0% found this document useful (0 votes)
572 views60 pages

Computer Terminology ICET Exam Updated 8th July 2022

This document provides an overview of computer terminology including: - The characteristics of computers such as speed, accuracy, reliability, and versatility. - A brief history of computers from the 1st generation machines using vacuum tubes to modern computers using microprocessors. - Descriptions of different types of computers classified by generation, size, use, and examples. - Explanations of common input devices like keyboards, mice, scanners, and microphones and output devices like monitors and printers. - Classifications of computers based on how they function such as analog, digital, and hybrid computers.

Uploaded by

Rishwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
572 views60 pages

Computer Terminology ICET Exam Updated 8th July 2022

This document provides an overview of computer terminology including: - The characteristics of computers such as speed, accuracy, reliability, and versatility. - A brief history of computers from the 1st generation machines using vacuum tubes to modern computers using microprocessors. - Descriptions of different types of computers classified by generation, size, use, and examples. - Explanations of common input devices like keyboards, mice, scanners, and microphones and output devices like monitors and printers. - Classifications of computers based on how they function such as analog, digital, and hybrid computers.

Uploaded by

Rishwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Presentation on

Computer Terminology
(For ICET Exam)
Abstract

Individual Topics
Important Questions
Computer Basics
What is a Computer?

Characteristics of a Computer
❖ Speed
❖ Accuracy
❖ Diligence: not afflicted to tiredness, monotony, lack of concentration
like human beings.
❖ Reliability / Memory
❖ Versatility: can work with different types of data like sound, graphics,
audio.
Computers – History
▪ 1st Mechanical Computer: MARK-1 (1944)

▪ 1st Electronic Digital Computer - Electronic Numerical


Integrator And Computer ENIAC (1946)

▪ 1st Stored Program Computer - Electronic Delay Storage


Automatic Calculator EDSAC (1949)

▪ 1st Personal Computer – Kenbak-1 (1971)


I Generation Computers
TIME PERIOD : 1940’s-1950’s
TECHNOLOGY USED : Vacuum Tubes
SIZE AND SPEED : Huge, taking up entire rooms, Slow speed
LANGUAGE USED : Machine language
COST : System and working cost very high.
OTHER FEATURES :
Used a great deal of electricity.
Generated a lot of heat.
Input was based on punched cards and paper tape, and output was
displayed on printouts.
EXAMPLE : ENIAC, EDSAC and UNIVAC
II Generation Computers
TIME PERIOD : 1950’s- 1960’s
TECHNOLOGY USED : Transistors
SIZE AND SPEED : Lesser size and increased speed
LANGUAGE USED : Assembly language and languages like
COBOL and FORTRAN
COST : Cost decreased
OTHER FEATURES : More efficient and reliable.
Though the transistors still generated a great deal of heat that subjected the
computer to damage, it was a vast improvement over the vacuum tube.
Second-generation computers still relied on punched cards for input and printouts
for output.
EXAMPLE : UNIVAC 1108, IBM 1401, CDC 1604
III Generation Computers
TIME PERIOD : late 1960’s-1970’s
TECHNOLOGY USED : Integrated Circuit
SIZE AND SPEED : Size Lesser and speed further increased
LANGUAGE USED : Operating System was developed.
COST : Cost decreased further
OTHER FEATURES : Instead of punched cards and printouts,
users interacted with third generation
computers through keyboards and monitors
and interfaced with an operating system,
which allowed the device to run many
different applications at one time with a
central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were
smaller and cheaper than their predecessors.
EXAMPLE : IBM-360 series, Honeywell Model 316,
Honeywell – 6000 series, CDC – 1700.
IV Generation Computers
TIME PERIOD : 1970’s-1980
TECHNOLOGY USED : Microprocessor (VLSI)
SIZE AND SPEED : Reduced size and tremendous speed
LANGUAGE USED : High Level Languages like PASCAL,
COBOL, C, C++, JAVA
COST : Reduced Cost
OTHER FEATURES : Microprocessors also moved out of the realm of
desktop computers and into many areas of life as
more and more everyday products began to use microprocessors.
• As these small computers became more powerful, they could be linked
together to form networks, which eventually led to the development of the
Internet.
• Fourth generation computers also saw the development of GUIs, the mouse
and handheld devices.
EXAMPLE : Intel 4004, Apple Macintosh
V Generation Computers
TIME PERIOD : 1980’s –today
TECHNOLOGY USED : Microprocessor (VLSI)
SIZE AND SPEED : Reduced size and tremendous speed
LANGUAGE USED : Based on Artificial Intelligence (AI) – LISP & Prolog
COST : Reduced Cost
OTHER FEATURES : Fifth generation computing devices, based on artificial
intelligence, are still in development, though there are some applications, such as
voice recognition, that are
being used today.
The goal of fifth-generation computing is to develop devices that
respond to natural language input and are capable of learning and self-organization.
EXAMPLE : Parallel Inference Machine
Note
• Artificial Intelligence is the branch of computer science concerned with making
computers behave like humans.
• Voice Recognition is the field of computer science that deals with designing
computer systems that can recognize spoken words.
Types of Computers
I. Super Computers

II. Mainframes,

III. Minicomputers

IV. Microcomputers (Personal Computers)

V. PDA/Palm tops
Classification of Computers on the basis of
How It Functions

Analog Digital
Computers Computers

Operate on continuous data, Digital computers work


like measuring temp. on discrete data.
changes
digital computer can
Faster
process data with greater
Accuracy of an analog accuracy
computer is restricted to the
accuracy with which We generally use digital
physical quantities can be computers for business
sensed and displayed. and scientific data
Specific Purpose computers processing.
Hybrid Computers

Hybrid computers are computers that comprise features of


analog computers and digital computers.

The digital component normally serves as the controller and


provides logical operations, while the analog component
normally serves as a solver of differential equations.
Input Devices
❑ When we work with computer, we need to enter data and instructions to the
computer using some devices
❑ These devices are called input devices
❑ These devices convert data and instructions to a form that can be
recognized by the computer
❑ Some of the commonly used input devices are:
✔ Keyboard
✔ Mouse / Trackball / Touch pad
✔ Scanner
✔ Light-pen
✔ Joystick
✔ Microphone
✔ Web / Digital camera
LIGHT PEN SCANNER
Key Board
Scanner
❖ Used to input a picture
❖ Analyzes images, printed text, or handwriting and converts it into digital
image
❖ Common scanner devices are:
Magnetic Ink Character Recognition (MICR) reader :- used by banks to
process large volumes of cheques and drafts
Optical Mark Reader (OMR) scanner :- scanning the answer sheet of an
objective type test in which answers are marked by darkening a square or
circle space by pencil
Optical Character Recognition (OCR) scanner :- used for direct reading of any
printed character

Barcode reader :- used to read the barcodes printed on practically every item
purchased from a department store
SERIAL MOUSE PS/2 MOUSE USB MOUSE

WIRELESS MOUSE OPTICAL MOUSE


MICR READER OMR SCANNER

OCR SCANNER BARCODE READER


Joystick
❖ Input device that is used to control onscreen
objects

❖ A small lever called stick is used instead of


cursor keys or mouse

❖ Commonly used for controlling player


movements in video or computer games

❖ Most joysticks are configured for 2-d movement

❖ Certain joysticks control 3-d movement also


Microphone
❖ Input device that is used for recording
audio in a computer
❖ To do this we also need a sound card
installed in computer
❖ Sound card converts analog sound signal
to digital form and vice-versa
❖ A speech recognition software is used with
microphone:
▪ to dictate text
▪ navigate programs
▪ select commands
Web / Digital Camera
❑ Input device used for capturing and storing still images
❑ We can connect digital camera to a comp and transfer the images from
camera directly to the computer
Output Devices
o For example, monitor, printer and speakers.
Monitors
Picture on monitor are made out of thousands of color dots called pixels
(i.e.. picture elements)

Higher the pixel higher the quality.


There are two types of monitor:
Cathode ray tube (CRT)
Thin film Transistor (TFT)
LCD – Liquid Crystal Display
LED – Light Emitting Diode
Organic – LED or OLED
Printer
The printers are evaluated on the basis of the following factors:

- Printer Resolution: It is measured in dots per inch(dpi). It indicates the


number of vertical and horizontal dots that can be printed. Higher the
resolution better is the quality.

- Printer Speed: It is measured in cpm or ppm ie. Character per minute or


Pages per minute.

Paper Capacity: The number of pages that can be accommodated in the paper
tray. The different sizes of pages that can be printed by the printer

Cost of Paper: It indicates the cost of any special paper


Printers & Plotters
Printer – for Raster Graphics
Plotter – for Vector Graphics
They are used to create a hard copy
of your work.
Most printer produce work on
paper.
There are many types of printers
Laser printers
Ink-jet printers
Dot-matrix printers
Ceramic printers
Thermal Printers
Types of Software
Software
( Set of programs that govern the operations of computer

System Software Application Software

( Software that controls internal ( Set of programs to carry out


computer operations ) operations for a specified
application )

Operating System Language


Processor Customized
( Software which Utilities Packages
acts as an interface ( Software which Software
( perform ( General
between user and converts HLL ( Tailor made
house utility
the hardware ) program into software
keeping ) software )
machine according to
language ) user’s needs )
Types of Memory
TYPES OF MEMORY as per speed/cost
Units of Memory
Number Systems
Operating Systems
Windows Family
Types of Windows OS
Windows 1.0 (1985)
Windows 2.0 (1987)
Windows 3.0 (1990, 1992)
Windows 95 (1995)
Windows 98 (1998)
Windows ME (2000)
Windows 2000 (2000)
Windows XP (2001)
Windows Vista (2006)
Windows 7 (2009)
Windows 8 (2012)
Windows 8.1 (2013)
Windows 10 (2016)
Windows 11 (2021)
OS X 10 beta: Kodiak
OS X Versions
OS X 10.0: Cheetah
OS X 10.1: Puma
OS X 10.2: Jaguar
OS X 10.3 Panther (Pinot)
OS X 10.4 Tiger (Merlot)
OS X 10.4.4 Tiger (Intel: Chardonay)
OS X 10.5 Leopard (Chablis)
OS X 10.6 Snow Leopard
OS X 10.7 Lion (Barolo)
OS X 10.8 Mountain Lion (Zinfandel)
OS X 10.9 Mavericks (Cabernet)
OS X 10.10: Yosemite (Syrah)
OS X 10.11: El Capitan (Gala)
macOS 10.12: Sierra (Fuji)
macOS 10.13: High Sierra (Lobo)
macOS 10.14: Mojave (Liberty)
Android Versions
Basic DOS Commands
Types of Networks
❖ Depending on one’s perspective, we can classify networks in
different ways

❖ Based on network size: LAN, MAN, WAN

❖ Based on management method: Peer-to-peer & Client/Server

❖ Based on topology (connectivity): Bus, Star, Ring, Mesh…

❖ Based on ownership : Intranet, Extranet, VPN (& Internet)


Protocols - 1
Protocol: Set of rules used to communicate between two devices
Examples:
HTTP – Hyper Text Transfer Protocol (www) is the protocol used on the world wide web
and determines what types of information can be transferred.
HTTPS – Hyper Text Transfer Protocol Secure (HTTPS) is an extension of the HTTP. It is
used for secure communication over a computer
FTP – File Transport Protocol is the protocol used to transfer files between computers
SMTP – Simple Mail Transfer Protocol is used to send email (text only).
MIME – Multipurpose Internet Mail Exchange is used to send email with attachments
POP3 – Post Office Protocol 3 is used to receive mail.
IMAP – Internet Message Access Protocol is used to receive mail.
NNTP – Network News Transfer Protocol provides distribution, inquiry, retrieval and
posting of news articles, bulleting boards and chats.
Telnet – Telnet allows a user to logon and control a remote computer.
PPP – Peer to Peer Protocol.
WAP – Wireless Application Protocol – Used for internet on mobile phones.
ICMP -Internet Control Message Protocol –Used for Handling error messages
SNMP-Simple Network Management Protocol-TO Manage IP address of devices in a network
Protocols - 2
Two types of commonly used transport protocols that are part of the TCP/IP
Protocol suite

Transport Control Protocol (TCP) - At this layer the connection oriented


protocol, TCP, establishes flow control by agreeing on the amount of data in
each packet to be transferred (3 way handshake) and monitoring the packets
that are received to ensure that lost packets are resent.

User Datagram Protocol (UDP) – At this layer the connectionless protocol,


UDP, sends a packet and assumes the destination computer receives it. There
is no check performed to ensure the packet arrived intact.
Protocols - 3
TCP/IP
Transport Control Protocol/Internet Protocol is the protocol used on the
Internet and by Windows networked operating systems

IPX/SPX
Novell Netware uses this protocol.

• Address Resolution Protocol (ARP)


▪ Is used between hub/switch and a node to get physical address
from IP address
• Reverse Address Resolution Protocol (RARP)
▪ Allows hosts to discover its IP when it is know only its physical
address.
Network Hardware Devices
NIC / LAN Card : A device that connects a node (usually personal computers) to
the network. (NIC=Network Interface Card)

Hub : A device that repeats or broadcasts the network stream of information to


individual nodes ( usually personal computers)

Switch :A device that receives packets from its input link, and then sorts them
and transmits them over the proper link that connects to the node addressed.

Bridge : A link between two networks that have identical rules of communication.

Router: A router is a switching device for networks, which is able to route network
packets, based on their addresses, to other networks or devices

Brouter : A bridge router or brouter is a network device that works as a bridge and
as a router.

Gateway : A link between two different networks that have different rules of
communication. (ie. different protocols)
Communication Links

Simplex : Communication can take place only in one direction.

Half Duplex : Communication can take place only in one direction at a time.

Full Duplex : Communication can take place simultaneously in both directions.


Internet Concepts
Firewall: is a program in charge of rejecting unwanted incoming connection
requests. A server with a firewall will keep other computers form connecting to
the server. It is like a boundary wall to keep intruders at bay.

DNS: Domain name server – is a program which deals with computer addresses.
You can look at it as a telephone directory, but for the Internet; it translates user
friendly computer hostnames into IP addresses.

Flash: is an embedded animation software/program that displays small


animations on web pages;
Hacker: A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled computer
programmers with knowledge of computer security.
Internet Concepts
URL: Uniform Resource Locater – is nothing but a web page’s address, or in
other words URL specifies the address of every file on the internet.

URL has three parts


(i)the protocol to be used to access the file = {http://}
(ii)(ii) the IP address/Domain Name = {www.gmail}
(iii)(iii) the Top level domain name = {.com}

Browser: is the software or program that allows a computer to view web pages.
Like Mozilla Firefox, Google Chrome, Internet Explorer, Safari, Opera.
Internet Concepts
Web Crawler: is a program that visits web sites and reads their pages and
other information in order to create entries for a search engine index.

Search Engines: are special program running on a website which offers user
results of simultaneous searches of other websites for the required
information. For example – Google, Yahoo. ... Baidu. ... AOL. ... Ask.com. ...
Excite. ... DuckDuckGo..Lycos

Traffic Congestion: is a phenomenon where too many users are connecting


to the internet at the same time or the internet service provider’s cables are
not able to support the user’s maximum speed; it really is like the traffic jam!
Internet Concepts

Malware – is the short for malicious software, as the standard definition goes –
is any software which can disrupt normal computer operation, gather sensitive
information or gain access to private system.

It is also sometimes referred to as badware. Malwares are essentially of two


types: (1) Viruses and (2) Worms.

(ii) Worms: worms are like viruses in the sense that they do the same damages
that viruses do, they also replicate themselves.
Internet Concepts
However the main difference being, it is a standalone malware – i.e., it does not
need to attach itself to any host/executable file. It on its own actively transmits
itself through a network and infects computers.

(iii) Trojan horse: This is my favorite malware as it is named on a very


interesting piece of history which involves Achilles and his heel!
Internet Concepts
Digital Signature: also known as electronic signature is like an encryption
technique for documents, which guarantees authenticity of the document and
helps combat digital forgeries and frauds.

Encryption/ Decryption: Encryption is a technique, derived from military use,


to mask/disguise any information, which cannot be read by anyone who does not
have the password/key.

In other words, encryption is ‘encoding’ any message/information so that only


authorizes people can read it. Encryption is done with a private key.

Thus, decryption is the ‘decoding’ of the encoded message, with the help of a
public key.
Entity & attributes
DBMS
✔ DDL – Data Definition Language
✔ DML – Data Manipulation Language
✔ DCL – Data Control Language
✔ TCL – Transaction Control Language

Examples of Commands in SQL:


✔ DDL – CREATE , ALTER, DROP
✔ DML – SELECT, INSERT, DELETE
✔ DCL – RANT, REVOKE
✔ TCL – COMMIT, ROLLBACK
Shortcuts
Ctrl + B - Make letters bold
Ctrl + I - Make letters italic
Ctrl + U - Make letters underline
Ctrl + Shift+ < - Decrease font size one value
Ctrl + Shift + > - Increase the font size one value
Ctrl + [ - Increase the font size by 1 point
Ctrl + ] - Decrease the font size by 1 point
Ctrl + Spacebar - Remove paragraph or character formatting.
Ctrl + C - Copy the selected text or object
Ctrl + X - Cut the selected text or object
Ctrl + V - Paste text or an object
Ctrl + Alt + V - Paste special
Ctrl + Shift + V - Paste formatting only
Ctrl + Z - Undo the last action
Ctrl + Y - Redo the last action
Excel Shortcuts
F2 - Edit the selected cell
F5 - Go to a specific cell
F7 - Spell check selected text and/or document
F11 - Create chart
Ctrl + Shift + ; - Enter the current time
Ctrl + ; - Enter the current date
Shift + F3 - Open the Excel formula window
Shift + F5 - Bring up search box.
Ctrl + A - Select all contents of the worksheet
Ctrl + B - Bold highlighted selection
Ctrl + I - Italic highlighted selection
Ctrl + U - Underline highlighted selection
Ctrl + P - Bring up the print dialog box to begin printing
Excel Shortcuts
Ctrl + Z - Undo last action
Ctrl + F9 - Minimize current workbook
Ctrl + F10 - Maximize currently selected workbook
Ctrl + F6 - Switch between open workbooks/window
Ctrl + Page Up - Move between Excel worksheet in the same Excel document.
Ctrl + Page Down - Move between Excel worksheets in the same Excel document
Ctrl + Tab - Move between two or more open Excel files
Alt + = - Create a formula to sum all of the above cells
Ctrl + ’ - Insert the value of the above cell into cell currently selected.
Ctrl + Arrow key - Move to next section to text
Ctrl + Space - Select entire column
Shift + Space - Select entire row
File Formats
.doc – Microsoft Word Document.
.docx – Microsoft Word Open XML Document.
.tex – LaTeX Source Document.
.mp3 – MP3 Audio File.
.wps – Microsoft Works Word Processor Document.
.txt – Plain Text File.
.odt – OpenDocument Text Document.
.dat – Data File.
.pps – PowerPoint Slide Show.
.ppt – PowerPoint Presentation.
.pptx – PowerPoint Open XML Presentation.
.flv – Flash Video File.
.bat – Windows Batch File.
File Formats
.avi – Audio Video Interleave File.
.tar – Consolidated Unix File Archive.
.xml – XML File.
.gif – Graphics Interchange Format File.
.xls – Excel Spreadsheet.
.dbf – Database File.
.sql – Structured Query Language Data File.
.exe – Windows Executable File.
.html – Hypertext Markup Language File.
.asp – Active Server Page.
.css – Cascading Style Sheet.
.tmp – Temporary File.
.bak – Backup File.
.mp4 – Multimedia/video Format File.
Important Questions
1. Well known internet protocol – HTTP
2. Storage that retains its data after power is turned off is referred to – Non
volatile
3. Processor speed is measured in – Giga hertz
4. Full form of EPROM - Erasable Programmable Read Only Memory
5. Not an object oriented language – PASCAL
6. According to ASCII how many letters are there – 256
7. To go to End of the page which key is used - Shift + PGDN
8. In MS Word to reverse the action of UNDO - Redo
9. Shortcut to go at the first line the page – Ctrl + home
10. Mouse, track ball are - Pointing devices
Important Questions
11. Smallest unit in an image on a computer screen - Pixel
12 . The principle that Internet service providers enable access to all content and
applications regardless of the source, and without favoring or blocking
particular products or websites – Net Neutrality
13. Full form of PDF - Portable Document Format
14. MS DOS is – Command Based Operating System
15. Full form of BIOS – Basic Input Output System
16. Full form of ECS – Electronic Clearing System
17. Shortcut to go at the end of the page - Ctrl + End
18. Which of these is an operating System – Windows 8
19. Short cut to BOLD the word - CTRL + B
20. DOS operation is done using - Command Instruction
Important Questions
21. Data transmission b/w mother board and component - BUS
22. Full form of WAN – Wide Area Network
23. By using ----------- we can search anything on internet. BROWSER
24. Which is not a computer language – ROM
25. Which of the following belongs to local network – LAN
26. Linux is a – Operating System
27. Chip is also called as - Integrated circuit
28. In a bank, after computerization, cheques are taken care of by – MICR
29. Microsoft office is a – Application software
30. In MS Word which combination is to bold the letters – CTRL+ B
Important Questions
31. Which is not an output device - Scanner
32. Full for of DOS – Disk operating system
33. Basic unit of worksheet where you enter data – CELL
34. A DVD is an example of– Secondary Memory
35. Short cut for Help menu- F1
36. Which of the following is non volatile ?
37. Process of transferring of files from Internet is –Downloading
38. Which of the following is an input ( Monitor, Scanner, CD, Speakers)
39. OS is –------ Software
40. SQL is which generation language --4th
Important Questions
41. 1 Byte is how many Bits– 8
41. --------- has attributes --- Entity
42. Cut, Paste, Copy are under– Edit
43. ------- is the largest memory unit---(TB)
44. Which of the following is not a memory ? (Plotter)
45. –------- booting happens with restart– Warm Booting
46. Not a type of Virus– Firm Ware
47. AI language in the given list (LISP)
48. Windows is a CUI(True/False)
49. Not a mobile OS (Safari)
50. Spell check is under– Tab of MS Office 2007(Review)
Thank You !

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy