COMPUTER
AWARENESS
Book for
Competitive Exams
FSSAI-FSO
STATE FSO
FCI - AGM
FSSAI: FCI: Computer Awareness Page 1
CONTENTS
S. No CHAPTER PAGE. NO
1 BASICS OF COMPUTER 3-5
2 COMPUTER HARDWARE & SOFTWARE 06-12
3 MEMORY MANAGEMENT 13-17
4 COMPUTER NETWORK & INTERNET 18-24
5 MICROSOFT OFFICE 25-38
6 PROGRAMMING LANGUAGE 39-45
7 COMPUTER ABBREVIATIONS 46-61
8 SOCIAL MEDIA 62-69
FSSAI: FCI: Computer Awareness Page 2
CHAPTER 01
BASICS OF COMPUTER
HISTORY OF COMPUTER
The word Computer in earlier times meant a person who performed calculations or
computations. With years its definition changed to a machine that performs calculations. It
can perform all type of mathematical and logical operations; it can accept data, store data,
retrieve data, process data and produce output Charles Babbage was known as father of
computer. He invented two machines in 1822 introduced Difference Engine and in 1834,
introduced Analytical engine.
ENIAC was the first digital computer and it was invented by J. Presper
Eckert and John Mauchly at the University of Pennsylvania and began construction in 1943.
It uses 18000 vacuum tubes as a storing device. They were also founders of the first computer
company, it was initially named Electronic Controls Company which was later changed to
Eckert– Mauchly Computer Corporation, and released a series of mainframe electronic digital
stored-program computer under the name of UNIVAC. MIT introduces the whirlwind machine
(first computer with RAM) on March 8, 1955.
Charles Babbage ( 26 December 1791 – 18 October
1871) was an English polymath. A mathematician,
philosopher, inventor and mechanical engineer,
Babbage originated the concept of a digital
programmable computer.
Babbage is considered by some to be "father of the
computer". Babbage is credited with inventing the
first mechanical computer, the Difference Engine,
that eventually led to more complex electronic
designs, though all the essential ideas of modern
computers are to be found in Babbage's Analytical
Engine.
FSSAI: FCI: Computer Awareness Page 3
GENERATION OF COMPUTER
Generation 1st Gen 2nd Gen 3rd Gen 4th Gen 5th Gen
Period 1940-56 1956-63 1964-71 1971-present Present &
beyond
Circuitry Vacuum Transistor Integrated Microprocessor Ultra Large
tube chip (IC) (VLSI) Scale
Integration
Technology
(ULSI)
Memory 20 KB 128 KB 1 MB Semiconductor VLSI and ULSI
Capacity type and very
high
Processing 300 IPS inst. 300 IPS 1 MIPS (1 Faster than 3rd Very fast
Speed Per Sec million inst. generation
Per Sec)
Programmi Assembly High level language All the Higher
ng Language (FORTRAN,COBOL, level
ALGOL) C, C++ C,C++,java language,
Language
Neural
network,
Example UNIVAC, IBM 1401 ,IBM IBM 360 Pentium series Artificial
EDVAC 7094,CDC 3600 , Series, multimedia Intelligence,
D UNIVAC 1108 1900 series ,Stimulation Robotics
TYPES OF COMPUTER
Classification of Computer
Computational Method Size and Capability Purpose
Digital Analog Hybrid Super Mainframe Mini Micro General Special Purpose
Purpose
Analog computer introduced by Lord Kelvin. Numerical data are represented by
measurable physical variables such as electrical voltage. A thermometer is a simple Analog
computer.
FSSAI: FCI: Computer Awareness Page 4
Digital computer that accepts and process data in the form of numbers and all the character
are converted into binary code.
Hybrid computer used the combined feature of Analog and digital machine. you can see
hybrid computer in geological departments. Microcomputer these are small relatively
inexpensive computer designed for personal and office use. It has lowest storing and
processing speed. These can be laptop or desktop.
Minicomputer powerful as compare to microcomputer it has higher memory provide
faster operating speeds and large storage capacities than microcomputers. It can be used as
a server and capable of supporting from 2 to 200 users.
Mainframe computer it has very high memory and processing speed and used as a server
(can support thousands of users) Super computer can be used for complex type of
application i.e. specific research, weather forecasting, Weapon designing etc.
CDC 6600 was the first successful supercomputer. Sunway Taihu Light of China is the fastest
supercomputer in the world.PARAM-8000 India’s first Super Computer developed by C- DAC
Pune in 1998. Shasra T is considered as India’s fastest super computer, manufactured by Indian
Institute of Science.
Servers are dedicated computers that serve the needs or request of other programs or
computer. Workstations serve usually one user only. Information appliances are computers
specially designed to perform a specific "user-friendly" function—such as playing music,
photography. An embedded system is a computer system with a dedicated function within
a larger system.
FSSAI: FCI: Computer Awareness Page 5
CHAPTER 02
COMPUTER HARDWARE & SOFTWARE
HARDWARE OF COMPUTER
A computer is an electronic device that accepts data from the user (input), processes the
data by performing calculations and operations on it and generates the desired Output. An
unprocessed collection or representation of raw facts represented in a manner suitable
for communication, interpretation or processing by humans or by automatic means, is
known as Data. Personal computers use a number of chips mounted on a main circuit
board called Motherboard. A motherboard is the physical arrangement in a computer that
contains the computer's basic circuitry and components.
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form.
The CPU is fabricated as a single Integrated Circuit (IC) chip. It is also known as the
Microprocessor. Multiprocessor Computers uses two or more central processing units
(CPUs) within a single computer system. The term also refers to the ability of a system to
support more than one processor and/or the ability to allocate tasks between them.
The central processing unit (CPU) is the brain of your computer. It handles all the
instructions you give your computer. The control unit (CU) is a component of a computer's
FSSAI: FCI: Computer Awareness Page 6
central processing unit (CPU) that directs operation of the processor. It tells the
computer's memory, arithmetic/logic unit and input and output devices how to respond
to a program's instructions.
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic
operations. It represents the fundamental building block of the central processing unit
(CPU) of a computer.
Instruction Execution: the program which is to be executed is a set of instruction which
are stored in memory. The CPU executes the instructions of program to complete a task
and this execution takes place inside the CPU with the help of registers ALU (arithmetic
logic unit) and CU(control unit). When the processor executes instructions, data is
temporarily stored in small local memory location and these are called registers.
Accumulator Register:- which stores the immediate result of arithmetic and logical
operations.
Memory address register (MAR) :- which contain the address of memory location to which
data is to be stored.
Program counter :- which contain the address of the next instruction to process.
Instruction register:- which contain the current instruction being processed
FSSAI: FCI: Computer Awareness Page 7
The data that is fed into a computer processor, received into the computer by a keyboard
or other sources is called Input. Examples of input devices include keyboards, mouse,
scanners, digital cameras and joysticks.
A keyboard is a typewriter-style device, which uses an arrangement of buttons or keys, to
act as mechanical levers or electronic switches. Most of the commonly available personal
computers have a keyboard, popularly known as Qwerty. 'Caps lock' and 'Num lock' keys
are called as Toggle Keys because when pressed, they change their status from one state
to another.
Numeric Keypad is a keypad located on the right hand side of the keyboard. It consists of
digits and mathematical operators.
A Modifier key is a special key (or combination) on a computer keyboard that temporarily
modifies the normal action of another key when pressed together. By themselves,
modifier keys usually do nothing; that is, pressing any of the Shift, Alt, or Ctrl keys alone
does not (generally) trigger any action from the computer.
Hardware of Computer
A Mouse is the most popular input device which is used today for interactive processing
and for the one line entry of data for batch processing. The first computer mouse was
invented by Douglas Engelbart.
FSSAI: FCI: Computer Awareness Page 8
Drag and Drop refers to the action of clicking and holding down the mouse button, while
moving the mouse and then releasing the mouse button.
Joystick is the device that moves in all directions and controls the movement of a pointer.
A Touch Screen is a type of display screen device that is placed on the computer monitor
to allow direct selection or activation of the computer when the user touches the screen.
It acts as both input and output device.
Light Pen is the pen shaped device, which can sense light and is used to point at spots on
a video screen.
A technology enables a high-speed reading of large quantities of data and transferring
these data to the computer without using a keyboard. It is referred as Optical Mark Reader
(OMR). It uses a beam of light that is reflected on the paper with marks, to capture
presence and absence of marks.
MICR reads the characters by examining their shapes in a matrix form and the information
is then passed `on to the computer. MICR stands for Magnetic Ink Character Reader. It
provides a high level of security and is therefore used by the banking industry for faster
processing of the cheque.
Bar Code is a machine readable code, which is represented by parallel vertical lines with
varying widths. For reading these bar-coded data, a device is used, which is known as a Bar
Code Reader (BCR)
Optical Character Recognition (OCR) is used to scan the document containing text. It is
the mechanical or electronic conversion of scanned or photographed images of
typewritten or printed text into machine- encoded/computer-readable text.
A point of sale terminal (POS terminal) is an electronic device used to process card
payments at retail locations.
The device that prints information from the computer onto the paper is Printer. The
printed form of output is referred as Hard Copy. The form of output displayed on the
screen is referred as Soft Copy. Pages per Minute (PPM) is the unit used to count the
speed of the printer. On the basis of technology, printers are categorized into Impact and
Non- Impact Printers.
1. Impact printers create an image by using some mechanism to physically press an
inked ribbon against the page, causing the ink to be deposited on the page in the shape
desired.
FSSAI: FCI: Computer Awareness Page 9
I) Dot matrix :- The dot-matrix printer uses print heads containing from 9 to 24 pins. These
pins produce patterns of dots on the paper to form the individual characters
II) Daisy wheel:- A hammer strikes a “petal” containing a character against the ribbon, and
the character prints on the paper. Its speed is slow typically 25-55 characters per second.
III) Line printer:- Line printers, or line-at-a-time printers, use special mechanism that can
print a whole line at once; they can typically print the range of 1,200 to 6,000 lines per
minute
IV) Drum printer:- A drum printer consists of a solid, cylindrical drum that has raised
characters in bands on its surface. The number of print positions across the drum equals
the number available on the page.
V) Chain printer:- A chain printer uses a chain of print characters wrapped around two
pulleys.
VI) Band printer:- Band printer has a steel band divided into five sections of 48 characters
each.
2. Non – Impact Printers do not touch the paper when creating an image.
I) Ink-jet printers:- One or more nozzles in the print head emit a steady stream of ink drops.
Droplets of ink are electrically charged after leaving the nozzle. The droplets are then
guided to the paper by electrically charged deflecting plates
II) Laser printers:- Laser printers use buffers that store an entire page at a time. When a
whole page is loaded, it will be printed.
III) Thermal printer:- is a digital printing process which produces a printed image by
selectively heating coated thermo chromic paper, or thermal paper as it is commonly
known, when the paper passes over the thermal print head.
A plotter is an output device that interprets commands from a computer to make line
drawings on paper with one or more automated pens. Unlike a regular printer, the plotter
can draw continuous point-to-point lines directly from vector graphics files or commands.
An uninterruptible power supply (UPS) is a device that allows a computer to keep running
for at least a short time when the primary power source is lost.
A Monitor is a TV-like display attached to the computer on which the output can be
displayed and viewed. It can either be a monochrome display or a colour display. The
number of pixels displayed on a screen is known as Resolution.
FSSAI: FCI: Computer Awareness Page 10
COMPUTER SOFTWARE AND OPERATING SYSTEM
A set of instructions that tells the computer about the tasks to be performed and how these
tasks are to performed, is known as Software.
The set of instructions, which control the sequence of operations, are known as Program. It
is a sequence of instructions, written to perform a specified task with a computer.
Application software is a group of program designed for fulfil the demand of end user e.g.
MS office, PowerPoint, Windows Media Player.
System software is a program which is created for the system and to make the system user
friendly such as operating system or is a type of computer program that is designed to run
a computer's hardware and application programs.
Utility software designed to help analyse, configure, optimize or maintain a computer such
antivirus software.
Operating system is a set of programs that help in controlling and managing the hardware
and the software resources of a computer system. Main functions of operating system
are :-
• Process management
• Memory management
• File management
• Security
• Command and interpretation
• Resource allocation
TYPES OF OPERATING SYSTEM
1) Batch operating system : Here data and program that need to be processed are bundled
and collected as a batch and executed together.
2) Multiprogramming operating system : It allows the instruction and data from two or
more separate process to reside in primary simultaneously. Multiprogramming system are
multitasking multiuser and multiprocessing operating system.
3) Single user : It is designed for single user and a single person use it at a time i.e. DOS
window’s 95 etc.
4) Distributed operating system : It is the one which manages a collection of independent
computers and makes them appear to the user of the system as a single computer.
FSSAI: FCI: Computer Awareness Page 11
5) Real Time Operating System (RTOS) : It is a computing environment that reacts to input
within a specific time period. It is used at those Places in which we Requires higher and
Timely Response.
6) Time Sharing System: A time sharing system allows the many users to simultaneously
share the computer resources. Since each action or command in a time-shared system
take a very small fraction of time, only a little CPU time is needed for each user.
7) Mobile OS: Windows 10 Mobile is the latest name for Microsoft's phone and tablet
operating system. Google's latest’s version of its android OS is Nougat and iOS i.e. iPhone
Operating System's latest version is iOS 10.
FSSAI: FCI: Computer Awareness Page 12
CHAPTER 03
MEMORY MANAGEMENT
MEMORY MANAGEMENT
Primary Storage (memory), also known as main storage and it is the area in a computer
in which data is stored for quick access by the computer's processor. The terms random
access memory (RAM) and memory are often as synonyms for primary or main storage.
Primary storage is volatile and can be contrasted with non-volatile secondary storage, also
known as auxiliary storage.
Cache memory is a smaller, faster memory which stores copies of the data from frequently
used main memory locations. A CPU cache is a hardware cache used by the central
processing unit (CPU) of a computer to reduce the average time to access data from the
main memory.
FSSAI: FCI: Computer Awareness Page 13
Secondary memory is where programs and data are kept on a long-term basis. Common
secondary storage devices are the hard disk and optical disks. The hard disk has enormous
storage capacity compared to main memory. The hard disk is usually contained inside the
case of a computer.
Read-only memory (ROM) is a storage medium used in computers and other electronic
devices. Data stored in ROM can only be modified slowly or with difficulty, or not at all.
ROM is non-volatile and the contents are retained even after the power is switched off.
It only allows reading.
The types of ROM include PROM, EPROM and EEPROM.
PROM - (programmable read-only memory) is a memory chip on which data can be written
only once.
The difference between a PROM and a ROM (read-only memory) is that a PROM is
manufactured as blank memory, whereas a ROM is programmed during the manufacturing
process. To write data onto a PROM chip, you need a special device called a PROM
programmer or PROM burner.
EPROM - (erasable programmable read-only memory) is a special type of PROM that can
be erased by exposing it to ultraviolet light.
EEPROM - (electrically erasable programmable read-only memory). EEPROM is a special
type of PROM that can be erased by exposing it to an electrical charge.
Random Access Memory (RAM), allows the computer to store data for immediate
manipulation and to keep track of what is currently being processed.
RAM is referred to as volatile memory and is lost when the power is turned off.
It also known as read/write memory as information can be read from and written onto it.
The two main types of RAM are Static RAM and Dynamic RAM.
SRAM retains data as long as power is provided to the memory chip and need not be
refreshed periodically. It is often used as CPU Cache memory. SRAM stands for Static
Random Access Memory.
The data on DRAM continues to move in and out of the memory as long as power is
available and must be continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory. Virtual memory is memory on the hard disk that the
CPU uses as an extended RAM.
FSSAI: FCI: Computer Awareness Page 14
MEMORY MANAGEMENT
8 bit 1 byte
1024 Byte 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)
Memory can also be categorized on the basis of their material:
Semiconductor memory:-such as RAM, ROM, EPROM, and flash memory.
Magnetic memory:-such as hard disk, floppy disk and magnetic tapes.
Optical memory:-such as computer disk, DVD and blue-ray disk.
A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which
can be shared by multiple hardware components in order to communicate with one
another.
The address bus (sometimes called the memory bus) transports memory addresses which
the processor wants to access in order to read or write data. It is a unidirectional bus.
The data bus transfers instructions coming from or going to the processor. It is a
bidirectional bus.
The control bus (or command bus) transports orders and synchonisation signals coming
from the control unit and travelling to all other hardware components. It is a bidirectional
bus, as it also transmits response signals from the hardware.
NUMBER SYSTEM
FSSAI: FCI: Computer Awareness Page 15
The radix or base is the number of unique digits, including zero, used to represent numbers
in a positional numeral system. For example, for the decimal system the radix is ten,
because it uses the ten digits from 0 through 9. And that of Binary is base 2.
Decimal Binary Octal Hexadecimal
0 0000 000 0
1 0001 001 1
2 0010 002 2
3 0011 003 3
4 0100 004 4
5 0101 005 5
6 0110 006 6
7 0111 007 7
8 1000 010 8
9 1001 011 9
10 1010 012 A
11 1011 013 B
12 1100 014 C
13 1101 015 D
14 1110 016 E
15 1111 017 F
Hexadecimal to Binary: Refer the above table for the,
(1A2)16 = (?)2
1=0001, A= 1010, 2=0010; Hence (1A2)16 =
(000110100010)2
Decimal to Binary: (75)10 =(?)2
Divide 75 by 2 (and write down its remainder).
FSSAI: FCI: Computer Awareness Page 16
Hence (75)10 =(101011)2
Any number system to decimal:
Sum of all (Digit × (Base)Base’s Place)
Example: (1A2)16 = (?)10 (From the table you can refer A
is equivalent to 10 )
((1× 162)+(10 × 161)+ (2×160))= 256+160+2=418
Example: (110110)2=(?)10
((1×25)+ (1×24)+ (0×23)+ (1×22)+ (1×21)+
(0×20))=32+16+4+2= 54; (110110)2=(54)10
Octal to Binary: (345)8 =(?)2 (Write down 3 bit binary
equivalents of all digits)
3=011, 4=100, 5=101; Hence (345)8 =(011100101)2
FSSAI: FCI: Computer Awareness Page 17
CHAPTER 04
COMPUTER NETWORK & INTERNET
COMPUTER NETWORK
Different types of network are: LAN, MAN and WAN.
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive (e.g., token ring or Ethernet).
A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. A WAN (wide area network), in comparison to a MAN,
is not restricted to a geographical location, although it might be confined within the
bounds of a state or country. A WAN connects several LANs, and may be limited to an
enterprise (a corporation or an organization) or accessible to the public. The technology is
high speed and relatively expensive. The Internet is an example of a worldwide public
WAN.
A personal area network (PAN) is a computer network used for data transmission amongst
devices such as computers, telephones, tablets and personal digital assistants.
Campus Area Network or corporate area network is a computer network made up of an
interconnection of local area networks (LANs) within a limited geographical area.
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-
level network access to storage. A virtual private network (VPN) extends a private
network across a public network, such as the Internet. It enables users to send and receive
data across shared or public networks as if their computing devices were directly
connected to the private network.
Networking Devices
Modem: Modem stands for Modulator-Demodulator. It is used to connect computers for
communication via telephone lines.
Hub: It works at the Physical layer. It just acts like a connector of several computers i.e.
simply connects all the devices on its ports together. It broadcasts all the data packets
arriving at it with no filtering capacity.
FSSAI: FCI: Computer Awareness Page 18
Switch: It works at the Data Link Layer. It is used for dividing a network into segments
called subnets. It provides filtering of data packets and prevents network traffic also.
Repeater: It operates at the Physical Layer. It is used to amplify a signal that has lost its
original strength so as to enable them to travel long distances.
Router: It works at the Network Layer and is used to connect different networks that have
different architectures and protocols. It sends the data packets to desired destination by
choosing the best path available thus reducing network traffic.
Gateway: It operates in all the layers of the network architecture. It can be used to connect
two different networks having different architectures, environment and even models.
Bridge: They are used two connect two LANs with the same standard but using different
types of cables. It provides an intelligent connection by allowing only desired messages to
cross the bridge thus improving performance. It uses physical addresses of the packets for
this decision.
IPv4 - 32 bits numeric address
IPv6 - 128 bits hexadecimal address
IPv6 does not use broadcast messages and has three types of addresses, which are
categorized as :
Unicast addresses. A packet is delivered to one interface.
Multicast addresses. A packet is delivered to multiple interfaces.
Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of
routing distance).
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class
C, Class D and Class E, while only A, B, and C are commonly used. Each class allows for a
particular range of valid IP addresses. Class D is reserved for multicast groups and Class E
is reserved for future use, or Research and Development Purposes.
Data Communication deals with the transmission of digital data from one device to
another. Data is transferred through a pathway called as communication channel which
can be physical wire connecting the devices or may be unguided media like laser,
microwave etc.
FSSAI: FCI: Computer Awareness Page 19
A communication channel has a source or transmitter at one side and a designation or
receiver at another side of the network. The source of data origination is single but there
may be multiple receivers. A communication channel is of 3 types:
Simplex: This, communication is unidirectional i.e. one of the two devices can transmit the
data and the other can only receive the data. For e.g. Radio broadcasting, television
broadcasting etc.
Half duplex: This communication is bidirectional. Either of the devices can act as
transmitter or receiver but only one device can transmit the data at one time. For e.g.
Walkie- Talkie.
Full Duplex: Here the communication is in both directions and both the devices can
simultaneously transmit the data. For e.g. Telephone conversation.
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes
and standardizes the internal functions of a communication system by partitioning it into
abstraction layers. The model is a product of the Open Systems Interconnection project at
the International Organization for Standardization (ISO).
Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network. There are two basic categories of network topologies:
1. Physical topology is the placement of the various components of a network,
including device location and cable installation, while Logical topology illustrates how data
flows within a network, regardless of its physical design. Various types of topologies are:
2. Hybrid topology uses a combination of any two or more topologies in such a way
that the resulting network does not exhibit one of the standard topologies.
Cloud computing is a type of Internet-based computing that provides shared computer
processing resources and data to computers and other devices on demand.
Public clouds are owned and operated by companies that offer rapid access over a public
network to affordable computing resources.
A private cloud is infrastructure operated solely for a single organization, whether
managed internally or by a third party, and hosted either internally or externally.
A hybrid cloud uses a private cloud foundation combined with the strategic integration
and use of public cloud services.
FSSAI: FCI: Computer Awareness Page 20
Google Drive is a personal cloud storage service from Google which gives every user 15 GB
of Drive storage space. OneDrive is Microsoft's service for hosting files in the "cloud
computing". OneDrive offers 5GB of storage space for free.
INTERNET
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array of
electronic, wireless, and optical networking technologies. ARPANET adopted TCP/IP in
1983, and from there researchers began to assemble the “network of networks” that
became the modern Internet. The World Wide Web (abbreviated as WWW or W3,
commonly known as the Web) is a system of interlinked hypertext documents that are
accessed via the Internet. A Website is a set of related web pages served from a single web
domain. A Home page, index page, or main page is a page on a website. A home page
usually refers to:
• The initial or main web page of a website, sometimes called the "front page" (by
analogy with newspapers).
• The first page that appears upon opening a web browser program, which is also
sometimes called the start page. This 'start page' can be a website or it can be a page
with various browser functions such as the visual display of websites that are often
visited in the web browser.
• The web page or local file that automatically loads when a web browser starts or when
the browser's "home" button is pressed; this is also called a "home page". The user
can specify the URL of the page to be loaded, or alternatively choose e.g. to re-load
the most recent web page browsed.
A personal web page, for example at a web hosting service or a university web site that
typically is stored in the home directory of the user.
A Hyperlink is a reference to data that the reader can directly follow either by clicking or
by hovering or that is followed automatically
A web browser (commonly referred to as a browser) is a software application for retrieving,
presenting and traversing information resources on the World Wide Web.
Some of the famous browsers are Safari, Chrome, Firefox, Bolt, UC Browser and Internet
Explorer
FSSAI: FCI: Computer Awareness Page 21
The Uniform Resource Locator, abbreviated as URL is a specific character string that
constitutes a reference to a resource. In most web browsers, the URL of a web page is
displayed on top inside an address bar.
(i) An example of a typical URL would be "http://www.swaeducation.com".
Here the domain name is ‘swaeducation.com’
Downloading means to receive data to a local system from a remote system or to initiate
such a data transfer Uploading refers to the sending of data from a local system to a remote
system such as a server or another client with the intent that the remote system should
store a copy of the data being transferred
An Internet Protocol address (also known as an IP address) is a numerical label assigned
to each device (e.g., computer, printer) participating in a computer network. It acts as an
identifier for a computer. It is a unique address for every computer.
Domain names are used to identify one or more IP addresses.
The universal resource locator, or URL, is an entire set of
directions, and it contains extremely detailed information. The domain name is one of the
pieces inside of a URL.
DOMAIN TYPES
Type Description
com Commercial and for profit organization
edu Educational provider, college, Universities
gov Government agencies
Mil US military sites
net Internet infrastructure and service providers
org Miscellaneous and Non-profit organisations
An email attachment is a computer file sent along with an email message. One or more files
can be attached to any email message, and be sent along with it to the recipient.
Hotmail was co-founded by an Indian American entrepreneur Sabeer Bhatia along with
Jack Smith in July of 1996.
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another.
The list of CC recipients is visible to all other recipients of the message.
FSSAI: FCI: Computer Awareness Page 22
An additional BCC (blind carbon copy) field is available for hidden notification; recipients
listed in the BCC field receive a copy of the message, but are not shown on any other
recipient's copy (including other BCC recipients) The Drafts folder retains copies of
messages that you have started but are not yet ready to send.
The first email was sent by Ray Tomlinson to himself in 1971.
Internet Explorer was deprecated in Windows 10, with Microsoft Edge replacing it as the
default web browser.
COMPUTER SECURITY
A Computer Virus is a computer program or code that can replicate itself and spread from
one computer system to another system. A computer virus has the capacity to corrupt or
to delete data on your computer and it can utilize an e- mail program to spread the virus
to other computer systems
In the worst case scenario, it can even delete everything on your hard disk .The purpose
of it is to disrupt the operation of the computer or the program.
Some examples of Computer Virus are Trojan viruses. Stealth viruses, worms, malware
(malicious software), Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word Concept,
etc.
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of executable code, scripts, active content, and other software.
Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.
A person who uses his or her expertise to gain access to other people’s computers to get
information illegally or do damage is a Hacker.
Authorization is the function of specifying access rights to resources related to
information security and computer security in general and to access control in particular.
More formally, "to authorize" is to define an access policy.
Authentication is the act of confirming the truth of an attribute of a single piece of data
or entity. It might involve confirming the identity of a person by validating their identity
documents, verifying the validity of a website with a digital certificate, tracing the age of
an artifact by carbon dating, or ensuring that a product is what its packaging and labelling
FSSAI: FCI: Computer Awareness Page 23
claim to be. In other words, Authentication often involves verifying the validity of at least
one form of identification.
Phishing is the attempt to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
A Spoofing attack is a situation in which one person or program successfully represents
oneself as another by falsifying data and thereby gaining an illegitimate advantage.
FSSAI: FCI: Computer Awareness Page 24
CHAPTER 05
MICROSOFT OFFICE
MICROSOFT OFFICE
Microsoft Office is an office suite of desktop applications, servers and services for the
Microsoft Windows and Mac operating systems. It includes Microsoft Word, Excel,
PowerPoint, Outlook, OneNote, Access and Publisher.
Note: Microsoft Windows Vista was an windows OS for PC not Office Suit.
Office 365 is a subscription service that includes the most recent version of Office, which
currently is Office 2016. It comes with the applications you’re familiar with, like Word,
PowerPoint, and Excel, plus extra online storage, ongoing tech support.
Note- Microsoft Azure is a growing collection of integrated cloud services which developers
and IT professionals use to build, deploy and manage applications through our global
network of data centres. It provides software as a service (SaaS), platform as a service (PaaS)
and infrastructure as a service (IaaS) and supports many different programming languages,
tools and frameworks. Microsoft Azure was earlier known as Windows Azure.
FSSAI: FCI: Computer Awareness Page 25
SOME NEW FEATURES INTRODUCED IN OFFICE 2016 FOR WINDOWS OS
Share: In Word 2016 for Windows, it is easier than ever to share your documents. When
you share your files by using OneDrive or SharePoint Online for Office 365, you can invite
people to the document directly from within Word, or send a PDF or Word file as an email
attachment. This feature of share is also available for Excel and PowerPoint 2016.
Tell Me: This is a text field where you can enter words and phrases about what you want
to do next and quickly get to those features you want to use or actions you want to
perform. You can also use Tell Me to find help about what you're looking for, or to use
Smart Lookup to research or define the term you entered.
Smart Lookup: Bing search incorporated with applications
New Charts introduced in Excel 2016 : New Chart types and templates are introduced in
Excel 2016 such as tree map, sunburst chart (also known as a ring chart), waterfall chart,
box plot and histogram, and financial and calendar templates.
Skype and OneDrive Integration : One of the new features added to Word, Excel, and
PowerPoint is the ability to use Skype for Business to collaborate and communicate while
working on documents. User can IM or video-call someone with Skype from the new Share
pane built into the new Office applications. OneDrive integration supports cloud storage
file hosting service that supports access of office document from anywhere on any device.
Some other features:
New animations in PowerPoint (such as the Morph transition), the ability to insert online
video in OneNote, and a data loss prevention feature in Word, Excel, and PowerPoint.
New recent-documents feature in Outlook 2016 shows you the documents you've recently
worked on in the Office apps, so you don't have to hunt for them on your PC.
Enterprise Data Protection: To manage and prevent data loss at enterprise level, MS Office
2016 comes paced with inbuilt security feature that provide an ease for system admin to
enforce policies for content authoring and document sharing.
FSSAI: FCI: Computer Awareness Page 26
SOME COMMANDS RELATED TO MS OFFICE
1. Save Vs Save As
"Save" simply saves your work by updating the last saved version of the file to match the
current version you see on your screen.
"Save As" brings up a prompt to save your work as a file with a different name. For
example, you might choose to save a document called "New Doc" as "Final Doc". This way,
you can save you file at different stages and keep multiple versions on your hard drive.
2. Save or convert to PDF
You can use the Office programs to save or convert your files to PDFs so that you can share
them or print them using commercial printers. To export or save as PDF, in your Office file,
on the File menu, click Export or Save As.
3. Undo Vs Redo
You can undo, redo, or repeat many actions in Microsoft Word, PowerPoint, and Excel.
Undo reverses the immediate action. Redo reverts the effects of the undo action.
4. Portrait Vs Landscape
The terms portrait and landscape refer to different orientations of the paper; whether it
is oriented vertically or horizontally. A page with portrait orientation, typical for letters,
memos, and other text documents, is taller than it is wide. Portrait is vertical mode and
landscape is horizontal mode.
MS WORD 2016:
Backstage View in MS Word 2016: MS Word 2016 has a backstage view where you can see
the recent documents that you’ve visited or edited and a few templates as well. There is
also an option to search for more templates. These templates can help you get the desired
layout where a sample data will already be there. You may edit and enter data as you may
like.
MS Word 2016 Ribbons:
Quick Access Toolbar
By default, on top is the Quick access toolbar which has 3 default options available: Save,
Undo Typing and Repeat Typing. After this there is a drop-down menu for customizing the
quick access toolbar. This toolbar is totally customizable; you can position it below the tabs
and commands or add more items to it.
To add or remove a command from the quick access toolbar: When you find a favourite
command, right-click it, and then click Add to Quick Access Toolbar.
Remove a command by right-clicking it on the Quick Access Toolbar, and then clicking
Remove from Quick Access Toolbar.
FSSAI: FCI: Computer Awareness Page 27
Tabs in Word 2016
The ribbon in Word and other Office Suite’s Application has Tabs. In Word 2016 there are
9 tabs followed by a new feature of “Tell me what you want to do” arranged in a horizontal
fashion. The tabs are as follows: File, Home, Insert, design, Layout, References, Mailing,
Review, and View. The File tab opens the Info Window and has options arranged in a
vertical array: Info, New, Open, Save, Save As, Print, Share, Export, Close, Account,
Feedback and Options.
The ribbon containing Tabs also have a new feature of Share and Comment at the extreme
right corner.
Note- Each tab has many commands which are grouped into specific categories. Following
are the groups for commands under various tabs of MS Word 2016:
Home: Clipboard, Font, Paragraph, Styles and Editing
Insert: Pages, Tables, Illustrations, Add-ins, Media, Links, Comments, Header & Footer,
Text, Symbols
Design: Document Formatting, Page Background
Layout: Page Setup, Paragraph, Arrange
References: Table of Contents, Footnotes, Research, Citation & Bibliography, Captions,
Index, Table of Authorities
Mailings: Create, Start Mail Merge, Write &Insert Fields, Preview Results, Finish
Review: Proofing, Accessibility, Language, Comments, Tracking, Changes, Compare,
Protect
View: Views, Page Movement, Show, Zoom, Window, Macros
MS POWERPOINT 2016:
PowerPoint is a slideshow presentation program that's part of the Microsoft office suite
of tools. PowerPoint slides can be plain with only text, or they can include pictures and
even animation, including moving text and images. Text can be formatted in the same way
as text can be formatted in Microsoft Word, including colour, size, and font type.
In PowerPoint 2016 there are 9 tabs followed by a new feature of “Tell me what you want
to do” arranged in a horizontal fashion. The tabs are as follows: File, Home, Insert, design,
Transition, Animation, Slide Show, Review, and View.
1. Home
The home tab in PowerPoint has following groups: Clipboard, Slides, Font, Paragraph,
drawing and Editing. The Clipboard, Editing and Font commands are same as that in Word
2016. The Slides group contains commands to insert new slide, choose slide layout, reset
the positions and formatting of the slide placeholders and option to organize your slides
into sections.
FSSAI: FCI: Computer Awareness Page 28
2. Insert
Click Insert to add something to a slide. This includes pictures, shapes, charts, links, text
boxes, video and more. The Insert Tab has following groups of commands: Slides, Tables,
Images, Illustrations, Add-ins, Links, Comments, Text, Symbols and Media.
3. Design
On the Design tab, you can add a theme or colour scheme, or format the slide background.
The design tab has following categories or groups of commands:
Themes- Each theme has its own unique set of font, effect, colour to create a visually
appeasing and overall look of the slide.
Variants - The current theme or style can be customized using various colour schemes
through variants.
Customize- This group contains commands to change slide size and Format Background.
Designer- For instant slide makeovers.
4. Transitions
Set up how your slides change from one to the next on the Transitions Tab. Find a gallery
of the possible transitions in the Transition to This Slide group – click More Button at the
side of the gallery to see all of them.
5. Animations
User may use the Animations tab to choreograph the movement of things on his slides.
Note that you can see many possible animations in the gallery in the Animation group, and
see more of them by clicking More Button. Apart from adding animation you can also
customize its duration and timing as you need by using advanced animation and timing
group of commands.
6. Slide Show
On the Slide Show tab, set up the way that you want to show your presentation to others.
7. Review
The Review tab lets you add comments, run spell-check, or compare one presentation with
another (such as an earlier version).
8. View
Views allow you to look at your presentation in different ways, depending on where you
are in the creation or delivery process.
9. File
At one end of the ribbon is the File tab, which you use for the behind-the-scenes stuff you
do with a file, such as opening, saving, sharing, exporting, printing and managing your
presentation. Click the File tab to open a new view called the Backstage.
10. Tools tabs
FSSAI: FCI: Computer Awareness Page 29
When you click some parts of your slides, such as pictures, shapes, SmartArt or text boxes,
you might see a colourful new tab appear.
For example, the Drawing Tools tab appears when you click a shape or text box. When you
click a picture, the Picture Tools tab appears. Other such tabs include SmartArt Tools, Chart
Tools, Table Tools and Video Tools. These tabs disappear or change when you click
something else in your presentation.
Terms related to PowerPoint
Slide Show : Each page of a PowerPoint presentation is called a slide. The default
orientation of the slide is in landscape layout
Design Template : A design template acts as a coordinated packaged deal. It is created so
that even though different slide types can have different layouts and graphics, the whole
presentation goes together as an attractive package.
Slide Master : When you want all your slides to contain the same fonts and images (such
as logos), you can make those changes in one place—the Slide Master, and they'll be
applied to all your slides. To open Slide Master view, on the View tab, select Slide Master.
MS EXCEL 2016
Microsoft Excel is a spreadsheet developed by Microsoft. Spreadsheets allow you to keep
track of data, create charts based from data, and perform complex calculations. Just like a
book ledger, spreadsheets store information in columns and rows. You can have up to 256
columns and 65,536 rows per worksheet.
Workbook and Worksheet
An Excel worksheet is a single spreadsheet that contains cells organized by rows and
columns. A worksheet begins with row number 1 and column A. Each cell can contain a
number, text or formula. Excel Workbook comprises number of worksheets. Many new
sheets can be added to a workbook using adding worksheet command which is present at
the bottom.
Formula and Function
Formulas enable you to enter calculations in a worksheet. Using Excel for calculations gives
you the ability to change the data (or values) of the cells, and have the program
automatically update the recalculate the value of the output based on the new numbers.
FSSAI: FCI: Computer Awareness Page 30
Function Description
SUM Use this function to add the values in cells.
function
IF function Use this function to return one value if a condition is true and another
value if it's false
LOOKUP Use this function when you need to look in a single row or column and
function find a value from the same position in a second row or column.
MATCH Use this function to search for an item in a range of cells, and then
function return the relative position of that item in the range. For example, if the
range A1:A3 contains the values 5, 7, and 38, then the formula
=MATCH(7,A1:A3,0) returns the number 2, because 7 is the second item
in the range.
CHOOSE Use this function to select one of up to 254 values based on the index
function number. For example, if value1 through value7 are the days of the week,
CHOOSE returns one of the days when a number between 1 and 7 is
used as index_num.
DATE Use this function to return the sequential serial number that represents
function a particular date. This function is most useful in situations where the
year, month, and day are supplied by formulas or cell references. For
example, you might have a worksheet that contains dates in a format
that Excel does not recognize, such as YYYYMMDD.
Use the DATEDIF function to calculate the number of days, months, or
years between two dates.
DAYS Use this function to return the number of days between two dates.
function
FIND, FINDB FIND and FINDB locate one text string within a second text string. They
functions return the number of the starting position of the first text string from
the first character of the second text string.
FSSAI: FCI: Computer Awareness Page 31
Freeze Panes in Excel
If you wish to see a particular area of a worksheet visible or multiple rows and columns
while you scroll to another area of the worksheet, you can use Freeze Panes (available
under view tab).
Tabs in MS Excel 2016
The ribbon in Excel and other Office Suite’s Application has Tabs. In Excel 2016 there are 8
tabs followed by a new feature of “Tell me what you want to do” arranged in a horizontal
fashion. The tabs are as follows: File, Home, Insert, Page Layout, Formulas, Data, Review,
and View.
Following are the groups of Commands available under tabs of Excel 2016:
Home: Clipboard, Font, Alignment, Number, Style (for Conditional Formatting of table),
Cells (to insert, delete and format cells), Editing (AutoSum, Sort & Filter, Find & Select)
Insert: Tables (Pivot Table, and Tables); Illustrations (Pictures, Online Picture, shapes and
Icon); Add-ins;
Charts; Tours (3D Map); Spark lines (Line, Column, Win/Loss); Filters; Links; Text; Symbols.
Page Layout: Themes; Page Setup (Margin, orientation, page size, print area, breaks,
background and print titles); Scale to fit; Sheet Options (Gridline, headings); Arrange
Formulas: Insert Function; Function Library; Defined Names; Formula Auditing; Calculation
Data: Get external Data; Get & Transform (New query, show queries, from table, recent
sources): Connections; Sort and Filter; Data Tools; Forecast (what-if analysis, forecast
sheet); Outline
Review: Proofing (Spelling, Thesaurus); Accessibility; Insights-smart lookup; Comments;
Changes (Protect sheet, protect workbook, share workbook, allow users to edit ranges,
track changes)
View: Workbook Views (Normal, Page Break Preview, Page Layout, Custom Views); Show
(gridlines, ruler. formula bar, headings); Zoom; Window; Macros.
FSSAI: FCI: Computer Awareness Page 32
MICROSOFT OFFICE SHORT KEYS
BASIC SHORTCUT KEYS
Alt + F File menu options in current program
Alt + E Edit options in current program
F1 Universal help (for all programs)
Ctrl + A Select all text
Ctrl + X Cut selected item
Shift + Del Cut selected item
Ctrl + C Copy selected item
Ctrl + Ins Copy selected item
Ctrl + V Paste
Shift + Ins Paste
Home Go to beginning of current line
Ctrl + Home Go to beginning of document End Go to end of current line
Ctrl + End Go to end of document
Shift + Home Highlight from current position to beginning of line
Shift + End Highlight from current position to end of line
WORD SHORTCUT KEYS
Ctrl + A Select all contents of the page
Ctrl + B Bold highlighted selection
Ctrl + C Copy selected text
Ctrl + X Cut selected text
Ctrl + N Open new/blank document
Ctrl + O Open options
Ctrl + P Open the print window
Ctrl + F Open find box
Ctrl + I Italicize highlighted selection
Ctrl + K Insert link
Ctrl + U highlighted selection
Ctrl + V Paste
Ctrl + Y Redo the last action performed
FSSAI: FCI: Computer Awareness Page 33
Ctrl + Z Undo last action
Ctrl + G Find and replace options
Ctrl + H Find and replace options
Ctrl + J Justify paragraph alignment
Ctrl + L Align selected text or line to the left
Ctrl + Q Align selected paragraph to the left
Ctrl + E Align selected text or line to the centre
Ctrl + R Align selected text or line to the right
Ctrl + M Indent the paragraph
Ctrl + T Hanging indent
Ctrl + D Font options
Ctrl + Shift + F Change the font
Ctrl + f Move one word to the left
Ctrl + Space Reset highlighted text to default font
Ctrl + 1 Single-space lines
Ctrl + 2 Double-space lines
Ctrl + 5 1.5-line spacing
Ctrl + Alt + 1 Change text to heading 1
Ctrl + Alt + 2 Change text to heading 2
Ctrl + Alt + 3 Change text to heading 3
F1 Open help
Shift + F3 Change case of selected text
Shift + Insert Paste
F4 Repeat last action performed (Word 2000+)
F7 Spell check selected text and/or document
Shift + F7 Activate the thesaurus F12 Save as
Ctrl + S Save
Shift + F12 Save
Alt + Shift + D Insert the current date
Alt + Shift + T Insert the current time
Ctrl + W Close document
FSSAI: FCI: Computer Awareness Page 34
EXCEL SHORTCUT KEYS
F2 Edit the selected cell
F5 Go to a specific cell
F7 Spell check selected text and/or document
F11 Create chart
Ctrl + Shift + Enter the current time
Ctrl + Enter the current date
Alt + Shift + F1 Insert new worksheet
Shift + F3 Open the Excel® formula window
Shift + F5 Bring up search box
Ctrl + A Select all contents of worksheet
Ctrl + B Bold highlighted selection
Ctrl + I Italicize highlighted selection
Ctrl + C Copy selected text
Ctrl + V Paste
Ctrl + D Fill
Ctrl + K Insert link
Ctrl + F Open find and replace options
Ctrl + G Open go-to options
Ctrl + H Open find and replace options
Ctrl + U Underline highlighted selection
Ctrl + Y Underline selected text
Ctrl + 5 Strikethrough highlighted selection
Ctrl + O Open options
Ctrl + N Open new document
Ctrl + P Open print dialog box
Ctrl + S Save
Ctrl + Z Undo last action
Ctrl + F9 Minimize current window
Ctrl + F10 Maximize currently selected window
Ctrl + F6 Switch between open workbooks/windows
Ctrl + Tab Move between two or more open Excel files
Alt + = Create formula to sum all of above cells
FSSAI: FCI: Computer Awareness Page 35
Ctrl + Insert Value of above cell into current cell
Ctrl + Shift + ! Format number in comma format
Ctrl + Shift + $ Format number in currency format
Ctrl + Shift + # Format number in date format
Ctrl + Shift + % Format number in percentage format
Ctrl + Shift + ^ Format number in scientific format
Ctrl + Shift + @ Format number in time format
Ctrl + g Move to next section of text
Ctrl + Space Select entire column
Shift + Space Select entire row
Ctrl + W Close document
FILE EXTENSIONS:
Word
XML file type Extension
Document .docx
Macro-enabled document .docm
Template .dotx
Macro-enabled template .dotm
Excel
XML file type Extension
Workbook .xlsx
Macro-enabled workbook .xlsm
Template .xltx
Macro-enabled template .xltm
Non-XML binary workbook .xlsb
Macro-enabled add-in .xlam
FSSAI: FCI: Computer Awareness Page 36
Power Point
XML file type Extension
Presentation .pptx
Macro-enabled presentation .pptm
Template .potx
Macro-enabled template .potm
Macro-enabled add-in .ppam
Show .ppsx
Macro-enabled show .ppsm
Slide .sldx
Macro-enabled slide .sldm
Office theme .thmx
DATABASE MANAGEMENT SYSTEM
DBMS is the acronym of Data Base Management System. DBMS is a collection of
interrelated data and a set of programs to access this data in a convenient and efficient
way. It controls the organization, storage, retrieval, security and integrity of data in a
database.
Types of Database Model: Network Database Model, Hierarchical Database model,
Relational Database Model and Object-Oriented Database Model.
Architecture of DBMS- The generalized architecture of DBMS is called ANSI/ SPARC model.
The architecture is divided into three levels:
External view or user view/View Level- It is the highest level of data abstraction. This
includes only those portions of database of concern to a user or Application program. Each
user has a different external view and it is described by means of a scheme called external
schema.
• Conceptual view/Logical Level- All the database entities and the relationship among
them are included. One conceptual view represents the entire database called conceptual
schema.
• Internal view/Physical Level- It is the lowest level of abstraction, closest to the physical
storage method. It describes how the data is stored, what is the structure of data storage
and the method of accessing these data. It is represented by internal schema.
Data model: A data model is a plan for building a database. The model represents data
conceptually, the way the user
FSSAI: FCI: Computer Awareness Page 37
• Entity – Relationship Model
• Relational Model
sees it, rather than how computers store it. Data models focus on required data elements
and associations.
Entity: A thing (animate or inanimate) of independent physical or conceptual existence
and distinguishable. In the University database context, an individual student, faculty
member, a class room, are entities.
Attributes: Each entity is described by a set of attributes/properties.
SQL (Structured Query Language) is a database computer language designed for the
retrieval and management of data in relational database.
Constrains: In SQL, we have the following constraints-
NOT NULL - Indicates that a column cannot store NULL value UNIQUE - Ensures that each
row for a column must have a unique value
CHECK - Ensures that the value in a column meets a specific condition
DEFAULT - Specifies a default value for a column.
Primary Key uniquely identifies a record in a table.
A candidate key is a single field or the least combination of fields that uniquely identifies
each record in the table.
A foreign key is generally a primary key from one table that appears as a field in another.
DDL: Data Definition Language is used for specifying the database schema. It contains
commands to create tables, alter the structure, delete tables or rename tables. E.g. Create.
DML: Data Manipulation Language is used for accessing and manipulating data in a
database. E.g. Select, Update
DCL: Data Control Language is used for granting and revoking user access on a database.
FSSAI: FCI: Computer Awareness Page 38
CHAPTER 06
PROGRAMMING LANGUAGE
COMPUTER LANGUAGES
Low level language: these are coded in a form which is easy to understand by the
processor.
Machine language: it is also a type of low level language these can be develop in binary
language (0 and 1) .
Assembly language: it is also a type of low level language and using the human readable
instruction of the CPU. It is written as ‘MOV A.’
High level language programmer can write code in simple easy language, it is user friendly
. E.g. C, JAVA
C language: it is a middle level programming language and also known as procedural
language
C++ is high level language that uses the OOPS concept.
Fortran: it is known as formula translation. It is used for scientific application
COBOL (Common Business Oriented Language ): used for record keeping and data
management in business organizations.
BASIC (Beginner’s All Purpose Symbolic Instruction Code): first language designed for
non-professional programmers.
PASCAL: it is developed as a teaching tool for programming concepts.
Simula was the first object-oriented programming language. Java, Python, C++, Visual
Basic .NET and Ruby are the most popular Object Oriented Programming languages. The
Java programming language is designed especially for use in distributed applications on
corporate networks and the Internet. Ruby is used in many Web applications. Curl,
Smalltalk, Delphi and Eiffel are also examples of object- oriented programming languages.
Language processor (Translator): Programmers write their program in one of the high
level language because it is much easy to code in these language but computer does not
FSSAI: FCI: Computer Awareness Page 39
understand any of these language so it is necessary to convert program into a machine
language so translator do this work.
Loader: It loads the code which is translated by translator into the main memory and
makes it ready to execute.
Linker is used to combine all the object files and convert them into a final executable
program.
Interpreter converts high level language program into machine language. It is very slow
because it convert program line by line.
Compiler: It also translates the program from high level language to machine language. It
is very
fast because it converts the whole program into machine language.
Assembler: It is used for converting the code of low level language (assembly language)
into machine level language.
PROGRAMMING LANGUAGE
Programming Language are coded language are coded language used by programmer to
write instructions that a computer can understand to what the Programmer want.
Following are the major categories of Programming Languages −
• Machine Language
• Assembly Language
• High Level Language
• System Language
• Scripting Language
Pseudo code -
Pseudo code is a simple way of writing programing code in English.
For example – Task – Add two Numbers ,
• Start
• Get two numbers
• Add them
• Print the answer
• End
Flow chart
FSSAI: FCI: Computer Awareness Page 40
A flow chart is a graphical or symbolic representation of a process. Each step in the process
is represented by a different symbol and contains a short description of the process step.
Different flow chart symbols have different meanings. The most common flow chart
symbols are:
• Terminator: An oval flow chart shape indicating the start or end of the process.
• Process: A rectangular flow chart shape indicating a normal process flow step.
• Decision: A diamond flow chart shape indication a branch in the process flow.
• Connector: A small, labelled, circular flow chart shape used to indicate a jump in
the process flow. (Shown as the circle with the letter "A", below.)
• Data: A parallelogram that indicates data input or output (I/O) for a process.
• Document: Used to indicate a document or report (see image in sample flow chart
below).
What is Algorithm
An algorithm is a well-defined procedure that allows a computer to solve a problem.
Another way to describe an algorithm is a sequence of unambiguous instructions. ... In
fact, it is difficult to think of a task performed by your computer that does not use
algorithms.
Sequence of program –
• Algorithm
• Flowchart
• Program (source code)
• Compiling
• Object code
What is syntax - way to write any instruction in any programming language with the help
of some special symbols and character.
FSSAI: FCI: Computer Awareness Page 41
• Machine language
Machine language is written in binary language. It is consists of 0s and 1s. Machine
language is dependent programming language. It is first generation programming
language. It does not require translator. Machine Language is easy to understand for
computer but difficult to programmer.
The program is written in machine is called object code.
It has two part –
Opcode – Operation code – an opcode is a single instruction that can be executed by the
CPU.
Operand (address part) – operands are manipulated by opcode
• Assembly Language -
Assembly language used mnemonic code in place of binary language. It is second
generation programming language. An assembly language is a low-level programming
language designed for a specific type of processor. Assembly languages generally lack high-
level conveniences such as variables and functions.
• High level Language -
A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that
enables a programmer to write programs that are more or less independent of a particular
type of computer. It is independent programming language. It is third Generation
programming language. The program is written in high level is called source code. FORTAIN
was first high level language.
FSSAI: FCI: Computer Awareness Page 42
➢ FORTRAN
Full form Formula Translation. It was first high-level language. It was introduced by John
Backus in 1957. It is used for scientist and engineers.
➢ ALGOL
ALGOL is short for algorithmic language. It is an early high-level computer programming
language devised to carry out scientific calculations. ALGOL was used as the standard
method for creating algorithms. First appeared in 1958. ALGOL language designed by:
Friedrich L. Bauer, Hermann Botten bruch
➢ COBOL
The name COBOL stands for Common Business-Oriented Language. COBOL is a
programming language that was developed in the year 1959. It was one of the first
computer programming languages used for commercial. It was introduced by Grace
Hopper.
➢ BASIC(Beginner's All-purpose Symbolic Instruction Code)
BASIC , Stands for "Beginner's All-purpose Symbolic Instruction Code”. BASIC is a computer
programming language that was developed in the mid-1960s to provide a way for students
to write simple computer programs. In 1964, John G. Kemeny and Thomas E. Kurtz
designed the original BASIC language at Dartmouth College.
➢ Pascal
Pascal is an imperative and procedural programming language, designed by Niklaus Wirth
as .... Apollo Computer used Pascal as the systems programming language for its operating
systems beginning in 1980. It is named in honor of the French mathematician, philosopher
and physicist Blaise Pascal.
➢ C Language
C is a general-purpose, procedural computer programming language supporting
structured programming, lexical variable scope, and recursion, while a static type system
prevents unintended operations. C was developed at Bell Labs by Dennis Ritchie for the
Unix Operating System in the early 1970s. It is also called middle level language.
➢ C++ Language
C++ is a High-level programming language developed by Bjarne Stroustrup starting in 1979
at Bell Labs. C++ runs on a variety of platforms, such as Windows, Mac OS, and the various
versions of UNIX. This C++ tutorial adopts a simple and practical approach to describe the
concepts of C++ for beginners to advanced software engineers. C++ fully supports object-
oriented programming, including the four pillars of object-oriented development.
FSSAI: FCI: Computer Awareness Page 43
➢ JAVA
Java is a programming language and a platform. Java is a high level, robust, object-oriented
and secure programming language. Java is introduced by James Gosling. Java is used many
application like ,
1. Desktop Applications such as acrobat reader, media player, antivirus, etc.
2. Web Applications such as irctc.co.in, javatpoint.com, etc.
3. Enterprise Applications such as banking applications.
4. Mobile
5. Embedded System
6. Smart Card
7. Robotics
8. Games, etc.
➢ PERL(Practical Extraction and Reporting Language)
Perl is a general-purpose programming language originally developed for text
manipulation and now used for a wide range of tasks including system administration, web
development, network programming, GUI development, and more. Perl was originally
developed by Larry Wall in 1987. Stand for "Practical Extraction and Reporting Language.
➢ Python
Python is a general purpose and high level programming language. You can use Python for
developing desktop GUI applications, websites and web applications. It is introduced by
Guido van Rossum.
➢ C# Language
C# can be used to create almost anything but is particularly strong at building Windows
desktop applications and games. C# can also be used to develop web applications and has
become increasingly popular for mobile development too. It is developed by Microsoft. C#
is an object-oriented programming language used with XML-based Web services on the
.NET platform and designed for improving productivity in the development of Web
applications.
SCRIPTING LANGUAGE
Scripting languages are server-side scripting languages that manipulate the data, usually
in a database, on the server. Scripting languages came about largely because of the
development of the Internet as a communications tool.
Html, Xml, JavaScript, ASP, JSP, PHP, Perl, Tcl and Python are examples of scripting
languages.
FSSAI: FCI: Computer Awareness Page 44
LANGUAGE TRANSLATOR
Language translator is a program which is used to translate instructions that are written in
the source code to object code i.e. from high-level language or assembly language into
machine language.
There are 3 different types of translators as
1. Assembler- Assembler are used to convert assembly language code into machine code.
Assembler convert mnemonic code in to object code.
2. Compiler- Compiler translate high level language in machine language. It read the
entire program. It finds the syntax error. Error in a program is called bug. Compiler convert
source code into object code.
3. Interpreter- An interpreter translates high-level instructions into an intermediate form,
which it then executes. It reads the program line by line. In contrast, a compiler translates
high-level instructions directly into machine language. Compiled programs generally run
faster than interpreted programs.
FSSAI: FCI: Computer Awareness Page 45
CHAPTER 07
COMPUTER ABBREVIATIONS
ABBREVIATIONS ASSOCIATED WITH COMPUTER
No. Abbreviation Full Form
Common Operating Machine Purposely Used for Technological and Educational
1 COMPUTER Research
2 ROM Read Only Memory
3 CPU Central Processing Unit
4 URL Uniform Resource Locator
5 USB Universal Serial Bus
6 VIRUS Vital Information Resource Under Siege
7 TCP Transmission Control Protocol
8 UPS Uninterruptible Power Supply
9 SATA Serial Advanced Technology Attachment
10 RAM Random Access Memory
11 SMPS Switched-Mode Power Supply
12 CD Compact Disc
13 DVD Digital Versatile Disc
14 CRT Cathode Ray Tube
15 DEC Digital Equipment Corporation
16 SAP System Application and Products
17 PNG Portable Network Graphics
18 IP Internet Protocol
19 GIS Geographical Information system
20 DDS Digital Data Storage
FSSAI: FCI: Computer Awareness Page 46
21 CAD Computer Aided Design
22 ACPI Advanced Configuration and Power Interface
23 AGP Accelerated Graphics Port
24 APM Advanced Power Management
25 APIPA Automatic Private Internet Protocol Addressing
26 HTTP Hyper Text Transfer Protocol
27 HTTPS Hyper Text Transfer Protocol Secure
28 GPU Graphics Processing Unit
29 GDI Graphics Device Interface
30 ICP Internet Cache Protocol
31 GIGO Garbage In Garbage Out
32 GMAIL Graphical Mail
33 CAN Campus Area Network
34 CAL Computer Aided Leering
35 GPL General Public License
36 GCR Group Code Recording
37 MSN Microsoft Networks
38 BCC Blind Carbon Copy
39 VDI Virtual Desktop Infrastructure
40 MPEG Moving Picture Experts Group
41 TPU Tensor Processing Unit
42 PSD Photoshop Document
43 DPI Dots Per Inch
44 FYA For Your Action
45 CRS Computer Reservation System
46 BFD Binary File Descriptor
47 ABR Available Bit Rate
48 GBPS Gigabits Per Second
49 PING Packet InterNet Groper
50 CSMA Carrier Sense Multiple Access
FSSAI: FCI: Computer Awareness Page 47
51 AD Active Directory
52 ADC Analog to Digital Converter
53 BGP Border Gateway Protocol
54 CSI Common System Interface
55 DHCP Dynamic Host Configuration Protocol
56 OSI Open Systems Interconnection
57 LAN Local Area Network
58 WAN Wide Area Network
59 MAN Metropolitan Area Network
60 PAN Personal Area Network
61 MAC Media Access Control
62 OMR Optical Mark Recognition
63 NIC Network Interface Card
64 LDAP Lightweight Directory Access Protocol
65 UART Universal Asynchronous Receiver-Transmitter
66 DCE Distributed Computing Environment
67 PFA Please Find Attached
68 HCI Human Computer Interaction
69 FHS Filesystem Hierarchy Standard
70 FCS Frame Check Sequence
71 DVE Digital Video Effects
72 DLL Data Link Layer
73 CSV Comma Separated Values
74 CTCP Client–to–Client Protocol
75 ABI Application Binary Interface
76 MIS Management Information System
77 BIOS Basic Input Output System
78 SMTP Simple Mail Transfer Protocol
79 LTE Long Term Evolution
80 AHA Accelerated Hub Architecture
FSSAI: FCI: Computer Awareness Page 48
81 ALU Arithmetic Logical Unit
82 FPU Floating Point Unit
83 FXP File Exchange Protocol
84 HID Human Interface Device
85 IOS iPhone Operating System
86 PATA Parallel Advanced Technology Attachment
87 DDR Double Data Rate
88 DFS Distributed File System
89 MIPS Million Instructions Per Second
90 MMC Microsoft Management Console
91 VGCT Video Graphics Character Table
92 WBMP Wireless BitMap Image
93 PCM Pulse-Code Modulation
94 WMA Windows Media Audio
95 RAS Remote Access Service
96 HTM Hierarchical Temporal Memory
97 SIS Security and Intelligence Services
98 LBA Logical Block Addressing
99 CIDR Classless Inter-Domain Routing
100 MIMO Multiple-Input Multiple Output
101 PLC Programmable Logic Controller
102 SCSI Small Computer System Interface
103 NVRAM Non-Volatile Random-Access Memory
104 BLOB Binary large Object
105 VPN Virtual Private Network
106 SFF Small Form Factor
107 CAI Computer–Aided Instruction
108 EMP Electro-Magnetic Pulse
109 EIDE Enhanced Integrated Drive Electronics
110 AAC Advanced Audio Codec
FSSAI: FCI: Computer Awareness Page 49
111 IIOP Internet Inter-ORB Protocol
112 ASL Age Sex Location
113 MBSA Microsoft Baseline Security Analyzer
114 ZIP Zig-zag In-line Package
115 HSPA High Speed Packet Access
116 VFS Virtual File System
117 SIMD Single Instruction Multiple Data
118 IPC Inter-Process Communication
119 DAC Discretionary Access Control
120 DKIM Domain Keys Identified Mail
121 WIFI Wireless Fidelity
122 PTP Picture Transfer Protocol
123 IGRP Interior Gateway Routing Protocol
124 HIG Human Interface Guidelines
125 UNIVAC Universal Automatic Computer
126 CIFS Common Internet File System
127 HAL Hardware Abstraction Layer
128 IPV6 Internet Protocol Version 6
129 CNR Communication Network Riser
130 EISA Extended Industry Standard Architecture
131 RPM Red-Hat Package Manager
132 DLT Distributed Ledger Technology
133 ISH Information Super Highway
134 BY Bronto-bytes
135 DTS Digital Theater System
136 MSB Most Significant Bit
137 HVD Holographic Versatile Disk
138 MOSFET Metal-Oxide Semiconductor Field Effect Transistor
139 AMR Adaptive Multi-Rate
140 CMD Command
FSSAI: FCI: Computer Awareness Page 50
141 BCD Binary Coded Decimal
142 DMA Direct Memory Access
143 EB Exa-bytes
144 AVI Audio Video Interleave
145 WLAN Wireless Local Area Network
146 CAM Computer Aided Manufacturing
147 RIFF Resource Interchange File Format
148 TFTP Trivial File Transfer Protocol
149 WUSB Wireless Universal Serial Bus
150 HHD Hybrid Hard Drive
151 HSDPA High Speed Downlink Packet Access
152 AST Abstract Syntax Tree
153 MSD Most significant Digit
154 IRQ Interrupt Request
155 DVI Digital Visual Interface
156 SPARC Scalable Processor Architecture
157 URI Uniform Resource Identifier
158 EPROM Erasable Programmable Read Only Memory
159 SAN Storage Area Network
160 EBCDIC Extended Binary Coded Decimal Interchange Code
161 MVS Multiple Vendor System
162 NAS Network Attached Storage
163 BPS Bits Per Second
164 LPX Low Profile Extension
165 HCL Hardware Compatibility List
166 RTS Real Time Streaming
167 RAID Redundant Array of Inexpensive Disks
168 MUI Multilingual User Interface
169 MFD Multi-Function Device
170 CISC Complex Instruction Set Computer
FSSAI: FCI: Computer Awareness Page 51
171 MBR Master Boot Record
172 BINAC Binary Automatic Computer
173 SGRAM Synchronous Graphics Random Access Memory
174 DLP Digital Light Processing
175 UEFI Unified Extensible Firmware Interface
176 LLC Logical Link Control
177 DOC Document (Microsoft Corporation)
178 ARPANET Advanced Research Projects Agency Network
179 ACL Access Control List
180 RAIT Redundant Array of Inexpensive Tapes
181 MMX Multi-Media Extensions
182 STP Spanning Tree Protocol
183 MLI Multiple Link Interface
184 RIP Routing Information Protocol
185 AIFF Audio Interchange File Format
186 RMA Returned Materials Authorization
187 EGP Exterior Gateway Protocol
188 XMF Extensible Music File
189 MTBF Mean Time Between Failure
190 MIME Multipurpose Internet Mail Extensions
191 SRAM Static Random-Access Memory
192 SDR Software-Defined Radio
193 PAP Password Authentication Protocol
194 VRAM Video Random Access Memory
195 WAP Wireless Application Protocol
196 TGT Ticket Granting Ticket
197 GIF Graphics Interchange Format
198 TPM Trusted Platform Module
199 SPSS Statistical Package for the Social Sciences
200 ULSI Ultra Large-Scale Integration
FSSAI: FCI: Computer Awareness Page 52
201 EIGRP Enhanced Interior Gateway Routing Protocol
202 CDN Content Delivery Network
203 NMI Non-Maskable Interrupt
204 PPI Pixels Per Inch
205 RJ45 Registered Jack 45
206 SEC Single Edge Connector
207 BER Bit Error Rate
208 OOPS Object-Oriented Programming System
209 ATA Advanced Technology Attachment
210 RISC Reduced Instruction Set Computer
211 NFS Network File System
212 SFC System File Checker
213 ICR Intelligent Character Recognition
214 BTX Balanced Technology Extended
215 DOS Disk Operating System
216 CTS Clear to Send
217 AMD Advanced Micro Devices
218 DVD Digital Video Disc
219 CD-R Compact Disk – Recordable.
220 BAL Basic Assembly Language
221 UTF Unicode Transformation Format
222 MIDI Musical Instrument Digital Interface
223 BAT Microsoft Batch Processing
224 VT Video Terminal
225 HP Hewlett Packard
226 URN Uniform Resource Name
227 D2D Device to Device
228 DSHD Double Sided High Density
229 FDC Floppy Disk Controller
230 SDN Service Delivery Network
FSSAI: FCI: Computer Awareness Page 53
231 SBU Standard Build Unit
232 MPL Mozilla Public License
233 ENIAC Electronic Numerical Integrator and Computer
234 CAQA Computer–Aided Quality Assurance
235 ASF Advanced Systems Format
236 VM Virtual Machine
237 Mac Macintosh
238 OS Operating System
239 MNG Multiple-image Network Graphics
240 CD-ROM Compact Disk-Read Only Memory
241 MSB Most Significant Byte
242 TCP/IP Transmission Control Protocol/Internet Protocol
243 DMI Desktop Management Interface
244 NTP Network Time Protocol
245 PINE Program for Internet News and Email
246 SSL Secure Sockets Layer
247 BCR Bar Code Reader
248 SPI Serial Peripheral Interface
249 KBPS Kilobits Per Second
250 TSI Time Slot Interchange
251 ABC Atanasoff-Berry Computer
252 YB Yotta Byte
253 ZB Zetta-bytes
254 WDDM Windows Display Driver Model
255 ZIF Zero-Insertion-Force
256 RDBMS Relation Database Management System
257 MSI Microsoft Installer
258 ISP Internet Service Provider
259 WAV Waveform Audio
260 TPS Transaction Per Second
FSSAI: FCI: Computer Awareness Page 54
261 ISV Independent Software Vendor
262 SXGA Super Extended Graphics Array
263 GP Graphics port
264 BGA Ball Grid Array
265 SIS Safety Instrumented System
266 CGI Common Gateway Interface
267 PDF Portable Document Format
268 MMU Memory Management Unit
269 PIC Peripheral Interface Controller
270 NIU Network Interface Unit
271 TPS Transaction Processing System
272 VLSI Very Large-Scale Integration
273 ESD Electro Static Discharge
274 MAPI Messaging Application Program Interface
275 KB Kilo-bytes
276 DSL Domain–Specific Language
277 PB Peta-bytes
278 NAP Network Access Point
279 MS-DOS Microsoft Disk Operating System
280 WMV Windows Media Video
281 MFA Multi-Factor Authentication
282 GUI Graphical User Interface
283 RIS Remote Installation Service
284 ASCII American Standard Code for Information Interchange
285 ELF Executable and Linkable Format
286 WWAN Wireless Wide Area Network
287 DFD Data Flow Diagram
288 IRC Internet Relay Chat
289 PC Personal Computer
290 SDL Software and Documentation Localization
FSSAI: FCI: Computer Awareness Page 55
291 WINS Windows Internet Name Service
292 NOS Network Operating System
293 UNICS UNiplexed Information Computing System
294 DVR Digital Video Recorder
295 XMS Extended Memory Specification
296 LSI Large-Scale Integration
297 STP Shielded Twisted Pair
298 PCB Process Control Block
299 AGA Advanced Graphics Architecture
300 HSUPA High-Speed Uplink Packet Access
301 ICS Internet Connection Sharing
302 SOA Service Oriented Architecture
303 WWW World Wide Web
304 DLL Dynamic Link Library
305 DAP Direct Access Protocol
306 WMF Windows Metafile
307 EVDO Evolution Data Optimized Or Evolution Data Only
308 FAT File Allocation Table
309 DTE Data Terminal Equipment
310 PAL Phase Alternation Line
311 VGA Video Graphics Array
312 HSSI High-Speed Serial Interface
313 SIMM Single In-Line Memory Module
314 IPX Internetwork Packet Exchange
315 BWF Broadcast Wave Format
316 CRIMM Continuity-Rambus Inline Memory Module
317 OOP Object Oriented programming
318 RTOS Real Time Operating System
319 DBSN Database Source Name
320 IHV Independent Hardware Vendor
FSSAI: FCI: Computer Awareness Page 56
321 ISR Interrupt Service Routine
322 SOAP Simple Object Access Protocol
323 FTP File Transfer Protocol
324 DRAM Dynamic Random-Access Memory
325 BSOD Blue Screen of Death
326 HTX Hyper Transport Expansion
327 LSTM Long Short-Term Memory
328 DIVX DIgital Video Express
329 UAC User Account Control
330 CASE Computer-Aided Software Engineering
331 HDMI High Definition Multimedia Interface
332 VDC Video Display Controller
333 AVC Advanced Video Coding
334 CGA Color Graphics Array
335 DPMS Display Power Management Signaling
336 DBA DataBase Administrator
337 P2P Peer-To-Peer
338 MSI Medium Scale Integration
339 EPP Enhanced Parallel Port
340 EFS Encrypting File System
341 MHz Megahertz
342 WPAN Wireless Personal Area Network
343 CAN Controller Area Network
344 VDU Video Display Unit
345 JPG Joint Photographic Expert Group
346 MB Mega-bytes
347 ENI Elastic Network Interface
348 VPU Visual Processing Unit
349 MTP Media Transfer Protocol
350 MDI Multiple Document Interface
FSSAI: FCI: Computer Awareness Page 57
351 TDR Time Domain Reflectometer
352 WUXGA Wide Ultra Extended Graphics Array
353 NAP Network Access Protection
354 DWM Desktop Window Manager
355 ERP Enterprise Resource Planning
356 PPT PowerPoint Presentation
357 LSB Least Significant Byte
358 CCD Charged Coupled Device
359 VCR Video Cassette Recorder
360 EEPROM Electrically Erasable Programmable Read-Only Memory
361 CRC Cyclic Redundancy Check
362 XGA Extended Graphics Array
363 LSB Least Significant Bit
364 ZISC Zero Instruction Set Computer
365 ISA Instruction Set Architecture
366 HPC High-Performance Computing
367 MSDN Microsoft Developer Network
368 BPI Bytes Per Inch
369 SVGA Super Video Graphics Array
370 RDF Resource Description Framework
371 MFP Multi-Function Product
372 FCPGA Flip Chip Pin Grid Array
373 ASR Automated System Recovery
374 VAN Value-Added Network
375 PIO Programmed Input/Output
376 RGB Red, Green, Blue
377 FDMA Frequency-Division Multiple Access
378 SWF Shock Wave Flash
379 EOF End of File
380 POP Post Office Protocol
FSSAI: FCI: Computer Awareness Page 58
381 CBEMA Computer Business Equipment Manufacturers Association
382 GB Giga-bytes
383 EDP Electronic Data Processing
384 DIMM Dual In-Line Memory Module
385 VM Virtual Memory
386 SHDSL Single-pair High-speed Digital Subscriber Line
387 WEP Wired Equivalent Privacy
388 MBCS Multi Byte Character Set
389 IPV4 Internet Protocol Version 4
390 MCR Multivariant Curve Resolution
391 MTA Mail Transfer Agent
392 BOSS Bharat Operating System Solutions
393 ISC Internet Storm Center
394 POST Power on self-test
395 DTR Data Terminal Ready
396 SMBIOS System Management BIOS
397 HPFS High Performance File System
398 SNMP Simple Network Management Protocol
399 IIS Internet Information Services
400 VPG Virtual Private Gateway
401 CUA Common User Access
402 NID Network Interface Device
403 HDD Hard Disk Drive
404 IMAP Internet Message Access Protocol
405 VLC Video LAN Client
406 ERD Emergency Repair Disk
407 WPA Wireless Protected Access
408 IOS Internetwork Operating System
409 PKI Public key Infrastructure
410 UDP User Datagram Protocol
FSSAI: FCI: Computer Awareness Page 59
411 ISA Industry Standard Architecture
412 TPDU Transaction Protocol Data Unit
413 M3G Mobile 3D Graphics
414 DTP Desktop Publishing
415 PCI Peripheral Component Interconnect
416 CAE Computer–Aided Engineering
417 NTFS New Technology File System
418 FDD Floppy Disk Drive
419 IPP Internet Printing Protocol
420 VLAN Virtual Local Area Network
421 PSU Power Supply Unit
422 CTL Computation Tree Logic
423 DAT Digital Audio Tape
424 BiDi Bi–Directional
425 SVG Scalable Vector Graphics
426 ECP Extended Capabilities Port
427 TB Tera-bytes
428 CMOS Complementary Metal–Oxide–Semiconductor
429 OCR Optical Character Reader
430 JPEG Joint Photographic Experts Group
431 SONET Synchronous Optical Networking
432 CCS Common Command Set
433 CUPS Common Unix Printing System
434 ENIAC Electronic Numerical Integrator and Compute
435 IVR Interactive Voice Response
436 HTPC Home Theatre Personal Computer
437 HD High Definition
438 EVC Ethernet Virtual Circuit
439 NMS Network Management System
440 UTP Unshielded Twisted Pair-Cable
FSSAI: FCI: Computer Awareness Page 60
441 FDDI Fiber Distributed Data Interface
442 HAN Home Area Network
443 XMPP Extensible Messaging and Presence Protocol
444 ISCSI Internet Small Computer Storage Interface
445 PDP Plasma Display Panel
FSSAI: FCI: Computer Awareness Page 61
CHAPTER 08
SOCIAL MEDIA
What is Social media ?
“Websites and applications that enable users to create and share content or to
participate in social networking”.
Social media is a collective term for websites and applications that focus on communication,
community-based input, interaction, content-sharing and collaboration. People use social
media to stay in touch and interact with friends, family and various communities. Businesses
use social applications to market and promote their products and track customer concerns.
FSSAI: FCI: Computer Awareness Page 62
HISTORY OF SOCIAL MEDIA
Twitter, Facebook, and Instagram are just a few of the most famous social media platforms
that exist this century, with Facebook leading the list. Billions of people have been using
social media since it boomed. As long as there are cell phones, tablets, computers and an
internet connection, people can easily connect with other people from anywhere through
social media. Some may even have multiple accounts registered on one social media
platform.
But have you ever wondered how it all started? Who the founder was? How it has evolved?
Let’s take a quick trip down memory lane.
• 20th Century and the Precursors of Social media
Tom Truscott and Jim Ellis first mentioned Usenet in 1979. Usenet allowed posting
news post or articles to newsgroups. Usenet systems were the one responsible for
the evolution of newsreader clients. They are also the precursor of RSS feed
readers.
• Bulletin Board Systems (BBS)
Bulletin board systems are one of the first forms of the social media in the late
1970’s. They are hosted on personal computers and are accessible to one person
at a time. BBS was the first kind of website that allows users to log on and connect
with each other. It remained famous until the end of 1990’s.
• Instant Messaging Time
Internet Relay Chat (IRC) was first introduced in 1988 and is used for link and file
sharing as well as keeping in touch. It came from BBS roots. It was also the real
FSSAI: FCI: Computer Awareness Page 63
predecessor of modern instant messaging. ICQ, on the other hand, was known as
the first program for instant messaging for PCs.
• Early social media
Sixdegrees is the first of social media platforms launched in 1997. It had about a
million members when it peaked. Unfortunately, SixDegrees was shutdown in the
year 2001.
From 1997 to 2001, other sites followed like Asianavanue, Migente and
Blackplanet. Users could create profiles, either personal or professional, and also
add friends.
• Social Media Advances in 2000s
In terms of modern social media, Friendster was the very first proper social
network. It was founded in 2002 and has over hundred million registered users,
mostly from Asia. Through Friendster, users can discover friends and expand their
growing networks. Its idea was to safely meet more new people than in the real
world. However, they took a break in 2015 to further improve their services.
LinkedIn, founded in 2003, first used mainstream networks for business. It allows
posting and interacting through private messaging. LinkedIn has now added new
options like groups; new profile features, forums, video, an ads platform etc.for
easier use and greater scale. Another social media network published in 2003 was
Hi5. It has over a million active users as of now. Users have an option to decide if
they prefer to be seen within their network or by other users in general. It is mostly
popular in Central Africa, Asia and Latin America.
• The Beginning of Facebook
Facebook started its history when it was first launched in Harvard in 2004. It quickly
spread to other schools and by 2008; it had become the most famous social media
platform and it still continues to grow rapidly. It allows its users to post content
and personalize their profiles. Over the years, it has added many fresh features that
made it even more popular. People could also use private messaging as well as add
various posts to their walls. It is even easier for them to change the settings of their
account based on their own discretion. The ads platform has now made it available
for marketer to reach their audiences like never before.
• MySpace
MySpace played a very important role in social media life since its launch in 2004.
By 2006, it had grown to become the most famous social media platform in the
world. With MySpace, users could customize their profiles completely, embed
videos and post music. It also has MySpace IM allowing people to chat with each
other.
FSSAI: FCI: Computer Awareness Page 64
• Youtube
Youtube launched its website in 2005 and is the one first major sharing sites and
video hosting platforms. Users can upload videos and even embed them to other
sites or blogs.
• Twitter came in 2006.
It was originally designed as mobile SMS-platform. It has upgraded since then and
now has over 300 million active users monthly.
• 2010 saw Instagram launch into the public domain
Instagram uses visual communication and social interaction to connect people
around the world. It allows users to upload and share photos and video stories. It
has many filters that could transform a boring picture into an Instagram-worthy
masterpiece.
Many of us will have started out in business before any of these platforms really
took off. How have you embraced the rapidly evolving landscape of the social
media world? Or maybe it’s all to much to take on, on top of the day to day running
of your business. If that’s the case, have you ever looked at social media
management? We can help your company enter the social media world to reach
out to clients otherwise missed through traditional marketing methods. If you’d
like to know more please read more here
Facebook is the largest social media platform in the world, with a clear advantage over
other social media, though it has similar audiences to others like Twitter and Instagram.
The figures for the most popular social media websites as of 2021 are as follows:
1. Facebook (2.85 billion users)
2. YouTube (2.29 billion users)
3. WhatsApp (2 billion users)
4. Facebook Messenger (1.3 billion users)
5. Instagram (1.22 billion users)
6. Whatsapp (1.21 billion users)
7. TikTok (689 million users)
8. QQ (617 million users)
9. Douyin (600 million users)
10. Sino Weibo (511 million users)
Facebook, YouTube, and WhatsApp are the world's largest social media
networks.
FSSAI: FCI: Computer Awareness Page 65
SOCIAL MEDIA WEBSITES FOUNDERS
No. Website Founder Launch
1 Badoo Andrey Andreev 2006
2 Bumble Whitney Wolfe Herd 2014
3 Buzznet 1) Marc Brown 2005
2) Anthony Batt
3) Kevin Woolery
4) Steve Haldane
4 Classmates Randy Conrads 1995
5 Facebook 1) Mark Zuckerberg 2004
2) Andrew McCollum
3) Eduardo Saverin
4) Dustin Moskovitz
5) Chris Hughes
6 Flickr 1) Stewart Butterfield 2004
2) Caterina Fake
7 Friendica Mike Macgirvin 2010
8 Friendster Jonathan Abrams 2002
9 Happn Didier Rappaport 2014
10 HotorNot James Hong 2000
11 Hi5 Ramu Yalamanchi 2004
12 Instagram 1) Mike Krieger 2010
2) Kevin Systrom
13 Kik Ted Livingston 2010
14 Kuaishou 1) Su Hua 2011
2) Cheng Yixiao
15 Likee Jason Hu 2017
FSSAI: FCI: Computer Awareness Page 66
16 LINE Hae Jin Lee 2011
17 LinkedIn 1) Reid Hoffman 2003
2) Konstantin Guericke
3) Jean-Luc Vaillant
4) Allen Blue
5) Eric Ly
18 LiveJournal Brad Fitzpatrick 1999
19 Lovoo Florian Braunschweig 2011
20 MocoSpace Justin Siegel 2005
21 Musical.ly 1) Alex Zhu 2014
2) Luyu Yang
22 Myspace 1) Tom Anderson 2003
2) Chris DeWolfe
3) Jon Hart
23 Ning 1) Marc Andreessen 2004
2) Gina Bianchini
24 OkCupid 1) Chris Coyne 2004
2) Christian Rudder
3) Sam Yagan
4) Max Krohn
25 Pinterest Ben Silbermann 2010
26 Quora 1) Adam D’Angelo 2010
2) Charlie Cheever
27 Reddit 1) Steve Huffman 2005
2) Alexis Ohanian
3) Aaron Swartz
28 Signal 1) Brian Acton 2018
2) Moxie Marlinspike
29 Skout 1) Christian Wiklund 2009
2) Niklas Lindstrom
FSSAI: FCI: Computer Awareness Page 67
30 Skype 1) Niklas Zennström 2003
2) Janus Friis
31 StumbleUpon 1) Garrett Camp 2001
2) Justin LaFrance
3) Geoff Smith
32 Snapchat 1) Evan Spiegel 2011
2) Bobby Murphy
3) Reggie Brown
33 Tagged 1) Greg Tseng 2004
2) Johann Schleier-Smith
34 Telegram 1) Pavel Durov 2013
2) Nikolai
35 TikTok ByteDance 2016
36 Tinder 1) Sean Rad 2012
2) Whitney Wolfe Herd
3) Arun Gopan
4) Jonathan Badeen
5) Justin Mateen
6) Joe Munoz
7) Dinesh Moorjani
37 Tumblr David Karp 2007
38 Twitter 1) Jack Dorsey 2006
2) Evan Williams
3) Noah Glass
4) Biz Stone
39 Twoo 1) Toon Coppens 2011
2) Lorenz Bogaert
40 Viber 1) Talmon Marco 2010
2) Igor Magazinnik
41 VK 1) Pavel Durov 2006
2) Nikolai Durov
FSSAI: FCI: Computer Awareness Page 68
3) Yitzchak Mirilashvili
4) Lev Binzumovich Leviev
42 WeChat Allen Zhang 2011
43 WhatsApp 1) Brian Acton 2009
2) Jan Koum
44 YouTube 1) Jawed Karim 2005
2) Steve Chen
3) Chad Hurley
45 Zoom Eric Yuan 2011
46 Zoosk 1) Alex Mehr 2007
2) Shayan Zadeh
FSSAI: FCI: Computer Awareness Page 69
Connect with Us
Website: www.swaeducation.com
Instagram : swaeducation_official
Telegram : Swa Education
Facebook: Swa Education
FSSAI: FCI: Computer Awareness Page 70
STATE & CENTRAL FOOD SAFETY OFFICER
Our eBOOK For Competitive Exam
ODISHA- FSO FSSAI - CFSO
FSSAI: FCI: Computer Awareness Page 71