Computer Awareness PDF
Computer Awareness PDF
Computer Awareness PDF
This PDF Capsule contains the most important computer topics that are important for
all bank and insurance exams.
1 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Overview of Computer
Computer is an electronic device that accepts data, stores it (either in temporary memory or permanent),
prcesses it (in CPU) and then gives the required output (information).
Data vs Information
Data- These are raw and unorganized facts and figures which are feeded into the computer for processing.
Information- The result that we get after data is processed is called information.
Hardwares are the physical component of computer that can be touched. Some hardware components are-
Input device, CPU, memory like RAM, output device, storage device. Various harwares will be discussed later.
Software represents the set of programs that govern the operation of a computer system. There are mainly two
types of software- System software and Application software. Will be discussed later.
Humanware- The user of the computer is called humanware. Also called Liveware.
Firmware- These are the set of programs that are pre-installed into the Read Only Memory (ROM) of computer,
during the time of manufacturing. Example- BIOS (Basic Input Output Services)
Generations of Computer
Generation/Period Component Memory and Languages used Examples Extra
Used Storage
First Generation Vacuum Tubes Magnetic Machine language ENIAC,
(1946-1954) (electornic tapes, EDVAC,
valves) magnetic EDSAC,
drums as UNIVAC-I,
secondary IBM 700
memory series
Second Generation Transistors Main High level IBM 7090, Floating point
(1955-1964) memory- languages(FORTRAN, CDC 1604, arithemetic
Ferite cores COBOL, Algol, CDC 3600, hadware was
Secondary Snobol) PDP 5, PDP widely used
Memory- 8, ICL 1901
Magnetic
disks and
tapes
Third Generation Intergrated Main High Level IBM 370, Cache memory,
(1965-1974) Circuits (IC) – SSI, memory- Languages(C,C++) CDC CYBER- parallel
MSI RAM, ROM 175, STAR- processing,
Secondary 100, PDP-11 multiprocessing
Memory- concepts were
Magnetic introduced
disks, tapes
Fourth Generation Microprocessors Main HLL ICL 2900, HP
(1975-present) (VLSI) Memory- 9845,
RAM/ROM Personal
Secondary Computer of
2 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Memory- Pentium
Hard Disk series.
Fifth Generation ULSI (Ultra Large Main HLL Super Artificial
(present) Scale Memory- Computers Intelligence
Integration) RAM/ROM
Secondary
Memory-
Hard Disk
Some Abbreviations used in above table
CPU- CPU is the brain of computer and its function is to execute programs. CPU also controls the operation of all
other components of computer.
Parts of CPU –Three major parts of CPU are Arithemetic and Logic Unit (ALU), Control Unit (CU), Memory unit
(Accumulator, Registers, Cache).
Arithemetic and Logic Unit (ALU)- It is the compenent where all the instuctions are actually implemented and
calculated. It performs arithematic and logical operations such as addition, subtraction, multiplication and
division; AND, OR, NOT and EXCLUSIVE-OR Operations.
Control Unit (CU)- Timing and Control Unit generates timing and control signal necessary for the execution of
the instruction. It acts as the Central Nervous System controlling the Flow of Data and Information from various
components.
Memory Unit- is the component of CPU, which stores Data/Instruction prior to processing by CU/ALU.
Accumulator- An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a
computer's CPU.
3 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Classification of Computers
1) Based On Generation: Already Discussed.
2) Based on Size and Performance- Microcomputers, Minicomputers, Mainframe, Super Computers, Embedded
Computers
Microcomputers- there are the personal computers that we use for normal home and office purpose. Examples:
PC, Laptops.
Mainframe Computer- Capable of performing high processing speed and data storage but not powerful as super
computers. Example: ISP providers use mainframe computers to process information about millions of internet
users.
Minicomputers- These are more powerful than Microcomputers but less powerful than Mainframe. These are
mainly multiuser systems where many users work simultaneously on the system. Example: PDP-11. Example:
Department of computer monitoring the network traffic of whole company.
Super Computer- These are most powerful computers used for very complex computation work.
First Supercomputer- CDC 6600; Fastest Supercomputer- Sunway TaihuLight (China) ;
Indias first super computer- PARAM-8000 (Vijanan Bharti); Indias fastest Super Computer- SahasraT (Cray XC40)-
IISc, Banglore.
Hardwares- In this section first we will discusses input devices then output devices and then memory.
Input devices-
Data and input is entered by the user into computer using input device like mouse keyboard etc. An input device
converts input data into suitable binary format which can be accepted by the computer.
Keyboard- Mostly in our computer we have QWERTY keyboard. Dvorak keyboard is also a type. Types of key on
a QWERTY Keyboards.
Function Key- Used to perform some specific pre defined fuction (F1-F12)
Alphanumeric Key- Alphabet key (A-Z) and Number keys (0-9)
Toggle Key- A toggle key is a key that is used to turn a function on or off, or to switch between two
functions. Like once when we press Capslock button we can type all upper case character, and if we
press it again we can type all lower case character. So two different result on two different press.
Example: Capslock, NumLock, Scroll Lock.
Modifier Keys: These are the key temporarily modifies the normal action of another key when pressed
together. Example: Shift, Alt, Ctrl, Fn.
Mouse- A mouse is a handheld pointing device used to position a cursor on a computer screen. It's therefore an
essential input device for selecting, dragging, hovering, and clicking. Douglas Engelbart invented the first
computer mouse prototypes in 1963. Types of Mouse- Serial, PS/2, USB and Wireless. (Based on connecting
point)
Joystick- A joystick is an input device consisting of a stick that pivots on a base and reports its angle or direction
to the device it is controlling. Used mostly for gaming in digital computers.
Light Pen- Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or draw
pictures on the monitor screen. It consists of a photocell and an optical system placed in a small tube.
4 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Digitizer- A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn
images into a format suitable for computer processing.
Microphone- Microphone is an input device to input sound that is then stored in a digital form.
Magnetic Ink Card Reader (MICR)- MICR is a technology used to verify the legitimacy or originality of paper
documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain
characters on the original documents. Information can be encoded in the magnetic characters. Used in banks for
cheques.
Optical Character Reader (OCR)- OCR is the recognition of printed or written text characters by a computer. This
involves photoscanning of the text character-by-character, analysis of the scanned-in image, and then
translation of the character image into character codes, such as ASCII, commonly used in data processing.
Bar Code Readers- A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner, is a hand-held
or stationary input device used to capture and read information contained in a bar code . A barcode reader
consists of a scanner , a decoder (either built-in or external), and a cable used to connect the reader with a
computer.
Optical mark Reader (OMR)- These are used to detect the presence of human made marks on paper.
Scanner- A scanner is a device that converts a physical document (hard copy) by capturing its image into an
ecectronic document (soft copy).
Types of scanner:
Drum Scanner- Used by publishing industry. Use technology called Photo Multiplier Tube (PMT).
Flatbet Scanner- Also called desktop scanner. The user puts the image to be scanned on the glass plate
and the scanner scans the image.
Sheet-fed Scanner- In this the document is moved and the scan head is immobile. Reverse of Flatbed
scanner.
Hand-held scanner- There are scanner that the user has to move over the sheet of paper to scan it.
Output Device
The output device receives information from CPU and provides it to the user.
Monitor- These are also called visual display unit (VDU). Types: (i) CRT (Cathode Ray Tube) (ii) LCD (Liquid Crystal
Display) (iii) LED (Light-Emitting Diodes). Note- thin-film transistor (TFT) is a variant of LCD.
(iv) Plasma: This is another new invention and it is named as the plasma display since there are some really small
sized cells are present there.
(v) OLED: This technology is the new technology. It stands for the Organic Light emitting Diodes.
5 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Refresh Rate: The refresh rate of a monitor or TV is the maximum number of times the image on the screen can
be "drawn", or refreshed, per second. The refresh rate is measured in hertz (Hz).
Printer- Device used used to print a computer document (soft copy) on a physical paper (hard copy).
Drum Printer- Drum Printer makes use of a Cylindrical Drum to print lines.
Chain Printer- Chain Printer makes use of a Rotating Chain or Print Chain to print lines.
Character Printer- These print one character at a time. These are of two types: Dot Matrix and Letter Qualtity
Printer
Dot Matrix Printer- Dot Matrix Printers have an arrangement of a matrix of 7, 9, 14, 18, 24 pins on the print head
and as the print head moves, the pins strike the paper to form a character.
Letter Quality Printer- These print full character and not dots. Example- Daisy Wheel Printer. Head is lying on a
wheel and pins corresponding to characters are like petals of Daisy (flower) which is why it is called Daisy Wheel
Printer.
(ii) Non Impact Printer- these donot touch the paper when creating an image.
Inkjet Printers- These uses cartridges filled with inks to print the image. These catridges emit the ink in required
quantity.
Laser Printer- Negatively charged ink power called toner is used in a laser printer for printing. The paper is
positively charged when it passes through the printer. In this entire page is processed at a time. Modern printer
like inkjet and laser printer have inbuilt memory to store pages that are printed.
Plotters- A plotter is a printer that interprets commands from a computer to make line drawings on paper with
multiple pens. A plotter is is a vector graphics printing device.
Main Memory- It stores programs and data which are currently needed by the CPU.
Secondary Memory- The information which is not being currently processed resides in the Secondary Memory.
The information which is needed by the CPU for current processing is transferred from the secondary memory
to primary memory.
6 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
RAM- Random Access Memory- It is a physical memory chip placed on the motherboard and stored the
frequently required dataand currently running processes. It is a volatile memory. It can be accessed randomly;
that is, any byte of memory can be accessed without touching the preceding bytes .
Types of RAM: Static Ram (SRAM), Dynamic RAM (DRAM), SDRAM (Synchronous Dynamic RAM), RDRAM
(RAMBus DRAM) and DDR RAM (Double Data Rate RAM)
ROM- Read Only Memory- these are semiconductor based memory that contains permanent operating
instructions called microprograms for the CPU which are stored into the computer when it is manufactured. It is
non-volatile. Types of ROM:
PROM- Programmable ROM- This is a blank ROM that can be written to once.
EPROM- Erasable Programmable ROM- can be reprogrammed after erasing the memory using special ultra
violet light.
EEPROM- Electrically Erasable Programable ROM- Also called Flash BIOS- These can be re written using special
software programs.
Example of ROM is BIOS- (basic input/output system) is the program a personal computer's microprocessor uses
to get the computer system started after you turn it on.
Cache Memory- Cache memory is an extremely fast memory that connects directly to the CPU through a cache
controller. It is used for storing frequently used data. Cache memory is used to bridge the speed mismatch
between the CPU and Main Memory. Cache if of two types: Internal Cache(L1)- built in the CPU and external
cache(L2)- outside the CPU between CPU and RAM.
Secondary Memory- Secondary memory is external and permanent memory that is useful to store the external
storage media such as floppy disk, magnetic disks, magnetic tapes.
Hard Disk- Hard Disk consists of multiple disks mounted on a common shaft. Each disk is known as platter. You
can consider it as multiple CD stacked over one another. Each platter/disk is divided into circular concentric
tracks and each track is divided into sectors. The disks are mounted on a rotary drive to rotate the disk. After the
read/write head is moved to the addressed track, it remains stationary while the disk rotates to bring the
starting position of the addressed sector under the read/write head. The time required to move the read/write
head to the addressed sector is called access time. Seek Time is the time required to move the read/write head
to the addressed track. Latency Time (Search time) is the time required to bring the starting position of the
addressed sector under the read/write head. So Access Time= Seek Time + Latency Time.
Types of connectors of Hard Disk and some other peripheral devices. Detailed knowledge is not necessary only
name and full form is enough.
SCSI- Small Computer System Interface
ATA- Advanced Technology Attachment
SATA- Serial ATA and PATA- Parallel- ATA
IDE_ Integrated Drive Electronic
Floppy Disk- Floppy disk also consists of disk similar to that of hard disk. Types of floppy: 3.5-inch and 5.25-inch.
Both Hard Disk and Floppy Disk are example of Magnetic Memory. RAM, ROM are example of Semiconductor
memory. While CD, DVD are examples of optical memory. Types of CD(Compact Disk) and DVD (Digital Versitile
Disk)
CD-ROM(CD Read Only Memory), CD-R(CD Recordable), CD-RW(CD- Read/Write), DVD-ROM, DVD-R, DVD-RW
7 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
SMPS- A switched-mode power supply (SMPS) is responsible for power distribution within a computer system.
As each component require different amount of power, hence SMPS gives each device the required amount of
power. Like for USB devices 5 Volt or 12 Volt. SMPS also gives power to all the components present on the
mother board.
Motherboard- Motherboard is the main circuit board on which all major components are present. Like RAM,
CPU, ROM, NIC Card etc. CMOS battery (complementary metal-oxide-semiconductor) CMOS is an on-board,
battery powered semiconductor chip inside computers that stores information. This information ranges from
the system time and date to system hardware settings for your computer.
BUS- Memory and I/O devices are connected to the CPU through a group of lines called Bus. These lines are
meant to carry information. There are three types of buses: Address Bus, data bus and control bus.
Address Bus- An address bus carries the address of a memory location or an Input/Output device that
the CPU wants to access. Address bus is uni-directional.
Data Bus- These lines carry the actual data. It is bidirectional
Control Bus- These lines carry the control signal from CPU to various device and vice versa. It is also bi-
directional.
Memory Units
8 bit 1 byte
1024 Byte 1 Kilo Byte(KB) = 210 bytes
1024 KB 1 Mega Byte (MB) = 220 bytes
1024 MB 1 Giga Byte (GB) = 230 bytes
1024 GB 1 Tera Byte (TB) = 240 bytes
1024 TB 1 Peta Byte (PB) = 250 bytes
1024 PB 1 Exa Byte (XB) = 260 bytes
1024 XB 1 Zeta Byte (ZB) = 270 bytes
1024 ZB 1 Yota Byte (YB) = 280 bytes
Also 1 Nibble= 4 bit
Softwares- Software is a set of programs, written in a programming language, which guides the computer to
perform a particular task or operation through well defined step by step instructions.
Types of Software: (i) System Software (ii) Application Software (iii) Development Software/ Programming
languages.
System Software consists of programs that control the operations of the computer and its peripheral devices. It
serves as an interface between the user, the application software and hardwares.
There are three types of System Software: (i) Operating System (ii) Language Translator (iii) System Utility
Operating System- will study with types
Language translators- Examples- Complier, Interpreter and Assembler. To understand these first lets discuss the
types of languages.
Machine language- The language that computer understand i.e Binary language (0 and 1)
Assembly Level Language- Machine language is not easy to code for human, so Assembly language was
developed which consists of human readable codes called mneumonics.
High Level Languages- There are codes written in simple English language. Like Java, C++
8 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Complier- It converts High Level language to Machine language in one go. That is full program at once.
Remember (Comp)iler => (Comp)lete. Means complete program at once. When a compiler complies a program
an object code is generated.
Interpreter- It also converts High Level Language into Machine language but one line at a time. In Interpreter no
object code is generated, while in Compiler Object code is generated.
Assembler- It converts Assebmly level language into Machine Language.
Loader and Linker- Linker – Usually a large program is divided into a number of smaller subprograms called
modules. A linker is a program that links (combines) smaller programs to form a single program. All the object
codes are combined.
Loader is a program that loads machine codes of a program into the system memory. If the program is in
reallocated format, the loader assigns specific addresses to each instruction and data before the loader loads
the program into memory.
System Utility- These are program which help users to perform certain tasks to help increase the efficiency of
the computer and do maintaince work of the computer. Example: Scandisk, Disk Defragment. Backup utility.
Application Software- the set of programs that is necessary to carry out operation for a specific application such
as processing documents, medical diagnosis, accounting, etc.Example: MS-Word, MS- Access, Paint, etc.
Programming languages- Programs are the set of instruction written to give some instruction to computer to
perform any function. Now these programs can be written using various programming languages available. For
example for performing same oeration we can write a code in C and C++ both performing similar operation, just
the coding will be different. Lets see generation of programming languages.
9 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Operating System- An operating system (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs. An operating system has two parts: Kernel
and Shell. The kernel is responsible for interacting with hardware and shell is responsible for interacting with
user.
Memory Management
Job Scheduling
Protection and Security
Device Management
File and Data Management
Communication between processes
Error Detection
Serial Processing OS: The Serial Processing Operating Systems are those which Performs all the instructions into
a Sequence Manner or the Instructions those are given by the user will be executed by using the FIFO Manner
means First in First Out.
Batch Processing OS: The Batch Processing is same as the Serial Processing Technique. But in the Batch
Processing Similar Types of jobs are Firstly Prepared and they processed simultanosuly in batches.
Multi-Programming OS: With the help of Multi programming we can Execute Multiple Programs on the System
at a Time and in the Multi-programming the CPU will never get idle, because with the help of Multi-
Programming we can Execute Many Programs.
Real Time OS: A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time
applications that process data as it comes in, typically without buffer delays. Real time OS fixes a time period for
each job to complete. This time period is called Deadline.
Distributed OS: Distributed Means Data is Stored and Processed on Multiple Locations. When a Data is stored
on to the Multiple Computers, those are placed in Different Locations. Distributed means In the Network,
Network Collections of Computers are connected with Each other.
Parallel OS: are used to interface multiple networked computers to complete tasks in parallel. The architecture
of the software is often a UNIX-based platform, which allows it to coordinate distributed loads between multiple
computers in a network.
Android- Cupcake, Donut, Éclair, Froyo, Gingerbread, Honeycomb, Ice Cream Sandwich, Jelly Bean, KitKat,
Lollipop, Marshmallow, Nougat, O.
10 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Mac OS- While a version of Mac OS X comes pre-installed on all Apple Macintosh computers, users must pay if
they wish to use newer versions when they become available. Versions- Mac OS X 10.0 – code name Cheetah,
Mac OS X 10.1 – code name Puma, Mac OS X 10.2 – also marketed as Jaguar, Mac OS X Panther - 10.3, Mac OS X
Tiger - 10.4 , Mac OS X Leopard - 10.5, Mac OS X Snow Leopard - 10.6, Mac OS X Lion - 10.7, OS X Mountain Lion
- 10.8, OS X Mavericks - 10.9, OS X Yosemite - 10.10 , OS X El Capitan - 10.11, macOS Sierra - 10.12
List of some Mobile OS: Symbian, Android, Apple iOS, Blackberry OS, Windows OS, BADA, Palm OS (Garnet OS),
Maemo, MeeGo, Verdict.
11 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Networking
Network- An interconnected collection of autonomous computers.
Arpanet- First Network . Acronym for Advanced Research Projects Agency Network.
LAN- A Local Area Network is a privately owned computer network covering a small Networks geographical area,
like a home, office, or groups of buildings e.g. a school Network. There are basically two types of Local Area
Networks namely: ARCnet and Ethernet.
MAN- Metropolitan Area Networks are the network spread over a city. Example: Cable TV. Various LANs can be
interconnected to form a MAN. MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual
Bus).
WAN- Wide Area Network.When computer/terminals are spread over a wide area, they can be connected
through public or private communication system. This type of network is called WAN. Internet is also a kind of
WAN.
SAN- Storage Area Network- A storage-area network (SAN) is a dedicated high-speed network (or subnetwork)
that interconnects and presents shared pools of storage devices to multiple servers.
PAN- Personal Area Network. A personal area network (PAN) is a computer network organized around an
individual person, and that's set up for personal use only. Like Bluetooth.
VPN- A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a
public network such as the Internet or a private network owned by a service provider.
Network Topology- The pattern of interconnection of nodes/ computers in a network is called Topology.
Bus/Linear This consists of a single Short Cable Length Fault diagnosis is easy
length of the Resilient Architecture Fault isolation is
transmission medium Easy to Extend difficult
onto which the various Nodes must be
nodes are attached. intelligent
12 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Network Devices
Modem (Modulation Demodulation)- It allows to connect and communicate with other computers via
telephone line.
Ethernet Card- Ethernet is a LAN architecture developed by Xerox Cor in association with DEC and Intel. It uses
either bus or start topology. RJ-45 (Rejistered Jack-45) is an either wire connector used for Ethernet
connections. Similarly RJ-11 is used for telephone cables.
Hub- A hub is a hardware device used to connect several computers together. It forwards any data packets
received from one port to all of the remaning posrts. Two types: Active Hub and Passive Hub. Active hub passes
the signal from one device to another device after amplifying it, while passive device passes without amplifying
it.
13 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Switch- A switch is a device that is used to segment networks into different sub networks called subnets.
Subnetting the network into samller network prevents traffic overloading in a network. To insulate the
transmission from the other ports, the switch establishes a temporary connection between the source and
destination, and then terminate the connection once the conversation is done.
Repeater- A reapeater is a device that amplifies a signal being transmitted on the network.
Bridge- A bridge is a device that lets you link two networks together. It establishes an intelligent connection
between two local netwroks with the same standard but with different types of cables.
Router- A device that wors like a bridge but can handle different protocols is known as a router. It is used to
separate different segments in a network to improve performance and reliability.
Communication protocols- A protocol is a formal description of message formats and the rules that two or more
machines must follow to exchange those messages.
OSI Model- The OSI model presents a conceptual model of how a telecommunications system works.
14 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
WWW- World Wide Web- is a collection of resources that one can access from anywhere in the world, over the
Internet. The World Wide Web Consortium (W3C) is an international community that develops open standards
to ensure the long-term growth of the Web.
Internet Protocols
HTTP- Hypertext Transfer Protocol- HTTP is the underlying protocol used by the World Wide Web and this
protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers
should take in response to various commands. HTTPS- HTTP Secured.
FTP- File Transfer Protocol- a method for copying files over a network from one computer to another.
Downloading- Transfer of file from server to user computer
Uploading- Transfer of file from user computer to server.
TCP/IP- TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different procedures that are
often linked together. TCP is the means for creating the packets, putting them back together in the correct order
at the end, and checking to make sure that no packets got lost in transmission. Internet Protocol (IP) is the
method used to route information to the proper address. Every computer on the Internet has to have its own
unique address known as the IP address. Every packet sent will contain an IP address showing where it is
supposed to go.
UDP- User Datagram Protocol (UDP) is part of the Internet Protocol suite used by programs running on different
computers on a network. UDP is used to send short messages called datagrams but overall, it is an unreliable,
connectionless protocol.
ICMP- Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used
by network devices, including routers, to send error messages and operational information indicating, for
example, that a requested service is not available or that a host or router could not be reached.
SMTP- Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network.
SMTP provides the ability to send and receive email messages.
POP- Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts
and retrieves email from a remote mail server for access by the host machine. POP3 is the latest version. POP
uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol (SMTP) for
end-to-end email communication, where POP pulls messages and SMTP pushes them to the server.
IMAP- Internet Message Access Protocol (IMAP) is a standard protocol for accessing email on a remote server
from a local client. IMAP is an application layer Internet Protocol using the underlying transport layer protocols
to establish host-to-host communication services for applications. This allows the use of a remote mail server.
The well-known port address for IMAP is 143.
15 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
To Vs CC VS BCC- CC_ Carbon Copy, BCC- Blind Carbon Copy. When you CC people on an email, the CC list is
visible to all other recipients. Unlike with CC, no one can see the list of recipients on the BCC list. The To and CC
fields work similarly. Whether you put four email addresses in the To field or put one email address in the To
field and three in the CC field, the four people will all receive the same email. They’ll also be able to see every
other recipients’ email address.
Attachement- An email attachment is a computer file sent along with an email message.
Draft- is the email that has been composed but not send.
URL- Uniform Resource Locator. Every website has a unique name called URL. Like www.byscoop.com is the URL
of our website. Each URL is associated with an IP address. For example if you types the IP address associate with
google.co.in in the browser you will oen the same google.co.in page. DNS- Domain Name Server is responsible
for converting this URL into IP address so that the site may be opened.
Type: specifies the type of server like http, ftp. www.domainname.com is the URL of the site. Dot com is the
domain ID there are various domain ID. Folder-name may or may not be present every time. Webpage is the
specific page that we open on a website. .htm ot .html is the extension of websites created using html coding.
Some Website designing tools and coding languages in brief: HTML, ASP, PHP
HTML- Hyper Text Markup Language. In a recent exam on of the html tag was asked so here we will give a list of
some basic html tags that may be asked. HTML is a language used to design webpages.
Some HTML tags- all the tags/keywords used in html are written inside "<>". main tag is <html> which denotes
the starting of html coding. Any tag that starts has a end too that is denoted by the same tag with "/" like <html>
is the opening tag, while </html> is the ending tag of html.
16 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
<title> tag- title of the page (appears in the title bar of the browser)
For heading there are six tags <h1>, <h2>, <h3>, <h4>, <h5>, <h6>- h1 is the largest while h6 is the
smallest.(given in decreasing order)
<header>- must be used before h1, h2, …h6. For heading
<body>- tag defines the document's body. Inside this the actual code is placed
<b>- bold; <i>-italics; <u>-underline
<hr>- horizontal line; <ul>- unordered list (bullets); <ol>- ordered list(numbering); <img>- to add image
<table>- to insert a table; <tr>- row of table; <td>- tag defines a standard cell in an HTML table.
<a href>- insert hyperlink, here a denotes anchor; <form>- to insert a form
Cascading Style Sheets (CSS)- is a style sheet language used for describing the presentation of a document
written in a markup language.
DHTML- Dynamic HyperText Markup Language is a combination of Web development technologies used to
create dynamically changing websites. Like CSS, Scripting language like ASP, PHP, Javascript.
PHP- (recursive acronym for PHP: Hypertext Preprocessor)- It is a server side Scripting language.
ASP -Active Server Pages. ASP is a development framework for building web pages. It was introduced in 1998 as
Microsoft's first server side scripting language.
17 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
DBMS- A database management system (DBMS) is a collection of programs that enables you to store, modify,
and extract information from a database.
Types of Database Model- Relational Data Model, Network Data Model, Hierarchial data model.
Database terms
Primary Key- it is the attribute that can uniquely identify tuples within a relation. In a Relation there is only one
Primary Key
Candidate Key- All those attributes that can act as a primary key are called candidate key. But only one of them
can be primary key.
Alternate Key- Those candidate key that are not primary key are alternate key
Foreign Key- A foreign key is used to represent the relation between two tables. A foreign key is the attribute
whose value is derived from the primay key of some other table.
RDBMS- Relational DBMS- A relational database management system (RDBMS) is a database management
system (DBMS) that is based on the relational model as invented by E. F. Codd.
SQL is a standard language for storing, manipulating and retrieving data in databases.
Data Definition Language, DDL, is the part of SQL that allows a database user to create and restructure database
objects, such as the creation or the deletion of a table.
Data Manipulation Language, DML, is the part of SQL used to manipulate data within objects of a relational
database.
Data control commands in SQL allow you to control access to data within the database. These DCL commands
are normally used to create objects related to user access and also control the distribution of privileges among
users
Data administration commands allow the user to perform audits and perform analyses on operations within the
database.
18 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Object- Object is an identifiable entity with some characteristic and behavior. Each object is characterized by a
set of properties that describe objects. Objects are variables or instances of the types class. Objects
communicate with each other through "functions"
Class- Class is a group of objects that share common properties and relationships. A class has two basic
elements: Data Members and Member Functions. Data members define the property of a class. Member
function describes how an object of that class operates. Class is a user defined data type.
Data Abstraction- it refers to the act of representing essential features without including the background details
and explanations.
Encapsulation- The wrapping of data and functions into a single unit called class is known as Encapsulation.
Inheritance- is the capability of one class of things to inherit capabilities or properties from another calss.
Modularity- The act of partitioning a program into individual components is called modularity.
Polymorphism- it is the ability for a message or data to be processed in more than one form.
19 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
20 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
What is a virus
Definition: is a type of malicious code or program written to alter the way a computer operates and is designed
to spread from one computer to another.
Boot sector virus- This type of virus can take control when you start — or boot — your computer. One
way it can spread is by plugging an infected USB drive into your computer.
Resident virus- live in your RAM memory. It can interfere with normal system operation which can lead
to the corruption -of files and programs.
Direct action viruses- they attack certain types of files, typically .exe and .com files. The main
purpose of this virus is to replicate and infect files in folders.
Browser Hijacker- This type of virus infects your web browser in which it will bring you to different
websites.
Web Scripting Virus- This virus lives in certain links, ads, image placement, videos, and layout of a
website. These may carry malicious codes in which when you click, the viruses will be automatically
downloaded or will direct you to malicious websites.
Macro Virus- Macro viruses target applications and software that contain macros. These viruses can
carry out series of operations affecting the performance of the program or software.
Other Malwares
Ransomware- Ransomware is a type of malicious software that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid.
Worms- Worms are malicious programs that make copies of themselves again and again on the local
drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again.
Trojans- It is a type of program that looks as a genuine application but it is actually something else and c
auses destructive results .Unlike viruses, Trojan horses do not replicate themselves but they can be just
as destructive.
Adware- Generically adware is a software application in which advertising banners are displayed while
any program is running.
Spyware- Spyware is a type of program that is installed with or without your permission on your
personal computers to collect information about users, their computer or browsing habits tracks each
and everything that you do without your knowledge and send it to remote user.
Spam- Spamming is a method of flooding the Internet with copies of the same message.
Adware- Software that generates revenue for its developer by automatically generating online advertisements
in the user interface of the software or on a screen presented to the user during the installation process.
21 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Backdoor- An undocumented way of accessing a system, bypassing the normal authentication mechanisms.
Browser Hijacker- Software that modifies a web browser's settings without a user's permission to inject
unwanted advertising into the user's browser.
Crimeware- A class of malware designed specifically to automate cybercrime. Crimeware (distinct from spyware
and adware) is designed to perpetrate identity theft through social engineering or technical stealth in order to
access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or
completing unauthorized transactions that enrich the cyberthief.
Denial of Service (DOS) Attacks- Malicious attempts by one or more people to cause the victim, site, or node to
deny service to its customers.
Keyloggers- The action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person
using the keyboard is unaware that their actions are being monitored.
Malicious Crypto Miners- Software that uses system resources to solve large mathematical calculations that
result in some amount of cryptocurrency being awarded to the solvers.
Rootkit- Programs that hide the existence of malware by intercepting (i.e., "Hooking") and modifying operating
system API calls that supply system information.
Spyware- Software that aims to gather information about a person or organization without their knowledge,
that may send such information to another entity without the consumer's consent, or that asserts control over a
device without the consumer's knowledge.
Wipers- A type of destructive malware that contains a disk wiping mechanism such as the ability to infect the
master boot record with a payload that encrypts the internal file table.
22 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Internet Protocol (IP) Address – Just like we have a house address for reaching someone’s house, a computer
system on the internet has an IP Address. It is an address through which a computer is identified on a
network/internet.
Subnet Mask– A subnet mask is a 32-bit number used to differentiate the network component of an IP address
by dividing the IP address into a network address and host address. Subnet masks are used to design
subnetworks, or subnets, that connect local networks
Classes of IP Address
IP Address is divided into 5 classes based on the address range. It is as follows:
Class From To
23 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
DHCP- The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP
networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters
to each device on a network so they can communicate with other IP networks.
Loopback IP Address: An address that sends outgoing signals back to the same computer for testing. In a TCP/IP
network, the loopback IP address is 127.0.0.1, and pinging thisaddress will always return a reply unless the
firewall prevents it.
DNS (Domain Name System)– On an interent, every website is associated with a unique IP Address. For
example, the IP Address of Google India is 216.58.200.163. SO when you open google, you are actually opening
216.58.200.163. The system/server that performs this task conversion of web names to IP Address is known as
Domain Name System (DNS). In simple words, it is the phonebook of the Internet.
24 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Important Abbreviations
S.No Abbreviation Full-name
1 AI Artificial Intelligence
2 ALGOL Algorithic Language
3 ALU Arithmetic Logic Unit
4 AMD Advanced Micro Devices
5 APRANET Advanced Research Project Agency Network
6 ASCII American Standard Code for Information Interchange
7 BASIC Beginners All-purpose Symbolic Instruction Code
8 BCD Binary Coded Decimal
9 BINAC Binary Automatic Computer
10 BIOS Basic Inpute Output System
11 BIPS Billions of Instructions Per Second
12 CC Carbon Copy (on emails)
13 CD Compact Disk
14 CD-R CD-Recordable
15 CD-ROM Compact Disk Read Only Memory
16 CD-RW CD Read/Write
17 CLI Command Line Interface
18 COBOL Common Business Oriented
19 CPU Central Processing Unit
20 CRT Cathode Ray Tube
21 DBMS Data Base Management System
22 DBS Demand Based Switching
23 DDL Data Definition Language
24 DMA Direct Memory Access
25 DNS Domain Name System
26 DPI Dots Per Inch
27 DRAM Dynamic RAM
28 DSN Distributed Systems Network
29 DVD Digital Versatile Disk
30 EBCDIC Extended Binary Coded Decimal Interchange Code
31 EDSAC Electronic Delay Storage Automatic Calculator
32 EDVAC Electronic Discrete Variable Automatic Calculator
33 ENIAC Electronic Numerical Integrator And Calculator
34 EPROM Erasable Programmable Read-Only Memory
35 EXE Executable
36 FAT File Allocation Table
37 FAX Far Away Xerox
38 FLOPS Floating Point Operations Per Second
39 FORTRAN FORmula TRANslation
40 FTP File Transfer Protocol
41 GB Giga Bytes
42 GHz Giga Hertz
43 GIF Graphics Interchange Format
44 GPRS General Packet Radio Service
45 GSM Global System for Mobile communication
46 GSM Global System for Mobile Communication
25 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
26 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
27 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
28 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
2. Which of the following version is the successor 9. IPv6 (Internet Protocol Version 6) is also called
of IPv4? as _________.
A) IPv5 A) IPng
B) IPv6 B) IEFT
C) IPv5.5 C) IAAE
D) IPv7 D) ISTS
4. IPv6 addresses are _____ bit hexadecimal Answers MCQ Set -1 (IP Address)
numbers.
A) 128 1. Option B
B) 64 Explanation: The Dynamic Host Configuration
C) 32 Protocol (DHCP) is a network management
D) 256 protocol used on UDP/IP networks whereby a
5. IPv4 addresses are _____ bit hexadecimal DHCP server dynamically assigns an IP address and
numbers. other network configuration parameters to each
device on a network so they can communicate
A) 32 bits
B) 64 bits with other IP networks.
C) 128 bits 2. Option B
D) 256 bits
Explanation: IP Version 6
6. Which of the following is a loopback IP address?
A) 192.168.1.1 3. Option C
B) 192.168.0.1
Explanation: Example
C) 127.0.0.0
2001:0db8:85a3:0000:0000:8a2e:0370:7334
D) 127.0.0.1
[su_spoiler title="View answer" style="fancy" 4. Option A
icon="plus-circle"] Option D Explanation: IPv6 addresses are 128 bits in length
and are made up of hexadecimal characters
7. In IPv4, every IP address comes with a
corresponding ________. 5. Option A
A) net address Explanation: The IPv4 addresses we are all used to
B) subnet mask
29 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
30 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
1. Feature in database that a user is able to access 8. The technique for collecting and managing data
only the information for he/she is provided access from varied sources to provide meaningful
is known as? business insights is known as?
A) Database Protection A) data warehouse
B) Database Maintenance B) data sourcing
C) Database Abstraction C) data outsourcing
D) Database Security D) data mining
31 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
2. Option A
MCQ Set-4 (Internet)
Explanation: There are many types of model: 1. The internet is a worldwide network of
Hierarchical database model- Relational model; computer networks that evolved from the first
Network model; Object-oriented database model; network ____________.
Entity-relationship model; Document model; A) Intranet
Entity-attribute-value model; Star schema B) Extranet
C) Arpanet
3. Option C
Explanation: The user extracts the data stored in D) Hypernet
the database using a DBMS tool. Hence the DBMS 2. What does C stands for in W3C?
tool acts as a link between the database and the A) Consortium
user B) Collection
4. Option D C) Community
Explanation: Database has following components- D) Consortium
Software- The DBMS software ; Data – metadata 3. Which protocol defines how messages are
i.e data about the data; Procedures- refer to formatted and transmitted over the Internet?
general instructions to use a database A) FTP
management system.; Database Access Language; B) HTTP
and Users C) SFTP
5. Option B D) TCP/IP
Explanation: Data Mining 4. Which of the following is not a protocol for e-
6. Option D mail?
A) POP
Explanation: extremely large data sets that may be
analysed computationally to reveal patterns, B) SMTP
trends, and associations, especially relating to C) ICMP
D) IMAP
human behaviour and interactions
32 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
33 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
34 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
35 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App
Computer Awareness PDF
Banking Awareness
Banking Awareness Quiz
Daily Current Affairs
Current Affairs Quiz
Static GK
Static GK Quiz
Government Schemes
Quiz on Government Schemes
Insurance Awareness
Insurance Awareness Quiz
36 www.byscoop.com | One stop solution for Current Affairs, Banking Awareness and Static GK
Like our Facebook Page Join our Telegram Channel Download Our Android App