Sie sind auf Seite 1von 27

Computer Awareness PDF

This PDF Capsule contains the most important computer topics that are important for
bank and insurance exams.

Click Here to Download ByScoop Mobile App

S.No Topic Page No.


1 Overview of Computer- Generation, Component, Classification 1-9
2 Operating System and its Type 10-11
3 Networking 12-14
4 Internet and E- Mail 15-17
5 DBMS- Data Base Management System 18
6 Object Oriented Programming (OOP) concepts 19
7 MS Office applications and its extensions 20
8 Computer Virus and Malwares 21-22
9 Important Abbreviations 23-25
10 One Liners 26

1 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Overview of Computer
Computer is an electronic device that accepts data, stores it (either in temporary memory or permanent),
prcesses it (in CPU) and then gives the required output (information).

Data vs Information

Data- These are raw and unorganized facts and figures which are feeded into the computer for processing.
Information- The result that we get after data is processed is called information.

Elements of Computer System

1) Hardware 2) Software 3) Humanware 4) Firmware

Hardwares are the physical component of computer that can be touched. Some hardware components are-
Input device, CPU, memory like RAM, output device, storage device. Various harwares will be discussed later.

Software represents the set of programs that govern the operation of a computer system. There are mainly two
types of software- System software and Application software. Will be discussed later.

Humanware- The user of the computer is called humanware. Also called Liveware.

Firmware- These are the set of programs that are pre-installed into the Read Only Memory (ROM) of computer,
during the time of manufacturing. Example- BIOS (Basic Input Output Services)

Generations of Computer
Generation/Period Component Memory and Languages used Examples Extra
Used Storage
First Generation Vacuum Tubes Magnetic Machine language ENIAC,
(1946-1954) (electornic tapes, EDVAC,
valves) magnetic EDSAC,
drums as UNIVAC-I,
secondary IBM 700
memory series
Second Generation Transistors Main High level IBM 7090, Floating point
(1955-1964) memory- languages(FORTRAN, CDC 1604, arithemetic
Ferite cores COBOL, Algol, CDC 3600, hadware was
Secondary Snobol) PDP 5, PDP widely used
Memory- 8, ICL 1901
Magnetic
disks and
tapes
Third Generation Intergrated Main High Level IBM 370, Cache memory,
(1965-1974) Circuits (IC) – SSI, memory- Languages(C,C++) CDC CYBER- parallel
MSI RAM, ROM 175, STAR- processing,
Secondary 100, PDP-11 multiprocessing
Memory- concepts were
Magnetic introduced
disks, tapes
Fourth Generation Microprocessors Main HLL ICL 2900, HP
(1975-present) (VLSI) Memory- 9845,
RAM/ROM Personal
Secondary Computer of

2 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Memory- Pentium
Hard Disk series.
Fifth Generation ULSI (Ultra Large Main HLL Super Artificial
(present) Scale Memory- Computers Intelligence
Integration) RAM/ROM
Secondary
Memory-
Hard Disk
Some Abbreviations used in above table

ENIAC- Electronic Numerical Integrator And Computer


EDVAC- Electronic Discrete Variable Automatic Computer
EDSAC- Electronic Delay Storage Automatic Computer
UNIVAC- UNIVersal Automatic Computer
FORTRAN- Formula Translation- developed by John BAckbus. For scientific calculations
COBOL- Common Business Oriented Language. Used for database and its processing.
SSI- Small Scale Integration; MSI- Medium Scale Integration; VLSI- Very Large Scale Integration

Major Components of a Digital Computer

CPU- CPU is the brain of computer and its function is to execute programs. CPU also controls the operation of all
other components of computer.

Parts of CPU –Three major parts of CPU are Arithemetic and Logic Unit (ALU), Control Unit (CU), Memory unit
(Accumulator, Registers, Cache).

Arithemetic and Logic Unit (ALU)- It is the compenent where all the instuctions are actually implemented and
calculated. It performs arithematic and logical operations such as addition, subtraction, multiplication and
division; AND, OR, NOT and EXCLUSIVE-OR Operations.

Control Unit (CU)- Timing and Control Unit generates timing and control signal necessary for the execution of
the instruction. It acts as the Central Nervous System controlling the Flow of Data and Information from various
components.

Memory Unit- is the component of CPU, which stores Data/Instruction prior to processing by CU/ALU.
Accumulator- An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a
computer's CPU.

3 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Classification of Computers
1) Based On Generation: Already Discussed.

2) Based on Size and Performance- Microcomputers, Minicomputers, Mainframe, Super Computers, Embedded
Computers

Microcomputers- there are the personal computers that we use for normal home and office purpose. Examples:
PC, Laptops.

Mainframe Computer- Capable of performing high processing speed and data storage but not powerful as super
computers. Example: ISP providers use mainframe computers to process information about millions of internet
users.

Minicomputers- These are more powerful than Microcomputers but less powerful than Mainframe. These are
mainly multiuser systems where many users work simultaneously on the system. Example: PDP-11. Example:
Department of computer monitoring the network traffic of whole company.

Super Computer- These are most powerful computers used for very complex computation work.
First Supercomputer- CDC 6600; Fastest Supercomputer- Sunway TaihuLight (China) ;
Indias first super computer- PARAM-8000 (Vijanan Bharti); Indias fastest Super Computer- SahasraT (Cray XC40)-
IISc, Banglore.

Hardwares- In this section first we will discusses input devices then output devices and then memory.

Input devices-
Data and input is entered by the user into computer using input device like mouse keyboard etc. An input device
converts input data into suitable binary format which can be accepted by the computer.

Keyboard- Mostly in our computer we have QWERTY keyboard. Dvorak keyboard is also a type. Types of key on
a QWERTY Keyboards.

 Function Key- Used to perform some specific pre defined fuction (F1-F12)
 Alphanumeric Key- Alphabet key (A-Z) and Number keys (0-9)
 Toggle Key- A toggle key is a key that is used to turn a function on or off, or to switch between two
functions. Like once when we press Capslock button we can type all upper case character, and if we
press it again we can type all lower case character. So two different result on two different press.
Example: Capslock, NumLock, Scroll Lock.
 Modifier Keys: These are the key temporarily modifies the normal action of another key when pressed
together. Example: Shift, Alt, Ctrl, Fn.

Mouse- A mouse is a handheld pointing device used to position a cursor on a computer screen. It's therefore an
essential input device for selecting, dragging, hovering, and clicking. Douglas Engelbart invented the first
computer mouse prototypes in 1963. Types of Mouse- Serial, PS/2, USB and Wireless. (Based on connecting
point)

Joystick- A joystick is an input device consisting of a stick that pivots on a base and reports its angle or direction
to the device it is controlling. Used mostly for gaming in digital computers.

Light Pen- Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or draw
pictures on the monitor screen. It consists of a photocell and an optical system placed in a small tube.

4 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Digitizer- A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn
images into a format suitable for computer processing.

Microphone- Microphone is an input device to input sound that is then stored in a digital form.

Magnetic Ink Card Reader (MICR)- MICR is a technology used to verify the legitimacy or originality of paper
documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain
characters on the original documents. Information can be encoded in the magnetic characters. Used in banks for
cheques.

Optical Character Reader (OCR)- OCR is the recognition of printed or written text characters by a computer. This
involves photoscanning of the text character-by-character, analysis of the scanned-in image, and then
translation of the character image into character codes, such as ASCII, commonly used in data processing.

Bar Code Readers- A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner, is a hand-held
or stationary input device used to capture and read information contained in a bar code . A barcode reader
consists of a scanner , a decoder (either built-in or external), and a cable used to connect the reader with a
computer.

Optical mark Reader (OMR)- These are used to detect the presence of human made marks on paper.

Scanner- A scanner is a device that converts a physical document (hard copy) by capturing its image into an
ecectronic document (soft copy).
Types of scanner:

 Drum Scanner- Used by publishing industry. Use technology called Photo Multiplier Tube (PMT).
 Flatbet Scanner- Also called desktop scanner. The user puts the image to be scanned on the glass plate
and the scanner scans the image.
 Sheet-fed Scanner- In this the document is moved and the scan head is immobile. Reverse of Flatbed
scanner.
 Hand-held scanner- There are scanner that the user has to move over the sheet of paper to scan it.

Output Device
The output device receives information from CPU and provides it to the user.

Monitor- These are also called visual display unit (VDU). Types: (i) CRT (Cathode Ray Tube) (ii) LCD (Liquid Crystal
Display) (iii) LED (Light-Emitting Diodes). Note- thin-film transistor (TFT) is a variant of LCD.
(iv) Plasma: This is another new invention and it is named as the plasma display since there are some really small
sized cells are present there.
(v) OLED: This technology is the new technology. It stands for the Organic Light emitting Diodes.

Some specifications of VDU

Aspect Ratio: Width:Height of screen. Example 4:3


Resolution: is the number of distinct pixels in each dimension that can be displayed. 640 x 480 resolution means
that the screen is 640 pixels wide by 480 tall. A pixel is the smallest element of a video image, but not the
smallest element of a monitor's screen. Since each pixel must be made up of three separate colors, there are
smaller red, green, and blue dots on the screen that make up the image. The term dot is used to refer to these
small elements that make up the displayed image on the screen.

5 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Refresh Rate: The refresh rate of a monitor or TV is the maximum number of times the image on the screen can
be "drawn", or refreshed, per second. The refresh rate is measured in hertz (Hz).

Printer- Device used used to print a computer document (soft copy) on a physical paper (hard copy).

Types of printer: (i) Impact Printer (ii) Non-Impact printer


(i) Impact Printers- have a mechanism that touches the paper in order to create an image.
Line Printer- It prints one complete line at a time. They are further of two types: Drum Printer and Chain Printer

Drum Printer- Drum Printer makes use of a Cylindrical Drum to print lines.
Chain Printer- Chain Printer makes use of a Rotating Chain or Print Chain to print lines.

Character Printer- These print one character at a time. These are of two types: Dot Matrix and Letter Qualtity
Printer

Dot Matrix Printer- Dot Matrix Printers have an arrangement of a matrix of 7, 9, 14, 18, 24 pins on the print head
and as the print head moves, the pins strike the paper to form a character.

Letter Quality Printer- These print full character and not dots. Example- Daisy Wheel Printer. Head is lying on a
wheel and pins corresponding to characters are like petals of Daisy (flower) which is why it is called Daisy Wheel
Printer.

(ii) Non Impact Printer- these donot touch the paper when creating an image.

Inkjet Printers- These uses cartridges filled with inks to print the image. These catridges emit the ink in required
quantity.

Laser Printer- Negatively charged ink power called toner is used in a laser printer for printing. The paper is
positively charged when it passes through the printer. In this entire page is processed at a time. Modern printer
like inkjet and laser printer have inbuilt memory to store pages that are printed.

Plotters- A plotter is a printer that interprets commands from a computer to make line drawings on paper with
multiple pens. A plotter is is a vector graphics printing device.

Some Specifications of Printers


PPM- Page Per Minute- The number of pages the printer can print in one minute.
Duty Cycle- This tells the maximum number of pages you can print in a given month without risking damage to
the printer.

Memory and Storage Devices


Memory is internal storage areas in the computer. There are two types of memory:

(i) Main Memory/ Primary Memory (ii) Secondary/ Auxilliary Memory

Main Memory- It stores programs and data which are currently needed by the CPU.
Secondary Memory- The information which is not being currently processed resides in the Secondary Memory.
The information which is needed by the CPU for current processing is transferred from the secondary memory
to primary memory.

Types of Primary Memory: (i) RAM (ii) ROM

6 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

RAM- Random Access Memory- It is a physical memory chip placed on the motherboard and stored the
frequently required dataand currently running processes. It is a volatile memory. It can be accessed randomly;
that is, any byte of memory can be accessed without touching the preceding bytes .

Types of RAM: Static Ram (SRAM), Dynamic RAM (DRAM), SDRAM (Synchronous Dynamic RAM), RDRAM
(RAMBus DRAM) and DDR RAM (Double Data Rate RAM)

ROM- Read Only Memory- these are semiconductor based memory that contains permanent operating
instructions called microprograms for the CPU which are stored into the computer when it is manufactured. It is
non-volatile. Types of ROM:
PROM- Programmable ROM- This is a blank ROM that can be written to once.

EPROM- Erasable Programmable ROM- can be reprogrammed after erasing the memory using special ultra
violet light.

EEPROM- Electrically Erasable Programable ROM- Also called Flash BIOS- These can be re written using special
software programs.

Example of ROM is BIOS- (basic input/output system) is the program a personal computer's microprocessor uses
to get the computer system started after you turn it on.

Cache Memory- Cache memory is an extremely fast memory that connects directly to the CPU through a cache
controller. It is used for storing frequently used data. Cache memory is used to bridge the speed mismatch
between the CPU and Main Memory. Cache if of two types: Internal Cache(L1)- built in the CPU and external
cache(L2)- outside the CPU between CPU and RAM.

Secondary Memory- Secondary memory is external and permanent memory that is useful to store the external
storage media such as floppy disk, magnetic disks, magnetic tapes.

Hard Disk- Hard Disk consists of multiple disks mounted on a common shaft. Each disk is known as platter. You
can consider it as multiple CD stacked over one another. Each platter/disk is divided into circular concentric
tracks and each track is divided into sectors. The disks are mounted on a rotary drive to rotate the disk. After the
read/write head is moved to the addressed track, it remains stationary while the disk rotates to bring the
starting position of the addressed sector under the read/write head. The time required to move the read/write
head to the addressed sector is called access time. Seek Time is the time required to move the read/write head
to the addressed track. Latency Time (Search time) is the time required to bring the starting position of the
addressed sector under the read/write head. So Access Time= Seek Time + Latency Time.

Types of connectors of Hard Disk and some other peripheral devices. Detailed knowledge is not necessary only
name and full form is enough.
SCSI- Small Computer System Interface
ATA- Advanced Technology Attachment
SATA- Serial ATA and PATA- Parallel- ATA
IDE_ Integrated Drive Electronic

Floppy Disk- Floppy disk also consists of disk similar to that of hard disk. Types of floppy: 3.5-inch and 5.25-inch.

Both Hard Disk and Floppy Disk are example of Magnetic Memory. RAM, ROM are example of Semiconductor
memory. While CD, DVD are examples of optical memory. Types of CD(Compact Disk) and DVD (Digital Versitile
Disk)

CD-ROM(CD Read Only Memory), CD-R(CD Recordable), CD-RW(CD- Read/Write), DVD-ROM, DVD-R, DVD-RW

7 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Some other hardwares inside a computer system.

SMPS- A switched-mode power supply (SMPS) is responsible for power distribution within a computer system.
As each component require different amount of power, hence SMPS gives each device the required amount of
power. Like for USB devices 5 Volt or 12 Volt. SMPS also gives power to all the components present on the
mother board.

Motherboard- Motherboard is the main circuit board on which all major components are present. Like RAM,
CPU, ROM, NIC Card etc. CMOS battery (complementary metal-oxide-semiconductor) CMOS is an on-board,
battery powered semiconductor chip inside computers that stores information. This information ranges from
the system time and date to system hardware settings for your computer.

BUS- Memory and I/O devices are connected to the CPU through a group of lines called Bus. These lines are
meant to carry information. There are three types of buses: Address Bus, data bus and control bus.

 Address Bus- An address bus carries the address of a memory location or an Input/Output device that
the CPU wants to access. Address bus is uni-directional.
 Data Bus- These lines carry the actual data. It is bidirectional
 Control Bus- These lines carry the control signal from CPU to various device and vice versa. It is also bi-
directional.

Memory Units

8 bit 1 byte
1024 Byte 1 Kilo Byte(KB) = 210 bytes
1024 KB 1 Mega Byte (MB) = 220 bytes
1024 MB 1 Giga Byte (GB) = 230 bytes
1024 GB 1 Tera Byte (TB) = 240 bytes
1024 TB 1 Peta Byte (PB) = 250 bytes
1024 PB 1 Exa Byte (XB) = 260 bytes
1024 XB 1 Zeta Byte (ZB) = 270 bytes
1024 ZB 1 Yota Byte (YB) = 280 bytes
Also 1 Nibble= 4 bit

Softwares- Software is a set of programs, written in a programming language, which guides the computer to
perform a particular task or operation through well defined step by step instructions.

Types of Software: (i) System Software (ii) Application Software (iii) Development Software/ Programming
languages.

System Software consists of programs that control the operations of the computer and its peripheral devices. It
serves as an interface between the user, the application software and hardwares.

There are three types of System Software: (i) Operating System (ii) Language Translator (iii) System Utility
Operating System- will study with types
Language translators- Examples- Complier, Interpreter and Assembler. To understand these first lets discuss the
types of languages.

 Machine language- The language that computer understand i.e Binary language (0 and 1)
 Assembly Level Language- Machine language is not easy to code for human, so Assembly language was
developed which consists of human readable codes called mneumonics.
 High Level Languages- There are codes written in simple English language. Like Java, C++

8 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Complier- It converts High Level language to Machine language in one go. That is full program at once.
Remember (Comp)iler => (Comp)lete. Means complete program at once. When a compiler complies a program
an object code is generated.
Interpreter- It also converts High Level Language into Machine language but one line at a time. In Interpreter no
object code is generated, while in Compiler Object code is generated.
Assembler- It converts Assebmly level language into Machine Language.

Loader and Linker- Linker – Usually a large program is divided into a number of smaller subprograms called
modules. A linker is a program that links (combines) smaller programs to form a single program. All the object
codes are combined.
Loader is a program that loads machine codes of a program into the system memory. If the program is in
reallocated format, the loader assigns specific addresses to each instruction and data before the loader loads
the program into memory.

System Utility- These are program which help users to perform certain tasks to help increase the efficiency of
the computer and do maintaince work of the computer. Example: Scandisk, Disk Defragment. Backup utility.

Application Software- the set of programs that is necessary to carry out operation for a specific application such
as processing documents, medical diagnosis, accounting, etc.Example: MS-Word, MS- Access, Paint, etc.

Programming languages- Programs are the set of instruction written to give some instruction to computer to
perform any function. Now these programs can be written using various programming languages available. For
example for performing same oeration we can write a code in C and C++ both performing similar operation, just
the coding will be different. Lets see generation of programming languages.

Generation Type Features Examples


First Generation Machine Language/ Low- Program execution was Machine language
Language level language faster. Difficult to
(1940-1956) understand. Machine
dependant
Second Generation Assembly Languages Machine dependant. Used Assembly language
Language (1956-1963) Mnemonic codes.
Third Generation High Level Languages Easy to use. Use of Logo, Fortran, Cobol,
Language keywords. Prolog- Programming in
(1964-1971) Logic- Used in AI.
Pascal, C- developed by
Dennis Ritchie, C++ =>
OOP language developed
by Bjarne Stroustrup.
Java, Corba- Common
Object Request Broker
Architecture.
Fourth Generation HLL- Non procedural Non procedural approach. Query languages(SQL),
Language Database management
(1971-Present) tools, RDBMS
Fifth Generation Artificial Intelligence 5GL are designed to make Prolog, OPS5, Mercury
Language the computer solve a
(Present and Beyond) given problem without
the programmer.

9 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Operating System- An operating system (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs. An operating system has two parts: Kernel
and Shell. The kernel is responsible for interacting with hardware and shell is responsible for interacting with
user.

Functions of Operating System:

 Memory Management
 Job Scheduling
 Protection and Security
 Device Management
 File and Data Management
 Communication between processes
 Error Detection

Types of Operating System

Serial Processing OS: The Serial Processing Operating Systems are those which Performs all the instructions into
a Sequence Manner or the Instructions those are given by the user will be executed by using the FIFO Manner
means First in First Out.

Batch Processing OS: The Batch Processing is same as the Serial Processing Technique. But in the Batch
Processing Similar Types of jobs are Firstly Prepared and they processed simultanosuly in batches.

Multi-Programming OS: With the help of Multi programming we can Execute Multiple Programs on the System
at a Time and in the Multi-programming the CPU will never get idle, because with the help of Multi-
Programming we can Execute Many Programs.

Real Time OS: A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time
applications that process data as it comes in, typically without buffer delays. Real time OS fixes a time period for
each job to complete. This time period is called Deadline.

Distributed OS: Distributed Means Data is Stored and Processed on Multiple Locations. When a Data is stored
on to the Multiple Computers, those are placed in Different Locations. Distributed means In the Network,
Network Collections of Computers are connected with Each other.

Multiprocessing OS: OS having capability to handle more than one processor.

Parallel OS: are used to interface multiple networked computers to complete tasks in parallel. The architecture
of the software is often a UNIX-based platform, which allows it to coordinate distributed loads between multiple
computers in a network.

List of Some Operating System-


Windows OS- Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10. Recently
Windows 10S was launched, S stands for students.

Ubuntu- Red Hat Linux, Fedora, Mandrake Linux

Android- Cupcake, Donut, Éclair, Froyo, Gingerbread, Honeycomb, Ice Cream Sandwich, Jelly Bean, KitKat,
Lollipop, Marshmallow, Nougat, O.

10 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Mac OS- While a version of Mac OS X comes pre-installed on all Apple Macintosh computers, users must pay if
they wish to use newer versions when they become available. Versions- Mac OS X 10.0 – code name Cheetah,
Mac OS X 10.1 – code name Puma, Mac OS X 10.2 – also marketed as Jaguar, Mac OS X Panther - 10.3, Mac OS X
Tiger - 10.4 , Mac OS X Leopard - 10.5, Mac OS X Snow Leopard - 10.6, Mac OS X Lion - 10.7, OS X Mountain Lion
- 10.8, OS X Mavericks - 10.9, OS X Yosemite - 10.10 , OS X El Capitan - 10.11, macOS Sierra - 10.12

IOS- IOS is Apple's mobile operating system.

List of some Mobile OS: Symbian, Android, Apple iOS, Blackberry OS, Windows OS, BADA, Palm OS (Garnet OS),
Maemo, MeeGo, Verdict.

11 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Networking
Network- An interconnected collection of autonomous computers.

Arpanet- First Network . Acronym for Advanced Research Projects Agency Network.

Types of Network- LAN, MAN, WAN

LAN- A Local Area Network is a privately owned computer network covering a small Networks geographical area,
like a home, office, or groups of buildings e.g. a school Network. There are basically two types of Local Area
Networks namely: ARCnet and Ethernet.

MAN- Metropolitan Area Networks are the network spread over a city. Example: Cable TV. Various LANs can be
interconnected to form a MAN. MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual
Bus).

WAN- Wide Area Network.When computer/terminals are spread over a wide area, they can be connected
through public or private communication system. This type of network is called WAN. Internet is also a kind of
WAN.

WLANs - Wireless Local Area Networks- Short networks created wirelessly.

SAN- Storage Area Network- A storage-area network (SAN) is a dedicated high-speed network (or subnetwork)
that interconnects and presents shared pools of storage devices to multiple servers.

PAN- Personal Area Network. A personal area network (PAN) is a computer network organized around an
individual person, and that's set up for personal use only. Like Bluetooth.

VPN- A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a
public network such as the Internet or a private network owned by a service provider.

Network Topology- The pattern of interconnection of nodes/ computers in a network is called Topology.

Topology Explanation Advantage Disadvantage


Star In this all nodes are Centralised Long cable Length
individually connected Control/Problem Difficult to expand
to a central connection Diagnosis Central Node
point, like a hub or a Easy Reconfiguration dependancy
switch. Simple Access Protocol

Bus/Linear This consists of a single Short Cable Length Fault diagnosis is easy
length of the Resilient Architecture Fault isolation is
transmission medium Easy to Extend difficult
onto which the various Nodes must be
nodes are attached. intelligent

Ring/Circular In this case, each node Short Cable length


is connected to two and No wiring closet space
only two neighbouring required
nodes. Data is accepted Suitable for optical
from one of the fobers

12 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

neighbouring node and Node failure causes


is transmitted to network failure
another. Difficult to diagnose
fault
Network
reconfiguration is
difficult.
Tree Topology A tree topology Expansion of Network Because of its basic
combines is possible and easy. structure, tree
characteristics of linear Error detection and topology, relies
bus and star topologies. correction is easy. heavily on the main
It consists of groups of Each segment is bus cable, if it breaks
star-configured provided with whole network is
workstations connected dedicated point-to- crippled.
to a linear bus point wiring to the As more and more
backbone cable central hub. nodes and segments
If one segment is are added, the
damaged, other maintenance
segments are not becomes difficult.
affected. Scalability of the
network depends on
the type of cable
used.
Mesh Topology In a mesh network Data can be There are high
topology, each of the transmitted from chances of
network node, different devices redundancy in many
computer and other simultaneously. of the network
devices, are Even if one of the connections.
interconnected with components fails there High Cost
one another. is always an alternative Set-up and
present. maintenance of this
Expansion and topology is very
modification in difficult.
topology can be done
without disrupting
other nodes.

Network Devices

Modem (Modulation Demodulation)- It allows to connect and communicate with other computers via
telephone line.

Ethernet Card- Ethernet is a LAN architecture developed by Xerox Cor in association with DEC and Intel. It uses
either bus or start topology. RJ-45 (Rejistered Jack-45) is an either wire connector used for Ethernet
connections. Similarly RJ-11 is used for telephone cables.

Hub- A hub is a hardware device used to connect several computers together. It forwards any data packets
received from one port to all of the remaning posrts. Two types: Active Hub and Passive Hub. Active hub passes
the signal from one device to another device after amplifying it, while passive device passes without amplifying
it.

13 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Switch- A switch is a device that is used to segment networks into different sub networks called subnets.
Subnetting the network into samller network prevents traffic overloading in a network. To insulate the
transmission from the other ports, the switch establishes a temporary connection between the source and
destination, and then terminate the connection once the conversation is done.

Repeater- A reapeater is a device that amplifies a signal being transmitted on the network.

Bridge- A bridge is a device that lets you link two networks together. It establishes an intelligent connection
between two local netwroks with the same standard but with different types of cables.

Router- A device that wors like a bridge but can handle different protocols is known as a router. It is used to
separate different segments in a network to improve performance and reliability.

Gateway- A gateway is a device that connects dissimilar networks.

Communication protocols- A protocol is a formal description of message formats and the rules that two or more
machines must follow to exchange those messages.

OSI Model- The OSI model presents a conceptual model of how a telecommunications system works.

Layer Function Parts and Examples


7-Application Layer Deals with the techniques that application Data
programs use to communicate with the network. Gateway, HTTP
6-Presentation The Presentation Layer is responsible for Data
Layer converting the data sent over the network from
one type of representation to another.
5-Session Layer The Session Layer establishes sessions (instances of Data
communication and data exchange) between
network nodes.
4-Transport Layer The Transport Layer is the basic layer at which one Segments.
network computer communicates with another
network computer.
3-Network Layer The Network Layer handles the task of routing Packets.
network messages from one computer to another. Routers, Brouters
2-Data Link Layer Data-link protocols address things, such as the size Frames.
of each packet of data to be sent, a means of Switch
addressing each packet so that it’s delivered to the
intended recipient, and a way to ensure that two
or more nodes don’t try to transmit data on the
network at the same time.
1-Physical Layer It addresses the physical characteristics of the Bits
network, such as the types of cables used to Hubs, Cables
connect devices, the types of connectors used
NOTE: The device used in higher layer supports the functionalities of lower layers also. Example Gateway
operates in all layer.

14 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Internet and E- Mail


Internet- The internet is a worldwide network of computer networks that evolved from the first network
Arpanet.

WWW- World Wide Web- is a collection of resources that one can access from anywhere in the world, over the
Internet. The World Wide Web Consortium (W3C) is an international community that develops open standards
to ensure the long-term growth of the Web.

Internet Protocols

HTTP- Hypertext Transfer Protocol- HTTP is the underlying protocol used by the World Wide Web and this
protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers
should take in response to various commands. HTTPS- HTTP Secured.

FTP- File Transfer Protocol- a method for copying files over a network from one computer to another.
Downloading- Transfer of file from server to user computer
Uploading- Transfer of file from user computer to server.

TCP/IP- TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different procedures that are
often linked together. TCP is the means for creating the packets, putting them back together in the correct order
at the end, and checking to make sure that no packets got lost in transmission. Internet Protocol (IP) is the
method used to route information to the proper address. Every computer on the Internet has to have its own
unique address known as the IP address. Every packet sent will contain an IP address showing where it is
supposed to go.

UDP- User Datagram Protocol (UDP) is part of the Internet Protocol suite used by programs running on different
computers on a network. UDP is used to send short messages called datagrams but overall, it is an unreliable,
connectionless protocol.

ICMP- Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used
by network devices, including routers, to send error messages and operational information indicating, for
example, that a requested service is not available or that a host or router could not be reached.

SMTP- Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network.
SMTP provides the ability to send and receive email messages.

POP- Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts
and retrieves email from a remote mail server for access by the host machine. POP3 is the latest version. POP
uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol (SMTP) for
end-to-end email communication, where POP pulls messages and SMTP pushes them to the server.

IMAP- Internet Message Access Protocol (IMAP) is a standard protocol for accessing email on a remote server
from a local client. IMAP is an application layer Internet Protocol using the underlying transport layer protocols
to establish host-to-host communication services for applications. This allows the use of a remote mail server.
The well-known port address for IMAP is 143.

Some other Protocols with full form.

SLIP- Serial Line Internet Protocol; PPP- Point to Point Protocol;

15 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

E-Mail- Electronic Mail. Used for sending messages electronically.


Structure of an e-mail address. Consider two examples: abc@gmail.com and admin@byscoop.com are two
email address. The basic structure of an email is: local-part@domain. An address consists of two parts. The part
before the @ symbol (local-part) identifies the name of a mailbox. This is often the username of the recipient
like abc in first case and admin in second case. The part after the @ symbol (domain) is a domain name on which
the email address is registered. Like gmail in first case and byscoop in second case.

To Vs CC VS BCC- CC_ Carbon Copy, BCC- Blind Carbon Copy. When you CC people on an email, the CC list is
visible to all other recipients. Unlike with CC, no one can see the list of recipients on the BCC list. The To and CC
fields work similarly. Whether you put four email addresses in the To field or put one email address in the To
field and three in the CC field, the four people will all receive the same email. They’ll also be able to see every
other recipients’ email address.

Attachement- An email attachment is a computer file sent along with an email message.

Draft- is the email that has been composed but not send.

URL- Uniform Resource Locator. Every website has a unique name called URL. Like www.byscoop.com is the URL
of our website. Each URL is associated with an IP address. For example if you types the IP address associate with
google.co.in in the browser you will oen the same google.co.in page. DNS- Domain Name Server is responsible
for converting this URL into IP address so that the site may be opened.

Structure of URL: type://www.domainname.com/folder-name/web-page-file-name.htm

Type: specifies the type of server like http, ftp. www.domainname.com is the URL of the site. Dot com is the
domain ID there are various domain ID. Folder-name may or may not be present every time. Webpage is the
specific page that we open on a website. .htm ot .html is the extension of websites created using html coding.

Domain ID Affiliation Extra


Com commercial For commercial firms
Edu education For educational institutes
Gov government For government organisations
Net network For ISP/network providers
Org organization For NGO and other non profit organisations
Co Company For listed companies
Biz Business For business
tv Television For television companies
Co.in Indian website Indian website
Bank For bank Recently SBI became first Indian bank to get
generic Top-Level Domain .bank SBI.BANK

Some Website designing tools and coding languages in brief: HTML, ASP, PHP

HTML- Hyper Text Markup Language. In a recent exam on of the html tag was asked so here we will give a list of
some basic html tags that may be asked. HTML is a language used to design webpages.

Some HTML tags- all the tags/keywords used in html are written inside "<>". main tag is <html> which denotes
the starting of html coding. Any tag that starts has a end too that is denoted by the same tag with "/" like <html>
is the opening tag, while </html> is the ending tag of html.

16 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

<title> tag- title of the page (appears in the title bar of the browser)
For heading there are six tags <h1>, <h2>, <h3>, <h4>, <h5>, <h6>- h1 is the largest while h6 is the
smallest.(given in decreasing order)
<header>- must be used before h1, h2, …h6. For heading
<body>- tag defines the document's body. Inside this the actual code is placed
<b>- bold; <i>-italics; <u>-underline
<hr>- horizontal line; <ul>- unordered list (bullets); <ol>- ordered list(numbering); <img>- to add image
<table>- to insert a table; <tr>- row of table; <td>- tag defines a standard cell in an HTML table.
<a href>- insert hyperlink, here a denotes anchor; <form>- to insert a form

Cascading Style Sheets (CSS)- is a style sheet language used for describing the presentation of a document
written in a markup language.

DHTML- Dynamic HyperText Markup Language is a combination of Web development technologies used to
create dynamically changing websites. Like CSS, Scripting language like ASP, PHP, Javascript.

PHP- (recursive acronym for PHP: Hypertext Preprocessor)- It is a server side Scripting language.

ASP -Active Server Pages. ASP is a development framework for building web pages. It was introduced in 1998 as
Microsoft's first server side scripting language.

17 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

DBMS- Data Base Management System


Database- A database is a collection of information that is organized so that it can be easily accessed, managed
and updated.

DBMS- A database management system (DBMS) is a collection of programs that enables you to store, modify,
and extract information from a database.

Types of Database Model- Relational Data Model, Network Data Model, Hierarchial data model.

Database terms

Table- Relation; Rows- Tuples; Column- Attribute

Primary Key- it is the attribute that can uniquely identify tuples within a relation. In a Relation there is only one
Primary Key

Candidate Key- All those attributes that can act as a primary key are called candidate key. But only one of them
can be primary key.

Alternate Key- Those candidate key that are not primary key are alternate key

Foreign Key- A foreign key is used to represent the relation between two tables. A foreign key is the attribute
whose value is derived from the primay key of some other table.

RDBMS- Relational DBMS- A relational database management system (RDBMS) is a database management
system (DBMS) that is based on the relational model as invented by E. F. Codd.

SQL is a standard language for storing, manipulating and retrieving data in databases.

Types of SQL Commands

Data Definition Language, DDL, is the part of SQL that allows a database user to create and restructure database
objects, such as the creation or the deletion of a table.

Data Manipulation Language, DML, is the part of SQL used to manipulate data within objects of a relational
database.

Data control commands in SQL allow you to control access to data within the database. These DCL commands
are normally used to create objects related to user access and also control the distribution of privileges among
users

Data administration commands allow the user to perform audits and perform analyses on operations within the
database.

Transactional Control Commands- to manage database transactions.

Examples of DBMS/RDBMS softwares- Oracle RDBMS, MySQL, Microsoft Access

18 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Object Oriented Programming (OOP) concepts


Object-oriented programming (OOP) is a programming language model organized around objects rather than
"actions" and data rather than logic.

Some OOP terminology.

Object- Object is an identifiable entity with some characteristic and behavior. Each object is characterized by a
set of properties that describe objects. Objects are variables or instances of the types class. Objects
communicate with each other through "functions"

Class- Class is a group of objects that share common properties and relationships. A class has two basic
elements: Data Members and Member Functions. Data members define the property of a class. Member
function describes how an object of that class operates. Class is a user defined data type.

Data Abstraction- it refers to the act of representing essential features without including the background details
and explanations.

Encapsulation- The wrapping of data and functions into a single unit called class is known as Encapsulation.

Inheritance- is the capability of one class of things to inherit capabilities or properties from another calss.

Modularity- The act of partitioning a program into individual components is called modularity.

Polymorphism- it is the ability for a message or data to be processed in more than one form.

19 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

MS Office applications and its extensions


Application Purpose Extension
Word For creating text files .doc, .docx
Excel For spreadsheet in rows and column format .xls, .xlsx
Powerpoint For presentations .ppt, .pptx
Access For database .accdb
Publisher desktop publishing program .pub

Some other extensions

• .mid or .midi - MIDI audio file.


• .mp3 - MP3 audio file
• .mpa - MPEG-2 audio file
• .wav - WAV file
• .7z - 7-Zip compressed file
• .pkg - Package file
• .tar.gz - Tarball compressed file
• .bin - Binary disc image
• .iso - ISO disc image
• .dat - Data file
• .db or .dbf - Database file
• .log - Log file
• .sql - SQL database file
• .tar - Linux / Unix tarball file archive
• .xml - XML file
• .apk - Android package file
• .bat - Batch file
• .bin - Binary file
• .cgi or .pl - Perl script file
• .com - MS-DOS command file
• .exe - Executable file
• .gadget - Windows gadget
• .jar - Java Archive file
• .py - Python file
• .wsf - Windows Script File
• .bmp - Bitmap image
• .gif - GIF image
• .ico - Icon file
• .jpeg or .jpg - JPEG image
• .png - PNG image
• .tif or .tiff - TIFF ima

20 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Computer Virus and Malwares


Viruses, worms, Trojans, and bots are all part of a class of software called "malware." Malware is short for
"malicious software,"

What is a virus

Virus Full Form: Vital Information Resources Under Seize

Definition: is a type of malicious code or program written to alter the way a computer operates and is designed
to spread from one computer to another.

Major types of computer virus

 Boot sector virus- This type of virus can take control when you start — or boot — your computer. One
way it can spread is by plugging an infected USB drive into your computer.
 Resident virus- live in your RAM memory. It can interfere with normal system operation which can lead
to the corruption -of files and programs.
 Direct action viruses- they attack certain types of files, typically .exe and .com files. The main
purpose of this virus is to replicate and infect files in folders.
 Browser Hijacker- This type of virus infects your web browser in which it will bring you to different
websites.
 Web Scripting Virus- This virus lives in certain links, ads, image placement, videos, and layout of a
website. These may carry malicious codes in which when you click, the viruses will be automatically
downloaded or will direct you to malicious websites.
 Macro Virus- Macro viruses target applications and software that contain macros. These viruses can
carry out series of operations affecting the performance of the program or software.

Other Malwares

 Ransomware- Ransomware is a type of malicious software that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid.
 Worms- Worms are malicious programs that make copies of themselves again and again on the local
drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again.
 Trojans- It is a type of program that looks as a genuine application but it is actually something else and c
auses destructive results .Unlike viruses, Trojan horses do not replicate themselves but they can be just
as destructive.
 Adware- Generically adware is a software application in which advertising banners are displayed while
any program is running.
 Spyware- Spyware is a type of program that is installed with or without your permission on your
personal computers to collect information about users, their computer or browsing habits tracks each
and everything that you do without your knowledge and send it to remote user.
 Spam- Spamming is a method of flooding the Internet with copies of the same message.

Other terms related to hacking and virus

Crimeware- A class of malware designed specifically to automate cybercrime.

Adware- Software that generates revenue for its developer by automatically generating online advertisements
in the user interface of the software or on a screen presented to the user during the installation process.

21 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Backdoor- An undocumented way of accessing a system, bypassing the normal authentication mechanisms.

Browser Hijacker- Software that modifies a web browser's settings without a user's permission to inject
unwanted advertising into the user's browser.

Crimeware- A class of malware designed specifically to automate cybercrime. Crimeware (distinct from spyware
and adware) is designed to perpetrate identity theft through social engineering or technical stealth in order to
access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or
completing unauthorized transactions that enrich the cyberthief.

Denial of Service (DOS) Attacks- Malicious attempts by one or more people to cause the victim, site, or node to
deny service to its customers.

Keyloggers- The action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person
using the keyboard is unaware that their actions are being monitored.

Malicious Crypto Miners- Software that uses system resources to solve large mathematical calculations that
result in some amount of cryptocurrency being awarded to the solvers.

Rootkit- Programs that hide the existence of malware by intercepting (i.e., "Hooking") and modifying operating
system API calls that supply system information.

Spyware- Software that aims to gather information about a person or organization without their knowledge,
that may send such information to another entity without the consumer's consent, or that asserts control over a
device without the consumer's knowledge.

Wipers- A type of destructive malware that contains a disk wiping mechanism such as the ability to infect the
master boot record with a payload that encrypts the internal file table.

22 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Important Abbreviations
S.No Abbreviation Full-name
1 AI Artificial Intelligence
2 ALGOL Algorithic Language
3 ALU Arithmetic Logic Unit
4 AMD Advanced Micro Devices
5 APRANET Advanced Research Project Agency Network
6 ASCII American Standard Code for Information Interchange
7 BASIC Beginners All-purpose Symbolic Instruction Code
8 BCD Binary Coded Decimal
9 BINAC Binary Automatic Computer
10 BIOS Basic Inpute Output System
11 BIPS Billions of Instructions Per Second
12 CC Carbon Copy (on emails)
13 CD Compact Disk
14 CD-R CD-Recordable
15 CD-ROM Compact Disk Read Only Memory
16 CD-RW CD Read/Write
17 CLI Command Line Interface
18 COBOL Common Business Oriented
19 CPU Central Processing Unit
20 CRT Cathode Ray Tube
21 DBMS Data Base Management System
22 DBS Demand Based Switching
23 DDL Data Definition Language
24 DMA Direct Memory Access
25 DNS Domain Name System
26 DPI Dots Per Inch
27 DRAM Dynamic RAM
28 DSN Distributed Systems Network
29 DVD Digital Versatile Disk
30 EBCDIC Extended Binary Coded Decimal Interchange Code
31 EDSAC Electronic Delay Storage Automatic Calculator
32 EDVAC Electronic Discrete Variable Automatic Calculator
33 ENIAC Electronic Numerical Integrator And Calculator
34 EPROM Erasable Programmable Read-Only Memory
35 EXE Executable
36 FAT File Allocation Table
37 FAX Far Away Xerox
38 FLOPS Floating Point Operations Per Second
39 FORTRAN FORmula TRANslation
40 FTP File Transfer Protocol
41 GB Giga Bytes
42 GHz Giga Hertz
43 GIF Graphics Interchange Format
44 GPRS General Packet Radio Service
45 GSM Global System for Mobile communication
46 GSM Global System for Mobile Communication

23 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

47 GUI Graphical User Interface


48 HTML HyperText Markup Language
49 HTTP HyperText Transport Protocol
50 IDN Integrated Digital Networks
51 IMAP Internet Message Access Protocol
52 IP Internet Protocol
53 ISDN Integrated Services Digital Network
54 ISP Internet Service Provider
55 JPEG Joint Photographic Experts Group
56 JSP Java Server Pages
57 KB Kilo Bytes
58 KHz Kilo Hertz
59 LAN Local Area Network
60 LCD Liquid Crystal Display
61 LED Light Emitting Diode
62 LPM Line Per Minute
63 LSI Large Scael Integration
64 MAN Metropolitan Area Network
65 MAR Memory Address Register
66 MB Mega Bytes
67 MHz Mega Hertz
68 MICR Magnetic Ink Character Read
69 MIDI Musical Instrument Digital Interface
70 MIPS Millions of Instructions Per Second
71 MMS Multimedia Message Service
72 MNP Microcom Network Protocol
73 MPEG Moving Pictures Experts Group
74 MS-DOS MicroSoft Disk Operating System
75 NIC Network Interface Card
76 NOS Network Operating System
77 OCR Optical Character Recognition
78 OMR Optical Mark Reader
79 OSI Open System Interconnection
80 OSS Open Source Software
81 PAN Personal Area Network
82 PDF Portable Document Format
83 PDP Program Data Processor
84 PING Packet Internet Gopher
85 PPP Point to Point Protocols
86 PROM Programmable Read-Only Memory
87 RAM Random Access Memory
88 RDBMS Relational Data Base Management System
89 RIP Routing Information Protocol
90 ROM Read Only Memory
91 SDLC Software Development Life Cycle
92 SGML Syntax for Generalized Markup Language
93 SIM Subscriber Identification Module
94 SMTP Simple Mail Transfer Protocol
95 SNA Systems Network Architecture

24 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

96 SQL Structured Query Language


97 SRAM Static RAM
98 SSI Small Scale Integration
99 TB Tera Bytes
100 TCP Transport Control Protocol
101 TCPIP Transmission Control Protocol Internet Protocol
102 UDP User Datagram Protocol
103 ULSI Ultra Large Scale Integration
104 URL Uniform Resource Locator
105 USB Universal Serial Bus
106 VDU Visual Display Unit
107 VGA Video Graphics Array
108 VoIP Voice over Internet Protocol
109 WAN Wide Area Network
110 WiFi Wireless Fidelity
111 WiMAX Worldwide Interoperability for Microwave Access
112 WLAN Wireless Local Area Network
113 WLL Wireless Local Loop
114 WORM Write Once Read Many
115 WPA Wi-Fi Protected Access
116 WWW World Wide Web
117 X.400 Electronic Mail Protocol
118 X.500 Directory Server Protocol
119 XHTML eXtensible HyperText Markup Language
120 XML eXtensible Markup Language
121 ZB Zettabyte

25 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Important One Liners


Q1. If a person wants to take a new internet connection whom should he contact?
Ans. Internet Service Provider
Q2. In a URL of a website, https is followed by which symbol?
Ans. ://
Q3. Name the virus that affects the boot sector of a hard disk by altering the boot data?
Ans. Boot Sector Virus
Q4. Data stored in computer is in which format?
Ans. Binary
Q5. The startup check by a computer to ensure the proper working of all attached device is known as?
Ans. Power On Self Test (POST)
Q6. Which address differentiates the computers connected in a network?
Ans. IP Address
Q7. Name the first Super Computer of India
Ans. PARAM 8000
Q8. What is the process of identifying and removing errors from programs known as?
Ans. Debugging
Q9. What is the full form of PDF?
Ans. Portable Document Format
Q10. Device used to keep the computer units powered up during time of power cut.
Ans. UPS
Q11. Name the first object-oriented programming language.
Ans. Simula
Q12. The principle that Internet service providers must treat all Internet communications equally is known as?
Ans. Net Neutrality
Q13. The device used to connect two networks having different architecture and model is known as?
Ans. Gateway
Q14. What is Liveware?
Ans. Computer User
Q15. What is the term for a temporary network connection created for a specific purpose?
Ans. Ad Hoc Network

26 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF

Read Our Study Materials and Quiz

 Banking Awareness
 Banking Awareness Quiz
 Daily Current Affairs
 Current Affairs Quiz
 Static GK
 Static GK Quiz
 Government Schemes
 Quiz on Government Schemes
 Insurance Awareness
 Insurance Awareness Quiz

27 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App

Das könnte Ihnen auch gefallen