com
Complete Computer
Guide for IBPS
Bank and Other
Govt. Exams
Powered by : Team Meritmock.com
www.meritmock.com
DEFINE COMPUTER
Computer is an electronic device that manipulates data, accepts and stores the
input data for further use, processes the data and produces the output data in
required format.
HISTORY
Atanasoff Berry Computer (ABC) was the worlds first unprogrammable electronic digital
computer
Alan Turing is regarded as the father of modern computer science .Electronic Numerical
Integrator and Calculator (ENIAC) is considered to be the first purpose electronic digital
computer.
Speed, Reliability and Storage are the parameters on which the power of the
computer is judged.
COMPUTER GENERATIONS
First Generation (1946-1959)
Some computers of this generation were: ENIAC ; EDVAC; UNIVAC; IBM-701 ; IBM-650
Assembly
language and high-level programming language like FORTRAN, COBOL, Algol were
used.
Used for extensive business applications, engineering design optimization scientific research.
Some computers
of this generation were: IBM 1620; IBM 7094 ; CDC 1604 ; CDC 3600 ;
UNIVAC 1108
Remote
processing, Time-sharing, Real-time, Multi-programming Operating System were
used.
www.meritmock.com
High-level
languages FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68, etc were
used.
Semiconductor memory and Winchester disk were used as the memory devices.
Some computers
types of this generation are: Desktop ; Laptop ; NoteBook ; UltraBook ;
ChromeBook
TYPES OF COMPUTER
www.meritmock.com
1. Input- The process of entering the data into the system. Data are the raw facts entered into the
computer. Input can be in the form of Programs, Commands and Users Response.
*Programs-Set of Instructions.
3. Processing- The process of performing arithmetic, logical operations on the data in order
to convert it into useful information.
* Information- It is the meaningful data or the final result which has been processed.
4. Output- The process of displaying the useful information to the user.
FUNCTIONAL UNITS
1. Arithmetic Logical Unit (ALU): ALU performs arithmetic and logic operations like Addition,
subtraction, multiplication, division, logic and comparison. It is a part of execution unit.
2. Control Unit (CU): Control unit controls the operations for all parts of computer. It does not
perform any data processing operations. It gives command to transfer data from the input
device into memory and from memory to ALU. It performs various functions
Controls and transfers the data and instructions to the other parts of a computer.
It manages and coordinates all the units of the computer.
It obtains the
instructions from the memory, interprets them and directs the operation of the
computer.
It communicates with Input/output devices for transfer of data or results from storage.
It does not process or store data.
www.meritmock.com
Machine cycle
Processor Speed-
Components of Computer
INPUT Devices: The data into computer is entered through the Input devices. It translates the data
into computer understandable form. Below are the examples of the Input devices1. Keyboard-The keyboard is the most common and popular input device.
Usually Keyboards are of two sizes 84 keys or 101/102 keys, but now 104 keys or 108 keys
keyboard is also available for Windows and Internet.
Computer Keys
-Special Purpose Keys: These are Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
2. Mouse- Mouse is the most popular pointing device. It has two buttons called left and right button
scroll bar is present at the mid. Mouse can be used to control the position of cursor on screen, but it
cannot be used to enter text into the computer.
*Pointing Device-Any human interface device which allows a user to input spatial data into a
computer.
www.meritmock.com
7. Microphone-It is used as a sound input to input sound. It can be used to enter text to any word
processing application with the voice recognition software in the computer.
8. Touch Screen-Input is given by touching the screen. Touch screen is used in many mobile phones.
They are used in cash machines and shopping centres.
9. Magnetic Ink Card Reader - MICR input device is majorly used in bank to process a large number
of cheques. The bank's code number and cheque number printed on the cheques with a special
ink consisting of particles of magnetic material which are machine readable. MICR is fast and less
error prone.
10. Optical Character Reader (OCR) - It is used to read a printed text. OCR scans text optically
character by character and converts them into a machine readable code.
11. Bar Code Reader- It is used for reading bar coded data (light and dark lines) Bar. Bar Code Reader
scans a bar code and converts it into an alphanumeric value.
Output Devices-Output devices translate the computer's output which has been processed into
useful information.
1. Visual Display Unit (VDU) Or Monitor-It is the main output device of the computer. The output
displayed on screen is called soft copy. There are two kinds of viewing screen used for monitors:
-Cathode-Ray Tube
-Flat-Panel Display
2. Printers - Most common Input device which is used to print information on paper. The output
printed on paper is known as a hard copy.
There are two types of Printer:
-Impact Printer
-Non-impact Printer
Impact Printers - The printers that print the characters by striking against the ribbon and onto
the paper are called impact printers.
Characteristics of Impact Printers are the following:
www.meritmock.com
Daisy Printer
Line Printer
Drum Printer
Chain Printer
Non-Impact Printer - These printer prints the characters without striking against the ribbon and
onto the paper is called Non-impact Printers. These printers print a complete page at a time. They
are also called as Page Printers.
Characteristics of Non-impact Printers:
High quality.
Laser Printer
Ink-jet Printers
3.Data Projectors- It projects the image onto a wall screen. Watching a movie in a theatre is
an example of projector.
4. Speaker- It gives you the same output from your computer.
COMPUTER MEMORY-
Computers internal storage area which holds the data and instruction during processing is called the
Computer Memory. Both programs and data are stored in the binary form. The memory is divided
into large number of small parts called cell. Each location or cell has a unique address, which varies
from zero to memory size minus one. The memory of computer is measured in Byte, Kilobyte,
Megabytes and Gigabytes.
www.meritmock.com
1. Primary Memory
When the data is entered into a computer, it gets stored in the Primary memory. Primary Memory
holds the data and instruction on which computer is currently working and the intermediate
results. When power is switched off it lost all data this happens due to its limited capacity.
-It is also known as main memory. It is also known as the temporary memory.
-It is volatile memory as the data is lost when the computer is switched off.
-It is faster than Secondary memory.
All the active data and programs are stored in RAM so that they are easily available and accessible
by the CPU.
It is volatile which means it lost its data when the power is switched off.
RAM can hold only small amount of data.
Static RAM: The static RAM retains its memory contents as long as power is applied.
Dynamic RAM: D-RAM continually needs to be refreshed in order for it to maintain the data.
2. ROM (READ ONLY MEMORY)
ROM is a non-volatile memory; it retains its contents even without a power source. The data
written on ROM is permanent. The data stored in ROM cannot be changed.
Bootstrap is an operation that is required to start computer, during this process instructions are
loaded from the ROM.ROM is more reliable and cheaper than RAM.
Following are the various types of ROM:
MROM (Masked ROM) -The first ROMs were hard-wired devices which contained a preprogrammed
set of instructions. They were known as masked ROMs. They were inexpensive
ROM.
www.meritmock.com
PROM (PROGRAMMABLE ROM) - PROM is read-only memory which can be modified only
once by a user. The data
is entered by user in the blank PROM using a PROM programmer.
PROM is not erasable.
erased electrically. It can be erased and reprogrammed about ten thousand times.
Both RAM and ROM make up the primary memory of the computer.
2. Secondary Memory or Auxiliary Memory
Secondary Memory is a non volatile which means data is stored permanently even if the power is
switched off. It is used for storage of the data in computer.
The Information in the secondary memory is not directly accessible to CPU, as it is moved from the
secondary memory to the primary memory first and then to the CPU. It is also known as the
permanent memory.
Common Examples of secondary Memory are:
Magnetic Tape: Long plastic tape coated with magnetic material. The speed of data access
can be slow, when
the tape is long. This is used for mainly major backups of large
amounts of data.
Hard Disk: A hard disk can store data from 10 megabytes to several gigabytes.
Cache Memory- Cache memory acts as a buffer between memory and CPU. A cache is a
temporary storage area where regularly accessed data is stored for speedy access. It is faster
than the main memory and
consumes less access time. The space in cache memory is limited
and it is very expensive.
Optical disk
In an optical disk, data are arranged in a spiral groove on starting from the centre of
the disk.
The different types of optical disk use different materials and methods to absorb and
reflect the light.
Disk Format
Tracks- A track is a circular ring on one side of the disk and each track has a number.
www.meritmock.com
Flash memory-
They are solid state devices that read and write data electrically, instead of magnetically.
The devices like digital cameras, digital camcorders and cell phones use compact flash,
smart media or another flash memory card.
USB drive-
They are known as flash drive, flash pen, thumb drive, key drive and mini- USB drive.
They are small in size and can plug into a USB port on the computer.
They have storage capacities from 8GB to 1GB.
They are regular external hard drive that can be used for backup.
Optical cards-
A chip on this type of card holds information like health records and other auto repair
records.
They can hold more data than the smart cards as they dont need to do any processing.
MEMORY UNITS
The data is stored in the storage unit. The storage capacity is expressed in terms
of Bytes.
1. Bit
2. Nibble
4 bits
3. Byte
8 bits
A group of 8 bits is called byte. A byte is the smallest unit, which can represent a
data item or a character.
4. Word
16 to 64 bits
The length of a computer word is called word-size or word length and it may be as
small as 8 bits or may be as long as 96 bits .A computer stores the information in
the form of the computer words.
5. Kilobyte(KB)
6. Megabyte(MB)
7. Gigabyte(GB)
8. Terabyte(TB)
9. Petabyte(PB)
1024Bytes
1024 KB
1024 MB
1024 GB
1024 TB
1. Microprocessors
2. Memory Devices
3. Motherboard
Microprocessor- The CPU, ALU and memory is contained in a single silicon chip known as the
Microprocessor. It is located on a large circuit board, known as the motherboard.
The microprocessor is very small in size.
www.meritmock.com
Memory Devices- Memory devices include Vaccum tubes, core and Semi Conductor.
MOTHERBOARD
The motherboard has a number of ports to connect all of the parts of a computer
together. A motherboard connects CPU, memory, hard drives, optical drives, video card,
sound card and other ports and expansion cards directly or via cables. It can be considered
as the backbone of a computer.
Motherboard contains ports to connect all of the internal components.
Port-A computer port is a physical docking point using which an external device can be connected to
the computer.
Following are the various types of important ports
Serial Port-It is used for external modems and older computer mouse.
Parallel Port-It is used for scanners and printers. It is also known as the printer port.
PS/2 Port-It is used for old computer keyboard and mouse. It is also called a mouse port.
Universal Serial Bus (or USB) Port-It connects all kinds of external USB devices such as external
hard disk, printer, scanner, mouse, keyboard, etc.
VGA Port-Connects monitor to a computer's video card.
Firewire Port-Transfer large amounts of data at very fast speed.Connects camcorders and
video equipments to the computer
Modem-Connects a PC's modem to the telephone network.
Digital Video Interface, DVI port connects a Flat panel LCD monitor to the computer's high-end
video graphic cards. Very popular among video card manufacturers.
Sockets-Connect microphone, speakers to sound card of the computer
ROM Memory Slot- There are four short slots for the semi conductor memory.
Power connection-This is the slot where power supply connects to the motherboard.
Processor Socket- This is the slot where the processor plugs into the motherboard.
www.meritmock.com
SOFTWARE
Software is a set of instructions that guides computer to process its job. Computer software
cannot be touched. The functions like controlling the hardware, performing computations,
human interactions etc, are performed by computer software.
Types of software: A. System Software
B. Application software
C. Utilities Software
SYSTEM SOFTWARE:
System software is a collection of programs designed to operate, control and extend the processing
capabilities of the computer itself. Operating System, Compiler, and Interpreter etc are the examples
of system software.
APPLICATION SOFTWARE
This software is requested by other application programs. Example of utility software- Antivirus etc.
Hardware
Hardware is the part of computer that can be seen and felt by touching. The other computer
equipments are called peripherals. Printer, Modems, scanners etc are the examples of hardware.
OPERATING SYSTEM
An operating system is a set of programs which performs various types of functions to manage and
organize files.
Operating system acts as a link between the software and the computer hardware.
It is specialised software that controls and monitors the execution of all other
programs that reside in the computer, including application programs and
other system software.
Common Operating System: MS DOS, Windows XP, Windows 7, UNIX, LINUX.
www.meritmock.com
Real time processing-It responds to the input instantly. Real time processing is use to control
machinery, scientific instruments and industrial systems.
Process Management
Memory Management
Input/Output Management
Information management
User interface
www.meritmock.com
Microsoft word is an excellent word processor that allows the user to create letter,
resume, report and announcements. File Extension for MS Word : .doc or .docx . A
word processor is similar to a conventional type writer with some additional features.
It provides a general set of tools entering, editing and formatting text.
Title Bar: The Title bar shows the name of the file on which you are working. In
this there are three buttons on the right hand side: Minimize (reduces the window
down), Maximize (to make the window full size) and Close (to close the window).
Menu Bar: The Menu Bar is placed below the Title bar and it consists of
various options.
File Menu: From File menu user can perform the functions such as Create a new
document, open existing file, save files and print.
Home Tab: It provides options that can change the font, size, colour, alignment,
bullets and numbering, organization and style of the text.
Insert Tab: It provides the options to insert Tables, links picture, clipart and symbols.
Ruler: It shows the width of the document which can be increased or decreased.
Spell check: It is used to check the spelling and grammar mistakes and also
provide the possible alternative for incorrectly spelt word.
List of Commonly used key that have special functions in MS Word :
1. Backspace key: This deletes letters backward.
2. Delete key: This deletes letter forward.
3. Shift key: This when press with another key will perform a secondary function.
4. Spacebar key: This enters the space between the words or letters.
5. Tab: This will indent what user type, or move the text to right. The default
indent distance is usually Inch.
6. Caps Lock : This key when pressed , will capitalized every letter
7. Control (Ctrl): This when pressed WITH another key, performs a shortcut.
8. Enter: This either gives a new line, or executes a command.
9. Arrow Keys: Used to navigate through a document or page.
www.meritmock.com
Ctrl +Function
key
F1
Go to next field
F2
Move text or
graphics
Switch to print
preview view
Copy text
F3
F4
Repeat a find or go to
Close the window action
Exit word
F5
Display the Go
To dialog box
F6
Go to the next
pane or frame
Go to the next
window
Go to the previous
pane or frame
F7
Show the
spelling dialog
box
F8
Extend a
selection
Shrink a selection
Run a Macro
Update the
selected fields
Insert an empty
field
Switch between a
field codes and its
result
Maximize the
Display a shortcut
menu
F9
F10
F11
tips on the
ribbon
Go to the next
www.meritmock.com
document
window
Lock a field
Go to the previous
Field
Description
Ctrl +N
Ctrl +O
Ctrl +W
Ctrl +S
Save a document
Ctrl +P
Alt +Ctrl +I
Alt +Ctrl +P
Ctrl +F
Ctrl +H
Ctrl +G
Ctrl +Z
Ctrl +C
Ctrl +X
Ctrl +V
Ctrl +F9
Shift +Enter
Ctrl + Enter
Ctrl + A
Ctrl + D
Shift + F3
Ctrl + B
www.meritmock.com
Ctrl + I
Ctrl + 1(One)
Ctrl + 2
Ctrl + 5
Ctrl + 0(zero)
Ctrl + E
Ctrl + J
Ctrl + R
Ctrl + L
Ctrl + M
Ctrl + T
Ctrl + Q
Ctrl + Del
Ctrl + Backspace
Ctrl + End
Ctrl + Home
Ctrl + Alt + 1
Ctrl + Alt + 2
Ctrl + Alt + 3
Alt + Ctrl + F2
Shift + Insert
Paste
Ctrl + Shift + F6
Alt + Shift + D
Alt + Shift + T
www.meritmock.com
Inserts link
Ctrl + Shift + F
Ctrl + Shift + *
MICROSOFT EXCEL
www.meritmock.com
Structure: The structure of a function begins with the function name, followed by an
opening parenthesis argument for the function separated by commas and a closing
parenthesis.
Charts: Charts are the pictorial representation of worksheet data.
Area chart: An area chart emphasises the magnitude of change over time.
Column chart: A column chart shows data changes over a period of time.
Bar chart: It illustrates comparisons among individual items.
Line chart: It shows trends in data at equal intervals.
Description
F2
F5
F7
F11
Create a chart
Ctrl +Shift+;
Ctrl+;
Alt+Shift +F1
www.meritmock.com
Shift+F5
Ctrl+A
Ctrl+B
Ctrl+I
Ctrl +K
Insert Link
Ctrl +U
Ctrl +5
Ctrl+P
Ctrl +Z
Ctrl + F9
Ctrl+ F10
Ctrl +F6
Ctrl+Page Down/Ctrl+Page
Up
Move to the next / previous worksheet in current workbook.t
Ctrl + Tab
Alt+ =
Ctrl +
Insert the value of the above cell into cell currently selected
Ctrl + Shift + !
Apply the Number format with two decimal places, thousands separator, and minus sign (-)
for negative values.
Ctrl+Shift+$
Ctrl+Shift+#
Apply the Date format with the day, month, and year
Ctrl+Shift+%
Ctrl+Shift+@
Apply the Time format with the hour and minute, and indicate A.M. or P.M.
Ctrl+y
www.meritmock.com
The application software that can create professional slides is called Presentation Graphics software.
Operation-
Drawing Objects-Drawing objecys include Autoshape, curves, lines, word art etc.
Clipart and pictures- Pictures and graphics are available in MS office suite. SlideIt shows slide and its contents.
Slide sorter- It displays the entire set of slides on screen, so that you can check the order
and completeness of the presentation
Slide show- It displays the presentation of slide at a time in sequence
Animations and Transitions- Transitions are the special effect that introduce a slide in a slide show.
Animations are special sound or visual effects that can be added to the text
Ctrl + A
Ctrl + P
Ctrl + C
Ctrl + S
Ctrl + V
www.meritmock.com
Description
Copy
Save
Paste
Cut
F5
Ctrl + Z
Esc
Ctrl + A
Ctrl + B
Ctrl + D
Ctrl + F
Ctrl + G
Ctrl + H
Ctrl + I
Ctrl + M
Ctrl + N
Ctrl + O
Ctrl + T
Ctrl + U
Ctrl + V
Ctrl + W
Ctrl + Y
Home
End
Ctrl + Home
Ctrl + End
Page Up
F7
www.meritmock.com
Selects all text from the cursor to the end of the active text box
Move to next slide
DBMS-
A DBMS is a collection of interrelated data and a set of programs to retrieve data from
the database.
RDBMS-
A RDBMS is a multi table database where the tables in the database have to be related
for storing or retrieving data.
A RDBMS is used to create and maintain relational databases.
Components of Table-
Each table in a database has a unique name that identifies it from other contents.
A table is also called a relation.
www.meritmock.com
Computer Virus
A computer virus is a malware program which when executed, replicates itself into computer
programs, data files, or the boot sector of the hard drive. The affected areas by a virus are said to
be "infected".
A Virus harms the computer by using hard disk space or CPU time. Viruses also access the private
information of the user, corrupts data, spamming their contacts, or logging their keystrokes.
In simple words, viruses are self-replicating computer programs which install themselves without the
user's knowledge.
Types of Virus-
1. Macro Virus- Macro virus harms the documents which use macros such as word processing and
excel spreadsheet documents. A macro virus is written in macro language.
2. Companion Virus- A virus that creates a new file with same existing filename.
3. Virus hoax- A computer virus hoax is a message, can be a false e-mail warning the recipients
to forward it to everyone they know.
4. Computer prank- It is a prank related to either the software or the hardware of computers.
5. WORM- A computer worm is a computer program that replicates itself in order to spread to
other computers. It mostly uses a computer network to spread itself. Unlike a computer virus, it
does not need to attach itself to an existing program.
6. Trojan horse- A Trojan horse is a generally non-self-replicating type of code which when
executed, causes loss or theft of data, and possible system harm.
Creeper-1971
Elk cloner-1982
The Morris Internet worm-1988
Melissa-1990
I Love You-2000
Code red-2001
Nimade-2001
SQL slammer-2003
Blaster-2003
Sasser-2004
Anti-Virus Software- Antivirus software is a computer software used to prevent, detect and remove
malicious software from computer. It is also known as Antivirus and anti-malware.
www.meritmock.com
Identifying any doubtful behaviour from any computer program that might infect the
computer.
Firewall- A firewall is a network security system which controls the incoming and outgoing
network traffic based on a set of rules. A firewall establishes an obstacle between a trusted,
secure internal network and another network. Firewalls exist both as a software solution
and as a hardware appliance.
www.meritmock.com
A network is a group of two or more computer systems connected together. The communication
between two or more computer systems connected together is called computer networking.
There are many types of computer networks, including: local-area networks (LANs) , MANs, WANs.
The local area network is designed to operate over a small area such as an office, building
or groups of building.
A LAN connects network devices over a short distance.
LANs are easy to design and troubleshoot.
In LAN, all terminals are connected to a main computer called server.
LAN network is owned and managed by a single person or an organization.
LAN machines are connected by a single cable.
Types of LAN
Star LAN
In star LAN, all the stations are connected to a single computer.
The information after passing through its central station proceeds to its final destination.
If one node fails, the system connectivity is not affected.
Ring LAN
Point-to-point link is used to connect the cables.
There is no central station, so the data passes through its adjacent nodes to reach its
final destination.
If there is failure in a single node, the whole connectivity suffers as data passes through each
node to reach its destination.
Bus LAN
There is a single communication line.
There is no repeater.
Fault diagnosis is difficult.
www.meritmock.com
WAN is not owned by any one organization but it owned by collective or distributed
ownership and management.
Types of WAN
Public Networks
The Networks owned and runned by telecommunication authorities and are made available
to individual user or organization.
Example-PSTN,PSDN,VAN,ISDN
Low speed transmission, Analog transmission, easy access, it covers almost every place
are features of PSTN.
PSDN connects public and private mail system to have electronic mail services with other
firms.
High reliability, high quality communication, cost effective usage is the features of PSDN.
Private Network-
www.meritmock.com
Network Toplogies-
Topology refers to the layout of connected devices. There are two possible ways to connect the
devices1. Point to point connection
2. Multipoint connection
The meaning of topology indicated that the way in which a network is laid out. Two or more
devices connected to a link, two or more links form a topology.
Network topologies are categorized into the following basic types:
Bus Topology
Ring Topology
Star Topology
Tree Topology
Mesh Topology
More complex networks can be built as hybrids of two or more of the above basic topologies.
Bus Topology
In a ring topology, each computer is connected to the next computer, with the last one connected
to the first one. The messages flow around the ring in one direction. There is no termination
because there is no end to the ring. Some ring networks do token passing. A short message token is
passed around the ring until the computer wishes to send the information to another computer.
Every device in a ring topology has exactly two neighbors for communication purposes. All messages
travel through a ring in the same direction (which can either be "clockwise" or "counterclockwise").
A failure in any cable or device breaks the loop and can take down the entire network.
www.meritmock.com
A tree topology is the variation of a star. As in stars, nodes in a tree are linked to a central hub that
controls the traffic to the network.
Not every computer plugs into the central hub. But most of them are connected to a secondary hub
which in turn is connected to a central hub. The central hub is an active hub which contains
repeater. The repeater amplifies the signal and increases the distance a signal can travel
Only hub devices connect directly to the tree bus, and each hub functions as the root of a tree of
devices. This bus/star hybrid can be approached for future expandability of the network much better
than a bus or a star alone.
Mesh Topology
In mesh topology, every device has a dedicated point-to-point link to every other device. The
dedicated link carries traffic only between two devices.
The messages sent on a mesh network can follow any of several possible paths from source to
destination. Some WANs , most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a full mesh.
www.meritmock.com
Internet
The Network of interconnected network which enable users to share information is called internet.
A computer that has an access to an Internet can collect information from a vast array of servers
available.
Most of the information on the internet is inter-linked with the hyper text documents and other
resources from which a user can access it.
With the help of web browser a user typically sends and receives information. Other interfaces
like e-mail, online chat, file transfer and file sharing can also be used to share information.
The movement of information on the internet is managed by interconnected computer
networks that share information by a standard TCP/IP protocol.
Internet is network of networks connected together to share information all over the world.
Internet consists of millions of private ,public, academic, business and government networks that
are connected by copper wires, fibre optic cables, wireless connections.
Internet is a way in which computers communicates and shares information.
It is worldwide collection of networks.
Internet Services
E-mail-Electronic mail is the most popular network services. The internet enables user to
exchange data and communicate with the help of electronic mail. Simple mail transfer
protocol (SMTP) protocol is a protocol used for sending an email and for receiving it is Post
office Protocol (POP3).
Chat
Chat is a form of exchanging messages by typing. Online chat refers to any kind of
communication over the Internet that allows a real-time transmission of text messages
from sender to receiver. Chat messages are generally short in order to enable other
participants to respond quickly.
Video Conferencing
Video conferencing allows users to exchange video information over the internet. It includes
an audio teleconference facility. Videoconferencing (VC) is the conduct of a videoconference
by a set of telecommunication technologies which allow two or more users to communicate
with each other by simultaneous two-way video and audio transmissions.
www.meritmock.com
The Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first
networking protocols defined in this standard. TCP/IP provides end-to-end connectivity
specifying how data should be packetized, addressed, transmitted, routed and received
at the destination.
PPP (Point-to-Point Protocol) - PPP is a data link protocol which is used to establish a
PPP is used over many types of physical networks which include serial cable, phone line,
trunk line, cellular telephone, specialized radio links, and fiber optic. PPP is also used over
Internet access connections. Internet service providers (ISPs) have used PPP for customer
dial-up access to the Internet, since IP packets cannot be transmitted over a modem line
on their own, without some data link protocol.
WWW- The World Wide Web (WWW, W3) is a system of interlinked hypertext documents
which are accessed with the help of Internet. It is commonly known as the Web. The pages on
the internet are called web pages which are accessed with the help of a software application
known as web browser. Web pages may contain text, images, videos, and other multimedia
components, as well as web navigation features consisting of hyperlinks.
Gopher- The Gopher protocol is a TCP/IP application layer protocol for distributing,
searching, and retrieving documents over the Internet. The Gopher protocol was
strongly designed as an alternative to the World Wide Web in its early stages. But then
HTTP took over as a dominant protocol.
Wais- Wide Area Information Servers or WAIS is a clientserver text searching system
that uses Information Retrieval Service Definition and Protocol Specifications for Library
Applications to search index databases on remote computers.
Mosaic- Mosaic is the first graphical web browser. Mosaic is a web browser due to which
the World Wide Web became popular. It was a client for earlier protocols such as FTP,
NNTP, and gopher. Mosaic was named for its support of multiple internet protocols. Mosaic
was the first browser to display images with text instead of displaying images in a separate
window.
www.meritmock.com
Archie-
Archie is a tool for indexing FTP archives which allows people to find specific files.
It is considered to be the first Internet search engine. It searches its database and then gives
information about the files.
Hypertext- Hypertext is text with references (hyperlinks) to other text which the user
can immediately access. The hypertext pages are interconnected by hyperlinks. Hypertext
is the underlying concept defining the structure of the World Wide Web, with pages often
written in the Hypertext Markup Language (HTML). It enables an easy-to-use and flexible
connection and sharing of information over the Internet.
Wireless LAN- A wireless local area network (WLAN) is a wireless computer network
which connects two or more devices using a wireless distribution method within a limited
area such as a home, school, computer laboratory, or office building. The users have the
ability to roam around, still be connected to the network.
FTP (File transfer Protocol)- FTP is used to exchange files over the internet which
supports TCP/IP protocol. In FTP transfer, there are two computers involved-one server and
other one client.
Internet Protocol Suite- IPS is the set of protocols that helps internet and
commercial networks to run.It is also called TCP/IP protocol suite.TCP/IP are the most
important protocols for transmitting data over the Internet. They are the two most
important protocols- Transmission control protocol (TCP) and Internet Protocol (IP)
Web Server- A web server is a program that uses client/server model and Hypertext
transfer protocol. Every website on the internet contains a website which must have a
web server program. Apache and Microsofts Internet Information Server (IIS) are the
examples of two leading web server.
www.meritmock.com
Client Server- Client server separates client from the server. The client software
send requests to a server.eg if you are visiting a website then your computer and web
browser will be considered a client and the server that hold that website would be
considered as server.
Proxy Server- A proxy server is a computer that allows a computer network to allow
an indirect network connections to other network services. A proxy server can also serve
as a firewall. A user connects to proxy server than requests a connection file which is
available on another server. The proxy server provides the resource by connecting to the
specific server.
Static website- A static website is one that has content which does not change frequently
and is manually updated by some person.
Dynamic website- A dynamic website is the website on which the content changes
frequently. When the server receives request, the page is automatically generated by
software in response to the request.
enabling navigation from one page to another page. The extensions of webpage can vary
such as .htm, .html, .php etc. A web page is displayed with the help of web browser like
Opera, Mozilla Firefox, and Chrome. The webpage can contain-
Text
Hyperlinks
Macromedia Flash
Dynamic Webpage- Dynamic web pages contain dynamic content like images,
text etc. This can change/ move without web page being uploaded.
Home Page- Home page is the first page of the website. It is also called the main page of
the website.
Uniform Resource Locator-A uniform resource locator is another name for website
address. A uniform resource locator is used with HTTP, is a specific character string that
constitutes a reference to a resource. Most web browsers display the URL of a web page
above the page in an address bar. E.g. The URL of Google search engine is www.google.com
www.meritmock.com
information over a mobile wireless network. A WAP browser is a web browser for mobile
devices such as mobile phones that uses the protocol.
can be found. It's how you'll express yourself through email or your website and it's what
customers think of when trying to find you.
www.meritmock.com
Applications of ComputerBusiness
A computer can perform high speed calculation, is more accurate, reliable, or versatile which made
it an important part in all business organisations.
Computer is used in business organisations for:
Payroll calculations
Budgeting
Sales analysis
Financial forecasting
Managing employees database
Maintenance of stocks etc.
Banking
Insurance companies keep the records up-to-date with the help of computers. Computer is widely
used by the insurance companies, finance houses and stock broking firms.Insurance companies are
maintaining a database of all clients with information showing
Education
The computer provides a tool in the education system known as CBE (Computer Based Education).
CBE includes control, delivery, and evaluation of learning.
The graph of number of computer students studying computers has rapidly increased.
Marketing
At Home Shopping
Health Care
www.meritmock.com
Diagnostic System
Lab-diagnostic System
Patient Monitoring System
Pharma Information
Surgery
Engineering Design
Military
Computers are majorly used in defence. Modern tanks, missiles, weapons etc. Military is employing
computerised control systems. Some military areas where a computer has been used are:
Missile Control
Military Communication
Military Operation and Planning
Smart Weapons
Communication
Communication means sending a message which can be in the form of text, video or an image.
Some main areas in this category are:
E-mail
Chatting
Usenet
FTP
Telnet
Video-conferencing
Government
www.meritmock.com
Budgets
Income tax department
Computerization of voters lists
Computerization of driving licensing system
Computerization of PAN card
Weather forecasting
Computer Terminologies-
Active Server Pages (ASP): A standard for scripting server side web pages.
Active Cell: The cell in MS Excel with dark boundary is called the active cell.
Analog: Describing a system particularly an electronic device that uses a continuous physical
quantity to represent information.
API (Application Programming Interface): It is a set of tools for building software applications. A
good API makes it easier to develop a program by providing all the building blocks .A
programmes then put the building blocks together
Back-up File: A copy of all the files created as a safety precaution in case any harm occurs to the
original.
BASIC (Beginners All-Purpose Symbolic Instruction Code): An easy to use High Level language
which is now replaced by improved version of Microsoft Visual Basic.
Blind Carbon Copy (BCC): In e-mail, a copy of message that is sent to one or more persons
without the knowledge of other recipients.
Bit: Basic unit of computer which has two values 0 and 1.
Byte: One byte is a collection of 8 bits.
Basic Input /Output System (BIOS): It handles the start up operations and low-level control
for hardware .Also known as ROM BIOS.
Boot Loader: It reads the main portion of the operating system form secondary memory.
Boot: An initiating automatic routine that is read into RAM when a computer is first turned on.
This provides the necessary environment for subsequent loading of all or part of the operating
system, software application etc. It prepares the computer for use. The process of starting a
computer is called boot and restarting is called warm boot.
www.meritmock.com
Bus: A bus is a communication system that allows the data to be passed back and forth inside a
computer or between the computers.
Bug: An error in a software program is called a bug.
Cache: A cache is a temporary storage area where frequently accessed data can be stored for
rapid access. It acts as a buffer between CPU and memory.
Clock speed: A rate at which a processor can complete a processing cycle is called clock speed.
.Com: .Com (Commercial) is a top level domain name used by businesses, although
individual register.
CGI (Common Gateway Interface): A standard method used to generate dynamic content on web
pages and web applications.
Cookie: Cookie is user data that is stored in a users browser to notify the application server of the
users previous activity regarding that application
Copyright: It means the material and information are the personal property of the owner
or producer.
Counter feiting: It is the process of making and distributing illegal copies of software packages.
DBMS: It stands for Data Base Management System. It is a software package to manage database.
Data processing: It is process to get meaningful information from data.
DHTML (Dynamic Hyper Text Markup Language): It is used to create dynamic content on web
pages.
Digital Signature: It is a cryptographic scheme to preserve the originality of digital documents
Dots per inch (dpi): It measures the resolution that states the number of dots that the device can
print, scan or display in a linear inch.
DNS (Domain Name System): Is a system that distributes unique name to internet resources
that identifies those resources across internet network
ERP (Enterprise Resource Planning): It is management software used in enterprises to collect,
store and manage their resources
www.meritmock.com
www.meritmock.com
COMPUTER ABBREVIATIONS
A
ALU : Arithmetic Logic Language
ARP: Address Resolution Protocol
AI: Artificial Intelligence
ALGOL: Algorithmic Language
ASCII: American Standard Code for Information and Interchange
ATDML : Asynchronous Time Division Multiplexing
B
BASIC: Beginners All-purpose Symbolic Instruction Code
BIOS: Basic Input Output System
BCC: Blind Carbon Copy
BINAC: Binary Automatic Computer
Bin: Binary
Bit: Binary Digit
D
DBA: Data Base Administrator
DBMS: Data Base Management System
DVDROM: DVD Read Only Memory
DVDRW: DVD Rewritable
DVR: Digital Video Recorder
DNS: Domain Name System
DOS: Disk Operating System
www.meritmock.com
E
EBCDIC: Extended Binary Coded Decimal Interchange Code
E-Commerce: Electronic Commerce
EDP: Electronic Data Processing
ENIAC: Electronic Numerical Integrator and Computer
EOF: End Of File
EPROM: Erasable Programmable Read Only Memory
EXE: Executable
EEPROM: Electronically Erasable Programmable Read Only Memory
E-Mail: Electronic Mail
F
FAX: Far Away Xerox/ facsimile
FDC: Floppy Disk Controller
FDD: Floppy Disk Drive
FDMA : Frequency Division Multiplexing Access
FLOPS: Floating Operations per Second
FORTRAN: Formula Translation
FS: File System
FTP: File Transfer Protocol
G
GB: Gigabit
GB: Gigabyte
GIF: Graphics Interchange Format
GSM: Global System for Mobile Communication
GUI : Graphical User Interface
H
HDD: Hard Disk Drive
HDTV : High Definition Television
HTML: Hyper Text Mark-up Language
HTTP: Hyper Text Transfer Protocol
HLL: High Level Language
I
IC: Integrated Circuit
IM: Instant Message
www.meritmock.com
J
JPEG: Joint Photographic Experts Group
K
Kb: Kilobit
KB: Kilobyte
KHz: Kilohertz
Kbps: Kilobit Per Second
L
LAN: Local Area Network
LCD: Liquid Crystal Display
LDU: Liquid Display Unit
LED: Light Emitting Diode
LIS: Large Scale Integration
LISP: List Processing
LPI: Lines per Inch
LLL: Low Level Language
M
MAN: Metropolitan Area Network
MAP : Mobile Application Port
MAPI: Mail Application Programming Interface
Mb: Megabit
MB: Megabyte
Mbps : Mega bits per second
MCB : Memory Control Block
MCR : Magnetic Card Reader
MMS: Multimedia Message Service
MICR: Magnetic Ink Character reader
MIDI : Musical Instrument Digital Interface
MIME : Multipurpose Internet Mail Extension
MIPS: Million Instructions per Second
MOPS: Millions of Operations per Second
MPU: Micro Processor Unit
MPEG: Moving Picture Experts Group
N
NIC: Network Interface Card
NETBIOS : Network Adapter Basic Input Output System
NFAR : Network File Access Routine
www.meritmock.com
O
OAIS : Open Archival Information System
OLTP : Online Transaction Processing
OMR: Optical Mark Reader
OMAP : Open Multimedia Application Platform
OOP: Object Oriented Programming
OSS: Open Source Software
P
PAP : Password Authentication Protocol
PC: Personal Computer
PCM : Pulse Code Modulation
PDA: Personal Digital Assistant
PDN : Public Data Network
PDP : Packet Data Protocol
PDF: Portable Document Format
PING: Packet Internet Gopher
POS: Point Of Sale
POST: Power on Self Test
PNG: Portable Network Graphics
PPM: Pages per Minute
PPP: Point-to-Point Protocol
PIN : Personal Identification Number
PRISM : Parallel Reduced Instruction Set Multiprocessing
PROM: Programmable Read Only Memory
PSDN : Packet-Switched Data Network
PSTN: Public Switched Telephone Network
R
RAM: Random Access Memory
RARP : Reverse Address Resolution Protocol
RDBMS: Relational Data Base Management System
RIP: Routing Information Protocol
RTF: Rich Text Format
RTCP : Real Time Control Protocol
S
SDRAM : Synchronous Dynamic Random Access Memory
SGML : Standard Generalized Markup Language
SIM: Subscriber Identification Module
SLIP : Serial Line Internet Protocol
SMTP: Simple Mail Transfer Protocol
www.meritmock.com
T
TB: Tera Bytes
TCP/IP: Transmission Control Protocol /Internet Protocol
TDMA: Time Division Multiple Access
U
UDMA : Ultra Direct Memory Access
UIML : User Interface Markup Language
ULSI: Ultra Large Scale Integration
UNIVAC: Universal Automatic Computer
UPS: Uninterrupted Power Supply
URI: Uniform Resource Identifier
USB: Universal Serial Bus
V
VAR: Variable
VDU: Visual Display Unit
VOIP: Voice Over Internet Protocol
VGA: Video Graphics Array
VLSI: Very Large Scale Integrated
VRAM : Volatile Random Access Memory
VRML : Virtual Reality Modelling Language
VSAM : Virtual Storage Access Method
W
Wi-Fi: Wireless Fidelity
WLAN: Wireless Local Area Network
WPA: Wi-Fi Protected Access
WWW: World Wide Web
WAN: Wide Area Network
WCCP : Web Cache Control Protocol
WORM: Write Once Read Many
WML : Wireless Markup Language
WSDL : Web Services Description Language
www.meritmock.com
www.meritmock.com
Pascal is a procedural programming language which was designed in 19681969 and published in
1970 by Niklaus Wirth as a small and efficient language which was developed to encourage good
programming practices using structured programming and data structuring.
6. C
Java is a general-purpose computer programming language that is concurrent, class-based, objectoriented. Java applications are typically compiled to bytecode that can run on any Java virtual
machine (JVM) and is independent of computer architecture. Java is one of the most popular
programming languages in use, particularly for client-server web applications. Java was originally
developed by James Gosling at Sun Microsystems (which has since merged into Oracle Corporation)
and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives
much of its syntax from C and C++.
www.meritmock.com
A first generation language (1GL) is a group of programming languages that are machine level
languages. The instructions were given through the front panel switches of these computers,
directly to the CPU. There was originally no compiler or assembler to process the instructions in 1GL.
The instructions in 1GL are made of binary numbers which is represented by 1s and 0s. Binary
numbers enables machine to understand but it makes it difficult to interpret and learn by the
human programmer.
The main advantage of programming in 1GL is that the code can run very fast and very efficiently,
precisely because the instructions are executed directly by the CPU. One of the main disadvantages of
programming in a low level language is that when an error occurs, the code is not as easy to fix.
Second-generation programming languages have the following properties:-The code can be read and
written by a programmer. To run on a computer it must be converted into a machine readable form,
a process called assembly. Secondly, the language is specific to a particular processor family and
environment.
www.meritmock.com
High-level programming languages using a compiler were called autocodes. Examples of autocodes
are COBOL and Fortran.
Thank you. Visit more and get latest updates from Meritmock.com
www.meritmock.com