Uploaded by Trinetra Joshi

Computer Bullet Points - GKmojo

Computer Bullet Points - GKmojo
Protected: Computer Bullet Points
1. Speakers and Headphones are an
Answer: output device
2. Which is the Fasted Printer?
Answer: Laser Printer
3. Keyboard is a ………device.
Answer: Input
4. Which is not an input device?
Answer: Monitor, printer
5. The number of function keys in a keyboard are
Answer: 12
6. Calculator Abacus was invented which country?
Answer: China
7. The Storage device of a computer is
Answer: RAM
8. 1024 tes is equal to
Answer: 1 kilote
9. Smallest unit of computer data?
Answer: Bit
10. When more computers are connected at one place, it is called?
Answer: LAN (Local area network)
11. Bank’s ATM Facility is an example of
Answer: WAN (Wide area network)
12. Full form of URL?
Answer: Uniform Resource Locator
13. Inventor of www?
Answer: Tim Berners Lee
14. Any Document can be saved the command?
Answer: Ctrl+S
15. Short form of uninterrupted power supply in computer is
Answer: UPS
16. The chip used in computer is made of
Answer: Silicon
Computer Bullet Points - GKmojo
1. The input is converted into output Answer: CPU
2. An error in a program which causes wrong result is called asAnswer: Bug
3. Any alphabet or symbol in computer is stored in ……te.
Answer: one
4. 0 to 7 digits are used in
Answer: Octal system
5. If the computer is switched off the contents of RAM
Answer: Get destroyed
6. When you work on a file on computer, the document are stored temporarily in
Answer: RAM
7. The code of web page is written using
Answer: HTML
8. Full form of URL?
Answer: Uniform Resource Locator
9. MS Office 2000 is developed ….
Answer: Microsoft
10. The extension of a file name saved in any excel database is…
Answer: Mbd
11. The first computer virus is…
Answer: creeper
12. What is virus?
Answer: Program code
Some important Bullet Points
1. An operating system is the most important software that runs on a computer. It manages the
computer’s memory and processes, as well as all of its software and hardware. It also allows you
to communicate with the computer without knowing how to speak the computer’s language. Without
an operating system, a computer is useless.
List of Important Operating system:
Microsoft Windows, MS DOS, Apple macOS, Linux,
Mobile Operating System:
Android, Apple’s iOS
Computer Bullet Points - GKmojo
2. Phishing:
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit
card details directly from users deceiving the users.
Phishing is typically carried out email spoofing or instant messaging, and it often directs users to
enter details at a fake website whose “look” and “feel” are almost identical to the legitimate one.
The fake website often asks for personal information, such as log-in details and passwords. This
information can then be used to gain access to the individual’s real account on the real website.
Preying on a victim’s trust, phishing can be classified as a form of social engineering.
Attackers are using creative ways to gain access to real accounts. A very common scam is when
attackers send fake invoices to recently purchased music or apps the individual.
3. Ransomware is a type of malware from cryptovirology that threatens to publish the
victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware
may lock the system in a way which is not difficult for a knowledgeable person to reverse, more
advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim’s files,
making them inaccessible, and demands a ransom payment to decrypt them. In a properly
implemented cryptoviral extortion attack, recovering the files without the decryption key is
an intractable problem – and difficult to trace digital currencies such as Ukash or Bitcoin and
other cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators
Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that
the user is tricked into downloading or opening when it arrives as an email attachment. However, one
high-profile example, the “WannaCry worm”, travelled automatically between computers without user
4. Printers
Printers are Output devices used to prepare permanent Output devices on paper. Printers can be
divided into two main categories :
A. Impact Printers : In this hammers or pins strike against a ribbon and paper to print the text.
This mechanism is known as electro-mechanical mechanism. They are of two types.
I. Character Printer : It prints only one character at a time. It has relatively slower speed. Eg. Of
them are Dot matrix printers.
II. Dot Matrix Printer : It prints characters as combination of dots. Dot matrix printers are the
most popular among serial printers. These have a matrix of pins on the print head of the printer
which form the character. The computer memory sends one character at a time to be printed the
printer. There is a carbon between the pins & the paper. The words get printed on the paper when the
pin strikes the carbon. There are generally 24 pins.
B. Non-Impact Printers : There printers use non-Impact technology such as ink-jet or laser
technology. There printers provide better quality of O/P at higher speed. These printers are of two
types :
I. Ink-Jet Printer : It prints characters spraying patterns of ink on the paper from a nozzle or jet. It
prints from nozzles having very fine holes, from which a specially made ink is pumped out to create
various letters and shapes. The ink comes out of the nozzle in a form of vapors. After passing through
Computer Bullet Points - GKmojo
a reflecting plate, it forms the desired letter/shape at the desired place.
II. Laser Printer is a type of printer that utilizes a laser beam to produce an image on a drum. The
light of the laser alters the electrical charge on the drum wherever it hits. The drum is then rolled
through a reservoir of toner, which is picked up the charged portions of the drum. Finally, the toner is
transferred to the paper through a combination of heat and pressure.
This is also the way copy machines work. Because an entire page is transmitted to a drum before the
toner is applied, laser printers are sometimes called page printers. There are two other types of page
printers that fall under the category of laser printers even though they do not use lasers at all. One
uses an array of LEDs to expose the drum and the other uses LCDs. Once the drum is charged,
however, they both operate like a real laser printer. One of the chief characteristics of laser printers is
their resolution – how many dots per inch (dpi) they lay down.
The available resolutions range from 300 dpi at the low end to 1,200 dpi at the high end. In addition
to text, laser printers are very adept at printing graphics, so you need significant amounts of memory
in the printer to print high-resolution graphics. To print a full-page graphic at 300 dpi, for example,
you need at least 1 MB (megate) of printer RAM. For a 600 dpi graphic, you need at least 4 MB RAM.
Because laser printers are non-impact printers, they are much quieter than dotmatrix or daisy-wheel
printers. They are also relatively fast, although not as fast as some dot-matrix or daisy-wheel printers.
The speed of laser printers ranges from about 4 to 20 pages of text per minute (ppm). A typical rate of
6ppm is equivalent to about 40 characters per second (cps).
Inkjet photo printers are the best option for businesses that need to print color documents or black
and white documents, like photographs, with a lot of variation in greytones at the highest possible
quality. Color laser printers have a limited color gamut and simply cannot reproduce certain
TISS GK Course 2020-21
RBI Grade B Phase 1 GA Course 2021
SEBI Grade A Phase 1 GA Finance Course 2020