0% found this document useful (0 votes)
10 views14 pages

computer

The document provides an overview of various computer memory types, including RAM, ROM, PROM, and EPROM, along with their functionalities. It also covers key concepts in networking, animation in PowerPoint, and the basics of malware, spreadsheets, and document formatting in software like MS Word and Access. Additionally, it discusses protocols like HTTP and SMTP, as well as the evolution of IP addresses from IPv4 to IPv6.

Uploaded by

SachinUpadhyay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views14 pages

computer

The document provides an overview of various computer memory types, including RAM, ROM, PROM, and EPROM, along with their functionalities. It also covers key concepts in networking, animation in PowerPoint, and the basics of malware, spreadsheets, and document formatting in software like MS Word and Access. Additionally, it discusses protocols like HTTP and SMTP, as well as the evolution of IP addresses from IPv4 to IPv6.

Uploaded by

SachinUpadhyay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

RAM(Random Access Memory) computer memory is available to the user for

creating, loading, or running programs and for the temporary storage and
manipulation of data, in which time of access to each item is independent of the
storage sequence.

 ROM(Read Only Memory) computer memory in which program instructions,


operating procedures, or other data are permanently stored, generally on electronic
chips during manufacture, and that ordinarily cannot be changed by the user.

 PROM(Programmable Read-Only Memory) is a memory chip whose


contents can be programmed by a user or manufacturer for a specific purpose.

 EPROM(Electronically Programmable Read-Only Memory) is a memory


chip whose contents can be erased by a mechanism using ultraviolet light and
reprogrammed for other purposes.

Animation scheme is a collection of different kinds of effects which helps to animate


the elements in MS PowerPoint. The animation scheme is already defined in the
slide transition method.

To view all slides on a single screen in Microsoft Powerpoint, we use Slide sorter
view.

 View in Slide Sorter You can view your slides as thumbnails in the Slide
Sorter view.

 You can easily sort and arrange the order of your slides using this view as you
create your presentation and again when you get ready to print it.

 You can see and sort the presentation slides in PowerPoint using the Slide
Sorter view.

In networking, a packet is a small segment of a larger message. Data sent over


computer networks, such as the Internet, is divided into packets. These packets are
then recombined by the computer or device that receives them

An arithmetic unit, or ALU, enables computers to perform mathematical


operations on binary numbers. They can be found at the heart of every digital
computer and are one of the most important parts of a CPU (Central Processing
Unit).

 An ALU consists of three types of functional parts: storage registers,


operations logic, and sequencing logic.

The first ATM was installed in a Barclay's Bank branch in London in 1970.
Firefox uses the Gecko layout engine to render web pages, which implements
current and anticipated web standards.

Stuxnet is a computer worm that targets industrial control systems. It attacked


Iran's nuclear program in 2007.

 Stuxnet

o It is a computer worm that was originally aimed at Iran's nuclear


facilities

o It has since mutated and spread to other industrial and energy-


producing facilities.

o The original Stuxnet malware attack targeted the programmable logic


controllers (PLCs) used to automate machine processes.

 Conficker

o Conficker, also known as Downup, Downadup, and Kido, is a computer


worm targeting the Microsoft Windows operating system.

 Sasser

o A Sasser worm is a computer worm mainly targeting computers running


Microsoft OSs such as Windows XP and Windows 2000.

o Sasser worm transmits by exploiting a vulnerable network port.

o This worm can easily spread out from one computer to another without
user interference.

 Zeus

o Zeus Virus (or Zeus Trojan malware) is a form of malicious software that
targets Microsoft Windows and is often used to steal financial data.

LANPAR, available in 1969, was the first electronic spreadsheet on


mainframe and time-sharing computers.

o LANPAR was an acronym: LANguage for Programming Arrays at Random.

o VisiCalc (1979) was the first electronic spreadsheet on a microcomputer.

 Microsoft Access:

o It is a database management system (DBMS) from Microsoft that


combines the relational Microsoft Jet Database Engine with a graphical user
interface and software-development tools.

In MS Word the default action when pressing the Enter key is to create a new
paragraph.
 In Microsoft Word, the keyboard shortcut Ctrl+Enter adds a page break at the
cursor's current position.

 Ctrl+ L is the short key to align a paragraph to the left side of the page.

 Ctrl+ E is the short key to align a paragraph to the center of the page.

 Ctrl+ R is the short key to align a paragraph to the right side of the page.

A bitmap (or raster graphic) is a digital image composed of a matrix of dots.


When viewed at 100%, each dot corresponds to an individual pixel on a display.
In a standard bitmap image, each dot can be assigned a different color.
Together, these dots can be used to represent any type of rectangular picture.

 There are several different bitmap file formats. The standard,


uncompressed bitmap format is also known as the "BMP" format or the device-
independent bitmap (DIB) format. It includes a header, which defines the size of
the image and the number of colors the image may contain, and a list of
pixels with their corresponding colors. This simple, universal image format can
be recognized on nearly all platforms, but is not very efficient, especially for large
images.

 Other bitmap image formats, such as JPEG, GIF, and PNG, incorporate
compression algorithms to reduce file size. Each format uses a different type of
compression, but they all represent an image as a grid of pixels. Compressed
bitmaps are significantly smaller than uncompressed BMP files and can
be downloaded more quickly. Therefore, most images you see on the web are
compressed bitmaps.

 If you zoom into a bitmap image, regardless of the file format, it will look
blocky because each dot will take up more than one pixel. Therefore, bitmap
images will appear blurry if they are enlarged. Vector graphics, on the other hand,
are composed of paths instead of dots and can be scaled without reducing the
quality of the image.

The Video Graphics Array (VGA) connector is a standard connector used


for computer video output.

 Originating with the 1987 IBM PS/2 and its VGA graphics system, the 15-
pin connector went on to become ubiquitous on PCs, as well as many monitors,
projectors, and high definition television sets.

FireWire, which is also called IEEE 1394, is a connecting device used primarily
for adding peripherals to a computer.

Hypertext is the text displayed on a computer display or other electronic


devices with references to other text that the reader can immediately access.

 Hypertext documents are interconnected by hyperlinks, which are


typically activated by a mouse click, keypress set, or screen touch.
 HyperMedia is a term used for hypertext that is not constrained to be text:
it can include graphics, video, and sound.

The fundamental sequence of steps that a CPU performs is called CPU Cycle, it is
also known as the "fetch-execute cycle,".

 A clock cycle, or simply a "cycle," is a single electronic pulse of a CPU.

 During each cycle, a CPU can perform a basic operation such as fetching an
instruction, accessing memory, or writing data.

 Since only simple commands can be performed during each cycle, most
CPU processes require multiple clock cycles.

 In physics, the frequency of a signal is determined by cycles per second, or


"hertz."

 Similarly, the frequency of a processor is measured in clock cycles per second.


Since modern processors can complete millions of clock cycles every second,
processor speeds are often measured in megahertz or gigahertz.

 The frequency of a processor is also known as the processor's clock speed.

 While the clock speed is important in determining the processor's overall


performance, it is not the only factor.

The information on the CMOS chip includes types of disk drives are installed,
the current date and time of your system clock, and your computer's boot
sequence.

 The Complementary Metal-Oxide-Semiconductor (CMOS) is a physical


part of the motherboard.

 The CMOS is reset and loses all custom settings in case the battery runs out of
energy, additionally, the system clock resets when the CMOS loses power.

 Basic Input/Output System(BIOS)

o It is a special kind of program which is required for the CPU to talk to other
devices. ROM chip stores all this information and the program which is stored on
ROM chips is called firmware.

 Complementary Metal-Oxide-Semiconductor (CMOS)

o The data on the CMOS chip can be accessed and updated via the CMOS Setup
program.

o Power is required to maintain the data stored on CMOS Chip, power is supplied
by a battery on the motherboard.

HTTP protocol is used for requesting a web page in ASP.NET from the Web Server:
Important Point of HTTP

 The Hypertext Transfer Protocol (HTTP) is an application protocol for


distributed, collaborative, hypermedia information systems.

 HTTP is the foundation of data communication for the World Wide Web, where
hypertext documents include hyperlinks to other resources that the user can easily
access.

Ctrl + Shift Apply an outline border to the selected


+& cells.

Ctrl + Shift
To unhide a selected column
+O

Ctrl + Shift
To apply the percent format
+%

Ctrl + Shift
To apply the currency format
+$

Ctrl + L: The keyboard shortcut is used for aligning the objects or elements of the
MS PowerPoint towards the left.

 Ctrl + K: The keyboard shortcut is used for inserting the hyperlink in MS


PowerPoint.

 Ctrl + M: The keyboard shortcut is used for a new slide in the presentation.

 Ctrl + S: The keyboard shortcut is used to save the current presentation.

When we produce a document of Access, information is held on and accessed


simply through multiple elements. There are seven major elements of MS Access
info. Discuss below ar an equivalent in brief:

 Tables: A table in Access is analogous to the other tabulated information


within the rows and columns. However, once adding information to a program to
make a table, all {the information the knowledge the information} entered should
be correct if any incorrect data is entered the process might become slow or might
not offer the proper answer. The looks of table might look like the one fashioned in
surpass with column headings and titles.

 Queries: Once a table is made and also the user or computer programmer is
trying to find a calculated output, then it's referred to as queries. this might
embrace filtering, shrewd, sorting, updating, etc.
 Macros: The tool victimization that predefined actions which may automatize
tasks on associate Access reports are termed macros. Multiple tasks are assigned
and they can operate whenever the macros choice is chosen on a report.

 Forms: A computer programme for an info application is created victimization


forms. Forms will be into two. These are certain and unbound forms.

 Report: Once all the data is entered into the info, it is reviewed or analysed
employing a report. A report will then be made-to-order or changed as per the
user’s demand.

 Module: this enables a collection of pre-defined directions to be created by a


computer programmer within the info they'll be used throughout the info.

 Originally created in 1989, this format was first implemented in the PKZIP
utility of PKWARE, Inc. as a replacement for Thom Henderson's previous ARC
compression format. Numerous software utilities other than PKZIP quickly
supported the ZIP format then.

 Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are cryptographic protocols
designed to provide the security of communication over a computer network.
 Software as a service(SAAS) is a licensing and distribution model of software in which software is
licensed and centrally hosted on a subscription basis.
 Search engine optimization(SEO) is the method of enhancing the quality and amount of website
traffic from search engines to a website or a web page.

 The collective name for a variety of malicious variants of software , including


viruses, ransomware, and spyware , is malware .

 Malware, shorthand for malicious software, usually consists of cyber-attacker-


developed code designed to inflict significant data and device harm or to
obtain unauthorized access to a network.

 A computer virus is a type of computer program that replicates itself when


executed by altering other programs on the computer and adding its own
code.

 The affected areas are then said to be 'infected' with a computer virus when
this replication succeeds.

 Spam is some form of unwanted digital correspondence that is sent out in


bulk, unsolicited.

 A subscript is a number, figure, symbol, or indicator that is smaller


than the normal line of type and is set slightly below it .

o For ex- Formula of Carbon Dioxide is CO 2.

o The shortcut key to create subscript in MS Word is Ctrl + = .


 A superscript is a number, figure, symbol, or indicator that is smaller
than the normal line of type and is set slightly above it .

o For ex- ion of sodium is Na+1.

o For superscript, press Ctrl, Shift, and the Plus sign (+) at the same time.

 IPv4 was the primary version of IP.

 It was sent for creation in the ARPANET in 1983.

 It is generally utilized IP adaptation.

 The IPv4 uses a 32-bit address scheme.

 IPv4 binary bits are separated by a dot(.)

 IPv4 support broadcast.

 IPv4 binary bits are a dot(.).

 IPv4 security permits encryption to keep up privacy and security.

 IPV4 addresses are redefined and permit flawless encoding.

 Routing is a lot scalable and economical as a result of addressing is collective


more effectively.

 Data communication across the network becomes a lot of specific in multicast


organizations.

 IP Address is either a four-byte (IPv4) or an sixteen-byte (IPv6) address.

 A device attached with IP Address can retrieve by RARP protocol.

 IP Address operates in the network layer.

 IP Address identifies the connection of the device on the network.

 IP Address modifies with the time and environment.

 IP Addresses can be found by a third party.

 IPv6 uses 128-bit addresses, allowing 3.4 x 1038 unique IP addresses.

 This is equal to 340 trillion trillion trillion IP addresses.

 IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by


the colons, thus (8 x 16 = 128) bits in total.

 A cross-assembler is an assembler that runs on a computer with one type of


processor but generates machine code for a different type of processor

 An emulator is hardware or software that enables one computer system to


behave like another computer system. An emulator typically enables the host
system to run software or use peripheral devices designed for the guest
system
 Bootstrap Loader (BSL) is a small program which can be activated
immediately after a microcontroller has been powered up, in order to load and
execute another program in a well defined manner.

 The simulator is a device that enables the operator to reproduce or


represent under test conditions phenomena likely to occur in actual
performance

 BCD (Binary Coded Decimal) is simply the 4-bit binary code


representation of a decimal digit.

o Each decimal digit replaced in the integer and fractional parts


by its binary equivalent.

o BCD Code uses four bits to represent the 10 decimal digits of 0 to


9.

o BCD code is often called 8421 because the BCD is a weighted


code and the weights used in binary coded decimal code are 8,
4, 2, 1.

 The first 8-bit Extended Binary Coded Decimal Interchange Code


(EBCDIC) introduced by IBM

Both SRAM and DRAM are random access memory.

Each cell of a memory device is capable of storing one bit of information in


the form of binary numbers. What does the term 'bit' mean?

Binary digit

EEPROM read-only memory can be erased by exposing it to an electrical


charge and can be reprogrammed

 CAM - Computer-Aided Manufacturing: This is the use of software to


control machine tools and related machinery in the manufacturing of
workpieces.

 CAE - Computer-Aided Engineering: It is the broad usage of computer


software to aid in engineering tasks, including simulation, analysis,
manufacturing, etc.

 CNC - Computer Numerical Control: It is a method used in manufacturing


where the functions and motions of machine tools are controlled by a
computer system.
 PLM - Product Lifecycle Management: It is the process of managing the
entire lifecycle of a product from inception, through engineering design and
manufacture, to service and disposal of manufactured products.

 FEA - Finite Element Analysis: It is a computerized method for predicting


how a product reacts to real-world forces, vibration, heat, fluid flow, and other
physical effects.

SMTP stands for Simple Mail Transfer Protocol.

 SMTP is a set of communication guidelines that allow the software to


transmit electronic mail over the internet is called Simple Mail Transfer
Protocol.

 It is a program used for sending messages to other computer users based on


e-mail addresses.

 The Simple Mail Transfer Protocol (SMTP) is used to deliver e-mail messages
over the Internet.

 This protocol is used by most e-mail clients to deliver messages to the server
and is also used by servers to forward messages to their final destination.

 Communication between mail servers generally uses the standard TCP port
25 designated for SMTP.

Asymmetrical Digital Subscriber Line.

 Asymmetrical Digital Subscriber Line is a type of digital subscriber line


technology a data communications technology that enables faster data
transmission over copper telephone lines.

 Asymmetrical Digital Subscriber Line works by using spectrum above band


used by voice telephone calls.

 It provides high transmission speed for video and voice over an ordinary
copper telephone wire.

 Object Linking and Embedding is a Microsoft Technology that facilitates


the sharing of application data and objects written in different formats from
multiple sources.

o Linking establishes a connection between two objects.

o Embedding facilitates data insertion.

 Object Linking and Embedding allows users to edit and create documents that
contain objects created by different applications.

 Object Linking and Embedding allows an editing application to export part of a


document to another editing application and then import it with additional
content.
 To format is to prepare a storage medium, usually a disk, for reading and
writing.

 Format is a term which is used in computer science which is erasing of entire


date in particular storage medium or disk.

 Defrag is done to speed up computer processing speed.

 Map referred to documentation which describes its overall structure.

 Boot refers to restarting the operating system (OS) of computer.

 The UNIVAC I (Universal Automatic Computer I) was the first commercial


computer produced in the United States. It was designed principally by J.
Presper Eckert and John Mauchly, the inventors of the ENIAC.

 The Electronic Numerical Integrator And Computer (ENIAC) was the


very first general-purpose electronic computer.

 It was designed primarily to calculate artillery firing tables to be used by the


United States Army's Ballistic Research Laboratory to help US troops during
World War II.

 F1 key: It is used as the help key in almost every program. Opens a help
screen when this key is pressed.

 F2 key: In Microsoft Windows, renames a highlighted icon, file, or folder in all


versions of Windows.

 F3 key: Often opens a search feature for many programs, including Microsoft
Windows when at the Windows Desktop.

 F4 key: Open find the window in Windows 95 to XP.

 F5 key: In all modern Internet browsers, pressing F5 refreshes or reloads the


page or document window.

 F6 key: Move the cursor to the address bar in Internet Explorer, Mozilla
Firefox, and most other internet browsers.

 F7 key: Commonly used to check grammar in Microsoft programs such as


Microsoft Word, Outlook, etc.

 F8 key: It is used to enter the Windows startup menu.

 F9 key: Refresh the document in Microsoft Word.

 F10 key: In Microsoft Windows, activates the menu bar of an open


application.

 F11 key: Enter and exit full-screen mode in all modern internet browsers.
 F12 key: Open the Save as a window in Microsoft Word.

Vacuum Tubes and Valves:

 This was the technology used in the first generation of computers, such as the
ENIAC, which was designed during World War II.

 A vacuum tube is a device that controls electrical current flow in a high


vacuum between electrodes, and it was used in early computers to perform
calculations.

 However, they had limitations such as generating a lot of heat, being large in
size, and being prone to burnout/failure.

Large Size Integrated Circuits:

 Integrated circuits, also known as microchips or simply chips, are tiny


electronic devices that contain many components (such as transistors,
resistors, and diodes) integrated into a compact package.

 They are a key element of third-generation computers and onwards,


substantially reducing the size, power consumption, and cost of computer
systems while improving their reliability and speed.

Integrated Circuits:

 These are miniature electronic circuits that can perform a variety of tasks,
including amplifying signals, regulating voltage, and performing logical
operations.

 Integrated circuits are a key component of third-generation computers and


beyond.

 One of the benefits of integrated circuits is that they're much smaller and
more efficient than vacuum tubes and transistors.

Transistors:

 These are semiconductors used to amplify or switch electronic signals and


electrical power.

 Transistors replaced vacuum tubes in the second generation of computers due


to their smaller size, lower cost, greater durability, and lower heat generation.

 They allowed computers to become smaller, faster, and more reliable.

 Windows logo key + l is used to lock the computer.

 Windows logo key + i is used to open settings.

 Windows logo key + f is used to open the feedback hub.

 Windows logo key + r is used to open the run window.


Keys Shortcut

Ctrl +
Insert a new slide
M

Ctrl + S Save a presentation

Ctrl + A Select all text in a text box

Ctrl + N Create a new presentation

Ctrl + O Open an existing presentation

Search in a presentation or use Find and


Ctrl + F
Replace

 Alt+Tab

o The keyboard shortcut is most often used to switch between


open programs in Microsoft Windows 10.

 Alt + S

o Alt+S is a keyboard shortcut most often used to open the slide


show settings in PowerPoint.

 Ctrl + S

o In Microsoft Word and other word processors, pressing Ctrl + S saves


the current document.

 Ctrl + Tab

o Ctrl+Tab is a keyboard shortcut most often used to switch


between open tabs in a browser.

Shortcut
Description
keys

Alt+F File menu options in the current program.

Alt+E Open Edit options in the current program.

Alt+Tab Switch between open programs.

View help information (F1 is used by almost


F1
every Windows program to display help).

F2 Rename a selected file.

F5 Refresh the current program window.


Bookmark the current page in most Internet
Ctrl+D
browsers.

Create a new or blank document in some


Ctrl+N software, or open a new tab in most Internet
browsers.

Ctrl+O Open a file in the current software.

Ctrl+A Select all text.

Ctrl+B Change selected text to bold.

Ctrl+I Change selected text to be in italics.

Ctrl+U Change selected text to be underlined.

Open find window for current document or


Ctrl+F
window.

Ctrl+S Save the current document file.

Ctrl+X Cut selected item.

Shift+Del Cut selected item.

Ctrl+C Copy selected item.

Ctrl+Ins Copy selected item.

Ctrl+V Paste

Shift+Ins Paste

 A ledge r is the actual account head to identify your transactions and are
used in all accounting vouchers.

 Alt + D is the keyboard command used to delete the ledger created in tally.

o Go to Gateway of Tally > Accounts Info. > Ledgers > Alter > Press Alt+D
.

 Users can delete any ledger in Tally if the balance does not exist in that
particular ledger.

 Alt+C is the short key to access Auto Value Calculator in the amount field
during voucher entry.

 Ctrl+C is the short key to create Cost Center from the Ledger creation
screen.

 Ctrl+B is the short key to create a Budget from the Ledger creation screen.
 Ctrl+G is the short key to create an account Group from the Ledger creation
screen.

You might also like