Monday, 11 January 2016

IBPS SO (Specialist Officer) IT-Notes Study Capsule 2

 IBPS SO (Specialist Officer) IT-Notes Study Capsule 2

 Dear Aspirants, as we all know only few days are left for IBPS SO exam. So, we are starting a new series ” IT Notes Study Capsule ” provided by our reader Mr. Rajshree Sharma. Our 1st  IBPS SO (Specialist Officer) IT-Notes Study Capsule 1 already published.
We will post 25+ points in one post ( 25 each ).learn them by heart. Share and discuss in comment section. We will gear up level day by day starting from very basics.So, Put your Seat belts on and join us in the journey to be a specialist officer. All the bset for your examinations.

Capsule  1) The ability to find an individual item in a file immediately direct access is used.

Capsule 2) To make a notebook act as a desktop model, the notebook can be connected to a
docking station which is connected to a monitor and other devices

Capsule 3) You can use the tab key to move a cursor across the screen, indent a paragraph.

Capsule 4) A collection of related files is called Database.

Capsule 5) Storage that retains its data after the power is turned off is referred to as non-volatile storage.

Capsule 6) Internet is an example of connectivity.

Capsule 7) Testing is the process of finding errors in software code.

Capsule 8) A syntax contains specific rules and words that express the logical steps of an algorithm.

Capsule 9) Changing an existing document is called the editing documentation

Capsule 10) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.

Capsule 11) Computers use the binary number system to store data and perform calculations.

Capsule 12) The windows key launched the start buttons.

Capsule 13) To move to the beginning of a line of text, press the home key.

Capsule 14) When sending an e-mail, the subject lines describe the contents of the message.

Capsule 15) Tables, paragraphs and indexes work with when formatting text in word.

Capsule 16) Storage Units chart


Capsule 17) The operating system tells the computer how to use its components.

Capsule 18) When cutting and pasting, the item cut is temporarily stored in clipboard.

Capsule 19) The blinking symbol on the computer screen is called the cursor.

Capsule 20) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential
because tape is a sequential access medium.

Capsule 21) Rows and columns are used to organize data in a spread sheet.

Capsule 22) When you are working on documentation on PC, the document temporarily stored
in flash memory.

Capsule 23) One megabyte equals approximately 1 million bytes.

Capsule 24) Information travels between components on the motherboard through buses.

Capsule 25) RAM refers to the memory in your computer.

Capsule 26) The method of communication in which transmission takes place in both directions, but only one direction at a time is called Half Duplex

Capsule 27) Error detection at the data link level is achieved by Cyclic Redundancy Code

Capsule 28) The topology with highest reliability is:Mess Topology

Capsule 29) ”BAUD” rate means the rate at which the signal changes

Capsule 30) Start and stop bits are used in serial communication for synchronisation

Capsule 31) Unmodulated signal coming from a transmitter is know as Baseband signal

Capsule 32) ARPANET network uses dynamic or adaptive routing.

Capsule 33)The Residual Error Rate measures the number of lost or garbled messages as a fraction of the total sent in the sampling period.

Capsule 34) In session layer, during data transfer, the data stream responsible for the “control” purpose (i.e control of the session layer itself) is Capability Data

Capsule 35) The Network topology that supports bi-directional links between each possible node is Mesh.

Capsule 36) In a broad Sense, a railway track is an example of half Duplex

Capsule 37) PAN network has connectivity range up to 10 meters.

Capsule 38 Unicode Represents symbol or characters used in any language.

Capsule 39) Correct method for full duplex mode of communication is: Both stations can transmit and receive data at the same time.

Capsule 40) A data communications system has 5 components
The five components are :
1. Message – It is the information to be communicated. Popular forms of information include text, pictures, audio, video etc. Text is converted to binary, number doesnt converted, image is converted to pixels, etc.
2. Sender – It is the device which sends the data messages. It can be a computer, workstation, telephone handset etc.
3. Receiver – It is the device which receives the data messages. It can be a computer, workstation, telephone handset etc.
4. Transmission Medium – It is the physical path by which a message travels from sender to receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.
5. Protocol – It is a set of rules that governs the data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating.

Capsule 41) 00 represents a pixel that pixel is known as Black Pixel

Capsule 42) Time required for a message to travel from one device to another is known as:Transit time

Capsule 43) If one link fails, only that link is affected. All other links remain active. Which topology does this? – Star Topology

Capsule 44) OSI model means:Open systems interconnection

Capsule 45) Fibre Optic Cable transport signals in the form of light.

Capsule 46) Twisted pair wires, coaxial cable, optical fiber cables are the examples of: Wired Media

Capsule 47) Twisted Pair Cable is used in communications is referred to as unshielded twisted-pair (UTP)

Capsule 48) Guided Media VS unguided media.Guided media is guided one.example- twisted pair cable,fibre optical wire,copper wire.
Unguided :- Here information is transmitted by sending electromagnetic signals through free space and hence the name unguided media, as the signals are not guided in any specific direction or inside any specific medium.

Capsule 49) Switching at the network layer in the Internet uses the datagram approach to:Packet Switching

Capsule 50) IPV4 is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach

Read :

IBPS SO (Specialist Officer) IT-Notes Study Capsule 1 

No comments:

Post a Comment