from File menu 22. It is a software tool that lets one to enter,
(3) Pressing Ctrl + S calculate, manipulate set of numbers
P
(4) All of the above (1) speed sheet (2) spread sheet
(5) None of the above (3) slide sheet (4) All of these
12. A file name cannot contain in MSWord database (5) None of these
file
ng
(1) Ctrl + A (2) Ctrl + S (3) Ctrl + W (1) formulas (2) functions (3) logic
(4) Ctrl + X (5) Ctrl + Alt (4) All of these (5) None of these
15. ‘Replace’ option is available in 26. To select the current row press
(1) Edit menu (2) File menu (3) Tools menu (1) Shift + Enter (2) Shift + Spacebar
(4) Insert menu (5) None of these (3) Ctrl + Spacebar (4) Ctrl + C
(5) Ctrl + B
101 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
27. To select the current column press 39. Cell address $A$4 in a formula means it is a
(1) Ctrl + Spacebar (2) Ctrl + B (1) mixed cell reference
(3) Shift + Enter (4) Ctrl + Enter (2) absolute cell reference
(5) Ctrl + Shift (3) relative cell reference
28. To select the entire worksheet (4) All of the above
(1) Ctrl + B (2) Ctrl + V (3) Ctrl + A (5) None of the above
(4) Ctrl + C (5) Ctrl + X 40. Cell address $A4 in a formula means it is a
29. The Extension of saved file in MSExcel (1) mixed cell reference
(2) absolute cell reference
pa
(1) .XIS (2) .XAS (3) .XLS
(4) .XLL (5) .LXS (3) relative cell reference
30. All formula start with, which sign in MSExcel? (4) All of the above
(1) + (2) (3) @ (5) None of the above
a
(4) = (5) = =
31. For creating an absolute cell reference, which Answers
ad
sign is used? 1) 2 2) 3 3) 4 4) 3
(1) $ (2) @ (3) #
(4) ! (5) None of these
5) 4 6) 1 7) 3 8) 4
32. A cell entry can be edited in the cell or in the 9) 1 10) 4 11) 4 12) 4
(1) menu bar
(3) function bar
(5) None of these
(2) edit menu
(4) formula bar
:K 13) 2
17) 4
21) 2
14) 1
18) 5
22) 2
15) 1
19) 1
23) 1
16) 3
20) 1
24) 3
33. In this chart, only one data series can be plotted 25) 3 26) 2 27) 1 28) 3
(1) pie (2) line (3) bar 29) 3 30) 4 31) 1 32) 4
(4) column (5) None of these 33) 1 34) 2 35) 3 36) 3
nt
34. A chart placed in a worksheet is called
37) 2 38) 3 39) 2 40) 1
(1) formatting chart (2) embedded chart
(3) aligning chart (4) hanging chart
oi
pa
02. The symbols used in an assembly language are 3) megabits per seconds
1) Codes 2) Mnemonics 4) minimum and maximum server speed
3) Assembler 4) Literals 5) data capacity
5) All of the above 11. The terms “ red book”, “ yellow book”, and
a
03. Portrait and Landscape are “orange book” refer to :
1) Page Orientation 1) SCSI 2) IDE
ad
2) Paper Size 3) Floppy drive technology
3) Page Layout 4) CDROM standards
4) Margin type 5) SATA
5) All of the above 12. In ROM BIOS, the acronym BIOS stands for :
04. Any storage device added to a computer
beyond the immediately usable main storage is
known as
:K 1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
1) Floppy disk 2) Hard disk 4) Basic Industry Operating System
3) Backing store 4) Punched card 13. Which DOS command will format a floppy
disk and transfer the system files
nt
5) Magnetic Tape
5. Which output device is used for translating 1) SYSC : A : 2) SYS A :
information from a computer into pictorial form 3) FORMAT A : /S
on paper 4) FORMAT A : /T 5) SYS C:
oi
3) Random 4) ISAM
5) VSAM 4) Sorting
8. Find the ODD one. 5) Indexing
1) JAVA 2) Cobol 3) Fortran
4) Linux 5) ADA
pa
1) File, add a new slide 2) Insert, new slide 5) None of the above
3) File, open 4) File, new 27. Which of the following registers is used to keep
5) None of the above track of address of the memory location where
a
19. Which of the following items are examples of the next instruction is located ?
storage devices ? 1) Memory address register
ad
1) Floppy disks 2) CDROMs 2) Memory data register
3) Tape devices 4) Hard Disk 3) Instruction register
5) All of the above 4) Program counter
20. The original ASCII code used ... bits of each 5) Flag Register
byte, reserving that last bit for error checking
1) 5
4) 8
2) 6
5) 16
3) 7
:K
28. Which American Computer Company is called
Big Blue ?
1) Microsoft 2) Compaq Corp
21. Word length of a computer is measured in 3) IBM 4) Tandy Stevenson
1) Bytes 2) Millimeters 5) DELL
3) Meters 4) Bits 29. A term associated with the comparison of
nt
5) All the above processing speeds of different computer
22. Which type of computers uses the 8bit code system is:
called EBCDIC ? 1) EFTS 2) MPG 3) MIPS
oi
serial form
3) Ab address 5) Data naturally needs to flow in and out in a
Tu
pa
3) justified 4) centered 8) 4 19) 5 30) 2
5) None of the above 9) 2 20) 3 31) 4
35. Most Web sites have a main page known as 10) 3 21) 4 32) 3
11) 4 22) 3 33) 1
a
which acts as a doorway to the rest of the
Website pages.
ad
1) search engine 2) home page
3) browser 4) URL Test - 14
5) Domain 01. Memory, also called Random Access Memory,
36. A software program that extends the or RAM
capabilities of your browser in a specific way
is known as
1) Plugin
:K 1) contains the electronic circuit that cause
processing to occur.
2) makes the information resulting from
2) Browser software processing available for use
3) Cookies 3) allows data, program, commands, and user
4) Applets responses to be entered into a computer
nt
5) None of the above 4) consist of electronic components that store
37. Internet is example of data
1) LAN 2) MAN 3) WAN 5) None of these
oi
pa
4) monitor 5) None of these 18. Easy to use means .......
8. Which key combination is used for special tasks? 1) user friendly 2) select
1) Insert, Delete 2) Ctrl, Shift 3) helpful 4) everready
3) Left Arrow, Right Arrow 19. When your computer stops working suddenly it
a
4) Page up, Page Down 5) None of these is referred to as a .....
9. Which is the part of a computer that one can 1) crash 2) die 3) death
ad
touch and feel? 4) penality 5) None of these
1) Programs 2) Software 3) Hardware 20. The smallest item of useful in information a
4) Output 5) None of these computer can handle .........
10. A store that combines online and physical 1) bite 2) byte 3) bit
presence is called a(n)store.
1) brickandmortar 2) clickandmortar
3) combination 4) ecommerce
:K
21.
4) belt 5) None of these
Device that let the computer communicate with
you .........
5) M commerce 1) input 2) output 3) type
11. The main processing unit of computer is known 4) print 5) None of these
as 22. Device that allows you to put information into
nt
1) CDrun on memory the computer ....
2) Central Processing Unit 1) input 2) output 3) type
3) Call powers Up 4) print 5) None of these
oi
13. Which key has to be used to type all letters capital 1) output 2) character 3) type
without using the shift key for each character ... 4) print 5) None of these
1) shifter 2) upper case 25. A symbol or question on the screen that prompts
3) caps lock key 4) Icon you to take an action and tell the computer what
ni
pa
4) boot 5) None of these on into the hard drive, or onto a disk ?
30 .......... is start or restart the computer. 1) view 2) hold 3) save
1) exit 2) kick 3) boot 4) go 5) None of these
a
4) kickstart 5) None of these
31. A blinking indicator that shows you where your
Answers
ad
next action will happen is...........
1) CPU 2) cursor 3) tool bar 1) 4 11) 2 21) 2 31) 2
4) boot 5) None of these 2) 1 12) 2 22) 1 32) 1
32. Commands at the top of a screen such FILE 3) 4 13) 3 23) 1 33) 4
EDITFONTTOOLS to operate and change
things within programs is........
1) menu bar 2) tool bar
:K
4) 2 14) 4
5) 1 15) 4
6) 4 16) 2
24) 2
25) 3
26) 1
34) 2
35) 2
36) 1
3) user friendly 4) word processor 7) 3 17) 4 27) 3 37) 2
5) None of these 8) 2 18) 1 28) 3 38) 2
33. CDROM stands for .........
9) 3 19) 1 29) 3 39) 1
nt
1) Central processing unit
2) CDremote open mouse 10) 5 20) 3 30) 3 40) 3
3) CD resizer or minimize
oi
screen
1) edit 2) delete key 3) dummy out
4) trust key 5) None of these
ni
pa
hardware and software. 4) palm 5) cursor
1) computer scientist 11. The_______ becomes of different shapes,
2) computer sales representative depending on the task you perform.
3) computer consultant
a
1) active tab 2) insertion point
4) corporate trainer 3) mouse pointer 4) ribbon
5) None of these
ad
5) None of these
03. _______function displays, row data in a column 12. By default, Excel positions a text in a cell
or column data in a row. 1) leftaligned 2) rightal igned
1) Index 2) Rows 3) Hyperlink 3) centered 4) justified
4) Transpose 5) Columns
04. PARAM is an example of a
1) Super computer
3) Laptop
2) PC
4) PDA
:K 5) None of these
13. Compiling creates a(n)
1) program specification 2) algorithm
3) executable program 4) subroutine
5) None of these 5) None of these
05. Which keys can be used together with other keys 14. A character of information is represented by a(n)
nt
for special tasks? l) byte 2) bit 3) field
1) Insert, Delete 4) attribute 5) None of these
2) Ctrl, Shift 15. One advantage of dialup Internet access is
3) Left Arrow, Right Arrow
oi
pa
symmetrickey cryptography_______ symmetric 5) None of these
keys are needed. 30. In which of the following was artificial
1) 190 2) 200 3) 20 intelligence introduced?
a
4) 19 5) 210 1) First generation 2) Second generation
21. Rules of a programming language are called 3) Third generation 4) Fourth generation
ad
1) procedures 2) calls 3) methods 5) Fifth generation
4) login 5) syntax 31. Which network architecture is defined in IEEE
22. A primary key can also be called a_______. 802.3 standard?
1) super key 2) candidate key 1) Token ring 2) FDDI
23.
3) alternate key 4) secondary key
5) foreign key
IEEE _______ is the standard of token bus.
:K 3) Fiber
5) None of these
32. PDA stands for
4) Ethernet
4) Recycle Bin
27. Zone information protocol is used for 5) None of these
Tu
1) copying file 2) deleting file 36. A multipurpose window which opens nearly for
3) editing file 4) pasting file everything is called
5) None of these 1) Main desktop 2) Explorer Window
3) Browser Window 4) Error Window
5) None of these
pa
computer is called?
_______ concept(s).
1. Delay time 2. Real time
1) online secondary storage
3. Execution time 4. Down time
2) swapping
8. _______is capable of operating at electronic
a
3) demand paging
speed.
4) None of these
1. magnetic disk 2. Semiconductor memory
ad
5) All of the above
3. Magnetic drum 4. Magnetic tape
40. Font size is measured in
9. _____ refers to the degree to which data in a
1) numbers 2) digits 3) dots
database system are accurate and correct?
4) points 5) decimals 1. data security 2. Data integrity
Answers
:K
10.
3. Data reducity 4. Data validity
which key launches the start button?
1. windows 2. Shift
1) 3 11) 3 21) 5 31) 4 3. Shortcut 4. Esc
2) 2 12) 1 22) 2 32) 2 11. extension of .bmp is used by?
3) 4 13) 3 23) 2 33) 2 1. msexcel 2.msppt
nt
1. memory 2.reports
7) 2 17) 2 27) 5 37) 2
3.data 4. Information
8) 1 18) 1 28) 4 38) 2 13. the collection of computer files that can be
P
pa
3. Only 7 4. As many as memory can hold 32. The RDBMS technology for a row is called?
20. assembly language is a division of? 1. degree 2. Attribute
1. middle level 2. High level 3 . relation 4. Tuple
3. Low level 4. All of these
a
33. Dijkstra’s bankar’s algorithm is a_________?
21. In ER diagram line is used to show? 1. cache
1. relationship 2. Connection
ad
2. Deadlock avoidance
3. To start 4. Process 3. Deadlock recovery
22. when integrating MSWord and Excel , word is 4. Exclusion
usually acts as? 34. which of the following SMPS shutsdown
1. server 2. Base
3. Client 4. All of these
23. A language based on graphics for use in education
is called?
:K automatically?
1. AT
3.ATX
2.ATY
4.none of these
35. The most dangerous risk involved in leaking of
1. PROLOG 2. LOGO information is ?
3. COBOL 4. PASCAL 1. access to online terminals
nt
24. Borders can be applied to ? 2. Online processing of data
1. paragraph 2. Text 3. ignorance about existence of risk
3. Cell 4. All of these 4. All of these
25. ________ is used to produce graphic outputs.
oi
1. plugins 2. Cookies
27. The data in RDBMS is stored in database objects 3. Scripts 4. ASP’s
called? 38. The distance between text boundaries and page
1. directory 2. Tables margins is called?
3. Records 4. Fields
ni
1. tab 2. Margin
28. The operating system that allows different parts 3. Indent 4. Space
of a software program to run concurrently? 39. In 802.4 token bus _______ cable is used.
1. multi tasking 2. Multi threading
r
1. TP 2. Coaxial
3. Multi user 4. All of these 3. Fibre 4. All of these
Tu
29. The engineer ing discipline that involves 40. which technology used to protect ECommerce
construction of computing devices of the size of page?
molecule is called? 1. HTTP 2. HTML
1. molecular process 3. ETP 4.SSL
2. Nanoscience
3. Nanotechnology
4. All of these
111 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
KEY 10. _________ is the term that describes a user’s
1 2 3 4 5 6 7 8 9 10 participation with a multimedia presentation.
4 4 2 2 1 4 3 2 4 1 1. Hyperactivity 2. Interactivity
11 12 13 14 15 16 17 18 19 20 3. Inactivity 4. Reactivity
4 3 2 1 4 2 3 2 4 3 11. which of the following operations is not performed
21 22 23 24 25 26 27 28 29 30 by a computer?
1 3 2 4 2 1 2 2 3 2 1. inputing 2. Controlling
31 32 33 34 35 36 37 38 39 40 3. Understanding 4. All of these
1 4 2 3 3 1 2 3 2 4 12. The time taken by CPU to retrieve and interpret
pa
the the instructions to be executed is called?
TEST-17 1. fetch cycle 2. Code cycle
1. When your computer suddenly stops working , it 3. Develop cycle 4. Instruction cycle
a
is called? 13. A_____ is not a form of biometrics.
1. crash 2. Die 1.fingerprint 2. Retina scan
ad
3. Death 4. Penalty 3. Breath scan 4. Password
2. The UNIX operating system typically used in? 14. _______ technology is typically used by intranet
1. Desktops 2. Web servers and extranet.
3. Laptops 4. Super computers 1. protocol 2. Paradigm
3. The ____ enables you to simultaneously keep
multiple web pages open in single browser
Window .
:K 3. Internet 4. Ethernet
15. A thing present in real world in physical form is
called?
1.tab box 2. Pop helper 1. DBMS 2. Entity
3. Tab row 4. Address bar 3. Module 4. All of these
4. Smart card is a? 16. Who invented PHP?
nt
1. special purpose card 1. rasmus lerdorf 2. Charless babage
2. Process unit for software handling 3. Dennis ritchew4. James gosling
3. money card 17. When we want draw a perfect shape____
oi
3.keyboard 4. All of these 18. Which of the following might prevent a program
6. Arrange the order of cables according to from being modified in future?
increasing order of speeds : twisted pair(T), co 1. pseudocode
ng
8. A person who enjoys using computer is called a? 20. An email address consists of ?
1. hacker 2.user friendly 1. domain name followed by user name
Tu
pa
3. PC 2. Vector images
4.PDA 3. Text
24. A set of rules that a computer on a network uses 4. none of these
a
to communicate with each other is called? 35. which protocol is used by the operating system
1. protocol 2. Ruler to generate error messages like “host
ad
3. King 4. None of these Unavailable” over a TCP/IP network?
25. computers send data to peripherals with the help 1. HTTP/0.1 2. ICMP
of ? 3. PPP 4. ICGM
1. parallel I/O interface 2. Modem 36. The memory which forgets everything when you
26.
3. Serial I/O interface
Microsoft Office is a
1. shareware
4. All of these :K switch off the power is known as
1. corrupt
3. Volatile
2.non volatile
4. Random access
2. Application suite 37. _______ is the measurement of things such as
3. Open source software fingerprints and retinal scans used for security
4 all of these access.
nt
27. what do you press to enter the current DATE in 1. Biomeasurement 2. Security
a cell? 3. Reasonality 4. Biometrics
1. ctrl+: (colon) 2. Ctrl+date 38. AMD manufactures which of the following?
oi
2. Floppy disk 11 12 13 14 15 16 17 18 19 20
Tu
3. CDROM’S 3 4 4 3 2 1 1 2 3 4
4. Hard disk 21 22 23 24 25 26 27 28 29 30
32. A hard drive consists of spinning_____ madeup 4 3 2 1 1 2 3 4 1 2
of aluminium or ceramic that is coated with 31 32 33 34 35 36 37 38 39 40
magnetic media. 3 4 4 1 2 3 4 3 2 1
pa
3. A print program keeps track of every _______
1. 2 2. 3
placed on the screen.
3. 4 4. 1
1. image 2. Object
15. Integrated Service Digital Network(ISDN) lines
3. Pixel 4. Paper
a
provide
4. The stack pointer in 8085 microprocessor is a
1. voice circuits 2. Data circuits
1. 16 bit accumulator
ad
3. Both of these 4. None of these
2. Memory location on stock
16. Technologies like PCS, TDMA, CDMA and
3. any of 1 and 2
GSM are associated with
4. 16bit register that points t stock memory
1. Monitor 2. Printers
location
5. The human readable version of a program is
called____
1. source code 2. Program code
:K 3. Mobile phones 4. None of these
17. ______ is a primary key of one file that also
appears in another file.
1. primary key 2. Foreign key
3. Human code 4. All of these
3. Private key 4. All of these
6. ________is called as the core of UNIX
18. Firewalls are used to protect against
operating system .
nt
1. authorized access
1. utility 2. Kernel
2. Unauthorized access
3. Device 4. Shell
3. Virus
7. In EXCEL, template is a
oi
4. Antivirus
1. title 2. Heading
19. To access a mainframe or supercomputer, users
3. Pattern 4. None of these
often use a
8. A person who writes a program for running the
P
1. node 2. Desktop
hardware of a computer is called
3.DTP 4. Terminal
1. system analyst 2. Data processor
20. Collecting personal information by effectively
3. Designer 4. Programmer
ng
3. View 4. File
can set for a drop cap?
22. ______contains data in oracle database.
1. 3 2. 10
Tu
1. extents 2. Datablocks
3. 5 4. 15
3. Tables 4. Segments
11. Which of the following do multimedia PC’s
23. To run desktop OS and applications inside virtual
contain?
machine _______is used.
1.scanner 2. Lan card
1. VGA 2. DVI
3. Sound card 4. None of these
3. VDI 4.VGS
114 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
24. which of the following is a low level language? 36. Which of the following is not an option under
1. BASIC 2. ALGOL change case of text in WORD?
3. COBOL 4. All of these 1. Indent case 2. Toggle case
25. Assembly instructions are in the form of 3. Upper case 4. Sentence case
1. binary 2. Digital 37. WAV,WMA, and AIFF are examples of which
3. English 4. None of these file format ?
26. To indicate an decision point in a program, an 1. audio 2. Video
_____ symbol is used. 3. Text 4. All of these
1. circle 2. Rectangle 38. What is the name of logic circuit which can add
pa
3. Diamond 4. Ellipse more than 2 binary digits ?
27. Thesaurus option in WORD2007 , is available 1. half adder 2. Full adder
at which menu? 3. Parallel adder 4. Serial adder
a
1. page layout 2. Review 39. The system unit of PC typically contains all of
3. File 4. Edit following except?
ad
28. Turnoff dialog box does not contain _____ option. 1. microprocessor 2. Disk controller
1. switch user 2. Standby 3. Modem 4. Serial interface
3. Restart 4. Turnoff 40. The view that shows maximum amount of
29. To handle “lost” and “ out of sequence” packet, information about each file in My Computer is
which layer is responsible?
1. transport layer 2. Network layer
3. Session layer 4. Physical layer
:K
KEY
1. small icons
3. Big icons
2. Medium icons
4. Details
2. Trojan TEST-19
3. Polymorphic virus 1.Error messages in EXCEL sheet start with _____
4. Antispyware symbol.
32. The equipment which holds the screen of a
ng
1. @ 2. $
computer is_____ 3.= 4.#
1. modem 2. Printer 2. Video processor consists of____ and____ ,
3. Mouse 4. Monitor which store and process images.
ni
4. All of these
of elements is known as_____ 3. FAX is an example of _______ channel.
Tu
pa
3. Computer forensics 4. Animation 4. High level and low level
7. ____ server stores and manages files for network 18. The integrated circuits are made of which metal?
users. 1. Al 2. Mg
a
1. main 2. File 3.Si 4. All of these
3. Web 4. Attached 19. URL has how many parts in it?
ad
8. Database that spreads information across 1. many 2. One
different tables while maintaining links between 3. Two 4. Three
them referred as 20. All windows settings are stored in which file?
1. Relational Database 1. Win.INI 2.Windows.INI
2.Rotational database
3. Both of these
4. None of these
:K 3. Windows.set 4. None of these
21. CPU can directly understood which language?
1.C 2. C++
9. Custom software, developed to address the 3.JAVA 4.Assembly Language
specific needs of a company, is known as____ 22. Alternate key is considered as a part of _____
Software. key.
nt
1.proprietary 2. Custom 1. Primary 2. Foreign
3. Relation 4. Copyrighted 3. Candidate 4. Composite
10. Clicking special areas called_____ activates 23. Compression and decompression of message data
oi
11. The creation of storyboard is essential to the 24. ______ is the language used to write animation
development of the project. This is___ step of for WWW.
Development. 1. Java 2. C
1.designing 2. Creating
ng
3. C++ 4. COBOL
3. Planning 4. Coding 25. The database schema is written in which
12. Who is the founder of ORACLE corporation? commands?
1. Bill gates 2. Dennis ritchew 1. DDL 2. DML
ni
1. F4 2.F6
14. What is the name of an application program that 3.F8 4.F10
Tu
gathers user information and sends it to 27. In ____ topology each node os having direct link
someone through internet. with remaining all nodes in network?
1. Virus 2. Bomb 1. Bus 2. Star
3. Spybot 4. Malware 3. Mesh 4. Ring
15. Which of the following is example of
telecommunication device?
116 YouTube Classes Subscribe TP Studies // 868 80 80 80 2 // Website www.tpstudies.in
Turning Point Coaching Center : SSC / BANKS / S.I. / P.C / DSC/Groups
28. _____ is a method of storing data on two or more 40. 8085 microprocessor is an example of _____bit
hard drives that work in combination to do processor.
The job for larger drive. 1. 32 2. 16
1. DAID 2. Casting 3. 12 4. 8
3. Merging 4. RAID KEY
29. A Robot consists of 3 basic components :Power 1 2 3 4 5 6 7 8 9 10
Supply, Memory and? 4 3 2 1 4 3 2 1 1 2
1. Arms 2. Software 11 12 13 14 15 16 17 18 19 20
3. Cable 4. None of these 3 4 4 3 2 1 2 3 4 1
pa
30. Dvorak is used with reference to 21 22 23 24 25 26 27 28 29 30
1. mouse 2. Keyboard 4 3 2 1 1 2 3 4 1 2
3. Printer 4. Scanner 31 32 33 34 35 36 37 38 39 40
a
31. The simplest and commonly used error detection 3 4 4 3 2 1 1 2 3 4
code is called ?
ad
1. hamming bit 2. Odd bit TEST-20
3. Parity bit 4. None of these 1. Which of the following program is no a popular
32. Housing all hardware, software, storage and DTP program?
processing in one location is called? 1. Adobe page maker
1. time sharing 2. Data sharing
3. Frame design 4. Centralized processing
33. The process of getting access to the computer is
:K 2. MS Publisher
3.QuarkXPress
4. Lotus AmiPro
called? 2. AVERAGE is an example for
1. sign in 2. Enter 1. formula 2. Field
3. Log off 4. Log in 3. Table 4. Function
nt
34. _____ are used to Add some new features from 3. ____ are specially designed computer chips that
internet to an allready installed application reside inside other devices such as car or
1. plug ins 2. Flash Electronic thermostat.
oi
activities.
1. volatile 2. Garbage 1. memory 2. Operating System
Tu
pa
3.3lines 4.4 lines 3. FORTRAN 4. BASIC
11. In Database, the collection information is entered 24. ________file is created in Microsoft Excel.
in which place? 1. Data 2. Program
a
1. table 2. Field 3. Folder 4. Local
3. Tuple 4. None of these 25. Which of the following is an example of Toggle
ad
12. A picture, map or graphics or image that can be Keys?
used in a document is called as? 1. Scroll lock 2. Del key
1. object 2. Clip 3. Page up key 4. None of these
3. Clipboard 4. None of these 26. Which type of memory is in pendrive?
13. Protect document option available in WORD
2007 , at which menu?
1. Review 2. File
:K 1. cache memory 2. Flash memory
3. ROM 4. RAM
27. In a sequence of events that take place in an
3. Edit 4. View instruction cycle, the second cycle is called?
14. Master file contain data of ____ nature. 1. fetch cycle 2. Code cycle
1. temporary 2. Permanent 3. Decode cycle 4. Execute cycle
nt
3. Local 4. Global 28. IRC stands for what?
15. Which view of the start menu has turn off option? 1. Inter Relay chat
1. modern 2. Advanced 2. Internal relay chat
oi
pa
3. Adjunt device 3. Reports 4. Indexes
4. None of these 3. DOS cannot retrieve any data from a disk if a
35. A device that is connected to the CPU is____ computer virus corrupts the___ of computer.
1. adjunt device 1. directory 2. Data
a
2. Connected using ribbon cable 3. Batch file 4. FAT
3. Peripheral 4. Salami attack is a type of attack that operates on
ad
4. None of these which data?
36. The process of a computer receiving information 1. confidential 2. Company
from a server on the internet is known as? 3. Employee 4. Financial
1. pulling 2. Pushing 5. IPV6 address is of how many bits?
3. Uploading 4. Downloading
37. For selecting or highlighting, which device used
generally?
:K 1. 256
3. 128
2. 512
4. 64
6. The fastest logic family is ?
1. Icon 2. Keyboard 1. TTL 2.ECL
3. Disk 4. Mouse 3. DT 4. RTL
38. The different styles of lettering in a word 7. Which language used for artificial intelligence?
nt
processing program: 1. FORTRAN 2. PROLOG
1. writing 2. Calligraphy 3. C 4. COBOL
3. Font 4. Manuscript 8. In ____ topology, each node has 2
oi
39. The record produced in audit trail is known as: communicating subordinates but no master node.
1. job file 2. Journal tape 1. star 2. Bus
3. Journal stream 4. Job tape 3. Ring 4. Mesh
P
40. A collection of graphics programs and supporting 9. _____ is used by kiosks to simplify the interface.
data files is called as: 1. track pad 2. Mouse
1. graphics suite 2. Shareware 3. Projector 4. Touch screen
ng
pa
1. alt key, mouse 2. Ctrl key, mouse
3. Alt+ enter 4. Ctrl+enter 1. safe mode
17. Which of the following is not an option in the 2. Turbo mode
spelling dialogue box? 3. Command prompt
a
1. ignore 2. Ignore all 4. Normal mode
3. Edit 4. Change all 29. In the OSI model, which layer work as interface
ad
18. A kind of serial dotmatrix printer that forms between user and the network?
characters with magnetically –chargedink 1. transport layer
sprayeddots is called : 2. Data link layer
1. Laser 2. Drum printer 3. Application layer
3. Daisywheel 4. Inkjet printer
19. If 20 people need to communicate using
symmetrickey cryptography, how many
:K 4. Network layer
30. After a user has saved and deleted many files,
many scattered areas of stored data remain that
symmetric Keys are needed? are too small to be used efficiently, causing:
1. 200 2. 20 1. Disorder 2. Disarray
3.19 4.190 3. Formatting 4. Fragmentation
nt
20. Rules of programming language are called: 31. EBCDIC can code up to how many different
1. method 2. Error characters?
3. Syntax 4. Procedure 1. 256 2. 128 3.64
oi
22. moving process between main memory and disk 1. wordart 2. Clipart
is called: 3. Dropcap 4. All of these
1. caching 2. Swapping 33. UNIX operating system was developed by
ng
pa
pictures, sound and videos is called: Synthesizer, is called:
1. Complex 2. video 1. MP3 2. MIDI
3. Audio 4. OLE object data type 3. MPEG 4. HTML
a
39. Which of the following is a feature of UNIX? 6. An entity set that does not have sufficient
1. multi tasking 2. Multiuser attributes to form a primary key is a:
ad
3. Reliable 4. All of these 1. strong entity set
40. KDE and GNOME are two main 2. Simple entity set
1. Operating system 3. Weak entity set
2. System boards 4. Primary entity set
KEY
3. GUI
4. All of these
:K
7. IPV6 is written in___ notation.
1. binary
3. Decimal
2. Octal
4. Hexa decimal
8. The third step in the transaction processing cycle
1 2 3 4 5 6 7 8 9 10 is:
2 3 4 4 3 2 2 3 4 2 1. adult 2. Field op
nt
11 12 13 14 15 16 17 18 19 20 3. Op field 4. Database operation
3 4 2 3 4 2 3 4 4 3 9. Functions such as multiplexing and segmenting
21 22 23 24 25 26 27 28 29 30 of the data are performed by__ layer.
oi
2 2 3 4 4 3 2 2 3 4 1. application 2. Physical
31 32 33 34 35 36 37 38 39 40 3. Network 4. Transport
1 2 3 4 3 2 3 4 4 3 10. Application software is designed to accomplish
P
1. computer works
TEST-22 2. Gaming tasks
3. Realworld tasks
ng
spreadsheet.
1. data, words, numbers 3. Five 4. Two
Tu
2. Words, numbers, labels 13. Which of the following protocols is used to locate
3. numbers, formulas, labels the hardware address of a local device?
4. None of these 1. ARP 2. PONG
3. The number of characters that can be stored in 3. PING 4. RARP
a given physical space is called:
pa
16. The storage subsystem in a microcomputer 3. Instructions 4. Processing
consists mainly of ___ media with varying 5. Command
Capacities ? 25. A half byte is known as :
a
1. Optical or memory 1. Bit 2. Data
2. Memory or video 3. Nibble 4. Half byte
ad
3. Video or magnetic 5. Double byte
4. Magnetic or optical 26. ____ refers to maintaining and assuring the
17. The computer that processes both analog and accuracy and consistency of data ?
digital is called? 1. Data interpretation
1. mainframe
3. Analog
2. Digital
4. Hybrid
18. The components that process data are located in
:K 2. Data independence
3. Data integrity
4. Data redundancy
the? 5. All of the above
1. Internal memory 2. Printer 27. A telephone number, a birth date and a customer
3. System unit 4. Monitor name are examples of ___?
nt
19. Which of the following device can be used to 1. A record 2. Data
directly image the printed text? 3. File 4. Database
1. MICR 2. OCR 5. Project
oi
3. OMR 4. Smart card 28. Why is the Caps Lock Key referred to as a Toggle
20. The device which is not connected to CPU is key?
called: 1. Because it cannot be used to delete
P
1. offline device 2. Online device 2. Because it cannot be used for entering number
3. Peripheral 4. Reddy device 3. Because it cannot be used to insert
21. A spooler is a(n): 4. Because it's funcation goes back and forth
(1) Location in memory that maintains the
ng
3. Scanning automation
22. Which protocol is used by operating system to 4. Source data automation
Tu
pa
5. None of these 39. Printer and scanner are called ?
33. The language used for children and kids for 1. input devices 2. output devices
drawing graphic line diagrams : 3. peripherals 4. both 1 & 2
a
1. PROLOG 2. LOGO 3. COMAL 5. None of these
4. ALCOL 5. ALOGE 40. Which of the following is a formating method ?
ad
34. A computer intensive problem runs a ___ 1. NIC 2. NTSS 3. BTS
1. server 2. mainframe 4. NTFS 5. None of these
3. super computer 4. super PC
5. None of these KEY
35. Which of the following is the lates processor ?
1. 15 2. 17
4. Core to dual 5. None of these
3. 13
1
2
:K 2
3
11 12
3
4
13
4
1
14
5
2
15
6
3
16
7
4
17
8
4
18
9
4
19
10
3
20
36. In MS word the margins, indents and tabs are 2 1 1 2 3 4 4 3 2 1
set by : 21 22 23 24 25 26 27 28 29 30
1. Status bar 2. Ruler bar 3. Toll bar 5 2 3 5 3 3 2 4 2 2
nt
4. Menu bar 5. Title bare 31 32 33 34 35 36 37 38 39 40
2 4 2 2 2 2 4 2 3 4
P oi
oi n t ...
ng P
ng
i
TurnWishes You...
est ...!
B
ni
he
All t
r
Tu
pa
05. What is the first electronic computer ? Quiz - 4
06. Barcode Readers takes product cost
01. What is shortcut for open dialogue box ?
automatically through which mechanism?
02. What is shortcut for save as dialogue box ?
a
07. What is the measurement of Resolution for
03. What is shortcut for spell check in MS Word?
monitor?
ad
04. What is shortcut for Date formation in current
08. The process of priority in printer is maintained
cell of worksheet?
by which code ?
05. What is shortcut for Slide show in MS
09. Instructions given by computer operator called
10.
as ?
Which language used by children for drawing
:K
06.
Power point ?
What is shortcut for page Justify / Vertical
centering in Document?
graphic images ?
07. The cut or copied text stored temporarily in ?
08. Thesarus present in which menu of MS Word
Quiz - 2
nt
09. Portrait & Landscape pertains to what?
01. Who performs POST in computer? 10. Line count & Page count of document present
02. Which Protocol Provides internet for mobiles? at which bar ?
oi
04. Full form of PCI 01. Which protocol responsible for message
05. In MICR, C stands for what ? delivery in Internet?
06. Full form of NIC 02. WWW full form ?
ng
07. Which storage medium used widely in computer 03. NNTP full form ?
( magnetic / optical ) ? 04. In TCP & UDP which is connection oriented
08. What is fullform of SD Memory cards? protocol?
ni
09. Who is the supervisor of system compnents? 05. Which is small & single site network?
10. Who is the supervisor of system functions? 06. Which device used in FDM for seperation of
r
Channels?
Quiz - 3
07. Unsolicited & Junk mails are stored in which
Tu
pa
05. ENIAC
07. Clipboard
06. Input Automation
08. REVIEW
07. DPI Dots Per Inch
09. Page orientation
a
08. Spooler ( Numeric Code)
10. Status Bar
09. Commands
ad
10. LOGO
Quiz - 5
Quiz - 2
01. TCP
01. BIOS
02.
03.
WAP Wireless Application Protocol
Hard Disk
:K
02.
03.
World Wide Web
Network News Transfer Protocol
04. TCP
04. Peripheral Component Interface
05. LAN
05. Character
06. Band Pass Filters
nt
06. Network Interface Card
07. SPAM
07. Magnetic Medium
08. Mail box
08. Secure Digital
oi
Quiz - 3
ng
01. FORTRAN
02. High level Language
03. Interpreter
oi n t ...
ng P
04. 1010
ni
i
TurnWishes You...
05. I7
06. Mega Byte
...!
r
08. Platforms
09. LINUX
10. ls