Professional Documents
Culture Documents
Foc All Unit
Foc All Unit
Foc All Unit
GENRATION OF COMPUTERS
There are five computer generations known till date. Each generation has been discussed in
detail along with their time period and characteristics. In the following table, approximate
dates against each generation has been mentioned, which are normally accepted.
Second Generation
2
The period of second generation: 1959-1965. Transistor based.
Third Generation
3
The period of third generation: 1965-1971. Integrated Circuit based.
Fourth Generation
4
The period of fourth generation: 1971-1980. VLSI microprocessor based.
Fifth Generation
5
The period of fifth generation: 1980-onwards. ULSI microprocessor based.
With the succession of different generations, came the advancement in computer technology.
Computer Generations
Let us now discuss the development in Computer Technology over the different generations.
Unit 1 FUNDAMENTALS OF COMPUTER
First Generation
• The first generation computers were developed by using vacuum tube or thermionic
valve machine.
• The input of this system was based on punched cards and paper tape; however, the
output was displayed on printouts.
Second Generation
• In comparison to the first generation, the size of second generation was smaller.
• In comparison to computers of the first generation, the computing time taken by the
computers of the second generation was lesser.
Third Generation
• The third generation computers were developed by using the Integrated Circuit (IC)
technology.
• In comparison to the computers of the second generation, the size of the computers of
the third generation was smaller.
• In comparison to the computers of the second generation, the computing time taken
by the computers of the third generation was lesser.
• The third generation computer consumed less power and also generated less heat.
• The maintenance cost of the computers in the third generation was also low.
• The computer system of the computers of the third generation was easier for
commercial use.
Fourth Generation
• The machine of fourth generation started generating very low amount of heat.
• The production cost reduced to very low in comparison to the previous generation.
Fifth Generation
• By the time, the computer generation was being categorized on the basis of hardware
only, but the fifth generation technology also included software.
• The computers of the fifth generation had high capability and large memory capacity.
• Working with computers of this generation was fast and multiple tasks could be
performed simultaneously.
• Some of the popular advanced technologies of the fifth generation include Artificial
intelligence, Quantum computation, Nanotechnology, Parallel processing, etc.
Block Diagram of Computer System :: The Computer system consists of mainly three types
that are central processing unit (CPU),Input Devices, and Output Devices .The Central
processing unit (CPU) again consists of ALU (Arithmetic Logic Unit) and Control Unit. The
set of instruction is presented to the computer in the form of raw data which is entered
through input devices such as keyboard or mouse.
Later this set of instruction is processed with the help of CPU, and the computer system
Produce an Output with the help of Output Devices mainly Printers and monitors. Large
amount of data is stored in the computer memory with the help of primary and secondary
storage devices temporarily and permanently.This are called as storage devices
The CPU is the heart | Brian of a computer because without the necessary action taken by the
CPU the user cannot get the desired output. The central Processing unit [CPU] is responsible
for processing all the Instruction which is given to computer system or PC. Below Block
Diagram of Computer and Its Components are mentioned For Better Understanding
Unit 1 FUNDAMENTALS OF COMPUTER
The Basic components & parts of computer system are given below :
• Input Devices
• Output Devices
• Storage Unit
• Control Unit
The set of instruction or information is provided to the computer system or PC with the help of input
devices such as (keyboard, mouse, scanners etc). The Instruction or data presented to computer
system is converted into binary form then it is supplied to computer system for furtherprocessing .
The Input Unit perform transferring the data from outside the world into the system and later
Unit 1 FUNDAMENTALS OF COMPUTER
this data is processed and system produces instruction through output unit such as Printer,
monitors etc.
The Input devices enter's the data from outside the world into the primary storage
devices.The input devices are a means of communication with outside world and our
computer system.
• Input Devices accepts or receives the data or instruction from outside the world such
as input devices like keyboard and mouse
• It converts the data or instruction or information into machine readable form for
further processing.
• They act like a connection between outside the world and our own computer system
• When the procedure is finished we get or receive desire result using output devices
such as printer's and monitor's.
For Example, The data or instruction such as Graphics, images or text is inserted in the
computer system with the help of input devices as the data received from the input devices is
in binary code, therefore, the data has to be primarily converted into human readable form
after processing user get the required or desired data or set of information.
• The output devices receives all the data or instruction in binary code.
• The output devices converts the binary codes into human readable or intelligible form
for better understanding and better functionality.
• They produces the changed or converted result to the user .which is effectively
comprehensible by humans for proper and accurate understanding.
Unit 1 FUNDAMENTALS OF COMPUTER
• They acts as a connection or link between outside world and computer system or our
own PC framework.
• Printers, monitors and projector's are the prime examples of output devices
The Central Processing unit is also called as brain or heart of a computer.The CPU is nothing
but an electronic hardware device which carries or performs out all the operation such as
arithmetic and logic operation. Below we have discussed briefly on arithmetic and logical
operation..
The CPU in another term is also called as "PROCESSOR".Every instruction given through
the input devices such as keyboard or mouse is carried further for processing and we user get
our desired results through are output devices such as printers and monitors.
The CPU is also responsible for controlling all the operations of the other units of the
computer system.When we talk or discuss CPU we tend to speak about its speed as speed
these days matters most due to high number of large software which requires fast processor
for execution.
The different component of CPU is Arithmetic logical unit And Control Unit.
Control Unit
The control Unit or CU Controls or coordinates all activities performed in a computer system.
It receives information or instruction or directions from the main memory of computer.It tells
the logic unit, memory as well as the input and output devices how to handle the program or
instruction in proper order.When the control unit receives any set of information or
instruction it converts them to control signals then this signals are sent to the central
processor for further processing and finally, it understands which operation to execute,
exactly or precisely and in which order.
There are some processors now that has more than single AU [Arithmetic Unit]. ALU
performs arithmetic and logical operation.When a set of instruction or program is conveyed
out. Control unit generally characterized which sort of operation to Execute.Arithmetic
operation comprises of (Addition, subtraction, division, multiplication) and the logical unit
carries out the operation such (AND, OR, Equal, less than, greater then), and later the control
is changed to ALU and the result generated in ALU later stored or puts away in transitory
memory.
Unit 1 FUNDAMENTALS OF COMPUTER
• It stores Results
Storage Devices :: The term storage is defined as the devices which stores data given by the
input devices or output devices after processing,the data is stored in computer system i.e
Primary storage or secondary storage depends entirely on the size of data.
• Primary Storage
• Secondary Storage
Primary Storage::They are also called as Main memory or in other words as RAM (Random
Access Memory).The Data or set of instruction is stored in primary storage before processing
and later the data is transferred to ALU where further processing is done.
The primary Storage cannot store huge amount of data, and the data store in this memory is
temporary (The data is lost when there is power failure), it is also called as temporary
memory, they are very expensive.The other example of primary Storage is L1 Cache of
Processor .
Secondary Storage:: Secondary storage are also called as permanent storage unit as when the
data store in this memory are stored permanently user can recall the data whenever they need.
The data remains in this memory even when there is a power failure or shutdown, they are
much more cheaper then primary memory.The Example of Secondary Storage are Hard disk
and Zip drives .
Hardware represents the physical and tangible components of a computer, i.e. the components that
can be seen and touched.
Unit 1 FUNDAMENTALS OF COMPUTER
• Hardware and software are mutually dependent on each other. Both of them must
work together to make a computer produce a useful output.
• Hardware without a set of programs to operate upon cannot be utilized and is useless.
• To get a particular job done on the computer, relevant software should be loaded into
the hardware.
• If the hardware is the 'heart' of a computer system, then the software is its 'soul'. Both
are complementary to each other.
• System Software
• Application Software
System Software
Unit 1 FUNDAMENTALS OF COMPUTER
The system software is a collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself. System software is generally prepared by the
computer manufacturers. These software products comprise of programs written in low-level
languages, which interact with the hardware at a very basic level. System software serves as
the interface between the hardware and the end users.
• Fast in speed
• Difficult to design
• Difficult to understand
• Less interactive
• Smaller in size
• Difficult to manipulate
Application Software
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the
category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for
writing and editing a simple text. It may also consist of a collection of programs, often called
a software package, which work together to accomplish a task, such as a spreadsheet
package.
• Payroll Software
• Microsoft Word
• Microsoft Excel
• Microsoft PowerPoint
• Easy to design
• More interactive
• Slow in speed
• Easy to understand
Monitor(VDU)
Unit 1 FUNDAMENTALS OF COMPUTER
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular
form. The sharpness of the image depends upon the number of pixels.
Features of Monitors
• Size
• Resolution
• Refresh rate
• Dot pitch
Size
Monitors are available in different sizes. The standard monitor for personal computers is 13
to 16 inches. The size of the monitor is measured diagonally.
Resolution
Resolution of a monitor is the number of pixels on the screen. It is the image sharpness of a
display screen. It is expressed as a matrix. A resolution of 640×480 means there is 640
horizontal pixels and 480 vertical pixels. The actual resolution is determined by the video
controller, not by monitor. Most monitors provide the resolutions of 640×480, 800×600, and
1024×768.
Refresh Rate
The number of times the electron guns scan every pixel on the screen in one second is called
refresh rate. It is measured in Hertz (Hz) or cycles per second.
Dot Pitch
The distance between the phosphorus dots that create a single pixel is called a dot pitch.A
computer monitor, technically termed as a visual display unit, can be plainly described as an
electronic device that transmits information from the computer onto a screen, thereby acting
as an interface and connecting the viewer with the computer. At present, computer monitors
are available in a variety of shapes, designs, and colors. However, based on the technology
used to make computer monitors, they can be broadly categorized into three types.
However, the only concern with buying CRT monitors is that they are heavy and can occupy
a great deal of work space. Also, these devices get heated up very easily.
• Secondly, these monitors do not consume much electricity and can even be operated
by using batteries.
• Also, the images transmitted by these monitors do not get geometrically distorted and
have little flicker.
However, LCD monitors do have certain disadvantages. Most importantly, these monitors are
very expensive. Secondly, image quality is not constant when viewed from different angles.
Also, an LCD monitor’s resolution is always constant. Any alterations can result in a reduced
performance.
LED monitors are said to use much lesser power than CRT and LCD. Thus, they are also
considered environmental friendly. Other core advantages of LED monitors are:
3. Lifespan and durability of LED monitors is more than CRT or LCD monitors.
4. Because of the technology, the monitor panels can be made very thin.
LED monitors are little expensive than the former types. There are multiple ways by which
LED back-lightning is done.
• White-edge LEDs are fixed around the rim of the monitor. It used a special diffusion
panel to spread light evenly behind the screen.
• An array of LEDs are placed behind the screen. Their brightness is not controlled
individually.
• Again an array of LEDs are placed behind the screen, but the brightness of each
individual LED is controlled separately.
Keyboard
Unit 1 FUNDAMENTALS OF COMPUTER
• Keyboard is the most common and very popular input device which helps to input
data to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.
• Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104
keys or 108 keys are also available for Windows and Internet.
Typing Keys
1
These keys include the letter keys (A-Z) and digit keys (09) which generally give the
same layout as that of typewriters.
Numeric Keypad
2 It is used to enter the numeric data or cursor movement. Generally, it consists of a set
of 17 keys that are laid out in the same configuration used by most adding machines
and calculators.
Function Keys
3 The twelve function keys are present on the keyboard which are arranged in a row at
the top of the keyboard. Each function key has a unique meaning and is used for some
specific purpose.
Unit 1 FUNDAMENTALS OF COMPUTER
Control keys
4 These keys provide cursor and screen control. It includes four directional arrow keys.
Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device having a
small palm size box with a round ball at its base, which senses the movement of the mouse
and sends corresponding signals to the CPU when the mouse buttons are pressed.
Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on the screen,
but it cannot be used to enter text into the computer.
Advantages
• Easy to use
• Moves the cursor faster than the arrow keys of the keyboard.
Joystick
Unit 1 FUNDAMENTALS OF COMPUTER
Joystick is also a pointing device, which is used to move the cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends. The lower
spherical ball moves in a socket. The joystick can be moved in all four directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. It consists of a photocell and an optical system placed in
a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button is pressed, its
photocell sensing element detects the screen location and sends the corresponding signal to
the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a
mouse. This is a ball which is half inserted and by moving fingers on the ball, the pointer can
be moved.
Unit 1 FUNDAMENTALS OF COMPUTER
Since the whole device is not moved, a track ball requires less space than a mouse. A track
ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used when
some information is available on paper and it is to be transferred to the hard disk of the
computer for further manipulation.
Scanner captures images from the source which are then converted into a digital form that
can be stored on the disk. These images can be edited before they are printed.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer can
convert a signal from the television or camera into a series of numbers that could be stored in
a computer. They can be used by the computer to create a picture of whatever the camera had
been pointed at.
Unit 1 FUNDAMENTALS OF COMPUTER
Digitizer is also known as Tablet or Graphics Tablet as it converts graphics and pictorial data
into binary inputs. A graphic tablet as digitizer is used for fine works of drawing and image
manipulation applications.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
The microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.
This reading process is called Magnetic Ink Character Recognition (MICR). The main
advantages of MICR is that it is fast and less error prone.
OCR scans the text optically, character by character, converts them into a machine readable
code, and stores the text on the system memory.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which is
then fed to the computer that the bar code reader is connected to.
It is specially used for checking the answer sheets of examinations having multiple choice
questions.
Printers
Printer is an output device, which is used to print information on paper.
• Impact Printers
• Non-Impact Printers
Unit 1 FUNDAMENTALS OF COMPUTER
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then pressed on
the paper.
• Very noisy
• Character printers
• Line printers
Character Printers
Character printers are the printers which print one character at a time.
• Daisy Wheel
In the market, one of the most popular printers is Dot Matrix Printer. These printers are
popular because of their ease of printing and economical price. Each character printed is in
the form of pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or
9*9) which come out to form a character which is why it is called Dot Matrix Printer.
Unit 1 FUNDAMENTALS OF COMPUTER
Advantages
• Inexpensive
• Widely Used
Disadvantages
• Slow Speed
• Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally used for
word-processing in offices that require a few letters to be sent here and there with very nice
quality.
Advantages
Unit 1 FUNDAMENTALS OF COMPUTER
• Better quality
Disadvantages
• Noisy
Line Printers
Line printers are the printers which print one line at a time.
• Drum Printer
• Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the drum is
divided into a number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper
width of 132 characters, drum will have 132 tracks. A character set is embossed on the track.
Different character sets available in the market are 48 character set, 64 and 96 characters set.
One rotation of drum prints one line. Drum printers are fast in speed and can print 300 to
2000 lines per minute.
Unit 1 FUNDAMENTALS OF COMPUTER
Advantages
Disadvantages
• Very expensive
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard
character set may have 48, 64, or 96 characters.
Advantages
Disadvantages
• Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a
complete page at a time, thus they are also called as Page Printers.
• Laser Printers
• Inkjet Printers
• High quality
Laser Printers
Unit 1 FUNDAMENTALS OF COMPUTER
These are non-impact page printers. They use laser lights to produce the dots needed to form
the characters to be printed on a page.
Advantages
Disadvantages
• Expensive
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology. They
print characters by spraying small drops of ink onto paper. Inkjet printers produce high
quality output with presentable features.
Unit 1 FUNDAMENTALS OF COMPUTER
They make less noise because no hammering is done and these have many styles of printing
modes available. Color printing is also possible. Some models of Inkjet printers can produce
multiple copies of printing also.
Advantages
• More reliable
Disadvantages
Memory
A memory is just like a human brain. It is used to store data and instructions. Computer
memory is the storage space in the computer, where data is to be processed and instructions
required for processing are stored. The memory is divided into large number of small parts
called cells. Each location or cell has a unique address, which varies from zero to memory
size minus one. For example, if the computer has 64k words, then this memory unit has
64 * 1024 = 65536 memory locations. The address of these locations varies from 0 to 65535.
• Cache Memory
• Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the CPU. It
acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
and program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can
access them.
Unit 1 FUNDAMENTALS OF COMPUTER
Advantages
• It stores the program that can be executed within a short period of time.
Disadvantages
• It is very expensive.
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than the
main memory. These are used for storing data/information permanently. CPU directly does
not access these memories, instead they are accessed via input-output routines. The contents
of secondary memories are first transferred to the main memory, and then the CPU can access
it. For example, disk, CD-ROM, DVD, etc.
Unit 1 FUNDAMENTALS OF COMPUTER
• It is a non-volatile memory.
RAM (Random Access Memory) is the internal memory of the CPU for storing data,
program, and program result. It is a read/write memory which stores data until the machine is
working. As soon as the machine is switched off, data is erased.
Unit 1 FUNDAMENTALS OF COMPUTER
Access time in RAM is independent of the address, that is, each storage location inside the
memory is as easy to reach as other locations and takes the same amount of time. Data in the
RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a
power failure. Hence, a backup Uninterruptible Power System (UPS) is often used with
computers. RAM is small, both in terms of its physical size and in the amount of data it can
hold.
There is extra space in the matrix, hence SRAM uses more chips than DRAM for the same
amount of storage space, making the manufacturing costs higher. SRAM is thus used as cache
memory and has very fast access.
• Long life
• No need to refresh
• Faster
• Large size
• Expensive
per second. DRAM is used for most system memory as it is cheap and small. All DRAMs are
made up of memory cells, which are composed of one capacitor and one transistor.
• Used as RAM
• Smaller in size
• Less expensive
ROM
ROM stands for Read Only Memory. The memory from which we can only read but cannot
write on it. This type of memory is non-volatile. The information is stored permanently in
such memories during manufacture. A ROM stores such instructions that are required to start
a computer. This operation is referred to as bootstrap. ROM chips are not only used in the
computer but also in other electronic items like washing machine and microwave oven.
Unit 1 FUNDAMENTALS OF COMPUTER
Let us now discuss the various types of ROMs and their characteristics.
The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kind of ROMs are known as masked ROMs, which are inexpensive.
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM program. Inside the PROM chip, there
are small fuses which are burnt open during programming. It can be programmed only once
and is not erasable.
EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased
one byte at a time, rather than erasing the entire chip. Hence, the process of reprogramming is
flexible but slow.
Advantages of ROM
• Non-volatile in nature
• Easy to test
MOTHER BOARD
The motherboard serves as a single platform to connect all of the parts of a computer
together. It connects the CPU, memory, hard drives, optical drives, video card, sound card,
and other ports and expansion cards directly or via cables. It can be considered as the
backbone of a computer.
Features of Motherboard
• Video cards, hard disks, sound cards have to be compatible with the motherboard to
function properly.
Popular Manufacturers
• Intel
• ASUS
• AOpen
Unit 1 FUNDAMENTALS OF COMPUTER
• ABIT
• Biostar
• Gigabyte
• MSI
Description of Motherboard
The motherboard is mounted inside the case and is securely attached via small screws
through pre-drilled holes. Motherboard contains ports to connect all of the internal
components. It provides a single socket for CPU, whereas for memory, normally one or more
slots are available. Motherboards provide ports to attach the floppy drive, hard drive, and
optical drives via ribbon cables. Motherboard carries fans and a special port designed for
power supply.
There is a peripheral card slot in front of the motherboard using which video cards, sound
cards, and other expansion cards can be connected to the motherboard.
On the left side, motherboards carry a number of ports to connect the monitor, printer, mouse,
keyboard, speaker, and network cables. Motherboards also provide USB ports, which allow
compatible devices to be connected in plug-in/plug-out fashion. For example, pen drive,
digital cameras, etc.
SECONDARY MEMORY
You know that processor memory, also known as primary memory, is expensive as well as
limited. The faster primary memory are also volatile. If we need to store large amount of data
or programs permanently, we need a cheaper and permanent memory. Such memory is called
secondary memory. Here we will discuss secondary memory devices that can be used to
store large amount of data, audio, video and multimedia files.
These are some characteristics of secondary memory, which distinguish it from primary
memory −
Depending on whether secondary memory device is part of CPU or not, there are two types
of secondary memory – fixed and removable.
Hard disk drive is made up of a series of circular disks called platters arranged one over the
other almost ½ inches apart around a spindle. Disks are made of non-magnetic material like
aluminum alloy and coated with 10-20 nm of magnetic material.
Unit 1 FUNDAMENTALS OF COMPUTER
Standard diameter of these disks is 14 inches and they rotate with speeds varying from 4200
rpm (rotations per minute) for personal computers to 15000 rpm for servers. Data is stored by
magnetizing or demagnetizing the magnetic coating. A magnetic reader arm is used to read
data from and write data to the disks. A typical modern HDD has capacity in terabytes (TB).
MAGNETIC DISK
Unit 1 FUNDAMENTALS OF COMPUTER
•To read information, the arm is positioned over the correct track.
•Data is read and written by adisk drive which rotates the discs and positions the read/write heads over
the desired track.
Seek Time-
• The time taken by the read / write head to reach the desired track is called as seek
time.
• It is the component which contributes the largest percentage of the disk service time.
• The lower the seek time, the faster the I/O operation.
Rotational Latency-
• The time taken by the desired sector to come under the read / write head is called as
rotational latency.
• The amount of data that passes under the read / write head in a given amount of time
is called as data transfer rate.
WRITE MECHANISM
-> Writes binary data by magnetizing small areas or zones of the disk.
-> Current through the coil produces magnetic field.
-> Corresponding magnetic pattern is recorded on the surface.
Magnetic tape and magnetic disk both stores the data magnetically. The surface of a magnetic tape
and the surface of a magnetic disk are covered with a magnetic material which helps in storing the
Unit 1 FUNDAMENTALS OF COMPUTER
information magnetically. Both are non-volatile storage. Despite these similarities both differs in
many aspects from their appearance to their working, their cost and much more.
The basic difference between magnetic tape and magnetic disk is that magnetic tape is used for
backups whereas, magnetic disk are used as secondary storage. Let us discuss some more
differences between magnetic tape and magnetic disk with the help of comparison chart shown
below.
Basis for
Magnetic Tape Magnetic Disk
Comparison
Used for backup, and storage of
Basic less frequently used Used as a secondary storage.
information.
Several platters arranged above each other
Plastic thin, long, narrow strip
Physical to form a cylinder, each platter has a read-
coated with magnetic material.
write head.
Use Idle for sequential access. Idle for random access.
Access Slower in data accessing. Fast in data accessing.
Once data is fed, it can't be
Update Data can be updated.
updated.
If the tape is damaged, the data
Data loss In a case of a head crash, the data is lost.
is lost.
Typically stores from 20 GB to
Storage From Several hundred GB to Terabytes.
200 GB.
Magnetic tapes are less
Expense Magnetic disk is more expensive.
expensive.
Magnetic Tapes were introduced in 1928, earlier used as a secondary storage medium.
Magnetic tape is a thin long narrow plastic strip coated with the magnetizable substance.
The tape is wounded over a spool, and it is wounded or unwounded past a read-write head to
more time than magnetic disk because the magnetic tape has to perform forward and rewind
operation to locate a correct spot.
Once the read-write head in magnetic tape is positioned correctly, it writes the data with the
same speed as that of the magnetic disk. The data transfer speed of the magnetic tape is
similar to the magnetic disk. As random access to magnetic tapes is comparatively slower, it
was not very useful for secondary storage. Now, the magnetic tapes are used for backups, for
storing the data that is less frequently used.
Magnetic tapes are also used in supercomputer centres for holding the large volume of data
that is used for scientific research.
In modern computers, Magnetic Disk is used for secondary storage. Like Magnetic tape, the
magnetic disk is also a non-volatile so, its stores the data permanently. The magnetic disk has
several flat circular shaped platters which appear like a CD.The diameter of each platter
Each platter surface is divided into circular tracks which are further divided into sectors. The
read-write head flies over the platter surface on a thin cushion of air. Though the disk platter
is coated with a protective layer, there is always a danger that head will make contact with the
disk causing head crash. The Head crash is not repairable the whole magnetic disk is to be
replaced.
Unit 1 FUNDAMENTALS OF COMPUTER
1. The magnetic tapes are used for backups and the storage of the data that may be less
frequently used. On the other hands, the magnetic disk is used as a secondary
storage in modern computers.
2. The magnetic disk has several platters arranged one above the other to form a
cylinder, and each platter has a read-write head that flies over the surface of the
platter.On other hands, magnetic tape is a long thin narrow plastic strip coated with
magnetizing substance wounded over a spool.
3. Magnetic tape allows fast sequential accessing but is slower in random accessing.
However, the magnetic disk is fast in accessing data sequentially or randomly.
4. Magnetic disk access the data faster than the magnetic tape.
5. Magnetic tape can not be updated once written whereas, magnetic disk can be
updated.
6. If the magnetic tape is damaged data can be lost whereas, in the case of the magnetic
disk a head crash can cause data loss.
Conclusion:
Magnetic tape was earlier used as secondary storage, but now they are used for backups.
Magnetic disks are used as secondary storage for modern computers. Both Magnetic tapes
and magnetic disks are the non-volatile storages and both stores the data magnetically.
OPTICAL DISK
A storage medium from which data is read and to which it is written by lasers. Optical disks
can store much more data -- up to 6 gigabytes (6 billion bytes) -- than most portable magnetic
media, such as floppies. There are three basic types of optical disks:
CD-ROM :Like audio CDs, CD-ROMs come with data already encoded onto them.
The data is permanent and can be read any number of times, but CD-ROMs cannot be
modified.
WORM : Stands for write-once, read -many. With a WORM disk drive, you can
writedata onto a WORM disk, but only once. After that, the WORM disk behaves just
like a CD-ROM.
Unit 1 FUNDAMENTALS OF COMPUTER
Erasable: Optical disks that can be erased and loaded with new data, just like
magnetic disks. These are often referred to as EO (erasable optical) disks.
These three technologies are not compatible with one another; each requires a different type
of disk drive and disk. Even within one category, there are many competing formats, although
CD-ROMs are relatively standardized.
CD Drive
CD stands for Compact Disk. CDs are circular disks that use optical rays, usually lasers, to
read and write data. They are very cheap as you can get 700 MB of storage space for less than
a dollar. CDs are inserted in CD drives built into CPU cabinet. They are portable as you can
eject the drive, remove the CD and carry it with you. There are three types of CDs −
• CD-ROM (Compact Disk – Read Only Memory) − The data on these CDs are
recorded by the manufacturer. Proprietary Software, audio or video are released on
CD-ROMs.
• CD-R (Compact Disk – Recordable) − Data can be written by the user once on the
CD-R. It cannot be deleted or modified later.
• CD-RW (Compact Disk – Rewritable) − Data can be written and deleted on these
optical disks again and again.
DVD Drive
DVD stands for Digital Video Display. DVD are optical devices that can store 15 times the
data held by CDs. They are usually used to store rich multimedia files that need high storage
capacity. DVDs also come in three varieties – read only, recordable and rewritable.
Unit 1 FUNDAMENTALS OF COMPUTER
Pen Drive
Pen drive is a portable memory device that uses solid state memory rather than magnetic
fields or lasers to record data. It uses a technology similar to RAM, except that it is
nonvolatile. It is also called USB drive, key drive or flash memory.
A memory is just like a human brain. It is used to store data and instruction. Computer
memory is the storage space in computer where data is to be processed and instructions
required for processing are stored.
The memory is divided into large number of small parts. Each part is called a cell. Each
location or cell has a unique address which varies from zero to memory size minus one.
For example if computer has 64k words, then this memory unit has 64 * 1024 = 65536
memory location. The address of these locations varies from 0 to 65535.
•
• # • Optical Storage • Magnetic Storage Devices
Devices
• 1 • Stores data as patterned • Stores data in magnetic form
image
• 2 • Optical storage devices • Magnetic storage devices offer
offer lesser capacity much higher capacity
• 3 • Requires LASER light • Doesn’t require LASER heads
to read and write data to read and write data
onto the disc
• 4 • Slower data read and • Faster data read and write
write
• 5 • Data on the disk will not • Magnetic field can destroy the
be damaged by data stored on Magnetic storage
magnetic fields devices
• 6 • Optical storages can be • Magnetic storage devices are
readable, writable and always readable and re-writable
re-writable
• 7 • Optical storage devices • Almost all magnetic storage
require additional drives devices comes with built-in
to function drives
• 8 • Easy and safe to take • Not as safe as optical storage
around devices to take around
• General • Devices that store • Devices that store information
Definitio information on the on the computer and on the
n computer and on the system, which comes in a round
system, which comes in and flat shape and rotates along
a round and flat shape the axis.
and rotates along the
axis.
• Differen • Uses laser tools to store • Uses magnetization process.
tiation and read information
• Working • A laser is used to read • The mechanical arm becomes
the information stored in the primary tool that uses the
the dots and then handle to read data from the
converted into a signal device and write data to the
of electricity that gave disk.
an audio or visual
output
• Space • 27 GB maximum • Several hundred GBs
• Basis • Magnetic Disk • Optical Disk
For
Compar
ison
• Media • Muiltiple fixed disk • Single removable disk
type
• Position • Intermediate signal to • Excellent signal to noise ratio
error noise ratio
Unit 1 FUNDAMENTALS OF COMPUTER
signals
• Sample • Low • High
rate
• Impleme • Used mostly where data • Used in streaming files.
ntation is randomly accessed.
• Tracks • Circular • Spiral or circular
• Usage • Only one disk can be • Mass replication is possible
used at a time
• Access • Shorter comparatively • Longer
time
• Definition of Magnetic disk
• The Magnetic disk is made of a set of circular platters. These platters are initially
build up of non-magnetic material i.e., aluminium or aluminium alloy referred to as
substrate then the substrate is coated with a magnetic film and mounted on a
common spindle. The disks are placed inside a rotary drive where the magnetised
surface rotates close to the read and write heads. Every head is comprised of a
magnetising coil and a magnetic yoke. It stores the digital information on the
concentric tracks by applying the current pulse of appropriate polarity to the magnetic
coil.
• The number of bits stored on each track does not change by using simplest constant
angular velocity. Multiple zoned recording is used to increase the density in which
the surface is partitioned into a number of zones and the zones located near the centre
contain fewer bits than the zones farther from the centre. However, this strategy is not
optimal.
• .
•
Unit 1 FUNDAMENTALS OF COMPUTER
• In the read operation, the alteration in a magnetic field is sensed. So, the two opposite
states of magnetisation represent 0 and 1; it produces the voltage in the head when 0-1
and 1-0 transition takes place in the bit stream.
• The Optical disk is a storage device in which optical (light) energy is used. In the
initial stages, the designers created a compact disk in the mid- 1980s which use the
digital representation for the analog sound signals. The CD was capable of providing
great quality sound recording by taking 16-bit samples of analog signals at the speed
of 44,100 samples per second and also it can detain up to 75 minutes where a total
amount of stored bits needed is approx 3 x 109 (3 gigabits). These optical disks use
the optical technology in which a laser light is centred to the spinning disks.
• The optical disk is constructed from a resin like polycarbonate, and the surface of
this polycarbonate contains the digital information impressed on it as the sequence of
microscopic pits. A microscopic pitted surface is then glazed by a highly reflective
surface such as aluminium or gold. To make the disk scratch resistant it is coated by
acrylic and silkscreened label on it. Finally, a concentrated high-intensity laser is
utilized in the creation of the master disk.
• The information retrieval from a CD is done through housing a low powered laser in
an optical disk player. The laser is radiated through the clear polycarbonate while the
disk is spinning by the motor. As the laser falls on the pit (usually having the rough
surface), the magnitude of the reflected laser light changes. The vacant smooth area
between the pits is known as the land from which the light reflects back at a higher
magnitude.
Unit 1 FUNDAMENTALS OF COMPUTER
•
A photosensor is used to identify the alteration between the pits and lands and
translate it into a digital signal. The pit area represents a ‘1’ while no change is
observed between intervals a ‘0’ is recorded. There are numerous optical disk
products are available in the market such as CD, CD-ROM, CD-R, CD-RW, DVD,
DVD-R, DVD-RW.
• The magnetic disk is a fixed storage device whereas optical disk is transportable storage
media which is removable.
• The sample rate used in the magnetic disk is lower than used in the optical disk.
• In the optical disk, the data is sequentially accessed. In contrast, the data in the magnetic
disk is randomly accessed.
• Tracks in the magnetic disk are generally circular while in optical disk the tracks are
constructed spirally.
• Optical disk allows mass replication. On the contrary, in the magnetic disk, only one disk is
accessed at a time.
• The access time of the magnetic disk is lesser than the optical disk.
Unit 1 FUNDAMENTALS OF COMPUTER
• Conclusion
The magnetic disk works on electromagnetic technology while optical disk functions by
using optical means (laser light). Although, the speed of the magnetic disk is higher than that
of the optical disk.
• MEMORY HIERARCHY
MEMORY UNIT
Memory unit is the amount of data that can be stored in the storage unit. This storage capacity
is expressed in terms of Bytes.
Nibble
2
A group of 4 bits is called nibble.
Byte
3
A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data
item or a character.
Word
A computer word, like a byte, is a group of fixed number of bits processed as a unit,
which varies from computer to computer but is fixed for each computer.
4
The length of a computer word is called word-size or word length. It may be as small
as 8 bits or may be as long as 96 bits. A computer stores the information in the form of
computer words.
Kilobyte (KB)
1
1 KB = 1024 Bytes
Unit 1 FUNDAMENTALS OF COMPUTER
Megabyte (MB)
2
1 MB = 1024 KB
GigaByte (GB)
3
1 GB = 1024 MB
TeraByte (TB)
4
1 TB = 1024 GB
PetaByte (PB)
5
1 PB = 1024 TB
DATA
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or
special characters (+,-,/,*,<,>,= etc.)
Types of Data
Data, in mathematical and scientific speak, is a group of information collected. The
information could be anything, and is often used to prove or disprove a hypothesis, or
scientific guess, during an experiment. Data that can be collected can be hair color, number of
movies a person goes to, how a person feels about a certain topic, how much money a group
of people make over the course of time, and so much more. Data is usually grouped into two
different types of information: categorical and numerical. In this lesson, we'll talk about
numerical data.
One of the ways you can identify numerical data is by seeing if the data can be added
together. In fact, you should be able to perform just about any mathematical operation on
numerical data. You can also put data in ascending (least to greatest) and descending (greatest
to least) order. Data can only be numerical if the answers can be represented in fraction
and/or decimal form. If you have to group the information into categories, then it is
considered categorical.
If you were to measure the height of four ladders, you could average the heights, you could
add the heights, and you could put them in ascending or descending order. That's because the
height of the ladders is numerical data!
When working with statistics, it’s important to recognize the different types of data: numerical
(discrete and continuous), categorical, and ordinal. Data are the actual pieces of information that you
collect through your study. For example, if you ask five of your friends how many pets they own, they
might give you the following data: 0, 2, 1, 4, and 18. (The fifth friend might count each of her
aquarium fish as a separate pet.) Not all data are numbers; let’s say you also record the gender of
each of your friends, getting the following data: male, male, female, male, female.
a person owns, how many teeth a dog has, or how many pages you can read of your favorite book
before you fall asleep.
Numerical data can be further broken into two types: discrete and continuous.
• Discrete data represent items that can be counted; they take on possible values that can be listed
out. The list of possible values may be fixed (also called finite); or it may go from 0, 1, 2, on to infinity
(making it countably infinite). For example, the number of heads in 100 coin flips takes on values
from 0 through 100 (finite case), but the number of flips needed to get 100 heads takes on values
from 100 (the fastest scenario) on up to infinity (if you never get to that 100th heads). Its possible
values are listed as 100, 101, 102, 103, . . . (representing the countably infinite case).
• Continuous data represent measurements; their possible values cannot be counted and can only be
described using intervals on the real number line. For example, the exact amount of gas purchased at
the pump for cars with 20-gallon tanks would be continuous data from 0 gallons to 20 gallons,
represented by the interval [0, 20], inclusive. You might pump 8.40 gallons, or 8.41, or 8.414863
gallons, or any possible number from 0 to 20. In this way, continuous data can be thought of as being
uncountably infinite. For ease of recordkeeping, statisticians usually pick some point in the number
to round off. Another example would be that the lifetime of a C battery can be anywhere from 0
hours to an infinite number of hours (if it lasts forever), technically, with all possible values in
between. Granted, you don’t expect a battery to last more than a few hundred hours, but no one can
put a cap on how long it can go (remember the Energizer Bunny?).
Categorical Numerical
Why is data, that contains numbers, such as post codes and birthdates, considered categorical?
A quick and easy way to decide whether data is numerical or categorical is to ask yourself “Can I
calculate an average of these numbers?. If you can calculate an average, the data is numerical, if you
cannot, the data is categorical. Since an average postcode or average year level has no meaning, this
data is categorical, even though the data is presented as numerals.
Ordinal Data
When the categories may be ordered, these are called ordinal variables.Ordinal data mixes
numerical and categorical data. The data fall into categories, but the numbers placed on the
categories have meaning. For example, rating a restaurant on a scale from 0 (lowest) to 4 (highest)
stars gives ordinal data. Ordinal data are often treated as categorical, where the groups are ordered
when graphs and charts are made. However, unlike categorical data, the numbers do have
mathematical meaning. For example, if you survey 100 people and ask them to rate a restaurant on a
Unit 1 FUNDAMENTALS OF COMPUTER
scale from 0 to 4, taking the average of the 100 responses will have meaning. This would not be the
case with categorical data.
A set of data is said to be ordinal if the values / observations belonging to it can be ranked (put in
order) or have a rating scale attached. You can count and order, but not measure, ordinal data.
The categories for an ordinal set of data have a natural order, for example, suppose a group of people
were asked to taste varieties of biscuit and classify each biscuit on a rating scale of 1 to 5,
representing strongly dislike, dislike, neutral, like, strongly like. A rating of 5 indicates more
enjoyment than a rating of 4, for example, so such data are ordinal.
Ordinal scales are typically measures of non-numeric concepts like satisfaction, happiness,
discomfort, etc.
Nominal Data
Nominal scales are used for labeling variables, without any quantitative value. “Nominal” scales
could simply be called “labels.” Here are some examples, below. Notice that all of these scales are
mutually exclusive (no overlap) and none of them have any numerical significance. A good way to
remember all of this is that “nominal” sounds a lot like “name” and nominal scales are kind of like
“names” or labels.
Unit 1 FUNDAMENTALS OF COMPUTER
Summary
Categorical Numerical
Values or observations that can be sorted into Values or observations that can be measured. And
groups or categories. these numbers can be placed in ascending or
Bar charts and pie graphs are used to graph descending order.
categorical data.
alphanumeric is a description of data that is both letters and numbers. For example,
"1a2b3c" is a short string of alphanumeric characters. Alphanumeric is commonly used to
help explain the availability of text that can be entered or used in a field such as an
alphanumeric password.
What is Information?
Information is organized or classified data, which has some meaningful values for the
receiver. Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following
characteristics −
• Input − In this step, the input data is prepared in some convenient form for
processing. The form will depend on the processing machine. For example, when
electronic computers are used, the input data can be recorded on any one of the
several types of input medium, such as magnetic disks, tapes, and so on.
• Processing − In this step, the input data is changed to produce data in a more useful
form. For example, pay-checks can be calculated from the time cards, or a summary
of sales for the month can be calculated from the sales orders.
• Output − At this stage, the result of the proceeding processing step is collected. The
particular form of the output data depends on the use of the data. For example, output
data may be pay-checks for employees.
The storage medium is a part of the storage system where the actual data is stored, such as on
a DVD or a memory card. This medium can then be put into a storage device like a DVD
player or phone to read this data. You usually find these two parts to be separate pieces,
making the storage medium removable. Some storage devices can be found inside of the
system unit, while others are plugged into an external port. There are letters on the storage
device that go along with this that helps the unit to identify them. These letters or words
describe where these are and what they are used for. For example, when you plug in a USB
into the USB port on the computer, while viewing this USB in “My Computer” you will see a
letter next to it verifying what it is used for in the system unit. Storage devices contain
primary and secondary memory. Primary memory is volatile memory, which means that when
Unit 1 FUNDAMENTALS OF COMPUTER
the device is shut off, the information is lost. Secondary is the exact opposite, being non-
volatile in that the memory remains even if the computer is turned off.[3] The problem with
these devices is you must be cautious with how they are treated, especially if they have
important information. Misplacing or mistreating can result in a loss of important data that
could be impossible to get back depending on the circumstances.
Hard Drives
Every computer contains one, if not two, hard drives. There are internal and external hard
drives. The internal hard drive is located inside the system unit, and the external hard drive is
connected to the computer for extra storage. It is vital that an owner of a computer purchases
an external hard drive to backup his or her computer in case it crashed. An external hard drive
is extremely convenient to store information; however, one must be cautious of the possibility
of "hard drive theft" because it is easy for someone to access a random, external hard drive
into their own computer. Many people today use a finger print or password to access to their
hard drive because of this reason. Without a hard drive, one could not store the countless
amount of information contained to a computer. The hard drive holds a port to connect to the
motherboard.[4] There are a wide range of capacity for hard drives, depending on the
computer owner's preference.[5] Magnetic hard drives and solid-state hard drives are two
common hard drives used for computers. A magnetic hard drive is the term computer users
mean when they say hard drive, and solid-state hard drives cause flash memory technology.
Without hard drives, many information and data would be lost and forgotten.
Hard drives are used as primary storage units to store most data and computer programs to
operate on a computer. The two types of hard drives available for purchase are: internal hard
drives, and external hard drives. There are many things to consider if you are a consumer
seeking these storage devices. The internal hard drive, which can be included in the computer
before purchase, is directly connected to the motherboard, (A.K.A the brain of the computer),
as well as other components inside the tower or casing of the computer/laptop. An external
hard drive is commonly used among users who are either portably transporting data/programs
from device to device, or seeking extra storage space for their files. External hard drives can
be very small, and convenient for traveling with data. There are multiple different options to
explore while considering a hard drive: speed, consistency, and durability. The types of hard
drives offered include either of the following: magnetic storage, optical storage, and electrons
which use flash memory media.[6]
the head to move to the disk to prepare for reading. Rotational delay is the delay that occurs
when waiting for the disk to begin rotating. Data movement time involves the movement of
data from the disk to memory of the computer or the movement of data from the memory of
the computer to the disk. Maximum rotational latency is the time it takes for the disk to
perform a full rotation excluding any acceleration time. There are two types of ways in which
a disk rotates: constant linear velocity and constant angular velocity. Constant linear velocity
occurs when the rotational speed of the disk is dependent upon the location of the head.
Constant angular velocity occurs when the disk is spun at the same speed regardless of the
location of the head, like vinyl records. Certain low-noise disks utilize a slower disk access
time to reduce noise created by the hard drive. Slower rotational speeds and seek speeds are
purposefully installed to make sure that audible clicks and crunching sounds don’t interfere
with recordings.
Unit II: Hardware and Software
Computer Peripherals: Cables, Buses, Device drivers, installation of devices: keyboard, mouse,
scanner, printer, web-camera, speakers and many more; plug-and-play devices; expansion
slots……..System software, Program Language Translators, application software, Programming
Language Paradigms: Imperative, Object-Oriented and Logic languages, Basics of Popular Operating
Systems (Windows and Linux); The User Interface, Using Mouse and Organizing Desktop
components, Running an Application, File, Folders and Directory management features, Using Help;
Creating Short cuts, Configuring Operating System: Windows and Ubuntu, BIOS, System Utilities and
Antivirus software.
Computer Peripherals
A peripheral or peripheral device is "an ancillary device used to put information into and get information out of
the computer". Three categories of peripheral devices exist based on their relationship with the computer:
1. an input device sends data or instructions to the computer, such as a mouse, keyboard, graphics
tablet, image scanner, barcode reader, game controller, light pen, light gun, microphone, digital
camera, webcam, dance pad, and read-only memory);
2. an output device provides output from the computer, such as a computer monitor, projector, printer,
headphones and computer speaker.
3. an input/output device performs both input and output functions, such as a computer data storage device
(including a disk drive, USB flash drive, memory card and tape drive).
Many modern electronic devices, such as internet capable digital watches, smartphones, and tablet computers,
have interfaces that allow them to be used as computer peripheral devices.
A computer peripheral is any external device that provides input and output for the computer. For example, a
keyboard and mouse are input peripherals, while a monitor and printer are output peripherals. Computer
peripherals, or peripheral devices, are sometimes called "I/O devices" because they provide input and output for
the computer. Some peripherals, such as external hard drives, provide both input and output for the computer.
Cabels
Computer cables are overwhelming. There are so many standards, acronyms, and terms to know. There are
number of cables are available in used for computer.
USB (Universal Serial Bus)
The USB connection is the most ubiquitous of all computer connector types in the world. Nearly every
computer peripheral device—keyboards, mice, headsets, flash drives, wireless adapters, and such—can be
connected to a computer through a USB port.
USB keeps evolving, which means there are multiple USB versions:
• USB 1.0 can transmit data at speeds up to 1.5 MB/s.
• USB 2.0 can transmit data at speeds up to 60 MB/s and
is compatible with older versions of USB.
• USB 3.0 can transmit data at speeds up to 625 MB/s. It
is compatible with previous versions of USB.
• USB 3.1 can transmit data at speeds up to 1.25 GB/s. It
is compatible with previous versions of USB. At the
time of this article, USB 3.1 is the most common type
found in the market.
• USB 3.2 can transmit data at speeds up to 2.5 GB/s, but
only when using a USB-C connection. It is compatible
with previous versions of USB.
• USB 4.x is a future specification that will transmit data
at speeds up to 5 GB/s, but only when using a USB-C connection. It will release in mid-2019 and will be
compatible with USB 3.2 and USB 2.0.
There are also several “shapes” for USB connections:
• Type A supports USB 1.0, USB 2.0, USB 3.0, USB 3.1.
• Type B supports USB 1.0, USB 2.0, USB 3.0, USB 3.1.
• Type C (i.e. USB-C) supports USB 3.1, USB 3.2, USB 4.x.
• Mini supports USB 2.0.
• Micro supports USB 2.0.
HDMI (High Definition multimedia interface)
High-definition broadcasts are now the standard for high-quality video. Unlike VGA and DVI, which only
transmit video signals, HDMI sends both video and audio signals together. These signals are digital; thus,
HDMI is only compatible with newer devices. (Learn more
about video cable types!)
HDMI connections come in five types:
• Type A is the most popular. This connector can be
identified by its 19 pins on the male head. Type A is
compatible with single-link DVI-D connections.
• Type B is larger than Type A, coming in at 29 pins on
the male head. Type B is compatible with dual-link
DVI-D connections. You won’t see this type often, if
ever.
• Type C (Mini) is a 19-pin connector that’s most often
used with portable devices, like camcorders and digital
cameras.
• Type D (Micro) also has 19 pins and looks similar to a
Micro-USB cable. It’s mostly used for mobile devices,
including smartphones and tablets.
• Type E is much larger with a locking mechanism. It’s mainly used in automotive applications.
Display Port
Like HDMI, DisplayPort is a media interface that transmits
both video and audio signals together and was designed to
replace VGA and DVI. These days, DisplayPort is mainly
used to connect devices (e.g. a computer) to monitors, so
you’ll only see it among other monitor cable types.
There are multiple versions of DisplayPort, but all
DisplayPort cables are compatible with all DisplayPort
devices. The speed will be limited by the lowest version of
DisplayPort supported between the device and cable. Look
for these DisplayPort cable certifications:
• RBR (Reduced Bit Rate): Up to 810 MB/s.
• HBR (High Bit Rate): Up to 1,350 MB/s.
• HBR2 (High Bit Rate 2): Up to 2,700 MB/s.
• HBR3 (High Bit Rate 3): Up to 4,050 MB/s.
DisplayPort is compatible with HDMI and USB using adapters. There is also Mini DisplayPort, which was
mainly used in older Apple devices released before 2011.
Thunderbolt
Thunderbolt cables are designed to connect external devices to a
computer. They’re mainly used in Apple devices released 2011
and later. For more on cables, adapters, and ports for Apple
devices, check out our helpful guide. Thunderbolt
1 and Thunderbolt 2 cables use the same connector as Mini
DisplayPort, and all Thunderbolt 1 and Thunderbolt 2 connections
are compatible with Mini DisplayPort connections.
Thunderbolt 3 cables use the same connector as USB-C, and all Thunderbolt 3 connections are compatible with
USB-C connections. Thunderbolt 3 is also compatible with Thunderbolt 1 and Thunderbolt 2 using adapters.
Device drivers
In computing, a device driver is a computer program that operates or controls a particular type of device that is
attached to a computer. A driver provides a software interface to hardware devices, enabling operating systems
and other computer programs to access hardware functions without needing to know precise details about the
hardware being used.
A driver communicates with the device through the computer bus or communications subsystem to which the
hardware connects. When a calling program invokes a routine in the driver, the driver issues commands to the
device. Once the device sends data back to the driver, the driver may invoke routines in the original calling
program. Drivers are hardware dependent and operating-system-specific. They usually provide
the interrupt handling required for any necessary asynchronous time-dependent hardware interface.
Hardware that uses a device driver to connect to a computer includes printers, displays, CD-ROM readers,
network or sound cards, computer mice or hard disks. Device drivers will instruct a computer on how to
communicate with each input/output (I/O) device through translating the operating system's I/O instructions to a
software language the hardware device understands.
Applications
Because of the diversity of modern hardware and operating systems, drivers operate in many different
environments. Drivers may interface with:
1. Printers 3. Network cards
2. Video adapters 4. Sound cards
5. Local buses of various sorts—in particular, for bus mastering on modern systems
6. Low-bandwidth I/O buses of various sorts (for pointing devices such as mice, keyboards, USB, etc.)
7. Computer storage devices such as hard disk, CD-ROM, and floppy disk buses (ATA, SATA, SCSI)
8. Implementing support for different file systems
9. Image scanners
10. Digital cameras
Common levels of abstraction for device drivers include:
• For hardware:
o Interfacing directly
o Writing to or reading from a device control register
o Using some higher-level interface (e.g. Video BIOS)
o Using another lower-level device driver (e.g. file system drivers using disk drivers)
o Simulating work with hardware, while doing something entirely different[8]
• For software:
o Allowing the operating system direct access to hardware resources
o Implementing only primitives
o Implementing an interface for non-driver software (e.g. TWAIN)
o Implementing a language, sometimes quite high-level (e.g. PostScript)
So choosing and installing the correct device drivers for given hardware is often a key component of computer
system configuration.
Installation of Mouse
Today, almost all wired and wireless mice use USB as the interface to the computer. However, older computers
may utilize PS/2 or serial ports. If your mouse is wireless, it can be communicating over Bluetooth, RF (radio
frequency), or IR(infrared). To proceed, select your connection type from the list below and follow the
instructions.
1. Connecting a wireless USB mouse
A cordless mouse has a small receiver that communicates with the mouse. The receiver connects to the
computer via a USB port. Look for a USB port in the back or on the side of your computer and plug in the
receiver.
Once the wireless receiver is connected to the computer, Windows should automatically find and install the
appropriate drivers as long as you're connected to the Internet. Make sure there are batteries in the mouse or that
it is charged. Next, verify that the mouse is turn on. Many wireless devices have an on and off switch on the
bottom of them.
2. Connecting a wired USB mouse
Connect the USB cable coming from the mouse to one of the USB ports (shown right) on the back or side of
your computer. If you are using a USB port hub, connect the mouse cable to that.
After the mouse is connected, the computer should automatically install the drivers and provide basic
functionality. If the mouse you want to change how any special buttons work, additional software may need to
be installed.
If the mouse is not functioning, see our mouse troubleshooting section.
3. Connecting a Bluetooth mouse
A Bluetooth mouse connects to a computer wirelessly using a Bluetooth signal. The computer must have
Bluetooth built in or have a Bluetooth adapter connected to it.
To connect a Bluetooth mouse to your computer, follow the steps below.
Open the Bluetooth utility on your computer and make sure Bluetooth is turned on. The Bluetooth utility, if
enabled, can usually be found in the notification area, with an icon that looks like the Bluetooth symbol.
Turn on the mouse if it has an On/Off switch. Check the Bluetooth utility to see if it detects the Bluetooth
mouse.
When the Bluetooth utility finds the Bluetooth mouse, select the mouse in the Bluetooth device list and click
the Pair button.
If successful, the mouse will be connected to the computer.
4. Connecting a PS/2 mouse
Connect the cable coming from the mouse to the green-colored PS/2 port (shown right) on the back of the
computer. If your PS/2 ports are not color coded, the mouse port will be the one furthest away from the left
edge of the computer case (when viewed from the back).
After the mouse is connected, the computer should automatically install the drivers and provide basic
functionality. If the mouse you want to change how any special buttons work, additional software may need to
be installed. If the mouse is not functioning, see our mouse troubleshooting section.
5. Connecting a serial mouse
Connect the mouse to the serial port on the back of the computer. If you have more than one serial port on the
computer, we recommend connecting the mouse to the first port. Once connected, depending on your computer
setup, you may need to configure the mouse COM ports in CMOS setup.
Today, most computers no longer have serial ports. Most serial mice are specialized, so to use one, you need to
install the software included with the mouse, or from the mouse manufacturer's website.
Installation of Scanner
Before you can scan documents into your computer with a scanner, you need to install the scanner driver so that
your scanner and computer can communicate. Start by connecting the scanner to your computer’s USB port (see
your scanner manual for information about how it connects to your computer).
1. Turn the scanner on. If you’re not using a Plug and Play device or Windows doesn’t have the driver for
that device, you see the Found New Hardware message.
2. Click the Found New Hardware message, click Yes, This Time Only, and then click next again. You
only need to do this step if you don’t permit Windows 7 to automatically connect to Windows Update.
Otherwise, you don’t see the Found New Hardware Wizard.
3. If you have a CD for the scanner, insert it in your CD drive and click next. Windows 7 searches for your
scanner driver software and installs it.
4. Choose Start→Control Panel and type scanners in the Search box. Windows returns a set of links.
5. Click the View Scanners and Cameras link.
6. Click the Add Device button and then click next. The Scanner and Camera Installation Wizard window
appears. When you click next, the next screen of the wizard appears.
7. Click a Manufacturer in the list on the left and then click a model in the list on the right. Now it’s just a
matter of following the wizard directions based on the model of scanner you choose and whether you
have a manufacturer’s disc (a CD- or DVD-ROM). If you don’t have a disc, Windows can help you
download software from the Internet.
8. When you reach the end of the wizard, click Finish. The installation is complete.
Installation of Printer
Connecting the printer to the computer
Connect the printer to the computer either using a USB cable, parallel port cable, or SCSI cable and then
connect the power plug to a power outlet. Today, most all home computer printers are using a USB cable
similar to the example picture.
Setup printer and install software. Every printer should come with the software used to install a printer in
Windows or your operating system.
1. After everything is plugged in, turn the computer on.
2. Insert the CD that came with the printer. If the CD does not automatically start, open My Computer,
double-click on the CD drive, and then click the Setup or Install file. If you have downloaded the
drivers, run the downloaded setup file.
3. Follow the installation wizard and once completed, your software is installed.
4. Test the printer to make sure it is working.
Installing a printer only using the drivers
If you only want the printer to be installed and none of the extra software programs, you can only install the
printer driver by following the steps below.
1. With the printer connected and powered on, open the Control Panel.
2. In the Control Panel, double-click the Printers or Printers and Faxicon.
3. In the Printers window, click the Add a printer icon.
4. After completing the above steps, you should see the Windows Printer Wizard. Click Next to start the
wizard.
5. Next, you have the choice of installing a Local or Network printer. If the printer is connected to your
computer, choose Local printer attached to this computer and click Next.
6. When prompted for the location of the printer drivers, browse to the directory of your drivers or point it
to the printer CD.
Testing the printer
1. Open the Control Panel.
2. Double-click the Devices and Printers, Printers, or Printers and Fax icon.
3. Right-click on the Printer you want to test and click Properties. If you do not see your printer, your
printer is not installed.
4. In the Printers Properties window, click the Print Test Page button.
5. If the printer can print a test page, your printer is installed and set up properly. However, if you cannot
print in other programs, the program you are attempting to print from has issues.
Installation of Speaker
Follow these step-by-step instructions to attach speakers to your computer
Step 1: Ensure that the computer is turned off.
Step 2: Plug the speakers into the power socket.
Step 3: Locate the 3.5mm jack connected to the cable at the back of the speakers. You’ll use this plug to attach
them to your computer tower.
Step 4: On the back of the computer tower are a number of small, round, coloured-coded sockets. The one to
plug your speakers into is usually green. It may also be marked with a headphones symbol or be labelled ‘Audio
out’.
Push the jack into this socket firmly to get a good connection. But don’t continue pushing if you meet any
resistance – the socket is attached to the sound card on the computer’s mother board, and if you push too hard,
you could damage it.
Step 5: In some speaker set-ups, there’s an additional ‘subwoofer’, a larger third speaker that provides bass
sounds. Before plugging this in, find out if your sound card can support multiple speakers. If it does, follow the
color coding on the back of the tower as you connect the jacks – plug the green jack into the green socket, the
black jack into the black socket and so on.
Step 6: Turn on your computer and speakers and adjust the volume control. Your computer is probably set to
play a small tune when it’s turned on. If you now hear it, you’ll know that the speakers are on and working. But
don’t worry if you don’t hear it.
Step 7: The computer should recognize the addition of speakers to your system and will respond accordingly.
Possibly it will say ‘New driver detected’ and run through a short set-up process. You’ll need to click ‘Yes’ to
allow it to make the appropriate changes.
Step 8: To test that your speakers are working, play something you know has a soundtrack. Pop a CD or DVD
in the DVD drive or watch a clip on YouTube. You may also notice that sounds now occur when simple
functions are carried out – for example, a noise when you click a button or open a window or when an email
arrives.
System software
The system software is a collection of programs designed to operate, control, and extend the processing
capabilities of the computer itself. System software is generally prepared by the computer manufacturers. These
software products comprise of programs written in low-level languages, which interact with the hardware at a
very basic level. System software serves as the interface between the hardware and the end users. Some
examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
Operating system
The operating system is the central part of the computer system, or you can say that it is the lifeline of the
computer. We will install the OS on a computer so that it can function smoothly. Suppose all the devices like
keyboard, mouse, CPU, monitor are connected and now you think as we switch on the power supply, the
computer will start working. No, this is not possible until we install the operating system on it.
It is necessary to install as it performs the following functions:
• It will allocate resources to each task.
• It will keep all hardware parts of the system in a ready state so that it can follow the instructions given by the
user.
• It enables the user to access and use application software.
• It schedules the multiple tasks by priority.
• It controls the improper use of the computer.
• It sets the coordination between the different devices.
• It prevents the error during the use of the software.
• It enables the computer to access network.
• It manages different computer resources such as software, hardware etc..
• It controls the input and output devices of the computer.
• It detects installs and troubleshoots devices.
Example: The earlier OS was MS-DOS which make use of Command Line Interface(CLI). After then,
windows was developed by Microsoft which make use of Graphical User Interface(GUI). So, they keep on
evolving.
Programming Language Translators (Compiler/Interpreter/Assembler)
Programming Language Translators are those who convert the high-level language and middle-level language
into machine language as machine understands only its language. The high-level language is the language
through which the user interacts with the computer. Java, C, C++, PHP, Python all are the examples of high-
level language. Machine language is the code which is understood by the processor only. The average human
being cannot be able to understand it.
Some famous translators are Compiler, Interpreter and assembler. They are designed by the manufacturers of
the computer. Translators can completely translate the code into machine code at once, or they can do it line by
line.
Device Drivers
Driver software is a type of system software so that we can use our devices smoothly without any
troubleshooting problem. This type of software enables the components to perform their tasks as directed by the
OS. Example of device which require driver’s printer, plotter, scanner etc.
If the device is new for the operating system like the printer, then we have to install the drivers so that it get
familiar with the OS. We can install them from the websites of the manufacturers or some other alternative
source like from the internet.
Firmware Software
It is the operational software which is already embedded in flash, ROM, EPROM, EEPROM memory chips so
that the OS can identify them quickly. The task of the firmware is to directly manage and control all the
activities of any single hardware.
Traditionally, firmware was installed on the non-volatile chips. We can upgrade them by changing with the new
programmed chips. However, nowadays, firmware was installed on the flash chips. So, now we can upgrade
them without swapping the chips.
There are two types of chips: BIOS (Basic Input/ Output System) chip and UEFI (Unified Extended Firmware
Interface) chip. The manufacturer installs the firmware on the motherboard, and it can be accessed through
these two types of chips. It is the configuration interface. When the computer is powered on and is going
through POST (Power on Self Test), then it is first loaded. The main difference between the firmware and the
driver is that firmware will reside within the devices whereas the drivers will install in the operating system.
Utility Software
Utility software is a kind of system software which acts as an interface between system software and application
software. These are those programs which are specifically designed for some particular purpose like
maintenance of the computer or diagnose any error in the computer. Generally, these are third-party tools which
come along with the operating system.
The features of the utility software are as follows:
• To protect us against external threats, the inclusion of a firewall is there. Example: windows firewall
• It can scan hardware diagnostic services like performance monitor, hard disk sentinel.
• It can also compress files so that the disk space can be optimised. E.g., WinRAR, WinZip.
• Utility can do disk partition services like Windows Disk Management.
• Utility can help us in recovering in our lost data. E.g., iCare Data Recovery
• Utility can back up our data to increase the security of our systems.
• Utility can do defragmentation of a disk so that the scattered file can be organized on the drive. E.g., Disk
Defragmenter.
• Utility can perform antivirus and security software so that the security of the files and the applications can be
maintained. E.g., AVG, Microsoft Security Essentials etc.
Program Language Translators
Programming Language Translators are those who convert the high-level language and middle-level language
into machine language as machine understands only its language. The high-level language is the language
through which the user interacts with the computer. Java, C, C++, PHP, Python all are the examples of high-
level language. Machine language is the code which is understood by the processor only. The average human
being cannot be able to understand it.
Some famous translators are Compiler, Interpreter and assembler. They are designed by the manufacturers of
the computer. Translators can completely translate the code into machine code at once, or they can do it line by
line.
Application software
Application software products are designed to satisfy a particular need of a particular environment. All software
applications prepared in the computer lab can come under the category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for writing and editing a
simple text. It may also consist of a collection of programs, often called a software package, which work
together to accomplish a task, such as a spreadsheet package. Examples of Application software are the
following.
1. Payroll Software 6. Microsoft Office Suite Software
2. Student Record Software 7. Microsoft Word
3. Inventory Management Software 8. Microsoft Excel
4. Income Tax Software 9. Microsoft PowerPoint
5. Railways Reservation Software 10. Types of system software
Using Mouse
Using a computer mouse is one of the first steps to properly operating a computer. The mouse allows you to
move the cursor and click programs. These steps will show you how to use a PC and MAC computer mouse,
whether it is plugged into the computer, wireless, or connect via Bluetooth.
Using a PC Computer Mouse
1. Familiarize yourself with the mouse. The front of the mouse points away from you and has two buttons
on the left and right which you can click. These allow you to open programs and menus. In the middle of
these two buttons is a small wheel, which allows you to scroll up and down pages.
a. You can use your index finger to click the left button and the middle finger to click the right one.
b. On the bottom of the mouse is a censor that allows the mouse to know where to move.
c. A wireless mouse may have a compartment to insert a battery, and it may have an on and off
button.
2. Place the mouse on a clean, smooth surface, preferably a mouse pad. This allows the mouse to move
without interference. You may have issues with the mouse if it is not on a mouse pad, such as it not
scrolling smoothly.
3. Grip the mouse lightly in your dominant hand. You don’t want to hang on to the mouse too tightly or
click with a lot of force. Keep your fingers relaxed, and keep the mouse at elbow level. If your fingers
become tired, take breaks from the computer.
4. Plug in the mouse with its USB connector. Your mouse will have a cable extending from it, or it will
come with a small USB connector if it is wireless. USB ports are located in different areas for every
computer, but in general, laptops will have USB ports on the left or right side of the keyboard; most
desktops will have a USB on the front or back of the modem or either side of the monitor.
a. Look for a small square port about the size of your USB connector.
b. Insert the USB connector. Flip the USB connector upside down if it does not fit the first time, but
never force the USB connector in.
5. Connect the mouse via Bluetooth if necessary. Plug the Bluetooth transceiver into a USB port, then
press and hold the connect button on the USB transceiver for five seconds. Next, the connection wizard
will pop up, so follow the instructions in the wizard to connect your device.
6. Make sure the mouse is working. Your computer should be on, and you should see a cursor on the
screen you can control by moving your mouse. If the mouse isn’t working, try plugging it in to a
Different USB port or plugging it in again. Also, make sure a wireless mouse is on and has batteries.
7. Practice clicking with the mouse. The left button is the primary button for right-handed users, and the
right button is the primary button for left-handed users. Click the primary button once to click on
something and twice in a row to “double click” on a program or menu. When clicking the non-primary
button, this is called “right-clicking.”
a. Single-clicking often selects an item or opens a menu.
b. Double-clicking often opens items or folders.
c. Right-clicking usually displays a list of things you can do with a selected item.
8. Practice scrolling and dragging items with the mouse. Move the wheel with your pointer finger to scroll
up and down pages. To drag an object, place the cursor on it, then press and hold down the primary
button, and move the mouse to a new location. Release the primary button once you are done.
9. Customize the mouse as needed. You can change how quickly your mouse pointer moves on the screen,
change the mouse’s primary buttons if you’re left handed, and even change the pointer’s appearance. Go
to the settings on your PC to do this.
Running an Application
Now that you have a computer, you probably want to run and
manage software programs, from programs that manage your
finances to a great animated game of bingo. By using the best
methods for accessing and running programs on your
computer, you save time and make your life easier. You can
open, or launch, a program by using any of the following four
methods:
• Choose Start→All Programs. Click the program name
on the All Programs list that appears. You see a list of
programs; just click the program on that sublist to open
it.
• Double-click a program shortcut icon on the desktop.
• Click an item on the taskbar. The taskbar should
display by default; if it doesn’t, press the Windows logo
key (on your keyboard) to display it and then click an
icon on the taskbar, just to the right of the Start button.
• If you used the program recently and saved a document,
choose it from the list of recently used programs
displayed when you first open the Start menu. Then
click a document created in that program from the list that displays.
When the application opens, if it’s a game, play it; if it’s a spreadsheet, enter numbers into it; if it’s your e-mail
program, start deleting junk mail . . . you get the idea.
File Folders and Directory management features
File management in windows can be done through Windows explorer or My Computer. Windows Explorer
displays the hierarchical list
of files, folders, and storage
drives (both fixed and
removable) on your
computer. It also lists any
network drives that have
been mapped to as a drive
letters on your computer.
Windows Explorer can be
used to copy, move,
rename, and search for files
and folders. For example, to
copy a file, you can open a
folder that contains the
desired file to be copied or
moved and then just drag
and drop the file to target
folder or drive.
When files or folders are
deleted from hard disk,
Windows places them in the
Recycle Bin, from where
they can be retrieved, until
the Recycle Bin is made
empty. Files or folders
deleted from a File
Management in Windows removable storage media such as network drive are permanently deleted and are not
sent to the Recycle Bin.
Using Windows Explorer
Windows offer another utility "Windows Explorer" which helps you in working with files and folders on your
computer.
1. To open Windows Explorer,
2. Click on Start,
3. Point to All Programs,
4. Point to Accessories, and then click on Windows Explorer
The left pane of the Explorer window shows a hierarchy of all the drives, folders and desktop items on your
computer. A drive or folder that contains other folders has a plus sign to the left of the icon. Click the plus sign
to expand it and see the folders inside.
Opening drives and folders
Two drives nearly all computers have are a floppy drive (drive A:) and a hard drive (drive C:). If you have more
than one drive, then they are named D:, E: and so on. If you have a CD drive or a DVD drive, it also is named
with a letter. Opening a hard drive is easy. Just double click the icon representing the drive you want to open.
Files and folders contained in the drive are now shown in the opened window. Now for opening a folder, double
click its icon.
1. Coping or Moving a file or Folder using My Document
2. Click on Start, and then click on My Documents.
3. Click the file or folder to be copied. More than one file or folder can be copied at a time.
4. To select more than one consecutive files or folders, click the first file or folder, press and hold down
SHIFT key, and then click the last files or folders.
Opening drives and folders
1. To select non-consecutive files or folders, press and hold down CTRL key, and then click each of the
files or folders to be copied.
2. Under Edit menu, select Copy.
3. Select the target drive or folder to which you want to copy the files
4. Under Edit menu, select Paste to copy the desired file or folder to the target drive.
View file details
1. Click on Start, and then click on My Documents.
2. Double-click the folder that contains the files to be viewed.
3. On the View menu, click Details.
4. It will display all the details about the files such as Name, Type, size etc.
Copying and moving files using Explorer
1. Click Start, point to All Programs, point to Accessories, and then click Windows Explorer.
2. Make sure the destination for the file or folder you want to move is visible.
3. Drag the file or folder from the right pane and drop it on to the destination folder in the left pane to
move the file or folder there.
4. If you drag an item while pressing the right mouse button, you can move, copy, or create a shortcut to
the file in its new location.
5. To copy the item instead of moving it, press and hold down CTRL while dragging.
6. If you drag an item to another disk, it is copied, not moved. To move the item, press and hold down
SHIFT while dragging.
7. Dragging a program to a new location creates a shortcut to that program. To move a program, right-click
and then drag the program to the new location.
Copying and Moving the Files
Create a new folder
Folders help you to organize your files. You can create a folder either by using My Computer window or
through Windows Explorer. You can create a Folder in any existing disk drive or folder or on the windows
desktop. The steps for creating a folder are:
1. Click on Start, and then click on My Documents
2. Under File menu click New and select Folder.
3. A new folder is displayed with the default name, New Folder.
4. Type a name for the new folder, and then press ENTER.
5. A new folder can also be created directly on the desktop by right-clicking a blank area on the desktop,
pointing to New, and then clicking Folder.
Rename a file or folder
1. Click on Start, and then click on My Documents
2. Click on the file or folder you want to rename.
3. Under File menu click on Rename.
4. Type the new name, and then press ENTER key.
5. Alternately file or folder can also be renamed by right-clicking it and then clicking on Rename.
Delete a file or folder
1. Click on Start, and then click on My Documents
2. Click on the file or folder you want to delete.
3. Under File menu click on Delete.
4. Files or folders can also be deleted by right-clicking the file or folder and then clicking Delete.
5. Deleted files or folders are stored in the Recycle Bin, till they are permanently removed from the
Recycle Bin.
6. To retrieve a deleted file, double-click the Recycle Bin icon on the desktop. Right-click on the file to be
retrieved, and then click Restore.
7. To permanently delete a file, press and hold down SHIFT key and drag it to the Recycle Bin.
Using Help
In computing, Help usually refers to online documentation. Many programs come with the instruction manual,
or a portion of the manual, integrated into the program. If you encounter a problem or forget
command while running the program, you can summon the documentation by pressing a designated Help key or
entering a HELP command. In Windows, the Help key is the function key labeled F1.
Using the Help System
Once you summon the Help system, the program often displays a menu of Help topics. You can choose the
appropriate topic for whatever problem you are currently encountering. The program will then display
a help screen that contains the desired documentation. Some programs are more sophisticated, displaying
different Help messages depending on where you are in the program. Such systems are said to be context
sensitive.
The Macintosh Help system is often referred to as Balloon Help because the help messages appear in a cartoon-
like balloon. Newer Macs also have something called Interactive Help, which contains tutorials that show you
how to perform different operations.
Help may refer to any of the following:
1. Help is a term used to describe the process of assisting another person with a problem.
2. Help is an MS-DOS, Windows command line, and Linux command to list an overview of commands
and a quick way to find help.
3. Help is an available option or menu in most software programs that allow users to search and find
answers to questions they may have about that program. Most Microsoft Windows programs can access
help by using the F1 function key on the keyboard.
Ubuntu
Installing Linux: Let's look the various methods we can use to install Ubuntu.
Installing Linux using USB stick
This is one of the easiest methods of installing Ubuntu or any distribution on your computer. Follow the steps.
1. Download the .iso or the OS files on your computer from this link.
2. Download free software like 'Universal USB installer to make a bootable USB stick.
3. Select an Ubuntu Distribution form the dropdown to put on your USB
a. Select your Ubuntu iso file download in step 1.
b. Select the drive letter of USB to install Ubuntu and Press create button.
4. Click YES to Install Ubuntu in USB.
5. After everything has been installed and configured, a small window will appear Congratulations! You
now have Ubuntu on a USB stick, bootable and ready to go.
Installing Linux using CD-ROM
Those who like the way a CD runs should try using this method.
1. Download the .iso or the OS files onto your computer from this
link http://www.ubuntu.com/download/desktop.
2. Burn the files to a CD.
3. Boot your computer from the optical drive and follow the instructions as they come.
BIOS
BIOS (an acronym for Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC
BIOS) is non-volatile firmware used to perform hardware initialization during the booting process (power-on
startup), and to provide runtime services for operating systems and programs. The BIOS firmware comes pre-
installed on a personal computer's system board, and it is the first software to run when powered on.
BIOS (basic input/output system) are the program a personal computer's microprocessor uses to get the
computer system started after you turn it on. It also manages data flow between the computer's operating
system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.
BIOS are an integral part of your computer and comes with it when you bring it home. BIOS are a program that
is made accessible to the microprocessor on an erasable programmable read-only memory (EPROM) chip.
When you turn on your computer, the microprocessor passes control to the BIOS program, which is always
located at the same place on EPROM.
When BIOS boots up (starts up) your computer, it first determines whether all of the attachments are in place
and operational and then it loads the operating system (or key parts of it) into your computer's random access
memory (RAM) from your hard disk or diskette drive.
With BIOS, your operating system and its applications are freed from having to understand exact details (such
as hardware addresses) about the attached input/output devices. When device details change, only the BIOS
program needs to be changed. Sometimes this change can be made during your system setup. In any case,
neither your operating system nor any applications you use need to be changed. When you turn on the
computer, BIOS instructions are initiated. These instructions make it check the RAM and the Processor (for
faults) on your computer.
1. It enumerates the RAM by checking each compartment to see if all of them are working.
2. After checking out RAM and Processor, it checks for other devices attached to the computer
3. It detects all the peripherals, including the keyboard and mouse and then checks for the boot options
4. Boot options are checked in the sequence configured in your BIOS: Boot from CD-ROM, Boot From
Hard Drive, Boot from LAN, etc.
5. It checks for bootstraps on the devices in the order you or the machine vendor configured the BIOS.
6. It passes reigns of the computer to the operating system by loading the essential parts of the OS into the
random access memory (RAM) reserved for the OS, after bootstrap is located.
Word Processing Basics (MS Word / LibreOffice Writer): Opening and Closing of documents;
Text creation and Manipulation; Formatting of text; Table handling; Spell check, language
setting and thesaurus; Printing of word document;
Introduction
Microsoft Word (or simply Word) is a word processor developed by Microsoft. It was first released on October
25, 1983 under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for
several other platforms including IBM PCs running DOS(1983), Apple Macintosh running the Classic Mac
OS (1985), AT&T Unix PC (1985), Atari ST (1988), OS/2 (1989), Microsoft Windows (1989), SCO
Unix (1994), and macOS (formerly OS X; 2001).
Commercial versions of Word are licensed as a standalone product or as a component of Microsoft
Office, Windows RT or the discontinued Microsoft Works suite.
File Format
Microsoft Word's native file formats are denoted either by a .doc or .docx filename extension. Although
the .doc extension has been used in many different versions of Word, it actually encompasses four distinct file
formats:
Basics
Microsoft Office Word 2010 allows you to create and edit personal and business documents, such as letters,
reports, invoices, emails and books. By default, documents saved in Word 2010 are saved with the .docx
extension. Microsoft Word can be used for the following purposes −
1. To create business documents having various graphics including pictures, charts, and diagrams.
2. To store and reuse readymade content and formatted elements such as cover pages and sidebars.
3. To create letters and letterheads for personal and business purpose.
4. To design different documents such as resumes or invitation cards etc.
5. To create a range of correspondence from a simple office memo to legal copies and reference
documents.
Title bar: This lies in the middle and at the top of the window. Title bar shows the program and document titles.
Rulers: Word has two rulers - a horizontal ruler and a vertical ruler. The horizontal ruler appears just beneath
the Ribbon and is used to set margins and tab stops. The vertical ruler appears on the left edge of the Word
window and is used to gauge the vertical position of elements on the page.
Help: The Help Icon can be used to get word related help anytime you like. This provides nice tutorial on
various subjects related to word.
Zoom control: Zoom control lets you zoom in for a closer look at your text. The zoom control consists of a
slider that you can slide left or right to zoom in or out; you can click the + buttons to increase or decrease the
zoom factor.
View Buttons: The group of five buttons located to the left of the Zoom control, near the bottom of the screen,
lets you switch through the Word's various document views.
1. Print Layout view − this displays pages exactly as they will appear when printed.
2. Full Screen Reading view − this gives a full screen view of the document.
3. Web Layout view − this shows how a document appears when viewed by a Web browser, such as
Internet Explorer.
4. Outline view − this lets you work with outlines established using Word’s standard heading styles.
5. Draft view − this formats text as it appears on the printed page with a few exceptions. For example,
headers and footers aren't shown. Most people prefer this mode.
Document Area: This is the area where you type. The flashing vertical bar is called the insertion point and it
represents the location where text will appear when you type.
Status Bar: This displays the document information as well as the insertion point location. From left to right,
this bar contains the total number of pages and words in the document, language, etc.
You can configure the status bar by right-clicking anywhere on it and by selecting or deselecting options from
the provided list.
Dialog Box Launcher: This appears as very small arrow in the lower-right corner of many groups on the
Ribbon. Clicking this button opens a dialog box or task pane that provides more options about the group.
Entering Text
Document area is the area where you type your text. The flashing vertical bar is called the insertion point and it
represents the location where the text will appear when you type. Keep the cursor at the text insertion point and
start typing the text? The following are the two important points that will help you while typing −
1. You do not need to press Enter to start a new line. As the insertion point reaches the end of the line,
Word automatically starts a new one. You will need to press Enter, to add a new paragraph.
2. When you want to add more than one space between words, use the Tab key instead of the spacebar.
This way you can properly align text by using the proportional fonts.
Select Text
1. Selecting text between two points: Click at the start of the block of text, hold down Shift, and click at the
end of the block.
2. Selecting a single word: Double-click anywhere on the word you want to select.
3. Selecting a paragraph: Triple-click anywhere on the paragraph you want to select.
4. Selecting a sentence: Hold down the Ctrl key and click anywhere in the sentence you want to select.
5. Selecting a column of text: Hold down Alt, click and hold the mouse button, and drag over the column you
want to select.
Delete Text
Using Backspace & Delete Keys
1. Backspace: Keep the insertion point just after the character you want to delete and press
the Backspace key. Word deletes the character immediately to the left of the insertion point.
2. Ctrl + Backspace: Keep the insertion point just after the word you want to delete and press Ctrl +
Backspace key. Word deletes the whole word immediately to the left of the insertion point.
3. Delete: Keep the insertion point just before the character you want to delete and press the Delete key. Word
deletes the character immediately to the right of the insertion point.
4. Ctrl + Delete: Keep the insertion point just before the word you want to delete and press Ctrl + Delete key.
Word deletes the word immediately to the right of the insertion point.
Using Selection Method
1. Deleting text between two points: Click at the start of the block of text, hold down the Shift key, and click
at the end of the block to select the portion of text and finally press either the Backspace key or
the Delete key.
2. Deleting a single word: Double-click anywhere on the word you want to delete and finally press either
the Backspace key or the Delete key.
3. Deleting a paragraph: Triple-click anywhere on the paragraph you want to delete and finally press either
the Backspace key or the Delete key.
4. Deleting a sentence: Hold down the Ctrl key and click anywhere in the sentence you want to delete and
finally press either the Backspace or the Delete key.
5. Deleting a column of text: Hold down the Alt key, click and hold the mouse button, and drag over the
column you want to delete and finally press either the Backspace key or the Delete key.
6. Deleting a line: Bring your mouse in the selection bar area and click in front of the line you want to delete
and finally press either the Backspace key or the Delete key.
7. Deleting entire document content: Press Ctrl + A keys to delete the entire document and finally press either
the Backspace key or the Delete key.
Copy & Paste Operation
The Copy operation will just copy the content from its original place and create a duplicate copy of the content
at the desired location without deleting the text from it's the original location. Following is the procedure to
copy the content in word −
1. Select a portion of the text using any of the text selection methods.
2. You have various options available to copy the selected text in clipboard. You can make use of any one of
the options
a. Using Right-Click − When you right-click on the selected text, it will display the copy option, click
this option to copy the selected content in clipboard.
b. Using Ribbon Copy Button − after selecting text, you can use the copy button available at the
ribbon to copy the selected content in clipboard.
c. Using Ctrl + c Keys − after selecting a text, just press Ctrl + c keys to copy the selected content in
clipboard.
3. Finally click at the place where you want to copy the selected text and use either of these two simple
options
a. Using Ribbon Paste Button − Just click the Paste button available at the ribbon to paste the copied
content at the desired location.
b. Using Ctrl + v Keys − This is simplest way of pasting the content. Just press Ctrl + v keys to paste
the content at the new location.
Cut & Paste Operation
The Cut operation will cut the content from its original place and move the content from its original location to
a new desired location. Following is the procedure to move the content in word −
1. Select a portion of the text using any of the text selection methods.
2. Now, you have various options available to cut the selected text and put it in the clipboard. You can make
use of one of the options −
a. Using Right-Click − If right-click on the selected portion of text, it will display cut option, just click
this option to cut the selected content and keep it in clipboard.
b. Using Ribbon Cut Button − after selecting a portion of text, you can use cut button available at the
ribbon to cut the selected content and keep it in clipboard.
c. Using Ctrl + x Keys − after selecting a portion of text, just press Ctrl + x keys to cut the selected
content and keep it in clipboard.
3. Finally, click at the place where you want to move the selected text and use either of these two simple
options −
a. Using Ribbon Paste Button − Just click the Paste button available at the ribbon to paste the content
at the new location.
b. Using Ctrl + v Keys − this is simplest way of pasting the content. Just press Ctrl + v keys to paste
the content at the new location.
Page Formatting
Adjust Margins
The following steps will help you understand how to set margins for an open document.
1. Open the document the margins of which need to be set. If you want the margins to be applied only to a
selected part of a document, select that particular part.
2. Click the Page Layout tab, and click the Margins button in the Page Setup group. This will display a list of
options to be selected but you have to click the Custom Margins option available at the bottom.
You can also select any of the predefined margins from the list, but using custom margins option you will have
more control on all the settings.
3. You will have to display a Page Dialog Box as shown below where you can set top, left, right and bottom
margins under the Margins Tab. Select the Apply to: option to apply the margin on selected text or
complete document.
4. If you are going to bind the document and want to add an extra amount of space on one edge for the
binding, enter that amount in the Gutter text box, and select the side the gutter is on with the Gutter
Position drop-down list. After setting all the desired values for all the margins, click the OK button to apply
the margins.
Add Header and Footer
The following steps will help you understand how to add header and footer in a Word document.
1. Click the Insert tab, and click either the Header button or the Footer button that which needs to be added
first. Assume you are going to add Header; when you click the Header button it will display a list of built-
in Headers from where you can choose any of the headers by simply clicking on it.
2. Once you select any of the headers, it will be applied to the document in editable mode and the text in your
document will appear dimmed, Header and Footer buttons appear on the Ribbon and a Close Header and
Footer button will also appear at the top-right corner.
3. Finally, you can type your information whatever you want to have in your document header and once you
are done, click Close Header and Footer to come out of the header insertion mode. You will see the final
result as follows.
Edit Header and Footer
The following steps will help you understand how to edit the existing header or footer of your document.
1. Click the Insert tab, and click either the Header button or Footer button or whatever you want to edit.
Assume you are going to edit the Header, so when you click the Header button it will display a list of
options including the Edit Header option.
2. Click on the Edit Header option and Word will display the editable header as shown in the following
screenshot.
3. Now you can edit your document header and once you are done, click Close Header and Footer to come
out of the edit header mode.
Add Page Numbers
Following are the simple steps to add page numbers in a Word document.
1. Click the Insert tab, and click the Page Number button available in the header and footer section. This will
display a list of options to display the page number at the top, bottom, current position etc.
2. When you move your mouse pointer over the available options, it displays further styles of page numbers
to be displayed. For example, when I take the mouse pointer at the Bottom of Page option it displays the
following list of styles.
3. Finally, select any one of the page number styles. I selected the Accent Bar 1style by clicking over it. You
will be directed to the Page Footer modification mode. Click the Close Header and Footer button to come
out of the Footer Edit mode.
You can format your page numbers using the Format Page Numbers option available under the listed options.
Remove Page Numbers
The following steps will help you remove page numbering from a Word document.
1. Click the Insert tab, and click the Page Number button available in the header and footer section. This will
display a list of options to display page number at the top, bottom, current position, etc. At the bottom, you
will have the Remove Page Number soption. Just click this option and it will delete all the page numbers
set in your document.
Insert Page Breaks
The following steps will help you insert page breaks in a Word document.
2. Step 1 − Bring your insertion point immediately before the text that has to appear on a new page.
3. Step 2 − Click the Insert tab, and click the Page Break button available in the Pages group.
Word inserts a page break and moves all text after the page break onto a new page. You can also use the Ctrl +
Enter keys to create a page break at the pointed location.
Delete a Page Break
Just put the insertion point on the previous page of the page break that needs to be deleted. Press the Delete key
multiple times until both the pages get merged.
Insert Blank Pages
Following are the simple steps to insert blank page in a word document.
1. Bring your insertion point immediately before the text where you want to insert a blank page.
2. Click the Insert tab, and click the Blank Page button available in the Pages group.
Word inserts a new blank page and moves all the text after the page break onto a new page.
Delete Blank Pages
The following steps will help you delete blank page from a Word document.
1. Click the Home tab, and click the Show/Hide ¶ paragraph marks button available in the Paragraph group or
simply press the Ctrl + Shift + * keys. This will display all the page breaks as shown below −
2. Bring your cursor immediately before the Page Break mark available on the blank page and press
the Delete Key. This will delete the blank page and again you can click the Show/Hide ¶ paragraph marks
button to hide all the paragraph marks.
Add Cover Pages
Following are the simple steps to add a cover page in a Word document.
1. Click the Insert tab, and click the Cover Page button available in the Pages group. This will display a list
of Built-in Cover Pages as shown below.
2. Choose a cover page from the options available in the gallery. The selected cover page will be added as the
first page of your document which can later be modified according to the requirements. If you want to
place the cover page elsewhere except the first page, right-click the cover page in the gallery and select the
location you want from the menu that appears.
Delete Cover Pages
The following steps will help you understand how to delete an existing cover page from a Word document.
1. Click the Insert tab, and click the Cover Page button available in the Pages group. This will display a list of
Built-in Cover Pages as shown below. You will find a Remove Current Cover Page option available at the
bottom of the cover page gallery.
2. Click the Remove Current Cover Page option and your cover page will be deleted from your document.
Change Page Orientation
The following steps will help you understand how to change the page orientation of a word document.
1. Open the Word document the orientation of which needs to be changed. By default, orientation will
be Portrait Orientation as shown below.
2. Click the Page Layout tab, and click the Orientation button available in the Page Setup group. This will
display an Option Menu having both the options (Portrait & Landscape) to be selected.
3. Click any of the options you want to set to orientation. Because our page is already in portrait orientation,
we will click the Landscape option to change my orientation to landscape orientation.
Split a Table
Following are the simple steps to split a table into two tables in a Word document.
1. Bring your mouse pointer position anywhere in the row that should appear as the first row of the new table.
2. Now click the Layout tab and then click the Split Table button which will split the table into two tables and
the selected row will become the first row of the lower table.
After splitting the table into two tables, you can further divide it into two parts and you can continue dividing
the Word tables as long as a table has more than one row.
Split a Cell
The following steps will help you split a cell into two sub-cells of a table available in word document.
1. Bring your mouse pointer position inside the cell that has to be divided into multiple cells.
2. Now click the Layout tab and then click the Split Cells button; this will display a dialog box asking for the
number of rows and columns to be created from the selected cell.
3. Select the desired number of rows and columns that have to go into the resultant cell and finally click
the OK button to apply the result. ou can divide a cell into multiple cells either row-wise or column-wise or
both.
Add a Formula
Following are the simple steps to add formula in a table cell available in Word document.
1. Consider the following table with the total number of rows. Click in a cell that should contain the sum of
the rows.
2. Now click the Layout tab and then click the Formula button; this will display a Formula Dialog Box which
will suggest a default formula, which is =SUM(LEFT) in our case. You can select a number format
using Number Format List Box to display the result or you can change the formula using the Formula List
Box.
3. Now click OK to apply the formula and you will see that the left cells have been added and the sum has
been put in the total cell where we wanted to have it. You can repeat the procedure to have the sum of other
two rows as well.
Cell Formulae
The Formula dialog box provides the following important functions to be used as formula in a cell.
1. AVERAGE( ): The average of a list of cells
2. COUNT( ): The number of items in a list of cells
3. MAX( ): The largest value in a list of cells
4. MIN( ): The smallest value in a list of cells
5. PRODUCT( ): The multiplication of a list of cells
6. SUM( ): The sum of a list of cells
Add Borders to Table
The following steps will help you add borders in a table cell available in Word document.
1. Select the table to which you want to add border. To select a table, click over the table anywhere which
will make the Cross icon visible at the top-left corner of the table. Click this cross icon to select the table.
2. Click the Border button to display a list of options to put a border around the selected table. You can select
any of the option available by simply clicking over it.
3. Try to add and remove different borders like left, right, top or bottom by selecting different options from
the border options.
4. You can apply border to any of the selected row or column. You can try it yourself.
5. To delete the existing border, simply select the No Border option from the border options.
Using Border Options
You can add borders of your choice to word table by following the simple steps given below.
1. Click the Border button to display a list of options to put a border. Select the Border and Shading option
available at the bottom of the list of options as shown in the above screenshot. This will display a Border
and Shading dialog box. This dialog box can be used to set borders and shading around a selected table.
2. Click the Border tab; this will display a list of border settings, styles and options whether this border should
be applied to the table or text or paragraph.
3. You can use the Preview section to disable or enable left, right, top or bottom borders of the selected table
or row or column. Follow the given instructions in the preview section itself to design the border you like.
4. You can customize your border by setting its color, width by using different width thickness available
under the style section.
Add Shades to Table
The following steps will help you add shades on a selected table or its rows or columns.
1. Select a row or column where you want to apply a shade of your choice.
2. Click the Border button to display a list of options to put a border. Select the Border and Shading option
available at the bottom of the list of options. This will display a Border and Shading dialog box. This
dialog box can be used to set borders and shading around selected row(s) or column(s).
3. Click the Shading tab which will display options to select fill, color and style and whether this border
should be applied to cell or table or selected portion of text.
4. You can use the Preview section to have an idea about the expected result. Once you are done, click
the OK button to apply the result.
Printing Document
Preview Documents
The following steps will help you preview your Microsoft Word Document.
1. Open the document the preview of which you want to see.
2. Click the File tab followed by the Print option; this will display a preview of the document in the right
column. You can scroll up or scroll down your document to walk through the document using the
given Scrollbar. In the next chapter, we will learn how to print the previewed document and how to set
different printing options..
3. Once you are done with your preview, you can click the Home tab to go to the actual content of the
document.
Printing Documents
The following steps will help you print your Microsoft Word document.
1. Open the document for which you want to see the preview. Next click the Filetab followed by
the Print option which will display a preview of the document in the right column. You can scroll up or
scroll down your document to walk through the document using given Scrollbar. The middle column gives
various options to be set before you send your document to the printer.
2. You can set various other printing options available. Select from among the following options, depending
on your preferences. Option and Description
a. Copies: Set the number of copies to be printed; by default, you will have one copy of the document.
b. Print Custom Range: This option will be used to print a particular page of the document. Type the
number in Pages option, if you want to print all the pages from 7 till 10 then you would have to
specify this option as 7-10 and Word will print only 7th, 8th, 9thand 10th pages.
c. Print One Sided: By default, you print one side of the page. There is one more option where you
will turn up your page manually in case you want to print your page on both sides of the page.
d. Collated: By default, multiple copies will print Collated; if you are printing multiple copies and you
want the copies uncollected, select the uncollected option.
e. Orientation: By default, page orientation is set to Portrait; if you are printing your document in
landscape mode then selects the Landscape mode.
f. A4: By default, the page size is A4, but you can select other page sizes available in the dropdown
list.
g. Custom Margin: Click the Custom Margins dropdown list to choose the document margins you
want to use. For instance, if you want to print fewer pages, you can create narrower margins; to
print with more white space, create wider margins.
h. 1 Page per Sheet: By default, the number of pages per sheet is 1 but you can print multiple pages on
a single sheet. Select any option you like from the given dropdown list by clicking over the 1 Page
per Sheet option.
3. Once you are done with your setting, click on the Print button which will send your document to the printer
for final printing.
Using Spread Sheets (MS Excel / LibreOffice Calc) Basic operations of Spreadsheets;
Manipulation of cells; Formulas and Functions; Editing of Spread Sheet, printing of Spread
Sheet;
Introduction
Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features
calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for
Applications. It has been a very widely applied spreadsheet for these platforms, especially since version 5 in
1993, and it has replaced Lotus 1-2-3 as the industry standard for spreadsheets. Excel forms part of
the Microsoft Office suite of software.
File extensions
Microsoft Excel 2007, along with the other products in the Microsoft Office 2007 suite, introduced new file
formats. The first of these (.xlsx) is defined in the Office Open XML (OOXML) specification.
Excel 2010 formats
Format Extension Description
The default Excel 2007 and later workbook format. In reality a Zip compressed
archive with a directory structure of XML text documents. Functions as the
Excel Workbook .xlsx
primary replacement for the former binary .xls format, although it does not
support Excel macros for security reasons.
Excel Macro-
enabled .xlsm As Excel Workbook, but with macro support.
Workbook
As Excel Macro-enabled Workbook, but storing information in binary form
Excel Binary rather than XML documents for opening and saving documents more quickly
.xlsb
Workbook and efficiently. Intended especially for very large documents with tens of
thousands of rows, and/or several hundreds of columns.
Excel Macro- A template document that forms a basis for actual workbooks, with macro
.xltm
enabled Template support. The replacement for the old .xlt format.
Excel Excel add-in to add extra functionality and tools. Inherent macro support because of the file
.xlam
Add-in purpose.
Explore Window
The following basic window appears when you start the excel application. Let us now understand the various
important parts of this window.
File Tab
The File tab replaces the Office button from Excel 2007. You can click it to check the Backstage view, where
you come when you need to open or save files, create new sheets, print a sheet, and do other file-related
operations.
Quick Access Toolbar
You will find this toolbar just above the File tab and its purpose is to provide a convenient resting place for the
Excel's most frequently used commands. You can customize this toolbar based on your comfort.
Ribbon
Editing Worksheet
Inserting Data
For inserting data in MS Excel, just activate the cell type text or number and press enter or Navigation keys.
Inserting Formula
For inserting formula in MS Excel go to the formula bar, enter the formula and then press enter or navigation
key. See the screen-shot below to understand it.
Modifying Cell Content
For modifying the cell content just activate the cell, enter a new value and then press enter or navigation key to
see the changes. See the screen-shot below to understand it.
Select with Mouse
Drag the mouse over the data you want to select. It will select those cells as shown below.
Select with Special
If you want to select specific region, select any cell in that region. Pressing F5 will show the below dialogue
box. Click on Special button to see the below dialogue box. Select current region from the radio buttons. Click
on ok to see the current region selected.As you can see in the below screen, the data is selected for the current
region.
Delete with Mouse
Select the data you want to delete. Right Click on the sheet. Select the delete option, to delete the data.
Delete with Delete Key
Select the data you want to delete. Press on the Delete Button from the keyboard, it will delete the data.
Selective Delete for Rows
Select the rows, which you want to delete with Mouse click + Control Key. Then right click to show the
various options. Select the Delete option to delete the selected rows.
Move data
Let us see how we can Move Data with MS Excel.
1. Step 1 − Select the data you want to Move. Right Click and Select the cut option.
2. Step 2 − Select the first cell where you want to move the data. Right click on it and paste the data. You
can see the data is moved now.
Row and Column Basics
MS Excel is in tabular format consisting of rows and columns.
1. Row runs horizontally while Column runs vertically.
2. Each row is identified by row number, which runs vertically at the left side of the sheet.
3. Each column is identified by column header, which runs horizontally at the top of the sheet.
For MS Excel 2010, Row numbers ranges from 1 to 1048576; in total 1048576 rows, and Columns ranges
from A to XFD; in total 16384 columns.
Navigation with Rows and Columns
Let us see how to move to the last row or the last column.
1. You can go to the last row by clicking Control + Down Navigation arrow.
2. You can go to the last column by clicking Control + Right Navigation arrow.
Cell Introduction
The intersection of rows and columns is called cell. Cell is identified with Combination of column header and
row number. For example − A1, A2.
Copy Paste
1. To copy and paste, just select the cells you want to copy. Choose copy optionafter right click or
press Control + C.
2. Select the cell where you need to paste this copied content. Right click and select paste option or
press Control + V.
3. In this case, MS Excel will copy everything such as values, formulas, Formats, Comments and
validation. MS Excel will overwrite the content with paste. If you want to undo this, press Control +
Z from the keyboard.
4. Copy Paste using Office Clipboard
5. When you copy data in MS Excel, it puts the copied content in Windows and Office Clipboard. You can
view the clipboard content by Home → Clipboard. View the clipboard content. Select the cell where
you need to paste. Click on paste, to paste the content.
Copy Paste in Special way
You may not want to copy everything in some cases. For example, you want to copy only Values or you want
to copy only the formatting of cells. Select the paste special option as shown below. Below are the various
options available in paste special.
1. All − Pastes the cell’s contents, formats, and data validation from the Windows Clipboard.
2. Formulas − Pastes formulas, but not formatting.
3. Values − Pastes only values not the formulas.
4. Formats − Pastes only the formatting of the source range.
5. Comments − Pastes the comments with the respective cells.
6. Validation − Pastes validation applied in the cells.
7. All using source theme − Pastes formulas, and all formatting.
8. All except borders − Pastes everything except borders that appear in the source range.
9. Column Width − Pastes formulas, and also duplicates the column width of the copied cells.
10. Formulas & Number Formats − Pastes formulas and number formatting only.
11. Values & Number Formats − Pastes the results of formulas, plus the number.
12. Merge Conditional Formatting − This icon is displayed only when the copied cells contain conditional
formatting. When clicked, it merges the copied conditional formatting with any conditional formatting
in the destination range.
13. Transpose − Changes the orientation of the copied range. Rows become columns, and columns become
rows. Any formulas in the copied range are adjusted so that they work properly when transposed.
Find and Replace Dialogue
Let us see how to access the Find & Replace Dialogue. To access the Find & Replace, Choose Home → Find
& Select → Find or press Control + F Key. You can replace the found text with the new text in the Replace
tab.
Exploring Options
Now, let us see the various options available under the Find dialogue.
1. Within − Specifying the search should be in Sheet or workbook.
2. Search By − Specifying the internal search method by rows or by columns.
3. Look In − If you want to find text in formula as well, then select this option.
4. Match Case − If you want to match the case like lower case or upper case of words, then check this
option.
5. Match Entire Cell Content − If you want the exact match of the word with cell, then check this option.
Spell Check Basis
Let us see how to access the spell check.
1. To access the spell checker, Choose Review ➪ Spelling or press F7.
2. To check the spelling in just a particular range, select the range before you activate the spell checker.
3. If the spell checker finds any words it does not recognize as correct, it displays the Spelling
dialogue with suggested options.
Exploring Options
Let us see the various options available in spell check dialogue.
1. Ignore Once − Ignores the word and continues the spell check.
2. Ignore All − Ignores the word and all subsequent occurrences of it.
3. Add to Dictionary − Adds the word to the dictionary.
4. Change − Changes the word to the selected word in the Suggestions list.
5. Change All − Changes the word to the selected word in the Suggestions list and changes all subsequent
occurrences of it without asking.
6. AutoCorrect − Adds the misspelled word and its correct spelling (which you select from the list) to the
AutoCorrect list.
Zoom Slider
By default, everything on screen is displayed at 100% in MS Excel. You can change the zoom percentage from
10% (tiny) to 400% (huge). Zooming doesn’t change the font size, so it has no effect on the printed output.
You can view the zoom slider at the right bottom of the workbook.
Zoom In
You can zoom in the workbook by moving the slider to the right. It will change the only view of the workbook.
You can have maximum of 400% zoom in.
Zoom Out
You can zoom out the workbook by moving the slider to the left. It will change the only view of the workbook.
You can have maximum of 10% zoom in. .
Special Symbol
Using Symbols
Go to Insert » Symbols » Symbol to view available symbols. You can see many symbols available there like
Pi, alpha, beta, etc. Select the symbol you want to add and click insert to use the symbol.
Using Special Characters
Go to Insert » Symbols » Special Characters to view the available special characters. You can see many special
characters available there like Copyright, Registered etc. Select the special character you want to add and click
insert, to use the special character.
Adding Comment to Cell
Adding comment to cell helps in understanding the purpose of cell, what input it should have, etc. It helps in
proper documentation. To add comment to a cell, select the cell and perform any of the actions mentioned
below.
1. Choose Review » Comments » New Comment.
2. Right-click the cell and choose Insert Comment from available options.
3. Press Shift+F2.
Initially, a comment consists of Computer's user name. You have to modify it with text for the cell comment.
Modifying Comment
You can modify the comment you have entered before as mentioned below.
1. Select the cell on which the comment appears.
2. Right-click the cell and choose the Edit Comment from the available options.
3. Modify the comment.
Formatting Comment
Various formatting options are available for comments. For formatting a comment, Right click on cell » Edit
comment » Select comment » Right click on it » Format comment. With formatting of comment you can
change the color, font, size, etc of the comment.
Text Boxes
Text boxes are special graphic objects that combine the text with a rectangular graphic object. Text boxes and
cell comments are similar in displaying the text in rectangular box. But text boxes are always visible, while cell
comments become visible after selecting the cell.
Adding Text Boxes
To add a text box, perform the below actions.
Choose Insert » Text Box » choose text box or draw it.
Initially, the comment consists of Computer's user name. You have to modify it with text for the cell comment.
Formatting Text Box
After you have added the text box, you can format it by changing the font, font size, font style, and alignment,
etc. Let us see some of the important options of formatting a text box.
1. Fill − Specifies the filling of text box like No fill, solid fill. Also specifying the transparency of text box
fill.
2. Line Color − Specifies the line color and transparency of the line.
3. Line Style − Specifies the line style and width.
4. Size − Specifies the size of the text box.
5. Properties − Specifies some properties of the text box.
6. Text Box − Specifies text box layout, Auto-fit option and internal margins.
Undo Changes
You can reverse almost every action in Excel by using the Undo command. We can undo changes in following
two ways.
1. From the Quick access tool-bar » Click Undo.
2. Press Control + Z.
You can reverse the effects of the past 100 actions that you performed by executing Undo more than once. If
you click the arrow on the right side of the Undo button, you see a list of the actions that you can reverse. Click
an item in that list to undo that action and all the subsequent actions you performed.
Redo Changes
You can again reverse back the action done with undo in Excel by using the Redo command. We can redo
changes in following two ways.
1. From the Quick access tool-bar » Click Redo.
2. Press Control + Y.
Formatting Cell
MS Excel Cell can hold different types of data like Numbers, Currency, Dates, etc. You can set the cell type in
various ways as shown below −
1. Right Click on the cell » Format cells » Number.
2. Click on the Ribbon from the ribbon.
Various Cell Formats: Below are the various cell formats.
1. General − this is the default cell format of Cell.
2. Number − this displays cell as number with separator.
3. Currency − this displays cell as currency i.e. with currency sign.
4. Accounting − Similar to Currency, used for accounting purpose.
5. Date − various date formats are available under this like 17-09-2013, 17th-Sep-2013, etc.
6. Time − Various Time formats are available under this, like 1.30PM, 13.30, etc.
7. Percentage − this displays cell as percentage with decimal places like 50.00%.
8. Fraction − this displays cell as fraction like 1/4, 1/2 etc.
9. Scientific − this displays cell as exponential like 5.6E+01.
10. Text − this displays cell as normal text.
11. Special − Special formats of cell like Zip code, Phone Number.
12. Custom − you can use custom format by using this.
Setting Font from Home
You can set the font of the selected text from Home » Font group » select the font. Setting Font From Format
Cell Dialogue
1. Right click on cell » Format cells » Font Tab
2. Press Control + 1 or Shift + Control + F
Text Decoration
Various options are available in Home tab of the ribbon as mentioned below.
1. Bold − It makes the text in bold by choosing Home » Font Group » Click B or Press Control + B.
2. Italic − It makes the text italic by choosing Home » Font Group » Click I or Press Control + I.
3. Underline − It makes the text to be underlined by choosing Home » Font Group » Click U or
Press Control + U.
4. Double Underline − It makes the text highlighted as double underlined by choose Home » Font Group »
Click arrow near U » Select Double Underline.
More Text Decoration Options
There are more options available for text decoration in Formatting cells » Font Tab » Effects cells as
mentioned below.
1. Strike-through − It strikes the text in the center vertically.
2. Super Script − It makes the content to appear as a super script.
3. Sub Script − It makes content to appear as a sub script.
Rotating Cell from Home Tab
Click on the orientation in the Home tab. Choose options available like Angle CounterClockwise, Angle
Clockwise, etc.
Rotating Cell from Formatting Cell
Right Click on the cell. Choose Format cells » Alignment » Set the degree for rotation.
Changing Background Color
By default the background color of the cell is white in MS Excel. You can change it as per your need
from Home tab » Font group » Background color.
Changing Foreground Color
By default, the foreground or text color is black in MS Excel. You can change it as per your need from Home
tab » Font group » Foreground color.
Also you can change the foreground color by selecting the cell Right click » Format cells » Font Tab » Color.
Change Alignment from Home Tab
You can change the Horizontal and vertical alignment of the cell. By default, Excel aligns numbers to the right
and text to the left. Click on the available option in the Alignment group in Home tab to change alignment.
Change Alignment from Format Cells
Right click on the cell and choose format cell. In format cells dialogue, choose Alignment Tab. Select the
available options from the Vertical alignment and Horizontal alignment options.
Exploring Alignment Options
1. Horizontal Alignment − you can set horizontal alignment to Left, Centre, Right, etc.
Left − Aligns the cell contents to the left side of the cell.
Center − Centers the cell contents in the cell.
Right − Aligns the cell contents to the right side of the cell.
Fill − Repeats the contents of the cell until the cell’s width is filled.
Justify − Justifies the text to the left and right of the cell. This option is applicable only if the cell is
formatted as wrapped text and uses more than one line.
2. Vertical Alignment − you can set Vertical alignment to top, Middle, bottom, etc.
Top Aligns the cell contents to the top of the cell.
Center Centers the cell contents vertically in the cell.
Bottom Aligns the cell contents to the bottom of the cell.
Justify Justifies the text vertically in the cell; this option is applicable only if the cell is formatted as
wrapped text and uses more than one line.
Merge Cells
MS Excel enables you to merge two or more cells. When you merge cells, you don’t combine the contents of
the cells. Rather, you combine a group of cells into a single cell that occupies the same space.
You can merge cells by various ways as mentioned below.
1. Choose Merge & Center control on the Ribbon, which is simpler. To merge cells, select the cells that
you want to merge and then click the Merge & Center button.
2. Choose Alignment tab of the Format Cells dialogue box to merge the cells.
Additional Options
The Home » Alignment group » Merge & Center control contains a drop-down list with these additional
options −
1. Merge Across − When a multi-row range is selected, this command creates multiple merged cells —
one for each row.
2. Merge Cells − Merges the selected cells without applying the Center attribute.
3. Unmerge Cells − Unmerges the selected cells.
Wrap Text and Shrink to Fit
If the text is too wide to fit the column width but don’t want that text to spill over into adjacent cells, you can
use either the Wrap Text option or the Shrink to Fit option to accommodate that text.
Apply Borders
MS Excel enables you to apply borders to the cells. For applying border, select the range of cells Right Click »
Format cells » Border Tab » Select the Border Style.
Then you can apply border by Home Tab » Font group » Apply Borders.
Apply Shading
You can add shading to the cell from the Home tab » Font Group » Select the Color.
Formatting Cells
In MS Excel, you can apply formatting to the cell or range of cells by Right Click » Format cells » Select the
tab. various tabs are available as shown below. Alternative to Placing Background
1. Number − you can set the Format of the cell depending on the cell content. Find tutorial on this at MS
Excel - Setting Cell Type.
2. Alignment − you can set the alignment of text on this tab. Find tutorial on this at MS Excel - Text
Alignments.
3. Font − you can set the Font of text on this tab. Find tutorial on this at MS Excel - Setting Fonts.
4. Border − you can set border of cell with this tab. Find tutorial on this at MS Excel - Borders and
Shades.
5. Fill − you can set fill of cell with this tab. Find tutorial on this at MS Excel - Borders and Shades.
6. Protection − you can set cell protection option with this tab.
Formatting Worksheet
Sheet Options
MS Excel provides various sheet options for printing purpose like generally cell gridlines aren’t printed. If you
want your printout to include the gridlines, Choose Page Layout » Sheet Options group » Gridlines » Check
Print. Options in Sheet Options Dialogue
Print Area − you can set the print area with this option.
Print Titles − you can set titles to appear at the top for rows and at the left for columns.
Print −
o Gridlines − Gridlines to appear while printing worksheet.
o Black & White − Select this check box to have your color printer print the chart in black and
white.
o Draft quality − Select this check box to print the chart using your printer’s draft-quality setting.
o Rows & Column Heading − Select this check box to have rows and column heading to print.
Page Order −
o Down, then Over − It prints the down pages first and then the right pages.
o Over, then Down − It prints right pages first and then comes to print the down pages.
Margins
Margins are the unprinted areas along the sides, top, and bottom of a printed page. All printed pages in MS
Excel have the same margins. You can’t specify different margins for different pages. You can set margins by
various ways as explained below.
Choose Page Layout » Page Setup » Margins drop-down list, you can select Normal, Wide, Narrow, or
the custom Setting.
These options are also available when you choose File » Print.
If none of these settings does the job, choose Custom Margins to display the Margins tab of the Page Setup
dialog box.
Center on Page
By default, Excel aligns the printed page at the top and left margins. If you want the output to be centered
vertically or horizontally, select the appropriate check box in the Center on Page section of the Margins tab as
shown in the above screenshot.
Page Orientation
Page orientation refers to how output is printed on the page. If you change the orientation, the onscreen page
breaks adjust automatically to accommodate the new paper orientation.
Types of Page Orientation
Portrait − Portrait to print tall pages (the default).
Landscape − Landscape to print wide pages. Landscape orientation is useful when you have a wide
range that doesn’t fit on a vertically oriented page.
Changing Page Orientation
Choose Page Layout » Page Setup » Orientation » Portrait or Landscape.
Choose File » Print.
Header and Footer
A header is the information that appears at the top of each printed page and a footer is the information that
appears at the bottom of each printed page. By default, new workbooks do not have headers or footers.
Adding Header and Footer
Choose Page Setup dialog box » Header or Footer tab.
You can choose the predefined header and footer or create your custom ones.
&[Page] − Displays the page number.
&[Pages] − Displays the total number of pages to be printed.
&[Date] − Displays the current date.
&[Time] − Displays the current time.
&[Path]&[File] − Displays the workbook’s complete path and filename.
&[File] − Displays the workbook name.
&[Tab] − Displays the sheet’s name.
Other Header and Footer Options
When a header or footer is selected in Page Layout view, the Header & Footer » Design » Options group
contains controls that let you specify other options −
Different First Page − Check this to specify a different header or footer for the first printed page.
Different Odd & Even Pages − Check this to specify a different header or footer for odd and even
pages.
Scale with Document − If checked, the font size in the header and footer will be sized. Accordingly if
the document is scaled when printed. This option is enabled, by default.
Align with Page Margins − If checked, the left header and footer will be aligned with the left margin,
and the right header and footer will be aligned with the right margin. This option is enabled, by default.
Page Breaks
If you don’t want a row to print on a page by itself or you don't want a table header row to be the last line on a
page. MS Excel gives you precise control over page breaks.
MS Excel handles page breaks automatically, but sometimes you may want to force a page break either a
vertical or a horizontal one. so that the report prints the way you want. For example, if your worksheet consists
of several distinct sections, you may want to print each section on a separate sheet of paper.
Inserting Page Breaks
Insert Horizontal Page Break − For example, if you want row 14 to be the first row of a new page, select cell
A14. Then choose Page Layout » Page Setup Group » Breaks » Insert Page Break.
Insert vertical Page break − In this case, make sure to place the pointer in row 1. Choose Page Layout » Page
Setup » Breaks » Insert Page Break to create the page break.
Removing Page Breaks
Remove a page break you’ve added − Move the cell pointer to the first row beneath the manual page
break and then choose Page Layout » Page Setup » Breaks » Remove Page Break.
Remove all manual page breaks − Choose Page Layout » Page Setup » Breaks » Reset All Page Breaks.
Background Image
Unfortunately, you cannot have a background image on your printouts. You may have noticed the Page Layout
» Page Setup » Background command. This button displays a dialogue box that lets you select an image to
display as a background. Placing this control among the other print-related commands is very misleading.
Background images placed on a worksheet are never printed.
Alternative to Placing Background
You can insert a Shape, WordArt, or a picture on your worksheet and then adjust its transparency. Then
copy the image to all printed pages.
You can insert an object in a page header or footer.
Freezing Panes
If you set up a worksheet with row or column headings, these headings will not be visible when you scroll
down or to the right. MS Excel provides a handy solution to this problem with freezing panes. Freezing panes
keeps the headings visible while you’re scrolling through the worksheet.
Using Freeze Panes
Follow the steps mentioned below to freeze panes.
Select the First row or First Column or the row Below, which you want to freeze, or Column right to
area, which you want to freeze.
Choose View Tab » Freeze Panes.
Select the suitable option −
o Freeze Panes − To freeze area of cells.
o Freeze Top Row − To freeze first row of worksheet.
o Freeze First Column − To freeze first Column of worksheet.
If you have selected Freeze top row you can see the first row appears at the top, after scrolling also. See
the below screen-shot.
Unfreeze Panes
To unfreeze Panes, choose View Tab » Unfreeze Panes.
Conditional Formatting
MS Excel 2010 Conditional Formatting feature enables you to format a range of values so that the values
outside certain limits, are automatically formatted.
Choose Home Tab » Style group » Conditional Formatting dropdown.
Various Conditional Formatting Options
Highlight Cells Rules − It opens a continuation menu with various options for defining the formatting
rules that highlight the cells in the cell selection that contain certain values, text, or dates, or that have
values greater or less than a particular value, or that fall within a certain ranges of values.
Suppose you want to find cell with Amount 0 and Mark them as red. Choose Range of cell » Home Tab »
Conditional Formatting DropDown » Highlight Cell Rules » Equal To.
After Clicking ok, the cells with value zero are marked as red.
Top/Bottom Rules − It opens a continuation menu with various options for defining the formatting rules
that highlight the top and bottom values, percentages, and above and below average values in the cell
selection.
Suppose you want to highlight the top 10% rows you can do this with these Top/Bottom rules.
Data Bars − It opens a palette with different color data bars that you can apply to the cell selection to
indicate their values relative to each other by clicking the data bar thumbnail.
With this conditional Formatting data Bars will appear in each cell.
Color Scales − It opens a palette with different three- and two-colored scales that you can apply to the
cell selection to indicate their values relative to each other by clicking the color scale thumbnail.
See the below screenshot with Color Scales, conditional formatting applied.
Icon Sets − It opens a palette with different sets of icons that you can apply to the cell selection to
indicate their values relative to each other by clicking the icon set.
See the below screenshot with Icon Sets conditional formatting applied.
New Rule − It opens the New Formatting Rule dialog box, where you define a custom conditional
formatting rule to apply to the cell selection.
Clear Rules − It opens a continuation menu, where you can remove the conditional formatting rules for
the cell selection by clicking the Selected Cells option, for the entire worksheet by clicking the Entire
Sheet option, or for just the current data table by clicking the This Table option.
Manage Rules − It opens the Conditional Formatting Rules Manager dialog box, where you edit and
delete particular rules as well as adjust their rule precedence by moving them up or down in the Rules
list box.
Introduction
Microsoft PowerPoint is a commercial presentation application written and distributed by Microsoft for
Microsoft Windows and Mac OS X. The current versions at the time of writing this tutorial are 2010 for
Microsoft Windows and 2011 for Mac OS X. Microsoft PowerPoint is a presentation tool that supports text,
shapes, graphics, pictures and multimedia along with integration with other Microsoft Office products like
Excel. By default, documents saved in PowerPoint 2010 are saved with the .pptx extension whereas; the file
extension of the prior PowerPoint versions is .ppt.
Explore Window
The following screenshot shows the various areas in a standard PowerPoint file. It is important to familiarize
yourself with these areas as it makes learning and using PowerPoint easier.
File Tab
This tab opens the backstage view which basically allows you to manage the file and settings in PowerPoint.
You can save presentations, open existing ones and create new presentations based on blank or predefined
templates. The other file related operations can also be executed from this view.
Ribbon
Rearranging Slide
Normal View
1. Select the slide to be moved.
2. Left click on the slide and drag it to the position in the sequence where you want to place it. PowerPoint
will indicate the insert position with a line in-between existing slides.
3. When you get to the right position release the left click button to insert the slide. Alternately you can
also cut the selected slide and paste it back in the sequence as shown below.
Slide Sorter View: let us now understand how the Slide Sorter View works.
1. Select the slide to be moved.
2. Left click on the slide and drag it to the position in the sequence where you want to place it. PowerPoint
will indicate the insert position with a line in-between existing slides.
3. When you get to the right position release the left click button to insert the slide. Alternately you can
also cut the selected slide and paste it back in the sequence as shown below.
Slide Notes: How to add slide notes to an existing presentation.
1. To locate the slide notes, set the view in Normal mode.
2. The Slide Notes section is indicated by "Click to add notes".
3. You can click on the top border and drag the section to increase its size to make it easier to type.
4. Type your text in this section as slide notes.
You can only use bullets, numbering and alignment functions in the Slide Notes section. All other functions can
be selected, but can be applied only to the selected slide, not the notes.
Section
Creating Sections:
The steps to create a new section are as follows. You can execute these steps from the Normal view or the Slide
Sorter view.
1. In the Normal view or the Slide Sorter view, right-click at the position where you want to add the
section and select add section.
2. The new section gets added to the presentation with all the subsequent slides being included in this
section.
3. By default, the new section is named "Untitled Section" but you can change the section name. Right-
click on the section and select "Rename Section".
4. In the Rename Section dialog box, enter the new section name. This accepts all the characters including
alphabets, numbers, special characters, punctuations, etc.
Rearranging Sections: One of the advantages of sections is that you can not only group slides together, but
also rearrange them as one set. Instead of having to move each slide individually, you can move the entire
section. Just like rearranging slides you can drag and move the sections. Alternately, you can right-click on the
section and move it up or down as shown below.
If there are many slides to work with, you can collapse them so you view just the sections. This makes
rearranging them less confusing too.
Deleting Sections: PowerPoint 2010 provides three options to delete sections. The table below explains the
function of each option.
1. Delete Option & Description
2. Remove Section: Deletes the selected section and merges slides with the previous section.
3. Remove Section & Slide: Deletes the selected section and all the slides in the section.
4. Remove All Sections: Deletes all the sections and merges all the slides into a presentation without
sections.
Slides Tab
This tab shows all the slides stacked vertically in a sequential manner. You can select individual slides from this
tab and also perform some tasks like changing slide layouts, reordering slides, inserting new slides, deleting
slides, etc. Although you cannot edit the slide contents from this tab, you can select the slide and make edits
from the slide displayed to the right.
Outline Tab
This is the tab right next to the Slides tab and as the name suggests, this provides the outline for the slide. This
section just displays all the textual content from every slide - this can be very useful if there is a lot of non-text
content in the slide and reviewing just the written part gets difficult. Unlike in the slides tab, you can edit the
text from this section.
PowerPoint Views
PowerPoint views can be accessed from two locations. Views can be accessed quickly from the bottom bar just
to the left of the zoom settings. Views can also be accessed from the Presentation Views section in the View
ribbon Here is a short description of the various views and their features.
Normal View
This is the default view in PowerPoint and this is primarily used to create and edit slides. You can create/
delete/ edit/ rearrange slides, add/ remove/ modify content and manipulate sections from this view.
Slide Sorter View
This view is primarily used to sort slides and rearrange them. This view is also ideal to add or remove sections
as it presents the slides in a more compact manner making it easier to rearrange them.
Reading View
This view is new to PowerPoint 2010 and it was created mainly to review the slideshow without losing access
to rest of the Windows applications. Typically, when you run the slideshow, the presentation takes up the entire
screen so other applications cannot be accessed from the taskbar. In the reading view the taskbar is still
available while viewing the slideshow which is convenient. You cannot make any modifications when on this
view.
Slides Show
This is the traditional slideshow view available in all the earlier versions of PowerPoint. This view is used to
run the slideshow during presentation.
Background and themes
Given below are the steps to apply backgrounds in PowerPoint.
1. In the Design ribbon, under the Background group, click the Background Styles command.
2. Select one of the background styles that suits your requirements.
3. To edit the background for a specific slide, right-click on the desired background slide and select "Apply
to Selected Slides". Step 4 − Selected slide(s) now have the new background.
The graphics in the slide background can distract you from the actual content, in such cases you can hide the
graphics and retain a plain background till you finish working on the content. To do this, select the slide and
check the "Hide Background Graphics" checkbox.
Orientation
Like most other applications PowerPoint supports two orientations: landscape and portrait.
The Landscape layout is the default PowerPoint layout and it is probably the more commonly used one. In the
landscape layout, the longer edge is horizontal so the slides align better with the screens and projectors.
The Portrait layout is where the shorter edge is horizontal. This is sometimes better for print depending on the
kind of content you want to present.
Saving the presentation
The following are the basic steps to save a presentation.
1. Click on the File tab to launch the Backstage view and select Save.
2. In the Save As dialog, type in the file name and click "Save".
3. The default file format is .pptx. If you want to save the file with a different name, choose one of the file
types from the "Save as type" dropdown list.
If you are working on an already saved file, the "Save" option in the backstage view will directly save the file in
the existing format with the existing name. If you want to change the format or filename of an existing file, use
the Save As option instead.
Review presentation
All the reviewing tools are grouped under the Review ribbon.
Review Section Functions
2 Slide Number
Insert Slide number in the footer
3 Footer
Add designated text to the footer - a good example of this is the confidentiality
clause or copyright clause
2 Header
Add the header information for every page on the handout
3 Page Number
Insert page number in the footer
4 Footer
Add designated text to the footer - a good example of this is the confidentiality
clause or copyright clause
When you check any of the header and footer checkboxes in either tabs, you can see the location where the
detail is inserted in the preview section.
Slide Show
Most PowerPoint presentations are created to be run as a slideshow. Given all the advanced features available in
PowerPoint 2010, it is no surprise that there are many features related to running the slideshow that have been
included in this program too. Features related to running the slideshow are grouped under the Slideshow ribbon.
Section Menu Item Description
Formatting Presentation
One of the key elements of any good presentation is the text, hence managing the fonts in PowerPoint is
vital to designing an impressive slideshow. PowerPoint offers extensive font management features to cover
various aspects of fonts. The font management can be accessed from the Home ribbon in the Font group. You
can also access font management features by selecting a text box, right-clicking and selecting Font. This opens
up the Font dialog which contains all the font management features available under the font section in the
Home ribbon. The table below describes various font management features available in PowerPoint.
S. No Features & Description
1 Font Type: Defines the font type like Arial, Verdana, etc.
2 Font Size: Defines the font size. Besides, there are icons to increase and decrease
the font size in steps in the Font group.
3 Font Style: Defines font styles like Regular, Bold, Italics or Underlined.
6 Character Spacing: Specifies character spacing like loose, tight, normal, etc.
Setting text font
PowerPoint offers a wide range of pre-built fonts to choose from. Depending on the purpose of the presentation
you may want to choose a more casual font or a formal one. This section will look at the steps to set the text
fonts.
1. The default font in PowerPoint 2010 is Calibri.
2. To change the text font, select that portion of text the font of which needs to be changed. If you select
the entire text box or shape, the changes will apply to all the text in the selection. If you select specific
text, the changes will apply to selection only.
3. In the Font group, under the Home ribbon, click on the font face dropdown.
4. Scroll through the list of font faces to pick the one that suits your needs. As you move your cursor over
the fonts, the selection will change accordingly to give you a preview.
Text Decoration
PowerPoint offers many text decoration features and adds to the aesthetic sense of a presentation. These
features can be accessed from the Home ribbon under the Font group. Given below are the various font
decoration features and their functions in PowerPoint.
1. Makes the font face bold
2. Makes the font face italics (slanted font)
3. Underlines the font face
4. Adds shadow to the font face
5. Strikes through the font face
6. Adjusts the character spacing for the font. Predefined settings are very tight, tight, normal, loose and
very loose. There is a user defined space setting available too.
Besides these, there are some other font decoration features that can be accessed from the Font dialog. To open
the Font dialog, right-click on the selected text and select Font. The table below describes the additional text
decoration features in the Font dialog.
1. Double Strikethrough: Adds two strike lines over the text
2. Superscript: Raises the text above the normal text. For example, the use of "nd" in 2nd
3. Subscript: Shrinks the below the normal text. For example, the '2' in H2O the chemical formula of
water
4. Small Caps: Changes the entire text to small caps
5. All Caps: Changes the entire text to capital letters
6. Equalize Character height: Adjusts the characters so that all are of the same height regardless of the
caps setting
Text Case
The following steps will help you change the text case.
1. Select the text the case of which you want to change.
2. Go to the Font group under the Home ribbon.
3. From the Change Case dropdown, select the case you want to use for your text.
4. Click on your choice to change case for the selected text.
Text Size
The following steps will help you change the text size.
1. Select the text the case of which you want to change.
2. Go to the Font group under the Home ribbon.
3. From the Font Size dropdown, select the size you want to use for your text.
4. Click on your choice to change the font size for the selected portion of text.
5. If you want to change the font size in steps you can also use the Increase/ Decrease Font Size options.
Text Color
The following are the steps to change text color.
1. Select the text the color of which needs to be changed.
2. Go to the Font group under the Home ribbon.
3. From the Font Color dropdown, select the color you want to use for your text.
4. Click on your choice to change the font color for the selected portion of text.
If you want to choose from a wider range of colors than what's shown in the dropdown you can click on "More
Colors…" Here you can pick from a standard color palette for a greater choice of predefined colors or create
your own from the custom color palette.
Text Alignment
PowerPoint offers various text alignment options to create visually appealing designs and organizing the
content better. The table below describes the various text alignment options available in PowerPoint.
1. Aligns the text to the left of the shape/ text box.
2. Aligns the text in the middle of the shape/ text box.
3. Aligns the text to the right of the shape/ text box.
4. Justifies the alignment by adjusting the character spacing so the final text looks aligned from both left
and right.
Specifies text direction: horizontal (default), stacked (vertical), rotated by 90 or 270 degrees. You can also
customize the text direction to other angles.
Vertically aligns the text; top, bottom or middle of the text box/ shape.
Alignment can be done on selected portion of text in text boxes, shapes and even SmartArt. The following
steps will help you align text.
1. Select the portion of text that needs to be aligned. If you select a specific portion of text, the alignment
settings will apply to that portion of text alone. If you select the entire shape/ text box, the settings will
apply for the entire selection.
2. Go to the Paragraph group under the Home ribbon.
3. Select one of the alignment options described above to change the text alignment. Note that the default
alignment for text is usually Left.
4. As long as the text is selected, you can change the text alignment multiple times.
Indent Paragraph
Relatively long paragraphs can get monotonous to read and this effect is accentuated in slides where the area is
smaller and the contents are usually projected. Paragraph indentations can help ease the strain on eyes and also
help present the content in a visually appealing way.
1. Select the text content to be indented. Unlike most other settings, indentation works at a paragraph
level, so regardless of what text you select the indent settings will apply to the entire paragraph.
However, if the text box has multiple paragraphs you can have different indentations for different
paragraphs.
2. Go to the Paragraph group under the Home ribbon.
3. Select one of the indentation options. You will notice that by default the text is set at the lowest
indentation level, so you will not be able to decrease it further. You must increase indentation the first
time you use it.
4. Once you have increased the indent, the decrease indent option is enabled.
Set line spacing
While dealing with a lot of textual content, especially during projected presentations, it is a good idea to space
the lines further apart to improve the readability of the overall content. PowerPoint offers line spacing options
to help you change the spacing between lines in the text. Like the indentation, these settings apply at a
paragraph level. Given below are the steps to set the line spacing in PowerPoint.
1. Select the text content to be spaced. You can either select the entire paragraph or just place the cursor
within the paragraph.
2. Go to the Paragraph group under the Home ribbon.
3. Select one of the line spacing options from the dropdown list to apply one of predefined spacing
options.
4. To customize the spacing, you can click on "Line Spacing Options…" This will launch
the Paragraph dialog.
5. The spacing section in the Paragraph dialog has two settings. The Before and After are the spacing for
paragraph as a whole, while Line Spacing is the spacing for lines within the paragraph itself.
Border and shades
Applying Borders
The following are the steps that will help you apply borders in your presentation.
1. Select the object (text box, image, chart, picture, etc.) to which you want to apply the border.
2. Go to the Drawing group under the Home ribbon.
3. Click on the Shape Outline to choose the border settings.
4. Use the color palette to choose the border color. You can choose More Outline Colors to get access to
additional color choices
5. Use the Weight dropdown to define the thickness of the border.
6. Use the Dashes option to define the border style.
Applying Shades
The following steps will help you apply shades to your presentation.
1. Select the object (text box, shape, chart, etc.) to which you want to apply the shades.
2. Go to the Drawing group under the Home ribbon.
3. Click on the Shape Fill to choose the shade settings.
4. Use the color palette to choose the shade color. You can choose More Outline Colors to get access to a
choice of colors.
5. Use the Picture to add a picture as the background rather than a color.
6. Use the Gradient option to add color gradient in the background. You can use the pre-defined gradients
or click on "More Gradients…" to customize the shading with gradient colors.
7. Use the Texture option to add a pre-defined texture instead of a color shade.
Apply formatting
One of the most powerful tools in Microsoft Office is the application of formatting feature. This feature
basically lets you define the right format once and apply the same to a series of objects in the rest of the
presentation or any other file. While working with large presentations or just working on slides for a long time,
if you ever need to make a change in the style and want it applied across multiple content this is the tool to use.
The following are the steps to apply formatting to your presentation −
1. Select the content you want to copy the formatting from.
2. Go to the Clipboard group under the Home ribbon.
3. Click on the Format Painter icon.
4. Select the content you want to format.
Here are some key aspects about the Format Painter −
1. If you click on the Format Painter icon just once, the formatting will be copied just once.
2. If you click on the Format Painter icon twice quickly, you can copy the formatting multiple times.
3. If you want to copy just the text formatting and not the paragraph features, ensure that you select just
the sample text and not the entire paragraph.
4. If you want to copy paragraph and font formatting, you must select the entire paragraph.
Using slide master
Slide master is simple way of applying changes to the entire slide. Every presentation has at least one slide
master, but you can have more than one. Using features like copy/ paste and format painting you can make
changes to different sections within the presentation to make them look similar, however, if you want to use a
theme and background throughout the slide, using the slide master is a simpler and more graceful way of
approaching it. Given below are the steps to customize your slide master.
1. Go to the Master Views group under the View ribbon.
2. Click on Slide Master to open the Slide Master Ribbon. The top most slide in the left sidebar is
the Master slide. All the slides within this master template will follow the settings you add on this
master slide.
3. You can make changes to the master slide in terms of the theme, design, font properties, position and
size of the title and other content using the remaining ribbons which are still accessible.
4. While PowerPoint provides some default slide layouts, you can create your own layouts by clicking on
the "Insert Layout" in the Edit Master section of the Slide Master ribbon.
5. You can add content placeholders to the slide layouts using the "Insert Placeholder" in the Master
Layout group under the Slide Master ribbon. Under the Placeholder dropdown, you can either create a
generic content placeholder or specify the kind of content you want in that placeholder.
6. You can apply different themes, background and page setup settings to all the slides from the master
slide
7. You can also customize individual slide layouts to be different from the master slide using the menu
options available with the layouts.
Save design template
One of the best features of PowerPoint is that you can create slide masters and then save them as templates to
be reused later. There are different aspects of a design which can be created and saved to ensure you can reuse
the hard work you spent on creating the first copy. Given below are the steps to save design templates.
1. Create a new design template from the Slide Master view. Depending on your needs, this template can
have different colors, images, logos or symbols included in the master slide and the layout templates.
2. Go to the Edit Theme group under the Slide Master ribbon.
3. Navigate to Edit Themes > Themes > Save Current Theme…
4. In the Save Current Theme dialog, enter the Theme name and click Save.
5. This template is now saved and available on your PowerPoint design template view to be applied to any
presentation.
1 Remove Background: Automatically removes the unwanted sections in the image. This is similar to
the magic tool in some of the other photo editing programs. You can click on different regions on the
image to define the area to be removed.
2 Correction: Allows you to change the brightness and contrast on the image and also change the image
sharpness.
3 Color: Allows you to change the color on the image by changing the saturation or tone. You can also
make the image monochromatic based on different hues to match the theme of your presentation.
4 Artistic Effects: Adds artistic effects to the image like plastic wrap, glowing edges, etc.
5 Compress Picture: This can change the image resolution to manage the file size.
2 Picture Effects: Adds effects to the picture like reflection, shadow, etc.
3 Convert to SmartArt Graphic: Transforms the picture into the selected SmartArt.
4 Quick Styles: Pre-defined styles with different picture borders and effects.
PowerPoint offers many image formatting features that can help shape the image to suit your needs. The
picture formatting features in PowerPoint can be accessed from the Format ribbon once the picture is selected.
The formatting features are grouped under the Arrange and Size section in the Format ribbon.
Picture Arrangement Features: The following table describes various picture arrangement features available in
PowerPoint.
S.No Feature & Description
1 Bring Forward: Moves the picture layer up. Bring Forward moves the picture up by one layer, Bring
to Front makes the picture layer the topmost
2 Send Backward: Moves the picture layer down. Send Backward moves the picture down by one layer,
Send to Back makes the picture layer the bottommost
3 Selection Pane: This opens up the Selection Pane sidebar where you get a better idea of the layers and
can work with arrangements better.
5 Group: Allows multiple images to be grouped together to create on single object or ungroup them to
split them into individual pictures.
1 Crop: Allows you to crop the image. The cropping can be freehand, based on aspect ratio or any of the
predefined shapes.
2 Shape Height/ Width: Used to change the height and width of the image. When you edit these
parameters from the ribbon, the aspect ratio is always maintained.
One of the interesting features about PowerPoint is that you can insert a screenshot of one of your
applications into your presentation without having to use any other program. Given below are the steps to
insert a screenshot.
1. Go to the Images group in the Insert Ribbon.
2. Click on the Screenshot dropdown to look at full screen snaps of all the applications running on your
computer’s desktop.
3. Select one of the screenshots to add it directly on to your presentation.
4. If you do not want the entire screen and just a portion of it, you can use the Screen Clipping option.
The Screen Clipping option will automatically move the focus to the program immediately below
PowerPoint. So while using this option, ensure that you have the right screen behind the PowerPoint program.
PowerPoint supports the addition of shapes in presentations. It also includes Shapes like basic geometric
shapes, flowchart components, arrows, callouts, lines and other predefined special shapes. These shapes also
double up as text boxes as they support adding text to them directly. Besides, you can also use these shape to
crop pictures to shape. Given below are the steps to add a shape in PowerPoint.
1. Go to the Illustrations group under the Insert Tab.
2. Click on the Shapes dropdown to view the available shapes.
3. Select the shape you want to insert. This will change the cursor to a + sign.
4. Click and drag on the slide to create the shape. As you drag, the shape will show up on the slide.
Continue to drag and adjust the size and the symmetry of the shape.
Just like images and pictures, PowerPoint also supports editing of shapes inserted in the presentation. The
shape editing features in PowerPoint can be accessed from the Format ribbon once the shape is selected. The
editing features are grouped under the Insert Shapes and the Shape Styles section in the Format ribbon.
Insert Shape Features: The table below describes various insert shape features available in PowerPoint.
S.No Feature & Description
2 Edit Shape: Replaces the shape completely, or use the edit points to change the existing shape.
1 Shape Fill: Selects the shape fill color and style. You can add a single solid color from the palette, or a
picture, gradient or texture.
2 Shape Outline: Selects the shape border color, thickness and style.
3 Shape Effects: Adds special effects to the shape like reflection, 3D rotation, bevel, shadow, etc.
4 Predefined Styles: These are a combination of the style features that can be applied to the shape with a
single click.
PowerPoint offers formatting features for shapes along the same lines as pictures. This consistency in
the features makes it easy for people to grasp the functionality and also makes PowerPoint very versatile. The
shape formatting features in PowerPoint can be accessed from the Format ribbon once the shape is selected.
The formatting features are grouped under the Arrange and Size section in the Format ribbon.
Shape Arrangement Features: The table given below describes the various shape arrangement features available
in PowerPoint.
S.No Feature & Description
1 Bring Forward: Moves the shape layer up. Bring Forward moves the shape up by one layer, Bring to
Front makes the shape layer the topmost.
2 Send Backward: Moves the shape layer down. Send Backward moves the shape down by one
layer, Send to Back makes the shape layer the bottommost.
3 Selection Pane: This opens up the Selection Pane sidebar where you get a better idea of the layers and
can work with arrangements better.
5 Group: Allows multiple shapes to be grouped together to create on single object or ungroup them to
split them into individual shapes.
1 Shape Height/ Width: Used to change the height and width of the shape. When you
edit these parameters from the ribbon, the aspect ratio is always maintained
One of the great aspects of PowerPoint is that you can treat the shapes as text boxes too. This becomes
useful when you want to type some text within a shape and ensure the text does not overflow the boundaries of
the shape. By being able to enter text within the shape, PowerPoint will ensure the text stays contained and you
do not have to worry about fixing it. The following steps will help you add text to the shapes in PowerPoint.
1. Right-click on the shape to which you want to add the text and select the Edit Text option.
2. Start typing the text into the shape. Once you are done, click the cursor anywhere outside the shape.
An alternative way of adding text to shape is to select the shape and start typing directly. Once you have the
text within the shape you can format the text using the font related features available in PowerPoint.
PowerPoint supports multiple content types and invariably different contents coexist in a slide. While it is
ideal to have each content standout separately, there are times when you cannot do that or when overlapping of
content is desirable. In such cases, it is important that you can determine which content stays on top of which
one. PowerPoint has arrangement features to help achieve this goal. While working with arrangement features,
you must think of each content as a separate layer and that these layers are laid over one another. To arrange
the content, you must basically play with these layers.
The following steps will help you arrange content in a presentation slide.
1. Select one of the contents and go the Arrange group under the Format ribbon.
2. Click on the Selection Pane to open the Selection and Visibility sidebar.
3. Select one of the rows in the sidebar to highlight the corresponding content in the slide.
4. Use the reordering arrows in the sidebar to move the content layer up or down.
5. Click on the eye next to each content in the sidebar to toggle its visibility on the slide.
Instead of using the Selection Pane option, you can also right-click on the content to move it up or down.
When you right-click, besides moving the layers by one step at a time using Bring Forward or Send Backward,
you can also move the content directly to the top or bottom using Bring to Front or Send to Back respectively.
While working with PowerPoint, you might need to carry out a set of actions on a bunch of objects.
PowerPoint allows you to group objects within a slide and apply the same action on all the objects
simultaneously. This feature in PowerPoint is called grouping. The following steps will help you group and
ungroup objects −
1. Select a set of shapes or objects together. To select the objects, press the Ctrl-key and select each object
individually. If the objects are together, you can also click and drag the cursor to select them; however
with the click and drag everything that falls within the selected area will be selected.
2. Go to the Arrange Group under the Format ribbon.
3. Click on Group under the Group menu item - this will group the objects and shapes into a single object.
4. Apply the common changes you want to make to these objects.
5. Even though the objects are grouped, you can still edit them individually if need be.
6. If you want to edit the shapes or objects individually, go back to the Group menu item and
select Ungroup.
7. After making changes, if you want to regroup the objects as per original grouping, you select one of the
objects and use the Regroup option under the Group menu.
PowerPoint supports multimedia in the slides. You can add audio or video clips to the slides which can be
played during the presentation. The following steps will help you add audio or video file to the slides.
1. Go to the Media group under the Insert ribbon
2. To insert video file select Video as media type and Video from File to insert a video from your
computer or hard drive.
3. In the Insert Video dialog, browse for a video file and click Insert.
4. You will now see that a Video file is added to the slide.
5. To insert audio file select Audio as media type and Audio from File to insert an Audio from your
computer or hard drive.
6. In the Insert Audio dialog, browse for an audio file and click Insert.
7. You will now see that an Audio file is added to the slide.
One of the most powerful data representation techniques is the use of tables. Table allows information to be
segregated making it easy to read. PowerPoint has features that let you add tables in slides and also format
them to enhance their visual effects. What's more, these tables are also compatible with Microsoft Excel, so
you can basically take a spreadsheet or a section of a spreadsheet and paste it into a slide as a table.
The following steps will help you add a table in PowerPoint.
1. Go to the Tables group under the Insert ribbon.
2. Click on the dropdown and select your table dimension from the matrix.
3. If you require more than 10 columns or 8 rows click on "Insert Table" to open the Insert Table dialog
where you can specify the column and row count.
PowerPoint table is a simple table that does not support the mathematical features of an Excel spreadsheet. If
you want to carry out some calculations, you can insert an Excel spreadsheet instead of a regular table. This
will insert the spreadsheet in the slide and as long as the spreadsheet is selected, the ribbon at the top will be
changed to an Excel ribbon instead of a PowerPoint one.
The PowerPoint table formatting features have been grouped under two ribbons: Design and Format.
The sections below discuss the features under each ribbon. To access these ribbons, you must select the table
first.
Table Design Features: We will now understand the table design features in PowerPoint.
Feature Sub Features Description
Table Style Options Header Row Adds a different shade to the first row to distinguish it.
Total Row Adds a different shade to the last row to distinguish it.
Banded Rows Shades alternate rows in the table with the same color.
First Column Adds a different shade to the first column to distinguish it.
Last Column Adds a different shade to the last row to distinguish it.
Banded Columns Shades alternate columns in the table with the same color.
Table Styles Offers different shades to be added to selected table/ row/ column/
Shading cell. You can pick from solid shade, texture, image or gradient
shading.
Offers different border options for the table. You can edit the border
Border
color, thickness and style
Offers the ability to create table shadow or reflection. You can also
Effects
create bevels for individual cells.
Word Art Styles Text Fill Allows you to change the color of the text within the table.
Text Outline Allows you to add an outline to the text within the table and change
the outline color, weight and style.
Allows you to add special effects (like reflection, shadow etc.) to the
Text Effects
text within the table.
Draw Borders Pen Style Defines the style of the table border when you draw it.
Pen Weight Defines the thickness of the table border when you draw it.
Pen Color Defines the color of the table border when you draw it.
Table Allows you to select the entire table or the row(s) or column(s)
Select
depending on the position of your cursor.
Rows & Columns Allows you to delete selected row(s) or column(s) or the entire
Delete
table.
Inserts a row above the row where the cursor is currently. If you
Insert Above haven't placed the cursor within the table, it adds a new row at the
top of the table.
Inserts a row below the row where the cursor is currently. If you
Insert Below haven't placed the cursor within the table, it adds a new row at the
bottom of the table.
Merge Allows you to merge cells, rows or columns. This is enabled only
Merge
if you have selected more than one cell, row or column.
Split Cells Allows you to specify the number of rows and columns into
which the current section of cell(s) need to be split.
Cell Size Defines the height and width of the selected cell. Usually if you
Height/ Width change these aspects for a single cell, the change affects the entire
row or column too.
Distribute Rows Equalizes the height of all the rows to fit the current table height.
Equalizes the width of all the columns to fit the current table
Distribute Columns
width.
Alignment Allows you to align the selected text to the left, right or center of
Horizontal Alignment
the cell.
Allows you to align the selected text to the top, bottom or middle
Vertical Alignment
of the cell.
Allows you to change the direction of the selected text within the
Text Direction
cells.
Cell Margins Allows you to define the margins within the cell.
Table Size Allows you to adjust the table height - it retains the relative
Height heights of the individual rows while changing the overall table
height.
Allows you to adjust the table width - it retains the relative widths
Width
of the individual columns while changing the overall table width.
Checking this box will ensure the ratio between the table height
Lock Aspect Ratio
and width is maintained when one of these is changed.
Arrange Bring Forward Allows you to move the table up by one layer or right to the top.
Allows you to move the table down by one layer or right to the
Send Backward
bottom of the slide.
Align Allows you to align the entire table with reference to the slide.
Charts are an effective way of representing data. Long list of confusing numbers can instantly become
trends which can be spotted when they are captured as charts. PowerPoint supports the addition and formatting
of charts. Given below are the steps to add a chart to PowerPoint.
1. Go to the Illustrations group under the Insert ribbon.
2. Click on the Chart option to open the Insert Chart dialog. You can choose the chart category and pick
individual chart types from the list.
3. Select the chart type and click OK or double-click on the chart type to insert the chart in the slide.
4. Along with the chart, an Excel spreadsheet is also launched. This spreadsheet is the source for your
chart. You can change the category names, series names and individual values to suit your needs.
As you edit the values and the table in Excel the chart gets modified accordingly.
The PowerPoint chart formatting features have been grouped under three
ribbons: Design, Layout and Format. The sections below discuss the features under each ribbon. To access
these ribbons you must select the chart first.
Chart Design Features: We will now understand the various chart design features in PowerPoint. The table
given below describes the various chart design features −
Feature Sub Features Description
Type Change Chart Type Changes the chart type retaining the same data.
Data Transposes current excel data - this is enabled when you have the
Switch Row/Column
source data excel sheet open.
Chart Layouts Offers a list of predefined layouts which can be instantly applied to
Chart Layouts
current chart with a single click.
Chart Styles Offers a list of predefined styles which can be instantly applied to
Chart Styles
current chart with a single click.
Chart Layout Features: We will now understand the various chart layout features in PowerPoint. The following
table describes the various chart layout features in PowerPoint.
Feature Sub Features Description
Current Selection Drop down Shows the currently selected chart element.
Format Selection Shows the selection format dialog to update the selection.
Discards all the chart customizations and matches the chart with
Reset to Match Style
the overall presentation theme.
Labels Chart Title Defines the visibility, position and style of the chart title.
Axis Titles Defines the visibility, position and style of the axis titles.
Data Labels Defines the visibility and position of the data labels.
Data Table Defines the visibility, position and format of the data table.
Axes Axes Defines the position and scale of axes.
Background Plot Area Toggles chart plot area - available only for 2D charts.
Chart Wall Toggles the chart wall - available only for 3D charts.
Chart Floor Toggles the chart floor - available only for 3D charts.
3-D Rotation Toggles the chart 3D rotation- available only for 3D charts.
Chart Format Features: We will now understand the various chart format features in PowerPoint. The following
table describes the various chart format features in PowerPoint.
Feature Sub Features Description
Current Selection Drop down Shows the currently selected chart element.
Format Selection Shows the selection format dialog to update the selection.
Discards all the chart customizations and matches the chart with
Reset to Match Style
the overall presentation theme.
Shape Styles Offers different shades to be added to selected chart series item.
Shape Fill
You can pick from solid shade, texture, image or gradient shading.
Offers different border options for selected chart series item. You
Border
can edit the border color, thickness and style.
Word Art Styles Text Fill Allows you to change the color of the text within the chart.
Allows you to add an outline to the text within the chart and
Text Outline
change the outline color, weight and style.
Arrange Bring Forward Allows you to move the chart up by one layer or right to the top.
Allows you to move the chart down by one layer or right to the
Send Backward
bottom of the slide.
Align Allows you to align the entire chart with reference to the slide.
Allows you to group multiple charts as one group object, or split a
Group
group object into individual charts.
Create Graphic Adds another shape to the current SmartArt graphic; this also adds another
Add Shape
bullet in the text pane.
Adds another bullet in the text pane; this also adds another shape to the
Add Bullet
graphic.
Moves the bullet up in the text pane or the shape to the left in the
Move Up
graphics.
Moves the bullet down in the text pane or the shape to the right in the
Move Down
graphics.
Layouts Layouts Allows you to change the layout of SmartArt graphics to one from the list.
Smart Styles Change Colors Changes the color scheme for the SmartArt graphics.
Allows you to change the SmartArt graphics styles to one of the
SmartArt Styles
predefined ones from the list with one click.
Reset Reset Graphic Removes all the customization done on the SmartArt graphic.
Shapes Change Shape Changes the selected shape in the SmartArt to one of those in the list.
Shape Styles Offers different shades to be added to selected SmartArt graphics item.
Shape Fill
You can pick from solid shade, texture, image or gradient shading.
Offers different border options for selected SmartArt graphics item. You
Border
can edit the border color, thickness and style.
Word Art Styles Text Fill Allows you to change the color of the text within the SmartArt.
Allows you to add an outline to the text within the SmartArt and change
Text Outline
the outline color, weight and style.
Allows you to add special effects (like reflection, shadow etc.) to the text
Text Effects
within the SmartArt.
Contains a list of pre-defined Word Art styles that can be applied to the
Quick Styles
selected text within the SmartArt with a single click.
Arrange Bring Forward Allows you to move the SmartArt up by one layer or right to the top.
Allows you to move the SmartArt down by one layer or right to the
Send Backward
bottom of the slide.
Align Allows you to align the entire SmartArt with reference to the slide.
Printing Presentation
It is sometimes necessary that you share your slides with your audience in printed format before you begin
presenting them so they can take notes. There are other times when you want to give your audience handouts
with additional notes.
To print slides, you must go to the Backstage view under the File tab and click on the Print menu. The
following table describes the various printing options available in PowerPoint.
Main Settings Options Description
Printing Slides Print All Slides Prints all the slides in the presentation.
Collation Prints slides in sequence or prints multiple copies of each slide one
Collating Options
after another.
Printing Color Selects color, grey scale or black & white printing options. Although
Color you can select any color settings, the output will depend on the kind of
printer you use. A non-color printer cannot print color slides.
Print your PowerPoint slides, handouts, or notes
PowerPoint for Office 365 PowerPoint for Office 365 for Mac More...
In PowerPoint, you can print your slides, your speaker notes, and create handouts for your audience.
Windows mac OS Web
Print your presentation
1. Select File > Print.
2. For Printer, select the printer you want to print to.
3. For Settings, select the options you want:
a. Slides: From the drop-down, choose to print all slides, selected slides, or the current slide. Or, in
the Slides box, type which slide numbers to print, separated by a comma.
b. Print Layout: Choose to print just the slides, just the speaker notes, an outline, or handouts. The
Outline prints only the text in the slides, without images. The Notes of a presentation show the
slide and the related speaker notes below it. If you choose to print Handouts, you can print everal
slides on one page using a variety of layouts, some with space for note-taking.
c. Collated: Choose whether you want the sheets collated or uncollated.
d. Color: Choose whether you want color, grayscale, or pure black and white.
e. Edit Header & Footer: Select to edit the header and footer before printing.
4. For Copies, select how many copies you want to print.
5. Select Print.
Unit IV: Computers and Communication
WWW and Web Browsers: Basic of Computer networks; LAN, WAN; Networking Devices,
Topologies, Cables and connectors, Connecting to internet; ISP; Basics of internet connectivity related
troubleshooting, Web Browsing software, Search Engines; URL; Domain Names; IP Addressing, Wi-
Fi and Bluetooth technology overview, Internet and Intranet: architecture, various file formats,
Applications of INTERNET: Electronic mailing systems (Google Mail features): Creating and
Managing mailing accounts, folders, Document collaboration, Instant Messaging, Netiquettes; Skype
calling and Messenger services; functioning and features of smart gadgets: Smart phones, 4K smart
television gadgets, kindle, gaming-gadgets, fitness gadgets and alike.
Web Browser
A web browser (commonly referred to as a browser) is a software user agent for accessing information
on the World Wide Web. To connect to a website's server and display its pages, a user needs to have a web
browser program. This is the program that the user runs to download, format and display a web page on the
user's computer.
A web browser is a software program that allows a user to locate, access, and display web pages. In
common usage, a web browser is usually shortened to "browser." Browsers are used primarily for displaying
and accessing websites on the internet, as well as other content created using languages such as Hypertext
Markup Language (HTML) and Extensible Markup Language (XML).
Browsers translate web pages and websites delivered using Hypertext Transfer Protocol (HTTP) into
human-readable content. They also have the ability to display other protocols and prefixes, such as secure
HTTP (HTTPS), File Transfer Protocol (FTP), email handling (mailto:), and files (file:). In addition, most
browsers also support external plug-ins required to display active content, such as in-page video, audio and
game content.
A variety of web browsers are available with different features, and are designed to run on different
operating systems. Common browsers include Internet Explorer from Microsoft, Firefox from Mozilla, Google
Chrome, Safari from Apple, and Opera. All major browsers have mobile versions that are lightweight versions
for accessing the web on mobile devices.
Web browsers date back to the late 1980s when an English scientist, Tim Berners-Lee, first developed
the ideas that led to the World Wide Web (WWW). This consisted of a series of pages created using the HTML
language and joined or linked together with pointers called hyperlinks. Following this was the need for a
program that could access and display the HTML pages correctly – the browser.
Basic of Computer networks
Open system: A system which is connected to the network and is ready for communication.
Closed system: A system which is not connected to the network and can’t be communicated with.
Computer Network: It is the interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge. The layout pattern using
which devices are interconnected is called as network topology. Such as Bus, Star, Mesh, Ring, Daisy chain.
OSI: OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer.
Protocol: A protocol is the set of rules or algorithms which define the way how two entities can communicate
across the network and there exists different protocol defined at each layer of the OSI model. Few of such
protocols are TCP, IP, UDP, ARP, DHCP, FTP and so on.
UNIQUE IDENTIFIERS OF NETWORK
Host name: Each device in the network is associated with a unique device name known as Hostname.
Type “hostname” in the command prompt and press ‘Enter’, this displays the hostname of your machine.
IP Address (Internet Protocol address): Also, known as the Logical Address, is the network address of the
system across the network.To identify each device in the world-wide-web, Internet Assigned Numbers
Authority (IANA) assigns IPV4 (Version 4) address as a unique identifier for each device on the
Internet.Length of the IP address is 32-bits. (Hence we have 232 IP addresses available.)
Type “ipconfig” in the command prompt and press ‘Enter’, this gives us the IP address of the device.
MAC Address (Media Access Control address): Also known as physical address, is the unique identifier of each
host and is associated with the NIC (Network Interface Card).MAC address is assigned to the NIC at the time of
manufacturing. Length of the MAC address is : 12-nibble/ 6 bytes/ 48 bits
Type “ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC address.
Port: Port can be referred as a logical channel through which data can be sent/received to an application. Any
host may have multiple applications running, and each of this application is identified using the port number on
which they are running. Port number is a 16-bit integer, hence we have 216 ports available which are
categorized as shown below:
PORT TYPES RANGE
Networking Devices
Different networking devices have different roles to play in a computer network. These network devices also
work at different segments of a computer network performing different works. In our new series after network
topology, we talk about different networking devices like a switch, router, hub, bridge etc.
Network Hub: Network Hub is a networking device which is used to connect multiple network hosts. A network
hub is also used to do data transfer.
Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say
that a switch is more intelligent than a hub. While hub just does the work of data forwarding, a switch does
'filter and forwarding' which is a more intelligent way of dealing with the data packets.
Modem: A Modem is somewhat a more interesting network device in our daily life. So if you have noticed
around, you get an internet connection through a wire (there are different types of wires) to your house. This
wire is used to carry our internet data outside to the internet world.
Network Router: A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network. You can think of a
router as a traffic police who directs different network traffic to different directions.
Bridge: If a router connects two different types of networks, then a bridge connects two subnetworks as a part of
the same network. You can think of two different labs or two different floors connected by a bridge.
Repeater: A repeater is an electronic device that amplifies the signal it receives. In other terms, you can think of
repeater as a device which receives a signal and retransmits it at a higher level or higher power so that the signal
can cover longer distances.
Topologies
Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial field
busses and computer networks.
Network topology is the topological structure of a network and may be depicted physically or logically.
It is an application of graph theory wherein communicating devices are modeled as nodes and the connections
between the devices are modeled as links or lines between the nodes.
Types of Network Topology
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver is
referred as network topology. The various network topologies
are:
a) Mesh Topology: In mesh topology, every device is connected
to another device via particular channel.
Advantages of this topology:
1. It is robust.
2. Fault is diagnosed easily. Data is reliable because data is
transferred among the devices through dedicated
channels or links.
3. Provides security and privacy.
Problems with this topology:
1. Installation and configuration is difficult.
2. Cost of cables are high as bulk wiring is required, hence
suitable for less number of devices.
3. Cost of maintenance is high.
b) Star Topology: In star topology, all the devices are connected
to a single hub through a cable. This hub is the central node and
all others nodes are connected to the central node. The hub can be
passive in nature i.e. not intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as
active hubs. Active hubs have repeaters in them.
Advantages of this topology:
1. If N devices are connected to each other in star topology,
then the number of cables required to connect them is N.
So, it is easy to set up.
2. Each device requires only 1 port i.e. to connect to the hub.
Problems with this topology:
1. If the concentrator (hub) on which the whole topology
relies fails, the whole system will crash down.
2. Cost of installation is high.
3. Performance is based on the single concentrator i.e.
hub.
c) Bus Topology:
Bus topology is a network type in which every computer and
network device is connected to single cable. It transmits the
data from one end to another in single direction. No bi-
directional feature is in bus topology.
Advantages of this topology:
1. If N devices are connected to each other in bus topology, then the number of cables required to connect
them is 1 which is known as backbone cable and N drop lines are required.
2. Cost of the cable is less as compared to other topology, but it is used to build small networks.
Problems with this topology:
1. If the common cable fails, then the whole system will crash
down.
2. If the network traffic is heavy, it increases collisions in the
network. To avoid this, various protocols are used in MAC layer
known as Pure Aloha, Slotted Aloha, and CSMA/CD etc.
d) Ring Topology:
In this topology, it forms a ring connecting devices with its exactly two
neighboring devices.
The following operations takes place in ring topology is:
One station is known as monitor station which takes all the
responsibility to perform the operations.
To transmit the data, station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in
the ring.
There are two types of token release techniques: Early token
release releases the token just after the transmitting the data
and Delay token release releases the token after the
acknowledgement is received from the receiver.
Advantages of this topology:
1. The possibility of collision is minimum in this type of
topology.
2. Cheap to install and expand.
Problems with this topology:
1. Troubleshooting is difficult in this topology.
2. Addition of stations in between or removal of stations can
disturb the whole topology.
e) Hybrid Topology:
This topology is a collection of two or more topologies which are
described above. This is a scalable topology which can be
expanded easily. It is reliable one but at the same it is a costly
topology.
Ethernet Cabling
Now to familiarize you with more on the Ethernet and it’s
cabling we need to look at the 10’s. 10Base2, is considered the
thin Ethernet, thinnet, and thinwire which uses light coaxial
cable to create a 10 Mbps network. The cable segments in this
network can’t be over 185 meters in length. These cables
connect with the BNC connector. Also as a note these unused
connection must have a terminator, which will be a 50-ohm
terminator.
10Base5, this is considered a thicknet and is used with coaxial
cable arrangement such as the BNC connector.
10BaseT, the “T” stands for twisted as in UTP (Unshielded
Twisted Pair) and uses this for 10Mbps of transfer.
100BaseT, is considered Fast Ethernet uses STP (Shielded
Twisted Pair) reaching data transfer of 100Mbps.
10BaseF, This arrangement is a little more complicated and uses
special connectors and NIC’s along with hubs to create its
network.
An important part of designing and installing an Ethernet is
selecting the appropriate Ethernet medium. There are four major
types of media in use today: Thickwire for 10BASE5 networks,
thin coax for 10BASE2 networks, unshielded twisted pair (UTP)
for 10BASE-T networks and fiber optic for 10BASE-FL or
Fiber-Optic Inter-Repeater Link (FOIRL) networks.
Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps LocalTalk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
100 Mbps (2 pair) 100BaseT Ethernet
5
1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet
6 10,000 Mbps Gigabit Ethernet
Connectors –
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is
an RJ-45 connector. This is a plastic connector that looks
like a large telephone-style connector . A slot allows the RJ-
45 to be inserted only one way. RJ stands for Registered
Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard
designates which wire goes with each pin inside the
connector.
F-Type
The F connector is a type of RF connector commonly used for cable and
universally for satellite television. They are also used for the cable TV
connection in DOCSIS cable modems, usually with RG-6 tri-shield cable. The F
connector is inexpensive, yet has good performance up to 1 GHz. One reason for
its low cost is that it uses the center wire of the coaxial cable as the pin of the
male connector. The male connector body is typically crimped onto the exposed
outer braid. Female connectors have a 3/8-32 thread. Most male connectors have
a matching threaded connecting ring, though push-on versions are also available.
ST (Straight Tip) and SC (Subscriber Connector or Standard Connector)
Fiber network segments always require two fiber cables: one for transmitting data, and one for receiving. Each
end of a fiber cable is fitted with a plug that can be inserted into a network adapter, hub, or switch. In the North
America, most cables use a square SC connector (Subscriber Connector or Standard Connector) that slides and
locks into place when inserted into a node or
connected to another fiber cable, Europeans use
a round ST connector (Straight Tip) instead.
Fiber LC (Local Connector)
These connectors are used for single-mode and multimode fiber-optic cables. FC
connectors offer extremely precise positioning of the fiber-optic cable with respect
to the transmitter's optical source emitter and the receiver's optical detector. FC
connectors feature a position locatable notch and a threaded receptacle.
Modem
Once you have your computer, you really don't need much additional hardware to
connect to the Internet. The primary piece of hardware you need is a modem.
The type of Internet access you choose will determine the type of modem you
need. Dial-up access uses a telephone modem, DSL service uses a DSL
modem, cable access uses a cable modem, and satellite service uses a satellite
adapter. Your ISP may give you a modem—often for a fee—when you sign a contract,
which helps ensure that you have the right type of modem. However, if you would
prefer to shop for a better or less expensive modem, you can choose to buy one
separately.
Router
A router is a hardware device that allows you to connect several
computers and other devices to a single Internet connection, which is known as
a home network. Many routers are wireless, which allows you to create a home
wireless network, commonly known as a Wi-Fi network.
You don't necessarily need to buy a router to connect to the Internet. It's possible to
connect your computer directly to your modem using an Ethernet cable. Also, many
modems include a built-in router, so you have the option of creating a Wi-Fi network
without buying extra hardware.
Setting up your Internet connection
Once you've chosen an ISP, most providers will send a technician to your house to turn on the connection. If
not, you should be able to use the instructions provided by your ISP—or included with the modem—to set up
your Internet connection.
After you have everything set up, you can open your web browser and begin using the Internet. If you have any
problems with your Internet connection, you can call your ISP's technical support number.
Home networking
If you have multiple computers at home and want to use all of them to access the Internet, you may want to
create a home network, also known as a Wi-Fi network. In a home network, all of your devices connect to
your router, which is connected to the modem. This means everyone in your family can use the Internet at the
same time.
Your ISP technician may be able to set up a home Wi-Fi network when installing your Internet service. If not,
you can review our lesson on How to Set Up a Wi-Fi Network to learn more.
If you want to connect a computer that does not have built-in Wi-Fi connectivity, you can purchase a Wi-Fi
adapter that plugs into your computer's USB port.
Connecting to the Internet
A device has to be connected to the Internet before you can access it. If you plan to use the Internet at home,
you'll usually need to purchase an Internet connection from an Internet service provider, which will likely be a
phone company, Cable Company, or the government. Other devices usually connect through Wi-Fi or cellular
Internet connections. Sometimes libraries, cafes, and schools offer free Wi-Fi for their patrons, customers, and
students.
Search Engines
A web search engine or Internet search engine is a software system that is designed to carry out web
search (Internet search), which means to search the World Wide Web in a systematic way for particular
information specified in a textual web search query. The search results are generally presented in a line of
results often referred to as search engine results pages (SERPs). The information may be a mix of links to web
pages, images, videos, info graphics, articles, research papers, and other types of files. Some search engines
also mine data available in databases or open directories. Unlike web directories, which are maintained only by
human editors, search engines also maintain real-time information by running an algorithm on a web crawler.
Internet content that is not capable of being searched by a web search engine is generally described as the deep
web.
Search engine is a service that allows Internet users to search for content via the World Wide Web
(WWW). A user enters keywords or key phrases into a search engine and receives a list of Web content results
in the form of websites, images, videos or other online data. The list of content returned via a search engine to a
user is known as a search engine results page (SERP).
To simplify, think of a search engine as two components. First a spider/web crawler trolls the web for
content that is added to the search engine's index. Then, when a user queries a search engine, relevant results are
returned based on the search engine's algorithm. Early search engines were based largely on page content, but as
websites learned to game the system, algorithms have become much more complex and search results returned
can be based on literally hundreds of variables.
Different Types of Search Engines: Search engines are classified into the following three categories based on
how it works.
1. Crawler based search engines
2. Human powered directories
3. Hybrid search engines
4. Other special search engines
Crawler Based Search Engines: All crawler based search engines use a crawler or bot or spider for crawling and
indexing new content to the search database. There are four basic steps, every crawler based search engines
follow before displaying any sites in the search results.
1. Crawling: Search engines crawl the whole web to fetch the web pages available.
2. Indexing: Indexing is next step after crawling which is a process of identifying the words and
expressions that best describe the page. The identified words are referred as keywords and the
page is assigned to the identified keywords.
3. Calculating Relevancy: Search engine compares the search string in the search request with the
indexed pages from the database.
4. Retrieving Results: The last step in search engines’ activity is retrieving the results. Basically, it
is simply displaying them in the browser in an order. Search engines sort the endless pages of
search results in the order of most relevant to the least relevant sites.
Examples of Crawler Based Search Engines
1. Google 4. Baidu
2. Bing 5. Yandex
3. Yahoo!
Human Powered Directories: Human powered directories also referred as open directory system depends on
human based activities for listings. Below is how the indexing in human powered directories work:
1. Site owner submits a short description of the site to the directory along with category it is to be
listed.
2. Submitted site is then manually reviewed and added in the appropriate category or rejected for
listing.
3. Keywords entered in a search box will be matched with the description of the sites. This means
the changes made to the content of a web pages are not taken into consideration as it is only the
description that matters.
4. A good site with good content is more likely to be reviewed for free compared to a site with poor
content.
Yahoo! Directory and DMOZ were perfect examples of human powered directories. Unfortunately,
automated search engines like Google, wiped out all those human powered directory style search engines out of
the web.
Hybrid Search Engines: Hybrid Search Engines use both crawler based and manual indexing for listing the sites
in search results. Most of the crawler based search engines like Google basically uses crawlers as a primary
mechanism and human powered directories as secondary mechanism. For example, Google may take the
description of a webpage from human powered directories and show in the search results. As human powered
directories are disappearing, hybrid types are becoming more and more crawler based search engines.
Other Types of Search Engines: Besides the above three major types, search engines can be classified into many
other categories depending upon the usage. Below are some of the examples:
1. Search engines have different types of bots for exclusively displaying images, videos, news,
products and local listings. For example, Google News page can be used to search only news
from different newspapers.
2. Some of the search engines like Dogpile collect Meta information of the pages from other search
engines and directories to display in the search results. This type of search engines is called
metasearch engines.
3. Semantic search engines like Swoogle provide accurate search results on specific area by
understanding the contextual meaning of the search queries.
URL
A Uniform Resource Locator (URL), a web address, is a reference to a web resource that specifies its
location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform
Resource Identifier (URI), although many people use the two terms interchangeably. URLs occur most
commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access
(JDBC), and many other applications.
Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html, which indicates a protocol (http),
a hostname (www.example.com), and a file name (index.html).
URL is also known as a web address, a URL (Uniform Resource Locator) is a form of URI and a
standardized naming convention for addressing documents accessible over the Internet and Intranet. An
example of a URL is https://www.computerhope.com, which is the URL for the Computer Hope website.
Overview of a URL
Below is additional information about each of the sections of the http URL for this page.
http:// or https://
The "http" stands for Hypertext Transfer Protocol and is what enables the browser to know what protocol it is
going to use to access the information specified in the domain. An "https" protocol is short for "Hypertext
Transfer Protocol Secure" and indicates that information transmitted over HTTP is encrypted and secure. After
the http or https is the colon ( : ) and two forward slashes ( // ) that separate the protocol from the remainder of
the URL.
A URL is not explicit to an HTTP or HTTPS addresses; FTP, TFTP, Telnet, and other addresses are also
considered URLs and may not follow the same syntax as our example.
WWW
Next, "www" stands for World Wide Web and is used to distinguish the content. This portion of the URL is not
required and many times can be left out. For example, typing "http://computerhope.com" would still get you to
the Computer Hope website. This portion of the address can also be substituted for an important sub page
known as a subdomain.
computerhope.com
Next, "computerhope.com" is the domain name for the website. The last portion of the domain is known as the
domain suffix, or TLD, and is used to identify the type or location of the website. For example, ".com" is short
for commercial, ".org" is short for an organization, and ".co.uk" is the United Kingdom. There are dozens of
other domain suffixes available. To get a domain, you would register the name through a domain registrar.
/jargon/u/
Next, the "jargon" and "u" portions of the above URL are the directories of where on the server the web page is
located. In this example, the web page is two directories deep, so if you were trying to find the file on the
server, it would be in the /public_html/jargon/udirectory. With most servers, the public_html directory is the
default directory containing the HTML files.
url.htm
Finally, url.htm is the actual web page on the domain you're viewing. The trailing .htm is the file extension of
the web page that indicates the file is an HTML file. Other common file extensions on the Internet include
.html, .php, .asp, .cgi, .xml, .jpg, and .gif. Each of these file extensions performs a different function, like all the
different types of files on your computer.
Where is the URL located?
A URL is located at the top of the browser window in the address baror omnibox depending on your browser
window. On desktop computers and laptop, unless your browser is being displayed in fullscreen the URL is
always visible. In most smartphone and tabletbrowsers, the address bar containing the URL will disappear as
you scroll down and only show the domain when visible. When the address bar is not visible, scrolling up on
the page shows the address bar and if only the domain is shown tapping on the address bar shows the full
address.
How to open an URL
A URL can be opened by clicking on a hyperlink. For example, if you click on "hyperlink" in this paragraph it
will open a page describing hyperlinks.
If a URL is in printed material, e-mail, or other place that does not have the URL as a hyperlink it can be typed
in the browser address bar to open the page. If the URL is in an e-mail, it can also be copied and pasted into the
address bar.
What characters are not allowed in a URL?
Most people realize that a space is not allowed in a URL. However, it is also important to realize, as
documented in RFC 1738, the URL string can only contain alphanumeric characters and the !$-_+*'(),
characters. Any other characters that are needed in the URL must be encoded.
Understanding more complex URLs and parameters
When a URL points to a script that performs additional functions, such as a search engine pointing to a search
results page, additional information (parameters) is added to the end of the URL. Below is additional
information about a URL that points to the Computer Hope search page, with the search query of "example
search".
../../cgi-bin/search.cgi?q=example%20search
In this URL, the script file being pointed to is search.cgi in the cgi-bin directory. Because this file ends with
.cgi, it is assumed to be a Perlscript.
After the script file name is a ? (question mark). The question mark in a URL separates the URL from all the
parameters or variables that are being sent to the script. In the example above, the parameter being sent
is q=example%20search. The "q" is a variable name, and the "example%20search" is the value being sent to
that variable. Because no spaces are allowed in a URL, the space is encoded as %20. In many scripts, a + (plus)
is also used to represent a space.
Domain Names
A domain name is an identification string that defines an empire of administrative autonomy, authority
or control within the Internet. Domain names are used in various networking contexts and for application-
specific naming and addressing purposes. In general, a domain name identifies a network domain, or it
represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server
computer hosting a web site, or the web site itself or any other service communicated via the Internet. In 2017,
330.6 million domain names had been registered.
Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name
registered in the DNS is a domain name. Domain names are organized in subordinate levels (subdomains) of
the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs),
including the generic top-level domains(gTLDs), such as the prominent domains com, info, net, edu, and org,
and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the
second-level and third-level domain names that are typically open for reservation by end-users who wish to
connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites.
The registration of these domain names is usually administered by domain name registrars who sell their
services to the public.
A fully qualified domain name (FQDN) is a domain name that is completely specified with all labels in the
hierarchy of the DNS, having no parts omitted. Labels in the Domain Name System are case-insensitive, and
may therefore be written in any desired capitalization method, but most commonly domain names are written in
lowercase in technical contexts.
DNS AND NAME SERVERS
Without the Domain Name System (DNS), the Internet would be a much less user-friendly place. Instead of
using easily remembered names such as a2hosting.com, we would have to use a sequence of numbers like
75.98.175.166 (also known as an IP address) every time we wanted to visit a web site or access a service on the
Internet. DNS translates human-readable domain names into numeric IP addresses that computers can
understand.
IP Addresses
In addition to the domain name, there is also another address for a Web site: the IP (Internet Protocol) number.
This is the actual address computers use to connect to the site through the Internet. It is directly linked to the
domain name and is regulated by the Internet Corporation for Assigned Names and Numbers (ICANN)
The domain name and the IP address act in the same way. Each computer connected to the Internet is assigned a
unique number known as an IP address. Developed in the early 1970's, this number serves as the computer's
Internet address. An IP address can be either static (permanent) or dynamic (temporary). Most home computers
use a dynamic IP address while servers and many other computers use a static IP address. An IP address looks
like this: 12.129.147.10. If you were to enter that number in the address bar of your Web browser, you would
reach the Web site of the Washington Post.
Registering Domain Names
In order to use a domain name, it must be registered with a registry. ICANN maintains a current directory of
accredited registrars. The domain name is registered for a specified period of time. i.e. one year, up to a
maximum of ten years, and is renewable on an ongoing basis. When you purchase a domain name, it only
belongs to you for the specified time you stated, in this case, one year. As long as you continue to renew it in a
timely fashion, it will belong to you. It is important to keep track of the renewal period because if the domain
name is not renewed, it can be registered by anyone for their own use.
During the registration process you may be asked for information for different "contacts." i.e., technical,
administrative. Your domain name record will be available to the public in what is called a "who is" database (a
public database mandated by ICANN).
IP Addressing
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number, this allows for a maximum
of 4,294,967,296 (232) unique addresses. However, because of the growth of the Internet and the depletion of
available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, which allows for 3.4 x
1038 (2128) unique addresses was developed in 1995, and standardized in December 1998. In July 2017, a final
definition of the protocol was published. IPv6 deployment has been ongoing since the mid-2000s.
IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 in
IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated
in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is
equivalent to the historically used subnet mask 255.255.255.0.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by
five regional Internet registries (RIRs) responsible in their designated territories for assignment to end users
and local Internet registries, such as Internet service providers. IPv4 addresses have been distributed by IANA
to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator
assigns an IP address to each device connected to its network. Such assignments may be on a static (fixed or
permanent) or dynamic basis, depending on its software and practices.
SubNetworks
IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is
recognized as consisting of two parts: the network prefix in the high-order bits and the remaining bits called
the rest field, host identifier, or interface identifier (IPv6),
used for host numbering within a network.[1] The subnet
mask or CIDR notation determines how the IP address is
divided into network and host parts.
The term subnet mask is only used within IPv4. Both
IP versions however use the CIDR concept and notation. In
this, the IP address is followed by a slash and the number (in
decimal) of bits used for the network part, also called
the routing prefix. For example, an IPv4 address and its
subnet mask may be 192.0.2.1 and 255.255.255.0,
respectively. The CIDR notation for the same IP address and
subnet is 192.0.2.1/24, because the first 24 bits of the IP
address indicate the network and subnet.
IPv4
An IPv4 address has a size of 32 bits, which limits the address space to 4294967296 (232) addresses. Of
this number, some addresses are reserved for special purposes such as private networks (~18 million addresses)
and multicast addressing (~270 million addresses).
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers,
each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits
(an octet) of the address. In some cases of technical writing, [specify] IPv4 addresses may be presented in
various hexadecimal, octal, or binary representations.
Historical Classful Network Architecure
Reserved PrivateIPv4 Network Range
IPv6
In IPv6, the address size was increased from 32 bits in IPv4 to 128 bits, thus providing up to
2128 (approximately 3.403×1038) addresses. This is deemed sufficient for the foreseeable future.
The intent of the new design was not to provide just a sufficient quantity of addresses, but also redesign
routing in the Internet by allowing more efficient aggregation
of subnetwork routing prefixes. This resulted in slower
growth of routing tables in routers. The smallest possible
individual allocation is a subnet for 264 hosts, which is the
square of the size of the entire IPv4 Internet. At these levels,
actual address utilization ratios will be small on any IPv6
network segment. The new design also provides the
opportunity to separate the addressing infrastructure of a
network segment, i.e. the local administration of the
segment's available space, from the addressing prefix used to
route traffic to and from external networks. IPv6 has
facilities that automatically change the routing prefix of
entire networks, should the global connectivity or the routing
policy change, without requiring internal redesign or manual
renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where
appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have complex
address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native support for the IPv6 protocol,
but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP (VoIP)
and multimedia equipment, and some networking hardware.
APPLICATIONS of INTERNET
The Internet has many important applications. Of the various services available via the Internet, the three most
important are e-mail, web browsing, and peer-to-peer services. E-mail, also known as electronic mail, is the
most widely used and successful of Internet applications. Web browsing is the application that had the greatest
influence in dramatic expansion of the Internet and its use during the 1990s. Peer-to-peer networking is the
newest of these three Internet applications, and also the most controversial, because its uses have created
problems related to the access and use of copyrighted materials.
Examples of Applications: An Internet application does something for end users. It is generally not concerned
with how data is actually transmitted between the hosts. Here are some distributed applications that require
well-defined application level protocols:
Sending and receiving email
Searching and browsing information archives
Copying files between computers
Conducting financial transactions
Navigating (in your car, smart scooter, smart bike, or other)
Playing interactive games
Video and music streaming
Chat or voice communication (direct messaging, video conferencing)
Communication Travel
Job searches Entertainment
Finding books and study material Shopping
Health and medicine Stock market updates
Research
Business use of internet: different ways by which internet can be used for business are
o Information about the product can be provided can be provided online to the customer.
o Provide market information to the business
o It help business to recruit talented people
o Help in locating suppliers of the product.
o Fast information regarding customers view about companies product
o Eliminate middle men and have a direct contact with contact with customer.
o Providing information to the investor by providing companies back ground and financial
information on web site.
In addition, there are a number of network services such as:
Name servers
Configuration servers
Mail gateways, transfer agents, relays
File and print servers
Communication
Data Transfer
Information
Electronic mailing systems (Google Mail features): Creating and Managing mailing accounts,
folders.
EMAIL
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic
devices. Invented by Ray Tomlinson, email first entered limited use in the 1960s and by the mid-1970s had
taken the form now recognized as email. Email operates across computer networks, which today is primarily
the Internet. Some early email systems required the author and the recipient to both is online at the same time,
in common with instant messaging. Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to
be online simultaneously; they need to connect only briefly, typically to a mail server or a webmail interface for
as long as it takes to send or receive messages.
Short for electronic mail, email (or e-mail) is defined as the transmission of messages
over communications networks. Typically the messages are notes entered from the keyboard or
electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an email system.
Massage Format
Internet email messages consist of two major sections, the message header and the message body, collectively
known as content. The header is structured into fields such as From, To, CC, Subject, Date, and other
information about the email. In the process of transporting email messages between systems, SMTP
communicates delivery parameters and information using message header fields. The body contains the
message, as unstructured text, sometimes containing a signature block at the end. The header is separated from
the body by a blank line.
Message header
Each email message has a header (the "header section" of the message, according to the specification),
comprising a number of fields ("header fields"). Each field has a name ("field name" or "header field name"),
which is followed by the separator character ":", and a value ("field body" or "header field body").
Each field name must start in the first character of a new line in the header section and begin with a non-
whitespace printable character. It ends with the separator character ":". The separator is then followed by the
field value (the "field body"). The value can continue onto subsequent lines if those lines have a space or tab as
their first character. Field names and, without SMTPUTF8, field bodies are restricted to 7-bit ASCII characters.
Some non-ASCII values may be represented using MIME encoded words.
Header fields
Email header fields can be multi-line, with each line recommended to be no more than 78 characters, although
the technical limit is 998 characters. In particular, this allows email addresses to use non-ASCII characters.
Such addresses are supported by Google and Microsoft products, and promoted by some governments.
The message header must include at least the following fields:
From: The email address, and optionally the name of the author(s). In many email clients not changeable
except through changing account settings.
Date: The local time and date when the message was written. Like the From: field, many email clients fill
this in automatically when sending. The recipient's client may then display the time in the format and time
zone local to them.
To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients
(multiple allowed), for secondary recipients see Cc: and Bcc: below.
Subject: A brief summary of the topic of the message. Certain abbreviations are commonly used in the
subject, including "RE:" and "FW:".
Cc: Carbon copy; Many email clients will mark email in one's inbox differently depending on whether they
are in the To: or Cc: list. (Bcc: Blind carbon copy; addresses are usually only specified during SMTP
delivery, and not usually listed in the message header.)
Content-Type: Information about how the message is to be displayed, usually a MIME type.
Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that automated "vacation" or
"out of office" responses should not be returned for this mail, e.g. to prevent vacation notices from being
sent to all other subscribers of a mailing list. Sendmail uses this field to affect prioritization of queued
email, with "Precedence: special-delivery" messages delivered sooner. With modern high-bandwidth
networks, delivery priority is less of an issue than it once was. Microsoft Exchange respects a fine-grained
automatic response suppression mechanism, the X-Auto-Response-Suppress field.[42]
Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in
In-Reply-To: (see below).
In-Reply-To: Message-ID of the message that this is a reply to. Used to link related messages together. This
field only applies for reply messages.
References: Message-ID of the message that this is a reply to, and the message-id of the message the
previous reply was a reply to, etc.
Reply-To: Address that should be used to reply to the message.
Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list
manager, etc.).
Archived-At: A direct link to the archived form of an individual email message.
SMTP defines the trace information of a message, which is also saved in the header using the following two
fields:
Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last
to first).
Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at
the top of the header.
Other fields that are added on top of the header by the receiving server may be called trace fields, in a broader
sense.
Authentication-Results: when a server carries out authentication checks, it can save the results in this field
for consumption by downstream agents.[45]
Received-SPF: stores results of SPF checks in more detail than Authentication-Results.[46]
Auto-Submitted: is used to mark automatically generated messages.[47]
VBR-Info: claims VBR whitelisting[48]
Message body
Content encoding
Internet email was originally designed for 7-bit ASCII. Most email software is 8-bit clean but must assume it
will communicate with 7-bit servers and mail readers. The MIME standard introduced character set specifiers
and two content transfer encodings to enable transmission of non-ASCII data: quoted printable for mostly 7-bit
content with a few characters outside that range and base64 for arbitrary binary data.
Plain text and HTML
Most modern graphic email clients allow the use of either plain text or HTML for the message body at the
option of the user. HTML email messages often include an automatically generated plain text copy as well, for
compatibility reasons. Advantages of HTML include the ability to include in-line links and images, set apart
previous messages in block quotes, wrap naturally on any display, use emphasis such as underlines and italics,
and change font styles. Disadvantages include the increased size of the email, privacy concerns about web bugs,
abuse of HTML email as a vector for phishing attacks and the spread of malicious software.
What Is Gmail?
Gmail is a free email service run by Google. It integrates with other Google services like Google Docs, Google
Drive, and YouTube. Google also offers premium services to businesses through G Suite. There is also an
HTML version of Gmail called Gmail Basic and a Gmail mobile app.
If you've never had an email account before, Gmail is a good place to start. It is reliable and free, and it comes
with 15 GB of storage space for your messages. Your email is stored online, so you can access it from any
device that can connect to the internet.
How to Get a Gmail Account: To create a new Gmail account, you must first create a new Google account.
1. Go to Gmail.com and select Create account.
2. Select For myself.
3. Enter the requested information, then select Next.
4. You may be asked to provide a phone number to verify your identity. Enter your phone number and
select Next. Google will send you a text with a code that you must enter on the following page.
5. Enter the requested information, then select Next.
6. Read Google's privacy information and select I agree.
7. Select Next.
8. Choose a layout for your viewing your messages, then select OK.
You will automatically be taken to Gmail to set up your new account. You'll see a message from Google in your
inbox, which contains important information about using Gmail.
How to Set Up Gmail
After reviewing the introductory information, you can personalize your account. For example, select Change
profile image to add a photo that will be visible to other Gmail users. If you want to change the colors and
layout of the Gmail interface, select choose a theme. If you have another email account, select Import contacts
and mail to link it to your new Gmail account.
How to Use Gmail
1. To send a new Gmail message, select Compose.
2. Select the Star beside a message to mark it as important.
3. To remove messages from your inbox, select the checkbox beside the message, then select Archive (the
folder with a down-arrow) or Trash (the trashcan).
4. Sending a message to the trash in Gmail does not automatically delete it. To permanently delete a
message, select Trash from the left pane to open your trash folder, then select Empty Trash now.
5. To sign out of Gmail, select your profile icon (or image) in the top-right corner, then select Sign out.
How to Make Labels (Folder)
Gmail labels make it easier to manage your inbox. While viewing a message, select the Label icon and choose
from the options, or select Create new to make custom labels.
How to Find Emails in Gmail
In addition to using labels, you can search for the message using the search bar above your inbox. You can also use
your Gmail contacts to find all correspondence with certain people.
Document Collaboration
One of the first real-time collaborative editor tools can be found in “The Mother of All Demos,” presented by
Douglas Engelbart in 1968. The next major milestone for document collaboration appeared in 1991 with the
release of Instant Update for the Mac OS and Microsoft Windows.
Document collaboration has grown to cover tools that enable real-time access and updates for concurrent work
across the room or around the world. This practice (of multiple people working simultaneously on a single
document) is called co-authoring. Modern tools mitigate the challenges of non-real-time and un-automated
collaboration, such as paper trails and red-lining, unwieldy email chains, or overwriting original material.
What Is a Collaborative Document?
A collaborative document is a file that multiple people edit or contribute to, with the goal of creating single final
version through collaboration. Collaborative documents may be word processing or text documents,
spreadsheets, presentations, images, PDFs, videos, or maps.
Common Uses of Document Collaboration
Few documents, presentations, reports, spreadsheets, or projects are developed by just one person. At its core,
document collaboration involves designated shared access to files for editing by groups of any size – be it two
or 2,000.
Document collaboration goals will vary for each organization, so before you choose a tool, define your needs.
For example, a group building a social media campaign may require video, graphs, and pictures as part of
brainstorming or mind mapping. By contrast, a technical build for software values document integrity through
controlled revisions, so security and access may be more important. Consider your company’s functions and
needs when adopting a document collaboration solution.
Top Document Collaboration Tools
Document collaboration tools, like any other widely adopted software platform, are always growing and
improving. Here are the most popular solutions:
1. Google
2. Microsoft Office 365
3. Quip
4. Dropbox Paper
Google offers a suite of services through Google Drive, including the following:
1. Google Docs (initially developed as Writely)
2. Google Slides
3. Google Sheets
Google’s file collaboration platform is universally available and easy to use, as is Microsoft Office 365. Both
have functions that users are already familiar with and can quickly adapt.
Collaboration tools can be more document-centric, such as Google, Quip, and Microsoft Office 365, all of
which use familiar features that use notation to track who and when edits are made. These platforms and others,
such as Dropbox and Box, offer cloud storage-centric tools that enable easy document access from multiple
devices by multiple users, as well as integration with numerous applications. When shopping for a document
collaboration tool, consider these additional features:
1. Automatic save
2. Real-time comments and messaging
3. Version review
4. User permission controls
5. Update alerts
6. Participants list
7. External and internal access
8. Mobile device access (phone, tablet, and
platform support)
9. Offline and online access
10. Compliance
11. File synchronization
12. Historical audit trail (change history)
13. Large file capability
14. Large enterprise team support for
simultaneous access
15. Language/time-zone compatibility
How to Use Document Collaboration Tools
Upon entering a real conference room, you would instantly notice many details, such as who is present and what
they are working on. However, in the new collaborative digital space, much more is immediately evident,
including past and present conversations, project timeline, and next steps. You can easily identify the people in
attendance, meeting agendas, calendars, and revision history.
Most collaborative work is done online or through a proprietary and secure server. Depending upon security
setup, it can be accessed on mobile devices, too. While you typically access and synchronize the work online,
there will be times when team members need offline syncing capabilities, such as when traveling. As with all
tools, know how your document collaboration platform will be used and what features are important — this
information will guide your solution search.
How Do You Share a Document?
Collaboration revolves around sharing documents, and your method for doing so is dependent on the file type
and the tools available in the platform. Google Drive, Dropbox, and Box all have the same general sharing
steps: upload the document to a folder within the online solution, select the Share option, and enter the email
address of the person you would like to share the document with. You also have options to set view-only or edit
permissions.
Document Collaboration for Developers
Software developers depend on accurate version control, and they know both the benefits and the perils of
document collaboration. When choosing a version control platform, development teams should value
accessibility and sharing. Tools and solutions for development collaboration are available through IBM,
Microsoft, Subversion, and Helix.
Another popular platform choice is a distributed version-control (DVC) system, which allows numerous
working copies to be reconciled with the main document. Tools from Git and Mercurial provide some of the
best open source solutions for DVC.
Instant Messaging
Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over
the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are
typically transmitted between two parties, when each user chooses to complete a thought and select "send".
Some IM applications can use push technology to provide real-time text, which transmits messages character by
character, as they are composed. More advanced instant messaging can add file transfer,
clickable hyperlinks, Voice over IP, or video chat.
An instant message (IM) is a real-time, text-based communication similar to chat. IM uses a shared software
client between or among two or more people using personal computers, iPhones or other devices. The
communication is done over a network, often the Internet, and may include advanced modes with live voice or
video. File transfers are also sometimes allowed but are limited in size.
Although included in the online chat category of technologies, IM differs in that the communicating parties are
selected from a known list, called a “buddy list,” “friend list” or “contact list." Users are typically alerted when
someone on their list is online. However, online chat allows communication in a multiuser environment among
users that are usually anonymous.
Some IM systems permit messages to be sent when the recipient is not online. In these cases, IM is much like
email; in fact, the message may even be sent to the recipient's email address.
Features of instant messaging
The exchange of text has long been the chief function of instant messaging, but it is now one feature of many.
The ability to insert images and emojis into messages is now standard in many clients, as are file
transfers. Facebook Messenger even enables users to send money via IM. Numerous clients now support the
escalation from IM to other modes of communication, such as group chat, voice calls or video conferencing.
Presence enables users to see the availability of their contacts -- not only whether they are online or offline, but
also whether they have indicated their status is free or busy. Some clients also enable users to set an "away
message" providing more detail about their limited or lack of availability. Within an active session between two
users, most clients can also indicate to one user in real time when the other user is typing.
Popular instant messaging software: While some IM clients are distinctly consumer services or explicitly for
enterprises, some crossovers exist. The following is a list of popular consumer, prosumer and enterprise IM
clients:
1. Apple Messages (formerly iMessage) 9. Pidgin
2. Cisco Jabber (based on Jabber) 10. Slack
3. Google Hangouts (formerly Google Talk) 11. Telegram
4. Microsoft Skype (includes Skype for 12. Trillian
Business) 13. Viber
5. Facebook Messenger 14. WeChat
6. IBM Sametime 15. WhatsApp Messenger
7. ICQ 16. Windows Live Messenger
8. Line 17. Yahoo Messenger
Netiquettes
"Netiquette" refers to Internet etiquette. This simply means the use of good manners in online communication
such as e-mail, forums, blogs, and social networking sites to name a few. It is important to use netiquette
because communication online is non-verbal. Most often online communication consists of reading something
someone else has typed. This type of communication does not allow each person to see facial expressions, body
language, or hear intonation. Because of this, messages can often be misinterpreted. By following netiquette,
online communication becomes clearer. Especially in business and career related online communications
netiquette should be used to ensure that correct spelling, grammar, and punctuation are put in place to project
professionalism. Netiquette also includes the use of emoticons (such as :) :( ;) and others) to explain an emotion.
In e-mail, netiquette means not flooding someone's inbox with forwarded messages or spam mail. Following
netiquette will help you to maintain and establish positive online relationships as well as develop a positive
online reputation.
While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. Below
are ten examples of rules to follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another person may
not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a
positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
Sign in to Skype
1. Double click on the Skype icon on your desktop to start Skype.
2. Enter your Skype name and password and click on “Sign me in.”
3. When you sign in for the first time, it takes you through a 2 step process of testing your microphone
and webcam and selecting a profile picture. The profile picture can be uploaded from an existing
photo on your computer or you can capture your image using the webcam. You may also skip these
steps and do them later.
You are signed in and ready to use Skype.
Adding Contacts
1. You will need to add contacts before you can actually start communicating with Skype.
2. You may click on the “Add Contact” option in the “Contact” Menu or click on the “Add a contact”
link on the lower left corner of the window.
3. You will get the screen below to add contacts. The more details you provide in the add contacts
windows, the easier it becomes to locate your friend. Once you have located your friend by providing
details, click on “Add” to continue.
4. You will get the screen below. If you want to send a personal message, type in the message box and
click on “Send request.
5. A request will be sent to your friend and when he/she accepts the request, he/she will get added to your
contact list.
6. You may click on the “Add another contact” in the request sent confirmation screen to keep
adding contacts.
Accept Contact requests
1. You may also receive contact requests from others. You have to accept contact requests sent by others
to add them to your contact list. Ask a few participants to send you a contact request and accept those
contacts.
2. When someone adds you to his/her contact list you will get a message on top of your contact list as
given below. Click on the contact request
a. You will get the following buttons which can be used for various purposes.
b. To add a contact, click the Add to Contacts button. Note: Do not accept contacts of people
whom you do not know. Add only contacts of those people who you know personally or
professionally.
c. To view the profile of the person sending the contact, click View Profile. This will show you
the information regarding the person.
d. Click Ignore to reject the contact request.
e. Click Block if you wish to reject the contact request and block the person. Note: Blocking a
person will disable the person from sending you contact requests again.
Send instant messages: By sending instant messages or chatting online using Skype you can share your business
idea description with friends.
1. In your Skype window, go to the Contacts tab and click the name of the person or the group you
wish to start the chat conversation with. You will notice a chat window with the person’s or group’s
name will appear.
2. Click to place your cursor in the chat box and type your message. Then, click Send Message, or
press Enter on your keyboard.
3. Your message along with your contact’s reply to the message will be shown in the chat transcript
window.
4. To continue chatting, repeat steps 2-3.
5. If you wish to chat with another person, go to the Contacts tab, and choose the other person’s name.
The chat window for that person will be shown. Repeat steps 2-4 to start a chat.
6. You can have multiple chat conversations at the same time. To navigate between the different chat
windows, click on the contact, whose chat window you wish to see. Typically, there will be an
orange circle next to the contact that has sent you a message. You may also receive an audio beep.
Sign out of your Skype account
Once you have finished sharing your business idea with all the group members, sign out of your Skype
account. To sign out, in your Skype window, click Skype -> Sign Out in the Menu Bar
Smart phones
A smartphone is a cellular telephone with an integrated computer and other features not
originally associated with telephones, such as an operating system, web browsing and the ability to run
software applications.
Important features
One of the most important features of a smartphone is its connection to an app store. An app store is a
centralized portal where users can search for and download software applications to run on their phones. A
typical app store offers thousands of mobile apps for productivity, gaming, word processing, note-taking,
organization, social media and more. The following are some of the other key features of a smartphone:
1. internet connectivity;
2. a mobile browser;
3. the ability to sync more than one email account to a device;
4. embedded memory;
5. a hardware or software-based QWERTY keyboard;
6. wireless synchronization with other devices, such as laptop or desktop computers;
7. the ability to download applications and run them independently;
8. support for third-party applications;
9. the ability to run multiple applications simultaneously;
10. touchscreen;
11. Wi-Fi;
12. a digital camera, typically with video capability;
13. gaming;
14. unified messaging;
15. GPS -- global positioning system.
A smartphone also has the ability to support accessories, including Bluetooth headphones, power charging
cables and extra speakers. Because of the fragile outer casing of most smartphones, users often also purchase
screen protectors and more durable cases in which to put their phones.
Popular uses
Many consumers use their smartphones to engage with friends, family and brands on social media. Social
media platforms such as Facebook, Instagram, Twitter and LinkedIn all have mobile apps that a user can
download from their phone's app store. These apps make it easier for smartphone users to post personal
updates and photos while on the go rather than at their desktop.
Another common use for smartphones is health and wellness tracking. Third-party wearable devices, such as
smart watches, can connect with a smartphone to monitor an individual's health statistics, such as heart rate,
and send information to be aggregated on the phone.
Mobile payment is another popular use for smartphones. Wallet features allow users to save credit card
information on their phones to use when purchasing items at retail stores.
Kindle
Kindle is a line of Android-powered portable e-book reader devices developed by Amazon
that enable users to shop for, download and read electronic versions of books, newspapers, magazines,
websites, blogs and more. Amazon's basic Kindle devices primarily compete with similar e-book devices like
Barnes & Noble's Nook, while the more advanced Kindle Fire competes with mobile devices like Android-
powered tablet computers and Apple's iPad.
The entry-level Kindles' primary purpose is for reading books, and the devices utilize
Electronic Ink ("E Ink") technology called E Ink Pearl to improve the reading experience. Compared to
the LCDscreens utilized by most mobile devices, the Kindle's E Ink Pearl technology and monochrome matte
screen combine to provide sharp, clear text and reduced glare for extended reading with less eye
fatigue. Kindle devices also offer built-in Wi-Fi capabilities for downloading e-books and apps, as well as
basic Web browsing, and Kindle users can take advantage of free Wi-Fi access at AT&T hotspots.
The Kindle line consists of:
1. The original Kindle device, which is now in its fourth generation
2. The Kindle Touch, Kindle that offers a touch-sensitive screen
3. The Kindle Keyboard, which includes a built-in keyboard
4. The Kindle DX, a Kindle that features larger screen than the original device
5. The Kindle Fire, a tablet computer that offers a full color display.
Key benefits and features of a Kindle:
1. Stores up to 1,400 books.
2. Special high-contrast screen allows you to read even in bright sunshine with no glare.
3. Clear text and fonts, and a sharp display – what you see resembles a book page.
4. Adjustable text size.
5. Built-in wifi or 3G connection.
6. Battery life of at least a month if wifi is turned off.
7. Page-turning function so you feel as if you’re reading a real book.
8. Integrates with Facebook and Twitter and allows searching on Wikipedia.
9. Never heats up like a laptop.
10. Books can be categorised or stored as collections.
11. Automatic archive function: you can delete books and download them another time.
12. Screen can be rotated for better viewing of pictures, diagrams, maps, etc.
13. Also able to read newspapers, magazines and web pages.
14. In-built keyboard enables searching within a book, a library or online.
15. You can add your own annotations to the text.
16. Automatic bookmark.
17. Built-in Oxford English Dictionary.
18. Password protection.
Gaming-gadgets
The Game Gadget is an open source gaming handheld that supports music and video playback, open game
development, and some e-reader features. It was available in one colour (white). It was released on April 6,
2012. Specification
1. CPU MIPS Ingenic JZ4750 @ 433Mhz
2. RAM 64MB
3. Internal Storage 2GB flash
4. Additional Storage SD/SDHC
5. Input D-Pad, 2 shoulder, 4 face, Start & Select buttons, Mic.
6. Outputs Stereo Speakers, Headphone Jack & TV-out
7. I/O Micro USB
8. Display 3.5" LCD, 320x240 resolution
9. Audio Playback MP3, WMA, APE, FLAC, RA
10. Software Support Free official SDKs Available
Popular gaming gadgets
Steelseries Wireless Controller: This has been designed to work with your PC or Mac, which is pretty
standard – but it also works with mobile devices via Bluetooth. Just hook it up to your Android or iPhone and
bam, proper gaming on the go. Fully charged, it gives you 10 hours of non-stop playing time.
Razer destructor 2: The Destructor 2 is only 2.2mm thick and is pretty much the perfect mouse pad for
gamers. Its surface is micro-textured for easy sliding and works with both laser and optical mice.
WD My Passport Portable Hard Drive: Avoid the PC gamer's dilemma and get this two-terabyte external hard
drive and you'll never need to worry about those Steam games filling up your hard drive. It's USB powered
(2.0 and 3.0 compliant) and will run with a Mac or PC.
Logitech G19s gaming keyboard: The new keyboard from Logitech features a customisable display that
allows you to track your gaming stats even if you aren't currently in game. There are also 12 programmable
keys, with 36 different functions. Its two USB ports mean you don't have to worry about not having enough
slots for other kit, either.
Mad Catz Cyborg Fly 5 Joystick: An affordable joystick that doesn't compromise on features. It has 10
buttons, a dual-throttle lever and an adjustable handle height. There's no need for batteries either; it runs off
your USB port.
Book Publishing
Publishing is the dissemination of literature, music, or information. It is the activity of making
information available to the general public. In some cases, authors may be their own publishers, meaning
originators and developers of content also provide media to deliver and display their content. Also, the word
"publisher" can refer both to an individual who leads a publishing company or an imprint and to an individual
who owns/heads a magazine.
Traditionally, the term refers to the distribution of printed works, such as books (the "book trade")
and newspapers. With the advent of digital information systems and the Internet, the scope of publishing has
expanded to include electronic resources such as the electronic versions of books and periodicals, as well
as micropublishing, websites, blogs, video game publishers, and the like.
Publishing includes the following stages of development: acquisition, copy editing,
production, printing (and its electronic equivalents), marketing, and distribution.
Publication is also important as a legal concept: As the process of giving formal notice to the world of a
significant intention, for example, to marry or enter bankruptcy As the essential precondition of being able to
claim defamation; that is, the alleged libel must have been published For copyright purposes, where there is a
difference in the protection of published and unpublished works
There are two basic business models in book publishing:
1. Traditional or commercial publishers: Do not charge authors at all to publish their books, for certain
rights to publish the work and paying a royalty on books sold.
2. Self-publishing: The author has to meet the total expense to get the book published. The author should
retain full rights, also known as vanity publishing.
Electronic Publishing
Electronic publishing (also referred to as e-publishing or digital publishing or online publishing)
includes the digital publication of e-books, digital magazines, and the development of digital libraries and
catalogues. It also includes an editorial aspect that consists of editing books, journals or magazines that are
mostly destined to be read on a screen (computer, e-reader, tablet, smartphone).
Here’s how to publish a book step-by-step:
1. Decide Why You Want to Publish a Book
2. Write Your Book
3. Get Feedback Before Publishing Your Book
4. Choose a Book Title
5. Hire a Great Book Editor
6. Design a Book Cover that Converts
7. Create Your Kindle Direct Publishing Account
8. Format and Upload your Book
9. Self-Publish Your Book
10. Price Your Book
11. Form a Launch Team
12. Maximize Book Launch Exposure
13. Celebrate Publishing a Book!
Data Analysis
Data analysis is a process of inspecting, cleansing, transforming and modeling data with the goal of
discovering useful information, informing conclusions and supporting decision-making. Data analysis has
multiple facets and approaches, encompassing diverse techniques under a variety of names, and is used in
different business, science, and social science domains. In today's business world, data analysis plays a role in
making decisions more scientific and helping businesses operate more effectively.
Data mining is a particular data analysis technique that focuses on modeling and knowledge discovery
for predictive rather than purely descriptive purposes, while business intelligence covers data analysis that relies
heavily on aggregation, focusing mainly on business information.
Data integration is a precursor to data analysis, and data analysis is closely linked to data
visualization and data dissemination. The term data analysis is sometimes used as a synonym for data modeling.
The process of data analysis includes.
1. Data requirements 5. Exploratory data analysis
2. Data collection 6. Modeling and algorithms
3. Data processing 7. Data product
4. Data cleaning 8. Communication
Data analysis is a part of a larger process of deriving business intelligence. The process includes one or more
of the following steps:
1. Defining Objectives: Any study must begin with a set of clearly defined business objectives. Much of
the decisions made in the rest of the process depend on how clearly the objectives of the study have been
stated.
2. Posing Questions: An attempt is made to ask a question in the problem domain. For example, do red
sports cars get into accidents more often than others?
3. Data Collection: Data relevant to the question must be collected from the appropriate sources. In the
example above, data might be collected from a variety of sources including: DMV or police accident
reports, insurance claims and hospitalization details. When data is being collected using surveys, a
questionnaire to be presented to the subjects is needed. The questions should be appropriately modeled
for the statistical method being used.
4. Data Wrangling: Raw data may be collected in several different formats. The collected data must be
cleaned and converted so that data analysis tools can import it.
5. Data Analysis: This is the step where the cleaned and aggregated data is imported into analysis tools.
These tools allow you to explore the data, find patterns in it, and ask and answer what-if questions. This
is the process by which sense is made of data gathered in research by proper application of statistical
methods.
6. Drawing Conclusions and Making Predictions: This is the step where, after sufficient analysis,
conclusions can draw from the data and appropriate predictions can be made.
Let us now look in some detail at the methods of data analysis in particular.
Data Mining
Data mining is a method of data analysis for discovering patterns in large data sets using the methods of
statistics, artificial intelligence, machine learning and databases. The goal is to transform raw data into
understandable business information. These might include identifying groups of data records (also known as
cluster analysis), or identifying anomalies and dependencies between data groups. Applications of data mining:
1. Anomaly detection can process huge amounts of data (“big data”) and automatically identify outlier
cases, possibly for exclusion from decision making or detection of fraud (e.g. bank fraud).
2. Learning customer purchase habits. Machine learning techniques can be used to model customer
purchase habits and determine frequently bought items.
3. Clustering can identify previously unknown groups within the data.
4. Classification is used to automatically classify data entries into pre-specified bins.
Text Analytics
Text analytics is the process of deriving useful information from text. It is accomplished by processing
unstructured textual information, extract meaningful numerical indices from the information and make the
information available to statistical and machine learning algorithms for further processing. Text mining process
includes one or more of the following steps:
1. Collecting information from various sources including web, file system, database, etc.
2. Linguistic analysis including natural language processing.
3. Pattern recognition (e.g. recognizing phone numbers, email addresses, etc.)
4. Extracting summary information from the text, such as relative frequencies of the words, determining
similarities between documents, etc.
Examples of text analytics applications:
1. Analyzing open-ended survey responses.
2. Analysis of emails, documents, etc. to filter out “junk”. This also includes automatic classification of
messages into pre-defined bins for routing to different departments.
3. Investigate competitors by crawling their websites. This could be used to derive information about
competitors’ activities.
4. Security applications which can process log files for intrusion detection.
Business Intelligence
Business intelligence transforms data into actionable intelligence for business purposes and may be used in an
organization’s strategic and tactical business decision making. It offers a way for people to examine trends from
collected data and derive insights from it. Some examples of business intelligence in used today:
1. An organization’s operating decisions such as product placement and pricing.
2. Identifying new markets, assessing the demand and suitability of products for different market segments.
3. Budgeting and rolling forecasts.
4. Using visual tools such as heat maps, pivot tables and geographical mapping.
Data Visualization
Data visualization refers very simply to the visual representation of data. In the context of data analysis, it
means using the tools of statistics, probability, pivot tables and other artifacts to present data visually. It makes
complex data more understandable and usable.
Instantly Visualize Data & Information With Google Fusion Tables Increasing amounts of data are being
generated by a number of sensors in the environment. This data presents challenges in understanding which can
be eased by using the tools of Data visualization. Data visualization is used in the following applications.
1. Extracting summary data from the raw data of IOT.
2. Using a bar chart to represent sales performance over several quarters.
3. A histogram shows distribution of a variable such as income by dividing the range into bins.
Application of Data Analysis
Internet Search, Digital Advertisements (Targeted Advertising and re-targeting), Recommender Systems,
Image Recognition, Speech Recognition, Gaming, Price Comparison Websites, Airline Route Planning,
Fraud and Risk Detection, Delivery logistics
Accounting
An accounting application is a software program that captures and records all accounting transactions. It
often divides functions into modules such as accounts payable, accounts receivable, inventory, and more. An
accounting application may run on a locally managed set of hardware and networking equipment or rely on the
expertise of a third-party-managed cloud-based infrastructure.
Accounting provides companies with various pieces of information regarding business operations. It is
often conducted by a company's internal accounting department and reviewed by a public accounting firm.
Small businesses often have significantly less financial information recorded during the accounting process.
However, business owners often review this financial information to determine how well their business
is operating. Accounting information can also provide insight on growing or expanding current business
operations.
Business Performance Management: A common use of accounting information is measuring the performance of
various business operations.
Create Company Budgets: Business owners often use accounting information to create budgets for their
companies. Business owners often take this accounting information and develop future budgets to ensure they
have a financial road map for their businesses.
Making Business Decisions: Accounting information is commonly used to make business decisions. For
financial management, an income statement and accounting of expenses provides an important overview of the
business. Decisions may include expanding current operations, using different economic resources, purchasing
new equipment or facilities, estimating future sales or reviewing new business opportunities.
Informing Investment Decisions: External business stakeholders often use accounting information to make
investment decisions.
What is accounting software?
Accounting software is a fundamental application that allows an organization to record the flow of money for
internal and external review and auditing. It is the primary tool for assessing the financial health of the
organization and for meeting legal compliance through such core financial tools as general ledger, accounts
payable and receivable, purchase order, stock or inventory and billing. Modern implementation of the
application expands to payroll modules, electronic payment, timesheet and expenses among others in order to
gain a wider foothold in the market.
Features of Computerized Accounting System Accounting software is used to implement a computerized
accounting system. The computer accounting system is based on the concept of databases. It does away with the
concept of creating and maintaining journals, ledger, etc. which are essential while working with manual
accounting system. Typically computerized accounting system offers the following features:
1. Online input and storage of accounting data.
2. Printout of purchase and sales invoices.
3. Logical scheme for codification of accounts and transactions. Every account and transaction is assigned
a unique code.
4. Grouping of accounts is done from the very beginning.
5. Instant reports for management, for example – Aging Statement, Stock Statement, Trial Balance,
Trading and Profit and Loss Account, Balance Sheet, Stock Valuation, Value Added Tax (VAT),
Returns, Payroll Report, etc.
Some application of accounting is tally and tally ERP etc.
Investment
To invest is to allocate money in the expectation of some benefit in the future. In finance, the benefit
from an investment is called a return. The return may consist of a gain (or loss) realized from the sale of
property or an investment, unrealized capital appreciation (or depreciation), or investment income such
as dividends, interest, rental income etc., or a combination of capital gain and income. The return may also
include currency gains or losses due to changes in foreign currency exchange rates.
Investors generally expect higher returns from riskier investments. When a low risk investment is made, the
return is also generally low. Investors, particularly novices, are often advised to adopt a particular investment
strategy and diversify their portfolio. Diversification has the statistical effect of reducing overall risk.
Investment apps
1. Best for Free Stock Trades: Robinhood
2. Best for Automated Investing: Acorns
3. Best for Learning About Investing: Stash
4. Best for Retirement: Vault
5. Best for Stock Gifting: Stockpile
6. Best for Microinvesting: Clink
7. Best for Features: TD Ameritrade Mobile
8. Best for College Savings: Wealthfront
Inventory control
Inventory control or stock control can be broadly defined as "the activity of checking a shop’s
stock." However, a more focused definition takes into account the more science-based, methodical practice of
not only verifying a business' inventory but also focusing on the many related facets of inventory management
(such as forecasting future demand) "within an organization to meet the demand placed upon that business
economically." Other facets of inventory control include supply chain management, production control,
financial flexibility, and customer satisfaction. At the root of inventory control, however, is the inventory
control problem, which involves determining when to order, how much to order, and the logistics (where) of
those decisions.
An extension of inventory control is the inventory control system. This may come in the form of a
technological system and its programmed software used for managing various aspects of inventory problems, or
it may refer to a methodology (which may include the use of technological barriers) for handling loss
prevention in a business.
Inventory control system
An inventory control system is used to keep inventories in a desired state while continuing to adequately
supply customers, and its success depends on maintaining clear records on a periodic or perpetual basis.
Inventory management software often plays an important role in the modern inventory control system,
providing timely and accurate analytical, optimization, and forecasting techniques for complex inventory
management problems. Typical features of this type of software include:
1. inventory tracking and forecasting tools that use selectable algorithms and review cycles to
identify anomalies and other areas of concern
2. inventory optimization
3. purchase and replenishment tools that include automated and manual replenishment components,
inventory calculations, and lot size optimization
4. lead time variability management
5. safety stock calculation and forecasting
6. inventory cost management
7. shelf-life and slow-mover logic
8. multiple location support
Through this functionality, a business may better detail what has sold, how quickly, and at what price,
for example. Reports could be used to predict when to stock up on extra products around a holiday or to make
decisions about special offers, discontinuing products, and so on.
Inventory control techniques often rely upon barcodes and radio-frequency identification (RFID) tags to
provide automatic identification of inventory objects—including but not limited
to merchandise, consumables, fixed assets, circulating tools, library books, and capital equipment—which in
turn can be processed with inventory management software. Example of inventory management system.
1. Inventory for Local Application
2. Business Application Inventory Sample
3. Inventory for Application Interface
4. Enterprise Application Inventory Example
5. Simple Application Inventory
6. Server Application Inventory Example
7. Inventory for Software Application
Robotics
Robotics is the engineering science and technology which involves the conception, design, operation
and manufacture of robots. Electronics, mechanics and software are brought together by robotics.
An industrial robot is a robot system used for manufacturing. Industrial robots are automated,
programmable and capable of movement on three or more axis.Typical applications of robots include welding,
painting, assembly, pick and place for printed circuit boards, packaging and labeling, palletizing, product
inspection, and testing; all accomplished with high endurance, speed, and precision. They can assist in material
handling.
Robots are used for jobs that are dirty, dull and dangerous. Today robotics have many different application
areas. Some of those are:
Outer Space Applications: Robots are playing a very important role for outer space exploration. The robotic
unmanned spacecraft is used as the key of exploring the stars, planets...etc.
Military Applications: In today's modern army robotics is an important factor which is researched and
developed day by day. Already remarkable success has been achieved with unmanned aerial vehicles like the
Predator drone, which are capable of taking surveillance photographs, and even accurately launching missiles at
ground targets, without a pilot.
Intelligent Home Applications: We can monitor home security, environmental conditions and energy usage
with intelligent robotic home systems. Door and windows can be opened automatically and appliances such as
lighting and air conditioning can be pre programmed to activate. This assists occupants irrespective of their
state of mobility.
Industry: From the beginning of the industrial revolution robotics and automation becomes the most important
part of manufacturing. Robotic arms which are able to perform multiple tasks such as welding, cutting, lifting,
sorting and bending are used in fabrics.
he most commonly used configurations of the industrial robots are:
1. Articulated Robots: An articulated robot is one which uses rotary joints to access its work
space. Articulated robots can range from simple two-jointed structures to systems with 10 or more
interacting joints.
2. Cylindrical Coordinate Robots: These robots have three degrees of freedom and they moves linearly
only along the Y and Z axes with a cylindrical work envelope.
3. Scara Robots: It stands for Selective Compliant Assembly Robot Arm or Selective Compliant
Articulated Robot Arm. SCARA robots usually have four axes as any X-Y-Z coordinate within their
work envelope and a fourth axis of motion which is the wrist rotate (Theta-Z).
4. Spherical Coordinate Robots: The spherical arm, also known as polar coordinate robot arm, has one
sliding motion and two rotational, around the vertical post and around a shoulder joint.
5. Cartesian Coordinate Robots: Rectangular arms are sometimes called "Cartesian" because the arm´s
axes can be described by using the X, Y, and Z coordinate system. It is claimed that the Cartesian design
will produce the most accurate movements.
6. Delta Robots: A Delta robot consists of three arms connected to universal joints at the base. The key
design feature is the use of parallelograms in the arms, which maintains the orientation of the end
effector. The Delta robot has popular usage in picking and packaging in factories
Health Service: Under development is a robotic suit that will enable nurses to lift patients without damaging
their backs. Scientists in Japan have developed a power-assisted suit which will give nurses the extra muscle
they need to lift their patients - and avoid back injuries.
Top 6 Robotic Applications in Automotive Manufacturing: The following robotic applications are the most
common in the automotive industry:
1. Collaborative Robots: These collaborative robots are built to work together with other robots, on
enormous assembly lines. Robots must collaborate between handling and welding robots to make such
assembly lines function properly.
2. Robotic Painting: Professional painters are difficult to find and the job is a highly toxic one. This
makes it perfect for robots, because the paint job needs to be highly consistent over a large area of paint,
and reducing the amount of wasted material can add up to quite a bit of savings over time.
3. Robotic Welding: Robotic welding has been the top robotic application in the automotive sector for a
long time, as every car needs a high number of welds before it’s complete. Given the high value of the
finished product, productivity from automation is enormous.
4. Robotic Assembly: In many automotive plants, robots are assembling smaller components like pumps
and motors at high speeds. Often, robots are performing tasks like windshield installation and wheel
mounting to increase throughput.
5. Material Removal: High consistency and repeatability make robots perfect for material removal
processes like trimming and cutting. This could be in the form of cutting fabrics, trimming plastic
moldings and die castings or even polishing molds.
4. Part Transfer and Machine Tending: Pouring molten metal, transferring metal stamps, and loading
and unloading CNC machines are all best completed by a robot as they are dangerous. When completed
consistently with little downtime they can also be a source of major productivity.
Cyber security
Cyber security refers to the body of technologies, processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred
to as information technology security.
THE IMPORTANCE OF CYBER SECURITY
Cyber security is important because government, military, corporate, financial, and medical
organizations collect, process, and store unprecedented amounts of data on computers and other devices. A
significant portion of that data can be sensitive information, whether that is intellectual property, financial data,
personal information, or other types of data for which unauthorized access or exposure could have negative
consequences.
Organizations transmit sensitive data across networks and to other devices in the course of doing
businesses, and cyber security describes the discipline dedicated to protecting that information and the systems
used to process or store it. As the volume and sophistication of cyber-attacks grow, companies and
organizations, especially those that are tasked with safeguarding information relating to national security,
health, or financial records, need to take steps to protect their sensitive business and personnel information.
CHALLENGES OF CYBER SECURITY
For an effective cyber security, an organization needs to coordinate its efforts throughout its entire information
system. Elements of cyber encompass all of the following:
1. Network security 5. Identity management
2. Application security 6. Cloud security
3. Endpoint security 7. Mobile security
4. Data security 8. End-user education
9. Disaster recovery/business continuity planning
10. Database and infrastructure security
The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves.
Traditionally, organizations and the government have focused most of their cyber security resources on
perimeter security to protect only their most crucial system components and defend against known treats.
MANAGING CYBER SECURITY
The National Cyber Security Alliance, through SafeOnline.org, recommends a top-down approach to cyber
security in which corporate management leads the charge in prioritizing cyber security management across all
business practices. NCSA advises that companies must be prepared to “respond to the inevitable cyber incident,
restore normal operations, and ensure that company assets and the company’s reputation are protected.”
NCSA’s guidelines for conducting cyber risk assessments focus on three key areas: identifying your
organization’s “crown jewels,” or your most valuable information requiring protection; identifying the threats
and risks facing that information; and outlining the damage your organization would incur should that data be
lost or wrongfully exposed.
Cyber risk assessments should also consider any regulations that impact the way your company collects,
stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA, and others. Following a cyber-risk
assessment, develop and implement a plan to mitigate cyber risk, protect the “crown jewels” outlined in your
assessment, and effectively detect and respond to security incidents. This plan should encompass both the
processes and technologies required to build a mature cyber security program.
An ever-evolving field, cyber security best practices must evolve to accommodate the increasingly
sophisticated attacks carried out by attackers. Combining sound cyber security measures with an educated and
security-minded employee base provides the best defense against cyber criminals attempting to gain access to
your company’s sensitive data. While it may seem like a daunting task, start small and focus on your most
sensitive data, scaling your efforts as your cyber program matures.
Types of cyber security threats
The process of keeping up with new technologies, security trends and threat intelligence is a challenging task.
However, it's necessary in order to protect information and other assets from cyber threats, which take many
forms.
1. Ransom ware is a type of malware that involves an attacker locking the victim's computer system files --
typically through encryption -- and demanding a payment to decrypt and unlock them.
2. Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan
horses and spyware.
3. Social engineering is an attack that relies on human interaction to trick users into breaking security
procedures in order to gain sensitive information that is typically protected.
4. Phishing is a form of fraud where fraudulent emails are sent that resemble emails from reputable
sources; however, the intention of these emails is to steal sensitive data, such as credit card or login
information.
Benefits of cyber security
1. Benefits of utilizing cyber security includes:
2. Business protection against malware, ransomware, phishing and social engineering.
3. Protection for data and networks.
4. Prevention of unauthorized users.
5. Improves recovery time after a breach.
6. Protection for end-users.
7. Improved confidence in the product for both developers and customers.
This is a very broad category of online tools, incorporating a range of options from free one-to-one audio
conferencing all the way to more sophisticated and expensive tools such as Polycom which allow multiple sites
with entire classes participating using video and audio.
Video and audio, or just audio connection between two computers communicating via the Internet.
Examples of free audio conferencing software: Gizmo, Skype (both cross platform) both enable users to
speak to other Gizmo/Skype users free of charge (although users can also pay a fee and make calls to landlines
using the computer). Examples of free video conferencing software: iVisit (cross platform), iChat (Mac
only), NetMeeting (Windows only). Breeze can also be used for video conferencing (but Breeze is more than
just a video/audio conferencing tool.).
Transmitted to & received from any computer in any location that has Internet connection (broadband
desirable for effective use). Teacher must have microphone, can have camera. Ideally end users have
microphone (camera not essential) for synchronous communication.
Technology requirements for video/audio conferencing:
1. Computer with access (ideally broadband) to the Internet.
2. Browser.
3. Speakers to hear audio.
4. Microphone (to contribute audio).
5. Web camera to contribute video
Why use video/audio conferencing?
Enables teacher or limited number of learners need to connect from different locations at the same time when
only video and/or audio connection is needed. Examples: guest speaker at remote location can talk to local
class; students in one class can engage in discussion with students at another location (such as a class in another
country); when a student is unable to attend face-to-face class, s/he can connect to class via VOIP; students can
take virtual field trips to remote locations.
Advantages video/audio conferencing
1. Free download of easy to use software that can be used via Internet to connect student, instructor, or
guest speaker to class and enable both sides to see & hear.
2. Enables individual (usually limited to one connection) to participate in synchronous learning
experiences from any location worldwide. Users can connect from home, work or other location easily
accessible to them.
3. Specifically useful for guest speaker who is far away from face-to-face class location, or student who
cannot be in face-to-face class.
4. Enables students to take virtual field trips to remote locations or engaging in an interactive lesson. This
is especially an advantage to students who attend schools in isolated communities, but is an advantage to
all students regardless of location or socio-economic factors.
5. Can be used to record vodcast or podcast and uploaded to course website.
6. As video conferencing technology improves, this can become a far cheaper alternative to ITV or systems
like PolyCom in enabling school districts to offer specialized subjects by having one teacher teach a
class to students at a number of schools.
Disadvantages of video/audio conferencing
1. Typically on free systems only one or a very limited number of users can connect to the host (instructor)
computers at a time, so video/audio conferencing can be used only for individual access rather than as a
larger scale tool and learning environment. However, newer systems such as Camfrog enable multi-user
video conferencing.
2. Depending on the stability of the connection, users may be disconnected during the class and have to
reconnect.
3. Difficult to see and hear people who are not close to the microphone/camera, especially when using one
of the low-cost systems (such as iSight camera). Thus difficult to have multiple people at one site,
sharing a computer to communicate with users at other sites.
Issues & problems related to video/audio conferencing
Works best with broad band connection, especially for video conferencing. Users report that after the
initial fascination with the video component has worn off, they realize that they really only need to use the
audio as this uses less bandwidth and results in higher quality audio than the video option. Because of the small
video window and low quality, the video image is of limited use.
If used for users connecting to face-to-face class, it is important to have good quality speakers so that
classroom-based students can hear the person who is calling in. Students speaking from classroom must identify
who they are before speaking.
Requires students connecting to class from remote site to be able to follow discussion relying just on
audio or audio with low quality video. This is also an accessibility issue.
Social networking
A social networking service (also social networking site or social media) is an online platform which people use
to build social networks or social relationship with other people who share similar personal or career interests,
activities, backgrounds or real-life connections.
What Is Social Networking?
Social networking is the use of Internet-based social media sites to stay connected with friends, family,
colleagues, customers, or clients. Social networking can have a social purpose, a business purpose, or both,
through sites such as Facebook, Twitter, LinkedIn, and Instagram, among others. Social networking has become
a significant base for marketers seeking to engage customers.
Despite some stiff competition, Facebook remains the most popular social network, with a reach 90% of U.S.
mobile users, as of October 2018, the most recent data available, as of early 2019. It was followed, in order of
popularity, by Instagram, Facebook Messenger, Twitter, and Pinterest, according to Statistica.com.
How Social Networking Works
Marketers use social networking for increasing brand recognition and encouraging brand loyalty. Since it makes
a company more accessible to new customers and more recognizable for existing customers, social networking
helps promote a brand’s voice and content.
For example, a frequent Twitter user may hear of a company for the first time through a news feed and decide to
buy a product or service. The more exposed people are to a company’s brand, the greater the company's chances
of finding and retaining new customers.
Marketers use social networking for improving conversion rates. Building a following provides access to and
interaction with new, recent and old customers. Sharing blog posts, images, videos or comments on social
media allows followers to react, visit the company’s website and become customers.
Advantages and Disadvantages of Social Networking in Marketing
Customers may complement the company’s offerings and encourage others to buy the products or services. The
more customers are talking about a company on social networking, the more valuable the brand authority
becomes. As a brand grows stronger, more sales result. Increased company posts rank the company higher in
search engines. Social networking can help establish a brand as legitimate, credible, and trustworthy.
A company may use social networking to demonstrate its customer service level and enrich its relationships
with consumers. For example, if a customer complains about a product or service on Twitter, the company may
address the issue immediately, apologize, and take action to make it right. However, criticism of a brand can
spread very quickly on social media. This can create a virtual headache for a company's public relations
department.
Although social networking itself is free, building and maintaining a company profile takes hours each week.
Costs for those hours add up quickly. In addition, businesses need many followers before a social media
marketing campaign starts generating a positive return on investment (ROI). For example, submitting a post to
15 followers does not have the same effect as submitting the post to 15,000 followers.
Top social media sites are
Facebook
YouTube Pinterest
Instagram Fliker
Qzone Linkedin
Weibo whatsapp
Twitter
Surveillance
Surveillance is the monitoring of behavior, activities, or information for the purpose of influencing, managing
or directing. This can include observation from a distance by means of electronic equipment, such as closed-
circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It
can also include simple technical methods, such as human intelligence gathering and postal interception.
Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan
and commit crimes, and by businesses to gather intelligence on their competitors, suppliers or customers.
Surveillance can be viewed as a violation of privacy, and as such is often opposed by civil liberties activists.
A liberal democracy may have laws which restrict domestic government and private use of
surveillance. Authoritarian governments seldom have any domestic restrictions, and international espionage is
common among all types of countries.
Concerns have been raised about surveillance with regards to the Internet of things. Where surveillance
technology is used for identification, monitoring, location tracking or to gain access to buildings and networks.
Security Camera Applications: With their wide range of styles and features, security cameras are common in
most industries around the world. These applications can range from theft and vandalism deterrence to traffic
and weather monitoring and more.
By combining advanced camera features with sturdy outdoor housings or discreet camera design, an IP
camera can be installed in almost any location. This makes them ideal for monitoring inside and outside of
businesses and offices, recording in remote locations, or recording high quality video to identify suspicious
people.
Methods
Computer: The vast majority of computer surveillance involves the monitoring of data and traffic on
the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act,
all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be
available for unimpeded real-time monitoring by federal law enforcement agencies.
Telephones:
The official and unofficial tapping of telephone lines is widespread. In the United States for instance,
the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP
communications be available for real-time wiretapping by Federal law enforcement and intelligence
agencies. Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts
with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal
agencies, in return for $1.8 million per year. Between 2003 and 2005, the FBI sent out more than 140,000
"National Security Letters" ordering phone companies to hand over information about their customers' calling
and Internet histories. About half of these letters requested information on U.S. citizens.
Social Network analysis: One common form of surveillance is to create maps of social networks based on data
from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information
from phone call records such as those in the NSA call database, and others. These social network "maps" are
then data mined to extract useful information such as personal interests, friendships & affiliations, wants,
beliefs, thoughts, and activities.
Biometric: Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral
characteristics for authentication, identification, or screening purposes. Examples of physical characteristics
include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a
person's manner of walking) or voice.
Aerial: Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne
vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of
sensors (e.g. radar) to monitor the battlefield.
RFID and geolocation devices: Radio Frequency Identification (RFID) tagging is the use of very small electronic
devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose
of identification and tracking using radio waves. The tags can be read from several meters away. They are
extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products
without significantly increasing the price, and can be used to track and identify these objects for a variety of
purposes.
Case Studies: Computer Literacy for banking, KYC, Insurance and financial transactions,
operating mobile banking, Nine Pillars of Mission Digital India (DI-Initiatives) and their scheme
highlights.