Computer Fundamental For BBA B.Com and B PDF
Computer Fundamental For BBA B.Com and B PDF
Anything new started is always with mixed feelings. There is the joy of
novelty, the determination of a missionary, but also the apprehension of a
new comer. Will it click? Will it be liked? Will it serve any purpose at all? Is
it worth the effort?
From the responses received, I can safely say that the phase of
apprehension is over. Colleagues and friends from all over, esteemed
teachers and researchers have called up or written to encourage the
effort. I am extremely grateful to them. My esteemed guide and support of
Mr. Narendra Narang (Bamanendra) from Indore, Chairman-Vishisht
Education Society was the first to call and offer appreciation.
I admire the patience with which he and his office carry out the numerous
corrections and additions in getting the monographs ready for printing.
I seek your suggestions and advice, your views and opinions on the
issues raised by this collection. Please feel free to write or call. It will be a
great pleasure to interact with you.
Sanjay Maheshwsari
1
Index
2
Functions Of An Operating System 110
File System 111
Icon 114
Taskbar 116
Moving And Sizing The Taskbar 119
My Computer 121
Control Panel 123
Desktop 124
Files And Folders 131
Creating And Deleting Files 134
Back Up 136
The Disk Defragmenter 137
Screensaver 138
Passwords 138
Recycle Bin 139
Paint Brush 141
Ms-Word 141
Ms-Excel 142
Ms-Access 144
Tally 147
Video Conferencing 149
DECISION SUPPORT SYSTEM 153
Expert System 154
Artificial Intelligence 155
Impact Of IT 157
Image Processing 160
Digital Image Processing 161
Virtual Reality 162
Information Superhighway 163
Online Shopping 164
E-Mail 165
4 GL 166
Internet Explorer 167
Network 169
Computer Keyword 170
3
The History of Computers
Computers have wedged themselves into every facet of our lives—they are what
we would use as the symbolic representation of the modern world. But did you
know that the history of computers dates back to the 1800s?Indeed, the history
and evolution of computers is quite extraordinary—and with many early
computing technology innovations tied to defense contracts, much of this
information were kept secret from the public for decades. In this article, we
explore the development and progression of computers.
The first computers were designed by Charles Babbage in the mid-1800s, and are
sometimes collectively known as the Babbage Engines. These include the
Difference Engine No. 1, the Analytical Engine, and the Difference Engine No. 2.
The Difference Engine was constructed from designs by Charles Babbage. Photo
by Allan J. Cronin These early computers were never completed during
Babbage’s lifetime, but their complete designs were preserved. Eventually, one
was built in 2002.
While these early mechanical computers bore little resemblance to the computers
in use today, they paved the way for a number of technologies that are used by
modern computers, or were instrumental in their development. These concepts
include of the idea of separating storage from processing, the logical structure of
computers, and the way that data and instructions are inputted and outputted.
4
Z1 was used to take the U.S. Census in 1890.
Colossus—whose name was fitting for its size—was developed during World
War II.The first electronic computers were developed during the World War II,
with the earliest of those being the Colossus. The Colossus was developed to
decrypt secret German codes during the war. It used vacuum tubes and paper tape
and could perform a number of Boolean (e.g. true/false, yes/no) logical
operations.
Another notable early electronic computer was nicknamed "The Baby" (officially
known as the Manchester Small-Scale Experimental Machine). While the
computer itself wasn’t remarkable—it was the first computer to use the Williams
Tube, a type of random access memory (RAM) that used a cathode-ray tube.
Some early electronic computers used decimal numeric systems (such as the
ENIAC and the Harvard Mark 1), while others—like the Atanasoff-Berry
Computer and the Colossus Mark 2—used binary systems. With the exception of
6
the Atanasoff-Berry Computer, all the major models were programmable, either
using punch cards, patch cables and switches, or through stored programs in
memory.
The first commercially available computers came in the 1950s. While computing
up until this time had mainly focused on scientific, mathematical, and defense
capabilities, new computers were designed for business functions, such as
banking and accounting.
The J. Lyons Company, which was a British catering firm, invested heavily in
some of these early computers. In 1951, LEO (Lyons Electronic Office) became
the first computer to run a regular routine office job. By November of that year,
they were using the LEO to run a weekly bakery valuations job.
The UNIVAC was the first mass-produced computer. The UNIVAC was the first
commercial computer developed in the U.S., with its first unit delivered to the
U.S. Census Bureau. It was the first mass-produced computer, with more than
45 units eventually produced and sold.
The IBM 701 was another notable development in early commercial computing;
it was the first mainframe computer produced by IBM. It was around the same
time that the Fortran programming language was being developed (for the
704).
7
The IBM 650 would cost you $4 million dollars if you bought it today.
A smaller IBM 650 was developed in the mid-1950s, and was popular due to its
smaller size and footprint (it still weighed over 900kg, with a separate 1350kg
power supply).They cost the equivalent of almost $4 million today (adjusted for
inflation).
IBM 350 RAMAC used disk drives. These transistors also led to developments
in computer peripherals. The first disk drive, the IBM 350 RAMAC, was the
first of these introduced in 1956. Remote terminals also became more common
with these second-generation computers.
The microchip (or integrated circuit) is one of the most important advances in
computing technology. Many overlaps in history existed between microchip-
based computers and transistor-based computers throughout the 1960s, and even
into the early 1970s.
8
Microchips allowed the manufacturing of smaller computers. Photo by Ioan
Sameli The microchip spurred the production of minicomputers and
microcomputers, which were small and inexpensive enough for small businesses
and even individuals to own. The microchip also led to the microprocessor,
another breakthrough technology that was important in the development of the
personal computer.
There were three microprocessor designs that came out at about the same time.
The first was produced by Intel (the 4004).
The first processors were 4-bit, but 8-bit models quickly followed by 1972. 16-bit
models were produced in 1973, and 32-bit models soon followed. AT&T Bell
Labs created the first fully 32-bit single-chip microprocessor, which used 32-bit
buses, 32-bit data paths, and 32-bit addresses, in 1980.The first 64-bit
microprocessors, were in use in the early 1990s in some markets, though they
didn’t appear in the PC market until the early 2000s.
The first personal computers were built in the early 1970s. Most of these were
limited-production runs, and worked based on small-scale integrated circuits and
multi-chip CPUs.
The Commodore PET was a personal computer in the 70s. The Altair 8800 was
the first popular computer using a single-chip microprocessor. It was also sold in
kit form to electronics hobbyists, meaning purchasers had to assemble their own
computers.
Clones of this machine quickly cropped up, and soon there was an entire market
based on the design and architecture of the 8800. It also spawned a club based
around hobbyist computer builders, the Homebrew Computer Club.
1977 saw the rise of the "Trinity" (based on a reference in Byte magazine): the
Commodore PET, the Apple II, and the Tandy Corporation’s TRS-80. These
three computer models eventually went on to sell millions.
9
These early PCs had between 4kB and 48kB of RAM. The Apple II was the only
one with a full-color, graphics-capable display, and eventually became the best-
seller among the trinity, with more than 4 million units sold.
One particularly notable development in the 1980s was the advent of the
commercially available portable computer.
The first of these was the Osborne 1, in 1981. It had a tiny 5" monitor and was
large and heavy compared to modern laptops (weighing in at 23.5 pounds).
Portable computers continued to develop, though, and eventually became
streamlined and easily portable, as the notebooks we have today are. These early
portable computers were portable only in the most technical sense of the word.
Generally, they were anywhere from the size of a large electric typewriter to the
size of a suitcase.
The Gavilan SC was the first PC to be sold as a "laptop". The first laptop with a
flip form factor, was produced in 1982, but the first portable computer that was
actually marketed as a "laptop" was the Gavilan SC in 1983.
Early models had monochrome displays, though there were color displays
available starting in 1984 (the Commodore SX-64).Laptops grew in popularity as
they became smaller and lighter. By 1988, displays had reached VGA resolution,
and by 1993 they had 256-color screens. From there, resolutions and colors
10
progressed quickly. Other hardware features added during the 1990s and early
2000s included high-capacity hard drives and optical drives.
Mobile computing is one of the most recent major milestones in the history of
computers. Many smart phones today have higher processor speeds and more
memory than desktop PCs had even ten years ago. With phones like the iPhone
and the Motorola Droid, it’s becoming possible to perform most of the functions
once reserved for desktop PCs from anywhere.
11
A number of manufacturers had models, including Apple and Palm. The main
feature PDAs had that not all pocket PCs had was a touch screen interface. PDAs
are still manufactured and used today, though they’ve largely been replaced by
smart phones.
Smartphone’s have truly revolutionized mobile computing. Most basic computing
functions can now be done on a Smartphone, such as email, browsing the
internet, and uploading photos and videos.
The Asus Eee PC 700 was the first netbook to enter mass production.
The first mass-produced net book was the Asus Eee PC 700, released in 2007.
They were originally released in Asia, but were released in the US not long
afterward.
Other manufacturers quickly followed suit, releasing additional models
throughout 2008 and 2009.
One of the main advantages of netbooks is their lower cost (generally ranging
from around US$200-$600). Some mobile broadband providers have even
offered net books for free with an extended service contract. Comcast also had a
promotion in 2009 that offered a free net book when you signed up for their cable
internet services.
Most net books now come with Windows or Linux installed, and soon, there will
be Android-based net books available from Asus and other manufacturers.
The history of computing spans nearly two centuries at this point, much longer
than most people realize. From the mechanical computers of the 1800s to the
room-sized mainframes of the mid-20th century, all the way up to the net books
and smart phones of today, computers have evolved radically throughout their
history. The past 100 years have brought technological leaps and bounds to
computing, and there’s no telling what the next 100 years might bring.
This series covers many of the major milestones in computer history (but not all
of them) with a concentration on the history of personal home computers.
13
Computer
John Backus & IBM
FORTRAN
The first successful high level
1954 Computer
programming language.
Programming
Language
Stanford Research
The first bank industry computer
Institute, Bank of
1955 - also MICR (magnetic ink
America, and General
(In Use 1959) character recognition) for
Electric
reading checks.
ERMA and MICR
Jack Kilby & Robert
Noyce
1958 Otherwise known as 'The Chip'
The Integrated
Circuit
Steve Russell & MIT
The first computer game
1962 Spacewar Computer
invented.
Game
Douglas Engelbart
Nicknamed the mouse because
1964 Computer Mouse &
the tail came out the end.
Windows
1969 ARPAnet The original Internet.
Intel 1103 Computer The world's first available
1970
Memory dynamic RAM chip.
Faggin, Hoff &
Mazor
1971 The first microprocessor.
Intel 4004 Computer
Microprocessor
Alan Shugart &IBM Nicknamed the "Floppy" for its
1971
The "Floppy" Disk flexibility.
Robert Metcalfe &
Xerox
1973 The Ethernet Networking.
Computer
Networking
Scelbi & Mark-8
1974/75 Altair & IBM 5100 The first consumer computers.
Computers
14
Apple I, II & TRS-
1976/77 80 & Commodore More first consumer computers.
Pet Computers
Dan Bricklin & Bob
Frankston Any product that pays for itself
1978 VisiCalc in two weeks is a surefire
Spreadsheet winner.
Software
Seymour Rubenstein
1979 & Rob Barnaby Word Processors.
WordStar Software
IBM
From an "Acorn" grows a
1981 The IBM PC - Home
personal computer revolution
Computer
Microsoft From "Quick And Dirty" comes
1981 MS-DOS Computer the operating system of the
Operating System century.
Apple Lisa The first home computer with a
1983
Computer GUI, graphical user interface.
Apple Macintosh The more affordable home
1984
Computer computer with a GUI.
Microsoft begins the friendly
1985 Microsoft Windows
war with Apple.
What is a Computer !
15
• O - Oriented
• M - Machine
• P - Particularly
• U - Used For
• T - Trade
• E - Education And
• R - Research
Characteristics of Computers !
1. Mainframe Computers
2. Minicomputers
3. Microcomputers
4. Supercomputers
Mainframe computers are very large, often filling an entire room. They can store
enormous of information, can perform many tasks at the same time, can
communicate with many users at the same time, and are very expensive. . The
price of a mainframe computer frequently runs into the millions of dollars.
Mainframe computers usually have many terminals connected to them. These
terminals look like small computers but they are only devices used to send and
receive information from the actual computer using wires. Terminals can be
located in the same room with the mainframe computer, but they can also be in
different rooms, buildings, or cities. Large businesses, government agencies, and
universities usually use this type of computer.
Minicomputers are much smaller than mainframe computers and they are also
much less expensive. The cost of these computers can vary from a few thousand
dollars to several hundred thousand dollars. They possess most of the features
found on mainframe computers, but on a more limited scale. They can still have
16
many terminals, but not as many as the mainframes. They can store a tremendous
amount of information, but again usually not as much as the mainframe. Medium
and small businesses typically use these computers.
Microcomputers are the types of computers we are using in your classes at Floyd
College. These computers are usually divided into desktop models and laptop
models. They are terribly limited in what they can do when compared to the
larger models discussed above because they can only be used by one person at a
time, they are much slower than the larger computers, and they cannot store
nearly as much information, but they are excellent when used in small businesses,
homes, and school classrooms. These computers are inexpensive and easy to use.
They have become an indispensable part of modern life.
Computer Architecture
The Central Processing Unit (CPU) is the "brain" of the computer, it is the
'computer' in computer. Without the CPU, you have no computer. Computer
CPU's (processors) are composed of thin layers of thousands of transistors.
Transistors are tiny, nearly microscopic bits of material that will block electricity
when the the electricity is only a weak charge, but will allow the electricity pass
through when the electricity is strong enough. The transistors transition from
being a non-conductor (resist the electricity) to a conductor (they conduct
electricity) when the electrical change is strong enough. The material the
transistor is made of loses its resistance to electricity and becomes a conductor
when the electricity gets strong enough. The ability of these materials (called
semi-conductors) to transition from a non-conducting to a conducting state allows
them to take two electrical inputs and produce a different output only when one
or both inputs are switched on. A computer CPU is composed of millions (and
soon billions) of transistors. Because CPU's are so small, they are often referred
to as microprocessors. So, the terms processor, microprocessor and CPU are
interchangeable. AMD, IBM, Intel, Motorola, SGI and Sun are just a few of the
companies that make most of the CPU's used for various kinds of computers
including home desktops, office computers, mainframes and supercomputers.
Modern CPU's are what are called 'integrated chips'. The idea behind an
integrated chip is that several types of components are integrated into a single
piece of silicon (a single CPU), such as one or more execution cores, arithmetic
17
logic unit (ALU) or 'floating point' processor, registers, instruction memory,
cache memory and the input/output controller (bus controller).
Each transistor is a receives a set of inputs and produces output. When one or
more of the inputs receive electricity, the combined charge changes the state of
the transistor internally and you get a result out the other side. This simple effect
of the transistor is what makes it possible for the computer to count and perform
logical operations, all of which we call processing.
A modern computer's CPU usually contains an execution core with two or more
instruction pipelines, a data and address bus, a dedicated arithmetic logic unit
(ALU, also called the math co-processor), and in some cases special high-speed
memory for caching program instructions from RAM.
Generations
CPU Components
A lot of components go into building a modern computer processor and just what
goes in changes with every generation as engineers and scientists find new, more
efficient ways to do old tasks.
• Execution Core(s)
• Data Bus
• Address Bus
• Math Co-processor
• Instruction sets / Microcode
• Multimedia extensions
• Registers
• Flags
• Pipelining
• Memory Controller
• Cache Memory (L1, L2 and L3)
18
Block Diagram of Computer :
A computer can process data, pictures, sound and graphics. They can solve highly
complicated problems quickly and accurately.
Input Unit:
Computers need to receive data and instruction in order to solve any problem.
Therefore we need to input the data and instructions into the computers. The
input unit consists of one or more input devices. Keyboard is the one of the most
commonly used input device. Other commonly used input devices are the mouse,
floppy disk drive, magnetic tape, etc. All the input devices perform the following
functions.
•Accept the data and instructions from the outside world.
•Convert it to a form that the computer can understand.
•Supply the converted data to the computer system for further processing.
Storage Unit:
The storage unit of the computer holds data and instructions that are entered
through the input unit, before they are processed. It preserves the intermediate
and final results before these are sent to the output devices. It also saves the data
for the later use. The various storage devices of a computer system are divided
into two categories.
1. Primary Storage: Stores and provides very fast. This memory is generally
used to hold the program being currently executed in the computer, the data being
received from the input unit, the intermediate and final results of the program.
The primary memory is temporary in nature. The data is lost, when the computer
is switched off. In order to store the data permanently, the data has to be
transferred to the secondary memory. The cost of the primary storage is more
19
compared to the secondary storage. Therefore most computers have limited
primary storage capacity.
Memory Size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a
number is represented by an 8 bit code.
The set of 8 bits is called a byte.
A character occupies 1 byte space.
A numeric occupies 2 byte space.
Byte is the space occupied in the memory.
The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte).
One KB is equal to 1024 bytes and one MB is equal to 1000KB. The size of the
primary storage in a typical PC usually starts at 16MB. PCs having 32 MB,
48MB, 128 MB, 256MB memory are quite common.
Output Unit:
All calculations are performed in the Arithmetic Logic Unit (ALU) of the
computer. It also does comparison and takes decision. The ALU can perform
basic operations such as addition, subtraction, multiplication, division, etc and
does logic operations viz, >, <, =, ‘etc. Whenever calculations are required, the
control unit transfers the data from storage unit to ALU once the computations
are done, the results are transferred to the storage unit by the control unit and then
it is send to the output unit for displaying results.
There are 4 types of arithmetic operations that the CPU can perform...
1. Addition
2. Subtraction
3. Multiplication
4. Division
20
The ALU will also perform logical operations. This is simply a comparison
operation. Does A = B? It can compare numbers, letters, and some special
characters. The CPU will then take action based on the outcome of this operation.
This is central to the CPU and allows it to be able to tell you things like...
Control Unit:
It controls all other units in the computer. The control unit instructs the input unit,
where to store the data after receiving it from the user. It controls the flow of data
and instructions from the storage unit to ALU. It also controls the flow of results
from the ALU to the storage unit. The control unit is generally referred as the
central nervous system of the computer that control and synchronizes its working.
The control unit and ALU of the computer are together known as the Central
Processing Unit (CPU). The CPU is like brain performs the following functions:
• It performs all calculations.
• It takes all decisions.
• It controls all units of the computer.
A PC may have CPU-IC such as Intel 8088, 80286, 80386, 80486, Celeron,
Pentium, Pentium Pro, Pentium II, Pentium III, Pentium IV, Dual Core, and
AMD etc.
Related Posts:
• Internal parts of CPU
• What is RAM and what are its functions
• Classification of computers based on memory size
• What is an operating system? What are its functions?
• What is a hard disk? What are its features
Input/output Devices
Contents:
II. Input Devices :- Keyboard, mouse, joystick, scanners, digital camera, bar code
reader, touch Screen, Speech input device (microphone)
21
(a) Keyboard
It is a text base input device that allows the user to input alphabets, numbers and
Other characters. It consists of a set of keys mounted on a board.
Alphanumeric Keypad
Function Keys
There are twelve function keys labeled F1, F2, and F3… F12. The functions
assigned to these keys differ from one software package to another. These keys
are also user programmable keys.
Special-function Keys
These keys have special functions assigned to them and can be used only for
those
specific purposes. Functions of some of the important keys are defined below.
Enter : It is similar to the ‘return’ key of the typewriter and is used to execute
a command or program.
Backspace : This key is used to move the cursor one position to the left and
also delete the character in that position.
Insert : Insert key is used to toggle between insert and overwrite mode
during data entry.
Shift : This key is used to type capital letters when pressed along with an
alphabet key. Also used to type the special characters located on the upper-side
of a key that has two characters defined on the same key.
Caps Lock : Cap Lock is used to toggle between the capital lock features. When
‘on’, it locks the alphanumeric keypad for capital letters input only.
22
Tab : Tab is used to move the cursor to the next tab position defined in the
document. Also,it is used to insert indentation into a document.
Ctrl : Used with combination key ex Ctrl S for Save the File
Alt : Also like the control key, Alt key is always used in combination with
other keys to perform specific tasks.
Esc : This key is usually used to negate a command. Also used to cancel or
abort executing programs.
Numeric Keypad : Numeric keypad is located on the right side of the keyboard
and consists of keys having numbers (0 to 9) and mathematical operators (+ −* /)
defined on them. This keypad is provided to support quick entry for numeric data.
Cursor Movement Keys : These are arrow keys and are used to move the cursor
in the direction indicated by the arrow (up, down, left, right).
(b) Mouse : The mouse is a small device used to point to a particular place on
the screen and select in order to perform one or more actions. It can be used to
select menu commands, size windows, start programs etc. The most conventional
kind of mouse has two buttons on top: the left one being used most frequently.
Mouse Actions
(c) Joystick
The joystick is a vertical stick which moves the graphic cursor in a direction the
stick is moved. It typically has a button on top that is used to select the option
23
pointed by the cursor. Joystick is used as an input device primarily used with
video games, training simulators and controlling robots
(d) Scanner
Scanner is an input device used for direct data entry from the source document
into the computer system. It converts the document image into digital form so
that it can be fed into the computer. Capturing information like this reduces the
possibility of errors typically experienced during large data entry. Hand-held
scanners are commonly seen in big stores to scan codes and price information for
each of the items. They are also termed the bar code readers.
A bar code is a set of lines of different thicknesses that represent a number. Bar
Code Readers are used to input data from bar codes. Most products in shops have
bar codes on them .Bar code readers work by shining a beam of light on the lines
that make up the bar code and detecting the amount of light that is reflected back.
It is a pen shaped device used to select objects on a display screen. It is quite like
the mouse (in its functionality) but uses a light pen to move the pointer and select
any object on the screen by pointing to the object. Users of Computer Aided
Design (CAD) applications commonly use the light pens to directly draw on
screen.
A digital camera can store many more pictures than an ordinary camera. Pictures
taken using a digital camera are stored inside its memory and can be transferred
to a
computer by connecting the camera to it. A digital camera takes pictures by
converting the light passing through the lens at the front into a digital image.
24
The “Microphones - Speech Recognition” is a speech Input device. To operate it
we require using a microphone to talk to the computer. Also we need to add a
sound card to the computer. The Sound card digitizes audio input into 0/1s .A
speech recognition program can process the input and convert it into machine-
recognized commands or input.
Output Devices
(a) Monitor
Monitor is an output device that resembles the television screen and uses a
Cathode Ray Tube (CRT) to display information. The monitor is associated with
a keyboard for manual input of characters and displays the information as it is
keyed in. It also displays the program or application output. Like the television,
monitors are also available in different sizes.
(c) Printer
Printers are used to produce paper (commonly known as hardcopy) output. Based
on the technology used, they can be classified as Impact or Non-impact printers.
Impact printers use the typewriting printing mechanism wherein a hammer strikes
the paper through a ribbon in order to produce output. Dot-matrix and Character
printers fall under this category. Non-impact printers do not touch the paper while
printing. They use chemical, heat or electrical signals to etch the symbols on
paper. Inkjet, DeskJet, Laser, Thermal printers fall under this category of printers.
When we talk about printers we refer to two basic qualities associated with
printers: resolution, and speed. Print resolution is measured in terms of number of
dots per inch (dpi). Print speed is measured in terms of number of characters
printed in a unit of time and is represented as characters-per-second (cps), lines-
per-minute (lpm), or pages-per-minute (ppm).
(d) Plotter
25
(e) Audio Output: Sound Cards and Speakers:
The Audio output is the ability of the computer to output sound. Two components
are needed: Sound card – Plays contents of digitized recordings, Speakers –
Attached to sound card.
Summary:
The First Generation Computers was marked by the use of vacuum tubes for the
electronic components and by the use of electrostatic tubes or mercury delay lines
for storage.
The first computers used vacuum tubes for circuitry and magnetic drums for
memory, and were often enormous, taking up entire rooms. They were very
expensive to operate and in addition to using a great deal of electricity, generated
a lot of heat, which was often the cause of malfunctions. First generation
computers relied on machine language to perform operations, and they could only
solve one problem at a time. Input was based on punched cards and paper tape,
and output was displayed on printouts.
26
The First Generation (1951-1959)
• 1951: Mauchly and Eckert built the UNIVAC I, the first computer designed and
sold commercially, specifically for business data-processing applications.
• 1950s : Dr. Grace Murray Hopper developed the UNIVAC I compiler.
• 1957 : The programming language FORTRAN (FORmula TRANslator) was
designed by John Backus, an IBM engineer.
• 1959 : Jack St. Clair Kilby and Robert Noyce of Texas Instruments
manufactured the first integrated circuit, or chip, which is a collection of tiny
little transistors.
The second generation computers are initially marked by either magnetic drum or
magnetic core storage and later by the use of the transistor in the place of vacuum
tubes.
1. Magnetic core was used as primary storage device and tape as secondary
storage.
2. Used transistor circuits, hence the size of the computer was small compared to
that of first generation computer.
3. Greater reliability and higher speed, when compared to that of first generation
computers.
4. Uses high level procedural languages viz., FORTRAN (Formula Translator)
1954-57, COBOL (Common Business Oriented Language) 1957-61.
5. They are small, faster and required less power to operate.
27
6. Applications: Payroll, Inventory, Accounts Receivable, in large and medium
sized companies:
Ex: IBM 700, 1401; ATLAS; ICL 1901
• 1960s : Gene Amdahl designed the IBM System/360 series of mainframe (G)
computers, the first general-purpose digital computers to use integrated circuits.
• 1961: Dr. Hopper was instrumental in developing the COBOL (Common
Business Oriented Language) programming language.
• 1963 : Ken Olsen, founder of DEC, produced the PDP-I, the first minicomputer
(G).
• 1965 : BASIC (Beginners All-purpose Symbolic Instruction Code)
programming language developed by Dr. Thomas Kurtz and Dr. John Kemeny.
The arrival of the third generation in the mid 1960’s proved to be an important
milestone in the evolution of computers. The development of the integrated
circuit was the hallmark of the third generation of computers. Transistors were
miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation
computers through keyboards and monitors and interfaced with an operating
system, which allowed the device to run many different applications at one time
with a central program that monitored the memory. Computers for the first time
became accessible to a mass audience because they were smaller and cheaper
than their predecessors.
28
10. Input and Output devices are improved.
11. Applications: Order Processing, air line reservation, real-time inventory
control etc.
12. Uses online, real time processing and multiprogramming operating system.
Ex: IBM/360/370; NCR 395; Burroughs-B6500.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple
introduced the Macintosh. Microprocessors also moved out of the realm of
desktop computers and into many areas of life as more and more everyday
products began to use microprocessors.
As these small computers became more powerful, they could be linked together
to form networks, which eventually led to the development of the Internet. Fourth
generation computers also saw the development of GUIs, the mouse and
handheld devices.
30
Fifth Generation - Present and Beyond: Artificial Intelligence
The term fifth generation was intended to convey the system as being a leap
beyond existing machines. Computers using vacuum tubes were called the first
generation; transistors and diodes, the second; ICs, the third; and those using
microprocessors, the fourth. Whereas previous computer generations had focused
on increasing the number of logic elements in a single CPU, the fifth generation,
it was widely believed at the time, would instead turn to massive numbers of
CPUs for added performance and self-organization.
By the end of 1982, the computers were used every where, in automobiles,
appliances, business information systems, and military hardware. With electronic
technology advancing rapidly, the use of computers expected to grow in coming
years. With the increased user requirements, the technology has evolved with
outstanding features.
Some of the important features of the future computers are:
31
7. Applications: Artificial Intelligence, Robots, Large Scale Corporate modeling,
oil exploration, star wars system and personal robots.
Advantages:
Speed: Computerization helps in processing the data placed in several data files
in no time. This is possible due to the high speed of computers for processing
data and CPU of the computer works at the speed of electricity which is the
highest ever attainable speed.
Accuracy: The data processed by the computer are highly accurate. The programs
written on the system checks and controls data before and during processing. It
detects invalid data and ensures high degree of accuracy and reliability of output
reports.
Flexibility: The modern digital computers can be used for a variety of purposes.
E.g. online processing, multiprogramming etc.
Choice of Configuration: Wide ranges of peripherals are available for many
computer systems, which allow business organization to select those which most
suit its processing requirements.
1. Storage capacity: Large volumes of data can be conveniently stored,
accessed and altered.
2. Management information: They can be used to provide useful information
of management for control and decision making.
3. Data Processing: Computer has lifted the heavy data processing constraint
with the manual system and has opened up new avenues for planning, control and
data experimentation.
4. Volume: Computers can store volumes of data and can retrieve the
desired information quickly. This is very useful in the areas like insurance, bank
accounts etc where large number of documents is handled every day.
5. Database: Computer facilities the establishment of database. Such a
database integrates data records and reduces data redundancy.
6. Reduction in paper work: The use of computers for data processing has
helped the management of business organizations to cope with increasing
problem of paper handling. The computers have speeded up the process and have
eliminated the paper needs through the storage of data in elaborately constructed
data bases and files.
7. Reduced cost: Though the initial investment for installing a computer is
high, but it substantially reduces the cost of each of its transaction. Cost reduction
occurs due to processing of huge data and record keeping.
32
8. Facilitates report preparation: Computer facilitates the preparation of
various types of reports required by organizational executives for the purpose of
decision making and control.
9. Reduce the space requirements: The use of computer for office activities
reduces the requirements of office space which otherwise is required.
10. Reduces the manpower requirement: The number of persons required for
performing various organizational activities will be reduced by using a computer
system.
11. Increased ability to perform computations: Computers perform
computations with a very high speed.
Diligence: Being a machine, it does not suffer from boredom, tiredness or lack of
concentration, even if millions of computations are to be performed by a
computer. It performs the calculations with same accuracy and speed.
Disadvantages:
1. Installing the computer requires a grueling and expensive task of system
analysis and design. There is a scarcity of computer professionals to do this.
2. Management tends to treat computer like ordinary equipment Viz., air
conditioning equipment, and keep themselves aloof from the system development
effort. Computer pervades the working of the entire organization and unless
managements involve themselves fully during the system development effort and
the employees, the customers, the vendors etc. are willing to accept the
computerized system and its outputs the system is bound to prove a failure.
3. The initial investment can be very high though this can be mitigated to
some extent by the rental and tax concessions.
4. Since the lead-time of installing is long and the hardware technology is a
rapidly advancing field, some of the peripherals/components may be rendered
obsolete before even they are installed.
5. The need to obtain stand by facilities in the event of breakdown of any
computerized systems. Manual systems, though slow, are vastly flexible. If the
format of a report, for example has to be changed, it can be readily done by
communicating the necessary instruction to the concerned staff whereas in a
computerized system, this would have to go through all the stages of systems
analysis and design before it is effected
33
There are two broad categories of software, system software and application
software. System software is a set of programs that manage the resources of a
computer system, so that they are used in an optimal fashion, provide routine
services such as copying data from one file to another and assist in the
development of applications programs.
System software consists of programs that assist the computer in the efficient
control, support, development and execution of application programs.
Application software on the other hand, performs specific tasks for the computer
user.
System software:
Application Software:
1. Starting the Computer: In most computers, the BIOS and the diagnostic
routines are contained in ROM. They are permanently available to other
programs to check equipment and perform input/output tasks. In addition, ROM
contains a bootstrap loader program that is used to start a computer.
34
The remainder of the operating system is contained in secondary memory.
When the computer is turned on, it automatically begins to execute the boot
program. This program first runs diagnostic programs to check the status of RAM
and of each of the attached system devices.
The boot program then reads in the operating system executive program from the
disk. The layout of the memory at this stage is shown in figure.
When the application program is running the operating system manages the
allocation of memory. When a user requests that a program be run, the operating
system allocates the memory required for the program instructions and for data.
Disk Copy A: B: (copies the contents of the disk in drive A, onto the disk on
drive B)
35
The programs written in Assembly Languages are machine dependant. They are
not portable. There are many low level languages. They are machine dependant.
For example
IBM – Assembly language.
ICL – System 4 user code.
Honey well – Easy coder.
Advantages:
• Programs written in machine language are replaced by mnemonics which are
easier to remember.
• It is not required to keep track of memory locations.
• Easy to make insertions and deletions.
• Requires fewer instructions to accomplish the same result.
Disadvantages:
• Programs written in such languages cannot be executed on small sized
computers.
• It takes lot of time to code or write the program, as it is more complex in
nature.
• Lack of portability of program between computers of different makes.
What is Hardware
A hardware upgrade is any new hardware that replaces or adds to old hardware
in the computer. A good example of a common hardware upgrade is a RAM
upgrade, where the user is increasing the computers total memory, which will
increase its overall speed and efficiency. Another good example is doing a video
card upgrade, which is the act of removing the old video card and replacing it
with a new video card that is much more capable than the previously installed
video card, again increasing the capabilities of the computer.
36
• Motherboard
• RAM
• Sound card
• Video card
External hardware examples
• Flat-panel, Monitor, and LCD
• Keyboard
• Mouse
• Printer
• Scanner
Computer hardware related questions
• What are the differences between hardware and software?
• Computer hardware questions and answers.
• Full listing of computer hardware devices, support, and help.
Not everybody has exactly the same hardware. But those of you who have a
desktop system, like the example shown in Figure 1, probably have most of the
components shown in that same figure. Those of you with notebook computers
probably have most of the same components. Only in your case the components
are all integrated into a single book-sized portable unit.
Figure 1
The system unit is the actual computer; everything else is called a peripheral
device. Your computer's system unit probably has at least one floppy disk drive,
and one CD or DVD drive, into which you can insert floppy disks and CDs.
There's another disk drive, called the hard disk inside the system unit, as shown
in Figure 2. You can't remove that disk, or even see it. But it's there. And
everything that's currently "in your computer" is actually stored on that hard disk.
(We know this because there is no place else inside the computer where you can
store information!).
37
Figure 2
The floppy drive and CD drive are often referred to as drives with removable
media or removable drives for short, because you can remove whatever disk is
currently in the drive, and replace it with another. Your computer's hard disk can
store as much information as tens of thousands of floppy disks, so don't worry
about running out of space on your hard disk any time soon. As a rule, you want
to store everything you create or download on your hard disk. Use the floppy
disks and CDs to send copies of files through the mail, or to make backup copies
of important items.
There's too much "stuff" on your computer's hard disk to use it all at the same
time. During the average session sitting at the computer, you'll probably use only
a small amount of all that's available. The stuff you're working with at any given
moment is stored in random access memory (often abbreviated RAM, and often
called simply "memory"). The advantage using RAM to store whatever you're
working on at the moment is that RAM is very fast. Much faster than any disk.
For you, "fast" translates to less time waiting and more time being productive.
So if RAM is so fast, why not put everything in it? Why has a hard disk at all?
The answer to that lies in the fact that RAM is volatile. As soon as the computer
is shut off, whether intentionally or by an accidental power outage, everything in
RAM disappears, just as quickly as a light bulb goes out when the plug is pulled.
So you don't want to rely on RAM to hold everything. A disk, on the other hand,
holds its information whether the power is on or off.
All of the information that's "in your computer", so to speak, is stored on your
computer's hard disk. You never see that actual hard disk because it's sealed
inside a special housing and needs to stay that way. Unlike RAM, which is
volatile, the hard disk can hold information forever -- with or without electricity.
Most modern hard disks have tens of billions of bytes of storage space on them.
Which, in English, means that you can create, save, and download files for
months or years without using up all the storage space it provides?
38
In the unlikely event that you do manage to fill up your hard disk, Windows will
start showing a little message on the screen that reads "You are running low on
disk space" well in advance of any problems. In fact, if that message appears, it
won't until you're down to about 800 MB of free space. And 800 MB of empty
space is equal to about 600 blank floppy disks. That's still plenty of room!
The Mouse
Obviously you know how to use your mouse, since you must have used it to get
here. But let's take a look at the facts and buzzwords anyway. Your mouse
probably has at least two buttons on it. The button on the left is called the
primary mouse button, the button on the right is called the secondary mouse
button or just the right mouse button. I'll just refer to them as the left and right
mouse buttons.
Types Of Hardware
System Unit
• Motherboard
• Hard Disk
• ROM BIOS
• Input Devices
• CPU
• RAM
• CD-ROM
• Output Devices
What is Software?
Software is the general term for information that's recorded onto some kind of
medium. For example, when you go to the video store and rent or buy a tape or
DVD, what you're really getting is the software that's stored on that tape or disk.
You’re VCR or DVD player are hardware devices that are capable of reading the
software from a tape or disk and projecting it onto your TV screen, in the form of
a movie.
Your computer is a hardware device that reads software too. Most of the software
on your computer comes in the form of programs. A program consists of
"instructions" that tell the computer what to do, how to behave. Just as there are
thousands of albums you can buy on CD for your stereo, and thousands of movies
you can buy to play on your VCR or DVD player, there are thousands of
programs that you can buy to run on your computer.
39
When you buy a computer, you don't automatically get every program produced
by every software company in the world. You usually get some programs. For
example, when you buy a computer it will probably have an operating system
(like Windows XP) already installed on it.
When you purchase a program, you get the program stored on a CD as in the
example shown at left. You may not have seen any boxes containing software
when you bought your computer. That's because the software that came with your
computer has been pre-installed onto your computer's hard disk for you. You
don't need to use the CD to run a program that's already installed on your
computer. You only need to keep the CDs as backups, in case something goes
wrong with your hard disk and you need to re-install the programs.
Perhaps you're wondering what programs are installed on your computer. Usually
when you buy a computer, they tell you what programs you're getting with it. So
if you were to go back to the original ad from which you bought your computer,
you'd probably find the names of programs you already have listed there. Though
there's no need to do that, because every program that's currently installed on
your computer is listed in your All Programs menu (assuming you're using
Windows XP).
When you first open the Start menu, the left column lists programs you've used
the most recently (Figure a1). If your computer is brand new, then the programs
listed there will just be some examples.
40
Figure a1
That little list of program icons and names on the left side of the menu doesn't
represent all the programs that are currently installed on your computer. Not by a
long shot. The All Programs option on the Start menu provides access to all your
installed programs. When you first click on (or just point to) the All Programs
option, the All Programs menu that appears (Figure a2) will show icons and name
of program groups, as well as some programs.
Figure a2
It's easy to tell the difference between a program and a program group. The
program groups all have the same icon, and all have a right-pointing triangle ()
at their right side. When you click on, or point to, a program group, icons and
names of programs within that group appear on a submenu. The submenu will
contain programs within that group, and perhaps some more program groups. For
41
example, Figure a3 shows the result of clicking on the Accessories program
group in the All Programs menu. The submenu that opens contains more program
groups, and specific programs you can run.
Figure a3
Your Start menu won't look exactly like the one shown in the figures, because
different computers have different programs installed. (Just like different people
who own CD players own different CDs).
Running Programs
When you click on the icon for a program, the program opens. Which means the
program appears on the screen, so you can use it. Each program will appear in its
own program window on the Windows desktop. For example, in Figure a4 the
photograph in the background is the Windows desktop. Floating about on top of
that desktop are four different program, each in its own separate program
window.
Figure a4
While not two programs are exactly alike, most program windows contain certain
similar elements. Stretched across the top of the program window is the title bar,
which usually shows the name of the program that's inside the program window.
Beneath the title bar is the menu bar, which gives you access to the tools and
capabilities of that specific program. Many programs have a toolbar under their
42
menu bar. The toolbar provides quick one-click access to frequently-used
commands in the menu bar. The status bar at the bottom of a program provides
general information. Figure a5 shows, in animated form, the title bar, menu bar,
toolbar, and status bar of several different sample programs.
Figure a5
INTRODUCTION
When the computer starts, it starts the operating system that takes the control of
the machine. An Operating System is a set of programs that help in controlling
and managing the Hardware and the Software resources of a computer system. A
good operating system should have the following features;
1. Help in the loading of programs and data from external sources into the
internal memory before they are executed.
2. Help programs to perform input/output operations, such as;
43
OBJECTIVES
As the name suggests, the operating System is used for operating the system or
the computer. It is a set of computer programs and also known as DOS (Disk
Operating System). The main functions of DOS are to manage disk files, allocate
system resources according to the requirement. DOS provides features essential
to control hardware devices such as Keyboard, Screen, Disk Devices, Printers,
Modems and programs.
Basically, DOS is the medium through which the user and external devices
attached to the system communicate with the system. DOS translate the
command issued by the user in the format that is understandable by the computer
and instruct computer to work accordingly. It also translates the result and any
error message in the format for the user to understand.
WILDCARD CHARACTERS
If you want to carry out a task for a group of files whose names have
something in common, you can use wildcard characters to specify groups of
files. DOS recognize two wildcard characters: asterisk (*) represents one or
more characters that a group of files has in common; and the question
mark (?) represents a single character that a group of files has in common
Internal Commands
44
COPY Copies one or more files to another location.
MD Creates a directory.
RD Removes a directory.
External Command
45
ATTRIB
Sets or displays the read-only, archive, system, and hidden attributes of a file or
directory.
FORMAT
DOSKEY
Loads the Doskey program into memory which can be used to recall DOS
commands so that you can edit them.
BACKUP
Makes a backup copy of one or more files. (In DOS Version 6, this program is
stored on the DOS supplemental disk.)
CHKDSK
Deletes (erases) a directory including all files and subdirectories that are in it.
EDIT
Starts the MS-DOS editor, a text editor used to create and edit ASCII text files.
46
LABEL
EXPAND
What Is Dbms?
As the tool that is employed in the broad practice of managing databases, the
DBMS is marketed in many forms. Some of the more popular examples of
DBMS solutions include Microsoft Access, FileMaker, DB2, and Oracle. All
these products provide for the creation of a series of rights or privileges that can
be associated with a specific user. This means that it is possible to designate one
or more database administrators who may control each function, as well as
provide other users with various levels of administration rights. This flexibility
makes the task of using DBMS methods to oversee a system something that can
be centrally controlled, or allocated to several different people.
What is ICT ?
Lets focus on the three words behind ICT:
-INFORMATION -COMMUNICATIONS -TECHNOLOGY
47
A good way to think about ICT is to consider all the uses of digital technology
that already exist to help individuals, businesses and organizations use
information.
What is Linux ?
attrib chmod
backup tar
dir ls
cls clear
copy cp
del rm
deltree rm -R
rmdir
move / rename mv
48
cd cd
chdir
md mkdir
What Is Virus ?
Computer Viruses
Boot Sector viruses: A boot sector virus infects diskettes and hard drives. All
disks and hard drives contain smaller sections called sectors. The first sector is
called the boot. The boot carries the Mater Boot Record (MBR). MBR functions
to read and load the operating system. So, if a virus infects the boot or MBR of a
disk, such as a floppy disk, your hard drive can become infected, if you re-boot
your computer while the infected disk is in the drive. Once your hard drive is
infected all diskettes that you use in your computer will be infected. Boot sector
viruses often spread to other computers by the use of shared infected disks and
pirated software applications. The best way to disinfect your computer of the boot
sector virus is by using antivirus software.
49
Program viruses: A program virus becomes active when the program file
(usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is
opened. Once active, the virus will make copies of itself and will infect other
programs on the computer.
Multipartite viruses:
Stealth viruses:
Polymorphic viruses:
Macro Viruses:
Trojan Horse Viruses
Blaster
Comparison chart
Improve
Hardware Software
this chart
System software,
Input,storage,processing,control, and output
Types: Programming software, and
devices.
Application software.
To deliver its set of
Inter Hardware starts functioning once software is
instructions, Software is
dependency: loaded.
installed on hardware.
Reliability: Hardware stays at steady reliability level in useful Software needs constant
50
Improve
Hardware Software
this chart
life. testing after upgrades.
Software failure is systematic.
Hardware failure is random. Hardware does have
Failure: Software does not have an
increasing failure at the last stage.
increasing failure rate.
To perform the specific task
Hardware serves as the delivery system for you need to complete.
software solutions. The hardware of a computer is Software is generally not
Function: infrequently changed, in comparison with software needed to for the hardware to
and data, which are “soft” in the sense that they are perform its basic level tasks
readily created, modified, or erased on the compute such as turning on and
responding to input.
Fault: Hardware faults are physical. Software faults are not.
Software does not wear out
Lifetime: Hardware wears out over time.
over time.
Nature: It is physical in nature It is logical in nature
Collection of instructions that
enables a user to interact with
the computer. Software is a
Devices required to store and execute (or run) the program that enables a
Definition:
software. computer to perform a specific
task, as opposed to the
physical components of the
system (hardware).
QuickBooks, Adobe Acrobat,
CD-ROM, monitor, printer, video card, scanners ,
Examples: Internet Explorer , Microsoft
label makers, routers , and modems.
Word , Microsoft Excel
What is computer hardware? What are the different kinds of computer hardware?
For the examples of computer hardware and peripheral devices, read on..
Hardware is the physical aspect of a computer. While computer software exists in
the form of ideas and concepts, computer hardware exists in substance. By
definition, the different parts of a computer that can be touched constitute
computer hardware. Computer hardware includes central processing unit,
motherboard, microchips as well as computer peripherals like input-output and
storage devices that are added to a host computer to enhance its abilities. Here is
an overview of the different kinds of computer hardware.
Here is a list of some of the fundamental units of a computer that form the set of
hardware components.
Central Processing Unit: It is a set of logic machines that can execute computer
programs. The fundamental function of a CPU is to execute sequences of stored
instructions known as programs. During its first step of operation, the processor
retrieves instructions from the program memory. This step is known as the 'fetch'
step. In the 'decode' step, the processor breaks up the instructions into parts after
which it is executed. During the fourth step of write back, the CPU writes back
the results of the processed instructions into memory.
Computer fan: It is attached to the CPU and is used to lower the temperature of
a computer. There are several fans in the computer case, which help maintain a
constant flow of air to the computer system.
52
forms the complex electronic system of a computer. A motherboard provides the
computer system with all the electrical connections, the basic circuitry and
components required for its functioning.
RAM: Short for random access memory, RAM is the physical memory of a
computer. It is used to store the currently running programs and is attached to the
motherboard.
Sound Card: It is a computer expansion card that enables the input and output of
audio signals to and from a computer. Sound cards provide multimedia
applications with the audio components.
Video Card: Video card that is also known as the graphics card is a hardware
component, which generates and outputs the images to a display.
Media Devices
Devices such as CDs, DVDs and Blue-ray disks are some of the popular
removable storage media that can store digital data. USB flash drives are the
relatively recent storage media that have become a rage today. Tape drives and
zip drives are less commonly used while the floppy disks are obsolete today.
Hard disks and solid-state drives are used for internal storage. Here is a brief
introduction to each of these storage media. Know all about the hard drives.
Blue-ray Disc: It is an optical disc storage media format. It obtains its name from
the blue laser that is used to read and write this type of disc. Owing to its shorter
wavelength, blue-ray discs can store large amounts of data. BD-ROM drive is
used for reading data from a blue-ray disc and a BD writer can be used for both
reading from and writing to a blue-ray disc.
Compact Disc: Popularly known as CDs, compact discs are storage devices for
storing digital data. Standard CDs can store around 80 minutes of audio. CD-
ROMs contain data that is accessible for reading and is not modifiable. CD-
ROMs are used for distribution of computer software and multimedia
applications. A CD Writer is an optical disc drive that uses laser radiation or
electromagnetic waves for reading and writing data onto discs.
53
Digital Versatile Disc: Commonly known as a digital video disk and abbreviated
as DVD, a digital versatile disk is an optical disc storage media. With physical
dimensions similar to those of a compact disc, DVDs can store data as much as
six times more than a CD. A DVD-ROM Drive is used for reading data from a
DVD. A DVD Writer is used for reading and writing data to a DVD. DVD-RAM
Drives allow data to be read and written rapidly from specific types of DVDs.
HD DVD is a high-density optical disc format that succeeded DVD.
Disc Array Controller: It manages physical disc drives and brings them to the
form of logical units. It provides a disk cache and implements hardware RAID.
Floppy Disc: It is a data storage media that is a disk of a thin magnetic storage
medium covered by a plastic shell. With the advent of flash and optical storage
devices, floppy discs have become obsolete.
Hard Disk: It is a non-volatile storage device that stores digital data on magnetic
surfaces. It is used for medium-term storage of data.
Solid-state Drive: This storage device uses solid-state memory to store persistent
data. It can replace the hard disk drive in many applications.
Tape Drive: This data storage device reads and writes data stored on a magnetic
tape. Tape drives have storage capacities ranging from a few megabytes to
multiple gigabytes. They are mainly used for archival storage of data.
Zip Drive: Iomega came up with this medium-capacity storage media in 1994. It
had a capacity of about 100 MB. Zip drives could never become standardized and
were replaced by rewritable CDs.
Modem: This device is used for dial-up connections. It modulates analog carrier
signals to encode digital information and demodulates it to decode the
information transmitted.
54
Network Card: It is one of the most important pieces of hardware as it allows a
computer to communicate with other computers over a network. It serves as a
networking medium and provides the computers with a MAC address system. A
network card is also known as a network adapter, a LAN card and better known
as a NIC.
Router: Routers are not exactly pieces of hardware. Rather, they are devices that
are used to join multiple wired or wireless computer networks. Know all about
routers.
Computer Peripherals
Apart from the hardware components of a computer, there are many external
devices that are equally important for the functioning of a computer. Keyboard,
mouse and the visual display of a computer form its basic input and output
devices. Joysticks, game controllers and other pointing devices are commonly
used for the gaming applications on a computer. Headphones, speakers,
microphones and webcams are popularly used for running multimedia
applications on a computer. Let us look at some exam. of these peripheral
devices.
Headphones: It consists of a pair of small loud speakers, which can be held close
to the ears. They can be connected to an audio-frequency source such as an
amplifier or a CD player. Know more about headphones.
Joystick: It is an input device that consists of a stick that is pivoted on a base and
indicates its direction to the device it controls. Joysticks are popularly used in
video games and mobile phones.
55
Mouse: A computer mouse is a pointing device that detects two-dimensional
motion. The motion of a mouse translates into the motion of a pointer on the
computer display, enabling the user to control a graphical user interface.
Speaker: Computer speakers are external audio devices that enable the computer
users to listen to audio media. Multimedia speakers consist of an internal
amplifier. It has a jack connecting it to the sound cards.
Trackball: It is a pointing device that comprises a mouse along with a ball with
sensors to sense rotational motion. Trackballs find utility in special-purpose
workstations and video games.
Webcam: A web camera is a small camera that is widely used with video
conferencing and instant messaging services. Web cameras are digital cameras,
which can upload images to a web server.
This was an introduction to the different kinds of hardware with examples. You
might want some tips on purchasing network hardware. With the advancement in
computer technology, we can look forward to the creation of many more
hardware components that translate technology to action!
Well, if you start writing the list of computer parts, right from the miniature
components, the list will get very long. So why not explain the parts, grouping
them, depending on the purpose they solve. This list will also help you in
designing, or at least selecting, the configuration for your computer. Let us start
with the basic list of parts in a computer, which you need to have, irrespective of
the purpose for which you want to use your computer.
56
LCD Monitor
It is not required to mention that this is one of the most important peripherals of
your computer. The computer monitor is your computers display device and in
most of the cases, the only source of output from your computer. Your exact
requirements will largely determine the LCD you purchase. While some may
prefer a High-Def system at 1920x1080, others may be satisfied with a
1280x1024 pixels, 17 inch LCD. To ensure that you make full use of your LCD,
check your video card abilities. Although VGA can still be used on many video
cards, LCDs are typically connected with a DVI cable. If your video adapter has a
DVI port, you can get a cable to use it with a VGA-ported LCD.
Keyboard
Most people wonder, how can keyboards differ? But computer keyboards
manufactured by different vendors have different facilities. There are some that
provide keys for internet access, while some provide keys for games. Some have
keys for increasing or decreasing the volume, though this has been integrated in
almost all keyboards that are manufactured nowadays.
Mouse
This is the device, because of which, we don't have to remember the keyboards
shortcuts anymore. An optical mouse is always preferred, whether a laptop or
desktop. There are three modes of connecting an optical mouse; USB, wireless
and Bluetooth.
With the three basic peripherals explained, let us now try to understand the
detailed computer parts, as per our requirement.
Optical Drive
You will require an optical reader to read your CDs and DVDs. You can also get
a DVD-ROM R/W, can read and write both CDs and DVDs. You can consider
getting a Blue-ray drive to enhance the viewing pleasure on your LCD monitor.
Having a separate reader and burner for both reading and writing CDs and DVDs,
57
can avoid excessive use of the same lens, and hence increase the longevity of
your optical drive.
USB Ports
This is the age of USB devices. The storage capacities of USB storage devices
have also increased a lot. Check that you have got more than two USB ports in
your computer, for almost all components, like a mouse and USB flash drives
will need a USB port. Computer mouse, monitor, keyboard, printer etc. all come
along with the USB connection facility. You can add an external hard disk to
your computer too, using a USB port.
Printers/Scanners
These are the computer peripherals, which you can get as per your requirement. If
you have a job of desktop publishing, then printers and scanners are among the
parts that will be an integral part of your infrastructure.
A great safety device for your computer, a surge protector will enable you to plug
all your power chords to one power source and protect your computer against
power surges in case of power outage. An UPS will buy you vital time to save
your file or important work in case of a blackout.
What I have listed above, can more accurately be termed as computer peripherals
rather than computer parts. Now, let's take a look at those, which are inside the
CPU (Central Processing Unit).
Motherboard
This is perhaps the most important part of your computer. This is where all your
computer peripherals and components are connected to and most importantly, the
CPU is mounted on the computer motherboard. It is nothing but a PCB (Printed
Circuit Board), which holds and provides connections to different components.
When selecting a motherboard, you should take into consideration, the processor
which you are going to use. Not all processors are compatible to all
motherboards. For example, socket motherboards are compatible with AMD
Athlons, whereas socket 478 motherboards are compatible with Pentium 4
processors.
CPU
58
computer buying process. There are 32 bits and 64 bits processors available in the
market. Get a proper review of the 32 bits and 64 bits processors, before selecting
the computer processor you want. AMD and Intel are the two major players in
this field. Review the AMD and Intel chips, before selecting the CPU for your
computer. The other most important factor that you need to take care of is the
processor speed. The unit of processor speed is GHz/sec.
RAM
It is generally assumed that the more the storage capacity of the RAM, the faster
the computer. This is because the RAM is the primary storage device in a
computer. Your RAM also needs to be compatible with the computer processor
you are using. DDR SDRAM is the most used RAM nowadays. It is compatible
with socket A as well as socket 478 motherboards.
Storage Devices
The most important storage devices within any CPU, is the hard disk. The storage
space in your computer again depends upon its use. If you are a movie freak and
want to make a collection, then you will require high storage capacity. The hard
disk space is generally measured in Gigabytes. Since hard disks generally come
very cheap nowadays, it is always better to use a hard disk with a high storage
capacity. There are also, high memory portable storage devices available in the
market, which can be connected to your computer using the USB port. There are
two different types of hard disks that are available in the market, namely the
serial and the parallel. The SATA hard disks are serial devices and have high data
transfer rates. The parallel hard disks are known as PATA. You can take a review
of the different types of hard drives too, before selecting the one which best suits
your purpose.
Graphics Card
Now, suppose you want to configure a computer that is compatible with almost
all types of PC games. The gaming parts, will include almost all the components
and peripherals that have been mentioned above, but with, what I would term as
'higher values'. You will require a processor with a greater speed, a larger storage
hard disk, s RAM with a larger capacity and a TFT screen for better display. In
addition to all these, you will require a graphics card. If you want to play the
latest multimedia games, then a graphics card is the utmost necessity. Many
computers come along with built-in graphics card, while many of them just
provide the graphics card slot. If the graphics card provided by your computer
manufacturer does not solve your purpose, then you can replace the graphics card
with another one of your choice. The Nvidia Gforce and ATI Radeon are among
the top competitors in this field.
59
Sound Card
What I have listed above is the most common computer parts, which you have to
take into consideration before getting a computer or upgrading your existing one.
Ensure that you have studied the reviews of all the components in the list
mentioned above, before configuring your computer. There are various other
details like the type of cabinet and UPS, which you will also need to take into
consideration.
There are a number of output devices which deliver data processed by the
computer to the user. Let's find out which are these.
In the world of computers, input/output (I/O) refers to the communication
between a computer and the user. Input is
the data sent to the system, whereas output
is the data sent by the system to the outside
world. Output devices are computer
hardware equipment that is used to
communicate the results of data processing
carried out by a computer to the user. There
are a number of devices, which produce
data in different forms, which includes
audio, video or hard copy. Output device of computer are types of peripheral
hardware connected that is connected to the computer, either using cables or over
a wireless network. Immaterial whether you have desktop computers, laptop
computers, supercomputers, etc., you will require at least one output device.
An output given by the computer can be in the form of a display on the screen or
a printed document or a song that is played. Most of the computer output devices
are common to home as well as office environment. At the same time, there are
some devices, which are not as commonly available. Having said that, let's take a
look at output devices list.
Monitor
A monitor is also called video display terminal (VDT). The visual display of the
processed data, which the users can view is got through the monitor. Computer
60
monitors come in a variety of screen sizes and not to forget visual resolutions.
There are two types of computer monitors available, namely CRT and flat panel.
All monitors rely in a video card, which is located on the motherboard to display
the information. It is the video card, which processes the data into images, which
is eventually displayed on the monitor.
Printer
Next is the printer, which is an external hardware device, which takes processed
data from the computer to generate a hard copy of the data. After the monitors,
printers are the most used peripherals on computers and they are commonly used
to print text data, images, etc. There are three main types of computer printers,
namely ink jet, laser printers and dot matrix. Each of this printer type uses a
different technology to print the data.
Speaker
A speaker is a hardware device that is connected to a computer's sound card,
which outputs sound generated by the card. Audio data generated by the
computer is sent to the audio card that is located in the expansion slot. The card
translates the data into audio signals, which are then sent to either the speakers or
headphones. In the initial phase, computers had on-board speakers, which
generated series of different tones and beeps. When the popularity of multimedia
and computer games grew, higher quality computer speakers came into the
market. These new speakers were known for higher quality sound effects and
music.
Projector
Plotter
Plotters, like printers, create a hard copy rendition of a digitally rendered design.
The design is sent to a plotter through a graphics card and the image is created
using a pen. In simple words, plotters basically draw an image using a series of
straight lines. This device is used with engineering applications.
Discs
There are different types of discs, such as CD, DVD and floppy discs, which are
output devices that are also used to store data, hence they are also input devices at
61
the same time. The data is sent to the disc and the data is embedded on the disc,
which is retrieved, when required.
All computers might not have all the output devices, but it certainly does have
one of the visual output devices, namely either a monitor or projector.
Hardware
All physical contents of computer are hardware. This form is given to all
electrical and mechanical devices attached to the computer for the purpose of
input, process, and storage and output operations. Primary Hardware: is the CPU
and its other units i.e. circuits and IC's. Secondary Hardware: is the memory or
storage area of computer.
Software
Software is a general term used for computer Programs. A computer program is a
planned, step by step set of instructions that directs the computer what to do and
how to do. It turns the data into information - that makes a computer useful.
Types Of Software
Generally speaking, software can be categorized as: (1) System Software (2)
Application Software
System Software
The programs directly related to the computer hardware and perform tasks
associated with controlling and utilizing computer hardware is known as system
software. System software does not solve a specific problem for the user rather it
helps to solve a problem.
62
Some important tasks of an operating system are managing the resources of the
computer such as Central Processing Unit (CPU), memory, disk drives and
printer and running user programs. Every type of computer has its own operating
system. Operating system for mainframe and other large computers are very
complex since they must keep track of several programs from several users all
running in the same time frame.
Following are some of the popular operating systems used in personal computers:
DOS, Windows, Unix, Linux, Solaris, etc.
(iv) Editors
Editors allow the user to type-in a program, generate text and make modifications
whenever necessary. A program is first written in an editor and then is compiled.
63
It is possible that the compiler of any language has its own editor for writing
programs.
These are programs that users can purchase as separate products to perform a
wide range of functions. The programs for these functions are PC-Tools, Scan
Disk, Norton Disk Doctor (NDD), Antivirus and some of the utilities that are
mostly bundled with the operating system.
Application
General purpose software includes, MS Office, Corel Draw, Page maker, Adobe
Photo shop, etc.
(ii) Special Purpose Application Software
The software that is designed to perform a specific task is known as special
purpose application software. This I also called Custom software. The Software
can perform only one task for which it has been designed. Custom software for
the tasks of a large organization may be extremely complex and takes a lot of
time to develop.
For example, Software to process inventory control, software to maintain Bank
Accounts, Software used in Airline Booking System, etc.
Virtual Memory
If your computer lacks the random access memory (RAM) needed to run a
program or operation, Windows uses virtual memory to compensate. Virtual
memory combines your computer’s RAM with temporary space on your hard
64
disk. When RAM runs low, virtual memory moves data from RAM to a space
called a paging file. Moving data to and from the paging file frees up RAM to
complete its work.
The more RAM your computer has, the faster your programs will generally run.
If a lack of RAM is slowing your computer, you might be tempted to increase
virtual memory to compensate. However, your computer can read data from
RAM much more quickly than from a hard disk, so adding RAM is a better
solution Not real. The term virtual is popular among computer scientists and is
used in a wide variety of situations. In general, it distinguishes something that is
merely conceptual from something that has physical reality. For example, virtual
memory refers to an imaginary set of locations, or addresses, where you can store
data. It is imaginary in the sense that the memory area is not the same as the real
physical memory composed of transistors. The difference is a bit like the
difference between an architect's plans for a house and the actual house. A
computer scientist might call the plans a virtual house. Another analogy is the
difference between the brain and the mind. The mind is a virtual brain. It exists
conceptually, but the actual physical matter is the brain.
Physical Memory
Cache Memory
65
chip.) L2 is usually a separate static RAM (SRAM) chip. The main RAM is
usually a dynamic RAM (DRAM) chip.
In addition to cache memory, one can think of RAM itself as a cache of memory
for hard disk storage since all of RAM's contents come from the hard disk
initially when you turn your computer on and load the operating system (you are
loading it into RAM) and later as you start new applications and access new data.
RAM can also contain a special area called a disk cache that contains the data
most recently read in from the hard disk.
RAM, or random access memory, consists of one or more memory modules that
temporarily store data while a computer is running. RAM is volatile memory,
meaning it is erased when the power is turned off. Therefore, each time you start
up your computer, the operating system must be loaded from secondary memory
(such as a hard drive) into the primary memory, or RAM. Similarly, whenever
you launch an application on your computer, it is loaded into RAM.
The operating system and applications are loaded into primary memory, since
RAM can be accessed much faster than storage devices. In fact, the data can be
transferred between CPU and RAM more than a hundred times faster than
between the CPU and the hard drive. By loading data into RAM, programs can
run significantly faster and are much more responsive than if than constantly
accessed data from secondary memory.
NOTE: Primary memory may be called "primary storage" as well. However, this
term is somewhat more ambiguous since, depending on the context, primary
storage may also refer to internal storage devices, such as internal hard drives
• Registers: The CPU processes data and instructions with high speed;
there is also movement of data between various units of computer. It is necessary
to transfer the processed data with high speed. So the computer uses a number of
special memory units called registers. They are not part of the main memory but
they store data or information temporarily and pass it on as directed by the
control unit.
68
• Magnetic Tape: Magnetic tapes are used for large computers like
mainframe computers where large volume of data is stored for a longer time. In
PC also you can use tapes in the form of cassettes. The cost of storing data in
tapes is inexpensive. Tapes consist of magnetic materials that store data
permanently. It can be 12.5 mm to 25 mm wide plastic film-type and 500 meter
to 1200 meter long which is coated with magnetic material. The deck is
connected to the central processor and information is fed into or read from the
tape through the processor. It’s similar to cassette tape recorder.
• Magnetic Disk: You might have seen the gramophone record, which is
circular like a disk and coated with magnetic material. Magnetic disks used in
computer are made on the same principle. It rotates with very high speed inside
the computer drive. Data is stored on both the surface of the disk. Magnetic disks
are most popular for direct access storage device. Each disk consists of a number
of invisible concentric circles called tracks. Information is recorded on tracks of a
disk surface in the form of tiny magnetic spots. The presence of a magnetic spot
represents one bit and its absence represents zero bit. The information stored in a
disk can be read many times without affecting the stored data. So the reading
operation is non-destructive. But if you want to write a new data, then the
existing data is erased from the disk and new data is recorded. For Example-
Floppy Disk.
• Optical Disk: With every new application and software there is greater
demand for memory capacity. It is the necessity to store large volume of data that
has led to the development of optical disk storage medium. Optical disks can be
divided into the following categories:
While the memory of a hard disk drive is primarily used for long-term storage of
files and information, RAM memory is used by the computer while it actively
processes information.
When your computer is running a program, that software program is loaded from
the hard disk and stored into the computer's RAM memory upon usage.
Whenever you stop running that program, it is then taken from RAM memory
upon usage. Whenever you stop running that program, it is then taken from RAM
memory and stored back on the hard disk drive
There are various types of RAM memory currently in use today. These
definitions will help you to identify which types you should use in your computer
system:
69
DDR(Double Data Rate) :- The current standard for RAM memory modules,
DDR offers greater bandwidth than the older standard , SDRAM, DDR is only
available on more modern motherboards night now and it is best to check your
motherboard’s compatibility with DDR prior to purchasing it.
RDRAM ( Ram bus DRAM) :- RDRAM ships only with certain Pentium 4
systems at this time, or some outdated Pentium III systems. RDRAM is not used
with the AMD Duren or the AMD Athlon XP processors. RDRAM and DDR are
the two current best types of memory modulates you can get for both speed and
performance, however, RDRAM is much more expensive.
DRAM (Dynamic RAM) :- This older, "classic" form of RAM has been
supplanted by SDRAM and DRAM does not see much active use.
Currently DDR RAM is probably the best choice, but if may simply come down
to which motherboard you have. In many older Refurbished Computers, you
might still see SDRAM, but DDR2 is the most commonly used Unless you're
buying a computer system which has a newer type of motherboard build for DDR
RAM, you will probably be stuck using SDRAM
70
Because of its high speed, it is replacing EEPROM in many devices. The term
FRAM itself is a trademark of Ramtron.
Hard Disk
When you save data or install programs on your computer, the information is
typically written to your hard disk. The hard disk is a spindle of magnetic disks,
called platters, that record and store information. Because the data is stored
magnetically, information recorded to the hard disk remains intact after you turn
your computer off. This is an important distinction between the hard disk and
RAM, or memory, which is reset when the computer's power is turned off.
The hard disk is housed inside the hard drive, which reads and writes data to the
disk. The hard drive also transmits data back and forth between the CPU and the
disk. When you save data on your hard disk, the hard drive has to write
thousands, if not millions, of ones and zeros to the hard disk. It is an amazing
process to think about, but may also be a good incentive to keep a backup of your
data.
71
Types of Hard Disk Drives
Disk drive technologies have advanced quickly over recent years, making
terabytes of storage available at reasonable cost. When researching the type of
hard disk storage system appropriate for your needs, keep in mind the format and
data rate of the video you’re capturing. Depending on whether you work as an
independent video editor or collaborate with others, the amount of storage you
require and the bit rate of data transfer will be important factors to match up with
your storage needs. Outlining all of the hard disk storage technologies is beyond
the scope of this documentation, but four common choices include:
• ATA
• FireWire
• SCSI
• RAID and Fiber Channel
Comparison chart
RAM ROM
Stands for: Random Access Memory Read-only memory
It is non-volatile i.e. its
RAM is volatile i.e. its contents are lost contents are retained even
Volatility:
when the device is powered off. when the device is powered
off.
The types of ROM include
The two main types of RAM are static
Types: PROM, EPROM and
RAM and dynamic RAM.
EEPROM.
Use: RAM allows the computer to read data ROM stores the program
72
RAM ROM
quickly to run applications. It allows required to initially boot the
reading and writing. computer. It only allows
reading.
Random Access Memory or RAM is a Read-only memory or ROM
form of data storage that can be is also a form of data storage
Definition:
accessed randomly at any time, in any that cannot be easily altered
order and from any physical location. or reprogram
73
needs information that is in the book that he recently used, it is just within arm’s
reach and he doesn’t have to stand and walk to get it.
Algorithm
Step by step procedure designed to perform an operation, and which (like a map
or flowchart) will lead to the sought result if followed correctly. Algorithms have
a definite beginning and a definite end, and a finite number of steps. An
algorithm produces the same output information given the same input
information, and several short algorithms can be combined to perform complex
tasks such as writing a computer program. A cookbook recipe, a diagnosis, a
problem solving routine, are some common examples of simple algorithms.
Suitable for solving structured problems (amenable to sequential analysis)
algorithms are, however, unsuitable for problems where value judgments are
required.
Uses of Algorithms
• Algorithms are used in various fields -- computer programming,
mathematics and psychology, for example. They can even be used in baking.
They can be expressed in regular spoken language, in mathematical terms or in
computer programming languages. Algorithms can be used to make our daily
tasks simpler; you might write your own algorithm for baking a cake, for
example, or detailing the most efficient way to get ready for work.
When you are going to create an algorithms, keep following point in mind as:
Finiteness: If we trace the steps of an algorithm, then for all cases, the algorithm
must terminate after a finite number of steps.
Effectiveness: Each step must be sufficiently basic that a person using only paper
and pencil can in principle carry it out. In addition, not only each step is definite,
it must also be feasible.
74
Comment Session: Comment is additional info of program for easily
modification. In algorithm comment would be appear between two square
bracket []
Ans.
Ans.
step 1 : start
step 2 : input number
step 3 : rem=number mod 2
step 4 : if rem=0 then
print "number even"
else
print "number odd"
endif
step 5 : stop
`
Conditional Patterns
75
2. Write an algorithm to check whether a given number is +ve, -ve or a
zero.
C. On Iterational Patterns
76
2. Write an algorithm to print all the odd numbers between 1 and 10.
Sol- Step 1: Start
Step 2: Initialize Counter to 1 (Count =1)
Step 3: Print ‘Count’
Step 4: Count = Count + 2
Step 5: if Count < = 10 go to Step 3
Step 6: Stop
3. Write an algorithm to print all the even numbers between 1 and 10.
Sol- Step 1: Start
Step 2: Initialize Counter to 2 (Count =2)
Step 3: Print ‘Count’
Step 4: Count = Count + 2
Step 5: if Count < = 10 go to Step 3
Step 6: Stop
Like algorithms, flow charts can be used to symbolize efficient ways to do any
process. Flow charts can be used to document any kind of business process, from
the procurement of materials and movement of the materials to a factory to the
recruitment of a new employee from among a pool of candidates.
The symbols that are commonly used in Flowcharts (Viewgraph 3) have specific
meanings and are connected by arrows indicating the flow from one step to
another:
Oval. Ovals indicate both the starting point and the ending point of the process
steps.
77
Each path emerging from the diamond must be labeled with one of the possible
answers.
Programming Fundamentals
What is programming?
Once we have defined and analyzed the problem — decided on the output and the
input — we can go on to develop the solution.
The most important aspect of developing the solution is developing the logic to
solve the problem. This requires creating a set of step-by-step instructions and/or
rules called an algorithm. Each step performs a particular task. We can write
these steps in plain English.. The algorithm for the example on finding total
marks and average would look like this:
1. Note down the student’s marks in different subjects.
2. Find the total marks scored by the student.
3. Compute the average marks.
4. Assign grade.
5. Display average percentage of marks and grade.
6. End.
For any computer program to work well, it has to be written properly.
Formulating an effective algorithm will make writing an effective program easier.
For an algorithm to be effective, it has to have the following characteristics:
1. Finiteness: An algorithm should terminate after a fixed number of steps.
2. Definiteness: Each step of the algorithm should be defined precisely. There should
be no ambiguity.
3. Effectiveness: All the operations in the algorithm should be basic and be
performed within the time limit.
4. Input: An algorithm should have certain inputs.
5. Output: An algorithm should yield one or more outputs that are the result of
operations performed on the given input.
The famous mathematician, D.E. Knuth, first expressed these characteristics.
79
Once we develop the algorithm, we need to convert it into a computer program
using a programming language (a language used to develop computer programs).
A programming language is entirely different from the language we speak or
write. However, it also has a fixed set of words and rules (syntax or grammar)
that are used to write instructions for a computer to follow.
Programming languages can be divided into three types. They are:
1. Machine language
This is the basic language understood by a computer. This language is made up of
0’s and 1’s. A combination of these two digits represents characters, numbers,
and/or instructions. Machine language is also referred to as binary language.
2. Assembly language
This language uses codes such as ADD, MOV, and SUB to represent instructions.
These codes are called mnemonics. Though these codes have to be memorized,
assembly language is much easier to use than machine language.
3. High-level languages
High-level languages such as BASIC, FORTRAN, C, C++, and JAVA are very
much easier to use than machine language or assembly language because they
have words that are similar to English.
Most of us are used to answering the phone with a simple ‘hello’ at home. Some
of us tend to do the same at the workplace. However this sounds rude and
extremely unprofessional. When you receive a call at work, greet the person at
the other end (Good morning, good afternoon) and then state the name of your
company followed by your own name.
If you have made the call ensure that you identify yourself at the outset and state
the reason for the call.
The thumb rule for telephone calls at the workplace is that they should be brief,
precise, and to the point.
Electronic communication
We are living in the 21st century where we are besieged by electronic modes of
communication such as emails, speakerphones, car phones, cellular phones, and
fax machines.
If you are using the speakerphone make sure that you have informed the person at
the other end. While using cellular phones at the workplace make sure that you
have turned the ring volume low so that you do not disturb the people around
you. Car phones are useful if you have a job that dictates you spend more time on
the road then at your desk. Email is a quick and easy way to send messages to
people. However most people tend to regard it as an informal means of
communication even when it is used for professional reasons. While sending an
email remembers that you must adopt the same rules of propriety that you would
use while communicating with a person through a letter or any other mode of
written communication.
When you send a fax to someone always ensure that you send a cover letter
stating the sender’s name and telephone number, the recipient, the total number
of pages and the date. Never send unsolicited fax unless it is urgent.
Letters
Writing business letters is an art that most people need to cultivate. Unlike
friendly personal letters, business letters should be brief and to the point. Avoid
wasting the other person’s time with unnecessary trivia. Avoid trite and general
comments such as “Thank you for taking the time out of your busy schedule to
see me.” Instead try to be as precise and specific as possible. Avoid addressing
someone by the first name in the salutation and then signing off with your full
name. It conveys the impression that you are talking down to the other person.
Ensure that you use your business stationery for business reasons and personal
stationery for personal use. Avoid mixing up the two.
Office etiquette
82
Always make sure that you greet the people around you when you enter your
office.
While visiting another person at the workplace:
When you are visiting someone at his/her office ensure that you call ahead and
fix an appointment. Do not drop in unannounced. Ensure that you are punctual.
Observe the normal rules of decorum that you would follow when you visit
someone. Do not make yourself too comfortable at the other person’s office by
spreading your books and papers all over the person’s desk. Do not overstay your
welcome and linger beyond your allotted time. If you need more time ask if it is
convenient to the other person. If not you can reschedule another appointment.
When others visit you at the workplace:
If people visit you at your office remember that you are playing the role of a host
and act accordingly. Always get up and come around your desk to shake hands
with the other person. Indicate where you would like the person to sit. After the
discussion is over summarize the main points and the further action that needs to
be taken. Once the meeting is over escort the other person out of the office. Don’t
leave him/her to find his/her way out. It appears rude and ungracious to do so.
If you are busy or tied up in a meeting and cannot attend to your visitors
immediately, ensure that your secretary makes them comfortable.
Business entertaining
Many business meetings may be scheduled over meals during the day or outside
office hours after work. While attending a business meal ensure that you keep the
purpose in mind and that you stick to the allotted timeframes. Power breakfasts
are generally scheduled to discuss something urgent that is going to happen
during the course of the day. They may also be scheduled if the people involved
have busy schedules during the normal course of the day and cannot otherwise
find time for the meeting. Power breakfasts generally last for 45 minutes to an
hour.
Lunch meetings are generally held to establish contacts or entertain clients. They
usually last for an hour but may stretch up to two hours.
Business dinners should be handled with care or else they may peter out into a
social evening. If you are meeting a client for the first time doesn’t suggest a
business dinner unless the client specifically requests it. While scheduling a
business dinner remember that you are encroaching on a person’s personal time.
Business dinners are ideal for cementing professional relationships.
While paying for a business meal there are a few things you should keep in mind.
Whoever benefits from the meeting generally pays for it. If there is no clear
beneficiary the person who extends the invitation pays.
83
Directory and Files
Every picture, sound or document - including this webpage - which you use or
work with on a computer, is stored digitally on the computer's drive in its own
individual picture file, sound file or document file. All the pictures on this
webpage are stored as individual picture files, and the webpage itself is a special
type of document file that your Internet browser knows how to display on the
screen with the pictures and links in the right places.
If we could only organize the files on a computer in a long list, this would run
into several thousands, and while the computer would have no trouble with such
a huge list, it would be extremely difficult for a human to work with. In order to
organize files in a practical and useful way, we create computer directories - more
commonly called 'folders' - to group together files in whatever way we find
helpful, whether by date, type, or any other way that is helpful. So a directory is
an organizational tool for files. The usual way for a computer to show a directory
(as an icon, or picture symbol) is as a folder, because as far as the user is
concerned, that is the way a directory works.
Directories can, and very often do, have further sub-directories inside them, in
order to keep the numbers of files to a manageable level.
•Processor – Celeron
•Main Memory - 128 MB RAM
•Hard Disk - 20 GB IDE Hard Disk
•Removable Drives
–1.44 MB Floppy Disk Drive
–52X IDE CD-ROM Drive
•PS/2 HCL Keyboard and Mouse
Installation Procedure...
Connecting Your PC
•All the Connectors in your PC are in different colors for easy identification.
•Keyboard and Mouse - PS / 2 Port in Violet and Green respectively.
•Video Port - For Monitor in Blue Color
•Serial Port COM1/COM2 - for Serial Devices (e.g. MODEM)
•Parallel Port - in Pink Color (for devices like Printer)
•USB Port - For USB devices like Scanner, Digital Camera
84
•Game Port - For devices like Joy Stick
•Line Out / Line In / MIC - For speakers with Amplifier and Microphone
Operation Procedure...
Testing Procedure...
Points to check
Maintenance Procedure...
•Weekly or monthly once, run Scandisk and Defragment for better performance
of your PC
•Make it a habit, cleaning Your PC daily before you start, with a clean, dampened
cloth.
•Wait for at least 3 minutes even after you switch the PC OFF.
Standard Configuration
• i3 or i5 processor with an 800 MHz front side bus or faster
85
• 4 GB RAM minimum
• 250 GB Hard Drive Minimum (7200 RPM speed)
• DVD or DVD/RW Drive
• Web camera
• 6-cell battery
• Network: 10/100/1000 BASE-T Ethernet
• Wireless: 802.11 b/g/n
• Laptop Security Cable Lock (highly recommended for Resident students)
• Windows 7 Home 64 Bit, Windows 7 Pro 64 bit or Windows 7 Ultimate
64 bit
High-End Configuration
• i5 or i7 Quad Core processor with a 1066 MHz front side bus or faster
• Integrated video card with 512mb or 1 GB of dedicated memory
• 15-inch or larger screen
• 4 GB RAM minimum
• 500 GB Hard Drive Minimum (7200 RPM speed)
• DVD or DVD/RW Drive
• Web camera
• 6-cell battery
• Network: 10/100/1000 BASE-T Ethernet
• Wireless: 802.11 b/g/n
• Laptop Security Cable Lock (highly recommended for Resident students)
• Windows 7 Home 64 Bit, Windows 7 Pro 64 bit or Windows 7 Ultimate
64 bit
Desktop PC
• i3 , i5 or i7 processors Duo or Quad 2.66 GHz
• 4 GB RAM minimum (4 GB recommended)
• 250 GB Hard Drive (7200 RPM speed)
• 256 MB minimum Video Card
• DVD or DVD/RW Drive
• Sound Card with internal speakers
• 10/100/1000 MB Ethernet card
• Keyboard & Mouse
• Windows 7 Home 64 Bit, Windows 7 Pro 64 bit or Windows 7 Ultimate
64 bit
• 19-inch Flat Panel Monitor (Note: a larger monitor size will result in
smaller text on the screen)
Apple iMac
• 21-inch iMac
• 2.66 Intel processor
• 4 GB Ram
• 500 GB hard drive
• 256 MB Video Card
• Double layer SuperDrive DVDRW
86
• Keyboard & Mouse
• Built in Airport Extreme and Bluetooth 2.0
87
Introduction to General Packet Radio Service (GPRS)
The General Packet Radio Service (GPRS) is a new no voice value added
service that allows information to be sent and received across a mobile telephone
network. GPRS supplements today's Circuit Switched Data and Short Message
Service. GPRS is NOT related to GPS (the Global Positioning System), a similar
acronym that is often used in mobile contexts.
Key User Features of GPRS
88
or receive information through GPRS. Whereas with SMS this was often another
mobile phone, in the case of GPRS, it is likely to be an Internet address, since
GPRS is designed to make the Internet fully available to mobile users for the first
time. From day one, GPRS users can access any web page or other Internet
applications- providing an immediate critical mass of uses;
• Having looked at the key user features of GPRS, let’s look at the key
features from a network operator perspective.
Limitations of GPRS
It should already be clear that GPRS is an important new enabling mobile data
service which offers a major improvement in spectrum efficiency, capability and
functionality compared with today's no voice mobile services. GPRS does impact
a network's existing cell capacity. There are only limited radio resources that can
be deployed for different uses - use for one purpose precludes simultaneous use
for another. For example, voice and GPRS calls both use the same network
resources. The extent of the impact depends upon the number of timeslots, if any,
that are reserved for exclusive use of GPRS. However, GPRS does dynamically
manage channel allocation and allow a reduction in peak time signaling channel
loading by sending short messages over GPRS channels instead.
Achieving the theoretical maximum GPRS data transmission speed of 172.2 kbps
would require a single user taking over all eight timeslots without any error
protection. Clearly, it is unlikely that a network operator will allow all timeslots
to be used by a single GPRS user. Additionally, the initial GPRS terminals are
expected be severely limited - supporting only one, two or three timeslots. The
bandwidth available to a GPRS user will therefore be severely limited. As such,
the theoretical maximum GPRS speeds should be checked against the reality of
constraints in the networks and terminals. The reality is that mobile networks are
always likely to have lower data transmission speeds than fixed networks.
At the time of writing, there has been no confirmation from any handset vendors
that mobile terminated GPRS calls (i.e. receipt of GPRS calls on the mobile
phone) will be supported by the initial GPRS terminals. Availability or not of
GPRS MT is a central question with critical impact on the GPRS business case
such as application migration from other no voice bearers.
By originating the GPRS session, users confirm their agreement to pay for the
delivery of content from that service. This origination may well be performed
using a Wireless Application Protocol (WAP) session using the WAP micro
browser that will be built into GHPRS terminals. However, mobile terminated IP
traffic might allow unsolicited information to reach the terminal. Internet sources
originating such unsolicited content may not be chargeable. A possible worst case
scenario would be that mobile users would have to pay for receiving unsolicited
89
junk content. This is a potential reason for a mobile vendor NOT to support
GPRS Mobile Terminate in their GPRS terminals.
Chat can be distinguished from general information services because the source
of the information is a person with chat whereas it tends to be from an Internet
site for information services. The "information intensity" - the amount of
information transferred per message tends to be lower with chat, where people
are more likely to state opinions than factual data. In the same way as Internet
chat groups have proven a very popular application of the Internet, groups of
like-minded people - so called communities of interest - have begun to use
nonvoice mobile services as a means to chat and communicate and discuss.
Because of its synergy with the Internet, GPRS would allow mobile users to
participate fully in existing Internet chat groups rather than needing to set up their
own groups that are dedicated to mobile users. Since the number of participants is
an important factor determining the value of participation in the newsgroup, the
use of GPRS here would be advantageous. GPRS will not however support point
to multipoint services in its first phase, hindering the distribution of a single
message to a group of people. As such, given the installed base of SMS capable
devices, we would expect SMS to remain the primary bearer for chat applications
in the foreseeable future, although experimentation with using GPRS is likely to
commence sooner rather than later.
A wide range of content can be delivered to mobile phone users ranging from
share prices, sports scores, weather, flight information, news headlines, prayer
reminders, lottery results, jokes, horoscopes, traffic, and location sensitive
services and so on. This information need not necessarily be textual- it may be
maps or graphs or other types of visual information.
90
remain delivered using SMS, in order to limit people to brevity and reduce the
incidence of spurious and irrelevant posts to the mailing list that are a common
occurrence on Internet chat groups.
As this generic term suggests, file transfer applications encompass any form of
downloading sizeable data across the mobile network. This data could be a
presentation document for a traveling salesperson, an appliance manual for a
service engineer or a software application such as Adobe Acrobat Reader to read
documents. The source of this information could be one of the Internet
communication methods such as FTP (File Transfer Protocol), telnet, http or Java
- or from a proprietary database or legacy platform. Irrespective of source and
type of file being transferred, this kind of application tends to be bandwidth
intensive. It therefore requires a high speed mobile data service such as GPRS,
EDGE or UMTS to run satisfactorily across a mobile network.
Every search engines having their own crawler or spider or bots which is nothing
but a set of software program is used to crawl whole web page and indexed and
keeps the contents on their own server.
Crawlers of the search engines will go through every web pages and extracting
the contents from web pages and maintain those web page contents on their
server and revisit within a scheduled time slot.
Previously, search engines list the sites most considerably with keyword Meta
tag. But, nowadays most of the search engines are not considering the keyword
91
Meta tags, due to avoid irrelevant keyword stuff on that tags. But, title tag is
taking most important part in search engine’s keyword relevancy. More over
that description tags are also important for searches.
How the SEO Companies are functioning?
Each and every seo company and seo experts are following different kind of seo
techniques and seo services to improve search engine rankings for their web sites.
But, deep analysis and study on this field will lead always. Based on the seo
companies and their own proven results, they are charging and also having
different types of seo plans to lead on this competitive world. But, the most
important factor to know for web masters can’t get the results within a day or
week. After you finished a seo web site, it will take approximately 3 months to
get results for their seo work done. Some time it may take more than 6 moths
also. Don’t believe if any seo company says as immediate inclusion is possible on
search engines.
SEO for a website is not a single line matter to explain to all. We have to
consider lot of factors to do. If you need seo for your web site, you have to select
a best seo company or seo expert to do. Unless you are selecting good seo
company or seo experts, definitely you will lose your investment and efforts on
seo. While making a seo website, you have to avoid more images and flash
animations on your web site. Search engines are unable to find the words on
images or animated flashes. For your knowledge, Java Scripts are also not
supportable for search engine. So avoid these things and make very good seo web
sites.
92
Binary, Hexadecimal and Octal number system
Binary, hexadecimal, and octal refer to different number systems. The one that
we typically use is called decimal. These number systems refer to the number of
symbols used to represent numbers. In the decimal system, we use ten different
93
symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. With these ten symbols, we can represent
any quantity. For example, if we see a 2, then we know that there is two of
something. For example, this sentence has 2 periods on the end.
When we run out of symbols, we go to the next digit placement. To represent one
higher than 9, we use 10 meaning one unit of ten and zero units of one. This may
seem elementary, but it is crucial to understand our default number system if you
want to understand other number systems.
For example, when we consider a binary system which only uses two symbols, 0
and 1, when we run out of symbols, we need to go to the next digit placement.
So, we would count in binary 0, 1, 10, 11, 100, 101, and so on.
This article will discuss the binary, hexadecimal, and octal number systems in
more detail and explain their uses.
Fold
Table of Contents
How a Number System Works
Binary
Octal
Hexadecimal
Conversion
Base to Decimal
Decimal to Base
How?
Conversion.
From decimal to binary
From binary to decimal
From decimal to hexadecimal.
From hexadecimal to decimal
From decimal to octal
From octal to decimal
Fun Facts
End
94
Once we reach the last symbol, we create a new placement in front of the first
and count that up.
8, 9, 10, 11, 12, … , 19, 20, …
This continues when we run out of symbols for that placement. So, after 99, we
go to 100.
The placement of a symbol indicates how much it is worth. Each additional
placement is an additional power of 10. Consider the number of 2853. We know
this number is quite large, for example, if it pertains to the number of apples in a
basket. That's a lot of apples. How do we know it is large? We look at the number
of digits.
Each additional placement is an additional power of 10, as stated above. Consider
this chart.
103 102 101 100
digit digit digit digit
*1000 *100 *10 *1
Each additional digit represents a higher and higher quantity. This is applicable
for Base 10 as well as to other bases. Knowing this will help you understand the
other bases better.
Binary
Binary is another way of saying Base Two. So, in a binary number system, there
are only two symbols used to represent numbers: 0 and 1. When we count up
from zero in binary, we run out of symbols much more frequently.
0, 1, …
From here, there are no more symbols. We do not go to 2 because in binary, a 2
doesn't exist. Instead, we use 10. In a binary system, 10 are equal to 2 in decimal.
We can count further.
Binary 0 1 10 11 100 101 110 111 1000 1001 1010
Decimal 0 1 2 3 4 5 6 7 8 9 10
Just like in decimal, we know that the more digits there are, the larger the
number. However, in binary, we use powers of two. In the binary number
1001101, we can create a chart to find out what this really means.
26 25 24 23 22 21 20
1 0 0 1 1 0 1
64+0+0+8+4+0+1
87
Since this is base two, however, the numbers don't get quite as large as it does in
decimal. Even still, a binary number with 10 digits would be larger than 1000 in
decimal.
95
The binary system is useful in computer science and electrical engineering.
Transistors operate from the binary system, and transistors are found in
practically all electronic devices. A 0 means no current, and a 1 means to allow
current. With various transistors turning on and off, signals and electricity is sent
to do various things such as making a call or putting these letters on the screen.
Computers and electronics work with bytes or eight digit binary numbers. Each
byte has encoded information that a computer is able to understand. Many bytes
are stringed together to form digital data that can be stored for use later.
Octal
Octal is another number system with fewer symbols to use than our conventional
number system. Octal is fancy for Base Eight meaning eight symbols are used to
represent all the quantities. They are 0, 1, 2, 3, 4, 5, 6, and 7. When we count up
one from the 7, we need a new placement to represent what we call 8 since an 8
doesn't exist in Octal. So, after 7 are 10.
Octal 0 1 2 3 4 5 6 7 10 11 12… 17 20… 30… 77 100
Decimal 0 1 2 3 4 5 6 7 8 9 10… 15 16… 24… 63 64
Just like how we used powers of ten in decimal and powers of two in binary, to
determine the value of a number we will use powers of 8 since this is Base Eight.
Consider the number 3623 in base eight.
83 82 81 80
3 6 2 3
1536+384+16+3
1939
Each additional placement to the left has more value than it did in binary. The
third digit from the right in binary only represented 23-1, which are 4. In octal,
that is 83-1 which is 64.
Hexadecimal
The hexadecimal system is Base Sixteen. As its base implies, this number system
uses sixteen symbols to represent numbers. Unlike binary and octal, hexadecimal
has six additional symbols that it uses beyond the conventional ones found in
decimal. But what comes after 9? 10 are not a single digit but two… Fortunately,
the convention is that once additional symbols are needed beyond the normal ten,
letters are to be used. So, in hexadecimal, the total list of symbols to use is 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. In a digital display, the numbers B and D
are lowercase.
When counting in hexadecimal, you count 0, 1, 2, and so on. However, when you
reach 9, you go directly to A. Then, you count B, C, D, E, and F. But what is
next? We are out of symbols! When we run out of symbols, we create a new digit
placement and move on. So after F is 10. You count further until you reach 19.
After 19, the next number is 1A. This goes on forever.
96
Hexadecimal 9 A B C D E F 10 11… 19 1A 1B 1C… 9F A0
Decimal 9 10 11 12 13 14 15 16 17 25 26 27 28 159 160
Digits are explained as powers of 16. Consider the hexadecimal number 2DB7.
163 162 161 160
2 D B 7
8192+3328+176+7
11703
As you can see, placements in hexadecimal are worth a whole lot more than in
any of the other three number systems.
Conversion.
In the latter topic I explained the logic behind the binary, hexadecimal and octal
number systems. Now I’ll explain something more practical. If you fully
understood the previous thing you can skip this topic.
An example:
Convert 68 to binary:
• 68 are even, so we write 0.
• Dividing 68 by 2, we get 34.
• 34 is also even, so we write 0 (result so far - 00)
• Dividing 34 by 2, we get 17.
• 17 is odd, so we write 1 (result so far - 100 - remember to add it on the
left)
• Dividing 17 by 2, we get 8.5, or just 8.
• 8 is even, so we write 0 (result so far - 0100)
• Dividing 8 by 2, we get 4.
• 4 is even, so we write 0 (result so far - 00100)
• Dividing 4 by 2, we get 2.
• 2 is even, so we write 0 (result so far - 000100)
• Dividing 2 by 2, we get 1.
• 1 is odd, so we write 1 (result so far - 1000100)
• Dividing by 2, we get 0.5 or just 0, so we're done.
• Final result: 1000100
97
From binary to decimal
• Write the values in a table as shown before. (or do so mentally)
• Add the value in the column header to your number, if the digit is turned
on (1).
• Skip it if the value in the column header is turned off (0).
• Move on to the next digit until you’ve done them all.
An example:
Convert 101100 to decimal:
• Highest digit value: 32. Current number: 32
• Skip the "16" digit, its value is 0. Current number: 32
• Add 8. Current number: 40
• Add 4. Current number: 44
• Skip the "2" and "1" digits, because their value is 0.
• Final answer: 44
Convert 39 to hexadecimal:
• First, we convert to binary (see above). Result: 100111
• Next, we split it up into nibbles: 0010/0111 (Note: I added two zeroes to
clarify the fact that these are nibbles)
• After that, we convert the nibbles separately.
• Final result: 27
98
• Convert to binary.
• Split up in parts of 3 digits, starting on the right.
• Convert each part to an octal value from 1 to 7
Example: Convert 25 to octal
• First, we convert to binary. Result: 11001
• Next, we split up: 011/001
• Conversion to octal: 31
Boolean algebra which deals with two-valued (true / false or 1 and 0) variables
and functions find its use in modern digital computers since they too use two-
level systems called binary systems.
Let us examine the following statement:"I will buy a car If I get a salary increase
or I win the lottery." This statement explains the fact that the proposition “buys a
car" depends on two other propositions "get a salary increase" and "win the
lottery". Any of these propositions can be either true or false hence the table of all
possible situations:
The mathematician George Boole, hence the name Boolean algebra, used 1 for
true, 0 for false and + for the or connective to write simpler tables. Let X = "get a
salary increase", Y = "win the lottery" and F = "buy a car". The above table can
be written in much simpler form as shown below and it defines the OR function.
X Y F=X+Y
0 0 0
99
0 1 1
1 0 1
1 1 1
Let us now examine the following statement:"I will be able to read e-books
online if I buy a computer and get an internet connection." The proposition "read
e-books" depends on two other propositions "buy a computer" and "get an
internet connection". Again using 1 for True, 0 for False, F = "read e-books" , X
= "buy a computer", Y = "get an internet connection" and use . for the connective
and, we can write all possible situations using Boolean algebra as shown below.
The above table can be written in much simpler form as shown below and it
defines the AND function.
X Y F=X.Y
0 0 0
0 1 0
1 0 0
1 1 1
We have so far defined two operators: OR written as + and AND written . . The
third operator in Boolean algebra is the NOT operator which inverts the input.
Whose table is given below where NOT X is written as X'.
X NOT X = X'
0 1
1 0
The 3 operators are the basic operators used in Boolean algebra and from which
more complicated Boolean expressions may be written. Example: F = X . (Y + Z)
100
First observations tell us that the circuit consists of a 2-input NAND gate, a 2-
input EX-OR gate and finally a 2-input EX-NOR gate at the output. As there are
only 2 inputs to the circuit labeled A and B, there can only be 4 possible
combinations of the input (22) and these are: 0-0, 0-1, 1-0 and finally 1-1. Plotting
the logical functions from each gate in tabular form will give us the following
truth table for the whole of the logic circuit below.
Inputs Output at
A B C D Q
0 0 1 0 0
0 1 1 1 1
1 0 1 1 1
1 1 0 0 1
From the truth table above, column C represents the output function from
the NAND gate and column Represents the output function from the Ex-OR gate.
Both of these two output expressions then become the input condition for the Ex-
NOR gate at the output. It can be seen from the truth table that an output at Q is
present when any of the two inputs A or B are at logic 1. The only truth table that
satisfies this condition is that of an OR Gate. Therefore, the whole of the above
circuit can be replaced by just one single 2-input OR Gate.
101
The system consists of an AND Gate, a NOR Gate and finally an OR Gate. The
expression for the AND gate is A.B, and the expression for the NOR gate is A+B.
Both these expressions are also separate inputs to the OR gate which is defined
as A+B. Thus the final output expression is given as:
The output of the system is given as Q = (A.B) + (A+B), but the notation A+B is
the same as the De Morgan´s notation A.B, Then substituting A.B into the output
expression gives us a final output notation of Q = (A.B)+(A.B), which is the
Boolean notation for an Exclusive-NOR Gate as seen in the previous section.
Then, the whole circuit above can be replaced by just one neither
single Exclusive-NOR Gate and indeed an Exclusive-NOR Gate is made up of
these individual gates.
Computer software
What is Software?
Software is the general term for information that's recorded onto some kind of
medium. For example, when you go to the video store and rent or buy a tape or
DVD, what you're really getting is the software that's stored on that tape or disk.
You’re VCR or DVD player are hardware devices that are capable of reading the
software from a tape or disk and projecting it onto your TV screen, in the form of
a movie.
Your computer is a hardware device that reads software too. Most of the software
on your computer comes in the form of programs. A program consists of
"instructions" that tell the computer what to do, how to behave. Just as there are
thousands of albums you can buy on CD for your stereo, and thousands of movies
you can buy to play on your VCR or DVD player, there are thousands of
programs that you can buy to run on your computer.
When you buy a computer, you don't automatically get every program produced
by every software company in the world. You usually get some programs. For
example, when you buy a computer it will probably have an operating system
(like Windows XP) already installed on it.
103
computer. You only need to keep the CDs as backups, in case something goes
wrong with your hard disk and you need to re-install the programs.
Running Programs
When you click on the icon for a program, the program opens. Which means the
program appears on the screen, so you can use it. Each program will appear in its
own program window on the Windows desktop. Floating about on top of that
desktop are four different programs, each in its own separate program window.
While not two programs are exactly alike, most program windows contain certain
similar elements. Stretched across the top of the program window is the title bar,
which usually shows the name of the program that's inside the program window.
Beneath the title bar is the menu bar, which gives you access to the tools and
capabilities of that specific program. Many programs have a toolbar under their
menu bar. The toolbar provides quick one-click access to frequently-used
commands in the menu bar. The status bar at the bottom of a program provides
general information.
The Operating System is the System Software that makes the Computer work.
We can say that an Operating System (OS) is Software that acts as an interface
between you and the hardware. It not only contains drivers used to speak the
hardware's language, but also offers you a very specific graphical user interface
(GUI) to control the computer. An OS can also act as an interface (from the
hardware) to the other software. A complex OS like Windows or Linux or Mac
OS offers the services of an OS, but also has applications built in. Solitaire, Paint,
Messenger, etc. are all applications.
Application software is the software that you install onto your Operating System.
It consists of the programs that actually let you do things with your computer.
These Applications are written to run under the various Operating Systems.
These include things like your word processing programs, spread sheets, email
clients, web browser, games, etc. Many programs, such as most of the Microsoft
Office suite of programs, are written in both Mac and Windows versions, but you
still have to have the right version for your OS.
So, the Operating system of a Computer is the Software that allows the Computer
work. It provides the framework under which the Applications run. An operating
system is the type of Computer system you have such as Window XP or Window
104
95, 98, Mac, etc. The Applications are the Software that actually allows the user
to do something with the Computer. Without the applications, all you can do is
change settings and navigate among the folders. You can purchase its CD from a
software company or download from a software company’s web site.
Computer Program
System software and application software are computer programs. The system
software is also installed during the installation of the operating system.
However, the application software utilizes the capabilities of the computer on
which it is installed.
System Software
The programs and the file that comprises the operating system are called system
software. These files include configuration files, system preferences, system
services, libraries of functions and the drivers for the hardware installed on the
computer. The computer programs in system software include compilers, system
utilities, assemblers, debuggers and file management tools.
Once you install the operating system, the system software is also installed.
Program such “Software update” or “Windows update” can be used to update the
105
system software. However, the end user does not run the system software. For
example, while using the web browser, you don’t need to use the assembler
program.
System software is also called low-level software as it runs at most basic level of
the computer. It just creates a graphical user interface thorough which the user
can interact with hardware with the help of operating system. System software
just runs at the back so you don’t need to bother about it.
The system software provides an environment to run application software and it
controls the computer as well as the applications installed on the machine.
Application software
• System software gets installed when the operating system is installed on the
computer while application software is installed according to the requirements of
the user.
• A computer may not require more than one type of system software while there
may be a number of application software programs installed on the computer at
the same time.
Interpreters
The programs created in high level languages can be executed by using two
different ways. The first one is the use of compiler and the other method is to use
an interpreter. High level instruction or language is converted into intermediate
from by an interpreter. The advantage of using an interpreter is that the high level
instruction does not goes through compilation stage which can be a time
consuming method. So, by using an interpreter, the high level program is
executed directly. That is the reason why some programmers use interpreters
while making small sections as this saves time.
107
Almost all high level programming languages have compilers and interpreters.
But some languages like LISP and BASIC are designed in such a way that the
programs made using them are executed by an interpreter.
Difference between compiler and interpreter
• A complier converts the high level instruction into machine language while an
interpreter converts the high level instruction into an intermediate form.
• Before execution, entire program is executed by the compiler whereas after
translating the first line, an interpreter then executes it and so on.
• List of errors is created by the compiler after the compilation process while an
interpreter stops translating after the first error.
• An independent executable file is created by the compiler whereas interpreter is
required by an interpreted program each time.
Assemblers
Computer Language
108
programming language. Programming languages are a subset of computer
languages. For example, HTML is a markup language and a computer language,
but it is not traditionally considered a programming language. Machine code is a
computer language. It can technically be used for programming, and has been
(e.g. the original bootstrapped for Altair BASIC), though most would not
consider it a programming language.
Computer languages can be divided into two groups: high-level languages and
low-level languages. High-level languages are designed to be easier to use, more
abstract, and more portable than low-level languages. Syntactically correct
programs in some languages are then compiled to low-level language and
executed by the computer. Most modern software is written in a high-level
language, compiled into object code, and then translated into machine
instructions.
What is a Computer?
A computer is a device that accepts user input, processes it, and returns output.
Usually, the modern use of the term computer refers to an electronic device that
accepts input via keyboard and mouse, and returns output via a CRT or LCD
monitor. Other input and output devices associated with today's common
computer include hard disks, optical and flash storage, network connections,
speakers, joysticks, and paper printers. Also, computers today are used for much
more than the processing of raw data. Standard home computers are often used
for communicating via the Internet, word processing, audio / video media
management, and game playing. Specialized fields have discovered thousands of
other uses for computers, and the devices are being introduced to new fields
almost daily.
109
specialized small computers are found in wristwatches, medical and factory
monitors, automobile control systems, microwave ovens, and literally thousands
of other applications. These are usually referred to as embedded systems, as the
computer involved is not the primary component of the device. Large, very
specialized computers are used in physics research, military intelligence, weather
prediction, and other specialized fields. These machines are often called
mainframes, a name that pays homage to the large frame encompassing early
models.
There is no universal consensus on the identity of the first computer. While many
historians are content with crowning the Roman or Chinese abaci as the earliest
of computers, the devices themselves performed no information processing.
Thus, an abacus does not display the defining property of a computer. The
earliest known device that did in fact process information automatically was the
Jacquard loom. The head of the Jacquard loom read punch cards, determined the
locations of holes in the cards, and in response altered the pattern being woven by
the loom. In addition to processing data, the loom was programmable by means
of replacing the punch cards. Thus, the Jacquard loom performed two of the most
important defining functions of computers: data processing, and the ability to be
programmed.
110
have built-in security features. Although the second Windows XP service pack
added a firewall and anti-virus monitoring service, Vista implements these
features and more at the kernel level. Individual programs are 'sandboxed' and
cannot access each other's memory. Critical drivers are executed in user mode, so
crashes and malicious behavior cannot cause system-wide instability or security
breaches. Even third-party anti-virus and anti-spyware software runs outside the
kernel, further protecting it from bugs and backdoors in those programs.
Microsoft has just released the new Office suite for Windows. Transmitting those
documents over the Internet is now easier than ever with the PDF file format. Try
a pdf converter such as to convert pdf to word or maybe even pdf to excel so that
those PDF's can be edited again.
Most home computers today use the Microsoft Windows operating system. Other
operating systems, such as Apple Macintosh and Linux, have traditionally been
111
termed as "alternative operating systems", implying that Windows is usually
expected to be installed by default. However, the usability issues surrounding
Windows Vista, combined with improvements in the usability of graphical user
interfaces for Linux, have catalyzed renewed interest in Linux and Macintosh.
Other concerns, such as restrictive licensing and DRM issues, are expected to
further interest in alternative, mostly open source operating systems. Currently,
Linux is the leading open source operating system, with many distributions
consisting entirely of open source software.
The first computers had no operating systems. The hardware of these early
systems was very specialized, and only certain types of programs would run on
them. These programs, being so specialized, interfaced directly with the system's
hardware. Thus, these programs were not portable and any changes in hardware
required changes in the computer program. As computers became less
specialized, and different companies began producing hardware, the need for
abstraction layers that would allow programs to run on the various hardware
became apparent. Hence the concept of the shared library was invented, the first
of which provided uniform software interfaces to various hardware. Later, these
libraries incorporated time-sharing management tools and automatic job
switching functions. Thus, the operating system was born.
1. Windows 1.01
2. Windows 2.03
3. Windows 2.11
4. Windows 3.0
5. Windows 3.1
6. Windows For Workgroups 3.1
7. Windows NT 3.1
112
8. Windows For Workgroups 3.11
9. Windows 3.2
10. Windows NT 3.5
11. Windows NT 3.51
12. Windows 95
13. Windows NT 4.0
14. Windows 98
15. Windows 98 SE
16. Windows 2000
17. Windows Me
18. Windows XP
19. Windows XP 64-bit Edition 2003
20. Windows Server 2003
21. Windows XP Professional x64 Edition
22. Windows Fundamentals for Legacy PCs
23. Windows Vista
24. Windows Home Server
25. Windows Server 2008 (planned)
26. Windows 7 (planned) (Formerly codenamed Blackcomb, now Vienna)
Definition
An operating system is a group of computer programs that coordinates all the
activities among computer hardware devices. It is the first program loaded into
the computer by a boot program and remains in memory at all times.
113
Performs basic computer tasks
The operating system performs basic computer tasks, such as managing the
various peripheral devices such as the mouse, keyboard and printers. For
example, most operating systems now are plug and play which means a device
such as a printer will automatically be detected and configured without any user
intervention.
114
New Technology file system (NTFS)
File Allocation table (FAT) uses the file allocation table which records, which
clusters are used and unused and where files are located within the clusters.
NTFS is a file system introduced by Microsoft and it has a number of advantages
over the previous file system, named FAT32 (File Allocation Table).
One major advantage of NTFS is that it includes features to improve reliability.
For example, the new technology file system includes fault tolerance, which
automatically repairs hard drive errors without displaying error messages. It also
keeps detailed transaction logs, which tracks hard drive errors. This can help
prevent hard disk failures and makes it possible to recover files if the hard drive
does fail.
NTFS also allows permissions (such as read, write, and execute) to be set for
individual directories and files
There are several types of operating systems, with Windows, Linux and
Macintosh suites being the most widely used. Here is an overview on each
system:
MS-DOS
Here's the way to change My Computer or The Recycle Bin that are built-in to
Windows.
1. Right-click on desktop > Properties > Effects
2. Highlight Icon > Change and Icon > Browse > Local Disk
3. Open C: > WINNT > System 32 > Program. Note: the filename is
"Program"
4. Change the icons using this program.
Use this method to change all the icons associated with a given file type, like all
Notepad documents, for example. Changing one file icon generally changes all of
that type.
1. Open My Computer > Open tools > Open folder options
2. Click File Types
3. Highlight the file type icon you wish to change.
4. Click Advanced at the bottom right of the screen.
5. Change the icon.
6. Use one of the 4 shown icons or click Browse to go to Local Disk C: >
WINNT > System 32 > Program
7. Highlight the icon.
8. Click OK.
o Note: you might not be able to edit some files types like folders.
You cannot properly change individual icons on the desktop without editing the
Registry, but you can change shortcut icons.
1. Create a folder on the desktop.
2. Name the folder Shortcuts.
3. Put all the desktop files you want to change the icons for into this folder.
116
4. Right-click on each of these files.
5. Choose Send to Desktop or Create Shortcut.
6. Right-click the new shortcut icon on the desktop.
7. Select Properties > Change icon or
8. Browse to Browse > Program
To remove the little arrows Windows adds to shortcut desktop icons with "Tweak
UI," a venerable Windows Program.
1. Download the program from "TweakUI"
2. Run it and go to the Explorer.
3. Navigate to the shortcut tab.
4. Click Overlay.
5. Select None to remove the shortcut arrows from your desktop.
117
3. In Windows 98, navigate to
[HKEY_CLASSES_ROOT\CLSID\{63B51F81-C868-11D0-999C-
00C04FD655E1}\InProcServer32] and delete the current value default.
4. For some Windows 98 computers, as well as Windows 95, navigate to
both [HKEY_CLASSES_ROOT\lnkfile], [HKEY_CLASSES_ROOT\piffile] and
[HKEY_CLASSES_ROOT\Internet Shortcut] and deleting both Is Shortcut
values will work.
118
4. Save the file.
1. Select File > Save As.
2. Select Binary Encoding.
3. Select Save Transparent Color.
4. Select Desktop > Icon Folder as the save location.
5. Name the file Deskcon, for reference.
Now that you've created unique icons for your desktop, you'll undoubtedly want
to add color and transparency.
1. Choose an icon editor, a good one is IconEdit32.
2. Download the software "IconEdit32"
3. Open IconEdit32.
4. Click the 16 or 32 color box on the right side.
5. Open Desk on that you created with the last program.
o A small sample of the icon is shown at the right to make selection
easier.
6. To make an icon transparent, click Transparent.
7. To change colors, click Change colors.
8. Select Save As to your desktop icon folder when you are done making
edits.
And finally, it's a good idea to add descriptions to all your new icons.
1. Click on the icon and click Properties.
2. Go to the Shortcut tab.
3. Type in your new description in the space for the Comment.
4. Click Apply.
5. Click OK.
6. When you scroll your pointer over the shortcut, it will now read your
description. Note: this may not work with all shortcuts.
Icon
An icon is a small graphic representation of a program or file that,
when clicked on, will be run or opened. Icons are used with
Graphical User Interface (GUI) Operating Systems such as Microsoft Windows
and the Apple Mac OS. In the image to the right, is an example of what the My
Computer icon in Microsoft Windows XP looks like.
119
Using The Taskbar
If you think of your computer’s hard disk as a filing cabinet where all your
programs and documents (files) are stored, then you can think of your Windows
desktop as being like your real "wooden" desktop. Only the things you're working
with right now are on your Windows desktop, as well as your real desktop. (Not
counting all the miscellaneous clutter you haven't gotten around to putting away,
of course).
At any given time, you might have several programs, folders, and documents
open on your desktop. The short name for "anything that's currently open on your
desktop" is task. That is, we can refer to each open item on your desktop -- no
matter what that item is, as a "task", short for "task-in-progress". The Windows
taskbar, which is roughly centered across the bottom of your screen, as in Figure
a1.
Figure a1
When you have lots of program windows open, they pile up on your Windows
desktop, just like sheets of paper can pile up on your real desktop. You can use
the taskbar to sort of "shuffle things around", so you're in control of what is, and
isn't visible at the moment. Here are some things you can do with the taskbar
along those lines:
• If a program window is buried in the mess, click its taskbar button to
instantly bring it to the top of the stack.
• You can also click a task's taskbar button to make it invisible (so it's not
taking up any space on the desktop), then click that same button again to make it
visible again.
• You can also close any open task (thereby removing it from the desktop
and putting it back in the filing cabinet) by right-clicking its taskbar button and
choosing Close.
As you open more and more items on your screen, all of the taskbar buttons need
to shrink a bit to make room for the new button. If you open lots of items with the
same program, those "many" taskbar buttons might eventually collapse into a
single taskbar button that shows a number.
For example, suppose you open a bunch of folders from the Start menu (My
Documents, My Music, My Pictures, My Computer). If the taskbar gets too
crowded, the taskbar buttons for those folders may collapse into a single button
120
labeled 4 Windows Explorer. The 4 stands for "four open folders". Windows
Explorer is the name of the program that lets you navigate around in, and view
the contents of, all folders on your computer.
Tip: Don't confuse Windows Explorer with Internet Explorer. Windows Explorer
is the program that lets you explore things "inside" your own computer. Windows
Explorer opens automatically whenever you open any folder. Internet Explorer
lets you explore things "outside" your computer -- namely things on the Internet.
When you click on a taskbar button that represents multiple open items on your
desktop, a little menu pops up, as in Figure a2. To bring one of those items to the
top of the stack of junk on your desktop, just click its name in the menu. Or, if the
item is already on the top of the stack, clicking its name will minimize the item to
put it into hiding for the time being.
Figure a2
As you close items on the desktop, making more room for taskbar buttons, a
collapsed button may suddenly unclasped, breaking out into separate buttons
again. Don't let that bother you -- it's normal. It's just Windows using the
available space wisely.
Tip: At any time, you can neatly stack all your open program windows like sheets
of paper. To do so, right-click the current time in the lower right corner of you
screen and click on Cascade Windows in the menu that appears.
Like everything else in Windows XP, you can customize the taskbar to your
liking. To do so, right-click the Start button and choose Properties. In the Taskbar
and Start Menu Properties dialog box that opens, click on the Taskbar tab. The
options shown in Figure 3 appear. Your options are summarized below:
121
Figure 3a
• Lock the taskbar: If selected, hides all sizing handles on the taskbar so
you can't accidentally move or resize it (as discussed below).
• Auto-hide the taskbar: If you select this option, the taskbar will be hidden
most of the time so as to not take up any space on the screen. To make it visible,
move the mouse pointer to the very bottom of your screen.
• Keep the taskbar on top of other windows: If selected, makes sure the
taskbar is visible at all times, even when large maximized program windows are
covering the rest of the screen.
• Group similar taskbar buttons: If selected, allows multiple taskbar buttons
to collapse into a single button so the buttons don't become too small to see on
the taskbar.
• Show Quick Launch: If selected, displayed the optional Quick Launch
toolbar to the right of the Start button.
You'll find articles on the Quick Launch toolbar and Notification area after you
finish this article and click Back to return to the precious page.
Windows XP is very flexible. You can size, color, and position anything to your
liking. But you can only move and size things on the taskbar when the taskbar is
unlocked. In addition to the option shown back in Figure a3, you can quickly
lock, or unlock the taskbar at any time by right-clicking the current time in the
lower right corner of your screen and choosing Lock the Taskbar from the
122
shortcut menu that appears. You can tell when the taskbar is unlocked, because
sizing handles are invisible, and Lock the Taskbar on the shortcut menu isn't
checked, as in Figure a4.
Figure a4
When the taskbar is locked, the sizing handles aren't visible, and the Lock the
Taskbar option on the shortcut menu is selected (checked), as in Figure a5.
Figure a5
It's best to keep the taskbar locked when you're not intentionally trying to move
or size it. That way, you won't accidentally move or size the taskbar while you're
whipping around the screen with the mouse pointer. But just so you know, when
the taskbar is unlocked, you can change its height as follows:
1. Move the mouse pointer to the thin bar that appears along the top strip of
the taskbar, until the mouse pointer turns to a two-headed arrow.
2. Hold down the left mouse button and drag that top edge up or down until
the taskbar is the width you want, then release the mouse button.
Tip: If the taskbar seems "stuck" between double-height, and no height, drag one
of the dotted vertical sizing handles up to the row above it. Then drag the top
edge of the taskbar down a notch.
To move the entire unlocked taskbar to another edge of the screen, move the
mouse pointer to some empty spot on the taskbar (not on a button or icon). Then
hold down the left mouse button, drag the taskbar to any edge of the screen, and
release the mouse button. Figure 6 shows examples of sizing and moving an
unlocked taskbar.
123
Alan Simpson
Back
My Computer
124
Drive listing in My Computer
Using My Computer
Once My Computer is open you'll see all available drives on your computer. For
most users, you'll only be concerned with the Local Disc (C:) drive, which is the
hard drive and what stores all your files. Double-click this drive icon to open it
and view of its contents.
125
Tip: If you're looking for a document such as a word processor file you've
created, music file, picture, or other personal file it's likely that it's contained in
your documents folder. This folder is displayed in My computer as a folder and
usually contains your name. For example, if your username was John, this folder
would be named John's Documents.
Finding files in My Computer
If you're having trouble finding where one of your files is stored, use the
Windows find feature to find the file. To do this from within My Computer either
click on File and then Search or right-click on the C: drive or other folder you
wish to search and click Search. In the Search window, type the name or part of
the name of the file you're trying to find.
If you wish to manage your computer or view other settings and information
about your computer instead of double-clicking the My Computer icon to open it,
right-click on the My Computer icon and click Properties. Performing these steps
will open your System Properties (the same window accessible through the
Control Panel).
Control Panel
126
Microsoft Windows 7 Control Panel
127
Microsoft Windows 98 Control Panel
How to get into the Control panel
1. Click Start
2. Click Control Panel.
• Adding or removing icons in Windows Control Panel.
Microsoft Windows 95, 98, ME, NT, XP users
In Microsoft Windows 95, 98, ME, NT, or XP open the Control Panel by
following the below steps.
1. Click Start
2. Click Settings
3. Clicking the Control Panel.
Desktop
128
Windows 95 Desktop
If you think of your computer’s hard disk as a filing cabinet where all your
programs and documents (files) are stored, then you can think of your Windows
desktop as being like your real "wooden" desktop. Only the things you're working
with right now are on your Windows desktop, as well as your real desktop. (Not
counting all the miscellaneous clutter you haven't gotten around to putting away,
of course).
At any given time, you might have several programs, folders, and documents
open on your desktop. The short name for "anything that's currently open on your
desktop" is task. That is, we can refer to each open item on your desktop -- no
matter what that item is, as a "task", short for "task-in-progress". The Windows
taskbar, which is roughly centered across the bottom of your screen, as in Figure
1.
Figure 1
When you have lots of program windows open, they pile up on your Windows
desktop, just like sheets of paper can pile up on your real desktop. You can use
the taskbar to sort of "shuffle things around", so you're in control of what is, and
isn't visible at the moment. Here are some things you can do with the taskbar
along those lines:
• If a program window is buried in the mess, click its taskbar button to
instantly bring it to the top of the stack.
• You can also click a task's taskbar button to make it invisible (so it's not
taking up any space on the desktop), then click that same button again to make it
visible again.
• You can also close any open task (thereby removing it from the desktop
and putting it back in the filing cabinet) by right-clicking its taskbar button and
choosing Close.
130
Collapsible Taskbar Buttons
As you open more and more items on your screen, all of the taskbar buttons need
to shrink a bit to make room for the new button. If you open lots of items with the
same program, those "many" taskbar buttons might eventually collapse into a
single taskbar button that shows a number.
For example, suppose you open a bunch of folders from the Start menu (My
Documents, My Music, My Pictures, My Computer). If the taskbar gets too
crowded, the taskbar buttons for those folders may collapse into a single button
labeled 4 Windows Explorer. The 4 stands for "four open folders". Windows
Explorer is the name of the program that lets you navigate around in, and view
the contents of, all folders on your computer.
Tip: Don't confuse Windows Explorer with Internet Explorer. Windows Explorer
is the program that lets you explore things "inside" your own computer. Windows
Explorer opens automatically whenever you open any folder. Internet Explorer
lets you explore things "outside" your computer -- namely things on the Internet.
When you click on a taskbar button that represents multiple open items on your
desktop, a little menu pops up, as in Figure 2. To bring one of those items to the
top of the stack of junk on your desktop, just click its name in the menu. Or, if the
item is already on the top of the stack, clicking its name will minimize the item to
put it into hiding for the time being.
Figure 2
As you close items on the desktop, making more room for taskbar buttons, a
collapsed button may suddenly unclasped, breaking out into separate buttons
again. Don't let that bother you -- it's normal. It's just Windows using the
available space wisely.
Tip: At any time, you can neatly stack all your open program windows like sheets
of paper. To do so, right-click the current time in the lower right corner of you
screen and click on Cascade Windows in the menu that appears.
131
Figure 3
• Lock the taskbar: If selected, hides all sizing handles on the taskbar so
you can't accidentally move or resize it (as discussed below).
• Auto-hide the taskbar: If you select this option, the taskbar will be hidden
most of the time so as to not take up any space on the screen. To make it visible,
move the mouse pointer to the very bottom of your screen.
• Keep the taskbar on top of other windows: If selected, makes sure the
taskbar is visible at all times, even when large maximized program windows are
covering the rest of the screen.
• Group similar taskbar buttons: If selected, allows multiple taskbar buttons
to collapse into a single button so the buttons don't become too small to see on
the taskbar.
• Show Quick Launch: If selected, displayed the optional Quick Launch
toolbar to the right of the Start button.
You'll find articles on the Quick Launch toolbar and Notification area after you
finish this article and click Back to return to the precious page.
Windows XP is very flexible. You can size, color, and position anything to your
liking. But you can only move and size things on the taskbar when the taskbar is
unlocked. In addition to the option shown back in Figure 3, you can quickly lock,
or unlock the taskbar at any time by right-clicking the current time in the lower
right corner of your screen and choosing Lock the Taskbar from the shortcut
menu that appears. You can tell when the taskbar is unlocked, because sizing
132
handles are invisible, and Lock the Taskbar on the shortcut menu isn't checked, as
in Figure 4.
Figure 4
When the taskbar is locked, the sizing handles aren't visible, and the Lock the
Taskbar option on the shortcut menu is selected (checked), as in Figure 5.
Figure 5
It's best to keep the taskbar locked when you're not intentionally trying to move
or size it. That way, you won't accidentally move or size the taskbar while you're
whipping around the screen with the mouse pointer. But just so you know, when
the taskbar is unlocked, you can change its height as follows:
1. Move the mouse pointer to the thin bar that appears along the top strip of
the taskbar, until the mouse pointer turns to a two-headed arrow.
2. Hold down the left mouse button and drag that top edge up or down until
the taskbar is the width you want, then release the mouse button.
Tip: If the taskbar seems "stuck" between double-height, and no height, drag one
of the dotted vertical sizing handles up to the row above it. Then drag the top
edge of the taskbar down a notch.
To move the entire unlocked taskbar to another edge of the screen, move the
mouse pointer to some empty spot on the taskbar (not on a button or icon). Then
hold down the left mouse button, drag the taskbar to any edge of the screen, and
release the mouse button. Figure 6 shows examples of sizing and moving an
unlocked taskbar.
133
Alan Simpson
This article will help you learn how to find, organize, and use files and folders on
your computer.
A file is very much like a typed document that you might find on someone's desk
or in a filing cabinet; it's an item that contains a collection of related information.
On a computer, examples of files include text documents, spreadsheets, digital
pictures, and even songs. Every picture you take with a digital camera, for
example, is a separate file, and a music CD might contain a dozen individual
song files.
Your computer represents files with icons. By looking at a file's icon, you can tell
at a glance what kind of file it is. Here are some common file icons:
134
files in folders inside a filing cabinet. Arranging files into logical groups makes it
easy to locate any particular file.
Folders on your computer work exactly the same way. This is what a typical
folder icon looks like:
When it comes to getting organized, you don't need to start from scratch.
Windows comes with a handful of common folders that you can use as anchors to
begin organizing your files. Here's a list of some of the most common folders you
can store your files and folders in:
• Documents. Use this folder to store your word-processing files,
spreadsheets, presentations, and other business-oriented files.
• Pictures. Use this folder to store all of your digital pictures, whether you
get them from your camera, scanner, or in e-mail from other people.
• Music. Use this folder to store all of your digital music, such as songs that
you copy from an audio CD or download from the Internet.
• Videos. Use this folder to store your videos, such as clips from your
digital camera, camcorder, or video files that you download from the Internet.
• Downloads. Use this folder to store files and programs that you download
from the web.
There are many ways to find these folders. The easiest method is to open the
personal folder, which gathers all of your common folders in one place. The
personal folder isn't actually called "personal"—it's labeled with the user name
that you used to log on to the computer. To open it, click the Start button , and
then click your user name at the top of the Start menu's right pane.
135
You can open common folders from the Start menu
You can also find the Documents, Pictures, and Music folders in the Start menu,
just below your personal folder.
Remember that you can create subfolders inside any of these folders to help you
better organize your files. In the Pictures folder, for example, you might create
subfolders to organize pictures by date, by event, by the names of people in the
pictures, or by any other scheme that helps you work more efficiently.
Top of page
When you open a folder on the desktop, a folder window appears. In addition to
showing the contents of the folder, a folder window has a variety of parts that are
designed to help you navigate around Windows or work with files and folders
more easily. Here is a typical folder and each of its parts:
When you open a folder and see your files, you might prefer larger (or smaller)
icons, or an arrangement that lets you see different kinds of information about
each file. To make these kinds of changes, use the Views button in the toolbar.
Each time you click the Views button, the folder window changes the way it
displays your file and folder icons, alternating between large icons, a smaller icon
136
view called Tiles, and a view called Details that shows several columns of
information about the file.
If you click the arrow next to the Views button, you have even more choices.
Drag the slider up or down to fine-tune the size of the file and folder icons. You
can see the icons change size as you move the slider.
When you need to find a particular file, you'll often know that it's located
somewhere in a common folder like Documents or Pictures. Unfortunately,
actually locating the file you want might mean browsing through hundreds of
files and subfolders—not an easy task. To save yourself time and effort, use the
Search box to find your file.
Top of page
Occasionally, you might want to change where files are stored on your computer.
You might want to move files to a different folder, for example, or copy them to
removable media (such as CDs or memory cards) to share with another
person.Most people copy and move files using a method called drag and drop.
137
Start by opening the folder that contains the file or folder you want to move.
Then open the folder where you want to move it to. Position the folder windows
on the desktop so you can see the contents of both of them.
Next, drag the file or folder from the first folder to the second folder. That's all
there is to it.
The most common way to create new files is by using a program. For example,
you can create a text document in a word processing program or a movie file in a
video editing program. Some programs create a file when you open them. When
you open WordPad, for example, it starts with a blank page. This represents an
empty (and unsaved) file. Start typing, and when you are ready to save your
work, click File in the menu bar and then click Save As. In the dialog box that
appears, type a file name that will help you find the file again in the future, and
then click Save.
When you no longer need a file, you can remove it from your computer's hard
disk to save space and keep your computer from getting cluttered with unwanted
files. To delete a file, open the folder that contains the file and then select the file.
Press DELETE and then, in the Delete File dialog box, click Yes.
138
When you delete a file, it's temporarily stored in the Recycle Bin. Think of the
Recycle Bin as a safety folder that allows you to recover files or folders that you
deleted accidentally. Occasionally, you should empty the Recycle Bin to reclaim
all of the hard disk space being used by your unwanted files. To learn how to
empty the Recycle Bin, see Permanently delete files from the Recycle Bin.
Top of page
To open a file, double-click it. The file will open in the program that you used to
create or edit it. If it's a text file, for example, it will open in your word-
processing program.
That's not always the case, though. Double-clicking a digital picture, for example,
will usually open a picture viewer. To actually edit the picture, you need to use a
different program. Right-click the file, click Open With, and then click the name
of the program that you want to use.
You can use Control Panel to change settings for Windows. These settings
control nearly everything about how Windows looks and works, and you can use
them to set up Windows so that it's just right for you.
Open Control Panel by clicking the Start button , and then clicking Control
Panel.
139
Windows tools to help you optimize your computers performance
In the Windows Accessories you will also find some very handy tools that will
help you keep your system running smoothly. It's a good idea to get acquainted
with these tools and how to use them.
You find the tools by clicking System Tools from the Accessories menu
The most important accessories to know are:
• Back Up
• Disk Cleanup
• Disk Defragmenter
Backup!
Where I come from, we have a saying "Real men do not back up!". The very
same "real men" always come to me for help, when they run into trouble from
NOT having backed up anything and their hard drive crashes. Unfortunately there
is nothing I can do to help them - other than point out to them that in MY opinion
"real men" are smart men, who DO back up important files on a weekly or
monthly basis, - time frame depending on how much they use their computers
and how important to them their work is.
The Backup wizard gives you the opportunity to create a "System recovery
Disk", too. This is a handy tool if you're not TOO sure how well protected you
are from virus and other malware. The restore disc will include all data on your
computer and the lies necessary to restore windows in the case of a major failure.
Note! Backing up means making a copy of files and store it on another media,
such as a CD Rom disk, a Smart drive or another hard drive. Choose the one that
suites you the best. For the CD Rom backup option - of course - you will need a
"Burner" to make a copy.
An external hard drive attached to your USB port is a good choice for backup
media.
The next of the important accessories is:
140
• The Disk Defragmenter
When you click the Disk Defragmenter from the Windows accessories > System
Tools menu
Screensaver
Software program that becomes activated after the computer has been inactive for
a specified amount of time. Screensavers were originally designed to help prevent
images or text from being burned into older monitors. The monitors and LCDs
used today no longer suffer from this issue and screensavers are commonly used
today for entertainment, a method of securely protecting your computer while
away, or a method of informing visitors of the computer user's status
How can I create a photo slideshow?
Answer
There are several available software programs capable of creating a photo
slideshow. However, we've been really impressed with Picasa, a free software
program from Google capable of running a slideshow of photos on your
computer, saving the slideshow as a movie file, creating a screensaver, and
saving those photos to a CD to be viewed elsewhere. Below are steps on how to
create a slide show using Picasa.
Before following any of the below steps you'll need to downloaded and installed
Picasa on your computer visit http://picasa.google.com/ and download Picasa
now.
Running a Slideshow on your computer
1. Open Picasa.
2. Browse to the folder containing your pictures or highlight all the pictures
you wish to run a slideshow for.
141
3. Click the Slideshow button.
Once completed successfully the slideshow will begin to run. Clicking the mouse
button on the screen while being run will open an option menu that will allow
you to adjust the settings.
Saving the Slideshow as a movie file
1. Open Picasa.
2. Browse to the folder containing your pictures or highlight all the pictures
you wish to run a slideshow for.
3. Click Create at the top of the Window and then click Movie.
4. In the Create Movie window select the delay between each of the pictures
and the size of the movie. As you increase the size of the movie file it will
increase the quality, however, at the same time will also increase the size of the
movie file. Once options have been selected click Ok.
5. Finally, you'll have the option of selecting the video compression to be
used. By default the video will not be compressed and will allow it to work on
many different players. However, will be very large if you have several hundred
pictures. If you're not sure what compression to use we suggest using DivX if you
plan on creating a movie with a lot of images.
6. Click Ok and the movie will be created.
Creating a screensaver from your images
1. Open Picasa.
2. Browse to the folder containing your pictures you wish to add to the
screensaver.
3. Click Create at the top of the Window and then click Add to
Screensaver.
How do I change my Windows screensaver?
Answer
Microsoft Windows 95, 98, ME, NT, 2000, and XP users can change their
screensaver and adjust its properties by following the below steps.
1. Open the Control Panel.
2. In the Control Panel double-click the Display icon.
3. In Display click the Screen Saver tab.
4. Within the Screen Saver tab you can view the currently set screensaver as
well as change the screensaver to another installed screensaver. Click the Settings
button to make any addition changes to the properties of the screensaver. If you
do not wish to have a screensaver select (None).
5. Finally, once you've changed your password if you wish to see how it will
look click the Preview button.
Passwords
Some screensavers may have password settings and other security features
through the Settings button. However, most screensavers rely on Windows to
display the password prompt or Welcome screen when resuming from the
142
Windows screensaver. For password protection check the box "On resume
password protect" or "On resume, display Welcome screen" or a similar option.
Away messages. If you step away from your computer and want to let others
know who may stop by your computer setting the screensaver as the Marquee is a
fast and easy way to leave an away message. Marquee is a default Windows
password and can be selected from the drop-down menu of available passwords.
Once selected click the Settings button and change the text often defaulted to:
Your text goes here. to the text you wish to scroll across your screen. For
example, I'm out to lunch, will be back at 1:00.
Instructions
1.
Find the files you wish to send to your computer's Recycle Bin. You can do this
by directly accessing the file folder if you know where it is, or you can use the
Start Menu's "Search" feature and enter the name of the file to find it.
Highlight the file using the mouse pointer by single clicking on the file or folder
in question.
Press the "Delete" key. This will bring up a context menu asking you if you're
sure you want to send the item to the Recycle Bin.
Confirm your selection by clicking "Yes." This will automatically send the file to
the Recycle Bin. Press "No" if you've made a mistake.
o Use the right-click context menu instead of the "Delete" key to cut
out a step. Simply click the "Delete" link on the menu and proceed as you did in
Step 4.
Right-click on the Recycle Bin, which should be on your desktop. This will bring
up its list of functions. Open or Explore the Recycle Bin to see the contents.
Click "Empty Recycle Bin" to complete the deletion process and remove files
from your hard drive.
Windows Accessories Programs
Calculator Program:
• Open the Start menu by clicking on the Start button.
• Select Programs.
• Select Accessories.
• Select Calculator.
Back to top
Standard Calculator Features:
• Backspace - deletes the last digit of the number displayed.
• CE - Clears the last number input.
• C - Clears the last calculation.
• +/- - Changes the sign of the number.
• M+ - Adds number displayed to number in memory.
143
• MS - Stores number displayed in memory.
• MR - Recalls number in memory.
• MC - Clears number in memory.
• Note: Only the commonly misunderstood buttons are pointed out.
Scientific Calculator:
To view the scientific calculator, select the view menu and click on Scientific.
Notepad
WordPad is similar to Notepad, but gives you more formatting options. You can
use bold and italics formatting, and change the font, size, and color of the text.
You can also create bulleted lists and center and justify paragraphs. WordPad
allows you to save documents as either basic text (.TXT) files or rich text format
(.RTF) files. Saving a document in the rich text format will keep all the
formatting you have done to the text, while saving it as a basic text file will
remove all text formatting from the document.
WordPad is a good choice for writing papers or creating documents that you want
to print. It is also great for making lists, since it supports bullets. You can use
WordPad to open an unformatted text document and add whatever formatting you
want. If you want even more formatting options and a more user-friendly
interface, you can use a program such as Microsoft Word.
Ms-Word
INTRODUCTION
Let us consider an office scene. Many letters are typed in the office. The officer
dictates a letter. The typist first types a draft copy of the letter. The officer goes
through it to check mistakes regarding spelling errors, missing words, etc. and
suggests corrections. The typist changes the letter as suggested by the officer.
This is a simple example of word processing.
There are many software packages to do the job of word processing. Some of
them work in DOS environment. Example are WordStar, Word Perfect and
Professional Write. But in these days working in WINDOWS is becoming more
and more popular. So let us consider software for word processing which works
in WINDOWS. Our choice is MS-WORD because it is the most popular software
in these days.
What Is Word-Processing?
Word Processor is a Software package that enables you to create, edit, print and
save documents for future retrieval and reference. Creating a document involves
145
typing by using a keyboard and saving it. Editing a document involves correcting
the spelling mistakes, if any, deleting or moving words sentences or paragraphs.
(a) Advantages of Word Processing
One of the main advantages of a word processor over a conventional typewriter is
that a word processor enables you to make changes to a document without
retyping the entire document.
(b) Features of Word Processing
Most Word Processor available today allows more than just creating and editing
documents. They have wide range of other tools and functions, which are used in
formatting the documents. The following are the main features of a Word
Processor
i. Text is typing into the computer, which allows alterations to be made
easily.
ii. Words and sentences can be inserted, amended or deleted.
iii. Paragraphs or text can be copied /moved throughout the document.
iv. Margins and page length can be adjusted as desired.
v. Spelling can be checked and modified through the spell check facility.
vi. Multiple document/files can be merged.
vii. Multiple copies of letters can be generated with different addresses
through the mail-merge facility.
Ms-Excel
WHAT IS A SPREADSHEET?
A spreadsheet is simply a table or matrix of rows and columns, very similar to an
accounting journal. The intersection of each row and column is called a cell. A
cell can hold any type of data, including numbers, formulas and texts. The major
difference between an electronic spreadsheet and an accounting journal is the
enhanced flexibility, speed and accuracy provided by an electronic spreadsheet.
Excel is an electronic spreadsheet program that can be used for storing,
organizing and manipulating data.
When you look at the Excel screen (refer to the example on this page) you see a
rectangular table or grid of rows and columns. The horizontal rows are identified
by numbers (1,2,3) and the vertical columns with letters of the alphabet (A,B,C).
For columns beyond 26, columns are identified by two or more letters such as
AA, AB, AC.
The intersection point between a column and a row is a small rectangular box
known as a cell. A cell is the basic unit for storing data in the spreadsheet.
Because an Excel spreadsheet contains thousands of these cells, each is given a
cell reference or address to identify it.
The cell reference is a combination of the column letter and the row number such
as A3, B6, AA345.
Data Types, Formulas, and Functions
146
The types of data that a cell can hold include numbers, text or formulas. Just as in
math class, formulas are used for calculations usually involving data contained in
other cells. Excel and other electronic spreadsheets include a number of built in
formulas used for common tasks known as functions.
Excel and Financial Data
Spreadsheets are often used to store financial data. Formulas and functions that
are used on this type of data include:
• Performing basic mathematical operations such as summing columns and
rows of figures.
• Finding values such as profit or loss.
• Calculating repayment plans for loans or mortgages.
• Finding the average, maximum, or minimum values in a specified range
of data.
Excel's Other Uses
Other common operations that Excel can be used for include:
• graphing or charting data to assist users in identifying data trends.
• sorting and filtering data to find specific information.
The information garnered in a spreadsheet can easily be incorporated into
electronic presentations, web pages, or printed off in report form.
Excel delivers powerful new features and tools to help you discover patterns or
trends that can lead to more informed decisions and improve your ability to
analyze large data sets
Save time , simplify your work , and increase your productivity.
Ms-Power Point
PowerPoint is a complete presentation graphics package. It gives you everything
you need to produce a professional-looking presentation. PowerPoint offers word
processing, outlining, drawing, graphing, and presentation management tools- all
designed to be easy to use and learn.
The following gives you a quick overview of what you can do in PowerPoint:
Features
147
Creating interactive PowerPoint presentations is easy with a Turning
Technologies Audience Response System and Turning Point our simple
PowerPoint software plug-in. Turning Point works within PowerPoint by taking
professionally-designed templates and simply editing them to suit your needs
using the Turning Point toolbar. All of the templates are fully customizable,
meaning you can change the text, color, size and style in just a few clicks. Just
choose a template, alter the content and settings using the Turning Point toolbar,
and save your slide - as easy as 1-2-3.
it is a PowerPoint that anyone can use. You can draw pictures with it....MS
PowerPoint is a software application that has replaced 35mm slide shows of the
past. One creates this presentation tool by creating a series of horizontally
formatted "slides".
One can then add "special effects" for each placeholder, such as fly ins, fly outs,
etc. to add interest and "sizzle" to the presentation.
For more advanced uses, Adobe Flash and other applications can be used to add
customized special effects and interactivity.
Ms-Access
Microsoft Access has been around for some time, yet people often still ask me
what is Microsoft Access and what does it do? Microsoft Access is a part of the
Microsoft Office Suite. It does not come with all versions of Microsoft Office, so
if you specifically want Microsoft Access make sure the office suite you are
148
purchasing has it. Microsoft Access has the look and feel of other Microsoft
Office products, including its layout and navigational aspects. That is where the
similarity ends. Microsoft® Access is a database and, more specifically, a
relational database. This will be explained in more detail later.
What is Microsoft Access made up of?
The Microsoft® Access Database is made up of 7 major components:
• Tables;
• Relationships;
• Queries;
• Forms;
• Reports;
• Macros;
• Modules.
The following gives a quick overview of each component.
Tables
The tables are the backbone and the storage container of the data entered into the
database. If the tables are not set up correctly, with the correct relationships, then
the database may be slow, give you the wrong results or not react the way you
expect. So, take a bit of time when setting up your tables.
Queries, forms, etc. are usually based on a table.
The tables that contain data look a bit like a table in Microsoft® Word or a
Microsoft® Excel Spreadsheet, when opened. They have columns and rows as
does a table in Microsoft® Word and an Excel worksheet. Each of the columns
will have a field name at the top and each of the rows will represent a record.
Relationships
Relationships are the bonds you build between the tables. They join tables that
have associated elements. To do this there is a field in each table, which is linked
to each other, and have the same values.
Queries
Are the means of manipulating the data to display in a form or a report. Queries
can sort, calculate, group, filter, join tables, update data, delete data, etc. Their
power is immense. The Microsoft® Access database query language is SQL
(Structured Query Language). The need to know SQL is not required in the early
stages of learning Access. Microsoft® Access writes the SQL for you, after you
tell it what you want, in the Design view of the queries window.
Forms
Forms are the primary interface through which the users of the database enter
data. The person who enters the data will interact with forms regularly. The
149
programmer can set the forms to show only the data required. By using queries,
properties, macros and VBA (Visual Basic for Applications), the ability to add,
edit and delete data can also be set. Forms can be set up and developed to reflect
the use they will be required for.
Reports
Reports are the results of the manipulation of the data you have entered into the
database. Unlike forms, they cannot be edited. Reports are intended to be used to
output data to another device or application, i.e. printer, fax, Microsoft® Word or
Microsoft® Excel.
Macros
Macros are an automatic way for Access to carry out a series of actions for the
database. Access gives you a selection of actions that are carried out in the order
you enter. Macros can open forms; run queries, change values of a field, run other
Macros, etc. the list is almost endless.
Modules
Modules are the basis of the programming language that supports Microsoft®
Access, The module window is where you can write and store Visual Basic for
Applications (VBA). Advanced users of Microsoft® Access tend to use VBA
instead of Macros. If you would like to learn VBA, I have simple step by step
lessons.
All of the above components are persistent; this means that changes are saved
when you move from one component to another, not when the database is closed,
as in a Microsoft® Word Document.I hope the above give you a bit of an idea of
what is Microsoft Access and what it includes.
Limitations
The total size of a database file (.MDB) is limited only by the storage capacity of
your PC (Microsoft® quote the maximum database size of 2 Gigabyte (2000
Megabytes)). These figures are for pre 2007 versions of Microsoft Access.
Operating System
Operating System is a software program that acts as an interface between the user
and the computer. It is a software package which allows the computer to function.
Functions:
1. Program creation
2. Program execution
3. Access to Input/output devices
150
4. Controlled access to files
5. System access
6. Error detection and response
7. Interpreting the commands
8. Managing peripherals
9. Memory management
10. Processor management
11. Information management
12. Process communication
13. Networking
TALLY
Tally 4.5
Tally was started with is first version of Tally 4.5, which was a DOS based
program. This program was very light weight and very fast in operation.
Tally 5.4
The next version was 5.4 which was graphic interface version. It became popular
in the masses. Its pirated copy made it most popular accounting software.
Tally 6.3
Next version was tally 6.3 which was truly windows based version which could
support fast printing and with VAT implemented. Tally 6.3 came with water tight
security in terms of piracy. With its dongle it was almost impossible to crack.
Although crack of software were available but Tally's policy of frequent upgrades
and newer releases does the trick.
Tally 7.2
Next version of Tally was Tally 7.2. It was also fast version with lots of new
feature like statutory compliant versions. Different VAT rules for different states
was achieved with this version. eTDS ,Service Tax,Tcs,Mail Tally, Tally
8.1,Excise for Traders, Fringe Benefit Tax, Payroll
Tally 8.1
was developed with new data structure of Tally. A module of POS and Payroll
was added to it. It could not live up to the expectations with the people and
marred by bugs. Company rectified many but the version could not become
popular and company has to abort it before time and launch new version. Job
Costing, POS Invoicing, Data Synchronization, Advanced MIS
Tally 9
This is the latest version of Tally which has maximum features. All other
versions have been declared end of life period by Tally company. Tally 9 has
advance features like Excise for Dealers, Payroll, FBT, TDS, e-TDS filing
facility etc along with its regular features related to accounting and inventory
management.
151
POS, Import/Export, Excise for Dealers, Export of Statutory Report to Excel,
Difference between tally and erg
Tally 9 is the ultimate business solution, designed to meet the growing needs of
your business. When you use Tally 9 , you will see clear business benefits accrue
right from the start. The following are the powerful advantages that you can
enjoy with this versatile and robust solution:
• Expand your business - with the concurrent multi-lingual capability and multi-
currency features that allow you to transact beyond geographical boundaries,
without language barriers.
• No need to hire specialized resources – since Tally 9 is very simple to learn
and the easy interface enables you to navigate the software without difficulty.
• Blazing Speed - provides you with the information you want - FAST.
• Unmatched Scale ability –Tally 9 adapts to the current and future needs of
your business, irrespective of its size or style.
• Sheer Power – Tally 9 has the ability to handle huge volumes of transactions
without compromising on speed or efficiency.
• Real-time access to information – enables quick decision through fast and
easy sharing of data from Tally.
• Better cash flow and savings on interest - by using the ‘receivables and
payables’ management feature, to help you ensure on-time collections and
generate reminder letters.
• Amazing Accuracy – Tally 9 provides user-definable templates for fast,
accurate data entry.
• Manage your future dealings with bad debtors and persistent defaulters -
using the payment performance of debtors feature, to identify them.
• Faster and error-free invoicing and data entry – using the multiple price
levels feature to pre-define item rates for specific categories of customers.
152
• Identify products with high or low margins - with the profitability analysis
feature, that provides you with product-wise and invoice-wise profitability.
• Avoid stocking excess items and ensure that you don’t run out of essential
stock - by using the reorder feature, to set reorder levels for any given period.
• Better planning and dramatic improvement in co-ordination of your
operations with reduced paperwork – as a result of using the integration across
functions feature.
• Reduce costs and increase productivity – using features such as inventory
management, receivables and payables management etc.
• Accurate information tracking, quicker data entry and retrieval - thanks to
the integrated system that ensures real-time linking of accounts and inventory.
• Get a better understanding and analysis of performance levels for various
periods and divisions - with the advanced MIS feature.
• Enjoy better planning and forecasting – using sophisticated analytical tools
that help you forecast and examine possible scenarios, and give you the ability to
view provisional reports.
• Save time and reduce paperwork - by automating your Payroll process with
the Payroll Feature in
Video Conferencing
Connect as if you were face-to-face, even if your meeting members are spread
across the globe. This simple to use technology will improve your meeting
communication and help eliminate your travel budget and greenhouse gasses.
Meet together as if you were in the same room, and help save the planet - who
wouldn't want to do that?
153
• High Quality Video Conferencing
• Easy to Use
• Convenient - Always Available
• 9.9 cents per minute
• Includes Toll-Free Audio Telephone Access
• Try Before You Buy - Call us for your 14-day trial
• 5 Ways to Supercharge your Video Conference
• HD Video Conferencing
To make the most of your video conference, follow these additional tips:
• Before the meeting gets under way, introduce each of the conference
participants, including their position, affiliation or reason for attending. You want
people to put a name to each face and understand each individual's role in the
discussion.
• Immediately establish meeting etiquette. You may not be the only first-
timer at the video conference. Ask participants to identify themselves when they
comment or ask a question. Ask participants to mute their microphones when
they are not speaking to keep extraneous noise to a minimum.
• Maintain control of the meeting. When asking for comments or questions,
specify the order to be followed and follow it consistently. Make certain
participants at distant sites are equally represented with regard to questions and
comments.
• When answering questions, repeat the question first to make certain
everyone heard it.
• Avoid interrupting when participants are speaking so that all speakers can
be clearly heard.
• Encourage discussion to create interaction between meeting participants.
• Watch for body language and gestures that may indicate that a participant
would like to ask a question or make a comment or that they are confused or
annoyed. Stop and invite their participation.
• If presenting visuals, give your audience time to read the material twice to
ensure assimilation.
• Make sure your microphone is muted at the end of the meeting.
154
Say a technical support executive goes to a site where the spare part isn’t
working, explains an IT director. Using the People Link Video Conference on
internet data card, the maintenance guy sends pictures in real-time to a tech that
specializes in that spare part to help resolve the problem it doesn’t matter where
the specialist is physically located. As a result, productivity increases along with
employee and customer satisfaction.
155
• 6. Reducing hiring cycle and recruitment costs:
The cost of acquiring talent can be significantly reduced by using video
conferencing to pre-interview rather than having the candidate or the interviewer
travel to the office or vice versa for the interview.
156
site for final selections, they had already narrowed the pool to a handful of
companies worth visiting.
Disadvantages
✘ Technical Problems
The major disadvantages are the technical difficulties associated with smooth
transmissions that could result from software, hardware or network failure.
Remote connections are sometimes known to be hampered by environmental
changes. On some occasions, the absence of technical support personnel creates
difficulty for participants who are unfamiliar with the videoconferencing
technological concepts.
This document traces decision support applications and research studies related to
model and data-oriented systems, management expert systems, multidimensional
data analysis, query and reporting tools, online analytical processing (OLAP),
Business Intelligence, group DSS, conferencing and groupware, document
management, spatial DSS and Executive Information Systems as the technologies
emerge, converge and diverge. All of these technologies have been used to
support decision making.
Decision Support Systems (DSS) are a specific class of computerized information
system that supports business and organizational decision-making activities. A
properly designed DSS is an interactive software-based system intended to help
decision makers compile useful information from raw data, documents, personal
knowledge, and/or business models to identify and solve problems and make
decisions.
Typical information that a decision support application might gather and present
would be:
• Accessing all of your current information assets, including legacy and
relational data sources, cubes, data warehouses, and data marts
• Comparative sales figures between one week and the next
• Projected revenue figures based on new product sales assumptions
• The consequences of different decision alternatives, given past experience
in a context that is described
Expert System
158
containing accumulated experience and a set of rules for applying the knowledge
base to each particular situation that is described to the program. Sophisticated
expert systems can be enhanced with additions to the knowledge base or to the
set of rules.
Among the best-known expert systems have been those that play chess and that
assist in medical diagnosis.
The user interface is the means of communication between a user and the expert
systems problem-solving processes. A good expert system is not very useful
unless it has an effective interface. It has to be able to accept the queries or
instructions in a form that the user enters and translate them into working
instructions for the rest of the system. It also has to be able to translate the
answers, produced by the system, into a form that the user can understand.
Careful attention should be given to the screen design in order to make the expert
system appear ‘friendly’ to the user.
The knowledge base stores all the facts and rules about a particular problem
domain. It makes these available to the inference engine in a form that it can use.
The facts may be in the form of background information built into the system or
facts that are input by the user during a consultation. The rules include both the
production rules that apply to the domain of the expert system and the heuristics
and rules-of-thumb that are provided by the domain expert in order to make the
system find solutions more efficiently by taking short cuts.
The inference engine is the program that locates the appropriate knowledge in the
knowledge base, and infers new knowledge by applying logical processing and
problem-solving strategies.
159
The first expert systems appeared in the late sixties. Today, they exist in many
forms, from medical diagnosis to investment analysis and from counseling to
production control. Due to the advances of the last decade, today's expert
systems users can choose from dozens of commercial software packages. At
present, we accept as routine such expert systems as weather forecasting, online
mapping and driving directions, diagnostic systems for automotive repair shops,
and so on.
Artificial Intelligence then and now In 1941, the most intelligent machine was an
invention in the form of the electronic computer. Who would have thought 60
years from then that the same computer would be perfected beyond leaps and
bounds and be used to control other machines, as well as be part of day to day
living? In 1956, John McCarthy, considered the father of Artificial Intelligence,
organized a conference where intellectuals gathered to learn of this phenomenon.
This laid the foundation for the advancements in artificial intelligence today.
There are many advantages and disadvantages of the use of artificial intelligence
in business and in our day to day lives.
Machines can be used to take on complex and stressful work that would be
otherwise performed by humans Machines can complete the task faster than a
human assigned to do the same task Use of robotics to discover unexplored
landscape, outer space and also be useful in our home activities Less danger,
injury and stress to humans as the work is done by a artificially intelligent
machine Aiding of mental, visually and hearing impaired individuals Used for
games to create a atmosphere where you don't feel like you are playing against
just a machine Understanding complex software can be made in to easy-to-
understand types with the aid of artificial intelligence Less errors and defects
160
Minimized time and resources. Time and resources are not wasted but effectively
used to achieve the end goal Their function is infinite
Lacks the human touch. Human qualities are sometimes ignored The ability to
replace a human job. This gives rise to humans feeling insecure and may have the
fear of losing their job Human capabilities can be replaced using a machine and
therefore can foster feelings of inferiority among workers and staff Artificial
Intelligence can malfunction and do the opposite of what they are programmed to
do May corrupt the younger generation. There is no filtering of information This
type of technology can be misused to cause mass scale destruction
Summery: This article describes what artificial intelligence is and how useful it is
in our day to day lives, while also highlighting some of the disadvantages.
Introduction to IT Concepts and its development
There term “Information Technology” came about in the 1970’s. Information
Technology is a manifestation of public and private investment in science and
engineering (S&E) that is enabling broad and significant changes in society.
Throughout the 20th century an alliance between the military and various
industries has existed in development of electronics, computers and information
theory. Many observers compare the rapid development and expansion of IT to
industrial revolution in terms of its potential scope and impact on society. Few
other modern advances in technology have had the capacity to affect so
fundamentally the way people work, live, learn and govern them. As with the
industrial revolution, both the time and direction of many of the changes are
difficult to predict.
Semiconductor Technology
Information Storage
Networking
IT’S Application in Business
Growth of E-Commerce
Business-to-Business e-commerce
It Effect on Productivity and Economic Growth
Inflation and Overall Economic Growth
IT Effects on Income and Work
What is Information Technology?
161
services. A career in the IT field; therefore, is focused on those who do the
designing, developing, supporting, and managing of hardware, software,
multimedia, and system integration. This is often referred to as IT Producer Skills
(Dittmar, 2003). Consider Information Technology as an expansive specialized
career field. To succeed in an Information Technology career, a candidate must
possess IT skills beyond being a user of information Technology (Dittmar, 2003).
IT Users have mastery in using a vast array of software including office suites,
Web development, and project management. IT Users have a basic understanding
162
of computer networks; multimedia; new technologies and new media; ethics,
privacy and the information retrieving and transmission.
IT Applications are pertinent to all careers and not only to those specializing in
IT. Table 1 details the IT User tasks within the applications that all workers need
to know. IT applications pertinent for all careers are the following :
163
E-mail This is the ability to send and receive messages. Although it is primarily
associated with the Internet, it is not essential to involve Internet technology. E-
mail skills are equally pertinent to proprietary software.
Word Processing This is the ability to use a software application designed for
the creation, edit and production of documents and text (i.e. writing a letter,
memo or CV).
Spreadsheets This is the ability to use a software application designed to record
data in rows and columns and perform calculations with numerical data (i.e.
Microsoft Excel, Sun Office Star or AppleWorks). It can be used in a number of
ways i.e. budgeting, producing tables, calculating house-hold bills or producing
graphs.
Databases This is the ability to use a software application (i.e. Microsoft Access
or Sun Office Star) designed to organize and collate related information (i.e.
storing addresses and phone numbers).
Web Design This is the ability to use a software application designed for the
creation and maintenance of simple non-professional web sites.
Art and Design This is the ability to use a software application designed for the
production and manipulation of drawings, clip art and digital pictures.
Presentations This is the ability to use a software application to produce
presentations, which include a combination of media (i.e. photos from digital
cameras, animation and sound) for education, entertainment or information
sharing.
Evaluate the Impact of Information Technology (IT)
This is the ability to evaluate the impact of IT in a variety of situations either at
home, work or school.
Determine the Appropriate Use of Information Technology (IT) This is the
ability to determine the appropriate use of IT in a variety of situations either at
home, work or school.
media and web development, or the business side of IT, but each carries over into
the other. Some examples of IT jobs titles requiring IT producer skills are listed
below; job descriptions vary by company. See the Specialized Careers within the
IT Industry section of this paper for details about these jobs.
Application Systems Analyst
Client/Server Programmer
Data Architect
Help Desk Support
Network Administrator
Web Designer
Windows NT Administrator
Network Security
Image Processing
164
In imaging science, image processing is any form of signal processing for which
the input is an image, such as a photograph or video frame; the output of image
processing may be either an image or a set of characteristics or parameters related
to the image. Most image-processing techniques involve treating the image as a
two-dimensional signal and applying standard signal-processing techniques to it.
Image processing usually refers to digital image processing, but optical and
analog image processing also are possible. This article is about general
techniques that apply to all of them. The acquisition of images (producing the
input image in the first place) is referred to as imaging. Closely related to image
processing are computer graphics and computer vision. In computer graphics,
images are manually made from physical models of objects, environments, and
lighting, instead of being acquired (via imaging devices such as cameras) from
natural scenes, as in most animated movies. Computer vision, on the other hand,
is often considered high-level image processing out of which a
machine/computer/software intends to decipher the physical contents of an image
or a sequence of images (e.g., videos or 3D full-body magnetic resonance
scans).In modern sciences and technologies, images also gain much broader
scopes due to the ever growing importance of scientific visualization (of often
large-scale complex scientific/experimental data). Examples include microarray
data in genetic research, or real-time multi-asset portfolio trading in finance.
165
History
Virtual Reality
166
The uses for virtual reality are infinite. It can be used for air traffic control,
medicine, entertainment, office work and industrial design. However, along with
the good comes the bad. Virtual reality could also be used for destructive
purposes, such as war and crime.
The idea of virtual reality emerged in the 1930s when scientists created the first
flight simulator for the training of pilots. They wanted to put the piloted in a real
situation before letting him fly.
In 1965, an American, called Ivan Sutherland, hit on a new idea and published his
findings in a document called 'The Ultimate Display'. His idea was to create a
portable, or personal, virtual world using two tiny television sets, one for each
eye. In order to realise this, he also designed a head mounted display. Although
his invention worked, and he did create a sort of a virtual world, the images were
very crude and basic. Another problem was the helmet - it was extremely heavy
and cumbersome and needed to be supported from the ceiling. It was also very
expensive. In the following years, scientists continued to work on Sutherland's
initial idea and great improvements were made. Then in 1985, Michael
McGreevey of NASA/AMES developed a much cheaper and lighter version of
the helmet. He used a motorcycle helmet and fitted it with mini display screens,
and special sensors which were designed to track movement and were linked to
powerful, but sensitive computers.
The final piece of equipment for a complete virtual reality kit was a glove. One
had been designed in the early 1980s, but modern virtual reality was born in 1986
when a computer games programmer, called Jaron Lanier, designed a new glove.
This brought the VR helmet and glove kit into existence for the first time. It was
Lanier who gave this new technology the name Virtual Reality.
The second form of virtual reality uses video cameras to track the image of the
user in a virtual world where you can also pick up or move objects. Both these
VR systems allow more than one person to take part at the same time.
The final type of VR is where three- dimensional images are played on a large,
curved screen. The shape of the screen helps to give you a greater sense of being
in the virtual world. By wearing special 3-D glasses, this effect can be greatly
improved.
167
Information superhighway
Information
Information is the basis of the internet; you search Google to find things that
interest you, learn something new and find what you are looking for. It also
encompasses the blogging arena as well.
Social
the best way to stay in touch with friends and family. Social media, such as Face
book and Twitter are now so integrated with our lives it is as commonplace to
Face book message someone as it was to pick up the phone and call.
Online Shopping
How often do you do research on a product online before purchasing it? The
internet is a perfect vehicle for finding what you are looking for, and it is a very
competitive market. With search engine optimization and pay-per-click
advertising at the heart of online shopping, it is no wonder it is such a relevant
source of products and services.
So with that in mind, I propose that we come up with a new term to encompass
the internet. Instead of the "Information Super Highway," how 'bout the
"Information, Social, Shopping Mega Freeway?" It may not have the same ring to
it, but it certainly is more accurate in today's age.
168
Who invented the Internet?
A single person did not create the Internet that we know and use today. Below is
a listing of several different people who've helped contribute and develop the
Internet.
The idea
The initial idea is credited as being Leonard Kleinrock's after he published his
first paper entitled "Information Flow in Large Communication Nets" on May 31,
1961. In 1962 J.C.R. Licklider becomes the first Director of IPTO and gave his
vision of a galactic network. In addition to the ideas from Licklider and
Kleinrock, Robert Taylor helped create the idea of the network, which later
became ARPANET.
Initial creation. The Internet as we know it today first started being developed in
the late 1960's. In the summer of 1968, the Network Working Group (NWG) held
its first meeting chaired by Elmer Shapiro with the Stanford Research Institute
(SRI) with attendees: Steve Carr, Steve Crocker, Jeff Rulifson, and Ron
Stoughton. In the meeting the group discussed solving issues related to getting
hosts to communicate with each other.
In December 1968, Elmer Shapiro with SRI released a report "A Study of
Computer Network Design Parameters." Based on this work and earlier work
done by Paul Baran, Thomas Marill and others; Lawrence Roberts and Barry
Wessler helped to create the final version of the Interface Message Processor
(IMP) specifications. Bolt Beranek and Newman, Inc. (BBN) was later awarded
the contract to design and build the IMP sub network.
Introduction of the Internet to the general public UCLA puts out a press release
introducing the public to the Internet on July 3, 1969.First network equipment
August 29, 1969 the first network switch and the first piece of network
equipment called "IMP", which is short for (Interface Message Processor) is sent
to UCLA. On September 2, 1969 the first data moves from UCLA host to the
switch. In the picture to the right, is a picture of Leonard Kleinrock next to the
IMP.
The first distributed message and network crash On Friday October 29, 1969 at
10:30 p.m., the first Internet message was sent from computer science Professor
Leonard KleinRock's laboratory at UCLA, after the second piece of network
equipment was installed at SRI. This connection not only enabled the first
transmission to be made, but is also considered to be the first Internet backbone.
The first message to be distributed was "LO", which was an attempt at "LOGIN"
by Charley S. Kline to log into the SRI computer from UCLA. However, the
169
message was unable to be completed because the SRI system crashed. Shortly
after the crash, the issue was resolved and he was able to log into the computer.
E-mail is developed
Ray Tomlinson introduces network e-mail in 1972. The first messaging system
to send messages across a network to other users.
TCP is developed
Vinton Cerf and Robert Kahn design TCP during 1973 and later publish it with
the help of Yogen Dalal and Carl Sunshine in December of 1974 in RFC 675.
First commercial network
Ethernet is conceived
TCP/IP is created
In 1978 TCP splits into TCP/IP driven by Danny Cohen, David Reed, and John
Shoch to support real-time traffic. This allows the creation of UDP. TCP/IP is
later standardized into ARPANET in 1983 and is still the primary protocol used
for the Internet.
DNS is introduced
170
First generation: machine language
Second generation: assembly language
Third generation: high-level programming languages, such as C, C++, and
Java.
Fifth generation: languages used for artificial intelligence and neural
networks.
Internet Explorer has become notorious for its disregard of standards compliance
and its horrible security record. While IE 3.0 was the first major browser to
support CSS, the rest of its innovative features were proprietary Microsoft
171
developments. As these features were rushed to market, they were implemented
long before the W3C had the chance to standardize implementation details.
Often, the recommended implementation of then-proprietary features was not
compatible with Microsoft's development (or Netscape's, for that matter). As
Microsoft developed its FrontPage web-authoring software which produced the
non-standard code required to implement Microsoft's innovations, the company
could not change Internet Explorer to conform to web standards while FrontPage
did not. Thus, a tradition of non-standards compliance was instituted within IE
development. Although standards non-compliance was not reason enough to
interest people in finding web browser alternatives, IE's security record has
caused many IT managers and even home users to seek alternatives. Internet
Explorer has more security notices than all the other web browsers combined, and
the severity of IE security issues is often very severe, given the tight integration
between the web browser and the Windows operating system.
What is 127.0.0.1?
127.0.0.1 Is a reserved IP address corresponding to the host computer? Known as
the loopback address, 127.0.0.1 is used whenever a program needs to access a
network service running on the same computer as itself. Although mainly used as
a testing and development address, the loopback address can be used to access
local services, such as web servers, that are usually only accessed over a network
and have no local interface. Additionally, most modern operating systems that
implement TCP/IP regard the name "local host" as being equivalent to 127.0.0.1.
172
'prove' their network's speed and reliability by having customers ping the
loopback address. Many anecdotes about the "World's Worse Hacker" performing
a DDoS attack, or similar malicious feat, on 127.0.0.1 circulate the Internet.
What is Email?
Email is abbreviation for "Electronic Mail". It is one of the most common uses of
the Internet today, secondary only to the World Wide Web. Although originally
spelled with a dash (E-mail) popular use has seen the dash eliminated. This is
evidence to email's penetration into everyday life and its importance. While email
is often perceived as an inclusive system, there are actually a series of protocols
governing its application which are constantly being refined. Notable among
these are SMTP, POP3, and IMAP. No fewer than four different computer
programs and often as many as eight may handle a typical email message in the
few seconds between its transmission and receipt.
The first email systems were developed at SCD and MIT in 1965. Incompatible
with each other, each system was designed to facilitate message delivery between
users on a single machine. As there were no large computer networks at the time,
the need for interoperable protocols had yet to be realized. When ARPANET
engineer Ray Tomlinson decided in 1971 that he wanted to send a message to
another user on a remote computer, he chose the @ symbol to separate the user's
name from the machine's name. He modified the leading email program of the
time, SNDMSG (which Ray himself wrote), to accept and process these new
addresses. Within just a few years, Ray's protocols had been implemented on
virtually every networked computer in the world.
Advertisement Are you looking for a good Exchange email outsourcing service to
host your email? If you are tired of spam and headaches with trying to manage
your email, let an email hosting service do it for you. If you want the best, you
need an email host that uses the latest software: Exchange 2007 to host your
email so you get the best bang for your buck.
Email logo
Although email is often credited with making the world smaller by fostering
communication, it has also brought with it a fair share of problems. Email
communications are usually plain text transmissions over unsecured channels,
passing through many gateways on their way to delivery. Thus, the interception
of email is not difficult to perform. Also, backups of email delivery machines can
save copies of messages for years, even though they had been deleted by the
recipient. However, the most visible problem associated with email today is
spam, or unsolicited bulk messages. Estimates of global spam rates hover
173
between 70 and 80 percent of all email successfully delivered, and some popular
systems can see their spam rates rise well over 99 percent.
What is a Network?
Wireless home networks are becoming extremely popular. The reduction in cost
of wireless equipment has seen thousands of new consumer-grade products enter
the market. The vast majority of these connect via the popular IEEE 802.11 Wi-
Fi standards. In fact, many homes and small establishments would not have
computer networks were it not for Wi-Fi, thus the technology is often perceived
as not simply being a wireless version of the standard wired network. Wi-Fi
enables networked computers to be placed in locations otherwise unavailable,
such as a laptop computer on a swimming pool float, or even some city-wide
efforts to blanket several square kilometers with Wi-Fi reception.
174
What is Firefox? What is a Firewall? What are FOSS and FLOSS
software?
What is FUD? What is GIMP? What is Gmail?
What is a Hacker? What is a Kernel?
Computer Keyword
G
176
GB – Gigabytes
GBps – Gigabytes per second or Gigabits per second
GDI – Graphical Device Interface
GHz – GigaHertz
LG – LG Electronics
LAN – Local Area Network
177
LCD – Liquid Crystal Display
LDT – Lightning Data Transport
LED – Light Emitting Diode
OC – Over Clock
OCZ – OCZ Technology
OEM – Original Equipment Manufacturer
PC – Personal Computer
PCB – Printed Circuit Board
PCI – Peripheral Component Interconnect
PDA – Personal Digital Assistant
PCMCIA – Peripheral Component Microchannel Interconnect
Architecture
PGA – Professional Graphics Array
178
PLD – Programmable Logic Device
PM – Private Message or Private Messaging
PnP – Plug ‘n Play
PNY – PNY Technology
POST – Power On Self Test
PPPoA – Point to Point Protocol over ATM
PPPoE – Point to Point Protocol over Ethernet
PQI – PQI Corporation
PSU – Power Supply Unit
TB – Terabytes
179
TBps – Terabytes per second
Tbps – Terabits per second
TDK – TDK Electronics
TEC – Thermoelectric Cooler
TPC – TipidPC
TWAIN – Technology Without An Important Name
VCD – Video CD
VPN – Virtual Private Network
Reference
sixrevisions.com/resources/the-history-of-computers-in-a-nuts
computerhistorytoday.weebly.com/history-of-the-computer.html
enfind.com/history-of-computers-nutshell
techbitestoday.blogspot.com
sitefans.net/pc/the-history-of-computers-in-a-nutshell.html
180
wwweceinfotech.blogspot.com
www.studymode.com/essays/Computers-Then-And-Now-1175770.html
www.studymode.com/course-notes/Brief-History-Of-Computer-1817465.html
sarvajan.ambedkar.org/index.php?s=sayadaw
https://www.scribd.com/doc/270391736/Computers
https://www.scribd.com/doc/257364018/Computers
https://www.scribd.com/.../Evolution-and-classification-of-computers
en.wikipedia.org/wiki/Z3_(computer)
en.wikipedia.org/wiki/Differential_analyser
en.wikipedia.org/wiki/Manchester_Small-Scale_Experimental_Machine
en.wikipedia.org/wiki/Talk:Manchester_Small-Scale_Experimental_Machine
en.wikipedia.org/wiki/Mechanical_computer
en.wikipedia.org/wiki/Harwell_Computer
www.slideshare.net/.../evolution-and-classification-of-computers
www.authorstream.com/Presentation/Sabatini-37647-history-computers...
www.authorstream.com/Presentation/aSGuest108169-1131758-historyof...
en.m.wikipedia.org/wiki/Category:Electro-mechanical_computers
181