Fundamentals of Computer

Fundamentals of Computer

1. Introduction to Computers

A computer is an electronic device that processes data to produce meaningful information. It operates using hardware and software components.

Characteristics of Computers:

  • Speed: Can perform millions of calculations per second.
  • Automation: Works without human intervention once programmed.
  • Accuracy: Provides precise results unless input errors occur.
  • Storage: Stores large amounts of data.
  • Versatility: Can perform multiple tasks simultaneously.
  • Connectivity: Can communicate with other devices via the internet or networks.

Basic Functions of a Computer (IPO Cycle):

  1. Input: Data is entered via input devices (keyboard, mouse).
  2. Processing: The CPU processes the input.
  3. Storage: Processed data can be stored for future use.
  4. Output: Results are displayed via output devices (monitor, printer).

2. Components of a Computer

A computer consists of two main components: Hardware and Software.

A. Hardware (Physical Parts of Computer)

  1. Input Devices: Keyboard, Mouse, Scanner, Microphone.
  2. Output Devices: Monitor, Printer, Speaker.
  3. Processing Unit:
    • Central Processing Unit (CPU): The brain of the computer.
      • Control Unit (CU): Manages operations.
      • Arithmetic Logic Unit (ALU): Performs calculations and logic operations.
  4. Memory & Storage:
    • Primary Memory (RAM, ROM): Temporary storage for active processes.
    • Secondary Storage (HDD, SSD, Pen Drive): Permanent data storage.

B. Software (Set of Instructions for Computers)

  1. System Software: Manages hardware (Operating System, Drivers).
  2. Application Software: Performs specific tasks (MS Office, Web Browsers).
  3. Programming Languages: Used to create software (Python, C++, Java).

3. Types of Computers

  1. Supercomputer: High-performance for scientific research (e.g., PARAM, Summit).
  2. Mainframe Computer: Used by large organizations for data processing.
  3. Minicomputer: Mid-sized, used in businesses and universities.
  4. Microcomputer (PC): Used for personal and office work (Laptops, Desktops).

4. Types of Memory

  1. Primary Memory:
    • RAM (Random Access Memory): Temporary storage, volatile.
    • ROM (Read-Only Memory): Permanent storage, non-volatile.
  2. Secondary Memory: HDD, SSD, USB drives for long-term storage.
  3. Cache Memory: Small, fast memory that stores frequently used data.
  4. Virtual Memory: Part of the hard drive used as extra RAM.

5. Number System in Computers

Computers use different number systems for data processing:

  1. Binary (Base-2): Uses 0 and 1 (Machine Language).
  2. Decimal (Base-10): Normal counting system (0-9).
  3. Octal (Base-8): Uses digits 0-7.
  4. Hexadecimal (Base-16): Uses 0-9 and A-F.

Example:

  • Decimal 10 = Binary 1010
  • Hexadecimal A = Decimal 10

6. Operating System (OS)

An Operating System is system software that manages hardware and software.

Functions of OS:

  • Manages files and folders.
  • Allocates memory and processing power.
  • Manages user interfaces (GUI, Command Line).
  • Handles security and permissions.

Types of OS:

  1. Single-user OS: Windows, macOS.
  2. Multi-user OS: UNIX, Linux.
  3. Real-time OS: Used in robots and air traffic control.
  4. Embedded OS: Found in smart devices and appliances.

7. Computer Networks & Internet

Types of Networks:

  1. LAN (Local Area Network): Small area (e.g., office, school).
  2. WAN (Wide Area Network): Large area (e.g., Internet).
  3. MAN (Metropolitan Area Network): Covers a city.

Network Devices:

  • Router: Connects different networks.
  • Switch: Manages data transfer within a network.
  • Modem: Converts digital and analog signals for internet use.

8. Cyber Security & Legal Aspects

Cyber Security protects computer systems from threats like viruses and hacking.

Common Cyber Threats:

  • Malware: Viruses, Trojans, Worms.
  • Phishing: Fake emails to steal personal data.
  • Ransomware: Blocks access until ransom is paid.
  • Hacking: Unauthorized access to systems.

Cyber Laws & IT Act 2000

  • IT Act 2000 governs cybercrimes and electronic transactions in India.
  • Digital Signature: Ensures authenticity of online documents.
  • Cybercrime Penalties: Includes fines and imprisonment for hacking, identity theft.

9. MS Office Basics

  1. MS Word: Used for document writing.
  2. MS Excel: Handles data and calculations.
  3. MS PowerPoint: Used for presentations.

10. Basic Programming Concepts

  1. Algorithm: Step-by-step instructions for problem-solving.
  2. Flowchart: Diagram representing an algorithm.
  3. Programming Languages: C, C++, Python, Java.

PREVIOUS YEAR QUESTIONS/ MOST IMPORTANT AND MOST EXPECTED QUESTIONS:

1. Which of the following is NOT an antivirus program?

A. Norton
B. McAfee
C. Linux
D. Kaspersky

Answer: C. Linux

Explanation: Linux is an operating system, not an antivirus program. Norton, McAfee, and Kaspersky are well-known antivirus software.


2. Which file extension is used to start Microsoft Word?

A. msword.exe
B. word.exe
C. winword.exe
D. doc.exe

Answer: C. winword.exe

Explanation: The executable file for Microsoft Word is 'winword.exe'.


3. What is the shortcut key for the copyright symbol (©) in Microsoft Word?

A. Ctrl + C
B. Alt + Ctrl + C
C. Ctrl + Shift + C
D. Alt + C

Answer: B. Alt + Ctrl + C

Explanation: In Microsoft Word, pressing 'Alt + Ctrl + C' inserts the copyright symbol.


4. What does CPU stand for in computer terminology?

A. Central Processing Unit
B. Central Program Unit
C. Central Performance Unit
D. Central Protocol Unit

Answer: A. Central Processing Unit

Explanation: The CPU, or Central Processing Unit, is the primary component of a computer that performs most of the processing inside a computer.


5. Which of the following is a primary memory device?

A. Hard Disk
B. CD-ROM
C. RAM
D. USB Flash Drive

Answer: C. RAM

Explanation: RAM (Random Access Memory) is a type of primary memory used for temporary storage while the computer is running.


6. Which number system is primarily used by computers to perform calculations and store data?

A. Decimal
B. Binary
C. Octal
D. Hexadecimal

Answer: B. Binary

Explanation: Computers use the binary number system, which consists of only two digits: 0 and 1.


7. Which of the following is an example of system software?

A. Microsoft Word
B. Adobe Photoshop
C. Windows Operating System
D. Google Chrome

Answer: C. Windows Operating System

Explanation: System software includes operating systems like Windows, which manage hardware and software resources.


8. What does 'LAN' stand for in networking?

A. Local Area Network
B. Large Area Network
C. Long Area Network
D. Light Area Network

Answer: A. Local Area Network

Explanation: LAN refers to a network that connects computers within a limited area, such as a home, school, or office building.


9. In computing, what does 'GUI' stand for?

A. General User Interaction
B. Graphical User Interface
C. Global User Interface
D. Graphical User Interaction

Answer: B. Graphical User Interface

Explanation: A GUI allows users to interact with electronic devices through graphical icons and visual indicators.


10. Which protocol is primarily used for transferring web pages on the internet?

A. FTP
B. HTTP
C. SMTP
D. SNMP

Answer: B. HTTP

Explanation: HTTP (HyperText Transfer Protocol) is the foundation of data communication on the World Wide Web.


11. What is the main function of the Arithmetic Logic Unit (ALU) in a computer?

A. Store data
B. Perform arithmetic and logical operations
C. Control data flow
D. Manage memory

Answer: B. Perform arithmetic and logical operations

Explanation: The ALU is a component of the CPU that handles all arithmetic and logical operations.


12. Which device is used to connect multiple computers within a local area network (LAN)?

A. Modem
B. Router
C. Switch
D. Firewall

Answer: C. Switch

Explanation: A switch connects multiple devices within a LAN and uses MAC addresses to forward data to the correct destination.


13. What does 'HTTP' stand for?

A. HyperText Transfer Protocol
B. HyperText Transmission Protocol
C. HyperText Transfer Program
D. HyperText Transmission Program

Answer: A. HyperText Transfer Protocol

Explanation: HTTP is the protocol used for transmitting hypertext over the internet.


14. Which of the following is a non-volatile memory?

A. RAM
B. Cache Memory
C. ROM
D. Register

Answer: C. ROM

Explanation: ROM (Read-Only Memory) retains its data even when the computer is turned off, making it non-volatile.


15. What is the purpose of a firewall in computer networks?

A. To monitor and control incoming and outgoing network traffic
B. To connect different networks
C. To store data securely
D. To encrypt data

Answer: A. To monitor and control incoming and outgoing network traffic

Explanation: A firewall acts as a security system that monitors and controls network traffic based on predetermined security rules.


16. Which of the following is an example of application software?

A. Linux
B. Microsoft Excel
C. BIOS
D. Android

Answer: B. Microsoft Excel

Explanation: Microsoft Excel is application software used for spreadsheet calculations.


17. What does 'USB' stand for?

A. Universal Serial Bus
B. Universal System Bus
C. United Serial Bus
D. Unified System Bus

Answer: A. Universal Serial Bus

Explanation: USB is an industry standard for cables and connectors used to connect, communicate, and supply power between computers and devices.


18. Which of the following is a characteristic of primary memory?

A. Non-volatile
B. Permanent storage
C. Volatile
D. Slow access speed

Answer: C. Volatile

Explanation: Primary memory, like RAM, is volatile, meaning it loses its data when power is turned off.

Comments

Popular posts from this blog

COMPUTER ABBREVIATIONS