Computer Ebook New
Computer Ebook New
ir)
lS
ba
(Iq
st
Fa
y
ud
St
B
SS
JK
JKSSB Study Fast (Iqbal Sir)
Computer
Important Points
Computer - Latin word - Computare -means to Calculate.
ir)
First Super computer of World - Cray-1.
lS
ba
Features of Computer :- The key features of computer are as follows
(Iq
1. Speed :- The computer can process data very fast at the rate of millions of instructions per
st
Fa
second.
y
2. Accuracy :- Computers provide a high degree of accuracy. They respond to the user as per
ud
3. Storage Capacity :- Computers are store huge amounts of data which depends on the
SS
4. Versatility :- Computers can do types of work simultaneously. They can perform multiple
tasks at the same time.
5. Automation :- Once the instruction to do any work is given to the computer, the computer
does its work automatically by itself.
6. Diligence :- Unlike human beings, a Computer is free from monotony, tiredness, lack of
concentration, etc. and can work for hours without creating any errors.
8. Reliability :- Computers are more reliable than human beings. Computers always produce
exact results. The possibility of errors occur only if the input is wrong, i.e. the computers never
make mistakes of their own accord. (GIGO = Garbage In Garbage Out)
9. Plug and Play :- Computers have the ability to automatically configure a new hardware and
software component.
JKSSB Study Fast (Iqbal Sir)
ir)
lS
ba
(Iq
st
Fa
y
ud
St
B
SS
---------
JK
-----
JKSSB Study Fast (Iqbal Sir)
--------------------------------
ir)
lS
ba
(Iq
It was introduced in 1970 by Von Nauman. • Input - Processing - Output - Storage { IPOS}
y
ud
CPU (Central Processing Unit) :- Also known as Brain of computer. CPU have three parts as
St
below:
B
SS
• Logic Section: Performs logic operations such as comparing, selecting, matching, and
merging of data.
2. Control Unit (CU) :- CU coordinates with the input and output devices of a computer. It directs
the computer to carry out stored program instructions by communicating with the ALU and
Register . It organises the processing of data and instructions.The basic function control unit is
to fetch the instruction stored in the main memory, identify the operations and the devices
involved in it and accordingly generate control signals.
3. Registers :- These are used to quickly accept, store and transfer the data and instructions
that are being used immediately by the CPU.These rigisters are top of the memory
hierarchy.(Fastest Memory).
JKSSB Study Fast (Iqbal Sir)
Computer Memory
Memory is primarily of three types −
1. Primary Memory/Main Memory
2. Secondary Memory
3. Cache Memory
1. Primary Memory (Main Memory) :-
Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off. It is generally
made up of semiconductor device. These memories are not as fast as registers. The data and
instruction required to be processed resides in the main memory. It is divided into two
subcategories RAM and ROM.
A. RAM (Random Access Memory) :- It is also known as read/write memory that allows CPU to
read as well as write data and instructions into it. RAM (Random Access Memory) is used for
ir)
the temporary storage of input data, output data and intermediate results.
lS
There are two categories of RAM :
ba
(Iq
(a) Dynamic RAM (DRAM):- It is made up of memory cells where each cell is composed of one
st
capacitor and one transistor. DRAM must be refreshed continually to store information. DRAM
Fa
is slower, less expensive and occupies less space on the computer's motherboard.
y
ud
(b) Static RAM (SRAM):- It retains the data as long as power is provided to the memory chip. It
St
need not be refreshed periodically. SRAM uses multiple transistors for each memory cell. It
does not use capacitor. SRAM is often used as cache memory due to its high speed. SRAM is
B
SS
B. ROM (Read Only Memory) :- It is non-volatile memory or permanent storage. It does not lose
its content when the power is switched OFF. ROM has only read capability, no write capability.
(a) Programmable ROM (PROM):- It is also non- volatile in nature. Once a PROM has been
programmed, its contents can never be changed.
(b) Erasable Programmable ROM (EPROM) :- It can be erased by exposure to strong ultraviolet
light, then rewritten.
(c) Electrically Erasable Programmable ROM (EEPROM) :- It can be erased electrically. Itis now
commonly used for holding BIOS.
2. Secondary Memory :-
This type of memory is also known as external memory or non-volatile. It is slower than the
main memory. These are used for storing data/information permanently. CPU directly does not
JKSSB Study Fast (Iqbal Sir)
access these memories, instead they are accessed via input-output routines. The contents of
secondary memories are first transferred to the main memory, and then the CPU can access it.
For example, disk, CD-ROM, DVD, etc.
1. Magnetics Memory:- Magnetic tapes, Magnetic Disks, Hard Disk, Floppy Disks.
2. Optical Memory:- Optical Disks like CD, DVD, CD-ROM, DVD-ROM, CD-RW(CD- Rewritable), CD-
R (CD-Recordable) WORM (Write Once Read Many), Blue-ray Disks.
3. Cache Memory :- It is a very high speed semiconductor memory which can speed up the CPU.
It acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
and program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can
ir)
access them.
lS
Input Devices ba
(Iq
st
Keyboard Microphone
Fa
• QWERTY key Layout [Total-104 keys] :- Consists of the following Keys: Alphabetical keys (A-Z,
a-z), Number keys (0-9), Function keys (F1 to F12), modifier keys (Ctrl, Alt, Shift), Toggle keys
(Caps lock, Num-lock, Scroll lock) etc.
• Caps Lock & Norn Lock = Toggle key [ because when they pressed they change).
• Caps Lock key: To enable or disable Uppercase [capital letter] & Num Lock key: To enable or
disable Numeric keypad.
• Backspace key: Used to Erase anything typed.(Or Delete one letter left side)
JKSSB Study Fast (Iqbal Sir)
• Delete key: Used to Erase information from computer Memory & from Screen. (Or Delete one
letter on the right side)
Mouse :- Discovered by Douglas Engelbert. Two types of mouses are Optical mouse and
mechanical mouse.
• Left Click:- Left mouse button is used for object Selecting & double clicking
• R. Double click: Used to open objects (such as file, icon).Stylus:- It is a pen-shaped input
device used to draw on the screen of a graphic tablet or device. Initially it was just used for
graphic tablets & PDAs, but Now it has become popular on mobile.
Graphic tablet : A flat rectangular pad which can be drawn on with a special pen called Stylus.
Whatever is drawn on it seen on •Computer Screen. It mainly used for CAD (computer aided
design)
ir)
Joystick: It is a pointing device like Mouse & trackball. It is a popular device for gaming. • Uses
lS
in Video games, Aeroplane Stimulators, Industrial Machinery [Cranes] Track ball: It is similar to
mouse but a ball is on top of this. ba
(Iq
st
Scanners :- Used to convert images or text on paper into a digital Format that can be used by
Fa
Barcode Reader :- [Point of Sale] (POS). :- is able to scan and decode barcodes.
ud
St
MICR (Magnetic Ink Character Recognition) : It examines character Shape in the matrix form.
Characters are printed using special Ink, which Contains Iron particles that can be magnetised.
JK
Output Devices
Monitor. Both Input-Output Devices:
Printer. Modems
Headphones. Network cards
Speakers. Touch screen
JKSSB Study Fast (Iqbal Sir)
Projector. Headsets
GPS Facsimile (FAX)
Audio cards/sound cards.
Monitor :- (Visual Display Unit)(VDU) :- A monitor is of two kinds monochrome display (only one
color) and another & colour display monitor (can display 254 colours). The image is created by
a configuration of dots also k/as "Pixels".
Types of Monitor :
1. Cathode Ray Tube : It is a Rectangular shaped monitor . CRT has Vacuum tubes.
2. Liquid Crystal Display (LCD) :- These are laptops and notepad sized PC's (Non-Emission
displays)
3. Light Emitted Diode (LED): It emits light when electric current is passed (Emission Display)
ir)
lS
Printers :- Speed measures in Characters per second, Lines per second, Pages per second. •
Resolution of Printer-measures in -Dots Per Inch (DPI). ba
(Iq
Types of Printers:
st
Fa
1. Impact Printers: It strikes paper & ribbon together to form a character. It is like a typewriter. It
uses pins or hammers that press an Inked ribbon against the paper. There are 4-types.
y
ud
a) Dot Matrix Printer (Pin Printer): It forms characters using rows of pins. It can print one
St
character at a time.
B
SS
b) Daisy wheel Printer : Here characters are fully formed on Petals (like Typewritten)
JK
2. Non-Import Printer :- They don't hit a ribbon to print. They use electrostatic & Chemical inkjet
technology. It is of 4 types:
Plotters :- These are used to print out huge graphs, designs, and other types of paper-based
documents, such as engineering drawings, business charts, construction maps, and
architectural blueprints.
Computer Ports :-
1. Parallel Port :- It is an interface for connecting eight or more data wires. The data flows
through the eight wires simultaneously. They can transmit eight bits of data in parallel. As
result, parallel ports provide high speed data transmission. Parallel port is used to connect
printer to the computer.
JKSSB Study Fast (Iqbal Sir)
2. Serial Port :- It transmits one bit of data through a single wire. Since, data is transmitted
serially as single bit. It provides slow speed data transmission. It is used to connect external
modems, plotters, barcode reader, etc.
3. Universal Serial Bus (USB):- It is a common and popular external port available with
computers. Normally, two to four USB ports are provided on a PC. USB also has the plug and
play feature, which allows devices ready to be run.
4. Firewire:- Fastest Speed. (Peer to peer protocol)
5. PS/2 (Personal system/2):- Connects Mouse/Keyboard.
ComputerSoftware
SytemSoftware ApplicationSoftware
A.SystemManagementProgram:- A.GeneralPurpose
OperatingSystem WordProcessor
DeviceDrivers Spreadsheet
SystemUtility. Powerpointetc.
ir)
B.SystemDevelopmentProgram:- B.SpecialPurpose
lS
Programinglanguages ReservationSystem
LanguageTranslators ba
AttendenceSystem
(Iq
Linker&Loader. BillingSystemetc
st
Fa
• It provides the interface b/w Hardware & User. Eg. MS.DOS, Windows XP/2000/98, Unix, Linux.
B
etc.
SS
JK
• Linux is an operating system. Linux was created in 1991 by Linus Torvalds and the Free
Software Foundation (FSF). It is an open-source Unix-like operating system. An operating
system helps users interact with the computer.
• BIOS (Basic Input/output system) - Important for booting. It lies in EEPROM (ROM)
• Cold Booting :- If the computer is in "off state" and we boot by switching on.
Device Drivers:- Making device functional, it act like interface between Device & User.
Important for working of peripheral devices (monitor, keyboard etc.)
Language Translator :-
1. Assembler :- Convert Assembly language into Machine Language.
JKSSB Study Fast (Iqbal Sir)
3. Interpreter :- Convert High level language into Machine language (Line by Line)
Programming Languages :-
FORTRAN [Formula Translation] - IBM
ALGOL [Algorithmic language] - European Scientists
LISP [List Processing] - John McCarthy
COBOL [Common Business Oriented Lang.]. - Grace Hopper
PROLOG [Programming Logic] - by Alain Colmerauer - Used for Artificial Intelligence.
BASIC [Beginners's All Purpose Symbolic Instruction Code] - Kemney
PASCAL [Programming Language] - Niklaus Wirth
ir)
C - Dennis Ritchie
lS
C++ - Bjarne Strouptrup
ba
(Iq
Linker :- A linker is an important utility program that takes the object files, produced by the
st
Assembler & Compiler and other code to join them into a single executable file.
Fa
y
• The Linker is used during the compilation process to link object files into a single executable
SS
file, while the Loader is used at runtime to load the executable file into memory and prepare it
JK
for execution.
2. Closed Source Software :- (Properiaty Software) :- Software that holds the source code
safe & encrypted. Users can't modify or delete part of the code.
• Free Software Foundation (Non-profit organization): Founded by - Richard Stallman (1985).
• Open Source Initiative (1998): Started by- Raymond & Bruce.
• Infoworld Bossie Award:- Best Open source software award. In 2021 it was given to 25 OSS.
JKSSB Study Fast (Iqbal Sir)
Debugging :- is the process of finding and correcting errors or defects (Bug) in software
or systems to prevent improper operation.
ir)
Computer Error
lS
ba
1. Synthetic Error:- It occurs when we Violate any grammatical rule of programming
(Iq
Language.
st
Fa
2. Logical Error:- It occurs in the Output of Programs. Its presence leads to undesired/
incorrect Output. qbal Si
y
ud
3. Runtime Error:- It occurs due to some illigal Operation performed in the program
St
B
Deadlock :- is a situation where a computer process waits for a resource which is being
SS
held by another process or a situation in which two programs sharing the same resource are
JK
• The minimum number of threads or processes for a deadlock situation is 2. The OS detects
the deadlocks with the help of the Resource Allocation graph.
Typing Mistakes
1. Green wavy underline:- Grammatical Error.
2. Red wavy underline :- Misspell.
3. Blue wavy underline :- Wrong word used but spelled right.
Important Shortcut Keys
Ctrl+A = All Select Ctrl+V = Paste
Ctrl+B = Bold Ctrl+W = Close
Ctrl+C = Copy Ctrl+X = Cut
Ctrl+I = Italic Ctrl+Y = Redo
Ctrl+K = Hyperlink Ctrl+Z = Undo
Ctrl+N = New Document Text Alignment
Ctrl+O = Open Ctrl+L = Align Text Left
Ctrl+P = Print Ctrl+R = Align Text To Right
Ctrl+S = Save Ctrl+E = Align Text To Center
ir)
Ctrl+U = Underline Ctrl+J = Justify
lS
ba
(Iq
Copyright © - Ctrl + Alt + C Function Keys
st
Thesaurus- A feature that provides synonyms or alternative words for chosen words.
Page Break:- The spot in a document where one page ends and the other starts.
JKSSB Study Fast (Iqbal Sir)
Indentation :- It denotes the distance text boundaries and page margins. It offers three types of
negative indentation. positive, hanging and negative indent.
Page Orientation :- Two types of page orientation 1. Portrait - vertically oriented and 2.
Landscape - horizontally oriented.
Gutter Margin:- (Binding Area) A gutter margin adds extra space to the side, top margin, or
inside margins of a document you plan to bind.
Drop Cap :- A drop cap (dropped capital) is a large capital letter used as a decorative element at
the beginning of a paragraph or section. The size of a drop Caps by default 3 lines and
Maximum 10 lines.
Footer- A feature that allows the text/graphics that are marked on every page or segment,
regularly at the bottom yet can be anywhere on a page.
Header- A feature that allows text/graphics that are imprinted on every page/section, usually at
the top yet can be anywhere on a page.
ir)
lS
Endnotes- Notes or references that resemble at the end of the document.
ba
Footnotes- Comments or references that appear at the bottom of each page.
(Iq
Indent- A feature that allows setting a temporary left or right margin for paragraph line.
st
Fa
MS Excel :- Spreadsheet
St
B
SS
Shortcut Keys
ir)
Terms in PowerPoint
lS
ba
1. AutoContent Wizard:- Quickest way to Creat PowerPoint Presentation.
(Iq
2. Template:- (Presentation design) A file which contains readymade styles.
st
Fa
3. Slide Transition: A special effect used to introduce slide in a slide show. It is how one slide
removed from the screen and the next slide is displayed during a presentation.
y
ud
PowerPoint Views
4. Outline view :- Displays your presentation as an outline made up of the titles and main text
from each slide.
ir)
types of content on the slide and are preformatted for you to provide consistent formatting
between each slide.
lS
ba
Outline pane: The Outline pane appears at the left, showing only the text in your presentation.
(Iq
Slide pane: Slide pane contains the current slide in your presentation. You can use the vertical
st
scroll bar to view other slides in the presentation. Notes pane is located below the slide pane
Fa
Microsoft Access
St
B
A database is a collection of logically related and similar data. Database stores similar kind of
SS
data for a specific purpose that is organised in such a manner that any information can be
JK
retrieved from it, when needed. Microsoft Access is an application which allows the creating of
databases. Microsoft Access is a Relational Database Management System (RDBMS).
like -{110.22.33.112}.
• Uniform Resource Locator (URL) :- URL is the address of a document you'll find on the WWW.
JKSSB Study Fast (Iqbal Sir)
ir)
lS
them via hyperlinks.
ba
• Web Browsers :- Firefox, Google Chrome, Microsoft edge, Apple saffari, Opera, Brave ,Vivaldi
(Iq
etc.
st
Fa
• Search Engines :- Google, AltaVista, Yahoo, Hotbot, Lycos, Excite, WebCrawler etc.
y
Types of Communication
ud
St
1. Simplex Channel :- In this channel, the flow of data is always in one direction, with no
B
one of the communicating devices and the other can only e.g. Radio, Television, information etc.
JK
2. Half Duplex channel:- In this channel, the data can flow in directions, but not at a same time.
Wh one device transmits other can only receive at informatioir) that point of time. e.g. Walkie
Talkie.
3. Full Duplex Channel :- In this channel, the flow of data is in both directions at a time, i.e. both
stations can transmit and receive information simultaneously. e.g. Wireless handset (mobile
phone).
Networking Devices
Modem: Modem stands for Modulator- Demodulator. It is used to connect computers for
communication via telephone lines.
Hub: It just acts like a connector of several computers i.e. simply connects all the devices on its
ports together. It broadcasts all the data packets arriving at it.
JKSSB Study Fast (Iqbal Sir)
Switch: It is used for dividing a network into segments called subnets. It provides filtering of
data packets and prevents network traffic also. Repeater: It is used to amplify (multiply) a
signal that has lost its original strength so as to enable them to travel long distances.
Router: It is used to connect different networks that have different architectures and protocols.
It sends the data packets to desired destination by choosing the best path available thus
reducing network traffic. It routes the data packets using the routing table that contains all the
Information regarding all known network addresses, possible paths and cost of transmission
over them.
Gateway: It can be used to connect two different networks having different architectures,
environment and even models. It converts the data packets in form that is suitable to the
destination application. The two different networks may differ in types of communication
protocols they use, language, data formats etc.
Bridge: They are used two connect two LANS with the same standard but using different types
ir)
lS
of cables. It provides an intelligent connection by allowing only desired messages to cross the
bridge thus improving performance.
ba
(Iq
Network Topology
st
Fa
1. Bus Topology: A bus topology is such that there is a single line to which all nodes are
connected and the nodes connect only to this bus.
JK
2. Mesh Topology: This type of network topology contains at least two nodes with two or more
paths between them.
3. Ring Topology: In this network topology, every node has exactly two branches connected to it.
The ring is broken and cannot work if one of the nodes on the ring fails.
4. Star Topology: In this network topology, the peripheral nodes are connected to a central node,
which rebroadcasts all transmissions received from any peripheral node to all peripheral nodes
on the network, including the originating node.
5. Tree Topology: This is a network topology in which nodes' are arranged as a tree. The
function of the central node in this topology may be distributed.
Types of Network
PAN - Personal Area Network eg. Bluetooth
LAN - Local Area Network eg. Ethernet, Wifi.
JKSSB Study Fast (Iqbal Sir)
MAN - Metropolitan Area Network eg. Cable tv network
WAN - Wide Area Network. Eg. Internet
E-mail :- :-Ray Tomlinson 1971 (1st message sent by him was QWERTYUIOP.
• Name@website.com eg. jkssbstudyfast@gmail.com
E-mail supports-
ir)
POP3 (Post office protocol 3) for recieving mails.
lS
SMTP (Simple Mail Transfer Protocol) For sending mails/messages.
ba
IMAP (Internet Messaging Access Protocol). - for. Storing messages.
(Iq
Outlook Express - E-mail Internet Explorer.
st
Fa
VIRUS:- A computer virus is a type of program that, when executed, replicates itself
y
ud
First ever Virus Creeper (1971). First PC Book Sector Virus Brain (1986)
JK
Boot Sector Virus :- It affects the boot sector. This virus enters ,the system when computers
are booted from floppy disks. Nowadays, these viruses can even penetrate in forms of physical
media such as external hard drives or USBs. Brain is the first PC Boot sect Post
Direct Action Virus :- When a virus connects itself directly to a .exe or .com file and penetrates
the device while its execution is named a Direct Action Virus. It is also known as a Non-
Resident Virus as it does not install itself.
Resident Virus :- Unlike Direct Action Virus this type of virus installs itself in the primary
memory of the computer and then infects other files and programs. A resident virus can affect
anytime when an operating system loads; heading towards file and program corruption. These
viruses are hidden in the memory and are hard to find and removed from the system.
Multipartite Virus :- It can infect and spread in various ways. It can infect multiple parts of the
system including program files, memory files, and boot sector.
JKSSB Study Fast (Iqbal Sir)
Overwrite Virus. :- One of the most damaging viruses, the overwrite virus can fully remove the
existing program and substitute it with the malicious code by overwriting it. These types of
viruses generally spread through emails and are difficult to trace, to remove the virus one needs
to delete the infected file.
Polymorphic Virus :- A polymorphic virus is difficult to track or remove as these viruses alter
their code each time an infected file is executed. Spread through spam and infected websites.
Spacefiller virus :- As the name implies, this type of virus fills in the empty spaces of a file with
viruses without affecting the size of the file such that the user cannot detect it easily. It is also
recognized as a "cavity virus".
Macro Virus :- It infects files that are created using certain applications or programs that
contain macros, e.g. Melissa.A
Trojan Horse: It is non-self replicating" type of Malware which faciliate unathorised access to
ir)
user's computer. [By Falsifying). eg. Beart, Sub 7 Zeus. Spyware: It is a program which is
lS
installed on a Computer to spy on the system owner's activities & collects all the information eg
ba
keylogger. Worms. It is a "standalone Malware" that replicate spread. 28. Morris. to
(Iq
Ransomware: It holds computer system captive while nonding Ransom.
st
Salami Technique :- Small amount money from large No. of accounts. es. Rs.1. from.
B
SS
ir)
Second VIRUS - Vital Information Resource Under
lS
GIF - Graphic Interchangeable Format. Seized
GUI - Graphical User Interface ba
VGA - Video Graphics Array
(Iq
GIGO - Garbage In Garbage Out VOIP - Voice Over Internet Protocol
st
HTTPS - Hyper Text Transfer Protocol WORM - Write Once Read Many
y
IMAP - Internet Message Access Protocol XHTML - Extensible Hyper Text Markup
B
SS
Advantages of e-governance :-
1) ICT provides efficient storing and instantaneous transmission of information faster than the
earlier manual systems.
2) E-Governance brings public services to citizens with Convenience.
3) More efficient government management.
4) Cost Reduction
5) Productivity increase
6) Better transparency as it allows the public to be informed on government decisions and
policies
7) Accountability
8) Re-structuring of administrative processes 9) Growth in GDP
10) The efficiency of the current system as it would have saved money and time.
Challenges of e-governance
1. Knowledge of Technology Literacy of the users and the i to use the computer.
2. Resistance to change People face the hesitation towards a
3. Digital Divide Separation between those that have access to Internet technology resources &
ir)
those who don't due to poverty & lack of awareness.
lS
4. Trust. 5. Privacy and Security
ba
(Iq
st
Fa
y
ud
St
B
SS
JK