Computer Awareness Capsule PDF
Document Details
Uploaded by Deleted User
Kapil Kathpal
Tags
Summary
This document is a computer awareness capsule, providing a detailed overview of computer history, from its early beginnings to modern advancements. It covers different generations of computers, various types of computers, and computer hardware.
Full Transcript
Computer Awareness Capsule Page 1 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via...
Computer Awareness Capsule Page 1 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Hi story and Generations of Computers 1. 2600 B.C.-Abacus in China 2. (1614-1617)-John Napier (Napier Bones) 3. 1500-Leonardo Da Vinci is now given credit for building the first mechanical calculator around. 4. 1642-Blaise Pascal (Pascal Calculator with 8-digit capacity) 5. 1800-Joseph Marie Jacquard (automatic Jacquard Looms) 6. 1822-Charles Babbage (Difference Engine). Augusta Ada Byron (1 st computer programmer), worked with Babbage and created a first program for the Analytical Engine. 7. 1834-Charles Babbage (Analytical engine). 8. 1836-Morse Code by Samuel Morse (US) - Morse developed a system of dots and dashes to help send telegraphs over long distance wire. 9. 1840-George Boole invented Boolean algebra. Claude E. Shannon recognized its relevance to electronics design. 10. 1857-Sir Charles Wheatstone (the inventor of the accordion) introduced the first application of paper tapes as a medium for the preparation, storage, and transmission of data. 11. 1868-The first practical typewriting machine was commercially successful, invented by three American Christopher Latham Sholes (also the father of modern Keyboard), Carlos Glidden, and Samuel W. Soule. 12. 1890-Herman Hollerith (Tabulating Machine).Data was entered on punched cards and could be sorted according to the census requirements. 13. 1911- Charles Ranlett Flint founded” Computing-Tabulating-Recording company (CTR)” and was renamed "International Business Machines" in 1924. 14. 1926- Dr. Julius Edgar Lilienfeld from New York filed for a patent on a transistor. 15. (1936-1938)-Konrad Zuse, completes the 1st general purpose programmable Computer (Z1). 16. 1942-Atanasoff-Berry Computer (First electronic digital computer) 17. 1944-Concived by Howard Aiken (Harvard Mark 1) designed by IBM. 18. (1943-1946)-E NIAC (Electronic Numerical Integrator and Computer) is developed by J. Presper Eckert and John Mauchly. It was the first general purpose Electronic computer (Based on Decimal numbers). 19. 1947-The transistor is developed by Bell Telephone Laboratories. 20. (1946-1949)-EMCC (Eckert-Mauchly Computer Company) the First computer company. 21. 1949-EDVAC (Electronic discrete variable automatic computer) unlike the predecessor, it was binary rather than decimal and was a stored program computer. Idea of stored program was given by Jon Von Neumann. 22. 1949-EDSAC(Electronic Delay Storage Automatic Calculator)-Maurice Wilkes(first fully stored computer based on binary) 23. 1951-UNIVAC (Universal Automatic Computer) was release which was the world’s first commercial computer. 24. 1959-Texas Instruments and Fairchild Semiconductor both announce the integrated circuit (Jack Kilby & Robert Noyce). 25. 1962-Ivan Sutherland demonstrates a program called Sketchpad (makes engineering drawings with a light pen) on a TX- 2 mainframe at MIT’s Lincoln Labs 26. 1964-The IBM 360 is introduced and quickly becomes the standard institutional mainframe computer. Page 2 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule 27. 1964-Douglas Engelbart invented first mouse. 28. 1968-Gordon Moore and Robert Noyce founded a company called Intel. 29. 1971-Intel introduces a 1K RAM chip and the 4004 (first processor), a 4-bit microprocessor. 30. 1972-Intel introduced 8008, an 8-bit processor. 31. 1972-Gary Kildall writes PL/M (Programming Language for Microcomputers), the first high-level programming language for the Intel Microprocessor. 32. 1975-Paul Allen and Bill Gates develop BASIC for the Altair 8800. Microsoft is born!!! 33. 1976-Apple was founded by Steve Jobs and Steve Wozniak found in Southern California. 34. 1980-Microsoft is approached by IBM to develop BASIC for its personal computer project. The IBM PC is released in August, 1981. 35. 1981-First Laptop was introduced by Adam Osborne and the company EPSON manufactured first laptop. 36. 1984-The First Apple Macintosh, featuring a simple graphical interface using the 8-MHz, 32-bit Motorola 68000 CPU and a built-in 9-inch B/W screen. Generations of Computers First Generation (1945-1955) 1. Vacuum Tubes invented 2. Magnetic Drum for memory 3. Works on 4000 bits 4. ENIAC, EDVAC, EDSAC, UNIVAC-I Second Generation (1955-1965) 1. Transistors invented by J. Bardeen, H.W. Brattain and W. Shockley 2. Magnetic Core was used for primary storage 3. 32,000 bits 4. IBM 700/7000, 7094, 1401, IBM 650, ATLAS, CDC (Control data Corporation) 1604, 3600, NCR (National cash register)304 Third Generation (1965-1971) 1. IC (Integrated circuits) invented by Jack Kilby and Robert Noyce 2. 128,000 bits 3. Multiprogramming 4. Keyboard, Monitor 5. IBM 360, 370, PDP (Programmed Data Processor) 8, 11, UNIVAC AC9000 Fourth Generation (1971-1990) 1. LSI, VLSI 2. 100 Million bits 3. Microprocessor (4004) Page 3 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule 4. Time sharing, Real time, Distributed and Networks OS were introduced 5. Apple Macintosh, IBM PC, SUN SPARC, STAR 1000 Fif th Generation (1990-Till Date) 1. ULSI, SLSI, AI 2. Robotics, Neural Networks, Expert System 3. Parallel Processing 4. HVD Technique 5. Advancement of Supercomputing 6. Laptop, Desktop, Notebook, Ultrabook, Chromebook Types of computers Analog computer introduced by Lord Kelvin. Numerical data are represented by measurable physical variables such as electrical voltage (Analog format). A thermometer is a simple analog computer. Digital computer that accepts and process data in the form of numbers and all the character are converted into binary code 0, 1 (Discrete Value). Example Digital Watch. Hybrid computer used the combined feature of analog and digital machine. you can see hybrid computer in geological departments. Microcomputer these are small relatively inexpensive computer designed for personal and office use. It has lowest storing and processing speed. These can be laptop or desktop. Minicomputer powerful as compare to microcomputer it has higher memory provide faster operating speeds and large storage capacities than microcomputers. It can be used as a server and capable of supporting from 2 to 200 users. Mainframe computer it has very memory and processing speed and used as a server (can support thousands of users). Super computer can be used for complex type of application i.e. specific research, weather forecasting, Weapon designing etc Servers are dedicated computers that serve the needs or request of other programs or computer. Workstations serve usually one user only. Information appliances are computers specially designed to perform a specific "user-friendly" function—such as playing music, photography. An embedded system is a computer system with a dedicated function within a larger system Page 4 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Computer Hardware All the physical componen0ts that grouped and form a complete system are known as hardware. Example: - Motherboard, RAM, ROM, Hard disk, monitor, keyboard, mouse etc. IPOS Cycle: - Input Process Output Storage System Unit: The system unit is the case that contains all the electronic components related to processing of any computer system. A system unit includes the following parts: 1. Motherboard: The circuit board that holds the main internal components of the computer together. 2. Microprocessor: Microprocessor or brain of the computer is also known as CPU. The CPU controls information and tells the other components inside the computer what to do. CU and ALU along with registers form a complete CPU. 3. Buses: A bus is a subsystem that is used to connect computer components and transfer data between them. There are three types of buses – Address bus, Data bus and control bus. 4. Ports: Ports are connecting socket outside the system into which different types of cables are plugged. 5. Memory: RAM, ROM 6. Cards: Sound card, Video card, NIC card Input Devices: In computing, Input device is a peripheral used to provide data or control signal to system for processing. Examples: - Keyboard, Mouse, Trackball, Light pen, Stylus, Scanner, Joystick, OMR, OCR, MICR, BCR, QR, WEBCAM, Biometric, Touch pad, Microphone, Pen tab. Keyboard One of the primary input devices used to input data and commands. Alphabet (A – Z, a - z), Number keys(0-9), Function key (F1 to F12), Modifier keys (Ctrl, ALT, Shift), Toggle keys (Caps lock, num-lock, Scroll lock), Navigation keys (Arrow keys, Home, End, Page Up, Page Down), Indentation key (Tab key), Special symbols (!, @ # $ % ^ & * ( ) _ + - = [ ] \ { } | ; ’ : ” ,. / ? ) Keyboards are connected to the computer through USB or Bluetooth. Keyboard can be use in GUI and CUI. 104 Key in Standard keyboards. 17 keys in Number pad. Mouse It is a pointing device to point out any object on screen. It can be used only in CUI, not in GUI. Types of mouse - 1. Mechanical Mouse 2. Optical mouse (Wired and Wireless) Track ball It is also a pointing device that can be used instead of mouse. Now as days it is used in mobiles to control the pointer. Light Pen It is also a pointing device. It can be used for digital signature. It can work with any CRT based monitors. Stylus It is a pen-shaped input device used to write or draw on the screen of a graphic tablet or device. Page 5 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Scanner: - Scanner is an input device that reads an image and converts it into a digital file. A scanner is connected to a computer through USB. There are different types of scanners: Flatbed scanner – uses a flat surface to scan documents. Sheet fed scanner – like a laser printer where paper is fed into the scanner. Handheld scanner – the scanner is dragged over the page to be scanned Joystick A joystick is an input device commonly used to control video games. Joysticks consist of a base and a stick that can be moved in any direction. The stick can be moved slowly or quickly and in diff erent amounts. OMR Optical mark recognition (also called optical mark reading and OMR) is the process of capturing human-marked data from document forms such as surveys and tests. They are used to read questionnaires, multiple choice examination paper in the form of lines or shaded areas. MICR Magnetic ink character recognition code, known in short as MICR code, is a character recognition technology used mainly by the banking industry to streamline the processing and clearance of cheques and other documents. OCR Optical character recognition (OCR) software works with your scanner to convert printed characters into digital text. BCR A Barcode reader or Barcode scanner is an electronic device which is able to scan and decode barcodes. These devices use optical technology such as infrared light. QR A QR code (short for "quick response" code) is a type of barcode that contains a matrix of dots. It can be scanned using a QR scanner or a smartphone with built-in camera. Once scanned, software on the device converts the dots within the code into numbers or a string of characters. Touch pad A touchpad or trackpad is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is made output to the screen. Microphone It is used to convert sound waves into electric waves or input the audio into computers. It captures audio by converting sound waves into an electrical signal, which may be a digital or analog signal. Pen tab A graphics tablet (also known as a digitizer, drawing tablet, drawing pad, digital drawing tablet, pen tablet, or digital art board) enables a user to hand draw images, animations and graphics, with a special pen-like stylus, similar to the way a person draws images with a pencil and paper. Page 6 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Output Devices An output device is any piece of computer hardware equipment which converts information into human-readable form. It can be text, graphics, tactile, audio, and video. Some of the output devices are Visual Display Units i.e. a Monitor, Printer, projector, Plotters, Speakers etc. Monitor It is known as standard output device. The monitor displays video and graphics information, user interface and other programs, allowing the user to interact with the computer. Types of monitors: CRT (cathode ray tube), TFT (thin film transistor), LCD (Liquid crystal display), LED (Light emitting display) Types of monitor based on colours 1. Monochrome (black and white) 2. Colour CGA (Colour Graphics Adapter): 4color/resolution 320*320 EGA (Enhanced Graphics Adapter): 16 colour/resolution 640*350 VGA (Video Graphics Array): 256 colour/resolution 640*480 XGA (Extended Graphics Array): 65536 colour/resolution 800*600 and 1024*768 SVGA (Super Video Graphics Array): 16,777,216 colour/resolution 1280*1024 Printer It is an output device and used to convert the soft copy to hard copy. Types of Printers 1. Impact printer Use hammer and ribbon, strikes the paper directly. Daisy wheel, Dot matrix, and Line printers are the examples of impact printer. 2. Non-Impact printer Does not use hammer and ribbon for printing, also does not strikes the directly. Inkjet, laser and thermal printers are he examples of impact printer. Types of printers based on colours: Monochrome (black and white) Colour COLOURS [C-Cyan M-Magenta Y-Yellow K-Key (Black)] Plotter A plotter can be used to produce high quality, accurate and bigger drawings. Generally plotters are used in CAD, CAM applications such as house maps banners, hoardings and car parts etc. Page 7 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Projector and speakers are also examples of output devices. Projectors gives us an output in the form of light and speakers give us sound format. Memory Unit and Management 0 or 1 1 Bits 4 Bits 1 Nibble 8 bits 1 byte 1024 Byte 1 KB (Kilo Byte) 1024 KB 1 MB (Mega Byte) 1024 MB 1 GB (Giga Byte) 1024 GB 1 TB (Tera Byte) 1024 TB 1 PB (Peta Byte) 1024 PB 1 EB (Exa Byte) 1024 XB 1 ZB (Zeta Byte) 1024 ZB 1 YB (Yota Byte) 1024 YB 1 BB (Bronto Byte) 1024 BB 1 Geop Byte Primary Memory Secondary Memory Primary storage is also known as Memory or Secondary storage is also known as Main Memory or internal memory. Secondary memory or auxiliary memory or external memory. From here data is directly accessed by CPU. From CPU cannot access the data from here. Very Fast in the comparison of secondary Very slow in the comparison of primary storage. storage. Holds the data and the instructions that the Holds the data and instructions that the computer is working on right now computer has access to when it need them Holds the data and the instructions that the It determines that how many programs and computer is working on right now data can be stored permanently. Primary Memory Random Access Memory (RAM), allows the computer to store data for immediate manipulation and to keep track of what is currently being processed. RAM is referred to as volatile memory and is lost when the power is turned off. It also known as read/write memory as information can be read from and written onto it. The two main types of RAM are Static RAM and Dynamic RAM. SRAM stands for Static Random-Access Memory. SRAM is Fast and flip-flop is used to store data. In SRAM retains data as long as power is provided to the memory chip and need not be refreshed periodically. Page 8 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule The data on DRAM stands for Dynamic Random-Access Memory. DRAM is Slow and use transistor for controlling and capacitors for storage. DRAM continually refreshed to maintain the data. Read-only memory (ROM)is non-volatile and the permanent memory. BIOS (Basic input/Output system) stored in ROM. The types of ROM include PROM, EPROM and EEPROM. PROM - (programmable read-only memory) is a memory chip on which data can be written only once. The difference between a PROM and a ROM is that a PROM is manufactured as blank memory, whereas a ROM is programmed during the manufacturing process. EPROM - (erasable programmable read-only memory)is a special type of PROM that can be erased by exposing it to ultraviolet light. That’s why it is also known as UVEPROM. EEPROM - (electrically erasable programmable read only memory). EEPROM can be erased by exposing it to an electrical charge. Secondary Memory SASD - Sequential Access storage device – Data can be accessed in sequential manner (Magnetic Tape)DASD/RASD - Direct/Random Access storage device – Data can be access directly or randomly manner. Magnetic Disk – Floppy (1.44 MB), Hard disk Optical Memory – CD (ROM, Recordable, Rewritable) – 700 MB approximate.DVD (Digital Versatile/Video disc) – 4.7 GB Approximate. BRD (Blu-Ray Disc) – 25GB in Single layered, 50GB in double layered. HVD (Holographic Disc) – 3.9 TB for users and 6TB for scientists. Flash memory (Electronic Non-Volatile memory) – Pen drive and memory card. There are two types of memory cards MMC card and SD card. MMC for Multimedia card and SD stands for Secure digital card used now a days. SD cards are of four types: SDSC(secure digital standard capacity), SDHC (secure digital high capacity), SDXC (secure digital extended capacity), SDUC (secure digital ultra-capacity). Virtual Memory - To load an application or to perform some task the extra memory (apart from RAM)that is borrow from Hard disk, is known as virtual memory or extended RAM. Cache Memory - Cache is a very high speed, expensive memory. Cache is used to speed up the memory retrieval process. The idea of introducing cache is that this extremely fast memory would store data that is frequently accessed. It works between Main memory and CPU. Computer Software Data – Data is a raw information or unprocessed information. Information – Information is a meaningful data or a processed data, or we can say that after processing data is converted into information. Programs – Collection of instruction or Page 9 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule commands. Software – Collection of programs to performs some specific task. There are two types of softwares: System softwares and Application Softwares System software provides a base platform to execute and development different types of other programs. It is designed to control the operations and resources of computer and co-ordinate all hardware. Examples:- Operating system, BIOS, Linker and Loader, Language translators, Utility software. Language t ranslators - Assembler, compiler, Interpreter. Utility Software - Utility Softwares are used to enhance the performance of a system and devices. Examples: - Antivirus, Data backup software, Desktop cleaner, Disk cleanup, Firewall, File management tools, Compression software, Disk Defragmenter, Device Driver, etc. An application software is designed and developed for the users to perform some specific tasks like writing a letter, listening to music or seeing any video. For all these requirements there required a specific software for each type and that specific software that is designed for some specific purpose. Word Processors–MS Word, Word pad, Word star, Corel WordPerfect, Google Docs. Database Software –MS Access, FileMaker, dBase, Clipper, MySQL, FoxPro. Web Browsers – Google Chrome, Mozilla Firefox, Internet Explorer, Opera. Multimedia Software – Adobe Photoshop, Picasa, VLC Media Player, Windows Media Player. Mailing Software – MS Outlook. Presentation Software –MS Power point. Spreadsheet Software – MS Excel, Lotus 123. Firmware - It is actually a permanent software which is embedded in the system’s read-only memory. It is essentially a set of instructions which are permanently stored onto to the hardware device. Some of the examples of firmware are: BIOS etc. Freeware - These softwares are available free of cost. A user can easily download them from the internet and can easily use them without paying any charges or fees. However, they don’t provide any type of liberty to modify the entire software or charging a fixed fee for its distribution. Shareware - This software is distributed freely to users on a fixed trial basis. It generally comes with a set time limit, and on the expiration of the time limit, the user is finally asked to pay a fixed fee for the continued services. Open Source softwares - Such types of software are usually available to users along with their source code which means that the user can easily modify and distribute the software as well as add additional features to them. They can either be chargeable or free. Tailor made/ Bespoke/ custom softwares - Tailor Made Software also known as custom software is software that is specially developed for some specific organization or other user. Page 10 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Operating System Operating system is an example of System software. It is a collection of integrated programs that is used to control the resources of computer system, this is why it is also known as the resource controller of our system. It works as an interface between user and hardware. Function of OS: Process Management Messaging service Device management Error detection Memory management Security File management Command interpretation WIN (In short)means Windows. WINDOWS – Wide Interactive Network Development for Office Work Solution. Inbuilt web browser is Internet Explorer. Microsoft Edge is browser for Windows 10.List of Windows Operating System Windows 1.0, Windows 2.0, Windows 3.0, Windows 3.1, Windows NT 3.1 – 3.5, Windows 95, Windows NT 4.0, Windows 98,Windows 2000, Windows ME, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10. Macintosh OS - The full form of Mac is Macintosh Operating system. First version of macOS was known as Classical Mac OS.It was designed by product of Apple in 1984.Inbuilt web browser is Safari. Some examples of Mac OS are Cheetah, puma, jaguar, panther, tiger, leopard, snow leopard, lion, mountain lion, mavericks, Yosemite, EI -Capitan, sierra, high sierra, Mojave, Catalina (latest), Big Sur (To be announced). Android It is associated with Google. It is an open source operating system. First version was released on Sept 2008.Name of android OS are cupcake, Donut, Éclair, Froyo, Gingerbread, Honeycomb, Ice cream sandwich, Jelly bean, KitKat, Lollipop, Marshmallow, Nougat, Oreo, Pie, Android 10 Q. LINUX It was developed by Linus Torvalds in 1991.It is not associated with any company. It is an open source operating system. It is highly secured operating system. Some Linux based operating systems are – Ubuntu. Mint, fedora, redhat, CentOS, OPENSUSE, gentoo, Debian, Mandriva, Slackware etc. UNIX - Old name of UNIX is UNICS. Full form of UNIX or UNICS is “Unilpexed information and computing system”. Unix is a family of multitasking, multiuser computer operating systems. Unix was developed in the 1971 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and other. Some examples of Unix based OS are - Microsoft/SCO Xenix, HP-UX, IBM AIX, SGI IRIX, Oracle Solaris, Tru64 UNIX, Apple Darwin, FreeBSD(Berkeley Software Distribution),NetBSD etc. MS – DOS – Microsoft disk operating system by (Microsoft). It is command line operating system. It is Single user and s ingle tasking Operating system.Microsoft renamed it PC-DOS (the IBM version) and MS-DOS (the Microsoft version). Page 11 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Types of Operating systems Batch Operating system - These are oldest system. To speed up the processing, operator batches together jobs with similar needs and ran them through the computer as a group. If one job is fully executed, then only another job will be executed. In batch processing no any prioritization of job is used. Example – Payroll system, Banking system etc. Multiprogramming Operating system There are one or more jobs loaded into memory which are ready to executed. In multiprogramming CPU never sits idle. Multiprogramming increase CPU utilization. Time sharing / multitasking operating system It is a logical extension of multiprogramming. Main objective to use multitasking is to minimize response time. Time is shared to execute a particular job. Examples; Unix, windows, Linux etc. Multiprocessing operating system Multiprocessor Operating System refers to the use of two or more central processing units (CPU) within a single computer system. These multiple CPUs are in a close communication sharing the comput er bus, memory and other peripheral devices. It is used to increase throughput of system. Economical of scale. Real t ime operating systemThe real-time operating system used for a real-time application means for those applications where data processing should be done in the fixed and small quantum of time. Types of Real-Time Operating System 1) Soft Real-Time System: Example are a digital camera, mobile phones, etc. 2) Hard Real-Time System: Examples are Airbag control in cars, anti-lock brake, engine control system, etc.Network Operating systemNetwork Operating System is an operating system that includes special functions for connecting computers and devices into a local-area network (LAN) or Inter-network. Short form of Network Operating system is NOS. Novell Netware, Windows NT/2000, Linux, Sun Solaris, UNIX, and IBM OS/2. Computer Programming Languages What is a Programming Language? A set of words, symbols and codes used to write programs is called programming language. A programming language is a language that is designed to be used (read and written) by humans to create programs that can be executed b y computers. In other words, we can say that programming languages provides the way so that the users may interact with the computer to give it commands and instructions to perform certain tasks. Algorithm - Algorithm is step by step description that the program must perform to arrive the solution. Flowchart - A graphical representation of an algorithm is known as a flowchart. Some symbols are used to design a flowchart Page 12 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Machine Language A language in which instructions are written in binary form (0& 1) is called machine language. It is the only language that is directly understood by the computer. Machine language is also known as first generation language. It is a machine dependent language. Very fast program execution. Machine Language is difficult to understand. Machine Language requires deep knowledge of hardware. Assembly Language Assembly language is computer language in which the instructions are created using symbols such as letters, digits and special characters. In assembly language, we use predefined words called mnemonics Code. Binary code instructions in low level language are replaced with mnemonics and operands in middle level language. Assembly language is known as second generation language. Page 13 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule But computer cannot understand mnemonics. So, we use a translator to convert the assembly code (Mnemonics code) into machine understandable code. Converter is known as assembler. Assembly language is easier to learn, understand and modify than machine language. Assembly language programs are machine dependent. Assembly language programming requires deep knowledge of hardware. Execution of this is very slow than machine language. Assembler Assembly/Mnemonics code Binary/Machine code High level language High level language is a computer language which can be understood by the users but the computer cannot understand it. High level language is very similar to the human languages and have a set of grammar rules that are used to make instructions more easily. Every high-level language has a set of predefined words known as reserved Keywords and a set of rules known as Syntax to create instructions. High level language needs to be converted into low level language to make it understandable by the computer. We use Compiler or interpreter to convert high level language to low level language. It is Easy to remove errors in the Programs written in High Level Programming Languages. Programs written in High Level Programming Languages are Machine independent. High Level Programming Languages have Better documentation. Less time to write a program. High level language needs to be translated to low level language. High level language executes slower compared to low level languages. Difference between Interpreter and compiler Interpreter Compiler 1. Read a program line by line. 1. Read a whole program at a time. 2. No intermediate object code is Generated. 2. Intermediate object code is Generated. 3. Less Memory required. 3. More memory required. 1. Errors are displayed for every instruction 4. Errors are displayed after entire program is interpreted (if any) checked. Loader: It loads the code which is translated by translator into the main memory and makes it ready to execute. Linker is used to combine all the object files and convert them into a final executable program Page 14 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Some Important High-level Languages Fortran- 1957, FORmula TRANSlation, by John Backus, Language for scientific computations. That’s why it is known as scientific language. ALGOL - ALGOL is short for algorithmic language. It is an early high-level computer programming language devised to carry out scientific calculations. ALGOL was used as the standard method for creating algorithms. First appeared in 1958. Lisp- 1958, LISt Processing, by John McCarthy. Cobol - 1959, COmmon Business Oriented Language, by a group of computer professionals called the Conference on Data Systems Languages (CODASYL) by Grace Hopper. BASIC - 1964, Beginner's All-purpose Symbolic Instruction Code, by John G. Kemeny and Thomas E. Kurtz. Pascal- 1970, after the name of a French mathematician, by Nicklaus Wirth. SQL- 1970, Donald D. Chamberlin and Raymond F. Boyce, Language for Database, SQL was one of the first commercial languages to utilize Edgar F. Codd’s relational model. PL/ M- 1972, Programming Language for Microcomputers, by Gary Kildall. High-level language for Intel's microprocessors. Prolog- 1972 by Alain Colmerauer. Logic programming. A language of Artificial intelligence. C- 1972, Designed by Dennis Ritchie to write the code of the UNIX operating system, Structured and procedural language. MATLAB- 1975-1978, by Cleve Moler. The scientific and mathematical language evolved to more diverse applications. C++ - 1979 -1983, by Bjarne Stroustrup. It is an Object-oriented language. C++ was initially known as “C with classes,” and was renamed C++ in 1983. ++ is shorthand for adding one to variety in programming, therefore C++ roughly means that “one higher than C.” PERL (Practical Extraction and Reporting Language) Perl is a general-purpose programming language originally developed for text manipulation and now used for a wide range of tasks including system administration, web development, network programming, GUI development, and more. Perl was originally developed by Larry Wall in 1987. HTML- 1990-91, Hypertext Mark-up Language. 1991 by Tim Berners-Lee. Visual Basic - 1991, VB is a programming language from Microsoft first released. It is a user-friendly programming language designed for beginners, and it is a first graphical language. Python- 1991 by Guido van Rossum. Based on OOPs. Java- 1995, by James Gosling. it is an object-oriented Programming language, an internet language and a platform independent language. PHP -1995, Personal Home Page/Hypertext Processor, by Rasmus Lerdorf. ASP - 1996, by Microsoft, For web designing. C#- 2000, By Microsoft as an alternative to Java and derived from C++ too. It is an OOP based language. Page 15 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Scripting Language - Scripting languages are server-side scripting languages that manipulate the data, usually in a database, on the server. Scripting languages are used to create and manage Internet as a communications tool. Html, Xml, JavaScript, ASP, JSP, PHP, Perl are examples of scripting languages. Computer Network Data Communication - Exchange of data between two or more devices via some of the transmission medium such as wire/wireless.The effectiveness of a data communications system depends on four fundamental characteristics: Delivery - The system must deliver data to the correct destination. Accuracy - The system must deliver the data accurately. Timeliness - The system must deliver data in a timely manner. Jitter - Jitter refers to the variation in the packet arrival time. Component used in data communication Sender, Receiver, Transmission medium, Message and Protocol Data representation Text – (0 – 9), (A - Z), (a - z) and special symbols. ASCII– 7-bit code (American standard code or information interchange) BCD– 4-bit code (Binary coded decimal) EBCDIC– 8-bit code (Extended binary coded decimal interchange code) UNICODE– 16, 32-bit code (Universal code) Numbers– Numbers are directly converted into Binary. Images– Images are also represented by bit patterns. An Images is a composed of a matrix of Pixels. Audio– In the form of continuous signals. Video– It is a collection of images. Signals Page 16 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule To be transmitted, data must be transformed to electromagnetic signals. Data can be analog or digital. Analog data refers to information that is continuous. Ex: Human Voice, Analog clock. Digital data refers to information that has discrete state. Ex: Digital clock, Computer. Analog signal Digital signal An analog signal is a continuous wave. A digital signal is a discrete wave. Analog signal can have infinite number of Digital signal can have a limited values in a range. number of values. An analog signal transmit data in the form A digital signal carries data in the of a wave. binary form i.e. 0 and 1. Slow transmission. Fast transmission. Data t ransmission modes Simplex – Unidirectional or one-way transmission one of the two devices can transmit the data and the other can only receive the data. for example: Remote, Radio, Keyboard, mouse etc. Half Duplex – Both sender and receiver can both transmit and receive, but not at the same time. For example: Walkie- talkie etc. Full duplex – Both sender and receiver can simultaneously transmit the data. For example: telephone. Network – Computer network is a collection of two or more nodes and devices linked together for exchanging information, data or resources. Types of Networks: Mainly there three networks in networking (LAN, MAN, WAN) LAN (Local area network) - A LAN is a group of computer and devices which are connected in a limited area such as school, home, and office building. Ethernet, bus network are the most common examples of LAN. It is a widely useful network for sharing resources like files, printers, games, and other application. MAN (Metropolitan area network) - MAN is consisting of a computer network across an entire city. The s ize of the Metropolitan area network is larger than LANs and smaller than WANs, but covers the larger area of a city or town. Cable TV is an example of MAN. WAN (Wide Area Network) - A WAN can cover large geographical area such as country, continent or even a whole world. Internet connection is an example of WAN. It is difficult to maintain the WAN network. Page 17 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule PAN (Personal Area Network) - PAN offers to make connections of multiple devices or other equipment under the single user’s environment within 10 meters to 30 feet. PAN network enables with few computer devices, telephones, electronic devices, laptop, PDAs, printers, smart phone, and other wearable computer devices. Wired PAN - physical wires can be used like as USB. Wireless PAN – In this network, wireless connections are established like as infrared, Bluetooth, NFC. CAN (Campus Area Network) - CAN network helps to link couples of LANs with small geographical space such as schools, university campuses, and corporate buildings. A CAN has main objective is that offer to best accessibility of campus residential regions such as schools, colleges, university, small institutes and corporate area. SAN (Storage Area Network) is a specialized, high-speed network that provides block-level network access to storage. VPN (virtual private network) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Types of connection Point-to-point connection – In which provides a dedicated link between two devices. Multipoint connection – In which more than two devices share a single link. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies. Various types of topologies are: Bus, ring, star, mesh and tree. 1. Bus topology - Bus topology is also called as a linear bus topology. All computers are connected to a central cable with Multipoint connection. Break in the cable cause whole network failure. Transmission speed is slow in bus topology. It provides unsecured medium. Terminators are used at the end of the central cable. 2. Ring topology - In ring topology, the structure of the network is formed similar to as of a “Ring”. Nodes are connected in a circular manner to each other. It is an example of Point to point structure. Transmission speed is slow. Failure in any cable or device cause whole network failure. Ring topology provides unsecured medium security of data. In order for all computers to communicate with each other, all computers must be turned on. 3. Star topology - In this, all the nodes/devices are connected to a centralized device known as HUB in the structure similar to that of a “STAR”. It is Point to point structure. Easily add and/or remove devices. It provides secured transmission. Problem identification is easy in star topology. Data communication is fast due to the HUB/Switch connectivity. Expensive due to the cost of cables and HUB/Switch. If central device fails, entire network will shut down. 4. Mesh Topology - In Mesh Topology, each node provides an individual link to another node. It means, every node in the entire network is directly connected to every other node in the network making it the most complex topology among all the other topologies. It is a Point to point Structure. Data communication speed is fast in mesh topology. Security and privacy of data is provided. Any fault in the network doesn’t affect the entire network. Most expensive topology due to the amount of cables. Highly complex structure. 5. Tree topology - Tree topology is a combination of bus and star topology. Tree topology is made by connecting various star topologies via central bus backbone cable. It is also known a expended star topology. It is used for expansion of the Page 18 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule network. If central backbone cable or root device gets a problem then the whole network stops functioning. There are a lot of cables needed, so it is highly expensive. Expansion of Network is possible and easy. Hybrid topology uses a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies. Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. Public c louds are owned and operated by companies that offer rapid access over a public network to affordable computing resources. A private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or externally. A hybrid cloud uses a private cloud foundation combined with the strategic integration and use of public cloud services. Google Drive is a personal cloud storage service from Google which gives every user 15 GB of Drive storage space. One Drive is Microsoft's service for hosting files in the "cloud computing". One Drive offers 5GB of storage space for free. Transmission media Transmission media can be defined as something that can carry information from a source to a destination. Transmission media can be divided into two categories. Guided and Unguided media. Guided Media Twisted-Pair cables - A twisted-pair cable consists of two conductors, each with its own plastic insulators, twisted together. Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP) RJ-45 Connector is used to connect it. Coaxial cables - A coaxial cable is used in video, communications, and audio. Most users relate to a coaxial or coax cable as a cable used to connect their TVs to a cable TV service. However, these cables are also used in networks that allow a broadband cable Internet connection using a cable modem. BNC (Bayone-Niell-Concelman) connector is used to connect Coaxial cable. Page 19 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Fibre optic cable - A fiber optic cable contains optical fibers (usually glass) coated in plastic which are used to send data by pulses of light. Fiber optic cables allow for a much faster data transmission than standard copper wires, due to the fact that they have a much higher bandwidth. Connectors are used for connections are as follows: SC (subscriber channel) – for cable TV ST (Straight Tip) – for networking device MT-RJ (mechanical transfer) like RJ-45 Unguided Media Unguided medium transport electromagnetic waves without using a physical conductor. This type of communication is often referred to as wireless communication. Radio waves f requency range (3KHz – 1 GHz). Radio waves are used for multicast communications such as AM/FM Radio, TV, Cordless phones etc. Microwaves f requency range (1 GHz – 300 GHz). Microwaves are used in unicast communications such as cellular phones, satellite networks and wireless LANs. Infrared frequency range (300 GHz – 400 THz). Infrared signals are used in short range communication in closed area using line of sight. such as TV remote. OSI MODEL OSI (Open system interconnection) model is an architecture or model, not a protocol. It describes “How to transfer the data from sender to receiver”. In 1984, the OSI model was approved as international standard by ISO. It is a seven layered Model. Functions of Layers Physical layer – To define the specifications of medium. To convert the data in the form of bits and transmit it over medium. To define topologies, medium, speed, transmission modes. Data Link Layer–Construction of data frame. Error detection and controlling. Data flow controlling. Physical addressing (Mac Addressing). Network layer –Logical addressing (IP addressing), Routing and Packet delivery. Page 20 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Transport layer –It provides a reliability of error free, end to end data delivery and correct destination. Segmentation and reassembly. Session layer – Time management, communication controlling, Synchronization. Presentation layer –Data is presented in the form size, type, encryption-decryption and compression. Application layer –It provides a user interface or platform to transmit or receive the data. Example web browser. Protocols and standards work on OSI Layers Connecting Devices Gateway – It works on all the layers of OSI model. Gateway is a combination of Software and hardware. It is used to connect different types of two or more networks having different protocols, services and environments. Bridge - It works on data link layer of OSI Model. It is used to connect same or similar types of two or more networks. It is also used to divide a big network into two or more small networks. Router It works at the Network Layer. It sends the data packets to desired destination by choosing the best path available thus reducing network traffic Router works as a data traffic controller in a network. Addressing and routing are the functions of Router. MODEM - Modulator and demodulator is the full-form of MODEM. It works on Physical layer. The function of MODEM is Modulation and demodulation. Modulation means Digital to analog or Demodulation means analog to digital. It is used to connect computers for communication via telephone lines. Page 21 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Hub: It works at the Physical layer. It just acts like a connector of several computers i.e. simply connects all the devices on it s ports together. It broadcasts all the data packets arriving at it with no filtering capacity. Switch: It works at the Data Link Layer. It is used for dividing a network into segments called subnets. It provides filtering of data packets and prevents network traffic also. A switch is also known as an intelligent hub. Repeater – It works in physical layer. Repeaters are used to recharge or regenerate or re-boost the week signals to transmits the signals for long distance. TCP/IP Model MAC address - It is also known as Physical address of our system. The size of MAC address is 48 Bits/6 Bytes.MAC address works on Data link layer of OSI model.MAC address is of Hexadecimal format. Format of MAC address is 07 : 01 : 02 : 22 : 3C : 4D Manufacturer ID Ethernet Card Serial Number IP address - IP address is used to uniquely identify a system in a network. It is also known as Logical address of our system. It is of two type as followsIPV4 (32bits/4Bytes) and IPV6 (128bits/16Bytes). Format of IPV4 Address is 25 2.50.100.10 Format of IPV6 Address is FDEC: 790B:45DE:0000:0001:1239: CDFA:AD38 Loopback addresses are used to find out the current status of hardware (related to networking), whether these are working properly or not. Range of loopback address is (127.0.0.1 – 127.255.255.255). Page 22 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Public IP address: A public IP address is the address that is assigned to a computing device to allow direct access to internet. IT can be found at www. whatismyipaddress.com. Some authorities are responsible to manage these public addresses. ICANN : Internet Corporation Authority Name and Numbers IANA : Internet Assigned Name and Numbers RIR : Regional Internet Registry ISP : Internet Service provider Private IP address: Private IP addresses are locally unique. It is used in private networks. These addresses are commonly used for local area networks in residential, office, and enterprise. There are three classes - A Class:(10.0.0.0 to10.255.255.255), B Class :(172.16.0.0to172.31.255.255), C Class:(192.168.0.0to192.168.255.255) Static IP address: A permanent address that is assigned to a host by network administrator. It means for manual configuration. Less secure. Does not changes automatically after it is assigned to a computer. Dynamic IP address: A Temporary address that is assigned to a host by automatically by DHCP Sever. It means for Automatic configuration More secure as compared to Static IP. Changes automatically if connection is reset or DHCP Lease expires. APIPA – (Automatic Private IP addressing) APIPA is a special feature of windows operating system that enables computer to automatically self-configure an IP address and subnet mask when DHCP server is not reachable. Internet The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite(TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies History of internet 1962 –The concept of the Galactic Network was created by J.C.R. Licklider. 1969 – ARPANET (Advance research project agency) First network of world. 1971 – Email (@) by Ray Tomlinson. 1973 – Vinton "Vint" Cerf and Robert E. "Bob" Kahn start a project to develop Transmission-Control Protocol (TCP). 1973-74 – Ethernet by Robert Metcalfe. 1974 – Bob Kahn and Vint Cerf refer to the term "Internet" for the first time in their notes regarding Transmission Control Protocol. Page 23 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule 1977 – First modem by Dennis Hayes.1983 – TCP/IP became the standard communication method for ARPANET.1983- 84 – The Domain Name System (DNS) establishes the familiar.edu,.gov,.com,.mil,.org,.net, and.int system for naming websites. This is easier to remember than the previous designation for websites. 1989 – WWWC (World Wide Web Consortium). 1990-91 – The first web browser, called World Wide Web, was created by Sir Tim Berners-Lee. 1990 – Archie search engine (first search engine) by Alen Emtage. 1993 – First Graphical browser MOSAIC, by Marc Andreessen, at NCSA. 1995 – Internet launched in India by VSNL. What are Domain Names. Domain names are enabled computers to find the server where your website is hosted. Types of Domain:1. Top level Domain.2. Sub domain. List of Domains.mil - Military groups.com – Commercial Organizations.def - Defense sites.org – non-profit organizations.co.in - commercial in India.info - Information service providers.net - network centers.aero - Airlines and aerospace sites.edu - Educational institutions.biz - Businesses or firms.ac.in - Academics in India.gov - Govt. websites.Int - International Organizations URL Address URL stands for Uniform Resource Locator, or in other words, the web address of an online resource, i.e. a web site or document. Sometimes people understand (www.abc.com) a URL, but it is not URL. It is a part of URL. Example - HTTPS://www.xyz.com/asdef/jopl?color=bk&Positivity=False Web browsers – It is an example of application software. It provides a platform to access the services of internet or a network. Examples – WWW (World Wide Web) – first web browser of world. It renamed as NEXUS. Mosaic – it was the first graphical web browser. Some other examples of browsers are LYNX, Arena, Netscape Navigator, opera, Internet explorer, Amaya, Mozilla Firefox, phoenix, safari, google chrome, Epic (Indian), Microsoft Edge etc. Search engine - A search engine is an online tool that searches for results in its database based on the s earch query (keyword) submitted by the internet user. Search engines find the results in their database, sort them and make an ordered list of these results based on the search algorithm. This list is generally called the search engine results page ( SERP). There are many search engines on the market, while the most widely used is Google. Some other examples are Archie (First search engine in the world developed by Alan Emtage), Veronica, Gopher, Excite, Aliweb, Altavista, Lycos, Yahoo, Looksmart, Hotbot, Ask.com, Bing, google, all the web, Baidu, Cuil etc. Page 24 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is followed automatically. A Website is a set of related web pages served from a single web domain. A Home page, index page, or main page is a page on a website. Computer malware and security Malware - Malware is stands for malicious software. It is small program that can come in our system form anywhere and then infects or harms our system. Virus, Worm, Trojan horse, Spyware, Adware, Rootkit, Key loggers, Logic bomb, Ransomware. VIRUS (Vital Information resource under siege)A virus is a program that replicates its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program. Types of viruses are File Virus, Macro Virus, Multipart ite Virus, Boot sector Virus/Master Boot Record Virus, Stealth Virus, Cavity (Space Filler) Virus, Tunneling Virus, Polymorphic Virus, Cluster Virus. WORM (Write once read many) -A computer worm is a program that replicates itself and makes use of a PC's network connectivity to transfer a copy of itself to other computers within that network. Worms are distinct from viruses in that they do not require a host program to run. Trojan Horse - In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. By definition a Trojan does not self-replicate. Like the horse, a Trojan program is a delivery vehicle; the Trojan horse appears to be a very useful program of some type but when a certain event occurs, it does something nasty and often destructive to the system. Spyware is a type of malware that is installed on a user's computer to collect personal information or monitor internet browsing activities. Rootkit is an application that hides its own presence or presence of other malwares on the computer, using some of the lower layers of the operating system (API function redirection, using of undocumented OS functions, etc.), which makes them almost undetectable by common anti-malware software. Adware is software that contains advertisements embedded in the application. Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software. Keylogger - A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. A key logger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. Logic Bomb - A logic bomb is a piece of code inserted into an operating system or software application that implements a malicious function after a certain amount of time, or specific conditions are met. Ransomware- It is a type of malicious software designed to block access to a computer system until a sum of money is paid. Page 25 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Bot, Zombie and Botnet - A bot is an abbreviation for “robot” and denotes a type of software, application, or code script that can be commanded remotely by the attacker. After a device has been infected by a bot, the infected computer is now referred to as a zombie, because it is being remotely animated by the attacker. One zombie under the control of a bot is a useful thing to an attacker, but their usefulness increases in groups. Attackers will attempt to infect dozens, hundreds, or thousands of computers with the same bot and unify to perform coordinated malicious activities. Hacking, Hacker and Cracker - In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. Malicious attacks on computer networks are officially known as cracking. Types of Hacking 1. Ethical hacking (Legal hacking) 2. Non-ethical hacking (Illegal) Types of hackers 1. White hat hackers (Ethical hacking) 2. Black hat hackers (Non-Ethical hacking) 3. Gray Hat hackers (Combination of both black and white hat hackers) 4. Script Kiddie (not a professional, but use download software for hacking). Phishing - Phishing is the attempt to acquire sensitive information such as usernames, passwords, and c redit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Packet Sniffing Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. Spoofing– A spoofing attack is when an attacker or malicious program successfully acts on another person’s (or program’s) behalf by impersonating data.Some common types of spoofing attacks include ARP spoofing, DNS spoofing and IP address spoofing. These types of spoofing attacks are typically used to attack networks, spread malware and to access confidential information and data. Snooping – Snooping refer to listening to a conversation. For example, if you login to a website that uses no encryption, your username and password can be sniffed off the network by someone who can capture the network traffic between you and the web site. Firewall–A computer firewall is a software program that prevents unauthorized access to or from a private network. Firewalls are tools that can be used to enhance the security of computers connected to a network, such as LAN or the Internet. Authentication–to verify the user id and password Authorization– to verify permission, rights and authority assigned to a particular user to perform some task. Page 26 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Logic Gates AND Gate - The AND gate is an electronic circuit which gives a high output only if all its inputs are high. The AND operation is represented by a dot (.) sign. AND gate is also known as conjunction gate. OR Gate - The OR gate is an electronic circuit which gives a high output if one or more of its inputs are high. The operation performed by an OR gate is represented by a plus (+) sign. OR gate is also known as Disjunction gate. NOT Gate - The NOT gate is an electronic circuit which produces an inverted version of the input at its output. It is also known as an Inverter. The operation of NOT gate is also known as Complement or 1’s Complement. NAND Gate - The NOT-AND (NAND) gate which is equal to an AND gate followed by a NOT gate. The NAND gate gives a low output only if all its inputs are high. The NAND gate is represented by a AND gate with a small circle on the output. The small circle represents inversion. NOR Gate - The NOT-OR (NOR) gate which is equal to an OR gate followed by a NOT gate. The NOR gate gives a low output if any one of the inputs are high. The NOR gate is represented by an OR gate with a small circle on the output. The small circle represents inversion. XOR Gate - The 'Exclusive-OR' gate is a circuit which will give a high output if only one of its inputs is high but not both of them. The XOR operation is represented by an encircled plus sign. XNOR Gate - The 'Exclusive-NOR' gate is a circuit that does the inverse operation to the XOR gate. It will give a low output if only one of its inputs is high but not both of them. The small circle represents inversion. Database management system Database: It is a collection of interrelated data. These can be stored in the form of tables. Database Management System: “DBMS is a collection of interrelated data and set of programs that enables user to create and maintain a database.” Page 27 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Examples of database softwares: Sybase, dbase, D2K, DB2, Oracle, My SQL, MS SQL Server, FileMaker, Informix, MS Access etc. Sequence of data - Bit Byte/character Field Record File/Table DatabaseFile Oriented approach:In this approach all data stored in various files of different formats, and it needs different applications to extract data from / add data to files, so it is very difficult to use in proper way. Disadvantages of file-oriented approach: Data redundancy – Repetition of data. Data inconsistency – No proper updation of data in all files. Difficulty in accessing data – Accessing of data is very difficult. Data isolation – Creating application of every file of different format and location is very difficult. Integrity Problems – No proper validation of data in file approach. Atomicity – Data is not saved during any type of failure. Concurrent access – Same data accessed, deleted, updated at same time, it will lead to inconsistent data. To get rid of these problem database management system presents. Architecture of DBMS-The generalized architecture of DBMS is called ANSI/ SPARC model. The architecture is divided into three levels: External v iew or user view/View Level- It is the highest level of data abstraction. This includes only those portions of database of concern to a user or Application program. Each user has a different external view and it is described by means of a scheme called external schema. Conceptual view/Logical Level- All the database entities and the relationship among them are included. One conceptual view represents the entire database called conceptual schema. Internal view/Physical Level- It is the lowest level of abstraction, closest to the physical storage method. It describes how the data is stored, what is the structure of data storage and the method of accessing these data. It is represented by internal schema.Centralized Database- In a centralized database, all data is stored and maintained in one place. In a centralized database system one computer act as a server for storing whole data. In a centralized database system, client/server architecture is used it is the very simplest form of a database system in which one client sent a request to the server. The server will receive a request and will be the response. Page 28 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Distributed Database- A distributed database contains two or more database files located at different locations in the network. In other words, the database is split into multiple files. The users can access the nearest database file. This will increase the speed of retrieving data. This avoids users from interfering with each other. Another advantage is that if one database fails, there are other database files. Types of Databases model - Hierarchical database model, Network Database Model, E-R database model, Relational database model Hierarchical Database model - In a hierarchical database model, the data is organized into a tree-like structure. In simple language we can say that it is a set of organized data in tree structure. Its structure is like a tree with nodes representing records and branches representing fields. Network Database model - Network database model organized data more like a graph and can have more than one parent node. E. R. Database model - Full form of E. R. model is Entity Relationship data model. It is a high-level conceptual data model diagram. The Entity-Relation model represents real-world entities and the relationship between them. Relational Database model - In relational model, the data and relationships are represented by collection of inter-related tables. Each table is a group of column and rows, where column represents attribute of an entity and rows represents records. Attribute – Attributes are the properties which define a relation. Tables – In the Relational model the relations are saved in the table format. It is stored along with its entities. A table has two properties rows and columns. Tuple – It is nothing but a single row of a table. Relation Schema – A relation schema represents the name of the relation with its attributes. Degree – The total number of attributes which in the relation. Cardinality– Total number of rows present in the Table. Relation instance – The set of tuples of a relation at a particular instance of time is called as relation instance. Attribute domain– Every attribute has some pre-defined value and scope which is known as attribute domain. Page 29 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Primary Key is used to uniquely identify each record in a table. Primary Key – Unique + Not Null When a master table contribute its own primary key to another table, then the contributed key of another table is known as foreign key or reference key. SQL – Structured Query Language- SQL is a special purpose query language, designed for create or manage the RDBMS. The SQL programming language was first developed in the 1970s by IBM researchers Raymond Boyce and Donald Chamberlin. SQL is divided in four major parts DDL (Data definition language) - Commands - Create/Alter/Drop/Rename/Truncate DML (Data Manipulation Language) – Commands – Select/Insert/Update/Delete DCL (Data control language) - Commands – Grant/Revoke TCL (Transaction Control Language) –Commands – Commit/Rollback/Savepoint. File Name A filename is a text string that identifies a file. Every file stored on a computer's hard disk has a filename that helps ide ntify the file within a given folder. Filenames may contain letters, numbers, and other characters. Different operating systems also have different limits for the number of characters a filename can have. While older operating systems limited filenames to only 8 or 16 characters, newer OS's allow filenames to be as long as 256 characters. Of course, for most practical purposes, 16 characters is usually enough. A file extension (or simply "extension") is the suffix at the end of a filename that indicates what type of file it is. For e xample, in the filename "myreport.txt," the.TXT is the file extension. It indicates the file is a text document. List of some important File extensions for exams Page 30 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Page 31 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule MS-Office Microsoft Office, or simply Office, is a family of client software, server software, and services developed by Microsoft. It was first announced by Bill Gates on August 1, 1988, at COMDEX in Las Vegas. Initially a marketing term for an office suite (bundled set of productivity applications), the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. It includes Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, Access, and Publisher. Microsoft Office 2019 is the current version of Microsoft Office, a productivity suite, succeeding Office 2016. Famous versions of MS-office are Office 1.0, 95, 97, 2000, XP, 2003, 2007, 2010, 2013, 2016 and 2019. MS-Word Microsoft Word is a word processor developed by Microsoft. It is used for creating, editing, formatting, storing, retrieving and printing of a text document. Microsoft Word's native file formats are denoted either by a.doc or.docx file extension. Tabs of MS-Word- File, Home, Insert, design, Layout, References, Mailing, Review, and View. The File tab opens the Info Window and has options arranged in a vertical array: Info, New, Open, Save, Save As, Print, Share, Export, Close, Account, Feedback and Options. The ribbon containing Tabs also have a new feature of Share and Comment at the extreme right corner. Note- Each tab has many commands which are grouped into specific categories. Following are the groups for commands under various tabs of MS Word: Home : Clipboard, Font, Paragraph, Styles and Editing Insert : Pages, Tables, Illustrations, Add-ins, Media, Links, Comments, Header & Footer, Text, Symbols Page 32 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Design : Document Formatting, Page Background Layout : Page Setup, Paragraph, Arrange References: Table of Contents, Footnotes, Research, Citation &Bibliography, Captions, Index, Table of Authorities Mailings: Create, Start Mail Merge, Write &Insert Fields, Preview Results, Finish Review: Proofing, Accessibility, Language, Comments, Tracking, Changes, Compare, Protect View : Views, Page Movement, Show, Zoom, Window, Macros Help : Help Page Orientation - Portrait and Landscape options are available in Orientation category of Page Setup. Alignments- Alignment refers to the position of text between the margins. Left/ Right/ Center/ Justify Auto complete - Auto complete is a feature in word that automatically completes the spelling of days of the week and months of the year that have more than five letters in their names. Header & Footer -Header and Footer option is used to display information such title and page number of the document. Title Bar - The bar at the top of the window that bears the name of the window. Menu bar/Tab Row - A screen element of MS Word that is usually located below the title bar that provides categorized option, is called Menu Bar(in older Version)/ Tab Row(in newer Version). Editing - To change the value of data is known as editing. Formatting - To change the look and appearance of data. Format Painter -To copy the styles and formatting of text and then apply it to another text. Indents- In word processing, the word indent is used to describe the distance, or number of blank spaces used to separate a paragraph from the left or right margins. Left, Right, First Line and Hanging Indent. Margins- the strips of white space around the edge of the paper. Most word processors allow you to speci fy the widths of margins. Left, Right, Top, Bottom. Case – 1. Sentence case (Only first letter of sentence is capital). 2. Lower case (All letters of sentence are small). 3. Upper case (All letters of sentence are capital). 4. Capitalize each word (Only first letter of each word in a sentence is capital). 5. Toggle case (in this all capital letters are converted into small letters and all small letters are converted into capital letters). Superscript - A symbol or character that appears slightly above a line. Subscript - A symbol or character that appears slightly below a line is called a subscript. Font Size - Range of font size (1 to 1638). Table- A combination of rows and columns. Total number of rows in a table – 32767. Total number of columns in a table – 63. Watermark- A watermark is a faded background image that displays behind the text in a document. Page 33 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Mail merge-Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. When performing a Mail Merge, you will need a Word document (you can start with an existing one or create a new one) and a recipient list, which is typically an Excel workbook. Footnote - A footnote is additional information found at the bottom of the current page in a document. Endnote - An endnote is similar, but they are only found at the end of a document and contain reference information about quoted material. Hyperlink-A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the current document. (Ctrl + Click). Macros- A macro is a series of commands (Shortcuts and recording) that is recorded so it can be played back (executed) at a later time. Macros are great for reducing the amount of work you have to do on a series of steps that you perform frequently. Thesaurus- Thesaurus is used for finding a synonym for a word in the document. Some important shortcut keys used in MS- Word Page 34 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Page 35 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule MS-Excel Microsoft Excel is a spreadsheet application developed by Microsoft for Microsoft Windows and M ac OS.It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications. The tabs are as follows: File, Home, Insert, Page Layout, Formulas, Data, Review, and View. Following are the groups of Commands available under tabs of Excel: Page 36 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Home: Clipboard, Font, Alignment, Number, Style (for Conditional Formatting of table), Cells (to insert, delete and format cells), Editing (AutoSum, Sort & Filter, Find & Select) Insert: Tables (Pivot Table, and Tables); Illustrations(Pictures, Online Picture, shapes and Icon); Add-ins; Charts; Tours (3D Map); Sparklines (Line, Column, Win/Loss);Filters; Links; Text; Symbols Page Layout: Themes; Page Setup (Margin, orientation, page size, print area, breaks, background and print titles); Scale to fit; Sheet Options (Gridline, headings); Arrange Formulas: Insert Function; Function Library; Defined Names; Formula Auditing; Calculation Data: Get external Data; Get & Transform (New query, show queries, from table, recent sourc es); Connections; Sort and Filter; Data Tools; Forecast (what-if analysis, forecast sheet); Outline Review: Proofing (Spelling, Thesaurus); Accessibility; Insights-smart lookup; Comments; Changes (Protect sheet, protect workbook, share workbook, allow users to edit ranges, track changes) View: Workbook Views (Normal, Page Break Preview, Page Layout, Custom Views); Show (gridlines, ruler. formula bar, headings); Zoom; Window; Macros Some important facts regarding MS-Excel - The intersection of a row and column is called a Cell. - The cell in which we are currently working is known as Active Cell. - A Worksheet is made of columns and rows, wherein columns run Vertically and rows run Horizontally. - Microsoft Excel has the basic features of all spreadsheets, using a grid of cells arranged in numbered rows and letter- named columns to organize data manipulations like arithmetic operations - The letter and number of the intersecting column and row is the Cell Address. - Short cut key to insert a new worksheet in MS-Excel is ALT + Shift + F1 + or Shift + F11. - Sheet tab is the tab at the bottom of the worksheet window that displays the name of the worksheet. - A Microsoft office document that contains one or more worksheets is known as a Workbook. In order to work correctly, a function must be written a specific way, which is called the syntax. The basic syntax for a function is the equals s ign (=), the function name (SUM, for example), and one or more arguments. Arguments contain the information you want to calculate. For example, the function = AVERAGE (B1:B9) would calculate the average of the values in the cell range B1:B9. This function contains only one argument. Multiple arguments must be separated by a comma. For example, the function = SUM(A1:A3, C1:C2) will add the values of all of the cells in the three arguments Page 37 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule Some important functions used in Microsoft Excel AUTOSUM: Allows you to automatically insert the most common functions into your formula, including SUM, AVERAGE, COUNT, MIN, and MAX. LEFT : Returns a specified number of characters from the start of a supplied text string TRIM : Removes duplicate spaces, and spaces at the start and end of a text string. LOWER: Converts all characters in a supplied text string to lower case PROPER: Converts all characters in a supplied text string to proper case (i.e. letters that do not follow another letter are upper case and all other characters are lower case) UPPER: Converts all characters in a supplied text string to upper case CONCAT: Joins together two or more text strings MID: Returns a specified number of characters from the middle of a supplied text string RIGHT : Returns a specified number of characters from the end of a supplied text string REPT : Returns a string consisting of a supplied text string, repeated a specified number of times IF: Tests a user-defined condition and returns one result if the condition is TRUE, and another result if the condition is FALSE LEN: Returns the length of a supplied text string DATE : Returns a date, from a user-supplied year, month and day TIME: Returns a time, from a user-supplied hour, minute and second NOW: Returns the current date & time TODAY: Returns today's date DAY : Returns the day (of the month) from a user-supplied date MONTH: Returns the month from a user-supplied date YEA R: Returns the year from a user-supplied date ABS : Returns the absolute value (i.e. the modulus) of a supplied number SUM : Returns the sum of a supplied list of numbers PRODUCT: Returns the product of a supplied list of numbers POWER: Returns the result of a given number raised to a supplied power MOD: Returns the remainder from a division between two supplied numbers SUBTOTAL: Performs a specified calculation (e.g. the sum, product, average, etc.) for a supplied set of values ROUND: Rounds a number up or down, to a given number of digits SUMIF : Adds the cells in a supplied range, that satisfy a given criteria COUNT : Returns the number of numerical values in a supplied set of cells or values COUNTA: Returns the number of non-blanks in a supplied set of cells or values COUNTBLANK: Returns the number of blank cells in a supplied range COUNTIF: Returns the number of cells (of a supplied range), that satisfy a given criteria MAX : Returns the largest value from a list of supplied numbers MIN: Returns the smallest value from a list of supplied numbers Page 38 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule AVERAGE: Returns the Average of a list of supplied numbers Some Important Shortcut keys of Microsoft Excel Close a spreadsheet Ctrl+W Open a spreadsheet Ctrl+O Go to the Home tab Alt+H Save a spreadsheet Ctrl+S Copy Ctrl+C Paste Ctrl+V Undo Ctrl+Z Remove cell contents Delete key Choose a fill colour Alt+H, H Cut Ctrl+X Go to Insert tab Alt+N Bold Ctrl+B Centre align cell contents Alt+H, A, then C Go to Page Layout tab Alt+P Go to Data tab Alt+A Go to View tab Alt+W Open context menu Shift+F10 Add borders Alt+H, B Delete column Alt+H,D, then C Go to Formula tab Alt+M Hide the selected rows Ctrl+9 Hide the selected columns Ctrl+0 Move to the previous cell in a worksheet or the previous option Shift+Tab in a dialog box. Move one cell up in a worksheet. Up Arrow key Move one cell down in a worksheet. Down Arrowkey Move one cell left in a worksheet. Left Arrow key Move one cell right in a worksheet. Right Arrowkey Move to the edge of the current data region in a worksheet. Ctrl+arrow key Enter End mode, move to the next nonblank cell in the same column or row as the active cell, and turnoff End mode. If the cells are blank, End, arrow key move to the last cell in the row or column. Move to the last cell on a worksheet, to the lowest used row of the Ctrl+End rightmost used column. Extend the selection of cells to the last used cell on the worksheet Ctrl+Shift+End Page 39 of 59 Click Here For Banking and Insurance Special Package | Click Here For Best Standard Online Test Series If there are any suggestions/ errors in this PDF contact us via this email: [email protected] Computer Awareness Capsule (lower-right corner). Move to the cell in the upper-left corner of the window when Scroll Home+Scroll Lock is turned on. Lock Move to the beginning of a worksheet. Ctrl+Home Move one screen down in a worksheet. Page Down Move to the next sheet in a workbook. Ctrl+PageDown Move one screen to the right in a worksheet. Alt+Page Down Move one screen up in a worksheet. Page Up Move one screen to the left in a worksheet. Alt+Page Up Move to the previous sheet in a workbook. Ctrl+Page Up Move one cell to the right in a worksheet. Or, in a protected Tab worksheet, move between unlocked cells. Open the Format Cells dialog box. Ctrl+1 Format fonts in the Format Cells dialog box. Ctrl+Shift+F orCtrl+Shift+P Edit the active cell and put the insertion point at the end of its contents. Or, if editing is turned off for the cell, move the insertion F2 point into the formula bar. If editing a formula, toggle Point mode off or on so you can use arrow keys to create a reference. Add or edit a cell comment.