1. M1- IT Tools & Application
DCA - Diploma in Computer Application
G-TEC COMPUTER EDUCATION
Kattakada | Vellanade
2. 1 | P a g e
1. In order to Excel that we are entering a formula in cell,we must begin with an operator
Ans : =
2. Into how many generations can computers be classified
Ans : 5
3. GUI stands for
Ans: Graphical User Interface
4. Out of the following items which one is not an application software
Ans: Assembler
5. Any data or instruction enters into the storage of a computer is considered as
Ans : Input
6. Processing speed of computers can be measured by using
Ans : MIPS (GHz)
7. An error is also known as
Ans: Bug
8. Graphical picture that represents an object like file ,folder etc are
Ans: Icon
9. All modern computers are
Ans: Digital Computers
10. The 0 and 1in the binary numbering system are called binary digits or
Ans: Bits
11. In a digital computer, data is represented in
Ans: Binary form
12. Commonly called computer
Ans: ENIAC
13. Mainly used with computer games
Ans: Joy stick
14. Allows you to enter a ghosted text behind a content of a page
Ans: Watermark
15. Shortest access time
Ans: Cache Memory
16. The minimum and maximum size of fonts in the formatting toolbar are
Ans:8,72
17. The size of A4 sheet
Ans: 210x297
18. By default, the header or footer is printed
Ans: on every page
19. How many maximum lines can be set for the drop cap
Ans: 10
3. 2 | P a g e
20. Which of the following is used to move an active cell to the first column of the current
row
Ans: Ctrl + Home
21. The program used to convert mnemonic code to machine code
Ans: Assembler
22. This is used in EBCDIC
Ans: Mainframe
23. Computers used for automatic operations are
Ans: Digital Computer
24. Execution of two or more programs by a single CPU is known as
Ans: Multiprogramming
25. Data in our worksheet can be arranged in an order using
Ans: Sort
26. Features that display only the data in columns to specified criteria is
Ans: Filtering
27. Statistical calculations and preparations of tables and graphs can be done using
Ans: Excel
28. The blank space outside the printing area on a page
Ans: Margin
29. The name of the word document is displayed
Ans: Title Bar
30. Connects computers and allow them to communicate with others
Ans : Network card
31. I wake up the computer and reminds what to do
Ans: BIOS
32. Iam the brain of the computer
Ans: CPU
33. Largest storage device attached within a computer
Ans:Hard drive
34. I hold all other circuit board
Ans: Motherboard
35. I handle the graphics thata are displayed on the monitor
Ans: Video card
36. Iam the type of port used by flash drives
Ans: USB port
37. Computers that support hundreds or thousands of users simultaneously
Ans: Mainframe
38. The binary language consists of two digits
Ans: 0 and 1
39. A computer gathers data,process it, outputs the data or information and
4. 3 | P a g e
Ans : stores the data or information
40. Enter key is used to break a paragraph
41. Ctrl+D is used for opening a font dialogue box in MS Word
42. Page setup consists of all of the above(page size,printmargin,page orientation)
43. ENIAC is commonly called First computer
44. Short cut key for find is Ctrl+F
45. Ctrl+ spacebar is the shortcut key for clear formatting
46. In a digital computer data is represented in Binary form
47. Theme is used to set the overall design of a presentation
48. In default,clipboard can hold 24 items temporarily
49. C &C++ are HLL type of languages
50. Hybrid computer is a combination of analog and digital computer
51. Assembler converts assembly language into machine language
52. Compiler converts High Level language to machine language
53. Ctrl+Z is the short cut key for undo
54. Word length is the number of bits transferred at a time
55. Internet explorer is a web browser that is already installed along with Windows OS
56. Explorer is a powerful file manager
True or false
1. Assembly language programs are system independent -True
2. Program instructions within a high level language are called source code – True
3. DVDs have a higher storage capacity than C-ROMs – True
4. We can enter new program into ROM – False
5. GNU Linux is an open source operating software - True
6. Magnetic tape uses Random access method -False
7. The language the computers can understand is called machine Language – True
8. CPU stands for Central Performance Unit – False
9. MS Word is a hardware – False
10. There is only one way to create a folder –False
11. Ctrl+p is used to open a paragraph dialogue in MS Word – False
12. Kernel is the core of Linux system - True
13. Ctrl + Enter is used to add a new page in MS Word – True
14. We cannot set a header in an Excel file – False
15. BIOS stands for Basic In Order System – False
16. The hexadecimal number system contains digits from 1 – 15 – False
17. Twitter is an online social networking and blogging service - False
18. Worms and Trojan horses are easily detected and eliminated by antivirus software –
True
19. The first page you normally view at a web site is its Master Page –False
20. Watermark command is shown under page layout tab -False
5. 4 | P a g e
21. Ctrl+ P is used to open paragraph dialogue in MS Word – False
22. We cannot set a header to an excel file – False
23. Data validation prevents invalid data from entering int a cell – True
24. We cannot change layout of slide after entering information – False
25. We can create a video file by using PowerPoint – True
26. Shift + F5 is used to start the slide show from the current slide – True
27. F8 is the short cut key for spell check - False
28. Default font of MS Word is Arial Black – False
29. Minimum zoom percentage in word document is 10 - True
Match the following
1. F5 – Slideshow
2. Esc – quit form slideshow
3. Super computer – used by large organizations
4. Ctrl+A – Select All
5. Ctrl+E – Centre align
6. MICR – Input Device
7. Hard disk -DRAM
8. System Software – Compiler
9. Refresh periodically - More than two heads
10. Spelling and Grammar – MS Word
11. Bluetooth – Connect another device
12. Help -F1
13. Portrait - Vertical page
14. WordArt – Decorated text
15. Redo – Ctrl + Y
16. Link – Ctrl + K
17. Placeholder – Dotted areas in an empty slide
18. Print preview – Ctrl + F2
19. Pivot table – Insert
20. MS Excel – Financial Analysis
21. View styles and zoom - Status Bar
22. Show/hide ruler - top of vertical scroll bar
23. Subtotal - find the total/average/max of each subset in a table
24. Currency -$
25. What if analysis – Scenario Manager
26. F12 -Save As
27. Gridline – Cell borer
28. Ctrl + : - Displays system date
29. Ctrl + ; - Displayssystem time
6. 5 | P a g e
30. weekday – This function returns 1 - 7
Answer The Following
1. Advantages and disadvantages of fourth and fifth generation computers
Fourth Generation of Computers(1972 onward): VLSI (Very Large Scale Integrated)
Circuit or they’re additionally referred to as microprocessors are utilized in this
generation. A microprocessor chip is made from hundreds of Integrated Circuits
construct on a single silicon chip. The use of Personal Computer(PCs) elevated on this
generation and First Personal Computer (PC) changed into advanced through IBM. For
example, Apple, CRAY-1, etc.
Advantages Fourth Generation of Computer
Following are some advantages of fourth-generation computers:
They were designed to be used for a wide range of purposes (general-purpose
computers).
Smaller and more dependable than previous generations of computers.
There was very little heat generated.
In many circumstances, the fourth-generation computer does not require a cooling
system.
Portable and less expensive than previous versions.
Computers from the fourth generation were significantly quicker than those from
previous generations.
The Graphics User Interface (GUI) technology was used to provide users with
better comfort. During this time, PCs became more inexpensive and widespread.
Repair time and maintenance costs are reduced.
They were also created with the intention of being used in commercial production.
In this form of computer, any type of high-level language can be employed.
Disadvantages of the Fourth Generation of Computer
Following are some disadvantages of fourth-generation computers:
The fabrication of the ICs necessitated the use of cutting-edge technologies
(Integrated Circuits).
Only ICs can be made with a high-quality and reliable system or technology.
Microprocessors must be manufactured using cutting-edge technology, which
necessitates the use of a cooler (fan).
Fifth Generation of Computers(Present and Future): It is primarily based totally on
Artificial intelligence (AI) software. Artificial intelligence describes the medium and
manner of creating computer systems like people, the manner human thinks, the
manner people act, etc. and that is a rising department and has all of the scopes for
studies work too. For example, PARAM 10000, IBM notebooks, etc.
Advantages of Fifth Generation of Computer
Following are some advantages of fifth-generation computers:
These computers are far quicker than previous generations.
7. 6 | P a g e
These computers are simpler to repair.
These computers are substantially smaller in size than other generation computers.
They are lightweight and easy to move.
True artificial intelligence is being developed.
Parallel Processing has progressed.
Superconductor technology has progressed.
Disadvantages of Fifth Generation of Computer
Following are some disadvantages of fifth-generation computers:
They’re usually sophisticated but could be difficult to use.
They can give businesses additional power to monitor your activities and potentially
infect your machine.
2. Functions of Operating System
An operating system is a program on which application programs are executed and acts
as a communication bridge (interface) between the user and the computer
hardware. The main task an operating system carries out is the allocation of resources
and services, such as the allocation of memory, devices, processors, and information.
Functions of Operating System
1. Memory Management
It is the management of the main or primary memory. The operating system:
Allocates and deallocates the memory.
Keeps a record of which part of primary memory is used by whom and how
much.
Distributes the memory while multiprocessing.
In multiprogramming, the operating system selects which processes acquire
memory when and how much memory they get.
2. Processor Management/Scheduling
Every software that runs on a computer, whether in the background or in the frontend, is a
process. Processor management is an execution unit in which a program operates. The
operating system determines the status of the processor and processes, selects a job and
its processor, allocates the processor to the process, and de-allocates the processor after
the process is completed.
When more than one process runs on the system the OS decides how and when a process
will use the CPU. Hence, the name is also CPU Scheduling. The OS:
Allocates and deallocates processor to the processes.
Keeps record of CPU status.
3.Device Management
8. 7 | P a g e
An operating system regulates device connection using drivers. The processes may require
devices for their use. This management is done by the OS. The OS:
Allocates and deallocates devices to different processes.
Keeps records of the devices.
Decides which process can use which device for how much time.
4. File Management
The operating system manages resource allocation and de-allocation. It specifies which
process receives the file and for how long. It also keeps track of information, location, uses,
status, and so on. These groupings of resources are referred to as file systems. The files on
a system are stored in different directories. The OS:
Keeps records of the status and locations of files.
Allocates and deallocates resources.
Decides who gets the resources.
5. Storage Management
Storage management is a procedure that allows users to maximize the utilization of
storage devices while also protecting data integrity on whatever media on which it lives.
Network virtualization, replication, mirroring, security, compression, deduplication, traffic
analysis, process automation, storage provisioning, and memory management are some of
the features that may be included. The operating system is in charge of storing and
accessing files. The creation of files, the creation of directories, the reading and writing of
data from files and directories, as well as the copying of the contents of files and
directories from one location to another are all included in storage management.
The OS uses storage management for:
Improving the performance of the data storage resources.
It optimizes the use of various storage devices.
Assists businesses in storing more data on existing hardware, speeding up the
data retrieval process, preventing data loss, meeting data retention
regulations, and lowering IT costs
3. Distinguish between Compiler and Interpreter
Compiler
A compiler is a translator that produces an output of low-level language (like an
assembly or machine language) by taking an input of high-level language. It is basically a
computer program used to transform codes written in a programming language into
machine code (human-readable code to a binary 0 and 1 bits language for a computer
processor to understand).
9. 8 | P a g e
Compilers check all types of errors, limits, and ranges. Thus, it’s more intelligent.
The run time of its program is longer, and it occupies more memory.
Interpreter
It is a program that functions for the translation of a programming language into a
comprehensible one. It is a computer program used for converting high-level program
statements into machine codes. It includes pre-compiled code, source code, and scripts.
An interpreter translates only one statement at a time of the program.
They create an exe of the programming language before the program runs.
Difference Between Compiler and Interpreter
Interpreter Compiler
Translates program one statement at a
time.
Scans the entire program and translates it
as a whole into machine code.
Interpreters usually take less amount of
time to analyze the source code. However,
the overall execution time is comparatively
slower than compilers.
Compilers usually take a large amount of
time to analyze the source code. However,
the overall execution time is comparatively
faster than interpreters.
No Object Code is generated, hence are
memory efficient.
Generates Object Code which further
requires linking, hence requires more
memory.
Programming languages like JavaScript,
Python, Ruby use interpreters.
Programming languages like C, C++, Java
use compilers.
4. 10 Options Of Insert Menu In MS Word
The Insert Tab is right next to the Home Tab in Microsoft Word . This tab has a lot of useful
features that will let you insert things like pictures, clip art images, shapes, SmartArt
graphics, charts and a host of other items. Let us review a few of these features in this
exciting new tab.
Table : helps to insert table
Header & Footer: Helps to insert header, footer as well as pagenumber
Link : helps to create hyperlinks to other files, docments and website.
Equation: helps to insert equation
Symbols: symbols can be inserted from here.
Illustrations: pictures,shapes,icons, smartart,chart and screenshot can be added
from here.
Date&time: inserts system date and time
Drop cap : drops first letter of paragragh
Object: helps to insert various objects such as charts,paint images etc
10. 9 | P a g e
Cover page: inserts a cover page
Page break: helps to break a page into another.
5. Social media networks
Social media is as a set of software and web tools that help users interact online, share
content and develop a personalised network of friends, colleagues or organisations. Every
individual uses their network differently, and there are no set rules about what is ‘right’ for
each site. However, the key word here is social. Users come to social media sites to talk to
friends, share ideas and hear the latest news. They do not, in general, log in to their
accounts intending to buy something. Even on the more career-focused sites like LinkedIn,
direct sales messages have to be done only rarely and with care. Instead of posting simply
‘buy me’ messages for your book, there are plenty of other approaches. You could consider
the following:
Write an article about your work and post a link to it in relevant groups and forums;
remember to add a note about your book.
Join groups relevant to your work and keep an eye on other users’ comments. Is
someone asking a question you can answer? Then answer it and put in a link to your
home page or blog or anywhere that your book can be found.
Something in the news relevant to your work? Make sure your friends and
colleagues know it!
In short, social media works best if you participate and support the communities you join. If
you share a link to your book before anyone knows who you are, it won’t generate much
interest. However, if you have earned a reputation as an active and constructive participant,
an announcement about your book will be warmly received. If you are interested in learning
more about social media, there are many books, blogs and websites which are easy to find
with a quick search on Google or your preferred search engine. Once you begin, you will find
that it is not difficult, although it does require a little dedication and patience.
Examples are Facebook, twitter Instagram
6. Different kinds of Printers
Printers have many types based on how they work. There are several types of printers that
you can identify based on how they work. The following are the types of printers.
Inkjet Printers
The first type of printer is the Inkjet printer. This printer is a printer that is commonly
found in everyday life because the way it works is quite fast.This printer sprays ink
onto the top of the paper according to the data received from the connected device.
The ink is placed in a container called a cartridge.This printer has the advantage that
the quality of the prints on the paper is very good. So this printer is suitable for
printing large images because of the quality it produces.
LaserJet Printers
The second type of printer is a LaserJet printer. This printer uses a laser to print text
or images contained in the document to be printed.The way this laser works is by
11. 10 | P a g e
shining a laser into the printed paper which can create a pattern for the image to be
printed.The advantage of LaserJet printers is that the print speed is faster than inkjet
printers. In addition, the resulting image quality is also quite good.
Dot Matrix Printers
The next type of printer is the Dot Matrix Printer. This printer has a quite unique way
of working, namely by using a ribbon and a set of ribbons that have been arranged to
print.The way this printer works is the same as a typewriter which has a slow speed
in printing letters in text. This printer is usually found to print the total goods in a
warehouse or other.
Thermal Printer
Then there is a thermal printer, which is a printer used to print bills or receipts at
supermarkets or shopping. The way a thermal printer work is by heating the paper
from the roll, the paper will turn dark when heated.The mechanism of this printer is
quite easy, which is by pulling the paper adjacent to the print head in which there is
an automatic permanent. The heater is certainly capable of producing simple text
and images on paper.The advantage of this printer is that this printer does not
require ink in the printing process, but it has the disadvantage that it is only used for
simple text, such as printing groceries bills.
7. Distinguish between Static and Dynamic RAM
RAM:Random access memory (RAM) is the best known form of computer memory. RAM
is considered "random access" because you can access any memory cell directly if you
know the row and column that intersect at that cell.
Dynamic RAM :Dynamic RAM is the most common type of memory in use today. Inside
a dynamic RAM chip, each memory cell holds one bit of information and is made up of
two parts: a transistor and a capacitator.
Static RAM :In static RAM, a form of flip-flop holds each bit of memory. A flip-flop for a
memory cell takes 4 or 6 transistors along with some wiring, but never has to be
refreshed, which makes status RAM appreciably faster than dynamic RAM.
Difference Between Static RAM And Dynamic RAM In Tabular Form
BASIS OF
COMPARISON
SRAM DRAM
Description
Static RAM is a type of semiconductor
memory that uses bistable latching
circuitry to store each bit.
Dynamic random access memory is a
type of random access memory that
stores each bit of data in a separate
capacitor within an integrated circuit.
Storage Of Bit
Of Data
SRAM uses transistor to store a single bit
of data.
DRAM uses a separate capacitor to
store each bit of data.
Data Holding Holds data indefinitely as long as the Holds data dynamically not
12. 11 | P a g e
computer is turned on. indefinitely.
Refreshment
SRAM does not require periodic
refreshment to maintain data.
DRAM requires periodic refreshment
to maintain the charge in the
capacitors for data.
Access Time
SRAM has lower access time; therefore it
is faster compared to DRAM.
DRAM has higher access time;
therefore it is slower than SRAM.
Place Of Use SRAM are used in Cache memory. DRAM is used in main memory.
Structure
SRAM’s structure is complex than DRAM.
It comprises of array of six transistors,
latches and cross-coupled inverters.
DRAM’s structure is simple when
compared to that of DRAM. It
comprises of one capacitor and very
few transistors.
Storage
Capacity
Due to complexity of internal circuitry,
less storage capacity is available
compared to the same physical size of
DRAM memory chip.
Due to simplicity and size of internal
circuitry in the one-bit memory cell of
DRAM. Large storage capacity is
available.
Power Supply
SRAM requires constant power supply,
which means this type of memory
consumes more power.
DRAM offers reduced power
consumption, due to the fact that the
information is stored in the capacitor.
Heat
Generation
Generates more heat. Generates less heat.
Application
SRAM is used to create speed-sensitive
cache.
DRAM is used to create a larger RAM
space system.
Latency Latency is low in SRAM. Latency is high in DRAM.
Cost Comparatively expensive. Comparatively less costly.
8. Different slots and ports of Motherboard
The Motherboard is the largest circuit board often used in computers. It has a primary CPU
(central processing unit) connected to an array of chips for peripherals like printers and
speakers. These peripheral chips are separate from the CPU and communicate via expansion
slots. There are typically 24 expansion slots of 6 inches long on Motherboard, with each slot
sporting eight pins that can be plugged in by inserting a flat cable into its appropriate site.
Different Types of Slots on Motherboard
13. 12 | P a g e
PCI Slots
A PCI slot is an interface on the motherboard that allows you to put in a device that
requires power, famous for coming with the first Intel Pentiums in 1993.The PCI stands
for ‘peripheral components interconnect’, a standard computer bus to connect
peripheral devices directly to your motherboard.
The devices installed on such PCI slots are very diverse: various controllers, Wi-Fi
adapters, TV tuners, satellite receivers, etc. The number of available slots on
motherboards ranges from two to six.
PCIe Slots
PCIe or PCI Express slots are the most common slots on the motherboard that optimize
the communication with the microprocessor.
When you need to mount a TV Tuner Card, Video Cards, or Storage Drives like NVMe
based on a PCIe protocol, PCI Express Slots will be used for that purpose. There might be
several numbers of PCIe slots on the motherboard.
PCI-X Slots
One PCI-X slot on the motherboard is for the PCI Express (PCI-E)-based graphics card
connected to the CPU via a dedicated 16x or 32x direct link to provide high
bandwidth and low latency. The remaining slots are used for other functions as
follows: –
PCMCIA Card,
Wireless LAN Card,
Bluetooth Card.
AGP Slots
The acronym AGP stands for ‘Advanced/Accelerated Graphics Port’, and they are mainly
designed to support video/graphic cards with high bandwidth requirements. The main
advantage of these slots type is that they support a simple direct connection between the
CPU and the motherboard without any PSU connectors or cables needed.
ISA Slots
ISA expansion slots are the oldest types of slots on the motherboard. ISA stands for
‘Industry Standard Architecture’ because no other slots were invented at that time.
Network cards, video cards, and other extended hardware are installed with the help of
ISA slots.
EISA Slots
The EISA ‘Extended Industry Standard Architecture’ slots were introduced to compete
with Micro Chanel Architecture by IBM.The main thing to remember when it comes to
ESIA Slot configurations is that they range from 1x to 16x. That’s because the number in
front of the x denotes how many cards are in one slot.
VESA Slots
VESA stands for ‘Video-Electronics Standards Association’, it is a group of monitor and
graphics card manufacturers that establish video bus and display standards. The aim of
VESA slots is to optimize the video operations.
14. 13 | P a g e
RAM Slots
The RAM slot on the motherboard determines the RAM your computer can use. Some
motherboards support the option to mix RAM, allowing you to use a combination of
different RAM modules size, power and speed.
AMR Slots
The AMR ‘Audio/Modem Rise’ slots are generally found on Pentium 3 and Pentium 4
computers on some of the motherboards. Intel designed these expansion slots to
communicate with the motherboard by offering analog capability. These slots are used
to install modems and sound cards.
CNR Slots
Communications and networking slot or CNR slot is only used by the customized systems
for networking. It is a specification that supports audio, modem, USB, and LAN interfaces
on core logic chipsets.Today this slot is no longer found on motherboards and has
been replaced by PCI and PCI
Internal Motherboard Ports
CPU socket - Where the CPU or processor plugs in.
CPU power connector - Power cable connection for the CPU.
ATX power connector - Power cable connection for the system.
DIMM/RAM Memory slots - Connectors for system memory or RAM.
PCIe slots (x16, x2, x1) - Expansion card slots, including the graphics card.
M.2 connection - Solid-state drive connection.
SATA ports - Modern internal hard drive ports.
Front panel connector - Connection for USB, and audio ports on the front or top
of the case.
Front panel header - Connection for LED/RGB lighting, power switch, and reset
switch.
USB headers (3.1, 2. etc.) - Connection for rear USB ports on the motherboard.
CMOS battery - Bios battery for when there’s no system power.
Fan headers - Connection for the case and system fans.
There may be additional ports such as a COM/Serial header, TPM header, or RGB
headers. Some ports will not be used, and sometimes there are redundant connections.
External Motherboard Ports (Rear Ports)
PS/2 - Used for older PS/2 interface keyboards.
USB - Connection for USB peripherals including keyboards, mice, hard drives,
audio equipment, and more.
HDMI/DisplayPort/VGA - They’re all video or display connectors to output video
or audio to a monitor.
Ethernet /RJ-45 - Connection for wired internet.
Analog/Digital Audio - Connections for speakers and digital audio equipment,
including home theater systems.
9. Explain Booting
15. 14 | P a g e
Booting is basically the process of starting the computer. When the CPU is first switched on
it has nothing inside the Memory. In order to start the Computer, load the Operating System
into the Main Memory and then Computer is ready to take commands from the User.
Types of Booting
There are two types of booting:
Cold Booting
A cold boot is also called a hard boot. It is the process when we first start the
computer. In other words, when the computer is started from its initial state by
pressing the power button it is called cold boot. The instructions are read from
the ROM and the operating system is loaded in the main memory.
Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the computer. Here,
the computer does not start from the initial state. When the system gets stuck
sometimes it is required to restart it while it is ON. Therefore, in this condition the
warm boot takes place. Restart button or CTRL+ALT+DELETE keys are used for warm
boot.
Steps of Booting
We can describe the boot process in six steps:
The Startup :It is the first step that involves switching the power ON. It supplies
electricity to the main components like BIOS and processor.
BIOS: Power On Self Test:It is an initial test performed by the BIOS. Further, this test
performs an initial check on the input/output devices, computer’s main memory,
disk drives, etc. Moreover, if any error occurs, the system produces a beep sound.
Loading of OS: In this step, the operating system is loaded into the main memory.
The operating system starts working and executes all the initial files and
instructions.
System Configuration: In this step, the drivers are loaded into the main memory.
Drivers are programs that help in the functioning of the peripheral devices.
Loading System Utilities:System utilities are basic functioning programs, for
example, volume control, antivirus, etc. In this step, system utilities are loaded
into the memory.
User Authentication: If any password has been set up in the computer system, the
system checks for user authentication. Once the user enters the login Id and
password correctly the system finally starts.
10. Explain Number System
Number system is important from the viewpoint of understanding how data are
represented before they can be processed by any digital system including a digital
computer.
16. 15 | P a g e
Types of Number Systems
Based on the base value and the number of allowed digits, number systems are of
many types. The four common types of Number System are:
Decimal Number System
Binary Number System
Octal Number System
Hexadecimal Number System
Decimal Number System :Number system with a base value of 10 is termed a
Decimal number system. It uses 10 digits i.e. 0-9 for the creation of numbers. Here,
each digit in the number is at a specific place with place value a product of
different powers of 10. Here, the place value is termed from right to left as first
place value called units, second to the left as Tens, so on Hundreds, Thousands,
etc.
Binary Number System :Number System with base value 2 is termed as Binary
number system. It uses 2 digits i.e. 0 and 1 for the creation of numbers. The numbers
formed using these two digits are termed Binary Numbers. The binary number
system is very useful in electronic devices and computer systems because it can be
easily performed using just two states ON and OFF i.e. 0 and 1.
Decimal Numbers 0-9 are represented in binary as: 0, 1, 10, 11, 100, 101, 110, 111,
1000, and 1001
For example, 14 can be written as 1110, 19 can be written as 10011, 50 can be
written as 110010.
Octal Number System:Octal Number System is one in which the base value is 8. It
uses 8 digits i.e. 0-7 for the creation of Octal Numbers. Octal Numbers can be
converted to Decimal values by multiplying each digit with the place value and then
adding the result. Here the place values are 80, 81, and 82. Octal Numbers are useful
for the representation of UTF8 Numbers. Example,
(135)10 can be written as (207)8
(215)10 can be written as (327)8
Hexadecimal Number System:Number System with base value 16 is termed as
Hexadecimal Number System. It uses 16 digits for the creation of its numbers. Digits
from 0-9 are taken like the digits in the decimal number system but the digits from
10-15 are represented as A-F i.e. 10 is represented as A, 11 as B, 12 as C, 13 as D, 14
as E, and 15 as F. Hexadecimal Numbers are useful for handling memory address
locations.The hexadecimal number system provides a condensed way of representing
large binary numbers stored and processed. Examples,
(255)10 can be written as (FF)16
(1096)10 can be written as (448)16
(4090)10 can be written as (FFA)16
17. 16 | P a g e
11. Write the applications of MS Excel
Excel is a software program created by Microsoft that uses spreadsheets to organize
numbers and data with formulas and functions. Excel analysis is ubiquitous around
the world and used by businesses of all sizes to perform financial analysis.Excel is
typically used to organize data and perform financial analysis. It is used across all business
functions and at companies from small to large.
The main uses of Excel include:
Data entry
Data management
Accounting
Financial analysis
Charting and graphing
Programming
Time management
Task management
Financial modeling
Customer relationship management (CRM)
Almost anything that needs to be organized!
12. Brief note about 10 functions in MS Excel
List of Functions
SUM Function
Count Function
CountA Function
LEN Function
TRIM Function
RIGHT
LEFT
MID Function
VLOOKUP
IF Statements
SUM Function: The SUM function allows you to add 2 or more numbers together. Sum
function can be directly applied to sets of numbers separated by a comma, two or
more cells separated by comma or selecting a range of cells. Let us discuss it in more
detail. For example, let us add 25+35+24.
Formula: =SUM(25,35,24) Answer: 84
18. 17 | P a g e
COUNT Function: The count function counts the number of cells containing numbers
for a selected range. This formula only works with numbers. It counts the cells where
there are numbers. The formula for the count is =COUNT(Cell Start: Cell End).Eg:
Formula: =COUNT(A1: A1O)
COUNTA Function:This function counts the number of non-empty cells in a selected
range. It will count cells that have numbers and/or any other characters in
them.Formula: =COUNTA(A1: A1O)
LEN Function:The LEN formula counts the number of characters in a cell including
spaces.Formula: =LEN(B3)
TRIM Function:This TRIM function is useful for removing extra spaces in a cell
whether at the beginning, trailing or anywhere between the words.Formula:
=TRIM(A1)
RIGHT:Right gives you the number of specified characters from the right of a text
string.Formula:=RIGHT(Text or Cell reference, number of characters you want to look
for)
LEFT: Left gives you the number of specified characters from the left of a text string.
Formula:=LEFT(Text or Cell reference, number of characters you want to look for
MID: Midgives you the number of specified characters from the middle of a text
string. Formula: =MID(Text or Cell reference, Start Number, number of characters
you want
VLOOKUP Function:VLOOKUP Function is the most used function in day to day
operations of many businesses.It looks for a particular value in another table or array
and returns the value in the same row from a specified column.Formula:
=Vlookup(lookup_value, table_array, col_index_num, range_lookup)
IF Statements:IF Statement is also among the most used formula for analytical
scenarios, where a data has to react differently based on different situations.
Formula: =IF(logical_test, value_if_true, value_if_false)
13. Define icon? Write a brief note about different types of icons?
An icon is a graphical representation or symbol that people see on computer screens to
represent an application, object, file, or function, like a command to initiate actions.An
icon is a small visual representation of a program, component, or file that a person sees
on a desktop screen to represent or lead to another action that is part of the computer’s
graphical user interface (GUI) or on websites. These representations are prevalent in
different setups, including computers, laptops, tablets, and even social media platforms
representing specific ideas or topics Icons are part of a computer’s GUI systems,
including Windows and Mac operating systems, intending to aid users in identifying the
type of file that it represents. Most icons can be clickable to redirect users to a specific
action, including accessing a gaming platform, sending work emails, or accessing social
media pages.
19. 18 | P a g e
Icons can be divided or classified into three categories.
System Icon:The system icon is an icon that comes with a computer, laptop, or
phone when we buy it, and that cannot be deleted.When we buy a computer, laptop
mobile, some applications come along with like a camera, calculator, and other apps
that software that comes with the system.
Application Icon:Application is those which come after installation on our device.
They are known as Application Icon.We download the share it app and install it;
after that icon, we see this is known as the application icon.
Shortcut Icon:A shortcut icon is a computer icon. There is one arrow, and they are
known as Shortcut Icon.
14. Computer Memory,Classiffy it and Explain
Computer memory is just like the human brain. It is used to store data/information
and instructions. It is a data storage unit or a data storage device where data is to be
processed and instructions required for processing are stored. It can store both the input
and output can be stored here.
Types of Computer Memory
In general, computer memory is of three types:
Primary memory
Secondary memory
Cache memory
Primary Memory:It is also known as the main memory of the computer system. It is used to
store data and programs or instructions during computer operations. It uses semiconductor
technology and hence is commonly called semiconductor memory. Primary memory is of two
types:
o RAM (Random Access Memory): It is a volatile memory. Volatile memory stores
information based on the power supply. If the power supply fails/ interrupted/stopped,
all the data and information on this memory will be lost. RAM is used for booting up or
start the computer. It temporarily stores programs/data which has to be executed by
the processor. RAM is of two types:
S RAM (Static RAM): S RAM uses transistors and the circuits of this memory are
capable of retaining their state as long as the power is applied. This memory
consists of the number of flip flops with each flip flop storing 1 bit. It has less
access time and hence, it is faster.
D RAM (Dynamic RAM): D RAM uses capacitors and transistors and stores the
data as a charge on the capacitors. They contain thousands of memory cells. It
needs refreshing of charge on capacitor after a few milliseconds. This memory is
slower than S RAM.
20. 19 | P a g e
o ROM (Read Only Memory): It is a non-volatile memory. Non-volatile memory stores
information even when there is a power supply failed/ interrupted/stopped. ROM is
used to store information that is used to operate the system. As its name refers to read-
only memory, we can only read the programs and data that is stored on it. It contains
some electronic fuses that can be programmed for a piece of specific information. The
information stored in the ROM in binary format. It is also known as permanent memory.
ROM is of four types:
MROM(Masked ROM): Hard-wired devices with a pre-programmed collection of
data or instructions were the first ROMs. Masked ROMs are a type of low-cost
ROM that works in this way.
PROM (Programmable Read Only Memory): This read-only memory is
modifiable once by the user. The user purchases a blank PROM and uses
a PROM program to put the required contents into the PROM. Its content can’t
be erased once written.
EPROM (Erasable Programmable Read Only Memory): EPROM is an extension
to PROM where you can erase the content of ROM by exposing it to Ultraviolet
rays for nearly 40 minutes.
EEPROM (Electrically Erasable Programmable Read Only Memory): Here the
written contents can be erased electrically. You can delete and
reprogramme EEPROM up to 10,000 times. Erasing and programming take very
little time, i.e., nearly 4 -10 ms(milliseconds). Any area in an EEPROM can be
wiped and programmed selectively.
Secondary Memory:It is also known as auxiliary memory and backup memory. It is a non-volatile
memory and used to store a large amount of data or information. The data or information stored
in secondary memory is permanent, and it is slower than primary memory. A CPU cannot access
secondary memory directly. The data/information from the auxiliary memory is first transferred
to the main memory, and then the CPU can access it. Types of secondary memory are
o Magnetic Tapes: Magnetic tape is a long, narrow strip of plastic film with a thin,
magnetic coating on it that is used for magnetic recording. Bits are recorded on tape as
magnetic patches called RECORDS that run along many tracks. Typically, 7 or 9 bits are
recorded concurrently. Each track has one read/write head, which allows data to be
recorded and read as a sequence of characters. It can be stopped, started moving
forward or backward, or rewound.
o Magnetic Disks: A magnetic disk is a circular metal or a plastic plate and these plates are
coated with magnetic material. The disc is used on both sides. Bits are stored in
magnetized surfaces in locations called tracks that run in concentric rings. Sectors are
typically used to break tracks into pieces.
o Hard discs: are discs that are permanently attached and cannot be removed by a single
user.
o Optical Disks: It’s a laser-based storage medium that can be written to and read. It is
reasonably priced and has a long lifespan. The optical disc can be taken out of the
computer by occasional users. Examples: CD – ROM, WORM-(WRITE ONCE READ
MANY),DVDs, DVDR (writable),DVDRW (Re-Writable),DVD-ROMS (Digital Versatile
Discs),DVD-R
21. 20 | P a g e
Cache Memory: It is a type of high-speed semiconductor memory that can help the CPU run
faster. Between the CPU and the main memory, it serves as a buffer. It is used to store the data
and programs that the CPU uses the most frequently.
15. Short note on computer languages
Definition of a Computer Language
A computer language is a group of instructions that are used to create computer programs. This is
the brief of computer languages. The main goal is to achieve human-computer interaction.
Types of Computer Languages
Different types of Computer languages are given below.
Low Level Language: A Low-level computer language includes only 1’s and 0’s. This
language was used in first and second generation computers. A Low level language is
very easily understood by a computer but hard to understand for Humans. Low level
languages are designed to interact with computer hardware, which are categorized into
two types: Machine level language and Assembly level language.
Machine Language: As discussed above, Machine level language is a type of Low level
language. Machine language is considered to be the oldest computer language. Machine
language is developed by only using binary numbers i.e., 0 and 1. So, the instructions or
the statements in this language use a sequence of 0’s and 1’s.
Assembly Language: Assembly level language in computer programming has evolved
with the advancements in the machine language. Assembly language uses symbols,
which are popularly known as mnemonics in computer terminology to write the
instructions. So, comparatively writing a program in Assembly language is more
understandable to the Human than Machine Language.The Assembly language code will
be converted into a Machine language code with the help of an Assembler so that the
computer can understand the binary converted Assembly Language.
High Level Language: High Level computer languages are the advanced development
languages in the evolution of computer languages. These languages are designed to
make the programming easier and less error-free.High level language uses words and
commands along with symbols and numbers.The keywords used in High level languages
are similar to English words and can be easily understood by Humans when compared to
a Low level language. Types of programming languages in High level languages are:C,
C++, Java, Java Script, Python, C#, PHP.
16. Difference Between High-Level and Low-Level Computer languages
Low Level Computer Language High Level Computer Language
Low level languages are hard to understand by
humans as they use binary numbers and easy to
High level languages are simple to understand by
22. 21 | P a g e
understand by the computer. humans as they use English statements.
Low level languages are programmer-friendly High level languages are human friendly.
Program execution time (computational speed) is
less.
Program execution time is longer.
These are complex to maintain. These are simple to maintain.
Debugging process is hard. It is easy to debug in High level languages.
The programs in low level language are not portable
from one computer to another.
The programs in a high level language are portable,
so we can use them on any computer.
Usage of low level language is less in today’s
technologies.
We use high level language in today’s technologies.
17. Explain about six input devices
An input device is a special type of peripheral device that allows making communication
along with processing unit of the computer system.Computer’s input devices are mostly to
be used for recognized the input data that are provided by users for solving their problems.
Input data has many variants like as text, images, audio, and video. These input devices
allow transferring data from input devices to computer system.
Mouse: With the help of mouse of computer, users can control a cursor, and select all
types of text, files, icon on your computer screen.
Keyboard: The keyboard is the most frequent and widely used input device for
entering data into a computer. Although there are some additional keys for
performing other operations, the keyboard layout is similar to that of a typical
typewriter.
Generally, keyboards come in two sizes: 84 keys or 101/102 keys but currently
keyboards with 104 keys or 108 keys are also available for Windows and the Internet.
Trackball: In the Trackball, one small movable ball places on the surface and using this
ball can be moved any direction on the computer screen.
Touchpad: Touch pad is best alternative to mouse device. In which all input give to
computer by touching to touch pad, mostly this devices is embedded on the laptop.
Joysticks: Mainly, joysticks devices are designed for playing game, using this device can
be control any character in the game.
23. 22 | P a g e
Scanner: A scanner is an input device that functions similarly to a photocopier. It’s
employed when there’s information on paper that needs to be transferred to the
computer’s hard disc for subsequent manipulation. The scanner collects images from
the source and converts them to a digital format that may be saved on a disc. Before
they are printed, these images can be modified.
18. Describe ASCII Code and BCD Code
Computers and digital circuits processes information in the binary format. Each
character is assigned 7 or 8 bit binary code to indicate its character which may be
numeric, alphabet or special symbol. Example - Binary number 1000001 represents
65(decimal) in straight binary code, alphabet A in ASCII code and 41(decimal) in BCD
code.
Types of codes
BCD (Binary-Coded Decimal) code
Four-bit code that represents one of the ten decimal digits from 0 to 9.
Example - (37)10 is represented as 0011 0111 using BCD code, rather than
(100101)2 in straight binary code.
Thus BCD code requires more bits than straight binary code.
Still it is suitable for input and output operations in digital systems.
(Note: 1010, 1011, 1100, 1101, 1110, and 1111 are INVALID CODE in BCD code.)
ASCII (American Standard Code Information Interchange) code
It is 7-bit or 8-bit alphanumeric code.
7-bit code is standard ASCII supports 127 characters.
Standard ASCII series starts from 00h to 7Fh, where 00h-1Fh are used as control
characters and 20h-7Fh as graphics symbols.
8-bit code is extended ASCII supports 256 symbols where special graphics and
math's symbols are added.
Extended ASCII series starts from 80h to FFh.
19. Define Firmware and SMPS
Firmware:Firmware as the name suggests, is simply a type of software program on a
hardware device that provides a control for specific hardware and provide essential
instructions on how the device communicates with various other computer
hardware. Firmware’s are generally a type of software used to control hardware
devices.
o Firmware is low-level software that stands between the hardware and the
operating system.
o There are no categories of firmware.
24. 23 | P a g e
o Types of firmware includes BIOS, EFI (Extensible Firmware Interface), etc. The
firmware size is very small and generally ranges between a few kilobytes (KB).
Firmware’s are usually developed using low level languages.
o Updating firmware’s usually tricky.
o Firmware are not designed for user interaction and are instead hidden on device.
o Firmware memory is inaccessible and cannot be altered simply by the user.
o The firmware does not run on CPU, instead runs on smaller processors.
o The hardware’s flash storage is used to keep the firmware.
o Features of firmware includes perfect rotation counter support, floating point
variable, perform all control, etc.
o It requires less time to create firmware than software.
o It is rarely changed.
SMPS : The full form of SMPS is Switched Mode Power Supply also known as Switching
Mode Power Supply. SMPS is an electronic power supply system that makes use of a
switching regulator to transfer electrical power effectively. It is a PSU (power supply unit)
and is usually used in computers to change the voltage to the appropriate range for the
computer.An SMPS adjusts output voltage and current between different electrical
configurations by switching the basics of typically lossless storage such as capacitors and
inductors. Ideal switching concepts determined by transistors controlled outside of their
active state that have no resistance when ‘on’ and carry no current when ‘off.’
Benefits of SMPS
o The switch-mode power source is small in scale.
o The SMPS is very lightweight.
o SMPS power consumption is typically 60 to 70 per cent, which is ideal for use.
o SMPS is strongly anti-interference.
o The SMPS production range is large.
Limitations of SMPS
o The complexity of SMPS is very large.
o The production reflection is high and its control is weak in the case of SMPS.
o Use of SMPS can only be a step-down regulator.
o In SMPS, the voltage output is just one.
20. Write a brief note about the components of a system unit?
A computer system unit is the case that houses the internal parts of a computer, the
kind used for work and entertainment. This case is also sometimes called the computer
tower and it comes in a variety of materials and colors, although is most often black.
When people use a computer, multiple parts are used, including the monitor, keyboard,
mouse, and the box of components that work to process digital information. The
25. 24 | P a g e
computer system unit refers to the case, box, or tower that includes many components
that work together in order to communicate with other computers, produce sound and
audio, and allow human interaction. The computer system unit does not include the
monitor, mouse, keyboard, or screen.
The components of a system unit are as follows:
Motherboard ( System Board)
CPU (Central Processing Unit)
Memory, such as RAM, ROM, Cache, and Flash
Ports
Expansion Slots
Motherboard : Motherboard is the main circuit board for the computer, containing
both soldered, nonremovable components along with sockets or slots for
components that can be removed. The motherboard holds the CPU, RAM and ROM
chips, etc.
Central Processing Unit (CPU) :The Central Processing Unit (CPU) is the "brain" of
the computer. It executes instructions (from software) and tells other components
what to do.
The Intel Pentium is a popular processor for IBM-PCs.
The PowerPC is a popular processor for Macintoshes.
There are 2 parts of the CPU: The ALU and Control Unit.
The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as
addition and subtraction) and logical operations (such as comparing two
values).
The Control Unit deciphers and carries out instructions.
Different CPUs have different types of instructions, so software made for one
type of CPU will not run on other kinds.
The word size denotes how many bits of data a CPU can process at once. 32
bits is the standard word size for CPU's used in personal computers today.
The higher the word size, the faster a CPU can execute instructions.
System Clock : The System Clock is an "electrical pulse generator" that sends out a
pulse of electricity at regular intervals. The electronic components of the computer
need these electric pulses in order to perform work. The more pulses sent out by the
system clock, the faster the computer. The first personal computers had clock speeds
of 8 MHz (8 million pulses per second); today's PC's have clock speeds greater than
3.2 GHz (3.2 billion pulses per second).
Bus Lines: Bus Lines are "electrical data roadways" (i.e., wires) through which bits of
information are transmitted between the CPU and other components. The bus
size denotes how many bits can be transmitted at once. In general, this should be
the same as the CPU word size.
Memory Chips:
26. 25 | P a g e
Random Access Memory (RAM), also known as Main Memory or Primary
Storage, is used to hold instructions and data while they are being used.
RAM is volatile, meaning its contents are lost when the power goes off.
RAM is more than 1000x faster than the fastest secondary storage (see
below).
Read Only Memory (ROM) chips are non-volatile memory that generally
contains instructions for "booting" the computer (i.e., loading the
operating system when the computer starts up).
CMOS chips are powered by a battery and contain so-called "flexible
information" such as the type of hard drive your computer is using and
the current date and time.
Flash chips do not require electricity or a battery yet are non-volatile.
They are used in computers, cell phones, digital cameras, etc.
Cache memory is special high-speed memory that temporarily stores
instructions and data the CPU is likely to use frequently. These speeds up
processing. Level 2 or external caches generally range in size from 64
Kilobytes to 2 Megabytes.
Expansion Slots: Expansion Slots are sockets on the motherboard that you can
plug expansion cards into. To plug a card into a slot, you must open the system unit.
A card contains a socket on its end that sticks out from the system unit so a cable can
be plugged into it. Common types of cards are graphics, sound, and network cards.
Ports :Ports are sockets that are on the outside of the system unit, meaning you can
easily plug a cable into a port without opening the system unit.
Serial ports transmit one bit of data at a time.
Parallel ports transmit 8 bits of data at a time.
Universal Serial Bus (USB) ports are much faster than serial or parallel
ports and allow multiple devices to be connected to the same port.
21. Write a brief note about Open Writer, Calc and Impress?
OpenOffice Writer is a great alternative to the more expensive and feature-rich
Microsoft Office programs like Word. It offers a lot of the same features, including text
editing, font selection, and color selection, as well as the AutoCorrect and AutoComplete
options. It also works with standard Office formats, like DOC. The actual developer of the
free program is The Apache Software Foundation. The OpenOffice Writer installer is
commonly called OpenOfficeWriter.exe or swriter.exe etc. The most popular versions
among the software users are 4.1 and 4.0.
OpenOffice Calc is a free and open-source spreadsheet software that is part of the
OpenOffice suite of applications. It is designed to be compatible with Microsoft Excel
and has similar features. Newcomers find it intuitive and easy to learn; professional data
27. 26 | P a g e
miners and number crunchers will appreciate the comprehensive range of advanced
functions.
o DataPilot is an advanced technology that makes it easy to pull in raw data from
corporate databases; cross-tabulate, summarize, and convert it into meaningful
information.
o Natural language formulas let you create formulas using words (e.g. “sales - costs”).
o Intelligent Sum Button inserts a sum function or a subtotal automatically, depending
on context.
o Wizards guides you through choosing and using a comprehensive range of advanced
spreadsheet functions, or download templates from our Templates repository for
ready-made spreadsheet solutions.
o Styles and Formatting makes it easy to apply flexible cell formatting options,
including freely rotating contents, templates, backgrounds, borders, and many more.
You can be your own spreadsheet expert thanks to templates with built-in functions,
allowing you to concentrate on your real work.
o Scenario Manager allows “what if …” analysis at the touch of a button - e.g. compare
profitability for high / medium / low sales forecasts.
o Calc’s solver component allows solving optimization problems where the optimum
value of a particular spreadsheet cell has to be calculated based on constraints
provided in other cells.
o Multiple users support - Encourage collaborative work on spreadsheets. By sharing a
spreadsheet, other users can easily add their data to the spreadsheet. The
spreadsheet owner can then easily integrate the new data with a few clicks. This
collaboration feature helps avoid editing conflicts.
o Save your spreadsheets in OpenDocument format, the new international standard
for office documents. This XML based format means you’re not tied in to Calc. You
can access your spreadsheets from any OpenDocument compliant software.
o You are free to import your old Microsoft Excel spreadsheets, or save your work in
Excel format for sending to people who are using Microsoft products. Calc is able to
read .xlsx files created with Microsoft Office 2007 or Microsoft Office 2008 for Mac
OS X.
o If you want to send your results to someone who doesn’t have a spreadsheet
application installed, then use Portable Document Format (.pdf) - no need to buy or
install any extra software.
22. Define ICON, Different types of ICON
Icons represent objects or programs on your hard drive on your computer screen. Icons are
visual representations of specific things in our computers in real life. Users can quickly enter
text for completing any task with this user-friendly computing platform. Icons are any
applications, folders, or identities of a person on a computer. Icons that are seen on the
desktop like apps, programs, folders, and files if we know it is a graphical user interface
stored on the PC. The Digital data and information inside the computer system cannot be
28. 27 | P a g e
seen therefore computer communicates with users through GUI [Graphical User Interface]
with the help of desktop icons.
Icons can be divided or classified into three categories.
System Icon: The system icon is an icon that comes with a computer, laptop, or phone
when we buy it. When we buy a mobile, some applications come along with like a
camera, calculator, and other apps that software that comes with the system. And that
cannot be deleted, which is known as System Icon. If your mobile has a calculator app,
you did not delete it. This icon is called System Icon.
Application Icon: Application is those which come after installation on our device. They
are known as Application Icon. We download the share its app and install it; after that
icon, we see this is known as the application icon.
Shortcut Icon: A shortcut icon is a computer icon. There is one arrow, and they are
known as Shortcut Icon.
23. What is a Desktop. What are Desktop Elements
Desktop is the working area of the computer. Desktop GUIs help the user to easily access
and edit files, while they usually do not provide access to all of the features found in the
underlying operating system. A Desktop Environment (DE) is an implementation of
the desktop metaphor made of a bundle of programs running on top of a
computer operating system that share a common graphical user interface (GUI).The Desktop
contains many of the common elements and they are as follows.
Icons represent objects in the file system; you will generally put special folders or
program icons on the Desktop.
Desktop wallpaper is a graphic—for show, of course.
Gadgets are little tools or utilities that you add to the Desktop for additional
functionality.
The Desktop switch is a button in the lower-right corner that switches from the tile-
based interface to the Desktop. (You see the button only when your mouse button is
down.)
The Notification area shows icons of various utilities (usually system utilities); it was
once called the Status tray.
Toolbars contain related commands or objects that you can place on the taskbar.
The taskbar is a container for toolbars and the Notifications area.
24. What is a software? Different types of software?
"Software is a set of programs (sequence of instructions) that allows the users to perform
a well-defined function or some specified task. " Software is responsible for directing all
computer-related devices and instructing them regarding what and how the task is to be
performed. However, the software is made up of binary language (composed of ones and
zeros), and for a programmer writing the binary code would be a slow and tedious task.
29. 28 | P a g e
Therefore, software programmers write the software program in various human-readable
languages such as Java, Python, C#, etc. and later use the source code. Software's are
broadly classified into two types, i.e., System Software and Application Software.
System Software: System software is a computer program that helps the user to run
computer hardware or software and manages the interaction between them.
Essentially, it is software that constantly runs in the computer background, maintaining
the computer hardware and computer's basic functionalities, including the operating
system, utility software, and interface. System software is not limited to the operating
system. They also include the basic I/O system procedures, the boot program, assembler,
computer device driver, etc. This software supports a high-speed platform to provide effective
software for the other applications to work in effortlessly. The further classifications of system
software are as follows:
a. Operating System: The operating system acts as an interface between the user
and system hardware. It is a group of software that handles the execution of
programs and offers general services for the application that runs over the
computer. There are various types of operating systems available in the market,
such as embedded operating systems, real-time OS, distributed OS, single or
multi-user operating system, mobile, Internet, and various others. Some of the
commonly used examples of operating systems are Microsoft Windows, Apple's
iOS, Apple's MacOS, Android, Unix, Linux
b. Device Drivers: Device driver is a type of software that operates or controls
some specific hardware devices linked to your system. They provide a software
interface to hardware devices allowing computer operating systems and other
applications to fetch hardware functions without knowing the exact
specifications of the hardware. Some common examples of such device drivers
that connect hardware devices (printers, sound cards, network cards, hard disks,
floppy disk, keyboard, mouse, etc.) to a system easily are as follows: BIOS (Basic
Input/Output System) Device Driver, USB (Universal Serial Bus) Drivers,
Motherboard Drivers, Display Drivers, Printer Drivers, Sound Card Driver, ROM
(Read-only memory) Drivers, VGA (Video Graphic Array) Drivers
c. Firmware: In electronic systems and computing, firmware is a type of permanent
software embedded in the system's ROM (read-only memory) to provide low-
level control for some particular system device hardware. It is a set of
instructions that are stored permanently on your computer's hardware device.
d. Utility: Utility software is developed to provide support in analyzing, optimizing,
along configuring and maintaining a computer. The job of the utility program is
30. 29 | P a g e
to offer support to the system infrastructure. Though the system will work even if
it doesn't have any utility software, the right kind of utility software enhances its
performance and makes it more reliable.Some of the common examples of utility
software are as follows:Norton and McAfee Antivirus,WinRAR,etc
Application Software: Application programs or software applications are end-user
computer programs developed primarily to provide specific functionality to the
user. The applications programs assist the user in accomplishing numerous tasks
such as doing online research, completing notes, designing graphics, managing the
finances, watching a movie, writing documents, playing games, and many more.
Therefore, many software applications are designed and developed every year by
companies as per the demand and requirements of the potential users. The
application software can either be designed for a general-purpose or specially coded
as per the requirements of business cooperation. Examples of this software are .
Word Processors, MS Word (Microsoft), Corel WordPerfect, Oracle, Mozilla
Firefox,etc