Computer Quick Notes For SBI Clerk Exam

Dear readers, Here we are presenting you some quick notes on Computer which hopefully will be helpful in the upcoming SBI Clerk Exam.

                                    Quick Notes

  • A collection of 8 bits is called Byte. A bit is the smallest unit of storage.
  • The
    first computer architecture was introduced by John Von Neumann.
  • A website containing periodic posts is called Blog.
  • Starting up on operating system is called Booting.
  • Restarting a computer that is already on, is referred to as Warm Booting.
  • A program used to browse the web is called Browser.
  • The code for a Web page is written using Hypertext Markup language (HTML).
  • A series of instructions that tells a computer what to do and how to do it is called a Program.
  • The device which is used with a computer to display or store data is called Peripherals.
  • The mechanical, magnetic, electronic and electrical components that comprises a computer system such as the Central Processing Unit (CPU), monitor, keyboard, etc. is known as Hardware.
  • A set of instructions that tells the computer about the tasks to be performed and how these tasks are to performed, is known as Software.
  • Executing is the process of carrying out commands.
  • The rectangular area of the screen that displays a program, data, and or information is a Window.
  • Downloading means to receive data to a local system from a remote system, or to initiate such a data transfer.
  • Uploading refers to the sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred.
  • An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient.
  • CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. The list of CCed recipients is visible to all other recipients of the message.
  • An additional BCC (Blind Carbon Copy) field is available for hidden notification; recipients listed in the BCC field receive a copy of the message, but are not shown on any other recipient’s copy (including other BCC recipients).
  • Disk drive is the part of the computer helps to store information.
  • Arithmetic operations include addition, subtraction, multiplication, and division.
  • The most important or powerful computer in a typical network is Network Server.
  • The primary purpose of software is to turn data into information.
  • A collection of related files is called Record.
  • Storage that retains its data after the power is turned off is referred to as Non-Volatile Storage. ROM is an example of this type of storage.
  • Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
  • Computers use the Binary Number System to store data and perform calculations.
  • When sending an e-mail, the Subject line describe the contents of the message.
  • The Operating System tells the computer how to use its components.
  • During the cutting and pasting of an item, the part which is cut, is temporarily stored in Clipboard.
  • The blinking symbol on the computer screen is called the Cursor.
  • Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential access medium.
  • Information travels between components on the motherboard through Buses.
  • A Website Address is a unique name that identifies a specific web site on the web.
  • Alt, Ctrl & Shift keys in a keyboard are known as: Modifier keys. 
  • Caps lock, Num lock & Scroll lock in a keyboard are known as: Toggle keys.
  • F1 to F12 keys in a keyboard are known as: Function keys.
  • A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a Hacker.
  • A Computer Virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”.
  • Antivirus Software is used to scan the hard disk to remove the virus from them.
  • The assembly language program is translated into machine code by a separate program known as an Assembler.
  • A Backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. It contains a copy of every program data and system file on a computer.