Computer Theory With Questions
Computer Theory With Questions
i)Type
racer.com
Accuracy
-
10 Fastfingers
c)
-
Y
A B
0
O 0
I
0 I
I
L 0
I A
I
-
B Y
A
0
00
O
O I
0
10
I I N
Y
A ⑧
I I
0
A B AXNOR B
O
O
0
I
O
I
! I P
CREATIVE CIRCLE
Introduction to Computer Program: it is a set of instructions given to a computer
~
-
A computer is a device that accepts data, processes it in order to perform some task.
and displays the processed result. It can process both aCharacteristic of Computer
numerical and non-numerical (arithmetic and logical)
1. Speed: the computer can process data very
calculations, and responds to a specific set of
fast at the rate of millions of instructions per
instructions (program) in a well-defined manner. The
second.
term computer has been derived from a Latin word
“computare” which means to calculate. 2. Accuracy: computers provide a high degree of
The four main functions of computer are: accuracy. They respond to the user as per the
1. Input: It means entering raw information into a input instructions.
computer from the input devices. It is the 3. Storage Capacity: Computers are capable to
collection of letters, numbers, images, etc. store huge amount of data which depends on
2. Processing: It means the the capacity of hard disk.
operation/manipulation of data as per given 4. Versatility: computers can do different types
instruction. of work simultaneously. They can perform
3. Output: It is the processed data as known as multiple tasks at a same time.
the result given by computer after data 5. Diligence: Unlike human beings, a computer is
processing. free from monotony, tiredness, lack of
4. Storage: It means storing data so that it’s concentration etc. and can work for hours
available for future use. Quite often, we need without creating any errors.
to save output for future used. This is done
Drawbacks:
through storage. ~
1. No I.Q (Intelligence): Computer does not work
Terms related to computer
without instruction.
Hardware:
- Hardware is the collection of physical
2. No Feelings, emotions: Computer does not
elements that constitute a computer system. It is a
have emotions, knowledge, experience,
comprehensive term for all the physical parts of
feeling.
computer e.g display screens, disks, keyboards, mouse,
printers, scanner, chips etc. Computer Generation:
-
Software: it is a set of programs and procedures. Sl.no Generation
~
Software tells the hardware what to do and how to First Generation (1946-1959) Vacuum tube
1.
accomplish a task e.g., web browsers, word processors. base
Etc Second Generation(1959-1965) Transistor
2.
~ based
Data: Unprocessed raw facts and figures, like numbers,
Third Generation (1965-1971) Integrated
text on pieces of paper, are known as data. 3.
Circuit based
Information:
~ When data is processed, organized, Fourth Generation(1971-1980) VLSI
structured or presented in a given context so as to be 4.
microprocessor based
useful, then it is called information. Fifth Generation (1980-onwards) ULSI
↑Instruction: it is a command given to a computer in the 5.
microprocessor based
computer language by the user.
1 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
heat.
Non-
portable.
Second 1956- Transistors Magnetic 10 Time- Assembly More Used for
63 core micro sharing language, reliable and commercial
technolog second system, high level less prone production
y multitaskin language to e.g., PDP-8,
g OS hardware
IBM-1401
failure.
Portable
and
generate
less amount
of heat.
Third 1964- Integrated Magnetic 100 Real time High level Consumed Database
71 Circuits (ICs) core as nano system language less power. manageme
primary second (FORTRA Highly nt system
storage s N, sophisticate e.g., NCR-
medium COBOL) d
ALGOL 395,B6500
technology
required.
Fourth 1971- Large Scale Semi- 10 pica Time PASCAL, More Distributed
Presen Integrated conductor second sharing ADA, reliable and system,
t (LSI) circuit memory, network, COBAL-74 portable. e.g., Intel
microprocess Winchest GUI FORTRAN This 4004 chip,
or er disk interface. IV generation
Macintosh.
leads to
better
communica
tion and
resource
sharing.
Fifth Presen Very Large Parallel Artificial
t and Scale processing Intelligence
Beyon Integrated Intel core e.g.,
d (VLSI) chips microproce robotics
ssor is
implemente
d.
Enables
mega chips
Note: EDVAC was the first electronic computer
Charles Babbage is called the father of constructed at the Moore School of
computer. Engineering (USA).
Alan Turing is known as the father of modern ENIAC was the world’s first successful
computer. electronic computer which was developed by
The first computer architecture was the two scientists namely JP Eckert and JW
introduced by John Von Neumann in 1948. Mauchy. It was the beginning of first
generation computer.
2 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Binary number system was suggested by John rods around and placing them in specially
Von Neumann constructed boards.
Microprocessor is the main concept behind Slide Rule
fourth generation of computer. Invented by William Oughtred in 1622.
In 1971, Ted Hoff invented Intel 4004 chip Is based on Napier’s ideas about logarithms.
which was the world’s first single chip
microprocessor. Used primarily for multiplication, division ,
Transistors were invented by Bell Laboratory of roots, logarithms, trigonometry.
America in 1953 and were made up of Not normally used for addition or subtraction.
semiconductors like germanium and silicon. Pascaline
In 1958, Jack St. Clair Kilby and Robert noyce InventedbyBlaise Pascal in 1642.
invented the first IC. IC was made up of silicon It was its limitation to addition and
material and consists of thousands of subtraction.
transistors on a single chip.
It is too expensive
The first computer architecture was introduced
by John Von Neumann (1970) Jacquard Loom
History of Computer The Jacquard loom is a mechanical loom,
-
Eeliest computer invented by Joseph-Marie Jacqard in 1881.
Originally calculations were computed by It an automatic loom controlled by punched
humans whose job title was computers. cards.
These human computers were typically Arithmometer
engaged in the calculation of a mathematical A mechanical calculator invented by Thomas
expression. de Colmar in 1820.
The calculations of this period were specialized
The first reliable, useful and commercially
and expensive, requiring years of training in
successful calculating machine.
mathematics.
The first use of the word “computer” was The machine could perform the four basic
recorded in 1613 referring to a person who mathematic functions.
carried out calculation, or computations, and The first mass-produced calculating machine.
the word continued to be used in that sense Difference Engine and Analytical Engine
until the muddle of the 20th century. It an automatic, mechanical calculator
-
Tally Sticks designed to tabulate polynomial functions.
A tally stick was an ancient memory aid device to Invented by Charles Babbage in 1822 and
record and document numbers, quantities, or even
1834.
messages.
Abacus
-
It is the first mechanical computer.
An abacus is a mechanical device used to aid First computer Programmer
an individual in performing mathematical In 1840, Augusta Ada Byron suggests to
calculations. Babbage that he use the binary system.
The abacus was invented in Babylonia in 2400 She writes programs for the Analytical Engine.
-
3 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
The first Electro-mechanical computer.
Z1
The first programmable computer.
Based on Purpose
Created by KnoradZuse in Germany from 1936
On the basis of purpose, computers are categorized as
to 1938.
follows
To program the Z1 required that the user insert
1. General Purpose Computer
punch tape into a punch tape reader and all General purpose computers are those
output was also generated through punch computers, which are used to solve variety of
tape. problems by changing the program or
Atanasoff-Berry Computer (ABC) instructions. e.g., to make small database
It was the first electronic digital computing calculations, accounting, etc.
device. Special Purpose Computer
Invented by Professor John Atanasoff and Special purpose computers are those
graduate student Clifford Berry at lowa State computers which are used to solve a single and
University between 1939 and 1942. dedicated type of problem. e.g., automatic
ENIAC aircraft landing, multimedia computer, etc.
ENIAC stands for Electronic Numerical Based on Work
Integrator and Computer. (i) Analog Computers
It was the first electronic general purpose These computers recognize data as a
computer, completed in 1946. continuous measurement of a physical
property. Their output is usually in the
Developed by John Presper Eckert and John W.
form of readings and dials or graphs,
Mauchl. Voltage, pressure, speed and
UNIVAC 1 temperature are some physical
The UNIVAC 1 (UNIVersal Automatic Computer properties that can be measured in
1) was the first commercial computer. this way.
Designed by J. Presper Eckert and John Example: Automobile speedometer,
Mauchly. thermometer.
(ii) Digital Computers
EDVAC
These are high speed programmable
EDVAC stands for Electronic Discrete Variable electronic devices that perform
Automatic Computer. mathematical calculations compare
Designed by Von Neumann in 1952. values and store the results. They
It has a memory to hold both a stored program recognize data by counting discrete
as well as data. signal representing either high (on) or
low (off) voltage state of electricity.dat
The First Portable Computer
is stored in the forms of binary digits
Osborne 1- the first portable computer.
i.e. 0 or 1 eg. Personal computer (PC)
Released in 1981 by Osborne Computer (iii) Hybrid Computers
Corporation. The combination of analog and digital
The First computer Company computer is known as Hybrid
The first computer company was the Electronic computers. They have the speed of
Controls Company. analog computers and the accuracy of
Founded in 1949 by J. Presper Eckert and John digital computers.
Based on size
Mauchly.
(i) Super Computers
Classification of Computer
These are the most powerful, most
expensive and being the fastest
4 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
computers. Super computers have anywhere. These are small enough to
large memories and high processing fit inside a briefcase, light enough to
speed and can process billions of be easily carried around during
instructions per second (BIPS). Another travelling also. The primary difference
unit of speed is measured in Flops also. between a laptop and a notebook are
Super computers are widely used in size and eeight. Notebooks are smaller
scientific applications, processing of than laptops and weigh less.
geological data, collection and (iii) Handheld computers
processing weather data etc. A hand held computers is a small
Indian Super Computers computing device that can be used by
(a) PARAM series developed by C- holding in hand. It is also known as
DAC, Pune palmtop because it can be kept on
(b) ANUPAM series developed by palm and operated. These are used to
BARC, Mumbai collect field data.
(c) PACE series developed by DRDO, Eg. Tablet PC, Personal /digital
Hyderabad Assistant (PDA) or pocket PC and Smart
(ii) Mainframe computers Phone.
A mainframe computer is usually Note:
slower, less powerful and less Siddhartha was the first computer developed
expensive than super computers but in India.
exceeds the performance of mini The world’s first computer called the Z1, was
computers and personal computers. invented by KonradZuse.
Mainframe process data at several CRAY-1 was the world’s first supercomputer
Millions Instructions per second introduced by Seymour R CRAY in 1976.
(MIPS). More than 1,000 remote PARAM was the first supercomputer
computers can be accommodated by a developed in India in 1990. It is a series of
typical mainframe computers. gigaflops, assembled by C-DAC in Pune.
Mainframes are used by banks
PARAM YUVA II is the latest machine in the
insurance companies, hospitals,
series of PARAM made by C-DAC (pune) in
railways, etc. that need on-line
India. It performs at a peak of 524 teraflops. It
processing of large number of
has been ranked 33rd in the list of top 500
transactions.
supercomputers in world.
(iii) Mini Computers
Tianhe-2 is the world’s fastest super computer
Mini computers are smaller than
launched by China at NUDT University in 2013.
mainframe, general purpose
It is based on Rylin Linux operating system with
computers. Mini computers are well
33.86 petaflops.
adapted for functions such as
accounting word processing, data base Components of a computer
management, computers aided design A computer consists of four main components.
(CAD) and numerical analysis etc. i) Input Unit
Small size Computers ii) Central Processing Unit (CPU)
(i) Micro Computers iii) Memory Unit
There are single user, least expensive iv) Output Unit
computers and smaller than Super, Input Unit
Mainframe and Mini-computers. There
are portable computers. Micro This unit contains devices with the help of which we
computers are also called personal enter data into computer. This unit makes link
computers. between user and computer. The input devices
(ii) Laptops and Note Books translate the information into the form understandable
These computers are battery operated by computer. Keyboard and mouse are two basic
and hence can be used anytime and devices used for giving data or instruction to computer.
5 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
CPU (Central Processing Unit): CPU is considered as The internal bus connects components inside
the brain of the computer. It performs all types of data the motherboard like, CPU and system
processing operations, stores data, intermediate memory. It is also called the system bus.
results and instructions (program).It controls the The external bus connects the different
operation of all parts of computer. external devices; peripherals, expansion slots,
CPU itself has following three components I/O ports and drive connections to the rest of
ALU (Arithmetic Logic Unit): When the control computer. It is also referred to as the
unit encounters an instruction that involves expansion bus.
mathematical calculation or decision/logic, it The command to access the memory or the I/O
passes the control to the second component, device is carried by the control bus.
i.e. the arithmetic logic unit (ALU). The address of I/O device or memory is carried
o The ALU includes a group of registers - by the address bus. The data to be transferred
memory locations built directly into is carried by the data bus.
the CPU, that are used to hold data
that are being processed by the Computer memory
current instruction. The computer memory is one of the most important
Registers: The register is the smallest high- elements in a computer system. It stores data ad
speed storage area in the CPU. instructions required during the processing of data and
o All data must be represented in a output results. Storage may be required for a limited
register before it can be processed. period of time, instantly or for an extended period of
Control Unit: This unit controls the operations time. Computer memory refers to the electronic
of all parts of computer but does not carry out holding place for instructions and data where the
any actual data processing operations processor can read quickly.
Memory Unit Types of Memory
Memory is that part of the computer, which holds In general, the memory is classified into two categories
data and instructions. Memory is an integral 1. Primary memory or Main memory
component of the CPU. The memory unit consists 2. Secondary memory or Auxiliary memory
of primary memory and secondary memory. Primary Memory/Main Memory
The memory unit that communicates directly with the
Output Unit
CPU is called main memory. The primary memory
The output unit sends the processed results to the allows the computer to store data for immediate
user. It is mainly used to display the desired result to manipulation and to keep track of what is currently
the user as per input instruction. e.g., Monitor, Printer being processed. It is volatile in nature, it means that
and plotter, etc. when the power is turned off, the contents of the
Interconnection of Units primary memory are lost forever.
CPU sends data, instructions and information to the Primary memory further classified in two categories
components inside the computer as well as to the 1. Random Access Memory (RAM)
peripherals and devices attached to it. Bus is a set of It is also known as read/write memory, that
electronic signal pathways that allows information and allows CPU to read as well as write data and
signals to travel between components inside or outside instructions into it.
of a computer. RAM is used for the temporary storage of input
The features and functionality of a bus are as follows data, output data and intermediate results.
Ram is a microchip implemented using
A bus is a set of wires used for interconnection, semiconductors.
where each wires used for interconnection, There are two categories of RAM
where each wire can carry one bit of dat. (i) Dynamic RAM (DRAM): It is made up
A computer bus can be divided into two types; of memory cells where each cell is
internal bus and external bus. composed of one capacitor and one
transistor. DRAM must be refreshed
continually to store information. The
6 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
refresh operation occurs automatically The secondary memory stores much larger amounts of
thousands of times per second. DRAM data and information for extended periods of time.
is slower, less-expensive and occupies Data in secondary memory cannot be processed
less space on the computer’s directly by the CPU, it must first be copied into primary
motherboard. storage i.e., RAM.
(ii) Static RAM (SRAM): Ii retains the data Secondary storage is used to store data and programs
as long as power is provided to the when they are not being processed. It is also non-
memory chip. It needs not be volatile in nature. Due to this, the data remain in the
‘refreshed’ periodically. SRAM uses secondary storage as long as it is not overwritten or
multiple transistors for each memory deleted by the user. It is a permanent storage i.e.,
cell. It does not use capacitor. SRAM is device.
often used as cache memory due to its Secondary memory devices include
high speed. SRAM is more expensive Magnetic Disks Hard Disk Drive
than DRAM. Floppy Disk
2. Read Only Memory (ROM) Memory Stick
It is also known as non-volatile memory or Optical Disks CD
permanent storage. It does not lose its content DVD
when the power is switched off. ROM has only Blue-ray Disk
read capability, no write capability. ROM can Solid state Disks Pen/Flash Drive
have data and instruction written to it only one Magnetic Tapes
time. Once a ROM chip is programmed at the Magnetic tape is the most popular storage medium for
time of manufacturing, it cannot be large data that are accessed and processed
reprogrammed or rewritten. sequentially. Magnetic tape is a plastic ribbon usually ¼
There are three categories of ROM inch or ½ inch wide and 50 to 2400 feet long. It is
(i) Programmable ROM (PROM): it is also coated with such a material that can be magnetized
non –volatile in nature. Once a PROM such as iron oxide or chromium oxide. Data is stored or
has been programmed, its contents recorded in the form of ting invisible magnetized and
can never be changed. It is a one-time non-magnetized spots (representing 1’s and 0’s) on the
programmable device. PROMs are coated surface magnetic tapes can also be erased and
manufactured blank and can be reused indefinitely.
programmed at buffer, final test or in Types of Magnetic Tapes
system. These types of memories are Commonly used magnetic tapes are –
found in video game consoles, mobile 1) ½ inch tape reel
phones, implantable medical devices 2) ½ inch tape cartridge.
and high definition multimedia 3) ¼ inch streamer tape
interfaces. PROM was invented by Win 4) 4mm Digital Audio tapes (DAT)
Tsing Chow in 1956. Magnetic Disk
Erasable Programmable ROM (EPROM): It is similar to Magnetic Disks are the most popular direct access
PROM, but it can be erased by exposure to strong secondary storage devices. A magnetic disk is a thin
ultraviolet light, then rewritten. So it is also known as circular plate made of metal or plastic and coated with
Ultraviolet Erasable Programmable ROM (UNEPROM). iron oxide to store data on both sides. A standard
EPROM was invented by Dov Frohman of Intel in 1971. binary code, usually 8-bit EBCDIC, is used for recording
(ii) Electrically Erasable Programmable data. A magnetic disk can also be erased and reused
ROM (EEPROM): It is similar to EPROM, many times-
but it can be erased electrically, then Types of magnetic disks
rewritten electrically and the burning (i) Floppy disks (ii) Hard disks
process is reversible by exposure to Floppy disk
electric pulses. A floppy disk is a flat, circular piece of flexible
Secondary Memory plastic coated with magnetic oxide. It is packed
(Auxiliary Memory/Storage Devices)
7 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
in protective envelopers or plastic cases. A number of tracks varies greatly between disks
floppy disk is also known as diskettes. from as few as 40 tracks on some low capacity
These are introduced by IBM in 1972. disks to several thousands on high capacity
These are designed by Sony disks.
There are different types of floppy disks 2) Sector
available in the market, according to their sizes A disk surface is divided into a number of
and storage capacities. There are three types invisible pie-shaped segment. Each of these
of floppy disk, according to their size. portions are called sectors. A sector typically
(a) 8- inch portable disk – 360 KB and 720 KB. contain 512 bytes. It is the smallest unit on a
1 magnetic disk.
(b) 5 4 inch disk- 360 KB, 1.2 MB
1 3) Cylinder
(c) 3 2inch floppy disk -720 KB, 1.44 MB, 2.88 A set of corresponding tracks on all the
MB. recording surfaces of a disk pack together form
Hard disk a cylinder. For example:- The 5th track of all
A hard disk are the primary on-line secondary recording surfaces together form a cylinder
storage device for most computer systems. Optical disk
Hard disks hold more fata and are faster than An optical- disk storage system consists of a rotating
floppy disks. disk coated with a thin metal that is highly reflective. It
A single hard disk usually consists of several uses laser beam technology for recording or reading of
platters. Each platter requires two read/write data on disk surface. They come in various sizes and
heads, one for each side. Each platter has the ranges from 3.0 inch to 12.0 inch diameter. The most
same number of tracks. Hard disks are less popular is of 5.25 inch diameter with capacity of about
portable than floppies, although it is possible 650/700 MB.
to buy removable/external hard disks. Types of Optical disks
Type of hard disks 1. Compact disk (CD)
These are categorized into three types Storage capacity of CD’s are
1) Zip/Bernaulli disk 650/700MB.
These disks are commonly 5.25 inch in size Size of CD’s are 5.25 inch diameter.
having storing capacity of about 100MB and Types of CD’s
even more. These are developed by lomega (i) Compact Disk
corporation. Read only Memory (CD-ROM),
2) Disk Pack Data can be written once and
It consists of multiple disk platters mounted on read many times.
a single central shaft. These platters can be (ii) Worm disk/CD-R Disks
removed and can be stored off line in a plastic Worm stands for write once,
case. This gives virtually unlimited storage read many and CD-R stands for
capacity to disk packs. CD-recordable. In this compact
3) Winchester disk disk, same as CD-ROM, data
A Winchester disk also consist of multiple disk can be written only cone but
platters mounted on a single central shaft. But can be read many times.
a Winchester disk drive is of fixed type i.e. it (iii) CD-Read/Write (CD-R/W) Disk
cannot be removed. It is sealed together in a In these compact disk, data
contamination free container and cannot be can be written many times by
separated from each other. Storage capacity of erasing the previous content
today’s Winchester disks ranges from a few and can be read many times
gigabytes (109 bytes) to few terabytes (1012 also. So these disks can be
bytes). reused many times.
Storage organization of magnetic disk- 2. Digital Versatile/Video Disk (DVD)
1) Tracks DVD’s were designed primarily to store and
The surface of a disk is divided into a number distribute movies. These are high storage
of invisible concentric circles called tracks. The
8 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
capacity disks than CD’s. There are two 2. Nibble: A group of 4 bits is called nibble.
variants of DVD- 3. Byte: A group of 8 bits is called Byte. A Byte is
(i) Single layer disk= 4.7 GB storage. the smallest unit which can represent a data
(ii) Double layer disk =8.5 GB storage.
item or a character.
Types of DVD’s
(i) DVD-R (DVD-recordable) – Data can be 4. Word: A computer word, like a byte, is a group
written once and read many times. of fixed number of bits processed as a unit
(ii) DVD-R/w- Data can be written and which varies from computer to computer but is
read many times. fixed for each computer. The length of a
(iii) DVD-Audio- these disks are designed computer word is called word-size or word
for music storage only. length and it may be as small as 8 bits or may
(iv) DVD video- these are designed for
be as long as 96 bits. A computer stores the
storing movies and video files.
Blue Ray Disk (BRD) information in the form of computer words.
There are two types of Blue ray disks. Computer Languages:
(i) Single Layered (Storage Capacity approx. The language acceptable to a computer system is
25GB) called computer language and process of writing
(ii) Double Layered (Storage Capacity approx. instructions in such a language is called programming
50GB) or coding.
Memory Storage Devices:- these devices use flash Computer languages can be classified into three
memory technology for secondary storage devices. categories:
1. Machine Language (Low Level Language)
Two popular memory storage devices are- 2. Assembly Language (Middle Level Language)
1) Pen Drive (Flash Drive)/USB Storage 3. High-level language
2) Memory Card (SD/MMC i.e. SD stands for Machine language
Secure Data and MMC stands for multimedia A computer’s machine language consist of strings of
Card) binary number (i.e. 0 and 1) and is the only one which
Storage capacity of a Pen drive range the processor directly understands. Machine language
from 8MB to 128 GB programs have an advantage of very fast execution
Storage capacity of a memory card speeds and efficient use of primary memory. The first
ranges from 8 MB to 64GB. computer program was written in machine language.
Unit of Memory Assembly language
0 or 1 = 1 Bit It is also considered in low level language along with
4 Bits = 1 Nibble machine language. It uses mnemonics in place of 0’s
8 bits = 1 Byte and 1’s to represent the operation code. This language
10
(2 bytes) 1024 bytes = 1 Kilobyte (KB) contain a system software known as assembler, which
(220 bytes) 1024 KB = 1 Megabyte (MB) translates a assembly language program into its
(230 bytes) 1024 MB = 1 Gigabyte (GB) equivalent machine language program.
40
(2 bytes) 1024 GB = 1 Terabyte (TB) High level language
1024 TB = 1 PB(Peta Byte) These are machine independent and do not require
programmers to know anything about the internal
1024 PB = 1 EB(Exa Byte)
structure of the computer on which the high-level
1024 EB = 1 ZB(Zetta Byte) language programs are executed. These languages use
1024 ZB = 1 YB (Yotta Byte) characters, symbols and mathematical notations.
1024 YB = 1 (Bronto Byte) These languages are easier to learn, requires less time
1024 Brontobyte = 1 (Geop Byte) to write and do not deal with machine-level coding-
Following are the main memory storage units. high level language must also be translated into
1. Bit(Binary Digit): A binary digit is logical 0 and machine language before they can be used on a
1 representing a passive or an active state of computer. There are two different language translator
programs used to translate high level languages.
component in an electric circuit.
9 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
1. Interpreter: It translates a high level language 3. XML-Extensible Mark-up Language.
program into machine language line by line 4. Java
and execute line of the program after it is Hardware and Software
translated using RAM only. Hardware is the physical aspect of computers which
2. Compiler: It is also a high level language can be touched. The hardware are the parts of
translating program which translates the whole computer itself including the CPU, Memory, Keyboard,
program in a single instance or move, in Monitor, CD-ROM, DVD, Hard Disk etc.
machine language i.e completes source code at Software (S/W)
once into machine code and saves the object Software is a collection of computer programs and
code also. related data that provide the instructions for telling a
Examples of some high level languages being used are- computer what to do and how to do it. A software is an
1. FORTRAN (FORMULA TRANSLATOR) 2. COBOL interface between the user and computer. It is a set of
(common business oriented language) instructions, programs that are used to give command
3. BASIC (Beginner’s all-purpose symbolic instruction to hardware. It is responsible for controlling,
code) 4. C 5.C++ 6.Java etc. integrating and managing the hardware components of
Web/Internet Language a computer system and for accomplishing specific
The languages which are used for coding or creating tasks.
web pages are known as web or internet languages. Types of Software
Some famous web languages are Software can be divided into two major categories.
1. HTML- Hyper Text Mark-up Language. 1. System software
2. DHTML- Dynamic Hyper Text Markup 2. Application software
Language.
Software
Set of programs that governs
the functioning of computer
System Software It also provides the interface between the user and
System software consists of several programs, which component of the computer.
are directly responsible for controlling, integrating and The purpose of system software is to insulate the
managing the individual hardware components of a applications programmer as much as possible from the
computer system. detail of the particular complex computer being used.
10 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Depending on the functionality, the system software programs. e.g., MS-DOS, Windows
can be further divided into two major categories; XP/2000/2007/2008, Unix, Linux, etc.
system management program and developing The operating system performs the
software. following functions
1. System Management Program (i) It recognizes input from
It includes an integrated system of programs, keyboard, sends output to the
which manages the operations of the display screen.
processor, controls input/output, manages (ii) It makes sure that programs
storage resources and provides various running at the same time do not
support services. Some common examples of interfere with each other.
system management programs are operating (iii) It is also responsible for security,
system, device driver and system utilities. ensuring that unauthorized users
Operating System do not access the system.
It consists of programs, which controls, Device Drivers
coordinates and supervises the activities of A software, which is written with the
the various components of a computer objective of making a device functional
system. Its function is to provide link when it is connected to the computer is
between the computer hardware and the called device driver. It is a system software
user. that acts like an interface between the
It performs all internal management device and the user. Every device, whether
functions (disk access, memory it is a printer, monitor, mouse or keyboard
management, task scheduling and user has a driver program associated with it for
interfacing) and ensures systematic its proper functioning.
functioning of a computer system. It
provides a environments to run the
Device drivers are a set of II. Disk Fragmenters It detects
instructions that introduce out PC computer files whose contents are
to a hard ware device. broken across several locations on
Device drivers are not independent the hard disk and moves the
program, they assists and are fragments to one location to
assisted by the operating system increase efficiency. It can be used
for the proper functioning. to rearrange files and unused
System Utilities space on your hard disk.
These programs perform tasks related to III. Backup Utilities It can make a copy
the maintenance of the computer system. of all information stored on a disk
These are the packages which are loaded and restore either the entire disk
into computer during time of installation of or selected files.
operating system. They are used to IV. Disk cleaners It is used to find files
support, enhance, expand and secure that have not been used for a long
existing programs and data in the time. This utility also serves to
computer system. increase the speed of a slow
System utility mainly consists of the computer.
following functions V. Anti-virus It is the utility which is
I. Disk Compression It increases the used to scan computer for viruses
amount of information that can be and prevent the computer system
stored on a hard disk by files from being corrupt.
compressing all information stored 2. Developing Software
on hard disk. This utility works It is a software which provides service required
automatically and the user does for the development and execution of
not need to be aware of its application software. The programming
existence. languages, language translator, loader, linker
11 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
are required for the application software An input device is an electro mechanical device that
development. accepts data from outside world and translates them
Programming Languages into a form that a computer can interpret.
A programming language is a primary interface The most commonly used input devices are as follows
of a programmer with a computer. A 1. Key Board
programming language is an artificial language Keyboard devices are the most commonly used
to express computation that can be performed input devices today. They allow data entry into
by a computer. a computer system by pressing a set of keys,
Each language has its own syntax i.e., the set of mounted on a keyboard. The most popular
specific rules and expresses the logical steps of keyboard used today is the 101 keys QWERTY
an algorithm. Programming languages are keyboard but on new keyboard a few
divided into two categories; Low Level additional keys are added and the number of
Language (LLL) and High Level Language (HLL). keys has gone upto 121.
Linker 0-9 keys are known as numeric keys
A linker is a system program that links together A-Z key are known as alphabetic keys
several object modules and libraries to form a F1 – F12 keys are known as Functions
single and coherent program (executable). The keys ctrl, Alt, and Shift are known as
main purpose of linker is to resolve references modifier keys
among files. Linker is used to determine the Num Lock keys acts as a toggle
memory locations that code from each module switching the function of cursor
will occupy and relates its instruction by movement into numberic operation.
adjusting absolute references. 2. Mouse
Loader A mouse is the most popular point and draw
Loader is a kind of system software, which is device. It support graphical user interface (GUI)
responsible for loading and relocation of the as their primary user interface. A mouse
executable program in the main memory. It is a controls the cursor movement on the screen.
part of operating system that brings an Types of mouse are mechanical Mouse (roller-
executable file residing on disk into memory ball) and Optical Sensor Mouse.
and starts its execution process. 3. Joystick
Application software A Joystick is a most popular input device used
Application software is computer software designed to to play video games. A joystick uses a level to
help the user to perform singular or multiple tasks. It is control the position and speed with which the
a set of instructions or program designed for specific joystick is moved into digital signals that are
uses or application, that enable the user to interact sent to the computer to control the cursor
with a computer. Application software are also called movement.
the end-user programs. These programs do the real 4. Scanner
work for users. It is an input device which is used for
There are two types of application software; General converting text, document and pictures or
purpose software and specific purpose software. images into digital form for storage in
The general purpose softwares are designed to computer.
perform general tasks. Examples are MS-Office, DBMS, 5. Digitizer
Graphics software, Multimedia software etc. It is similar device like scanner but it is a
The specific purpose software are designed to perform specialized device for converting hard copies of
specific tasks. This type of application software maps, pictures and graphics into soft copies i.e.
generally has one purpose to execute. it convert them into digital form to be stored in
Some of the specific purpose application software are the computer system. Digitizers are used
Inventory Management System and purchasing commonly in the area of computer aided
System, Payroll management System, billing System design to design cars, buildings, medical
etc. devices, robots etc.
Other Input and Output Devices Input Devices 6. Electronic/Light Pen
12 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
It is a Pen-based point and draw device. The television like screen. A picture on a monitor is
pen is used on the pad as an ink pen would be created by dots and these dots are called
used on paper. Movement of electronic pen pixels. A pixel is the smallest unit which frames
causes the graphical cursor on screen to move. or makes a picture or image.
It is used in many departments for digital Types of monitors-
signatures to caused in the screen. (a) Cathode Ray tube (CRT)
7. Touch screen (b) Flat- Panel Display – These are two types of
It is the easiest and simplest way to use all flat panel Display-
input devices. A touch screen enables a user to (i) Liquid Crystal Display (LCD)
choose from available options by simply (ii) Thin Film Transistor (TFT)
touching the desired icon or menu items (c) Light Emitting Diode (LED) displays.
displayed on a computer’s screen with his 2. Plotters
finger. Plotters are an ideal output device for
8. Magnetic Ink character Recognition (MICR) architects, engineers, city planners and other
MICR is used by banking industry for faster who need to generate hard copy graphic
processing of large volume of cheques. These output of widely varying sizes and in multiple
magnetic-ink characters are bank processing colours. Two commonly used types of plotters
symbols representing the cheque number and are-
bank identification number. The main (a) Drum plotters
limitation of MICR is that only the 10 digits and (b) Flatbed plotters
4 special characters needed for bank 3. Screen Image Projector
processing are used. It is an output device used to project
9. Optical Bar Code Reader (OBR)/Bar Code information from a computer on to a large
Reader screen so that a group of people can view it
Bar codes represent alphanumeric data by a simultaneously.
combination of adjacent vertical lines (called 4. Printers
Bar) by varying their width and spacing These are commonly used popular output
between them. A bar code reader is a scanner device for producing hard copy output on
used for reading (decoding) bar- coded data. papers.
10. Optical character Recognition (OCR) Types of Printers
It is a scanner equipped with character (i) Impact Printers-
recognition software. An input device which A printer which prints characters by
can read characters directly from all ordinary causing hammers to strike against the
piece of paper by using a scanning mechanism. paper on which information is to be
These characters are written in special type printed. These are noisy printers and
fonts. multiple copies can be printed. The
11. Speech Recognition devices printers which come under this
An input device that allow a person to input category are as follows-
data to a computer system by speaking to it. (a) Dot matrix printers.
12. Vision-Input System/ Digital / Web cameras (b) Daisy wheel printers.
It is normally connected to a computer and is (c) Line printers.
used to read data encoded on an electronic Drum printers.
card and transferred to a computer for further Chain/band Printers.
processing. The unit of speed of these printers are
Output Devices measured in CPS (Characters Per Second) and
An output device is a electromechanical device that LPM (Lines Per Minute).
accepts data from a computer and translated them (ii) Non-Impact printers
into a form suitable for use by outside world. A printer that prints without banging a
1. Monitor/Visual Display Unit (VDU) ribbon into paper i.e. these types of
Monitors are the most popular output device printers do not leave any impression
which displays the generated output on a on paper, are less noisy and can
13 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
notgives multiple copies. The printers comes column AA through XFD. The last column of the
which falls under this category are worksheet, XFD is the 16,384th column.
(a) Ink Jet Printers.
Up to Excel 2003, the standard amount of columns has
(b) Laser Printers
been 256 and 65,536 rows.
(c) Thermal printers.
The unit of speed of laser printers is Cell: A cell is the intersection of a row and a column.
measured in LPM( Lines Per Minute) For example, the uppermost cell is A1 (Column A, row
and PPM (pages Per Minute). A laser 1). Cell G9 is the intersection of column G, row 9.
printer is the fastest printer. When you select a cell by clicking it with the mouse, or
5. Speakers moving to it using the keyboard, it becomes the active
It produces audio output by selecting an cell. Cell can be referenced in three ways (i) Relative (ii)
appropriate audio output from a set of pre absolute (iii) mixed.
recoded audio response. Formula: Formulas are equations that perform
6. Speech Synthesizer calculations on values in your worksheet. It is an order
It is an output device which converts text of values, names, cell references, functions and
information into spoken sentences. operators in a cell that together give a new value. A
formula always begins with = (equal) sign.
MICROSOFT EXCELL Function: Functions are pre-defined formulas or
Microsoft Excel is a spreadsheet application developed programs that perform calculations in Excel on specific
by Microsoft for Microsoft Windows and Mac OS. values, called arguments. Each function takes specific
types or arguments such as numbers, references, text,
Spreadsheets is an electronic document that stores
or logical values.
various types of data. There are vertical columns and
horizontal rows. A cell is where the column and row Sheet tab is the tab at the bottom of the worksheet
intersect. A cell can contain data and can be used in window that displays the name of the worksheet.
calculations of data within the spreadsheet. An Excel Active cell is a cell in which we are currently working.
spreadsheet can contain workbooks and worksheets.
The workbook is the holder for related worksheets. Formula bar: the formula bar is located under the
toolbars at the top of the working screen. It contains
Workbook: A workbook is a collection of many the edit line for working with formulas, and provides
worksheets. In a single workbook, you can store information regarding cell addresses.
information in an organized manner. By default a
workbook opens with three worksheets and it can Syntax: The syntax of the function refers to t0he order
contain a maximum of 255 worksheets. of the functions arguments. In some functions, the
order of the arguments determines how Excel solves
Worksheet: A Worksheet is a sheet made up of rows the function.
and columns. It is used for planning a project or
financial documents of an organization. Worksheet Chart sheet: Chart sheet is a separate sheet in a
refers to the actual document you create by using the workbook that contains only graphs or charts. It is
spreadsheet program. A worksheet is always stored in useful when you want to see a chart or tabular data
a workbook. separated from other type of data.
Row: a row is a horizontal block of cells that runs Various Chart types in MS-Excel are area chart, Column
through the entire width of the worksheet. The rows Chart, Bar chart, Line chart, Pie Chart, XY(Scatter)
are numbered from top to bottom along the left edge chart.
of the worksheet. The first row numbered 1, the Some functions are
second 2 and so on. There can be a maximum of
10,48,576 rows. 1. Sum() adds all numbers in a range of
cells and returns the result.
Column: A column is a vertical block of cells that runs Syntax:
through the entire worksheet. A worksheet contains SUM(number1,[number2,…,number_n
16,384(A to XFD) columns. The first column is A, the )
second column is B and so on until you reach Z. Then
14 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
2. SUMIF() is a worksheet function that #N/A The formula is referring (directly or
adds all numbers in a range of cells indirectly) to a cell that uses the NA
based on one Criteria. function to signal that data is not
Syntax: SUMIF(range,
--
available.
criteria,[sum_range])
-- #NULL! The formula uses an intersection of
3. AVERAGE() returns the average two ranges that don’t intersect.
(arithmetic mean) of the numbers
#NUM! A problem with a value exists; for
provided.
example, you specified a negative
Syntax: AVERAGE(number1,
number where a positive number is
[number2],…[number_n])
expected.
4. MIN() returns the smallest value from
the numbers provided. #REF! The formula refers to a cell that isn’t
Syntax: MIN(number1,[number2,… valid.
number_n]) #VALUE! The formula includes an argument or
5. MAX() returns the largest value from operand of the wrong type. An
the numbers provided. operand is a value or cell reference
Syntax: MAX (number1, that a formula uses to calculate a
[number2,...number_n]) result.
6. IF() returns one value if the condition is Shortcut Keys of MS-Excel
TRUE, or another value if the condition Key Description
is FAlSE.
F2 Edit the selected cell
Syntax: IF(condition,
[value_if_true],[value_if_false]) F5 Go to a specific cell
7. AND() returns TRUE if all conditions are F7 spell chek selected text and/or
TRUE. It returns FALSE if any of the document
conditions are FAlSE. F11 Create chart
Syntax: AND(Condition
Ctrl+shift+; Enter the current time
1,[condition2]…[condition N]) where
N=30 Ctrl+; Enter the current date
8. OR() returns TRUE if any of the Shift+F3 open the excel formula window
conditions are True. Otherwise if Shift+F5 Bring up all search box
returns False. Ctrl+F9 Minimise current workbook
Syntax:
Ctrl+F10 Maximise currently selected
OR(Condition1,[condition2]…[conditio
workbook
n N]) where N=30
9. CONCATENATE() all to join 2 or more Ctrl+F6 Switch between open
strings together. workbooks/window
Syntax: CONCATENATE(text1, Ctrl+page up Move between Excel worksheets in
[text2,…text_n]) the same Excel document.
10. CONCATENATE WITH &: Concatenate Ctrl+Page down Move between Excel worksheets in
multiple strings into a single in the same Excel document.
Microsoft excel, you can use the &
Ctrl+tab Move between two or more open
operator to separate the string values.
Excel files.
Syntax for the & operator is
String1&String2 [&String3&string_n] Alt+= Create a formula to sum all of the
above cells
Excel Error Values.
Ctrl+’ Insert the value of the above cell into
#DIV/0! The formula is trying to divide by cell currently selected.
zero. Ctrl+Arrow Key Move to next section to text.
#NAME? The formula uses a name that Excel Ctrl+Space Select entire column
doesn’t recognize.
15 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Shift+Space Select entire row A communication channel has a source or transmitter
at one side and a designation or receiver at another
NETWORK side of the network. The source of data origination is
single but there may be multiple receivers. A
Networking communication channel is of 3 types:
Network: computer Networks means interconnected Simplex: In this, communication is
set of autonomous system that permits distributed unidirectional i.e. one of the two devices can
processing to information. transmit the data and the other can only
Five components receive the data. For eg. Radio broadcasting,
Sender computer television broadcasting etc.
Sender equipment (Modem) Half duplex: In this communication is
Communication channel (Telephone Cables) bidirectional. Either of the devices can act as
transmitter or receiver but only one device can
Receiver Equipment (modem)
transmit the data at one time. For eg. Walky-
Receiver computer
talky,wireless, email, etc.
Types of Network Full Duplex: Here also communication is in
Local Area Network (LAN): A local area both directions and both the devices can
network is relatively smaller and privately simultaneously transmit the data. For eg.
owned network with the maximum span of 10 Telephone conversation.
KM. Data Transmission Media
Metropolitan Area Network (MAN): MAN is There are several types of physical channels through
defined for less than 50 km and provides which data can be transmitted from one point to
connectivity within a campus or small another. Some of the most common data transmission
geographical area. media are
Wide Area Network (WAN): A Wide Area 1. Co-axial cables
Network, or WAN, occupies a very large area, 2. Twisted pair cables.
such as an entire country or the entire world. A a) Shielded twisted pair (STP) cables.
WAN can contain multiple smaller networks, b) Unshielded twisted pair (UTP) cables.
such as LANs or MANs. The Internet is the best- 3. Optical fibres
known example of a public WAN.
4. Communication satellite
Personal Area Network (PAN): PAN refers to a
small network of communication. These are In co-axial cables and twisted pair cables data is
used in a few limited range, which is in transmitted in form of electrical signals whereas in
reachability of individual person. Few examples optical fibre cables data travels in the form of light
of PAN are Bluetooth, wireless USB, signals and not in the form of electrical signals. Optical
fibres are fastest data transmission medium.
Wireless LAN: a wireless LAN or WLAN is a
Wireless Local Area Network that uses radio Network topologies
waves as its carrier. The last link with the users Topology of a network refers to the way in which the
is wireless to give a network connection to all network’s nodes are linked together. It is the physical
users in the surrounding area. layout structure of a network.
Wi-Fi (Wireless-Fidelity) is used for creating There are different network topologies which are as
Wireless LANs and also for providing wireless follows-
internet access. It communicates through radio 1. Bus
waves over network. In this topology, all nodes shares a single
Data Communication deals with the transmission of transmission media that is all nodes are
digital data from one device to another. Data is
attached to same communication line are
transferred through a pathway called as
backbone cable
communication channel which can be physical wire
connecting the devices or may be unguided media like 2. Star network
laser, microwave etc.
16 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
The nodes (computers) in this network are optimal topology (star vs. bus, etc.), the maximum
linked with each other through a centralized length of cables, etc.
network device. That is, the nodes in the LAYER 2 – DATA LINK LAYER
When obtaining data from the Physical layer, the Data
network are linked to each other through the
Link layer checks for physical transmission errors and
host node. packages bits into data "frames". The data link layer
3. Ring network provides error-free transfer of data frames from one
This is a circular network in which each node node to another over the physical layer, allowing
has two communication subordinate nodes but layers above it to assume virtually error-free
there is no master node for controlling other transmission over the link.
nodes. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link
4. Mesh/Completely connected network
Control (LLC) layer. The MAC sub layer controls how a
In this topology, there is a separate physical computer on the network gains access to the data and
link for connection each node to any other permission to transmit it. The LLC layer controls frame
node. Hence, each node has a direct link, called synchronization, flow control and error checking.
point to point link with all other nodes in the Networking Device – Bridge, Ethernet Switches and
network. multi layer switches, proxy server, gateway
5. Hybrid network Protocol Data Unit - Frame
Some Protocols – Ethernet, Point to Point Protocol
It is a combination of two or more network
(PPP)
topologies. LAYER 3 – NETWORK LAYER
Open Systems Interconnection model (OSI) The network layer controls the operation of deciding
The International Standards Organization (ISO) which physical path the data should take based on
developed the Open Systems Interconnection (OSI) network conditions, priority of service, and other
model. Layers 1-4 are considered the lower layers, and factors. When data arrives at the Network layer, the
mostly concern themselves with moving data around. source and destination addresses contained inside
Layers 5-7, the upper layers, contain application-level each frame are examined to determine if the data has
data. Each layer has a protocol data unit which is an reached its final destination. If the data has reached
open-system interconnection (OSI) term used in the final destination, then network layer formats the
telecommunications that refers to a group of data into packets delivered up to the Transport layer.
information added or removed by a layer of the OSI Otherwise, the Network layer updates the destination
model. OSI layer may also have specific protocols address and pushes the frame back down to the lower
which are a set of rules that governs the layers.
communications between computers on a network. Networking Device – Router, multi layer switches,
LAYER 1- PHYSICAL LAYER gateway, proxy server
The physical layer, the lowest layer of the OSI model, is Protocol Data Unit - Packets
concerned with the transmission and reception of the Some Protocols – Address Resolution Protocol (ARP),
unstructured raw bit stream over a physical medium. It IPv4/IPv6, Internet Protocol, Routing Information
provides the hardware means of sending and receiving Protocol (RIP), IPX.
data on a carrier network. LAYER 4 – TRANSPORT LAYER
Networking Device – Hub, Network Interface Card The Transport Layer provides transparent transfer of
(NIC), repeater, gateway data between end systems, or hosts, and is responsible
Protocol Data Unit - Bit for end-to-end error recovery and flow control. It
Some Protocols - Ethernet relieves the higher layer protocols from any concern
The physical layer of the network focuses on hardware with the transfer of data between them and their
elements, such as cables, repeaters, and network peers. The transport layer controls the reliability of
interface cards. By far the most common protocol used communications through flow control, segmentation,
at the physical layer is Ethernet. For example, an and error control. Two great examples of transport
Ethernet network (such as 10BaseT or 100BaseTX) protocols are TCP (as in TCP/IP) and UDP.
specifies the type of cables that can be used, the Networking Device – proxy server, gateway
17 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Protocol Data Unit – Segments for TCP, Datagram for Layer 4: Transport layer - provides reliable
UDP process-to-process message delivery and error
Some Protocols – SPX, TCP recovery
TCP, paired with IP, is by far the most popular protocol Layer 3: Network layer - moves packets from
at the transport level. If the IPX protocol is used at the source to destination providing inter
network layer, then it is paired with SPX at the networking capabilities
transport layer. Layer 2: Data link layer - organizes bits into
LAYER 5 – SESSION LAYER frames providing node-to-node delivery
The session layer sets up, coordinates and terminates Layer 1: Physical layer - transmits bits over a
conversations. Services include authentication and re- medium establishing mechanical and electrical
connection after an interruption. It allows session specifications
establishment between processes running on different
stations. TCP/IP
Networking Device – gateway, Logical Ports Transmission control protocol/Internet Protocol
Protocol Data Unit – Data/Session (TCP/IP) is suite of communication protocols used to
Some Protocols – AppleTalk Data Stream Protocol, connect hosts on the internet. It uses several
Remote Procedure Call Protocol (RPC) protocols, two main ones
LAYER 6 – PRESENTATION LAYER being TCP and IP. Lets quickly understand the
As the sixth layer of the OSI model, the presentation differences between OSI model and TCP/IP model:
layer is primarily responsible for managing two OSI is a generic, protocol independent
networking characteristics: protocol and architecture. standard while TCP/IP is the standard around
Whereas, protocol defines a standard set of guidelines which Internet has developed.
under which the network operates, the network's TCP/IP has 4 in comparison to 7 layers of OSI.
architecture determines what protocol applies. OSI uses bottom up approach while TCP/IP
Encryption is typically done at this level too. uses top down approach.
Networking Device – gateway TCP/IP combines the OSI Data link and Physical
Protocol Data Unit – Data/ Encoded User Data layer into Network access layer.
Some Protocols – Musical instrument digital interface OSI is reference model while TCP/IP is an
(MIDI), Moving picture experts group (MPEG) implementation of it.
LAYER 7 – APPLICATION LAYER Take a look at the diagram below to understand
The application layer serves as the window for users effectively.
and application processes to access network services.
Everything at this layer is application-specific. This
layer provides application services for file transfers, e-
mail, and other network software services. Telnet and
FTP are applications that exist entirely in the
application level.
Networking Device – gateway
Protocol Data Unit – Data
Some Protocols – DNS, FTP, SMTP, POP3, IMAP, Telnet,
HTTP
18 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
traffic from a work station to the outside Communication Trace feature is available in
network that is serving web pages. ISP both IPv4 and IPv6
(Internet Service Provider) is the gateway for Advantages of IPv6 over IPv4
Internet service at homes. Security
Bridge: When the size of the LAN is difficult to Auto configuration
manage, it is necessary to breakup the Simplified Header format with better Quality of
network. The function of the bridge is to Service (QoS)
connect separate networks together. Bridge do IP Host Mobility
not forward bad or misaligned packets. IPv6 has been designed with many new
Internet Protocol features which make it possible to develop
Internet Protocol is a set of technical rules and innovative applications which are not easily
guidelines that defines how different computers possible in the current IPv4 protocol
communicate over a Computer Network. IP address is The limit of payload size is not there in IPv6
a number used by different computers and servers in and its size can be as large as possible
the Internet to communication each other. Without IP depending upon the Maximum Transmission
address, computers will not be able to communicate Unit
and send data each other. It is essential to the Network Protocols
infrastructure of the web. It is like an Address is Protocols describe rules of transmission of data over
required to identify a Person. communication network. Protocols are set of rules
IPv4 (Internet Protocol Version 4) which governs different services which runs on a
IPv4 was the first version of Internet Protocol to be network or internet
widely used, and accounts for most of today’s Internet Some important protocols over network are-
traffic. There are just over 4.3 billion IPv4 addresses. 1. Address Resolution Protocol (ARP): Maps IP
IPv4 has the limitation of lesser number of addresses, address to hardware address
so it can address only limited number of Computers. 2. Internet Control Message Protocol (ICMP):
IPv6 (Internet Protocol Version 6) Used to send an error message
IPv6 is a newer numbering system that provides a 3. Transmission Control Protocol (TCP):
much larger address pool than IPv4. It was deployed in Connection oriented, Reliable.
1999 and should meet the world’s IP addressing needs 4. User Datagram protocol (UDP): Connetion-
well into the future. It is replacing IPv4 to less, unreliable.
accommodate the growing number of networks 5. File Transfer Protocol (FTP): moves file
worldwide and help solve the IP address exhaustion between devices.
problem due to increased number of Mobile Simple Network management protocol (SNTP):
Computing Devices. IPv6 is referred as the Next Primarily reports anomalous network conditions
Generation Internet Standard. and sets network threshold values.
At present the following websites are using IPv6: Model of Computer Networking:
Facebook, Google, Yahoo, Wikipedia, You tube, etc. There are mainly two model of computer networking
Differences between IPv4 and IPv6 Client-Server Network: The model of interaction
IPv4 uses four 1 byte decimal numbers, between two application programs in which a
separated by a dot (i.e. 192.168.1.1), program at one end (client) requests a service
IPv6 uses hexadecimal numbers that are from a program at the other end (Server).
separated by colons (i.e.
fe80::d4a8:6435:d2d8:d9f3b11). Peer-to-Peer Network
Packet size in IPv4 is 576 bytes It is also known as P2P network. This computer
Packet size in IPv6 is 1280 bytes network relies on computing power at the edges
Broadcast feature is available in IPv4 of a connection rather than in the network itself.
Broadcast feature is not available in IPv6 It is used for sharing content like audio, video,
IPv6 is more compatible to mobile networks data or anything in digital format. In P2P
than IPv4 connection, a couple of computers is connected
IPv6 is used by less than 1% of the networks, via a universal serial bus to transfer files.
while IPv4 is still in use by 99%
19 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Networking Devices networks using the Novell NetWare operating
Modem: Modem stands for Modulator- systems.
Demodulator. It is used to connect computers POP3 (Post Office Protocol 3): This is the most recent
for communication via telephone lines. version of a standard protocol for receiving email.
Network Interface Card (NIC): NIC provides a Internet
physical connection between the networking The Internet is a global system of interconnected
cable and the computer’s internal bus. NICs computer networks that use the standard
come in three basic varieties 8 bit, 16 bit and Internet protocol suite (TCP/IP) to link several
32 bit. The larger number of bits that can be billion devices worldwide. It also known as
transferred to NIC, the faster the NIC can “network of networks” that consists of private,
transfer data to network cable. public, academic, business, and government
Hub: Hubs are actually multi part repeaters. A networks.
hub takes any incoming signal and repeats it In 1969, ARPANET system of the Advance Research
out all ports. Project Agency of the US department of defense
Switch: It works at the Data Link Layer. It is started the internet services in USA. ARPANET
used for dividing a network into segments was the first WAN and had only four sites.
called subnets.It provides filtering of data Various Applications of Internet are:
packets and prevents network traffic also. Exchange messages using email (
Repeater: Repeaters are used to connect Electronic mail).
together two Ethernet segments of any media Transfer files as well as software.
type. In larger designs, signal quality begins to Browse through information on
deteriorate as segments exceed their any topic on web.
maximum length. We also know that signal Communicate in real time (chat)
transmission is always attached with energy with others connected to the
loss. So, aperiodic refreshing of the signals is Internet.
required. Search databases of government,
individuals and organizations.
Telnet: Serves as a terminal emulation
Read news available from leading
protocol
news groups.
Network File System (NFS), External Data
Send or receive animation and
Representation (XDR), and Remote Procedural
picture files from distant places.
Call (RPC): Work together to enable
transparent access to remote network Set up a site with information
resources. about your company’s products
and services.
Simple Mail Transfer protocol (SMTP):
Provides electronic mail services. The World Wide Web commonly known as the
Web or www developed founded by Tim
Domain Name System (DNS): Translates the
Berners – Lee in 1989, is a system of
names of network nodes into network
interlinked hypertext documents that are
addresses (Some of the domain extensions are
accessed via the Internet. These multimedia
.gov, .edu, .mil etc)
pages are ever-changing.
Point-to-Point (PPP): Commonly used in
establishing a direct connection between two A Hyperlink is a reference to data that the
networking nodes. reader can directly follow either by clicking or
Hyper test Transfer Protocol (HTTP): used by by hovering or that is followed automatically.
the world wide web. HTTP defines how A web browser (commonly referred to as a
messages are formatted & transmitted, and browser) is a software application for
what actions web servers & browsers should retrieving, presenting and traversing
take in response to the various command. information resources on the World Wide
Internetwork Packet Exchange/Sequenced Web.
Packet Exchange (IPX/SPX): Used primarily on
20 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Some of the famous browsers are Safari, addressed primarily to another. The list of CC
Chrome, Firefox, Bolt, UC Browser and recipients is visible to all other recipients of the
Internet Explorer. message.
The Uniform Resource Locator, abbreviated as An additional BCC (blind carbon copy) field is
URL is a specific character string that available for hidden notification; recipients
constitutes a reference to a resource. In most listed in the BCC field receive a copy of the
web browsers, the URL of a web page is message, but are not shown on any other
displayed on top inside an address bar. recipient's copy (including other BCC
Example of a typical URL would be recipients).
http://WWW.GOOGLE.COM. Search Engines: A software service used to
File Transfer protocol: It allows a user to move locate files or data on internet and which is
a file from one computer to another. This generally accessed with the help of web
service allows downloading and uploading of browsers. Examples: Google, Yahoo, Fast,
data or file Excite, Lycos, etc.
Downloading means to receive data to a local Domain Name is a group of network resources
system from a remote system, or to initiate assigned to a group of users. A domain name is
such a data transfer. a way to identify and locate computers
Uploading refers to the sending of data from a connected to the Internet. A domain name
local system to a remote system such as a must be unique. It always have two or more
server or another client with the intent that parts, separated by periods (dots). Example:
the remote system should store a copy of the www.goole.com, yahoo.com etc.
data being transferred. Domain abbreviation: Domain are organized
An Internet Protocol address (also known as by the type of organizations and by country. A
an IP address) is a numerical label assigned to three-letter abbreviation indicating the
each device (e.g., computer, printer) organization and usually two-letter
participating in a computer network. It acts as abbreviation indicating the country name.
identifier for a computer. It is a unique address Most common domain abbreviation for organization
for every computer. E.g., 128.113.22.55 are
Hotmail, a free e-mail service provided by info Information organization
Microsoft which was established in 1995 was com Commercial
co - founded by an Indian American gov Government
entrepreneur Sabeer Bhatia along with Jack edu Education
Smith in July of 1996 mil Military
Telnet: telnet service enables an internet user net Network
to log-in-to another computer on the internet org Usually Non-profit organization
from his/her local computer for sharing Some domain abbreviation for country are
software, remote databases, etc. in-India, au-Australia, fr-France, nz-New Zealand, and
Usenet Group: This service helps a groups of uk-United Kingdom.
internet users to exchange their views or ideas Computer Viruses:
or information on same common topic which is A virus is a parasitic program that infects another
of interest for all members belonging to the legitimate program, which is sometimes called the
group. host. To infect the host program, the virus modifies the
An email attachment is a computer file sent host so that it contains a copy of the virus.
along with an email message. One or more files Boot sector viruses: A boot sector virus infects
can be attached to any email message, and be the boot record of a hard disk. The virus allows
sent along with it to the recipient. The first the actual boot sector data to be read as
email was sent by Ray Tomlinson to himself in through a normal start-up were occurring.
1971. Adware: Displays ads while a program is
CC (Carbon Copy) in e – mail indicates those running.
who are to receive a copy of a message
21 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Spyware: Tracking software. For instance, a Bit: The smallest unit of information in computer
spyware can bin installed on computers to system. Bit is short for binary digit; either a "1” or a
track employees browsing activities. "0".
Cluster viruses: If any program is run from the Boot: The process of getting the computer started.
infected disk, the program causes the virus also Buffering: The process of storing data in a memory
to run . This technique creates the illusion that device, allowing the devices to change the data
the virus has infected every program on the rates, perform error checking and errot
disk. retransmission.
Worms: A worm is a program whose purpose Bug: A software bug is an error, flaw, fault in a
is to duplicate itself. computer program or system produces an
Bombs: This type of virus hides on the user’s incorrect or unexpected result.
disk and waits for a specific event to occur Bus: A pathway along which electronic signals
before running. travel between the components of a computer
Trojan Horses: A Trojan Horses is a malicious system
program that appears to be friendly. Because Byte: A byte is made up of 8 bits. The amount of
Trojan Horses do not make duplicates of memory it takes to store a single character.
themselves on the victim’s disk. They are not Cache: A separate area of Primary Memory (RAM)
technically viruses. where the computer stores a copy of frequently
Stealth Viruses: These viruses take up used information for quick access. This is meant to
residence in the computer’s memory, making speed up the operation of the hard disk.
them hard to detect. CD-ROM: Compact Disk-Read Only Memory. This is
Micro Viruses: A macro virus is designed to infect a a permanent storage device used to store large
specific type of document file, such as Microsoft Word quantities of information that need not be
or Microsoft Excel files. These types of documents can changed.
include macros, which are small programs that execute CGA: Color Graphics Adapter. Low-resolution
commands. screen (640x200 pixels) with color capability.
Abort: To stop a program or function before it has Character: A number, letter, symbol, or
finished. punctuation mark.
Algorithm: A set of instructions that provides a Chip: A small piece of silicon containing thousands
solution to a given problem. or millions of electrical elements. Also called an
Animation: A simulation of movement created by Integrated Circuit (IC).
displaying a series of pictures, or frames. For Compatible: The ability of one device or program
example, cartoons on television. to work with another device or program. For
ANSI: American National Standards Institute, a example, a printer and a computer are said to be
powerful industry association of USA, promoting compatible if they can be connected to each other.
Programming language standards. Control Panel: it is the part of windows menu
Antivirus: Program A utility that searches a hard accessible from the start menu, which allows users
disk for viruses and removes any, that is found. to view and manipulate basic system settings and
Architecture: A design. It can refer to either controls, such as adding hardware,
hardware or software or to a combination of adding/removing software, controlling user
hardware and software. The architecture of a accounts, changing accessibility options, etc.
system defines its broad outlines. Conventional Memory: The first 640K of electronic
ASCII: American Standard Code for Information Memory (RAM) in a computer used to run OS and
Inter change. This is a seven/eight bit code widely applications.
used in computers for the transfer of data. Debug: In computer related systems, fixing
Bandwidth: The amount of data that can be software related problem is known as debugging.
transmitted in a fixed amount of time. It is usually Digitize To scan a piece of artwork in very fine
expressed in bits per second (bps) or bytes per detail and store it in a form that computer
second. understands.
DOS: It stands for Disk Operating System. It is a
single user operating system.
22 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Debugging: locating and eliminating defects in a IBM: International Business Machines, a USA based
program. multinational Company.
Delete: a command to erase information in Icon: A graphical screen element that executes one
storage. or more commands when selected with a mouse or
Directory: A list of the files stored on a disk. other pointing device
DVD: Digital Versatile Disc or Digital Video Disc IDE: Integrated Device Electronics, a standard used
Dynamic: Refers to actions that take place at the for connecting hard drive to a computer. IDE hard
moment they are needed rather than in advance. drives are very common and relatively inexpensive.
EDP: Electronic Data Processing. Intel: The manufacturer of the most popular
E-Mail: Electronic Mail. A facility to send electronic microprocessors or CPUs.
messages to another person on a computer Intelligent: Printer combining laser, computer and
network. photocopying technology.
End-User: The end user is the individual who uses Internet: The world's largest computer network
the product after it has been fully developed and that links many of the scientific, research and
marketed. educational computers as well as commercial
EPROM: Erasable Programmable Read Only networks. The internet uses TCP/IP protocols, and
Memory. A type of ROM that can be programmed computers on Internet can run on any operating
or reprogrammed usually by exposing a normally system, like, several variations of UNIX, Windows
covered sector to UV-Light. NT, and VMS etc.
Extended Memory: Memory in addition to Intranet: In the most general sense, a private
conventional memory used to run and manage corporate network that uses Internet technology
applications; together with expanded memory, it based software and TCP/IP protocol standards.
helps PCs to address increased amounts of data in Many companies use intranets for tasks as simple
memory. as distributing a company letter and for tasks as
Fax/Facsimile: A way of transmitting copies of complex as posting and updating technical support
documents over telephone lines. Fax is short for bulletins to service personnel worldwide. An
Facsimile. intranet does not always include permanent
Gigabyte: Abbreviated as GB, is equal to 1024 MB. connection to Internet.
GUI Graphical User Interface. A user interface that Kilobyte (K, KB) Approximately one thousand
works visually and is based on the selection of characters; actually 1024bytes.
actions using a mouse or a similar pointing device LAN An acronym for local area network. A system
to click on icons or to pick options from menus; see of PCs that are located relatively near to each
also icon. other and connected by wire so that individual
Hertz: A unit of frequency that means Cycles per users can cooperatively process information and
Second. share resources; see also WAN.
High Density: The amount of information a disk can Laptop Computer: A portable computer, small
hold. High Density disks hold more information enough to be held on a lap,but slightly larger than
than Double Density disks. a notebook computer.
Hypertext: A method of presenting information so LED: Light Emitting Diode. An electronic device that
the user can view it in a non-sequential way, lights up when electricity is passed through it.
regardless of how the topics were originally Light Pen: An input device that allows a user to
arranged. It has now evolved as a flexible software write on or point to a special pad or the screen of a
technology to create electronic books provides fast pen-based computer, such as a PDA.
and flexible access to search criteria and provides Macintosh: A PC based on a Motorola
quick access to information in large documents. microprocessor employing GUI. Apple Macintosh
HTML: Hyper Text Markup Language. A markup or has been in use since late eighties.
structuring language used to describe Web and Macro: A symbol, name, or key that represents a
Intranet documents. It is used to define structure, list of commands, actions or keystrokes.
appearance and placement of HTML elements Math co-processor: Part of the microprocessor; a
including, fonts, graphics, text, hypertext links to companion chip designed to perform complex
other sites and many more details. calculations.
23 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Megabyte (M, MB): Approximately one million Protocol: In networking and communications, the
characters; actually 1,048,576 bytes. A measure of formal specification that defines the procedures to
memory or storage. follow when transmitting and receiving data.
Megahertz (MHz): A measure of processing speed. Protocol defines the format, timing, sequence and
The higher the value, the faster a computer can error checking used on the network.
work. Record: a record (also called strut or compound
Microprocessor: A single chip containing all the data) is a basic data structure. A record is a
elements of a computer's CPU. collection of fields, possibly of different data types,
MIPS: Million Instructions Per Seconds, a unit for typically in fixed number and sequence.
measuring the speed of a computer. Resolution: The size and quantity of dots that make
Mother Board: The main circuit board of a up a printed page, screen or scanned image.
computer, which carries electrical signals to and Runtime: Error An error that occurs during the
from various parts of the computer. execution of a program.
Multimedia: A computer system that combines Scanner: An input device used to copy a printed
text, graphics, animation, music, voice and video document into a computer’s memory in digital
media; may include stereo speakers as an output form, without requiring manual keying.
device. SCSI: Small Computer System Interface. A standard
Multiprocessing: It refers to a computer system’s for connecting a hard drive to a computer.
ability to support more than one process at the Serial Port: An outlet on a computer used to attach
same time. It is also called multitasking. a device, such as a modem. A serial port sends data
Nibble: Half a byte i.e. 4bits. (bits) down the wire one at a time (in a series).
Non-Volatile Memory: This is data storage that Service Pack: It is an update to a software version
does not lose its contents on power off; for that fixes an existing problem, such as a bug or
example, ROM. provides enhancements to the product that will
Notebook Computer: A portable computer, appear in the next version of the product.
approximately 8½ by 11 inches, that fits inside a TCP/IP: Transmission Control Protocol / Internet
briefcase. Protocol is a set of communication protocols that
Numeric keypad: The part of a keyboard that looks encompass media access, packet transport, session
like an adding machine, with 10 digits and communications, file transfer, e-mail, and terminal
mathematical operators; usually located on the emulation. TCP/IP is supported by a large number
right side of the keyboard. of H/W and S/W vendors and is available on many
Office-Automation: The use of computer systems computer systems, from PCs to mainframes.
to execute a variety of office operations, such as Troubleshoot: To isolate the source of a problem
word processing, accounting and Email. and fix it. In case of computer systems,
Parallel Port: An outlet on a computer used to troubleshoot is usually used when the problem is
attach a device, such as a printer. A parallel port hardware related.
sends data (bits) down the wire side by side UNIX: A multi user operating system.
(parallel to each other). Upgrade: A new version of a software or hardware
Pentium: The fifth generation of microprocessors. product designed to replace an older version of the
The Pentium is 2 to 3 times faster than the 80486, same product.
the fourth generation of microprocessors. UPS: Uninterruptible Power Supply. It is a power
Peripheral: Any piece of hardware attached to the supply that includes a battery to maintain power in
outside of a computer. Examples are printers and the event of a power cut for several minutes to
modems. some hours.
Pixel: Short for "Picture Element". A Pixel is the Universal Serial bus(USB): A common standard for
smallest dot the computer can control on the connecting multiple peripherals to a computer as
screen. needed.
Portable computer: A small computer that usually Utility: A program that performs a very specific
runs on batteries. In the categories of portable task, usually related to managing system
computers are laptop, notebook, sub-notebook resources.
and palmtop.
24 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
ZIP: ZIP is an archive file format that supports .pdb: Program Database
lossless data compression. A ZIP file may contain .dbf: Database file
one or more files or directories that may have .accdb: access databse file
been compressed .db: Database file
Zoom: zoom is another name for maximize, to .sql: Structured Query Language data file
enlarge the data size or image size. .mdb: Microsoft Access Database
FILE and EXTENSION Executable files
FILE: A computer file is a block of arbitrary information, .cgi: common gateway interface script
or resource for storing information, which is available .com: dos command file
to a computer program and is usually based o some .vb: VBScript file
kind of durable storage.
.exe: Windows Executable file
Extension: a filename extension is a suffix to the name
.jar: Java Archive file
of a computer file applied to indicate the encoding
Web files
convention (file format) of its contents.
.cer: Internet security certificate
Tex files extension
.css: Cascading Style sheet
.docx: Microsoft Word Open XML document
.html: hypertext Markup language file
.doc: Microsoft word Document
.xhtml: Extensible hypertext Markup Language
.dat: Data file
file
.rtf: rich text format
Backup files
.txt: plain text file
.tmp: Temporary file
.ppt: PowerPoint Presentation
.bak: Backup file
.pdf: Portable document format file
Microsoft Word
Audio Files Extension
MS-Word is a word processing application and is one of
.mp3: MP3 audio file the most important and widely used application found
.amr for GSM based mobile phones on computer. Word processing software is mainly used
.acc: Advanced Audio coding for the creation of test based documents. It provides
.rm: Real Media tools for composing, editing, formatting and printing of
.wma: windows media audio file documents smaller than 45k. The document can be a
Video files extension poster, report, letter, brochure, web page, newsletter,
.avi: audio video Interleave etc.
.dat: digital audio Tape e.g., Wordstar, Easy Word, Notepad for Windows.
.flv: flash video file Starting Word:
.3gp: the most common video format for cell 11. Click the Start button, click All
phone Programs, Click Microsoft Office, and
.mp4 MPEG-4 video file then click Word. (If Word 2013, the
.mpg: Movie file start screen appears)
.mpeg: MPEG movie 12. In the right pane, click Blank
.vob: DVD video object file document. A new, blank document
.wmv: windows Media video file opens in the program window
Image files extension 1. Title Bar: Appears at the top of the program
.jpg or jpeg: Joint Photographic Experts Group window and displays the name of the
.bmp: bitmap document and the program. The buttons on
.tif: Tagged Image file the right side of the Title bar are used to get
.png: portable network graphics help; change the display of the Ribbon;
.gif: graphic Interchange format minimize, restore, maximize and close the
program window.
.pds: Adobe Photoshop document
2. Quick Access toolbar: Appears on the left side
Spreadsheet files
of the Title bar and contains frequently used
.xls: Excel Spreadshet
commands that are independent of the tab
.xlsx: Microsoft Excel Open XML Spreadsheet
displayed on the Ribbon.
Database files
25 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
3. Ribbon: Extends across the top of the program the mouse, the keyboard or the selection area to make
window, directly below the Title bar, and a selection. Selected text appears highlighted on the
consist of the a set of tabs, each of which screen.
contains groups of related commands. To select text:
4. Navigation pane: Appears on the left side of To select a word: double-click anywhere in the
the program window and enables you to word.
navigate long documents, search for specific To select a sentence, hold down the Ctrl key
text, and reorganize content. and click anywhere in the sentence.
5. Document window: appears below the Ribbon To select a line, click in the selection area to
and displays the contents of the document. the left of the line.
6. Cursor: A blinking vertical line that indicates To select a paragraph, triple-click anywhere in
where text or objects will be inserted you to the paragraph. Or double-click in the selection
scroll through the document. area to the left of the paragraph.
7. Scroll bars: Appears along the right side and To select the entire document, triple-click in
bottom of the document window and enable the selection area or press Ctrl+A.
you to scroll through the document. To select adjacent words, lines, or paragraphs,
8. Status bar: Appears at the bottom of the drag the mouse pointer over the text. Or click
program window and displays information at the beginning of the text, and the hold down
about the document (number of pages, the Shift key and click at the end of the text.
number of words. Etc). The tools on the right To select non-adjacent Words, lines, or
side of the status bar can be used to display paragraphs, make the first selection, and then
the document in variety of views and to hold down the Ctrl key and make the second
change the zoom level. selection.
Ribbon Tabs Deleting Text
1. File: Displays the Backstage view which You can delete text one character at a time by
contains commands related to managing files positioning the cursor, and then pressing the
and customizing the program. Backspace key to delete the character to the left of the
2. Home: contains the most frequently used cursor or the Delete key to delete the character to the
commands. The Home tab is active by default. right of the cursor.
3. Insert: contains commands related to all the Features of Word
items that you can insert into a document. Microsoft Word's native file formats are
4. Design: Contains commands related to denoted either by a .docor .docxfile extension.
changing the layout of a document. The default document name is
5. Page Layout: Contains commands related to document1,document2 and so on.
changing the layout of a document. The word processor automatically fits the
6. References: Contains commands related to typed text within the specified left and right
reference information you can add to a margins. This feature is called word wrapping.
document. To create a document, we use New command
7. Mailings: Contains commands related to from the File Tab. Or Press ctrl+N.
creating mass mailings. Save as is used to save a document for the first
8. Review: Contains commands related to time. It is also used to change the destination
proofreading a document, adding comments, of the saved file in the computer. Or press
tracking and resolving document changes, and Ctrl+S to open the dialog box.
protecting a document. Closing Documents: When you finish working
9. View: Contains commands related to changing on a document, you can close it, but keep the
the view and other aspects of the display. program window open to work on more
Mini Toolbar: The Mini toolbar provides quick access documents. If the document contains any
to frequently used commands and appears whenever unsaved changes, you will be prompted to save
you select text or right-click an object. the changes before closing it. (Press Ctrl+W)
Selecting Text: before you can edit text, you must first Open: Open a previously saved document.
select the text that you want to modify. You can use (Ctrl+O).
26 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Print: Print the active file. It also gives the Clearing Formatting: you can remove all
opportunity to change print options. (Ctrl+P) formatting form selected text, leaving only the
Print Preview is used to see the document plain text.
before the printout is taken. Cut and Paste options are used to move the
Text formatting includes font, font size, font data from one part of the document to
color, and font style and effect. The font group another.
on the Home tab of the Ribbon contains the Paragraphs formatting: It refers to the layout
most commonly used text formatting of a paragraph on the page. You can change
commands. the look of a paragraph by changing its bullet
Gutter Margin, margin that is added to the and number list, alignment, line spacing and
binding site of pages when printing. indentation, as well as the space before and
Type 3 hyphens and press enter key, a after it.
horizontal line will be generated. Bulleted and Numbered list make documents
Press CTRL key and click any sentence to select easier to read and understand.
that sentence. Alignment: There are four alignments (Left,
After opening a word file, Press Shift+F5 and Center, Right, Justify), left align is default
cursor will move to the location, when you last alignment.
saved the file. Tab Stops can be used to align lines of text in
Also while working on a word document, different locations across the page. By default,
pressing Shift+F5 will take you to the last word 2013 sets left-aligned tab stops every half
edited locations. inch form the left margin. The easiest way to
Pressing Ctrl+Shift+> makes the font bigger for set tab stops is to use the horizontal ruler.
the selected text, similarly Ctrl+shift+< makes There are five tab stops i.e, Left Tab, Center
it smaller in size. Tab, Right Tab, Decimal Tab, and Bar Tab.
Font size is the size of text. The maximum font Portrait and Landscape options are available in
size is 1638 points and the minimum font size Orientation category of Page Setup. Portrait is
is 1 point. the default orientation.
Keeping Ctrl key pressed and then hitting To insert links quickly just press ctrl+K and type
backspace key deletes the whole word. the URL in the address field.
To apply a format just copy the format by Header and Footer option is used to display
selecting the piece of text and then clicking on information such as title and page number of
format painter. After that, just select another thedocument.
piece of text on which you want to apply the Drop Cap: A drop cap is a large capital letter at
format. the beginning of a text block that has the
Select any sentence and press Shift+F3 to depth of two or more lines of regular text. The
change the sentence to lower, upper or capital default number of lines to drop for drop cap is
case. 3 lines. The maximum number of lines to drop
To write on any place in Microsoft window just for drop cap is 10 lines.
Double click on that location. Auto Correct in word automatically corrects
To remove the formatting quickly, just select certain spelling, typing, and capitalization or
that piece of text and then CTRL + Space key. grammarerrors.
The fastest method to cut and paste is not Thesaurus is used for finding a synonym for
CTRL + X and CTRL + V . Just select any piece of aword in the document.
text and press F2. Now, click on that location Margins can be four type viz. left, right, top
and then hit enter , paste that piece of text. and bottom.
Subscripts are the letters or digits shown a Find and replace: This feature allows flexibility
little below the normal line.(Ctrl+=) and comfort to the user to replace a text with a
Superscripts are the letters or digits that are substituted text at all places.
shown a little above the normal line. Tables can be inserted in a Word document
(Ctrl+Shift+=) through Table command from the ribbon and
27 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
can be manipulated through the table drop JSP - Java Server Page
menu. The maximum column is 63. VBS - Visual Basic Scripting Language
To Delete table , select the table and press the JS - Java Script
Backspace key.
Images can be add visual interest to
Computer Media Related Terms
documents.
WordArt: A word processing tool, which 3GP - 3rd Generation Protocol
includes predefined and pre-decorated test 3GPP - 3rd Generation Partnership Project
that can be added to a document for AAC - Advanced Audio Codec
enhancing its appearance. You can also AC3 - Dolby Digital Sound File
customize the font size and font colour of the AIFF - Audio Interchange File Format
WordArt. AMR - Adoptive Multi Rate
To Insert Page Break by pressing Ctrl+Enter
AWB - Adoptive Multi Rate Wideband
Key and to delete any page break by selecting
the page break, and then pressing the Delete AVI - Audio Video Interleaved
key. CDA - Compact Disk Audio
Mail-Merge Word provides a mail-merge of DLL - Dynamik Link Library
addresses of a large number of recipients with DVD - Digital Versatile Disk
a common text document. EXE - Executable Format
Switching Views of document in a variety of FLAC - Free Lossless Audio Codec
views, read mode, print layout, web layout,
FLV - Flash Live Video
outline, draft.
JPEG - Joint Photographic Expert Group
ABBREVIATION BMP - Bitmap
PC - Personal Computer GIF - Graphic Interchange Format
COMPUTER - Commonly Operating Machine JAD - Java Application Development
Particularly Used for Technology Entertainment and JAR - Java Archive
Research MIDI - Musical Instrument Digital Interface
MMF - Music Mobile Format
Computer Language Related Terms MP2 - MPEG Audio Layer 2
HTML - Hyper Text Markup Language MP3 - MPEG Audio Layer 3
AJAX - Asynchronous Java script and XML MP4 - MPEG Audio Layer 4
ORACLE - Oak Ridge Automatic Computer and Logical MPEG - Motion Picture Experts Group
Engine PDF - Portable Document Format
RDBMS - Relational Database Management System PNG - Portable Network/New Graphics
SQL - Structured Query Language RM - Real Media
XML - Extensible Markup Language SIS - Symbian Installation Source
PERL - Practical Extraction and Report Language SWF - Shock Wave Flash
PHP - Hypertext Preprocessor ZIP - Zone Improvement Plan
ASP - Active Server Pages VCD - Video Compact Disk
API - Application Programming Interfaces VOB - Video Object
XHTML - Extensible Hypertext Markup Language WAV - Waveform PCM Audio
CSS - Cascading Style Sheets M3G - Mobile 3D Graphics
ASCII - American Standard Code for Information M4A - MPEG – 4 Audio File
Interchange XMF - Extensible Music File
XSL - Extensible Style Sheet Language WBMP - Wireless Bitmap Image
J2EE - Java 2 Platform Enterprise Edition DVX - DIVX Video
28 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
WML - Wireless Markup Language CPU - Central Processing Unit
CD - Compact Disk RAM - Random Access Memory
CRT - Cathode Ray Tube ROM - Read Only Memory
DAT - Digital Audio Tape PROM - Programmable Read Only Memory
DOS - Disk Operating System HDD - Hard Disk Drive
GUI - Graphical User Interface FDD -Floppy Disk Drive
KBD - Key Board
Internet Related Terms I/O - Input Output
HTTP - Hyper Text Transfer Protocol SMP -S Switch Mode Power Supply
HTTPS - Hyper Text Transfer Protocol Secure POST - Power ON Self-Test
IP - Internet Protocol BIOS - Basic Input Output System
ISP - Internet Service Provider VDU -Visible Display Unit
TCP - Transmission Control Protocol LED -Light Emitting Diode
UPS - Uninterruptible Power Supply LCD - Liquid Crystal Display
VHF - Very High Frequency VGA - Video/Visual Graphic Adapter
UHF - Ultra-High Frequency LAN - Local Area Network
ALU - Arithmetic Logic Unit WAN - Wide Area Network
URL - Uniform Resource Locator MAN - Metropolitan Area Network
HLL - High Level Language
WINDOWS – Wide Interactive Network Development LLL - Low Level Language
for Office Work Solution MIPS - Millions of Instruction Per Second
AMD - Advance Micro Device Mbps - Mega Bytes Per Second
ASPI - Advance SCSI Programming Interface Kbps - Kilo Bytes Per Second
ASIC - Application Specific Integrated Circuit CMD - Command
EPROM - Erasable Programmable Read Only Memory KB - Kilo Byte
FPS - Frame Per Second MB - Mega Byte
USB - Universal Serial Bus GB - Giga Byte
VIRUS - Vital Information Resource Under Seized TB - Tera Byte
RAM -Random Access Memory TiB - Tebi Byte
ROM - Read Only Memory PB - Peta Byte
MIME - Multipurpose Internet Mail Extensions PiB - Pebi Byte
SMTP - Simple Mail Transfer Protocol EB - Exa Byte
IMAP - Internet Message Access Protocol EiB - Exbi Byte
HSDPA - High Speed Downlink Packet Access ZB - Zetta Byte
EDGE - Enhanced Data Rate for GSM Evolution ZiB - Zebi Byte
GPRS - General Packet Radio Service YB -Yotta Byte
3G - 3rd General YiB - Yobi Byte
GSM - Global System for Mobile Communication NTFS - New Technology File System
CDMA - Code Division Multiple Access FAT - File Allocation Table
UMTS - Universal Mobile Telecommunication System DOC - Document
ARPANET - Advanced Research Project Agency TXT - Text
Network SD - Secure Digital
AM/FM - Amplitude/Frequency Modulation IT - Information Technology
WLAN - Wireless Local Area Network NET -Internet
29 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
AP - Access Point GBps - Gigabytes Per Second or Gigabits per Second
DNS - Domain Name System GDI - Graphical Device Interface
RSS - Really Simple Syndicatin MAC - Media Access Control
DMCA - Digital Millennium Copyright Act NAS -Network Attached Translation
IPV4 - Internet Protocol Version 4 NAT -Network Address Translation
IPV6 -Internet Protocol Version 6 NIC - Network Interface card
VOIP -Voice over Internet Protocol PCI - Peripheral Component Interconnected
SEO -Search Engine Optimization PDA - Personal Digital Assistant
1024 Bytes - 1 Kilo Byte (KB) PGA - Professional Graphics Array
1024 KB - 1 Mega Byte (MB) PLD - Programmable Logic Device
1024 MB -1 Giga Byte (GB) PSU -Power Supply Unit
1024 GB -1 Tera Byte (TB) RAID - Redundant Array of Inexpensive Disks
1024 TB - 1 Peta Byte (PB) SRAM - Static Random Access Memory
1024 PB -1 Exa Byte (EB) UART -Universal Asynchronous Receiver or Transmitter
1024 EB -1 Zetta Byte (ZB) UTP - Unshieled Twisted Pair
1024 ZB - 1 Yotta Byte (YB) VPN - Virtual Private Network
XGA - Extended Technology
Others XMS - Extended Memory Specification
ADSL - Asymmetric Digital Subscriber Line AAC - Advanced Audio Coding
AGP -Accelerated Graphics Port APT - Automatically Programmed Tooling
ALI -Acer Labs, Incorporated BCD - Binary Coded Decimal
AMD - Advanced Micro Devices BHTML - Broadcast Hyper Text Markup Language
APC - American Power Conversion B2B - Business to Business
AT -Advanced Technology B2C - Business to Consumer
ATI - ATI Technologies Inc. CADD - Computer Aided Design and Drafting
ATX - Advanced Technology Extended COBOL - Common Business Oriental Language
BIOS - Basic Input Output System CPI - Clock/Cycle Per Instruction
BNC - Barrel Nut Connector CUI -Character User Interface
CDRW - Compact Disk Rewriter DAT - Digital Audio Tap
CDR - Compact Disk Recorder DOS - Disk Operating System
CD – ROM -Compact Disk – Read Only Memory DOC - Data Optimizing Computer
CFM -Cubic Feet per Minute DDL - Data Definition Language
CMOS - Complementary Metal Oxide Semiconductor DNA - Distributed Internet Architecture
DDR - Double Data Rate Yahoo Yet Another Hierarchical Officious Oracle
DDR -SDRAM :Double Data Rate – Synchronous XML - Extensible Markup Language
dynamic Random Access Memory WMA - Windows Media Audio
DIMM -Dual Inline Memory Module WINS - Windows Internet Name Service
ECC - Error Collection Code WMV - Windows Media Video
EEPROM - Electrically Erasable Programmable Read VPN - Virtual Private Network
Only Memory WWW - World Wide Web
FDC - Floppy Disk Controller WORM - Write Application Protocol
FDD - Floppy Disk Drive VRML - Virtual Reality Modeling Language
FPU - Floating Point Unit UNIVAC - Universal Automatic Computer/Universal
FSAA - Full Screen Anti-Aliasing Non Integrated Vacuum Actuated
30 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Computer ^5 - high five
UMTS - Universal Mobile Telecommunication System AAS - alive and smiling
TAPI - Telephony Application Programming Interface BEG - big evil grin
BG - big grin
SMS - Short Message Service
GMTA - great minds think alike
SIU - Serial Interface Unit HHO 1/2 K - ha ha, only half kidding
SNOBOL - String Oriented Symbolic Language HTH - hope this(that) helps
SNAP - Sub Network Access Protocol JK - just kidding
RIP - Routing Information Protocol LOL - laughing out loud
PING - Packet Internet/Internetwork Groper MHOTY - my hat's off to you
PPP - Point to Point Protocol MTFBWU - may the force be with you
ROTFL - rolling on the floor laughing
OMR - Optical Mark Reader/Recognition
RUOK - Are you okay?
ISP - Internet Service Provider T+ - think positive
FPS -Frame per Second TIA - thanks in advance
ENIAC - Electronics Numerical Integrator and Calculator WEG - wicked evil grin
EFS - Encrypted File System WTG - way to go
DOC -Data Optimizing Computer
General Email Abbreviations
Email Abbreviations
Shorthand email abbreviations are as versatile as their
To Tell Your Status full word counterparts. Let your friends know when
you’re coming, how you’re feeling, and what you’d like
to do with these abbreviations.
It takes time to type out a lengthy sentence to indicate
that you are pausing or ending the conversation.
Instead, you can do it succinctly with short 2nite - tonight
abbreviations. These abbreviations include: 411 - information
4ever - forever
ASAP - as soon as possible
ADBB - all done bye bye
AWHFY - Are we having fun yet?
BBL - be back later
AYPI - And your point is?
BBIAF - be back in a few
B4 - before
BBIAB - be back in a bit
DUR? - Do you remember?
BCNU - be seein' you
J4F - just for fun
BFN - bye for now
KISS - keep it simple, stupid
BRB - be right back
NFC - no further comment
CUL8R - see you Later
NRN - no reply necessary
L8R - later
NTM - not to mention
LTNS - long time no see
OBTW - oh, by the way
TAFN - that's all for now
P&C - private and confidential
TTFN - ta ta for now
P-ZA - pizza
TTYL - talk to you later
QL - quit laughing
WB - welcome back
RTM - read the manual
SITD - still in the dark
To Show Your Feelings
WFM - works for me
YYSSW - yeah yeah sure sure whatever
Sometimes, all it takes is a few characters to express ZZZ - sleeping, bored, tired
your emotions. You can agree, disagree, show
excitement, or display disgust with just two to four
letters. Some of these expressions include:
31 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Subject Line Abbreviations BTW - by the way
CC - carbon copy
Announcing the subject of your email is the perfect use COB - close of business (day)
of the subject line. Abbreviations help you save space EOD - end of day
and communicate quickly before your recipient even EOW - end of week
opens your message. They are usually a few letters and FWIW - for what it’s worth
a colon followed by your subject line. HTH - hope that helps
IMO - in my opinion
Some common subject line abbreviations include: LET - leaving early today
LMK - let me know
1L - one line LSFW - less safe for work
AR - action required MIA - missing in action
CTA - call to action NBD - next business day (or no big deal)
EOM - end of message (when the email body NNTR - no need to respond
does not contain text) NRN - no reply necessary
FAO - for the attention of NSFW - not safe for work
FW: or FWD - forwarded NWR - not work related
FYI - for your information OOO - out of the office
FYA - for your action (or for your attention) PFA - please find attachment
FYR - for your reference PRB - please reply by
LF - looking for PS - postscriptum (“written after” in Latin)
NB - nota bene (“note well” in Latin) PSA - please see attachment (or public service
NIM or NM - no internal message (in email announcement)
body) PYR - per your request
NNTO - no need to open RB - reply by
NONB - non-business RLB - read later
NYR - need your response RSVP - répondez s'il vous plaît (“Please respond
NYRT - need your response today as soon as possible” in French)
NYRT - need your response quickly SFW - safe for work
OT - off topic TL;DR - too long; didn’t read
QUE - question TLTR - too long to read
RE or Re - regarding TYT - take your time
RR - reply requested (or reply required) WFH - working from home
SSIA - subject says it all Y/N - yes or no
TBF - to be forwarded YTD - year to date
UDA - urgent document attached
VSRE - very short reply expected
#
WAS or Was - indicates that the message
“was” originally under another subject
32 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
6) The data are modified to specific code and protected
in the sender side while transferring, and the special
key is used to retrieve the original data in the receiver
side. What is the process used in receiver side to
retrieve the original data?
a) Decoding
b) Encoding
c) Encrypting
d) Decrypting
e) None of these
COMPUTER AWARENESS QUESTIONS MAINS IBPS
Computer Questions Asked in Previous Year IBPS RRB 7) What is the term used to denote the repetition of
PO/ Clerk Mains Exams data in DBMS?
1) In which one of the following errors are displayed a) Repeating
for every instruction? b) Restrict
a) Assembler c) Reappear
b) Both c and d d) Redundancy
c) Complier e) None of these
d) Interpreter
e) None of these 8) ____ is the most important/powerful computer in a
typical network.
2) What does dots per inch (DPI) measure? a) Network client
a) Number of bits b) Desktop
b) Density of the pixels on a computer screen c) Network station
c) The density of bits on a disk d) Network switch
d) Density of graphic files stored on a hard disk e) Network server
e) None of these
9) The Artificial satellite which revolves around the
3) What is the full form of ‘MAN’? earth and provide transmit information from earth is
a) Man Area Network basically called _____
b) Meter Area Network a) Geosynchronous satellites
c) Metropolitan Area Network b) Geostationary satellites
d) Manage Area Network c) Low Earth Orbits
e) Master Accesses Network d) Sun-Synchronous orbits
e) None of these
4) Which of the following is not a network protocol?
a) HTTP 10) What is the name of the portal in computer, which
b) FTP allow additional devices to connect?
c) SMTP a) Primary
d) HTML b) Secondary
e) None of these c) Peripheral
d) Optional
5) What is access time? e) None of these
a) It is the time taken by the memory to store or
retrieve a piece of data. 11) What is the short cut key to close currently opened
b) It is the number marked on all memory chips. document in Microsoft word?
c) It is the memory clock. a) Ctrl + W
d) It is the transaction period between the CPU and the b) Ctrl + D
memory c) Ctrl + T
e) None of these d) Ctrl + B
33 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these e) None of these
12) In the C coding ‘’ is used as a _ _ _ ___ _file. 19) Which of the following layer is responsible for
a) Subroutines converting electrical impulse to bit streams?
b) Footer a) Presentation
c) Header b) Physical
d) Increment c) Data link
e) None of these d) Network
e) None of these
13) Raw, unprocessed facts, including text, numbers,
images, and sounds, are called ______ 20) What is the maximum number, that each of the
a) Applets four parts of an IP Address can have?
b) Data a) 345
c) Metaware b) 255
d) Product c) 197
e) Script d) 301
e) 127
14) All of the following are TRUE of Safe Mode EXCEPT:
a) Safe Mode is a special diagnostic mode 21) Which of the following extension is used to save
b) Safe Mode loads all non-essential icons image in the computer?
c) Safe Mode allows users to troubleshoot errors. a) .cmd
d) Safe Mode loads only the most essential devices b) .xls
e) None of these c) .vlc
d) .jpeg
15) Changing the appearance of a document is called e) None of these
a) Proofing
b) Editing 22) Machine language sometimes also referred as:
c) Formatting a) Binary language
d) Correcting b) High level language
e) All of the above c) Middle level language
d) Low level language
16) You can detect spelling and grammar errors by: e) None of these
a) Press Shit + F7
b) Press Ctrl + F7 23) Which is an another name for functional language
c) Press Alt + F7 a) Machine
d) Press F7 b) Application
e) None of these c) Low-level language
d) High-level language
17) Which of the following is necessary to track e) None of these
computer, while connecting to Internet?
a) System Number 24) ……….translates the semantic instructions
b) Memory developed by programmers into the machine language
c) IP a) Assembler
d) VP b) Interpreter
e) DHCP c) Loader
d) Compiler
18) Which of following is not an example for simplex? e) None of these
a) Radio broadcasting
b) Television broadcasting 25) ‘Chrome’ is a ______ software
c) Speaker a) Operating System
d) Walkie-talkie b) Application
34 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) System e) None of these
d) Utility
e) None of these 32) Expand “MODEM”?
a) Modern development
26) SRAM retains data as long as power is provided to b) Medium Development
the memory chip and need not be refreshed c) Modulation and Demolition
periodically. What does ‘S’ represents? d) Modulation and Demodulation
a) Stagnant e) None of these
b) Storage
c) Simple 33) What is the short cut to justify the paragraph?
d) Static a) Ctrl + R
e) None of these b) Ctrl + J
c) Ctrl + U
27) The computer’s capability of distinguishing spoken d) Ctrl + E
words is called _________ e) Ctrl + P
a) Voice analysis
b) Speech acknowledgment 34) Which of the following is a non-volatile memory? a)
c) Speech interpretation RAM
d) Voice recognition b) ROM
e) Vocalization c) Cache
d) Primary
28) While working in mail we may came under the e) None of these
‘BCC’, what does B represents?
a) Blink 35) Which one of the following command is used to
b) Black display both query and output?
c) Blind a) List
d) Broad b) Select
e) None of these c) Describe
d) R
29) Deleted mails from the Inbox can be found e) None of these
in______
a) Trash 36) OSI is an ISO standard for worldwide
b) Spam communications that defines a networking framework
c) Promotions for implementing protocols. What does ‘O’ stands for?
d) All Mail a) Operation
e) None of these b) Open
c) Organisation
30) What is the components that are used in second d) Optical
generation computers? e) None of these
a) Vacuum tube
b) LSI 37) An operation in which data is moved to a different
c) Punch cards location is referred as _______.
d) Transistors a) Block move
e) None of these b) Street move
c) Delete
31) ………is an artificial language designed to d) Shift remove
communicate instructions to a computer e) None of these
a) Programming language
b) Machine Language 38) Which among the following is not an Object
c) Software Language Oriented Programming Language?
d) Assembly Language a) Python
35 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
b) C++ 44) What happens when you click on
c) Java insert>Picture>Clip Art
d) PASCAL a) It inserts a clipart picture into document
e) Ruby b) It lets you choose clipart to insert into document
c) It opens Clip Art taskbar
39) This is a standard way for a Web server to pass a d) It insets symbols
Web user’s request to an application program and to e) None of these
receive data back to forward to the user –
a) Interrupt request 45) Which one allows Movements in all directions (360
b) Forward DNS lookup degree)?
c) Data-Link layer a) Mouse
d) File Transfer Protocol b) Joystick
e) Common gateway interface c) Light pen
d) Track ball
40) This type of software is designed for users who e) None of these
want to customize the programs they use.
a) Shareware 46) _____ and _____ refers to the action of clicking
b) Open-source software and holding down the mouse button while moving the
c) Freeware mouse and realign it
d) Macros a) Drag, Click
e) None of these b) Drop, Drag
c) Drag, Drop
41) The effect of the ROLLBACK command in a d) Click, Right Click
transaction is the following_________ e) None of these
a) Undo all changes to the data-base resulting from the
execution of the transaction 47) File record length
b) Undo the effects of the last UPDATE command a) Should always be fixed
c) Restore the content of the database to its state at b) Should always be variable
the end of the previous day c) Depends upon the size of file
d) Make sure that all changes to the database are in d) Should be chosen to match the data characteristics.
effect e) None of these
e) None of these
48) Which one is used to open a document or
42) A(n) -----system is a small, wireless handheld program?
computer that scans an item’s tag and pulls up the a) Click
current price (and any special offers) as you shop. b) Double Click
a) PSS c) Right Click
b) POS d) Drag and Drop
c) Inventory e) None of these
d) data mining
e) None of these 49) ______is another pointing device which is an
alternative to a mouse
43) Single party disk relying on the disk controller for a) Track ball
finding out which disk has failed is used by b) Joystick
a) RAID level 5 c) Light pen
b) RAID level 2 d) Touch Screen
c) RAID level 4 e) None of these
d) RAID level 3 50) Laser printer can print ___ pages of text per minute
e) RAID level 1 and their resolution ranges from ______dpi
a) 5-25, 400-1300
b) 5-25, 400-1200
36 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) 5-24, 400-1200
d) 5-25, 500-1300 57) A pixel is_____
e) None of these a) Picture element or dot on a screen
b) Point of ink on a user printed paper
51) Electromagnetic printer can produce documents at c) Point of ink on a inkjet printed page
a speed of over _____ lines d) Light beam used in printing paper
a)10000 e) None of these
b) 20000
c) 30000 58) In which printers, Printing is achieved by deflecting
d) 40000 laser beam on to photosensitive surface of a drum?
e) None of these a) Dot Matrix
b) Daisy Wheel
52) The main computer in a network is called c) Laser printer
a) host processor d) Electromagnetic printer
b) front-end processor e) None
c) commentator
d) KIPS 59) First generation computer were based on?
e) None of these a) Vacuum tubes
b) ICs
53) Caps lock and Num lock Keys are called as ____ c) Transistors
keys d) Conductors
a) Ctrl e) None
b) Shift
c) Toggle 60) Which language is directly understood by the
d) Window computer without translation Program?
e)None of these a) Machine language
b) C# Language
54) If you change Windows 98 to Windows XP, you are c) High level language
actually performing? d) C language
a) Upstart e) None of these
b) Update
c) Upgrade 61) The speed of Which Generation Computer was in
d) Patch Pico Seconds?
e) None of these a) First
b) Second
55) Which one performs simply an informal way of c) Fourth
describing a program and it does not follow any Syntax d) Fifth
Strictly? e) None of these
a) Mnemonic
b) Opcode 62) JS kilby developed which chips?
c) Pseudocode a) Silicon
d) Operand b) Silica
e) None of these c) Integrated
d) Iron oxide
56) Which one is a typical rectangular shaped monitor e) None of these
that you see on a desktop computer?
a) CRT 63) First Super computer of World is_____
b) LCD a) PARAM
c) LED b) Siddhart
d) BIOS c) IBM -370
e) None of these d) CRAY-1
37 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these 70) Which one is an Optical disk storage medium
designed to recapture the data normally in DVD
64) Which one is example for Fifth Generation format?
computer? a) Compact Disk
a) DBMS b) Digital Video Disk
b) Distributed System c) Blue-ray Disk
c) Real time System d) Floppy Disk
d) Artificial Intelligence e) None of these
e) None of these
71) Who designed the first electronics computer-
65) Which Storage devices is used in Fourth Generation ENIAC?
Computer? a) Van Neuman
a) Magnetic drum b) Joseph M Jacquard
b) Magnetic core technology c) J presper Eckert and John W Mauchly
c) Semiconductor memory d) Both (a) and (b)
d) Primary Storage medium e) None of these
e) None of these
72) …………is a collection of web-pages and …………is the
66) PDP-8 is an example for Which Generation very first page that we see on opening of a website.
Computer? a) Home page, Web page
a) First b) Website, Home page
b) Second c) Web page, Home page
c) Third d) Web page, Website
d) Fourth e) None of these
e) Fifth
73) When we run program in HTML coding, ……..is used
67) Which Operating System is used in Third as backend and……….works as frontend.
Generation Computer? a) Notepad, Internet Explorer
a) Batch b) Notepad, MSN messenger
b) Time Sharing System c) MS Word, Internet Explorer
c) Real-Time System d) Both (a) and (c)
d) GUI Interface e) None of these
e) None of these
74) The main memory of a computer can also be
68) Programming Language introduced in Which called………….
Generation? a) primary storage
a) First b) internal memory
b) Second c) primary memory
c) Third d) all of these
d) Fourth e) None of these
e) Fifth
75) A GUI is
69) Which one is generally used in banks to process the a) hardware
Cheques? b) language interpreter
a) OMR c) software interface
b) MICR d) an operating system
c) OCR e) None of these
d) MIC
e) None of these 76) Which one holds a block of data that is read or
written at one time?
a) Data Transfer rate
38 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
b) Track
c) Sector 83) Which key must be Unique?
d) Hard disk a) Alternate
e) None of these b) Primary
c) Candidate
77) The rate at which data is written to disk or read d) Foreign
from disk is called as ____ e) None of these
a) Data Transfer rate
b) Track 84) _______ are the actual data contained in the
c) Sector database at a particular point of line
d) Hard disk a) Schema
e) None of these b) Data mining
c) Instances
78) Which one records data bits as tiny magnetic d) Information
spots? e) None of these
a) Data Transfer rate
b) Track 85) Dr EF Codd represented _____ rules for relational
c) Sector database management system (RDBMS) in 1970
d) Hard disk a) 9
e) None of these b) 12
c) 14
79) BIOS Stands for? d) 11
a) Basic Input Output Server e) None of these
b) Basic Input Output Storage
c) Basic Input Output System 86) A set of possible data values is called as _____
d) Basic Input Output Standard a) Tuple
e) None of these b) Attribute
c) Degree
80) Which one is used in a program to execute a d) Domain
particular set of statements repeatedly? e) None of these
a) Visual basic
b) Pseudocode 87) Which one defines how the data are actually stored
c) Condition and organised on the storage medium?
d) Looping a) Physical level
e) None of these b) Logical level
c) View level
81) Which works on the supply of Continuous electrical d) Conceptual level
pulses? e) None of these
a) Analog Computer
b) Digital Computer 88) Which one defines what type of data is stored in
c) Both a and b the database?
d) Super Compute a) Internal level
e) None of these b) Physical level
c) View level
82) The Characteristics of any entity are called it as d) Logical level
________ e) None of these
a) Attributes 89) A device needed to communicate with computers
b) Relationship using telephone lines is _____
c) Entity set a) Disk
d) Information b) CPU
e) None of these c) VDU
39 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
d) Modem 96) If configured correctly, the……….will prevent
e) None of these interaction with your computer after a specified time
period.
90) Which one of the following domain is used by Non- a) firewall
Profit Organisation? b) filter
a) .com c) screen saver
b) .gov d) popup blocker
c) .org e) None of these
d) .edu
e) None of these 97) What is the name of the series of Laptop
computers manufactured by IBM called?
91) In which one of the following errors are displayed a) LapPad
after entire program is checked? b) Vaio
a) Assembler c) Aptiva
b) Both C and D d) Thinkpad
c) Complier e) Notepad
d) Interpreter
e) None of these 98) Which one of the following command is used to
show only the last query?
92) A _____ generator is used to print files on paper a) List
a) Printer b) Select
b) Scanner c) Describe
c) Both A and B d) R
d) Report e) None of these
e) None of these
99) Which one is not a Necessary conditions for
93) If we want to eliminate the duplicate values than deadlock?
_____ keyword is also to be used a) Non pre-emptive
a) Values b) Preemptive
b) Groups c) Partial allocation
c) Distinct values d) Circular wait
d) Columns e) None of these
e) None of these 100) Which one is true about generation of
computers?
94) If we want to check the structure of the table____ a) The first generation (1942-1954)
Command is used b) The second generation of computer (1954- 1964)
a) List c) Third generation of computer (1965-71)
b) Select d) Fourth generation of computer (1975-1984)
c) Describe e) None of these
d) R
e) None of these SOLUTION WITH EXPLAINATION
1) Answer: (d) Interpreter -> Interpreter takes Single as
95) A…………’s main purpose is to prohibit unauthorized Input. -> No Intermediate Object Code is generated. -
access to your computer via the Internet. >Memory requirement is more. ->Errors are displayed
a) popup blocker for every instruction
b) firewall
c) spyware blocker 2) Answer: (b) In printing, DPI (dots per inch) refers to
d) spam assassin the output resolution of a printer or image setter, and
e) None of these PPI (pixels per inch) refers to the input resolution of a
photograph or image.
40 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
3) Answer: (c) A MAN (metropolitan area network) is a 17) Answer: (c) Internet Protocol (IP) is required to
larger network that usually covers certain area, village track computer while assessing Internet.
or several building.
18) Answer: (d) Simplex communication is a
4) Answer: (d) HTML (Hypertext Markup Language) is communication channel that sends information in one
the programming language. direction only. Walkie-talkie is example for Half Duplex,
in which transmission is possible in both direction. But
5) Answer: (a) only one direction transmission is possible in one time.
6) Answer: (d) Decryption is the process of 19) Answer: (b) OSI Model, Layer 1 conveys the bit
transforming data that has been rendered unreadable stream - electrical impulse, light or radio signal —
through encryption back to its unencrypted form. In through the network at the electrical and mechanical
decryption, the system extracts and converts the level. It provides the hardware means of sending and
garbled data and transforms it to texts and images that receiving data on a carrier, including defining cables,
are easily understandable not only by the reader but cards and physical aspects. Fast Ethernet, RS232, and
also by the system. Decryption may be accomplished ATM are protocols with physical layer components.
manually or automatically. It may also be performed 20) Answer: (b) All IP addresses are made up of four
with a set of keys or passwords. parts (quadrants) separated by dots, like this:
XXX.XXX.XXX.XXX where each XXX can be any number
7) Answer: (d) Repetition of data in the DBMS was between 0 and 255. Each of these numbers are stored
called as Data Redundancy. in 8 bits (binary digits), and the number of possibilities
you can have is 2 raised to the power of 8, which is 256
8) Answer: (e) Network server is the most (0-255).
important/Powerful computer in a typical network.
9) Answer: (b) The majority of communications 21) Answer: (d) The images in the computer are saved
satellites are in fact geostationary satellites. with the extension .jpeg
Geostationary satellites like geosynchronous satellites
take 24 hours to complete a rotation. However, 22) Answer: (a)
geostationary satellites are positioned directly over the
equator and their path follows the equatorial plane of 23) Answer: (b)
the Earth.
24) Answer: (a)
10) Answer: (c) A peripheral device connects to a
computer system to add functionality. Examples are a 25) Answer: (b) Chrome is the Application software.
mouse, keyboard, monitor, printer and scanner. That are used to perform specific task
11) Answer: (a) To close currently opened document in 26) Answer: (d) SRAM retains data as long as power is
Microsoft word → Ctrl + W provided to the memory chip and need not be
refreshed periodically. SRAM stands for Static Random
12) Answer: (c) ‘’ and ‘’ are used as a header file in C Access Memory.
program
27) Answer: (d) The computer’s capability of
13) Answer: (b) Raw, unprocessed facts, including text, distinguishing spoken words is called Voice recognition
numbers, images, and sounds, are called Data.
28) Answer: (c) BCC → Blind Carbon copy
14) Answer: (b)
29) Answer: (a) Trash will contain all the deleted mails
15) Answer: (c) for 30 days from deleting the documents.
41 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
31) Answer: (a) 50) Answer: (c) Laser printer can print 5-24 pages of
text per minute and their resolution ranges from 400-
32) Answer: (d) MODEM → Modulation and 1200 dpi.
Demodulation
51) Answer: (b) Electromagnetic printer can produce
33) Answer: (b) Ctrl + J → to justify the paragraph. documents at a speed of over 20000 lines (i.e) More
than250 pages per minute.
34) Answer: (b) ROM is the non-volatile memory.
35) Answer: (d) R command is used to display both 52) Answer : (a)
query and output.
53) Answer: (c) Caps lock and Num lock Keys are called
36) Answer: (b) OSI - Open Systems Interconnection as Toggle keys because when pressed, they toggle or
The Open System Interconnection (OSI) model defines change their status from one state to another state.
a networking framework to implement protocols in
seven layers. 54) Answer: (c) If you change Windows 98 to Windows
XP, you are actually performing upgrade.
37) Answer: (a) An operation in which data is moved to
a different location is referred as Block move. 55) Answer: (c) Pseudocode is not a programming
language, but simply an informal way of describing a
38) Answer: (d) Pascal is an imperative and procedural program and it does not follow any Syntax Strictly.
programming language, which Niklaus Wirth designed
in 1968–69 and published in 1970 56) Answer: (a) CRT (Cathode Ray Tube) is a typical
rectangular shaped monitor that you see on a desktop
39) Answer: (e) computer. It works by moving an electron beam back
and forth across the back of the screen.
40) Answer: (a)
57) Answer: (a) A pixel is Picture element or dot on a
41) Answer: (a) screen.
42) Answer: (a) 58) Answer: (c) In Laser printers, Printing is achieved by
deflecting laser beam on to photosensitive surface of a
43) Answer: (d) drum.
44) Answer: (c) 59) Answer: (a) First generation computer were based
on Vacuum tubes.
45) Answer: (b) Joystick allows Movements in all
directions (360 degree). 60) Answer: (a) Machine language is directly
understood by the computer without translation
46) Answer: (c) Drag and Drop refers to the action of Program.
clicking and holding down the mouse button while
moving the mouse and realign it. 61) Answer: (c) The speed of Fourth Generation
Computer was in Pico Seconds and Microprocessor is
47) Answer: (b) the main concept behind fourth generation of
computer.
48) Answer: (b) Double Click is used to open a
document or program. 62) Answer: (c) JS kilby developed Integrated chips.
49) Answer: (a) Track ball is another pointing device 63) Answer: (d) First Super computer of World is CRAY-
which is an alternative to a mouse. 1
42 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
64) Answer: (d) Artificial Intelligence is example for 80) Answer: (d) Looping is control structure which is
Fifth Generation computer. used in a program to execute a particular set of
statements repeatedly.
65) Answer: (c) Semiconductor memory and
Winchester disk Storage devices is used in Fourth 81) Answer: (a) An analog Computer that operates on
Generation Computer. data which is in the form of Continuous variable
physical quantities
66) Answer: (b) Second Generation Computer Example
→ PDP8, IBM1401 82) Answer: (a) The Characteristics of any entity are
called it as Attributes. Attributes are drawn in Elliptical
67) Answer: (c) Real-Time System Operating System is Shape. Symbol →
used in Third Generation Computer.
83) Answer: (b) Primary key must be Unique and it
68) Answer: (c) Programming Language introduced in should not accept Null values.
Third Generation Computer.
84) Answer: (c) Instances are the actual data contained
69) Answer: (b) MICR (Magnetic Ink Character in the database at a particular point of line.
Recognition) is generally used in banks to process the
Cheques for recognising the magnetic encoding 85) Answer: (b) Dr EF Codd represented 12 rules for
numbers printed at the Bottom of a Cheque. relational database management system (RDBMS) in
1970.
70) Answer: (c) Blue-ray Disk is an Optical disk storage
medium designed to recapture the data normally in 86) Answer: (d) A set of possible data values is called
DVD format and it contains 25 GB(23.31 GB) per layer as domain
space.
87) Answer: (a) Physical level defines how the data are
71) Answer: (a) actually stored and organised on the storage medium
72) Answer: (b) and it is also known as internal level.
73) Answer: (a)
88) Answer: (d) Logical level defines what type of data
74) Answer: (c) is stored in the database, the relationship among the
data without effecting to the physical level and it is
75) Answer: (c) also known as conceptual level.
76) Answer: (c) Sector holds a block of data that is read 89) Answer: (d) A device needed to communicate with
or written at one time. computers using telephone lines is Modem.
77) Answer: (a) The rate at which data is written to disk 90) Answer: (c) .org domain is used by Non-Profit
or read from disk is called as Data Transfer rate. Organisation.
78) Answer: (b) Track records data bits as tiny magnetic 91) Answer: (c) Compiler ->Computer takes entire
spots. program Interpreter takes single as Input. -
>Intermediate Object Code is generated. ->Memory
79) Answer: (c) BIOS (basic input/output system) are requirement is more. -> Errors are displayed after
the program a personal computer's microprocessor entire program is checked.
uses to get the computer system started after you turn
it on. It also manages data flow between the 92) Answer: (d) A Report generator is used to print files
computer's operating system and attached devices on paper.
such as the hard disk, video adapter, keyboard, mouse
and printer. 93) Answer: (c) ->If we want to count only distinct
values than the DISTINCT keyword is also to be used -
43 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
>Count function counts all the not null values in the 4) If all the Network components are connected to the
specific column. same cable, then the certain topology is c alled ____.
a) Star
94) Answer: (c) If we want to check the structure of the b) Ring
table Describe Command is used. c) Bus
d) Mesh
95) Answer: (b) e) Mixed
Answer: C
96) Answer: (c) All the components are connected in a common bus in
the Bus topology.
97) Answer: (b)
5) Which of the following part will hold many of the
98) Answer: (a) List command is used to show only the crucial components of a c omputer, including the
last query. central processing unit (CPU), memory and connectors
for input and output devices?
99) Answer: (b) Necessary conditions for deadlock are a) Holders
->Non pre-emptive ->circular wait ->Mutual exclusion - b) Mother Board
>partial allocation Computer Questions c) Main Board
d) System Board
100) Answer: (c) Third generation of computer (1965- e) Breadboard
71) .
Answer: B A motherboard is one of the most essential
EXPECTED QUESTIONS parts of a computer system. It holds together many of
1) Who is the founder of ‘WWW’? the crucial components of a computer, including the
a) Ajay V. Bhatt central processing unit (CPU), memory and connectors
b) Tim Berners-Lee for input and output devices.
c) Ericsson d) DARPA
e) None of these 6) Which of the following is not a Modifier Key?
Answer: B English Scientist Tim Berners-Lee invented a) Insert b) Shift c) Alt
the World Wide Web in 1989 d) Ctrl e) Fn
Answer: A Shift, Alt, Ctrl and Fn are the Modifier Key.
2) ___________ is a sequence of instructions designed
to direct the computer to perform certain functions. 7) Which of the following will translate higher level
a) Data language to lower level language?
b) Program a) Translator
c) Software b) Linker
d) Subroutines c) Converter
e) None of these d) Compiler
Answer: C Software is a sequence of instructions e) None of these
designed to direct the computer to perform certain Answer: D Compiler translates the program from high
functions. level language to machine language. It is very fast
because it converts the whole program into machine
3) Which of the following is not an Operating system? language.
a) Windows Vista
b) Ubuntu 8) 1024 TB is called as ____.
c) ARM a) 1024 KB
d) BeOS b) 1024 PB
e) None of these c) 1024 EB
Answer: B Windows Vista, ARM, BeOS and Unix are the d) 1024 GB
Operating system. e) None of these
Answer: B 1024 TB = 1024 PB (PB → Petabyte)
44 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
9) SRAM retains data as long as power is provided to 13) What is the term used to denote the repetition of
the memory chip and need not be refreshed data in DBMS?
periodically. What does ‘S’ represents? a) Repeating
a) Stagnant b) Restrict
b) Storage c) Reappear
c) Simple d) Redundancy
d) Static e) None of these
e) None of these Answer: D Repetition of data in the DBMS was called as
Answer: D SRAM retains data as long as power is Data Redundancy.
provided to the memory chip and need not be
refreshed periodically. SRAM stands for Static Random 14) ____ is the most important/powerful computer in a
Access Memory. typical network.
a) Network client
10) What is the full form of ‘MAN’? b) Desktop
a) Man Area Network c) Network station
b) Meter Area Network d) Network switch
c) Metropolitan Area Network e) Network server
d) Manage Area Network Answer: E Network server is the most
e) Master Accesses Network important/Powerful computer in a typical network.
Answer: C A MAN (metropolitan area network) is a
larger network that usually covers certain area, village 15) The Artificial satellite which revolves around the
or several building. earth and provide transmit information from earth is
11) Which of the following is not a network protocol? basically called _____
a) HTTP a) Geosynchronous satellites
b) FTP b) Geostationary satellites
c) SMTP c) Low Earth Orbits
d) HTML d) Sun-Synchronous orbits
e) None of these e) None of these Answer: B The majority of
Answer: D HTML (Hypertext Markup Language) is the communications satellites are in fact geostationary
programming language. satellites. Geostationary satellites like geosynchronous
satellites take 24 hours to complete a rotation.
12) The data are modified to specific code and However, geostationary satellites are positioned
protected in the sender side while transferring, and the directly over the equator and their path follows the
special key is used to retrieve the original data in the equatorial plane of the Earth.
receiver side. What is the process used in receiver side
to retrieve the original data? 16) What is the name of the portal in computer, which
a) Decoding allow additional devices to connect?
b) Encoding a) Primary
c) Encrypting b) Secondary
d) Decrypting c) Peripheral
e) None of these d) Optional
Answer: D Decryption is the process of transforming e) None of these Answer: C A peripheral device
data that has been rendered unreadable through connects to a computer system to add functionality.
encryption back to its unencrypted form. In decryption, Examples are a mouse, keyboard, monitor, printer and
the system extracts and converts the garbled data and scanner.
transforms it to texts and images that are easily
understandable not only by the reader but also by the 17) What is the short cut k ey to c lose currently
system. Decryption may be accomplished manually or opened document in Microsoft word?
automatically. It may also be performed with a set of a) Ctrl + W
keys or passwords. b) Ctrl + D
45 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Ctrl + T provides the hardware means of sending and receiving
d) Ctrl + B data on a carrier, including defining cables, cards and
e) None of these physical aspects. Fast Ethernet, RS232, and ATM are
Answer: A To close currently opened document in protocols with physical layer components.
Microsoft word → Ctrl + W 18) In the C coding ‘’ is used
as a _______ file. a) Subroutines b) Footer c) Header d) 23) What is the maximum number, that each of the
Increment e) None of these Answer: C ‘’ and ‘’ are used four parts of an IP Address can have?
as a header file in C program a) 345 b) 255 c) 197
d) 301 e) 127
19) Raw, unprocessed facts, including text, numbers, Answer: B All IP addresses are made up of four parts
images, and sounds, are called ______ (quadrants) separated by dots, like this:
a) Applets XXX.XXX.XXX.XXX Where each XXX can be any number
b) Data between 0 and 255. Each of these numbers are stored
c) Metaware in 8 bits (binary digits), and the number of possibilities
d) Product you can have is 2 raised to the power of 8, which is 256
e) Script (0-255).
Answer: B Raw, unprocessed facts, including text,
numbers, images, and sounds, are called Data. 24) Which of the following extension is used to s ave
image in the computer?
20) Which of the following is necessary to track a) .cmd
computer, while connecting to Internet? b) .xls
a) System Number c) .vlc
b) Memory d) .jpeg
c) IP e) None of these
d) VP Answer: D The images in the computer are saved with
e) DHCP the extension .jpeg
Answer: C Internet Protocol (IP) is required to track
computer while assessing Internet. 25) ‘Chrome’ is a ______ software
a) Operating System
21) Which of following is not an example for simplex? b) Application c) System
a) Radio broadcasting d) Utility
b) Television broadcasting e) None of these
c) Speaker Answer: B Chrome is the Application software. That are
d) Walkie talkie used to perform specific task
e) None of these
Answer: D Simplex communication is a communication 26) The computer’s capability of distinguishing spoken
channel that sends information in one direction only. words is called _________
Walkie talkie is example for Half Duplex, in which a) Voice analysis
transmission is possible in both direction. But only one b) Speech acknowledgment
direction transmission is possible in One time. c) Speech interpretation
d) Voice recognition
22) Which of the following layer is responsible for e) Vocalisation
converting electrical impulse to bit streams? Answer: D The computer’s capability of distinguishing
a) Presentation spoken words is called Voice recognition
b) Physical
c) Data link 27) While working in mail we may came under the
d) Network ‘BCC’, what does B represents?
e) None of these a) Blink
Answer: B OSI Model, Layer 1 conveys the bit stream - b) Black
electrical impulse, light or radio signal — through the c) Blind
network at the electrical and mechanical level. It d) Broad
46 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these d) Shift remove
Answer: C BCC → Blind Carbon copy e) None of these
Answer: A An operation in which data is moved to a
28) Deleted mails from the Inbox can be found different location is referred as Block move.
in______
a) Trash 34) What does dots per inch (DPI) measure?
b) Spam a) Number of bits
c) Promotions b) Density of the pixels on a computer screen
d) All Mail c) The density of bits on a disk
e) None of these d) Density of graphic files stored on a hard disk
Answer: A Trash will contain all the deleted mails for e) None of these
30 days from deleting the documents. Answer: B In printing, DPI (dots per inch) refers to the
output resolution of a printer or image setter, and PPI
29) Expand “MODEM”? (pixels per inch) refers to the input resolution of a
a) Modern development photograph or image.
b) Medium Development
c) Modulation and Demolition 35) Which among the following is not an O bject
d) Modulation and Demodulation Oriented Programming Language?
e) None of these a) Python
Answer: D MODEM → Modulation and Demodulation b) C++
30) What is the short cut to justify the paragraph? c) Java
a) Ctrl + R b) Ctrl + J c) Ctrl + U d) PASCAL
d) Ctrl + E e) Ctrl + P e) Ruby
Answer: B Ctrl + J → to justify the paragraph. Answer: D Pascal is an imperative and procedural
programming language, which Niklaus Wirth designed
31) Which of the following is a non-volatile memory? in 1968–69 and published in 1970
a) RAM
b) ROM 36) What is the components that are used in second
c) Cache generation computers?
d) Primary a) Vacuum tube
e) None of these b) LSI
Answer: B ROM is the volatile memory. c) Punch cards
d) Transistors
32) OSI is an ISO standard for worldwide e) None of these
communications that defines a networking framework Answer: D Transistors are used in second generation
for implementing protocols. What does ‘O’ stands for? computers.
a) Operation
b) Open 37) While searching the information in Internet, we
c) Organisation may came to notice ‘HTTPS’ what does ‘S’ represents?
d) Optical a) Secure
e) None of these b) Storage
Answer: B OSI - Open Systems Interconnection The c) System
Open System Interconnection (OSI) model defines a d) Secrete
networking framework to implement protocols in e) None of these
seven layers. Answer: A HTTPS → Hypertext Transfer Protocol (HTTP)
Secure for secure communication over a computer
33) An operation in which data is moved to a different network
location is referred as _______.
a) Block move 38) How was multiplication process occurring in ALU?
b) Street move a) Repeated Addition
c) Delete b) Repeated Squaring
47 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Repeated Subtraction a) Oxford University
d) Repeated Division b) Stanford University
e) Repeated Cubing c) ETH Zurich
Answer: A Multiplication is the repeated Addition. d) University of Manchester
e) Harvard University
39) What is the name of the first invented digital Answer: D Second generation computer was built at
computer? university of Manchester.
a) EDVAC
b) ENIAC 44) ASCII is the character encoding standard for
c) Super Computer electronic communication. What does ‘II’ represents?
d) Calculator a) International Internship
e) None of these b) International Information
Answer: B ENIAC was the first digital computer and it c) Information Interchange
was invented by J.Presper Eckert and John Mauchly at d) Input International
the University of Pennsylvania and began construction e) None of these
in 1943. Answer: C ASCII → American Standard Code for
Information Interchange
40) Which of the following is the Universal gate?
a) NOT 45) The UNIX, which command is used to display the
b) AND message or value of any variable on the screen.
c) OR a) Char
d) NOR b) Info
e) EXOR c) Ping
Answer: D NAND and NOR gates are the universal d) Echo
gates, Since it is the combination of all three major e) None of these
gates AND, OR and NOT. Answer: D ECHO is a command typically used in shell
scripts and batch files to output status text to the
41) A program designed to destroy data on y our screen or a file, or as a source part of a pipeline
computer which can transfer to other computers and
infect data is called a ______ 46) Each boxes in the spread s heet are named as
a) Virus _____
b) Infector a) Row
c) File b) Column
d) App c) Sheet
e) None of these d) Blank
Answer: A A computer virus is a type of malicious e) Cell
software that, when executed, replicates itself by Answer: E Each boxes in the spread sheets are named
modifying other computer programs and inserting its as Cell
own code.
47) Each page in the Microsoft power point are named
42) Which of the part of a computer that co-ordinates as ________
all its functions is called ____________. a) Document
a) ALU b) Page
b) Mother Board c) Sheet
c) Storage d) Control Unit d) Slide
e) None of these e) None of these
Answer: D Control unit can process and control all the Answer: D Each page in power point is named as slide
data.
48) Which are the following keys are used to runs a
43) The second generation computer which was built Thesaurus check on the selected word?
by transistors was built by ________________. a) Shift + A
48 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
b) Shift + Y a) EDVAC
c) Shift + F7 b) ENIAC
d) Shift + F3 c) PC
e) None of these d) Colossus
Answer: C Shift + F7 is the key to run a thesaurus check e) None of these
on the selected word. Answer: D Colossus was the world's first electronic
digital programmable computer. It used a large
49) A computer cannot "boot" if it does not have the number of valves (vacuum tubes) It had paper-tape
______________. input and was capable of being configured to perform
a) Output device a variety of Boolean logical operations on its data, but
b) Input device it was not Turing-complete.
c) Operating system
d) Application 54) Coded entries which are used to access to a system
e) Specific software are called _____________.
Answer: C The computer cannot boot without a) Decrypt Key
Operating system b) Password
c) Source code
50) Which of the following is not a error in C d) Folder name
programming? e) None of these
a) Syntax error Answer: B The coded entries are Password which was
b) Runtime error used to access system
c) Logic error 55) The processing speed of the computer is depends
d) Semantic error on_____
e) Server error a) Power supply
Answer: E Sever error is not in C programming b) Clock pulse
c) Peripheral interfaces
51) Extensible Markup Language (XML) is a simple, very d) Transmission size
flexible text format, Which is derived from _______. e) All the Above
a) HTML Answer: B The clock pulse producing inside the
b) ETML computer is the major responsible for the speed of the
c) STML computer.
d) SGML
e) None of these 56) Instruction in computer languages consists of
Answer: D Extensible Markup Language (XML) is a ___________.
simple, very flexible text format derived from SGML a) OPCODE
(Standard Generalized Markup Language). b) OPERAND
c) Source code
52) ________ is software which has its source code d) Open source
freely available for use, viewing, m odification, and e) Either A or B
redistribution. Answer: E Instruction in computer languages consists
a) Source code of OPCODE and OPERAND
b) Free code
c) Open source 57) If in a c omputer, 16 bits are used to specify
d) Free Software address in a RAM, the number of addresses w ill be
e) None of these __________ bits
Answer: C Open Source is software which has its a) 216 b) 64K c) 65536
source code freely available for use, viewing, d) 1028 e) None of these
modification, and redistribution. Answer: C If in a computer, 16 bits are used to specify
address in a RAM, the number of addresses will be
53) Which of the following w as the world's first 65536 bits
electronic programmable computing device?
49 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
58) FORTRAN programming language is more suitable c) Meter per second
for ____ d) Bits per second
a) Business Application e) None of these
b) Marketing Application Answer: B The Speed of the Tape can be measured in
c) Scientific Application Inch per second
d) Social Application
e) None of these 64) Accessing the information in once computer,
Answer: C FORTRAN programming language is more without their knowledge is known as _____
suitable for Scientific Application. a) Tracking
b) Hacking
59) EEPROM stands for ______________ c) Routing
a) Electrically Erasable Programmable Read Only d) Coping
Memory e) None of these
b) Electronic Erasable Programmable Read Only Answer: B Accessing the information in once computer,
Memory without their knowledge is known as Hacking.
c) Easily Erasable Programmable Read Only Memory
d) Ever Non Erasable Programmable Read Only 65) What is the difference between a CD-ROM and a
Memory CD-RW?
e) None of these Answer: A EEPROM → Electrically a) They are the same –just two different terms used by
Erasable Programmable Read Only Memory different manufactures
60) The speed of the data transmission in the networks b) A CD-ROM can be written to and a CDRW cannot
is calculated by ________. c) A CD-RW can be written to but a CDROM can only be
a) Bits/Sec read from
b) GB/hr d) A CD-ROM holds more information than a CD-RW e)
c) Nipple/Sec None of these
d) MB/sec Answer: C CD-ROM →Can only read CD – RW→ can
e) None of these read and write.
Answer: A The speed of the data transmission are
mainly calculated by Bits/sec 66) The scanner can scan a document or image by
______.
61) Find out who is not the inventor of transistors a) Document by Document
among following names b) Line by line
a) John Burdeen c) Pixel by Pixel
b) William Shockley d) Paragraph by Paragraph
c) Walter Brattain e) None of these
d) Lee de Forest Answer: C The scanner can scan a document or image
e) All the above by Pixels by Pixels.
Answer: D Lee de Forest is the father of Radio.
67) If each and every system in the networks are
62) Which of the following order is definitely true, connected together then such a topology are kwon as
based on the distance coverage of the network? _______.
a) MAN > LAN > WAN a) Star b) Bus c) Ring
b) MAN > WAN > LAN d) Mesh e) Mixed
c) WAN > LAN > MAN Answer: A In Star topology every system are connected
d) WAN > MAN > LAN together.
e) None of these
Answer: D WAN (Country) > MAN (City) > LAN (100m) 68) In excel, chats are created using which option
a) Chart wizard
63) Tape speed can be measured in __________ b) Pie chart
a) Feet per second c) Pivot table
b) Inch per second d) Bar chart
50 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these 73) Firewall is used in communication network system
Answer: A The Chat can be created in the excel by to save ______.
using chart wizard a) Unauthorized attack
b) Virus attack
69) Rules for exchanging data between computers are c) Data driven attack
called __________ d) Fire attack
a) Procedures e) None of these
b) Protocols Answer: A Firewall is used to protect system from
c) Hyperlink unauthorized attack.
d) Programs
e) None of these 74) The ___________ folder retains copies of messages
Answer: B Protocols are the rules for exchanging data that you have s tarted but are not yet ready to send.
between computers. a) Inbox
b) Send mail
70) The Software tools that enable a user to interact c) Trash
with a computer for specific purposes are known as d) Spam
______________. e) Outbox
a) Hardware Answer: E The Outbox folder retains copies of
b) Networked Software messages, which are not sent
c) Shareware
d) Applications 75) Which of the following layer is the third layer of OSI
e) None of these layer?
Answer: D The Software tools that enable a user to a) Physical
interact with a computer for specific purposes are b) Application
known as Application. c) Presentation
d) Network
71) A program which helps create written documents e) Transport
and lets you go back and make necessary corrections is Answer: D Network layer is the third layer of OSI layer.
_________.
a) Spread sheet 76) Which ports connect s pecial types of music
b) Personal writer instruments to sound cards?
c) Word printer a) BUS b) UPS c) USB
d) Word processor d) MINI e) MIDI
e) None of these Answer: E MIDI (Musical Instrument Digital Interface) is
Answer: D A program which helps create written a protocol designed for recording and playing back
documents and lets you go back and make necessary music on digital synthesizers that is supported by many
corrections is Word processor makes of personal computer sound cards
72) When a file contains instructions that can be 77) Expand ERP?
carried out by the computer, it is often called a(n) a) Enterprise Retirement Planning
__________ file. b) Enterprise Relationship Planning
a) Data c) Enterprise Resource Planning
b) Information d) Enterprise Reorder Planning
c) Executable e) Enterprise Retention Planning
d) Application Answer: C Enterprise resource planning (ERP) is
e) Assembly business process management software that allows an
Answer: C When a file contains instructions that can be organization to use a system of integrated applications
carried out by the computer, it is often called a(n) to manage the business and automate many back
executable file office functions related to technology, services and
human resources.
51 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
78) Which of the following gate will person addition d) Model design
operation? e) None of these
a) AND b) OR c) NOR Answer: C Modulation demodulation is the
d) NOT e) EXOR abbreviation for MODEM.
Answer: B OR operation will perform Addition
operation. 84) While studying about networking we may came
across the term UDP. What does D stands for?
79) While studying networking we may come across a) Data
the term ‘TCP’. What does T represent? b) Description
a) Transistor c) Datagram
b) Transfer d) Development
c) Transmission e) None of these
d) Travel
e) Traffic Answer: C UDP → User Datagram Protocol
Answer: C TCP → Transmission control protocol. 85) The computer is manipulating data in m any ways,
and this manipulating is called ________
80) A ________ computer is a large and expensive a) Batching
computer capable of simultaneously processing data b) Processing
for hundreds or thousands for users. c) Utilizing
a) Server d) Upgrading
b) Mainframe e) Separating
c) Desktop Answer: B The computer is manipulating data in many
d) Tablet ways, and this manipulating is called processing.
e) None of these
Answer: B A mainframe computer is a large and 86) In which part of the computer, does the data is
expensive computer capable of simultaneously stored before entering in to CPU from the Main
processing data for hundreds or thousands for users. memory?
a) External hard disk
81) What is the short cut key to go to the file menu b) Secondary memory
option in current program? c) Cache memory
a) Alt + W d) In CPU
b) Ctrl + F e) None of these
c) Alt + F Answer: C The data is stored in Cache memory, before
d) Ctrl + W entering in to CPU from the Main memory.
e) None of these
Answer: C Alt + F is the short cut key to go to the file 87) The electronic path, that connect one part of
menu option in current program computer to another is _____
a) Serial Port
82) What is the extension used in executable file? b) Parallel Port
a) .txt c) Logical gate
b) .ppl d) Bus
c) .pdf e) Terminal
d) .exe Answer: D The electronic path, that connect one part
e) None of these of computer to another is called Bus
Answer: D The executable files can be scored in the
format .exe. 88) In the data flow diagram w e may came across the
symbol What does the symbol represents?
83) What is the full form for MODEM? a) Process
a) Modern determination b) Decision
b) Module demolition c) Terminal
c) Modulation demodulation d) Start
52 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) Data flow 94) ______ type of program controls the various
Answer: B It represents the decision making symbol. computer parts and allows the user to interact with the
computer
89) While studying DBMS, we many came across the a) Application Software
term SQL, What does ‘S’ represents? b) Utility software
a) Study c) Middleware
b) Sequence d) System software
c) Steady e) None of these
d) Structured Answer: B Utility software is type of program controls
e) None of these the various computer parts and allows the user to
Answer: D SQL → Structured Query Language interact with the computer
90) ‘COBOL ’ is one of the high level programming 95) The process is to check and ensure the components
language, What does B represents? of the computer are operating and connected properly
a) Business is known as ______
b) Buyer a) Repairing
c) Backend b) Checking
d) Busy c) Paring
e) None of these d) Booting
Answer: A COBOL → Common Business Oriented e) None of these
Language. It is the primary domain in business, finance Answer: D Booting is the process to check and ensure
and administration. the components of the computer are operating and
connected properly
91) Which of the following gates is called as Inverse
gate? 96) Which of the following operating system is not
a) EXOR licensed by any company?
b) EXNOR a) Windows
c) NOR b) Apple
d) NOT c) UNIX
e) None of these d) LINUX
Answer: D NOT gate is also called as Inverse gate. e) None of these
Answer: C UNIX is not owned and licensed by a
92) Arranging the data in sequence i s k nown as _____ company
a) Processing
b) Sorting 97) Underlined text, such as text and folder names is
c) Lining referred to as a
d) Ordering a) Icon
e) None of these b) Storage
Answer: B The Arranging the data in sequence is c) Source
known as sorting d) Hyperlink
e) None of these
93) In the 4g connection we m ay study about the term Answer: D Underlined text, such as text and folder
‘LTE’ what does T represents? names is referred to as a Hyperlink
a) Transmission
b) Transfer 98) ______ refers to the unauthorized copying and
c) Term distribution of software.
d) Trans a) Hacking
e) None of these b) Manipulating
Answer: C LTE → Long term evolution c) Software Integrity
d) Software Piracy
e) None of these
53 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: D Software piracy is the stealing of legally period of time. The purpose of an email bomb is
protected software. Under copyright law, software typically to overflow a user's inbox.
piracy occurs when copyright protected software is
copied, distributed, modified or sold. Software piracy is 103) Which button is called as middle button used as
considered direct copyright infringement when it third mouse button by pressing on it.
denies copyright holders due compensation for use of a) Right button
their creative works. b) Scroll wheel
c) Select
99) The process of transferring documents, graphics, d) Cursor
and other objects from your computer to a server on e) None of these
the Internet is called _________ Answer: B Scroll wheel is called as middle button used
a) Downloading as third mouse button by pressing on it.
b) Buffering
c) Streaming 104) ICANN is the non-profit corporation, w hich is
d) Uploading responsible for allocation of IP address and managing
e) None of these the domain name. What does A represents?
Answer: D The process of transferring documents, a) Assigned
graphics, and other objects from your computer to a b) Assisted
server on the Internet is called uploading c) Aided
d) Adopted
100) The most Powerful keys that let y ou exit a e) None of these
program when pushed Answer: A ICANN → Internet Corporation for Assigned
a) Ctrl Names and Numbers
b) Alt
c) Esc 105) __________is a type of denial of service (DoS)
d) Caps lock attack that sends a series of “SYN” messages to a
e) None of these computer, such as a web server.
Answer: C The Escape Key is the most powerful key, a) SYN source
which will exit a program b) TCP RST
c) TCP SYN
101) Which one of the following error w ill not be d) SYN flood
handle by the operating system? e) None of these
a) Power failure Answer: D A SYN flood is a form of denial-of-service
b) Lack of paper in Printer attack in which an attacker sends a succession of SYN
c) Failure of Network requests to a target's system in an attempt to consume
d) The Virus attack enough server resources to make the system
e) None of these unresponsive to legitimate traffic.
Answer: D The error happened by the Virus attack
cannot be handled by the operating system. 106) To find a saved document in the computer’s
memory and bring it up on the screen to view _______.
102) ___________ is a malicious act in which a large a) Reverse
number of email messages are sent to a single email b) Return
address in a short period of time. c) Retrieve
a) Sending d) Return
b) Copying e) None of these
c) E-Mail bomb Answer: C To find a saved document in the computer’s
d) Hacking memory and bring it up on the screen to view is known
e) None of these as Retrieve.
Answer: C An email bomb or "mail bomb" is a
malicious act in which a large number of email 107) Two different files can have the same name if
messages are sent to a single email address in a short _______________
54 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
a) They are in different folders Answer: B Presentation of a series of still images on a
b) They have same content projection screen or electronic display device is called
c) They have different content as Slide show
d) Never
e) None of these 112) ________ is an early packet switching network
Answer: A The two different files can be saved in the and the first network to implement the protocol suite
same name, if they are saved in different folders. a) CNNET
b) ARPANET
108) Application software enables the computer to c) ASAPNET
________. d) NSFNET
a) Produce some specific output for the users e) None of these
b) Can access whole system without the knowledge of Answer: B The Advanced Research Projects Agency
user. Network (ARPANET) was an early packet switching
c) Produce a set of programs network and the first network to implement the
d) Produce user-understandable programs protocol suite TCP/IP. Both technologies became the
e) All of the above technical foundation of the Internet.
Answer: A The application software has used to
produce some specific output. 113) Which is most common language used in w eb
designing?
109) How can a user determine what programs are a) C b) C++ c) PHP
available on a computer? d) HTML e) None of these
a) By checking the hard-disk properties Answer: D HTML (Hypertext Markup Language) is the
b) By viewing the installed programs during the standard markup language for creating web pages and
booting process web applications.
c) By checking the operating system for a list of
installed programs 114) Specialized program that allows user to utilize in
d) By checking the existing files saved on the disk specific application is classified as ______
e) None of these a) Application program
Answer: C The user can check the installed programs in b) Utility program
the operation system. c) System program
d) Logical program
110) The processing speed of the computer are e) None of these
depends upon _____
a) Input power Answer: A Specialized program that allows user to
b) Network connection utilize in specific application is classified as Application
c) Number of Peripherals program.
d) Clock pulse generating in the system 115) Which of the following is not a browser?
e) None of these a) Mozila
Answer: D The clock pulse generating in the system will b) Internet explore
determined the processing speed of the computer. c) Google
d) Chrome
111) Presentation of a series of s till images on a e) Opera Mini
projection screen or electronic display device is called Answer: C Google is the search engine it is not a
as _____ browser.
a) Video
b) Slide show 116) What is the shortcut k ey for s pell check in
c) Slide runner Microsoft word?
d) Movie clip a) F4 b) F7 c) F2 d) F5
e) None of these e) None of these
Answer: D Spell Check in Microsoft word can be done
by F5.
55 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: A ‘LTE’ → Long Term Evolution (LTE) is a 4G
117) Large transaction processing systems in wireless communications standard developed by the
automated organizations use ________. 3rd Generation Partnership Project (3GPP) that's
a) Online processing designed to provide up to 10x the speeds of 3G
b) Batch processing networks for mobile devices such as smartphones,
c) Once-a-day processing tablets, netbooks, notebooks and wireless hotspots.
d) End-of-day processing
e) Once-a-week processing 122) To access a m ainframe or s upercomputer, users
Answer: B In computing, batch processing refers to a often use a ___
computer working through a queue or batch of a) Desktop
separate jobs (programs) without manual intervention b) Terminal
(noninteractive). c) Node
d) HUB
118) Abacus was the first _________ e) None of these
a) Electronic computer Answer: B The user can assess the Mainframe or
b) Mechanical computer supercomputer from the Terminal.
c) Electronic calculator
d) Mechanical calculator 123) If you wanted to tell the database management
e) None of these system that a specific attribute contained numbers
Answer: D The abacus is a counting frame, is a only, what would you need to set?
calculating tool that was in use in Europe, China and a) Data category
Russia, centuries before the adoption of the written b) Data Manipulating
Hindu– Arabic numeral system c) Data Integrity
d) Data type
119) Which of the following letter is the w ild card, that e) None of these
stands in the place of a series of letters? Answer: D The specific attribute contained numbers
a) # only are called Data type.
b) *
c) % 124) What type of graphical model is used to define a
d) + database?
e) None of these a) Flow chart
Answer: B ‘*’ is the wild card letter in the program b) Bar chart
c) E-R diagram
120) Specialized program that assist users in locating d) Programming model
information of the web are called ____ e) None of these
a) Search engine Answer: C E-R diagram is used to define a database
b) Brower
c) Resource locater 125) Which of the following w ill converts all the source
d) Antivirus code into machine code, creating an executable file?
e) None of these a) Linker
Answer: A Specialized program that assist users in b) Compiler
locating information of the web are called Search c) Assembler
engine. d) Interrupter
e) None of these
121) While going through the 4G network, w e may Answer: B Compiler will converts all the source code
came across the term ‘LTE’. What does E represents? into machine code, creating an executable file
a) Evolution
b) Improved 126) To read the system messages and w arnings,
c) Envelop access in Windows, Which of the following files should
d) Enabled be checked?
e) None of these a) System manager
56 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
b) Even viewer
c) Control panel 131) In the mail transferring process, we may came
d) System message across the term ‘SMTP’. What does S represents?
e) None of these a) System
Answer: B In Even viewer, the user can read the system b) Smart
messages and warnings, access in Windows. c) Simple
d) Symmetric
127) A hacker that changes or forges information in an e) None of these
electronic resource is known as ________ Answer: C SMTP is known as Simple Mail Transfer
a) Terrorism Protocol. Simple Mail Transfer Protocol (SMTP) is an
b) Data diddling Internet standard for electronic mail (email)
c) Sniffing transmission.
d) Coping
e) None of these 132) What type of monitoring file is commonly used on
Answer: B A hacker will change or forge information in and accepted from Internet sites?
an electronic resource is known as Data diddling. a) Cookies
b) Blogs
128) A message with replies on a newsgroup is often c) Website
called a __________. d) Links
a) Post e) None of these
b) Reply Answer: A The type of monitoring file is commonly
c) Threads used on and accepted from Internet sites is known as
d) Command Cookies.
e) None of these
Answer: C A message with replies on a newsgroup is 133) When one computer provides services to another
often called as Threads computer, the environment is a(n) _____
infrastructure.
129) The program, which is used to gain administrative a) Master slave
rights to someone’s c omputer is known as ______. b) Client /server
a) Boot c) Domain
b) Rootkit d) Independent
c) Virus e) None of these
d) Executive Answer: B If one computer provides services to
e) None of these another computer, the environment is a(n) Client
Answer: B The program, which is used to gain /server infrastructure
administrative rights to someone’s computer is known
as Rootkit. 134) What type of technology scrambles the contents
of files sent via the Internet?
130) What type of technology allows you to verbally a) Encryption
speak with someone over the Internet? b) Encoding
a) Wiki c) Cryptography
b) Social Media d) Security code
c) VoIP e) None of these
d) Blog Answer: A The contents of files will be sent via internet
e) None of these after the files are encrypted by the process encryption.
Answer: C VoIP is short for Voice over Internet
Protocol. Voice over Internet Protocol is a category of 135) What term is used to identify people coming
hardware and software that enables people to use the together from various geographical locations to
Internet as the transmission medium for telephone complete some task?
calls by sending voice data in packets using IP rather a) Distributed team
than by traditional circuit transmissions of the PSTN. b) Internet
57 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Virtual team a) ROM
d) Similar team b) RAM
e) None of these c) ATM
Answer: C A virtual team (also known as a d) Machine
geographically dispersed team, distributed team, or e) None of these
remote team) usually refers to a group of individuals Answer: C ATM (Automatic Teller Machine) is example
who work together from different geographic locations for embedded system.
and rely on communication technology such as email,
FAX, and video or voice conferencing services in order 141) Formatting a disk results in _______
to collaborate. a) Saved to the disk
b) Copied from the disk
136) The computer cannot perform, without which of c) Deleted from the disk
the following? d) Arranging the data in the disk
a) Processor e) None of these
b) Monitor Answer: C Formatting the disk results in deleting the
c) Key board information from disk.
d) Storage
e) None of these 142) What does the company name 'AMD' stand for?
Answer: A The computer cannot perform without a) Always Making Dough
Processor. b) Advanced Micro Devices
137).Which of the following is a hoc query? c) Alternating Micron Deficiencies
a) Pre-planned question d) A Mac Device
b) Spur-of-the moment question e) None of these
c) Pre-scheduled question Answer: B AMD → Advanced Micro Devices is the
d) Question that will not return any results multinational semiconductor company.
e) None of these
Answer: B Spur-of-the moment question is a hoc 143) A computer cannot "boot" if it does not have the
query. a) Compiler
b) Loader
138) Which bus carries information between c) Assembler
processors and peripherals? d) Operating system
a) Address bus e) None of these
b) Control bus Answer: D The computer cannot boot the system, if it
c) Data bus do not have Operating system.
d) All of these
e) None of these 144) Which of the following is used to convert one type
Answer: A Address bus will carries information of number system in to the other form?
between processor and peripheral devices. a) Modifier
b) Translator
139) Which parts of the computer perform arithmetic c) Decoder
calculations? d) Adder
a) ALU e) None of these
b) Monitor Answer: C Decoder will convert one type of number
c) Register system into the another form of numbers
d) Bus
e) None of these 145) The utilized by the computer to process input and
Answer: A Arithmetic and Logical Unit will perform the provide output is known as ______.
arithmetic calculation in the computer. a) Delay time
b) Execution time
140) Which of the following is example for embedded c) Real time
system? d) Down time
58 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these
Answer: B The utilized by the computer to process 150) Which of the following is a general purpose
input and provide output is known as Execution time. application?
a) Application features.
146) If you wish to extend the length of the network b) Productivity programs
without having the signal degrade, you would use c) Multimedia programming
_______. d) Internet application
a) Switch e) None of these
b) Transmitter Answer: B Productivity program is a general purpose
c) Gateway application.
d) Repeater
e) None of these 151) Which of the following is the collection of related
Answer: D You wish to extend the length of the records?
network without having the signal degrade, you would a) Data b) File c) Multiple records
use Repeater. d) Table e) None of these
Answer: D Table is the collection of related record.
147) Optimized for dial-up connections over noisy
telephone lines, the oldest packet-switching protocol 152) A typical university or c orporate LAN that
for WAN usage, called _______________, is s till widely includes one or more servers and clients is c alled a
used. ____
a) Cat - 5 a) Master slave network
b) Cat- 6 b) Peer-to-peer
c) X.25 c) Client server network
d) Ethernet d) LAN
e) None of these e) None of these
Answer: C Optimized for dial-up connections over noisy Answer: C A typical university or corporate LAN that
telephone lines, the oldest packet-switching protocol includes one or more servers and clients is called a
for WAN usage, called X.25 is still widely used Client server network.
148) ADSL, SDSL, HDSL, and VDSL are examples of 153) Which of these is not a means of personal
different types of _____________. communication in Internet?
a) Ethernet a) Chat
b) Digital subscriber link b) Hangout
c) Modem d) Subscription c) Instant messaging
e) None of these d) Instanotes
Answer: B ADSL, SDSL, HDSL, and VDSL are examples of e) None of these
different types of Digital subscriber link. Answer: D Instanote is not a means of personal
communication in Internet.
149) A(n) ___________ is a system that includes the
collection of people, hardware, software, data records, 154) A detailed written description of the
and activities that process the data and information in programming cycle and the program, along with the
an organization. test results and a printout of the program is
a) Traditional organization structure called_______
b) Information system a) Reporting
c) Data mart b) Documentation
d) Information functional unit c) Output
e) None of these d) Special sheet
Answer: B A(n) information system is a system that e) None of these
includes the collection of people, hardware, software, Answer: B A detailed written description of the
data records, and activities that process the data and programming cycle and the program, along with the
information in an organization.
59 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
test results and a printout of the program is called c) webmail interface
Documentation. d) message board
e) None of these
155) To navigate to a new web page for which you Answer: C A(n) webmail interface allows you to access
know the URL, type that URL in the browser's _______ your email from anywhere
and press Enter
a) Name button 160) Which of the following document means the file is
b) Home transferred from another computer to your computer?
c) Address bar a) Uploading
d) Domain bar b) Downloading
e) None of these c) Accessing
Answer: C To navigate to a new web page for which d) Really Simple Syndication
you know the URL, type that URL in the browser's e) None of these
Address bar and press Enter Answer: D Really Simple Syndication means the file is
transferred from another computer to your computer
156) Computers use the ________ number system to
store data and perform calculations 161) LISP is designed for ____
a) Binary a) GUI b) AI c) CUI
b) Hexadecimal d) Transistor e) None of these
c) Octal Answer: B LISP is another language used for artificial
d) Decimal intelligence development. It is a family of computer
e) None of these programming language and is the second oldest
Answer: A Computers use the Binary number system to programming language after Fortran.
store data and perform calculations
162) Computer language used for scientific calculation
157) A directory within a directory is called is CALLED?
___________ a) FORTAN
a) Small directory b) LOGO
b) Sub directory C) BASIC
c) Grand directory D) PASCAL
d) Junior directory e) None of these
e) None of these Answer: A FORTRAN derived from Formula Translation
Answer: B A directory within a directory is called Sub is a general-purpose, compiled imperative
directory. programming language that is especially suited to
numeric computation and scientific computing.
158) _________ are specially designed computer chips
that reside inside other devices, such as your car or 163) Which one of the following shortcut key is used to
your electronic thermostat enter the current date?
a) Server a) Ctrl + Shift + ;
b) Embedded system b) Ctrl + ;
c) Client system c) Alt + Shift + D
d) Robotic application d) Alt + Shift + T
e) None of these e) None of these
Answer: B Embedded system are specially designed Answer: B To enter the current date -> Ctrl +;
computer chips that reside inside other devices, such
as your car or your electronic thermostat 164) Which one of the following takes entire program
and converts it into object code which is typically
159) A(n) _____ allows you to access your e-mail from stored in a file?
anywhere a) Complier
a) forum b) Converter
b) weblog c) Instructor
60 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
d) Interpreter
e) None of these 170) _______ is a computer program that enables a
Answer: A A compiler takes entire program and person to communicate with a computer through the
converts it into object code which is typically stored in use of symbols, visual metaphors and pointing device
a file. The object code is also refereed as binary code a) User interface
and can be directly executed by the machine after b) Graphical User interface
linking. Examples of compiled programming languages c) Character User interface
are C and C++. d) Ms-Dos
e) None of these
165) Which one of the following language is used to Answer: B Graphical User interface (GUI) is a computer
developing a games? program that enables a person to communicate with a
a) C b) C# c) SQL computer through the use of symbols, visual
d) Java e) None of these metaphors and pointing device.
Answer: D Java language is used to developing a
games. 171) _______ virus take up residence in the Computer
memory, making them hard to detect
166) Which one is used to Performs specific task? a) Worms
a) System Software b) Macro
b) Operating system c) Stealth
c) Application software d) Cluster
d) Presentation software e) None of these
e) None of these Answer: C Stealth virus take up residence in the
Answer: C Application software is used to Performs Computer memory, making them hard to detect.
specific task for computer users. Application software
also called as “The End-user Programs”. These 172) An operating System provides an interface
programs do the real work for user. between the computer user and the hardware?
a) User interface
167) The relationships between cells are called as b) Graphical User interface
_____ c) Character User interface
a) Tuple b) Field c) Record d) Ms-Dos
d) Formulas e) None of these e) None of these
Answer: D The relationships between cells are called as Answer: A An operating System provides an interface
Formulas. between the computer user and the hardware is
known as User interface.
168) In Spreadsheet, the names of the cells are called
as_________ 173) Which one is a system call of operating system
a) Fields b) Tuples c) Data and it is used to create a new process?
d) Labels e) None of these a) Shell b) Thread c) Fork
Answer: D In Spreadsheet, the names of the cells are d) Deadlock e) None of these
called as Labels. Answer: C Fork is a system call of operating system and
it is used to create a new process.
169) Which one brings you through the process of
creating a c hart by displaying a series of dialog boxes? 174) Which one does not allow Execution due to any
a) Chart area waiting event?
b) Chart title a) Shell b) Thread c) Fork
c) Chart wizard d) Deadlock e) None of these
d) Legend Answer: D A process which is not executing due to any
e) None of these waiting event is called as Deadlock.
Answer: C Chart wizard brings you through the process
of creating a chart by displaying a series of dialog
boxes.
61 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
175) _________ is a mechanism of interacting with a
computer system or software by typing commands to 180) Which one is used to insert an link?
perform specific tasks a) Ctrl+F
a) User interface b) Ctrl+Z
b) Graphical User interface c) Ctrl+N
c) Character User interface d) Ctrl+K
d) Ms-dos e) None of these
e) None of these Answer: D Ctrl+K is used to insert an link.
Answer: C Character User interface (CUI) is a
mechanism of interacting with a computer system or 181) ZIP stands for?
software by typing commands to perform specific a) Zone information process
tasks. b) Zone information protocol
c) Zone interface process
176) Which one is the capability of a computer under d) Zone interface protocol
which two or more programs can be simultaneously e) None of these
processed? Answer: B ZIP stands for Zone information protocol.
a) Multi programming This is an application that allows for the compression
b) Multi tasking of application files.
c) Multi processing
d) Time sharing 182) Which one is the exchange of data between two
e) None of these devices using some form of transmission media?
Answer: C Multi processing is the capability of a a) Networking
computer under which two or more programs can be b) Communication
simultaneously processed. c) Data communication
d) Information Passing
177) Which one Refers to the object that is being e) None of these
currently used or displayed on the desktop? Answer: C Data communication is the exchange of data
a) Working window between two devices using some form of transmission
b) Current window media.
c) Active window
d) Processing window 183) In which channel, both station can transmit and
e) None of these receive information Simultaneously?
Answer: C Active window refers to the object that is a) Simplex
being currently used or displayed on the desktop. b) Half duplex
c) Network
178) _____ provide a password to protect from d) Full duplex
unauthorized access e) None of these
a) Turn on Answer: D Full duplex channel, both station can
b) Log on transmit and receive information simultaneously.
c) Turn off
d) Log off 184) Which one is a wireless technology, used for
e) None of these exchanging data over short distances to create a
Answer: D Log off provide a password to protect from personal area network?
unauthorised access. a) Repeater
b) Bridge
179) The file format notepad file ____ c) Switch
a) .txt b) .doc c) .rtf d) Bluetooth
d) .wrd e) None of these e) None of these
Answer: A Notepad is a text editor. It is most Answer: D Bluetooth is a wireless technology, used for
commonly used for the edit or view text files. The file exchanging data over short distances to create a
format notepad file .txt ( text document). personal area network.
62 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
d) Hack bot
185) Which one is used to measure the speed of e) None of these
signaling and data transfer? Answer: B Time bomb is a piece of software, that is
a) Bandwidth used to the explodes at a particular time.
b) Baud rate
c) Throughput 190) _______ type of malware that is designed to gain
d) Bit rate administrative level control over a computer system
e) None of these without being detected
Answer: B Baud rate is used to measure the speed of a) Payloads
signalling and data transfer. b) Freeware
c) Root kits
186) Modem is a device that converts digital to analog d) Update
signal at _____ side and converts back analog to digital e) None of these
signal at ___ Side Answer: C Root kits is a type of malware that is
a) Receiver, sender designed to gain administrative level control over a
b) Receiver, client computer system without being detected.
c) Client, Sender
d) Sender, Receiver 191) Which one is used to insert the current date?
e) None of these a) Alt + Shift + S
Answer: D Modem is a device that converts digital to b) Alt + Shift + D
analog signal (Modulator) at Sender side and converts c) Alt + Shift + T
back analog to digital signal (Demodulator) at Receiver d) Alt + Shift + F
Side. A modem always placed between a telephone e) None of these
line and computer. Answer: B Alt + Shift + D is used to insert the current
date.
187) Which one prints the active documents?
a) Ctrl + D 192) _______ is the act of breaking in to computers
b) Ctrl + S a) Cracking
c) Ctrl + Shift + F12 b) Phishing
d) Ctrl +F2 c) Hacking
e) None of these d) Spam
Answer: C Ctrl + Shift + F12 Prints the active e) None of these
documents Answer: A Cracking is the act of breaking in to
computers and it is a popular, growing subject on the
188) Which one is a piece of software designed to fix internet. Cracking tools are widely distributed on the
problems with a computer program or its supporting internet.
data?
a) Patches 193) Which is a piece of code intentionally inserted in
b) Buffer to a computer’s memory that will set off a malicious
c) Gateway function when specified conditions are met?
d) Proxy server a) Proxy server
e) None of these b) Time bomb
Answer: A Patches one is a piece of software designed c) Logic bomb
to fix problems with a computer program or its d) Hack bot
supporting data. e) None of these
Answer: C Logic bomb is a piece of code intentionally
189) Which one is a piece of software, that is used to inserted in to a computer’s memory that will set off a
the explodes at a particular time? malicious function when specified conditions are met.
a) Proxy server
b) Time bomb
c) Logic bomb
63 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
194) ________ is the technique to access the Answer: D Adware term is sometimes used to refer the
unauthorised data without concerning to the software that displays unwanted advertisements.
authorised user
a) Cracking 199) Which one aligns the paragraph at both right and
b) Phishing left indent?
c) Masquerade a) Ctrl+R
d) Adware b) Ctrl+L
e) None of these c) Ctrl+J
Answer: C Masquerade is the technique to access the d) Ctrl+E
unauthorised data without concerning to the e) None of these
authorised user. It access the resources over the Answer: C Ctrl+J aligns the paragraph at both right and
network and it is also known as Spoofing. left indent.
195) Which one hide information or secret form? 200) Which one is used to insert the current time?
a) Steganography a) Alt + Shift + S
b) Cipher Text b) Alt + Shift + D
c) Cryptography c) Alt + Shift + T
d) Plain Text d) Alt + Shift + F
e) None of these e) None of these
Answer: C Cryptography is the science of writing Answer: C Alt + Shift + T is used to insert the current
information in a hidden or secret form and It protects Time.
the data in transmit and also the data stored on the
disk. 201) Which of the following people probably has the
196) ____ ensures that originators of messages cannot least amount of technical knowledge?
refuse they are not sender of the message? a) Programmer
a) Authentication b) Computer Operator
b) Integrity c) System analyst
c) Access control d) User
d) Non-Repudiation e) None of these
e) None of these Answer: D User will has least amount technical
Answer: D Non-Repudiation ensures that originators of knowledge.
messages cannot refuse they are not sender of the
message. 202) What key distinctly identifies a record in a
database table?
197) ____ converts plain text to cipher text and ____ a) Main Key
converts cipher text to plain text b) Major Key
a) Analog , Digital c) Principal Key
b) Digital, Analog d) Primary Key
c) Encryption, Decryption e) None of these
d) Decryption, Encryption Answer: D Primary key distinctly identifies a record in a
e) None of these database table
Answer: C Encryption converts plain text to cipher text
and Decryption converts cipher text to plain text. 203) Which of the following refers to a terminal
attached to a minicomputer or mainframe and used to
198) _____term is s ometimes used to refer the monitor the status of the system?
software that displays unwanted advertisements? a) Monitor
a) Cracking b) Mouse
b) Phishing c) Console
c) Masquerade d) Controller
d) Adware e) All of these
e) None of these
64 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: C Console is refers to a terminal attached to a c) Virtual storage
minicomputer or mainframe and used to monitor the d) Stimulated storage
status of the system e) None of these
Answer: C The technique that extends storage
204) Unauthorized access to restricted systems or capacities of main memory beyond the actual size of
resources is referred as __________ the main memory is called Virtual storage.
a) Pharming
b) Penetrating 209) A key that is used to alternate the input mode of a
c) Phishing group of keys on a keyboard is known as _____
d) Publishing a) Alpha Keys
e) None of these b) Toggle keys
Answer: B Unauthorized access to restricted systems or c) Numerical key
resources is referred as Penetrating d) Special key
e) None of these
205) Which is a special type of stored procedure that is Answer: B A key that is used to alternate the input
automatically invoked whenever the data in the table mode of a group of keys on a keyboard is known as
is modified? Toggle Key.
a) Tripped
b) Trigger 210) A program that generally has more user-friendly
c) Procedure interface than a DBMS is called a ______
d) Cursor a) Front end
e) None of these b) Back end
Answer: B Special type of stored procedure that is c) Tool bar
automatically invoked whenever the data in the table d) Form
is modified is known as Trigger. e) None of these
Answer: D A program that generally has more user-
206) A system call of OS which is used to c reate a new friendly interface than a DBMS is called a form.
process is known as __________.
a) Kernel 211) Multi user systems provided cost savings for small
b) Shell business because they use a single processing unit to
c) Fork link several ______
d) None of these a) Personal Computer
e) All of these b) Workstation
Answer: C A system call of OS which is used to create a c) Mainframes
new process is known as Fork. d) Dumb terminals
e) None of these
207) Which of the following is the seventh layer of OSI Answer: D Multi user systems provided cost savings for
layer? small business because they use a single processing
a) Physical Layer unit to link several Dumb terminals
b) Data link Layer
c) Application Layer 212) Which is a device designed to absorb and disperse
d) Session Layer heat away from a microprocessor?
e) None of these a) Heat sink
Answer: C Application Layer is the seventh layer of OSI b) Compiler
layer c) Motherboard
d) PCI
208) The technique that extends storage capacities of e) None of these
main memory beyond the actual size of the m ain Answer: A Heat sink is a device designed to absorb and
memory is called _______ disperse heat away from a microprocessor
a) Additional storage
b) Extra storage
65 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
213) A computer that c an be accessed by users across Answer: B Wiki is the type of web technology allows its
a network mainly or exclusively for storing and community members to continuously change the
supplying data files is known as ______ contents on a web site
a) Application server
b) Data server 218) What term refers to living life through
c) Distributed server technology?
d) File server a) Fake living
e) None of these b) False living
Answer: D A computer that can be accessed by users c) E-living
across a network mainly or exclusively for storing and d) Social Living
supplying data files is known as file server e) None of these
Answer: C E-living is the term refers to living life
214) The __________ is a special database that holds through technology
information about the computer’s user, installed
programs and hardware devices. 219) What type of software secretly collects
a) Dynamic link library information about you and your internet habits?
b) Initialization file a) Detection
c) Windows registry b) Spy
d) Complier c) Collection
e) None of these Answer: C The windows registry is a d) Authentication
special database that holds information about the e) Spyware
computer’s user, installed programs and hardware Answer: E Spyware is the software secretly collects
devices. information about you and your internet habits
215) Software, such as Explorer and Firefox, are 220) What is the shortcut key to open the Document?
referred to as _____. a) Windows + r
a) System software b) Windows + w
b) Utility software c) Windows + e
c) Application Software d) Windows + p
d) Operating system e) Windows + q
e) None of these Answer: C Windows + e is the shortcut key to open the
Answer: C Software, such as Explorer and Firefox, are Document
referred to as Application Software
221) What is the extension to save Database?
216) Which IT area is well-established in Accounting? a) .pnb b) .png c) .exe
a) Multimedia system d) .mdb e) None of these
b) Web development Answer: D The extension to save Database is .mdb
c) Statistical analysis
d) Accounting Information Systems 222) While w e are studying about transmission speed
e) None of these of the computer, we may came to know about the
Answer: D Accounting Information Systems is the IT term ‘MIPS’ What does M represents?
area, which is well established in Accounting. a) Million b) Miles c) Micro
d) Macro e) None of these
217) What type of web technology allows its Answer: A MIPS → Million Instructions Per Second
community members to continuously change the 223) The ability of an OS to run more than one
contents on a web site? application at a time is called _____.
a) Intelligent bots a) Table sharing
b) Wiki b) Multi-tasking
c) Social network c) object-oriented programming
d) Blogs d) Time sharing
e) None of these e) None of these
66 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: B The ability of an OS to run more than one a) Electronically
application at a time is called Multi-tasking b) Computer
c) Operational
224) A simple automated program that scans the web d) Counting
for specific data and insert into a designated database e) Measuring
_________ Answer: E The operation of a digital computer is based
a) Web hacking on measuring principle
b) Web mining
c) Web database integration 229) Which of the following programs is not a utility?
d) Web crawler a) Spooler
e) None of these b) Debugger
Answer: D A simple automated program that scans the c) Edition
web for specific data and insert into a designated d) Both A or B
database Web crawler e) All of these
Answer: A Spooler is not a utility program.
225) A computer user obsessed with gaining entry into
highly secured computer system is called a(n) ______. 230) RAM chip was invented by which of the following
a) Hacker company?
b) Copy a) Intel
c) Encrypting b) Toshiba
d) Programmer c) IBM
e) Cracker d) Cisco
Answer: E A computer user obsessed with gaining e) None of these
entry into highly secured computer system is called Answer: A RAM chip was invented by Intel Company
a(n) Cracker. 231) Disk is associated with _____
226) Which of the following printers is used in a) Internal storage
conjunction with computers and uses dry ink powder? b) Main storage
a) Daisy wheel c) Secondary storage
b) Laser printer d) All of these
c) Thermal printer e) None of these
d) Band printer Answer: C Disk is associated with Secondary storage.
e) None of these
Answer: B Laser printer is used in conjunction with 232) A hybrid computer uses a ________ to convert
computers and uses dry ink powder digital signals from a computer into analog signals
a) Encryption
227) A specialised network device that determines the b) Decoder
next network point to which it can forward a data c) Modem
packet towards the destination of the packet is d) Modulator
commonly known as __________ e) None of these
a) Bridge Answer: C A hybrid computer uses a Modem to convert
b) Router digital signals from a computer into analog signals
c) Switch
d) Hub 233) A(n)________ is a register or main memory
e) Repeater location which contains the effective address of the
Answer: B A specialized network device that operand.
determines the next network point to which it can a) Special location
forward a data packet towards the destination of the b) Pointer
packet is commonly known as Router. c) Pendrive
d) Floppy
228) The operation of a digital computer is based on e) Direct Indexed register
________ principle
67 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: A A(n) Special location is a register or main 239) What type of memory is not directly addressable
memory location which contains the effective address by the CPU and required special software to access it?
of the operand a) Main
b) Conventional
234) Computers gather data, which means that they c) Inbuilt
allow users to ________ data. d) Expanded
a) Input e) All of these
b) Output Answer: D Expanded type of memory is not directly
c) Storage addressable by the CPU and required special software
d) All of these to access the memory.
e) Present Answer: A Computers gather data, which
means that they allow users to Input data. 240) Signals can be analog or digital and a computer
that processes the both type of signals is known as
235) To print an individual item in a file immediately ________
click ____ a) Micro Computer
a) Shift + P b) Mainframe computer
b) Ctrl + P c) Analog computer
c) Alt + P d) Digital Computer
d) Window + P e) Hybrid Computer
e) None of these Answer: E Signals can be analog or digital and a
Answer: B To print an individual item in a file computer that processes the both type of signals is
immediately click Ctrl + P known as Hybrid Computer.
236) All the logical and mathematical calculations done 241) The basic operations performed by a computer
by the computer happen in/on the ______ are ___________.
a) System board a) Logical Operation
b) CPU b) Arithmetic Operation
c) Mother board c) Storage system
d) Memory d) All the above
e) None of these e) None of these
Answer: B All the logical and mathematical calculations Answer: D The basic operations performed by a
done by the computer happen in/on the CPU. computer are Logical Operation, Arithmetic Operation
and Storage system.
237) A proxy server is used for which of the following?
a) To provide security against unauthorized users 242) To produce high quality graphics (hardcopy) in
b) To process client requests for Web pages color, you would want to use a/n _______
c) To process client requests for database access a) Plotter
d) To provide TCP/IP e) None of these b) Printer
Answer: A A proxy server is used for to provide security c) Inkjet Printer
against unauthorised users d) Laser Printer
e) None of these
238) Storage that loses its data after the power is Answer: A To produce high quality graphics (hardcopy)
turned off is referred to as ______ in color, you would want to use a/n Plotter.
a) Non-volatile
b) Volatile storage 243) Name the computer, which w as invented by
c) Sequential storage Attanasoff and Clifford?
d) Random memory a) DELL
e) None of these b) ABC
Answer: A Storage that loses its data after the power is c) ENIVAC
turned off is referred to as non-volatile storage. d) Mark I
e) None of these
68 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: B The ABC (Atanasoff-Berry Computer) was 248) Which of the following is fifth lawyer of OSI
the first electronic digital computer, invented by model?
Attanasoff and Clifford. a) Application
b) Session
244) Mnemonic a memory trick is used in which of the c) Transport
following language? d) Network
a) Assembly language e) None of these
b) Machine language Answer: B The fifth lawyer of OSI model is session
c) High level language lawyer, The session layer provides the mechanism for
d) Middle level language opening, closing and managing a session between end-
e) None of these user application processes.
Answer: A Mnemonic a memory trick is used as
Assembly language. 249) What does DMA stand for?
a) Distinct Memory Access
245) Which was the most popular first generation b) Direct Memory Access
computer? c) Direct Module Access
a) IBM 650 d) Direct Memory Allocation
b) IBM 360 e) None of these
c) IBM 1130 Answer: B Direct memory access (DMA) is a means of
d) IBM 2700 having a peripheral device control a processor's
e) None of these memory bus directly. DMA permits the peripheral,
Answer: B IBM mainframes are large computer systems such as a UART, to transfer data directly to or from
produced by IBM since 1952. During the 1960s and memory without having each byte (or word) handled
1970s, the term mainframe computer was almost by the processor.
synonymous with IBM products due to their market
share. Current mainframes in IBM's line of business 250) Which programming languages are c lassified as
computers are developments of the basic design of the low level languages?
IBM System/360. a) Basic, COBOL, FORTRAN
b) Prolog 2, Expert Systems
246) The difference between memory and storage is c) Knowledge based Systems
that memory is _____ and storage is _______ d) Assembly Languages
a) Temporary, permanent e) None of these
b) Permanent, temporary Answer: D Assembly language is the low level
c) Slow, Fast language, in the programs are written in older days
d) All the above
e) Large, Small 251) Most important advantage of an IC is its _______
Answer: A Memory is temporarily saving the data and a) Easy replacement in case of circuit failure
Storage is to save the data permanently. b) Extremely high reliability
c) Reduced cost
247) Multi user systems provided cost savings for small d) Lower power consumption
business because they use a single processing unit to e) None of these
link several Answer: B IC is the integrated circuits. Those are high
a) Personal computers reliability
b) Workstations
c) Dumb terminals 252) The linking of computers with a communication
d) Mainframes system is called __________
e) None of these a) Networking
Answer: C Multi user systems provided cost savings for b) Pairing
small business because they use a single processing c) Interlocking
unit to link several systems are called Dumb terminals d) Assembling
e) Sharing
69 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: A The linking of computers with a creation, modification, analysis, or optimization of a
communication system is called Networking. design
253) Which of the following is a permanent memory? 258) Connections to the Internet using a phone line
a) SRAM and a modern are called ______ connections.
b) DRAM a) Digital
c) ROM b) Dial – up
d) All the above c) Broadband
e) None d) Dish
Answer: C Read only Memory (ROM) is the permanent e) None Answer: B Dial-up Internet access is a form of
memory. Internet access that uses the facilities of the public
switched telephone network to establish a connection
254) What is the shortcut key to align the paragraph at to an Internet service provider by dialing a telephone
the centre of the page? number on a conventional telephone line 2
a) Ctrl + C
b) Ctrl + E 59) If a user needs Information instantly available to
c) Ctrl + V the CPU, it should be stored __________
d) Ctrl + B a) On a CD
e) None of these b) In secondary storage
Answer: B Ctrl + E is used to align the paragraph at the c) In the CPU
centre of the page in the word document. d) In RAM
e) None
255) What is the extension is used to save image in the Answer: B If a user needs Information instantly
computer? available to the CPU, it should be stored in secondary
a) .pdf storage.
b) .doc 260) DSL is an example of a(n) _________ connection.
c) .ppx a) Network
d) .exl b) Wireless
e) .jpeg c) Slow
Answer: E Joint Photographic Experts Group(jpeg) is d) Broadband
the extension used to save image in the computer. e) None
Answer: D Digital subscriber line (DSL; originally digital
256) Seek time is subscriber loop) is a family of technologies that are
a) Time to position the head over proper track used to transmit digital data over telephone lines.
b) Time to position the head over proper sector
c) Time to position the head over proper cylinder 261) Most of the commonly used personal
d) The time to control the speed of the system computers/laptops do not have a c ommand key
e) None of above known as ______.
Answer: A Seek time is the time taken for a disk drive a) Turnover
to locate the area on the disk where the data to be b) Shift
read is stored. c) Alter
d) Delete
257) CAD stands for e) Ctrl
a) Computer aided design Answer: A Most of the commonly used personal
b) Computer algorithm for design computers/laptops do not have a command key known
c) Computer application in design as Turn over
d) All of the above
e) Concept aiding drawing 262) Which is part of a computer that one can touch
Answer: A Computer-aided design (CAD) is the use of and feel?
computer systems (or workstations) to aid in the a) Programs
b) Software
70 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Hardware c) Linking directory
d) Output d) Root directory
e) None e) Directory allocation table
Answer: C Hardware of the computer can touch and Answer: A References to each file on a disk are stored
feel. in a file allocation table.
263) A _______ typically connects personal computers 268) The central processing unit contains which of the
within a very limited geographical area, usually within following as a component?
a single building. a) Memory Regulation Unit
a) LAN b) Flow Control Unit
b) MAN c) Arithmetic Logic Unit
c) WAN d) Instructions Manipulation Unit
d) HAN e) None
e) None Answer: A Local Area Network is the typically Answer: C The CPU has ALU (Arithmetic Logic Unit) for
connects personal computers within a very limited proceeding the given input.
geographical area, usually within a single building.
269) A web _______ consist of one or more Web pages
264) To make the number pad act as directional located on a Web pages located on a web server.
arrows, you press the _______ key. a) Hub
a) Num lock b) Site
b) Caps lock c) Story
c) Arrows lock d) Template
d) Shift e) None
e) None Answer: B A website consist of one or more Web pages
Answer: A To make the number pad act as directional located on a Web pages located on a web server.
arrows, you press the Num lock key.
270) You are planning on using a single network that
265 ) A program that converts a high-level language supports 208 users. Which IP address c lass would you
source file into a machine-language file is called a choose to be the most efficient
_________. a) Class A
a) Translator b) Class B
b) Assembler c) Class C
c) Compiler d) Class D
d) Linker e) Class E
e) None Answer: C Class C type of IP is sufficient to provide
Answer: C A program that converts a high-level connection to 208 users.
language source file into a machine-language file is
called a Compiler. 271) Circular division of disks to store and retrieve data
are known as
266) The “home page” of a web site is _________. a) Tracks
a) The largest page b) Sectors
b) The last page c) Cycles
c) The first page d) Rings
d) The most colorful page e) Layer
e) None Answer: C The first page of the website is Answer: A Circular division of disks to store and
called as home page. retrieve data are known as tracks
267) References to each file on a disk are stored in a 272) Which statement is valid?
_________. a) 1KB = 1024 bytes
a) File allocation table b) 1 MB=2048 bytes
b) Root allocation table c) 1 MB = 1000 kilobytes
71 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
d) 1 KB = 1000 bytes
e) None of these 278) Which of the following controls the manner of
Answer: A 1KB is 1024 bytes. interaction between the user and the operating
system?
273) Which of the following memories has the shortest a) User interface
access times? b) Language translator
a) Cache memory c) Platform
b) Magnetic bubble memory d) Screen saver
c) Magnetic core memory e) None of these
d) RAM Answer: A User interface controls the manner of
e) None of these interaction between the user and the operating
Answer: A The memories which can be accessed for system.
the shortest times is known as cache memory.
279) The rectangular area of the screen that displays a
274) Any method for controlling access to or use of program, data, and/or information is a ___
memory is known ________. a) Title bar
a) Memory map b) Title bar
b) Memory protection c) Dialog box
c) Memory management d) Windows
d) Memory instruction e) None of these
e) None of these Answer: D The rectangular area of the screen that
Answer: B Any method for controlling access to or use displays a program, data, and/or information is a
of memory is known Memory protection. windows.
275) Napier’s Bones were invented in 280) An area of the microprocessor c hip used to
a) 1614 temporarily store instructions and data that the
b) 1617 processor is likely to use frequently is termed a(n)
c) 1620 a) ALU b) Bus c) Cache
d) 1630 d) CPU e) Flash
e) None of above Answer: C An area of the microprocessor chip used to
Answer: B Napier’s Bones is the manual calculator temporarily store instructions and data that the
which was invented in 1617. processor is likely to use frequently is termed as Cache.
276) All of the following are included in removable 281) Macros are available in Excel 2016 under which
media except _________ tab?
a) Floppy Disk a) Format b) View c) Home
b) Hard Disk d) Data e) Tool
c) DVDs Answer: E Macros are available in Excel 2016 under
d) Pen drive tools tab
e) ROM
Answer: E All of the following are included in 282) Which of the following concept means
removable media except ROM determining at runtime what method to invoke?
a) Data hiding
277) To move to the beginning of a line of text, press b) Dynamic loading
the ___ c) Dynamic Typing
a) Page up d) Dynamic binding
b) Ctrl e) None of these
c) Home Answer: D Dynamic binding also called dynamic
d) Shift dispatch is the process of linking procedure call to a
e) Number lock specific sequence of code (method) at run-time. It
Answer: C To move to the beginning of a line of text, means that the code to be executed for a specific
press the home key procedure call is not known until run-time. Dynamic
72 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
binding is also known as late binding or run-time 287) Which of the following will be the reusable
binding. Optical storage device?
a) CD b) DVD c) RW
283) What happens if the base and derived class d) ROM e) None of these
contains definition of a function with some prototype? Answer: C RW will be the reusable Optical storage
a) Compiler report an error on compilation device
b) Only base class function will get called irrespective
objective 288) Which of the following is the most important
c) Base class function will call base class function and powerful computer in a typical network?
derived class object will call derived class function. a) Desktop
d) Only derived class function will get called b) Network server
irrespective objective c) Network hub
e) None of these d) Network client
Answer: C If the base and derived class contains e) None of these
definition of a function with some prototype base class Answer: B The most important powerful computer in a
function will call base class function and derived class typical network is Network server.
object will call derived class function.
289) What is the key distinctly identifies a record in
284) Which of the following is not an E -commerce another database table?
application? a) Primary Key
a) House banking b) Principal Key
b) Buying Stock c) Link key
c) Conducting an auction d) Foreign key
d) Evaluating an employees e) None of these
e) None of these Answer: D Foreign key is the key distinctly identifies a
Answer: D Evaluating an employees is not an E- record in another database table.
commerce application.
290) If you wished to limit what you would see on an
285) What is the type of transmission impairment in Excel worksheet, what data function would you use?
which an outside source such as crosstalk corrupt a a) Conditional format
signal? b) Filter
a) Decibel c) Data analysis
b) Ultrasonic d) Sort
c) Distortion e) None of these
d) Noise Answer: B If you wished to limit what you would see on
e) None of these an Excel worksheet, what data function would you use
Answer: D Noise is a type of transmission impairment filter.
in which an outside source such as crosstalk corrupt a
signal 291) Microsoft's Access and Corel's Paradox are both
examples of which type of software?
286) A computer derives its basic s trength from which a) Network database systems
of the following given below? b) Flat-file database systems
a) Speed c) Relational database system
b) Accuracy d) Hierarchical database system
c) Memory e) None of these
d) All the above Answer: C Microsoft's Access and Corel's Paradox are
e) None of these both examples of Relational database system
Answer: D A computer derives its basic strength from
Speed, Accuracy and Memory. 292).What is the fourth layer in the OSI model?
a) Network layer
b) Transport layer
73 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Application layer 297) The computer operation system that is developed
d) Session layer to allow many users on different computer or terminal
e) None of these to access a single system with one OS on it is
Answer: B Transport layer is the fourth layer of OSI ____________
model. It is responsible for reliable delivery of packets a) Single user operating system
between points on a network. b) Multi user operating system
c) Dual user operating system
293) Which studying about computer, we may came d) All of the above
across the term USB, What does U represents? e) None of these
a) Under Answer: B The computer operation system that is
b) Unix developed to allow many users on different computer
c) Unit or terminal to access a single system with one OS on it
d) Universal is Multiuser operating system.
e) None of these
Answer: D USB→ Universal Serial Bus. 298) The smallest resolvable part of the screen is ____
a) Part
294) Which of the following is responsible to convert b) Portion
digital signal to analogous and vice versa for the c) Pixels
transmission and connection of computer? d) Byte
a) CPU e) None of these
b) USB Answer: C The smallest resolvable part of the screen is
c) MODEM called Pixels.
d) Network
e) ALU 299) The programs that are permanently stored in
Answer: C MODEM is responsible to convert digital ROM of the system are called ______
signal to analogous and vice versa for the transmission a) Program
and connection of computer b) Software
c) Application
295) If the transmission of packets was sent from one d) Firmware
sender to many receiver then they are named as e) None of these
_______ Answer: D The programs that are permanently stored
a) Uni cast in ROM of the system are called Firmware.
b) Multicast
c) Broadcast 300) Which of the following device is used to move the
d) Selective cast pointing device in a graphical user platform?
e) None of these a) Keyboard
Answer: C If the transmission of packets was sent from b) Joystick
one sender to many receiver then they are named as c) Mouse
Broadcast. d) Tracker
e) None of these
296) What is the shortcut key for find and replace in Answer: C Mouse is used to move the pointing device
Microsoft word? in a graphical user platform
a) Ctrl + R
b) Ctrl + F 301) Which of the following application can be used for
c) Alt + R real time interaction?
d) Alt + F a) E-Mail
e) None of these b) Usernet
Answer: B The shortcut key for ‘find and replace’ is Ctrl c) Webpage
+F d) Blog
e) Instant messaging
74 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: E Instant messaging can be used for the real c) Processing
time interaction. d) Compiler
e) None of these
302) Which of the following is the ascending order of Answer: C The way that computers manipulate data
the data hierarchy? into information is called processing.
a) Nipple – Byte – Megabyte- Kilobyte
b) Bit – Nipple – Byte - Kilobyte 308) COBAL is widely used in which of the following
c) Gigabyte – Kilobyte – Nipple - Bit application?
d) Bit – Nipple – Byte - Megabyte a) Commercial
e) None of these b) Scientific
Answer: D Bit , 4 bit = Nipple 2 Nipple = Byte 1024 c) Space
Kilobyte = 1 Megabyte d) Mathematical
e) None of these
303) PC cards, flash memory cards, and smart cards are Answer: A COBAL is widely used in commercial
all examples of _____ application.
a) Analogue storage
b) Digital storage 309) Default size of the word document is _____.
c) Solid state storage a) Legal
d) NOTA b) A4
e) None of these c) A2
Answer: C PC cards, flash memory cards, and smart d) Letter
cards are all examples of Solid state storage. e) None of these
Answer: B Default size of the word document is A4.
304) Google is an example for _____
a) Portal 310) Shell and Kernel is a feature of _____.
b) Internet a) Application
c) Search engine b) Operating system
d) Browser c) Application
e) None of these d) All the above
Answer: C Google is example for the search engine e) None of these
305) Binary numbers consist of___ Answer: B Shell and Kernel are the feature of
a) 0’s and 1’s Operating system.
b) All the alphabets
c) Any two digit numbers 311) *.bmp is the extension of which of the following
d) All two letter application?
e) None of these a) Word
Answer: A Binary numbers consist of 0’s and 1’s. b) Excel
c) Paint
306) Which of the following value storage device is not d) Power point
found? e) None of these
a) 2GB Answer: C The *.bmp is the extension of Paint
b) 32GB application.
c) 60GB
d) 16GB 312) The box that is displayed to indicate that the text,
e) None of these pictures or objects are placed in it is called
Answer: C The storage device with 60GB is not found. ___________
a) Place holder
307) The name for the way that computers manipulate b) Auto text
data into information is called _____. c) Text box
a) Storage d) Word Art
b) Program e) None of these
75 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: A The box that is displayed to indicate that the Answer: C A USB communication device that supports
text, pictures or objects are placed in it is called Place duty encryption for scare wireless loss communication
holder for notebook users is called Router.
313) While browsing the internet, which of the 318) A set of rules for telling the computer what
following key is used for full screen view? operations to perform is called a —
a) F12 a) Programming language
b) F 7 b) Natural language
c) F10 c) Procedural language
d) F11 d) Structural language
e) None of these e) None of these
Answer: D The F11 can be used to view the full screen, Answer: A A set of rules for telling the computer what
while browsing the data. operations to perform is called Programming language.
314) Which of the following is used in icons and menus 319) In MIME, I stands for__________
displayed on the screen to send command to the a) Internet
computer system? b) Intranet
a) System Utility c) Induce
b) API d) Inspect
c) GUI e) None of these
d) User Interfaces Answer: A MIME → Multipurpose Internet Mail
e) None of these Extension.
Answer: C Under the GUI, Icons and Menus displayed
on the screen to send command to the computer 320) In which of the following communication system,
system. both the sender and receiver can transfer the
315) Which of the following is not an Biometric? information at the same time?
a) Retina scan a) Half duplex
b) Irish scan b) Full duplex
c) Face recognition c) Multi duplex
d) Palm print d) Simplex
e) None of these e) None of these
Answer: E All the given option are the biometric Answer: B In Full duplex, both the sender and receiver
can transfer the information at the same time.
316) In Power Point, the Header & Footer button can
be found on the Insert tab in what group? 321) The mails deleted from the Inbox will be s aved in,
a) Illustration group which of the following place?
b) Object group a) Draft b) Trash c) Outbox
c) Table group d) All Mail e) None of these
d) Text group Answer: B The mails which are deleted from the Inbox
e) None of these will be saved in Trash.
Answer: D In Power Point, the Header & Footer button
can be found on the Insert tab in Text group. 322) Which of the following layer will be sixth lawyer of
OSI model?
317) A USB communication device that supports duty a) Network lawyer
encryption for scare wireless loss communication for b) Physical Lawyer
notebook users is called _____. c) Transport Lawyer
a) Wireless switch d) Session Lawyer
b) Wireless hub e) None of these
c) Router Answer: E The sixth lawyer of OSI model is
d) HUB Presentation lawyer
e) None of these
76 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
323) EEPROM is a type of ROM. What does P c) Storage Directory
represents? d) Main Directory
a) Presentation e) Root Directory
b) Probable Answer: E Root Directory is the main folder on a
c) Programmable storage device.
d) Preparation
e) None of these 329) During the which of the following operation, the
Answer: C EEPROM Electrically Erasable Programmable control unit determines what the program is telling the
Read Only Memory. computer to do?
a) Encryption
324) Which of the following element will convert high b) Decode
level language into machine level language? c) Decryption
a) Translator d) Encode
b) Assembler e) None of these
c) Transmitter Answer: B The decode operation will helps the control
d) Compiler unit to determine, what the program is telling the
e) None of these computer.
Answer: D The Compiler will convert high level
language into machine level language. 330) A mistake in an algorithm, that causes incorrect
result is known as ____
325) The Booting occurs while turning ON or OFF of the a) Logical Error
computer is known as _______. b) Machine Error
a) Sectional Booting c) Compiler Error
b) Warm Booting d) Syntax Error
c) Cold Booting e) None of these
d) All of these Answer: A The mistakes in Algorithm will be resulted in
e) None of these Logical Error.
Answer: C The Cold Booting will occurs, while turning
ON or OFF of the computer. 331) A is a device that not only provides s urge
protection, but also furnishes your computer with
326) Which of the following key is used to repeat the battery backup power during a power outage________
last action in the document? a) USB b) UPS c) URC
a) F2 b) F4 c) F6 d) Battery Strip e) None of these
d) F8 e) None of these Answer: B A is a device that not only provides surge
Answer: B By, pressing the F4 key the user can repeat protection, but also furnishes your computer with
the last action in the document. battery backup power during a power outage UPS
327) The internet service that provides a multimedia 332) Expand RAID?
interface to available resources is called————— a) Reproduce Array of Intelligent Disks
a) World Wide web b) Reproduce Array of Inexpensive Disks
b) Telnet c) Redundant Array of Inexpensive Drives
c) NOTA d) Redundant Array of Inexpensive Disks
d) FTP e) None of these
e) None of these Answer: D RAID Redundant Array of Inexpensive Disks
Answer: A The internet service that provides a
multimedia interface to available resources is called 333) Which of the following is an example for
World Wide Web. nonnumerical data?
a) Employees Salary
328) What is the main folder on a storage device? b) Examination Score
a) Directory c) Bank balance
b) Sub Directory d) Employees Name
77 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these a) Fetching
Answer: D Except employees name all other thing are b) Sorting
nonnumerical data c) Decoding
d) Executing
334) The name given to a document by user is e) Encryption
called______ Answer: D By, executing the commands can be
a) File type implementing.
b) File name
c) Source file 339) The computer uses which of the following system
d) Data to store data and perform calculation?
e) None of these a) Decimal
Answer: B The name given to a document by user is b) Hexadecimal
called as File name. c) Octal d) Binary
e) None of these
335) From which of the following software, the Answer: D All the datas, which are stored and
webpage can be developed? performed for calculation for system are stored as
a) C Binary.
b) Java
c) HTML 340) Which of the following key is used to m ove down
d) C++ a page in a document?
e) None of these a) Jump
Answer: C From HTML (Hypertext Markup Language), b) Fly
the webpage can be developed. c) Wriggle
d) Scroll
336) The attributes and methods for each object are e) None of these
stored in ________ Answer: D The scroll key can be used to move down a
a) An object instance page in the document.
b) An object connection
c) An assembly structure 341) By using which of the following key, the exciting
d) An object repository document can be saved in another name in the
e) None of these Microsoft word?
Answer: D Object Repository is a collection of object a) File
and properties with which QTP will be able to b) Tool
recognize the objects and act on it. The attributes and c) Save
methods for each object are stored in an object d) Save as
repository. e) None of these
Answer: D The exciting document can be saved in
337) Which of the following is a program that works another name in the Microsoft word by using Save as.
like a calculator for keeping track of money and making
budgets? 342) To make a notebook act as desktop as a desktop
a) Calculator model, the notebook can be connected to a ________
b) Bank which is connected to a monitor and other devices.
c) Spread sheet a) Bay
d) Budget b) Docking station
e) None of these c) Port
Answer: C Spreadsheet is a program that works likes a d) Network
calculator for keeping track for money and making e) None of these
budget. Answer: B To make a notebook act as desktop as a
desktop model, the notebook can be connected to a
338) Which of the following is the process of docking station, it can be connected to a monitor and
implementing commands? other devices.
78 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
d) All the above
343) System software is the s et of programs that e) None of these
enables your computer’s hardware devices and Answer: D All three are the problem of file
________ software to work together. management system.
a) Management
b) Processing 349) The operation of a digital computer is based on
c) Utility which of the following principle?
d) Application a) Counting
e) None of these b) Electronic
Answer: D System software is the set of programs that c) Logical
enables your computer’s hardware devices and d) Mechanical
application software to work together e) All of these
Answer: A The operations of a digital computer is
344) Which of the following is not a type of broadband based on counting principle.
internet connection?
a) Cable b) LTE c) DSL 350) An automatic machine that performs routine
d) Dial-up e) Satellite seemingly human tasks is _______.
Answer: A Except cable all other are a type of a) KIPS
broadband internet connection. b) Robot
c) PL
345) Which of the following is a ex tension to save d) Artificial intelligence
Video? e) None of these
a) .jpeg b) .png c) .Mpeg Answer: B An automatic machine that performs
d) .dox e) None of these routine seemingly human tasks is called Robot.
Answer: C Video file can be saved in .mpeg 351) Which of the following is a non-standard version
of a computer language?
346) Magnetic s trip reader is a type of ________ a) PROLOG
device. b) APL
a) Input c) ARM
b) Output d) PL/1
c) Processor e) None of these
d) Input/output Answer: C ARM is a processor, but not a computer
e) None of these language.
Answer: A Magnetic strip reader is a type of input
device 352) What should be minimum requirement of random
access memory (RAM) for internet access?
347) Error messages in an Excel s heet s tart with a) 8KB
________ sign/symbol. b) 32MB
a) % c) 16MB
b) $ d) 64KB
c) # e) None of these
d) = Answer: B 32MB is the minimum requirement of
e) – random access memory for internal access
Answer: C Error messages in an Excel sheet start with #
sign/symbol. 353) Which of the following is the Role of IP
addressing?
348) Which of the following is a problem of file a) Name indication
management system? b) Address indication
a) Lack of data independence c) Router indication
b) Data redundancy d) All the above
c) Programme dependence e) None of these
79 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: D All the given are the role of IP addressing. 359) In Microsoft PowerPoint special effects used to
introduce slides in a presentation are called
354) What is the process of deleting the recently done __________.
activities? a) Effect
a) Redo b) Transistor
b) Undo c) Custom animations
c) Paste d) Present animations
d) Cut e) None of these
e) None of these Answer: B In Microsoft PowerPoint special effects used
Answer: B The process of deleting the recently done to introduce slides in a presentation are called
activities. Transistor
355) Which of the following is a part of session layer? 360) Which of the following can you use to add times
a) Transports data across the physical link to the slides in a presentation?
b) Determines network topology. a) Slide show menu
c) Terminates a session b) Space bar
d) Performs flow control c) Rehearse timings button
e) Transmission between machine to its above layer d) Slide skip
Answer: C The session layer will perform terminates a e) None of these
session. Answer: C Rehearse timings button will helps to add
times to the slide in a presentation.
356) Which of the following key is used in the
Operating system to display or hide the start menu? 361) Which one is used to convert the data and image
a) Windows Logo on paper in to the digital form?
b) Windows logo + Break a) Printer
c) Windows Logo + D b) Scanner
d) Windows Logo + M c) Sensor
e) Windows Logo + T d) Smart card reader
Answer: A The windows logo is used to display or hide e) None of these
the start menu. Answer: B Scanner is used to convert the data and
image on paper in to the digital form.
357) In Excel accounting style s hows negative numbers
in __________ 362) Which one allows Movements in all directions
a) Bold (360 degree)?
b) Parentheses a) Mouse
c) Show b) Joystick
d) Quotes c) Light pen
e) Brackets d) Track ball
Answer: B In Excel accounting style shows negative e) None of these
numbers in Parentheses. Answer: B Joystick allows Movements in all directions
(360 degree).
358) In Excel when integrating word and excel, word is
usually the ______ 363) _____ and _____ refers to the action of clicking
a) Server and holding down the mouse button while moving the
b) Destination mouse and realign it
c) Client a) Drag, Click
d) Both B and C b) Drop, Drag
e) Both A and B c) Drag, Drop
Answer: D In Excel when integrating word and excel, d) Click, Right Click
word is usually the Destination and Client
80 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
Answer: C Drag and Drop refers to the action of clicking computer. It works by moving an electron beam back
and holding down the mouse button while moving the and forth across the back of the screen.
mouse and realign it.
369) A pixel is_____
364) Which one is used to open a document or a) Picture element or dot on a screen
program? b) Point of ink on a user printed paper
a) Click c) Point of ink on a inkjet printed page
b) Double Click d) Light beam used in printing paper
c) Right Click e) None of these
d) Drag and Drop Answer: A A pixel is Picture element or dot on a screen.
e) None of these
Answer: B Double Click is used to open a document or 370) In which printers, Printing is achieved by
program. deflecting laser beam on to photosensitive surface of a
drum?
365) ______is another pointing device w hich is an a) Dot Matrix
alternative to a mouse b) Daisy Wheel
a) Track ball c) Laser printer
b) Joystick d) Electromagnetic printer
c) Light pen e) None
d) Touch Screen Answer: C In Laser printers, Printing is achieved by
e) None of these deflecting laser beam on to photosensitive surface of a
Answer: A Track ball is another pointing device which is drum.
an alternative to a mouse.
371) First generation computer were based on?
366) Laser printer can print ___ pages of text per a) Vacuum tubes
minute and their resolution ranges from ______dpi b) ICs c) Transistors
a) 5-25, 400-1300 d) Conductors
b) 5-25, 400-1200 e) None
c) 5-24, 400-1200 Answer: A First generation computer were based on
d) 5-25, 500-1300 Vacuum tubes.
e) None of these
Answer: C Laser printer can print 5-24 pages of text per 372) Which language is directly understood by the
minute and their resolution ranges from 400-1200 dpi. computer without translation Program?
a) Machine language
367) Electromagnetic printer can produce documents b) C# Language
at a speed of over _____ lines c) High level language
a)10000 d) C language
b) 20000 e) None of these
c) 30000 Answer: A Machine language is directly understood by
d) 40000 the computer without translation Program.
e) None of these
Answer: B Electromagnetic printer can produce 373) The speed of Which Generation Computer w as in
documents at a speed of over 20000 lines(i.e) More Pico Seconds?
than250 pages per minute. a) First
b) Second
368) Which one is a typical rectangular shaped monitor c) Fourth
that you see on a desktop computer? d) Fifth
a) CRT b) LCD c) LED e) None of these
d) BIOS e) None of these Answer: C The speed of Fourth Generation Computer
Answer: A CRT (Cathode Ray Tube) is a typical was in Pico Seconds and Microprocessor is the main
rectangular shaped monitor that you see on a desktop concept behind fourth generation of computer.
81 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
c) Real-Time System
374) JS kilby developed which chips? d) GUI Interface
a) Silicon e) None of these
b) Silica Answer: C Real-Time System Operating System is used
c) Integrated in Third Generation Computer.
d) Iron oxide
e) None of these 380) Programming Language introduced in Which
Answer: C JS kilby developed Integrated chips. Generation?
a) First
375) First Super computer of World is_____ b) Second
a) PARAM c) Third
b) Siddhart d) Fourth
c) IBM -370 e) Fifth Answer: C Programming Language introduced
d) CRAY-1 in Third Generation Computer.
e) None of these
Answer: D First Super computer of World is CRAY-1 381) Which one is generally used in banks to process
the Cheques?
376) Which one is example for Fifth G eneration a) OMR
computer? b) MICR
a) DBMS c) OCR
b) Distributed System d) MIC
c) Real time System e) None of these
d) Artificial Intelligence Answer: B MICR (Magnetic Ink Character Recognition)
e) None of these is generally used in banks to process the Cheques for
Answer: D Artificial Intelligence is example for Fifth recognising the magnetic encoding numbers printed at
Generation computer. the Bottom of a Cheque. Important
377) Which Storage devices is used in Fourth 382) Which one is an Optical disk storage medium
Generation Computer? designed to recapture the data normally in DVD
a) Magnetic drum format?
b) Magnetic core technology a) Compact Disk
c) Semiconductor memory b) Digital Video Disk
d) Primary Storage medium c) Blue-ray Disk
e) None of these d) Floppy Disk
Answer: C Semiconductor memory and Winchester e) None of these
disk Storage devices is used in Fourth Generation Answer: C Blue-ray Disk is an Optical disk storage
Computer. medium designed to recapture the data normally in
DVD format and it contains 25 GB(23.31 GB) per layer
378) PDP-8 is an example for Which Generation space.
Computer?
a) First 383) Which one holds a block of data that is read or
b) Second written at one time?
c) Third a) Data Transfer rate
d) Fourth b) Track
e) Fifth c) Sector
Answer: B Second Generation Computer Example → d) Hard disk
PDP-8, IBM1401 e) None of these
Answer: C Sector holds a block of data that is read or
379) Which Operating System is used in Third written at one time.
Generation Computer?
a) Batch 384) The rate at which data is written to disk or read
b) Time Sharing System from disk is called as ____
82 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
a) Data Transfer rate
b) Track 389) Which one performs simply an informal w ay of
c) Sector describing a program and it does not follow any Syntax
d) Hard disk Strictly?
e) None of these a) Mnemonic
Answer: A The rate at which data is written to disk or b) Opcode
read from disk is called as Data Transfer rate. c) Pseudocode
d) Operand
385) Which one records data bits as tiny magnetic e) None of these
spots? Answer: C Pseudocode is not a programming language,
a) Data Transfer rate but simply an informal way of describing a program
b) Track and it does not follow any Syntax Strictly.
c) Sector
d) Hard disk 390) Which one is used in a program to execute a
e) None of these particular set of statements repeatedly?
Answer: B Track records data bits as tiny magnetic a) Visual basic
spots. b) Pseudocode
c) Condition
386) BIOS Stands for? d) Looping
a) Basic Input Output Server e) None of these
b) Basic Input Output Storage Answer: D Looping is control structure which is used in
c) Basic Input Output System a program to execute a particular set of statements
d) Basic Input Output Standard repeatedly.
e) None of these
Answer: C BIOS (basic input/output system) are the 391) Which w orks on the supply of Continuous
program a personal computer's microprocessor uses to electrical pulses?
get the computer system started after you turn it on. It a) Analog Computer
also manages data flow between the computer's b) Digital Computer
operating system and attached devices such as the c) Both a and b
hard disk, video adapter, keyboard, mouse and printer. d) Super Compute
e) None of these
387) Caps lock and Num lock Keys are called as ____ Answer: A An analog Computer that operates on data
keys which is in the form of Continuous variable physical
a) Ctrl quantities
b) Shift
c) Toggle 392) The Characteristics of any entity are called it as
d) Window ________
e) None of these a) Attributes
Answer: C Caps lock and Num lock Keys are called as b) Relationship
Toggle keys because when pressed, they toggle or c) Entity set
change their status from one state to another state. d) Information
e) None of these
388) If you change Windows 98 to Windows XP, you Answer: A The Characteristics of any entity are called it
are actually performing? as Attributes. Attributes are drawn in Elliptical Shape.
a) Upstart Symbol →
b) Update
c) Upgrade 393) Which key must be Unique?
d) Patch a) Alternate
e) None of these b) Primary
Answer: C If you change Windows 98 to Windows XP, c) Candidate
you are actually performing upgrade. d) Foreign
83 Add: Konung Mamang Near Traffic Point, GST Building Wangkhei Road. Call/Whatsapp: 8794-713-479
CREATIVE CIRCLE
e) None of these data without effecting to the physical level and it is
Answer: B Primary key must be Unique and it should also known as Conceptual level.
not accept Null values.
399) A device needed to communicate with computers
394) _______ are the actual data contained in the using telephone lines is _____
database at a particular point of line a) Disk
a) Schema b) CPU
b) Data mining c) VDU
c) Instances d) Modem
d) Information e) None of these
e) None of these Answer: C Instances are the actual Answer: D A device needed to communicate with
data contained in the database at a particular point of computers using telephone lines is Modem.
line.
400) Which one of the following domain is used by
395) Dr EF Codd represented _____ rules for relational Non-Profit Organisation?
database management system (RDBMS) in 1970 a) .com
a) 9 b) 12 c) 14 b) .gov
d) 11 e) None of these c) .org
Answer: B Dr EF Codd represented 12 rules for d) .edu
relational database management system (RDBMS) in e) None of these
1970. Answer: C .org domain is used by Non-Profit
Organisation.
396) A set of possible data values is called as _____ Merger cell.
a) Tuple
b) Attribute
c) Degree
d) Domain
e) None of these
Answer: D A set of possible data values is called as
domain