TAGORE COLLEGE OF ARTS & SCIENCE
(Affiliated to the University of Madras)
Chromepet, Chennai- 600 044
Internal Quality Assurance Cell
Five Days Virtual Faculty Development Program
JRF/NET/SET – PAPER I
INFORMATION AND
COMMUNICATION TECHNOLOGY
Introduction to computer
Computer is an electronic device that receives input, stores or processes the
input as per user instructions and provides output in desired format.
Computer input is called data and the output obtained after processing it,
based on user’s instructions is called information.
Raw facts and figures which can be processed using arithmetic and logical
operations to obtain information are called data.
Characteristics of Computer
Speed − Typically, a computer can carry out 3-4 million instructions per second.
Accuracy − Computers exhibit a very high degree of accuracy. Errors that may occur
are usually due to inaccurate data, wrong instructions or bug in chips – all human
errors.
Reliability − Computers can carry out same type of work repeatedly without throwing
up errors due to tiredness or boredom, which are very common among humans.
Storage Capacity − Computers can store a very large amount of data at a fraction of
cost of traditional storage of files. Also, data is safe from normal wear and tear
associated with paper.
Input Devices
Keyboard
Mouse
Joy Stick
Light pen
Track Ball
Scanner
Graphic Tablet
Microphone
Magnetic Ink Character Recognition(MICR)
Optical Character Recognition(OCR)
Bar Code Reader
Optical Mark Recognition(OMR)
OUTPUT DEVICES
Monitors
Graphic Plotter
Printer
Memory
BASIC UNITS OF MEMORY
BOOTING
Starting a computer or a computer –embedded device is called booting.
Booting Steps
Switching on power supply
Loading OS into computers main memory
Keeping all applications in a state o readiness in needed by the user.
The first program or set of instructions that run when the computer is switched on is called BIOS
(Basic Input Output System).
BIOS is a firmware.
Restarting a system when it is already running is rebooting.
Rebooting may be required if
A software or hardware has been installed.
System is unusually slow.
Two types o booting:
1. Cold Booting:
System is started by switching on the computer through
power supply. The next step in cold booting is loading of BIOS.
2. Warm Booting:
When the system is already running and needs to be restarted or rebooted. It is called
warm booting.
Warm booting is faster than Cold booting.
Language Processor
Machine-level language − This language is nothing but a string of 0s and 1s
that the machines can understand. It is completely machine dependent.
Assembly-level language − This language introduces a layer of abstraction by
defining mnemonics. Mnemonics are English like words or symbols used to
denote a long string of 0s and 1s. For example, the word “READ” can be
defined to mean that computer has to retrieve data from the memory. The
complete instruction will also tell the memory address. Assembly level
language is machine dependent.
High level language − This language uses English like statements and is
completely independent of machines. Programs written using high level
languages are easy to create, read and understand.
GENERATIONS OF
COMPUTER
Types of Computer
We can categorize computer in two ways: on the basis of data handling
capabilities and size.
On the basis of data handling capabilities, the computer is
of three types:
Analogue Computer
Digital Computer
Hybrid Computer
Analogue Computer
Analogue computers are designed to process analogue data. Analogue data is
continuous data that changes continuously and cannot have discrete values.
Analogue computers directly accept the data from the measuring device
without first converting it into numbers and codes.
They measure the continuous changes in physical quantity and generally render
output as a reading on a dial or scale. Speedometer and mercury
thermometer are examples of analogue computers.
Digital Computer
Digital computer is designed to perform calculations and logical operations at
high speed.
It accepts the raw data as input in the form of digits or binary numbers (0 and
1) and processes it with programs stored in its memory to produce the output.
All modern computers like laptops, desktops including smart phones that we
use at home or office are digital computers.
Hybrid Computer
Hybrid computer has features of both analogue and digital computer. It is fast
like an analogue computer and has memory and accuracy like digital
computers.
It can process both continuous and discrete data. It accepts analogue signals
and convert them into digital form before processing. So, it is widely used in
specialized applications where both analogue and digital data is processed.
For example, a processor is used in petrol pumps that converts the
measurements of fuel flow into quantity and price. Similarly, they are used in
airplanes, hospitals, and scientific applications.
On the basis of size, the computer can be of five types:
Supercomputer
Supercomputers are the biggest and fastest computers. They are designed to
process huge amount of data.
A supercomputer can process trillions of instructions in a second. It has
thousands of interconnected processors.
Supercomputers are the fastest computers on Earth. They are used for
carrying out complex, fast and time intensive calculations for scientific and
engineering applications.
Mainframe computer
Mainframe computers are designed to support hundreds or thousands of users
simultaneously. They can support multiple programs at the same time. It means
they can execute different processes simultaneously.
These features of mainframe computers make them ideal for big organizations
like banking and telecom sectors, which need to manage and process high
volume of data.
Mainframe computers are designed to support hundreds or thousands of users
simultaneously. They can support multiple programs at the same time. It
means they can execute different processes simultaneously.
Minicomputer
It is a midsize multiprocessing computer. It consists of two or more processors
and can support 4 to 200 users at one time.
Mini computers are used in institutes and departments for tasks such as
billing, accounting and inventory management.
A minicomputer lies between the mainframe and microcomputer as it is
smaller than mainframe but larger than a microcomputer.
Microcomputer
Microcomputer is also known as a personal computer. It is a general-purpose
computer that is designed for individual use.
It has a microprocessor as a central processing unit, memory, storage area,
input unit and output unit. Laptops and desktop computers are examples of
microcomputers.
They are suitable for personal work that may be making an assignment,
watching a movie, or at office for office work.
What does Open-source mean?
The term Open-source is closely related to Open-source software (OSS).
Open-source software is a type of computer software that is released under
a license, but the source code is made available to all the users.
The copyright holders of such software allow the users to use it and do some
valuable modifications in its source code to add some new features, to
improve the existing features, and to fix bugs if there are any.
Because of this reason only Open-source software is mostly developed
collaboratively.
Some famous examples of Open-source products are :
• Operating systems –
Android, Ubuntu, Linux
• Internet browsers –
Mozilla Firefox, Chromium
• Integrated Development Environment (IDEs) –
Vs code (Visual Studio Code), Android Studio, PyCharm, Xcode
Freeware
Freeware is software which the users can use free of cost. Moreover,
there are no restrictions on the use limit, the number of times one
can download the software, etc.
Besides, it depends on the owner of the software to pose the
restrictions. Some organizations keep restrictions on distribution or
modification while others may not.
Furthermore, it does not mean that the source code is also available
along with the software. We can say that these are closed source
software.
Advantages of freeware are as follows:
• Available to users free of cost.
• Distribution is free of cost.
Shareware
This software is available free of cost but only up to a certain time
limit. Furthermore, after the time limit, the user has to pay the
money to use the software. Since, after the time limit, the software
deactivates itself.
Its main advantage is that users can understand and know about
the software before buying it.
Examples are WinZip, Adobe Acrobat 8 Professional, GetRight, etc.
Proprietary Software
It is software that is available only after buying the proper license of the software.
moreover, only the owner has the right to change or sell the software.
The owner can be an individual developer or an organization. Closed Source
Software or Commercial Software is its other name.
Besides, it has certain restrictions like:
• The number of people who can use the software is limited.
• Requires a license.
• Users cannot distribute the software further
• The system or type of environment that the software requires.
Examples are macOS, Adobe Suite, Microsoft Windows Professional Edition.
What is a Computer Virus?
A computer virus is a sort of malware that attaches itself to another
program and can replicate and propagate once it has been installed
on a user’s computer.
For example, you may receive an email with a harmful attachment,
inadvertently open the file, and the computer virus then infects your
machine. Or in other words, a harmful software application that is
installed without the user’s knowledge/ consent on their computer
and then performs some malicious acts is known as a virus.
A virus attaches itself to another software, once infected the system,
in such a way that the host program’s execution activates the virus’s
actions simultaneously. It has the ability to self-replicate itself into
other programs or files and infecting them.
Spyware
Spyware is malicious software that enters a user's computer, gathers data from
the device and user, and sends it to third parties without their consent. A
commonly accepted spyware definition is a strand of malware designed to
access and damage a device without the user's consent.
Trojan
A Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program. The delivery method typically sees an
attacker use social engineering to hide malicious code within legitimate
software to try and gain users' system access with their software.
Worm
A computer worm is a subset of the Trojan horse malware that can propagate or
self-replicate from one computer to another without human activation after
breaching a system. Typically, a worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
Logic Bomb
A logic bomb is a set of instructions in a program carrying a malicious
payload that can attack an operating system, program, or network. It only
goes off after certain conditions are met. A simple example of these
conditions is a specific date or time.
Phishing:
A technique for attempting to acquire sensitive data, such as bank account
numbers, through a fraudulent solicitation in email or on a web site, in
which the perpetrator masquerades as a legitimate business or reputable
person.
Cyber Venting:
Cyber-venting is the act of bad-mouthing about one's employer, senior
executives, colleagues, etc. with the intention of letting off the steam,
using websites and making such comments public for all to see them.
Pharming
Pharming is online fraud that involves the use of malicious code to direct victim
to spoofed websites in an attempt to steal their credential and data.
Mentimeter
Mentimeter enables you to: Engage with students using live polls, word clouds,
quizzes, multiple-choice questions and more. Track learning and understanding
by asking questions and downloading results. Communicate and interact with
your students.
Even if students are not able to attend school or university in person,
Mentimeter allows them to continue learning in an engaging and interactive
manner.
Mentimeter enables you to:
• Engage with students using live polls, word clouds, quizzes, multiple-choice
questions and more
• Track learning and understanding by asking questions and downloading
results
• Communicate and interact with your students
• Stay up-to-date with the teaching syllabus so that no one misses a thing
• Enable Q&A so that queries and questions can be discussed, explained and
clarified
Kahoot:
Kahoot! is a game-based learning platform that makes it easy to
create, share and play learning games or trivia quizzes in minutes.
Kahoot is a free student-response tool for administering
quizzes, facilitating discussions, and collecting survey data. It is
a game-based classroom response system played in real time.
Kahoot is an assessment tool. It supports pre-assessments,
productive formative assessments and student reflection ,
through fun quizzing, quick polls and surveys.
Padlet:
Padlet is a free online tool that is best described as an online
notice board. Padlet can be used by students and teachers to
post notes on a common page. The notes posted by teachers
and students can contain links, videos, images and document
files.
As such, the use of Padlet as an educational tool promotes
creativity and collaborative learning among students and serves
as a valuable learning resource. Advances in technology have
created a space in which faculty members can communicate,
collaborate, and share resources.
Give below are two statements:
Statement I: Shareware is limited - functioning freeware, and normally expires
after a week or month.
Statement II: Shareware code can be modified and redistributed.
In the light of the above statements, choose the most appropriate answer from
the options given below:
1. Both Statement I and Statement II are true
2. Both Statement I and Statement II are false
3. Statement I is true but Statement II is false
4. Statement I is false but Statement II is true
Which of the following is a tool used for creating and sharing online learning
games?
1. Mentimeter
2. Padlet
3. Kahoot
4. Zoom
Given below are two statements:
Statement I: Mentimeter is a tool used for creating interactive videos in education.
Statement II: Kahoot is a tool used for assessment in education.
In the light of the above statements, choose the correct answer from the options
given below
1. Both Statement I and Statement II are true
2. Both Statement I and Statement II are false
3. Statement I is true but Statement II is false
4. Statement I is false but Statement II is true
Match List –I with List-II in the context of computer networking:
List I List II
a) VOIP i) makes use of light pulses to
transmit data
b) Fibre-optic ii) Use of Internet to make phone
cable calls.
c) URL iii) Most appropriate to connect
computers in a small building
d) UTP cable iv) Text used by web browsers to
locate a web address on the internet.
A) (a)-iv), (b)-(i), (c)-(ii), (d)-(iii)
B) (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)
C) (a)-(ii), (b)-(iii), (c) -(iv), (d)-(i)
D) (a)-(iv), (b)-(iii), (c) –(ii), (d)-(i)
Dec 2019
NUMBER SYSTEMS
S.No. Number System and Description
Binary Number System
Base 2. Digits used : 0, 1
1
Octal Number System
Base 8. Digits used : 0 to 7
2
Hexa Decimal Number System
Base 16. Digits used: 0 to 9, Letters used : A- F
3
Binary Number System
Characteristics of the binary number system are as follows −
Uses two digits, 0 and 1
Also called as base 2 number system
Each position in a binary number represents a 0 power of the base (2). Example
20
Last position in a binary number represents a x power of the base (2). Example
2x where x represents the last position - 1.
Example
Binary Number: 10101 2
Step Binary Number Decimal Number
Step 1 101012 ((1 x 24) + (0 x 23) + (1 x
22) + (0 x 21) + (1 x 20))10
Step 2 101012 (16 + 0 + 4 + 0 + 1)10
Step 3 101012 2110
Octal Number System
Characteristics of the octal number system are as follows −
Uses eight digits, 0,1,2,3,4,5,6,7
Also called as base 8 number system
Each position in an octal number represents a 0 power of the base (8). Example
80
Last position in an octal number represents a x power of the base (8). Example
8x where x represents the last position – 1
Example
Octal Number: 125708
Step Octal Number Decimal Number
Step 1 125708 ((1 x 84) + (2 x 83) + (5 x
82) + (7 x 81) + (0 x 80))10
Step 2 125708 (4096 + 1024 + 320 + 56 +
0)10
Step 3 125708 549610
Hexadecimal Number System
Characteristics of hexadecimal number system are as follows −
Uses 10 digits and 6 letters, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
Letters represent the numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F
= 15
Also called as base 16 number system
Each position in a hexadecimal number represents a 0 power of the base (16). Example,
160
Last position in a hexadecimal number represents a x power of the base (16). Example
16x where x represents the last position - 1
Example
Hexadecimal Number: 19FDE16
Step Binary Number Decimal Number
Step 1 19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161)
+ (E x 160))10
((1 x 164) + (9 x 163) + (15 x 162) + (13 x
161) + (14 x 160))10
Step 2 19FDE16
Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
Step 4 19FDE16 10646210
BASICS OF INTERNET
Internet is a system that interconnects the different computer systems across the
world. It uses the Internet protocol suite to link devices located in different
corners of the world.
The Internet system carries an extensive range of information resources and
services including World Wide Web (WWW), telephony, electronic mail, etc. It
uses standard internet protocols, such as TCP/IP and HTTP, etc.
An internal web comprises of all Hypertext Transfer Protocol (HTTP) nodes on
a private network; for example, an organization’s LAN or WAN.
Which of the following three numbers (A-C) in decimal, octal and hexadecimal
notations respectively, is/are equivalence to (11011001)2 in binary notations?
a) (217)
b) (661)8
c) (D9)16
Choose the correct answer from the options given below:
1) a only
2) b only
3) a and b only
4) a and c only
Match List I with List II:
List I List II
(Computer Term) (Description)
a) Arithmetic and Logic Unit I. Stores part of the operating system
currently in use.
b) Control Unit II. Carries out operations such as AND,
OR , NOT
c) Random Access Memory III. Stores bootstrap loader and BIOS
d) Read Only Memory IV. Fetches and manages execution of
each instruction in turn
1) a-IV, b-III, c-II, d-I
2) a-III, b-IV, c-I, d-II
3) A-II, b-IV, c-I, d-III
4) A-II, b-I, c-IV, d-III
Miss Anita is excited to use a new software which is freely to download but she
cannot modify or change the source code, Anita is using.
a) Freeware
b) Open Source Software
c) Firmware
d) Liveware
Given below are two statements:
Statement 1: The binary equivalent of decimal number (19)10
and (10101)2
Statement 2: (1011)2+(110)2=(10101)2
In the light of the above statements , choose the correct answer from the
options given below:
a) Both Statement I and Statement II are true
b) Both Statement I and Statement II are false
c) Statement I is true but Statement II is false
d) Statement I is false but Statemen II is true
To perform t-test which of the following software can be utilized?
a) MS-Excel
b) UNIX
c) SPSS
d) MS Equations
Choose the most appropriate answer from the options given below:
1) a and b only
2) b,c and d only
3) a and c only
4) a , c and d only
Match List I with List II
List I List II
(Computer Terms) (Description)
A) Linux i) Text File Editor
B) Mozilla Firebox ii) Image File Format
C) Notepad iii)Operating System
D) JPEG iv) Web Browser
Choose the correct answer from the option given below:
1) A-iv, B-iii, C-I, D-ii
2) A-iii, B-iv, C-i, D-ii
3) A-ii, B-iv, C-i, D-I
4) A-iii, B-iv, C-ii, D-i
Match List I with List II:
List I List II
(Question) (Value)
A. What hexadecimal value is obtained
when the two hexadecimal digits C
and D are added together? I. 8
B. What is the denary (base 10) value of
the binary number: 00100100 II. 19
C. Number of seconds to transfer a
2 megabyte file over a 2 megabits per
second internet connection III. 30
D. If 1 gigabyte=2p, hen what is the value
of p? IV. 36
Choose the correct answer from the options given below:
1) A-III, B-IV, C-I, D-II
2) A-II, B-IV, C-I, D-III
3) A-IV, B-II, C-I, D-III
4) A-II, B-I, C-IV, D-III
Match List I with List II
List I List II
(Computer terms) (Description)
(A) Hub (I) Input device
(B) Joystick (II) Operating system
(C) Notepad (III) Network device
(D) Android (IV) Text editor
Choose the correct answer from the options given below:
(1) (A)-(I), (B)-(III), (C)-(IV), (D)-(II)
(2) (A)-(III), (B)-(I), (C)-(II), (D)-(IV)
(3) (A)-(III), (B)-(I), (C)-(IV), (D)-(II)
(4) (A)-(IV), (B)-(II), (C)-(I), (D)-(III)
Arrange the following optical storage devices in increasing order of their
storage capacity.
A. DVD B. CD-ROM C. Blu-Ray
Choose the correct answer from the options given below:
A. A,B,C
B. A,C,B
C. B, A, C
D. B, C, A
Which one of the following is a type of malware embedded in a program on a
computer that will set off a malicious function when certain conditions are
met?
A. Logic bomb
B. Spyware
C. Trojan
D. Worm
Match the following:
List I List II
a) Programming language i)Wide Area Network
b) Operating system ii) Ms-Power Point
c) Internet iii)Windows XP
d) Application software iv) C++
Which of the following statements are correct?
e) Internet is larger than Intranet
f) Intranet is larger than Internet
g) Internet and Intranet are same
h) Internet is a network of networks
i) World Wide Web is and example if internet
Code:
a) B&E b) A&D c) C&E d) B&C
Given below two statements:
Statement I: Example of primary memory is RAM
Statement II: Example of secondary memory is Pendrive
Code:
a) Both statement I and statement II are correct
b) Both statement I and statement II are incorrect
c) Statement I is correct but statement II is incorrect
d) Statement I is incorrect but statement II is correct
The main purpose of using ICT for classroom teaching is to
A) Make the classroom instructions interesting
B) Divert student’s attention in the class
C) Keep student’s engaged in the class
D) Optimize learning outcomes of teaching
Which of the following statements is/are correct?
a) The clock speed of a CPU is measured in hertz(Hz)
b) Bluetooth technology consumes more power than Wi-Fi technology
Choose the correct answer from the options given below:
A) a) only
B) b) only
C) Both a) and b)
D) Neither a) nor b)
Dec 2019
Put the following units of storage into the correct order, starting with the
smallest unit first and going down to the largest unit:
a)Kilobyte b) Byte c) Megabyte d) terabyte
e) Gigabyte f) Bit
Give your answer from the following code:
a) (f), (b), (a), (c), (d), (e)
b) (f), (b), (a), (d), (e), (c)
c) (f), (b), (a), (c), (e), (d)
d) (f), (b), (a), (d), (c), (e)
July 2018
Given the following email fields, which of the email addresses will ‘swami’ be
able to see when he receives the message?
To… [email protected]
Cc… [email protected]; [email protected]
Bcc…[email protected];[email protected]
a) [email protected]
b) [email protected]; [email protected]; [email protected]
c) [email protected]; [email protected]
d) [email protected]; [email protected]; [email protected]; [email protected]
July 2018
A new Laptop has been produced that weighs less, is smaller and uses less
power than Previous Laptop models. Which of the following technologies has
been used to accomplish this?
a) Universal Serial bus Mouse
b) Faster Random Access Memory
c) Blue Ray Drive
d) Solid State Hard Drive
July 2018