Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
340 views

Computer Basic Notes

The document discusses the role of computers in today's world and their advantages in business. It states that for both personal and business activities, we rely on computer systems. All organizations now offer computer-based services due to growing dependency. Computers allow businesses to be more independent by automating tasks. They also enable cost cutting, easy marketing to more customers through the internet, fast transactions, huge data storage, improved productivity and efficiency, high accuracy, and easy data sharing. However, increased use of technology has also led to more competition among tech companies.

Uploaded by

Sowmya Dumpala
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
340 views

Computer Basic Notes

The document discusses the role of computers in today's world and their advantages in business. It states that for both personal and business activities, we rely on computer systems. All organizations now offer computer-based services due to growing dependency. Computers allow businesses to be more independent by automating tasks. They also enable cost cutting, easy marketing to more customers through the internet, fast transactions, huge data storage, improved productivity and efficiency, high accuracy, and easy data sharing. However, increased use of technology has also led to more competition among tech companies.

Uploaded by

Sowmya Dumpala
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Role of Computer in Today’s World

In today’s world, for almost every activity whether personal (for example, operating personal savings bank
account) or business-related (for example, selling any product or services); in some or the other way, we rely
on the computer system.
Due to the growing dependency on computers, every small and big organizations and other business
companies have started offering computer-based service. Furthermore, the advancement of communications,
electronic service networks, and multimedia have opened a new door for corporates by providing an effective
way of business processing, payment transfer, and service delivery.

Advantages of Computers in Business:


Following are the major advantages of introducing computer system in business:-

Independency:
As computers help in making the business automated, the businesses are becoming more and more
independent in nature. No more, there is the need to put man-power for every work, as with the help of
computer most of the works can be automated. Starting from ticket booking to a luxury car manufacturing,
everything is automated.

Automatic Car Factory Automatic Driverless Cars Smart Houses with Remote control applications

Cost Cutting:
A number of business are based online in recent times; therefore, there is no need to open business branch in
every city, rather having one centralized inventory can make the business easier. There is no need to employ
many man-power.
Easy Marketing and reaching to more customers:
With the use of computer system with Internet facility, it is very simple to make a business global in a given
period of time. Website, email, social media websites, online advertisements, etc. are the important tools of
online marketing.

Computer Skills 1
Transactions:
A number of tasks are being done by computer which once were
manually done: Such as online money transaction, Purchasing
travel tickets online, in fact transacting money has become so easy
and less time consuming, that just few clicks enables us to transfer
thousands of rupees in a span of seconds.
Huge Storage Capacity:
Normally, most of the businesses need to store and maintain huge data and other records; manually, it is very
difficult to maintain, but the use of computer not only increases the storage capacity, but also facilitates the
processing and retrieval of data anytime.
Improvement of Productivity & Efficiency:
Imagine the times when you had to maintain a dairies for noting the meetings
time and date, Seems ancient but it’s just been a 2 decades since we use to
practice the old methods. Today, One piece of phone or a laptop is enough to
set reminders, store important files in the cloud server, Make a quick notes
etc. Few tricks in your sleeves about knowing the workings of Internet and
just few clicks will enable you into multitask your work. Because computer
technology, services also became faster and easier.
High Accuracy:

Unlike human beings, computer are very accurate, i.e., They never tend to make much mistake until it has
been a human error (which most of the time it is). A computer can work for very long periods without
going rogue. However, when an error occurs the computer has number of in-built, self-checking features in
their electronic components that can detect, correct and inform us such errors. Usually errors are committed
by the users entering the data to the computer, thus the saying Garbage in Garbage Out (GIGO).
This means that, if you enter incorrect data into the computer and have it processed, the computer will give
you misleading information. But computers are most reliable tool when compared to your friend sitting
next to you for sure (just in case of your work mind you).

Ease of Data Sharing


Data sharing has now become very simple just the way it is simple to link one computer system to another
sharing data (no matter how big the files are) are transferred in matter of few seconds.
Competition
The applicability of computer technology has also
increased competition among the many technological
service companies today. With such a pace of
development and quick arrival of new technology in
market, if companies don’t upgrade with the trend, it
becomes very difficult to float in the competition.
That’s why in the present job market, until one doesn’t
update him/her self with trend and needs of the market,
growth in the job would be difficult in such competitive
environment.

Computer Skills 2
COMPUTER FUNDAMENTALS
Being a modern-day student you must have used, seen, or read about computers. This is because they are an
integral part of our everyday existence. Be it school, banks, shops, railway stations, hospital or your own
home, computers are present everywhere, making our work easier and faster for us. As they are such integral
parts of our lives, we must know what they are and how they function. Let us start with defining the term
computer formally.
The literal meaning of computer is a device that can calculate. However, modern computers can do a lot more
than calculate. Computer is an electronic device that receives input, stores or processes the input as per user
instructions and provides output in desired format.

Why use computers What is in a computer?


• A computer is a programmable machine designed to perform arithmetic and logical operations
automatically and sequentially on the input given by the user and gives the desired output after
processing.
• Computer components are divided into two major categories namely hardware and software.
• Hardware is the machine itself and its connected devices such as monitor, keyboard, mouse etc.
• Software are the set of programs that make use of hardware for performing various functions.

Computer Organization:

A computer system consists of mainly four basic units namely:


• Input Unit
• Storage unit
• Processing
• Output unit

A computer performs five major operations or functions irrespective of its size and make. They :
• Accepts data or instructions as input,
• Stores data and instruction
• Processes data as per the instructions
• Controls all operations inside a computer,
• Gives results in the form of output.

Computer Skills 3
Input Units and Devices:

This unit is used for entering data and programs into the computer system by the user for processing.
• Keyboard
• Mouse
• Trackball
• Touchpad
• Touch Screen
• Light Pen Touch screen Light Pen Touch Pad Touch Pad

Storage unit and devices:

The storage unit is used for storing data and instructions before and after processing. The computer uses
several devices to permanently store and move data, which vary a lot in terms of capability, cost, speed and
portability.

Science behind Storage:


Before starting with the computer description, it is useful to become proficient with the data size
terminology, which will often be used in daily purpose.
• Computers have a very elementary way to store data: they can remember only 0 or 1
• A value of 0 or 1 is called bit and all computer data are stored as sequences of bits.
• A sequence of 8 bits is called a byte, which is a quantity large enough to store usually a letter or a
digit (even though sometimes 2 bytes are necessary).
• Modern computers are able to deal with enormous quantity of bytes, forcing us to introduce other
quantities:
à Kilobyte (KB), approximately 1,000 bytes
à Megabyte (MB), approximately 1,000 KB or one million bytes
à Gigabyte (GB), approximately 1,000 MB or one billion bytes
à Terabyte (TB), approximately 1,000 GB or one trillion bytes.

Usually, the unformatted text of a whole book can fit in some KB, while for an image in a good resolution
(let’s say ready to be printed on A4 paper) or for a modern song some MB are required, while a film in high
quality needs some GB.

Storage Devices:

• The most used one is the internal hard disk, which usually is inside the
computer box and cannot be moved. Its size currently ranges from 1 to 4 TB.

• On the other hand, an external hard disk is outside the computer, has the Internal hard disk
same size and obviously can be moved. Its only disadvantage is being slightly
slower.

• SSD or Solid State Drives are starting to invade the market and will replace
traditional hard disks. They are not disks at all, but very large memory cards
shaped like a hard disk which can entirely replace the internal hard disk. Their External Hard Disk
main advantages are that not having moving parts (they do not rotate at high
speed like hard disks) are more robust and that in most situations they up to 10
times faster than traditional hard disks. Their disadvantage is the limited size
which currently is 500 GB and their high price
Solid State Drives

Computer Skills 4
• CD, DVD, and Blu-ray are an alternative way to store data. They contain
about 700 MB, 4 GB, and 25 GB, respectively. They required an appropriate
reader to be read, which is available on many computers, and an appropriate
writer device to be written, which is available only on some computers. This
technology has now disappeared, as disks are much larger and easier to
damage compared to USB sticks or external hard disks. USB flash stick or CD drive
USB pen drive is the most used way to temporary store and move data. Its size
is now up to 500 GB, however, its reliability is not perfect, therefore it is used
mostly to move data. Another common way to store and move data is through a
memory card, used by external devices such as photo cameras or to expand
mobile phones’ memory. From a technical point of view, they are identical to
SSD or USB sticks. USB flash stick
Processing
• The task of performing operations like arithmetic and logical operations is called processing.
à The Central Processing Unit (CPU) takes data and instructions from the storage unit and makes
all sorts of calculations based on the instructions given and the type of data provided.
à It is then sent back to the storage unit. CPU includes Arithmetic logic unit (ALU) and control
unit (CU)

o Arithmetic Logic Unit: All calculations and comparisons, based on the instructions provided,
are carried out within the ALU. It performs arithmetic functions like addition, subtraction,
multiplication, division and also logical operations division and also logical operations like
greater than, less than and equal to etc.
o Control Unit: Controlling of all operations like input, processing and output are performed by
control unit. It takes care of step by step processing of all operations inside the computer.

Output units and Devices

The output unit is used for storing the result as output produced by the computer after processing. Output
device receives information from the CPU and presents it to the user in the desired from. The processed
data, stored in the memory of the computer is sent to the output unit, which then converts it into a form that
can be understood by the user. The output is usually produced in one of the two ways –
• On the display device, or
• On paper (hard copy).

à Monitor
à Printer
à Plotters
à Scanner
à Magnetic ink character recognition (MICR)
• MICR can identify character printed with a special ink Plotter OMR
that contains particles of magnetic material.
• This device particularly finds applications in banking industry.

à Optical mark recognition (OMR):


• Optical mark recognition, also called mark sense reader is a
technology where an OMR device senses the presence or
absence of a mark, such as pencil mark. Bar Code Reader MICR

• OMR is widely used in tests such as aptitude test.

à Bar code reader:


• Bar-code readers are photoelectric scanners that read the bar codes or vertical
zebra strips marks, printed on product containers.
Scanner
Computer Skills 5
• These devices are generally used in super markets, bookshops etc.

Computer Software

Computer software is the set of programs that makes the hardware perform a set of tasks in particular order.
Hardware and software are complimentary to each other. Both have to work together to produce
meaningful results. Computer software is classified into two broad categories;
• Program
• Data
• System software
• Application software
Programs
• An organized list of instructions that, when executed, causes the computer to behave in a
predetermined manner. Without programs, computers are useless.
• A program is like a recipe. It contains a list of ingredients (called variables) and a list of directions
(called statements) that tell the computer what to do with the variables. The variables can represent
numeric data, text, or graphical images.
• There are many programming languages -
àC
àC++,
à Pascal,
à BASIC,
àFORTRAN,
à COBOL,
àLISP etc…
• The above programming languages are
all high-level languages. One can also write
programs in low-level
languages called assembly languages,
although this is more difficult.
• Low-level languages are closer to
the language used by a computer, while
high-level languages are closer to human languages. Sample Coding language

Data
• In general, data is any set of characters that is gathered and translated for some purpose, usually
analysis. It can be any character, including text and numbers, pictures, sound, or video.
• If data is not put into context, it doesn't do anything to a human or computer.
• Within a computer's storage, data is a series of bits (binary digits) that can have the value one or
zero. Data is processed by the CPU, which uses logical operations to produce new data (output) from
source data (input).
• Examples: The below are the data sets respectively: Address, Number, Binary.

Computer Skills 6
System Software
System Software can be designed as the software in such a way so that it can control and work
with computer hardware. It acts as an interface between the device and the end user.
It also provides the platform for the running of other software’s.

Features of the system software:


• It is difficult to design.
• It is written in the low-level language, or you can say that it is written in machine language which is
only understood by the machine.
• It is difficult to manipulate.
• System software is very close to the system.
• The speed of the system software is fast.

Components of system software:


System software consist of the following elements:

Device Driver:
• A device driver is a small piece of software that tells the operating system and other software how to
communicate with a piece of hardware.
• For example, printer drivers tell the operating system, and by extension whatever program you have
the thing you want to print open in, exactly how to print information on the page.

Operating System:
The operating system is the system which manages the hardware of the computer. The
operating system consists of program and data. An operating system also provides us with
services so that we can execute the application software.

• Microsoft Windows, which is the market leader for computers


• Macintosh computers have their own operating system macOS (formerly OS X)
• Linux (it is a family of very similar operating systems), which is a costless operating
system for computers).
• Android a family of very similar Linux-based operating systems for mobile devices.
• iOS for Apple mobile devices.

Server:
it is a program which works like a socket listener in a computer networking system. A server computer is a
series of computers which link other computers with itself. The server can provide some essential services to
both private users and public users via the internet across a network.

Computer Skills 7
Examples of Server:
• Application server
• Blade server
• Cloud server
• Database server
• Dedicated server
• Domain name
service
• File server
• Mail server
• Print server
• Proxy server
• Standalone server
• Web server

Utility Software

• Utility software, often referred as utility is a system software that is designed to help analyse,
configure, optimize or maintain a computer and enhance the computer’s performance.
• It is a program that performs a specific task, which is usually related to managing the system
resources.
• Utilities are sometimes also installed as memory-resident programs.
• Utility software usually focuses on how the computer infrastructure that includes computer
hardware, application software, operating system and data storage programs operates.
• These utilities could range from the small and simple to the large and complex that can perform
either a single task or a multiple tasks.
• Some of the functions performed by these utilities are data compression, disk defragmentation, data
recovery, management of computer resources and files, system diagnosis, virus detection, and many
more.
• Some of the examples of the utility programs (Utilities) include:
à Disk defragmenters
à System Profilers
à Network Managers
à Application Launchers
à Antivirus software System utility in MacOS Disk Cleaner
Zip File (File Compression)
à Backup software
à Disk repair
à Disk Cleaners
à Registry Cleaners
àDisk Space analyser
àfile manager
àFile Compression
àData Security.
àIn addition,
operating systems
contains a number of
Antivirus software
utilities for managing disk File manager programs
drives, printers, and other devices.

Computer Skills 8
Windowing system:

A windowing system, also referred to as a window


system, is a collection of software that creates the
basic GUI (graphical user interface) on computer
display screens, including the drawing of windows
and other graphics primitives (i.e., basic shapes) for
application programs.

Ubuntu/Linux Window Display

Mac iOS Window Display Windows Display

Application software

• Software that can perform a specific task for the user, such as word processing, accounting,
budgeting or payroll, fall under the category of application software.
• Word processors, spreadsheets, database management systems are all examples of general purpose
application software.

Types of application software are:

Word processing software:


The main purpose of this software is to produce documents. MS-Word, Word
Pad, Notepad and some other text editors are some of the examples of word
processing software. Figure 1: Microsoft Note Pad
word
Database software:
Database is a collection of related data. The purpose of this software is to organize and manage data. The
advantage of this software is that you can change the way data is stored and displayed. MS access, dBase,
FoxPro, Paradox, and Oracle are some of the examples of database software.

M.S Access Oracle D Base FoxPro

Spread sheet software:


The spread sheet software is used to maintain budget, financial statements, grade sheets,
and sales records. The purpose of this software is organizing numbers. It also allows the
users to perform simple or complex calculations on the numbers entered in rows and
columns. MS-Excel is one of the example of spreadsheet software. M.S. Excel

Computer Skills 9
Presentation software:
This software is used to display the information in the form of slide show. The three main
functions of presentation software is editing that allows insertion and formatting of text,
including graphics in the text and executing the slide shows. The best example for this
type of application software is Microsoft PowerPoint. M.S. Power Point

Multimedia software:
Media players and real players are the examples of multimedia software. This software will allow the user to
create audio and videos. The different forms of multimedia software are audio converters, players, burners,
video encoders and decoders.

Audio Converter CD Burner Audio Converter multimedia


VLC Media

Files and directories:

• The software is stored on storage devices in a special container called file.


• The operating system uses a lot of files for itself and for its data, a program
usually uses one file for itself and other files for its data, and the user uses some
files for his data.
• A file is represented by a small picture called icon. Another special object is the File Folder
directory or folder, which is basically a container for files and other directories
and is represented with an icon depicting a yellow closed or open folder.

How to open the file?


• Double clicking on a directory opens a new window which
presents the directory content.
• Each storage device is a big directory, accessible from My
Computer window, which contains directories and files.
• Each of these subdirectories may contain other files and other
sub-subdirectories, and so on in a hierarchical way, forming a
tree with the hard disk (or another storage device) as the root,
directories as branches and files as leaves.
• Local disks are usually indicated with a letter and a colon,
such as C.

Subdirectories of files

File Types:
Windows identifies a file type by its extension, which is everything
after the last dot in the filename. Usually, it is a 3 or 4 character
acronym. Using the file extension, Windows knows the file type and
Local Disk C
decides which program will open that file. If the file extension does not
show up, follow the instructions at section 2.3 on page 7. The most
important file types are:

Computer Skills 10
file type and its extension

Computer Skills 11
INTERNET
In the present age of information Technology, use of Internet is becoming quite
popular for accessing information on any topic of your interest. It also provides
tremendous opportunities to students, researchers and professionals for getting
information on matters related to academic and professional topics and lot
more.

In the present world, most of the people who have computers around
themselves use Internet to access information from the World Wide Web
(www), exchange messages & documents and all the e-services from purchasing goods to transferring
money.

The Internet is a worldwide telecommunications


system that provides connectivity for millions of NOTE
other, smaller networks; therefore, the Internet is The Internet began in 1969 as the U.S. Department
of Defence Advanced Research Project Agency
often referred to as a network of networks. It allows (ARPA) to provide immediate communication
computer users to communicate with each other within the Department in case of war.
across distance and computer platforms.

Ways of Connecting to Internet:


• The Internet acts as a pipeline to transport electronic messages from one network to another network.
At the heart of most networks is a server, a fast computer with large amounts of memory and storage
space.
• The server controls the communication of information between the devices attached to a network,
such as computers, printers, or other servers.
• An Internet Service Provider (ISP) allows the user access to the Internet through their server.
• Many professors use a connection through a local university as their ISP because it is free. Other
ISPs, such as America Online, telephone companies, or cable companies provide Internet access for
their members.
• You can connect to the Internet through telephone lines, cable modems, cell phones and other mobile
devices.
• There are five types of internet connections which are as follows:
àDial up Connection:
àLeased Connection
àDSL connection
àCable Modem Connection
àVSAT

Computer Skills 12
Type of Networks:

A network is any collection of independent computers that exchange information with, each other over a
shared communication medium.

• Local Area Networks (LANS)


• Wide Area Networks (WANS)
• Wireless Local Area Networks (WLANS)
• Intranet: A Secure Internet-Like Net
• work for Organizations
• Extranet: A Secure Means for Sharing Information with Partners

Local Area Networks (LAN):

• Local Area Networks or LANs are usually confined to a limited geographic area, such as a single
building or a college campus.
• LANs can be small, linking as few as three computers, but can often also link hundreds of computers
used by thousands of people.
• There is another advance LAN called the Metropolitan Area Network (MAN), used when we
consider the distance covered to be between 1 to 10km unlike the LAN that spans within 1km.

Wide Area Networks (WAN):

• Often elements of a network are widely separated physically. Wide area networking combines
multiple LANs that are geographically separate.
• This is accomplished by connecting the several LANs with dedicated leased lines such as a T1 or a
T3, by dial-up phone lines (both synchronous and asynchronous), by satellite links and by data
packet carrier services.
• WANs can be as simple as a modem and a remote access server for employees to dial into, or it can
be as complex as hundreds of branch offices globally linked.
• Special muting protocols and filters minimize the expense of sending data over vast distances.

Wireless Local Area Networks (WLAN):

• Wireless LANs, or WLANs, use radio frequency (RF) technology to transmit and receive data over
the air. This minimizes the need for wired connections.
• WLANs give users mobility as they allow connection to a local area network without having to be
physically connected by a cable.
• This freedom means users can access shared resources without looking for a place to plug in cables,
provided that their terminals are mobile and within the designated network coverage area. With
mobility, WLANs give flexibility and increased productivity, appealing to both entrepreneurs and to
home users.
• WLANs may also enable network administrators to connect devices that may be physically difficult
to reach with a cable.

Intranet: A Secure Internet-Like Network for Organizations :

• With advancements in browser-based software for the Internet, many private organizations have
implemented intranets. An intranet is a private network utilizing Internet-type tools, but available
only within that organization. For large organizations, an intranet provides easy access to corporate
information for designated employees.

Computer Skills 13
What makes up the World Wide Web (WWW)?

• The Internet is often confused with the World Wide Web. The misperception is that these two terms
are synonymous. The Internet is the collection of the many different systems and protocols. The
World Wide Web, developed in 1989, is actually one of those different protocols. As the name
implies, it allows resources to be linked with great ease in an almost seamless fashion.
• The World Wide Web contains a vast collection of linked multimedia pages that is ever-changing.
However, there are several basic components of the Web that allow users to communicate with each
other. Below you will find selected components and their descriptions.

Domain name system

• An Internet address has four fields with numbers that are separated by periods or dots. This type of
address is known as an IP address.
• Rather than have the user remember long strings of numbers, the Domain Name System (DNS) was
developed to translate the numerical addresses into words.
• For example, the address fcit.usf.edu is really 131.247.120.10.

URLs

• Addresses for web sites are called URLs (Uniform Resource Locators). Most of them begin with http
(Hyper Text Transfer Protocol), followed by a colon ( : ) and two slashes ( // ).
• For example, the URL for the Florida Centre for Instructional Technology is http://fcit.usf.edu/
• Some of the URL addresses include a directory path and a file name. Consequently, the addresses
can become quite long. For example, the URL of a web page may be:
http://fcit.usf.edu/holocaust/default.htm
• In this example, "default.htm" is the name of the file which is in a directory named "holocaust" on
the FCIT server at the University of South Florida.

Top-level domain

• Each part of a domain name contains certain information.


• The first field is the host name, identifying a single computer or organization.
• The last field is the top-level domain, describing the type of organization and occasionally
country of origin associated with the address.
• Top-level domain names include:

à .com -------------> Commercial


à .edu -------------> Educational
à .gov -------------> US Government
à .mil. -------------> US Military
à .net -------------> Networking Provider
à .org -------------> Non-profit Organization

• Domain name country codes include, but are not limited to:
à .in -------------> India
à .au -------------> Australia
à .de -------------> Germany
à .fr -------------> France
à .nl -------------> Netherlands
à .uk -------------> United Kingdom
à .us -------------> United States…….. etc
Computer Skills 14
What are browsers?

• Web Browser is an application software that allows us to view and explore information on
the web. User can request for any web page by just entering a URL into address bar.
• Web browser can show text, audio, video, animation and more. It is the responsibility of
a web browser to interpret text and commands contained in the web page.
• Earlier the web browsers were text-based while now a days graphical-based or voice-
based web browsers are also available. Following are the most common web browser
available today.

Browser Vendor Graphically


Represented

Internet Explorer Microsoft

Google Chrome Google

Mozilla Firefox Mozilla

Netscape Navigator Netscape


Communication Corp.

Opera Opera Software

Safari Apple

Sea Monkey Mozilla Foundation

K-Meleon K-Meleon

Taking an example of Internet Explorer, in the following section we will explain brief aspects of
opening and using browser for searching an information.
Opening a Web Browser:
Internet explorer is a web browser developed by Microsoft. It is installed by default with the
windows operating system however, it can be downloaded and be upgraded.
To start internet explorer, follow the following steps:

Computer Skills 15
Go to Start button and click Internet Explorer or select the Just enter the URL in the address bar as shown
default on the Ribbon below

Finding Information on the Internet:

Using Search Engines:


There is an enormous amount of information on the
Web! However, there's an easy way for you to find
specific information without searching through
every site yourself. Just use a search engine. Here
are some tips to help you make the most of search
engines.

How to Use a Search Engine

Most search engines work the same basic way. You type into a search box the information you're looking
for and “Pasta” the search engine lists Web sites that contain this information. These results are known as
"hits." The words you type into the search box are called "keywords." The keywords you use will greatly
affect your results. Other search engines, like Ask Jeeves for Kids, let you type in questions without having
to choose keywords.

Tips to Help Make the Most of a Search


Make your keywords as precise as possible:
If you're looking for information on Tyrannosaurus rex, don't type in "dinosaurs." You'll get too much
general information about dinosaurs and not enough specific hits about T-rex.

Use two or more keywords in your search


But put the most important keywords first. For example, if you wanted information about what the T-rex ate,
you might use the following keywords in this order: Tyrannosaurus rex diet. The search engine will look for
Web pages that contain all these words.

Always try more than one search engine. Each search engine doesn't look through every site on the Web.
Instead, most search engines check Web site pages every once in a while to create their own databases. So
when you use a search engine, you're actually looking at one small slice of sites. Different search engines
will usually come up with different results. So it makes sense to use more than one.

Computer Skills 16
Email Operations
Email is a popular mode of communication and has become as necessary as a phone number or mailing
address. Similar to calling somebody, email has become a standard mode of communication with the
expectation being that everybody should have an email address.

In many ways, email has made my life easier. It allows to:


• Contact people all over the world for free
• Communicate with more than one person at a time
• Document interactions
• Leave messages any time of day without bothering people

Creating Email Account:


There are various email service provider available such as Gmail, hotmail, ymail, rediff mail, Oulook etc.
Here we will learn how to create an account using Gmail.
• Open gmail.com and click create an account.
• Now a form will appear. Fill your details here and click Next Step.

• This step allows you to add your picture. If you don’t want to upload now, you can do it later. Click Next
Step.
• Now a welcome window appears. Click Continue to Gmail.
• Wow!! You are done with creating your email account with Gmail. It’s that easy. Isn’t it?
• Now you will see your Gmail account as shown in the following image:
Key Points:
• Gmail manages the mail into three categories namely Primary, Social and Promotions Gmail manages
the mail into three categories namely Primary, Social and Promotions.

• Compose option is given at the right to compose an email message.

• Inbox, Starred, Sent mail, Drafts options are available on the left pane which allows you to keep track
of your emails.
Composing and Sending Email
Before sending an email, we need to compose a message. When we are composing an email
message, we specify the following things:
• Sender’s address in To field
• Cc (if required)
• Bcc (if required)
Computer Skills 17
• Subject of email message
• Text
• Signature
You should specify the correct email address; otherwise it will send an error back to the sender.
Once you have specified all the above parameters, It’s time to send the email. The mailer program provides
a Send button to send email, when you click Send, it is sent to the mail server and a message “mail sent
successfully” is shown at the above.

Computer Skills 18
SECURITY AWARENESS

The Internet has transformed our lives in many good ways. Unfortunately, this vast network and its
associated technologies also have brought in their wake, the increasing number of security threats. The most
effective way to protect yourself from these threats and attacks is to be aware of
standard cybersecurity practices.

What is Computer Security?


Computer security basically is the protection of computer
systems and information from harm, theft, and
unauthorized use. It is the process of preventing and
detecting unauthorized use of your computer system.

Often people confuse computer security with other related


terms like information security and cybersecurity. One
way to ascertain the similarities and differences among
these terms is by asking what is being secured. For
example,

• Information security is securing information from unauthorized access, modification & deletion
• Computer Security means securing a standalone machine by keeping it updated and patched
• Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks

It’s important to understand the distinction between these words, though there isn’t necessarily a clear
consensus on the meanings and the degree to which they overlap or are interchangeable.

So, Computer security can be defined as controls that are put in place to provide confidentiality, integrity,
and availability for all components of computer systems. Let’s elaborate the definition.

Components of computer system

The components of a computer system that needs to be protected are:


• Hardware, the physical part of the computer, like the system memory and disk drive
• Firmware, permanent software that is etched into a hardware device’s non-volatile memory and is
mostly invisible to the user
• Software, the programming that offers services, like operating system, word processor, internet
browser to the user
Computer security threats

Computer security threats are possible dangers that can possibly hamper the normal functioning of your
computer. In the present age, cyber threats are constantly increasing as the world is going
digital. The most harmful types of computer security are:

Viruses: A computer virus is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and infects the files and
programs on the user’s PC. The ultimate goal of a virus is to ensure that the victim’s
computer will never be able to operate properly or even at all.

Computer Worm: A computer worm is a software program that can copy itself from
one computer to another, without human interaction. The potential risk here is that it will

Computer Skills 19
use up your computer hard disk space because a worm can replicate in great volume and with great speed.

Phishing: Disguising as a trustworthy person or business, phishers attempt to steal


sensitive financial or personal information through fraudulent email or instant
messages. Phishing in unfortunately very easy to execute. You are deluded into thinking
it’s the legitimate mail and you may enter your personal information.

Botnet: A botnet is a group of computers connected to the internet, that have been
compromised by a hacker using a computer virus. An individual computer is called ‘zombie
computer’. The result of this threat is the victim’s computer, which is the bot will be used
for malicious activities and for a larger scale attack like DDoS.

Rootkit: A rootkit is a computer program designed to provide continued privileged access


to a computer while actively hiding its presence. Once a rootkit has been installed, the
controller of the rootkit will be able to remotely execute files and change system
configurations on the host machine.

Keylogger: Also known as a keystroke logger, keyloggers can track the real-time activity
of a user on his computer. It keeps a record of all the keystrokes made by user keyboard.
Keylogger is also a very powerful threat to steal people’s login credential such as username
and password

These are perhaps the most common security threats that you’ll come across. Apart from
these, there are others like spyware, wabbits, scareware, bluesnarfing and many
more. Fortunately, there are ways to protect yourself against these attacks.

Computer Skills 20
SAFE COMPUTER SECURITY PRACTICES

Computer security threats are becoming relentlessly inventive these days. There is much need for one to arm
oneself with information and resources to safeguard against these complex and growing computer security
threats and stay safe online. Some preventive steps you
can take include:
• Secure your computer physically by:
o Installing reliable, reputable security
and anti-virus software
o Activating your firewall, because a
firewall acts as a security guard between
the internet and your local area network
• Stay up-to-date on the latest software and news
surrounding your devices and perform software
updates as soon as they become available.
• Avoid clicking on email attachments unless you
know the source Antivirus software
• Change passwords regularly, using a unique
combination of numbers, letters and case types
• Use the internet with caution and ignore pop-
ups, drive-by downloads while surfing
• Taking the time to research the basic aspects of
computer security and educate yourself on
evolving cyber-threats
• Perform daily full system scans and create a
periodic system backup schedule to ensure your
data is retrievable should something happen to
your computer. Traits of a fake email (Example of a Boston Public
School(BPS)

Email and password security

Email is both an excellent communication tool and also a way that companies can inform you about their
latest products and services. However, email is frequently used to deliver unwanted material which is at
best, annoying and at worst, malicious – causing considerable
harm to your computer and yourself.

Spam (or Junk) email:

The vast majority of email sent every day is unsolicited junk


mail. Examples include:
• Advertising, for example online pharmacies, pornography,
dating, gambling.
• Get rich quick and work from home schemes.
• Hoax virus warnings.
• Hoax charity appeals.
• Chain emails which encourage you to forward them to
multiple contacts (often to bring ‘good luck’).

How spammers obtain your email address:

•Using automated software to generate addresses.


•Enticing people to enter their details on fraudulent websites.
•Hacking into legitimate websites to gather users’ details.
Computer Skills 21
• Buying email lists from other spammers.
• Inviting people to click through to fraudulent websites posing as spam email cancellation services.
• From names/addresses in the cc line, or in the body of emails which have been forwarded and the
previous participants have not been deleted.

The very act of replying to a spam email confirms to spammers that your email address exists.

How to spot spam

Spam emails may feature some of the following warning signs:

• You don’t know the sender.


• Contains misspellings (for example ‘p0rn’ with a zero) designed to fool spam filters.
• Makes an offer that seems too good to be true.
• The subject line and contents do not match.
• Contains an urgent offer end date (for example “Buy now and get 50% off”).
• Contains a request to forward an email to multiple people, and may offer money for doing so.
• Contains a virus warning.
• Contains attachments, which could include .exe files.

The risks

• It can contain viruses and spyware.


• It can be a vehicle for online fraud, such as phishing.
• Unwanted email can contain offensive images.
• Manual filtering and deleting is very time-consuming.
• It takes up space in your inbox.

Email Scams

Scams are generally delivered in the form of a spam email (but remember, not all spam emails contain
scams). Scams are designed to trick you into disclosing information that will lead to defrauding you or
stealing your identity.

Examples of email scams include:

• Emails offering financial, physical or emotional benefits, which are in reality linked to a wide variety of
frauds.
• These include emails posing as being from ‘trusted’ sources such as your bank, HMRC or anywhere else
that you have an online account. They ask you to click on a link and then disclose personal information.

Phishing emails

Phishing is a scam where criminals typically send emails to thousands of people. These emails pretend to
come from banks, credit card companies, online shops and auction sites as well as other trusted
organisations. They usually try to trick you into going to the site, for example to update your password to
avoid your account being suspended. The embedded link in the email itself goes to a website that looks
exactly like the real thing but is actually a fake designed to trick victims into entering personal information.

Computer Skills 22
• The email itself can also look as if it comes from a genuine source. Fake emails sometimes display some
of the following characteristics, but as fraudsters become smarter and use new technology, the emails
may have none of these
characteristics. They may even
contain your name and address.
• The sender’s email address may
be different from the trusted
organisation’s website address.
• The email may be sent from a
completely different address or
a free webmail address.
• A sense of urgency; for
example the threat that unless
you act immediately your
account may be closed.
• A request for personal
information such as username,
password or bank details.
• You weren't expecting to get an
email from the organisation that
appears to have sent it.
Sample PayPal emails
Use email safely

• Do not open emails which you suspect as being scams.


• Do not forward emails which you suspect as being scams.
• Do not open attachments from unknown sources.
• If in doubt, contact the person or organisation the email claims to have been sent by ... better safe
than sorry.
• Do not readily click on links in emails from unknown sources. Instead, roll your mouse pointer over the
link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is
different from what is displayed in the text of the link from the email.
• Do not respond to emails from unknown sources.
• Do not make purchases or charity donations in response to spam email.
• Don’t click on ‘remove’ or reply to unwanted email.
• Check junk mail folders regularly in case a legitimate email gets through by mistake.
• When sending emails to multiple recipients, list their addresses in the 'BCC' (blind copy) box instead of
in the 'To' box. In this way, no recipient will see the names of the others, and if their addresses fall into
the wrong hands there will be less chance of you or anybody else receiving phishing or spam emails.
• Similarly, delete all addresses of previous parties in the email string, before forwarding or replying.
• If you are suspicious of an email, you can check if it is on a list of known spam and scam emails that
some internet security vendors such as McAfee and Symantec feature on their websites.
• Most Microsoft and other email clients come with spam filtering as standard. Ensure yours is switched
on.
• Most spam and junk filters can be set to allow email to be received from trusted sources, and blocked
from untrusted sources.
• When choosing a webmail account such as Gmail, Hotmail and Yahoo! Mail, make sure you select one
that includes spam filtering and that it remains switched on.
• Most internet security packages include spam blocking. Ensure that yours is up to date and has this
feature switched on.

Computer Skills 23
PRODUCTIVE COMPUTER SKILLS FOR BETTER EMPLOYABE OPPORTUNITY

Today, nearly every job requires a basic understanding of computers, and many jobs involve intermediate to
advanced computer skills. This can include knowledge of specific software, applications or devices. Below,
you’ll discover more information about the type of computer skills employers commonly look for in job
applicants.

What are computer skills?

Computer skills fit into two categories:


à Hardware àSoftware.

Hardware skills:
• Allow you to physically operate a computer.
• Hardware skills can be as simple as knowing how to turn devices on and off.
• They might also involve more complex tasks like connecting machines to networks, changing parts
or fixing broken devices.
• For such complex tasks, many employers hire trained technicians with advanced computer skills.

Software skills:
• Help you to efficiently use computer programs and applications.
• There are some software skills that employers may consider as prerequisites to employment.
• Employers may not include some software skills on job posts under the assumption they are
universally understood.
• For example, many employers may believe all applicants have a basic knowledge of word processing
programs, like Microsoft Word.

Some common computer skills include:


• Analytics • Email Communication
• Social Media • Marketing Automation
• Graphic Design • Data Visualization
• Microsoft Office

Certain software skills are more commonly desired in different fields. If you’re a computer programmer, you
may be required to know various coding languages like:
• C • Java
• Python • HTML among others
• C++

Accounting Software
• Microsoft Excel • Profit books
• QuickBooks • Busy Accounting Software
• Tally.ERP 9 • Zoho Books Etc……
To find out which skills employers in your industry might expect, spend some time researching the most
common software skills for your career. Carefully read job descriptions and take note of the requirements
listed there.

Why are computer skills important in today’s Job Environment?

Most jobs now require the use of computers, mobile devices or software applications in some capacity.
Some employers will require prior knowledge or experience with specific applications, while others will

Computer Skills 24
offer on-the-job training. If you have a working knowledge of commonly used software, you may be able to
more easily learn how to use new programs.

The types of computer skills employers expect will vary depending on your career or industry.
• For example, if you’re applying for a job as an office manager, you will likely be required to have a
basic knowledge of word processing programs, spreadsheets, email platforms and other
communication tools.
• If you are applying for an advertising firm, You are expected to know Graphical based software’s
such as Photoshop, InDesign, Maya (3D Software) etc..
• If you are applying for an accountant job, you need to be proficient in Excel or Talley software’s.

There are many other computer skills, however, that are commonly used across all industries that are
important for most job applicants to know.

Some of the most important computer skills to learn include the following:

Office suites
Basic knowledge of productivity software suites can add value to your resume.
à Outlook à OneNote
à Word à Share Point
à Excel à Microsoft Teams
à PowerPoint à One Drive

Microsoft Word
• Word processors, such as Microsoft Word, are among the most commonly used productivity tools.
They are writing programs used to help produce digital documents.
• From writing reports to making a CV, Bill, Letter, Most of the work in any job environment is
created in the Word.
• Employers often assume that most applicants know how to use word
processing programs. As a result, these programs may not be listed on a job
posting.
• If you find you are unfamiliar with how to use word processors, it may be
helpful to spend time researching the basic skills required to use these
programs.

Microsoft Excel

• Microsoft Excel is a common application. You may have used it on the job or for school, but chances
are that you only used it for its most basic uses.
• However, Excel skills are more important than ever. And those who know how to tap into Excel
are in a better position to find a better paying job. Being one of the most demand based
software for better employability.
• The use of Excel has been almost used in all possible jobs, but advancing the skills in Excel could
give you a head start in the following fields.

Administrative Assistants:
Administrative Assistants perform a number of tasks such as minor bookkeeping, generating reports,
creating client databases, organizing document systems, and maintaining computer records–all of which
involve Excel to a certain extent.

Computer Skills 25
Retail Store Managers:
A Retail Store Manager is in charge of maintaining and running the daily operations of a store. Though
they’re responsible for creating store policies, overseeing and leading staff, and monitoring inventory,
retail managers are also responsible for maximizing profits. As such, they analyse consumer and sales
trends, prepare annual budgets and schedule expenditures. And Excel is natural tool of choice.

Project Managers:
A Project Manager has to stay on top of everything to ensure that everything stays on track. From working
with third party vendors and allocating resources to managing employees and creating documents, project
managers need to navigate through all the information they need.
While there are tools that exist for more complex projects, project managers can use Excel while
working with smaller businesses to streamline daily operations, manage financial records, sort out
vendor lists, generate reports, and create gantt charts.

Business Analysts:
A Business Analyst is someone who analyses an organization or business, documents its processes or
systems, and assesses the
business, identifying areas and
solutions aimed at maximizing
the value of a company. And
this requires keeping track of a
ton of data and being able to
analyse it. That’s where
spreadsheets step in as one of
the best analytical tools for
business analysis according to
the professionals.

Accountants:
This list wouldn’t be complete if Accountants weren’t on this list. True, they deal with specialized
accounting software like QuickBooks, but accountants must be proficient with Excel. This includes tasks
such as auditing, formatting, using formulas to filter out different values and sums, and more. To ensure that
the numbers add up, they need to analyse them.
Computer Skills 26
PowerPoint:
A creative based software is almost used in all the professions. In the act of presenting your product, Idea,
Active planning etc.. Power point slide shows are generally used for presenting in the larger group.
The Amount of creativity deployed into the slide
shows are enormous and many.

Making your presentation more interesting through the


use of multimedia can help to improve the audience's
focus. PowerPoint allows you to use images, audio
and video to have a greater visual impact. These visual
and audio cues may also help a presenter be more
improvisational and interactive with the audience.

Social Media

Social Media up till now has been used largely for conversing with your friends or acquaintances. But
Today the social media platform is more than just a meet up medium, but could be an
• Advertisement and Marketing platform
• Job search platform
• Entrepreneurial platform
• E-Commerce Platform
• E-Learning Platform

Advertisement and Marketing platform:

• Knowing the skills of marketing on the social media could be very advantageous to the businesses
the individual will be working.
• Social media marketing is a powerful way for businesses of
all sizes to reach prospects and customers.
• Your customers are already interacting with brands through
social media, and if you're not speaking directly to your
audience through social platforms like Facebook, Twitter,
Instagram, and Pinterest, you're missing out!
• Great marketing on social media can bring remarkable
success to your business, creating devoted brand advocates
and even driving leads and sales.
Computer Skills 27
Job search platform:

Today, job seekers rely on social networks to search and apply for jobs. To bring your positions in front of
the people you want to hire, you have to go where they are. And that’s in the most popular social sites:
LinkedIn, Facebook and Twitter. Posting jobs on these platforms helps you increase the visibility of your
job ads among potential candidates.
• LinkedIn is your go-to place to connect with job candidates, both passive and active. You can
advertise your open roles or share them with your network.
• Using Facebook “We are Hiring” Pages where your respective jobs are advertisement.
• Specific Websites which are connected to the social media. Few Websites which are best for
searching jobs are:
à Theindiajobs.com àNaukrihub.com
à Naukri.com àCareerjet.com
àMonster.com àCareerAge.com
à TimesJobs.com àJobAlertsHub.com
àJobket.com àFreshersworld.com

Entrepreneurial platform:

• Some of the best social media platforms for business, like Facebook and Instagram, have become
essential tools in the modern business opportunity.
• More and more consumers are using the social
media channels to find new companies and
engage with their favourite brands. However,
most companies can’t be everywhere at once,
especially small businesses with tight marketing
budgets.
• For example; Facebook being one of the best
social media platforms for businesses to use to
reach their target market- whatever that audience
may be. Photographs and Advertisements for very
low coast could reach thousands of customers.
• Similarly Instagram with a simple swipe up and
down interface can scroll number of photograph.
Various Fashion based business, products, Instagram Ad. Facebook Ad
content, etc. are advertised in this platform.

E-Commerce Platform:

The ecommerce industry is ushering in the next wave of change for the Indian
economy and if you’ve been thinking about venturing a foot into its world
of online business.
• Amazon, Flipkart, Snapdeal, Myntra, Shopclues, PayTm today are
the largest e-commerce platforms today in India. All products are
advertised in these platforms making it easier for the customers to view
your products.
• Or for advertising your own product, one could purchase a domain name and
creating your own website with all the product and could be hence
advertised in the social media platform.
• If in case in the future, if one wanted to start a business and wanted to distribute to the wider
audience, Such online retail bodies will be very advantageous for gaining profits.

Computer Skills 28
E-Learning Platform:

• Online Learning is changing Higher Education all over the world, In fact many open Universities
have started with the basic of online courses.
• MOOCs or Massive Open Online Courses is a great platform to learn and gain
more knowledge about the topics you are Interested in it. With a good internet
service and in the comfort of your home, you are able to learn more skills in
your comfort zone.
• Some of the Best Online MOOC classes are:
à edX
àUdemy
àCoursera
àUdacity
àKhan Academy
à UpGrad
àBloc

Graphic Design

• Graphic Design is defined as the process of visual communication which combines words, images,
and ideas to present the information to the audience.
• Pictures are the most effective means of communication and graphic design implies this wonderfully
well.
• The graphic designer is a specialist in solving the problems associated with visual communication.
• The competent graphic designers have the desired skills in Drawing, Lay outing, Typography,
Lettering, Diagramming, and Photography.

Programs that every graphical designer would need:

à Adobe InDesign:

InDesign is one of the most important programs for


graphic designers to know inside and out. This
program is becoming the standard desktop
publishing software that designers are expected to
use. Designers use it for creating and editing all
kinds of visual materials. With InDesign, you can
design everything from a small postcard or
invitation to posters, brochures, magazines, and
books.
Sample InDesign posters
à Adobe Photoshop:

Photoshop is one of the go-to tools that designers use to manipulate photos and create graphics. It contains
many features for photos, such as cropping, editing, color-correcting, and re-sizing.
Designers can also create and edit graphics in Photoshop. Unlike the simple editing features
on your smart phone’s camera, Photoshop is a professional-level program that is used for
high-quality productions.

Computer Skills 29
à Adobe Illustrator

This program is a sister program for Adobe Photoshop. While Photoshop is mainly used for
manipulating photos, Illustrator is used for creating vector images, which are high-quality
images that can be scaled up or down without losing
quality. Designers might use Illustrator to create
logos, charts, diagrams, illustrations, or graphs.
Creating these illustrations requires an understanding
of concepts like paths, groups, layers, text, colour,
and effects.

à Adobe Dreamweaver:
Sample Illustrator sketches process

Dreamweaver is Adobe’s web development and design


software. With this software, Graphic Designers can
design new web content, manage existing sites, and
write and edit code. The program has features that allow
the user to see a visualization of the web content while
writing new code.

à PowerPoint

While the Adobe Creative Suite is the mainstay for


Graphic Designers, it is also important to be skilled at
PowerPoint since so many corporations and small
businesses use it. As a Graphic Designer, you may be
called on to help a co-worker with their PowerPoint deck, in order to make it look more professional and
align it with the company’s branding.
Bonus tips! More useful skills for Graphic Designers

à Video and animation tools

Multimedia production seems to be getting more and more sophisticated every day. Being comfortable with
video and animation tools can help to make you a more versatile Graphic Designer.
In this age of rapidly-improving technology, there are always new tools to help Graphic Designers stay on
the cutting edge of design. Throughout your career, it’s a good idea to keep up with the newest technologies,
be willing to try new things, and to keep learning about your career field. Few examples given below could
be the start towards learning basic Animation techniques:
• Animatron • Renderforest
• Moovly • Windows Movie Maker
• GoAnimate • Prezi Etc

Computer Skills 30
Self-Assessment Exercise:

1. GUI stands for:


a) Graph Use Interface c) Graphical User Interface
b) Graphical Universal Interface d) Graphical Unique Interface

2. Any data or Instruction entered into the memory of a computer is considered as?
a) Storage d) Information
b) Output e) None of these
c) Input

3. The memory sizes in mainframe computers and advanced technology microcomputer are expressed as:
a) Bytes d) Megabytes
b) Kilobytes e) None of these
c) Bits

4. Which of the following statement is wrong?


a) Photoshop is a graphical design tool by c) Linux is owned and sold by Microsoft
Adobe d) Windows XP is an operating system
b) Linux is free and open source software e) None of the above

5. An error is also known


a) Bug d) Icon
b) Debug e) None of these
c) Cursor

6. Microsoft word is an example of:


a) An operating system d) An input device
b) Processing device e) System Software
c) Application software
7. Graphical Pictures that represented an object like file, folder etc are:
a) Task bar d) Desktop
b) Windows e) None of these
c) Icons

8. The 0 and 1 in the binary numbering system are called Binary Digits or
a) Bytes d) Bits
b) Kilobytes e) None of these
c) Decimal bytes
b) Word Processing Software
a) System

9. A kilobyte also referred to as KB, is equal to:


a) 1000 bytes c) 2048 bytes
b) 1024 bytes d) 512 bytes

10. The File extension of MS-Word document in Office 2007 is


a) .doc d) .txt
b) .docx e) .xls
c) .pdf

11. Internet Explorer is a type of:


a) Operating System c) IP address
b) Browser d) Compiler
Computer Skills 31
12. Which one is not an Input device?
a) Keyboard d) Scanner
b) Mouse e) None of the above
c) Speaker

13. What Language does a browser typically interpret to display information from the World Wide Web?
a) Machine Code d) C++
b) Assembly Language e) None of these
c) HTML

14. What Menu is selected to cut, copy and paste?


a) File d) Edit
b) Tools e) None of these
c) Special

15. A graph prepared by a computer


a) Is its output c) Is a hard copy
b) Is the piece of information to use d) All of the above

16. The Central Processing Unit:


a) Is operated from the control panel. c) Controls the auxiliary storage unit
b) Is controlled by the input data entering the d) Controls all input, output and processing
system

17. Information retrieval is faster from


a) Floppy disk c) Hard disk
b) Magnetic tape d) None of the above

18. Operating system


a) Link a program with the subroutines it c) Enables a programmer to draw a flowchart
references d) None of the above
b) Provides a layered, user-friendly interface

19. The difference between memory and storage is that the memory is__________ and storage is_________
a) Temporary, permanent c) Slow, fast
b) Permanent, temporary d) None of the above

20. The language that the computer can understand and execute is called _____
a) Machine language c) System program
b) Application software d) None of the above

21. Which one of these stores more data than a DVD ?


a) CD Rom c) Floppy
b) Blue Ray Disk d) Red Ray Disk

22. Junk email is also called


a) spam c) sniffer script
b) spoof d) spool

23. Where are data and programme stored when the processor uses them?
a) Main memory b) Secondary memory
Computer Skills 32
c) Disk memory d) Programme memory

24. RAM stands for?


a) Random origin money c) Read only memory
b) Random only memory d) Random access memory

25. Help Menu is available at which button?


a) End c) Turnoff
b) Start d) Restart

26. Which of the following is also known as brain of computer


a) Control unit c) Arithmetic and language unit
b) Central Processing unit d) Monitor

27. Which device is required for the Internet connection?


a) Joystick c) CD Drive
b) Modem d) NIC Card

28. First page of Website is termed as-


a) Homepage d) Bookmark
b) Index
c) JAVA script

29.Arrange in ascending order the units of memory TB, KB, GB, MB


a) TB>MB>GB>KB c) TB>GB>MB>KB
b) MB>GB>TB>KB d) GB>MB>KB>TB

30. Raw facts such as letters, words and sounds are called
a) Commands c) User Response
b) Data d) Programs

After Assessing your knowledge in the basics of Computer. Please evaluate your self
o If 1 – 10 Correct à Get back to the chapters now
o If 11 – 17 Correct à Have done fairly fine, But do go through the chapters again
o If 18 – 23 Correct à Well done, you have scored well. You should think of pursuing more
o If 24 – 30 Correct à Wow. You’re an expert now, So what next computer course are you taking?

Computer Skills 33

You might also like