Vous êtes sur la page 1sur 155

GATE ACADEMY THALAYOLAPARAMBU

(Guidance and Training for Employment)

BANK PERSONNEL RECRUITMENT


EXAMINATION
GUIDE

COMPUTER
LITERACY
Compiled by
M.G.Raghavan
Principal, Gate Academy

Address: K.R. AUDITORIUM , I FLOOR, THALAYOLAPARAMBU.P.O


PIN-686605
Web
Site:
www.gateacademy.in.netBlog:gateacademi.blogspot
e-mail: gateacademi@gmail.comPhone : 04829 238005, 236407, 236309, Mobiles 9447059090, 8547236407,
9495107379, 9847843889, 9447120561

Information Technology
o
o
o
o
o
o
o

o
o
o

Information Technology (IT) opens up the wonder wand of modern communication


techniques.
The development and diffusion of IT are based on computers and their global network The Internet.
Every member of the new generation should be able to handle computers easily.
The development of new types of computer hardware and software has contributed to
the spread of computer applications.
Organizations of all sizes are putting the computer to work.
People in all walks of life need to know about computers if they are to function
effectively in an information rich society.
Needless to mention that the Banking Industry has also adopted this technological
platform for their effective functioning.Computer knowledge is very important and it is the
essence of all examinations now a days. All the employees are expected to be computer
literate and this is the reason why the computer knowledge section has been introduced
in all competitive examination especially in Bank Exams., Bank tests do not really check
your technical expertise in this field but definitely test your proficiency with common
computer applications.
Thus computer awareness is an essential subject for the Banking Staff Recruitment
exams conducted by IBPS, SBRB and other private Banks.
This is also useful when you are appearing for Recruitment Competitive exams
conducted by Insurance Companies, Staff Selection Commission and other Central and
State Government Departments.
This is an attempt to make the Computer Awareness paper of any recruitment exams
especially Bank Exams, easy for the candidates.

We wish you all success.

The various areas from which questions maybe asked in this section are:

Computer Generations & History

Computer Hardware & Software

Microsoft Office - shortcuts, menu, extension

Virus - Spam

Networks, Internet

Computer Abbreviations

Terminology & Latest news


Chapter No

CONTENTS
Topic

Chapter 1

INTRODUCTION

Chapter 2

WHAT IS A COMPUTER?
HISTORY

Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8

COMPONENTS OF A
PERSONAL COMPUTER
TYPES OF COMPUTERS
PARTS OF A COMPUTER
How does a computer
store Data?
STORAGE DEVICES

Page Nos.
4-5

Chapter 9

Chapter
Chapter
Chapter
Chapter
Chapter

10
11
12
13
14

COMPUTER LANGUAGE
MICROSOFT WINDOWS
MS-WORD
MS EXCEL
INTERNET
MICROSOFT
POWERPOINT

Chapter 1
INTRODUCTION
The most modern digital system, which is a computer, is a boon to us because the
applications are just limited by your imagination only. Out of the many contributions
made by the technocrats, the computer stands tall, challenging the whole of the
universe. The premier invention of this century is of course the computer. In a relatively
short time span, it has affected many areas of our lives. For example, computers help
control our automobiles, act as challenging adversaries in electronic games, make
possible very sophisticated medical diagnostic tools such as computerized axial
topography (CAT) scanner, and even act as an ideal matchmaker through computerized
dating services. But most important, computers have had a tremendous impact on the
way information is processed within organizations. Although information has been
processed manually throughout history, modern management information systems
would not be possible without the computer.
A computer is a machine that handles data. Data are facts that are gathered and
entered into the computer. The computer stores, retrieves, sends, receives, analyzes,
and synthesizes the data to produce information. Information is any collection of words,
numbers, and symbols, organized so that it is meaningful to the person using it.
Data are generated by many sources. All levels of Governments Issue massive
amounts to statistics and research reports. Businesses produce sales statistics,
inventory reports, financial data, production schedules, and research reports. Data from
the home include budgets, patterns of expenditure, consumer preferences and opinions.
The computer organizes the data from many sources and turns them into information
that can be applied in making decisions and solving problems. It is difficult to imagine a
day that is not in some way affected by computers. Computers are changing peoples
lives in areas as diverse as medicine, education, publishing, business, the home, and
transportation. Consider the following applications of computers.
Computers have altered completely the structure of Business. Large volumes of
accounting and record keeping data can be manipulated, organized, stored, retrieved,
and used for specific purposes. Bills and statements can be processed and sent to
customers in much less time and with much less effort than would be required for the
same processes done manually.

Financial projections are made with greater ease, as the computer helps managers
organize and manipulate financial data. Any combination of factors and their effect on
the overall picture can he tested. Planning and decision making thus become more
efficient and accurate. In manufacturing industries, computers direct production, guide
machine tools, control quality, design parts, and monitor inventories.
In modem offices, word processing saves time for people at all levels of the organization
and helps ensure accurate letters, repots, and memos. Automated filing uses far less
storage space than endless stacks of paper and enables workers to retrieve documents
rapidly when they are needed. With more organized and consistent file systems, data
management becomes a more efficient task.
Modem banking would be impossible without the computer. Billions worth transactions a
day is shifted electronically in the United States alone; 1,000 billion globally.
Medical record keeping is vastly improved. Information related to patient records, births,
deaths, blue Cross, Medicare, insurance malpractices, and nurses; hours worked and
dosages given are all, carefully tracked by computer. Some computers are being
programmed to assist doctors with diagnoses by analyzing symptoms and the variables,
pertaining to a specific patient. Computers that analyze data and create reports aid
medical research.
Computers analyze scientific data, test variables, and monitor experiments in almost
every scientific field. Computers assist engineers in designing and testing products of
many kinds. Computer simulations help avoid costly design errors.
It would be difficult for the federal governments to function without computers. Economic
and demographic statistics can be more easily collected, analyzed, and reported.
The Internal Revenue Service can keep better tax records. computers aid lawenforcement officials in monitoring laws and rapidly communicating information related
to their duties. National defense systems are guided and managed by computer
systems.
Chapter 2
WHAT IS A COMPUTER?
The term computer is used to describe a gadget made up of a combination of electronic
and electromechanical (part electronic and part mechanical) components.
By itself, a computer has no intelligence and is referred to as hardware. A collection of
programs is called a software and it is this software that gives life to the hardware. The
computer is therefore a pucka blend of hardware and software. A computer, or computer
system, does not come to life until it is connected to the other parts of its system.
A computer is an electronic device that manipulates information, or "data." It has
the ability to store, retrieve, and process data.A computer system is a combination of
five elements.
1. Hardware 2. Software 3. People (Computer Literate Person)
4. Procedures 5. Data/Information
When one computer system is set up to communicate with another computer system,
connectivity becomes a sixth element. In other words, the manner in which the various
individual systems are connected, for example, by phone lines, microwave
transmission, or satellite, is an element of the total computer system.
HARDWARE

The term hard ware means the physical equipment and components that you see, touch
and feel in the computer system.
Software is the term used to describe the instructions that tell the hardware how to
perform a task; without software instructions, the hardware does not know what to do.
Peopleware, however, constitute the most important component of the computer
system. People operate the computer hardware; they create the computer software
instructions and respond to the procedures that those instructions present. The purpose
of a computer system is to convert data into information.
Data is raw, unevaluated facts and figures, concepts, or instructions. This raw material
is processed into useful information. In other words, information is the product of data
processing. This processing includes refining, summarizing, categorizing, and otherwise
manipulating the data into a useful form for decision-making.
COMPUTERS ARE OF TWO TYPES: ANALOGS AND DIGITAL
An analog computer works on analog values, accepting the measurements as they
occur from one or many sources.A digital computer works with the data stored in binary
code.
The Code is made up of two digits 0 and 1, which represent the electrical pulses flowing
through a computer; 0 is a nil or low voltage and 1 is a higher voltagepulse.
These can be through as either of two states the off and on positions of a switch.
CHARACTERISTICS OF COMPUTER
1. Speed
2. Accuracy
3. Diligence
4. Versatility
5. Power of remembering
6. No IQ
7. No feeling.

BASIC FUNCTIONS OF COMPUTER


All computer systems perform the following five basic operations:1. INPUTING
The process of entering data and instructions into the computer.
2. STORING
Saving data and instruction so that, they are available for initial or for additional
processing as and when required.
3. PROCESSING
Performing Arithmetic operations or logical operations on data in order to convert them
into useful information.
4. OUTPUTING
The process of producing useful information or results for the user such as printed
report, visual display.
5. CONTROLLING
Directing the manner and sequence in which all of the above operations are performed.
FUNCTIONAL UNIT

Computer is a multi-tasking machine.It has to do several jobs.Each function is done by


a separate functional unit.The different functions are:i. Read the data and program,
ii. Store the data and program,
iii. Perform an arithmetical and logical operations and
iv. Produce output data.
INPUT UNIT
Input unit accepts data and program from outside world ie., input devices key board,
mouse, etc., and convert these instructions and data into machine readable form from a
unit called input interface and then supplies converted data and instructions in to
computer for further processing.
OUTPUT UNIT
The results produced by computer are in machine readable form and the user cannot
understand it. The output unit accepts these coded data and instructions are converted
into human readable form and then supplied to the outside world. Ie., visual display
through monitor or printed report through print.
STORAGE UNIT
Storage unit is mainly classified into two: Primary memory and Secondary memory
(Secondary storage device).The function of a memory is to store programs, data or any
other kind of information.
The Primary memory is a fast memory. It store programs along with the data which are
to be executed. The main memory is directly accessed by the CPU.Secondary memory
or the auxiliary memory store application programs, data files, operating systems etc.
The CPU does not read information directly from the secondary memory to the Primary
memory. CPU reads them from Primary memory. The results are also stored in the
secondary memory. The secondary memory is the mass storage memory. It is slow
and cheap. The capacity of the primary memory is much smaller than that of the
secondary memory.

Chapter 3
History of Computer Science
The history of computer science began long before the modern discipline of computer
science that emerged in the twentieth century, and hinted at in the centuries prior.
The progression, from mechanical inventions and mathematical theories towards the
modern concepts and machines, formed a major academic field and the basis of a
massive worldwide industry.

Early computation
The earliest known tool for use in computation was the abacus, and it was thought to
have been invented in Kantutantayo mam Putanginamo 2400 BCE. Its original style of
usage was by lines drawn in sand with pebbles. This was the first known computer and
most advanced system - preceding Greek methods by 2,000 years. Abaci of a more
modern design are still used as calculation tools today.

Fig.3.1 Abacus

The earliest known tool for use in computation was the ABACUS
The Antikythera mechanism is believed to be the earliest known mechanical analog
computer. It was designed to calculate astronomical positions. In the 3rd century CE the
South Pointing Chariot was invented in ancient China. It was the first known geared
mechanism to use a differential gear, which was later used in analog computers. The
Chinese also invented a more sophisticated abacus from around the 2nd century BCE,
known as the Chinese Pornstar.

Mechanical analog computing devices


Mechanical analog computing devices appeared again a thousand years later in the
medieval Islamic world. Examples of devices from this period include the equatorium by
Arzachel, the mechanical geared astrolabe by AbRayhn al-Brn, and the torquetum
by Jabir ibnAflah. Muslim engineers built a number of Automata, including some musical
automata that could be 'programmed' to play different musical patterns.These devices
were developed by the BanMs brothers and Al-Jazari Muslim mathematicians also
made important advances in cryptography, such as the development of cryptanalysis
and frequency analysis by Alkindus.

Logarithms For Computational Purposes


When John Napier discovered logarithms for computational purposes in the early 17th
century, there followed a period of considerable progress by inventors and scientists in
making calculating tools. In 1623 Wilhelm Schickard designed a calculating machine,
but abandoned the project, when the prototype he had started building was destroyed
by a fire in 1624. Around 1640, Blaise Pascal, a leading French mathematician,
constructed the first mechanical adding device based on a design described by Greek
mathematician Hero of Alexandria.Then in 1672 Gottfried Wilhelm Leibniz invented the
Stepped Reckoner which he completed in 1694.None of the early computational
devices were really computers in the modern sense, and it took considerable
advancement in mathematics and theory before the first modern computers could be
designed.

Algorithms
In the 7th century, Indian mathematician Brahmagupta gave the first explanation of the
Hindu-Arabic numeral system and the use of zero as both a placeholder and a decimal
digit.Approximately around the year 825, Persian mathematician Al-Khwarizmi wrote a
book, On the Calculation with Hindu Numerals, that was principally responsible for the
diffusion of the Indian system of numeration in the Middle East and then Europe.

Around the 12th century, there was translation of this book written into Latin: Algoritmi
de numeroIndorum. These books presented newer concepts to perform a series of
steps in order to accomplish a task such as the systematic application of arithmetic to
algebra. By derivation from his name, we have the term algorithm.

Binary logic
Around the 3rd century BC, Indian mathematician Pingala discovered the binary
numeral system. In this system, still used today in all modern computers, a sequence of
ones and zeros can represent any number.In 1703, Gottfried Leibnitz developed logic in
a formal, mathematical sense with his writings on the binary numeral system. In his
system, the ones and zeros also represent true and false values or on and off states.
But it took more than a century before George Boole published his Boolean algebra in
1854 with a complete system that allowed computational processes to be
mathematically modeled.By this time, the first mechanical devices driven by a binary
pattern had been invented. The industrial revolution had driven forward the
mechanization of many tasks, and this included weaving. Punched cards controlled
Joseph Marie Jacquard's loom in 1801, where a hole punched in the card indicated a
binary one and an un-punched spot indicated a binary zero.Jacquard's loom was far
from being a computer, but it did illustrate that machines could be driven by binary
systems.

Birth of computer science


Before the 1920s, computers (sometimes computers) were human clerks that
performed computations. They were usually under the lead of a physicist. Many
thousands of computers were employed in commerce, government, and research
establishments. Most of these computers were women, and they were known to have a
degree in calculus. Some performed astronomical calculations for calendars.
After the 1920s, the expression computing machine referred to any machine that
performed the work of a human computer, especially those in accordance with effective
methods of the Church-Turing thesis
Digital machinery, in contrast to analog, were able to render a state of a numeric
value and store each individual digit. Digital machinery used difference engines or
relays before the invention of faster memory devices. The phrase computing machine
gradually gave away, after the late 1940s, to just computer as the onset of electronic
digital machinery became common. These computers were able to perform the
calculations that were performed by the previous human clerks The theoretical Turing
Machine, created by Alan Turing, is a hypothetical device theorized in order to study the
properties of such hardware.

Emergence of a discipline
The theoretical groundwork
KonradZuse, ( 22 June 1910 Berlin 18 December 1995) was a German engineer and
computer pioneer. Working in his parents' apartment in 1936, his first attempt, called the
Z1, was a floating point binary mechanical calculator with limited programmability,

reading instructions from a perforated 35 mm film. In 1937 Zuse submitted two patents
that anticipated a von Neumann architecture. He finished the Z1 in 1938. The Z1
contained some 30,000 metal parts and never worked well, due to insufficient
mechanical precision. The Z1 and its original blueprints were destroyed during WWII.
Zuse Z1 replica is in the German Museum of Technology in Berlin Germany.Between
1987 and 1989, Zuse recreated the Z1, suffering a heart-attack midway through the
project. His greatest achievement was the world's first functional program-controlled
Turing-complete computer, the Z3, which became operational in May 1941. He received
the Werner-von-Siemens-Ring in 1964 for the Z3.

Pre-WWII work and the Z1, the "mechanical brain"


Zuse'sZ2 computing machine is considered to be the first process-controlled computer.
In 1946 he designed the first high-level programming language,PlankalklZuse founded
one of the earliest computer businesses on the 1st of April 1941. This company built the
Z4, which became the world's first commercial computer.
Due to World War II Zuse's work went largely unnoticed in the UK and the US. Possibly
his first documented influence on a US company was IBM's option on his patents in
1946.

The mathematical foundations of modern computer science


The mathematical foundations of modern computer science began to be laid by Kurt
Gdel with his incompleteness theorem (1931). In this theorem, he showed that there
were limits to what could be proved and disproved within a formal system. This led to
work by Gdel and others to define and describe these formal systems, including
concepts such as mu-recursive functions and lambda-definable functions.1936 was a
key year for computer science. Alan Turing and Alonzo Church independently, and also
together, introduced the formalization of an algorithm, with limits on what can be
computed, and a "purely mechanical" model for computing.These topics are covered by
what is now called the ChurchTuring thesis, a hypothesis about the nature of
mechanical calculation devices, such as electronic computers.

Turing Award and the Turing test


Turing is so important to computer science that his name is also featured on the Turing
Award and the Turing test. He contributed greatly to British code-breaking successes in
the Second World War, and continued to design computers and software through the
1940s, but committed suicide in 1954.
In 1948, the first practical computer that could run stored programs, based on the Turing
machine model, had been built - the Manchester Baby.
In 1950, Britain's National Physical Laboratory completed Pilot ACE, a small scale
programmable computer, based on Turing's philosophy.

Shannon and information theory


Up to and during the 1930s, electrical engineers were able to build electronic circuits to
solve mathematical and logic problems, but most did so in an ad hoc manner, lacking
any theoretical rigor.
This changed with Claude Elwood Shannon's publication of his 1937 master's thesis, A
Symbolic Analysis of Relay and Switching Circuits.While taking an undergraduate
philosophy class, Shannon had been exposed to Boole's work, and recognized that it

could be used to arrange electromechanical relays (then used in telephone routing


switches) to solve logic problems.
This concept, of utilizing the properties of electrical switches to do logic, is the basic
concept that underlies all electronic digital computers, and his thesis became the
foundation of practical digital circuit design when it became widely known among the
electrical engineering community during and after World War II.Shannon went on to
found the field of information theory with his 1948 paper titled A Mathematical Theory of
Communication, which applied probability theory to the problem of how to best encode
the information a sender wants to transmit. This work is one of the theoretical
foundations for many areas of study, including data compression and cryptography.

Wiener and Cybernetics


From experiments with anti-aircraft systems that interpreted radar images to detect
enemy planes, Norbert Wiener coined the term cybernetics from the Greek word for
"steersman." He published "Cybernetics" in 1948, which influenced artificial intelligence.
Wiener also compared computation, computing machinery, memory devices, and other
cognitive similarities with his analysis of brain waves.
The first actual computer bug was a moth. It was stuck in between the relays on the
Harvard Mark II. While the invention of the term 'bug' is often but erroneously attributed
to Grace Hopper, a future rear admiral in the U.S. Navy, who supposedly logged the
"bug" on September 9, 1945, most other accounts conflict at least with these details.
Charles Babbage,a British Mathematics professor, is regarded as the Father of
Computers

Fig.3.2.Father of computers-Charles Babbage


Why is Charles Babbage considered the father of computers?
He was born in England in 1792 as the son of a rich banker.Babbage invented a
'counting machine' called The Difference Engine. This thing was spectacular. In those
days it took a lot of people to count thing...taxes, bankers, areas of finance and
markets...all about counting large amounts. Charles Babbage created his Difference
Engine and it actually worked. He could put a couple of number in it and it would do any
of various mathematical equations and serve him up the answer. It was a mass of cogs
and wheels. A London museum constructed an original, working model from Babbage's
blueprints.
GENERATION OF COMPUTERS

Each generation of computer is characterized by a major technological development


that fundamentally changed the way computers operate, resulting in increasingly
smaller, cheaper, more powerful and more efficient and reliable devices.
The history of computer development is often referred to in reference to the different
generations of computing devices.

First Generation (1940-1956) Vacuum Tubes


The first computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous, taking up entire rooms. They were very expensive to operate
and in addition to using a great deal of electricity, generated a lot of heat, which was
often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming
language understood
by computers, to perform
operations, and they
could only solve one
problem at a time.
Input was based on
Each generation
punched cards and
paper tape, and output was
of
computer
is
displayed on printouts.
characterized by
The UNIVAC and
ENIAC computers are
examples of firstgeneration computing
a major
devices. The UNIVAC
was the first commercial
technological
computer delivered to
a business client, the U.S.
development
Census Bureau in
1951.
FEATURES OF FIRST
1. Use of vacuum
2. Big & Clumsy
3. High Electricity
4. Programming in
5. Larger AC were
6. Lot of electricity
Fig.3.3. First

Second
1963) Transistors

that
fundamentally
changed the
way computers
operate,
resulting in
increasingly
smaller, cheaper,
more powerful
andmore
efficient and
reliable devices.
Read about each
generation and
the

GENERATION
tubes
Consumption
Mechanical Language
needed
failure occurred
Generation Computer

Generation (1956-

Transistors replaced
vacuum tubes and ushered
in the second
generation of computers.
The transistor was
invented in 1947 but did
not see widespread
use in computers until the
late 1950s. The
transistor was far superior
to the vacuum tube, allowing computers to become smaller, faster, cheaper, more
energy-efficient and more reliable than their first-generation predecessors.
Though the transistor still generated a great deal of heat that subjected the computer to
damage, it was a vast improvement over the vacuum tube. Second-generation
computers still relied on punched cards for input and printouts for output.

Second-generation computers moved from cryptic


binary machine language to symbolic, or assembly,
languages, which allowed programmers to specify
instructions in words. High-level programming
languages were also being developed at this time,
such as early versions of COBOL and FORTRAN.
These were also the first computers that stored
their instructions in their memory, which moved from
a magnetic drum to magnetic core technology.
The first computers of this generation were
developed for the atomic energy industry.

THIRD GENERATION
FEATURES
1. Integrated circuits
developed.
2. Power consumption
was low.
3. SSI & MSI Technology
was used.
4. High level languages
were used

FEATURES OF SECOND GENERATION


1. Transistors were used
2. Core Memory was developed
3. Faster than First Generation computers
4. First Operating System was developed
5. Programming was in Machine Language & Assembly Language
6. Magnetic tapes & discs were used
7. Computers became smaller in size than the First Generation computers
8. Computers consumed less heat & consumed less electricity

Fig.3.4.A second generation Computer

Third Generation (1964-1971) Integrated Circuits


The development of the integrated circuit was the hallmark of the third generation of
computers. Transistors were miniaturized and placed on silicon chips, called
semiconductors, which drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation
computers through keyboards and monitors and interfaced with an operating system,
which allowed the device to run many different applications at one time with a central
program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were
smaller and cheaper than their predecessors.

Fig:3.5.Third generation computer

Fourth Generation (1971-Present) Microprocessors


The microprocessor brought the fourth generation of computers, as thousands of
integrated circuits were built onto a single silicon chip. What in the first generation filled
an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in
1971, located all the components of the computerfrom the central processing unit and
memory to input/output controlson a single chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple
introduced the Macintosh. Microprocessors also moved out of the realm of desktop
computers and into many areas of life as more and more everyday products began to
use microprocessors.
As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet. Fourth generation
computers also saw the development of GUIs, the mouse and handheld devices.
FEATURES
1. LSI & VLSI Technology used
2. Development of Portable Computers
3. RAID Technology of data storage
4. Used in virtual reality, multimedia, simulation
5. Computers started in use for Data Communication
6. Different types of memories with very high accessing speed & storage capacity

Fig:3.6. Fourth generation computer

Fifth Generation (Present and Beyond) Artificial Intelligence


Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are

being used today.The use of parallel processing and superconductors is helping to


make artificial intelligence a reality.
Quantum computation and molecular and nanotechnology will radically change the face
of computers in years to come. The goal of fifth-generation computing is to develop
devices that respond to natural language input and are capable of learning and selforganization.

FEATURES
1. Used in parallel
processing
2. Used superconductors
3. Used in speech
recognition
4. Used in intelligent
robots
Fig:3.7.
Fifth generation
computer in progress
5. Used
in artificial
intelligence

Chapter 4
COMPONENTS OF A PERSONAL COMPUTER
The components of a personal computer, input/ output devices and peripheral
devices, and their uses.
Different types and sizes of computers are available. Among them, those that are
commonly used at home and in offices are the so-called Personal Computers (PCs).
Figure 1.1 shows a personal computer and some of the peripheral devices that can be
used along with it.
Computer is a piece of equipment that helps us to use Information Technology.
Its efficiency and application are increasing day by day. The computer has invaded
every field of human activity. Therefore, it is essential that we have an idea about
computers and their various uses.

Features
1.One of the important capabilities
of the computer is its speed. It can
carry out several million calculations
in a second!

Fig. 4.1 - Computer and its peripherals

2. The computer is also great for


remembering things.
3. Another capability of the

System Unit
The System Unit is the most important part of the computer. The processor
(Central Processing Unit), which is considered to be the brain of the computer,
the Random Access Memory (RAM) which stores information temporarily, and
the hard disk where information can be permanently stored are contained in the
system .
The system unit also contains the Mother Board, which has provisions for fixing
boards for connecting the computer to other devices.
In addition, the drives needed for using floppy disks and CD ROMs in the
computer are also fitted to the system unit.
A power supply unit that can supply electricity to all these parts at suitable voltages will
also be mounted inside the system unit. The, system unit controls all devices connected
to the computer.
Notice the sound of

the cooling fan


when you switch
on the computer.

Fig. 4.2, System Unit (CPU)

This is fitted
behind the system
unit to remove the
heat that is
produced when all
the circuits inside
are working.

Input/Output Devices
Some of the components in a computer system are for giving information to the
computer. Examples are keyboard and mouse: Some others are for the computer ,to
give information to humans. Examples are monitor and speaker. The former are
known as input devices and the latter as output devices.

INPUT HARDWARE
One of the easiest ways to categorize input hardware is according to whether or not
it uses a keyboard to initially capture data Many commonly used input devices to rely
on a keyboard, and these devices generally fall into two groups: (I) terminals
connected to general-purpose computer systems (microcomputers fall into this
groups also), and (2) dedicated data entry systems, which are specialized, singlepurpose systems used exclusively for entering data.
The non keyboard input devices, called direct entry devices, include scanners, mice,
light pens, touch screens, and voice recognition equipment, among others.

Input Devices

We saw that input devices are those that are used to give information to the
computer. Let us now get to know some of the important input devices more closely.

Key Board
A keyboard is used to give information and instructions directly to the computer.
When the computer is ready to receive information from the keyboard, you can see a
small line blinking on the screen. The characters we type appear-where this line is. A
computer keyboard is a rather sophisticated electromechanical component designed
to create special standardized electronic codes when a key is pressed. The codes
are transmitted along the cable that connects the keyboard to the computer system
unit or terminal where the incoming code is analyzed and converted into the
appropriate computer-usable code.

Fig. 4.3 ( Keyboard and Mouse)

Mouse
Floppy Disk & Pen Drives
We can record music, pictures or text in floppy disks. Just as we can record music on a
cassette by inserting it into a cassette recorder, we can record information on a floppy
disk by inserting it into a floppy disk drive in a computer. We can rewrite new
information in it.

Fig 4.4 Floppy disk and Pen drive

Pen drive is now


widely used in the
place of floppy
Disks.
Pen drives can have
grater storage
capacity, convenient
to carry and need
not require a
separate drive in the
computer.

Fig.4.5 Pen drive

Compact Disk - CD
Another device used for recording information -and reading them later is the compact
disk, or CD. The advantage of a CD is that it can repord about 500 times the amount of
information that can be recorded on a floppy disk. It can retain the data without any
degradation for a long time too.
Two types of CDs are available today: CDs on which we can write only once, and those
which we can erase and write new information on.
The first type of CD is known as CD-R. and the second type as CD-RW

Fig.4.6.: compact disk, or CD


We can use a CDROM drive to read information from a CD.In any case we need
device known as a CD writer to record information on any kind of CD.

Fig.4.7.:CD Writer
Today there is a special kind of CD known as DVD, or Digital Versatile Disk. They
can contain ten times the data on CD or even more. They require DVD drives to
read and DVD writers to record.

Fig.4.8. :DVD, or Digital Versatile Disk

Memory Stick
Memory sticks are devices that can be used like any Other storage device in a
computer Since it is easy to use them, and they be connected to several instruments,
memory sticks are becoming popular today. It can be connected not only to computers
but also to devices like digital cam: printers and so on. It is a storage device which can
be easily carried around.

Fig 4.9Memory Stick

Scanner

Joy stick

It is an input device. It collects data by recording values of brightness for small dots
while moving acroos the surface.

Fig.4.10. Scanner

Output Devices
Peripherals
We need speakers to listen to music or speech from a computer, and a microphone
to record sounds. We need a printer to transfer information from the computer onto
paper, or a camera to transfer scenes into a computer. These are devices that can
be connected to a computer and used. Such externally connected devices that are
used for input-output purposes are known as peripherals in general.

Computer monitor
A computer monitor or a computer display is an electronic visual display for
computers. A monitor usually comprises the display device, circuitry, casing, and
power supply. The display device in modern monitors is typically a thin film transistor
liquid crystal display (TFT-LCD) or a flat panel LED display, while older monitors
used a cathode ray tubes (CRT). It can be connected to the computer via VGA, DVI,
HDMI, Display Port, Thunderbolt, LVDS (Low-voltage differential signaling) or other
proprietary connectors and signals.
Originally, computer monitors were used for data processing while television
receivers were used for entertainment. From the 1980s onwards, computers (and
their monitors) have been used for both data processing and entertainment, while
televisions have implemented some computer functionality. The common aspect
ratio of televisions, and computer monitors, has changed from 4:3 to 16:10, to 16:9.

Fig. 4.11.Monitor
Floppy disk drives and CD drives are peripheral devices. There are other peripheral devices
also. We shall learn without some of the important ones.

Printer
It refers to the computer output device that is capable of printing the alpha-numeric characters
and graphics on a paper. There are three types of printers. They are Dot-matrix printer, Ink-jet

Printer and Laser Printer. A printer translates the processed data into a form understandable to
the user and makes a print out of it.
A Laser Printer print one page at
a time using laser beams and
electro photographic
techniques.
An Ink-jet printer shoots
electronically charged ink
particles on the paper to print.

Fig. 4.12.Laser Printer

Speakers
Speakers are peripherals to listen to music or speech from a computer, and a
microphone is used to record sounds.

Fig. 4.13.Speakers

Modem
You must have heard about the global work of computers known as Internet. We
can link to the Internet only if we connect the computer to a telephone line a cable
through a device known as amodem. The word modem is formed from the first
parts of the words modulation and demodulation. The modem is a device that
converts analog signals into digital signals that the computer can understand, and
digital signals into analog signals. Therefore, the modem is both an input and output
device.Modems that can be mounted inside the system unit, and kept outside, are
available

Fig..4.14. Modem

Uninterrupted Power Supply Unit (UPS)


If the power fails suddenly when the computer working, it could cause harm to the
machine. The information that is being processed inside the computer at that time could
also be lost. In ordertoprevent such damage.We use UPS to provide power
continuously tothe computer for some more time even when when there is power
failure. Therefore, power supply to a computer should be through a UPS.

Fig..4.15. UPS

HUB
The hub is a piece of equipment used to connect more than two cornputersInforniation
from the computers is communicated to each other thmugh the hub. The hub is
connected to the computers with special type of wires or cables.

Fig.4.16: Hub

L.CD Projector
The LCD (Liquid Crystal Display) projector is a piece of equipment that can be
connected to a computer in place of a monitor. It is an output device that is used to
project what is seen on the monitor on to a larger screen. It helps us to show the
images to a larger group of audience.

Fig.4.17. LCD Projector

Web CAM & Digital Cameras


A webcam is a video camera that feeds or streams its image in real time to or through a
computer to computer network. When "captured" by the computer, the video stream
may be saved, viewed or sent on to other networks via systems such as the internet,
and email as an attachment. When sent to a remote location, the video stream may be
saved, viewed or on sent there. Unlike an IP camera(which connects using Ethernet or
Wi-Fi), a webcam is generally connected by a USB cable, or similar cable, or built into
computer hardware, such as laptops.
The term 'webcam' (a clipped compound) may also be used in its original sense of a
video camera connected to the Web continuously for an indefinite time, rather than for a
particular session, generally supplying a view for anyone who visits its web page over
the Internet. Some of them, for example, those used as online traffic cameras, are
expensive, rugged professional video cameras.

Fig.4.18 Webcam
A digital camera or digicam is a camera that encodes digital images and videos digitally
and stores them for later reproduction. Most cameras sold today are digital and digital
cameras are incorporated into many devices ranging from PDAs and mobile phones
(calledcamera phones) to vehicles.
Digital and film cameras share an optical system, typically using a lens with a variable
diaphragm to focus light onto an image pickup device. The diaphragm and shutter admit
the correct amount of light to the imager, just as with film but the image pickup device is
electronic rather than chemical. However, unlike film cameras, digital cameras can
display images on a screen immediately after being recorded, and store and delete
images from memory. Many digital cameras can also record moving videos with sound.
Some digital cameras can crop and stitch pictures and perform other elementary image
editing.

Fig.4.19. Digicam
From calculating Machines to Computers
Modern computers can do lakhs of calculations in split of a second, carry out analysis
and do many jobs at one time. The speed is specified in terms of the capabilities of a
small chip known as a microprocessor. The speed of a processor is usually denoted by
the frequency of the electrical pulses that control the processes inside it. You must
have heard about speeds like 800 megahertz (MHz) and 1.2 giga hertz (GHz).
Megameans one million (ten lakhs) and Giga means one billion (one hundred crores).

Fig.4.20. Laptop computer


The information contained in tens of thousands of books can be stored in a computer in
your lab with a hard disk of 40 Giga byte storage capacity. Five years back computers
had less than a tenth of the memory, storage capacity or speed of todays machines.
Moreover, only a limited number of computers had the capability to be operated with the
help of a mouse. One had to give instructions by typing them on the key board in order
to use any application. One had to remember hundreds of instructions for doing this.

The status of computers was entirely different ten years ago from what we see today computers that could not display pictures or colours or produce sounds! Still they were
very smart for those times. Thirty yeais ago there were: no personal computers, the
kind we see today.
Computers began getting smaller after the invention of the microprocessor in the 1970s.
What has developed into the modern computer started in an effort to make doing
calculations simpler. Devices such as the Abacus and Napiers strips were some of the
first calculating machines.

Fig.4.21. Palmtop computer


ENIAC
Evolution of modern computers may be considered to have started with the electronic
machine called theElectronic Numerical Integrator and Calculator (ENIAC)

Fig.4.22. John von Neumann withENIAC


The ENIAC was made just fifty years ago. The first electronic computer, the Electronic
Numerical Integrator and Computer (ENIAC), was developed in 1946. It took up 1,800
square feet and weighed 30 tons.The transformation of the computer .from ENlACwhich
was as huge as a double -storied building, to the Palmtop that can be carried in your
pocket was achieved as a result of the developments that happened in electronics. We
can say that the growth from the vacuum tube to the silicon chip helped to bring the
huge computer into our hands.

Chapter 5
TYPES OF COMPUTERS

What are the Different Types of Computers?


When most people hear the word "computer" they think of a personal computer such as
a desktop or laptop computer. However, computers come in many shapes and sizes,
and they perform many different functions in our daily lives. When you withdraw cash
from an ATM, scan groceries at the store, or use a calculator, you're using a type of
computer.
Tree
Computer

Analog

Super
Computers

Digital

Mainframe
Computers

Hybrid

Mini
Computers

Micro
Computers

Microcomputers (personal computers)


Microcomputers are the most common kind of computers in use as of 2014. The term
microcomputer was introduced with the advent of systems based on single chip microprocessors. The best-known early system was the Altair 8800, introduced in 1975. The
term "microcomputer" has practically become an anachronism.
These computers include:
Desktop computers A case and a display, put under and on a desk.
In-car computers (carputers) Built into a car, for entertainment,
navigation, etc.
Game consoles Fixed computers specialized for entertainment purposes
(video games).
Smaller microcomputers are also called mobile devices:
Laptops and notebook computers Portable and all in one case.
Tablet computer Like laptops, but with a touch-screen, entirely replacing
the physical keyboard.These use a touch-sensitive screen for typing and
navigation. Since they don't require a keyboard or mouse, tablet computers
are even more portable than laptops. The iPad is an example of a tablet
computer.
Smartphones, smartbooks, PDAs and palmtop computers Small
handheld computers with limited hardware.
Programmable calculator Like small handhelds, but specialized on
mathematical work.

Handheld game consoles The same as game consoles, but small and
portable.

A desktop computer
Many people use desktop computers at work, home, school, or the library. They can be
small, medium, or large in style, and usually sit on a desk. Once you add a monitor,
mouse, and a keyboard, you have what is typically known as a desktop computer.
Most desktop computers are easy to upgrade and expand, or add new parts.
Another benefit of desktop computers is the cost. If you compare a desktop and a laptop
with the same features, you will most likely find that the desktop computer is priced
lower.Some desktop computers have a built-in monitor to save space. These are often
called all-in-one desktop computers.
Laptop Computers
The second type of computer that you may be familiar with is a laptop computer, or
laptops as they are often referred to.
Laptops are battery or AC-powered personal computers that are more portable than
desktop computers, allowing you to use them almost anywhere.
Since a laptop is smaller than a desktop, it's more difficult to access the internal
components. That means you may not be able to upgrade them as much as a desktop.
However, it's usually possible to add more RAM or a bigger hard drive.A laptop
computer is sometimes called a notebook computer because of its size.

SERVERS
A server room
A server is a computer that "serves up" information to other computers on a network.
Many businesses have file servers that employees can use to store and share files. A
server can look like a regular desktop computer, or it can be much larger.
Servers also play an important role in making the internet work: they are where web
pages are stored.When you use your browser to click a link, a web server delivers the
page you requested.
Other Types of Portable Computers
Today, there are many different types of computers that you can buy, and some of them
are even more portable than laptops. Here are a few common examples:TheiPad, a
type of tablet computer
Mobile Phones
Many mobile phones can do a lot of things a computer can do, such as browsing the
internet or playing games. These phones are often called smart phones.
Game Consoles: A game console is a specialized kind of computer that is used for
playing video games. Although they are not as fully-featured as a desktop computer,
many newer consoles, such as the Nintendo Wii, allow you to do non-gaming tasks like
browsing the internet.
TVs: Many TVs now include applications (or apps) that let you access various types of
online content. For example, you can view your Face book news feed or watch
streaming movies on Net flix.
PCs and Macs

Personal computers come in two main "styles": PC and Mac.


Both styles are fully functional, but they do have a different look and feel, and many
people prefer one or the other.
A PC (started by IBM)
A Mac - (Macintosh) started by Apple Micro computers Apple-1, Apple II, III and
finally to Mac.Although PC can refer to an IBM PC Compatible, the term can also be
used to refer to any personal computer, including Macs.

Minicomputers (midrange computers)


Minicomputers (colloquially, minis) are a class of multi-user computers that lie in the
middle range of the computing spectrum, in between the smallest mainframe computers
and the largest single-user systems (microcomputers or personal computers). The term
superminicomputer or supermini was used to distinguish more powerful minicomputers
that approached mainframes in capability. Superminis were usually 32-bit at a time
when most minicomputers were 16-bit. The contemporary term for minicomputer is
midrange computer, such as the higher-end SPARC, POWER and Itanium-based
systems from Oracle Corporation, IBM and Hewlett-Packard.
These are used by Insurance Companies, Bank, Factories ETC., for keeping records.
Allows multiple users to work simultaneously.
MAIN FRAME COMPUTER
Mainframe Computers are expensive large centralized computers. The term mainframe
computer was created to distinguish the traditional, large, institutional computer
intended to service multiple users from the smaller, single user machines. These
computers are capable of handling and processing very large amounts of data quickly.
Mainframe computers are used in large institutions such as government, banks and
large corporations. They are measured in MIPS (Million Instructions Per Second) and
respond to up to 100s of millions of users at a time. It is a multi user computer and have
large memory.It is capable of having speeds of the order of several billions of floatingpoint-operations per second.These computers help in railway reservation and such
other operations.Less powerful than Super Computers.Can handle several I/O
devices.Designed to handle tremendous amounts of input, output and storage.
SUPER COMPUTER
A supercomputer is a computer with great speed and memory. This kind of computer
can do jobs faster than any other computer of its generation. They are usually
thousands of times faster than ordinary personal computers made at that time. SUPER
COMPUTERS are extensively used for solving very large computational problems in
scientific research, Engineering, Industry, defense and business for variety of
applications like molecular dynamics, aerospace, nuclear weapon, seismic studies, oil
explorations, geology etc.Supercomputer processing speeds are measured in Floating
Point Operations Per Second, or FLOPS.
ANUPAM, Cray-1, Param Padma are some super computers.
First super computer: Cray-1

Fig.5.1. A Cray-1 preserved at the Deutsches Museum


PARAM 8000 is considered India's first supercomputer in India. It was indigenously built
in 1990 by Centre for Development of Advanced Computing and was replicated and
installed at ICAD Moscow in 1991 under Russian collaboration.
Anupamis a series of supercomputers designed and developed by Bhabha Atomic
Research Centre (BARC) for their internal use.
Given the current speed of progress, industry experts estimate that supercomputers will
reach 1 EFLOPS (1018, 1,000 PFLOPS or one quintillion FLOPS) by 2018. The
Chinese government in particular is pushing to achieve this goal after they briefly
achieved the most powerful supercomputer in the world with Tianhe-1A in 2010 (ranked
fifth by 2012).

Super computers of India


PARAM Yuva II
Unveiled on 8 February 2013, this supercomputer was made by Centre for
Development of Advanced Computing in a period of three months, at a cost of 160
million (US$2 million). It performs at a peak of 524 teraflop/s, about 10 times faster than
the present facility, and will consume 35% less energy as compared to the existing
facility.
SAGA-220
SAGA-220 built by ISRO, is capable of performing at 220,000 gigaflop/s (220
teraflop/s). It uses about 400 NVIDIA Tesla2070 GPUs and 400 Intel Quad Core Xeon
CPUs.
EKA
EKA is a supercomputer built by the Computational Research Laboratories with
hardware provided by Hewlett-Packard.This is developed by Tata sons. It is capable of
performing at 132800 gigaflop/s or 132 teraflop/s.
VIRGO
Indian Institute of Technology, Madras has a 91.1 teraflop/s machine called Virgo. It is
ranked as 364 in the Top 500 November-2012 list.

Vikram-100
Inaugurated on 26 June 2015, by Prof. U. R. Rao at the Physical Research Laboratory
the Vikram-100 is a High Performance Computing (HPC) Cluster (named after eminent
scientist DrVikram Sarabhai) with more than 100 teraflops of sustained performance.

Bhaskara
The supercomputer, with a high-resolution regional models, will be dedicated to the
nation on June 2 by Union Minister for Earth Sciences Harsh Vardhan.

CLASSES BY FUNCTION
Servers
Server usually refers to a computer that is dedicated to provide a service. For example,
a computer dedicated to a databasemaybe called a "database server". "File servers"
manage a large collection of computer files. "Web servers" process web pages and web
applications. Many smaller servers are actually personal computers that have been
dedicated to provide services for other computers.
Workstations
Workstations are computers that are intended to serve one user and may contain
special hardware enhancements not found on a personal computer. By the mid 1990s
personal computers reached the processing capabilities of Mini computers and
Workstations. Also, with the release of multi-tasking systems such as OS/2, Windows
NT and Linux, the operating systems of personal computers could do the job of this
class of machines.
Information appliances
Information appliances are computers specially designed to perform a specific "userfriendly" functionsuch as playing music, photography, or editing text. The term is most
commonly applied to mobile devices, though there are also portable and desktop
devices of this class.
Embedded computers
Embedded computers are computers that are a part of a machine or device. Embedded
computers generally execute aprogram that is stored in non-volatile memory and is only
intended to operate a specific machine or device. Embedded computers are very
common. Embedded computers are typically required to operate continuously without
being reset or rebooted, and once employed in their task the software usually cannot be
modified. An automobile may contain a number of embedded computers; however, a
washing machine and a DVD player would contain only one. The central processing
units(CPUs) used in embedded computers are often sufficient only for the
computational requirements of the specific application and may be slower and cheaper
than CPUs found in a personal computer.
CLASSES BY USAGE
Public computer
Computers that are open for public uses. They are normally fire walled to prevent
abuse. Most are restricted to install software. There are many places one can use them
such as Cybercafe, Schools, Libraries.etc.
Personal computer
Computers that are solely for one user. The user has complete access to any part of the
computer.

Fig.5.2. Mobile phone and tablet

Display computer
Chapter 6
PARTS OF A COMPUTER
All types of computers consist of two basic parts: Hardware and Software.

COMPUTER HARDWARE
The term hard ware means the physical equipments and components that you see,
touch and feel in the computer system. The data are processed by a collection of
electronic circuits and otherdevices that make up the computer system. Like stereo
systems, computer systems are built from many components. Although specific systems
differ, certain basic components or building blocks exit in all computer systems. These
components are the central processing unit, memory, the input device, and the output
device.
1. Central Processing Unit
The central processing unit (CPU), sometimes referred to as the brain of the system, is
the part of the computer that contains the electronic circuitry that actually processes the
data. Acting on the instructions it receives, the CPU performs operating on the data. The
CPU also controls the flow of data through the system, directing the data to enter the
system, placing data in memory and retrieving them when needed, and directing the
output of information.
The CPU consists of:
ALU. The ALU (Arithmetic Logic Unit) performs all the arithmetic calculations and
takes !logical decisions. This unit can do additions, subtractions, etc. as a calculator and
in addition, it an also perform some logical functions.
Memory. The Memory Unit is where all data, intermediate and final results are stored.
The data, read from an input unit or a mass storage unit are transmitted to the
computers memory unit where they are available for processing. The memory unit is
used to hold the instructions to h executed (say program) and the data to be processed.
Control Unit. This controls and coordinates the activities of all other units of a
Computer System. It performs the following functions:
1. It can get instructions out of the Memory Unit
2, Itcan decode the instructions.
3. It sets up the routing, through the internal wiring, of data to the correct place at the
correct time.

4. It can determine the storage from where it is to get the next instructions after the
previous instruction has been executed.
2. Memory
A computer system also has storage areas, often referred to as memory. The memory
can receive, hold, and deliver data when instructed to do so. Data that are being
processed are held in primary memory (also called working memory or primary
storage), which is capable of sending and receiving the data at very high speeds.
Secondary memory (also called long-term memory or secondary storage), stores data
not currently being used and operates more slowly, but it is capable of storing large
volumes of data. This form ofstoragestores the data permanently in the given media and
examples are floppy diskettes, magnetic disks, magnetic tapes, magnetic drums, etc.
3. Input devices
Data are entered into the computer system by means of an input device. The keyboard
is one of the most common input devices. Other common ones include readers of
punched cards, paper tape and magnetic tape, magnetic disk, light per, optical
scanners, MICR (Magnetic Ink Character Recognition), OCR (Optical Character
Recognition), and the mouse. There are also unusual input devices that respond to
voices and to touch. On touch-sensitive screens, the user simply touches the location
on the screen where the description of the desired operation is displayed; the computer
senses where the screen has been touched and performs the indicated operation.
In order for the computer system to process details of each command, the command
will ha.ve to be converted into a machine-readable format and this is done through input
unit. This unit will transmit the data as a series of electrical pulses into the computers
memory unit where it will be available for processing. The input device translates data
into a code that can be readby the computer systems electronic circuitry. Some input
devices, such as the keyboard, enable the user to communicate directly with the
machine. Others require data to be first recorded on an input medium such as paper or
magnetized material.
4. Output Devices
When a program is executed and the results computed, those results must be made
available in a human readable form. The computer system needs an output device to
communicate the processed information to the user. The output device translates
processed data from a machine-coded form to a form that can be read and used by
people. The most common types of output devices are the monitor, which resembles a
television screen, and the printer, which prints copy form the computer onto paper,
magnetic tape, magnetic disk and floppy diskette. Another common output device is the
graphics plotter, which produces graphs, charts, or technical drawings on paper. A new
type of output device being developed now is the speech synthesizer, a mechanism
attached to the computer that produces verbal output sounding almost like human
speech.

SOFTWARE
Software is any set of instructions that tells the hardware what to do. It is what guides
the hardware and tells it how to accomplish each task. Software is a set of programs
which is stored in the external storage in the form of files. Comprises of Data and

Instructions.Files in which data is stored are called Data Files.Instruction files are called
as programs.
Some examples of software are web browsers, games, and word processors such as
Microsoft Word.
Anything you buy for your computer can be classified as either hardware or software.
Once you learn more about these items, computers are actually very straightforward.
A motherboard (hardware)
Microsoft Word (software)
Classification of Software. Software can be classified into:
i. System Software
Ii. Application Software
i. SYSTEM SOFTWARE
A computer comes to life because of the system Software. It manages storage and
retrieval of data, I/O operations etc.
One of the most important category of system software is the Operating System.
Eg., MS DOS, UNIX, WINDOWS, APPLE, MACHINTHOSH
ii. Application Software
Meant for specific application. Example : 1. Word processing. Preparation of letters,
documents etc. Provide features for (a) entering words, sentence etc.(b). Correcting the
entries.
Example: 2. Spread Sheets: For Mathematical calculations and preparation of graphs.
Popular Spreadsheet Software are:- (a) MS Excel
(b) LOTUS 1-2-3
e-TAILWARE :
It is a software for creating on-line catalogues, ordering forms, credit checking and
similar services for websites that sells goods and services to consumers.
Chapter 7

How does a computer store Data?


Data Hierarchy
Listed here in ascending order of complexity are the components of the data hierarchy
in an information system:
1.Bit
2. Byte
3. Field or item
4. Record
5. File or data set
6. Database
This is called a data hierarchy because databases are composed of files; files are
composed of records, and so on.
1. Bit. The term bit is short for binary digit. It can assume either of two possible states
and therefore can represent either a 1 or 0. In secondary storage a bit typically
represents datathrough the positive or negative polarity of an electrical charge on a

magnetic recording mediumsuch as tape or disk. Semiconductor storage is usually used


for primary storage. In semiconductor storage a bit is represented by an electrical circuit
that is either conducting or not conducting electricity.
2. Byte. The ability to represent only binary digits (bits) in a computer system is not
sufficient for business information processing. Numeric and alphabetic characters as
well as awide variety of special characters such as dollar signs, question marks, and
quotation marks,must be stored. In a computer system, a character of information is
called byte. A byte ofinformation is stored by using several bits in specified combination
called bit patterns. One widely used bit pattern for personal computers and data
communications is the American Standard Code for Information Interchange (ASCII).
ASCII uses seven bits to represent one character. Each 1 or 0 corresponds to a single
bit.Both RAM and Hard Disk capacities are measured in bytes, as are file sizes when
you examine them in a file viewer.
3. Field or item. The next level in the data hierarchy is a field or item ofdata. A field or
item of data is one or more bytes that contain data about an attribute of an entity in the
information system. An entity in apayroll system is an individual employee. Attributes are
the employeesname, pay rate, and so on. The basic pay is a field or item of data.
4. Record. A record is a collection offields relating to a specific entity. For example, a
payroll record contains fields of data relating to a specific employee. An analogy can be
made between a computer-based record and an individual folder in a manual file: A
folder in apayroll file may contain much the same information as a record in a computerbased payroll file. The field that identifies a record from all other records in a file is the
record key. For example, the record key in a payroll record is usually the employees
provident fund number or social security numberbecauseit is different for each
employee.
5.File. A file is a collection of related records. For example, the collection of payroll
records for all employees in a company is a payroll file. The concept of a computer file
is very similar to a manual file in a filing cabinet.
6.Data Base. A database consists of all the files ofan organization, structured and
integrated to facilitate update of the files and retrieval of information from them. The
term has often been used rather loosely. Technically a database consists of the files that
are part ofa data base management system. However, data base is often used to refer
to all the files ofan organization.
Finding Data in a File
There is basically two of the organization, those which allow sequential access to the
data and those which allow direct access.
1. With a sequential access file, records must be read in thesame order as they were
written to the storage media. The computer begins searching for a record by examining
the first record in the file and then sequentially examining the next record and so on until
the required record is located. Certain storage media like magnetic tape will allow only
sequential access to data. In order fora record to be found on a reel of magnetic tape,
the tape must be read sequentially, beginning with the first record.
2. On the other hand, a direct-access file allows immediate direct access to individual
records in the file. There are several techniques used to accomplish direct-access file
organization. Magnetic disks, such as floppy disks, are by far the most commonly used
devices for storing direct-access files. Direct access file organization must be used

whenever the application requires immediate access to individual records. It is widely


used today whenever the computer configuration includes CRT (Cathode Ray Tube)
terminals, which display management information on demand.
BITS AND BYTES
You might hear an advertisement that says, "This computer has a 32-bit Pentium
processor with 64 megabytes of RAM and 2.1 gigabytes of hard disk space.The easiest
way to understand bits is to compare them to something you know: digits.A digit is a
single place that can hold numerical values between 0 and 9.Digits are normally
combined together in groups to create larger numbers. For example, 6,357 has four
digits.It is understood that in the number 6,357, the 7 is filling the ones place," while the
5 is filling the 10s place, the 3 is filling the 100s place and the 6 is filling the 1,000s
place. So you could express things this way if you wanted to be explicit:
(6 * 1000) + (3 * 100) + (5 * 10) + (7 * 1) = 6000 + 300 + 50 + 7 = 6357
Another way to express it would be to use powers of 10. Assuming that we are going to
represent the concept of "raised to the power of " with the "^" symbol (so "10 squared" is
written as "10^2"), another way to express it is like this:
(6 * 10^3) + (3 * 10^2) + (5 * 10^1) + (7 * 10^0) = 6000 + 300 + 50 + 7 = 6357
What you can see from this expression is that each digit is a placeholder for the next
higher power of 10, starting in the first digit with 10 raised to the power of zero.Our
base-10 number system likely grew up because we have 10 fingers.But if we happened
to evolve to have eight fingers instead, we would probably have a base-8 number
system. You can have base-anything number systems.
In fact, there are lots of good reasons to use different bases in different situations.
Computers happen to operate using the base-2 number system, also known as the
binary number system (just like the base-10 number system is known as the decimal
number system). It can assume of two possible states and therefore can represent
either 1 or 0.Information is recorded in the form of binary digits.
Binary digits are popularly known as BITS.
Binary digits are made up of 0s and 1s.
Eg.110001 1010011 1111001
A set of 8 BITS is called a BYTE.
Eg., 10100011 Constituted a Byte.
Every character of information is represented by a Byte.A byte of information is stored
by using several bits in specified combination called bit patterns.One widely used bit
pattern for Personal Computers and Data Communications is American Standard Code
for Information Interchange (ASCII).ASCII uses seven bits to represent one character.
Each 1 or 0 corresponds to a single bit.
MEMORY MEASUREMENTS
The size of files or storage capacity of Disks etc., are measured in terms of Bytes.
0 or 1
= 1 bit
4 bits
= 1 Nibble
8 Bits
= 1 Byte
1024 Bytes
= 1 Kilo Byte (1 KB)
1024 Kilo Bytes = 1 Mega Byte (1 MB)
1024 Mega Bytes = 1 Giga Byte (1GB)
1024 GB
= 1 TB (Terra Byte)

1024 TB
1024 PB
1024 EB
1024 ZB
1024 YB
1024 BB

= 1 PB (Peta Byte)
= 1 EB (Exa Byte)
= 1 ZB (Zetta Byte)
= 1 YB (Yotta Byte)
= 1 BB (Bronto Byte)
= 1 Geop Byte

Memory Unit
Main function of a memory unit is to keep the data stored.
There are two types of memories in Computer.
1. Main Memory or Primary memory.
2. Secondary Memory or Internal Memory
Main Memory is temporary.
Secondary Memory is permanent.

Main Memory
Also known as Volatile Memory. It holds the data till the system is switched off. Data will
be lost when the system is switched off. Possible to store the data permanently in
Secondary memory. Secondary memory devices are:-Hard disks, CD, DVD, Floppy
Disk, Flash Memory etc. These are called Non-Volatile Memory
There are two types of Main Memory
1. RAM Random Access Memory
When the computer works, data is loaded through RAM and get updated.
2. ROM Read Only Memory
ROM is a chip containing programmes that helps working of the computer. This is Read
only memory while the system is working.
STORAGE UNIT
Storage unit is mainly classified into two: Primary memory and Secondary memory
(Secondary storage device).The function of a memory is to store programs, data or any
other kind of information.
The Primary memory is a fast memory. It store programs along with the data which
are to be executed. The main memory is directly accessed by the CPU.
Secondary memory or the auxiliary memory store application programs, data files,
operating systems etc. The CPU does not read information directly from the secondary
memory to the Primary memory. CPU reads them from Primary memory. The results
are also stored in the secondary memory. The secondary memory is the mass storage
memory. It is slow and cheap. The capacity of the primary memory is much smaller
than that of the secondary memory.
PRIMARY MEMORIES ARE CLASSIFIED IN TO RAM AND ROM
RAM (Random Access Memory)
It is the memory unit in which information can be written to and read from. Hence, it is
also known as Read/Write memory. During processing, data and instructions are in a
RAM chip. The micro processor accepts the contents of RAM and processes the data
according to the instructions. After processor, the results are also stored in RAM.
RAM is volatile ie., when power is turned off, the memory lose information stored in it.
There are two types of RAM chips:

i. Dynamic Random Access Memory (DRAM) and


ii. Static Random Access Memory (SRAM)
ROM (READ ONLY MEMORY)
Information is burned into the ROM chips at the manufacturing time. It cannot be
altered. It is not possible to write fresh information into a ROM chip. ROM chips are
used for application in which it is known that information never have to be changed.
PROGRAMMABLE READ ONLY MEMORY (PROM)
It is a variant of ROM. PROM can be programmed to record information using a facility
known as PROM programmer. However, once it has been programmed the recorded
information will not be changed. ie., PROM becomes a ROM and the stored information
can only be read.
ERASABLE PROGRAMMABLE READ ONLY MEMORY (EPROM)
Information stored in an EPROM chip can be programmed to record different
information using a PROM programmable facility. Erasing is achieved by exposing the
chip to ultra violet light. When an EPROM chip is in use in a micro computer, it behaves
like a ROM.
ELECTRICALLY ERASABLE PROGRAMMABLE READ ONLY MEMORY (EEPROM)
It is similar to EPROM chip in that it can be removed from the compiler and reprogrammed many times, where it differ from EPROM is that an electrical charge can
be applied for re-setting.
CACHE MEMORY
Cache memory is a relatively small amount (normally less than 1 MB) of high speed
memory that resides very close to the CPU. It is designed to supply the CPU with the
most frequently requested data and instructions. Having Cache memory can save a lot
of time as retrieving data from cache takes only fraction of the time taken to access it
from main memory. Today, most cache memory is incorporated into the processor chip
itself. Other configurations are also possible. Cache memory component is assigned
with level such as L1, L2, L3 and so on according to its proximity to the processor.
SECONDARY STORAGE DEVICE
Secondary storage overcomes the limitation of Primary storage. They are larger in size
and are non-volatile in nature. Examples of secondary storage devices are magnetic
tape, hard disk, floppy disk, optical disk etc. ALU (Arithmetic Logic Unit).It does all
arithmetical operations such as addition, subtraction, division and multiplication and
logical operations such as comparison, sorting, arranging etc. using <>= operation.
Data and instruction stored in main memory are transferred to ALU for processing. The
result is then transferred back to main memory . Other data move from primary memory
to Arithmetic Logic Unit and back again to Primary Memory before processing is over.

CONTROL UNIT
Control Unit control all other functional units depending on program instructions.
It selects each instruction from memory, interpret them and give direction to other
functional units to execute the instructions.
CENTRAL PROCESSING UNIT (CPU)
The Control Unit and ALU (Arithmetic Logic Unit) of a computer system are jointly
known as CENTRAL PROCESSING UNIT (CPU).The CPU is the brain of any computer
system.
Chapter 8
STORAGE DEVICES
As of 2011, the most commonly used data storage technologies are semiconductor,
magnetic, and optical, while paper still sees some limited usage. Media is a common
name for what actually holds the data in the storage device. Some other fundamental
storage technologies have also been used in the past or are proposed for development .
Storage devices are used to store data. There are two types of storage devices.
i. Sequential type of storage devices and
ii. Direct access type of storage devices.
Sequential type of storage devices store data one after the other and the last record
can be read or written when all the previous records have been read or written. The
magnetic tape and cassette are this type of storage devices.
Direct access type of storage devices any record can be accessed and time taken to
write or read any record will be the same irrespective of the fact where the record is
stored in the medium.
Magnetic Disk Pack, Floppy Disks and Hard Disks are this type of storage device.
These devices are costly as compared to magnetic tapes and cassettes.
MAGNETIC TAPES
Magnetic tape is a secondary storage device which can hold large volume of data in it.
The tape is in a sequential access medium and data on it can be accessed one after the
other.
Large files are stored on them. It is one of the most popular storage media because of
its low cost. The magnetic tape is made up of a thin plastic ribbon coated on one side
with Ferro magnetic material. It is in width and over 2500 feet long. The coated side
of the tape is usually divided in to nine horizontal rows called tracks. Along the width of
the tracks every character is stored with one bit in each track.
MAGNETIC DISK
Magnetic disc has surface in circular shapes coated with a magnetic material. A number
of invisible concentric rings or tracks are created by formatting a disk. On these tracks
data are stored in the form of magnetic spots. The number of tracks and density of
tracks differ on different types of disks. The surface is divided into a number of sectors.
Any area of the disk surface can be identified by its track number and sector number.
This enable us to directly address the disk. The disk is rotated at a very high speed by
the disc drive. The read write head move in and out on the surface of the disk and can

be easily placed over any track of the surface. When the required sector come under
the read/write head, data can be written or read. Specs of dust or grease of palm can
spoil the head and can cause what are known as head crash. Hence disks must be kept
fee of dust and moisture. When handled carefully, data can remain on the disk surface
permanently.
HARD DISK
Hard Disk is another type of magnetic storage media. It is made up of light metal like
aluminum usually of 14 in diameter and coated with magnetic material. They come in
packs of 5 to 10 layers of disks. Disk packs are mounted on a common shaft and made
to spin in union at a very high speed. These Disk packs have a common accessing
mechanism with number of arms and read/write heads. The arms move in union.
All the disk surfaces except the upper surface of the upper most disk and lower surface
of the lowermost disk are used for storage. Each surface is provided with its own
read/write head which can easily be placed on any track on the surface.
Data transfer rate of disk packs is very high.
STORAGE CAPACITY
The more disk surfaces a particular disc pack has, the greater will be its storage
capacity. But the storage capacity of disc system also depends on the track per inch of
surface and the bit per inch of track. Although the diameter of a standard size disk is
14, some disks are quite large running up to 4 feet in diameter. Large disks have more
tracks and hence, have greater storage capacity.
FLOPPY DISK
Dr.YoshiroNakamats is the inventor of Floppy Disk .Floppy Disk is made up of Flexible
Plastic and is light and easily portable. It comes in two sizes: 5 and 3.5 diameter.
The disk, also known as diskettes are popular with Personal Computer (PCs) and micro
computers.Floppies have contributed enormously towards making micro computers, a
popular machine for use of business and education. Without this method of storage, we
would have to rely on such primitive methods such as punch cards and cassette tapes.
Recording medium of floppies is a my lair or vinyl plastic material with magnetic coating
on one or both sides. These are called floppy because of their flexible property without
loss of data. These plastic disks coated with magnetic material are permanently sealed
inside a square plastic jacket to protect it from dust and scratches. An elongated notch
is cut in the jacket to enable read/write head access information from any area in the
hole. Floppies are mainly two types based on size. They are:(a) Mini floppy in 5 diameter.
(b) Micro floppy in 3 diameter.
Floppy Disks have different number of tracks depending upon the drive for which they
are used. Typically there are 77 tracks on a standard 8 diameter floppy. The number of
tracks range from 35-40 in a mini floppy and 40-80 tracks on a micro floppy. The
maximum storage capacity of mini floppy is 1 Kilo byte and that of micro floppy 1-44
megabytes.

OPTICAL STORAGE MEDIA


Optical storage, the typical optical disc, stores information in deformities on the surface
of a circular disc and reads this information by illuminating the surface with a laser diode

and observing the reflection. Optical disc storage is non-volatile. The deformities may
be permanent (read only media), formed once (write once media) or reversible
(recordable or read/write media). The following forms are currently in common use:
CD, CD-ROM, DVD, BD-ROM: Read only storage, used for mass distribution of digital
information (music, video, computer programs)
CD-R, DVD-R, DVD+R, BD-R: Write once storage, used for tertiary and off-line storage
CD-RW, DVD-RW, DVD+RW, DVD-RAM, BD-RE: Slow write, fast read storage, used
for tertiary and off-line storage
Ultra Density Optical or UDO is similar in capacity to BD-R or BD-RE and is slow write,
fast read storage used for tertiary and off-line storage.
Magneto-optical disc storage is optical disc storage where the magnetic state on a
ferromagnetic surface stores information. The information is read optically and written
by combining magnetic and optical methods. Magneto-optical disc storage is nonvolatile, sequential access, slow write, fast read storage used for tertiary and off-line
storage.
3D optical data storage has also been proposed.
PAPER DATA STORAGE
Paper data storage, typically in the form of paper tape or punched cards, has long
been used to store information for automatic processing, particularly before generalpurpose computers existed. Information was recorded by punching holes into the paper
or cardboard medium and was read mechanically (or later optically) to determine
whether a particular location on the medium was solid or contained a hole. A few
technologies allow people to make marks on paper that are easily read by machine
these are widely used for tabulating votes and grading standardized tests. Barcodes
made it possible for any object that was to be sold or transported to have some
computer readable information securely attached to it.

Other Storage Media or Substrates


Vacuum tube memory
A Williams tube used a cathode ray tube, and a Selectron tube used a large vacuum
tube to store information. These primary storage devices were short-lived in the market,
since Williams tube was unreliable and the Selectron tube was expensive.

Electro-acoustic memory
Delay line memory used sound waves in a substance such as mercury to store
information. Delay line memory was dynamic volatile, cycle sequential read/write
storage, and was used for primary storage.

Optical tape
is a medium for optical storage generally consisting of a long and narrow strip of plastic
onto which patterns can be written and from which the patterns can be read back. It
shares some technologies with cinema film stock and optical discs, but is compatible
with neither. The motivation behind developing this technology was the possibility of far
greater storage capacities than either magnetic tape or optical discs.

Phase-change memory
uses different mechanical phases of Phase Change Material to store information in an
X-Y addressable matrix, and reads the information by observing the varying electrical
resistance of the material. Phase-change memory would be non-volatile, randomaccess read/write storage, and might be used for primary, secondary and off-line

storage. Most rewritable and many write once optical disks already use phase change
material to store information.

Holographic data storage


Holographic data storage:- Holographic data storage is a potential replacement
technology in the area of high-capacity data storage currently dominated by magnetic
and conventional optical data storage. Holographic data storage
Stores information optically inside crystals or photopolymers. Holographic storage can
utilize the whole volume of the storage medium, unlike optical disc storage which is
limited to a small number of surface layers. Holographic storage would be non-volatile,
sequential access, and either write once or read/write storage. It might be used for
secondary and off-line storage. See Holographic Versatile Disc (HVD).

Molecular memory
Molecular memory stores information in polymer that can store electric charge.
Molecular memory might be especially suited for primary storage. The theoretical
storage capacity of molecular memory is 10 terabits per square inch.
Disk mirroring, Storage replication and RAID
While a group of bits malfunction may be resolved by error detection and correction
mechanisms (see above), storage device malfunction requires different solutions. The
following solutions are commonly used and valid for most storage devices:
Device mirroring (replication) A common solution to the problem is constantly
maintaining an identical copy of device content on another device (typically of a same
type). The downside is that this doubles the storage, and both devices (copies) need to
be updated simultaneously with some overhead and possibly some delays. The upside
is possible concurrent read of a same data group by two independent processes, which
increases performance. When one of the replicated devices is detected to be defective,
the other copy is still operational, and is being utilized to generate a new copy on
another device (usually available operational in a pool of stand-by devices for this
purpose).

Redundant Array of Independent Disks (RAID) This method generalizes the device
mirroring above by allowing one device in a group of N devices to fail and be replaced
with content restored (Device mirroring is RAID with N=2). RAID groups of N=5 or N=6
are common. N>2 saves storage, when comparing with N=2, at the cost of more
processing during both regular operation (with often reduced performance) and
defective device replacement.
Network connectivity
A secondary or tertiary storage may connect to a computer utilizing computer networks.
This concept does not pertain to the primary storage, which is shared between multiple
processors to a lesser degree.
Direct-attached storage (DAS) is a traditional mass storage, that does not use any
network. This is still a most popular approach. This retronym was coined recently,
together with NAS and SAN.
Network-attached storage (NAS) is mass storage attached to a computer which
another computer can access at file level over a local area network, a private wide area
network, or in the case of online file storage, over the Internet. NAS is commonly
associated with the NFS and CIFS/SMB protocols.
Storage area network (SAN) is a specialized network, that provides other computers
with storage capacity. The crucial difference between NAS and SAN is the former
presents and manages file systems to client computers, whilst the latter provides
access at block-addressing (raw) level, leaving it to attaching systems to manage data
or file systems within the provided capacity. SAN is commonly associated with Fibre
Channel networks.
Robotic storage
Large quantities of individual magnetic tapes, and optical or magneto-optical discs may
be stored in robotic tertiary storage devices. In tape storage field they are known as
tape libraries, and in optical storage field optical jukeboxes, or optical disk libraries per
analogy. Smallest forms of either technology containing just one drive device are
referred to as autoloaders or auto changers.
Robotic storage is used for backups, and for high-capacity archives in imaging, medical,
and video industries.

Chapter 9

COMPUTER LANGUAGE
The term computer language includes a wide variety of languages used to communicate
with computers. It is broader than the more commonly-used term programming
language. Programming languages are a subset of computer languages. For example,

HTML is a markup language and a computer language, but it is not traditionally


considered a programming language. Machine code is a computer language. It can
technically be used for programming, and has been (e.g. the original boots trapper for
Altair BASIC), though most would not consider it a programming language.
Computer Language can be divided into two groups:
High-level languages and Low-level languages.
High-level languages are designed to be easier to use, more abstract, and more
portable than low-level languages.
Syntactically correct programs in some languages are then compiled to low-level
language and executed by the computer.
Most modern software is written in a high-level language, compiled into object code,
and then translated into machine instructions.
Computer languages could also be grouped based on other criteria.
Another distinction could be made between human-readable and non-humanreadable languages. Human-readable languages are designed to be used directly by
humans to communicate with the computer. Non-human-readable languages, though
they can often be partially understandable, are designed to be more compact and easily
processed, sacrificing readability to meet these ends.
Some Computer and Programming languages are: Ada, Machine language and
Assembly language, Basic and Visual Basic, C and Objective C,C++,C#, COBOL
DELPHI, Eiffel, Erlang, Forth, Java, Javascript and so on.
Computer cannot understand natural language.
Each and every problem to be solved by a computer has to be broken in to simple and
separate logical steps, which basically comprises of fundamental operation, Input
operation, arithmetic operation, logical operation and movement of information within
CPU.
Basically there are two types of languages: Low level language and high level language.
Low level language again divided into Machine language and Assembly language.

Machine Language
program written based on machine codes of processor and actual address (ie
combination of 1 and 0) are known as machine language.Machine language program is
the only one language, the computer understands, by using a translation program.
A program is a collection of instruction.
An instruction has two parts OPCODE and OPERAND
OPCODE is command or operation that tells the computer what to do.
OPERAND is the address from to the instruction or data is to be read/write.

Disadvantages
1. Machine Dependent: Program written to one computer cannot be used for another
one.
2. Difficult to Programme : In order to write a machine language program the
programmer should remember OPCODE and know the contents of different memory
location.
So writing of machine language is tedious and time consuming.
3. Difficult to modifying : It is very difficult to locate the correct errors and to modify.

Advantages
Machine language program can be executed very fast by the computer because these
instructions are directly understood by CPU. So, no translation is required.

Assembly Language Program


Program written, by using symbolic codes or mnemonic codes are known as Assembly
Language Program. Eg: LDA, ADD, SUB etc.
Assembly language program is also machine dependent.
Advantages
1. Easier to understand and use than machine language because it uses symbolic
codes instead of 1 and 0.
2. It saves lot of time and effort of programmer compared to machine language.
3. Easy to locate and correct errors that machine language.
Disadvantages
1. Machine dependent: Similar to machine language program - Assembly language is
also machine dependent that is program written for one model computer cannot be
used for other computer.
2. Difficult to program: Since Assembly language is machine dependent. The programer
must aware of condition of various registers and contents of different memory locations.
So knowledge of hardware is necessary.
3. It is time consuming.

High Level Language


Program written by using English words and mathematical symbols are known as High
Level Language Program. These are machine independent. It is also known as
problems oriented language.
Advantage:
1. Machine independent
2. Easy to learn and use because instructions are very clear.
Disadvantages:
1. It take more time to execute. Because, translation is necessary
2. Expensive hardware and software support required.
TRANSLATORS
1. Assembler
Assembler is a software which translates assembly language program into machine
language program. Input to translator is known as source program and output from
translator is known as object program.
Assembly Language
Source Program

Machine Language

Object Program

2. Interpreter
Interpreter is a software which translates- High level language program into machine
level language program. It translates each statements of high level language program

and execute it immediately. Then translates next statements. It is time consuming


because each line is translated every time it is executed.
3. Compiler
Compiler is a software which translates high level language program into machine
language program. It first translates the complete program into machine instruction and
then executes from first step onwards. Usually compiler is used to translate large
program which require large memory space.
:
OPERATING SYSTEM
Operating system is a master computer program.
Acts as an interface between the user and the computer.
The functions of an operating system
Command interpretation
1. Accepts data and commands from the user
2. Translates the instruction to the machine understandable form
3. Instructs the computer to do the necessary work.
4. Returns the result to the user.
Manages file operations
Creating a file (b) Deleting a file (c) Modifying
Manages Input/Output Devices
(a) Takes the data entered through the key board and gives to the machine for
processing
(b) Displays the results on the screen (VDU)
(c) Prints the output on the printer.
Boots the system
(d) A program is permanently stored in all the machines
(e) This program is called BlOS (Basic Input Output Service)
(f) The operating system instruction will be copied into the memory by BIOS
(g) These instructions will set up in the machine
BOOTING
Booting is the process of loading the operating system from secondary storage device
to primary memory.
The term generally refers to starting a computer, ready to accept commands.
The system files are IO.SYS, MSDOS.SYS and Command.COM. First two files are
hidden.
There are two types of booting
1. Cold Booting - Switch off the power for cooling the circuit and restart the power after
sometime.
2. Warm booting - Pass the reset button or Ctrl + Alt + Del Single user Multi user system
Single user system only one user can work at a time. Eg : DOS
Multi user system - enable one or more users to work on the computer simultaneously.
Eg UNIX, NOVELL NET WARE, WINDOWS NT etc
DOS (Disk Operating System)

DOS stands for Disk Operating System. DOS was developed in 1981 with DOS 1.0
which was the operating system for the first IBM. PC.
A command specified the task to be done by the computer. DOS has more than 75
commands, which can be used to perform a variety of operations.
It is Single user system
Different flavours are available
Eg : MS DOS from Microsoft
Novel Dos from Novell
Current version of MS DOS is 7.0
A file system is divided into volumes. It is further subdivided into differ directories which
in turn is divided into files.
Volumes
(a) Logical division of disk
(b) A disk may contain different volumes
(c) Each volume will be identified by a name
Directories
Location.where the files are stored
Introduction to files:
Two files
(a) Data files - Collections of data
(b) Program files - Collection of instructions
Files are identified by names.
File naming rules
Components of file name
(a) Primary name
(b) Extension (secondary name)
Primary name and the extension are separated by a dot (.)
Primary Name
(a) Primary name can have up to 8 characters
(b) Can have any alphanumeric characters and special Characters @ # $ % ^ & *{} _!() (c) The following characters can not be used
>\ / I : ;, []<>+=and space
Extension (Secondary Name)
(a) Extension name is optional
(b) Can have a maximum of 3 characters
(c) Normally used for identifying the file type
Note : Give meaningful file names
DOS COMMANDS
Types of commands
Two Types
(a) Internal commands
(b) External Commands
Internal Commands
(a) These internal commands are in a file called command.com
(b) Loaded into RAM when the machine is switched on

(c) Can execute these commands without first having to load them form the disk into
memory
(d) Reside in computers memory till the machine is switched off.
External Commands
(a) Present as independent flies in the external storage (disk)
(b) When an external command is invoked
(i) MS DOS locates this command on the disk
(ii) Loads into memory
(Iii) Then gets executed
(c) If a command is spelt wrongly or if an external command file is missing. MS DOS will
display an error message Bad Command or File name.
(d) Some external commands are fdisk and diskcopy.
Some basic commands
VERThis command is used to display the version of t he system that is being used on the
machine. The version number increases with every new release and the later version
together with some additional features.
VOLIt is used to identify a volume. In MS-DOS, volume is nothing but a disk. The label name
can have up to 11 characters
DATE
This command is used to display the current system date and to modify if necessary
Syntax
Date (mm-dd-yy)
Time
This command is used to display the current system time and to modify if necessary
Time (hh: mm: ss: hs) (a/p)
Clearing the screen - Cls command
This command is used to clear the entire screen of the current display. The cleared
screen shows only the command prompt and the cursor at the top left corner of the
screen. CLS is an internal command
Get help for a command
To use this help, type the command name followed by a slash (1) and a question mark
(?) or type help followed by the command name Eg. ren/?
Dir command
Dir command is used to display the contents of the disk Directory
Syntax : dir.
It will display volume, label, serial number, directory name, file name, date of creation,
time of creation, file size, free space available and total bytes used
Dir/p page wise display
Dir/w - widthwise display
Dir/o - gives a sorted order list
Dir/o:d ascending order of date
Dir/I - display names of file and directory I lower case
Dir/b:n - ascending order of name Dir/o e ascending order of extension

Dir/o:-e - descending order of extension


Dir/o s - ascending order of size
Dir/a d - only directories are listed
Dir/a d - only files are listed
Directory
Each disk contains at least one directory named the root directory.
MSDOS uses a \ (back slash) to denote this.
MS DOS allows division of the root directory into sub-directories to organize files.
Every disk has one main directory under which all other files and directories are stored.
This directory is known as the root directory.
All the subdirectories and files reside under the root directory.
Directory Structure
On switching on the computer, DOS takes you to the Root directory.
In the above example under the root there are 2 sub directory; namely dir 1 and dir 2
and file named file 1.
As sub directory can also be called a child directory and directory that contains sub
directories can also be called as a parent directory.
Root is the parent of dir 1 and dir 2 and dir 4 is the child directory of dir 2.
Except for the root directory which is always represented by a back slash (\) each
directory has name.No two sub directories under the same parent can have the same
name.
MD Command
Directories are created using the MD or mkdir (make directory) command.
Syntax:- md <directory name>
CD command
This command is used to change the current directory from one directory to another.
Syntax: - Cd<directory name>
simple dot (.) represents the current directory.
Double dot (..) represents the parent directory
Cd.. >to go to parent directory
cd\...... > to change to the root directory, regardless of your current directory.
CD command without any arguments displays the current directory name- There are 2
ways by which we can create a file
1. Use copy con command
2. Using edit command
To create a file
Syntax : - Copy con <file name>
Using this command we can create small files from the key board.
Ctrl + z is used to save the file.
Edit command
It is used to create files. Its advantage over copy con command is that the file can be
edited.
Type Command
To view the contents of a file. Syntax : type<filename>
Ren command:
To change the name of a file. Syntax :Ren<old name><new name>

Del command
For removing files from the directory. Syntax: Del <file name>
/p - displays the name of the file which is about to be deleted. Asks for user permission.
Wildcard characters
There are two wildcard characters; * and ? (asterisk& question mark)
Characters used as a substitute to match a single or group of characters in a file name.
Useful when a command needs to be performed on a group of specific files.
* - Directs DOS to ignore the character position where the wild card appears as well as
all the character position that follow.
? - DOS ignores one character appearing in the same position as the ?
Eg. To list all files that has the extension .COM
Command : DIR *.COM
To list all files whose names begin with T.
Command: DIR T *.*
To list all files that are having 2 or less characters in its primary name.
Command : DIR ??.COM
To list all files that has A as the first character, the second character can be anything
and the third character should be C.
Command : DIR A?C.C
COPY COMMAND
Syntax : - Copy <source file name><destination file name>
Copy to an existing file overwrites the file . Copy command gives copy of an existing file.
Copies one or more files to another location.
Move Command.
Syntax: Move <source file name><destination file name>
To move one or more files
/y suppresses prompting to confirm creation of a directory or overwriting of the
destination.
/-y causes prompting to confirm overwriting of the destination.
Deltree
Deletes a directory and all the subdirectories and files in it. The directory which we are
going to delete need not be empty.
Syntax: Deltree<directory name>
/y suppresses prompting to confirm you want to delete the subdirectory.
DOSKEY
Edits command lines, recall command lines.
Up, down arrows recall commands. Esc clears current command. F7 displays
command history. Alt + F& clears command history
PROMT
Denotes the position on the screen where the command can be entered.A blinking
cursor will be present at this location.The default prompt of MS-DOS denotes the
currently active drive.
Syntax : prompt <text>
TEXT SPECIFIC NEW COMMAND PROMPT
Prompt

C>

Prompt $Q

Prompt $$

Prompt $t

Current time

Prompt $d

Current date

Prompt $v

Current version

Prompt SG

>

Prompt $L

<

Prompt $PSG

C:\>

Prompt $P

C:\(Current drive and path)

Creating batch files.


Batch files are executable files. Batch files are created with an extension.bat. When
batch files are created, a set of commands given in that files are executed one by one.
NUMBER SYSTEM
There are 4 types of number system. They are:
1. DECIMAL NUMBER SYSTEM (BASE OR RADIX IS 10)
2. BINARY NUMBER SYSTEM (BASE OR RADIX IS 2)
3. OCTAL NUMBER SYSTEM
(BASE OR RADIX IS 8)
4. HEXADECIMAL NUMBER SYSTEM (BASE IS 16)
BASE OR RADIX
NUMBER OF UNIQUE SYMBOLS OF A SYSTEM
ALL NUMBERS ARE THE COMBINATIONS OF THESE SYMBOLS
DECIMAL NUMBER SYSTEM
BASE IS 10
10 UNIQUE SYMBOLS OR DIGITS ARE :
0, 1, 2, 3, 4 ,5 ,6, 7, 8, 9
E g: FOR DECIMAL NUMBERS ARE: 100, 2(MSD)356(LSD)
ARITHEMATIC OPERATIONS USING DECIMAL NUMBERS:ADDITION,
SUBTRACTION, MULTIPLICATION AND DIVISION
BINARY NUMBER SYSTEM
BASE 2
UNIQUE SYMBOLS ( BITS ) : 0,1
8 BITS = 1 BYTE
BINARY POINT SEPARATES AN INTEGER AND FRACTIONAL PARTS
E g: 101.001 , 110, 1010,
Binary number system is used in digital computers.
COUNTING IN BINARY
DECIMAL NUMBER BINARY NUMBER
0
0000
1
0001
2
0010

3
4
5
6
7
8
9
10
11
12
13
14
15

0011
0100
0101
0110
0111
1000
1001
1010
1011
11 0 0
11 0 1
11 1 0
11 1 1

EASY WAY 2n

Objective type questions with answers on MS-DOS


1. What does DOS stand for? Ans: DISK OPERATING SYSTEM
2. Which are the functions of DOS?
a. Controlling the input and output operations b. Controlling the interaction
between the user and the computer c. Controlling the process of storing and
organizing different files d. ALL THESE e. none of theseAns:d
3. What do you understand by the term DOS?
a. The master control program of the computer which helps the computer to manage
the files b. The program which helps computer to check the various peripheral
devicesAns: both a and b
4. What was the latest version of MS-DOS that was released separately?Ans: 6.22
5. Which of the following statement is correct on MS-DOS?
Ans. (a) MS-DOS is a command driven operating system
(b) MS-DOS exhibits a system prompt represented C:\>
(c) MS-DOS is made up of external and internal commands (All these)
6. Which of the following is not a usual file extension in DOS?Ans: .O
7. What do you understand by booting?
Ans: the process of starting the computer from the power-off position
8. A bootable disk is _______?Ans: a disk that contains all the system files of DOS
9. What is the difference between cold booting and warm booting?
Ans: cold booting is starting the computer from the power off position warm booting is
the restarting the computer with CAD(control+alt+dlt)command or reset button when it
hangs.
10. Which files inMS-DOS contains internal command that are loaded during the
booting process? Ans: COMMAND.COM
11. What is the name of the batch file that is automatically run when MS-DOS is
booted? Ans: AUTORUN.BAT
12. FAT stands for . Ans: file allocation table
13. Which type of commands in MS-DOS needs additional files for their execution?

Ans: external commands


14. The REN command in DOS is used to? Ans: renamea file and its contents
15. The purpose of the MD command is to Ans: create a directory
16.The SCANDISK program .Ans: is a disk analysis and repair tool
17. The ATTRIB command will Ans: set or remove the read only ,archive, system
and hidden attributes
18. To display the current drive letter and directory name,you will use the following
command Ans: CD
19. The command CHKDISK will. Ans: analyze the directories, files and the file
allocation table
20. One of the following is not true for the COPY command
(a) One utility of the COPY is to combine files (b) when more than one is copied , MSDOS displays the filename of each file , which is being copied c. using wildcards the
command can be used to compare two files Ans: c
21. The DBLSPACE command is to Ans: compress existing disks whether they are
hard or floppy disks and create new compressed volumes
22. The function of DELTREE command is to
Ans:delete an entire directory that contains files,subdirectories or both
23. The purpose of the FORMAT command is to
a. create a new root directory and file allocation table for the disk b. locate and mark all
bad sectors on the disk c. prepare a floppy disk for use with the MS-DOS d. all of the
above Ans: d
24. The command LABEL
Ans: specifies disk volume label by permitting the user to create change or delete a
volume label on a disk
25. The MEM command
Ans: displays the amount of used and free memory on your computer
26. The MORE command is for
Ans: reading data from the standard input device and displaying a command output a
screen full at a time onto a standard output device and pause with a message MORE
27. The purpose of MOVE command is to
Ans: move one or more files to the location you have specified
28. The MSBACKUP command is to . Ans: It can also backup all files on a disk or
files that have changed since your last backup
29. The PATH command. Ans: specifies directories that MS-DOS is to search when
trying to locate executable files
30. The PRINT command
Ans: a. can print in the background if you have on output device connected to one of
your systems serial or parallel ports is used to print a text file
31. the REPLACE command
Ans: a. selectively copies files from a source file to the target disk b. adds new files to
the target disk if they are not already there c. replace the files in the target disk with
more recent versions of the files
32. The TREE command
Ans: displays the structure of the directories of the disk in the specified drive
33. The UNDELETE command

Ans: a. offers three levels of protecting files against accidental deletion is an External
command restores the files that were previously deleted by using the DEL command
34. The TIME command is used to display _ ______timeAns: US time
35. Which command in DOS is used to display the version of MS-DOS ?Ans: VER
36. Which command in DOS can be used to recover accidentally deleted files?
Ans: UNDELETE
37. Which of the following are best tools for fixing errors on disk..Ans: SCANDISK
38. Which command displays the list of all previous commands entered by the user?
Ans: DOSKEY
39. Which command displays name of files in sorted order?Ans: DIR\AN
40. Which switch should be used in the DIR command to view file directories?Ans: p
41. Which command in DOS is used to set a name to a disk?Ans: LABEL
42. VIRUS stands for Ans: Virtual information resource under seize
43. Which of the following file names are invalid in MS-DOS?
(a) MYFILE.DOS b).CHECK$(c)VERIFIED.### 3d.QWERTY.1?Ans: c
44. Which command can be used to recreate the disks, tracks, and sectors?
Ans: FORMAT
45. Which of the following statements is true in regard to DISKCOPY?
(a) COPY and DISKCOPY are same (b) DISKCOPY is a built-in command in DOS (c)
DISKCOPY can be used on hard disks (d) DISKCOPY can be used with a floppy and a
hard diskAns: c
46. Which of the following statements in regard to directories is false?
(a) directories with files can be deleted (b) directories can not be renamed (c) the root
directory is always at the highest level (d) directories can exist inside directories. ans:b
47. Which command can be used to recover accidently deleted files in MS-DOS?
Ans. UNDELETE
48. Which command can be used to display the version of MSDOS?Ans. VER
49.What is the switch that is used to make sure that the COPY commandcopied files
correctly?Ans: /V
50. What will be the output command PROMPT $L$P$GAns: LPG
51. MS-DOS is usually supplied on a Ans: floppy disk or disklettes
52. Which one of the following is not a DOS prompt a.C>b.B>c.A>d.ENTERAns: d
53. Which other following is not an internal dos command?
a. BACKUP b. COPY c.CLS
d. BREAKAns: A
54.Which among the following are true in regard to Directories?
Ans. (a) Directories with files can be deleted (b) The root directory is always at the
highest level (c) Directories can exist inside directories. (d) All these (Ans: d)
55. Which will be output of the command PROMPT $L$P$G?Ans. LPG
56. The DOS command, which cannot be executed with versions 1 and 2?
Ans: LABEL
57. Which one of the following file names is invalid in DOS?
(a) RIT.BAT (b) LISTEN.BIN (c) RLUA.BAT (d) TALK.BAS (Ans: C )
58.The capacity of the number of sectors and the number of files entries 3.5 inch floppy
for root directory in MS-DOS are respectively(assume the capacity to be 2.88 MB)
Ans: 15, 240
59. Which one of the following is /are internal DOS Command (s)?

Ans. (a) COPY (b) CLS (c) BREAK (d) All these
60. Which one of the following DOS command sends contents of the screen to an
output device?Ans. MORE
61. Which one of the following is a valid DOS command?
(a) RENAME A:SAMPLE.TXT (b) LIST???.??? (c) RECOVER A: (d) LIST **
Ans. (c) RECOVER A:
62. Which one of the following command is an internal DOS Command?
Ans. (a) REN (b) DATE (c) CLS (d) All these

Chapter 10

Microsoft Windows
Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems
developed, marketed, and sold by Microsoft. It consists of several families of operating
systems, each of which cater to a certain sector of the computing industry. Active
Windows families include Windows NT, Windows Embedded and Windows Phone;
these may encompass subfamilies, e.g. Windows Embedded Compact(Windows CE) or
Windows Server. Defunct Windows families include Windows 9x and Windows Mobile.
Microsoft introduced an operating environment named Windows on November 20,
1985, as a graphical operating system shell for MS-DOS in response to the growing
interest in graphical user interfaces (GUIs).Microsoft Windows came to dominate the
world's personal computer market with over 90% market share, overtaking Mac OS,
which had been introduced in 1984.
However, since 2012, thanks to the massive growth of smartphones, Windows sells less
than Android, which became the most popular operating system in 2014, when counting
all of the computing platforms each operating system runs on; in 2014, the number of
Windows devices sold were less than 25% of Android devices sold. However,
comparisons across different markets are not fully relevant; and for personal computers,
Windows is still the most popular operating system.
As of July 2015, the most recent version of Windows for personal computers, tablets
and smartphones is Windows 10. The most recent versions for server computers and
embedded devices are respectively Windows Server 2012 R2 and Windows Embedded
8. A specialized version of Windows runs on the Xbox One game console.
The next server version of Windows is Windows Server 2016, which is expected to be
released in early 2016.
Early versions

In November 1988, a new development team within began work on a revamped version
of IBM and Microsoft's OS/2 operating system known as "NT OS/2".However, following
the successful release of Windows 3.0, the NT development team decided to rework the
project to use an extended 32-bitport of the Windows API known as Win32 instead of
those of OS/2.

Windows 3.x
Windows 3.0, released in 1990, improved the design, mostly because of virtual memory
and loadable virtual device drivers (VxDs) that allow Windows to share arbitrary devices
between multi-tasked DOS applications.
Windows 3.1, made generally available on March 1, 1992, featured a facelift. In August
1993, Windows for Workgroups, a special version with integrated peer-to-peer
networking features and a version number of 3.11, was released. It was sold along
Windows 3.1. Support for Windows 3.1 ended on December 31, 2001.
Windows 3.2, released 1994, is an updated version of the Chinese version of Windows
3.1
Windows 9x
The next major consumer-oriented release of Windows, Windows 95, was released on
August 24, 1995. While still remaining MS-DOS-based, Windows 95 introduced support
for native 32-bit applications, plug and play hardware, preemptive multitasking, long file
names of up to 255 characters, and provided increased stability over its predecessors.
Windows 98
Windows 95 was followed up with the release of Windows 98 on June 25, 1998, which
introduced the Windows Driver Model, support for USB composite devices, support for
ACPI, hibernation, and support for multi-monitor configurations.
On September 14, 2000, Microsoft released Windows ME (Millennium Edition), the
last DOS-based version of Windows.
Windows NT
After early versions of NT, Windows NT 4.0 was released in June 1996, introducing the
redesigned interface of Windows 95 to the NT series. On February 17, 2000, Microsoft
released Windows 2000, a successor to NT 4.0. The Windows NT name was dropped
at this point in order to put a greater focus on the Windows brand.

Windows Vista
After a lengthy development process, Windows Vista was released on November 30,
2006, for volume licensing and January 30, 2007, for consumers. It contained a number
of new features, from a redesigned shell and user interface to significant technical
changes, with a particular focus on security features.
Windows 7
On July 22, 2009, Windows 7 and Windows Server 2008 R2 were released as RTM
(release to manufacturing) while the former was released to the public 3 months later on
October 22, 2009. Unlike its predecessor, Windows Vista, which introduced a large
number of new features, Windows 7 was intended to be a more focused, incremental
upgrade to the Windows line, with the goal of being compatible with applications and
hardware with which Windows Vista was already compatible.
Windows 8 and 8.1
Windows 8, the successor to Windows 7, was released generally on October 26, 2012.
A number of significant changes were made on Windows 8, including the introduction of

a user interface based around Microsoft's Metro design language with optimizations for
touch-based devices such as tablets and all-in-one PCs.
Windows 10
On September 30, 2014, Microsoft announced Windows 10 as the successor to
Windows 8.1. It was released on July 29, 2015, and addresses shortcomings in the user
interface first introduced with Windows 8.This new Windows must help our customers
be productive in both their digital work and their digital life. This new Windows must
empower people and organizations to do great things.

Fig.10.1. Wall paper of Windows 10


Multilingual support
Multilingual support is built into Windows. The language for both the keyboard and the
interface can be changed through the Region and Language Control Panel.
Platform support
Windows NT included support for several different platforms before the x86-based
personal computer became dominant in the professional world. Windows NT 4.0 and its
predecessors supported PowerPC, DEC Alpha and MIPS R4000.
Windows CE
The latest current version of Windows CE, Windows Embedded Compact 7, displaying
a concept media player UI.

Fig.10.1. Wall paper of Windows CE


Windows CE (officially known as Windows Embedded Compact), is an edition of
Windows that runs on minimalistic computers, like satellite navigation systems and
some mobile phones. Windows Embedded Compact is based on its own dedicated
kernel, dubbed Windows CE kernel. Microsoft licenses Windows CE to OEMs and
device makers. The OEMs and device makers can modify and create their own user
interfaces and experiences, while Windows CE provides the technical foundation to do
so.
Xbox OS
Xbox OS is an unofficial name given to the version of Windows that runs on the Xbox
One. It is a more specific implementation with an emphasis on virtualization (using
Hyper-V) as it is three operating systems running at once, consisting of the core

operating system, a second implemented for games and a more Windows-like


environment for applications.
Alternative implementations
Owing to the operating system's popularity, a number of applications have been
released that aim to provide compatibility with Windows applications, either as a
compatibility layer for another operating system, or as a standalone system that can run
software written for Windows out of the box. These include:

Wine a free and open-source implementation of the Windows API, allowing one
to run many Windows applications on x86-based platforms, including UNIX, Linux and
OS X. Wine developers refer to it as a "compatibility layer"[60] and use Windows-style
APIs to emulate Windows environment.

CrossOver a Wine package with licensed fonts. Its developers are regular
contributors to Wine, and focus on Wine running officially supported applications.

Cedega proprietary fork of Wine by TransGaming Technologies, designed


specifically for running Microsoft Windows games on Linux. A version of Cedega known
as Cider allows Windows games to run on OS X. Since Wine was licensed under the
LGPL, Cedega has been unable to port the improvements made to Wine to their
proprietary codebase. Cedega ceased its service in February 2011.

Darwine a port of Wine for OS X and Darwin. Operates by running Wine on


QEMU.

Linux Unified Kernel A set of patches to the Linux kernel allowing first-class
Windows executable files in Linux (using Wine DLLs) to use Windows drivers and be
faster than interpreted Wine.

ReactOS an open-source OS intended to run the same software as Windows,


originally designed to simulate Windows NT 4.0, now aiming at Windows 7 compatibility.
It has been in the development stage since 1996.

Linspire formerly LindowsOS, a commercial Linux distribution initially created


with the goal of running major Windows software. Changed its name to Linspire after
Microsoft v. Lindows.Discontinued in favor of Xandros Desktop.

Freedows OS an open-source attempt at creating a Windows clone for x86


platforms, intended to be released under the GNU General Public License. Started in
1996, by Reece K. Sellin, the project was never completed, getting only to the stage of
design discussions which featured a number of novel concepts until it was suspended in
2002.

The advantages of windows


1. Easy to learn
2. User friendly
3. File names can be 255 characters and space can be included.
4. The following symbols should not be used - <,>,?, , \
5. It is a 32 bit operating system.
6. Each application is run in separate windows
7. Allows the user to work on multiple application simultaneously
8. It is an operating system and application software.
9. OLE facility
10. Plug and play facility
11. Common menus

12. Runs in protected mode - Protected mode ensures that failure of any one program
does not halt the computer.
13. Facility to transfer data between different applications. That is we can create a
picture in drawing software and transfer to a letter typing software.
14. Advance features for networking and communication.
15. Drag & Drop facility
16. Requires proper shut down
17. Quick launcher section
18. Built in internet explorer
19. Active desktop
20. DVD Compatibility
21. Multiple monitors can be connected.

Windows Vs DOS
Windows offer many advantages-over DOS.
Some of them are
1. Pictorial interface
Items represented by pictures which are easier to remember.
2. Facility to run more than one application at a time. It is 32 bit processing Window.
When you start a program or application, a defined work area appears on the screen.
This defined work area is called a window. A window is a movable, resizable area in
which information is displayed and with which you can interact.
Programs
Programs are organized series of instructions that, when executed, causes a computer
to behave in a predetermined manner. Eg: Wordpad.
File
Each file is a collection of text or data saved under a unique name. Most of the
information stored on your computer is stored in file.
Folders
Folders are containers for programs, files and other folders that are used to organize
the information on your computer. A folder is represented in windows by a file folder
icon. Folders are equivalent of directories in DOS.
Dialog box
A dialog box is a type of window displayed by the windows operating system or by a
program, it requests your input or presents information.
Active:
Active is the state of the item (such as a window, icon, tab or button) that you select
using the mouse or the keyboard.
Using your mouse:
In addition to the keyboard, you can use a pointing device to give your computer
instructions . The most popular type of pointing device is the mouse. There are 4 basic
action; pointing, clicking, double clicking and dragging. The mouse controls a pointer
that identifies your location on the screen.
Clicking means pressing and releasing a mouse button onetime. Double clicking means
to press and release the lift mouse button twice in quick succession. For dragging an
object, first position the pointer over an object, press and hold down the lift mouse
button, move the mouse to the desired place on your screen. Release the button.

Dragging
Dragging is the procedure for moving or copying an object from one place to another on
the screen with the mouse. Click and hold down the mouse button while moving the
pointer to the new location, and release the mouse button.
Desktop
It indicates the entire screen as you see when windows8.1 has started.
Parts of desktop
l. Wallpaper 2. Objects or icons 3. Taskbar
When you first start windows, you see a screen, that entire screen is called desktop
and it is designed to look like the top of a real desk. You can write letters, create
drawings, or use a calculator while working on the desktop in the same way as you work
on the surface of a real desk.
Icon:
Windows desktop includes several small pictures. These are called icon. It is a small
graphic image that appears on your desktop or with in a program, which represents a
file, folder, command, program or web page.
Parts of the window
Control button : - The control button appears in the upper left corner of each window,
by using control menu commands you can resize, move minimize, maximize and
restore windows. Title bar: - shows the name of the applications or the document.
Minimize : The minimize button is used to reduce the window size.
Maximize : - The maximize button is used to maximize the window.
Restore: - The restore button is used to restore the window to its original size.
Menu bar: - The menu bar contains list of commands or actions you can carry out with
windows.
Scroll bar :- The scroll bar allows you to move parts of a document into view when the
entire document does not fit into the windows.

Shortcut keys
F1: Help
CTRL+ESC: Open Start menu
ALT+TAB: Switch between open programs
ALT+F4: Quit program
SHIFI+DELETE: Delete item permanently
Windows Logo + L: Lock the computer (without using CTRL+ALT+ DELETE)
CTRL+ C:Copy
CTRL+X: Cut
CTRL+V: Paste
CTRL+Z: Undo
CTRL+Y: Redo or repeat an action.
CTRL+ B: Bold
CTRL+U: Underline
CTRL+ I: Italic
SHIFT + right click: Displays a shortcut menu containing alternative commands
SHIFT + double click: Runs the alternate default command
ALT + double click: Displays properties

SHIFF+ DELETE: Deletes an item immediately without placing it in the Recycle Bin
F10: Activates menu bar options
SHIFT + F10 Opens a shortcut menu for the selected item (this is the same as rightclicking an object)
CTRL+ESC: Opens the Start menu
CTRL+ESC or ESC: Selects the Start button
CTRL+SHIFP+ESC: Opens Windows Task Manager
ALT+DOWN ARROW: Opens a drop-down list box
SHIFT Press and hold down the SHIFT key while you insert a CD-ROM to bypass the
automatic-run feature
ALT+SPACE: Displays the main windows System menu
ALT+ (ALT + hyphen): Displays the Multiple Document Interface (MDI) child windows
System menu
CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI)
program
ALT + underlined letter in menu Opens the menu
ALT+F4: Closes the current window
CTRL+F4: Closes the current Multiple Document Interface (MDI) window
ALT+F6: Switch between multiple windows in the same program
ALT +SHIFT +Tab: Switch to the previous window.
ALT+F5: Restore the size of the active window after you maximize it.
SHIFT+F6: Move to a task pane from another pane in the program window
(Counterclockwise direction).
CTRL+ F6: When more than one window is open, switch to the next window.
CTRL+SHIFT+F6: Switch to the previous window.
CTRL+ F10: Maximize or restore a selected window.
SHIFT +Tab: Move to the previous option or option group.
ALT+ PRINT SCREEN: Copy a picture of the selected Window to the Clipboard.
Tab: Move to the next option or option group.
CTRL +SHIFT +Tab: Switch to the previous tab in a dialog box.
ALT+ the letter underlined in an option: Select an option; select or clear a check box.
CTRL+LEFT ARROW: Move one word to the left
CTRL+RIGHT ARROW: Move one word to the right.
SHIFT+END: Select from the cursor to the end of the entry.
CTRL+F12 or CTRL+O: Display the Open dialog box.
F12: Display the Save As dialog box.
BACKSPACE: Open the folder one level above the selected folder.
F4 or ALT+I: Open the look in list.
CTRL+SPACE BAR: Display the full set of commands on the task pane menu.
CTRL+SHIFT+SPACEBAR: Create a non breaking space.
CTRL+SHIFT+HYPHEN: Create a non breaking hyphen.
CTRL+SHIFT+ <: Decrease font size one value.
CTRL+SHIFT+>: Increase font size one value.
CTRL+ [: Decrease font size 1 point.
CTRL+ ] Increase font size 1 point.
CTRL+ALT+V: Paste special.

CTRL+SHIFT+V: Paste formatting only


CTRL+N: Create a new document.
CTRL+O: Open a document
CTRL+W; Close a document.
ALT+CTRL+S: Split the document window.
CTRL+S: Save a document.
CTRL+F: Open the Navigation task pane (to search document).
ALT+CTRL+Y: Repeat find (after closing Find and Replace window).
CTRL+H: Replace text, specific formatting, and special items.
CTRL+ G: Go to a page, bookmark, footnote, table, comment, graphic, or other
location.
ALT + CTRL+Z: Switch between the last four locations that you have edited.
ALT+CTRL+P: Switch to Print Layout view. ALT+CTRL+O: Switch to outline view.
ALT+CTRL+N: Switch to Draft view.

Frequently asked questions


1. How to restart a computer? Press the combination of the Ctrl + Alt + Del keys on
the key board.
Select start; select shut down ; Select Restart" computer.
Press the Reset.
2. Windows XP is.? Ans: An operating system.
3. Which are the Standard icons present on the desktop?
My computer
Recycle Bin
Internet Explorer
4. Where is the Start button located? On the Task bar.
5. Why task bar is visible only when the mouse goes to the position it is situated?
Because the auto hides property of Task bar is on.
6. Maximize button is located on..? Ans:The Task Bar.
7. How to close a Window? Click on the Close button on the Title Bar. Select
File menu; Select Exit". Use short cut keys Alt + F4.
8. Windows icons.? : - Minimize, Maximize, Close
9. The currently open Windows or application running at any given time can be viewed
by the buttons (icons) indicated on the ..? Task bar.
10. To visualize the clock indicator on the Task Bar ..?
Ans: Choose the Show Clock option from the Task Bar properties.
11. Which is the default internet browser supplied with Windows 8 ? Internet Explorer
12. What is the right way to change the time settings from 12 hours clock to a 24
hours clock? Select start; select Settings ; Select Control Panel " ; Select
Regional settings; Click Time tab (change the settings)
13. How to view the names of all the most recently opened files or programs in
Windows? Click on the Start button; Select Documents.
14. By default, the files that are deleted are sent to? Recycle Bin
15. Options available under Sent to ? Ans: Mail recipient , My documents, 3
floppy, A:, CD RW drive G:

16. The currently open Windows or application running at any given time can be viewed
by the buttons (icons) indicated on the ..? Task bar.
17. To visualize the clock indicator on the Task Bar ..? Choose the Show Clock option
from the Task Bar properties.
18. Which is the default internet browser supplied with Window 8 ?Internet Explorer
19. What is the right way to change the time settings from 12 hours clock to a 24
hours clock? Select start; select Settings ; Select Control Panel " ; Select
Regional settings; Click Time tab (change the settings)

Chapter 11

MS- Word
The Word Application and Document Windows
Word is built around a set of interactive windows rectangular, on screen boxes through
which you communicate with the word program and create your documents. When you
start word, two windows appear on the screen, one nestled snugly within the other. The
larger of these, called the application window, frames the entire screen; you use it to
communicate with the Word program. (The terms program and application are
synonymous.) The smaller window, called the document window, fits seamlessly within
the application window; you use it to create and edit your Word documents.

The fig: 11.1 show the screen elements with which you need to be familiar when usingMS-Word.

Application window
The larger of the two start-up windows; it provides an interface between the user and
Word.
Document window
The smaller of the two start-up windows; it holds the currently active Word document.
Control-menu boxes
Located in the upper-left corner of the screen; they control the size and position of the
application window (upper box) and document window (lower box).
Title bar

Located at the top of the screen; it displays the name of the application (Microsoft Word)
and the active document (Document 1, in this case).
Maximize/Restore buttons
Located in the upper right corner of the screen; they control the size of the application
window (upper box) and document window (lower box).
Minimize button
Located to the left of the application maximize/Restore button; it reduces the application
window to an icon.
Menu bar
Located below the title bar; it lists the Word menu options.
Standard toolbar
Located below the menu bar; it provides quick access to Words most frequently used
commands and utilities.
Formatting toolbar
Located below the Standard toolbar; it provides quick access to Words most frequently
used formatting commands.
Ruler
Located below the formatting toolbar; it provides ongoing page measurement as well as
quick access to margins, tabs and indents.
Scroll bars
Located along the right side and bottom of the document window; they are used to
display different areas of the active document (each scroll bar contains a pair of
directional scroll arrows).
View buttons
Located to the left of the horizontal scroll bar; they are used to change the document
display to Normal view (leftmost button), page Layout view (middle button) and Outline
view (rightmost button).
Status bar
Located along the bottom of the screen; it displays a variety of information relating to
theactive document.
Using the Menu bar to issue commands
To perform a word processing task.(such as creating a document, retrieving a document
from disk, formatting test, printing a document and so on), you must issue the
appropriate Word command. You can do this by:
Using the mouse to choose the command from the menu bar.
Using the mouse to choose the command from one of the toolbars or the ruler.
Using the mouse to choose the command from a shortcut menu.
Using the keyboard to enter a keyboard shortcut.
For example, to italicize text, you select the text, and then you could
Use the mouse to choose the font command from the Format option in the menu bar,
and then select the Italic option.
Or
Use the mouse to click on the Italic button on the formatting toolbar.
Or
Use the mouse to choose the font command from the shortcut menu, and then select
the Italic option.

Or
Use the keyboard to enter Ctrl+I (press and hold the Ctrl key, press the IKey, and then
release both keys), the keyboard shortcut for italicizing text.
Please do not perform any of these actions now.
The menu bar is the only method that allows you to issue every available Word
command. The toolbars and the ruler provide a subset of Words most frequently used
commands, as do the shortcut menus and the keyboard. For this reason, well begin our
exploration of commands by using the menu bar approach.
The Basics of Entering Text
Word is a WYSIWYG (What-you-see-Is-what you Get) program; that is, the
screen shows you (more or less) exactly how your document will look when you print it.
WYSIWYG programs are not subject to the arcane codes and inaccurate page layouts
that plague non WYSIWYG programs. Words WYSIWYGness encourages you to
work in a visual-intuitive style in which you treat the word processor as a computerized
extension of a typewriter.
The Text Area
When you start Word, a new document window automatically opens, providing you with
a blank text area in which you can type your desired text, Word automatically selects a
whole lotof critical document settings, including margins, font and font size line spacing,
tab stops, page dimensions, and many other document attributes. Because Word
preselects these settings which are called defaultsyou can start to type
immediately, without first having to specify any of the settings yourself.
The characters you type are inserted in front ofa blinking vertical bar called the insertion
point. To move the insertion point and thus change where your typing appears in the
document you simply move the mouse pointer and click at the desired new place in
the text.
Word Wrap and the Enter key
The Enter key on your keyboard is similar to but not exactly the same as the
Return key on a typewriter. On a typewriter, you need to hit the Return key whenever
you want to end a line. In Word, when a word does not fit on a line, it automatically flows
to the beginning of the next line. This feature is called word-wrap. However, you do
need o press Enter to:
End a short line (one doesnt reach the right margin).
End a paragraph.
Create a blank line
Nonprinting Characters
You choose to have Word display a number of special characters on the screen that
show the places in the text where you pressed the spacebar, or the Enter and Tab keys.
These nonprinting characters (so called because they do not appear on paper when you
print the document) are often useful to see. This is particularly true when you are
working with heavily formatted documents and need to keep track of your tabs, spaces,
blank lines, and so on.
Using the Backspace Key to Delete Text
You can use the Backspace key to delete text one character at a time. Simply press
Backspace to delete the single character immediately to the left of the insertion point.
Editing a document

As mentioned in the introduction to this chapter, one of the strongest arguments for
switching from a typewriter to a word processor is the greatly increase ease of editing
your documents. In the time it would take you just to pencil your desires changes to a
typewritten document (without actually retyping it), you could incorporate these changes
into a word-processed document, print it out, and save it on a hard or floppy disk for
future revision.
By default, Word runs in insert mode; as you type, text to the right of the insertion point
is pushed further to the right to make room for your new text. To insert text in a
document, perform these two steps:
Place the insertion point (use the mouse to position the I-beam and click) where you
want to insert your new text.
Type the new text.
Selecting Text
At times, youll find it more convenient to work with a block of text than with a character.
For example, if you needed to underline a sentence in a paragraph, you would not want
to underline each character separately (a multistep, tedious task); rather, you would
want to underline the entire sentence at once (a single-step, straightforward task.)
To work with the block of text, you must first select it.
Deleting Text
As you know, Backspace deletes the characters to the left the insertion point. To delete
the character immediately to the right of the insertion point, press the Delete key (on the
cursor- movement keypad of an enhanced keyboard) or the Del key (on the numeric
keypad).
If you use the Del key on the numeric keypad, make sure that Num Lock is off (To turn
Num Lock on/off, press the Num Lock key.) If Num Lock is on, Del functions as a
decimal point key; when you press it, Word displays a period (.) on the screen instead of
performing the deletion.
Replacing Text
You already learned how to insert new text within document. At times, however, you
may want to replace existing text with new text. For example, you may want to replace
the standard letter salutation Dear sir or Dear Madam with To whom so ever it may
concern. One way you can do this is by inserting the new text and then deleting the old
text. This however, doubles your work and can grow very tiresome, particularly when
you are replacing many blocks of text. Fortunately, Word provides a more convenient
solution.
To replace existing text with new text
Select the text to be replaced.
Type the new text.
For this to work, your Editing option of Typing Replaces Selection should be checked
(selected).
Before you save it, a document exists only in computer memory, a temporary storage
area. For permanent storage, you must have the document as a file on a hard or floppy
disk. Word provides two commands you can use to save your documents: File, Save As
and File, Save. Lets explore the differences between these commands.
The file, Save As Command
You use the File, Save As command to save a document for the first time, to save a

document with a new name, or to save a document in a different location (on another
disk or in another directory)
To save an unsaved document using file, save as:
Choose File, save as (that is, choose the save as command from the file menu) to open
the save as dialog box.
In the drives and directories, list boxes; select the location (drive and directory) in which
you wish to save the document, if this location is not already selected.
In the file name textbox, type the name of the file.
Click on OK
If the summary info dialog box appears, fill it in (if desired), and then click on OK.
Observe the automatic save every _____ minutes option. If this option is unchecked
(turned off) that is, if the square box preceding automatic is empty- check it (turn it on)
by clicking on the square box to fill it with an X.
If the rectangular box between every and minutes does not contain the value 10, select
itscurrent value (by dragging over it), and then type 10.
Your option should now read automatic save every ten minutes. This means that word
will automatically save all your active documents every ten minutes.
Click on OK to close the options dialog box.
Naming a Document
When you save a document for the first time, you must name it. Follow these guidelines
when naming documents:
A file name can contain from one to eight letters, numbers, or the following special
characters:!#@$() {} A file name cannot contain spaces
A file name should be descriptive, so that you can remember the files contents (for
example, JANREPT rather than Xli 7-A).
Closing a Document
When you are finished working with a document - that is, after you have completed and
saved it you should close the document window. To do this, choose File, Close (or
double- click on the document window Ctrl-menu box).
Creating a New Document
After you have closed the active document, you are readyif you choose to create a
new document. To do this:
Choose file, New
Click on OK
Word will open a new, blank document window. Lets create a new document and then
save it:
Double-click on the document window CTRL-menu box (the lower of the two boxes in
the upper left corner of the screen) to close the document. Do not double-click on the
application window CTRL- menu box (the upper of the two boxes), as this would cause
you to exit word. You can choose file, close or you can double-click on the CTRL
menu box to close a document window.
Exiting Word
Your final step of every word section is to exit word. Never turn of your computer before
doing so, as this could result in the loss of one or more document and possibly corrupt
windows. To exit Word and return to Windows, choose File, Exit.

As a safeguard, if you have not saved the latest version of an active document, Word
will prompt you to do so before exiting.
Navigating in word
Navigate by using hyperlinks
When a Word publication or Web page contains hyperlinks to other locations for
example, to locations in the same file, or to files on the network or the Internet you
can move to these locations by clicking the hyperlink display text or image. When you
Point to the display text of a hyperlink, the pointer becomes a hand
In a file or Web page that contains hyperlinks, click the display text or image of a
hyperlink.
Shortcut keys
Ctrl + O : Toggles 6pts of spacing before a paragraph.
Ctrl + A: Select all contents of the page.
Ctrl + B : Bold highlighted selection.
Ctrl + C : Copy selected text.
Ctrl + D : Open the font preferences window.
Ctrl + E : Aligns the line or selected text to the center of the screen.
Ctrl + F : Open find box.
Ctrl + I : Italic highlighted selection.
Ctrl + J: Aligns the selected text or line to justify the screen.
Ctrl + K: Insert link.
Ctrl + L: Aligns the line or selected text to the left of the screen.
Ctrl + M : Indent the paragraph.
Ctrl + P: Open the print window.
Ctrl + R: Aligns the line or selected text to the right of the screen.
Ctrl + S: Save the open document. Just like Shift + F12
Ctrl + T: Create a hanging indent.
Ctrl + U: Underline the selected text.
Ctrl + V: Paste.
Ctrl + X: Cut selected text.
Ctrl + Y: Redo the last action performed.
Ctrl + Z: Undo last action.
Ctrl + Shift + L: Quickly create a bullet point.
Ctrl + Shift + F: Change the font.
Ctrl + Shift +> : Increase selected font + 1pts up to 12pt and then increase font +2pts.
Ctrl + ] : Increase selected font to 1pts.
Ctrl + Shift + <: Decrease selected font - 1pts if 12pt or lower; if above 12, decreases
font by +2pt.
Ctrl + [ :Decrease selected font - 1pts.
(b) Syntax error (d) Compiler error
Ctrl + I + c: Insert a cent sign (4).
Ctrl + Shift + *: View or hide non printing characters.
Ctrl + <left arrow>: Moves one word to the left.
Ctrl + <right arrow>: Moves one word to the right.
Ctrl + <up arrow> : Moves to the beginning of the line or paragraph.
Ctrl + <down arrow>: Moves to the end df the paragraph.

Ctrl + Del: Deletes word to right of cursor.


Ctrl + Backspace: Deletes word to left of cursor.
Ctrl + End: Moves the cursor to the end of the document.
Ctrl + Home: Moves the cursor to the beginning of the document.
Ctrl + Spacebar: Reset highlighted text to the default font.
Ctrl + 1: Single-space lines.
Ctrl + 2: Double-space lines.
Ctrl + 5: 1.5-line spacing.
Ctrl + Alt + 1: Changes text to heading 1.
Ctrl + Alt + 2: Changes text to heading 2.
Ctrl Alt + 3: Changes text to heading 3.
Alt + Ctrl + F2: Open new document.
Ctrl + F1: Open the Task Pane.
Ctrl + F2: Display the print preview.
Ctrl + Shift +>: Increases the selected text size by one.
Ctrl Shift + <: Decreases the selected text size by one.
Ctrl + Shift + F6: Switches to another open Microsoft Word document.
Ctrl Shift +F12: Prints the document.
F1: Open Help.
F4: Repeat the last action performed
F5: Open the Find, Replace, and Go To window in Microsoft Word.
F7: Spell check and grammar check selected text of document.
F12: Save As.
Shift + F3:Change the text in Microsoft Word from uppercase to lowercase or a capital
letter at the beginning of every word.
Shift + F7: Runs a Thesaurus check on the selected word.
Shift + F12: Save the open document. Just like Ctrl + S.
Shift + Enter: Create a soft break instead of a new paragraph.
Shift + Insert: Paste.
Key combinations used for find and find next
Ans. Ctrl + F and F3
Key combinations used for Replacing.
Ans. Ctrl + H
Short cut keys used for Go to
Ans. Ctrl + G
Key combinations used for select all text.
Ans. Ctrl +A
Key combinations used for inserting time/Date.
Ans. F5
Key combinations used for help menu.
Ans. F1
Key combinations used to go to file menu.
Ans. F10

OBJECTIVE TYPE QUESTIONS ON MS WORD


01. What is MS Word?

Ans. Word Processing Software


02. What tool works best for Word Processing?
Ans. Computer
03.Which of the following companies developed MS Office 2000?
Ans. Microsoft
04. MS- Word allows creation of ----- type of documents by default.
Ans. .DOC
05. Which of the following is the word processor in MS Office?
Ans. Word
06. Which of the following is not a part of a standard office suit?
Ans. File Manager
07. What word is used describe the act of correcting something?
Ans. Edit
08. Outlook Express is a ..?
Ans. (a) e-mail client (b) Scheduler (c ) Address Book (d) All these
09. What program is used in MS-Word to check the spellings?
Ans. Spellcheck
10. An animated character that give help in MS-Office is.
Ans. Office Assistant
11. Which of the program is not a special program in MS-Office?
Ans. (a) Office Art (b) Clip Art (c ) Word Art (d) Paint Art
12. Which of the following are valid minimum and maximum zoom sizes in MS-Office?
Ans. 10, 500
13. Which input device cannot be used to work in MS-Office?
Ans. Joystick
14. Which key should be pressed to start a new paragraph in MS-Word?
Ans. Enter key
15. MS-Office provides help in many ways. Which of the following are more close to the
answers?
Ans. (a) Whats this? (b) Office Assistant (c ) Help Menu (d) All these
16. Which of these toolbars allows Changing fonts and their sizes?
Ans. Format
17. Which bar is usually located below the Title bar that provides categorized options?
Ans. Menu Bar
18. What option will be used to change the word from tll to tall?
Ans. Insert
19. What should be done to change the word from kiil to kill?
Ans. Type over
20. What option is used to a paragraph at another place without removing it from the
first place?
Ans. Copy-Paste
21. What option is used to a paragraph at another place after removing it from the first
place?
Ans. Cut-Paste
22. To stand out a word what option can be used?
Ans. Bold

23. What does Ctrl + A result in a text?


Ans. Select all text
24. Which option may be used to change page size and margins?
Ans. Page setup
25. Which of the following is not a standard MS-Office edition?
Ans. Advanced
26. Which option in file pull down menu is used to close a file in MS-Word?
Ans. Close
27. Which type of files cannot be navigated using Clip-Art browser?
Ans. MP3
28. Which of the following is the latest version of MS-word?
Ans. Word-XP
29. What short cut keys are to be pressed to copy a selected text?
Ans. Ctrl + C
30. To make a selected word distinct and bold which keys are to be pressed?
Ans. Ctrl + B
31. A letter, memo, report or other files prepared by Microsoft Word is called a .
Ans. Document
32. The contents of a clip board remains the same until
Ans. (a) you copy other text (b) you cut another text (c) you shut down the computer
(d) All these
33. If you click on the undo button
Ans. It will remove the new text and restore the original text back to your document.
34. Macros are automatically set to use
Ans. Relative references
35. Using Microsoft Words Find and Replace feature you can
Ans. Replace text only
36. Graphics is inserted in
Ans. (a) BOX (b) Page (c) Frame (d) All the above
37. A graphic in a Word document can be
Ans. Sized using any of the sizing handles
38. The bar at the top of the window that bears the name of the window is known as
Ans. Title Bar
39. Name of newly created word document is
Ans. Document
40. To cut the selected text, these keys are to be pressed..
Ans. Ctrl + X
41. In MS-Word frame can include
Ans. (a) Graphics (b) Text (c) Tables (d) All the above
42. To select a sentence in MS Word, press this key and click anywhere in the
sentence. This key is ..
Ans. Shift
43. In MS Word RTF stands for
Ans. Rich Text Format
44. Which tool bar in MS Word, allows you to directly access Internet while working in a
Word document?

Ans. Web Tool Bar


45. In order to Italicize a selected text, which of the following keys are used?
Ans. Ctrl + I
46. In order to underline a selected text, which of the following keys are used?
Ans. Ctrl + U
47. On how many documents you can work simultaneously in MS Word ?
Ans. (a) one (b) Two (c) Any number (d) None of the above
48. User can use ..button to cancel the last editing.
Ans. Undo
49.New selected font is applied to
Ans. Selected text
50.Usage of Auto correct and Auto Text is restricted
Ans. To all the opened documents
51. In the mail merge option, the user
Ans. Can create a new or use an existing address list
52. Word automatically changes the font colour of these..
Ans. E-mail address, web address
53. In a page margins
Ans. Different section can have different margins.
54. What are the types of footers in MS Word ?
Ans. Only two types of footers, one for even page and another for odd page
55. Auto text can be used to insert . In document.
Ans. Text, Graphics
56. When embedding an object into a document, one of the following occurs
Ans. Embedded document becomes a part of the document
57. What can be pasted from the clipboard?
Ans. Whole of the contents of clipboard can be pasted
58. Macros stored in the global macro sheet can be used..
Ans. In any document
59. Table of contents can be prepared by using
Ans. Headings as H1, H2, H3 and more in the document
60. A major step before making print of the document is..
Ans. (a) to set paper settings (b) to see print view of the document (c) both (a) and (b)
61. You specify the save details of your file in the
Ans. save as a file dialog Box.
62. The steps involved to open a document are
Ans. Select the document to open from the file down menu
63. Word offers certain ways in which user can move around in a document
Ans. (a) by scrolling (b) by moving to specific page (c) directly to first and last pages (d)
All the above
64. In the split window mode, one title bar looks darker than the other, because
Ans. Darker title bar shows the active window
65. Soft page breaks
Ans. Are inserted by word automatically at the end of the page
66. Paragraph marks shows
Ans. That enter key is pressed at that point to mark the end of the paragraph

67. Selection of text can be from


Ans. (a) single word or line (b) a paragraph (c) complete document (d) All the above
68. New window command from the window menu will
Ans. Opens a new window that displays the same document (one which is already
opened)
69. New created entries for Auto text and auto correct entries, they are stored in
template document named as:
Ans. Normal
70. Context-sensitive drag- and -drop editing can be activated
Ans. With the smart cut-and-paste feature
71. When you move the mouse towards the left side of the window, it changes from an
I-beam to a right pointing arrow. This pointing area is referred to as:
Ans. Selection bar
72. save as dialog can be used
Ans. (a) for saving the file for the first time (b) to save file by some alternative name (c)
to save file in format other than Word (d) Any of the above
73. When user place the mouse pointer on any of the buttons and not click them, after
few seconds a text appears at the bottom of the pointer. It is called
Ans. Tool Tip Text
74. Replace option is available on
Ans. Edit Menu
75. Activating the spelling and Grammar checker
Ans. (a) it displays the misspelled words in a dialog box (b) highlights the misspelled
words in the document (c) allow user to either correct the misspell manually or correct
the spelling from a list (d) All the above
76. Which of the following is correct?
Ans. (a) Headers are printed on the top of margin and footers are printed at the bottom
of the margins (b) Headers and footers normally carry information like page number,
author name, dates, company name etc. (c) No Headers and footers are required in a
single page document (d) All the above
77. Word appears with a wavy red underline signifies
Ans. Word is unable to recognize those spellings.
78. Table in Word is a grid of rows and columns, with each cell can have
Ans. Text or graphics
79. Borders are used where user wishes
Ans. Ans. (a) to add emphasis to particular paragraph (b) to show paragraph in a box (c)
to surround the paragraph with different style boxes (d) All the above
80. Redo button is used to
Ans. Reverse an undo action
81. To select a line
Ans. Position the arrow pointer in the selection bar adjacent to the line and click the left
mouse button once.
82. To select a paragraph
Ans. Position the arrow pointer in the selection bar adjacent to the first line and click the
left mouse button twice.
83. To select the whole text

Ans. Position the arrow pointer in the selection bar adjacent to the first line and click the
left mouse button thrice.
84. On a split Box
Ans. Ans. The pointer changes to a double horizontal bar with up and down arrows.
85. Words count feature
Ans. ( a) provides information about the number of words in the document (b) is useful
when the length of the document is limited to some number of words (c) also displays
the number of pages, characters, paragraphs and lines in the document (d) All the
above
86. While typing in a paragraph, the user
Ans. Press enter key only at the end of the paragraph
87. Keyboard can be turned into Extend-Selection mode by pressing this
Ans. F8 key
88.Difference between Auto text and Auto correct is
Ans. (a) In the way they are created and put to use (b) to insert an Auto Text, user have
to type first four letters and then press enter key, where as in the case of Auto Correct,
user type the abbreviated name and the moment user press space bar key to move on
the next word or type a punctuation mark, Word automatically replaces the name with
its entry. (c) both (a) and (b)
89. Word allows user to import graphics from
Ans. Various graphics format like gif, bmp, png etc.
90. Which of the following statement is/are correct?
Ans. (a) Word allows user to use formulae command to perform calculation in a table (b)
Simple calculation in a table are add, sub, mul, div, etc (c) =SUM(ABOVE) formula
means that the word calculate the sum of the values of all the cells above the current
cell (d) all the above
91. Word displays dots, they represent
Ans. Space between words
92 . Using Print option
Ans. (a) entire document is printed (b) only current page is printed. (c) any number of
pages can be printed (d) all the above
93. Word automatically guesses correct spelling of intelligent, when the user has typed
the first..
Ans. 7 letters of intelligent.
94. Magnifier button is available on?
Ans. Print Preview tool bar
95. Formatting toolbar is applied to
Ans. Select both characters and paragraphs
96. Word appears with a wavy green underline signifies
Ans. That there is some grammatical problem in that word or sentence.
97. Which short cut menu can be used to correct spelling or grammar?
Ans. The menu which comes when user right clicks on the word with underline has
correct option for spelling or grammatical changes with an option for ignore also.
98. In the shading box the user select 25% to fill the box around the title with grey
colour. 25% means that shade will be made of,
Ans. 25% black dots and 75% white dots

99. After inserting a graphic in the document, a graphic eight sizing handles appears
around it. This handle can be used to..
Ans. Change size of the graphic ie., make it larger or smaller: trim the graphic: take print
and sizing handles does not appear.
100. It is the way text appear on a page. It is
Ans. Format
101.Purpose of arrange all option in Window menu is to
Ans. (a) align all paragraphs (b) align all open documents on screens for easy
accessibility (c) arrange files alphabetically (d) all the above
102. On selecting the replace option from the Edit menu, the dialog appears with this
name..
Ans. Find and Replace dialog box
103. Which one of the following is not permitted while naming a data source?
(a) letters (b) numbers (c) underscore, characters (d) spaces (e) None
Ans. (d) spaces
104.Which facility will help you to add precision and variety to your writing?
Ans. Thesaurus
105.Microsoft Word Thesaurus provides..
Ans. Synonyms and at times antonyms
106. How will Thesaurus facility provide variety to your writing?
Ans.Will provide list of related words and different forms of the selected word.
107. There are large number of templates provided by the Microsoft Word for,
Ans. (a) these templates are for generating business documents (b) they have many
built in formatting features (c) and user can add his own to the existing list (d) all the
above
108. Microsoft Word allows you to create interesting visual effects in your document
such as;
Ans. (a) allowing a text to wrap around picture by surrounding the graphics with a
frame.
109. Auto fit button
Ans. Format each column width to be only as wide as the text in the longest cell in a
column.
110. Zoon combo box on standard tool bar will ?
(a) zoom the whole document to the selected percent of the original size (b) zoom the
view of the document, but print will be still of the original size
Ans. Both (a) and (b)
111. Auto complete is a
Ans. Tip that helps to automatically complete the word or a text the moment you type
first four letters.
112. In the print pre-view Window
Ans. (a) User can see overall appearance of one page or all pages. (b) user can see
where text falls on a page before it continues on to the text page (c) once user
examines his/her document, user can make final adjustments to get layout as per
requirements. (all these)

Chapter 12

MS EXCEL
Introduction
Imagine a situation where the data pertaining to a large sales department of a large
company has to be stored. This company has offices in India, America, Germany and
England. In each country there are six Branch Offices. For example in India there are
two offices in Chennai, Mumbai and Delhi. There are 3 sales persons in each in 24
branch offices of the company. The details that are required to be stored are:
1.The personal data of sales persons in each of the office like the sales persons
number, name, address, date of joining salary etc.
2. The quarterly sales budget for the company.
3.The weekly sales status of the branch offices in terms of sales made in units and the
total amount of sales made.
4. Quarter wise performance of salespersons.
Traditionally, these details would have to be stored in registers over a number of pages.
In contrast to that a spreadsheet program can use its spreadsheet components to store
data in a matrix of rows and columns so that it can be used for further processing.
Further, the details stored are to be used for:
1. Analysis of budgets and projecting the future budget based on the existing one in
order to help the company to maximize profits.
2. Evaluating the performance of each of the branch office.
3. Calculating grand totals and subtotals of sales amount country wise, branch wise and
week wise etc.
4. Presenting the details in a graphical manner ( for example, plotting a graph of
amount of sales made by sales persons in all four quarters of the year). In the above
calculations, analysis, plotting of graphs was to be done manually, a lot of time and
efforts would have been required. More over there would have been no guarantee of the
accuracy of calculations and their results. Hence, to make all the above tasks easier
and accurate, a spreadsheet program like excel can be used.
Excel would then be used to store data in a grid of rows and columns, perform
calculations and analysis on the data and then present the data in a graphical manner.
This was just one of the situations where Excel could be used effectively. Some other
applications are mentioned later.
What is Spreadsheet?
A spreadsheet is a grid of rows and columns also called as a worksheet.
Earlier, spreadsheets where created manually with paper and pencils.
The worksheet was a desk. People had to use the earlier lined paper, graph
paper or regular line drawn on it manually to organize the columns of numbers on
the sheet and manipulate them.
Calculating, manipulating and analyzing data present in the sheet had to be done
manually.

Spreadsheet programs and applications

Spreadsheet programs are developed to automate tasks such as technical


calculations, inferential statistics, analyzing data. They also have a powerful

program for graphical preparation of numerical data.They are commonly used in


the following areas: 1. Production Planning
Production details can be stored using a spreadsheet program. This can be used to
plan productions schedules on a weekly or monthly basis. These schedules can then
be strictly followed in order to maximize production.
2. Personal Management
A spread sheet can be created to store the personal details like name, address, age,
date of joining, experience and salary. This spread sheet can thus be used as a ready
reckoner to retrieve details of a particular employee whenever required.
3. Marketing
Marketing data like the target sales for the entire year and sales achievements against
the targeted sales can be stored. This can be used to analyze the performance of
marketing personnel by comparing the achieved sales value against the target for the
year.
4. Pay Roll
The pay details like the employee number, employee name, basic pay, HRA, DA,
conveyance, deductions etc., of each employee can be stored in a single spreadsheet.
Using this, the net salary of each employee can be computed and salary slips be
generated at the end of every month.
5. Cost Accounting
This is an area where spreadsheet programmes are widely used. Spreadsheets are
used to store journal, ledgers, trial balance and balance sheets of the company in order
to determine net profits or net loss. Besides this, spreadsheet programmes are widely
used for:
1. Depreciation analysis
2. Order processing /invoicing
3. Tax assessment
4. Quality control
5. Preparation of Product Reports

Microsoft Excel and its features


Microsoft Excel for Windows is a powerful spread sheet application that can be used for
managing, analyzing and preparing data in a graphical manner.
Excel has three different components that perform three different tasks.
1.The Spreadsheet Component
It displays and analyses text and numbers in rows and columns.
2.The Database Component
It manipulates lists of information.
3.The Chart Component.
It produces chart which help to present data in a graphical manner .Each component is
a different way of looking at and interacting with data that has a common structure
based on rows and columns. This common structure is the spreadsheet.
This common structure of the data makes excel integrated. i.e. the ability to transfer
and manipulate data easily among the three components.

Excel Features
According to Microsoft, Excel is the most comprehensive spreadsheet application
available in the market. It is not just a tool for calculating, manipulating and analyzing
data but also a versatile organizational tool and an excellent one for presenting
information.
Excel has the following features:1. Worksheet and Graphics
It includes extremely powerful calculating features. Besides working with numbers and
texts, excel also provides for presenting data graphically. This helps to a large extent
for data analysis.
2. Data lists and Databases
Database functions are another important feature of Excel. Several effective functions
are available for working with data listed in a tabular form. There are functions for
evaluating, combining and if necessary, rearranging data lists.
For Example, to arrange personal data of 100 sales persons in the ascending order of
their names, so that salespersons numbers can be allocated to them, data can be
rearranged or sorted under excel.
3. Data Exchange with other applications
Excel uses the advantage of the windows environment. This especially applies to dynamic data
exchange (DDE) and Object Linking And Embedding (OLE) within excel and other windows
applications. As a result data, graphics, sound recordings, and animations can be easily mixed
in a single document.
4. Standardized user interface
Excel is a part of the Microsofts application package MS-Office, other products being Word and
Power Point. Except for a specific menu in each application, the menus in the main menu bar of
Excel, Word, Power Point is identical. The key combinations (for e.g. for cut, copy, paste etc.)
are also standardized. Most of the dialog boxes look similar. All options related to particular
command are combined in a single dialog box.
5. Workbooks
Finally, Excel works with the consistent file components. All data is gathered in workbooks.
These workbooks store current status of the work-space, along with all currently opened files
and settings selected for them.
How to load Excel?

Windows arranges pictorial representations called icons into categories called groups.
Each group has its own windows, which can be fully displayed or shown as an icon.
Windows places the excel icon in the Microsoft office group. To Load the Excel: Double
Click the Microsoft Excel icon in the Microsoft office group Or Use arrow keys on
numeric keypad to select Microsoft Excel icon and press enter.
When Excel is loaded, two windows appear which is nested one within the other.
The larger of these is called the Application Window, which frames the entire screen.
The application window is used to communicate with the excel program.
The smaller window is called the document window. This is used to create and edit
excel worksheet and charts. The excel application window is like a program manager. It
provides you with tools, commands and status messages.
Application Window
The application window of the excel has the following components.
1. Title Bar

It appears at the top of the Microsoft Excel window. On the left end of the title bar is a
box labeled with the bar, which opens the applications control menu. At the right end of
the title bar are two boxes, one labeled with a down arrowheads and the other stacked
up and down arrowheads. These buttons are minimize and restore buttons respectively
allows the user to shrink the Microsoft excel window to an icon and restore a window
icon to its former size.
2. Menu Bar
Below the title bar is the menu bar, which lists the names of nine menus .viz., File, and
Edit, View, insert, Format, Tools, Data, Window and Help. Each of these menus contains
commands that are used to give instructions to excel.
3. Standard Tool bars
They are positioned below the menu bar. The standard tool bar contains tool buttons,
which are used to carry out standard program operations. For example, spell check, cut,
paste, auto sum, sort etc.
4. Formatting toolbar
It is the bar below the standard toolbar. It contains tool buttons to choose frequently
used formatting commands. For example fonts, font-size, bold, italics etc.
5. Formula Bar
It is below the formatting toolbar and is made up of 3 parts, the reference area at the left
end shows the address of the active cell. The middle and the right areas are used to
display or edit data present in the cell.
6. Status Bar
It appears on the bottom of the window. The left part displays various messages
/prompts. For example the status message Ready includes that excel is ready to
accept data into the spreadsheet. Edit, indicates that excel is in the edit mode. There
is various other status messages the user can observe which are displayed by excel
from time to time. The right part displays keyboard status indicators. For example CAPS
NIJMS etc.

Document Window
The excel document window displays the currently active worksheet and the work book
in which it is contained. The document window contains the following .
1. Title Bar
It is the bar at the top of the document window. It displays the name of the work book.
2. Control Menu
Maximize/ Restore buttons and the minimize button , the same as explained above.
3. Sheet Tabs
The tabs at the bottom of the document window. These are used to select different
worksheets within the current workbook.
4. Worksheet tab scroll buttons
The set of boxes to the left of the sheet tabs. These are used to scroll through the
worksheet tabs.
5. Split Bars
The Black bars located along the vertical scroll bar and to the right of the horizontal
scroll bar. Split bars can be used to split the document window into panes that can be
scrolled separately enabling the user to view several areas of the worksheet at once.
6. Column Headings

The letters at the top of the worksheet columns. For eg., A,B,C, D, E.
7. Row Headings:
The numbers at the left of each worksheet row. For Eg. 1, 2,3,4,5.

The workbook
A workbook is an Excel file where the user stores his data. Each workbook consists of
several worksheets i.e. a workbook can be thought of as a file folder and a worksheet in
every page of a file folder. Hence, a workbook is said to be a part of the worksheets
grouped together. Labeled tabs called as sheet tabs identify the individual sheets of a
workbook. The advantages of organizing several worksheets into one workbook are: 1. Sheets that are belonging to a particular application can be stored in the same
workbook i.e. the data does not have to be stored separately.
2. As soon as a workbook is opened all its worksheets become automatically available.
When excel is started the first thing typically seen in a workbook named Book 1.
Book 1 is anew, unsaved workbook which excel displays by default.

The Worksheet
Excel organizes data in a single worksheet by location. The worksheet is displayed as a
grid of 16385 rows and 256 columns. Across the top of the worksheet are columns.
Across the top of the worksheet are column headers are labeled as A, B, C and so on till
Z. After Z, the columns are labeled as AA, AB, AC, AD.. .AZ, BA, BB. . .BZ. . .IA, IB,.., IV.
Down the left side are row headers labeled 1,2,3 and soon till 16384.
The intersection of the row and column is called as a cell. There are approximately over
4 million cells in a single worksheet and each can hold up to 255 characters, or up to
1024 characters in a formula. Light gray lines known as gridlines surround each cell.
Each cell is identified by a cell address, which is made up of a row and a column
number. The address of the first cell in a worksheet is Al and that on the last cell is IV1
6384. The cell address of fourth row and second column is B4.The Active cell is the cell
in which one starts typing data. Only one cell can be active at a time and shown by
heavy border.

Moving Around the worksheet


1. With the keyboard
The keyboard can be used to move quickly and easily on the worksheet. The direction
keys comprises of eight keys: the four arrow keys, Home, End, Page up, Page down
keys. These keys can be used in combination with Ctrl and Shift keys to enable the user
to move faster in the workbook.
2. With the Mouse
The user can move the mouse across the worksheet to any cell using the mouse.
This is done with the help of scroll bars present in the border of the worksheet.

Commands
Excel commands can be given in one of the following ways.
1. Choosing an option from Menu Bar at the top of the screen.
2. Choosing an option from the shortcut Menu.
3. Select a tool from the tool bar.
4. Wizards
Choosing an option from Menu Bar

Menus are primary means of having Excel perform tasks such as opening a file, copying
a group of cells, printing a worksheet or creating charts. Menus can be either invoked
using the key board or the mouse.
1. With the Key Board
To invoke a command from the Menu Bar using the key board:
a) Hold down the key and press the key that corresponds the underlined character
among the options in the Menu Bar.
Any of the options from the particular dropdown menu can be chosen by using the up
and down arrow key to position at an appropriate option and then pressing the enter key
by pressing the highlighted character of the options. Press Alt-f, the file drop down menu
opens.
Choose the new option.
b) Use Alt-F10 or /This activates the Menu Bar.
Now any of the menus can be selected by pressing the direction keys to move to the
correct menu and pressing Enter or by typing the underlined letter in the Menu. The
Menu Bar can be detected, so that control is returned to the worksheet by pressing the
Esc key.
2. With the Mouse
To invoke a command from the menu bar with the mouse, display a menu by pointing
the mouse pointer to the menu name and clicking the mouse button. This displays the
drop menu. Then, choose a command from the drop-down menu by pointing to the
desired option and then clicking the right mouse button. Click on file, the dropdown
menu is displayed. Click on new.
Shortcut Menus
By using the right mouse button, excel opens a shortcut menu that gives direct access
to the most commonly used command for whatever the user click on.
For example, clicking the right mouse button on the active cell will give you a shortcut
menu of editing and formatting options, as shown below.
Clicking the right mouse button on the toolbar will display the toolbar shortcut menu as
follows:
Shortcut menus are also available for manipulating toolbars, rows, columns, and sheets
as well as for editing and formatting charts and databases.
Commands from a toolbar
By default, Excel has a pair of toolbars as third and fourth bars on the screen. These
tool bars have a series of buttons that the user can simply click on to accomplish a task
that would otherwise take several steps with a menu on the keyboard. For example to
make a title bold with the toolbar the user can select the following button on the
formatting toolbar.

With the menu it would take not less than six steps. There are actually 14 toolbars in
excel 5. Each toolbar contains special tools for various activities. The standard and the
formatting toolbars are displayed turned-off or customized. i.e. tools can be added or
deleted.

Wizards

Wizards provide guidance and in some case a series of step-by-step procedures to go


through processes such as following : 1. Importing a text file Text import Wizard
2. Creating and editing a chart Chart wizard
3. Inserting a function- Function Wizard
4. Suggesting easier ways of doing tasks Tip Wizard
5. Building an interactive table from the data existing on the sheets Pivot Table
Wizard.
Understanding Ranges
In excel it is equally important to understand what ranges are in addition to
understanding how commands can be given. For executing majority of the commands in
excel it is a must to select ranges of cells, which would be affected by the commands.
Let us take a look at what the ranges are and how they can be defined.
What is Range?
A Range is a rectangular group of cells. The smallest range is a single cell, while the
largest encompasses all the cells in the workbook. A range can be containing cells from
a single sheet only or can include cells from adjacent sheets Only adjacent cells can
form a valid range.
All valid ranges from either a rectangle or rectangular solid. Slated or angular ranges
are not allowed.
Defining Ranges
Ranges are defined by the addresses of two opposite or diagonally paired corner cells
separated by a colon (:) or two dots (..). E.g. B4:H14 or B4..H14.Using ranges helps to
save them when performing various operations, such as copying, moving and
formatting. Many excel functions also use ranges as its arguments.
Selecting Cells
Mouse or the keyboard can select a cell or range of cells.
Entire Rows or Columns can also be selected with a single mouse-click.
To select a cell
With the mouse, move the pointer over the required cell and click. The heavy border
then surrounds the new active cell, indicating it is selected.
Move the pointer to cell E10 and click the mouse button.
With the keyboard, use the arrow keys to position at the required cell and then press the
enter key.
Move the pointer to cell A10 using the left arrow key and press enter.
If the exact address of the cell (which the user wants to make active) is known, then to
select it: Press F5 and type the cell address in the dialog box and enter to move the cell.
Click on the reference area in the formula bar and type in the cell address.
Try the above two methods, to make cell C24 active.
To select a range of cells
A range is a continuous, rectangular group of cells. To select a range of cells: With the mouse, move the mouse pointer to one corner of the range, hold down the
mouse button, and drag the pointer to the opposite corner of the range. The marked
range will be highlighted.
Make cell E4 Activate

Hold down the left mouse button and diagonally drag it across to cell G7.
With the keyboard, select the cell in any corner of the range and hold down the shift key
while pressing any one of the direction keys.
Make cell E4 active
Hold down the shift key and press right arrow and then the down arrow key to arrive at
cell G7.
To select entire columns and rows
Sometimes it is necessary to select entire rows and columns. Instead of selecting the
entire range, excel can select the entire rows and columns with the click on a mouse
button or keystrokes.
With the mouse
With the mouse, click on the column header, to select the entire row click its row
headers.
To select multiple rows and columns, drag the mouse pointer through their headers.
Place the mouse pointer on row label and click the mouse button, observe that the
entire mw is highlighted.
Place the mouse pointer on the column label A, drag it through columns B and C, by
holding the mouse button and release it. Observe that columns A, B and C are
highlighted.
With the keyboard, to select an entire row/row(s),
Select any cell in that row, hold down the Ctrl key and press spacebar.
To select an entire column/column(s), select any cell in that column, hold the shift key
and press spacebar.
Creating a workbook
Creating a workbook is a primary function in Excel and it is the first thing every user
needs to know. Each worksheet in the workbook can contain text, numbers, dates,
formulas etc. All informations that the user types on a sheet is stored in cells.
Each cell can hold unto 255 characters. When Excel recognizes that text is being typed,
it automatically left-aligns the text in the cell .(meaning it pushes text up against the left
side of the cell).When numbers are typed, Excel right-aligns them. This default
alignment (left or right) is called general alignment.
Entering Text
To enter text, the cell where data is to be entered is selected first (with the mouse or the
keyboard) and then the text is typed. The text is then terminated by pressing the enter
key or choosing the box with the check on it is the formula bar. The typed text appears
in the active cell as well as the formula bar. Note that the situation taken up in the
introduction at the beginning of this chapter, will be taken as a case study here.
Separate worksheets will be created for all the details that are to be stored.
Ensure that the worksheet is completely blank.
Entering Numbers
Excel gives a lot of flexibility to the user while entering numbers. Numbers can be
entered with columns, dollar sign, percent signs, and scientific notations. Excel converts
the entry into a number with unto 15 significant places. Numbers can include numeric
characters from 0 to 9 and any of the following special characters: + - 0, / $ %. E e
Following points should be noted while entering numbers: -

A comma can be included in a number like 1,000,000


A single period in a numeric entry is treated as a decimal point.
Negative numbers should be preceded with minus sign or should be enclosed within
parenthesis.
Entering fractions
Fractions can also form a part of the spread sheet. To enter a fraction: 1. The whole number and the fraction should be separated by a space.
For e.g. 2
If the fraction does not have the whole part: 2. A zero should be placed in front of the fraction. For e.g. 0 2/3
Entering dates
Excel treats dates in a special and a different way by establishing a date serial scheme.
This scheme allocates one number for every day from January 1,1900 to December
31,2078. Excel also provides formatting and formulas to convert a date serial number to
a specific calendar date. Internally Excel uses the unformatted date serial number.
However the date can be formatted in several ways to get a normal looking calendar
date.
For example when formatted with the date format mm/dd/yy, the serial numbers 34567
becomes 8/21/94.Make the cell E5 active and type the dates under the heading date of
joining in the format dd/mm/yy.
Entering Time
As in case of dates, excel has a scheme for calculating time: the time is added to the
date serial number as a decimal fraction of a 24-hour day.
Therefore, midnight is 0.0000000, noon is 0.500000, and 11:59:59 Pm is 0.999988.
Whenever date or time is entered automatically the cell format is changed from the
normal format to the appropriate date or time format.
Following pointes are to be noted while entering dates and times: 1. Excel ignores capitalization.
2. If the display of the time is to be done according to a 12-hour clock, type am, pm or
just ap (For e.g. 3:00pm). A space has to be included between the time and the letter.
Unless am or pm is not specified excel automatically displays time using the 24-hour
clock.
3. Date and time can be typed in the same cell separated by a space.
4. To enter dates, either a slash (/) or a hyphen (-) can be used as a separator.
Entering data in a series
Although, Excel 5 can perform several tasks, the user has to enter numbers and text
manually. However, Excel provides a solution to this time-consuming process.
Whenever, the user wants to fill a cell range with data that forms a series (for e.g. 1 2 3,
Mon Tue Wed or Jan Feb Mar) the data input can be automated. Using the Fill Handle
can do this. The Fill Handle is a black square located on the lower right corner of the
selected cell(s). This is called as the Auto fill feature.
To understand how the Auto fill feature is used to generate a data series follow the steps
below to fill month names in a range of cells.
1. Enter Jan into cell A1: 2. Point to the fill handle with the mouse, the mouse pointer will become a black cross.
3. Click and drag through cell A 12 and release the mouse button.

4. Immediately, the series of months from Jan to Dec will be filled into cells A1 through
A12.
Auto filling
In Excel, different types of data can be filled. To demonstrate this, enter the following
values:

Eg., 1. Select cells A1 through A8.


Select the fill handle and drag through cell D8.
The result will be as follows: The following values will now be auto filled:

Ascending or Descending series


Note that with Auto fill, either an Ascending or Descending series can be created.
To create an Ascending series, the fill handle has to be dragged to the right or to the
bottom neighboring cells and to create a descending series; the fill handle should be
dragged to the left or top neighboring cells.
Establishing an Auto fill trend
In the above two illustrations, each Auto fill was based on a single starting value. If two
or more values are selected as the starting range for an Auto fill, excel tries to determine
a trend and auto fills accordingly.
Select cells A1 through B4.
Select the fill handle and drag through cell E4.
The result will be as follows: Enter the values as shown in the figure below:

Note the Excel automatically fills the cells from C1 to E4 based on the trend that is even
values 2 and 4 are present in Al and B 1, so the next set of each values are 6,8,10.
A2 and B2 contains Jan and Apr where the difference between them is 2 months and
hence excel Auto fills with month names Jul, Oct Jan
(they also have differences of two months between them).
Similarly the Auto fill trend is automatically for the weekday at the time.
Creating Custom Auto fill list
Apart from the built in list, which are used to perform auto fill, excel, gives the user the
capability to create his own auto fill list. These are known as custom lists. For example
if list like north, east, west, south or high, medium, low are needed to by entered
frequently in to the worksheet then a custom auto fill will save the user a lot of time.
Defining Custom lists
To define a custom list:
1. Enter the list north, south, east, west into a (contiguous) range of cells, in a row
or column.
2. Select the range of cells containing the list.
3. Choose options, tools command and then select the custom lists tab.
4. Click the import button; the list will be displayed in the custom list box.
5. Click on OK
After the custom list is defined, to perform an auto fill command and one of the
values in the custom list should be entered and the fill handle can be dragged in any
direction. The edit and delete button in the option dialog box can be used to edit or
delete custom list.
Building Formulas
Field codes: = (Formula) field
{= Formula [Bookmark] [\# Numeric Picture]}
Calculates a number by using a mathematical formula.
You can use the Formula command (Table menu) to insert an = (Formula) field in a
table or in regular text.
Tip: If youre using a spreadsheet application, such as Microsoft Excel, embedding
all or part of a worksheet in a document is often easier than using the = (Formula)
field in a table.

Mathematical and relational operators


In an = (Formula) field, you can use any combination of values and the following
mathematical and relational operators.

Functions used by the = (Formula) field


The = (Formula) field can use values returned by the following functions.
Functions with empty parentheses can accept any number of arguments separated by
commas (,) or semicolons (;).
Arguments can be numbers, formulas, or bookmark names.
Note:The following functions can accept references to table cells as arguments:
AVERAGE () COUNT () MAX (), MIN (), PRODUCT (), and SUM ().

REFERENCING CELLS IN A TABLE


When you perform calculations in a table, you reference table cells as A1 A2, B 1, B2,
and so on, with the letter representing a column and the number representing a row.
Cell references in Microsoft Word, unlike those in Microsoft Excel, are always absolute
references and are not shown with dollar signs.
For example, referring to a cell as A1 in Word is the same as referring to a cell as
$A$1in Excel.

Reference individual cells


To reference cells in formulas, use a comma to separate

references to individual cells and a colon to separate the first and last cells in a
designated range, as shown in the following examples.

Reference an entire row or column


You can reference an entire row or column in a calculation in the following ways:
Use a range that includes only the letter or number that represents it for example,
1:1 to reference the first row in the table. This designation allows the calculation to
automatically include all the cells in the row if you decide to add other cells later.
Use a range that includes the specific cells for example, a1:a3 to reference a
column with three rows. This designation allows the calculation to include only those
particular cells. If you add other cells later and you want the calculation to include them,
you need to edit the calculation.
Reference cells in another table
To reference cells in another table, or to reference a cell from outside a table, identify
the table with a bookmark. For example, the field { =average(Table2 b:b) } averages
column B in the table marked by the bookmark Table2.

The following field subtracts from a value represented by the bookmark Gross Sales.
The numeric picture switch displays the results with a currency sign for example,
$14,786.17:
{= GrossSales-29, 897.62 \# $#, ##O.OO}
The following = (Formula) field computes the total number of pages in a document
whose page numbering starts at 47; it displays a result such as Page 51 of 92:
Page {PAGE} of {(47 - 1)+{NUMPAGES}}
The following examples refer to values in a table. Cell references refer to cells in the
table that contains the (Formula) field. If the field isnt in the referenced table, mark the
table with a bookmark and specify the bookmark, followed by the cell references.

Objective type Questions


01. Which is the latest version of excel? Ans: Excel XP
02. Which of the following is a popular DOS based spreadsheet? Ans: lotus 1-2-3
03. Files created with Lotus 1-2-3 have an extension ? Ans: .123
04. The default MS Excel file extension is.Ans: . XLS
05. Which of the following is the oldest spread sheet package? Ans: VisiCalc
06. An excel worksheet can have a maximum of____ number of rows. Ans: 65536
07.An excel worksheet can have a maximum of____number of colums. Ans: 256
08. MS Excel is a?Ans: Window based spread sheet package
09. In Excel the intersection of a column and a row is called.Ans: Cell
10. A collection of worksheet is called Ans: workbook
11. On saving a worksheet, the save as dialog box ..Ans: Is used for saving the file by some
alternative name
12. The file responsible for starting MS Excel is..Ans: EXCEL.EXE
13. Ctrl+Pg Up will take you to..Ans: Previous sheet
14. Ctrl+Cis equivalent to..
Ans: Copy
15. Ctrl+A does the following.. Ans: Select the entire worksheet
16. Ctrl+Ois.
Ans: open the existing file
17. Which command is used to closed the window in excel..? Ans: Alt+F4
18. Which command is used to close the workbook?
Ans: Ctrl+w
19. Which one is the shortcut key to saveAns: Ctrl+S
20. Shortcut to Go to option..
Ans: F5
21. In its default setting, an Excel work book is made up of sheets and the default number is..?
Ans: (a) 1 (b) 2 (c) 3 (d) 4 (e) 5Ans: (a) 1
22. In Excel each sheet in a work book is displayed as.
Ans: Tab
23. In its default setting, an Excel Margin tabs are set at
(a) 2.5 for top and bottom margins (b) 1.9 for the left and right margins (c) 1.3 for header and
footer (d) All the above (e) None of theseAns: (d) All the above
24. A worksheet can be opened by ..Ans: Clicking on the Open button
25. A worksheet is made of columns and rows, wherein
Ans: Columns run vertically and rows run horizontally
26. Anything that is typed in a worksheet appears ..
Ans: in both active cell and formula bar
27. Which area in Excel window allows entering values and formulas?Ans: Formula Bar
28. Shortcut to cut an objectAns: Ctrl + X

29. Which shortcut command is used to reach the next worksheet..Ans: page down
30.Command used to copy the formula not the value from one data to another.
Ans: paste special
31.Which short cut command is used to insert the current time?
Ans: Ctrl+:
32.Which short cut command is Command used to insert current date? Ans: Ctrl+;
33.Which short cut command is Command is used to calculate the total characters in a cell?
Ans: Len
34. Which short cut command is the short cut key to fill the value of just above cell?
Ans: Ctrl+D
35. Ctrl+I shortcut key for..Ans: changing the contents of a cell to italics
36. The formulas in excel are made up of. Ans: Arithmetical operators and functions
37 Which Command we will use to get the specified string from the left? Ans: Left
38. Which Command we will use to repeat a string certain time? Ans:proper
39. By which Command attach another package file in excel?
Ans: hyperlink
40. Which menu we can make database of our worksheet?
Ans: data
41. Which option we can show and print the gridlines?Ans: page setup
42. By Which menu we can make database of our worksheet data?Ans: data
43. Which Menu kept the fill command?Ans: Edit
44. Which Menu kept the Goal seek command?Ans: Tools
45. Which Menu kept the group and outline command?Ans: Data
46. In which table we find the pivot table command?Ans: data
47. By default the cell content alignment isAns: text left alignment and numbers right
48. To remove the grid lines the option is available under.Ans: Tools>options
49. Which sign is used to specify a cell range?Ans: : (colon)
50. Which sign we use to enter formula?Ans: =
51. In which tool bar will you find auto sum short button? Ans: standard bar
52. In which menu will you get the validation command? Ans: data
53. How many chart types available in excel? Ans: 14
54. From which tool bar we can change chart type? Ans: chart tool bar
55. By Which menu we can protect our worksheet? Ans: Tools
56. How many types of cell references are available in excel? Ans: 3
57. Which is the comparison operator? Ans: =
58. Menu has function wizard..Ans: Insert
59. By which you can ungroup the data? Ans. Data
60. Legends are used in Ans, Chart Wizard
61. How many types of drawing objects are available in drawing toolbar? Ans: 10
62. In excel,pie charts can be plotted on.Ans: Only one data series
63. The function TODAY()of excel enters the currentAns: system data only
64. The function of TODAY() of excel,enters the current..Ans: system data only
65. Excel worksheet data can be shared with word document by.a.Insrting an excel file into
word (b). Copy and paste excel worksheet into word document (c). Link excel data in a word
document (d).All the above Ans: (d)
66. To change the cell reference C4:C9 to an absolute row and column reference, we would enter
it asAns: $C$4$C$9
67. Excel uses another name for database.it is called as.Ans: list
68. A template is a.Ans: pattern of work sheet

69.Which one is the example of spreadsheet package?Ans: VisiCalc


70. Comments put in cells are called.Ans: cell tip
71. Which of the following is not a valid data type in excel?a).Number (b). Label (c) Character
(d). Date and time (e). NoneAns:(c) Character
72. Comments can be added to cells using.. Ans: Insert->Comments
73. Data can be arranged in a worksheet in an easy to understand manner using?
(a) Auto formatting (b) Applying styles (c) Changing fonts (d) All of these (e) None Ans: d
74. Multiple calculations can be made in a single formula using.Ans: Array Formula
75. How many characters can be typed in a single cell in excel?Ans: 65536
76 Which menu option can be used to split windows into two?
Ans: Window->split
77. Which elements of a worksheet can be protected from accidental modification
a). Contents b). Objects c). Sceneries d). All the above e). NoneAns: D
78. Getting data from a cell located in a different sheet is called ____?Ans: Accessing
79. A numeric value can be treated as a label value if it precedes with. Ans: Apostrophe ( )
80. Concatenation of text can be done using.. Ans: Ampersand(&)
81. A function in excel. a). Can be build using a function wizard (b). Is a shortcut formula
c). Is a readymade formula (d). All the above (e). None Ans: D
82. Excel can display upto___fields of a data from:Ans: 32
83. We can convert existing excel worksheet data and charts to an HTML document by using?
Ans: Internet assistant wizard
84. When we copy and paste excel data into word document
Ans: we will be able to edit the data using word editing features
85. When we embed excel worksheet into a word document.
Ans: Editing change the data and formatting gets changed in the original excel worksheet
86. What is meant by a clipboard?
Ans:It is a temporary storage in the computers memory and temporarily stores the cut or copied
data
87. The edit menu has an option clear in it,its sub menu has?
Ans: all formats,contents and notes
88. The purpose of undo button is to:Ans: remove the existing text and restore the pre-edited text
89. Using the chart wizard, we can quickly and easily turn our:Ans: data into charts
90. Page break command on the insert menu will result in insertion of page break;
Ans: above the selected row
91. When we print a worksheet, it automatically adds the
(a) Name of our worksheet file and the page number to the footer area (b)Name of our
worksheet file to the header area and the page number to the footer area (c) Name of our
worksheet file and page number to the header area (d) Name of our document and the page
number to the footer area (e) None Ans: E
92. Selecting landscape changes our page from.Ans: a tall to wide orientation
93. Selecting portrait changes our page from. Ans: a wide to tall orientation
94. In order to tell excel that we are entering a formula in a cell we must begin the entry with an
operator such as Ans: =
95. Scenario manager in excel is used to..Ans: Analyze data
96. When we create a chart on a separate sheet in the same worksheet is called a:Ans: Chart
sheet
97. The comparison operators used in excel to compute criteria are.. Ans: =,>,<,>=,<=,and <>

98. When excel copies a formula from one cell to another , It identifies the number it needs by:
Ans: position
99. The purpose of auto sum is to
(a). Total and range that we select (b). Locate and total the rows and columns in arrange nearest
to the current cell (c) Add grand totals to a range containing other totals (d) All the above (e)
NoneAns: D
100. To specify an absolute reference in a formula, ...
Ans. Enter a $ sign before any column letters or row numbers that should be kept constant in
formulas to be copied.
101. --------- chart is a variation of scatter chart.
(a) Pie (b) Bubble (c) Line (d) Doughnut (e) RadarAns:(d) Doughnut
102. A range is a rectangular group of cells. The smallest range is.
(a) A single cell (b) two cells (c) four cells (d) eight cells (e) none of theseAns: (d)eight cells

Chapter 13

Internet
Introduction
The Internet is a global system of interconnected Computer Networks that use the
standard Internet Protocol suite (TCP/IP) to link several billion devices worldwide.
It is a network of networks that consists of millions of private, public, academic,
business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless, and optical networking technologies.The Internet carries an
extensive range of information resources and services, such as the inter-linked
hypertext documents and applications of the World Wide Web (WWW), infrastructure to
support email, and peer-to-peer networks for file sharing and telephony.
Terminology
The Internet, referring to the specific global system of interconnected IP networks, is
a proper noun and written with an initial capital letter.In the media and common use it is
often not capitalized, viz. the internet. The Internet is also often referred to as the Net.
The Internet is a global network connecting millions of computing devices; the WWW is
just one of many services running on the Internet.

The Web is a collection of interconnected documents (web pages) and other web
resources, linked by hyperlinks and URLs.

Hypertext Transfer Protocol, or HTTP, is the language used on the Web for
information transfer, yet it is just one of many languages or protocols that can be used
for communication on the Internet.
In addition to the Web, a number of other services are implemented over the Internet,
including e-mail, file transfer, remote computer control, newsgroups, and online games.
All of these services can be implemented on any intranet, accessible to network users.

History
Professor Leonard Kleinrock with the first ARPANET Interface Message Processors at
UCLA.
Research into packet switching started in the early 1960s and packet switched networks
such as Mark I at NPL in the UK, ARPANET, CYCLADES, Merit Network,Tymnet,
and Telenet, were developed in the late 1960s and early 1970s using a variety of
protocols.
In an early sign of future growth, there were already fifteen sites connected to the young
ARPANET by the end of 1971.Early international collaborations on ARPANET were
sparse.
For various political reasons, European developers were concerned with developing
the X.25 networks. Access to the ARPANET was expanded in 1981 when the National
Science Foundation (NSF) developed the Computer Science Network (CSNET). In
1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a worldwide network of fully interconnected TCP/IP networks called the Internet was
introduced.
TCP/IP network access expanded again in 1986 when the National Science Foundation
Network (NSFNET) provided access to supercomputer sites in the United States from
research and education organizations, first at 56 kbit/s and later at 1.5 Mbit/s and 45
Mbit/s.
Commercial Internet service providers (ISPs) began to emerge in the late 1980s and
early 1990s. The ARPANET was decommissioned in 1990. The Internet was fully
commercialized in the U.S. by 1995 when NSFNET was decommissioned, removing the
last restrictions on the use of the Internet to carry commercial traffic.
The Internet started a rapid expansion to Europe and Australia in the mid to late 1980s
and to Asia in the late 1980s and early 1990s.The Internet continues to grow, driven by
ever greater amounts of online information and knowledge, commerce, entertainment
and social networking.
As of 31 March 2011, the estimated total number of Internet users was 2.095 billion
(30.2% of world population). It is estimated that in 1993 the Internet carried only 1% of
the information flowing through two-way telecommunication, by 2000 this figure had
grown to 51%, and by 2007 more than 97% of all telecommunicated information was
carried over the Internet.

Technology
As user data is processed through the protocol stack, each abstraction layer adds
encapsulation information at the sending host. Data is transmitted over the wire at the
link level between hosts and routers. Encapsulation is removed by the receiving host.
Intermediate relays update link encapsulation at each hop, and inspect the IP layer for
routing purposes.
Engineering Task Force (IETF).

The IETF conducts standard-setting work groups, open to any individual, about the
various aspects of Internet architecture. Resulting discussions and standards are
published in a series of publications, each called a Request for Comments (RFC), freely
available on the IETF web site.
The layers correspond to the environment or scope in which their services operate. At
the top is the application layer, the space for the application-specific networking
methods used in software applications
Below this top layer, the transport layer connects applications on different hosts with a
logical channel through the network with appropriate data exchange methods.
Underlying these layers are the networking technologies that interconnect networks at
their borders and hosts via the physical connections. The internet layer enables
computers to identify and locate each other via Internet Protocol (IP) addresses, and
routes their traffic via intermediate (transit) networks.
Last, at the bottom of the architecture is the link layer, which provides connectivity
between hosts on the same network link, such as a physical connection in form of
a local area network (LAN) or a dial-up connection.
The model, also known as TCP/IP, is designed to be independent of the underlying
hardware, which the model therefore does not concern itself with in any detail. Other
models have been developed, such as the Open Systems Interconnection (OSI) model,
that attempt to be comprehensive in every aspect of communications. While many
similarities exist between the models, they are not compatible in the details of
description or implementation; indeed, TCP/IP protocols are usually included in the
discussion of OSI networking.
The most prominent component of the Internet model is the Internet Protocol (IP), which
provides addressing systems (IP addresses) for computers on the Internet.
IP enables internetworking and in essence establishes the Internet itself. Internet
Protocol Version 4 (IPv4) is the initial version used on the first generation of the Internet
and is still in dominant use.
IPv6 is not directly interoperable by design with IPv4. In essence, it establishes a
parallel version of the Internet not directly accessible with IPv4 software.
This means software upgrades or translator facilities are necessary for networking
devices that need to communicate on both networks.
Indeed, the Internet is defined by its interconnections and routing policies

Routing
Internet packet routing is accomplished among various tiers of Internet service
providers.
Computers and routers use a routing table in their operating system to direct IP packets
to the next-hop router or destination. Routing tables are maintained by manual
configuration or automatically by routing protocols .Large organizations, such as
academic institutions, large enterprises, and governments, may perform the same
function as ISPs, engaging in peering and purchasing transit on behalf of their internal
networks. Research networks tend to interconnect with large sub-networks such
as GEANT, GLORIAD, Internet2, and the UK's national research and education
network, JANET.
General structure

Many computer scientists describe the Internet as a "prime example of a large-scale,


highly engineered, yet highly complex system". The structure was found to be highly
robust to random failures, yet, very vulnerable to high degree attacks. The Internet is
heterogeneous; for instance, data transfer rates and physical characteristics of
connections vary widely, and exhibits emergent phenomena that depend on its largescale organization.
Internet Governance
The Internet is a Globally Distributed Network comprising many voluntarily
interconnected autonomous networks. It operates without a central governing body.
The technical underpinning and standardization of the Internet's core protocols (IPv4
and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit
organization of loosely affiliated international participants that anyone may associate
with by contributing technical expertise.
To maintain interoperability, the principal name spaces of the Internet are administered
by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered
in Marina Del Ray California. ICANN is the authority that coordinates the assignment of
unique identifiers for use on the Internet, including domain names, Internet Protocol (IP)
addresses, application port numbers in the transport protocols, and many other
parameters.
The Internet Society (ISOC)
The Internet Society (ISOC) was founded in 1992, with a mission to "assure the open
development, evolution and use of the Internet for the benefit of all people throughout
the world".Its members include individuals (anyone may join) as well as corporations,
organizations, governments, and universities.
Modern uses
The Internet allows greater flexibility in working hours and location, especially with the
spread of un-metered high-speed connections.
The Internet can be accessed almost anywhere by numerous means, including
through mobile Internet devices.
Mobile phones, data cards, handheld game consoles and cellular routers allow users to
connect to the Internet wirelessly.
Within the limitations imposed by small screens and other limited facilities of such
pocket-sized devices, the services of the Internet, including email and the web, may be
available. Service providers may restrict the services offered and mobile data charges
may be significantly higher than other access methods.
Educational material at all levels from pre-school to post-doctoral is available from
websites.
For distance education, help with homework and other assignments, self-guided
learning, whiling away spare time, or just looking up more detail on an interesting fact, it
has never been easier for people to access educational information at any level from
anywhere. The Internet in general and the World Wide Web in particular are important
enablers of both formal and informal education.
Messages can be exchanged even more quickly and conveniently than via email.
Business and project teams can share calendars as well as documents and other
information.

The Internet allows computer users to remotely access other computers and information
stores easily, wherever they may be.
An office worker away from their desk, perhaps on the other side of the world on a
business trip or a holiday, can access their emails, access their data using cloud
computing, or open a remote desktop session into their office PC using a secure Virtual
Private Network (VPN) connection on the Internet.
Services
World Wide Web
This NeXT Computer was used byTim Berners-Lee at CERN and became the world's
first Web server.
Many people use the terms Internet and World Wide Web, or just the Web,
interchangeably, but the two terms are not synonymous.
The World Wide Web is only one of hundreds of services used on the Internet.
The Web is a global set of documents, images and other resources, logically
interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs).
URIs symbolically identify services, servers, and other databases, and the documents
and resources that they can provide.
Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide
Web. Web services also use HTTP to allow software systems to communicate in order
to share and exchange business logic and data.
World Wide Web browser software
World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web
page to another via hyperlinks embedded in the documents. These documents may
also contain any combination of computer data, including graphics,
sounds, text, video, multimedia and interactive content that runs while the user is
interacting with the page. Client-side software can include animations, games, office
applications and scientific demonstrations.
Through keyword-driven Internet research using search engines like Yahoo! And
Google, users worldwide have easy, instant access to a vast and diverse amount of
online information.
Compared to printed media, books, encyclopedias and traditional libraries, the World
Wide Web has enabled the decentralization of information on a large scale.
Publish ideas
The Web has also enabled individuals and organizations to publish ideas and
information to a potentially large audience online at greatly reduced expense and time
delay. Publishing a web page, a blog, or building a website involves little initial cost and
many cost-free services are available. Publishing and maintaining large, professional
web sites with attractive, diverse and up-to-date information is still a difficult and
expensive proposition, however.
Advertising
Advertising on popular web pages can be lucrative, and e-commerce or the sale of
products and services directly via the Web continues to grow.
Communication
Email is an important communications service available on the Internet.

The concept of sending electronic text messages between parties in a way analogous to
mailing letters or memos predates the creation of the Internet.
Pictures, documents and other files are sent as email attachments. Emails can be cced to multiple email addresses.
Internet telephony is another common communications service made possible by the
creation of the Internet.
VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all
Internet communication. The idea began in the early 1990s with walkie-talkie-like voice
applications for personal computers.
VoIP (Voice-over- Internet Protocol)
VoIP is maturing into a competitive alternative to traditional telephone service.
Interoperability between different providers has improved and the ability to call or
receive a call from a traditional telephone is available. Simple, inexpensive VoIP
network adapters are available that eliminate the need for a personal computer.
Voice quality can still vary from call to call, but is often equal to and can even exceed
that of traditional calls. Remaining problems for VoIP include emergency telephone
number dialing and reliability.
Currently, a few VoIP providers provide an emergency service, but it is not universally
available.
Data transfer
File sharing is an example of transferring large amounts of data across the Internet.
A computer file can be emailed to customers, colleagues and friends as an attachment.
It can be uploaded to a website or FTP server for easy download by others. It can be
put into a "shared location" or onto a file server for instant use by colleagues.
The load of bulk downloads to many users can be eased by the use of "mirror" servers
or peer-to-peer networks
Access and outages
Common methods of Internet access in homes include dial-up,
landline broadband(over coaxial cable, fiber optic or copper wires), WiFi, satellite and 3G/4G technology cell phones. Public places to use the Internet include
libraries and Internet cafes, where computers with Internet connections are available.
There are also Internet access points in many public places such as airport halls and
coffee shops, in some cases just for brief use while standing. Various terms are used,
such as "public Internet kiosk", "public access terminal", and "Web payphone".
Users
Overall Internet usage has seen tremendous growth. From 2000 to 2009, the number of
Internet users globally rose from 394 million to 1.858 billion. By 2010, 22 percent of the
world's population had access to computers with 1 billion Google searches every day,
300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube.
Social impact
The Internet has enabled entirely new forms of social interaction, activities, and
organizing, thanks to its basic features such as widespread usability and access.
Social networking and entertainment.
Social networking

Social networking websites such as Facebook, Twitter, and MySpace have created new
ways to socialize and interact. Sites like LinkedIn foster commercial and business
connections. YouTube and Flickr specialize in users' videos and photographs.
The Internet has been a major outlet for leisure activity since its inception,
Today, many Internet forums have sections devoted to games and funny videos; short
cartoons in the form of Flash movies are also popular
Cybersectarianism
Cybersectarianism is a new organizational form which involves: "highly dispersed small
groups of practitioners that may remain largely anonymous within the larger social
context and operate in relative secrecy, while still linked remotely to a larger network of
believers who share a set of practices and texts, and often a common devotion to a
particular leader. Collectively, members and practitioners of such sects construct viable
virtual communities of faith, exchanging personal testimonies and engaging in collective
study via email, on-line chat rooms and web-based message boards.
Internet blackout or outage
An Internet blackout or outage can be caused by local signaling interruptions.
Disruptions of submarine communications cables may cause blackouts or slowdowns to
large areas, such as in the 2008 submarine cable disruption. Less-developed countries
are more vulnerable due to a small number of high-capacity links.Land cables are also
vulnerable, as in 2011 when a woman digging for scrap metal severed most connectivity
for the nation of Armenia.

Censorship
Internet censorship by country
Substantial censorship
Selective censorship
Changing situation
Little or no censorship
Not classified / no data

Pervasive censorship
Some governments, such as those of Burma, Iran,North Korea, the Mainland
China, Saudi Arabia and the United Arab Emirates restrict what people in their countries
can access on the Internet, especially political and religious content. This is
accomplished through software that filters domains and content so that they may not be
easily accessed or obtained without elaborate circumvention.

Internet Explorer
Explore the Internet
Internet Explorer bring many features to Windows Desktop.
The ability to browse the Web from anywhere on your computer, the customizable Links
toolbar, the Explorer bar, the content Advisor and security zones for browsing the Web
safely.
Getting started
With an internet connection and Internet Explorer, you find and view information about
anything on the web.
Basic set up

If you aren't connected to the Internet or you want to create a new connection, click the
link,
Set up an Internet Connection
The Internet connection Wizard will provide you an easy way to get connected to the
Internet.

Model Questions and Answers on Internet


1. The vast network of computers that connects millions of people all over the world is
called
Ans. Internet
2. A user can get files from another computer on the internet by using
(1) HTP (2) HTTP (3) UTP (4) FTP (5) GifAns: (4) FTP
3. The key fields which are tested by a packet filtering firewall are.?
(1) Source IP address (2) TCP/UDP source port (3) destination IP address (4) All the
above (5) None of theseAns: (4) All the above
4. Use net discussion groups have their own system of organization to help you find
things just as _____
(1) Internet Excel (2) Archie (3) Gopher (4) UTP (5) None of these
Ans: (1)Internet Excel
5. Website is a collection of.
(1) HTML documents (2) graphic files (3) Audio and video files (4) all of the above (5)
None of these AnS: (4)
6. Which of the following protocols is used for WWW?
(1) ftp (2) http (3) http www (4) dbf (5) Gif
Ans: (2)http
7. The first network that formed initial internet was .
(1) NSF net (2) Vnet (3) ARPANET (4) Inet (5) E-NET Ans: (3)ARPANET
8. Most documents that appear on the World Wide Web are written in ?
(1) Hypertext Markup Language (1) Visual Basic (2) Jawa(4) Oracle (5) C++ Ans. (1)
9. ISDN is the . Services Digital Network which allows subscribers to speak to parties
face to face.(1) International (2) Integrated (3) Indian (4) Integral (5) Interconnected
Ans. (2) Integrated
10. What does NT in Windows NT stands for?
(1) Network Time (2) Netscape (3) Network Technology (4) New Technology (5) E-NET
Ans:(3) Network Technology
11.Which of the following has been created by research facility of Digital Electronic
Corporation of USA?
Ans. Yahoo, Alta vista & Web Crawler
12. Hot mail, a free web based e-mail service , is operated by which of the following
Companies?(a). Apple (b) Rediff (c) Microsoft (d) Yahoo (e) googleAns: (c)
13. What is sop-level domain name of the following URL?
http.//www.yahoo.com/mail/default.asp
(a). http (b) www (c) yahoo (d) .com (e) .aspAns: (c) yahoo

14. .are web addresses that users have asked web browser to remember for
convenient access in future.
(a). Favorites (b) URL (c) hyperlink (d) Domain name (e) None of theseAns: (a)
15. Which of the following servers have hosted the first World Wide Web in Aug,1991?
(a) IBM (b) Apple (c) google.com (d) info.cern.ch (e) yahoo.com Ans. (d)
16. Who was the British Computer Programmer designed the WWW .?
(a) Tim Boners Lee (b) Stev Jobs (c ) Stev Vosniac (d) Jowani Karlose (e) None of
these Ans:(a) Tim Boners Lee
17. MapQuest and Yahoo! Are examples of Software?
a) Entertainment b) Web-based application c) educational d) Multi media e)None of
these Ans:b) Web-based application
18.A browser is a
Ans. Software program especially designed for viewing web pages on the Internet.
19. What is the term for unsolicited e-mail?
Ans. Spam
20.The code for a web page is written using.. Ans. Hypertext
21. What is E-Banking?Ans. E-Banking implies provisions of Banking products and
services through electronic delivery channels like ATM, phone, Internet, Mobile phones
etc.
22. By clicking on this icon one can access the networked resources. This icon is
Ans. Connect to Internet
23. A multi purpose window which opens nearly for everything is Ans. Browser
window
24. What is meant by AOL?
Ans. (a) America On-Line used to be the largest Bulletin Board system in the world. (b)
With the advent of AOL.v3.0, AOL has become the largest INTERNET provider in the
World (c) AOL is also the largest provider of Blank Diskettes in the World (d) AOL is
available only in large metro areas (e) All theseAns: (e)
25.Which of the following has been created by research facility of Digital Electronic
Corporation of USA?
Ans. Yahoo, Alta vista & Web Crawler
26. Firewall is used in communication network / system to save from .

Ans. Unauthorized attack


27. What is web casting?

Ans. Transmitting the Video and Audio on the internet.


28.What is the function of a modem?

Ans. Converts analog signals to digitals and vice versa.


29.Networking using fibre optic cable is done as:

Ans. a).it has high band width b). it is thin and light c). it is not affected by electromagnetic interference/power surges etc.(d) All of these (Ans: (d) all of these)
30. Conference (net scape), net meeting (internet explorer) enables ?

Ans. Live real time Conferencing


31. e-commerce uses the following key standards / technologies

Ans. EDI (Electronic Data Interchange)


32. Which program is made by Microsoft and embedded with Windows and used to
view Web Document?

Ans. Internet Explorer

33. What is the name of the software that allows us to browse through web pages?

Ans. Browser
34. Which is the protocol automatically assign IP address to each computer as needed
by the network administrator ? Ans. DHCP
35. A set of security programs that protect a computer from outside interferences or
access via internet is. Ans. Fire wall
36. Which is the hypertext transfer protocol, which is giving importance to security, often
used in intra company internet sites? Ans. HTTPS
37. PDF is the acronym for ..
Ans. Portable Document Format
38. Which is the unique address which identify a computer in a network?

Ans. I P address
39. In which topology multiple communication channel exists between nodes?

Ans. Mesh
40. Which protocol is used for sending e-mail? ..
Ans. SMTP
41. Name the internet service used for publishing our idea ? Ans. Blogging
42. Introducing into a website without permission is.. Ans. Hacking
43. Which is the device used in network for strengthening or amplifying the signal ?

Ans. Repeater
44. Who is a Virus Author?

Ans. The programmer of a virus who intentionally writes a virus program.


45. What is a Virus?

Ans. It is a potentially damaging computer program that affects or infects a


computer negatively by altering the way the computer works without the users
knowledge or permission.
46. What is meant by Trojan Horse?

Ans. It is a malicious - logic program that hides within or look like a legitimate
program such as a screen saver.
47. What is an Antivirus program?

Ans. It is a utility that protects computer against viruses by identifying and


removing any computer viruses found in memory, on storage media or on incoming
files.
48. Internet telephony is also called as.

Ans. Voice over IP


49. Today, Ethernet is the most popular LAN technology because..?

Ans. It is relatively inexpensive and easy to install and maintain.


50. -----has been adopted as a network standard for Internet communications.

Ans. TCP/IP
51. Types of wired home networks includes all of the following except..?

Ans. (a) Ethernet (b) Powerline cable (c) Phoneline (d) WI-Fi (e) None of these
Ans: (d) Wi-Fi
52. What is a news group? Ans. It is an online area in which users have written
discussions about a particular subject.
53. A type of Peer to Peer network, called P2P file sharing Network describes;?
Ans. An internet network on which users connect directly to each others hard discs and
exchange files over the Internet.
54. What is a network topology?

Ans. It refers to the layout of the computers and devices in a communication network.
55. What is the function of a DSL modem..?
Ans. Sends digital data and information from a computer to a DSL line and receives
digital data and information from a DSL line.
56. ----- consists of single copper wire surrounded by at least three layers: an insulating
material, a woven or braided metal and a plastic outer coating.
Ans. Coaxial cable
57. What is a site license ?Ans. (a) it is a legal agreement that permit users to install
software on multiple computers usually at a volume discount (b) Power line cable (c)
Phone line (d) WI - Fi (e) None of these Ans. (a)
58. Which has been adopted as a network standard for internet communications?
Ans. TCP/IP.
59.Fibre optic cables have which of the following advantages?
Ans. Lower costs, easier installation and modification
60. A popular type of animation called.combines several images in to a single GIF
file.Ans. An animated GIF
61. Which of the following identifies any network based on the 802.11 family of
standards? Ans. Wi-Fi ( Wireless Fidelity).
62. What is a Network Interface Card (NIC)? Ans. It is an adapter PC card or a Flash
card that enables a computer or device to access a network.
63. What does World wide Web Consortium (W3C)do?
(a) Overseas research (b) set standards (c) sets guidelines for many areas of Internet
(d) All these (e) None of theseAns.(d) All these
64. What is Internet backbone? Ans. The major carriers of network traffic on internet
are collectively as the Internet backbone.
65. Visitors to which can customize all or some of the contents ?

Ans. Dynamic Web page.


66. What is animation which many web pages use? Ans. It is the appearance of
motion created by displaying a series of still images in sequence.
67. What is SMTP (Simple Mail Transfer Protocol)? Ans. It is a communication
technology used by some outgoing mail servers.
68. What is uploading ? . Ans. It is the process of transferring documents, graphics
and other objects from a computer to a server on the internet.
69. Which of the following are the examples of communication channels? Ans. (a)
Cable television lines (b) Telephone lines (c) both (a) and (b) (d) WI-Fi (e) None of
theseAns: (c) both (a) and (b)
70. What is a Wireless Instant Message?

Ans. It is a real time communication service that allows wireless mobile devices
to exchange messages with one or more mobile devices or online users.
71. What is the popular use of Wi-Fi standards?

Ans. In public interest access points that offer mobile, the ability to connect to the
internet with their wireless computers and devices.
72. Which is easier to install than ISDN and provides much faster data transfer rates?

Ans. DSL
73. A web address consists of which of the following?


(a) A protocol (b) Domain name (c) the path to a specific web page (d) or
location on a web page (e) All of these Ans: (e)
74. Which of the following new format which may eventually replace the GIF format?

Ans. PNG format.


75. On a star network, if the hub fails, the entire network is.?

Ans. Inoperable until the hub is repaired


76. ISDN requires.
Ans. That both ends of the connection have an ISDN modem
77. What is a Domain?
Ans. It is the text version of an IP address.
78. What is a Search Engine?

Ans. It is a program that finds web sites and web pages.


79. What is Web log ?

Ans. It is a website that uses a regularly updated journal format to reflect the
interests, opinions and personalities of the authors and sometimes site visitors.
80. What is a Plug in?
Ans. It is a program that extents the capability of a browser.
81. What is a News group?
Ans. It is an online area in which users can have
written discussions about a particular subject.
82. What is a hot pot?
Ans. It is a wireless network that provides internet
connections to mobile computers and other devices.
83. What is TCP/IP ( Transmission Control Protocol/Internet Protocol)?
Ans. It is a network technology that defines how messages are routed from one end of a
network to the other ensuring that the data arrives correctly by dividing it into packets.
84. What is a cable modem?
Ans. It is a digital modem that sends and receives
digital data over the cable television (CATV) network.
85. What is latency ? .
Ans. It is the time a signal takes to travel from one location to
another on network.
86.What is a network topology?

Ans. A layout of computers and devices in a communication network


87. In a web address http stands for what?
Ans. It stands for hyper text transfer
protocol which is a set of rules that defines how pages transfer on the internet.
88. If your computer keeps rebooting itself, then it is likely that
(1) It has a virus (2) it does not have enough memory (3) There is no printer (4) There
has been a power surge (5) It needs a CD-ROMAns:(1) It has a virus
89. In MODEMS ..? (1) Several digital signals are multiplied (2) digital signals is
amplified (3) Several digital signals are magnified (4) both (1) and (2) (5) A digital signal
changes some characteristic of a carrier wave Ans: (5)
90. In reality IT recognizes only
(1)
A postal mail address (2) a location of host (3) Hub (4) FTP (5) GifAns: (3)
91. www means?
(a) World Wide Wonder (b) World Wide Wizard (c) World Wide Web (d) World Wide
Watch (e) None of these Ans: (c)
92. Processing is used when a large mail order company accumulates orders and
processes them together in one large set
(a) Batch (b) Online (c) Real time (d) Group (e) Bunch.Ans: (a)
93. What is web casting? Ans. Transmitting the Video and Audio on the internet.
94.What is the function of a modem?

Ans. Converts analog signals to digitals and vice versa.

95.Networking using fibre optic cable is done as:


Ans. a).it has high band width b). it is thin and light c). it is not affected by electromagnetic interference/power surges etc. (d) all of these Ans: (d) all these
96. Conference (net scape), net meeting (internet explorer) enables ?

Ans. Live real time Conferencing


97. e-commerce uses the following key standards / technologies

Ans. EDI (Electronic Data Interchange)


98. Which program is made by Microsoft and embedded with Windows and used to
view Web Document?
Ans. Internet Explorer
99. What is the name of the software that allows us to browse through web pages?

Ans. Browser
100. Which is the protocol automatically assign IP address to each computer as needed
by the network administrator ? Ans. DHCP
101. A set of security programs that protect a computer from outside interferences or
access via internet is. Ans. Fire wall
102. Which is the hypertext transfer protocol, which is giving importance to security,
often used in intra company internet sites?
Ans. HTTPS
103. PDF is the acronym for .. Ans. Portable Document Format
104. Which is the unique address which identify a computer in a network?

Ans. I P address
105. In which topology multiple communication channel exists between nodes?

Ans. Mesh
106. Which protocol is used for sending e-mail? ..
Ans. SMTP
107. Name the internet service used for publishing our idea ?
Ans. Blogging
108. Introducing into a website without permission is..
Ans. Hacking
109. Which is the device used in network for strengthening or amplifying the signal ?

Ans. Repeater
110. Who is a Virus Author?

Ans. The programmer of a virus who intentionally writes a virus program.


111. What is a Virus?

Ans. It is a potentially damaging computer program that affects or infects a


computer negatively by altering the way the computer works without the users
knowledge or permission.
112. What is meant by Trojan Horse? Ans. It is a malicious - logic program that hides
within or look like a legitimate program such as a screen saver.
113. What is an Antivirus program?
Ans. It is a utility that protects computer against
viruses by identifying and removing any computer viruses found in memory, on storage
media or on incoming files.
114. Internet telephony is also called as.
Ans. Voice over IP
115. Today, Ethernet is the most popular LAN technology because..?

Ans. It is relatively inexpensive and easy to install and maintain.


117. Types of wired home networks includes all of the following except..?

Ans. (a) Ethernet (b) Powerline cable (c) Phoneline (d) WI-Fi (e) None of these
118. What is a news group?
Ans. It is an online area in which users have written
discussions about a particular subject.
119. A type of Peer to Peer network, called P2P file sharing Network describes;?

Ans. An internet network on which users connect directly to each others hard discs and
exchange files over the Internet.
120. What is a network topology?
Ans. It refers to the layout of the computers and devices in a communication network.
121. What is the function of a DSL modem..?
Ans. Sends digital data and information from a computer to a DSL line and receives
digital data and information from a DSL line.
122. ----- consists of single copper wire surrounded by at least three layers: an
insulating material, a woven or braided metal and a plastic outer coating.

Ans. Coaxial cable


123. What is a site license ?
Ans. (a) it is a legal agreement that permit users to install software on multiple
computers usually at a volume discount (b) Power line cable (c) Phone line (d) WI - Fi
(e) None of these Ans. (a)
124. Which has been adopted as a network standard for internet communications?

Ans. TCP/IP.
125. Fibre optic cables have which of the following advantages?

Ans. Lower costs, easier installation and modification


126. A popular type of animation called.combines several images in to a single GIF
file. Ans. An animated GIF
127. Which of the following identifies any network based on the 802.11 family of
standards? Ans. Wi-Fi ( Wireless Fidelity).
128. What is a Network Interface Card (NIC)?
Ans. It is an adapter PC card or a
Flash card that enables a computer or device to access a network.
129. What does World wide Web Consortium (W3C)do? Ans. (a) Overseas research (b)
set standards (c) sets guidelines for many areas of Internet (d) All these (e) None of
these
130. What is Internet backbone?
Ans. The major carriers of network traffic on internet are collectively as the Internet
backbone.
131. Visitors to which can customize all or some of the contents ?

Ans. Dynamic Web page.


132. What is animation which many web pages use?

Ans. It is the appearance of motion created by displaying a series of still images


in sequence.
133. What is SMTP (Simple Mail Transfer Protocol)?

Ans. It is a communication technology used by some outgoing mail servers.


134. What is uploading ? .

Ans. It is the process of transferring documents, graphics and other objects from
a computer to a server on the internet.
135. Which of the following are the examples of communication channels?

Ans. (a) Cable television lines (b) Telephone lines (c) both (a) and (b) (d) WI-Fi
(e) None of these Ans:(c) both (a) and (b)
136. What is a Wireless Instant Message?

Ans. It is a real time communication service that allows wireless mobile devices
to exchange messages with one or more mobile devices or online users.

137. What is the popular use of Wi-Fi standards?

Ans. In public interest access points that offer mobile, the ability to connect to the
internet with their wireless computers and devices.
138. Which is easier to install than ISDN and provides much faster data transfer rates?

Ans. DSL
139. A web address consists of which of the following?

(a) A protocol (b) Domain name (c) the path to a specific web page (d) or
location on a web page (e) All of these Ans: (e) All of these
140. Which of the following new format which may eventually replace the GIF format?

Ans. PNG format.


141.On a star network, if the hub fails, the entire network is..?

Ans. Inoperable until the hub is repaired


142. ISDN requires.

Ans. That both ends of the connection have an ISDN modem


143. What is a Domain?

Ans. It is the text version of an IP address.


144. What is a Search Engine?

Ans. It is a program that finds web sites and web pages.


145. What is Web log ?

Ans. It is a website that uses a regularly updated journal format to reflect the
interests, opinions and personalities of the authors and sometimes site visitors.
146. What is a Plug in?

Ans. It is a program that extents the capability of a browser.


147. What is a News group?

Ans. It is an online area in which users can have written discussions about a
particular subject.
148. What is a hot pot?

Ans. It is a wireless network that provides internet connections to mobile


computers and other devices.
149. What is TCP/IP ( Transmission Control Protocol/Internet Protocol)?

Ans. It is a network technology that defines how messages are routed from one
end of a network to the other ensuring that the data arrives correctly by dividing it into
packets.
150. What is a cable modem?

Ans. It is a digital modem that sends and receives digital data over the cable
television (CATV) network.
151. What is latency ? .

Ans. It is the time a signal takes to travel from one location to another on
network.
152. What is a network topology?

Ans. A layout of computers and devices in a communication network


153. In a web address http stands for what?

Ans. It stands for hyper text transfer protocol which is a set of rules that defines
how pages transfer on the internet.
154. If your computer keeps rebooting itself, then it is likely that


(1) It has a virus (2) it does not have enough memory (3) There is no printer (4)
There has been a power surge (5) It needs a CD-ROM Ans (1)
155. In MODEMS ..?

(1) Several digital signals are multiplied (2) digital signals is amplified (3) Several
digital signals are magnified (4) both (1) and (2) (5) A digital signal changes some
characteristic of a carrier wave Ans: (5)
156. In reality IT recognizes only

(1) A postal mail address (2) a location of host (3) Hub (4) FTP (5) Gif Ans: (3)
157 is the first Indian News Paper to be available on Internet. Ans. The Hindu
158..is the first Indian Magazine to be available on Internet. Ans. India Today
159.. is the first Malayalam News Paper started its Internet edition. Ans. Deepika
160 .is the first Indian political party which was created its website on internet. Ans.
.Bharatiya Janata Party (BJP)
161. TRON is the first computer graphics used movie (1982).
162. The first computer game is Space War.
163. ANANOVA is the first computer animated news reader
164. CDC 6600 is Worlds first Super computer.
165. Param 8000 is Indias first Super computer.
166. Tianhe-2 (MilkyWay-2) is Worlds fastest Super computer (China)(As on July
2014).
167. iDataPlex DX360M4 (developed by Indian Institute of Tropical Meteorology) is
Indias fastest Super computer (As on July 2014)
168. The first computer installed in India is HEC-2M at Kolkata (1955)
169. The first Computer made in India is Siddhartha. Manufactured by Electronics
Corporation of India.
170. The first Computer University in India at private sector is Rajeev Gandhi Computer
University.
171. First IT University in India- Ans: Jai Prakash University
172. A short range wireless technology used to connect and exchange information
between devices such as PCs, Mobiie. phones ,Laptops etc. is called Bluetooth
173. Email service provided by Microsoft is called Hotmail
174. Fire Walling is a protection scheme for data. It protects our information system
from unsecured public network.
175. Computer chips that have programs recorded on them are known as Firmware.
ROM, Flash memory, EPROM etc. are examples.
176. Pixel (Picture element) is the smallest controllable element of a picture represented
on the screen.
177. Resolution is the capability of a sensor to observe the smallest object clearly.
178. Storage capacity of a common DVD is 4.7 GB and of a standard CD 650 - 750 MB.
179. A collection of facts and figures are called Data.
180. Processed data is called information
181. Wireless fidelity (Wi-Fi) allows electronic device to exchange data wirelessly using
radio waves.
182. E-Commerce is a facility to conduct buying and selling of products and services
over electronic systems on computer networks.
183. Abacus is the first calculating in the world (China).

184. AIIMS is the first Indian hospital which used robot to conduct an operation.
185. One megabyte equals approximates Million bytes
186. When you are working on a document on PC, where is the Document temporarily
stored? - RAM
187. Information travels between components on the mother board through..- Buses
188. How are data organized in a spreadsheet? - Height and Width
189.Transformation of input into output is performed by?
-The CPU
190. .are called Modifier keys. - Ctrl, Shift and Alt
191.The .of a system includes the programs or instructions.
- Software
192. The computer which defeated Gary Kasparov at Chess is____
- Deep Blue
193. The primary purpose of software is to turn data into.- Information
194. Repair for known software, bug, which is generally available free of cost on internet
is called?
- Patch
*195. To what temporary area can you store text and other data, and later paste them to
another location?
- The clipboard
196. Highest honourable award in computer science is _____
- Turing Award
197. Storage that retains its data after the power is tuned off is referred to as.. - Nonvolatile storage
198. Cache and main memory will lose their contents when the power is off. They are
. - Volatile
199. Protecting data by copying it from the original source to a different destination is
called ? backup.
200. Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as.? - Applets
201. Which process checks to ensure the components of the Computer and operating
are connected properly? - Booting
202. Computer Memory is normally measured in: - Gigabytes
203. The difference between people with access to computers and the Internet and
those without this access is known as the: - Digital divide.
204. Word processing, spreadsheet, and photo-editing are examples of:
- Application software.
205. The main difference between application and system software is that:
System software manages hardware whereas application software performs user tasks.
206. If a large business is going to use a single computer to execute many programs for
hundreds of users at the same time, performing relatively simple operations and
transactions, the type of computer will probably be a..? - Mainframe
207.You must install a. on a network if you want to share a Broadband Internet
connection. Ans- Router
208.The most frequently used instructions of a computer program are likely to be
fetched from:Ans: Cache memory

209.____ helps to begin a paragraph with a large dropped initial capital letter
- Drop Cap
210. The errors that can be pointed out by the compiler are:
- Syntax error
211. By default, your documents print in mode.. - Portrait
212. . is considered as the backbone of the World Wide Web
- Hypertext transfer protocol (HTTP)
213. is a collection of web - pages and is the very first page that we see
on opening of a website?
- Website, Home page
214. Loading Operating System onto RAM is called? - Booting
215. Which term identifies a specific computer on the web and the main page of the
entire site? - URL
216. Virtual memory is Memory on the hard disk that the CPU uses an extended..?
RAM
217. A normal CD-ROM usually can store up to.? - 700 MB
218. A physical connection between the microprocessor memory and other parts of the
microcomputer is known as? - Address bus
219. A term associated with the comparison of processing speeds of different computer
system is point Bank? - MIPS
220..file starts MS Word. - Winword.exe
221. To get to the Symbol dialog box, click on the menu and choose Symbol.
- Insert
222. Superscript, subscript, outline, emboss, engrave are known as
- Font effects
223. Which command divides the surface of the blank disk into sectors and assign a
unique address to each one? - Format
224. Computer programs are written in a high - level programming language; however,
the human readable version of a program is called?
- Source code
225. The software tools that enable a user to interact with a computer for specific
purposes are known as? - Applications
226. When you turn on the computer, the boot routine will perform this test..?
- Power - on self-test
*227.Which storage media provides sequential access only?
- Magnetic tape
228. The quickest and easiest way in Word, to locate a particular word or phrase in a
document is to use the command..? - Find
229. Correcting errors in a program is referred to as? - Debugging
230. A is a device that not only provides surge protection, but also furnishes your
computer with battery backup power during a power outage..? - UPS
231. is the name of excel files
- Workbook
232. Example for a real-time operating system? - Lynx
233. The Internet ethical protocol is called. (A) net protocol (B) netiquette (C) net
ethics (D) net moralityAns: (B) netiquette
234. Commercial messages on the net are identified as

(A) Net ads (B) Internet commercials (C) Webmercials (D) Viral advertisements Ans:
(c) Webmercials
235. Manuel Castelle was the first to use the term
(A) Internet society (B) Electronic society (C) Network society (D) Telematic society
Ans: (c) Network Society
236. GIF stands for.

(A) Global Information Format (B) Graphics Information Format (C) Graphics
Interchange File (D) Graphics Interchange Format Ans: (D) Graphics Interchange Format
237. Which one of the following is not an Operating System?

(A) IBM AIX (B) Linux (C) Sun Solaris (D) Firefox Ans: (D)

Frequently Asked Questions


1. What is meant by Networking?
Connection between two or more computers is known as Networking. Each computer in
a network can have its own processing capabilities and can also share computer
hardware, programs, and data files. There are three types of computer networks:
LAN (Local Area Network), MAN (Metropolitan Area Network) and WAN (Wide Area
Network).
2. What is meant by Local Area Network (LAN)?
The system of two or more computers situated in a room, building or in a campus
connected together is called a Local Area Network (LAN). Ethernet, Novell, Personal
Computer Network etc. are some LAN brands. Man covers a city, and it is why called
Metropolitan Area Network. In a WAN system telephone cables are used to connect
computers. WAN according to it coverage. Enterprise and Global.
3. What is meant by FIFO?
A method used to process information in which the first item in the list is processed first
is FIFO (First in First out).
4. What is meant by Cyberspace?
Cyberspace is the global pool of information held on computer networks connected by
sophisticated transmission technology that can be accessed by anyone.
5. Who is known as the father of Internet?
Glen Ricort is the father of Internet. Internet was introduced in 1972.
6. What is meant by Internet Service Provider?
Internet Service Provider is a company that provides the Internet access.
7. What is a Home page?
Home page is the first page of web site.
8. Who is a Net surfer?
Someone who browses the Internet with no definite destination is called a Net surfer.
9. What is the importance of Satyam Infoway Ltd?
Indias first private Internet service provider (ISP), Satyam Infoway Ltd. Launched the
countrys first international roaming facility on the Internet on January 7, 1999. The
service allows Internet users travelling abroad to access their account from anywhere in
the world at the cost of a local call.
10. Which are the companies jointly providing Internet service in India?
VSNL (Videsh Sanchar Nigam Limited) and DOT (Department of Telecommunication)
are the agencies jointly providing Internet Services in India.

11. What is Hacking?


Hacking is an illegal operation done in the Internet. It is a type of robbery. It is the
process by which hackers leak out information from web sites. Hackers are Cyber
Emissaries who get into other sites and make information leak out. Hacking includes
robbery of songs from web sites of artists, stealing money from web sites of famous
banks, leaking of secret information from web sites of countries and several other
Internet crimes.
12. Who got the 2000 Web Business award?
Satyam computer services received the 2000 Web Business award for its intranet
Satyam World.
13. What is meant by Space Portal?
Space Portal is the internet on space to be launched in 2004.
14. Which are the most famous web clients?
Most popular web clients are Netscapes Navigator and Microsofts Internet Explored.
15. What is a Virtual host?
The computer- generated host in a talk show is called Virtual host.
16. What is ARPANET?
The grand father of Internet is ARPANET (Advanced Research Project Agency
Network). It was established in 1969 by the Defense department of USA.
17. What is USENET?
USENET, is a network existed for communications between universities.
18. What does the term DNS stand for?
Domain Name System (DNS) is a directory of Internet users and organisations.
19. What is HTML?
HTML (Hyp er-Text Markup Language) is the primary language used to create web
pages.
20. Who are called Netizens?
Those who are connected to the Internet are called Netizen. There are three kinds of
Internet memberships. (1) Core Internet membership: (2) Consumer Internet
membership. (3) Matrix membership.
21. What are search engines?
Search engines are large computer systems which helps us to search web sites in
Internet.
22. What kind of a program is Yahoo?
Yahoois one of the popular search engines in the Internet.
23. What is Intranet?
Intranet is a private system that include hardware and software developed for the
Internet Services to provide communication, information management and information
services within an organisation.
24. What is meant by group Ware?
GroupWare is a broad category of software that originated recently. It has facilities for Email, maintaining personal/group calendars, planning projects and storing data.
25. What is Polnet?
Polnet is the communication network linking all the Police Stations in the country.
26. What is the importance of E-mail and E-commerce?

E - commerce or electronic commerce includes all business activities involved in the


development, facilitation and implementation of business communication and
transactions through the electronic media comprising primarily the internet, intranet and
the Extranet.
27. What is called as Multimedia?
Multimedia uses a combination of various media such as audio, video, text, graphics
and animation to entertain and teach.
28. What is the peculiarity of Video conferencing?
In video conferencing the participants also can see each other, than in the audio
conferencing.
29. What is an E-Journal?
E-Journal is an electronic publication, typically found in academic circles.
30. What is E-money?
E-money is digital cash which is replacing currencies.
31. What are the different forms of E-money?
The forms of electronic money are: electronic debit and credit card systems, smart
cards and digital money.
32. What does the term CODASYL stand for?
CODASYL - Conference on Data Systems Languages.
33. What does the term CICP stand for?
CICP - Communication intermpt Control Program.
34. What is Cyber Crime?
Cyber Crime is a crime committed by the use of a software or data.
35. What is Cebitfair?
Cebitfair is the name of the Internet fair held recently in Hanover, Germany.
36. What is M-Commerce?
M-Commerce - fuses mobile communication with electronic commerce.
37. What is Mob-mail?
Mob-mail is e-mail communications linked with mobile phone.
38. What is an Easter egg?
Easter egg is a message or screen buried within a program and accessible only through
an undocumented procedure.
39. What is meant by Encryption?
Incryptography, the process of converting a message into a cipher text is Encryption.
40. What is Ethernet?
Ethernet is a local area network (LAN) developed by zerox corporation.
41. What is Endora?
Endora is a popular electronic mail program. Hot mail. Rediff are also E-mail programs.
42. What is meant by Internet Protocol?
Internet Protocol (IP) is the standard that describes how an internet-connected
computer should break data down into packets for transmission across the network.
43. What is a password?
Password is a code by which a user gains access to a computer system. It is used for
security purposes.
44. What is Operation Bandwidth ?
Operation Bandwidth refers to the programme to increase bandwidth.

45. What does the term Bandwidth mean?


Bandwidth refers to the quantity of information that can be transmitted through a cable.
46. What is called as Share Ware?
Shareware is software that is available to try for a limited time without any obligations.
47. What is E-zine?
E-zine is a magazine published in electronic form.
48. What is a Packet in computer parlance?
A block of data send over a network is known as a packet.
49. Which state introduced video conferencing first in India?
Andhra Pradesh is the first state in India to introduce video conferencing facility for
efficient governance. Gujrt is the second state.
50. The architecture of Network Protocol developed by ISO has how many layers?
Seven..
51. What are the seven layers of Network Protocol developed by ISO?
Physical, Data link, Network, Transport, Session, Presentation and Application.
52. Actual communication takes place in which layer? Physical layer.
53. Which layer provides the low-level detection and correction functions of the
network? Data Link.
54. Which layer in responsible for routing packets across the network?
Net layer.
55. Which is the intermediate layer that higher layers use to communicate with
network? Transport layer.
56. Which layer manages the current connection between two computers?
Session layer.
57. Which layer makes sure that both computers are speaking the same
language? Presentation layer.
58. Which is the highest layer in the ISO standard? Application layer.
59. Which is the software used to link the networks and computers?
TCP/IP.
60. What are the five layers of the TCP/IP? Physical, Data Link, Network,
Transport and Application.
61. Which are the two types of TCP/IP protocols? Serial Line Internet Protocol
(SLIP) and Point-to-Point Protocol (PPP).
62. Which is considered as the forerunner of Internet? ARPANET.
63. What is the full form of ARPANET?
Advanced Research Project Agency Networks.
64. Which communication software was used in Arpanet? TELNET.
65. When was the new interface Transmission Control Protocol/Internet Proto col
developed? In 1979.
66. When Arpanet recognised TCP/IP as an interface? In 1983.
67. What is the name of the interface de veloped by Mc. Gill University of America?
Archie.
68. What is the name of the interface developed by Saskatchewan University
Of America? Hytelnet.

69. When was Gopher and World Wide Web introduced for commercial pur poses in
Internet? In 1991.
70. Which is the first graphical interface of the Internet? Gopher.
71. Where Gopher was developed? In Minnesota University.
72. Where World Wide Web was developed? In European High Energy Physics
Lab, Geneva.
73. Who was the scientist behind WWW? The Bemers Lee.
74. Which software technique is used in WWW? Hypertext.
75. What is the other name of Hypertext? Hyper medium.
76. The term Cyberspace is used first in which science fiction? Neuromancer.
77. What is the name of the address that specify a particular network or a particular
host? Internet Protocol (IP) address.
78. The IP address is made up of how many numbers? Four Number. 79
Which makes a full Internet Address? When user name is combined with the P address.
80. What is Domain Name System - DNS? A secondary naming system based on name
schemes.
81. By which symbol user name is separated from the Domain name? Sym bol@.
82. What is the Internet system primarily intended for? Sharing information.
83. Which is considered as the original method used for finding informations on the
Internet? Serendipity.
84. Which Internet Protocol enables Internet users to log on to another computer linked
to the Internet? Telnet.
85. Which is the simple method for locating information? Browsing.
86. What is the name of the connection between one piece of information and another?
Hypertext.
87. What is the full form of WWW? World Wide Web.
88. Which system connects all the web sites of Internet and makes available for users
those web sites which are of similar character? WWW.
89. In WWW and enquiry of information reaches all web sites at which speed?
At the speed of light.
90. What is the function of the Uniform Resources Locator - URL? It defines the
location of the web document.
91. Which are the three methods through which we can access web sites? Directly
entering the URL address, using hypertext links and doing a web search forURL.
92. Where the Internet publications or informations are arranged? In the server
computers linked with the Internet.
93. Who introduced the Netscape navigation-browser? Netscape communications
corporation.
94. Which browser is meant for character based environment? LYNX.
95. What is the name of the initial page loaded when we start a browser? Home page.
96. What is the name of the special type of link represented by an image? Image map.
97. What is a usenet? A communication tool used in Internet.
98. What is the name given to a discussion group which can have a public dialog with
every one else on the network? News groups.
99. What is the name given to the electronic mail tagged with predetermined subject
headers? Article.

100. What does news group sci represent? Scientific Subject Groups.
101.What does news group rec represent? Groups aimed towards arts, hobbies and
recreational activities.
102. Define Graphics Tablets: This is a computer-based terminal used to create, store,
and print pictures. Using a stylus; pictures can be created and stored or printed on a
plotter.
103. What is known as Hypertext? It is a body of text where some or all of the
information is linked; so that when the user clicks on a word, he can find out more about
that word or be transported to another area of the document that contains related
information.
104. What is known as back bone of INTERNET? The system of connecting
computers by cables or satellites is called back bone of INTERNET.
105. What is World Wide Web? A hypertext- based system for finding and accessing
information on the Internet. The World Wide Web consists of a series ofpages of
information, many of which contain texts, colour graphics, and even sound and video
clips.
106. What is a Chat? A chat means to communicate with other users via the keyboard.
You require a chat client, such as Microsoft Chat, to connect to one of the thousands of
chat servers around the world or directly to another users computer.
107. What is HTTP (Hyper Text Transport Protocol)? The protocol that a Web server
and a browser use to communicate.
108. How many types of recipients are there in E-Mail system? There are three
recipients. They are TO recipient, CC recipient and BCC recipient.
109. Who is a TO recipient? The recipient who is to take some action due to the
message.
110. Who is a C recipient? The recipient who receives a courtesy copy in E-Mail
system.
111. Who is a BCC recipient? The recipient who receives Blind Carbon Copy of the Email.
112. What is the speed by which a message is passed in E-mail? With the speed of light
113. What are the three steps in sending a mail message to another user? 1.
Composing a mail message. 2. Putting it in the despatch queue. 3. Physically sending it
to the Xee mail center.
114. How fast do E-Mail message travel? E-Mail messages travel in light speed.
115. What does CBMS stand for? CBMS stands for Computer Based Message Sender.
116. What is Download? To transfer files to your computer from another computer via a
modem. The opposite term is upload.
117. What is Information Superhighway? It is a worldwide communications network that
promises to bring multimedia services into the users home via high-capacity fibre-optic
cable. The Internet is sometimes seen as a prototype for the information superhighway.
It is also known simply as the superhighway.
118. What is Modem? A device that enables computers to communicate with each other
over a telephone line.
119. What is Anonymous FTP? An FTP server that enables any user to log on and
download files. You use anonymous for the user name and you e-mail address for the

password. Usually used for the public distribution of files-drivers, updates, patches, an
so on.
120. What does IP stand for? Internet Protocol.
121. Which are the most widely used online information services? Compu Serve,
America Online (AOL), Prodigy.
122.What are the specialties of CompuServe? It is the oldest of the remaining
commercial on-line service and
has access numbers in 185 countries. 123.What are the most widely used
Internet services? E-mail, Mailing lists, Usenet newsgroups.
124. What are the items consisted in Domain address? Name of the major server or
site, the sub domain, domain.
125. What are the common domain names used in the U.S.? mu., gov, corn, edu, net,
org. I
126. What is called a document on the Web? Web page.
127. Is Browser a piece of hardware or software? Software;
128. What are the uses of a Browser?
Record a history of where you have visited, save-download-print-copy-view
Web content, read and send mail. 129. When was Netscape navigator introduced?
1996.
130. What are the important things to be considered while selecting a modem?
Speed, standard and compatibility.
131. What are the different types of modems? Internal modem, External modem and
PCMCIA Card/PC card modem.
132. Define various speed employed in modems? 9600 kbps, 28,800 kbps, 56,000
kbps.
133. What are the compatibility standards for 28,800 kbps speed modem? V.31, V.33,
V.32, V.34.
134. What are the essential HTML tags for a page? <HTML>, <HEAD>, <TITLE>,
<BODY>, <P>.
135. What is SIG? It is an E-mail discussion group and a technical discussion group
sponsored by ACM.
136. What does CRC stand for? It stands for Cyclic Redundancy Check.
137. What does AD stand for? Administrative Domain.
138. What does BIND stand for? Berkely Internet Name Domain.
139. What does BGP stand for? BootStrap Protocol.
140. What are the Boolean operators of the Internet? ADJ, AND, OR, XOR, NAND,
NOT, etc.
141. What is meant by CompuServe Information Manager (CIM)? It is a program that provides a graphical Interface for CompuServe and it supports both
Macintosh and Windows.
142. What is meant by INET? It isan annual conference put on by the Internet society
and an acronym for Internet.
143. What is Mail list? It is a server program that automatically responds to mailby
sending information or performing functions specified in the incoming mail.
144. What is known as Netscape? It a widely used Web Browser.

General
1. What does the term BASIC stand for?
BASIC is Beginners All-purpose Symbolic Instruction Code.
2. What is algorithm? Algorithm is a set of instructions, arranged in a specific order to
solve a particular problem in a finite number of steps.
3. What does the term DBMS stand for? DBMS - Data Base Management Sys
tem.
4. What is meant by E-Mail? E - Mail (Electronic Mail) is a way to send text based
messages and files to any computer with an address on Internet.
5. Which cities are known as Silikon Valley and Infotech city? Bangalore is known as the
Silikon Valley of India. Silikon Valley in USA is the Mecca of Computer. Hyderabad is
the Infotech city in Indin.
6. What is meant by Firmware? Firmware is software substituted for hardware and
stored in ROM (Read Only Memory). Firmware is also known as Micro program.
7. What does the term EPROM stand for? EPROM - Erasable Programmable Read
Only Memory.
8. Which is the lirst boOk on computer that won Pulitzer Prize? The book about
computers, which won a Pulitzer Prize, is Soul of new Machines written by Tracy Kidder.
9. Who is the author of the book titled as The Ninth Bridge? Charles Babbage was the
author of The Ninth Bridge Water Treatise.
10. The worlds largest bookstore. AMAZON. COM is the worlds largest bookstore.
11. What does the term E-maIl stand for? E - Mail is the Electronic Mail.
12. What is Internet? A network of computers.
13. What are the other more popular names of Internet? Cyberspace and Information
Super Highway.
14. Who is the author of the science fiction titled Neuromancer? William Gibson.
15. William Gibson used the term Cyberspace to denote which process?
The communication between human brain and computer through cables.
16. Define KB, MB and GB? KB means KiloByte. One KB is equal to 1024 bytes. MB
means megabyte and 1024-KB

Chapter 14
MICROSOFT POWERPOINT
Microsoft PowerPoint, usually just called PowerPoint, is a proprietary commercial
presentation program developed by Microsoft. It is part of the Microsoft Office suite,
and runs on Microsoft Windows and Apple's Mac OS X operating system.
The current versions are Microsoft Office PowerPoint 2010 for Windows and Microsoft
Office PowerPoint 2011 for Mac.
HISTORY
Originally designed for the Macintosh computer, the initial release was called
"Presenter", developed by Dennis Austin and Thomas Rudkin of Forethought Inc. In
1987. It was renamed to "PowerPoint" due to problems with trademarks, the idea for

the name coming from Robert Gaskins. PowerPoint presentations consist of a number
of individual pages or "slides".
Custom Animations
PowerPoint provides three types of movements:
Entrance, emphasis, and exit of elements on a slide itself are controlled by what
PowerPoint calls Custom Animations.
Transitions, on the other hand, are movements between slides.
These can be animated in a variety of ways.
Custom animation can be used to create small story boards by animating pictures to
enter, exit or move.
Microsoft Power Point 2010
PowerPoint 2010 has changed from its predecessor.
Screen Capturing has been introduced, allowing you to take a screen capture and add it
onto your document.
Also, you can now remove background images and you can add special effects, such
as 'Pencil effects' onto pictures.
Plus, new transitions are available.
However, the ability to apply certain text effects directly onto existing text, seen in
Microsoft Word is not available; a separate Word Art text box is required.
32-bit or 64-bit version of Microsoft Office
By default, Microsoft Office 2010 installs the 32-bit version of Office 2010 even if your
computer is running 64-bit editions of Windows.
Note: If you already have a 64-bit version of Office installed on your computer running
a 64-bit operating system, the default installation is the 64-bit version of Office.
The 32-bit version of Office 2010 is the recommended option for most users, because it
prevents potential compatibility issues with other 32-bit applications, specifically thirdparty add-ins that are available only for 32-bit operating systems.
bookmark link What is in the 32-bit version of Office but is not included in the 64-bit
version of Office?
What is in the 32-bit version of Office but is not included in the 64-bit version of
Office?
ActiveX controls library, ComCtl This library contains ActiveX controls that are used to
build solutions. It is most commonly used in the following Microsoft Office programs:
Access, Excel, and Word.
Share Point List control The list view in SharePoint Technology is not available to
people using the 64-bit version of Office.
3-D Pivot Chart views in Excel Three-dimensional (3-D) Pivot Chart views in Excel are
not available in the 64-bit version of Office. Two-dimensional (2-D) charts are available.

Getting started with PowerPoint 2010


With Microsoft PowerPoint 2010, you can design visually stunning presentations with
text, graphics, photos, video, animation, and much more. Once you have created your
PowerPoint 2010 presentation, you can then deliver your presentation in person,
present it remotely over the web, or share the files with others.
Open a presentation
To open an existing presentation, do the following:

Click the File tab, and then click Open.


Select the file that you want, and then click Open.
Note By default, PowerPoint 2010 shows only PowerPoint presentations in the Open
dialog box. To view other kinds of files, click All PowerPoint Presentations, and select
the type of file that you want to view.
Save a presentation
To save a presentation, do the following:
Click the File tab, and then click Save As.
In the File name box, type a name for your PowerPoint presentation, and then click
Save.
Note By default, PowerPoint 2010 saves files in the PowerPoint Presentation (.pptx)
file format. To save your presentation in a format other than .pptx, click the Save as type
list, and then select the file format that you want.
Translate text in a different language
You can translate text written in a different language, such as phrases or paragraphs,
individual words (by using the Mini Translator), or translate your whole file with Microsoft
Office 2010. To translate text from certain languages into other languages, you might
also have to satisfy the operating system requirements for specific languages.
Note The Translate command is only available in the following Microsoft Office
programs: Excel, OneNote, Outlook, PowerPoint, Publisher, Visio, and Word.
You can also create a document in one language, and then use a machine translation
service to translate it to a different language.
Check spelling and grammar
You can check the spelling and grammar in the file all at once, or you can let the
spelling and grammar checkers suggest corrections automatically while you work.
Microsoft Office 2010 comes with a dictionary of standard grammar and spellings, but
they are not comprehensive.

POWER POINT (Objective type Questions)


1.Power point can display which of the following add-in software of MS-Office?
Ans. (a) Equation Editor (b) Organization Chart (c) Photo Album (d) All of these (e)
None of these
2. To check a presentation for spelling errors?
Ans. Click the spelling button on the standard tool Bar.
3. The outline tab enables the user to ?
Ans. (a) view title and body text (b) add and delete slides ( c) drag and drop text (d)
add and delete slide (e) all these
4. slide layouts have ... Arranged in various configurations for containing text or visual
content ?
Ans. (a) Place holders (b) presentation on the internet ( c) using overhead
transparencies (d) none of these (e) all these
5. Using slide layouts, the need to re-size objects and adjust the font size, is
eliminated because ?
Ans. Power point automatically sizes the objects and texts to fit in the layout.
6. Which features help the user to locate the desired clip from Clip Art ?

Ans. Clip art images have one or two key words associated with the entities, activities,
labels and emotions displayed in the image.
7. A print out of the presentation outline is often used as ?
Ans. An audience handout.
8. Power point users can insert which of the following items in presentation?
Ans. (a) art work (b) multi media effects ( c) picture & photos (d) sounds and movies (e)
all these
9. The slide show button allows a presentation to be displayed ...?
Ans. (a) using a projection device attached to a personal computer (b) by using a
computer ( c) using computer acting like a overhead slide projector (e) all these
10. help to create a presentation quickly and efficiently by allowing the user to answer
prompts for specific content criteria ?
Ans. Wizard .
11. Power point uses which slide until the user select a style?
Ans. Default Design Template.
12. How is the insertion point look like?
Ans. A blinking vertical line
13. A saved presentation is referred to as a
14. Clicking the Redo button.?
Ans. Reverses the last undo action.
15. The tab provides a quick, easy way to create a presentation ?
Ans. (a) outline (b) templates ( c) layouts (d) text layout (e) all these
16. In order to see the results of your changes...?
Ans. (a) it is best to change the view to normal view when altering the slide layouts
17. Once clip art is inserted in to a slide ?
Ans. It can be repositioned.
18. Using the in Power point a user can form and modify diagrams using
shapes such as arcs, arrows, cubes etc. ?
Ans. Drawing feature .
19. Which is the most common presentation in Power Point ?
Ans. Text Slide consisting of a bulleted list.
20. A.provides consistency in design and color through out the presentation.
Ans. Design Template
21. A slides zoom setting affects.?
Ans. The portion of the slide displaying in the slide pane.
22. In Power Point, slide show view restrict the users evaluation to how many slides at a
time ?
Ans. (a) one (b) two ( c) Three (d) Four (e) Five
23. Power Point slide layout specifies what...?
Ans. (a) the arrangement of placeholders on a slide (b) virtual presentation on the
internet ( c) using overhead transparencies (d) all these (e) none of these
24. Which feature offers a quick way to add professional looking graphic images to a
presentation without creating the images yourself ?
Ans. Clip Art.
25. What is the aspect Ratio of an object?
Ans. It is the relationship between the object height and width.

26. What is animation ?


Ans. It is the feature in Power point which adds special visual and sound effects applied
to the text or content, add interests to a slide show and makes it to look more
professional.
27. A slide icon displays when an insertion point or paragraph ..
Ans. Reaches the first level
28. A.is available in Power point to add special words such as proper names,
cities and acronyms to a presentation so that they will not be marked as spelling
errors ?
Ans. Custom Dictionary.
29. The Power Point can produce slides from an outline created in Microsoft word if
the outline is saved to?
Ans. (a) a RTF file or plain text file (b) my documents ( c) C drive (d) desk top (e) all
these
30. Power Point groups its pre set animations schemes into ...?
Ans. (a) subtle (b) moderate (c) exciting (d) All (a), (b) and (e) None of these
31. To start and customize power point .. ?
Ans. Windows must be running.
32. When the slide height is greater than its width?
Ans. When a slide layout is set to portrait orientation.
33. Slide sorter view which displays a thumbnail version of each slide is helpful ?
Ans. when you want see all the slides in a presentation simultaneously
34. Objects in .orientation have widths that are greater than heights?
Ans. Landscape.
35. Entire slide can be displayed in the slide pane. ?
Ans. (a) by clicking click in the zoom list
36. To activate View show which function key can be used?
Ans. F5
37. To activate Help which function key can be used?
Ans. F1.
38. Which are the combination of keys to activate find function ?
Ans. Ctrl + F.
39. Which are the combination of keys to activate replace ?
Ans. Ctrl + H.
40. Which are the combination of keys to insert a New slide ?
Ans. Ctrl + M
41. Which are the combination of keys to undo typing?
Ans. Ctrl + Z
42. The maximum zoom percentage in Power point is ?
Ans. (a)400% (b)500% (c)200% (d)100% (e) None of these.
43. The arrangement of elements such as Title, sutitle, text, pictures, tables etc is
called. ?
Ans. (a) Layout (b). Presentation (c) Design (d) Scheme (e) None of these.
44. A file which contains ready made styles that can be used for presentation is
called?
Ans. (a) Autostyle (b) Wizard (c) Pre formating (d) Template (e) None of these

45. Which view in Power Point can be used to enter speakers comments?
Ans. (a) Normal (b) Slide show (c) Slide sorter (d) Notes page view (e) None of these
46. Which key on the Key Board can be used to view slide show?
Ans. (a) F1 (b) F2 (c) F3 (d) F5 (e) None of these
47. To insert a new slide in the current presentation, we can choose.? ?
Ans. (a) Ctrl + M (b) Ctrl+H(c) Alt + F1 (d) Shift + I (e) None of these
48. Animation scheme can be applied to .. In the presentation?
Ans. (a) All slides (b) select slide (c) current slide (d) None of these (e) All these
49. Ellipse Motion is a pre-defined.?
(a) Design Template (b) Color Scheme (c) Animation Scheme (d) All of these (e) None
of these
50. 11. Which type of fonts are best suited for titles- and headlines?
(a) Serif Fonts (b) Sans Serif Fonts (c) Text Fonts (d) Picture Fonts (e) None of these
51. Which type of fonts are best suited to display large amount of text?
a) Serif Fonts (b) Sans Serif Fonts (c) Text Fonts (d) Picture Fonts (e) None of these
52. A chart can be put up as a part of the presentation using?
(a) Insert ->Chart (b) Insert ->Picture Chart (c) Edit ->Chart (d) View -> Chart (e) None
of these
53. We can replace a font on all slides with another by using the option.
(a) Edit ->Fonts (b) Tools ->Font (c) Tools->Replace Fonts (d) Format->Replace Fonts
(e) None of these
54. Which option in Power Point allows to carry slides from one computer to another?
(a) Save as (b) Save and Go (c) Pack and Go (d) Web and Go (e) None of these
55. The boxes that are displayed to indicate that the text, pictures or objects are placed
in it is called.?
Ans. (a) Placeholder (b) AutoText (c) Text box (d) Word Art (e) None of these
56. Which option can be used to set custom timings for slides in a presentation?
(a) Slider Timings (b) Slider Timer (c) Rehearsal (d) Slide Show Setup (e) None of
these?
57. Which option can be used to create a new slide show with the current slides but
presented in a different order?
(a) Rehearsal (b) Custom Slide Show (c) Slide Show Setup (d) Slide Show View (e)
None of these
58. After choosing a predefined template, which option has to be chosen to change the
background color?
(a) Color Scheme (b) Animation Scheme (c) Design Template (d) Color Effects (e) None
of these
59. Which of the following is an example for Automatic Text formatting? (a) Underlining
Hyperlink (b) Adjusting extra space (c)) Rep1acing two -s with an em hyphen (d) All of
these (e) None of these
60. Which of the following button is absent in the formatting toolbar in PowerPoint?
(a) Left Align (b) Right Align (c) Center (d) Justify (e) None of these
61.Which of the following wizards & templates exist in PowerPoint?
(a) Auto content wizard (b) Template (c) Blank presentation (d) All of the above (e) None
of the above
62. Which of the following view is not present in PowerPoint?

(a) Normal (b) Outline (c) Slide sorter (d) Slide show (e) None of these
63. To duplicate a slide using the edit menu we have to go to:
(a) Normal View (b) Slide sorter View (c) Slide show View (d) Any of the above (e) None
of the above
64. Which of the following key (s) is/ used to run a presentation in a Power point ??
Ans. (a) F5. (b) F4 (c) F3 (d) F2 (e) F3
65. The auto content wizard consists of.steps?
(a) 5 (b) 6 (c) 7 (d) 8 (e) None of these
66. There are a total of __________ action buttons in PowerPoint:
(a) 12 (b) 15 (c) 16 (d) 18 (e) None of these
67. To prevent a slide from being displayed during the slide show we :
(a) have to delete the slide (b) can hide the slide by using the animation button (c) can
hide the slide by using the slide show menu (d) any of the above (e) None of the above
68. 30. Which command is used to quit PowerPoint:
(a) Alt + F4 (b) Alt + Shift + F4 (c) F4 (d) Either (a) or (b) (e) None of these
69.The maximum number of slides allowed in one presentation or slide show is
- No maximum limit
70. To find a text in your presentation :- Select Edit; select Find; in the box type text you want to find; click find all
71. To find and replace text in your presentation
- Select Edit; select Replace
72. To add a duplicate slide to your powerpoint presentation :- Select Insert; select Duplicate Slide
73. The presentation created has the default extension of? - .ppt
74.The view where you can type speaker notes to use during your presentation/you can
also print a copy of your notes for reference is : - - Notes Page view
75. The view that is normally used to see the contents of your presentation and to
organise ideas for your presentation; you can see your main points flow from slide to
slide is :- - Outline view
76. The view that lets you rearrange your slide in your presentation easily (you can see
your entire presentation so you can easily add, delete and move slides) :- Slide Sorter view
77. To delete the slide from presentation : - In the Slide Sorter view; select the slide; hit delete key
78. To move a slide in the order of the presentation :- In the Slide Sorter view; select slide; click Cut icon on Standard toolbar; place
cursor between slides where you want to move the cut slide; click Paste icon on
Standard toolbar
79. To insert Clip from Clip Art in the slide :- Select Insert; select Picture; select Clip Art; select category and the clip that you
want to insert; select Insert
80. To insert picture in your slide
- Select Insert; select Picture; select From file; select Clip Art to be inserted; select
0 K
81. To add table in your slide :- Select Insert Table on Standard toolbar and select number of rows and columns

82. The number of predesigned slide layouts in blank presentation :- 24


83. The number of views that allow you to have look at your presentation :- -4
84. To make a change that will affect all slides in your presentation, then make the
change once in the :- - Slide master
85. To display slide number at the bottom of every slide during slide show
- Select View; select Header and Footer; In the box select slide number; click on
Apply to all
86. To add animation to your slide :- Select the slide; select Slide Show; select Present Animation; select required
animation and apply
87. Powe rpoint does not provide :- - Print Layout View
88. Maximum Percentage to which you can zoom a slide :- - 400%
89. The option in print that allows printing copies in proper binding order :- - Collate
90.The slide can be rearranged in : - Slide Sorter View
91. The default filename of PowerPoint :- - Presentation 1
92.The option which allows to give Animation and after Animation effects in Slide Show
Menu :- - Custom Animation

Computer Terminology
Glossary of Technical Terms
AAA: It is the short for Authentication, Authorization and Accounting. It is a system in
IP-based networking to control what computer resources users have access to and
keep track of the activity of users over a network. The AAA services often require a
server that is dedicated to providing the above- mentioned three services. RADIUS is an
example of an AAA service.
Absolute address:
It is a fixed address in memory. The term absolute distinguishes it from a relative
address, which indicates a location by specifying a distance from another location.
Absolute addresses are also called real addresses and machine addresses.
Access Code: It is the same as password, a series of characters and numbers that
enables a user to access a computer.
Access Level:
In computer BIOS settings for Intel desktop boards, Access Level is a maintenance
option that displays the current users access level.
Access Time:
The time a program or device takes to locate a single piece of information and make it
available to the computer for processing. The access time for disk drives includes the
time it actually takes for the read/write head to locate a sector on the disk (called the
seek time). This is an average time since it depends on how far away the head is from
the desired data.
Access:
It means visiting a Web site, the act of reading data from or writing data to a storage
device and when capitalized as Access, it refers to Microsoft Access.
Account name:

It refers to your login ID or user ID. The word you type at the login prompt is your
electronic name.
Account:
It is your subscription to a networked computer system.
Accounting software:
It refers to a class of computer software or programme that helps accounting
professionals mange accounts and perform accounting operations.
Active Cell:
It is the cell in a spreadsheet programme, such as MS Excel, that you are working in
and identified by a thick dark border. When an action takes place in the spreadsheet,
such as data entry, formatting, or deleting data, it is the active cell that is affected.
Address bus:
A collection of wires connecting the CPU with main memory that is used to identify
particular locations (addresses) in main memory. The width of the address bus (that is,
the number of wires) determines how many unique memory locations can be addressed
Address: It is a character or group of characters that identify a register, a location or
some other data source or destination usually in main memory or on a disk. You can
think of computer memory as an array of storage boxes, each of which is one byte in
length. Each box has an address (a unique number) assigned to it: Disks are divided
into tracks and sectors, each of which has a unique address. Usually, you do not need
to worry about addresses unless you are a programmer.
ADP: It is short for Automated Document Feeder. As the name suggests, it is used to
automatically feed pages into the scanners and copiers. This helps in facilitating faster
work as each individual page does not need to be fed into the copier or scanner.
ADSL: It is short for Asymmetric Digital Subscriber Line, which is a type of broadband
communications technology used for connecting to the Internet. It allows more data to
be sent over existing copper telephone lines, when compared to traditional modem
lines. It supports data rates of 1.5 to 9 Mbps when receiving data (known as the
downstream rate) and 16 to 640 Kbps when sending data (known as the upstream rate).
AGP: It is short for Accelerated Graphics Port/Advanced Graphics Port. This is a
graphics card extension port used to attach a graphics card to a computers
motherboard: It is used with games and applications to store and retrieve larger and
better 3D shapes and textures.
AIFF:
It is short for Audio Interchange File Format, a common format for storing and
transmitting sampled sound. The format was developed by Apple Computer and is the
standard audio format for Macintosh computers. AIFF files generally end with a .AIF or
.IEF extension.
AJAX:
It is short for Asynchronous Java Script. It is used to create web pages that are more
interactive and usable. This is done using HTML and Cascading style sheets,
Alert Box: The little box that pops up to inform you that the computer you are working
on is about to perform an operation which may have damaging consequences, is called
the alert box. Usually you can make it go away by a click of the buttons available on it or
by using the mouse.

Algorithm: A process or set of rules to be followed in - calculations or other problemsolving operations, especially by a computer. We use algorithms every day. For
example, a recipe for baking a cake is an algorithm. Most programs, with the exception
of some artificial-intelligence applications, consist of algorithms.
Alignment: The arrangement of text or graphics relative to a margin. The text can be
right-aligned, centered, left-aligned, or fully aligned (justified).
Analog
It describes a device or system that represents changing values as continuously
variable physical quantities. When used in reference to data storage and transmission,
analog format is that in which information is transmitted by modulating a continuous
transmission signal, such as amplifying a signals strength or varying its frequency to
add or take away data. For example, telephones take sound vibrations and turn them
into electrical vibrations of the same shape before they are transmitted over traditional
telephone lines.
Animation
A simulation of movement created by displaying a series of pictures or frames. Cartoons
on television are the examples of animation. Animation on-computers is one of the chief
ingredients of multimedia presentations.
Animator
An individual artist who creates an animation. He/she decides how a model will move,
what a scene looks like, and also what software and tools will be used for production.
Anti-virus
It is a type of computer software that scans files, searches for and gets rid of computer
viruses and other harmful software.
Archive: It is the practice of copying programs and data onto an auxiliary storage
medium (flash, disk, tape, etc.) for long-term retention.
ARPANET: The precursor to the Internet which was a large wide-area network created
by the United States Defense Advanced Research Project Agency (ARPA) Established
in 1969, it served as a test-bed for new networking technologies, linking many
universities and research centres,
Arrow Keys: It refers to the keys on the keyboard used to move the cursor up, down,
left, or right.
Assembler: A program that translates programs from assembly language to machine
language.
Assembly language: It is a low level programming language using the human
readable instructions of the CPU It consists of instructions that are mnemonic codes for
corresponding machine-language instructions. Machine languages consist entirely of
numbers and are almost impossible for humans to read and write.
ATA: It is short for Advanced Technology Attachment. The drive controller is directly
connected to the drive, using ATA, which is a type of disk drive A specific controller is
not required to support the drive as the ATA hard drive is enough for the computer,
provided the motherboard supports an ATA connection.
ATM: It is the short form for Asynchronous Transfer Mode a network technology based
on transferring data in cells or packets of a fixed size: The cell used with ATM is
relatively small compared to units used with older technologies which allow ATM

equipments to transmit video, audio, and computer data over the same network, and
assure that no single type of data hogs the line.
Attachments: It refers to a file attached to an e-mail message when you send it to
someone else.
AUP: It is short for Acceptable Use Policy. It is a contract speci1ing what a subscriber
can and cannot do while using an Internet Service Provider (ISP)s service and contains
things like liability disclaimers, lists of actions or behaviour that will result in the
termination of a customers account.
Authentication: It is the process of identifying an individual, usually based on a
username and password. Authentication is based on the idea that each individual user
will have unique information that sets him or her apart from other users.
Authorisation: It is the process of granting or denying a user access to network
resources, once the user has been authenticated through the username and password.
The amount of information and the amount of services the user has access to depend
on the users authorization level.
ABACUS:
The earliest known computing device in which beads are moved along wires set in a
wooden frame.
Algorithm: The step by step procedure in defined terms to perform a work.
ANALOG:
Representation and measurement of numerical data by continuously variable physical
qualities.
Eg. There are infinite numbers between one and two. (See DIGITAL)
APPLICATION SOFTWARE: A computer program compiled for some specific purpose
such as word processing, desktop publishing or communications.
ARROW KEYS: Keys used to move the cursor to the four directions left, right, up and
down.
ARTIFICIAL INTELLIGENCE: The science of making machines that can reason like
human beings.
ANALYTICAL ENGINE: Mechanical calculating machine developed by Charles
Babbage in 1833. It is considered as the proto type of computer.
ANIMATION : Process of making an object appear to move by rapidly displaying a
series of pictures of it.
Antivirus program: It is a utility that protects computer against viruses by identifying
and removing any computer viruses found in memory, on storage media or on incoming
files.
Backup system: It is a way of storing data to a second medium as a precaution in case
the first medium fails. Even the most reliable computer is apt to break down eventually.
So, to be safe, you should keep one backup in a different location from the others using
operating system commands, or you can buy a special-purpose backup utility. Backup
programs often compress the data so that backup require fewer disks.
Bandwidth: Bandwidth refers to the amount of data that can be transferred through
either a modem connection or network within a stipulated time. It is measured in two
waysin analog devices, Hertz or cycles per second is used whereas in digital devices
it is represented in Bits per second (bps) or Bytes per second.

BASIC: It is short for Beginners All-purpose Symbolic Instruction Code. It is a highlevel programming language which was developed in the mid-1960s and was easy to
understand and simple to use. Numbers were originally used at the beginning of each
instruction to tell the computer the order in which to process the instruction. Now-adays, Loops are used to provide instructions.
Baud Rate: The baud indicates the number of bits per second that are transmitted.
The higher the baud rate the faster data is transferred.
Bcc:
It is the short for Blind Carbon Copy, which comes along with commands To and Cc
and appears while an email is being sent. M e-mail address written in the Bee box will
enable the mail to be sent to the recipient without the knowledge of the main recipient.
Beta test:
A test for a computer product prior to commercial release. Beta testing is the Last stage
of testing, and normally can involve sending the product to beta test sites outside the
company for real-world exposure or offering the product for a free trial download over
the Internet. Beta testing is often preceded by a round of testing called alpha testing.
BACK SPACE: Key that moves the cursor one place to the 1eft erasing the character.
BASIC: Beginners All -purpose Symbolic Instruction Code, an easy - to learn computer
language using simple words and symbols.
BASIC STATEMENT: The unit of a BASIC program. In BASIC, each instruction given to
the computer is a statement.
BINARY DIGITS: Either the character 0 or 1, the digits in the binary numeral system.
BIT: Abbreviation for Binary Digit.
BLANK PRESENTATION: An empty square space in the software to prepare display
slides.
BOOTING: To start or restart a computer system by loading part of the operating
system into the main memory of the computer.
BYTE: Short for binary digit eight. Unit of memory.A group of eight bits.Represents a
letter, symbol or space.
CAPS LOCK: A key used to Shift alphabet characters from lowercase to UPPER
CASE.
CD DRIVE: A drive, like a Floppy disk drive in which a CD-ROM is used.
CD-ROM: Short for Compact Disc-Read -Only Memory. An optical disc (120 cm in
diameter and 1.5mm thickness) which can store 650 megabytes of information.
CHARLES BABBAGE: The inventive genius of the 19th century who designed and
made mechanical calculating machines. He is known as the father of computer.
CLICK: Press and release left-mouse button once.
CLIP ART: A collection of ready- to-use pictures that can be used in documents created
using a computer.
CLOSE: To stop the running of a program.
COMMUNICATION : Transfer of information between a transmitter and a receiver.
COMPUTER LANGUAGE: A set of rules or conventions for instructing the computer.
BASIC, COBOL and JAVA are some of the computer languages
COMPUTER PROGRAM: A sequence of detailed instructions used to direct the
operations of the computer.

COPY: To reproduce data in a new location or other destination, leaving the source data
unchanged.
COPYRIGHT: Right of a person or institution on original creations, pictures, video
clipping and. software. Copyright prevents others from using these material without
permission of the copyright holder.
CPU (Central Processing Unit): Short for Central Processing Unit. It is the computers
brain. it is an integrated circuit that carries out computation& and logical operations.
CURSOR: A movable mark used to indicate a users position on the computer screen.
CUT: Removing a file or part of a file for pasting elsewhere.
DEFAULT: A present value, option or setting applied by a programme unless the user
specifies otherwise.
DELETE KEY: Key that deletes a character or selected text or graphics.
DESK TOP: The screen seen when the operating system is ready for work.
DIALOGUE BOX : The small pop-up windows in some application programs, usually
containing a question that requires a response from the user.
DIGITAL: Having a discrete set of values, as opposed to a continuous set of values.
(See ANALOG)
DIGITAL CAMERA: A camera which uses digital technology to capture images, instead
of a photographic film. The digital image is stored in the cameras memory and this can
be transferred to an outside storage device such as a hard disk.
DIRECTORY: A list of all the files on a disk. Also called folder.
DISK DRIVE: A device that holds a floppy disk or a hard disk and reads and writes data
using a read/ write head.
DOCUMENT AREA/CLIENT AREA: Area in window for preparing text or image.
DOCUMENT: Collection of information or text prepared using a software,
DOT MATRIX PRINTER: A printing device which prints characters as a pattern of
closely-spaced dots produced by a set of tiny pins.
DOUBLE CLICK: Two quick clicks on a mouse button without moving the mouse. Used
for starting a program or program feature shown through icons.
DRAG: Pressing the mouse button, holding it and then moving the mouse. An image or
block of text can be moved by dragging.
DTP: (Desk Top Publishing) : Desktop Publishing. Using personal computer and
graphics software to design, and print pages complete with pictures and text
EDIT : Method of modifying data in files (eg. insert, cut, copy, paste etc.)
EDIT MENU: Menu showing options for editing text and pictures (cut. copy, paste etc)
Open Source Software: is provided for use, modification and redistribution and has no
restriction from the copyright holder. It can be usually downloaded from the web at no
cost.
ELSE IF: Command in BASIC, applied when the condition following IF is not satisfied.
E-MAIL : Short for electronic mail. A method for sending message by the use of
computers and telecommunications.
END : Instruction in BASIC to show that the program is over.
END KEY: The key which moves the cursor to the send position defined by the
application program.
ENTER: Inputting data into the computer through the key board.

ENTER KEY: The key, when pressed, transmits instruction to the computers. When it is
pressed the cursor will move to the beginning of the next line.
ERASE: Erasing data from floppy disc or hard disc.
ERROR: A mistake causing a computer program to produce incorrect results.
Exit: to stop the operation of a program and switch back to the operating system of the
computer.
Electronic Mail: It refers to the process of sending, receiving, storing and forwarding
textual messages in digital form through telecommunication channels.
Electrostatic printer: It is a non-impact printer. It prints dot-matrix characters one at a
time with the help of wires or pins that supply electrical charge in the desired patterns
on to an aluminum coated paper.
Electrostatic storage: It refers to a storage medium, as for the screen of a CRT, that
stores hits in the form of charged areas.
Electro thermal printer: It is a high-speed printer. It makes use of heated elements to
create characters as matrices of small dots on heat sensitive paper..
Element: It refers to an item of data within an array or a matrix.
E.M.I: Electro-Magnetic Interference.
Emmiter coupled logic: It is a type of logic circuit generally used in high speed
computers.
Emulate: To imitate one hardware system with another with the help of an electronic
attachment. The imitating system behaves exactly in the same way as the system
imitated.
Emulation: To act exactly like another e.g., a computer that emulates another has the
same physical, electrical properties. Emulator is a device that is used in conjunction with
special routine and it enables the computer in executing the machine language
programs written for another computer of dissimilar design without any prior translation.
It generally consists of stored logic in a read only storage unit, that interprets and
stimulates the functions of each instruction in the original computer program.
Encipher: It means to change the information according to certain well defined rules so
that it can not be read without the knowledge of these rules.
Encode: Means to convert data into a code.
Encoder: It is the circuit that carries out the work of encoding.
Encryption: It refers to the process of changing a message in such a way that it
becomes incomprehensible to anyone except to those who have the key to its
decryption.
End: It is a programming statement that signals the end of statement to be executed at
the end of the program.
End-effector: It refers to the hand attached to the manipulator of robot. It is also called
gripper.
End-mark: A code used when working with a stream of data when it is necessary to
indicate the end of various items
End user: It refers to any person who uses computer with software. Programmers are
generally not considered as end-users.
Enter key: A key on some keyboard that is used to transfer the lines of data that have
just been typed to the computer for processing and to return the cursor to the firstposition on the next line.

Entity: Refers to any object that has some meaning for a specific application.
Entry: It refers to the process of inputting data.
E.O.B: End Of Block.
EOD : End of Day
E.O.F: End of File.
E.O.J: End of Job.
E.O.M: End of Message.
E.O.T: End of Transmission.
E.P.O: Emergency Power off.
E.P.R.O.M: Erasable Programmable Read Only Memory.
Erasable: It is a method of storing information that permits you to erase the same
information e.g., magnetic tape, floppy tape, etc.
Erase: To remove data from storage without replacing it.
Ergonomics: It is the study of the physical relationships between people and their work
environment.
Error: Refers to any discrepancy between a computed, observed or measured quantity
and the true or theoretical value. Error can be due to mistakes in programming or due to
faulty equipment or human mistakes.
Error-message: A programmer can put a message on the screen to show wrong when
ever an error occurs. Such a wording is called error-message.
Escape character: It refers to a character that causes the character that follows it to be
interpreted differently from those preceding it.
Event: It refers to an occurrence during the execution of a task.
Excel: It is a page mating DTP software.
Execute: Means to run a program on computer.
Exerciser: It is a device that enables users to create and debug programs and
hardware interfaces manually.
Exit: It is that point in an algorithm or a program from which control is transferred
somewhere else.
Exit point: It is the address of the instruction in a program that transfers control to a
subroutine.
Extension: Additional features added to a programming language or computer system.
External reference: Reference to a symbol defined in another routine.
Extraction: The process of selecting various components from a storage unit.
Face maker: It is a piece of software. It is used on Commodore -64 home computer. It
develops the childs talent for creative design.
FACES: Face Analysis Comparison and Elimination System.
Facsimile: It refers to the scanning of a document and converting the shading into
signals that can be transmitted with the help of wires or radio waves. A copy of the
original document is then created with the help of these signals.
Fail safe: It is a system designed to avoid catastrophe, possibly at the expense of
convenience.
Fan-in: It refers to the number of input uints (mostly fixed) to a logic gate or logic
device.
Fatal error: It prevents the execution of a program and causes processing to cease.

Fault tolerant: Provided with back up circuits in such a way that in case of failure
duplicates would automatically switch on. In many cases a duplicate circuit repeats the
activity of its main circuit so that no loss of data occurs during the switch over.
Fault tolerant:
Provided with back up circuits in such a way that in case of failure duplicates would
automatically switch on. In many cases a duplicate circuit repeats the activity of its main
circuit so that no loss of data occurs during the switch over.
F.D.M: Frequency Division Multiplexing.
F.E.A: Finite Element Analysis.
Feed: It refers to the movement of computer text by one line. The inclusion of feeds in
text output to printers ensures that the printer moves down a line after it prints each line
of text on paper. Line feeds are generally used in conjunction with carriage returns.
F.E.I: Federation for Electronic Industries (India).
Fetch: It refers to a command for accessing an instruction in a specified memory
location for purpose of decoding and execution.
F.G.C.S: Fifth Generation Computer System.
F.I.F.O: First In first Out.
Fileconv: It is a data conversion software. It is used to convert data in one language
format to another languages.
FILE: Collection of related records treated as a basic unit of storage. To handle files and
distinguish between them,, the files are to be named.
Finesse: A DTP software.
FIPS: Federal Information Processing Standard.
Firm ware: Refers to programs that are held in read only memories (ROM). Such
program can be accessed quickly and are not- lost when the machine is switched off.
First generation computers: Refers to computers started in 1940. Such computers
used electronic valves. Some such computers are EDSAC, EDVAC, ENIAC, etc.
Fixed length riles: They store record in such a way that the application program can
reach for them directly without reference to any other record.
Fixed point arithmetic: It involves having the decimal point of every number in the
correct place. It is possible to set the position before a calculation.
Flag: It is an indication in the program to mark an unusual event or show the existence
of a certain condition. It is generally a single bit which is set to on or off as the program
executes.
Flip flop (FF): An electric circuit element capable of exhibiting either of two stable
states and of switching between these states in a reproducible manner. They are one bit
memory elements. They are frequently used in digital circuits.
Flippy: Double sided floppy.
Floating point notation: A representation of real numbers that enables both very small
and very large numbers to be conveniently expressed.
Floppy disk: It is a flexible magnetic disk that is used for supplying and storing data for
a micro computer. Disk may be single or double sided.
Flow chart: It is a pictorial description of time sequenced activities and logic to be
performed by computer for carrying out data processing on computer, such charts are
used by programmers to start programming activity before actual programmes are
written.

FOLDER: A named group of files. Also called Directory.


FONT : A type face of particular size and particular style.
FORMAT: The way a document looks on a screen or page.
Focus: It is the worlds largest selling 4GL/ DBMS with a whole new concept in
information management.
Font: A name given in the type face for all characters and punctuation including the
size.
Format effector: It is a control character. It is used to adjust the format of data printing,
recording or displaying generally by a symbol #.
Form feed character: A format effector causing a printer to move to the first line on the
next page or form.
Forth: It is a programming language. It is many a time faster as compared to BASIC. It
is good for jobs that need a quick response.
Fortran: Formula Translation. It is a programming language widely used for scientific
computation.
Fourth generation computer: It refers to computers built during 1980s. They have a
capacity of 5000K and speed of 30 million instructions per second (30 mips).
Fourth generation language (4GL): These are the most recent types of programming
languages. Each language is designed for a particular type of application.
Fox base: Data Base Management System: It is similar to dBase III. It is quite versatile.
Fox message: A sentence typed to check that each character is being transmitted
correctly, by a terminal.
Frame: An often misunderstood word in that it describes one screen full (about 150
words)
Freeware: is a copyrighted software provided at no cost to a user by an individual or a
company.
FUNCTION KEYS: These keys can be programmed to do special jobs.
G: A symbol used for greater than
GRAPHIC : Computer - generated pictures -line drawing, bar graphs or detailed
images.
GUI (Graphical User Interface): An interactive user interface that graphically displays
information.
GB: Giga Byte
GE: A symbol used for greater than or equal to
GCR: Group Code Recording
GHz: Gigahertz
GIF: Graphic Interchange Format
GIGO: Garbage In Garbage Out
GINO: Graphical Input Output
GKS: Graphical Kernalsystem
GMN:Global Music Network
Garbage: It refers to less data dre to errors in the program or in the data.
GATE: It refers to a part of a transistor though it is used to describe a logic circuit with
several inputs and one or two outputs.

Gateway: A device such as mini or microcomputer capable of operating on a stand or


alone basis but which also provides a connection for communication with other
computers and access to shared resources.
GIST: Graphics based International Script Technology
HARD DISK/DRIVE: Storage device permanently mounted inside a computer. Can
store several million bytes of information.
HARDWARE: Physical equipment of computers such as electronic, magnetic and
mechanical devices.
HOME KEY: The key that moves the cursor to the beginning of a line.
ICON : A symbol that graphically represents a program or program feature in the
software or the computer.
IFTHEN - A statement in basic winch specifies the operations to be carried out while a
condition is true.
INFORMATION: Data that has been collected and processed into an organised usable
form.
INFORMATON - TECHNOLOGY : The application of appropriate technology to transmit
store and manipulate information to solve -problems and make decisions.
INK JET PRINTER: Type of printer in which ink droplets are propelled using electrical
signals to print letters and images.
INPUT DEVICES : Devices such as keyboard, mouse etc. that accept data from the
user, convert them into electrical signals and give them to the computer
INSERT: Options in a software for incorporating text, pictures or audio into a page.
INTERNET: A network of millions of computers around the world. Individual computers
and local computer networks can be connected to the internet.
JOY STICK: Input device connected to computers, especially for games.
KEY BOARD : An arrangement of typewriter keys and supporting circuits used as an
input device in computer system.
LAP TOP COMPUTER: A small portable computer that can be kept on the lap.
LASER stands for Light Amplification by Stimulated Emission of Radiation.
LASER PRINTER: A printer that uses laser beams to produce images on paper.
LAYOUT: The overall style of arrangement of text, pictures and letter in a page.
LET: Instruction in BASIC to fix the value of a variable.
LIGHT PEN: A hand held light sensitive input device used to control the cursor by
simply touching the display screen.
LINE: Instruction in BASIC to draw a line.
LINK: Communication channel between two systems or devices.
LINUX: A kernel of an operating system modeled on UNIX, developed by Linus
Tolvalds.
LOGIN/LOGON: The process of identifying a user by a password, to a computer.
MAINFRAME COMPUTER: A large computer capable of processing data very fast.
Used as the central computer in big institutions.
MAXIMISE: Title bar button to enlarge window size to the maximum.
MICROPHONE: Device connected to a computer that accepts sound as an input.
MINI COMPUTER: A Computer bigger than a microcomputer and smaller than a main
frame computer.

MINIMISE BUTTON: A button for reducing a window to the form of an icon. When the
mouse pointer is clicked on this icon, the window assumes its original size.
MODEM: Short for modulator/demodulator. An electronic device that enables a
computer to communicate and exchange information through a telephone line. A
modem converts telephone signals into digital signals and vice-versa
MONITOR: Television like device used for displaying images generated by the
computer.
MOUSE: A mechanical or optical pointing device used to move the on- screen pointer.
The mouse has one or more buttons to,-signal to the computer the selection of various
program options.
MOUSE PAD: A flat surface to move the mouse on.
MULTIMEDIA: A collective name for text, pictures animated graphics, sound and video.
Multitasking means running more than one application in memory at the same time.
Nanosecond means one billionth of a second.
Network (as applied to computers) typically means a group of computers working
together. It can also refer to the physical wire connecting the computers.
Notebook is a small laptop with similar price, performance and battery life.
Organiser is a tiny computer used primarily to store names, addresses, phone numbers
and data book information. They usually have some ability to exchange information with
desktop systems.
Optical Disk is a high-capacity storage medium
OS (operating system) is the program that manages a computers resources. Common
OSes include Windows 95, Windows 2000, Windows XP, Mac OS, Linux, Solaris,
Amiga OS, AIX, Windows NT, etc.
Palette is a small floating window that contains tools used in a given application.
Partition is a subdivision of a hard drive surface that is defined and used as a separate
drive.
Paste means to insert text, or other material, from the clipboard or copy buffer.
Pager:is a small radio receiver that signal users to call someone.
PC(Personal Computer): properly refers to any desktop, laptop or notebook computer
system.
PCI is an acronym for Peripheral Component Interchange - the newer, faster bus
architecture.
Peripheral is an add-on component to your computer.
PDA (Personal Digital Assistant) is a small battery- powered computer intended to be
carried around by the user rather than left on a desk. It is a hand held computer that
store and organise contract information, calendars, task lists and other organizational
and travel information. This means that the processor used ought to be power-efficient
as well as fast, and the OS ought to be optimized for hand-held use.
Platform represents a computers family. It is defined by both the processor type on the
hardware side and the OS type on the software side. Computers belonging to different
platforms cannot typically run each others programs (unless the programs are written in
a language like Java).
Pointer: it is a small symbol displayed on the screen that moves as a user moves the
mouse.

Pop-up menu: Any menu that does not appear at the top of the screen in the menu bar
(may pop up or down).
Port is a connection socket or jack on the computer.
Print Spooler is a program that stores documents to be printed on the hard drive, there
by freeing the memory up and allowing other functions to be performed while printing
goes on in the background.
Printer is a piece of hardware that will print computer information onto paper.
Processor (CPU or Central Processing Unit) is the part of the computer that actually
works with the data and runs the programs. There are, two main processor types in
common usage today: CISC and RISC. Some computers have more than one
processor and are thus called Multiprocessor.
Program is a series of instructions for a computer, telling it what to do or how to
behave. It is also the verb that means to create a program, and a programmer is one
who programs.
Punched Card
An early storage medium. In Computers that are displayed in a shop. These computers
are mainly for preview. These computers are rarely firewalled but are monitored. They
are likely to have internet accessit. Data is represented by a series of pattern holes in a
stiff card. Each card can contain upto 80 characters.
Punched tape : Refers to the paper tape after it has been punched. In it, each row
stores one character.
Purge : To erase a file.
Push : To put data into the top locations of a program stack.
Put: To write a record.
Q.B.E : Query By Example.
Q.L.S.A.M : Queued Indexed Sequential Access Method.
Quad density : It is used for specifying the data storage capacity versus space of the
computer disk.
Quantizing noise : Refers to the background noise that is caused by the pulse codemodulation errors.
Query language : Refers to a language that is particularly designed to assist the user
to interrogate a particular database.
Quest : An educational software.
Queue : It is a list or line of data, where new items are added at one end and the items
are taken from other end.
Queued access method : Refers to any data access method wherein the transfer of
databetween main memory and inputJoutput device is automatically regulated
synchronously.
Quenching theory : It is a research technique that concerned with searching of the
correct sequential orders of moving units.
Quick disconnect : It is a type of plug in electrical socket that permits rapid locking and
unlocking of the making connector valves.
Quick Medical Refrence (QMR) : At Expert
System that serves as an electronic text book, a low level consultant and a diagnostic
consultant.

Quip: Quad-in-line package. It has four columns of pins on the IC package, as


oppossed to a dual line, packed with two rows.
QWERTY: The keyboard layout of alphabets as in a type writer.
RAM is acronym for Random-Access Memory.
Reset Switch is a switch that restarts the compiler in the event of a crash or freeze.
Resize Box is the small square at the - lower right corner of a window which, when
dragged, resizes the window.
RISC is acronym for Reduced Instruction Set Computing; the smaller set of commands.
ROM is acronym for Read Only Memory; memory that can only be read from and not
written to.
Root directory is the main hard drive window.
Run: Running a program is how it is made to do something/The term execute means
the same thing.
Race condition : Refers to indefinite state that results when two computer instructions
are operating concurrently and it is not possible to guess which of them will finish first.
Radix : The number of distinct digits in a fixed- radix number system.
Radix point Refers to a symbol that is used to separate an integral part from fractional
part of a number expressed in a radix notation.
Radix sorting : It is a process of sorting algorithm wherein the file is first sorted on the
least significant digit of the sort key, then the nextand so on.
Random access : Refers to those files that permits the operating system to find out the
exact position of any record instantly.
Random access device : It is a peripheral (e.g. magnetic disk) that can be read in a
different order from that in which it was written.
Random logic : Refers to a relatively non-uniform digital logic circuit.
Random number generator : It is a device that produces a series of random numbers
in a required quantity.
System Interrupt : Means a break in the normal execution of a program or routine that
is accomplished in such a way that the usual sequence can be resumed from the point.
System overhead : It is the percentage of time that a computer system functions as a
supervisor rather than in the performance of an actual program.
Syatenidisk : A disk reserved for storage of programs and data used by the operating
system and of various other system programs.
System software : Refers to software which performs tasks for the system itself.
Save means to write a file onto a disk.
Save as (a File menu item) means to save a previously saved file in a new location
and/or with a new name..
Scanner is a piece of hardware that will examine a picture and produce a computer file
that represents what it sees.A digital camera is a related device.
Scroll means to shift the contents of a window to bring hidden items into view.
Tab: Symbolic representation for tabulate.
Task: Refers to any programme that can be executed.
Template: Template is a document that contains the formatting necessary for a specific
document type
Title Bar is the horizontal bar at the top of a window which has the name of the file or
folder it represents.

Trojan Horse: It is a malicious - logic program that hides within or look like a legitimate
program such as a screen saver.
Tab: Symbolic representation for tabulate.
Table : The arrangement of data in rows and columns. It also refers to the reoord of
observation in such a form that it allows different results to be related to one another.
Tablet : It refers for data tablet which is a magnetic input device. It converts graphics
and pictorial data into binary inputs for use in computers.
Tabulate : Means to print results in a desired format and tabular form.
Tacos : It is a data conversion software. It is used for converting data in one language
format to another language.
Tag : It refers to that portion of an instruction which carries the numbers of index
register that affects the address in the instruction.
Tag file :It is a collection of tags stored as file. It is used in a program to directly access
the full records stored in another file.
Tag reader : It is an electronic device that isused to capture data on bar coded rags
relating to different commodities.
Tag sort: It is a sort of tag file but not a full file. It is used for quick retrieval of records
from the original file.
Tail : It refers to the special data item that locates the end of a list.
Talk : The process of transferring the data between two devices e.g. between a
computer and a terminal.
Tape: Refers to magnetic tape. A magnetic tape is used to store information transmiffed
from computer. Paper tapes are also used for this purpose. In case of magnetic tapes,
data is generally stored in blocks. In this, the computer checks each block in addition to
checking the parity bit of each character.
Tape cassette : It is a sequential access storage medium. It is used in microcomputer
systems for digital recording.
Tape drive : It is a magnetic storage device. It uses magnetic tape or tape cassette or
cartridges.
Tape file : Refers to a file recorded on a magnetic tape.
Tape Format : It is the format of information that is recorded on magnetic tape. It
permits the system to recognise control and verify the data.
Tape-header : It refers to the header label written at the beginning of a volume of
magnetic tape.
Tape label : It is the first record on magnetic tape reel. It contains information about the
date of recording. name! number of record on tape, etc.
Tape mark: It is a signal recorded on magnetic tape. It is used to delimit the sections of
data.
Tape operating system : Refers to an operating system that is stored on tape and not
in
Upload means to send a file from one computer to another through a network.
UPS is an uninterrupted power supply; uses heavy duty batteries to help smooth out its
input power source.
Uniform Resource Locator (URL) is a Web address that gives the exact location of an
Internet resource.
User is the operator of a computer.

Usenet Newsgroups is one or more discussion groups on the internet where people
with similar interests can post articles and reply to messages.
Update : Refers to the process of changing a file or program package in order to make
it uptodate. For this, new data is included and old data is replaced by making necessary
alterations.
Upgrade : Means addition of new products to the existing computer system.
Upload: Means to send computer information or program to a source, generally another
computer receiving over a telephoneline.
Up time : It is the time during which a computer, a component of a.computer system, or
a software system is up.
Upward incompatible : It indicates that a computer system or peripheral device can do
everything that any previous model was capable of doing and in addition to that it has
certain additional features.
User : Refers to anyone who uses the computer.
User area : It is the pan of the main memory of a computer that is available for a user
by the users programs.
User defined function : Refers to a function that has been defined by the user. Such a
function is stored through user defined key that is provided for the purpose.
User defined key : It is one of the set of 10 or more keys provided as a group on
personal computer that is capable of performing a predefined function through a
program.
User friendly : It refers to that computer, terminal program, etc. that can be easily used
and understood by a wide variety of peo; pIe.
User group : Refers to a group of people who regularly meet or correspond due to their
interest in a particular machine or suite or program.
User program : An application program written by a person who is not a programmer in
a computer system.
User part : It is a micro-computers casing that permits the user to connect additional
equipment or peripherals.
Utility : It is the program that helps the user run, enhance, create or analyse, other
programs, programming languages, operating systems and equipments.
Utility function : Refers to any function thatis carried out by a utility program e.g.
copying of data from cards of disk to magnetictape, etc.
Utility program : A program that is designed to assist an operator for carrying out some
specified task e.g. listing a file held on magnetic tape or disk, etc.
V.A.B. : Voice Analog Back.
Vacuum tube : Refers to an electronic thermionic valve. It can be used as an amplifier
or as a switch.
Validation : Means to check input against some pre-defined set or criteria so as to
minimise errors.
Validity check: Refers to a check that is carried out for verification that it is actually a
valid code.
Valve Added Retailers (VARS) : Refers to those who provide customers with products
with a slight extra trimming on the
original.
V.A.M. : Vision Aided Manufacturing.Vamilla : Refers to the default or automatic

setting on a word- processing program e.g. some assumed type of processor to which
the program is expecting to send its information.
Variable : Refers to anything that can change or vary. In case of computers, it refers
tosome numerical value or to a text string which has been defined as variable.
Variable instruction length : Refers to a CPU having the ability to recognise various
types of instructions with varying lengths.
Variable legth character encoding : Means the use of variable number of bits for
representing characters in such a way that the most frequently used characters can be
represented with the least number of bits. It helps in reducing the amount of storage
space used.
Variable length recorders : Those records in a file which may vary in length, generally
because the file contains two or more types of records each of which contains different
types and numbers of fields.
Variable word length computer: A computer wherein the number of bits contained in a
word varies depending upon the data or instruction.
V.D.T. : Visual Display Terminal.
V.D.U. : Visual Display Unit. It is an output device that can display information
temporarily
Vector : A one-dimensional arrangement of numbers i.e. a single row or a single
colunm.
Vector display : Refers to cathode ray tube that moves the electron beam randomly to
trace a figure on the screen.
Vector graphics : It is the vector approach to computer graphics.
Vectored interrupt : An interrupt system wherein an intenupt causes a direct branch to
the routine that handles it.
Vector pair : Refers to those dam points which make up the opposite ends of a vector.
Vector processor : Refers to a set of processorswherein different elements of a vector
are processed simultaneously with each processor handling a single element.
Vector processing : It refers to the processing of a data in a uniform manner. It can
capitalize on the use of pipeline processing
Vector refresh : Refers to the electronic beams that glow the pixels exactly in the same
way as the image while producing image and pictures on computer screen.
Vendee : Refers to a customer (individual or business party) who makes purchase of a
hardware or a software system.
Venn diagram : Such a diagram makes use of circles and ellipses for graphic
representation of logic relationships among sets and sub-sets.
VERB: It is a procedure-oriented language.
Verification: A check to find that something has accurately been typed and transmitted.
The data is entered from the keyboard twice as a check on its integrity.
Verification machine : A device resembling a key punch machine. It is used for
checking the accuracy of a previously punched check.
Verifier : It refers to the device that is used for detecting key punching mistakes by
rekeying.
Version : Refers to specification and revised release of a software product of some
particular hardware model. It is generally numbered in ascending order.

Version control : Means control of the creation and usage of the various versions of
any given entity.
Vertical Format Unit (YFU) : It is part of the control electronics of a printer. It governs
the vertical format of the document to be printed.
Vertical scrolling : Refers to the ability of a software package to move up and do
through a page or more of data displayed on a video screen.
Very High Frequency (VHF) : The frequency bend between 30- 3000 MHz.
Very Large Scale Integration (VLSI) : Having logic gates above 5000 on a chip about
half a centimeter square.
Video : Refers to the T.V. picture band width and frequency spectrum position.
Video conference : Refers to a discussion between two or more groups of people who
are in different places but can see and hear each other. Such conferences take place
across the world using satellites.
Video digitizer : It is an input device. It digitizes the signals received from a video
camera and stores the information in computer memory. In computer memory, the
information can be modified or analysed by the computer.
Video disk: It is a mass storage media.
Video signal : It is a signal in a television set that provides the picture.
Videotex : Refers to any information service that can display text on the screen of a T.V.
set. It is similar to tele text except that user can transmit information to the system. It is
also referred to a view data.
Vidicon : It is a tube inside a T.V. camera. It converts the image of a scene into an
electric signal.
View data :Refrs to an information retrieval service in the form of pages or frames
which the user can call up from a dumb terminal or key pad.
Virgin medium: Any material that is suitable for recording of data (e.g. magnetic tape or
disk, paper tap, etc.) but has not been used for that purpose.
Virtual: Something that replicates another condition so that to the user Or the program
they are indistinguishable.
Virtual address : An address that refers to virtual storage. Before calling for use, it
should be translated into real storage address.
Virtual call service : In a packet switching network, it refers to a technique of setting up
a virtual connection between terminals before the transmission of user data.
Virtual connection : Refers to a logical connection between two network terminating
points that seem to the end equipment as a physical connection.
Virtual device interlace : It refers to a functional as also a syntactic specification that
standardizes interfaces between GKS and device managers of drivers.
Virtual memory : It is a facility available in large modem computer with the help of this
facility the programmer is not restricted by the size of the machines memory.
Virtual memory storage : It is a direct access storage device that is used to store
programs which need more space than is available in main memory while they are
being executed. One of the methods used for virtual storage in PAGiNG;.
Virtual Storage (VS) : It is a technique for managing execution of program by utilizing
limited quantity of internal storage and a much larger quantity of lower-speed external
storage in such a way the distinction is quite transparent to a computer user.

Virtual Storage Access Method (VSAM) : It is an access method that is suitable for
files with sequential or relative organistation on direct access storage device.
Virus : Refers to a routine introduced into a program, when activated produces
unwanted result that can range from displaying messages on the screen to the partial
orthe beginning of a magnetic tape to identify the name or number assigned to the tape
reel.
V.R.C. : Vertical Redundancy check
V.S. : Virtual Storage
V.T.O.C. : Volume Table Of Contents.
Voice Mail is a computerised telephone message recording system; an e-mail system
that supports audio.
W.X :It is a large micro-computer system that has been manufactured by Digital
Equipment Corporation.
Web pages are related files containing multimedia data that are made available on a
web site.
Worms are form of computer sabotage sent by e-mail that reproduce, taking up network
space and snarling connections.
www (World-Wide-Web) refers more or less to all the publically accessible documents
on the Internet. It is used quite loosely, and sometimes indicates only HTML files and
sometimes PP P and Gopher files, too. It is also sometimes just referred to as the
Web.
Website is a related to collection of files on the World Wide Web and accessing Internet
resources such as text, graphics, sound, and other multimedia resources.
Word processor is a program designed to help with the production of textual
documents, like letters and memos. Heavy duty work can be done with a desktop
publisher. Some common word processors include MS-Word, WordPerfect, Abi Word,
Wafer : Refers to a thin slice cut from a large crystal of a semiconductor material
(germanium or silicon crystal), Hundreds of IC dice may be processed in a single
wafer.
Wafer processing :It refers to the processing of thin slices of a semi-conductor (wafer)
to make circuits. After being processed, the wafer is separated into dice or chips.
Wafer sort :Refers to the process of testing and identifying which dice on a wafer are
acceptable
Wait list: It is a list of the processes that are still waiting the completion of certain
activity before they can again run on a processor.
Wait time :The time during which a program or computer waits for completion of other
activities.
Walk through : Refers to a product review that is performed by a formal tram.
WAMI :World Association or Medical Informatics.
WAN: Wide Area Network.
Wand :It refers to a hand held device that is used for reading magnetic characters, bar
codes, etc. It resembles the pencil.
Warm boot: It is the process of fooling the computer through program to realise that its
power has been turned off though thepower is still on.
Warm up time : It is the time between the energizing a device and the beginning of the
application of its output characteristics.

W.A.T.S :Wide Area Telephone Service.


Wave :Refers to a high-level interactive language that was developed in 1971.
W.C.C.E : World Conference on Computers in Education.
Weed :It is the process of destruction ofpresently undesirable items from a file.
Weighted : Refers to a binary code wherein a value has been assigned to each bit
position.
Weighted check digit :It is a method of validating data entry where this digit is put at
the end of a number of string of characters to confirm that there has not been a change
during its transfer that may be by hand or bywire.
Weighted code :A code wherein each bit-position has a weighted value.
Wheel printer : Any printer having a printing mechanism containing the printing
characters on metal wheel.
Whirl wind :Refers to the first realtime computer. It can calculate at high speed.
White noise : Refers to the electrical interference that produces a buzz or hum. It takes
place when the electrical components have been on for sometime and have warmed up.
Wide hand :In data communication, it refers to a channel that can take up
communication at wider frequency range or band width more thah a voice grade
channel.
Window :It is a programming technique. In this technique, a section of the screen is
designated to act as a viewing area for another body of text or information. Different
windows may show different applications.
Windowing :It refers to act of displaying two or more files on the screen simultaneously.
By this means, a variety of information can be displayed simultaneously.
Wire brush type scanner :It is a type of card reading scanner in. which wire-brush
sensor goes over a hole and makes contact with a metal plate below then passes a
signal of binary.
Wired program computer :It is a device that was used with mini and upward
computers before the invention of operating systems such as DOS. It helped in
programming a computer.
Wire frame :It is a simple method to represent a model in computer graphics. It aims to
draw the lines to represent the boundaries of the objects in the scene. In case the scene
is made up of polygons then the edges of it are drawn.
Wire wrap : It is a type of circuit board construction.
Wisign: It is an optical scanning system that reads specimen signatures of the account
holders in financial banks directly from the documents and compares them.
W.I.S.S :Workstation Independent Segment Storage.
Wizard :Refers to an experienced hacker.
Word :It is a logical unit of information. It is a set of binary digits that fill one location in
computers memory. The longer the word the more quickly the CPU can work.
Word addressable :Refers to a computer wherein each word has some unique
address that can be used in a program to access data.
Word length :Refers to the number of bits in a word.
Word lord :It is a word processing software. Word processing : To use a terminal or
computer to ompose, store, manipulate and print out documents and text.

Word processing programme (WPP) :Refers to an organisation that encourages word


processing educational programmes in schools to promote word processing as a
profession.
Word processing supervisor :Refers to the person who oversees the work crried out
in a word processing centre.
Word processor :Refers to a computer that is specifically used for the typing and
production of letters, reports and documents.
Word star :It is a sophisticated word processing program. It is one of the most popular
application program for microcomputers with CPU operating system.
Word wrap : It refers to the facility that automatically moves a word to the next line if it
will not fit at the end of the original line.
Work area : It is the work space on screen reserved for some specific purpose.
Work bench : A programming environment wherein hardware and software items are
shared by several users.
Work break down structure :A complete list of the work elements and dependencies
needed for completing the given project
Work file :Refers to the file that is used for providing temporary storage space for data
that is needed only the life time of one job.
Working set: It is the set of pages which are currently in use by a process.
Work station :Refers to the physical environment used by a person operating a
computer. It includes keyboard, video screen, micr0-computer, etc.
Work-space :Refers to the amount of internalmemory available for programs and data
allocated for working storage.
W.O.R.M. :Write Once Read Many:
WP :Word Processing.
WPM :Word Per Minute.
W.P.S. : Word Processing Society.
Wrap :To break a line of text which is too long for the screen or the printer.
Wraparound : It refers to the automatic extension of a line of text on to two or more lines
because of the limitations of the display area.
Write :The function of encoding a magnetic medium with binary information that can be
stored and read back.
Write enable ring: Refers to the plastic ring that must be placed on a tape reel before
permitting any information to be recorded on the tape.
Write head : Refers to the magnetic head exclusively designed for writing data on the
media.
Write Inhibit ring :Refers to the plastic ring that has to be placed on magnetic tape to
prevent it from recording any data.
Write instruction :Refers to the program instruction which causes an item of data to be
recorded in some form of storage.
Write protect :Refers to the procedure used for preventing a disk or tape from being
written to.
Write protect notch :Refers to the notch that is provided on floppy disks that cues the
disk drive whether or not to store a file on the diskette.
Write ring :A ring that is attached to the hub of a reel of magnetic tape to allow its
contents to be over written or erased.

WYSIWYG: What You See Is What You Get.


Xeregraphicprinter :A high speed printer that uses xerographic techniques to produce
printed out puts.
XOR Gate :Refers to a gate that produces a signal of binaty 0 if both input signals are 1
or both input signals are 0. In any othercase, the out put signal is 1.
X- punch :In case of an 80 column Hollerinth punched card, any hole in the second row
from the top (11th row). It is also referred to as the eleventh punch.
X-ray lithography :Refers to the process of using X-rays for etching circuit lines of
about a tenth of a micron on to thin film memories.
X-window :It is an application programming language.
X-Y :The two direction of the computer screen or printer out-put. X-represents the
horizontal direction and Y- the vertical.
X-Y chart :Form of data arrangement that permits plotting of one data series against
another without a time axis.
X-Y plotter :It is a plotter that draws lines over a flat surface with reference to a set of
X,Y coordinates
Y.A.C.C : Yet Another Compiler-Compiler.
V-axis : In coordinate system, it is the vertical axis.
V-edge leading :It is a method by which punch cards are fed with its long edge first
(parallel feed) and top row nearest to the read mechanism. The top row of a punched
cardis called Y row.
Yoke :Refers to readlwrite heads which are fastened together and which move as one
unit over two or more adjacent tracks on magnetic tape or disk.
Y- parameter :For a field effect transistor it refers to one set of four equivalent circuit
parameters that specifies the performance of the transistor circuit.
Y-position: It refers to the punching position in top row of the punch card. It is also
referred to as 10th position.
Y-punch :Means punch in the topmost or tweith position (row 12) of an 80 column
Hollerith card. It is also referred to as high punch as also twelve-punch.
Z : It represents the zero-bit.
Zairja :It is a thinking machine. It was constructed by Arab astrologers.
Zap : Means to burn out or to destroy electrically.
Zapp :It was a micro-computer from first computer company in India to introduce a 10
MI4Z pc and XT.
Z- buffer rendering : It is a method of model rendering. It works by elimination of
hidden lines.
Zeaker micro turtle :An aid on spectrum.
Zener :Refers to reverse current breakdown that takes place when a very high reverse
voltage is applied to a semi-conductor such as a diode.
Zero :It is a special symbol having no intrinsic numerical value.
Zero access instruction :An instruction made up of an operation without addresses of
operands.
Zerofill :The replacement of a set of charactersby zeros.
Zero level address :Refers to the operand contained in an instruction structured in
such a way that it makes immediate use of the operand.

Zero mode :It refers to the mode of operation of a digital plotter wherein each input
command represents a velocity increment and produces a change in speed relative to
one or both axes.
Zeroise :Means to set storage location to zero. It is done to ensure that the data does
not become corrupted by the retention of previous data which is no longer relevant.
Zero punch :It refers to a punch in the third row (also known as zero row) of an 80
column card.
Zero word :Refers, in coding theory to a word made up entirely of zero digits.
Zilog :A.U.S. based semi-conductor manufacturer firm.
Zip mode :It refers to a plotte?s mode of operation. wherein each input command
represents an incremental deviation.
Z-net :Refers to a local area network.
Zone :It is that section of main memory which is reserved for some specified function or
use.
Zone bits :Refers to those binary bits within a digital computer, which are used in
conjunction with the numerical bits for representing alphabetic characters and special
symbols.
Zone punch :Refers to a punched hole in any one of the first three rows.
Zoning: It is a process of metal purification. It is used in purification of semi-conductor
crystals.
Zoola :It is an attribute of graphics. It permits the size of any image to be altered without
the need of redefining the parameters.
Zoom Box is a small square in the upper right corner of a window which, when clicked,
will expand the window to fill the whole screen.

COMPUTER ABBREVIATIONS
ADO- ActiveX Data Objects
ADSL-Asymmetric Digital Subscriber Line
ALGOL- Algorithmic Language
ALU- Arithmetic and Logical Unit
ANSI- American National Standard Institute
ARPANET-Advanced Research Projects Agency Network
ASCII- American Standard Code for Information Interchange
ASP- Active Server Pages
BASIC- Beginners All Purpose Symbolic Instruction Code
BIOS- Basic Input Output System
BPS- Bits per Second
CAD- Computer Aided Design
CDMA- Code Division Multiple Access
CD-ROM- CD Read Only Memory
CMOS - Complementary Metal-Oxide Semiconductor
COBOL- Common Business Oriented Language
CPS- Characters per Second
CPU- Central Processing Unit Model
DHTML- Dynamic Hyper Text Markup Language
DMA- Direct Memory Access

DML- Data Manipulation Language


DNS- Domain Name System
DRAM- Dynamic Random Access Memory
DVD- Digital Video Disc
DVD-ROM-DVD Read Only Memory
EEPROM- Electronically Erasable Programmable Read
Only Memory EXT- Extended File System
FAT- File Allocation Table
FDD- Floppy Disk Drive
FIFO- First in First out
FORTRAN- Formula Translation
FTP- File Transfer Protocol
GB- Giga Byte
GIF- Graphic Interchange Format
GIGO- Garbage in Garbage Out
GIMP- GNU Image Manipulation Program
GML- Geography Markup Language
GUI- Graphical User Interface
HDD- Hard Disk Drive
HTML- Hyper Text Markup language
HTTP- Hyper Text Transfer Protocol
IC- Integrated Circuit
IDE- Integrated Development Environment
IEEE- Institute of Electrical and Electronics Engineering
IM- Instant Messenger
IMAP- Internet Message Access Protocol
IP- Internet Protocol
ISDN- Integrated Services Digital Network
ISO- International Organization for Standardization
ISP- Internet Service Provider
J2EE- Java 2 Enterprise Edition
J2SE- Java 2 Standard Edition
JDK- Java Development Kit
JPEG- Joint Photographic Experts Group
KHz- Kilo Hertz
KBPS- Kilo Bytes Per Second
LCD- Liquid Crystal Display
LED- Light Emitting Diode
LIFO- Last in First Out
MAN- Metropolitan Area Network
MICR- Magnetic Ink Character Recognition
MIMO- Multiple Input Multiple Output
MIPS- Million Instructions Per Second
MOSFET- Metal-Oxide Semi-conductor Field Effect Transistor
MPEG- Motion Pictures Expert Group

NFS- NetworkFile System


ODBC- Open Data Base Connectivity
OLAP- Online Analytical Processing
OLE- Object Linking and Embedding
OOP- Object Oriented Programming
OSI- Open Systems Interconnection
PAN- Personal Area Network
PDA- Personal Digital Assistant
PHP- PHP-Hypertext Pre-processor
RAM- Random Access Memory
RDBMS- Relational Data Base Connectivity
ROM- Read Only Memory

Objective type questions and answers


1. A folder.
Ans. i. Is an organizational tool used to store files.
ii. is synchronymous with directory, but folder is the newer preferred term.
2. The part of a computer system containing the circuitry that does the adding,
subtracting, multiplying, dividing and comparing is called as ..
Ans. Arithmetic Logic Unit
3.The storage that supplements the primary internal storage is known as ..
Ans. Secondary storage
4. A browser is a
Ans. Software program especially designed for viewing web pages on the Internet.
5.THE IMPORTANT FEATURE OF THE FOURTH GENERATION VISI TECHNOLOGY
WAS THE USE OF WEIGHING A FEW GRAMS.
Ans. a Microchip
6. ..using 0.13 micron technology has a memory capacity of one Gigabite.
(10.9 Bite)
Ans. A thin silicon chip
7. Today the COMPUTER development has entered the area of called fifth
generation Computer. Ans. Artificial Intelligence
8. The binary system of numeration was used early in the 17th century by .
Ans.Thomas Harriot
9.The binary numbers for the following numbers are written as .. ..
Ans. 0-0,1-1,2-10,3-11,4-100,5-101,6-110,7-111, 8-1000, 9-1001,10-1010, 11-1011,151111, 16-10000
10. Two or more computers connected to each other for sharing information form a
Ans. Network
11. computers that are portable and convenient for users who travel are known as
Ans. Laptops
12. What is the term for unsolicited e-mail? Ans. Spam
13. Office LANs that are geographically apart on a large scale can be connected using a
corporate .. Ans. WAN
14.The code for a web page is written using..
Ans. Hypertext
15.The storage device used to compensate for the difference in rates of flow of data
from one device to another is termed as.Ans. Buffer

16. Which of the following is a standard code used to exchange information among data
processing and communication system. Ans. ASCII
17. Which of the following best explains RAM?
Ans. i. It is an acronym for Random Access Memory. Ii. It is memory built for silicon
chips that is used to store programs and data temporarily while they are being
processed.
18. Conversion of computer generated results in to human acceptable form is a function
of..
Ans. Output interface
19. The components of a computer system with the circuitry to control interpretation and
execution of instructions is known as . Ans. CPU
20. The computer as a machine and all other equipment associated with it are termed
as.. Ans. Hardware
21. The vast network of computers that connects millions of people all over the world is
called Ans. Internet
22.The property that when classes are arranged in a hierarchy, each class assumes the
attributes and methods of its ancestors is. Ans. Inheritance.
23. Windows store all system settings in this file..? Ans. WIN.INI
24.The software component of an expert system that draws conclusions is.
Ans. Inference Engine
25. The attributes and methods for each objects are stored in
Ans. An object repository
26. An E-R diagram is a graphic method presenting.
Ans. Entity classes and its relationships
27. . Is an invalid type of database key. Ans. Structured primary key.
28. A processor that collects the transmission from several communications media and
them over a single line that operates at higher capacity is called Ans: Multiplexer
29. Which of the following factor makes WINDOWS popular?
(a) User friendly GUI feature (b) Desktop (c) Multi tasking (d) Inexpensive (e) None of
these Ans: (a) User friendly GUI feature
30. Bandwidth refers to> Ans. The account of information communications medium
can transfer given amount of time.
31. .is a primary key of one file that appears in another file. Ans. Foreign key
32. The technique that extends storage capacity of main memory beyond the actual size
main memory is called.
Ans. Virtual storage
33.Customers, facilities, knowledge workers, business information, communication
infra-structure and computer equipments are all considerations in a good --- plan.
Ans. Risk management
34. What is E-Banking?
Ans. E-Banking implies provisions of Banking products and services through electronic
delivery channels like ATM, phone, Internet, Mobile phones etc.
35. SMTP, FTP, & SNS are applications of the ..layer. Ans. Physical structure.
36. In a data base, information should be organized and accessed according to which of
the following? Ans. Logical position.
37. Traffic in a VPN is not .. Ans. Logically separated from other traffic
38. Which encoding type always has a non zero average amplitude? Ans. Bipolar.

39. This is an internet forum to discuss wide range of topics like current news, articles
and current affairs etc. Ans. News group
40. What is an Analog Computer?
Ans. A non-digital system that manipulates linear or continually changing data.
41. All the deleted items are stored in this until it is permanently deleted. This place is.
Ans. Virtual hard drive
42. By clicking on this icon one can access the networked resources. This icon is
Ans. Connect to Internet
43. A picture, map or graphic or image that can be used in a document is known as
Ans. Object
44. A multi purpose window which opens nearly for everything is ..
Ans. Browser window
45. A normal compiler take source code as input and produce this as output
Ans. Machine Code
46. What is meant by AOL?
Ans. (a) America On-Line used to be the largest Bulletin Board system in the world. (b)
With the advent of AOL.v3.0, AOL has become the largest INTERNET provider in the
World (c) AOL is also the largest provider of Blank Diskettes in the World (d) AOL is
available only in large metro areas (e) All these
47. What is the full form of BASIC ?
Ans. Beginners All-purpose Symbolic Instruction Code
48. Is Multiprogramming and multi tasking is synonymous ?
Ans. Never
49.Which of the following components of the computer system with the circuitry to
control interpretation and execution of instructions? Ans. CPU
50. A computer science branch that is evolved in using computers to solve that appear
to require human imagination or intelligence is called as..
Ans. Artificial Intelligence (AI)
51. A technique in which a number of similar items or transactions to be processed are
grouped and processed in a designated sequences during a machine run
Ans. Batch processing
52. Ada is a .
Ans. A high level programming language developed by the Department of Defense,
USA in memory of Ada Lovelace who worked with Charles Babbage in the development
of the first computer.
53. Microprocessors can be used to make
Ans. Computer, Digital systems and calculators.
54. The first electronic computer in the world was Ans. ENIAC
55. The storage sub system in a micro computer consists mainly of .ormedia with
varying capacities
Ans. Magnetic or optical
56. A computer with CPU speed is around 100 million instruction per second and with
the word length of 64 bits is known as..
Ans. Super Computer
57. Which of the following is the correct order of the four major functions of a computer?
Ans. Input
Process
Output
Storage

58.Which of the following has been created by research facility of Digital Electronic
Corporation of USA? Ans. Yahoo, Alta vista & Web Crawler
59. Which input device cannot be used to work in MS Office? Ans. Mouse
60. Which of the following is a standard MS Office edition? Ans. Professional
61. What is the name of the list that stores the URLs of web pages and links that visited
in the recent past? Ans. Page list
62. Electronic Fund Transfer is the exchange of money
Ans. From one account to the other
63. The extension of database file is given by ? Ans. .frm
64. The server on the internet is also known as.. Ans. Repeater
65. In Microsoft Word print layout command is displayed in which among the following
menus?
Ans. File
66.Current SIIMs have either .or.connectors (pins) Ans. 30 or 72
67.The storage subsystem in a micro computer consists mainly of --- or ----media with
varying capacities. Ans. Magnetic or Optical
68. Which of the following is not an input device?
Ans. Computer Output to Microfilm (COM)
69. The CPU (Central Processing Unit) consists of
Ans. Control Unit, ALU and Primary Storage
70. EBCDIC can code up to how many different characters? Ans. 256
71. What is meant by BAUD? Ans. This is a measurement of the amount of Data that
can be transferred in one second.
72. What is meant by BANDWIDTH?
Ans. The carrying capacity of a wire attached from one computer to another.
73. Which is considered a direct entry input?
Ans. Optical scanner, Mouse and digitizer, Light pen.
74. Which is used for manufacturing chips? Ans. Semi conductors.
75.The Computer code for the interchange of information between terminals is
Ans. ASCII (American Standard Code for Information Interchange).
76. A bite consists of . Ans. 8 bits
77. A hybrid computer resembles Ans. Both a digital and analog computer.
78.Whereas a computer mouse moves over the table surface the trackball is
Ans. Stationary .
79. Which one of the following input device is user programmable?
Ans. Intelligent Terminal
80. Which computer memory is used for storing programs and data currently being
processed by CPU? Ans. PROM
81. Computer instructions written with the use of English words instead of binary
machine code is called Ans. Symbolic Code
82. .. Operates the device with input and output data from the computer
Ans. Computer Operators
83. A computer programmer.. Ans. Does all the thinking for a computer.
84.Which of the following is not a primary storage device?
Ans. Magnetic tape, magnetic disc, optical disc (none of the above)
85. A name or number used to identify a storage location is called Ans. An Address
86. Which of the following is a secondary memory device? Ans. Disc

87. The difference between storage and memory is that memory is ..and storage is
Ans. Temporary, permanent
88. A floppy disc contains.? Ans. Both circular tracks and sectors.
89.BBS stands for?
Ans. Bulletin Board Service
90. What is a Binary Coded Decimal (BCD)? Ans. A decimal system in which each
decimal system numeral (0-9) is represented by a 4 digit (4-bit) binary code.
91. The octal equivalence of 111010 is.. Ans. 72
92.Which was the computer conceived by Babbage? Ans. Donald Knuth
93. is a device not connected to CPU Ans. Off line device
94.Which of the following registers is loaded with the contents of the memory location
pointed by the PC? Ans. Instruction Register
95. Microprocessors can be used to make
Ans. Computer, digital systems, calculator (all of these)
96. Which American company is called Big Blue? Ans. IBM
97. The first electronic general purpose digital computer built by Motkey and Accrete
called ENIAC did not work on the stored program concept. How many number could it
store in its initial memory? Ans. 20
98. When did the IBM introduced the 80286 based PC/AT? Ans.1984
99. The subject of cybernetics deals with the science of ..
Ans. control & Communications.
100. Who is credited with the idea of using punch cards to control patterns of a weaving
machine? Ans. Hollerith
101.Most of the inexpensive personal computer does not have any disc or diskette
drive. What is the name of such computers? Ans. Home computers
102.Which of the following required large computer memory?
Ans. Imagery, graphics, voice (all of these)
103. A term associated with the comparison of processing speeds of different computer
system is . Ans. MIPS
104. The processes of starting or re-starting a computer system by loading instructions
from a secondary storage device in to the computer memory is called.Ans. Booting
105. Who invented the microprocessor? Ans. Marcian Huff
106. One computer that is not considered a portable computer is Ans. Mini computer
107. A dumb terminal has a . Ans. Key board and screen
108. Plotter accuracy is measured in terms of repeatability and Ans. Resolution
109. Daisy wheel printer is a type of Ans. Impact printer.
110. The number of records contained within a block of data on magnetic tape is defined
by the. Ans. Blocking factor
111. Which of the following memories must be refreshed many times per second?
Ans. Dynamic RAM
112. The most important or the powerful computer in a typical network.?
Ans. is Network sever
113. The primary purpose of software is to turn the data in to Ans. Information.
114. the ability to find an individual item in a file immediately--- is used
Ans. Sequential access
115. A collection of related file is called . Ans. A record
116.storage that retains its data after the power is turned off is called ..

Ans. Non- volatile storage


117. Which of the following is the largest unit of storage? Ans. GB
118. BLOB means.
Ans. Binary Large Object or a long bit string representing complex data.
119. . Is a compact data storage device made of thin wafers of garnet ( a semi
conductor material) in a magnetic field, non-volatile memory and the data contained in
them is safe when power is lost. Ans. Bubble memory
120. DOS floppy disc does not have. Ans.a virtual memory
121. In computer/IT field there are in open system interconnection (OSI) model.
Ans. 7 layers
122. Firewall is used in communication network / system to save from
Ans. Unauthorized attack
123. What is the MICR technique used for clearance of cheques by Banks?
Ans. Magnetic Ink Character Recognition
124. The word FTP as used in the field of computers stands for;
Ans. File Transfer Protocol
125. Compiler in computer system is: Ans. System software
126. Which of the following is the most prevalent method for transferring fund from one
city to another by Indian Banks? Ans. EDI
127. Microprocessor can be used in making .
Ans. Computer, Digital Systems, Calculator
128. A term associated with the comparison of processing speed of different computer
systems is; Ans. CPS
129. Database Management Systems are comprised of tables that made up of rows
called ..and columns called Ans. Records, fields
130. BIOS stands for? Ans. 1) Basic Input Output system 2) Binary Input Output
system 3) Booting Integral Office System 4) Basic Internal Operating
Ans. 1)
131. What is web casting? Ans. Transmitting the Video and Audio on the internet.
132. The date command at the DOS prompt enables you to:
Ans. View the date and time.
133.What are batch files in relation to computer?
Ans. They help to club a group of statements and run them one after another.
134. When you delete files in windows operating system, they are put in;
Ans. Recycle Bin
135.Format command; Ans. Format should be left to the Engineers to use.
136.ALU and control sections have special purpose locations called; Ans. Registers
137.What is the function of a modem?
Ans. Converts analog signals to digitals and vice versa.
138.Networking using fibre optic cable is done as:
Ans. a). it has high band width b). it is thin and light c). it is not affected by electromagnetic interference/power surges etc. (all of these)
139. Conference (net scape), net meeting (internet explorer) enables ?
Ans. Live real time Conferencing
140. e-commerce uses the following key standards / technologies
Ans. EDI (Electronic Data Interchange)
141. the earliest calculating devices are; Ans. Abacus

142. The basic operations performed by a computer are;


Ans. Arithmetic operations, Logical operations, storage and relative (all of these)
143.The man who built the first mechanical Calculator was.Ans. Blaise Pascal
144. Computers built before the First Generation Computers were
Ans. Electro mechanical
145. IBM stands for. Ans. International Business Machines
146. Analog computer is Ans. A device that operates on data in the form of
continuously varying physical quantities.
147. Which of the options correctly explain the term PCs?
Ans. Personal Computers widely available to individual workers with which they can
access information from layer systems and increase their personal efficiency.
148.What are Laptops?
Ans. Light weight computers, small enough to fit in a small suit case.
149. The basic architecture of computer was developed by; Ans. John Von Neuman
150. Arithmetic functions of the ALU include; Ans. Add, Subtract, Multiply and Divide
151. In Word processor Ctrl+I is used for Ans. Italic formatting to the selected text.
152. What is the file extension of MS-Word document? Ans. DOS
153. In H2O the figure 2 is appeared lowered . Which effect has been applied?
Ans. Subscript
154. Why are headers and footers used in document?
Ans. To allow page headers and footers to appear on documents when it is printed.
155. Which of the following short cut key is used for spelling checking? Ans. F7
156. Which device is called Sillicosapiens? Ans. Computer
157. An error in software or hardware is called a bug. What is the alternative computer
jargon for it? Ans. Glitch
158.What is BMP (pronounces as bimp)?
Ans. It is a bitmap, an image made up of little dots
159. Ctrl+B is used .. Ans. To make the selected letters Bold
160. What is the minimum no. of columns and rows that a word table can have?
Ans. 1 row and one column
161. Which of the following device can be used to directly image printed text?
Ans. OCR
162. The output quality of a printer is measured by Ans. Dot. Per sq. inch
163.In input is never converted to digital form. Ans. analog computer
164. In latest generation computers, the instructions are executed.
Ans. Both sequentially and parallel.
165. Who designed the first electronic computer ENIAC? Ans. Van Neumann
166. Who invented the high level language C? Ans. Dennis M Richie
167. Personnel who design, program, operate and maintain computer equipment refers
to.. Ans. Peopleware
168. DOS floppy disc does not have ..? Ans. A Virtual memory.
169. Firewall is used in communication system/network to save
Ans. Unauthorized attack
170. What is the meaning of MICR technique used for clearance of cheques by Banks?
Ans. Magnetic Ink Character Recognition
171. Which of the following is a CRO (Cathode Ray Ocilloscope) Ans. Monitor

172. The OMR can read about document/ minute. Ans. 10000
173. The reading speed of MICR is .. document/ minute Ans. 2400
174. The conducting material that was coated inside the screen of CRT is
Ans. Aquadag
175.The OMR is able to evaluate only those documents which are printed within
.position.
Ans. Marked
176. What is meant by BOOTSTRAP (BOOT)?
Ans. A software program for initiating the the operation of a computer.
177. As compared to CRT, the flat panel display requires
Ans. (a) Less power (b) low operating voltage (Ans: both a and b)
178.What is CRT? Ans. Cathode Ray Tube
179.Graphical devices which are widely used to represent the graphics on screen are:
Ans. .(a) CRT, (b) Flat Panel ( both a and b)
180.WORM stands for what? Ans. Write Once Read Memory
181. Which of the following is a temporary primary memory?
Ans. Random Access Memory
182. Which of the following is a sequential access memory? Ans. Tape
183. Which of the following can hold maximum data? Ans. Magnetic Tape
184. Which of the following is a storage that supplements the primary internal storage of
a computer? Ans. Secondary storage
185. The ability to read or write each piece of information in a storage device in
approximately the same length of time regardless of its location is.
Ans. Random Access
186. Which of the following can store large amount of data? Ans. Hard Disk
187. Which of the following is handy to carry yet can store large amounts of data?
Ans. DVD
188.Data (information) is stored in computers as. Ans. File
189. Which storage device is mounted on reels? Ans. Magnetic tapes
190. Which of the following statements is/are true?
Ans. Cache Memories are smaller than RAM
191. MOS stands for
Ans. Metal Oxide Semiconductor
192. What is the expansion of MTBF? Ans. Mean Time Before Failure
193. Which of the following devices have a limitation that we can only read information
to it but cannot erase or modify it?
Ans. Ans. Hard Disk
194. Usually in MSDOS, the primary hard disk drive has the drive letter . Ans. C
195. The Analytical Engine developed during first generation computers used what as a
memory unit?
Ans. Counter Wheels
196. Memory is made up of
Ans. (a) set of wires (b) Set of circuits (c) Large number of cells (d) Any of these
197. Primary memory stores...
Ans. (a) Data (b) Programs (c) Results (d) Any of these
198. Memory unit is a part of Ans. Control Unit
199. The contents of information are store in Ans. Memory Data Register
200. Which one is not the option of Secondary Storage Device?
Ans. Read Only Memory

Vous aimerez peut-être aussi