Вы находитесь на странице: 1из 24

UGC NET

General Paper On Teaching &


Research Aptitude
SAMPLE

Eduncle.com
Mpa 44, 2nd Floor, Above Bank Of India, Rangbari Main Road,
Toll Free: 1800-120-1021
Mahaveer Nagar 2nd, Near Amber Dairy, Kota, Rajasthan, 324005
Website: www.eduncle.com | Email: Info@Eduncle.com
General Paper-I (Sample Theory)

Information and Communication Technology

1. INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Information and communication Technology (ICT) is the infrastructure of modern computing. ICT
is synonym of Information Technology (IT). ICT is sometimes used synonymously with IT (for information
technology); however, ICT is generally used to represent a broader, more comprehensive list of all
components related to computer and digital technologies than IT.
Although there is no single, universal definition of ICT, the term is generally accepted to mean
all devices, networking components, applications and systems that combined allow people and
organizations (i.e., businesses, nonprofit agencies, governments and criminal enterprises) to interact in
the digital world.
According to UNESCO (2002), "ICT refers to forms of technologies that are used to create,
store, share or transmit, exchange information. ICT includes radio, television, video, DVD, telephone
(fixed line & mobile), satellite systems, computer and network hardware and software; (equipment &
services associated with these technologies, such as video conference electronic mail)".
The National curriculum framework 2005 (NCF 2005) has also highlighted the importance of
ICT in school education. Keeping in mind the importance of ICT, a major paradigm shift is imperative
in education characterized by imparting instructions collaborative learning, multi-disciplinary problem-
solving and promoting critical and creative thinking skills
The World Bank, numerous governmental authorities and non-government organizations (NGOs)
advocate policies and programs that aim to bridge the digital divide by providing greater access to ICT
among those individuals and populations struggling to afford it.
These various institutions assert that those without ICT capabilities are left out of the multiple
opportunities and benefits that ICT creates and will therefore fall further behind in socio economic terms.
The United Nations considers one of its Sustainable Development Goals (SDG) to
"significantly increase access to information and communications technology and strive to provide
universal and affordable access to the internet in least developed countries by 2020."
Components if ICT
These will not only include hardware devices connected to computers, and software applications,
but also interactive digital content, internet and other satellite communication devices, radio and television
services, web based content repositories, interactive forums, learning management systems, and
management information systems.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 1


General Paper-I (Sample Theory)

Advantages of ICT
 Speed : The innovations in internet and broadband have made the communication
instantaneous. Modern mobile applications have allowed people to communicate with
each other in real time. There is no time lag between two places which are thousands
of kilometers apart.
 Precision : The information that is communicated through ICT is very precise. Since
there is no time lag in the communication, there is less chances of miscommunications.
 Versatile : ICT can help in doing multiple tasks. Data can be gathered, verified, processed,
and managed. Information can be communicated. ICT provides a multi-media platform for
such communication.
 Digital Divide : Digital divide refers to a large difference between two or more groups
in a population in the distribution and effective use of ICT resources. For example, the
internet penetration in urban and rural India is quite different. From one perspective, ICTs
are considered to bridge the gap between subgroups of a population. But off late, it has
been said that ICT is contributing towards widening the gaps.
 Health : Internet and social networking addiction is a popular and identified side effect
of emergence of ICT. Excessive internet usage is also associated with low attention
problems.
Disadvantage of ICT
 Cost : ICT tools seem very expensive. But when we account for their reach, they come
out to be very cheap. For example, the cost involved in printing text books is very high
economically as well as environmentally. On the other hand preparing and using digital
form of the book need high one time investment in creating. But once created, it can be
used by any number of users without incurring additional cost.
 Hacking : The access to our various accounts is through user ids, and these services
are provided through internet. Through internet people steal and gather security passwords
of others, get access to others' accounts. This is termed as hacking. Hackers also get
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 2
General Paper-I (Sample Theory)

into users' banking accounts and inflict financial losses. Not sharing password with others
and frequent change of password has become a necessity for safe internet usage.
 Unauthorized Content Use : Internet and digital form of the data has allowed easy
duplication of the content without attributing/acknowledging the source of the content.
High speed internet and high capacity storage devices have made it easy. Appropriate
attribution needs to be done as an ethical ICT use.
 Trolls and Abuses : Internet is also a platform to express personal enmity in the form
of trolling and abusing people online. Since it is easy to conceal identity in internet,
people resort to this practice more frequently.
 Pornography : A lot of adult content is accessible through the Internet. This is in digital
form in various media that can be easily stored in storage devices. Child pornography is
a criminal activity mainly happening through the internet medium. There is a pressure on
government from religious and parent groups to ban all pornographic material available
in the internet. Alternatively, there are also many who claim that banning such materials
is against the spirit of internet freedom and democracy.
 Viruses : Viruses are relatively simple program written by people and designed to cause
nuisance or damage to computers or their files. They are also responsible for corrupting
data and data loss.
 Privacy concerns : Internet is also a hub of lot of personal data. It is possible to track
individual activities in the internet. Such data on user behavior can be misused for the
marketing purposes. Many civil rights activists fear the danger of authoritarian governments
to monitor and manipulate freedom of movement, speech, political activism and social
and personal behaviors.
Importance in Education
 Use of ICT for quality improvement also figures in Government of India's flagship
programme on education, Sarva Shiksha Abhiyan (SSA). Again, ICT has figured
comprehensively in the norm of schooling recommended by the Central Advisory Board
of Education (CABE), in its report on Universal Secondary Education, in 2005.
 ICT is useful of Distance Education Programme with learning become web-based.
 Provide training for Teacher with using ICT's in the classroom to be supported by well-
trained teacher.
 National Mission on Education through Information and Communication and
Technology (NMEICT) is an ambitious project undertaken by the Ministry of Human
Resource Development (MHRD), Government of India with a view to seamlessly providing
quality educational content to all the eligible and willing learners in India. It has envisaged
content and connectivity as the twin pedals for initiating and accelerating ICT-enabled
Higher Education.
 It seeks to bridge the digital divide, i.e. the gap in the skills to use computing devices for
the purpose of teaching and learning among urban and rural teachers/learners in Higher
Education domain and empower those, who have hitherto remained untouched by the
digital revolution and have not been able to joint the mainstream of the knowledge
economy.
 It plans to focus on appropriate pedagogy for e-learning, providing facility of performing
experiments through virtual laboratories, on-line testing and certification, on-line availability
of teachers to guide and mentor learners, utilization of available Education Satellite
(EduSAT) and Direct to Home (DTH) platform, training and empowerment of teachers to
effectively use the new method of teaching learning etc.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 3


General Paper-I (Sample Theory)

School Management Information System (School MIS)


 A nationwide network will be established in which schools, teachers, students, school
managers, and the community at large participate. This implementation will include the
School Management Information Systems (School MIS); digital repositories of tools, content
and resources; professional development and continuing education platforms; and guidance,
counseling and other student support services.
 School MIS will emerge as a single window clearing house on all information related to
the secondary school system. The information will facilitate research and analysis activities
and guide decision making at different levels in the education system, contributing to
enhanced efficiencies.
 The scope of information to be collated by the MIS will be broad and include student and
teacher tracking, particularly for their academic needs. The norms will also define standards
of technology including language fonts, word processors, technical dictionaries, etc. Open
standards facilitating universal access to information, content and resources will be ensured.
Information Technology Act
The Information Technology Act, 2000, was thus passed as the Act on June 9, 2000 and it was
made effective from October 17, 2000. By adopting this Cyber Legislation, India became the 12th nation
in the world to adopt a Cyber Law regime.
Aims of IT ACT
 To deliver lawful recognition for transactions through electronic data interchange (EDI)
and other means of electronic communication, commonly referred to as electronic
commerce or E-Commerce. The aim was to use replacements of paper-based methods
of communication and storage of information.
 To facilitate electronic filing of documents with the Government agencies and further to
amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence
Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith
or incidental thereto.
Cyber Security
Cyber security denotes the technologies and procedures intended to safeguard computers,
networks, and data from unlawful admittance, weaknesses, and attacks transported through the Internet
by cyber delinquents.
ISO 27001 (ISO27001) is the International Cyber Security Standard that delivers a model for
creating, applying, functioning, monitoring, reviewing, preserving, and improving an Information Security
Management System.
The Ministry of Communication and Information Technology under the government of India
provides a strategy outline called the National Cyber security Policy. The purpose of this government
body is to protect the public and private infrastructure from cyber-attacks
Cyberspace
Cyberspace can be defined as an intricate environment that involves interactions between people,
software, and services. It is maintained by the worldwide distribution of information and communication
technology devices and networks.
Cyberspace is useful for common people, business, critical information infrastructure, military
and government etc.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 4


General Paper-I (Sample Theory)

Q. NMEICT stands for :


(1) National Mission on Education through ICT
(2) National Mission on E-governance through ICT
(3) National Mission on E-commerce through ICT
(4) National Mission on E-learning through ICT (Dec. 2015)
Ans. (1)

Q. Which of the following statements regarding the features of Information and communication
Technology (ICT) is/are true ?
I. ICT are the main instruments for the creation of computer networks and the applications
based on them.
II. ICT support the spread of information and knowledge, separating the content from the
place where it belongs physically.
III. The digital and virtual nature of most of ICT products allow the expenditure for them to
be maximized.
Codes :
(1) I and II only (2) I and III only
(3) II and III only (4) I, II and III (Aug. 2016)
Ans. (1)

Q. The statement “the study, design, development, implementation, support or management of


computer-based information systems, particularly software applications and computer Hardware”
refers to
(1) Information Technology (IT)
(2) Information and Collaborative Technology (ICT)
(3) Information and Data Technology (IDT)
(4) Artificial Intelligence (AI) (July 2016)
Ans. (1)

Q. Read the following two statements :


I : Information and Communication Technology (ICT) is considered a subset of Information
Technology (IT).
II : The ‘right to use’ a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT ?
(1) Both I and II (2) Neither I nor II
(3) II only (4) I only (Jan. 2017)
Ans. (2)

Computer
Computers were used to perform arithmetic calculation at fast speed which is used in nearly
every field. The term computer has been borrowed form Compute that means - to calculate. Where
initially A computer is a programmable machine. The two principal characteristics of a computer are: It
responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list
of instructions (a Program).

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 5


General Paper-I (Sample Theory)

Characteristics of Computer
 Speed : A computer can perform several million instructions (Calculation) in one second.
The speed of computers in specified in MIP (Million Instructions per Second) or MFLOPS
(Million Floating - Point Operations per Second).
 Accuracy : Computer technology is well stabilized and the chances of computer giving
inaccurate results are very rare. It is performed with a very high degree of consistent
accuracy.
 Diligence : A computer can continue to work for hours (or Even days) at a same speed
and accuracy.
 Versatility : The same computer can be used for various application.
 Storage : A computer can storage a huge amount of data in its memory. Such as letter,
picture, sound etc.
 No Emotions : Computer are not living being and do not have any emotions, taste,
feeling, etc.
Computer Architecture

Computer Organization
Computer Organization The computer performs basically five major operations of functions
irrespective of their size and make.
 Accepts data or instruction by way of input
 Stores data
 process data as required by the user
 Gives results in the form of output
 Controls all operations inside a computer
Input : this is the process of entering data and programs into the computer system.
Control Unit (CU) : The process of input, output, processing and storage is performed under
the supervision of a unit called 'Control Unit'. It decides when to start receiving data, when to stop it,
where to store data, etc. It takes care of step-by-step processing of all operations in side the computer.
Memory Unit : Computer is used to store data and instructions.
Arithmetic Logic Unit (ALU) : The major operations performed by the ALU are addition,
subtraction, multiplication, division, logic and comparison.
Output : This is the process of producing results from the data for getting useful information.
The ALU and the CU of a computer system are jointly known as the central processing unit
(CPU). CPU as the brain of any computer system.
Classification of Computer
Computers are generally classified by size and power as follows, although there is considerable
overlap. The differences between computer classifications generally get smaller as technology advances,
creating smaller and more powerful and cost-friendly components.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 6
General Paper-I (Sample Theory)

 Personal Computer : a small, single-user computer based on a microprocessor. In


addition to the microprocessor, a personal computer has a keyboard for entering data, a
monitor for displaying information, and a storage device for saving data.
 Work station : A powerful, single-user computer. A workstation is like a personal computer,
but it has a more powerful microprocessor and a higher-quality monitor.
 Minicomputer : A multi-user computer capable of supporting from 10 to hundreds of
users simultaneously.
 Mainframe : A powerful multi-user computer capable of supporting many hundreds or
thousands of users simultaneously.
 Super Computer : An extremely fast computer that can perform hundreds of millions of
instructions per second.
 Analog Computer : An analog computer accept, processes, and generates continuous
(unbroken) data. Computations are carried out with physical quantizes such as length,
voltage, current etc.
 Digital Computer : A Digital Computer accepts, processes and produces discrete
(Discontinuous) data. Computation is done with discrete quantities such as numerical
digits. Usual fax machine, electronic calculator, is example of digital devices.
Q. ALU stands for (Dec. 2012)
(A) American Logic Unit (B) Alternate Local Unit
(C) Alternating Logic Unit (D) Arithmetic Logic Unit
Ans. (D)

Q. The post-industrial society is designated as (Dec. 2013)


(A) Information society (B) Technology society
(C) Mediated society (D) Non-agricultural society
Ans. (A)
History of Computer
 The Mark I computer (1937-1944) : the mark I computer also called the automatic
Sequence Controlled calculator was the first fully automatic calculating machine. It is
developed by professor Howard Aiken of Harvard. It could perform five basic arithmetic
operation (Addition, Subtraction, Multiplication, Division, and table reference)
 The Atanas off Computer (1935-1942) : The first electronic computer was developed by
Dr. John Vincent Atanas off a professor of physics and Mathematics.
 The ENIAC (1943-1946) : The Electronic Numerical Integrator and Calculator (ENIAC)
was first electronic computer. The ENIAC used about 19,000 vacuum tubes and was
housed in a room of about 800 square feet.
 The EDSAC (1947-1949) : EDSAC (Electronic Delay Storage Automatic Computer) is the
first 'stored instruction' computer developed by Professor Maurice Wilkes at Cambridge
University.
 The EDVAC (1946-1952) : The Electronic Discrete Variable Automatic Computer (EDVAC)
is a Stored Instruction Computer which developed by Professor J Presper ECKERT.
 The UNIVAC I (1951) : The first UNIVAC (Universal Automatic Computer) was used at
census Bureau for about a decade developed by census bureau.
These types of computers are First generation computer which is used a vacuum tubes are big
size to control the flow of electronic single.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 7


General Paper-I (Sample Theory)

 The second generation was introduced around 1959. These made of transistors a smaller
and more reliable these second generation computers are faster, smaller, and reliable.
 Third generation computer were based on IC technology. The system 3/60 introduced by
IBM in 1964 was third generation computer which were smaller, faster and more reliable
than second generation.
 The fourth generation computers were introduced around 1975 were based on LSI chips
(large Scale Integrated Circuit) which are very small, very powerful, fast and cheap.
 Scientists are working on the development of fifth generation computer which intelligence
ability to reason of real world and which can understand in natural language.
Operating System
The Operating System (O/s) is a collection of programs that control all hardware and other
resources in computer system. Without operating system is useless. Operating system operates and
controls the CPU, memories, and Input and output devices.
Some popular Operating Systems include Linux Operating System, Windows Operating
System, VMS, OS/400, AIX, etc.
Following are some of important functions of an operating system :
 Memory Management
 Processor Management
 Device Management
 File Management
 Security
 Control over system performance
 Job accounting
 Error detecting aids
 Coordination between other software and users
Types of Operating System
 Batch Operating System : The users of a batch operating system do not interact with
the computer directly. Each user prepares his job on an off-line device like punch cards
and submits it to the computer operator. To speed up processing, jobs with similar needs
are batched together and run as a group. The programmers leave their programs with
the operator and the operator then sorts the programs with similar requirements into
batches.
 Time Sharing Operating System : Time-sharing is a technique which enables many
people, located at various terminals, to use a particular computer system at the same
time. Time-sharing or multitasking is a logical extension of multiprogramming. Processor's
time which is shared among multiple users simultaneously is termed as time-sharing
 Disturbed Operating System : Distributed systems use multiple central processors to
serve multiple real-time applications and multiple users. Data processing jobs are distributed
among the processors accordingly.
 Network Operating System : A Network Operating System runs on a server and provides
the server the capability to manage data, users, groups, security, applications, and other
networking functions. The primary purpose of the network operating system is to allow
shared file and printer access among multiple computers in a network, typically a local
area network (LAN), a private network or to other networks.
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 8
General Paper-I (Sample Theory)

 Real-Time Operating System : A real-time system is defined as a data processing


system in which the time interval required to process and respond to inputs is so small
that it controls the environment. The time taken by the system to respond to an input and
display of required updated information is termed as the response time. So in this method,
the response time is very less as compared to online processing.
Operating System Properties
Batch Processing : Batch processing is a technique in which an Operating System collects the
programs and data together in a batch before processing starts.
Multitasking : Multitasking, the running of two or more programs (sets of instructions) in one
computer at the same time. Multitasking is used to keep all of a computer's resources at work as much
of the time as possible. It is controlled by the operating system, which loads programs into the computer
for processing and oversees their execution until they are finished.
The user gives instructions to the operating system or to a program directly, and receives an
immediate response.
 The OS handles multitasking in the way that it can handle multiple operations / executes
multiple programs at a time
 Multitasking Operating Systems are also known as Time-sharing systems.
 These Operating Systems were developed to provide interactive use of a computer
system at a reasonable cost.
 A time-shared operating system uses the concept of CPU scheduling and multiprogramming
to provide each user with a small portion of a time-shared CPU
 Each user has at least one separate program in memory.
Multiprogramming : Sharing the processor, when two or more programs reside in memory at
the same time, is referred as multiprogramming. Multiprogramming assumes a single shared processor.
Multiprogramming increases CPU utilization by organizing jobs so that the CPU always has one to
execute.
 The operating system keeps several jobs in memory at a time.
 This set of jobs is a subset of the jobs kept in the job pool.
 The operating system picks and begins to execute one of the jobs in the memory.
 Multiprogramming operating systems monitor the state of all active programs and system
resources using memory management programs to ensures that the CPU is never idle,
unless there are no jobs to process.
 A program that is loaded into memory and is executing is commonly referred to as a
process.
 When a process executes, it typically executes for only a very short time before it either
finishes or needs to perform I/O.
 Since interactive I/O typically runs at slower speeds, it may take a long time to complete.
During this time, a CPU can be utilized by another process.
 The operating system allows the users to share the computer simultaneously. Since each
action or command in a time-shared system tends to be short, only a little CPU time is
needed for each user.
Mother Board
The motherboard serves as a single platform to connect all of the parts of a computer together.
A motherboard connects CPU, memory, hard drives, optical drives, video card, sound card, and other
ports and expansion cards directly or via cables. It can be considered as the backbone of a computer.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 9


General Paper-I (Sample Theory)

The motherboard is mounted inside the case and is securely attached via small screws through
pre-drilled holes. Motherboard contains ports to connect all of the internal components. It provides a
single socket for CPU whereas for memory, normally one or more slots are available. Motherboards
provide ports to attach floppy drive, hard drive, and optical drives via ribbon cables. Motherboard carries
fans and a special port designed for power supply.
There is a peripheral card slot in front of the motherboard using which video cards, sound cards
and other expansion cards can be connected to motherboard. On the left side, motherboards carry a
number of ports connect monitor, printer, mouse, key board, speaker and network cables. Motherboards
also provide USB ports which allow compatible devices to be connected in plug-in/plug-out fashion for
example, pen drive, digital cameras etc.
Q. A Personal Computer uses a number of chips mounted on a circuit board called
(Dec. 2012)
(A) Microprocessor (B) System Board
(C) Daughter Board (D) Mother Board
Ans. (D)
Real Time Operating System : A real-time operating system (RTOS) is an operating system
that guarantees a certain capability within a specified time constraint. For example, an operating system
might be designed to ensure that a certain object was available for a robot on an assembly line. The
Operating system must guarantee response to events within fixed periods of time to ensure correct
performance.
To specify the timing constraints of real-time systems - Hard temporal constraints - Soft
temporal constraints
Soft Real-Time System : To achieve predictability on satisfying their timing constraints, possibly,
with the existence of other real-time systems
 A soft real-time system is one where the response time is normally specified as an
average value. This time is normally dictated by the business or market.
 A single computation arriving late is not significant to the operation of the system, though
many late arrivals might be.
 Ex: Airline reservation system - If a single computation is late, the system's response time
may lag. However, the only consequence would be a frustrated potential passenger.
Hard Real Time System : A hard real-time system is one where the response time is specified
as an absolute value. This time is normally dictated by the environment.
A system is called a hard real-time if tasks always must finish execution before their deadlines
or if message always can be delivered within a specified time interval.
Hard real-time is often associated with safety critical applications. A failure (e.g. missing
a deadline) in a safety-critical application can lead to loss of human life or severe economic
damage.
Spooling : Spooling refers to putting data of various I/O jobs in a buffer. This buffer is a special
area in memory or hard
Disk which is accessible to I/O devices.
An operating system does the following activities related to distributed environment:
 Handles I/O device data spooling as devices have different data access rates.
 Maintains the spooling buffer which provides a waiting station where data can rest while
the slower device catches up.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 10


General Paper-I (Sample Theory)

Hardware and Software


Hardware is a physical element of a computer. This is also called the machinery or the equipment
of the computer. Such as keyboard, monitor, CPU. However most of a computer's hardware cannot be
seen in other word it is not an external element of a computer. Computer hardware is comprised of many
different parts but perhaps the most important of these is the motherboard. The motherboard is made
up of even more parts that power and control of the computer.
Software is a general term used for computer programs that control the operations of the
computer. A program is a sequence of instructions that perform a particular task. A set of programs form
a software. It is the software which gives hardware its capability. Hardware is of no use without software
and software cannot be used without hardware.
Types of Software
 System Software
 Application Software
 Utility Software
System Software : It is help run the computer hardware. System software includes operating
systems, device drivers, diagnostic tool etc. it is always pre- installed on computer.
Application Software : Application software, or simply applications, are often called productivity
programs or end-user programs because they enable the user to complete tasks, such as creating
documents, spreadsheets, databases and publications, doing online research, sending email, designing
graphics, running businesses, and even playing games! Application software is specific to the task it is
designed for and can be as simple as a calculator application or as complex as a word processing
application. It is designed by programmer for easy task users.
Utility Software : Utility software helps to manage, maintain and control computer resources.
Operating systems typically contain the necessary tools for this, but separate utility programs can
provide improved functionality. Utility software is often somewhat technical and targeted at users with
a solid knowledge of computers.
For example utility programs are antivirus software, backup software and disk tools.
Firmware such as the ROM BIOS of a personal computer may contain only elementary basic
functions of a device and may only provide services to higher-level software. Firmware such as the
program of an embedded system may be the only program that will run on the system and provide all
of its functions.
Q. A Compiler is a software which converts (June 2013)
(A) characters to bits
(B) high level language to machine language
(C) machine language to high level language
(D) words to bits
Ans. (B)

Q. Which of the following is an open source software ? (June 2015)


(1) MS Word (2) Windows
(3) Mozilla Firefox (4) Acrobat Reader
Ans. (3)
Graphical User Interface (GUI)
The Graphical user interface (GUI) is a type of user interface that allows users to Interact with
electronic devices through graphical icons and visual indicators such as secondary notation, instead of
text-based user interfaces typed command labels or text navigation.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 11


General Paper-I (Sample Theory)

A GUI uses windows, icons, and menus to carry out commands, such as opening, deleting, and
moving files. Although many GUI operating systems are navigated through the use of a mouse, the
keyboard can also be utilized by using keyboard shortcuts or arrow keys.
Unlike a command line operating system or CUI, like Unix or MS-DOS, GUI operating systems
are much easier to learn and use because commands do not need to be memorized. Additionally, users
do not need to know any programming languages. Because of their ease of use, GUI operating systems
have become the dominant operating system used by today's end-users.
The GUI was first developed at Xerox PARC by Alan Kay, Douglas Engel bart, and a group of
other researchers in 1981. Later, Apple introduced the Lisa computer, the first commercially available
computer, on January 19, 1983.
What are examples of a GUI operating system :
 Microsoft Windows
 Apple System 7 and mac OS
 Chrome OS
 Linux variants like Ubuntu
Q. Which one of the following is not a/an image/graphic file format ? (June 2014)
(A) PNG (B) GIF
(C) BMP (D) GUI
Ans. (D)

Picture Format
 JPEG (or JPG, for the File Extension; Joint Photographic Experts Group) : Most
digital cameras store photos in JPEG format, because then you can take more photos
on one camera card than you can with other formats.
 PNG (Portable Network Graphics) : It's used almost exclusively for web images, never
for print images. For photographs, PNG is not as good as JPEG, because it creates a
larger file. But for images with some text, or line art, it's better, because the images look
less "bit mappy."
 BMP (Bitmap) : A bit map (often spelled "bitmap") defines a display space and the color
for each pixel or "bit" in the display space. A Graphics Interchange Format and a JPEG
are examples of graphic image file types that contain bit maps.
 GIF (Graphics Interchange Format) : GIFs also have an extremely limited color range
suitable for the web but not for printing. This format is never used for photography,
because of the limited number of colors. GIFs can also be used for animations.
 TIFF (Tagged Image File Format) : TIFF images create very large file sizes. TIFF
images are uncompressed and thus contain a lot of detailed image data (which is why
the files are so big) TIFFs are also extremely flexible in terms of color (they can be gray
scale, or CMYK for print, or RGB for web) and content (layers, image tags).
Q. gif, jpg, bmp, png are used as extensions for files which store (Dec. 2014)
(A) audio data (B) image data
(C) video data (D) text data
Ans. (B)

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 12


General Paper-I (Sample Theory)

Input and Output Device


Input Device : Input devices allow us to send information to the computer. Input is usually given
by clicking the mouse or typing on the keyboard.
Examples of some input devices are :
 Keyboard
 Mouse
 Joystick
 Microphone
 Bar code reader
 Graphics tablet
 Pen drive
 CD/DVD
 Digital Camera
Pick Device : Pick devices are used to select an object on the screen. The selected object can
be text or graphics. Examples of pick devices are light pens and touch screens.
Light Pens : A Light pen is a pen like light-sensitive device. It is connected by a wire to the
computer terminal to detect the CRT beam when pointed towards the screen and generate a narrow
electrical pulse that can be fed to the computer as an input signal.
Touch Screens : Touch screens are monitors / electronic visual display screens which detect
where they are being touched. The user makes selections by directly touching the screen. ATM machines
for making it user friendly and Kiosk machines are used for guiding the travelers about their travel plans.
Touch screens are also used in many of the modern cell phones.
Source Data Entry Devices : Entry of data into a computer system directly from the source,
without transcription is called source data entry. Source data entry devices have a lower probability of
error in input data than standard keyboard entry. Some of the common source data entry devices are
discussed below :
Digital Camera A Digital camera is an electronic device which takes video or still photographs
or both, digitally by recording images via an electronic image sensor. Digital cameras look like ordinary
cameras but have sufficient memory in the form of chips to store thousands of images, rather than using
photographic films.
Scanners A Scanner is an input device and is used to input data into the computer system in
the form of pictures. It optically scans images, printed text, handwriting, or an object, and converts it
to a digital image
Optical Mark Recognition (OMR) : OMR is the scanning of paper to detect the presence or
absence of a mark in a predetermined position. OMR can dictate 2000 copies in hours.
Magnetic Ink Character Recognition (MICR) : Magnetic Ink Character Recognition is a character
recognition system that uses special ink and characters. When a document that contains this ink needs
to be read, it passes through a machine, which magnetizes the ink and then translates the magnetic
information into characters.
MICR technology is used by banks for faster processing of large volumes of cheques.
Bar Code Reader : A barcode reader is an electronic device which is used to read printed
barcodes. Barcodes represent alphanumeric data which is a combination of vertical lines (bars) that vary
in width and length.
The bar code is 13 digits long and it has four main divisions. The First two digits of a bar code
represent the country, the second part represents the manufacturer's code (five digits) the third part
represents the product code (five digits) and the last digit is a check digit
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 13
General Paper-I (Sample Theory)

Q. Which of the following is not an input device ? (June, 2015)


(1) Microphone (2) Keyboard
(3) Joystick (4) Monitor
Ans. (4)

Output Device : An output device is used to send data out of the system. The user sees the
result after processing of data by the computer through output devices.
Examples of some output devices are:
 Monitor
 Printer
 Plotter
 Speaker
Monitor
Cathode Ray Tube Monitors (CRT) The main components of a CRT monitors are the electron
gun, the electron beam controlled by an electromagnetic field and phosphor coated display screen.
These older monitors are bulky and require a lot of space for installation. A Graphic display is made up
of a series of dots called 'pixels' (picture In CRT monitors, the image is projected on the screen by
directing the electron beam onto the computer screen.
Liquid Crystal Displays (LCD) First introduced in watches and clocks in the 1970's, LCDs are
now used to display images in monitors. A newer technology in computer screens is TFT LCD monitors.
These are light weight monitors and are used in laptop computers.
Thin Film Transistor Liquid Crystal Display (TFT LCD) It is type of monitor which used thin
film transistor technology to enhance the image quality of LCD Monitors. These are used as monitor in
television set, desktop computer, laptop computer and mobile phones etc.
Light Emitting Diodes Monitors (LED) LED is light weight monitors and is used in laptop
computers and in TV. The Life of LED monitors is three times than that of LCD monitors and they have
less warm up time than that of CRT or LCD monitors. These monitors require less space on the desk,
less power consumption and have flicker free screen.
Projection Displays These are normally used for large group presentations. These systems can
be connected to a computer and whatever appears on the computer terminal gets enlarged and projected
on a large screen. Video projector receives video signals and projects the corresponding image on a
projection screen. It uses a lens system for this projection.
Printers are used for producing output on paper. Printing devices which can be classified
according to the print quality and printing speed. These varieties of printers are :

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 14


General Paper-I (Sample Theory)

Printers can be divided into two main categories :


Impact Printers : It uses hammers or pins strike against a ribbon and paper to print the text.
This mechanism is known as electro-mechanical mechanism. They are of two types.
 Character Printer
 Line Printer
Character Printer : It prints only one character at a time. It has relatively slower speed. e.g. Dot
matrix printers.
Dot Matrix Printer : It prints characters as combination of dots. These have a matrix of pins on
the print head of the printer which form the character. There is a carbon between the pins & the paper.
The words get printed on the paper when the pin strikes the carbon. There are generally 9 or 24 pins.
Line Printer : The line printer is an impact computer printer that prints one entire line of text at
a time. It is mostly associated with unit record equipment and the early days of digital computing, but
the technology is still in use.
Non-Impact Printers : There printers use non-Impact technology such as ink-jet or laser
technology. There printers provide better quality of output at higher speed. These printers are of two
types:
 Ink-Jet Printer
 Laser Printer
Ink-Jet Printer : It prints characters by spraying patterns of ink on the paper from a nozzle or
jet. It prints from nozzles having very fine holes, from which ink is pumped out to create various letters
and shapes.
Laser Printer : It utilizes a laser beam to produce an image on a drum. The light of the laser
alters the electrical charge on the drum wherever it hits. The drum is then rolled through a reservoir of
toner, which is picked up by the charged portions of the drum. Finally, the toner is transferred to the
paper through a combination of heat and pressure. They are much quieter than dot-matrix. They are
also relatively fast. The speed of laser printers ranges from about 4 to 20 pages of text per minute
(ppm).
Q. Which of the following is not an output device ? (June 2015)
(A) Printer (B) Speaker
(C) Monitor (D) Keyboard
Ans. (D)

Plotters
Plotters produce high quality diagrams on the paper and their output quality is good. Engineers,
architects and planners use plotters to generate high quality, high-precision graphic output of different
sizes. For several design applications such as (CAD) design of layout of an aircraft, car, and architectural
design of a building and in other computer-aided design applications plotter are very useful.
(CAM)-Engineers, architects and planners use plotters to generate high quality, high-precision
graphic output of different sizes
Plotter is of two types :
 Drum Plotter
 Flat-Bed Plotter
Computer Aided Design (CAD)
Computer Aided Design (CAD) software are used to create two and three-dimensional architectural
design. Architects and designers usually make use of it in drafting and designing bridges, buildings, etc.
and have been found to be very useful as instead of redrawing the whole plan one can modify or redraw
with just a few clicks of mouse. Autodesk Streamline, AutoCAD, DW Gcolumn are a few such software.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 15
General Paper-I (Sample Theory)

Use of CAD
 Saves time in making and editing the drawings
 Enables the designers to lay out and develop work on the screen
 Provides print out of the designs reduces the design cycle and over all product development
costs Stores the designs for future purposes in digital form thus occupying practically no
space.
Computer Aided Manufacturing (CAM)
Computer-aided manufacturing (CAM) is an application technology that uses computer software
and machinery to facilitate and automate manufacturing processes. CAM is the successor of computer-
aided engineering (CAE) and is often used in tandem with computer-aided design (CAD). CAM may also
refer to the use of a computer to assist in all operations of a manufacturing plant, including planning,
management, transportation and storage.
In addition to materials requirements, modern CAM systems include real-time controls and
robotics.
Use of CAM
 CAM is faster because machining speeds are higher
 Every finished product is the same time and accurate.
 Production can run 24 hours a day, 7 days a week
 CAM is able to machine difficult shapes, eg tracks on a circuit boards
Port
Port is a connecting socket, outside the system into which different types of cables are plugged.
I/O ports are the interfaces through which computers communicate with external devices such as
printers, modems, joysticks and terminals. There are many types of ports used in computer system.
Parallel Port
Various peripherals can be connected through parallel port, which is a parallel communication
physical interface. A parallel port transmits 8 bits of a byte of data in parallel. It is used for transmitting
fast data over short distances. It is used to connect a printer to a computer.

Serial Port
Serial port transmits one bit of a byte, one at a time as a single stream of bits. It is meant for
transmitting slow data over long distances. Communication over a phone is an example of serial
communication. Dial-up modems and serial mice use serial ports.

Universal Serial Bus (USB)


A USB Port can connect up to 127 peripheral devices such as a digital camera, digital speakers,
scanners, speakers etc.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 16


General Paper-I (Sample Theory)

Small Computer System Interface (SCSI) Port


SCSI interfaces can be used internally to connect different types of hard ware devices directly
to a mother board or storage controller card. When used internally, devices are attached through a
ribbon cable.
Memory
Computer memory is any physical device capable of storing information temporarily or permanently.
For example, Random Access Memory (RAM) is a volatile memory that stores information on an
integrated circuit used by the operating system, software and hardware.
Types of Memory
Primary : Memory attached to the CPU is used for storage of data and instructions and is called
internal memory. The internal memory is also called the Primary memory or Main memory. Primary
memory or main memory is a Metal Oxide Semiconductor (MOS) memory used for storing program and
data during the execution of the program.
Example of Primary Memory
Random Access Memory (RAM) : The primary storage is referred to as random access memory
(RAM) due to the random selection of memory locations. It performs both read and write operations on
memory. This is two type
 SDRM (Stands for Static - Random Access) : In this RAM the stored data will be lost
only after the computer switch off.
 DRAM (Dynamic - Random Access Memory) : In this RAM the stored data will be lost
after few millisecond even if the computer is in "on" state
Read Only Memory : ROM is also formed by Integrated Circuits. The data which is stored in
ROM is permanent. The ROM can only read the data by CPU but can't be edited or manipulated. ROM
is a non-volatile memory because it will not lose its contents when there is a power failure in the
computer system. The contents in the ROM can neither be changed nor deleted.
 PROM (Programmable Read Memory) : Once the programs are written it cannot be
changed and remain intact even if the power is switched off. Therefore programs written
in PROM cannot be erased or edited.
 EPROM : Erasable Programmable Read Only Memory designed for recover the problems
of PROM and ROM. Users can delete the data of EPROM thorough pass on ultraviolet
light and it erases chip is reprogrammed.
 EEPROM : Electrically Erasable Programmable Read Only Memory similar to the EPROM
but it uses electrical beam for erase the data of ROM.
Cache Memory : Main memory less than the access time of CPU so, the performance will
decrease through less access time. Speed mismatch will decrease through maintain cache memory. All
types of external media like Magnetic disks, Magnetic drives and etc. store in cache memory to provide
quick access tools to the users.
Flash memory : It is a non-volatile computer memory that can be electrically erased and
reprogrammed. Examples are memory cards, chips, pen drives, and USB flash drives etc. flash memory
costs very less than byte-programmable EEPROM. It is very portable in nature.
Q. When a computer is booting, BIOS is loaded to the memory by
(A) RAM (B) ROM
(C) CD-ROM (D) TCP (June 2014)
Ans. (B)

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 17


General Paper-I (Sample Theory)

Virtual Memory : A computer can address more memory than the amount physically installed
on the system. This extra memory is actually called virtual memory and it is a section of a hard disk
that's set up to emulate the computer's RAM.
Virtual memory is a memory management capability of an OS that uses hardware and software
to allow a computer to compensate for physical memory shortages by temporarily transferring data from
random access memory (RAM) to dusk storage. Virtual address space is increased using active memory
in RAM and inactive memory in hard disk drives (HDDs) to form contiguous addresses that hold both
the application and its data.
Q. Virtual memory is (June 2013)
(A) an extremely large main memory
(B) an extremely large secondary memory
(C) an illusion of extremely large main memory
(D) a type of memory used in super computers
Ans. (C)

Q. Virtual reality provides (Dec. 2013)


(A) Sharp pictures (B) Individual audio
(C) Participatory experience (D) Preview of new films
Ans. (C)

Q. The first virtual university of India came up in (Dec. 2013)


(A) Andhra Pradesh (B) Maharashtra
(C) Uttar Pradesh (D) Tamil Nadu
Ans. (D)

Q. _________ is a type of memory circuitry that holds the computer's start-up routine.
(July 2016)
(1) RIM (Read Initial Memory) (2) RAM (Random Access Memory)
(3) ROM (Read Only Memory) (4) Cache Memory
Ans. (3)

Q. Which of the following correctly lists computer memory types from highest to lowest speed ?
(Jan. 2017)
(1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Ans. (3)

Secondary Memory : Secondary is a memory that keeps its contents even if the power is lost.
This is external and permanent memory that is useful to store the external storage media such as floppy
disk, magnetic disks, magnetic tapes and etc. cache devices.
Main secondary memory are :
1. Magnetic Disk
2. Magnetic Drum
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 18
General Paper-I (Sample Theory)

3. C-D Rom
4. Hard Disk
5. Floppy Disk
Magnetic Disk
Magnetic Disk is a circular metal plate coated on both side by ferrous oxide material. The surface
of the magnetic disk is divided into number of invisible concentric circles called "tracks" and these tracks
are further subdivided into "sectors", "blocks" etc. each its own unique addresses to facilitate the location
of data and the Disk moves on a vertical rotating spindle. Data is recorded in the form of magnetized
spots on the tracks of the disk, a spot representing the presence by "1" and its absence by "0" enabling
representing of data in binary form.
Magnetic Drum
It is a metallic cylinder coated with a special magnetic alloy. Data is stored in this surface as
minute magnetized spoke arranged in binary form in a series of parallel circular tracks. The magnetic
drum provides random access storage.
CD-Rom (Compact Disk Read Only Memory)
CD-ROM (Compact Disc Read Only Memory) is a Compact Disc contains data accessible by a
computer. While the Compact Disc format was originally designed for music storage and play back, the
format was later adapted to hold any form of binary data. The CR-ROM is also known as a laser disc,
which is shiny metal like disk. The diameter of the disk is 5.25 inches or 12 cm disk. Information of 650
MB can be stored which is equal to nearly 2, 50,000 pages of printed text.
Q. The process of copying files to a CD-ROM is known as (Aug. 2016)
(1) Burning (2) Zipping
(3) Digitizing (4) Ripping
Ans. (1)

Hard Disk
A hard disk consists of one or more rigid metal plates coated with a metal oxide material that
allows data to be magnetically recorded on the surface of the platters. It is a non-volatile secondary
storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaced.
The hard disk is an electro mechanical device. The hard disk is also known as Winchester disk.
Floppy Disk
These are also called as flexible disks. These are used in the smallest microcomputer systems
as well as mini computers. Floppy disks have higher storage capacity and offer direct access capability.
The floppy disk is permanently sealed in a plastic coated jacket and the whole package is inserted the
floppy drive for data recording and retrieval.
Q. A hard disk is divided into tracks which is further subdivided into (June. 2013)
(A) Clusters (B) Sectors
(C) Vectors (D) Heads
Ans. (B)

Q. DVD technology uses an optical media to store the digital data. DVD is an acronym for
(Jan. 2017)
(1) Digital Vector Disc (2) Digital Volume Disc
(3) Digital Versatile Disc (4) Digital Visualization Disc
Ans. (3)

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 19


General Paper-I (Sample Theory)

Volatile Memory : Volatile memory is a Primary memory because memory loses its contents
when the computer or hardware device loses power. Computer RAM is an example of a volatile memory
and is why if your computer switch off when working on a program and lose anything that hasn't been
saved.
Non-Volatile Memory : Non-volatile memory is a memory that keeps its contents even if the
power is lost. This is external and permanent memory that is useful to store the external storage media
such as floppy disk, magnetic disks, magnetic tapes and etc. cache devices.
Q. Random Access Memory (RAM), a form of computer storage, is a ______ memory.
(July 2016)
(1) Non-Volatile (2) Volatile
(3) Permanent (4) Secondary
Ans. (2)

Memory Unit
1 Bit Binary Digit
4 Bit 1 Nibble
8 Bits 1 Byte
1024 Bytes 1 KB (Kilo Byte) = 210
1024 KB 1 MB (Mega Byte) = 220
1024 MB 1 GB(Giga Byte) = 230
1024 GB 1 TB(Terra Byte) = 240
1024 TB 1 PB(Peta Byte) = 250
1024 PB 1 EB(Exa Byte) = 260
1024 EB 1 ZB(Zetta Byte) = 270
1024 ZB 1 YB (Yotta Byte) = 280
1024 YB 1 (Bronto Byte)
1024 Bronto byte 1 (Geop Byte)

Q. A Gigabyte is equal to (June, 2013)


(A) 1024 Megabytes (B) 1024 Kilobytes
(C) 1024 Terabytes (D) 1024 Bytes
Ans. (A)

Q. Which of the following represents one billion characters ? (June, 2015)


(A) Kilobyte (B) Megabyte
(C) Gigabyte (D) Terabyte
Ans. (C)

Q. In a Computer a byte generally consists of : (Dec, 2015)


(1) 4 bits (2) 8 bits
(3) 16 bits (4) 10 bits
Ans. (2)

Q. If one Giga Byte is equal to 230 Bytes of data storage, then 1024 Tera Bytes is equal to _____
bits of data storage. (Aug., 2016)
50 53
(1) 2 (2) 2
(3) 240 (4) 256
Ans. (1)
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 20
General Paper-I (Sample Questions)

Sample Questions With Solutions

1. ICT represents
(A) International Communication Technology
(B) Intra Common technology
(C) Inter Connected Terminals
(D) Information and Communication Technology

2. Which Institute was set up by Govt. of India to catalyze E-Governance activities


(A) NIC (B) NASSCOM
(C) MIT (D) FICCI

3. What does term SWAN refers to :


(A) Stable Wide Area Network (B) Static Wide Area Network
(C) State Wide Area Network (D) Suitable wide Area Network

4. Charles Babbage is called the father of the


(A) Computer (B) E-Mail
(C) E-Commerce (D) Internet

5. What does acronym for NIC body for E-Governance expand to?
(A) Novel Industrial Center (B) National Industrial Center
(C) Nodal Industrial Center (D) National Informatics Center

6. Which of the following is not a language ?


(A) COBOL (B) PASCAL
(C) UNIX (D) FORTRAN

7. WWW means
(A) World Wide Web (B) World Wide Work
(C) World Website Work (D) Work World Wide

8. HTML Stands for


(A) Hyper technology memory language
(B) Hyper Text Mark-up language
(C) Hyper Text Make up locator
(D) None of the these

9. What is the SPAM ?


(A) Electronic Junk Mail (B) Mail Service
(C) Internet Connection (D) None of the these
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 21
General Paper-I (Sample Questions)

10. MIS stands for


(A) Management information System (B) Memory Information System
(C) Memory Information Structure (D) None of these

ANSWER KEY
1 2 3 4 5 6 7 8 9 10
D A C A D C A B A A

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 22


General Paper-I (Sample Questions)

SOLUTIONS

1. (D) ICT is synonym of Information and Communication Technology (ICT).


2. (A) National Informatics Centre (NIC) was established in 1976, and has since emerged as a
"prime builder" of e-Government / e-Governance applications up to the grassroots level as
well as a promoter of digital opportunities for sustainable development.
3. (C) State Wide Area Network (SWAN) are based on multi-tiers of Network connectivity
model, which comprise of State Head Quarter, District Head Quarters and Tehsil Head
Quarters etc.
4. (A) Charles Babbage was considered to be the father of computer after his invention and
concept of the Analytical Engine in 1837.
5. (D) National Informatics Center (NIC) is helping the Government departments go paperless
or become offices with less paper.
6. (C) Unix is operating system while COBOL, PASCAL and FORTRAN are high level language.
7. (A) When most people think of the internet, the first thing they think about is the World Wide
Web. Nowadays, the terms "internet" and "World Wide Web" are often used interchangeably-
but they're actually not the same thing.
8. (B) HTML is used to create electronic documents (called pages) that are displayed on the
World Wide Web. Each page contains a series of connections to other pages called
hyperlinks.
9. (A) Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred
to as spam.
10. (A) MIS (Management Information System) is the use of information technology, people, and
business processes to record, store and process data to produce information that decision
makers can use to make day to day decisions.

Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 23

Вам также может понравиться