Professional Documents
Culture Documents
Fundamentals of Computer
Fundamentals of Computer
Fundamentals of Computer
Ramachandrapuram.
FUNDAMENTALS OF COMPUTERS
UNIT-I
INTRODUCTION TO COMPUTERS
1. COMPUTER?
Ans: A computer can be defined as an electronic device that is designed to accept data, perform the required
mathematical and logical operations at high speed, and output the result.
2. CHARACTERISTICS OF COMPUTER?
Ans: A computer accepts data, processes it, and produces information. Here data refers to some raw facts or
figures, and information implies the processed data. Computers are basically meant to solve problems quickly and
accurately.
I. Speed:
Computers can perform millions of operations per second. The speed of computers is usually given in
nanoseconds and picoseconds.
II. Accuracy:
A computer is a very fast, reliable, and robust electronic device. It always gives accurate results, provided
the correct data and set of instructions are input to it.
III. Automation:
Besides being very fast and accurate, computers are automatable devices that can perform a task without any
user intervention.
IV. Diligence:
Unlike humans, computers never get tired of a repetitive task. It can continually work for hours without
creating errors.
V. Versatile:
Versatility is the quality of being flexible. Today, computers are used in our daily life in different fields. For example,
they are used as personal computers (PCs) for home use, for business-oriented tasks, and so on. Computers are
versatile devices as they can perform multiple tasks of different nature at the same time.
VI. Memory:
Similar to humans, computers also have memory. Computers have internal or primary memory as well as
external or secondary memory. The internal memory of computers is very expensive and limited in size, the
secondary storage is cheaper and of bigger capacity.
3. APPLICATIONS OF COMPUTERS?
Computers are widely used in fields such as engineering, health care, banking, education, and so on.
I. Word Processing:
Word processing software enables users to read and write documents. Users can also add images, tables and
graphics for illustrating a concept. The software automatically corrects spelling mistakes and includes copy-paste
features.
II. Internet:
The Internet is a network of networks that connects computers all over the world. Using email, the user can
communicate in seconds with a person who is located thousands of miles away. Video-conferencing tools are
becoming popular for conducting meetings with people who are unable to be present at a particular place.
Computers make audio or video composition and editing very simple. This has drastically reduced the cost
of equipment to compose music or make a film. Graphics engineers use computers for developing short or full-
length films and creating 3D models and special effects in science fiction and action movies.
Desktop publishing software enables you to create page layouts for entire books.
V. Government:
Computers are used in government organizations to keep records on legislative actions, Internal Revenue
Service records, etc.
VI. Traffic Control:
In the United States, computers are used by the government for city planning and traffic control.
Computers are used in retail shops to enter orders, calculate costs, and print receipts. They are also used to
keep an inventory of the products available and their complete description.
VIII. Movies:
Computers are used to create sets, special effects, animations, cartoons, imaginary characters, videos, and
commercials.
Computers are used to prepare tickets, monitor the routes of trains and aero planes and guide planes to a safe
landing. They are also used to research about hotels in an area, reserve rooms, or to rent a car.
In Business and Industry, computers are used mainly for data processing, which includes tasks such as word
processing, analyzing data, entering records, payroll processing, personnel record keeping, and inventory
management.
XI. Hospitals:
Hospitals use computers to record every information about patients, from the time of their admission till
their exit. For example, the date, time, reason for being admitted, the doctor being consulted, all prescribed
medications, doctor visits, other hospital services, bills, etc., are all stored in computers.
When computers are fed with mathematical equations along with data about air pressure, temperature,
humidity, and other values, the solution of these equations gives an accurate prediction of the weather of a particular
area.
XIII Education:
A Computer is a powerful teaching aid and acts as another teacher in the classroom. Teachers use computers
to develop instructional material. Teachers may use pictures, graphs and graphical presentations to easily illustrate
an otherwise difficult concept.
XIV. Online Banking:
The world today is moving towards a cashless society, where you need not have money in your pocket to
purchase anything. You can just have your credit card or debit card with you. The ATMs provide a 24 X 7 service
and allow you to draw cash, check the balance in your account, and order a product.
XV. Robots:
Robots are computer-controlled machines mainly used in the manufacturing process in extreme conditions
where humans cannot work, for example, in high-temperature, high-pressure conditions or in processes that demand
very high levels of accuracy.
Ans:
1. Input Unit:
This is the process of entering data and instructions in to the computer system. The data and instructions can
be entered by using different input devices such as keyboard, mouse, scanner, and trackball. Note that computers
understand binary language, which consists of only two symbols (0 and 1), so it is the responsibility of the input
devices to convert the input data into binary codes.
2. Storage (memory):
It is the process of saving data and instructions permanently in the computer so that they can be used for
processing. A computer has two types of storage areas:
i. Primary Storage:
This, also known as the main memory, is the storage area that is directly accessible by the CPU at very high
speeds. It is used to store the data and parts of programs, the intermediate results of processing. Primary storage
space is very expensive and therefore limited in capacity. Another drawback of main memory is that is volatile in
nature; that is, as soon as the computer is switched off, the information stored gets erased. An example of primary
storage is the RAM.
Also known as the Secondary memory or auxiliary memory, this is just the opposite of primary memory. It
is cheaper, non-volatile, and used to permanently store data and programs of those jobs that are not being currently
executed by the CPU.
3. Processing:
The process of performing operations on the data as per the instructions specified by the user is called processing.
Data and instructions are taken from the primary memory and transferred to the arithmetic and logical unit (ALU),
which performs all sorts of calculations. The intermediate results of processing may be stored in the main memory,
as they might be required again. When the processing completes, the final result is then transferred to the main
memory.
4. Output Unit:
Output is the process of giving the result of data processing to the outside world. The output devices,
therefore, convert the results available in binary codes into a human-readable language before displaying it to the
user.
5. Control Unit:
The Control unit (CU) is the central nervous system of the entire computer system. It manages and controls
all the components of the computer system. It manages and controls all the components of the computer system.
The CU decides the manner in which instructions will be executed and operations performed. It takes care of the
step-by-step processing of all operations that are performed in the computer.CPU is a combination of the ALU and
the CU. The CPU is better known as the brain of the computer system because the entire processing of data is done
in the ALU, and the CU activates and monitors the operations of other units (such as input, output and storage) of
the computer system.
5. CLASSIFICATION OF COMPUTERS?
Ans: Computers can be broadly classified into four categories based on their speed, amount of data that they can
hold, and price.
1. SUPER COMPUTERS:
Among the four categories, the supercomputer is the fastest, most powerful, and most expensive computer.
Supercomputers were first developed in the 1980s to process large amounts of data and to solve complex scientific
problems. Supercomputers use parallel processing technology and can perform more than one trillion calculations
in a second.
A single supercomputer can support thousands of users at the same time. Such computers are mainly used
for weather forecasting, nuclear energy research, aircraft design, automotive design, online banking, controlling
industrial units, etc. Some examples are CRAY-1, CRAY-2, Control Data CYBER 205, and ETA A-10.
2. MAINFRAME COMPUTERS:
Mainframe Computers are large-scale computers. These are very expensive and need a very large clean room with
air conditioning, thereby making them very costly to deploy. As with supercomputers, mainframes can also support
multiple processors. For example, the IBM S/390 mainframe can support 50,000 users at the same time. Users can
access mainframes by either using terminals or via PCs. There are basically two types of terminals that can be used
with mainframe systems.
Dumb terminals consist of only a monitor and a keyboard. They do not have their own CPU and memory
and use the mainframe system’s CPU and storage devices.
Intelligent terminals have their own processor and thus can perform some processing operations. However,
just like the dumb terminals, they do not have their own storage space. Usually, PCs can be used as intelligent
terminals to facilitate data access and other services from the mainframe system.
Mainframe computers are typically used as servers on the World Wide Web. They are also used in large
organizations such as banks, airline companies, and universities, where a large number of users frequently access
data stored in their databases. Some examples of mainframe computers include IBM S/390, Control Data CYBER
176, Amdahl 580, etc.
3. MINICOMPUTERS: As the name suggests, minicomputers are smaller, cheaper, and slower than mainframes.
They are called minicomputers because they were the smallest computer of their times. Also known as midrange
computers, the capabilities of minicomputers fall between mainframe and PCs.
Minicomputers are widely used in business, education, hospitals, government organizations, etc.
Minicomputers can also be used as servers in a networked environment, and hundreds of PCs can be connected to
it.
4. MICROCOMPUTERS:
Microcomputers, commonly known as PCs, are very small and cheap. The first microcomputer was designed
by IBM in 1981 and was named IBM-PC.
Desktop PCs:
A desktop PC is the most popular model of PCs. The system unit of the desktop PC can be placed flat on a
desk or table. It is widely used in homes and offices.
Laptops:
Laptops are small microcomputers that can easily fit inside a briefcase. They are very handy and can easily
be carried from one place to another. The memory and storage capacity of a laptop is almost equivalent to that of a
desktop computer. As with desktop computers, laptops also have HDDs, floppy disk drives, zip disk drives, etc. For
input, laptops have a built-in keyboard and a trackball/touchpad, which is used as a pointing device.
Workstations:
Workstations are single-user computers that have the same features as PCs, but their processing speed
matches that of a minicomputer or mainframe computer. Workstation computers have advanced processors, more
RAM and storage capacity than PCs.
Network Computers:
Network computers have less processing power, memory, and storage than a desktop computer. These are
specially designed to be used as terminals in a networked environment. Network computers that are specifically
designed to access only the Internet or intranet are known as Internet PCs or Internet boxes.
Handheld Computers:
Handheld computers can fit in one hand, while users can use the other hand to operate them. Handheld
computers are very small in size, and hence they have small-sized screens and keyboards.
1. PDA’s:
A number of PDA’s available in the market offer a collection of application software for word processing
spreadsheets, games etc,. PDA’s are used to take notes, organize telephones numbers, and store addresses. Many
PDA’s are web enable the user to access the internet. Some PDA’s also provide telephone capabilities.
2. Cellular Phones:
Cellular phones are web enabled telephones that have features of both analogue and digital devices. Such phones ➢
are also known as smart phones.
The size and features of the H/PC Pro devices is more than PDA’s but less than that of typical notebook
PC’s. The H/Pc pro devices includes a full sized keyboard, RAM with very low storage capacity and a slow speed
processor, these devices do not have a secondary storage disk.
Input Devices: An input device is used to feed data and instructions into the computer.
1. KEYBOARD:
The Keyboard is the main input device for computers. Computer keyboards look very similar to the
keyboards of typewriters with some additional keys. Using a keyboard, the user can type a document, use keystroke
shortcuts, access menus, play games, and perform numerous other tasks. Most keyboards have between 80 and 110
keys, which include the following:
2. Numeric Keys: These include a set of 17 keys, arranged in the same configuration found on calculators to speed
up data entry of numbers.
3. Function Keys: These are used by applications and operating systems to input specific commands. They are often
placed on the top of the keyboard in a single row.
4. Control Keys: These are used to handle control of the cursor and the screen. Four arrow keys are arranged in an
inverted T-type fashion between the typing and the numeric keys, and are used to move the cursor on the screen in
small increments.
Advantages:
Disadvantages:
2. POINTING DEVICES:
A pointing input device enables the users to easily control the movement of the pointer to select items on a
display screen, to select commands from commands menu, to draw graphs, etc. Some examples of pointing devices
include mouse, trackball, light pen, joystick, and touchpad.
I. Mouse:
The mouse is an input device that was used in a Graphical User Interface (GUI). It can be used to handle the
pointer easily on the screen to perform various functions such as opening a program or file. The mouse has two
buttons and a scroll wheel. It can be held in the hand and easily moved, without lifting, along a hard flat surface to
move the cursor to the desired location – up, down, left or right.
Once the mouse is placed at the appropriate position, the user may perform the following operations:
a. Point:
Placing the mouse pointer over the word or the object on the screen by moving the mouse on the desk is
termed as pointing.
b. Click:
Pressing either the left or the right button of the mouse is known as clicking. Clicking a mouse button initiates
some action.
c. Drag:
Dragging means pointing to a desired location while pressing the left button.
d. Scroll:
The scroll wheel, which is placed in between the left and right buttons of the mouse, is used to vertically
scroll through long documents.
Advantages:
➢ The mouse is easy to use and can be used to quickly place the cursor anywhere on the screen. It is cheap.
Disadvantages:
➢ The mouse needs extra desk space to be placed and moved easily.
II. Trackball:
A trackball is a pointing device that is used to control the position of the cursor on the screen. It is usually
used in note book computers, where it is placed on the keyboard. The trackball is an upside-down mouse where the
ball rotates in place within a socket. The user rolls the ball to position the cursor at an appropriate position on the
screen and then clicks one of the buttons near the track ball, either to select objects are to position the cursor for text
entry. To move the pointer, the ball is rotated with the thumb, fingers or palm of the hand.
Advantages:
Disadvantages:
➢ The trackball chamber is often covered with dust, so it must be cleaned regularly.
III. Touchpad:
A touchpad is a small, flat, regular stationary pointing device with a sensitive surface of 1.5-2 square inches.
The user has to slide his or her fingers across the surface of the pad to point to a specific object on the screen. The
surface translates the motion and position of the user’s fingers to a relative position on the screen. There are also
buttons around the edge of the pad that work like mouse buttons. Touch pads are widely used in laptops, and are in
built on the laptop keyboards.
Advantage:
3. HANDLED DEVICES:
A handled device is a pocket-sized computing device with a display screen and touch input and/or a miniature
keyboard. Some common examples devices include smart phones, PDAs, stylus (pen) and touch screens
I. Joystick:
A joystick is a cursor control device widely used in computer games and computer aided design (CAD)/
computer aided manufacturing (CAM) applications. It consists of a handled lever that pivots on one end transmits
its coordinates to a computer. A joystick has one or more push buttons, called switches, whose position can also be
read by the computer. The lever of a joystick moves in all directions to control the movement of the pointer on the
computer screen.
II. Stylus:
A stylus is pen shaped input device used to enter information or write on the touch screen of a handled
device. It is a small stick that can also be used to draw lines on a surface as input into a device, choose an option
from a menu, move the cursor to another location on the screen, take notes, and create short messages.
A touch screen is a display screen that can identify the occurrence and position of a touch inside the display
region. The user can touch the screen either by using a finger or a stylus. The touch screen facilities the users to
interact with what is displayed on the screen in a straight forward manner, rather than in an indirect way by using a
mouse or a touchpad. Touch screen monitors are an easy way of entering information into the computer or mobile
phone, etc. Touch screen monitors are widely used in different applications including Point-Of-Sale (POS), PDAs,
Automated Teller Machines (ATMs), car navigation screens, mobile phones.
4. OPTICAL DEVICES:
Optical devices, also known as data-scanning devices, use light as a source of input for detecting or
recognizing different objects such as characters, marks, codes, and images. The optical device converts these objects
into digital data and sends it to the computer for further processing.
Some examples of optical devices include barcode readers, image scanners, Optical Character Recognition
(OCR) devices, Optical Mark Readers (OMR), and Magnetic Ink Character Recognition (MICR) devices.
i. Barcode Reader:
A barcode reader works by directing a beam of light across the bar code and measuring the amount of light
reflected back. The dark bars reflect less light when compared to the amount of light reflected by the white spaces
between those bars. The scanner converts this light energy into electrical energy. The decoder then converts these
signals into data and sends it to the computer for processing.
Advantages:
A scanner is a device that captures images, printed text and handwriting, from different sources such as
photographic prints, posters, and magazines and converts them into digital images for editing and display on
computers.
Advantages:
➢ Any printed or handwritten document can be scanned and stored in a computer for further processing
➢ The scanned and stored document will never deteriorate in quality with time. The document can displayed
and printed whenever required
➢ There is no fear of loss of documents. The user can scan important documents and store them permanently
in the computer.
Disadvantages:
Optical Character Recognition (OCR) is the process of converting the printed materials into text or word
processing files that can be easily edited and stored.
In OCR processing, the analysis of the scanned images is done to detect light and dark areas so as to identify
each alphabet or numeral. When a character recognized, it is converted into an ASCII code.
OCR is widely used in the following areas:
Advantages:
Disadvantages:
Optical Mark Recognition (OMR) is the process of electronically extracting data from marked fields, such
as checkboxes and fill-in fields, on printed forms. The optical mark reader is fed with OMR sheet that has pen or
pencil marks is predefined positions to indicate each selected response (such as answers for multiple choice
questions in an entrance examination).
The OMR sheet is scanned by the reader to detect the presence of a mark by measuring the reflected light
levels. The dark or the marked areas reflect less light than the unmarked ones. The optical mark reader interprets
this pattern marks and spaces, and stores the interpreted data in a computer for storage, analysis, and reporting.
Advantages:
Disadvantages:
Output Devices: Any device that outputs/gives information from a computer can be called an Output device. Output
devices are electromechanical devices that accept digital data (0’s and 1’s) from the computer and convert them into
Human-Understandable Language
Soft copy output devices produce an electronic version of an output – for example, a file that is stored on a
hard disk, CD, or pen drive –and is displayed on the computer screen (Monitor).
A. MONITORS:
The Monitor is a soft copy output device used to display video and graphics information generated by the
computer through the video card. Computer monitors are similar to television screens but they display information
at much higher quality.
a. CRT Monitor:
CRT Monitors work by firing charged electrons at a phosphorus film. When electrons hit the phosphor-
coated screen, they glow, thereby enabling the user to see the output.
b. LCD Monitor:
An LCD Monitor is a thin, flat, electronic visual display unit that uses the light modulating properties of
liquid crystals, which do not emit light directly. LCD screens are used in a wide range of applications ranging from
computer monitors, televisions, instrument panels, aircraft cockpit displays etc to consumer devices such as video
players, gaming devices etc.LCD screens are more portable, compact, lightweight, more reliable, and easier on the
eyes.
c. Plasma Monitor:
These monitors are thin and flat monitors widely used in televisions and computers. The plasma display
contains two glass plates that have hundreds of thousands of tiny cells filled with xenon and neon gases. The address
electrode and the transparent display electrode are sandwiched between the glass plates. The display electrode is
covered by a magnesium oxide protective layer and is arranged in horizontal rows along the screen, while the address
electrodes are arranged in vertical columns, thereby forming a grid-like structure.
B. PROJECTORS:
A Projector is a device that takes an image from a video source and projects it onto a screen or another
surface. Projectors are used for a wide range of applications, varying from home theater systems for projecting
movies and television programs onto screen much larger than even the biggest available television, to organizations
for projecting information and presentations onto screens large enough for rooms filled with many people.
Projectors can be broadly classified into two categories depending on the technology they use.
a. LCD Projector:
LCD projectors make use of their own light to display the image on the screen. To use these projectors, the
room must be first darkened; else the image formed will be blurred.
C. SPEAKERS:
Initially, Computers were designed to be used only for scientific purposes. Today, all business and home
users demand audio capabilities for their computers. For this purpose, speakers were developed in different sizes
and shapes, and with different powers and sound quality. With all these types of speakers, the user can enjoy music,
movie or game, and the voice will be spread through the entire room. Headphones are small devices that fit in or
on the ear, and give about the same quality and power of the sound, as the speakers, only to the listener.
Hard copy output devices produce a physical form of output. For example, the content of a file printed on
paper is a form of hard copy output.
A. PRINTERS:
A printer is a device that takes the text and graphics information obtained from a computer and prints it on
to a paper. Printers are available in the market in various sizes, speeds, sophistication, and costs. The Resolution of
a printer means the sharpness of text and images rendered on paper. High-speed printers are quite expensive. Most
printers have a small amount of memory, which can be expanded by the user. Printers can be broadly classified into
two groups: Impact printers and Non-impact printers.
These printers print characters by striking an inked ribbon against the paper. Examples of impact printers
include dot matrix printers, Daisy wheel printers, and line printers.
Advantages:
A dot matrix printer prints character and images of all types as a pattern of dots. This printer has a print head
that consists of pins representing the character or image. The print head runs back and forth, or in an up-and-down
motion on the page and prints by striking an ink-soaked cloth ribbon against the paper, much like the print
mechanism of a typewriter. Several dot matrix printer manufacturers implemented color printing through a multi-
color ribbon. The speed of dot matrix printers varies in the range of 50-500 characters per second.
A daisy wheel printer uses an impact printing technology to generate high-quality output comparable to
typewriters, and is three times faster. Today, daisy wheel technology is found only in some electronic typewriters.
The print head of a daisy wheel printer is a circular wheel, about 3 inches in diameter with arms. The key benefit
of using a daisy wheel printer is that the print quality is high, as the exact shape of the character hits the ribbon to
leave an impression on the paper.
A line printer is a high-speed impact printer in which one typed line is printed at a time. The speed of a line
printer usually varies from 600 to 1200 lines per minute, or approximately 10-20 pages per minute. These printers
used in data centers and in industrial environment.
A band printer is an impact printer with a printing mechanism that uses a metal loop or band to produce
typed characters. Band printer is its high speed, it can print 2,000 lines per minute. However, band printers cannot
be used for any graphics printing, as the characters are predetermined and cannot be changed unless the band is
changed. Today, laser printers have replaced band printers.
➢ Non-impact printers produce prints of good quality, and hence render sophisticated graphics.
A
➢ They are noiseless.
plotte
➢ They are fast.
r is a
➢ They can print text in different fonts.
printi
Disadvantages: ng
devic
➢ These printers are expensive.
e that
➢ The ink cartridges used by them are also costly.
is
BB. Inkjet Printer: usuall
y
The print head of inkjet printers have several tiny nozzles, also called jets. As the paper moves past the print
used
head, the nozzles spray ink onto it, forming characters and images. If observe a printout that has just come out from
to
an inkjet printer, the dots are extremely small (usually between 50 and 60 microns in diameter) and are positioned
print
very precisely, with resolutions of up to 1440 x 720 dpi. To create a colored image, the dots can have different colors
vector
combined together. An inkjet printer can produce from 100 to several hundred pages, before the ink cartridges must
graph
be replaced.
ics
with
high
BC. Laser Printer:
print
A laser printer is a non-impact printer that works at very high speeds and produces high-quality text and qualit
graphics. It uses the technology used in photocopier machines. y.
They
When a document is sent the printer, the following steps take place:
are
➢ A laser beam ‘draws’ the document on a drum (which is coated with a photo-conductive material) using widel
electrical charges. y
➢ After the drum is charged, it is rolled in a toner (a dry powder type of ink). used
➢ The toner sticks to the charged image on the drum. to
➢ The toner is transferred onto a piece of paper and fused to the paper with heat and pressure. draw
➢ After the document is printed, the electrical charge is removed from the drum and the excess toner is maps,
collected. in
scientific applications, and in CAD, CAM, and Computer Aided Engineering (CAE). Architects use plotters to draw
blueprints of the structures.
A plotter is basically a printer that interprets commands from a computer to make line drawings on paper
with one or more automated pens. Since plotters are much more expensive than printers, they are used only for
specialized applications.
A. Drum Plotters
B. Flatbed Plotters.
A. DRUM PLOTTER:
A drum plotter is used to draw graphics on paper that is wrapped around the drum. This type of plotter is
usually used with mainframe and minicomputer systems. It works with drum back and forth to produce vertical
motion.
B. FLATBED PLOTTER:
In a flatbed plotter, the paper is spread on the flat rectangular surface of the plotter, and the pen is moved
over it. Flatbed plotters are less expensive, and are used in many small computing systems. In this type plotter, the
paper does not move; rather, plotting is done by moving an arm that moves a pen over the paper.
Communication Between CPU&O/P devices
SOFTWARE:
Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It
is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to
refer to applications, scripts and programs that run on a device
TYPES OF SOFTWARE:
Software or PC software is basically sort of program that permits clients to play out specific assignments or really
use them to work their PC. It basically indicates all peripherals in whole PC system – precisely what to do and
how to carry out responsibility.
Software assumes significant job as go between client and PC equipment. Without software, client can not really
accomplish any work on PC. Software item advancement organization creates software for clients.
Point by point rundown of software types :
When all is said in done, there are two fundamental groupings of software: system software and application
software. How about we examine them.
System software :
On account of system software, it helps client just as equipment to work and associate effectively with one
another. Ordinarily, this is bit of software that is utilized to deal with conduct of PC equipment so client needs
essential usefulness. Basically, system software is basically go-between or middle of road layer between client and
equipment.
This software permits earth or stage for other software to work easily. Along these lines, system software is
significant in dealing with whole PC system. At the point when you first turn on PC, it is system software, which
is begun and afterward stacked into system memory. The system software basically runs out of sight and isn’t
really utilized by end clients. Consequently, system software is otherwise called “low-level software”.
Organizations typically utilize best software improvement organization to make system software.
A few instances of normal system software are :
1. Operating System :
Being an unmistakable model for system software, it is basically an assortment of software which
handles assets just as offers general administrations for different other application which really run
over them. There are various kinds of working systems like installed, ongoing, circulated, single-client,
multi-client, versatile, web and significantly more. Full stack web improvement administrations create
applications to work o versatile working system like Android and iOS. A portion of key instances of
working systems are as per following :
MS Windows
macOS
Linux
iOS
Android
CentOS
Ubuntu
Unix
2. Gadget Drivers :
This kind of software controls specific hardware which is basically connected to system. Diverse
hardware gadgets which require driver to interface with system effectively comprise of showcases,
printers, sound cards, hard circles, console, and mice. Not many of instances of such drivers are :
Profiles Driver
Motherboard Drivers
Show Drivers
ROM Drivers
Printer Drivers
USB Drivers
Sound Card Driver
VGA Drivers
in system’s perused just memory. It is basically lot of guidelines which are for all time put away onto
to hardware gadget. It offers essential data in regards to how specific gadget collaborates with various
other hardware. A portion of instances of firmware are :
PC Peripherals
Inserted Systems
UEFI
Profiles
4. Utility :
These software are intended to help with breaking down, just as advancing, alongside arranging and
keeping up given PC system. It offers help to PC foundation. Software like circle cleanup and board
apparatuses, against infections, defragmenters, pressure devices and so forth are on whole utility
software. A portion of its models are :
Norton Antivirus
McAfee Antivirus
WinRAR
WinZip
Piriform CCleaner
Windows File Explorer
Registry Opus
Razer Cortex
Application Software :
They are likewise prevalently known as end-client programs or even efficiency programs which help client in
finishing different undertakings like leading on web research, making notes, planning illustrations, looking after
records, completing computations or in any event, playing PC games. They basically lie over system software.
They are really utilized by end-client just as have explicit usefulness or undertakings which they are intended to
perform. These software are regularly evolved through custom software improvement, in light of prerequisites of
clients. There is an assortment of use software. Some of them are :
1. Word Processors :
Such applications are intended for documentation. It helps with putting away just as organizing and in
any event, printing of reports. Key instances of such software are :
MS Word
Apple iWork-Pages
Corel WordPerfect
Google Docs
2. Database Software :
It is utilized to make just as deal with database and furthermore known as Database Management
System or to put it plainly, DBMS. Such software aids information association. A portion of instances
of DBMS are :
MS Access
FileMaker
dBase
Scissors
MySQL
FoxPro
4. Internet Browsers :
These software are used to peruse web. Internet browsers help clients in situating just as recovering
information well over web. A portion of key instances of them are :
Google Chrome
Mozilla Firefox
Web Explorer
Drama
UC Browser
Safari
Be that as it may, there additionally exists another characterization of software. They can without much of a
stretch be characterized based on their accessibility just as sharability.
Their classification is as underneath :
1. Freeware :
These software are accessible liberated from cost. A client can undoubtedly download them from web
and can undoubtedly utilize them without paying any charges or expenses. Be that as it may, they don’t
give any kind of freedom to change whole software or charging fixed expense for its conveyance. A
best software advancement organization can build up its own freeware to connect with more clients. A
portion of instances of these software are :
Adobe Reader
Skype
ImgBurn
Group Viewer
Yahoo Messenger
2. Shareware :
This software is circulated openly to clients on fixed preliminary premise. It for most part accompanies
set time limit, and on termination of as far as possible, client is at long last approached to pay fixed
charge for proceeded with administrations. There are various sorts of shareware, for example,
Freemium, Donationware, Adware, Demoware and so forth. Not many of instances of shareware are :
Adobe Acrobat
PHP Debugger
WinZip
Getright
3. Open-source :
Such kinds of software are generally accessible to clients alongside their source code which implies
that client can without much of stretch alter and circulate software just as add extra highlights to them.
They can either be chargeable or free. Not many of instances of such software are :
Mozilla Firefox
Thunderbird
GNU Compiler Collection
With expanding job of software in every day lives of individuals, full stack web advancement administrations are
presently offering most recent software to satisfy their requests. As we probably am aware, there are different
kinds of software where market of system software is as of now soaked with huge players like Microsoft, Apple
and so forth while application software have hardened rivalry with built up players and new players contending to
pick up additional edge. Referenced above is clarification of what software is and kinds of software. A so ftware
improvement organization can wander into advancement of any of these software to gain enormous benefits.
Number system is important from the viewpoint of understanding how data are represented before they can
be processed by any digital system including a digital computer. there are two basic ways of representing the
numerical values of the various physical quantities with which we constantly deal in our day to day lives. The
arithmetic value which is used for representing the quantity and used in making calculations are defined as
NUMBERS. A symbol like “4, 5, 6” which represents a number is known as numerals. Without numbers,
counting things is not possible, date, time, money, etc. these numbers are also used for measurement and used for
labelling. The properties of numbers make them helpful in performing arithmetic operations on them. These
numbers can be written in numeric forms and also in words.
Based on the base value and the number of allowed digits, number systems are of many types. The four common
types of Number System are:
Decimal Number System
Binary Number System
Octal Number System
Hexadecimal Number System
UNIT-II
OPERATING SYSTEM
Introduction of Operating System
An operating system acts as an intermediary between the user of a computer and computer hardware. The purpose
of an operating system is to provide an environment in which a user can execute programs conveniently and
efficiently.
An operating system is a software that manages computer hardware. The hardware must provide appropriate
mechanisms to ensure the correct operation of the computer system and to prevent user programs from interfering
with the proper operation of the system.
Operating System – Definition:
An operating system is a program that controls the execution of application programs and acts as an
interface between the user of a computer and the computer hardware.
A more common definition is that the operating system is the one program running at all times on the
computer (usually called the kernel), with all else being application programs.
An operating system is concerned with the allocation of resources and services, such as memory,
processors, devices, and information. The operating system correspondingly includes programs to
manage these resources, such as a traffic controller, a scheduler, a memory management module, I/O
programs, and a file system.
Features of Operating system – Operating system has the following features:
1. Convenience: An OS makes a computer more convenient to use.
2. Efficiency: An OS allows the computer system resources to be used efficiently.
3. Ability to Evolve: An OS should be constructed in such a way as to permit the effective development,
testing, and introduction of new system functions at the same time without interfering with service.
4. Throughput: An OS should be constructed so that It can give maximum throughput(Number of tasks
per unit time).
Major Functionalities of Operating System:
Resource Management: When parallel accessing happens in the OS means when multiple users are
accessing the system the OS works as Resource Manager, Its responsibility is to provide hardware to
the user. It decreases the load in the system.
Process Management: It includes various tasks like scheduling and termination of the process. It is
done with the help of CPU Scheduling algorithms.
Storage Management: The file system mechanism used for the management of the
storage. NIFS, CFS, CIFS, NFS, etc. are some file systems. All the data is stored in various tracks of
Hard disks that are all managed by the storage manager. It included Hard Disk.
Memory Management: Refers to the management of primary memory. The operating system has to
keep track of how much memory has been used and by whom. It has to decide which process needs
memory space and how much. OS also has to allocate and deallocate the memory space.
Security/Privacy Management: Privacy is also provided by the Operating system by means of
passwords so that unauthorized applications can’t access programs or data. For example, Windows
uses Kerberos authentication to prevent unauthorized access to data.
The process operating system as User Interface:
1. User
2. System and application programs
3. Operating system
4. Hardware
Every general-purpose computer consists of hardware, an operating system(s), system programs, and application
programs. The hardware consists of memory, CPU, ALU, I/O devices, peripheral devices, and storage devices.
The system program consists of compilers, loaders, editors, OS, etc. The application program consists of business
programs, and database programs.
Types of Operating Systems
An Operating System performs all the basic tasks like managing files, processes, and memory. Thus operating
system acts as the manager of all the resources, i.e. resource manager. Thus, the operating system becomes an
interface between user and machine.
Types of Operating Systems: Some widely used operating systems are as follows-
1. Batch Operating System –
This type of operating system does not interact with the computer directly. There is an operator which takes
similar jobs having the same requirement and group them into batches. It is the responsibility of the operator to
sort jobs with similar needs.
MS- DOS:
AS soon as the computer is switched ON, self test are performed and we can see. c:\> on the screen. It is
known as “c prompt”. This indicates that Dos is loaded and the computer is ready to accept DOS command.
1. Internal commands
2. External commands
1. INTERNAL COMMANDS:
Internal commands are built-in commands. They are the programs which are loaded in to memory of computer. We
cannot alter this command. There are about 25 internal commands.
C:\>MD demo
When you type the above command and press enter key, the directory demo will be created.
C:\>DIR
c. CD: The CD command is used to change over to any other directory from the current directory.
The command for command for displaying files in the root directory is,
C:\>CD demo
C:\ demo>
d. COPY: The copy command copies files between directories and between directories and between disk drives
either by keeping the same file name or by changing it to another name. The following command copies the file
AAA.C to the BBB.C.
The command given below copies the file test.doc from B drive (floppy drive) to the file test1.doc in the directory
demo.
e. DEL: The DEL command is used to delete files. The command given below deletes the file book.doc
C:\>DEL book.doc
C:\demo>DEL big.c
f. REN: Files may be renamed by using the REN command. The following command renames the file old.c
as new.c
g. RD: Directories may be removed by suing the RD or RMDIR command. command given below
removes the subdirectory demo. It is essential that all files in a directory be removed, before removing the
subdirectory.
C:\>RD demo
h. CLS: VDU screen can be cleared of the contents using the CLS command.
C:\>CLS
C:/>DATE
C:/>TIME
displays time as
2. EXTERNAL COMMANDS:
External commands are loaded in the memory of the computer, only when specially asked for this command
is given externally by the user.
Some important external commands are explained below:
a. FORMAT: The format command is used for formatting a disk. Formatting a disk is the process of
dividing the disk into logical zones called tracks and sectors.
C:\>FORMAT B:
b. DISKCOPY: Copies the contents of one floppy to another floppy on a track for track
basis. That is, the entire directory structure is copied. The command works with only floppies.
c. CHKDSK: This command is used to check the disk space. It gives clear picture of
total space used space and remaining space available, interms of bytes.
C :\> CHKDSK
d. SCANDISK: This command is used to scan the disk for any errors occurred in the disk.
C :\> SCANDISK
f. DELTREE: This command used to delete a directory with its subdirectories and files.
h. LEVEL: This command is used to put the volume leave to disk drive
C:\>LEAVE
C:\>RESTORE
j. TREE: This command is used for displaying tree structure of directories graphically. The following displays
the entire directory structure of C Drive. C:\>TREE
Generally, we use operating systems to perform day-to-day tasks. So what would you do if your OS was corrupted
or lost? You will try to recover or at last, you end up reinstalling the OS.
To install the OS you need bootable media & you need boot media creation tools for the creation of bootable
media.
A Bootable media is storage (can be a Pendrive, CD/DVD, etc) that holds the OS installation files. Boot Creation
Tools is a tool that converts normal media to bootable media.
It makes bootable media by adding the necessary OS installation files from .img/.iso file to normal
storage/media.
Ex: Nero, Rufus, Windows media Creation tools, etc.
INSTALLATION STEPS:
Use this when you have an OS corrupted PC and you want to install a new OS.
Take the OS file (mostly it will be in .ISO or .IMG format) and keep it in some folder on your android
phone.
Then mount the OS File on an android phone using a file manager.
After mounting, in file manager, you will see OS files present in the .ISO/.IMG file needed for installation.
Just copy all the OS files to the root level of the destination place ( on the same android phone).
It means the files should be in top level directories of the bootable media.
Ex: If the .ISO/.IMG file is in internal storage and after the ISO mounts, copy the OS files to the
SDCARD root directory.
Unmount the ISO file after copying.
Plug the android phone into the OS Corrupted PC.
Change the phone’s USB settings to mass storage mode so that the SDCARD will become virtually
isolated from the android phone.
By making these PC BIOS, we will be able to detect SDCARD as a bootable media.
Restart the PC, select the bootable media in BIOS, and press enter.
Now, the PC will boot from bootable media to perform OS installation.
Once the OS is installed, move the files present in the parent directory to the subdirectory of the SDCARD.
Doing so, the PC BIOS will detect SDCARD as storage but not as a bootable media.
BIOS cannot search for OS installation files in subdirectories.
This method brings effective usage of smartphone external storage for creating bootable media and avoids using
third-party media creation tools( such as Nero, Rufus, Windows media Creation tools, etc) to create bootable
media.
After OS installation, you can use the SDCARD (with boot files present), for different purposes, since the SDcard
is not formatted with any file system and no data is lost .
1.
WHA
T
ARE
THE
FEA
TUR
ES
OF
MS-
WOR
D?
MS-Word
1. Features of MS-Word
2. MS-Word Window Components
3. Creating, Editing, Formatting and Printing of Documents
4. Headers and Footers
5. Insert/Draw Tables, Table Auto Format
6. Page Borders and Shading
7. Inserting Symbols, Shapes
8. Word Art, Page Numbers, Equations
9. Spelling and Grammar
10. Thesaurus
11. Mail Merge
Ans: Features of MS-Word:
A. SHARE DOCUMENTS:
Word 2010 lets you post your documents online and then access, view, and edit them from almost any
computer or your Windows phone. Microsoft Word Web App edits documents in a Web browser when you’re away
from your office or home, without compromising the quality of your viewing experience. You can also stay current
and take immediate action using an enhanced mobile version of Word specifically suited to your smart phone.
With Word 2010, you can apply formatting effects such as shadow, bevel, glow, and reflection to your
document text. You can spell-check text that uses visual effects, and add text effects to paragraph styles
Word 2010 offers you more options to add visual impact to your documents. You can choose from dozens
of additional Smart Art Graphics to build diagrams just by typing a bulleted list. Smart Art enables you to transform
basic, bullet-point text into visuals that illustrate your ideas.
D. IMAGE EDITING:
New picture-editing tools in Word 2010 enable you to add special picture effects without additional photo-editing
software. You can easily adjust pictures with colour saturation and temperature controls. You also get improved
tools for easier and. more precise cropping and image correction
The new Microsoft Office Backstage view replaces the traditional File menu to let you save, share, print,
and publish your documents with just a few clicks. With the improved Ribbon, you can access your favorite
commands even more quickly by customising tabs.
F. WORD TRANSLATION:
Word 2010 helps you work and communicate across different languages. It translates a word, phrase, or
document more easily than before. You can set separate language settings for ScreenTips, Help content, and displays
A button that provides access to menu commands in Word. The Microsoft Office Button replaces the File
button in previous versions. Here is where you will find commonly known features such as New, Open, Save, Print
and Recent Documents. This is also where you will find the Word Options commands that were previously located
in the Tools menu in previous versions.
O. RIBBON:
An area across the top of the screen that makes almost all the capabilities of Word available in a single area.
The Ribbon replaces the menus and toolbars in previous versions. The Ribbon exposes most of the features that
used to be hidden in File menus. The Ribbon makes it easier to see and find commands to format your document.
The Ribbon can be reduced to a single line of tabs by pressing CTRL + F1.
H. TAB:
An area on the Ribbon that contains buttons that are organized in groups. The default tabs are Home, Insert,
Page Layout, Reference, Mailings, Review and View.
A customizable toolbar at the top of an activedocument. By default the Quick Access Toolbar displays the
Save, Undo, and Repeat button sand is used for easy access to frequently used commands. To customize this toolbar
click on the dropdown arrow and select the commands you want to add.
N. TITLE BAR:
A horizontal bar at the top of an active document. This bar displays the name of the document and application. At
the right end of the Title Bar is the Minimize, Restore and Close buttons.
M. GROUPS CATEGORIES:
A Group of buttons on a tab that are exposed and easily accessible. These buttons were formally embedded
in menus on the Menu Bar.
A button that launches a dialog box containing options for refining a command.
N. STATUS BAR:
A horizontal bar at the bottom of an active window that gives details about the active document.
N. VIEW TOOLBAR:
A toolbar that enables, adjusts, and displays different views of a document’s content.
A. ZOOM BUTTON:
Ans:
A. SELECT A WORD:
B. SELECT A SENTENCE:
Click and drag or click in the sentence while holding down the CTRL key.
C. SELECT A PARAGRAPH:
Click and drag or triple-click in the paragraph or double-click in the selection area to the left of the paragraph.
Click and drag or click to the left of the first word, hold down the SHIFT key, and then immediately click to
the right of the last word.
E. SELECT A LINE:
Click and drag or click in the selection to the left of the line.
G. DELETING TEXT:
H. UNDO AN ACTION:
Often times you will need to move text from one location in a document to another, or to a different
application. In this case you will perform a Cut and Paste. To reproduce a specific part of a document and place it
elsewhere, you will perform a Copy and Paste.
1. TO CUT TEXT:
2. TO COPY TEXT:
3. TO PASTE TEXT:
➢ Click in the area of the document where you want to paste your text.
➢ Click on the Paste icon located on the Home tab in the Clipboard group.
4. FORMATTING A DOCUMENT:
2) Make your font changes using one of the methods listed below.
C
ommands for font formatting can be found on the Home tab in the Font group. For more font formatting 1)
options click on the Dialog Box Launcher in the lower right corner of the group. This will launch the Font dialog
box.
You can also use the Mini Toolbar. The Mini Toolbar is activated when you select text to be formatted. This
toolbar is miniature and semi-transparent to help you work with fonts, font styles, font sizing, alignment, text color,
indent levels, and bullet features.
5. LIVE PREVIEW:
Using Live Preview temporarily applies formatting on selected text or objects whenever a formatting
command is hovered.
a. Click the arrow next to the Font box and move the pointer over the fonts that you want to preview.
b. Click the arrow next to the Font Size box and move the pointer over the font sizes that you want to preview.
c. Click the arrow next to the Text Highlight Color button and move the pointer over the highlight or fill colors that
you want to preview.
d. Click the arrow next to the Font Color button and move the pointer over the font colors that you want to preview.
6. FORMATTING A PARAGRAPH:
A paragraph is a select group of text that can have its own formatting characteristics, such as alignment,
spacing and styles.
Select the desired paragraph(s) that you want to format.
2) Make your paragraph formatting selections using one of the methods listed below.
Commands for paragraph formatting can be found on the Home tab in the Paragraph group.
For more paragraph formatting options click on the Dialog Box Launcher in the lower-right corner of the
group. This will launch the Paragraph dialog box. You can also use the Mini Toolbar for paragraph alignment, indent
levels, and bullet features.
6.1 FONT: This option is used to change font, style, size and color and apply effects on the selected text in the word
document.
4) In the box change Font, Style, size and color and also effects
6.2 PARAGRAPH:
This option is used to set Alignment, indentation, spacing before and after paragraph and line spacing in Ms-
Word.
1) Select Paragraph
This option is used to insert bullets and numbers in the document when we want to write point wise.
TO INSERT BULLETS:
3) Select any bullet style from the list and click ok.
TO INSERT NUMBERS:
5) Click ok
TO INSERT BORDERS:
2) Select Border style from the list and its colour also.
This option is used to insert page borders and shadings in the document.
2) Select Border style from the list and its color also.
COLUMNS:
This option is used to insert columns in the document. In this select Columns option and specify no. of
columns in the number of column box.
CHANGE CASE:
his option is used to change the selected text into upper case (Capital letter), Lowe case (small letters), Title 4.
case, sentence case and toggle case.
2) Select Lower (or) Upper (or) Title (or) Sentence (or) Toggle Case.
TAB:
This option is used to insert tabs on ruler to facilitate in typing tabular data (columns & rows). In this we can
insert tab stops at specific position in the ruler.
TEXT DIRECTION:
We can change the text direction to vertically or horizontally in the text box tool or table contained text.
Click the Microsoft Office Button, point to print and select one of the following options:
➢ Print allows you to select a printer, number of copies, and other printing options before printing.
➢ Quick Print allows you to send the document directly to the default printer without making changes.
➢ Preview allows you to preview and make changes to pages before printing.
Ans:
Header and Footer appear at top and bottom respectively of a document. Header is a special text, which is
often used to repeating the title of document from a page to page and entering page number at the top of the
document. Footers are often used for the same purpose but at the bottom of a document.
3. A non printing dashed open dialog box which is header editing box will be displayed at the top of the
document.
alignments. Left, Right or Center.
5. Move the mouse pointer in the header editing box and type the text.
6. Select Switch to button from tool bar and move to footer editing box.
7. You can insert date, time, page number and total number of pages information in both header and footer.
8. In page setup dialog box you can select Different Odd or Even option or Different First page option or this
point forward option or applying whole document options to setup the header and footer to current document.
Ans:
To insert a table into a document, or you can insert one table into another table to a document the below
process is followed.
5.1 Draw Table: This option is used to draw table in the insert tab.
2. The Shape of cursor changes to (+), now drag left mouse button to draw table, rows and columns.
5.2 Insert:
f. Cells: Used to insert a cell to the right, down, entire row or column at the cursor position.
5.3 Select:
This option is used to divide a cell into specified no of rows and columns.
1. Select a cell.
5.6 Delete:
This option is used to delete entire table, a row, a column or a cell. To perform delete option the cursor
should be inside the table.
Ans:
Table auto formats are used to apply different formats to a cell range. A table auto format is a collection of
cell styles used to format all cells of a range. The style applied is dependent on the position of the cell.
The table auto format contains separate information about four different row types and four different column types:
First Row, First Data Area Row, Second Data Area Row, Last Row.
First Column, First Data Area Column, Second Data Area Column, Last column.
The row or column types for the data area (between first and last row/column) are repeated in sequence.
Each cell of the formatted range belongs to one of the row types and column types, resulting in 16 different auto-
format fields.
In the example below, the highlighted cell has the formatting of the first data area row and last column field.
Additionally, this example shows the indexes of all the auto format fields. These indexes are used to access the field
with the interface.
Ans: Page Boarders and Shadings is used to insert page borders and shadings in the document.
To Insert Page Borders and Shadings:
)
1. Select Borders and Shading and select Page Borders tab.
2. Select Border style from the list and its color also.
3. Use the Picture to add a picture as the background rather than a color.
5. You can use the pre-defined gradients or click on "More Gradients…" to customize the shading gradient
colors.
6. Use the Texture option to add a pre-defined texture instead of a color shade.
Inserting Symbols:
Inserts symbols and special characters from the fonts that are installed on your computer.
Shapes:
A group of readymade shapes that include basic shapes such as a rectangle, circle plus a variety of stars and
connectors, block arrows, flow chart symbols, banners, lines, callouts. To insert an auto shape, click auto shapes on
the drawing toolbar. Auto shapes include several categories of tools. In the lines category, curves, freeform, scribble
can be used.
Word Art:
This is used to insert decorative text. With this shadowed, skewed, rotated and stretched text can be created.
Page Numbers:
This option is used to insert page numbers in the document. On the Insert tab, in the Header and Footer
group, click Page Number. Choose the position in the header or footer where you want the page numbers to appear.
To insert page numbers we have to specify the position and alignment.
Select Page Numbers
3) In the Alignment box, change the alignment (left, right or center) and apply it.
Equations:
2. You will not be able to edit the equations until the document is converted to a new file format.
3. If you save the document in word format, equations will be converted to images that you can’t edit.
4. However, if you later convert the document to office word 2010 file format, the equations will become text
and you will be able to edit them.
Ans: Microsoft Word provides several ways to check spelling and grammar.
To fix spelling and grammatical errors without having to confirm each correction, use the Auto Correct
feature. For example, if you type definitely and then type a space or other punctuation. AutoCorrect can make
corrections that are generated by the spelling checkers main dictionary, and by a list of built-in AutoCorrect entries.
You can check for spelling and grammar option in Review tab and then confirm each correction. This method
is useful if you want to postpone proofing a document until after you finish editing it.
9. MAIL MERGE?
Ans:
he term Mail Merge is typically used to describe the process of merging some form of address database with ➢
a form of letter to create a group of individual letters. Mail Merge is used to print letter, envelopes mailing labels
etc.
Suppose if you want to call 100 candidates for an interview, then you will either type 100 letters one by one
or just create one letter and get the 99 Xerox copies. After this you will fill their name and address on processing
speed also becomes slow. In all the above cases it will waste your time and processing speed. To avoid such problem
we use Mail Merge concept.
In Mail Merge we store the Name, and the addresses in one file is called data file or data source.
The general body of the letter which is common for all 100 candidates is stored in another file called master
file or main file. Mail merge use the main file and picks the first Name, addresses or label addresses from the data
file or label files and combine these file into one. Similarly it will continue this process up to the last address in the
data file.
2. Create The Data Source: It has the label addresses of the letter.
3. Define the Merge Fields in the Main Document: User defines merge fields in the main document. These fields
tell the MS-Word where to insert specific data items from the data source.
4. Merge the data with Main Document: When the main document and the data source are ready, you can merge
two. The result is a single document containing all the personalized documents with page break separating one
document from another.
5. Print the Document: As all personalized documents are placed in a single document file, you can print all the
documents in one operation.
➢ Form Letters
➢ Envelopes
➢ Labels
CREATING A FORM LETTER:
1. Open the new document named interview.doc and type the body of the letter.
2. Select the Mail Merge command from the tools menu. A mail merge helper dialog box will be displayed.
➢ Merge for merging of the data source with the main document.
MS-Word displays a list box that contains the various types of Mail merge documents that you can create. The
lists have Form letter, mailing label, Envelopes and catalog. Click the form letters option. It displays message box
to create a new Mail merge document (i.e. interview.doc).
4. Now create the Data source or data file. For this click the get data button from the Mail merge helper dialog box.
Now MS-Word displays four options in the list box as Create data source, open data source, use address book and
Header options.
5. As we have not created any data source file, so select the create data source option from the list. Now MS Word
will display the create Data source dialog box. In this we enter various filed names. Word also has its own-filed list
in the field name. We skip this box and enter our own fields Name, Address, City and Phone Number.
6. Click the remove filed name button to remove all fields from the list box. At last list box will be empty.
7. Type our own fields- Name, Address… into list box by clicking add field name command button.
8. To save the above fields in the data source file, click the OK button. In save dialog box give data source file name
and click save button. Then it will display another message box. Here are two options: Edit data source and Edit
main document.
9. Click edit data source option to add record in the form containing the above fields. Add record by record by
clicking Add new button.
10. When you typed all the records in the Data form. Click the OK button to close the data form. Word closes the 5.
Data form and returns you to the INTERVIEW.DOC file. Now it also opens a new Mail Merge Toolbar. This mail
merge tools bar has many tools as: to insert merge field, to insert word field, merge to new document etc.
11. Move the mouse at the desired position where you want to insert fields. Now click the insert merge field button
and then list of merge fields will be displayed. Insert required fields at required position.
12. As you have completed the process of entering fields form the source data into the document file, now you want
to view the merged fields with data on the document file. For that select “Merge to New Document” option in Mail
merge tool bar. Then we can see the merged document for different addresses in new document window.
10 MACROS?
Ans: A macro is a series of Word commands and instructions that you group together as a single command to
accomplish a task automatically.
● To combine multiple commands; for example, inserting a table with a specific size and borders, and with a
specific number of rows and columns.
Creation of Macros:-
1. Record a series of actions using the keyboard and mouse. This is the easiest way.
2. Type a Macro directly into a macro-editing window. This way we have a more flexibility.
4. In the Store macro in box, click the template or document in which you want to store the macro.
n for the macro.
6. If you don't want to assign the macro to a view tab, or shortcut keys, click OK to begin recording the macro.
9. Click the macro you are recording, and drag it to the view tab you want to assign it to.
12. Click Keyboard. In the Commands box, click the macro you are recording.
13. In the Press new shortcut key box, type the key sequence, and then click Assign.
16. You can use the mouse to click commands and options, but the macro recorder cannot record mouse actions
in a document window.
17. To move the insertion point or select, copy, or move text, for example, you must use shortcut keys.
Ans:
Power point is GUI animation tool, which is used to design a slide show. This slide show consists of group
of slides, which can be displayed with different animation techniques and color combinations.
2. You can animate text, graphics, sounds, movies, charts, and other objects on your slides so that you can
focus on important points, control the flow of information, and add interest to your presentation.
3. You can set up the way you want text or an object to appear on your slide to fly in from the left.
4. You can change the order and timing of your animations, and you can set them to occur automatically without
having to click the mouse.
5. You can preview the animation of your text and objects, to see how they all work together and adjust
animations if necessary.
6. The slide master controls certain text characteristics such as font type, size, and color called "master text,"
as well as background color and certain special effects, such as shadowing and bullet style.
8. You can choose from a variety of transitions and vary their speed.
9. You can change the transition effect to indicate a new section of a presentation.
Organization charts now use the drawing tools in PowerPoint, resulting in smaller fields sizes and easier
editing. Also, PowerPoint includes a new gallery of common conceptual diagrams.
When you want to create a presentation using the drawing tools in PowerPoint, you can save it as a picture
by right-click it. you can also save a texture or picture background from a slide in the same way, that makes it easy
to reuse these graphic elements.
When you want to insert pictures from files on your hard disk drive, you select multiple pictures and insert
them all at once.
PICTURE ROTATION:
You can rotate and flip types of image file in a PowerPoint presentation including bitmaps.
Documents you are working on can be recovered if the program encounters an error or stops responding.
Ans:
Step-1: Click on the Start button, located in the lower left corner of the Windows task bar.
Step 5: Select any of the four options (Blank presentation, Form Design Template, from Auto content wizard,
New from the existing presentation) displayed in the task pane.
Step-6: From design template: it will create a presentation with color scheme and a look for the slides, such
as “ocean” or you can select any one of your choice. In this you have to provide the content of the
presentation.
Step-7: From auto content wizard, through this wizard you can select the type of presentation you want to
create (Generic, Recommending a strategy, Training, Brainstorming Session) and PowerPoint creates
an outline for the selected presentation.
Step-8: Type the text, and apply designs and animations etc. After completing the presentation close the
button in Right corner side.
Ans: When you create a template, add any content to the slide master in Slide Master view that you want to protect
from being changed by users of your template, such as instructional prompt text, logos, header and footer
information, subject matter content, a background, formatting, colors, fonts, and effects.
Users of your template will work in Normal view, guided by the instructional prompts that you added. The
template users will replace the instructional prompt text and other placeholder content with data that is specific to
their own project or presentation.
PowerPoint comes with two types of templates:
1. DESIGN TEMPLATES contain predesigned formats and color schemes you can apply to any presentation to
give it a particular look.
2. CONTENT TEMPLATES Content Templates contain formats and color schemes just like design templates,
plus slides with suggested text for specific subjects.
To modify any of the templates to suit your needs or you can make a new template based on a presentation
you’ve already created. You can add the new template to the Auto content wizard so that it will be available the next
time you use the wizard.
Ans:
On the View tab, in the Presentation Views group, click Normal. On the left pane that contains the Outline
and Slides tabs, click the Slides tab, right-click the slide that you want to add a slide, and then click new Slide.
On the View tab, in the Presentation Views group, click Normal. On the left pane that contains the Outline
and Slides tabs, click the Slides tab, right-click the slide that you want to delete, and then click Delete Slide.
3. Another way to delete a slide is to click the thumbnail of the slide in the Slide Preview pane and then press the
Delete key or the Backspace key.
4. If you delete the wrong slide, just click the Undo button to restore the slide.
CLIPART:
Adding clip art and pictures to your document can be a great way to illustrate important information or add
decorative accents to existing text. You can insert images from your computer or search Microsoft's extensive
selection of clip art to find the image you need. Once an image has been inserted, you can format text to wrap around
the image.
PICTURES:
To resize an image, click and drag one of the corner sizing’s handles. The image will change size while
keeping the same proportions. If you want to stretch it horizontally or vertically, you can use the side sizing handles.
Ans: A list of the different views available to you in PowerPoint. To change views, click the View menu, and
click the view you want.
A. NORMAL VIEW:
Normal view shows the slide, the Outline, and the Notes text box, where you can work on one slide at a time
or organize the structure of all the slides in your presentation.
B. OUTLINE VIEW:
Switches to outline view, where you can work with the structure of your file in outline form. Work in outline
view when you need to organize the structure of your file.
C. SLIDE VIEW:
Switches to Slide view, where you can work on one slide at a time
The Slide Sorter view lets you view miniature versions of all the slides in a presentation complete with text
and graphics. In slide sorter view, you can reorder slides; add transitions, and animation effects. You can also set
the timings for electronic slide shows.
The Notes Page view will show a small version of the current slide along with a larger view of the Notes
text box. (Similar to the Normal View except doesn't display the Show Outline).
The Slide Show command on the View menu lets you run the Slide Show in a full screen, beginning with
the current slide if you are in slide view or the selected slide if you are in slide sorter view.
G. PRESENTER VIEW:
P
resenter View helps you manage your slides while you present by tracking how much time has elapsed,
which slide is next, and displaying notes that only you can see (while also allowing you to take meeting notes as
you present). For more information about using presenter view, see Use presenter view.
H. MASTER VIEWS:
The master views include, Slide, Handout, and Notes view. They are the main slides that store information
about the presentation, including background, theme colors, theme fonts, theme effects, and place holder sizes, and
positions.
The key benefit to working in a master view is that on the slide master, notes master, or handout master, you
can make universal style changes to every slide, notes page, or handout associated with your presentation. For more
information about working with masters, see Modify a slide master.
Ans:
PowerPoint, Microsoft's presentation and slide software, allows you to create animated presentations
featuring text, images, sounds and other media objects. In addition to these custom features, you can also add linked
objects to your presentation.
While objects embedded in your PowerPoint presentation remain unchanged even when the source file
changes, linked objects reflect any changes made to the source file. For instance, if you insert a spreadsheet into
your presentation and then edit that spreadsheet, the updated file will also appear in PowerPoint.
1. Linked Objects
2. Embedded Objects
A. AUDIO:
PowerPoint allows you to add audio to your presentation. For example, you could add background music to
one slide, a sound effect to another, and even record your own narration or commentary. You can then edit the audio
to customize it for your presentation.
B. VIDEO:
If
you’re using Microsoft PowerPoint, you might have encountered problems with embedding video files. They 15
might get displayed as a thumbnail on a slide but then don’t play during the presentation or might show an error and
can’t be inserted into your slides at all. This is esp. true for older versions like PowerPoint 2007 or 2010
If you have an AutoShape containing text, you may desire automatic resizing whenever the text size changes.
You can adjust the AutoShape size to fit the text inside. Then, if you reduce the size of your text, the AutoShape
will automatically resize to fit around the text. For information, refer to the Scale command allows you to enlarge
or reduce an AutoShape or image by very precise amounts while retaining its original proportions.
Ans:
1. Select the slide which you want to apply the animation to.
2. From the menu bar, select the Animations tab and the Animation Pane button.
5. In normal view, display the slide that has the text or objects you want to animate.
6. On the Slide Show menu, click Custom Animation, and then click the Effects tab.
7. If you are animating a chart created in Microsoft Graph, click the Chart Effects tab.
8. Under Check to animate slide objects, select the check box next to the text or object you want to animate.
9. Under Entry animation and sound and Introduce text (if you are animating text), select the options you want.
10. Repeat same process for every object you want to animate.
12. To change the order of animation, select the object you want to change under Animation order, and then
click one of the arrows to move the object up or down in the list.
13. To set the timing, select the object and then do one of the following:
14. To start the animation by clicking the text or object, click on mouse click.
ick automatically, and then enter the number of seconds you want to have elapse between the previous
animation and the current one.
Ans:
3. In slide or slide sorter view, select the slide or slides you want to add a transition to.
5. In the Effect box, click the transition you want, and then select any other options you want.
8. Repeat the process for each slide you want to add a transition to.
9. To view the transitions, on the Slide Show menu, click Animation Preview.
MS-Excel
1. Overview of Excel features
2. Creating a new worksheet, Selecting cells
3. Entering and Editing Text, Numbers
4. Formulae, Referencing Cells
5. Inserting Rows/Columns
6. Changing Column widths and row heights
7. Auto Format
8. Changing Font sizes, Colors, Shading, Functions and Charts
Ans:
@ ENTERING NUMBERS:
Numbers are basic raw materials for spreadsheets. You can type numbers either by using the number keys
on top of letter keys or by using extended numeric pad on the keyboard.
# ENTERING FORMULAS:
The real power of excel lies in it being able to store complex formulas. You can either build formulas using
absolute numbers or use relative cell address like=A1+B1.
$ ENTERING DATES:
In Excel you cannot only enter dates but can also do mathematics on them. Here dates are stored as numbers.
% ALIGNMENT:
Any text that you type is always left aligned within the cell. Any number that you type is always right aligned
within the cells. These alignments can be changed as per you requirements.
^ WORD PROCESSING:
Using this facility we can do almost all the functions provided by a word processor. for example, writing
texts, changing its fonts, formattingtext,cut,copy,paste,save etc.
& DATABASE:
Using this facility we can do almost all the functions provided by a database package. For example, making
lists, records, adding and deleting records, query, data storing, data filling, etc.
* GRAPHICS:
Using this facility we can present our data in terms of some picture. There are more than enough
graphs/charts available in MS-Excel, by which we can represent our data.
The Office Button in Excel 2007 was a replacement for the file menu in earlier versions of Excel. Like the
old file menu, the File tab options are mostly related to file management such as opening new or existing worksheet
files, saving, printing, and a new feature - saving and sending Excel files in PDF format.
@ FORMULA BAR:
Located above the worksheet, this area displays the contents of the active cell. It can also be used for entering
or editing data and formulas.
# NAME BOX:
Located next to the formula bar, the Name Box displays the cell reference or the name of the active cell.
$ COLUMN LETTERS:
Columns run vertically on a worksheet and each one is identified by a letter in the column header.
% ROW NUMBERS:
Rows run horizontally in a worksheet and are identified by a number in the row header. Together a column
letter and a row number create a cell reference. Each cell in the worksheet can be identified by this combination of
letters and numbers such as A1, F456, or AA34.
^ SHEET TABS:
By default there are three worksheets in an Excel file. The tab at the bottom of a worksheet tells you the
name of the worksheet - such as Sheet1, Sheet2 etc. Switching between worksheets can be done by clicking on the
tab of the sheet you wish to access. Renaming a worksheet or changing the tab color can make it easier to keep track
of data in large spreadsheet files.
This customizable toolbar allows you to add frequently used commands. Click on the down arrow at the end
of the toolbar to display the toolbar's options.
* RIBBON:
The Ribbon is the strip of buttons and icons located above the work area. The Ribbon is organized into a
series of tabs - such as File, Home, and Formulas. Each tab contains a number of related features and options. First
introduced in Excel 2007, the Ribbon replaced the menus and toolbars found in Excel 2003 and earlier versions.
Ans: Click the first cell in the range, and then drag to the last cell, or hold down SHIFT while you press the arrow
keys to extend the selection. You can also select the first cell in the range, and then press F8 to extend
the selection by using the arrow keys. To stop extending the selection, press F8 again.
5. NUMBERS?
Ans:
➢ Add the values in a column or row by using a button. You can use AutoSum to quickly sum a range
of numbers in a column or row.
➢ Click an empty cell below a column of numbers or to the right of a row of numbers, and then click
AutoSum. Excel selects what it determines to be the most likely range of data.
➢ Add numbers in Excel 2013 (3:03) You can use Excel to add numbers using formulas, buttons, and functions.
➢ The SUM function (4:48) When adding a few cells, the SUM function will save you time. With larger ranges
of cells, it’s essential.
➢ The SUMIF function (5:37)
➢ The SUMIF function allows you add cells that meet a criteria that you provide.
6. FORMULAE?
➢ Select the range that you want to calculate, type the formula, and then press CTRL+ENTER. For example,
if you type =SUM(A1:B1) in range C1:C5, and then press CTRL+ENTER.
➢ Excel enters the formula in each cell of the range, using A1 as a relative reference. Formulas are equations
that perform calculations on values in your worksheet. A formula always starts with an equal sign (=).
➢ You can create a simple formula by using constants and calculation operators.
➢ Simple formulas can include values you enter, cell references, or names you have defined. For
example, =A1+A2 or =5+2 are simple formulas that add the values in cells A1 and A2 or the values that you
specify.
ction. For example, the formulas =SUM(A1:A2) and SUM (A1,A2) both use the SUM function to add the
values in cells A1 and A2.
➢ In addition to formulas that use a single function, you can create formulas with nested functions or arrays
that calculate single or multiple results.
7. REFERENCING CELLS?
Ans: Cell references in Excel are very important. Understand the difference between relative, absolute and mixed
reference, and you are on your way to success.
7.1 CELL:
Cell in Microsoft Excel is a rectangular-shaped box on a worksheet. Any combination of numbers or words
can be entered in the cell; however, Excel is generally used as a calculation tool.
Alternatively referred to as a cell pointer or selected cell, an active cell is a rectangular box, highlighting the
cell in a spreadsheet. It helps identify what cell is being working with and where data will be entered. In the picture
below of Microsoft Excel, you can see that the active cell is D8. When a cell is an active cell, it will differ in
appearance from other cells such as having a bold border.
It is a range is a group or block of cells in a worksheet that have been selected or highlighted. When cells
have been selected they are surrounded by a black outline or border. Normally there is only one cell in the
worksheet with a black outline. This is the active cell. Whatever command is executed by Excel affects the
active cell. Using the mouse, keyboard or Name Box, more than one cell can be selected to create a range, and
commands executed by Excel will affect the entire range.
A cell reference refers to a cell or a range of cells on a worksheet and can be used in a formula so that
Microsoft Office Excel can find the values or data that you want that formula to calculate. In one or several formulas,
you can use a cell reference to refer to: Data from one cell on the worksheet.
8.
INSE
RT AND DELETE ROWS AND COLUMNS? ➢
Ans:
1. Select the row above or the column to the right of where the insertion should occur.
2. Choose Home Cells and click the arrow to the right of the Insert button to open the drop-down list for the
Insert button.
3. From the menu, choose Insert Sheet Rows or Insert Sheet Columns.
4. You can insert blank cells above or to the left of the active cell on a worksheet.
5. When you insert blank cells, Excel shifts other cells in the same column down or cells in the same row to
the right to accommodate the new cells.
6. Similarly, you can insert rows above a selected row and columns to the left of a selected column. You can
also delete cells, rows, and columns.
Ans:
➢ Supposing you have a large worksheet which has multiple columns or rows need to be adjusted their width
or height alternately, you can change the row height or column width one by one manually if there is few
columns or rows.
➢ But, how could you change multiple row height or column width at once in Excel?
➢ On a worksheet, you can specify a column width of 0 (zero) to 255. This value represents the number of
characters that can be displayed in a cell that is formatted with the standard font.
➢ The default column width is 8.43 characters. If you set a column width to 0 (zero), the column is hidden.
➢ You can specify a row height of 0 (zero) to 409. This value represents the height measurement in points (1
point equals approximately 1/72 inch or 0.035 cm).
proximately 1/6 inch or 0.4 cm). If your set a row height to 0 (zero), the row is hidden.
➢ If you are working in Page Layout view (View tab, Workbook Views group, Page Layout button), you can
specify a column width or row height in inches.
➢ In this view, inches are the measurement unit by default, but you can change the measurement unit to
centimeters or millimeters (On the File tab, click Options, click the advanced category, and under Display,
select an option from the Ruler Units list).
Ans: Change the default font or font size for new workbooks. Click the Microsoft Office Button, and then
click Excel Options. In the Popular category, under when creating new workbooks, do the following: In the Use
this font box, click the font that you want to use.
Ans:
11.1 COLORS:
1. Select the data range that you want to color the specific cells.
2. Then apply this Select Specific Cells feature, in the popped out dialog box, click Cell under the Selection
type, and choose Equals from the Specific type drop down list, then enter the specific text or value that you
want to select. Jozef is looking for a way to change background colors of specific cells in the worksheet he
created.
3. For example, he would like to find all red background cells and change them to blue, or find all yellow
backgrounds and change them to blue. Jozef wonders if there is an easy way to do this.
4. It's fairly obvious that you can change the background colors of any cells manually, so there is no need to go
into that option for making the changes. What you need to do is use a simple tool, such as the Find and
Replace tool, to make the color changes.
OPE
N
THE
COLOR PALETTE MENUS WITH ALT+H+ (WORKAROUND)
Ans: Sort quickly. To sort with just two mouse clicks, click Sort & Filter (on the Home tab, in the Editing group),
and then click either of the Sort buttons. Select a single cell in the column on which you want to sort. Click the top
button to perform an ascending sort (A to Z or smallest number too largest).
13. FUNCTIONS?
Ans: Function are predefined formulas that perform calculations by using specific values called arguments, in a
specific order, or structure. Arguments can be numbers, text, logical values or constants or other functions.
A. MATHEMATICAL FUNCTIONS:
f. Power() : Returns a number which is answer to the number raised to another number
Ex: power(2,3) Result: 8
h. Sign(): Returns 1 if the value is positive, returns –1 if the value is negative or returns 0 if the
value is zero.
Ex: sum(a1:b4)
B. STATISTICAL FUNCTIONS:
Ex: average(a1:c6)
b. Max(): Returns the largest value in a set of values or in given range of cells.
d. Count(): Counts the numbers of cells containing values in a given range of cells.
Ex: count(a1:b8)
e. Countif(): Counts the number of cells containing values which satisfies the given condition.
Ex: countif(a1:b7)
g. Weekday(): Returns day of the week. The day is given as an integer from 1 to 7 where 1
D. LOGICAL FUNCTIONS:
a. And(): Returns true when all its arguments are true and returns false when any of its arguments are false.
Ex: and(a1>20,a1<90)
b. Or(): Returns true if any of the arguments are true and returns false if all its arguments are false.
Ex: or(a1<20,a1>90)
c. Not(): Reverses the value of its arguments. If the argument is true the result will be false. If the argument is
false the result will be true.
Ex: not(a1>90)
d. If(): This function checks a condition and if the condition is true it returns true value and if the condition
is false it returns false value.
E. TEXT FUNCTIONS:
e. Left(): Returns specified number of characters from the left most side of string.
f. Right(): Returns specified number of characters from the right most side of string.
g. Mid(): Returns specified number of characters from a text string starting at the position you specify.
Ans: Among its many features, Microsoft Excel enables you to incorporate charts, providing a way to add visual
appeal to your business reports. Pairing a chart with its correct data style will make the information easier to
understand, enhancing the communication within your small business.
1. Pie Chart
2. Column Chart
3. Line Chart
4. Bar Chart
5. Area Chart
6. Scatter Chart etc.,
Today we will discuss the six most common chart types supported by Microsoft Excel and provide many
sample charts as well. In addition, each of the different chart's sub-types, such as stacked, 100% stacked, and 3-D,
are also discussed.
Column Chart:
You can take any Excel data arranged in columns or rows and plot it on a standard column chart. The chart's
horizontal axis presents the categories being charted, while the vertical axis shows the charted values. Vertical
columns of differing colors rise from the horizontal axis to visually represent the desired data. The simple
presentation and colored columns make for easy visual comparisons. Column charts also come in a variety of
different forms, including clustered columns, stacked columns and 3-D columns.
Bar Chart:
Bar charts are essentially horizontal column charts. A bar chart organizes the categories along the vertical
axis and the values along the horizontal axis. Horizontal bars stretch left to right across the chart to plot the data.
Bar charts are excellent for charting multiple values over extended durations, with colored bars representing each
value.
Line Chart:
Line charts use one or more horizontal lines to visually depict data points. The chart distributes categories evenly
along the horizontal axis and values evenly along the vertical axis. The horizontal line connects the plotted points,
providing a clear picture of data trends. Line charts work best when presenting data over evenly distributed time
intervals.
Pie Chart:
A pie chart divides a circle into slices to represent a data series. The chart depicts each pie slice in a different
color for easy recognition of how the individual slice relates to the greater whole. Pie charts work best when you're
charting only one data series, when none of your data are negative, when your data features no zero values and when
you have seven values or fewer.
Doughnut Chart:
Although similar to pie charts in that they show the relationship of individual parts to the greater whole,
doughnut charts feature more than one data series. The chart shows each data series in a circular ring, one inside the
other and a hole in the middle like a doughnut. Instead of pie slices, each ring has colored segments to represent
data values. Some individuals may find doughnut charts difficult to read, making stacked column charts or stacked
bar charts better options.
Area Charts:
Data that is arranged in columns or rows on a worksheet can be plotted in an area chart. Area charts
emphasize the magnitude of change over time, and can be used to draw attention to the total value across a trend.
For example, data that represents profit over time can be plotted in an area chart to emphasize the total profit.
Stock Charts:
Data that is arranged in columns or rows in a specific order on a worksheet can be plotted in a stock chart.
As its name implies, a stock chart is most often used to illustrate the fluctuation of stock prices. However, this chart
may also be used for scientific data. For example, you could use a stock chart to indicate the fluctuation of daily or
annual temperatures. You must organize your data in the correct order to create stock charts.
Surface Charts:
Data that is arranged in columns or rows on a worksheet can be plotted in a surface chart. A surface chart is
useful when you want to find optimum combinations between two sets of data. As in a topographic map, colors and
patterns indicate areas that are in the same range of values.
Bubble Charts:
Data that is arranged in columns on a worksheet so that x values are listed in the first column and corresponding y
values and bubble size values are listed in adjacent columns, can be plotted in a bubble chart.
Radar Charts:
Data that is arranged in columns or rows on a worksheet can be plotted in a radar chart. Radar charts compare
the aggregate values of several data series.
UNIT-III
COMPUTER NETWORKS
Disadvantages: -
Breakdown and possible loss of Resources: One major disadvantage of
networking is the breakdown of the whole network due to an issue of the
server. Such breakdowns are frequent in networks causing losses of thousands
of dollars each year.
Expensive to build: Building a network is a serious business in many
occasions, especially for large scale organizations. Cables and other hardware
are very expensive to buy and replace.
Security Threats: Security threats are always problems with large networks.
There are hackers who are trying to steal valuable data for large companies for
their own benefit.
Band width issues: In a network there are users who consume a lot of more
bandwidth than others. Because of this some other people may exist experience
difficulties.
Data Communication: “Data communication means sharing the information. This
sharing can be local or remote or with in a building. Local communication usually
occurs in face to face, while remote communication takes place over distance.”
Data communication is the exchange of data between the two devices via
some of transmission medium. Data communication devices must be the part of
the communication system made up of combination of hardware and software.
The Effectiveness of Data Communication System depends on Three
Fundamental Characteristics.
Delivery: The system must deliver data to the correct destination.
Accuracy: The System must deliver data accurately.
Timeliness: The System must deliver data in a timely manner.
1. Simplex Mode:
Simplex: A to B Only
In simplex mode the communication can take place in only one direction.
In this mode a terminal can only send data and cannot receive it or it can only
receive data but cannot send it.
It is like one way street where traffic moves in only one direction. Example of
simplex communication modes are Radio, TV, keyboard and Monitor.
2. Half-Duplex Mode:
Half-Duplex A to B or B to A
In half-duplex mode the communication can take place in both directions but
only in one direction at a time. Data is sent and received alternatively.
In this mode, at a time only one end transmits the data while other end
receives.
In addition, it is possible to perform error detection and request the sender to
re-transmit the data.
Example of half-duplex mode is walkie-talkie system. It can only send or
receive a message at any given time. It cannot do both.
3. Full-Duplex Mode:
Full-Duplex: A to B and B to A
Network:
A computer network is a set of connected computers. The connection between
computers can be done via Ethernet cable or wirelessly.
Connected computers can share recourses, like access to the internet, printers, file
servers and other devices.
Networks are categorized based on their scale and scope, design and implementation
issues.
Common types of area networks are LAN, MAN, WAN, PAN.
LAN provides a useful way of sharing the resources between end users. The
resources such as printers, file servers, scanners, and internet are easily sharable
among computers.
Metropolitan area network (MAN):
A MAN is a network that interconnects computers and other devices in a
geographical area or region larger than LANs but smaller than WANs.
A MAN may interconnect networks in a city, a campus, or community to form a
single larger network.
MAN may be formed by interconnecting several LANs by bridging them with
backbone lines with help of fiber optic cables.
A MAN is high speed network that allows sharing of regional resources. It covers an
area of 5-50 square km.
Star Topology:
All the nodes in the network are connected to a central device like a hub or switch
via cables.
Nodes communicate across the network by passing data through the hub.
This topology is the most preferred and popular model.
In a star network, one malfunctioning node doesn't affect the rest of the network.
If the central computer fails, the entire network becomes shutdown.
Ring Topology:
In a ring topology all the nodes are connected to each other in the shape of a closed
loop, so that every node is connected directly to two other nodes.
In a ring network, messages travel through the ring in a circular fashion in the same
direction (either clock wise or counter clock wise).
A failure in any cable or device breaks the loop and can cause the network to
shutdown.
In a ring topology each device acts as repeater to keep the signal strong as it travels.
Bus topology:-
In a bus topology, each computer or server is connected to a central cable, called
bus or backbone.
All the nodes (computers and other devices) share the same communication
channel.
Both ends of the shared channel have line terminator.
The data is sent in only one direction and as soon as it reaches the extreme end,
the terminator removes the data from the line.
Failure of a single node does not affect the network.
A failure of the shared communication line can make all other devices stop
functioning.
Tree Topology:-
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.
This topology divides the network in to multiple levels/layers of network. Mainly in
LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached.
The middle layer is known as distribution layer, which works as mediator between
upper layer and lower layer.
The highest layer is known as core layer, and is central point of the network.
If the root goes down, then the entire network becomes shutdown.
Hybrid topology:
Hybrid network topology uses a combination of two or more topologies.
Two very commonly used hybrid network topologies include star-ring and star-bus
networks.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The combining topologies may contain attributes of Star, Ring, Bus, topologies.
Internet is the best example of largest Hybrid topology.
The exact configuration of a hybrid network depends on structure of the
organization.
3) What is Internet? Explain services of Internet.
Internet: The internet is a global network that connects billions of computers all
over the world. It is a network of networks. The internet links different organizations,
academic institutions, government offices, and home users to share information
among large group of users.
When two devices are connected over the Internet, they can send and receive all
kinds of Information such as text, graphics, and voice, video and computer
programs.
Internet uses the standard Internet Protocol (TCP/IP). Every computer in internet is
identified by a unique IP address.
Services of Internet: -
Today the internet become a part of not only the big organizations, universities, and
offices, but has become the need of home users all over the world.
It allows us to access huge amount of information such as text, graphics, sound and
software over the internet. Following diagram shows the four different categories of
Internet Services.
1. Communication Services: -
There are various Communication Services available that offer exchange of
information with individuals or groups.
E-mail: Sending and receiving E-mails around the world at minimal price.
Telnet: One can login on to other network via Internet as if one is a member of
that network this is done through utility called TELNET.
News group: Offers a forum for people to discuss topics of common interests.
Internet Relay Chat (IRC): Allows the people from all over the world to
communicate in real time.
Internet Telephony (VoIP): Allows the internet users to talk across internet
to any PC equipped to receive the call.
Instance Messaging: Offers real time chat between individuals and group of
people. Ex. Yahoo messenger, MSN messenger.
Videoconferencing: One can have a live talk with persons all round the world
and can hold meetings as if sitting just by their side by video conferencing of
multimedia conferencing.
3. Web Services: -
Web services allow exchange of information between applications on the web. Using
web services, applications can easily interact with each other.
Web services are built on top of open standards such as TCP/IP, HTTP, Java, HTML,
and XML.
The basic web services platform is XML + HTTP. All the standard web services work
using the following components − SOAP, UDDI, WSDL, RSS, Restful and RDF .
Applications of Internet: -
Search engine: It can be used to search anything and everything. Most popular
search engines are Google and yahoo searches.
Online Shopping: Shopping has become easier with the advent of internet. You
can buy or sell online.
Entertainment: Downloading games, visiting chat rooms or just surfing the web
are some most widely used Entertainment features.
Communication: This is a major role of the internet. It helps people to
communicate either with the use of social networking websites or through e mails.
Even chatting is a major use of the internet.
Job search: Nowadays, many people search for their jobs online as it is quicker
and there is a larger variety of job vacancies present.
Research: Research papers are present online which helps in the researcher
doing literature review.
Studying: They find many useful things to learn on the internet (though with
supervision). Up to doctorate level education, people rely on internet for their
education. Online educational books have even reduced the need for a library.
Online booking: There is no need to visit the booking counters to book tickets
(or) to contact the agents that might ask for more money in order to process your
request. You can do all these things sitting at home, using Internet.
Real Time updates: There are various websites on the Internet which provides
you with the real time updates in every field be it in business, sports, finance,
politics, entertainment and others. Many a time the decisions are taken on the real
time updates that are happening in various parts of the world and this is where
Internet is very essential and helpful.
Financial Transactions: Financial transaction is the term which is used when
there is exchange of money. With the use of Internet in the financial transaction,
your work has become a lot easier. Now you don’t need to stand in the queue at
the branch of your particular bank rather you can just log in on to the bank
website with the credential that has been provided to you by the bank and then
can do any transaction related to finance at your will.
Education: There are a number of books, reference books, online help centers,
expert’s views and other study oriented material on the Internet that can make
the learning process very easier as well as a fun learning experience. There are
lots and lots of websites which are related to different topic. You can visit them
and can gain endless amount of knowledge that you wish to have.
Internet Explorer:
Internet Explorer (IE) is a product from software giant Microsoft. This is
the most commonly used browser in the universe. It is also called as
Microsoft Internet Explorer (MSIE). UBS
Internet Explorer Developed in 1995 along with Windows 95 launch 19
and ithas passed Netscape popularity in 1998. It is a supportive package
to Microsoft windows line of operating systems.
Users can also use Internet Explorer to listen to and watch streaming
content, access online banking, and make purchases over the Internet, and
much more.
Internet Explorer has been included with all versions of Windows since
then. As of October 2017, the latest version of Internet Explorer is IE 11.
Google Chrome:
Google Chrome is a freeware web browser developed by Google. It was
first released in September 2008, for Microsoft Windows, and was
later ported to Linux, macOS, iOS and Android..
The latest version of Google chrome is 60.0.
Today, chrome is known to be one of the most popular web browsers
with its global share of more than 50%.
Chrome offers tight integration with Google sites and services, such
as YouTube and Gmail, and manages its system resources differently
than other browsers.
Mozilla Firefox:
Mozilla Firefox (or simply Firefox) is a free and open-source web
browser developed by Mozilla Foundation and its subsidiary, Mozilla
Corporation.
It was released in 2004 and has grown to be the second most
popular browser on the Internet.
Firefox is available for Windows, macOS, Linux, and BSD operating
systems. Firefox is also available for Android mobile operating system.
The latest version of Firefox is 57.0.
Safari:
Safari is web browser that was produced and developed by Apple Inc.
which functions on a Mac OS X, and Windows operating system.
It was first put out in public on January 7, 2003 by Apple Inc. It was Apple’s
default browser known as “Panther” for Mac users and released on June 11,
2007 on Microsoft Windows operating system.
ICT-2 BSC/ BCOM/BA/BBA/BCA – III SEM
Apple's Safari browser was the first to utilize private browsing, which is
significant for those who crave privacy on the Web. And included in Mac OS
X.
Safari has very good support for latest technologies like XHTML, CSS2
etc. Safari 9 running on OS X El Capitan.
UBS
20
Opera:
Opera is a web browser for Windows, macOS, and Linux
operating systems developed by Opera Software AS.
Opera was conceived at Telenor as a research project in 1994 and
was bought by Opera Software in 1995. Initially a commercial web
browser, Opera became freeware in 2005.
Features of the Opera web browser include private browsing,
tabbed browsing, download manager, mouse gestures and browser
extensions.
In a modern version, Opera 45, users can use the "Speed Dial" page,
which allows Internet users to access their favorite pages using a "Dial Pad"
like application.
Opera is a well-known browser that continues to grow and increase its
user base.
IP Address:
An IP address is a unique number that identifies computers on the
Internet; every computer directly connected to the Internet has one.
Every client, server and network device must have a unique IP address
foreach network connection (network interface).
An IP address consists of four numbers separated by periods(dot).
Each number must be between 0 and 255. For example 204.81.205.32
Domain Names:
Domain names are used in various networking contexts and for
application- specific naming and addressing purposes. Most computers on
the Internet have a unique domain name.
ICT-2 BSC/ BCOM/BA/BBA/BCA – III SEM
URL:
URL stands for Uniform Resource Locator. URLs are used to identify
specific sites and files available on the World Wide Web.
Similar to an e-mail address, a URL is read like a sentence. For ex:
http://www.healthyway.com
INTRODUCTIOIN TO THE INTERNET
1) What is Internet Explorer? Explain Internet Explorer Environment.
Internet Explorer:
Internet Explorer (IE) is a product from software giant Microsoft. This
is the most commonly used browser in the universe. It is also called as
Microsoft Internet Explorer (MSIE).
Internet Explorer Developed in 1995 along with Windows 95 launch and
it has passed Netscape popularity in 1998. It is a supportive package to
Microsoft windows line of operating systems.
Users can also use Internet Explorer to listen to and watch streaming
content, access online banking, and make purchases over the Internet, and
much more.
Internet Explorer has been included with all versions of Windows since
then. Asof October 2017, the latest version of Internet Explorer is IE 11.
Opening Internet Explorer: To open Internet Explorer, perform any one of the
following steps:
Double-click the Internet Explorer icon located on the desktop.
Click the Internet Explorer icon from Quick launch.
Click Start, and select Internet Explorer.
Click Start, select All Programs, and then select Internet Explorer.
Then internet explorer window will appear. The internet explorer window
is:
3) Write about entering a website address and searching the internet using IE?
Entering a website address:
The area which is dedicated to enter the website address in the internet
explorer is address bar. Put cursor at the address bar then type the address of
the website you want to open.
For example if you want to open Facebook website then type
www.facebook.com in the address bar and then press the enter button the
Facebook page will displayed at web page area in the browser.
1. Facebook:
Facebook is an online social networking service based in Menlo Park, United
States.
The Facebook website was launched on February 4, 2004 by Mark
Zuckerberg, along with fellow Harvard College students and roommates.
Facebook is a popular free Social Networking website that allows registered
users to create profiles, upload photos and video, send messages and keep
in touch with friends, family and colleagues.
The site, which is available in 37 different languages. It can be used by
anyone wherever they are in the world as long as they have internet access.
In the facebook we can search by name or e-mail to find people.
Facebook is available 24 hours a day, so people can communicate without a
time zone problem.
Most of us already know that Facebook is the top social network on the web.
As of the first quarter of 2018, Facebook had 2.19 billion monthly active
users.
2. WhatsApp:
WhatsApp is the most popular instant messaging provider worldwide.
WhatsApp Messenger is a cross-platform mobile messaging app which allows
you to exchange messages without having to pay for SMS/MMS.
Users can send messages to individuals or groups using text, photos, videos
and even voice messages.
Unlike other popular messaging apps, WhatsApp uses your phone number
rather than usernames or pins (despite being an alternative to SMS).
As of February 2016, WhatsApp had a user base of one billion, making it the
most popular messaging application.
WhatsApp Inc., based in Mountain View, California, United States, was
acquired by Facebook Inc. on February 19, 2014, for approximately US$19.3
billion.
WhatsApp Messenger is available for iPhone, BlackBerry, Windows Phone
and Android mobiles phones.
3. LinkedIn:
LinkedIn is a business-oriented social networking service. Founded on
December14, 2002, and launched on May 5, 2003, it is mainly used for
professional networking.
As of 2015, most of the site's revenue came from selling access to
information about its users to recruiters and sales professionals.
As of March 2016, LinkedIn has more than 433 million users, out of which
more than 106 million are active.
LinkedIn is used for keeping track of and growing a professional social
network, finding and applying for jobs, posting and viewing online resumes,
giving and receiving recommendations, learning more about companies,
tracking industry news and moves, and more.
With LinkedIn you do discussion to the point and you get answers for what
actually you might be searching for.
4. Twitter:
Twitter is a social network and real-time communication service launched in
July 2006 by Jack Dorsey, Evan Williams, Biz Stone, and Noah Glass.
Twitter is an online social networking service that enables users to send and
read short 140-character messages called "tweets". These messages or
tweets are public by default and visible to all those who are following the
twitter.
As of 2016, Twitter had more than 319 million monthly active users.
Registered users can read and post tweets, but those who are unregistered
can only read them.
Twitter allows you to follow other users you are interested in so that you'll
see their updates on your home page.
Twitter provides very high level security about users account. Twitter has
very high kind of security policies.
Katy Perry is currently the most followed account on Twitter.
5. Skype:
Skype is a computer program that can be used to make free calls over the
Internet. Skype allows these registered users to communicate through both
instant messaging and voice chat.
Voice chat allows telephone calls between pairs of users and conference
calling.
Skype uses a technology called voice over IP, or VoIP. VoIP is a method of
transmitting the human voice over Internet Protocol (IP) networks.
In addition to standard telephone calls, Skype enables file transfers, texting,
video chat and videoconferencing.
Skype is available for Microsoft Windows, Macintosh, or Linux, as well as
Android, Blackberry, and both Apple and Windows smart phones and tablets.
Skype Credit or a subscription is required to call a landline or a mobile phone
number.
Skype offers free communication and screen sharing. It allows a group call
without the need for group features.
Current version of Skype is 11.0
6. Google+:
Google Plus (stylized as Google+) is an Internet-based social network that is
owned and operated by Google.
Making its debut in the early summer of 2011, Google+ became the fastest
growing social network the web has ever seen.
Google+ is a social network that builds off of your Google Account. If you
have a Google Account, you can activate your Google+ account as easily as
you would activate Google Now.
By combining the best of Facebook and Twitter into one site – and backing it
by the power of the world’s largest search engine, Google has given users a
social site that has a little something for everyone.
It provides business deals face to face, easy searching for any information
and latest Google news.
It provides job opportunity for sharing and uploading resumes and any data
for particular sites.
7. Yahoo!:
Yahoo is an American multinational technology company headquartered in
Sunnyvale, California.
It is globally known for its Web portal, search engine Yahoo! Search, and
related services, including Yahoo! Directory, Yahoo! Mail, Yahoo! News,
Yahoo! Finance, Yahoo! Groups, Yahoo! Answers, advertising, online
mapping, video sharing, fantasy sports and its social media website.
It is one of the most popular sites in the United States.
Yahoo was founded by Jerry Yang and David Filo in January 1994 and was
incorporated on March 2, 1995. Marissa Mayer, a former Google executive,
serves as CEO and President of the company.
With Yahoo’s standard yahoo mail service, you can send email, receive it,
and manage contacts and maintain a calendar. All yahoo mails are 100
percent encrypted and users have 1TB of storage to hold emails and files.
Although you can send instant message (IM) from your yahoo mail page,
you have the option to install yahoo messenger on your computer and
mobile phone.
Like Google, Yahoo indexes the web and makes information from web pages
available to web searches.
8. Youtube:
YouTube is an American video-sharing website headquartered in San Bruno,
California.
The service was created by three former PayPal employees—Chad
Hurley, Steve Chen, and Jawed Karim—in February 2005.
Google bought the site in November 2006 for US$1.65 billion; YouTube now
operates as one of Google's subsidiaries.
YouTube allows users to upload, view, rate, share, add to favorites, report,
comment on videos, and subscribe to other users.
It offers a wide variety of user-generated and corporate media videos.
Available content includes video clips, TV show clips, music
videos, short and documentary films, audio recordings, movie trailers, live
streams, and other content such as video blogging, short original videos,
and educational videos.
YouTube provides fast and easy video sharing, privacy features and quick
access to various videos.
9. Flickr:
Flickr is an image hosting and video hosting website and web services suite
that was created by Ludicorp in 2004 and acquired by Yahoo in 2005.
In addition to being a popular website for users to share and embed
personal photographs, and effectively an online community.
The service is widely used by photo researchers and by bloggers to host
images that they embed in blogs and social media.
The Verge reported in March 2013 that Flickr had a total of 87 million
registered members and more than 3.5 million new images uploaded daily.
In August 2011 the site reported that it was hosting more than 6 billion
images and this number continues to grow steadily, according to reporting
sources.
Photos and videos can be accessed from Flickr without the need to register
an account, but an account must be made to upload content to the site.
Advantages: -
Connectivity – The first and main advantage of the social media is connectivity.
People from anywhere can connect with anyone. Regardless of the location and
religion. The beauty of social media is that you can connect with anyone to learn
and share your thoughts.
Education – Social media has a lot of benefits for the students and teachers. It
is very easy to educate from others who are experts and professionals via the
social media. You can follow anyone to learn from him/her and enhance your
knowledge about any field.
Help – You can share your issues with the community to get help and giddiness.
Whether it is helping in term of money or in term of advice, you can get it from
the community you are connected with.
Promotion – Whether you have an offline business or online, you can promote
your business to the largest audience. The whole world is open for you, and can
promote to them.
Helps Govt and Agencies Fight Crime- It is also one of the advantages of the
social media that it helps Governments and Security Agencies to spy and catch
criminals to fight crime.
Disadvantages: -
Hacking – Personal data and privacy can easily be hacked and shared on the
Internet. Which can make financial losses and loss to personal life, Several
personal twitter and Facebook accounts have been hacked in the past and the
hacker had posted materials that have affected the individuals personal lives.
Addiction – The addictive part of the social media is very bad and can disturb
personal lives as well. The teenagers are the most affected by the addiction of
the social media.
Security Issues – Now a day’s security agencies have access to people personal
accounts. This makes the privacy almost compromised. You never know when
you are visited by any investigation officer regarding any issue that you
mistakenly or unknowingly discussed over the internet.
Cheating and Relationship Issues – Most of the people have used the social
media platform to propose and marry each other. However, after some time they
turn to be wrong in their decision and part ways.
Health Issues – The excess usage of social media can also have a negative
impact on the health. Since exercise is the key to lose weight, most of the people
get lazy because of the excessive use of social networking sites.
Glamorizes Drugs and Alcohol – One of the disadvantages of the social media
is that people start to follow others who are wealthy or drug addicted and share
their views and videos on the web. This eventually inspires others to follow the
same and get addicted to the drugs and alcohol.
E-Mail
1) What is an E-mail? Explain its advantages and disadvantages?
E-mail: E-Mail or electronic mail is a system for sending messages from one
individual to another via telecommunications links between computers or terminals
using dedicated software. The sender and receiver must have email addresses to
share their data.
Email was invented by Ray Tomlinson in 1972. The only Internet service that is more
frequently used than the Web is electronic mail.
People most commonly use e-mail to send and receive text messages; you may be
able to exchange audio or video messages with someone else messages through
Internet.
Advantages: -
As in the early days of the telephone, the original users of email only had a
limitednumber of people whom they could communicate. Now that email is more
prevalent, some of the advantages of using email are:
Easy to use: E-mail helps us manage our contacts, send mails quickly,
maintain our mail history, store the required information, etc.
Speed: An email is delivered instantly and anywhere across the globe. No
other service matches the email in terms of speed. You can send the same
message/mail to multiple users simultaneously; thus, a lot of time is saved.
Reliable and secure: Constant efforts are taken to improve the security in
electronic mails. It makes the email one of the secured ways of
h a subject line, it is easy to prioritize them and ignore the ones that
are unwanted.
Advertising tool: Nowadays, many individuals and companies are using the
email service to advertise their products, services, etc.
Data Storage: The providers of email service offer enough space for data
storage. Also, the process of sorting and arranging mails as per the subject,
date, etc. is made quite easy for users.
Provision of Attachments: The feature of attachments allows users to
send huge chunks of data in the same mail. Also, sending attachments
doesn't raise the cost as in the postal service.
Informal and conversational: The language used in emails is generally
simple and thus, makes the process of communication informal. Sending and
receiving emails takes less time, so it can be used as a tool for interaction.
Disadvantages: -
Despite all of the advantages, we should bear in mind that not everyone
everywhere has access to email. Although the telephone is not truly universal
either, it still far outdistances email in terms of its worldwide availability.
Viruses: These are computer programs which have the potential to harm a
computer system. Viruses copy themselves and further infect the computer.
Recipients need to scan the mails since; viruses are transmitted through
them and have the potential to harm computer systems.
Spam: Emails when used to send unsolicited messages and unwanted
advertisements create nuisance and are termed as spam. Checking and
deleting the unwanted mails can unnecessarily consume a lot of time.
Hacking: The act of breaking into computer security is termed as hacking.
In this form of security breach, emails are intercepted by hackers. An email,
before it is delivered to the recipient, "bounces" between servers located in
different parts of the world; hence, it can be hacked by a professional
hacker.
Crowded inbox: Over a period of time, the email inbox may get crowded
with mails. It becomes difficult for users to manage such a huge chunk of
mails. This information overload often repels the readers from using the
email service.
Internet Access is required: There are many parts of the world where
people don't have access to the Internet. The email doesn't serve any
purpose in such areas.
2) Explain how to create an email ID (email account)?
There are various email service provider available such as Gmail, hotmail, yahoo
mail, rediff mail etc.
Gmail is an extremely popular email service provided by Google.
In order to create a Gmail account, you actually must sign up for a Google account.
This account will give you access to the Google Suite.
Composing an E-mail: -
Before sending an email, we need to compose a message. When we are
composing an email message, we need to specify the following things:
Sender “address in ‘To’ field
CC (if required)
BCC(if required)
Subject of email message
Body (Actual message)
Password: -
To prevent other people from using your account via your user-id, you are
required to have a password.
A password allows you and only you to access the computer system through your
user-id.
Password Rules: -
Passwords must be 7-14 characters.
Passwords must include at least one letter and one number.
Passwords cannot contain spaces.
Semicolons cannot be part of a Password.
Passwords are case-sensitive.
Do not use your User ID as your Password.
If you forget your User ID or Password, you can retrieve them
through the "User ID & Password Help" link.
us – United States
in – India
uk – United Kingdom
my – Malaysia
de - Germany(Deutschland)
Email addresses: -
Email addresses are two strings separated by the character "@" (the "at sign"):
user @ domain.
The right-hand part describes the domain name involved, and the left-hand part
refers to the user who belongs to that domain. One or more mail servers correspond
to each domain.
Example : balu.pdbs@gmail.com
In the above example first part is the User ID i.e.; balu.pdbs that refers
to the recipient’s mailbox.
Then there is after @ sign becomes next part is Gmail is the host name
are also called Domain Name. This refers to the mail server, it is the name of
the company or organization.
The end of the Domain Name consists of a dot(“.”) followed by three
or more letters(such as “.com”) that indicate top-level Domain of the any
organization or country.
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
Network Devices: Network devices, also known as networking hardware, are
physical devices that allow hardware on a computer network to communicate and
interact with one another. For example Repeater, Hub, Bridge, Switch, Routers,
Gateway, Brouter, and NIC, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted to
extend the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do not amplify the signal.
When the signal becomes weak, they copy it bit by bit and regenerate it at its star
topology connectors connecting if original strength. It is a 2-port device.
2. Hub – A hub is a basically multi-port repeater. A hub connects multiple wires
coming from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all hosts connected
through Hub remains one. Also, they do not have the intelligence to find out the
best path for data packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub:- These are the hubs that have their power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as
well as a wiring center. These are used to extend the maximum distance between
nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning
and boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub:- It works like an active hub and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure
each port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with
add on the functionality of filtering content by reading the MAC addresses of the
source and destination. It is also used for interconnecting two LANs working on the
same protocol. It has a single input and single output port, thus making it a 2 port
device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted
from the network, reconfiguration of the stations is unnecessary. These bridges
make use of two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost
its efficiency(a large number of ports imply less traffic) and performance. A switch is
a data link layer device. The switch can perform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors
and forward good packets selectively to the correct port only. In other words, the
switch divides the collision domain of hosts, but the broadcast domain remains the
same.
Types of Switch
Unmanaged switches: These switches have a simple plug-and-play design and do
not offer advanced configuration options. They are suitable for small networks or for
use as an expansion to a larger network.
Managed switches: These switches offer advanced configuration options such as
VLANs, QoS, and link aggregation. They are suitable for larger, more complex
networks and allow for centralized management.
Smart switches: These switches have features similar to managed switches but are
typically easier to set up and manage. They are suitable for small- to medium-sized
networks.
Layer 2 switches: These switches operate at the Data Link layer of the OSI model
and are responsible for forwarding data between devices on the same network
segment.
Layer 3 switches: These switches operate at the Network layer of the OSI model
and can route data between different network segments. They are more advanced
than Layer 2 switches and are often used in larger, more complex networks.
PoE switches: These switches have Power over Ethernet capabilities, which allows
them to supply power to network devices over the same cable that carries data.
Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster
than traditional Ethernet speeds.
Rack-mounted switches: These switches are designed to be mounted in a server
rack and are suitable for use in data centers or other large networks.
Desktop switches: These switches are designed for use on a desktop or in a small
office environment and are typically smaller in size than rack-mounted switches.
Modular switches: These switches have modular design, which allows for easy
expansion or customization. They are suitable for large networks and data centers.
5. Routers – A router is a device like a switch that routes data packets based on
their IP addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs and have a dynamically updating routing table based on
which they make decisions on routing the data packets. The router divides the
broadcast domains of hosts connected through it.
Algorithms play a crucial role in various fields and have many applications. Some of the key areas
where algorithms are used include:
Computer Science: Algorithms form the basis of computer programming and are used to solve
problems ranging from simple sorting and searching to complex tasks such as artificial intelligence
and machine learning.
Mathematics: Algorithms are used to solve mathematical problems, such as finding the optimal
solution to a system of linear equations or finding the shortest path in a graph.
Operations Research: Algorithms are used to optimize and make decisions in fields such as
transportation, logistics, and resource allocation.
Artificial Intelligence: Algorithms are the foundation of artificial intelligence and machine learning,
and are used to develop intelligent systems that can perform tasks such as image recognition,
natural language processing, and decision-making.
Data Science: Algorithms are used to analyze, process, and extract insights from large amounts of
data in fields such as marketing, finance, and healthcare.
These are just a few examples of the many applications of algorithms. The use of algorithms is
continually expanding as new technologies and fields emerge, making it a vital component of
modern society.
Algorithms can be simple and complex depending on what you want to achieve.
What is a Flowchart?
Flowchart is a graphical representation of an algorithm. Programmers often use it as a program-
planning tool to solve a problem. It makes use of symbols which are connected among them to
indicate the flow of information and processing.
The process of drawing a flowchart for an algorithm is known as “flowcharting”.
Connectors: Whenever flowchart becomes complex or it spreads over more than one
page, it is useful to use connectors to avoid any confusions. It is represented by a circle.
Looping in programming languages is a feature which facilitates the execution of a set of
instructions/functions repeatedly while some condition evaluates to true. Java provides three ways
for executing the loops.
Pseudo code: It's simply an implementation of an algorithm in the form of annotations and
informative text written in plain English. It has no syntax like any of the programming language and
thus can't be compiled or interpreted by the computer.
PROGRAMMING LAUNGUAGES:
Programming languages are used to write instructions that guide computers to carry out specified tasks.
The difference between machine language and assembly language is that machine language is a low-
level programming language, and assembly language is lower than a lower than a high-level language and
more than a low-level language. here we have discussed these languages in detail along with the difference
between machine language and assembly language.
The major difference between machine language and assembly language is that machine language is
referred to as a binary language. It can be run on a computer directly. While an assembly language is a
low-level programming language that must be converted into machine code using software called an
assembler. Candidates can have a better understanding of the concepts of machine language and assembly
language, and the difference between machine language and assembly language provided in the upcoming
sections.
Interpreter Vs Compiler
Interpreter Compiler
Scans the entire program and translates it as a whole
Translates program one statement at a time.
into machine code.
No Object Code is generated, hence are memory Generates Object Code which further requires linking,
efficient. hence requires more memory.