Sunday, 23 August 2020

Computer Fundamentals for Competitive Exams | Donwload pdf.

 A file is a collection of logically related information.

Features of DOS

It is not case sensitive, ie, DIR and dir are treated as the same.

The file names are restricted to 8 characters only.

It does not support space entries in the file name.

Features of Word Processor

OLE (Object Linking and Embedding) OLE is a program integration technology that is used to share information between programs through objects. Objects are saved entities like charts, equations, video clips, audio clips, pictures etc.

Mail merge is a feature within most data processing applications that enables users to send a similar letter or document to multiple recipients.

Word Window

Title Bar: It shows the name of the file on which you are working. It also consist of three buttons, eg,

Minimize button reduces the window to an icon but word still remains active.

Restore button again brings word window to the maximum original size.

Close button brings us out of word.

Menu Bar: It consists of various commands which can be accessed by clicking at the menu options under

these menu heads.

Standard Tool Bar: It displays the symbols for the common operation like open, print, save etc which can be per formed by clicking on the appropriate tool.

Formatting Tool Bar: It displays the options which can be used to format our document like font type,

size of the font, bold, underline, bullets, alignment etc.

Ruler: It shows the width of the document. It can be increased or decreased. You can see how much of the lines you have consumed by typing.

Workspace: It is the area where the text can be entered.

Vertical Scroll Bar: For a larger text in the document, you can scroll the vertical bar to see the text at various position.

Horizontal Scroll Bar: It is used to move from left side to right side in the document and vice-versa in case the document is too wide to fit in the screen.

MS Excel

Worksheet: It is a grid of cells made up of horizontal rows and vertical columns. Worksheet contains 65,536 rows and 256 columns.

Row Number :Each row is given a number that identifies it, starts from 1, 2, 3, 4, … so on.

Column Letter: Each column is given a letter that identifies it, starts from A … Z, AA … AZ, BA … BZ, …IA – IV.

A column in table can also be referred to as a field.

E-mail messages are usually encoded in American Standard Code for Information Interchange (ASCII) text.

A popular protocol for sending e-mail is Simple Mail Transfer Protocol (SMTP) and for receiving it is POP3.

Data is an input for computer. Information is an output from computer.

The history of computer begins with the birth of abacus which is believed to be the first computer. It is said that Chinese invented Abacus around 4,000 years ago.

In the early 1820s, it was designed by Charles Babbage who is known as "Father of Modern Computer". It was a mechanical computer which could perform simple calculations.

Generation of Computer

First Generation: The hardware used in the first generation of computers were:

Vacuum Tubes, Punch Cards.

It supported machine language. The memory was of 4000 bits.

The examples of first generation computers are −


Second Generation:

The hardware used in the second generation of computers were:

Transistors, Magnetic Tapes

Batch operating system

The capacity of the memory was 32,000 bits.

The examples of second generation computers are −

Honeywell 400, CDC 1604, IBM 7030

Third Generation

The hardware used in the third generation of computers were

Integrated Circuits made from semi-conductor materials, Large capacity disks and magnetic tapes

Supports time-sharing OS, 128,000 bits, the input was provided through keyboards

The examples of third generation computers are:

IBM 360/370, CDC 6600, PDP 8/11

Fourth Generation

The Hardware used in the fourth generation of computers were −

ICs with Very Large Scale Integration (VLSI) technology, Semiconductor memory, Magnetic tapes and Floppy

Multiprocessing & distributed OS, Object-oriented high level programs supported, No external cooling required & affordable

There are three main types of secondary storage in a computer system:

Solid state storage devices (such as USB memory sticks): Solid state storage is also faster than traditional hard disk drives because the data is stored electrically in silicon chips called cells. Within the cells, the binary data is stored by holding an electrical current in a transistor with an on / off mode.

Optical storage devices (such as CD, DVD and Blue-ray discs): Optical devices use a laser to scan the surface of a spinning disc made from metal and plastic. The disc surface is divided into tracks, with each track containing many flat areas and hollows. The flat areas are known as lands and the hollows as pits.

Magnetic storage devices (such as hard disk drives): Magnetic devices such as hard disk drives use magnetic fields to magnetize tiny individual sections of a metal spinning disk. Each tiny section represents one bit. A magnetized section represents a binary '1' and a demagnetized section represents a binary '0'.

Types of Computer

We can categorize computer by three ways:

Based on data handling capabilities

Based on size.

Based on Utility

On the basis of data handling capabilities, the computer is of three types:

Analogue Computer: Analogue computers are designed to process the analogue data. Analogue data is continuous data that changes continuously and cannot have discrete values. Analogue computers directly accept the data from the measuring device without first converting it into numbers and codes. Speedometer and mercury thermometer are examples of analogue computers.

Digital Computer: Digital computer is designed to perform calculations and logical operations at high speed. It accepts the raw data as digits or numbers and processes it with programs stored in its memory to produce output. All modern computers like laptops and desktops that we use at home or office are digital computers.

Hybrid Computer

On the basis of size, the computer can be of four types:

Microcomputer: Microcomputer is also known as personal computer. It is a general purpose computer that is designed for individual use. It has a microprocessor as a central processing unit, memory, storage area, input unit and output unit. Laptops and desktop computers are examples of microcomputers. Desktop Computer, Laptop Computer, Palmtop Computer/Digital Diary /Notebook /PDAs

Mini Computer: Minicomputers possess most of the features and capabilities of a large computer but are smaller in physical size. They are used as small or midrange operating business and scientific applications.

Mainframe computer: Mainframe computers are designed to support hundreds or thousands of users simultaneously. They can support multiple programs at the same time. It means they can execute different processes simultaneously. These features of mainframe computers make them ideal for big organizations like banking and telecom sectors, which need to manage and process high volume of data

Supercomputer: Supercomputers are the biggest and fastest computers. They are designed to process huge amount of data. A supercomputer can process trillions of instructions in a second. It has thousands of interconnected processors. First supercomputer was developed by Roger Cray in 1976.

Keys on keyword:

Typing Keys: These keys include the letter keys (A-Z) and digit keys (09) which generally give the same layout as that of typewriters.

Numeric Keypad: It is used to enter the numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machines and calculators.

Function Keys: The twelve function keys are present on the keyboard which is arranged in a row at the top of the keyboard. Each function key has a unique meaning and is used for some specific purpose.

Control keys: These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc)

Special Purpose Keys: Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.

Magnetic Ink Character Recognition (MICR): MICR computer input device is designed to read the text printed with magnetic ink. It is widely used in banks to process the cheques and other organizations where security is a major concern.

Optical Character Reader (OCR): OCR computer input device is designed to convert the scanned images of handwritten, typed or printed text into digital text. It is widely used in offices and libraries to convert documents and books into electronic files.

Optical Mark Reader (OMR): OMR is a special type of optical scanner used to recognize the type of mark made by pen or pencil. It is used where one out of a few alternatives is to be selected and marked.


The printers are of two types: Impact Printers and Non-impact Printers.

1) Impact Printers: They are of two types:

Character Printers (Dot Matrix printers, Daisy Wheel printers) and Line printers (Drum printers, Chain printers)

2) Non-impact printers: They are of two types: Laser printers, Inkjet printers.

Impact Printer: The impact printer uses a hammer or print head to print the character or images onto the paper.

Non-Impact Printer: They print characters and images without direct physical contact between the paper and the printing machinery. These printers can print a complete page at a time, so they are also known as page printers. The common types of non-impact printers are Laser printer and Inkjet printer:

Multiprogramming Operating System:

Multiprogramming is an extension to the batch processing where the CPU is kept always busy. Each process needs two types of system time: CPU time and IO time. In multiprogramming environment, for the time a process does its I/O, The CPU can start the execution of other processes. Therefore, multiprogramming improves the efficiency of the system.

Multiprocessing Operating System:

In Multiprocessing, Parallel computing is achieved. There are more than one processors present in the system which can execute more than one process at the same time. This will increase the throughput of the system.

Spooling: Spooling is an acronym for simultaneous peripheral operations on line. Spooling refers to putting data of various I/O jobs in a buffer. This buffer is a special area in memory or hard disk which is accessible to I/O devices.

Booting: When the computer starts, the operating system is first loaded (as it is essential for running all other programs), this process is known as booting.


NIC stands for network interface card. NIC is a hardware component used to connect a computer with another computer onto a network.

Wireless NIC: The wireless NIC contains the antenna to obtain the connection over the wireless network. For example, laptop computer contains the wireless NIC.

Wired NIC: The Wired NIC is present inside the motherboard. Cables and connectors are used with wired NIC to transfer data.

Computer worms "are self-replicating programs that spread with no human intervention after they are started." In contrast, "viruses are also self-replicating programs, but usually require some action on the part of the user to spread inadvertently to other programs or systems."

Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves. Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity. It can also delete a user's files or infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses).

Zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.



Alt + F File menu options in current program

Alt + E Edit options in current program

Ctrl +A Select all text

Ctrl + F Find

Ctrl +X Cut selected item

Shift + Del Delete permanently

Ctrl + C Copy selected item

Ctrl + Insert Copy selected item

Ctrl + V Paste

Shift + Insert Paste

Home Go to beginning of current line

Ctrl + Home Go to beginning of document

End Go to end of current line

Ctrl + End Go to end of document


Ctrl+0 Toggles 6pts of spacing before a paragraph.

Ctrl+D Open the font preferences window.

Ctrl+E Aligns the line or selected text to the center of the screen.

Ctrl+J Aligns the selected text or line to justify the screen.

Ctrl+K Insert a hyperlink.

Ctrl+L Aligns the line or selected text to the left of the screen.

Ctrl+M Indent the paragraph.

Ctrl+N Opens new, blank document window.

Ctrl+O Opens the dialog box or page for selecting a file to open.

Ctrl+P Open the print window.

Ctrl+R Aligns the line or selected text to the right of the screen.

Ctrl+S Save the open document. Like Shift+F12.

Alt, F, A Save the document under a different file name.

Archieve: It provides backup storage.

Bitmap: A method of storing a graphic image as a set of bits in a computer memory. To display the image on the screen, the computer converts the bits into pixels.

BUS: A bus is a set of wires that enables flow of data from one location of the computer to another.

CMOS: CMOS is an abbreviation for Complementary Metal-Oxide-Semiconductor. It is the battery powered chip that is situated on the Motherboard that retains system information such as date and time.

FAT: FAT is an acronym for File Allocation Table. It resembles a table of contents so that files can be located on a computer.


ALGOL – Algorithmic Language

AAC - Advanced Audio Coding

AMOLED – Active-Matrix Organic Light- Emitting Diode

AMD – Advanced Micro Devices

AVI – Audio Video Interleaved

ARPANET- Advanced Research Projects Agency Network

BASIC - Beginner’s All purpose Symbolic Instruction Code

BHTML - Broadcast Hyper Text Markup Language

BMP – Bitmap

 COBOL – Common Business Oriented Language

DVDR – DVD Recordable

DVR – Digital Video Recorder

EBCDIC – Extended Binary Coded Decimal Interchange Code

ENIAC - Electronic Numerical Integrator and Computer

EDI - Electronic Data Interchange

GPRS - General Packet Radio Service

Gb - Gigabit

GB - Gigabyte

GIGO - Garbage in Garbage Out

HDMI - High Definition Multimedia Interface

HVD- Holographic Versatile Disc

INTEL - Integrated Electronics

ICANN - Internet Corporation of Assign Names &Numbers

ISDN - Integrated Servers Digital Network

ISO- International Standard Organization/

JPEG - Joint Photographic Expert Group.

MIPS – Million Instructions Per Second

MIDI - Musical Instrument Digital Interface

NAT - Network Address Translation

PDA - Personal Digital Assistant.

PNG - Portable Network Graphics

PSTN – Public Switched Telephone Network

PING – Packet Internet Gopher

PCB - Printed Circuit Board RIP – Routing Information Protocol

RTF – Rich Text Format

RARP - Reverse Address Resolution Protocol

SIM – Subscriber Identification Module

SMPS - Switch Mode Power Supply

SFTP Secure File Transfer Protocol

SSH - Secure Shell

SIP - Session Initiation Protocol

SAN -Storage Area Network

VGA – Video Graphics Array

WORM – Write Once Read Many





Binary Coded Decimal, or BCD, is another process for converting decimal numbers into their binary equivalents.

It is a form of binary encoding where each digit in a decimal number is represented in the form of bits.

This encoding can be done in either 4-bit or 8-bit (usually 4-bit is preferred).

ex; Convert (123)10 in BCD

From the truth table above,

1 -> 0001

2 -> 0010

3 -> 0011

thus, BCD becomes -> 0001 0010 0011

Alphanumeric codes

A binary digit or bit can represent only two symbols as it has only two states '0' or '1'. But this is not enough for communication between two computers because there we need many more symbols for communication. These symbols are required to represent 26 alphabets with capital and small letters, numbers from 0 to 9, punctuation marks and other symbols.

The alphanumeric codes are the codes that represent numbers and alphabetic characters. The following three alphanumeric codes are very commonly used for the data representation.

·         American Standard Code for Information Interchange (ASCII).

·         Extended Binary Coded Decimal Interchange Code (EBCDIC).

·         Five bit Baudot Code.

ASCII code is a 7-bit code whereas EBCDIC is an 8-bit code. ASCII code is more commonly used worldwide while EBCDIC is used primarily in large IBM computers.

ASCII stands for the "American Standard Code for Information Interchange". ASCII is a 7-bit character set containing 128 characters. It contains the numbers from 0-9, the upper and lower case English letters from A to Z, and some special characters. The character sets used in modern computers, in HTML, and on the Internet, are all based on ASCII.

We use 65 for A and 97 for a.

EBCDIC (Extended Binary Coded Decimal Interchange Code)

WPA    Wi-Fi Protected Access

WEP    Wired Equivalent Privacy

VLSM  Variable-length subnet masking

UTP     Unshielded twisted pair

TOFU  Trust On First Use

TIA      Telecommunications Industry Alliance

TFTP    Trivial File Transfer Protocol

STP      Spanning Tree Protocol

SSID    Service set identifier (Wi-Fi)

SNA     Systems Network Architecture (IBM)

SLIP     Serial Line Internet Protocol

SDN     Software Defined Networking

PTT      Public Telephone and Telegraph

PPTP    Point-to-Point Tunneling Protocol

PAP     Password authentication protocol

MTU    Maximum Transmission Unit

MAM   Media access management

ITU-T  International Telecommunications Union

IETF    Internet Engineering Task Force

IEEE    Institute for Electrical and Electronic Engineers

FDDI   Fiber Distributed Data Interface

EIA      Electronics Industry Alliance

EHA    Ethernet Hardware Address

DMI     Desktop Management Interface

DTE     Data Terminal Equipment

CMOS  Complementary metal-oxide semiconductor

CIDR   Classless Inter-Domain Routing

ACL     Access control list

AGP Accelerated Graphic Port

PCI      Peripheral Component Interconnect

UNIVAC Universal Automatic Computer

ATX    Advanced Technology Extended

ENIAC Electronic Number Integrator and Calculator

EDSAC   Electronic Dialog Storage Automatic Computer

LSIC    Large Scale Integrated Circuit

PDA     Personal Digital Assistant

USSD   Unstructured Supplementary Service Data

BASIC Beginner All Purpose Symbolic Instruction Code


Types of Virus

Following are the major types of computer virus −


This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is self-contained and hence does not need to be part of another program to propagate itself.

Trojan Horse

A Trojan Horse is also a sort of destructive program that remains disguised in a normal software program. It is not exactly a virus, as it cannot replicate itself. However, there is possibility that virus program may remain concealed in the Trojan Horse.


It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device and hence it will go off only at a particular date and time.

The abacus was the first device for mathematical calculation. It can perform addition and subtraction.

John Napier invented logarithms, which is a technique that allows multiplication of the number via addition using a printed table.

Charles Babbage proposed a steam driven calculating machine the size of a room, which he called the Difference Engine. UNIVAC is the first commercial computer. In the 50's

UNIVAC called is Universal Automatic Computes was the household word for Computer .UNIVAC was also the first computer to employ magnetic tape.

In first generation computer, relied on Machine language (lowest level programming language understood by computer) Examples: The UNIVAC and ENIAC computers.

In second generation computer: High-level programming language also developed at this time such as an early version of COBOL and FORTRAN.

Fifth Generation (present and beyond) Artificial Intelligence.

Unix is a multi user OS.



ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves mathematical calculation or decision/logic, it passes the control to the second component, i.e., the arithmetic logic unit (ALU). The ALU includes a group of registers - memory locations built directly into the CPU - that are used to hold data that are being processed by the current instruction.

Memory or Storage Unit can store instructions, data, and intermediate results. This unit supplies information to other units of the computer when needed. It is also known as internal storage unit or the main memory or the primary storage or Random Access Memory (RAM).

Control Unit: This unit controls the operations of all parts of the computer but does not carry out any actual data processing operations.

For reference,


RAM (Random Access Memory) is directly connected to the CPU. In the old days, this was usually in a few chips on a circuit board next to a CPU, but these days, there’s usually some RAM inside a CPU. Small embedded CPUs may have all the RAM they need inside, while large PC-type CPUs will usually have a specialized kind of RAM called cache, which is used to store recently used information in RAM that’s extremely fast, trading back and forth with the main system RAM.


Digitizer- It converts analog information into digital form. It is an input device.

A motherboard connects CPU, memory, hard drives, optical drives, video card, sound card, and other ports and expansion cards directly or via cables. It can be considered as the backbone of a computer.

Freeware: Software which is completely costless. The producers of this software are either public institutions such as universities or developers who do it for personal interest or advertisement or private company who do it for dumping reasons.

Shareware: Software which is initially costless but after a certain period the user is asked to pay a fee or delete it. Or software which has two versions a free one, but incomplete or with advertisement banners and a complete advertisement free one for which the user must pay. The most common example is WinZip compression program.

Commercial: Software for which the user has to pay a license to use it . Common examples are Microsoft Windows operating system and Microsoft word.

Private: Software uniquely built, under payment for a specific customer to fit his need. Only the customer may use it.

Open Source: Software may be modified by anyone, sometimes under certain restrictions. Open source software is also freeware.

Proprietary: Software is distributed with the explicit with the explicit legal warning not to modify it and technically locked to prevent other developers to see or modify its source.

Bridge: A bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol.

No comments:

Post a comment

All about journals and research paper | What is impact factor? | how the impact factor is calculated? | who calculate the impact factor? Scopous journals

Figure 1: One of my Research Papers When the Scholars are in their Master or PhD or in any research field. They are supposed to writ...