SlideShare a Scribd company logo
1 of 30
M1- IT Tools & Application
DCA - Diploma in Computer Application
G-TEC COMPUTER EDUCATION
Kattakada | Vellanade
1 | P a g e
1. In order to Excel that we are entering a formula in cell,we must begin with an operator
Ans : =
2. Into how many generations can computers be classified
Ans : 5
3. GUI stands for
Ans: Graphical User Interface
4. Out of the following items which one is not an application software
Ans: Assembler
5. Any data or instruction enters into the storage of a computer is considered as
Ans : Input
6. Processing speed of computers can be measured by using
Ans : MIPS (GHz)
7. An error is also known as
Ans: Bug
8. Graphical picture that represents an object like file ,folder etc are
Ans: Icon
9. All modern computers are
Ans: Digital Computers
10. The 0 and 1in the binary numbering system are called binary digits or
Ans: Bits
11. In a digital computer, data is represented in
Ans: Binary form
12. Commonly called computer
Ans: ENIAC
13. Mainly used with computer games
Ans: Joy stick
14. Allows you to enter a ghosted text behind a content of a page
Ans: Watermark
15. Shortest access time
Ans: Cache Memory
16. The minimum and maximum size of fonts in the formatting toolbar are
Ans:8,72
17. The size of A4 sheet
Ans: 210x297
18. By default, the header or footer is printed
Ans: on every page
19. How many maximum lines can be set for the drop cap
Ans: 10
2 | P a g e
20. Which of the following is used to move an active cell to the first column of the current
row
Ans: Ctrl + Home
21. The program used to convert mnemonic code to machine code
Ans: Assembler
22. This is used in EBCDIC
Ans: Mainframe
23. Computers used for automatic operations are
Ans: Digital Computer
24. Execution of two or more programs by a single CPU is known as
Ans: Multiprogramming
25. Data in our worksheet can be arranged in an order using
Ans: Sort
26. Features that display only the data in columns to specified criteria is
Ans: Filtering
27. Statistical calculations and preparations of tables and graphs can be done using
Ans: Excel
28. The blank space outside the printing area on a page
Ans: Margin
29. The name of the word document is displayed
Ans: Title Bar
30. Connects computers and allow them to communicate with others
Ans : Network card
31. I wake up the computer and reminds what to do
Ans: BIOS
32. Iam the brain of the computer
Ans: CPU
33. Largest storage device attached within a computer
Ans:Hard drive
34. I hold all other circuit board
Ans: Motherboard
35. I handle the graphics thata are displayed on the monitor
Ans: Video card
36. Iam the type of port used by flash drives
Ans: USB port
37. Computers that support hundreds or thousands of users simultaneously
Ans: Mainframe
38. The binary language consists of two digits
Ans: 0 and 1
39. A computer gathers data,process it, outputs the data or information and
3 | P a g e
Ans : stores the data or information
40. Enter key is used to break a paragraph
41. Ctrl+D is used for opening a font dialogue box in MS Word
42. Page setup consists of all of the above(page size,printmargin,page orientation)
43. ENIAC is commonly called First computer
44. Short cut key for find is Ctrl+F
45. Ctrl+ spacebar is the shortcut key for clear formatting
46. In a digital computer data is represented in Binary form
47. Theme is used to set the overall design of a presentation
48. In default,clipboard can hold 24 items temporarily
49. C &C++ are HLL type of languages
50. Hybrid computer is a combination of analog and digital computer
51. Assembler converts assembly language into machine language
52. Compiler converts High Level language to machine language
53. Ctrl+Z is the short cut key for undo
54. Word length is the number of bits transferred at a time
55. Internet explorer is a web browser that is already installed along with Windows OS
56. Explorer is a powerful file manager
True or false
1. Assembly language programs are system independent -True
2. Program instructions within a high level language are called source code – True
3. DVDs have a higher storage capacity than C-ROMs – True
4. We can enter new program into ROM – False
5. GNU Linux is an open source operating software - True
6. Magnetic tape uses Random access method -False
7. The language the computers can understand is called machine Language – True
8. CPU stands for Central Performance Unit – False
9. MS Word is a hardware – False
10. There is only one way to create a folder –False
11. Ctrl+p is used to open a paragraph dialogue in MS Word – False
12. Kernel is the core of Linux system - True
13. Ctrl + Enter is used to add a new page in MS Word – True
14. We cannot set a header in an Excel file – False
15. BIOS stands for Basic In Order System – False
16. The hexadecimal number system contains digits from 1 – 15 – False
17. Twitter is an online social networking and blogging service - False
18. Worms and Trojan horses are easily detected and eliminated by antivirus software –
True
19. The first page you normally view at a web site is its Master Page –False
20. Watermark command is shown under page layout tab -False
4 | P a g e
21. Ctrl+ P is used to open paragraph dialogue in MS Word – False
22. We cannot set a header to an excel file – False
23. Data validation prevents invalid data from entering int a cell – True
24. We cannot change layout of slide after entering information – False
25. We can create a video file by using PowerPoint – True
26. Shift + F5 is used to start the slide show from the current slide – True
27. F8 is the short cut key for spell check - False
28. Default font of MS Word is Arial Black – False
29. Minimum zoom percentage in word document is 10 - True
Match the following
1. F5 – Slideshow
2. Esc – quit form slideshow
3. Super computer – used by large organizations
4. Ctrl+A – Select All
5. Ctrl+E – Centre align
6. MICR – Input Device
7. Hard disk -DRAM
8. System Software – Compiler
9. Refresh periodically - More than two heads
10. Spelling and Grammar – MS Word
11. Bluetooth – Connect another device
12. Help -F1
13. Portrait - Vertical page
14. WordArt – Decorated text
15. Redo – Ctrl + Y
16. Link – Ctrl + K
17. Placeholder – Dotted areas in an empty slide
18. Print preview – Ctrl + F2
19. Pivot table – Insert
20. MS Excel – Financial Analysis
21. View styles and zoom - Status Bar
22. Show/hide ruler - top of vertical scroll bar
23. Subtotal - find the total/average/max of each subset in a table
24. Currency -$
25. What if analysis – Scenario Manager
26. F12 -Save As
27. Gridline – Cell borer
28. Ctrl + : - Displays system date
29. Ctrl + ; - Displayssystem time
5 | P a g e
30. weekday – This function returns 1 - 7
Answer The Following
1. Advantages and disadvantages of fourth and fifth generation computers
Fourth Generation of Computers(1972 onward): VLSI (Very Large Scale Integrated)
Circuit or they’re additionally referred to as microprocessors are utilized in this
generation. A microprocessor chip is made from hundreds of Integrated Circuits
construct on a single silicon chip. The use of Personal Computer(PCs) elevated on this
generation and First Personal Computer (PC) changed into advanced through IBM. For
example, Apple, CRAY-1, etc.
Advantages Fourth Generation of Computer
Following are some advantages of fourth-generation computers:
 They were designed to be used for a wide range of purposes (general-purpose
computers).
 Smaller and more dependable than previous generations of computers.
 There was very little heat generated.
 In many circumstances, the fourth-generation computer does not require a cooling
system.
 Portable and less expensive than previous versions.
 Computers from the fourth generation were significantly quicker than those from
previous generations.
 The Graphics User Interface (GUI) technology was used to provide users with
better comfort. During this time, PCs became more inexpensive and widespread.
 Repair time and maintenance costs are reduced.
 They were also created with the intention of being used in commercial production.
 In this form of computer, any type of high-level language can be employed.
Disadvantages of the Fourth Generation of Computer
Following are some disadvantages of fourth-generation computers:
 The fabrication of the ICs necessitated the use of cutting-edge technologies
(Integrated Circuits).
 Only ICs can be made with a high-quality and reliable system or technology.
 Microprocessors must be manufactured using cutting-edge technology, which
necessitates the use of a cooler (fan).
Fifth Generation of Computers(Present and Future): It is primarily based totally on
Artificial intelligence (AI) software. Artificial intelligence describes the medium and
manner of creating computer systems like people, the manner human thinks, the
manner people act, etc. and that is a rising department and has all of the scopes for
studies work too. For example, PARAM 10000, IBM notebooks, etc.
Advantages of Fifth Generation of Computer
Following are some advantages of fifth-generation computers:
 These computers are far quicker than previous generations.
6 | P a g e
 These computers are simpler to repair.
 These computers are substantially smaller in size than other generation computers.
 They are lightweight and easy to move.
 True artificial intelligence is being developed.
 Parallel Processing has progressed.
 Superconductor technology has progressed.
Disadvantages of Fifth Generation of Computer
Following are some disadvantages of fifth-generation computers:
 They’re usually sophisticated but could be difficult to use.
 They can give businesses additional power to monitor your activities and potentially
infect your machine.
2. Functions of Operating System
An operating system is a program on which application programs are executed and acts
as a communication bridge (interface) between the user and the computer
hardware. The main task an operating system carries out is the allocation of resources
and services, such as the allocation of memory, devices, processors, and information.
Functions of Operating System
1. Memory Management
It is the management of the main or primary memory. The operating system:
 Allocates and deallocates the memory.
 Keeps a record of which part of primary memory is used by whom and how
much.
 Distributes the memory while multiprocessing.
 In multiprogramming, the operating system selects which processes acquire
memory when and how much memory they get.
2. Processor Management/Scheduling
Every software that runs on a computer, whether in the background or in the frontend, is a
process. Processor management is an execution unit in which a program operates. The
operating system determines the status of the processor and processes, selects a job and
its processor, allocates the processor to the process, and de-allocates the processor after
the process is completed.
When more than one process runs on the system the OS decides how and when a process
will use the CPU. Hence, the name is also CPU Scheduling. The OS:
 Allocates and deallocates processor to the processes.
 Keeps record of CPU status.
3.Device Management
7 | P a g e
An operating system regulates device connection using drivers. The processes may require
devices for their use. This management is done by the OS. The OS:
 Allocates and deallocates devices to different processes.
 Keeps records of the devices.
 Decides which process can use which device for how much time.
4. File Management
The operating system manages resource allocation and de-allocation. It specifies which
process receives the file and for how long. It also keeps track of information, location, uses,
status, and so on. These groupings of resources are referred to as file systems. The files on
a system are stored in different directories. The OS:
 Keeps records of the status and locations of files.
 Allocates and deallocates resources.
 Decides who gets the resources.
5. Storage Management
Storage management is a procedure that allows users to maximize the utilization of
storage devices while also protecting data integrity on whatever media on which it lives.
Network virtualization, replication, mirroring, security, compression, deduplication, traffic
analysis, process automation, storage provisioning, and memory management are some of
the features that may be included. The operating system is in charge of storing and
accessing files. The creation of files, the creation of directories, the reading and writing of
data from files and directories, as well as the copying of the contents of files and
directories from one location to another are all included in storage management.
The OS uses storage management for:
 Improving the performance of the data storage resources.
 It optimizes the use of various storage devices.
 Assists businesses in storing more data on existing hardware, speeding up the
data retrieval process, preventing data loss, meeting data retention
regulations, and lowering IT costs
3. Distinguish between Compiler and Interpreter
Compiler
A compiler is a translator that produces an output of low-level language (like an
assembly or machine language) by taking an input of high-level language. It is basically a
computer program used to transform codes written in a programming language into
machine code (human-readable code to a binary 0 and 1 bits language for a computer
processor to understand).
8 | P a g e
 Compilers check all types of errors, limits, and ranges. Thus, it’s more intelligent.
 The run time of its program is longer, and it occupies more memory.
Interpreter
It is a program that functions for the translation of a programming language into a
comprehensible one. It is a computer program used for converting high-level program
statements into machine codes. It includes pre-compiled code, source code, and scripts.
 An interpreter translates only one statement at a time of the program.
 They create an exe of the programming language before the program runs.
Difference Between Compiler and Interpreter
Interpreter Compiler
Translates program one statement at a
time.
Scans the entire program and translates it
as a whole into machine code.
Interpreters usually take less amount of
time to analyze the source code. However,
the overall execution time is comparatively
slower than compilers.
Compilers usually take a large amount of
time to analyze the source code. However,
the overall execution time is comparatively
faster than interpreters.
No Object Code is generated, hence are
memory efficient.
Generates Object Code which further
requires linking, hence requires more
memory.
Programming languages like JavaScript,
Python, Ruby use interpreters.
Programming languages like C, C++, Java
use compilers.
4. 10 Options Of Insert Menu In MS Word
The Insert Tab is right next to the Home Tab in Microsoft Word . This tab has a lot of useful
features that will let you insert things like pictures, clip art images, shapes, SmartArt
graphics, charts and a host of other items. Let us review a few of these features in this
exciting new tab.
 Table : helps to insert table
 Header & Footer: Helps to insert header, footer as well as pagenumber
 Link : helps to create hyperlinks to other files, docments and website.
 Equation: helps to insert equation
 Symbols: symbols can be inserted from here.
 Illustrations: pictures,shapes,icons, smartart,chart and screenshot can be added
from here.
 Date&time: inserts system date and time
 Drop cap : drops first letter of paragragh
 Object: helps to insert various objects such as charts,paint images etc
9 | P a g e
 Cover page: inserts a cover page
 Page break: helps to break a page into another.
5. Social media networks
Social media is as a set of software and web tools that help users interact online, share
content and develop a personalised network of friends, colleagues or organisations. Every
individual uses their network differently, and there are no set rules about what is ‘right’ for
each site. However, the key word here is social. Users come to social media sites to talk to
friends, share ideas and hear the latest news. They do not, in general, log in to their
accounts intending to buy something. Even on the more career-focused sites like LinkedIn,
direct sales messages have to be done only rarely and with care. Instead of posting simply
‘buy me’ messages for your book, there are plenty of other approaches. You could consider
the following:
 Write an article about your work and post a link to it in relevant groups and forums;
remember to add a note about your book.
 Join groups relevant to your work and keep an eye on other users’ comments. Is
someone asking a question you can answer? Then answer it and put in a link to your
home page or blog or anywhere that your book can be found.
 Something in the news relevant to your work? Make sure your friends and
colleagues know it!
In short, social media works best if you participate and support the communities you join. If
you share a link to your book before anyone knows who you are, it won’t generate much
interest. However, if you have earned a reputation as an active and constructive participant,
an announcement about your book will be warmly received. If you are interested in learning
more about social media, there are many books, blogs and websites which are easy to find
with a quick search on Google or your preferred search engine. Once you begin, you will find
that it is not difficult, although it does require a little dedication and patience.
Examples are Facebook, twitter Instagram
6. Different kinds of Printers
Printers have many types based on how they work. There are several types of printers that
you can identify based on how they work. The following are the types of printers.
 Inkjet Printers
The first type of printer is the Inkjet printer. This printer is a printer that is commonly
found in everyday life because the way it works is quite fast.This printer sprays ink
onto the top of the paper according to the data received from the connected device.
The ink is placed in a container called a cartridge.This printer has the advantage that
the quality of the prints on the paper is very good. So this printer is suitable for
printing large images because of the quality it produces.
 LaserJet Printers
The second type of printer is a LaserJet printer. This printer uses a laser to print text
or images contained in the document to be printed.The way this laser works is by
10 | P a g e
shining a laser into the printed paper which can create a pattern for the image to be
printed.The advantage of LaserJet printers is that the print speed is faster than inkjet
printers. In addition, the resulting image quality is also quite good.
 Dot Matrix Printers
The next type of printer is the Dot Matrix Printer. This printer has a quite unique way
of working, namely by using a ribbon and a set of ribbons that have been arranged to
print.The way this printer works is the same as a typewriter which has a slow speed
in printing letters in text. This printer is usually found to print the total goods in a
warehouse or other.
 Thermal Printer
Then there is a thermal printer, which is a printer used to print bills or receipts at
supermarkets or shopping. The way a thermal printer work is by heating the paper
from the roll, the paper will turn dark when heated.The mechanism of this printer is
quite easy, which is by pulling the paper adjacent to the print head in which there is
an automatic permanent. The heater is certainly capable of producing simple text
and images on paper.The advantage of this printer is that this printer does not
require ink in the printing process, but it has the disadvantage that it is only used for
simple text, such as printing groceries bills.
7. Distinguish between Static and Dynamic RAM
RAM:Random access memory (RAM) is the best known form of computer memory. RAM
is considered "random access" because you can access any memory cell directly if you
know the row and column that intersect at that cell.
Dynamic RAM :Dynamic RAM is the most common type of memory in use today. Inside
a dynamic RAM chip, each memory cell holds one bit of information and is made up of
two parts: a transistor and a capacitator.
Static RAM :In static RAM, a form of flip-flop holds each bit of memory. A flip-flop for a
memory cell takes 4 or 6 transistors along with some wiring, but never has to be
refreshed, which makes status RAM appreciably faster than dynamic RAM.
Difference Between Static RAM And Dynamic RAM In Tabular Form
BASIS OF
COMPARISON
SRAM DRAM
Description
Static RAM is a type of semiconductor
memory that uses bistable latching
circuitry to store each bit.
Dynamic random access memory is a
type of random access memory that
stores each bit of data in a separate
capacitor within an integrated circuit.
Storage Of Bit
Of Data
SRAM uses transistor to store a single bit
of data.
DRAM uses a separate capacitor to
store each bit of data.
Data Holding Holds data indefinitely as long as the Holds data dynamically not
11 | P a g e
computer is turned on. indefinitely.
Refreshment
SRAM does not require periodic
refreshment to maintain data.
DRAM requires periodic refreshment
to maintain the charge in the
capacitors for data.
Access Time
SRAM has lower access time; therefore it
is faster compared to DRAM.
DRAM has higher access time;
therefore it is slower than SRAM.
Place Of Use SRAM are used in Cache memory. DRAM is used in main memory.
Structure
SRAM’s structure is complex than DRAM.
It comprises of array of six transistors,
latches and cross-coupled inverters.
DRAM’s structure is simple when
compared to that of DRAM. It
comprises of one capacitor and very
few transistors.
Storage
Capacity
Due to complexity of internal circuitry,
less storage capacity is available
compared to the same physical size of
DRAM memory chip.
Due to simplicity and size of internal
circuitry in the one-bit memory cell of
DRAM. Large storage capacity is
available.
Power Supply
SRAM requires constant power supply,
which means this type of memory
consumes more power.
DRAM offers reduced power
consumption, due to the fact that the
information is stored in the capacitor.
Heat
Generation
Generates more heat. Generates less heat.
Application
SRAM is used to create speed-sensitive
cache.
DRAM is used to create a larger RAM
space system.
Latency Latency is low in SRAM. Latency is high in DRAM.
Cost Comparatively expensive. Comparatively less costly.
8. Different slots and ports of Motherboard
The Motherboard is the largest circuit board often used in computers. It has a primary CPU
(central processing unit) connected to an array of chips for peripherals like printers and
speakers. These peripheral chips are separate from the CPU and communicate via expansion
slots. There are typically 24 expansion slots of 6 inches long on Motherboard, with each slot
sporting eight pins that can be plugged in by inserting a flat cable into its appropriate site.
Different Types of Slots on Motherboard
12 | P a g e
 PCI Slots
A PCI slot is an interface on the motherboard that allows you to put in a device that
requires power, famous for coming with the first Intel Pentiums in 1993.The PCI stands
for ‘peripheral components interconnect’, a standard computer bus to connect
peripheral devices directly to your motherboard.
The devices installed on such PCI slots are very diverse: various controllers, Wi-Fi
adapters, TV tuners, satellite receivers, etc. The number of available slots on
motherboards ranges from two to six.
 PCIe Slots
PCIe or PCI Express slots are the most common slots on the motherboard that optimize
the communication with the microprocessor.
When you need to mount a TV Tuner Card, Video Cards, or Storage Drives like NVMe
based on a PCIe protocol, PCI Express Slots will be used for that purpose. There might be
several numbers of PCIe slots on the motherboard.
 PCI-X Slots
One PCI-X slot on the motherboard is for the PCI Express (PCI-E)-based graphics card
connected to the CPU via a dedicated 16x or 32x direct link to provide high
bandwidth and low latency. The remaining slots are used for other functions as
follows: –
 PCMCIA Card,
 Wireless LAN Card,
 Bluetooth Card.
 AGP Slots
The acronym AGP stands for ‘Advanced/Accelerated Graphics Port’, and they are mainly
designed to support video/graphic cards with high bandwidth requirements. The main
advantage of these slots type is that they support a simple direct connection between the
CPU and the motherboard without any PSU connectors or cables needed.
 ISA Slots
ISA expansion slots are the oldest types of slots on the motherboard. ISA stands for
‘Industry Standard Architecture’ because no other slots were invented at that time.
Network cards, video cards, and other extended hardware are installed with the help of
ISA slots.
 EISA Slots
The EISA ‘Extended Industry Standard Architecture’ slots were introduced to compete
with Micro Chanel Architecture by IBM.The main thing to remember when it comes to
ESIA Slot configurations is that they range from 1x to 16x. That’s because the number in
front of the x denotes how many cards are in one slot.
 VESA Slots
VESA stands for ‘Video-Electronics Standards Association’, it is a group of monitor and
graphics card manufacturers that establish video bus and display standards. The aim of
VESA slots is to optimize the video operations.
13 | P a g e
 RAM Slots
The RAM slot on the motherboard determines the RAM your computer can use. Some
motherboards support the option to mix RAM, allowing you to use a combination of
different RAM modules size, power and speed.
 AMR Slots
The AMR ‘Audio/Modem Rise’ slots are generally found on Pentium 3 and Pentium 4
computers on some of the motherboards. Intel designed these expansion slots to
communicate with the motherboard by offering analog capability. These slots are used
to install modems and sound cards.
 CNR Slots
Communications and networking slot or CNR slot is only used by the customized systems
for networking. It is a specification that supports audio, modem, USB, and LAN interfaces
on core logic chipsets.Today this slot is no longer found on motherboards and has
been replaced by PCI and PCI
 Internal Motherboard Ports
 CPU socket - Where the CPU or processor plugs in.
 CPU power connector - Power cable connection for the CPU.
 ATX power connector - Power cable connection for the system.
 DIMM/RAM Memory slots - Connectors for system memory or RAM.
 PCIe slots (x16, x2, x1) - Expansion card slots, including the graphics card.
 M.2 connection - Solid-state drive connection.
 SATA ports - Modern internal hard drive ports.
 Front panel connector - Connection for USB, and audio ports on the front or top
of the case.
 Front panel header - Connection for LED/RGB lighting, power switch, and reset
switch.
 USB headers (3.1, 2. etc.) - Connection for rear USB ports on the motherboard.
 CMOS battery - Bios battery for when there’s no system power.
 Fan headers - Connection for the case and system fans.
There may be additional ports such as a COM/Serial header, TPM header, or RGB
headers. Some ports will not be used, and sometimes there are redundant connections.
 External Motherboard Ports (Rear Ports)
 PS/2 - Used for older PS/2 interface keyboards.
 USB - Connection for USB peripherals including keyboards, mice, hard drives,
audio equipment, and more.
 HDMI/DisplayPort/VGA - They’re all video or display connectors to output video
or audio to a monitor.
 Ethernet /RJ-45 - Connection for wired internet.
 Analog/Digital Audio - Connections for speakers and digital audio equipment,
including home theater systems.
9. Explain Booting
14 | P a g e
Booting is basically the process of starting the computer. When the CPU is first switched on
it has nothing inside the Memory. In order to start the Computer, load the Operating System
into the Main Memory and then Computer is ready to take commands from the User.
 Types of Booting
There are two types of booting:
 Cold Booting
A cold boot is also called a hard boot. It is the process when we first start the
computer. In other words, when the computer is started from its initial state by
pressing the power button it is called cold boot. The instructions are read from
the ROM and the operating system is loaded in the main memory.
 Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the computer. Here,
the computer does not start from the initial state. When the system gets stuck
sometimes it is required to restart it while it is ON. Therefore, in this condition the
warm boot takes place. Restart button or CTRL+ALT+DELETE keys are used for warm
boot.
 Steps of Booting
We can describe the boot process in six steps:
 The Startup :It is the first step that involves switching the power ON. It supplies
electricity to the main components like BIOS and processor.
 BIOS: Power On Self Test:It is an initial test performed by the BIOS. Further, this test
performs an initial check on the input/output devices, computer’s main memory,
disk drives, etc. Moreover, if any error occurs, the system produces a beep sound.
 Loading of OS: In this step, the operating system is loaded into the main memory.
The operating system starts working and executes all the initial files and
instructions.
 System Configuration: In this step, the drivers are loaded into the main memory.
Drivers are programs that help in the functioning of the peripheral devices.
 Loading System Utilities:System utilities are basic functioning programs, for
example, volume control, antivirus, etc. In this step, system utilities are loaded
into the memory.
 User Authentication: If any password has been set up in the computer system, the
system checks for user authentication. Once the user enters the login Id and
password correctly the system finally starts.
10. Explain Number System
Number system is important from the viewpoint of understanding how data are
represented before they can be processed by any digital system including a digital
computer.
15 | P a g e
 Types of Number Systems
Based on the base value and the number of allowed digits, number systems are of
many types. The four common types of Number System are:
 Decimal Number System
 Binary Number System
 Octal Number System
 Hexadecimal Number System
 Decimal Number System :Number system with a base value of 10 is termed a
Decimal number system. It uses 10 digits i.e. 0-9 for the creation of numbers. Here,
each digit in the number is at a specific place with place value a product of
different powers of 10. Here, the place value is termed from right to left as first
place value called units, second to the left as Tens, so on Hundreds, Thousands,
etc.
 Binary Number System :Number System with base value 2 is termed as Binary
number system. It uses 2 digits i.e. 0 and 1 for the creation of numbers. The numbers
formed using these two digits are termed Binary Numbers. The binary number
system is very useful in electronic devices and computer systems because it can be
easily performed using just two states ON and OFF i.e. 0 and 1.
Decimal Numbers 0-9 are represented in binary as: 0, 1, 10, 11, 100, 101, 110, 111,
1000, and 1001
For example, 14 can be written as 1110, 19 can be written as 10011, 50 can be
written as 110010.
 Octal Number System:Octal Number System is one in which the base value is 8. It
uses 8 digits i.e. 0-7 for the creation of Octal Numbers. Octal Numbers can be
converted to Decimal values by multiplying each digit with the place value and then
adding the result. Here the place values are 80, 81, and 82. Octal Numbers are useful
for the representation of UTF8 Numbers. Example,
(135)10 can be written as (207)8
(215)10 can be written as (327)8
 Hexadecimal Number System:Number System with base value 16 is termed as
Hexadecimal Number System. It uses 16 digits for the creation of its numbers. Digits
from 0-9 are taken like the digits in the decimal number system but the digits from
10-15 are represented as A-F i.e. 10 is represented as A, 11 as B, 12 as C, 13 as D, 14
as E, and 15 as F. Hexadecimal Numbers are useful for handling memory address
locations.The hexadecimal number system provides a condensed way of representing
large binary numbers stored and processed. Examples,
(255)10 can be written as (FF)16
(1096)10 can be written as (448)16
(4090)10 can be written as (FFA)16
16 | P a g e
11. Write the applications of MS Excel
Excel is a software program created by Microsoft that uses spreadsheets to organize
numbers and data with formulas and functions. Excel analysis is ubiquitous around
the world and used by businesses of all sizes to perform financial analysis.Excel is
typically used to organize data and perform financial analysis. It is used across all business
functions and at companies from small to large.
The main uses of Excel include:
 Data entry
 Data management
 Accounting
 Financial analysis
 Charting and graphing
 Programming
 Time management
 Task management
 Financial modeling
 Customer relationship management (CRM)
 Almost anything that needs to be organized!
12. Brief note about 10 functions in MS Excel
List of Functions
 SUM Function
 Count Function
 CountA Function
 LEN Function
 TRIM Function
 RIGHT
 LEFT
 MID Function
 VLOOKUP
 IF Statements
 SUM Function: The SUM function allows you to add 2 or more numbers together. Sum
function can be directly applied to sets of numbers separated by a comma, two or
more cells separated by comma or selecting a range of cells. Let us discuss it in more
detail. For example, let us add 25+35+24.
Formula: =SUM(25,35,24) Answer: 84
17 | P a g e
 COUNT Function: The count function counts the number of cells containing numbers
for a selected range. This formula only works with numbers. It counts the cells where
there are numbers. The formula for the count is =COUNT(Cell Start: Cell End).Eg:
Formula: =COUNT(A1: A1O)
 COUNTA Function:This function counts the number of non-empty cells in a selected
range. It will count cells that have numbers and/or any other characters in
them.Formula: =COUNTA(A1: A1O)
 LEN Function:The LEN formula counts the number of characters in a cell including
spaces.Formula: =LEN(B3)
 TRIM Function:This TRIM function is useful for removing extra spaces in a cell
whether at the beginning, trailing or anywhere between the words.Formula:
=TRIM(A1)
 RIGHT:Right gives you the number of specified characters from the right of a text
string.Formula:=RIGHT(Text or Cell reference, number of characters you want to look
for)
 LEFT: Left gives you the number of specified characters from the left of a text string.
Formula:=LEFT(Text or Cell reference, number of characters you want to look for
 MID: Midgives you the number of specified characters from the middle of a text
string. Formula: =MID(Text or Cell reference, Start Number, number of characters
you want
 VLOOKUP Function:VLOOKUP Function is the most used function in day to day
operations of many businesses.It looks for a particular value in another table or array
and returns the value in the same row from a specified column.Formula:
=Vlookup(lookup_value, table_array, col_index_num, range_lookup)
 IF Statements:IF Statement is also among the most used formula for analytical
scenarios, where a data has to react differently based on different situations.
Formula: =IF(logical_test, value_if_true, value_if_false)
13. Define icon? Write a brief note about different types of icons?
An icon is a graphical representation or symbol that people see on computer screens to
represent an application, object, file, or function, like a command to initiate actions.An
icon is a small visual representation of a program, component, or file that a person sees
on a desktop screen to represent or lead to another action that is part of the computer’s
graphical user interface (GUI) or on websites. These representations are prevalent in
different setups, including computers, laptops, tablets, and even social media platforms
representing specific ideas or topics Icons are part of a computer’s GUI systems,
including Windows and Mac operating systems, intending to aid users in identifying the
type of file that it represents. Most icons can be clickable to redirect users to a specific
action, including accessing a gaming platform, sending work emails, or accessing social
media pages.
18 | P a g e
Icons can be divided or classified into three categories.
 System Icon:The system icon is an icon that comes with a computer, laptop, or
phone when we buy it, and that cannot be deleted.When we buy a computer, laptop
mobile, some applications come along with like a camera, calculator, and other apps
that software that comes with the system.
 Application Icon:Application is those which come after installation on our device.
They are known as Application Icon.We download the share it app and install it;
after that icon, we see this is known as the application icon.
 Shortcut Icon:A shortcut icon is a computer icon. There is one arrow, and they are
known as Shortcut Icon.
14. Computer Memory,Classiffy it and Explain
Computer memory is just like the human brain. It is used to store data/information
and instructions. It is a data storage unit or a data storage device where data is to be
processed and instructions required for processing are stored. It can store both the input
and output can be stored here.
 Types of Computer Memory
In general, computer memory is of three types:
 Primary memory
 Secondary memory
 Cache memory
 Primary Memory:It is also known as the main memory of the computer system. It is used to
store data and programs or instructions during computer operations. It uses semiconductor
technology and hence is commonly called semiconductor memory. Primary memory is of two
types:
o RAM (Random Access Memory): It is a volatile memory. Volatile memory stores
information based on the power supply. If the power supply fails/ interrupted/stopped,
all the data and information on this memory will be lost. RAM is used for booting up or
start the computer. It temporarily stores programs/data which has to be executed by
the processor. RAM is of two types:
 S RAM (Static RAM): S RAM uses transistors and the circuits of this memory are
capable of retaining their state as long as the power is applied. This memory
consists of the number of flip flops with each flip flop storing 1 bit. It has less
access time and hence, it is faster.
 D RAM (Dynamic RAM): D RAM uses capacitors and transistors and stores the
data as a charge on the capacitors. They contain thousands of memory cells. It
needs refreshing of charge on capacitor after a few milliseconds. This memory is
slower than S RAM.
19 | P a g e
o ROM (Read Only Memory): It is a non-volatile memory. Non-volatile memory stores
information even when there is a power supply failed/ interrupted/stopped. ROM is
used to store information that is used to operate the system. As its name refers to read-
only memory, we can only read the programs and data that is stored on it. It contains
some electronic fuses that can be programmed for a piece of specific information. The
information stored in the ROM in binary format. It is also known as permanent memory.
ROM is of four types:
 MROM(Masked ROM): Hard-wired devices with a pre-programmed collection of
data or instructions were the first ROMs. Masked ROMs are a type of low-cost
ROM that works in this way.
 PROM (Programmable Read Only Memory): This read-only memory is
modifiable once by the user. The user purchases a blank PROM and uses
a PROM program to put the required contents into the PROM. Its content can’t
be erased once written.
 EPROM (Erasable Programmable Read Only Memory): EPROM is an extension
to PROM where you can erase the content of ROM by exposing it to Ultraviolet
rays for nearly 40 minutes.
 EEPROM (Electrically Erasable Programmable Read Only Memory): Here the
written contents can be erased electrically. You can delete and
reprogramme EEPROM up to 10,000 times. Erasing and programming take very
little time, i.e., nearly 4 -10 ms(milliseconds). Any area in an EEPROM can be
wiped and programmed selectively.
 Secondary Memory:It is also known as auxiliary memory and backup memory. It is a non-volatile
memory and used to store a large amount of data or information. The data or information stored
in secondary memory is permanent, and it is slower than primary memory. A CPU cannot access
secondary memory directly. The data/information from the auxiliary memory is first transferred
to the main memory, and then the CPU can access it. Types of secondary memory are
o Magnetic Tapes: Magnetic tape is a long, narrow strip of plastic film with a thin,
magnetic coating on it that is used for magnetic recording. Bits are recorded on tape as
magnetic patches called RECORDS that run along many tracks. Typically, 7 or 9 bits are
recorded concurrently. Each track has one read/write head, which allows data to be
recorded and read as a sequence of characters. It can be stopped, started moving
forward or backward, or rewound.
o Magnetic Disks: A magnetic disk is a circular metal or a plastic plate and these plates are
coated with magnetic material. The disc is used on both sides. Bits are stored in
magnetized surfaces in locations called tracks that run in concentric rings. Sectors are
typically used to break tracks into pieces.
o Hard discs: are discs that are permanently attached and cannot be removed by a single
user.
o Optical Disks: It’s a laser-based storage medium that can be written to and read. It is
reasonably priced and has a long lifespan. The optical disc can be taken out of the
computer by occasional users. Examples: CD – ROM, WORM-(WRITE ONCE READ
MANY),DVDs, DVDR (writable),DVDRW (Re-Writable),DVD-ROMS (Digital Versatile
Discs),DVD-R
20 | P a g e
 Cache Memory: It is a type of high-speed semiconductor memory that can help the CPU run
faster. Between the CPU and the main memory, it serves as a buffer. It is used to store the data
and programs that the CPU uses the most frequently.
15. Short note on computer languages
Definition of a Computer Language
A computer language is a group of instructions that are used to create computer programs. This is
the brief of computer languages. The main goal is to achieve human-computer interaction.
Types of Computer Languages
Different types of Computer languages are given below.
 Low Level Language: A Low-level computer language includes only 1’s and 0’s. This
language was used in first and second generation computers. A Low level language is
very easily understood by a computer but hard to understand for Humans. Low level
languages are designed to interact with computer hardware, which are categorized into
two types: Machine level language and Assembly level language.
 Machine Language: As discussed above, Machine level language is a type of Low level
language. Machine language is considered to be the oldest computer language. Machine
language is developed by only using binary numbers i.e., 0 and 1. So, the instructions or
the statements in this language use a sequence of 0’s and 1’s.
 Assembly Language: Assembly level language in computer programming has evolved
with the advancements in the machine language. Assembly language uses symbols,
which are popularly known as mnemonics in computer terminology to write the
instructions. So, comparatively writing a program in Assembly language is more
understandable to the Human than Machine Language.The Assembly language code will
be converted into a Machine language code with the help of an Assembler so that the
computer can understand the binary converted Assembly Language.
 High Level Language: High Level computer languages are the advanced development
languages in the evolution of computer languages. These languages are designed to
make the programming easier and less error-free.High level language uses words and
commands along with symbols and numbers.The keywords used in High level languages
are similar to English words and can be easily understood by Humans when compared to
a Low level language. Types of programming languages in High level languages are:C,
C++, Java, Java Script, Python, C#, PHP.
16. Difference Between High-Level and Low-Level Computer languages
Low Level Computer Language High Level Computer Language
Low level languages are hard to understand by
humans as they use binary numbers and easy to
High level languages are simple to understand by
21 | P a g e
understand by the computer. humans as they use English statements.
Low level languages are programmer-friendly High level languages are human friendly.
Program execution time (computational speed) is
less.
Program execution time is longer.
These are complex to maintain. These are simple to maintain.
Debugging process is hard. It is easy to debug in High level languages.
The programs in low level language are not portable
from one computer to another.
The programs in a high level language are portable,
so we can use them on any computer.
Usage of low level language is less in today’s
technologies.
We use high level language in today’s technologies.
17. Explain about six input devices
An input device is a special type of peripheral device that allows making communication
along with processing unit of the computer system.Computer’s input devices are mostly to
be used for recognized the input data that are provided by users for solving their problems.
Input data has many variants like as text, images, audio, and video. These input devices
allow transferring data from input devices to computer system.
 Mouse: With the help of mouse of computer, users can control a cursor, and select all
types of text, files, icon on your computer screen.
 Keyboard: The keyboard is the most frequent and widely used input device for
entering data into a computer. Although there are some additional keys for
performing other operations, the keyboard layout is similar to that of a typical
typewriter.
Generally, keyboards come in two sizes: 84 keys or 101/102 keys but currently
keyboards with 104 keys or 108 keys are also available for Windows and the Internet.
 Trackball: In the Trackball, one small movable ball places on the surface and using this
ball can be moved any direction on the computer screen.
 Touchpad: Touch pad is best alternative to mouse device. In which all input give to
computer by touching to touch pad, mostly this devices is embedded on the laptop.
 Joysticks: Mainly, joysticks devices are designed for playing game, using this device can
be control any character in the game.
22 | P a g e
 Scanner: A scanner is an input device that functions similarly to a photocopier. It’s
employed when there’s information on paper that needs to be transferred to the
computer’s hard disc for subsequent manipulation. The scanner collects images from
the source and converts them to a digital format that may be saved on a disc. Before
they are printed, these images can be modified.
18. Describe ASCII Code and BCD Code
Computers and digital circuits processes information in the binary format. Each
character is assigned 7 or 8 bit binary code to indicate its character which may be
numeric, alphabet or special symbol. Example - Binary number 1000001 represents
65(decimal) in straight binary code, alphabet A in ASCII code and 41(decimal) in BCD
code.
Types of codes
BCD (Binary-Coded Decimal) code
 Four-bit code that represents one of the ten decimal digits from 0 to 9.
 Example - (37)10 is represented as 0011 0111 using BCD code, rather than
(100101)2 in straight binary code.
 Thus BCD code requires more bits than straight binary code.
 Still it is suitable for input and output operations in digital systems.
(Note: 1010, 1011, 1100, 1101, 1110, and 1111 are INVALID CODE in BCD code.)
ASCII (American Standard Code Information Interchange) code
 It is 7-bit or 8-bit alphanumeric code.
 7-bit code is standard ASCII supports 127 characters.
 Standard ASCII series starts from 00h to 7Fh, where 00h-1Fh are used as control
characters and 20h-7Fh as graphics symbols.
 8-bit code is extended ASCII supports 256 symbols where special graphics and
math's symbols are added.
 Extended ASCII series starts from 80h to FFh.
19. Define Firmware and SMPS
 Firmware:Firmware as the name suggests, is simply a type of software program on a
hardware device that provides a control for specific hardware and provide essential
instructions on how the device communicates with various other computer
hardware. Firmware’s are generally a type of software used to control hardware
devices.
o Firmware is low-level software that stands between the hardware and the
operating system.
o There are no categories of firmware.
23 | P a g e
o Types of firmware includes BIOS, EFI (Extensible Firmware Interface), etc. The
firmware size is very small and generally ranges between a few kilobytes (KB).
Firmware’s are usually developed using low level languages.
o Updating firmware’s usually tricky.
o Firmware are not designed for user interaction and are instead hidden on device.
o Firmware memory is inaccessible and cannot be altered simply by the user.
o The firmware does not run on CPU, instead runs on smaller processors.
o The hardware’s flash storage is used to keep the firmware.
o Features of firmware includes perfect rotation counter support, floating point
variable, perform all control, etc.
o It requires less time to create firmware than software.
o It is rarely changed.
 SMPS : The full form of SMPS is Switched Mode Power Supply also known as Switching
Mode Power Supply. SMPS is an electronic power supply system that makes use of a
switching regulator to transfer electrical power effectively. It is a PSU (power supply unit)
and is usually used in computers to change the voltage to the appropriate range for the
computer.An SMPS adjusts output voltage and current between different electrical
configurations by switching the basics of typically lossless storage such as capacitors and
inductors. Ideal switching concepts determined by transistors controlled outside of their
active state that have no resistance when ‘on’ and carry no current when ‘off.’
Benefits of SMPS
o The switch-mode power source is small in scale.
o The SMPS is very lightweight.
o SMPS power consumption is typically 60 to 70 per cent, which is ideal for use.
o SMPS is strongly anti-interference.
o The SMPS production range is large.
Limitations of SMPS
o The complexity of SMPS is very large.
o The production reflection is high and its control is weak in the case of SMPS.
o Use of SMPS can only be a step-down regulator.
o In SMPS, the voltage output is just one.
20. Write a brief note about the components of a system unit?
A computer system unit is the case that houses the internal parts of a computer, the
kind used for work and entertainment. This case is also sometimes called the computer
tower and it comes in a variety of materials and colors, although is most often black.
When people use a computer, multiple parts are used, including the monitor, keyboard,
mouse, and the box of components that work to process digital information. The
24 | P a g e
computer system unit refers to the case, box, or tower that includes many components
that work together in order to communicate with other computers, produce sound and
audio, and allow human interaction. The computer system unit does not include the
monitor, mouse, keyboard, or screen.
The components of a system unit are as follows:
 Motherboard ( System Board)
 CPU (Central Processing Unit)
 Memory, such as RAM, ROM, Cache, and Flash
 Ports
 Expansion Slots
 Motherboard : Motherboard is the main circuit board for the computer, containing
both soldered, nonremovable components along with sockets or slots for
components that can be removed. The motherboard holds the CPU, RAM and ROM
chips, etc.
 Central Processing Unit (CPU) :The Central Processing Unit (CPU) is the "brain" of
the computer. It executes instructions (from software) and tells other components
what to do.
 The Intel Pentium is a popular processor for IBM-PCs.
 The PowerPC is a popular processor for Macintoshes.
 There are 2 parts of the CPU: The ALU and Control Unit.
 The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as
addition and subtraction) and logical operations (such as comparing two
values).
 The Control Unit deciphers and carries out instructions.
 Different CPUs have different types of instructions, so software made for one
type of CPU will not run on other kinds.
 The word size denotes how many bits of data a CPU can process at once. 32
bits is the standard word size for CPU's used in personal computers today.
The higher the word size, the faster a CPU can execute instructions.
 System Clock : The System Clock is an "electrical pulse generator" that sends out a
pulse of electricity at regular intervals. The electronic components of the computer
need these electric pulses in order to perform work. The more pulses sent out by the
system clock, the faster the computer. The first personal computers had clock speeds
of 8 MHz (8 million pulses per second); today's PC's have clock speeds greater than
3.2 GHz (3.2 billion pulses per second).
 Bus Lines: Bus Lines are "electrical data roadways" (i.e., wires) through which bits of
information are transmitted between the CPU and other components. The bus
size denotes how many bits can be transmitted at once. In general, this should be
the same as the CPU word size.
 Memory Chips:
25 | P a g e
 Random Access Memory (RAM), also known as Main Memory or Primary
Storage, is used to hold instructions and data while they are being used.
RAM is volatile, meaning its contents are lost when the power goes off.
RAM is more than 1000x faster than the fastest secondary storage (see
below).
 Read Only Memory (ROM) chips are non-volatile memory that generally
contains instructions for "booting" the computer (i.e., loading the
operating system when the computer starts up).
 CMOS chips are powered by a battery and contain so-called "flexible
information" such as the type of hard drive your computer is using and
the current date and time.
 Flash chips do not require electricity or a battery yet are non-volatile.
They are used in computers, cell phones, digital cameras, etc.
 Cache memory is special high-speed memory that temporarily stores
instructions and data the CPU is likely to use frequently. These speeds up
processing. Level 2 or external caches generally range in size from 64
Kilobytes to 2 Megabytes.
 Expansion Slots: Expansion Slots are sockets on the motherboard that you can
plug expansion cards into. To plug a card into a slot, you must open the system unit.
A card contains a socket on its end that sticks out from the system unit so a cable can
be plugged into it. Common types of cards are graphics, sound, and network cards.
 Ports :Ports are sockets that are on the outside of the system unit, meaning you can
easily plug a cable into a port without opening the system unit.
 Serial ports transmit one bit of data at a time.
 Parallel ports transmit 8 bits of data at a time.
 Universal Serial Bus (USB) ports are much faster than serial or parallel
ports and allow multiple devices to be connected to the same port.
21. Write a brief note about Open Writer, Calc and Impress?
OpenOffice Writer is a great alternative to the more expensive and feature-rich
Microsoft Office programs like Word. It offers a lot of the same features, including text
editing, font selection, and color selection, as well as the AutoCorrect and AutoComplete
options. It also works with standard Office formats, like DOC. The actual developer of the
free program is The Apache Software Foundation. The OpenOffice Writer installer is
commonly called OpenOfficeWriter.exe or swriter.exe etc. The most popular versions
among the software users are 4.1 and 4.0.
OpenOffice Calc is a free and open-source spreadsheet software that is part of the
OpenOffice suite of applications. It is designed to be compatible with Microsoft Excel
and has similar features. Newcomers find it intuitive and easy to learn; professional data
26 | P a g e
miners and number crunchers will appreciate the comprehensive range of advanced
functions.
o DataPilot is an advanced technology that makes it easy to pull in raw data from
corporate databases; cross-tabulate, summarize, and convert it into meaningful
information.
o Natural language formulas let you create formulas using words (e.g. “sales - costs”).
o Intelligent Sum Button inserts a sum function or a subtotal automatically, depending
on context.
o Wizards guides you through choosing and using a comprehensive range of advanced
spreadsheet functions, or download templates from our Templates repository for
ready-made spreadsheet solutions.
o Styles and Formatting makes it easy to apply flexible cell formatting options,
including freely rotating contents, templates, backgrounds, borders, and many more.
You can be your own spreadsheet expert thanks to templates with built-in functions,
allowing you to concentrate on your real work.
o Scenario Manager allows “what if …” analysis at the touch of a button - e.g. compare
profitability for high / medium / low sales forecasts.
o Calc’s solver component allows solving optimization problems where the optimum
value of a particular spreadsheet cell has to be calculated based on constraints
provided in other cells.
o Multiple users support - Encourage collaborative work on spreadsheets. By sharing a
spreadsheet, other users can easily add their data to the spreadsheet. The
spreadsheet owner can then easily integrate the new data with a few clicks. This
collaboration feature helps avoid editing conflicts.
o Save your spreadsheets in OpenDocument format, the new international standard
for office documents. This XML based format means you’re not tied in to Calc. You
can access your spreadsheets from any OpenDocument compliant software.
o You are free to import your old Microsoft Excel spreadsheets, or save your work in
Excel format for sending to people who are using Microsoft products. Calc is able to
read .xlsx files created with Microsoft Office 2007 or Microsoft Office 2008 for Mac
OS X.
o If you want to send your results to someone who doesn’t have a spreadsheet
application installed, then use Portable Document Format (.pdf) - no need to buy or
install any extra software.
22. Define ICON, Different types of ICON
Icons represent objects or programs on your hard drive on your computer screen. Icons are
visual representations of specific things in our computers in real life. Users can quickly enter
text for completing any task with this user-friendly computing platform. Icons are any
applications, folders, or identities of a person on a computer. Icons that are seen on the
desktop like apps, programs, folders, and files if we know it is a graphical user interface
stored on the PC. The Digital data and information inside the computer system cannot be
27 | P a g e
seen therefore computer communicates with users through GUI [Graphical User Interface]
with the help of desktop icons.
Icons can be divided or classified into three categories.
 System Icon: The system icon is an icon that comes with a computer, laptop, or phone
when we buy it. When we buy a mobile, some applications come along with like a
camera, calculator, and other apps that software that comes with the system. And that
cannot be deleted, which is known as System Icon. If your mobile has a calculator app,
you did not delete it. This icon is called System Icon.
 Application Icon: Application is those which come after installation on our device. They
are known as Application Icon. We download the share its app and install it; after that
icon, we see this is known as the application icon.
 Shortcut Icon: A shortcut icon is a computer icon. There is one arrow, and they are
known as Shortcut Icon.
23. What is a Desktop. What are Desktop Elements
Desktop is the working area of the computer. Desktop GUIs help the user to easily access
and edit files, while they usually do not provide access to all of the features found in the
underlying operating system. A Desktop Environment (DE) is an implementation of
the desktop metaphor made of a bundle of programs running on top of a
computer operating system that share a common graphical user interface (GUI).The Desktop
contains many of the common elements and they are as follows.
 Icons represent objects in the file system; you will generally put special folders or
program icons on the Desktop.
 Desktop wallpaper is a graphic—for show, of course.
 Gadgets are little tools or utilities that you add to the Desktop for additional
functionality.
 The Desktop switch is a button in the lower-right corner that switches from the tile-
based interface to the Desktop. (You see the button only when your mouse button is
down.)
 The Notification area shows icons of various utilities (usually system utilities); it was
once called the Status tray.
 Toolbars contain related commands or objects that you can place on the taskbar.
 The taskbar is a container for toolbars and the Notifications area.
24. What is a software? Different types of software?
"Software is a set of programs (sequence of instructions) that allows the users to perform
a well-defined function or some specified task. " Software is responsible for directing all
computer-related devices and instructing them regarding what and how the task is to be
performed. However, the software is made up of binary language (composed of ones and
zeros), and for a programmer writing the binary code would be a slow and tedious task.
28 | P a g e
Therefore, software programmers write the software program in various human-readable
languages such as Java, Python, C#, etc. and later use the source code. Software's are
broadly classified into two types, i.e., System Software and Application Software.
 System Software: System software is a computer program that helps the user to run
computer hardware or software and manages the interaction between them.
Essentially, it is software that constantly runs in the computer background, maintaining
the computer hardware and computer's basic functionalities, including the operating
system, utility software, and interface. System software is not limited to the operating
system. They also include the basic I/O system procedures, the boot program, assembler,
computer device driver, etc. This software supports a high-speed platform to provide effective
software for the other applications to work in effortlessly. The further classifications of system
software are as follows:
a. Operating System: The operating system acts as an interface between the user
and system hardware. It is a group of software that handles the execution of
programs and offers general services for the application that runs over the
computer. There are various types of operating systems available in the market,
such as embedded operating systems, real-time OS, distributed OS, single or
multi-user operating system, mobile, Internet, and various others. Some of the
commonly used examples of operating systems are Microsoft Windows, Apple's
iOS, Apple's MacOS, Android, Unix, Linux
b. Device Drivers: Device driver is a type of software that operates or controls
some specific hardware devices linked to your system. They provide a software
interface to hardware devices allowing computer operating systems and other
applications to fetch hardware functions without knowing the exact
specifications of the hardware. Some common examples of such device drivers
that connect hardware devices (printers, sound cards, network cards, hard disks,
floppy disk, keyboard, mouse, etc.) to a system easily are as follows: BIOS (Basic
Input/Output System) Device Driver, USB (Universal Serial Bus) Drivers,
Motherboard Drivers, Display Drivers, Printer Drivers, Sound Card Driver, ROM
(Read-only memory) Drivers, VGA (Video Graphic Array) Drivers
c. Firmware: In electronic systems and computing, firmware is a type of permanent
software embedded in the system's ROM (read-only memory) to provide low-
level control for some particular system device hardware. It is a set of
instructions that are stored permanently on your computer's hardware device.
d. Utility: Utility software is developed to provide support in analyzing, optimizing,
along configuring and maintaining a computer. The job of the utility program is
29 | P a g e
to offer support to the system infrastructure. Though the system will work even if
it doesn't have any utility software, the right kind of utility software enhances its
performance and makes it more reliable.Some of the common examples of utility
software are as follows:Norton and McAfee Antivirus,WinRAR,etc
 Application Software: Application programs or software applications are end-user
computer programs developed primarily to provide specific functionality to the
user. The applications programs assist the user in accomplishing numerous tasks
such as doing online research, completing notes, designing graphics, managing the
finances, watching a movie, writing documents, playing games, and many more.
Therefore, many software applications are designed and developed every year by
companies as per the demand and requirements of the potential users. The
application software can either be designed for a general-purpose or specially coded
as per the requirements of business cooperation. Examples of this software are .
Word Processors, MS Word (Microsoft), Corel WordPerfect, Oracle, Mozilla
Firefox,etc

More Related Content

Similar to M1- IT Tools & Application.docx

1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdf1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdfhydyc
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Techglyphs
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xiSyed Zaid Irshad
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptxmehrajdin18
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersPrabu U
 
Computer Organization and BASIC Programming
Computer Organization and BASIC     Programming     Computer Organization and BASIC     Programming
Computer Organization and BASIC Programming MuhammadAhmad844
 
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptx
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptxCO--MODULE-1 (a) - Basic-Structure-of-Computers.pptx
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptxddscraft123
 
1Health Informatics.pdf
1Health Informatics.pdf1Health Informatics.pdf
1Health Informatics.pdfAmanuelMerga
 
COMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.docCOMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.doczacheuskiprono
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.pptEnquiryTITBhiwani
 

Similar to M1- IT Tools & Application.docx (20)

1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdf1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdf
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
copa-i.pptx
copa-i.pptxcopa-i.pptx
copa-i.pptx
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
Material.pdf
Material.pdfMaterial.pdf
Material.pdf
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Architecture presentation
Architecture presentationArchitecture presentation
Architecture presentation
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Computer Organization and BASIC Programming
Computer Organization and BASIC     Programming     Computer Organization and BASIC     Programming
Computer Organization and BASIC Programming
 
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptx
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptxCO--MODULE-1 (a) - Basic-Structure-of-Computers.pptx
CO--MODULE-1 (a) - Basic-Structure-of-Computers.pptx
 
PIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI ComputerPIR AMIR HUSSAIN NOSHAHI Computer
PIR AMIR HUSSAIN NOSHAHI Computer
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
1Health Informatics.pdf
1Health Informatics.pdf1Health Informatics.pdf
1Health Informatics.pdf
 
COMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.docCOMPLETE COMPUTER STUDIES NOTES.doc
COMPLETE COMPUTER STUDIES NOTES.doc
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

M1- IT Tools & Application.docx

  • 1. M1- IT Tools & Application DCA - Diploma in Computer Application G-TEC COMPUTER EDUCATION Kattakada | Vellanade
  • 2. 1 | P a g e 1. In order to Excel that we are entering a formula in cell,we must begin with an operator Ans : = 2. Into how many generations can computers be classified Ans : 5 3. GUI stands for Ans: Graphical User Interface 4. Out of the following items which one is not an application software Ans: Assembler 5. Any data or instruction enters into the storage of a computer is considered as Ans : Input 6. Processing speed of computers can be measured by using Ans : MIPS (GHz) 7. An error is also known as Ans: Bug 8. Graphical picture that represents an object like file ,folder etc are Ans: Icon 9. All modern computers are Ans: Digital Computers 10. The 0 and 1in the binary numbering system are called binary digits or Ans: Bits 11. In a digital computer, data is represented in Ans: Binary form 12. Commonly called computer Ans: ENIAC 13. Mainly used with computer games Ans: Joy stick 14. Allows you to enter a ghosted text behind a content of a page Ans: Watermark 15. Shortest access time Ans: Cache Memory 16. The minimum and maximum size of fonts in the formatting toolbar are Ans:8,72 17. The size of A4 sheet Ans: 210x297 18. By default, the header or footer is printed Ans: on every page 19. How many maximum lines can be set for the drop cap Ans: 10
  • 3. 2 | P a g e 20. Which of the following is used to move an active cell to the first column of the current row Ans: Ctrl + Home 21. The program used to convert mnemonic code to machine code Ans: Assembler 22. This is used in EBCDIC Ans: Mainframe 23. Computers used for automatic operations are Ans: Digital Computer 24. Execution of two or more programs by a single CPU is known as Ans: Multiprogramming 25. Data in our worksheet can be arranged in an order using Ans: Sort 26. Features that display only the data in columns to specified criteria is Ans: Filtering 27. Statistical calculations and preparations of tables and graphs can be done using Ans: Excel 28. The blank space outside the printing area on a page Ans: Margin 29. The name of the word document is displayed Ans: Title Bar 30. Connects computers and allow them to communicate with others Ans : Network card 31. I wake up the computer and reminds what to do Ans: BIOS 32. Iam the brain of the computer Ans: CPU 33. Largest storage device attached within a computer Ans:Hard drive 34. I hold all other circuit board Ans: Motherboard 35. I handle the graphics thata are displayed on the monitor Ans: Video card 36. Iam the type of port used by flash drives Ans: USB port 37. Computers that support hundreds or thousands of users simultaneously Ans: Mainframe 38. The binary language consists of two digits Ans: 0 and 1 39. A computer gathers data,process it, outputs the data or information and
  • 4. 3 | P a g e Ans : stores the data or information 40. Enter key is used to break a paragraph 41. Ctrl+D is used for opening a font dialogue box in MS Word 42. Page setup consists of all of the above(page size,printmargin,page orientation) 43. ENIAC is commonly called First computer 44. Short cut key for find is Ctrl+F 45. Ctrl+ spacebar is the shortcut key for clear formatting 46. In a digital computer data is represented in Binary form 47. Theme is used to set the overall design of a presentation 48. In default,clipboard can hold 24 items temporarily 49. C &C++ are HLL type of languages 50. Hybrid computer is a combination of analog and digital computer 51. Assembler converts assembly language into machine language 52. Compiler converts High Level language to machine language 53. Ctrl+Z is the short cut key for undo 54. Word length is the number of bits transferred at a time 55. Internet explorer is a web browser that is already installed along with Windows OS 56. Explorer is a powerful file manager True or false 1. Assembly language programs are system independent -True 2. Program instructions within a high level language are called source code – True 3. DVDs have a higher storage capacity than C-ROMs – True 4. We can enter new program into ROM – False 5. GNU Linux is an open source operating software - True 6. Magnetic tape uses Random access method -False 7. The language the computers can understand is called machine Language – True 8. CPU stands for Central Performance Unit – False 9. MS Word is a hardware – False 10. There is only one way to create a folder –False 11. Ctrl+p is used to open a paragraph dialogue in MS Word – False 12. Kernel is the core of Linux system - True 13. Ctrl + Enter is used to add a new page in MS Word – True 14. We cannot set a header in an Excel file – False 15. BIOS stands for Basic In Order System – False 16. The hexadecimal number system contains digits from 1 – 15 – False 17. Twitter is an online social networking and blogging service - False 18. Worms and Trojan horses are easily detected and eliminated by antivirus software – True 19. The first page you normally view at a web site is its Master Page –False 20. Watermark command is shown under page layout tab -False
  • 5. 4 | P a g e 21. Ctrl+ P is used to open paragraph dialogue in MS Word – False 22. We cannot set a header to an excel file – False 23. Data validation prevents invalid data from entering int a cell – True 24. We cannot change layout of slide after entering information – False 25. We can create a video file by using PowerPoint – True 26. Shift + F5 is used to start the slide show from the current slide – True 27. F8 is the short cut key for spell check - False 28. Default font of MS Word is Arial Black – False 29. Minimum zoom percentage in word document is 10 - True Match the following 1. F5 – Slideshow 2. Esc – quit form slideshow 3. Super computer – used by large organizations 4. Ctrl+A – Select All 5. Ctrl+E – Centre align 6. MICR – Input Device 7. Hard disk -DRAM 8. System Software – Compiler 9. Refresh periodically - More than two heads 10. Spelling and Grammar – MS Word 11. Bluetooth – Connect another device 12. Help -F1 13. Portrait - Vertical page 14. WordArt – Decorated text 15. Redo – Ctrl + Y 16. Link – Ctrl + K 17. Placeholder – Dotted areas in an empty slide 18. Print preview – Ctrl + F2 19. Pivot table – Insert 20. MS Excel – Financial Analysis 21. View styles and zoom - Status Bar 22. Show/hide ruler - top of vertical scroll bar 23. Subtotal - find the total/average/max of each subset in a table 24. Currency -$ 25. What if analysis – Scenario Manager 26. F12 -Save As 27. Gridline – Cell borer 28. Ctrl + : - Displays system date 29. Ctrl + ; - Displayssystem time
  • 6. 5 | P a g e 30. weekday – This function returns 1 - 7 Answer The Following 1. Advantages and disadvantages of fourth and fifth generation computers Fourth Generation of Computers(1972 onward): VLSI (Very Large Scale Integrated) Circuit or they’re additionally referred to as microprocessors are utilized in this generation. A microprocessor chip is made from hundreds of Integrated Circuits construct on a single silicon chip. The use of Personal Computer(PCs) elevated on this generation and First Personal Computer (PC) changed into advanced through IBM. For example, Apple, CRAY-1, etc. Advantages Fourth Generation of Computer Following are some advantages of fourth-generation computers:  They were designed to be used for a wide range of purposes (general-purpose computers).  Smaller and more dependable than previous generations of computers.  There was very little heat generated.  In many circumstances, the fourth-generation computer does not require a cooling system.  Portable and less expensive than previous versions.  Computers from the fourth generation were significantly quicker than those from previous generations.  The Graphics User Interface (GUI) technology was used to provide users with better comfort. During this time, PCs became more inexpensive and widespread.  Repair time and maintenance costs are reduced.  They were also created with the intention of being used in commercial production.  In this form of computer, any type of high-level language can be employed. Disadvantages of the Fourth Generation of Computer Following are some disadvantages of fourth-generation computers:  The fabrication of the ICs necessitated the use of cutting-edge technologies (Integrated Circuits).  Only ICs can be made with a high-quality and reliable system or technology.  Microprocessors must be manufactured using cutting-edge technology, which necessitates the use of a cooler (fan). Fifth Generation of Computers(Present and Future): It is primarily based totally on Artificial intelligence (AI) software. Artificial intelligence describes the medium and manner of creating computer systems like people, the manner human thinks, the manner people act, etc. and that is a rising department and has all of the scopes for studies work too. For example, PARAM 10000, IBM notebooks, etc. Advantages of Fifth Generation of Computer Following are some advantages of fifth-generation computers:  These computers are far quicker than previous generations.
  • 7. 6 | P a g e  These computers are simpler to repair.  These computers are substantially smaller in size than other generation computers.  They are lightweight and easy to move.  True artificial intelligence is being developed.  Parallel Processing has progressed.  Superconductor technology has progressed. Disadvantages of Fifth Generation of Computer Following are some disadvantages of fifth-generation computers:  They’re usually sophisticated but could be difficult to use.  They can give businesses additional power to monitor your activities and potentially infect your machine. 2. Functions of Operating System An operating system is a program on which application programs are executed and acts as a communication bridge (interface) between the user and the computer hardware. The main task an operating system carries out is the allocation of resources and services, such as the allocation of memory, devices, processors, and information. Functions of Operating System 1. Memory Management It is the management of the main or primary memory. The operating system:  Allocates and deallocates the memory.  Keeps a record of which part of primary memory is used by whom and how much.  Distributes the memory while multiprocessing.  In multiprogramming, the operating system selects which processes acquire memory when and how much memory they get. 2. Processor Management/Scheduling Every software that runs on a computer, whether in the background or in the frontend, is a process. Processor management is an execution unit in which a program operates. The operating system determines the status of the processor and processes, selects a job and its processor, allocates the processor to the process, and de-allocates the processor after the process is completed. When more than one process runs on the system the OS decides how and when a process will use the CPU. Hence, the name is also CPU Scheduling. The OS:  Allocates and deallocates processor to the processes.  Keeps record of CPU status. 3.Device Management
  • 8. 7 | P a g e An operating system regulates device connection using drivers. The processes may require devices for their use. This management is done by the OS. The OS:  Allocates and deallocates devices to different processes.  Keeps records of the devices.  Decides which process can use which device for how much time. 4. File Management The operating system manages resource allocation and de-allocation. It specifies which process receives the file and for how long. It also keeps track of information, location, uses, status, and so on. These groupings of resources are referred to as file systems. The files on a system are stored in different directories. The OS:  Keeps records of the status and locations of files.  Allocates and deallocates resources.  Decides who gets the resources. 5. Storage Management Storage management is a procedure that allows users to maximize the utilization of storage devices while also protecting data integrity on whatever media on which it lives. Network virtualization, replication, mirroring, security, compression, deduplication, traffic analysis, process automation, storage provisioning, and memory management are some of the features that may be included. The operating system is in charge of storing and accessing files. The creation of files, the creation of directories, the reading and writing of data from files and directories, as well as the copying of the contents of files and directories from one location to another are all included in storage management. The OS uses storage management for:  Improving the performance of the data storage resources.  It optimizes the use of various storage devices.  Assists businesses in storing more data on existing hardware, speeding up the data retrieval process, preventing data loss, meeting data retention regulations, and lowering IT costs 3. Distinguish between Compiler and Interpreter Compiler A compiler is a translator that produces an output of low-level language (like an assembly or machine language) by taking an input of high-level language. It is basically a computer program used to transform codes written in a programming language into machine code (human-readable code to a binary 0 and 1 bits language for a computer processor to understand).
  • 9. 8 | P a g e  Compilers check all types of errors, limits, and ranges. Thus, it’s more intelligent.  The run time of its program is longer, and it occupies more memory. Interpreter It is a program that functions for the translation of a programming language into a comprehensible one. It is a computer program used for converting high-level program statements into machine codes. It includes pre-compiled code, source code, and scripts.  An interpreter translates only one statement at a time of the program.  They create an exe of the programming language before the program runs. Difference Between Compiler and Interpreter Interpreter Compiler Translates program one statement at a time. Scans the entire program and translates it as a whole into machine code. Interpreters usually take less amount of time to analyze the source code. However, the overall execution time is comparatively slower than compilers. Compilers usually take a large amount of time to analyze the source code. However, the overall execution time is comparatively faster than interpreters. No Object Code is generated, hence are memory efficient. Generates Object Code which further requires linking, hence requires more memory. Programming languages like JavaScript, Python, Ruby use interpreters. Programming languages like C, C++, Java use compilers. 4. 10 Options Of Insert Menu In MS Word The Insert Tab is right next to the Home Tab in Microsoft Word . This tab has a lot of useful features that will let you insert things like pictures, clip art images, shapes, SmartArt graphics, charts and a host of other items. Let us review a few of these features in this exciting new tab.  Table : helps to insert table  Header & Footer: Helps to insert header, footer as well as pagenumber  Link : helps to create hyperlinks to other files, docments and website.  Equation: helps to insert equation  Symbols: symbols can be inserted from here.  Illustrations: pictures,shapes,icons, smartart,chart and screenshot can be added from here.  Date&time: inserts system date and time  Drop cap : drops first letter of paragragh  Object: helps to insert various objects such as charts,paint images etc
  • 10. 9 | P a g e  Cover page: inserts a cover page  Page break: helps to break a page into another. 5. Social media networks Social media is as a set of software and web tools that help users interact online, share content and develop a personalised network of friends, colleagues or organisations. Every individual uses their network differently, and there are no set rules about what is ‘right’ for each site. However, the key word here is social. Users come to social media sites to talk to friends, share ideas and hear the latest news. They do not, in general, log in to their accounts intending to buy something. Even on the more career-focused sites like LinkedIn, direct sales messages have to be done only rarely and with care. Instead of posting simply ‘buy me’ messages for your book, there are plenty of other approaches. You could consider the following:  Write an article about your work and post a link to it in relevant groups and forums; remember to add a note about your book.  Join groups relevant to your work and keep an eye on other users’ comments. Is someone asking a question you can answer? Then answer it and put in a link to your home page or blog or anywhere that your book can be found.  Something in the news relevant to your work? Make sure your friends and colleagues know it! In short, social media works best if you participate and support the communities you join. If you share a link to your book before anyone knows who you are, it won’t generate much interest. However, if you have earned a reputation as an active and constructive participant, an announcement about your book will be warmly received. If you are interested in learning more about social media, there are many books, blogs and websites which are easy to find with a quick search on Google or your preferred search engine. Once you begin, you will find that it is not difficult, although it does require a little dedication and patience. Examples are Facebook, twitter Instagram 6. Different kinds of Printers Printers have many types based on how they work. There are several types of printers that you can identify based on how they work. The following are the types of printers.  Inkjet Printers The first type of printer is the Inkjet printer. This printer is a printer that is commonly found in everyday life because the way it works is quite fast.This printer sprays ink onto the top of the paper according to the data received from the connected device. The ink is placed in a container called a cartridge.This printer has the advantage that the quality of the prints on the paper is very good. So this printer is suitable for printing large images because of the quality it produces.  LaserJet Printers The second type of printer is a LaserJet printer. This printer uses a laser to print text or images contained in the document to be printed.The way this laser works is by
  • 11. 10 | P a g e shining a laser into the printed paper which can create a pattern for the image to be printed.The advantage of LaserJet printers is that the print speed is faster than inkjet printers. In addition, the resulting image quality is also quite good.  Dot Matrix Printers The next type of printer is the Dot Matrix Printer. This printer has a quite unique way of working, namely by using a ribbon and a set of ribbons that have been arranged to print.The way this printer works is the same as a typewriter which has a slow speed in printing letters in text. This printer is usually found to print the total goods in a warehouse or other.  Thermal Printer Then there is a thermal printer, which is a printer used to print bills or receipts at supermarkets or shopping. The way a thermal printer work is by heating the paper from the roll, the paper will turn dark when heated.The mechanism of this printer is quite easy, which is by pulling the paper adjacent to the print head in which there is an automatic permanent. The heater is certainly capable of producing simple text and images on paper.The advantage of this printer is that this printer does not require ink in the printing process, but it has the disadvantage that it is only used for simple text, such as printing groceries bills. 7. Distinguish between Static and Dynamic RAM RAM:Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. Dynamic RAM :Dynamic RAM is the most common type of memory in use today. Inside a dynamic RAM chip, each memory cell holds one bit of information and is made up of two parts: a transistor and a capacitator. Static RAM :In static RAM, a form of flip-flop holds each bit of memory. A flip-flop for a memory cell takes 4 or 6 transistors along with some wiring, but never has to be refreshed, which makes status RAM appreciably faster than dynamic RAM. Difference Between Static RAM And Dynamic RAM In Tabular Form BASIS OF COMPARISON SRAM DRAM Description Static RAM is a type of semiconductor memory that uses bistable latching circuitry to store each bit. Dynamic random access memory is a type of random access memory that stores each bit of data in a separate capacitor within an integrated circuit. Storage Of Bit Of Data SRAM uses transistor to store a single bit of data. DRAM uses a separate capacitor to store each bit of data. Data Holding Holds data indefinitely as long as the Holds data dynamically not
  • 12. 11 | P a g e computer is turned on. indefinitely. Refreshment SRAM does not require periodic refreshment to maintain data. DRAM requires periodic refreshment to maintain the charge in the capacitors for data. Access Time SRAM has lower access time; therefore it is faster compared to DRAM. DRAM has higher access time; therefore it is slower than SRAM. Place Of Use SRAM are used in Cache memory. DRAM is used in main memory. Structure SRAM’s structure is complex than DRAM. It comprises of array of six transistors, latches and cross-coupled inverters. DRAM’s structure is simple when compared to that of DRAM. It comprises of one capacitor and very few transistors. Storage Capacity Due to complexity of internal circuitry, less storage capacity is available compared to the same physical size of DRAM memory chip. Due to simplicity and size of internal circuitry in the one-bit memory cell of DRAM. Large storage capacity is available. Power Supply SRAM requires constant power supply, which means this type of memory consumes more power. DRAM offers reduced power consumption, due to the fact that the information is stored in the capacitor. Heat Generation Generates more heat. Generates less heat. Application SRAM is used to create speed-sensitive cache. DRAM is used to create a larger RAM space system. Latency Latency is low in SRAM. Latency is high in DRAM. Cost Comparatively expensive. Comparatively less costly. 8. Different slots and ports of Motherboard The Motherboard is the largest circuit board often used in computers. It has a primary CPU (central processing unit) connected to an array of chips for peripherals like printers and speakers. These peripheral chips are separate from the CPU and communicate via expansion slots. There are typically 24 expansion slots of 6 inches long on Motherboard, with each slot sporting eight pins that can be plugged in by inserting a flat cable into its appropriate site. Different Types of Slots on Motherboard
  • 13. 12 | P a g e  PCI Slots A PCI slot is an interface on the motherboard that allows you to put in a device that requires power, famous for coming with the first Intel Pentiums in 1993.The PCI stands for ‘peripheral components interconnect’, a standard computer bus to connect peripheral devices directly to your motherboard. The devices installed on such PCI slots are very diverse: various controllers, Wi-Fi adapters, TV tuners, satellite receivers, etc. The number of available slots on motherboards ranges from two to six.  PCIe Slots PCIe or PCI Express slots are the most common slots on the motherboard that optimize the communication with the microprocessor. When you need to mount a TV Tuner Card, Video Cards, or Storage Drives like NVMe based on a PCIe protocol, PCI Express Slots will be used for that purpose. There might be several numbers of PCIe slots on the motherboard.  PCI-X Slots One PCI-X slot on the motherboard is for the PCI Express (PCI-E)-based graphics card connected to the CPU via a dedicated 16x or 32x direct link to provide high bandwidth and low latency. The remaining slots are used for other functions as follows: –  PCMCIA Card,  Wireless LAN Card,  Bluetooth Card.  AGP Slots The acronym AGP stands for ‘Advanced/Accelerated Graphics Port’, and they are mainly designed to support video/graphic cards with high bandwidth requirements. The main advantage of these slots type is that they support a simple direct connection between the CPU and the motherboard without any PSU connectors or cables needed.  ISA Slots ISA expansion slots are the oldest types of slots on the motherboard. ISA stands for ‘Industry Standard Architecture’ because no other slots were invented at that time. Network cards, video cards, and other extended hardware are installed with the help of ISA slots.  EISA Slots The EISA ‘Extended Industry Standard Architecture’ slots were introduced to compete with Micro Chanel Architecture by IBM.The main thing to remember when it comes to ESIA Slot configurations is that they range from 1x to 16x. That’s because the number in front of the x denotes how many cards are in one slot.  VESA Slots VESA stands for ‘Video-Electronics Standards Association’, it is a group of monitor and graphics card manufacturers that establish video bus and display standards. The aim of VESA slots is to optimize the video operations.
  • 14. 13 | P a g e  RAM Slots The RAM slot on the motherboard determines the RAM your computer can use. Some motherboards support the option to mix RAM, allowing you to use a combination of different RAM modules size, power and speed.  AMR Slots The AMR ‘Audio/Modem Rise’ slots are generally found on Pentium 3 and Pentium 4 computers on some of the motherboards. Intel designed these expansion slots to communicate with the motherboard by offering analog capability. These slots are used to install modems and sound cards.  CNR Slots Communications and networking slot or CNR slot is only used by the customized systems for networking. It is a specification that supports audio, modem, USB, and LAN interfaces on core logic chipsets.Today this slot is no longer found on motherboards and has been replaced by PCI and PCI  Internal Motherboard Ports  CPU socket - Where the CPU or processor plugs in.  CPU power connector - Power cable connection for the CPU.  ATX power connector - Power cable connection for the system.  DIMM/RAM Memory slots - Connectors for system memory or RAM.  PCIe slots (x16, x2, x1) - Expansion card slots, including the graphics card.  M.2 connection - Solid-state drive connection.  SATA ports - Modern internal hard drive ports.  Front panel connector - Connection for USB, and audio ports on the front or top of the case.  Front panel header - Connection for LED/RGB lighting, power switch, and reset switch.  USB headers (3.1, 2. etc.) - Connection for rear USB ports on the motherboard.  CMOS battery - Bios battery for when there’s no system power.  Fan headers - Connection for the case and system fans. There may be additional ports such as a COM/Serial header, TPM header, or RGB headers. Some ports will not be used, and sometimes there are redundant connections.  External Motherboard Ports (Rear Ports)  PS/2 - Used for older PS/2 interface keyboards.  USB - Connection for USB peripherals including keyboards, mice, hard drives, audio equipment, and more.  HDMI/DisplayPort/VGA - They’re all video or display connectors to output video or audio to a monitor.  Ethernet /RJ-45 - Connection for wired internet.  Analog/Digital Audio - Connections for speakers and digital audio equipment, including home theater systems. 9. Explain Booting
  • 15. 14 | P a g e Booting is basically the process of starting the computer. When the CPU is first switched on it has nothing inside the Memory. In order to start the Computer, load the Operating System into the Main Memory and then Computer is ready to take commands from the User.  Types of Booting There are two types of booting:  Cold Booting A cold boot is also called a hard boot. It is the process when we first start the computer. In other words, when the computer is started from its initial state by pressing the power button it is called cold boot. The instructions are read from the ROM and the operating system is loaded in the main memory.  Warm Booting Warm Boot is also called soft boot. It refers to when we restart the computer. Here, the computer does not start from the initial state. When the system gets stuck sometimes it is required to restart it while it is ON. Therefore, in this condition the warm boot takes place. Restart button or CTRL+ALT+DELETE keys are used for warm boot.  Steps of Booting We can describe the boot process in six steps:  The Startup :It is the first step that involves switching the power ON. It supplies electricity to the main components like BIOS and processor.  BIOS: Power On Self Test:It is an initial test performed by the BIOS. Further, this test performs an initial check on the input/output devices, computer’s main memory, disk drives, etc. Moreover, if any error occurs, the system produces a beep sound.  Loading of OS: In this step, the operating system is loaded into the main memory. The operating system starts working and executes all the initial files and instructions.  System Configuration: In this step, the drivers are loaded into the main memory. Drivers are programs that help in the functioning of the peripheral devices.  Loading System Utilities:System utilities are basic functioning programs, for example, volume control, antivirus, etc. In this step, system utilities are loaded into the memory.  User Authentication: If any password has been set up in the computer system, the system checks for user authentication. Once the user enters the login Id and password correctly the system finally starts. 10. Explain Number System Number system is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a digital computer.
  • 16. 15 | P a g e  Types of Number Systems Based on the base value and the number of allowed digits, number systems are of many types. The four common types of Number System are:  Decimal Number System  Binary Number System  Octal Number System  Hexadecimal Number System  Decimal Number System :Number system with a base value of 10 is termed a Decimal number system. It uses 10 digits i.e. 0-9 for the creation of numbers. Here, each digit in the number is at a specific place with place value a product of different powers of 10. Here, the place value is termed from right to left as first place value called units, second to the left as Tens, so on Hundreds, Thousands, etc.  Binary Number System :Number System with base value 2 is termed as Binary number system. It uses 2 digits i.e. 0 and 1 for the creation of numbers. The numbers formed using these two digits are termed Binary Numbers. The binary number system is very useful in electronic devices and computer systems because it can be easily performed using just two states ON and OFF i.e. 0 and 1. Decimal Numbers 0-9 are represented in binary as: 0, 1, 10, 11, 100, 101, 110, 111, 1000, and 1001 For example, 14 can be written as 1110, 19 can be written as 10011, 50 can be written as 110010.  Octal Number System:Octal Number System is one in which the base value is 8. It uses 8 digits i.e. 0-7 for the creation of Octal Numbers. Octal Numbers can be converted to Decimal values by multiplying each digit with the place value and then adding the result. Here the place values are 80, 81, and 82. Octal Numbers are useful for the representation of UTF8 Numbers. Example, (135)10 can be written as (207)8 (215)10 can be written as (327)8  Hexadecimal Number System:Number System with base value 16 is termed as Hexadecimal Number System. It uses 16 digits for the creation of its numbers. Digits from 0-9 are taken like the digits in the decimal number system but the digits from 10-15 are represented as A-F i.e. 10 is represented as A, 11 as B, 12 as C, 13 as D, 14 as E, and 15 as F. Hexadecimal Numbers are useful for handling memory address locations.The hexadecimal number system provides a condensed way of representing large binary numbers stored and processed. Examples, (255)10 can be written as (FF)16 (1096)10 can be written as (448)16 (4090)10 can be written as (FFA)16
  • 17. 16 | P a g e 11. Write the applications of MS Excel Excel is a software program created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions. Excel analysis is ubiquitous around the world and used by businesses of all sizes to perform financial analysis.Excel is typically used to organize data and perform financial analysis. It is used across all business functions and at companies from small to large. The main uses of Excel include:  Data entry  Data management  Accounting  Financial analysis  Charting and graphing  Programming  Time management  Task management  Financial modeling  Customer relationship management (CRM)  Almost anything that needs to be organized! 12. Brief note about 10 functions in MS Excel List of Functions  SUM Function  Count Function  CountA Function  LEN Function  TRIM Function  RIGHT  LEFT  MID Function  VLOOKUP  IF Statements  SUM Function: The SUM function allows you to add 2 or more numbers together. Sum function can be directly applied to sets of numbers separated by a comma, two or more cells separated by comma or selecting a range of cells. Let us discuss it in more detail. For example, let us add 25+35+24. Formula: =SUM(25,35,24) Answer: 84
  • 18. 17 | P a g e  COUNT Function: The count function counts the number of cells containing numbers for a selected range. This formula only works with numbers. It counts the cells where there are numbers. The formula for the count is =COUNT(Cell Start: Cell End).Eg: Formula: =COUNT(A1: A1O)  COUNTA Function:This function counts the number of non-empty cells in a selected range. It will count cells that have numbers and/or any other characters in them.Formula: =COUNTA(A1: A1O)  LEN Function:The LEN formula counts the number of characters in a cell including spaces.Formula: =LEN(B3)  TRIM Function:This TRIM function is useful for removing extra spaces in a cell whether at the beginning, trailing or anywhere between the words.Formula: =TRIM(A1)  RIGHT:Right gives you the number of specified characters from the right of a text string.Formula:=RIGHT(Text or Cell reference, number of characters you want to look for)  LEFT: Left gives you the number of specified characters from the left of a text string. Formula:=LEFT(Text or Cell reference, number of characters you want to look for  MID: Midgives you the number of specified characters from the middle of a text string. Formula: =MID(Text or Cell reference, Start Number, number of characters you want  VLOOKUP Function:VLOOKUP Function is the most used function in day to day operations of many businesses.It looks for a particular value in another table or array and returns the value in the same row from a specified column.Formula: =Vlookup(lookup_value, table_array, col_index_num, range_lookup)  IF Statements:IF Statement is also among the most used formula for analytical scenarios, where a data has to react differently based on different situations. Formula: =IF(logical_test, value_if_true, value_if_false) 13. Define icon? Write a brief note about different types of icons? An icon is a graphical representation or symbol that people see on computer screens to represent an application, object, file, or function, like a command to initiate actions.An icon is a small visual representation of a program, component, or file that a person sees on a desktop screen to represent or lead to another action that is part of the computer’s graphical user interface (GUI) or on websites. These representations are prevalent in different setups, including computers, laptops, tablets, and even social media platforms representing specific ideas or topics Icons are part of a computer’s GUI systems, including Windows and Mac operating systems, intending to aid users in identifying the type of file that it represents. Most icons can be clickable to redirect users to a specific action, including accessing a gaming platform, sending work emails, or accessing social media pages.
  • 19. 18 | P a g e Icons can be divided or classified into three categories.  System Icon:The system icon is an icon that comes with a computer, laptop, or phone when we buy it, and that cannot be deleted.When we buy a computer, laptop mobile, some applications come along with like a camera, calculator, and other apps that software that comes with the system.  Application Icon:Application is those which come after installation on our device. They are known as Application Icon.We download the share it app and install it; after that icon, we see this is known as the application icon.  Shortcut Icon:A shortcut icon is a computer icon. There is one arrow, and they are known as Shortcut Icon. 14. Computer Memory,Classiffy it and Explain Computer memory is just like the human brain. It is used to store data/information and instructions. It is a data storage unit or a data storage device where data is to be processed and instructions required for processing are stored. It can store both the input and output can be stored here.  Types of Computer Memory In general, computer memory is of three types:  Primary memory  Secondary memory  Cache memory  Primary Memory:It is also known as the main memory of the computer system. It is used to store data and programs or instructions during computer operations. It uses semiconductor technology and hence is commonly called semiconductor memory. Primary memory is of two types: o RAM (Random Access Memory): It is a volatile memory. Volatile memory stores information based on the power supply. If the power supply fails/ interrupted/stopped, all the data and information on this memory will be lost. RAM is used for booting up or start the computer. It temporarily stores programs/data which has to be executed by the processor. RAM is of two types:  S RAM (Static RAM): S RAM uses transistors and the circuits of this memory are capable of retaining their state as long as the power is applied. This memory consists of the number of flip flops with each flip flop storing 1 bit. It has less access time and hence, it is faster.  D RAM (Dynamic RAM): D RAM uses capacitors and transistors and stores the data as a charge on the capacitors. They contain thousands of memory cells. It needs refreshing of charge on capacitor after a few milliseconds. This memory is slower than S RAM.
  • 20. 19 | P a g e o ROM (Read Only Memory): It is a non-volatile memory. Non-volatile memory stores information even when there is a power supply failed/ interrupted/stopped. ROM is used to store information that is used to operate the system. As its name refers to read- only memory, we can only read the programs and data that is stored on it. It contains some electronic fuses that can be programmed for a piece of specific information. The information stored in the ROM in binary format. It is also known as permanent memory. ROM is of four types:  MROM(Masked ROM): Hard-wired devices with a pre-programmed collection of data or instructions were the first ROMs. Masked ROMs are a type of low-cost ROM that works in this way.  PROM (Programmable Read Only Memory): This read-only memory is modifiable once by the user. The user purchases a blank PROM and uses a PROM program to put the required contents into the PROM. Its content can’t be erased once written.  EPROM (Erasable Programmable Read Only Memory): EPROM is an extension to PROM where you can erase the content of ROM by exposing it to Ultraviolet rays for nearly 40 minutes.  EEPROM (Electrically Erasable Programmable Read Only Memory): Here the written contents can be erased electrically. You can delete and reprogramme EEPROM up to 10,000 times. Erasing and programming take very little time, i.e., nearly 4 -10 ms(milliseconds). Any area in an EEPROM can be wiped and programmed selectively.  Secondary Memory:It is also known as auxiliary memory and backup memory. It is a non-volatile memory and used to store a large amount of data or information. The data or information stored in secondary memory is permanent, and it is slower than primary memory. A CPU cannot access secondary memory directly. The data/information from the auxiliary memory is first transferred to the main memory, and then the CPU can access it. Types of secondary memory are o Magnetic Tapes: Magnetic tape is a long, narrow strip of plastic film with a thin, magnetic coating on it that is used for magnetic recording. Bits are recorded on tape as magnetic patches called RECORDS that run along many tracks. Typically, 7 or 9 bits are recorded concurrently. Each track has one read/write head, which allows data to be recorded and read as a sequence of characters. It can be stopped, started moving forward or backward, or rewound. o Magnetic Disks: A magnetic disk is a circular metal or a plastic plate and these plates are coated with magnetic material. The disc is used on both sides. Bits are stored in magnetized surfaces in locations called tracks that run in concentric rings. Sectors are typically used to break tracks into pieces. o Hard discs: are discs that are permanently attached and cannot be removed by a single user. o Optical Disks: It’s a laser-based storage medium that can be written to and read. It is reasonably priced and has a long lifespan. The optical disc can be taken out of the computer by occasional users. Examples: CD – ROM, WORM-(WRITE ONCE READ MANY),DVDs, DVDR (writable),DVDRW (Re-Writable),DVD-ROMS (Digital Versatile Discs),DVD-R
  • 21. 20 | P a g e  Cache Memory: It is a type of high-speed semiconductor memory that can help the CPU run faster. Between the CPU and the main memory, it serves as a buffer. It is used to store the data and programs that the CPU uses the most frequently. 15. Short note on computer languages Definition of a Computer Language A computer language is a group of instructions that are used to create computer programs. This is the brief of computer languages. The main goal is to achieve human-computer interaction. Types of Computer Languages Different types of Computer languages are given below.  Low Level Language: A Low-level computer language includes only 1’s and 0’s. This language was used in first and second generation computers. A Low level language is very easily understood by a computer but hard to understand for Humans. Low level languages are designed to interact with computer hardware, which are categorized into two types: Machine level language and Assembly level language.  Machine Language: As discussed above, Machine level language is a type of Low level language. Machine language is considered to be the oldest computer language. Machine language is developed by only using binary numbers i.e., 0 and 1. So, the instructions or the statements in this language use a sequence of 0’s and 1’s.  Assembly Language: Assembly level language in computer programming has evolved with the advancements in the machine language. Assembly language uses symbols, which are popularly known as mnemonics in computer terminology to write the instructions. So, comparatively writing a program in Assembly language is more understandable to the Human than Machine Language.The Assembly language code will be converted into a Machine language code with the help of an Assembler so that the computer can understand the binary converted Assembly Language.  High Level Language: High Level computer languages are the advanced development languages in the evolution of computer languages. These languages are designed to make the programming easier and less error-free.High level language uses words and commands along with symbols and numbers.The keywords used in High level languages are similar to English words and can be easily understood by Humans when compared to a Low level language. Types of programming languages in High level languages are:C, C++, Java, Java Script, Python, C#, PHP. 16. Difference Between High-Level and Low-Level Computer languages Low Level Computer Language High Level Computer Language Low level languages are hard to understand by humans as they use binary numbers and easy to High level languages are simple to understand by
  • 22. 21 | P a g e understand by the computer. humans as they use English statements. Low level languages are programmer-friendly High level languages are human friendly. Program execution time (computational speed) is less. Program execution time is longer. These are complex to maintain. These are simple to maintain. Debugging process is hard. It is easy to debug in High level languages. The programs in low level language are not portable from one computer to another. The programs in a high level language are portable, so we can use them on any computer. Usage of low level language is less in today’s technologies. We use high level language in today’s technologies. 17. Explain about six input devices An input device is a special type of peripheral device that allows making communication along with processing unit of the computer system.Computer’s input devices are mostly to be used for recognized the input data that are provided by users for solving their problems. Input data has many variants like as text, images, audio, and video. These input devices allow transferring data from input devices to computer system.  Mouse: With the help of mouse of computer, users can control a cursor, and select all types of text, files, icon on your computer screen.  Keyboard: The keyboard is the most frequent and widely used input device for entering data into a computer. Although there are some additional keys for performing other operations, the keyboard layout is similar to that of a typical typewriter. Generally, keyboards come in two sizes: 84 keys or 101/102 keys but currently keyboards with 104 keys or 108 keys are also available for Windows and the Internet.  Trackball: In the Trackball, one small movable ball places on the surface and using this ball can be moved any direction on the computer screen.  Touchpad: Touch pad is best alternative to mouse device. In which all input give to computer by touching to touch pad, mostly this devices is embedded on the laptop.  Joysticks: Mainly, joysticks devices are designed for playing game, using this device can be control any character in the game.
  • 23. 22 | P a g e  Scanner: A scanner is an input device that functions similarly to a photocopier. It’s employed when there’s information on paper that needs to be transferred to the computer’s hard disc for subsequent manipulation. The scanner collects images from the source and converts them to a digital format that may be saved on a disc. Before they are printed, these images can be modified. 18. Describe ASCII Code and BCD Code Computers and digital circuits processes information in the binary format. Each character is assigned 7 or 8 bit binary code to indicate its character which may be numeric, alphabet or special symbol. Example - Binary number 1000001 represents 65(decimal) in straight binary code, alphabet A in ASCII code and 41(decimal) in BCD code. Types of codes BCD (Binary-Coded Decimal) code  Four-bit code that represents one of the ten decimal digits from 0 to 9.  Example - (37)10 is represented as 0011 0111 using BCD code, rather than (100101)2 in straight binary code.  Thus BCD code requires more bits than straight binary code.  Still it is suitable for input and output operations in digital systems. (Note: 1010, 1011, 1100, 1101, 1110, and 1111 are INVALID CODE in BCD code.) ASCII (American Standard Code Information Interchange) code  It is 7-bit or 8-bit alphanumeric code.  7-bit code is standard ASCII supports 127 characters.  Standard ASCII series starts from 00h to 7Fh, where 00h-1Fh are used as control characters and 20h-7Fh as graphics symbols.  8-bit code is extended ASCII supports 256 symbols where special graphics and math's symbols are added.  Extended ASCII series starts from 80h to FFh. 19. Define Firmware and SMPS  Firmware:Firmware as the name suggests, is simply a type of software program on a hardware device that provides a control for specific hardware and provide essential instructions on how the device communicates with various other computer hardware. Firmware’s are generally a type of software used to control hardware devices. o Firmware is low-level software that stands between the hardware and the operating system. o There are no categories of firmware.
  • 24. 23 | P a g e o Types of firmware includes BIOS, EFI (Extensible Firmware Interface), etc. The firmware size is very small and generally ranges between a few kilobytes (KB). Firmware’s are usually developed using low level languages. o Updating firmware’s usually tricky. o Firmware are not designed for user interaction and are instead hidden on device. o Firmware memory is inaccessible and cannot be altered simply by the user. o The firmware does not run on CPU, instead runs on smaller processors. o The hardware’s flash storage is used to keep the firmware. o Features of firmware includes perfect rotation counter support, floating point variable, perform all control, etc. o It requires less time to create firmware than software. o It is rarely changed.  SMPS : The full form of SMPS is Switched Mode Power Supply also known as Switching Mode Power Supply. SMPS is an electronic power supply system that makes use of a switching regulator to transfer electrical power effectively. It is a PSU (power supply unit) and is usually used in computers to change the voltage to the appropriate range for the computer.An SMPS adjusts output voltage and current between different electrical configurations by switching the basics of typically lossless storage such as capacitors and inductors. Ideal switching concepts determined by transistors controlled outside of their active state that have no resistance when ‘on’ and carry no current when ‘off.’ Benefits of SMPS o The switch-mode power source is small in scale. o The SMPS is very lightweight. o SMPS power consumption is typically 60 to 70 per cent, which is ideal for use. o SMPS is strongly anti-interference. o The SMPS production range is large. Limitations of SMPS o The complexity of SMPS is very large. o The production reflection is high and its control is weak in the case of SMPS. o Use of SMPS can only be a step-down regulator. o In SMPS, the voltage output is just one. 20. Write a brief note about the components of a system unit? A computer system unit is the case that houses the internal parts of a computer, the kind used for work and entertainment. This case is also sometimes called the computer tower and it comes in a variety of materials and colors, although is most often black. When people use a computer, multiple parts are used, including the monitor, keyboard, mouse, and the box of components that work to process digital information. The
  • 25. 24 | P a g e computer system unit refers to the case, box, or tower that includes many components that work together in order to communicate with other computers, produce sound and audio, and allow human interaction. The computer system unit does not include the monitor, mouse, keyboard, or screen. The components of a system unit are as follows:  Motherboard ( System Board)  CPU (Central Processing Unit)  Memory, such as RAM, ROM, Cache, and Flash  Ports  Expansion Slots  Motherboard : Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed. The motherboard holds the CPU, RAM and ROM chips, etc.  Central Processing Unit (CPU) :The Central Processing Unit (CPU) is the "brain" of the computer. It executes instructions (from software) and tells other components what to do.  The Intel Pentium is a popular processor for IBM-PCs.  The PowerPC is a popular processor for Macintoshes.  There are 2 parts of the CPU: The ALU and Control Unit.  The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).  The Control Unit deciphers and carries out instructions.  Different CPUs have different types of instructions, so software made for one type of CPU will not run on other kinds.  The word size denotes how many bits of data a CPU can process at once. 32 bits is the standard word size for CPU's used in personal computers today. The higher the word size, the faster a CPU can execute instructions.  System Clock : The System Clock is an "electrical pulse generator" that sends out a pulse of electricity at regular intervals. The electronic components of the computer need these electric pulses in order to perform work. The more pulses sent out by the system clock, the faster the computer. The first personal computers had clock speeds of 8 MHz (8 million pulses per second); today's PC's have clock speeds greater than 3.2 GHz (3.2 billion pulses per second).  Bus Lines: Bus Lines are "electrical data roadways" (i.e., wires) through which bits of information are transmitted between the CPU and other components. The bus size denotes how many bits can be transmitted at once. In general, this should be the same as the CPU word size.  Memory Chips:
  • 26. 25 | P a g e  Random Access Memory (RAM), also known as Main Memory or Primary Storage, is used to hold instructions and data while they are being used. RAM is volatile, meaning its contents are lost when the power goes off. RAM is more than 1000x faster than the fastest secondary storage (see below).  Read Only Memory (ROM) chips are non-volatile memory that generally contains instructions for "booting" the computer (i.e., loading the operating system when the computer starts up).  CMOS chips are powered by a battery and contain so-called "flexible information" such as the type of hard drive your computer is using and the current date and time.  Flash chips do not require electricity or a battery yet are non-volatile. They are used in computers, cell phones, digital cameras, etc.  Cache memory is special high-speed memory that temporarily stores instructions and data the CPU is likely to use frequently. These speeds up processing. Level 2 or external caches generally range in size from 64 Kilobytes to 2 Megabytes.  Expansion Slots: Expansion Slots are sockets on the motherboard that you can plug expansion cards into. To plug a card into a slot, you must open the system unit. A card contains a socket on its end that sticks out from the system unit so a cable can be plugged into it. Common types of cards are graphics, sound, and network cards.  Ports :Ports are sockets that are on the outside of the system unit, meaning you can easily plug a cable into a port without opening the system unit.  Serial ports transmit one bit of data at a time.  Parallel ports transmit 8 bits of data at a time.  Universal Serial Bus (USB) ports are much faster than serial or parallel ports and allow multiple devices to be connected to the same port. 21. Write a brief note about Open Writer, Calc and Impress? OpenOffice Writer is a great alternative to the more expensive and feature-rich Microsoft Office programs like Word. It offers a lot of the same features, including text editing, font selection, and color selection, as well as the AutoCorrect and AutoComplete options. It also works with standard Office formats, like DOC. The actual developer of the free program is The Apache Software Foundation. The OpenOffice Writer installer is commonly called OpenOfficeWriter.exe or swriter.exe etc. The most popular versions among the software users are 4.1 and 4.0. OpenOffice Calc is a free and open-source spreadsheet software that is part of the OpenOffice suite of applications. It is designed to be compatible with Microsoft Excel and has similar features. Newcomers find it intuitive and easy to learn; professional data
  • 27. 26 | P a g e miners and number crunchers will appreciate the comprehensive range of advanced functions. o DataPilot is an advanced technology that makes it easy to pull in raw data from corporate databases; cross-tabulate, summarize, and convert it into meaningful information. o Natural language formulas let you create formulas using words (e.g. “sales - costs”). o Intelligent Sum Button inserts a sum function or a subtotal automatically, depending on context. o Wizards guides you through choosing and using a comprehensive range of advanced spreadsheet functions, or download templates from our Templates repository for ready-made spreadsheet solutions. o Styles and Formatting makes it easy to apply flexible cell formatting options, including freely rotating contents, templates, backgrounds, borders, and many more. You can be your own spreadsheet expert thanks to templates with built-in functions, allowing you to concentrate on your real work. o Scenario Manager allows “what if …” analysis at the touch of a button - e.g. compare profitability for high / medium / low sales forecasts. o Calc’s solver component allows solving optimization problems where the optimum value of a particular spreadsheet cell has to be calculated based on constraints provided in other cells. o Multiple users support - Encourage collaborative work on spreadsheets. By sharing a spreadsheet, other users can easily add their data to the spreadsheet. The spreadsheet owner can then easily integrate the new data with a few clicks. This collaboration feature helps avoid editing conflicts. o Save your spreadsheets in OpenDocument format, the new international standard for office documents. This XML based format means you’re not tied in to Calc. You can access your spreadsheets from any OpenDocument compliant software. o You are free to import your old Microsoft Excel spreadsheets, or save your work in Excel format for sending to people who are using Microsoft products. Calc is able to read .xlsx files created with Microsoft Office 2007 or Microsoft Office 2008 for Mac OS X. o If you want to send your results to someone who doesn’t have a spreadsheet application installed, then use Portable Document Format (.pdf) - no need to buy or install any extra software. 22. Define ICON, Different types of ICON Icons represent objects or programs on your hard drive on your computer screen. Icons are visual representations of specific things in our computers in real life. Users can quickly enter text for completing any task with this user-friendly computing platform. Icons are any applications, folders, or identities of a person on a computer. Icons that are seen on the desktop like apps, programs, folders, and files if we know it is a graphical user interface stored on the PC. The Digital data and information inside the computer system cannot be
  • 28. 27 | P a g e seen therefore computer communicates with users through GUI [Graphical User Interface] with the help of desktop icons. Icons can be divided or classified into three categories.  System Icon: The system icon is an icon that comes with a computer, laptop, or phone when we buy it. When we buy a mobile, some applications come along with like a camera, calculator, and other apps that software that comes with the system. And that cannot be deleted, which is known as System Icon. If your mobile has a calculator app, you did not delete it. This icon is called System Icon.  Application Icon: Application is those which come after installation on our device. They are known as Application Icon. We download the share its app and install it; after that icon, we see this is known as the application icon.  Shortcut Icon: A shortcut icon is a computer icon. There is one arrow, and they are known as Shortcut Icon. 23. What is a Desktop. What are Desktop Elements Desktop is the working area of the computer. Desktop GUIs help the user to easily access and edit files, while they usually do not provide access to all of the features found in the underlying operating system. A Desktop Environment (DE) is an implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system that share a common graphical user interface (GUI).The Desktop contains many of the common elements and they are as follows.  Icons represent objects in the file system; you will generally put special folders or program icons on the Desktop.  Desktop wallpaper is a graphic—for show, of course.  Gadgets are little tools or utilities that you add to the Desktop for additional functionality.  The Desktop switch is a button in the lower-right corner that switches from the tile- based interface to the Desktop. (You see the button only when your mouse button is down.)  The Notification area shows icons of various utilities (usually system utilities); it was once called the Status tray.  Toolbars contain related commands or objects that you can place on the taskbar.  The taskbar is a container for toolbars and the Notifications area. 24. What is a software? Different types of software? "Software is a set of programs (sequence of instructions) that allows the users to perform a well-defined function or some specified task. " Software is responsible for directing all computer-related devices and instructing them regarding what and how the task is to be performed. However, the software is made up of binary language (composed of ones and zeros), and for a programmer writing the binary code would be a slow and tedious task.
  • 29. 28 | P a g e Therefore, software programmers write the software program in various human-readable languages such as Java, Python, C#, etc. and later use the source code. Software's are broadly classified into two types, i.e., System Software and Application Software.  System Software: System software is a computer program that helps the user to run computer hardware or software and manages the interaction between them. Essentially, it is software that constantly runs in the computer background, maintaining the computer hardware and computer's basic functionalities, including the operating system, utility software, and interface. System software is not limited to the operating system. They also include the basic I/O system procedures, the boot program, assembler, computer device driver, etc. This software supports a high-speed platform to provide effective software for the other applications to work in effortlessly. The further classifications of system software are as follows: a. Operating System: The operating system acts as an interface between the user and system hardware. It is a group of software that handles the execution of programs and offers general services for the application that runs over the computer. There are various types of operating systems available in the market, such as embedded operating systems, real-time OS, distributed OS, single or multi-user operating system, mobile, Internet, and various others. Some of the commonly used examples of operating systems are Microsoft Windows, Apple's iOS, Apple's MacOS, Android, Unix, Linux b. Device Drivers: Device driver is a type of software that operates or controls some specific hardware devices linked to your system. They provide a software interface to hardware devices allowing computer operating systems and other applications to fetch hardware functions without knowing the exact specifications of the hardware. Some common examples of such device drivers that connect hardware devices (printers, sound cards, network cards, hard disks, floppy disk, keyboard, mouse, etc.) to a system easily are as follows: BIOS (Basic Input/Output System) Device Driver, USB (Universal Serial Bus) Drivers, Motherboard Drivers, Display Drivers, Printer Drivers, Sound Card Driver, ROM (Read-only memory) Drivers, VGA (Video Graphic Array) Drivers c. Firmware: In electronic systems and computing, firmware is a type of permanent software embedded in the system's ROM (read-only memory) to provide low- level control for some particular system device hardware. It is a set of instructions that are stored permanently on your computer's hardware device. d. Utility: Utility software is developed to provide support in analyzing, optimizing, along configuring and maintaining a computer. The job of the utility program is
  • 30. 29 | P a g e to offer support to the system infrastructure. Though the system will work even if it doesn't have any utility software, the right kind of utility software enhances its performance and makes it more reliable.Some of the common examples of utility software are as follows:Norton and McAfee Antivirus,WinRAR,etc  Application Software: Application programs or software applications are end-user computer programs developed primarily to provide specific functionality to the user. The applications programs assist the user in accomplishing numerous tasks such as doing online research, completing notes, designing graphics, managing the finances, watching a movie, writing documents, playing games, and many more. Therefore, many software applications are designed and developed every year by companies as per the demand and requirements of the potential users. The application software can either be designed for a general-purpose or specially coded as per the requirements of business cooperation. Examples of this software are . Word Processors, MS Word (Microsoft), Corel WordPerfect, Oracle, Mozilla Firefox,etc