Icitss - It Module 1
Icitss - It Module 1
(ICITSS)
COURSE MATERIAL
MODULE – I
Board of Studies
The Institute of Chartered Accountants of India, New Delhi
The objective of this compilation of background material is to provide uniform reference
material to the students undergoing Information Technology under ICITSS. All attempts
have been made to make the discussion simple and comprehensive.
Students may note that this is intended to help them acquire knowledge and skill in
the subject and gain hands on experience. This is also expected to serve as a source
of reference book in their future education and training. In case students have any
suggestions to make for further improvement of the material contained herein, they
may write to Board of Studies, A-29, Sector-62, and NOIDA.
Queries can also be sent to [email protected]
All care has been taken to provide the material in a manner useful to the students.
However, the material has not been specifically discussed by the Council of the
Institute or any of its Committees and the views expressed herein may not be taken to
necessarilyrepresent the views of the Council or any of its Committees.
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any forms, or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without prior permission, in writing, from the
Institute.© The Institute of Chartered Accountants of India, January 2009
ISBN : 978-81-8441-037-2
Designed & Printed at Repro India Limited, 50/2, TTC MIDC Industrial Area, Mahape,
Navi Mumbai 400 710, India.
August / 2011 / 30,000 Copies (Revised)
Preface
The impact of Information Technology (IT) on several aspects of accounting profession and
practice has been pronounced over the last three decades. The revolutionary developments
of various IT tools and techniques have a far reaching impact on the organizations. The
survival and growth of a dynamic profession such as Chartered accountancy depends, to a
large extent, on adoption of new techniques/methods and equipping the students to face the
emerging challenges in this globalized competitive business environment. The Institute of
Chartered Accountants of India has been making earnest efforts to develop a contemporary
body of knowledge and skill set for its student by updating its curriculum from time to time.
Considering the importance of Information Technology in present era, the Institute has
developed Integrated Course on Information Technology and Soft Skill (ICITSS) consisting
of Information Technology (IT) and Orientation Course (OC) for 4 weeks duration in shaping
Chartered Accountants as complete business managers with an all-round personality.
The objective of ICITSS is to familiarize the students with diversified field of Accountancy
profession, to make them tech- savvy and to develop their communication and presentation
skills and to foster values such as integrity, transparency so as to groom them as professionals
in future.
In order to impart synchronized and uniform theoretical and practical knowledge to all the
aspiring CA students in the IT area, the Institute has established its own IT Labs equipped
with computers of latest configuration, software and other infrastructural facilities at almost
all its Branches and Regional Offices.
The syllabus of Information Technology training has been revised under the new scheme
of education and training.The training components would focus on application software
relevant for accounting and auditing.
In addition, knowledge of Operating Systems Like Windows 7, MS-Office including Word,
Excel, PowerPoint, MS-Access, Computer Assisted Audit Techniques (CAAT) and Accounting
Package are strengthened. Students will also be familiarized with aspects of e-Filing relating
to Income Tax, Service Tax, Company Law and GST etc.
Module-I has been updated to include Computer Fundamentals, Operating Systems, MS-
Word 2010, MS-Excel 2010 and MS-PowerPoint 2010. In MS-Excel 2010, three new chapters
have been added keeping in view the relevance of Excel in the field of accounting.
Module-II has been updated to include new chapter on Computer Assisted Audit Techniques.
However, other topics such as MS-Access 2010, CBS, Accounting Package and E-filing have
been revised keeping in view the present requirements for CA profession.
The Board of Studies has thoroughly revised uniform course material prepared in accordance
with the course contents covered in the specially designed curriculum to disseminate quality
education to its students. The Board of Studies has printed this revised Information Technology
Study Material for distribution to CA students across India and abroad.
We hope that this course material would help the students in building their IT skills which
is a must for all, in the current scenario.
Contents
Unit 1 : Computer Fundamentals .......................................................................................... 1
LEARNING OBJECTIVES
To understand the basic concepts of computer system
To know the uses of computers in various fields
To understand the computing process
To understand the characteristics of computers
To do the classification of computers
To discuss various generations of computers
To understand the various functions of CPU
To know the concept of Virtual Memory
1.1 COMPUTER
In the simplest definition, a computer is an electronic device - a flexible machine that can manipulate
data. Computer is being used for tasks as adding up the supermarket bill, getting cash at an ATM,
computers are also used by writers, television producers, musicians, poets, graphics illustrators and
scholars of medieval history. A computer is programmable i.e. the computer depends totally on
the program, which the computer is using. (A program is a list of instructions, telling the computer
'what to do.') A computer’s hardware (the machine and its components) is designed to be as flexible
as possible. By using computer programs, called software, one transforms this flexible hardware
into a tool for a specific purpose. No matter which program a computer is using, the machine itself
performs only four basic operations, as shown in Fig. 1.1.1. The most widely accepted definition of
the computer includes the following operations :
2 INFORMATION TECHNOLOGY
Computer Concepts
Data
INFORMATION TECHNOLOGY 3
Computer Fundamentals
1.2 USES OF COMPUTER
The purpose of the computer is to transform data into information. In this context, data means some
kind of unorganized material that can be entered into the computer - a rough sketch that needs work,
a first draft of an essay that needs revision or polishing, figures from a company’s books, a list of
names and addresses. What results from processing operations is information, i.e. data that has
been made meaningful and useful. This capability to process data can be used in a variety of ways.
People have come up with some very interesting uses.
A psychologist keeps a computer in the counselling room. At the touch of a key, the psychologist
can search through references on a computer disk for information relating to topics that come up
during counselling sessions.
4 INFORMATION TECHNOLOGY
Computer Concepts
(KB), megabyte (MB) and gigabyte (GB) are used. A kilobyte equals approximately one thousand
bytes, a megabyte equals approximately one million bytes and a gigabyte equals approximately
one billion bytes. (The actual number of bytes in a megabyte is slightly higher because computer
storage amounts are actually measured in base 2 numbers.)
1.3.2 Software
Software is the set of instructions (also called a program) that guides the hardware through its job.
The following sections explore additional aspects of software.
(a) Programming Languages: Software programs must be written in programming languages.
Programmers i.e. people trained in the use of a programming language, write programs.
(b) System and Application Software Packages: Today’s complex computer programs, such
as Microsoft Word (a word processing program), consist of many separate programs that
are designed to run together. In recognition of this fact, people sometimes speak of software
packages. When we buy Microsoft Word, we are actually buying a software package rather
than a single program. Based on the function of the package, software packages are divided into
two categories: system software and application software. Computer literacy involves; learning
that 'how to use both system software and one or more application programs'. Computers need
system software to function. System software integrates the computer’s hardware components
and provides tools for day-to-day maintenance tasks, such as displaying a list of the files
contained on a disk. MS-DOS, UNIX, Microsoft Windows 98 and System 7 are well-known
examples of system software.
(c) Application software: It turns the computer into a tool for a specific task, such as writing. Not
all application programs will be useful to us. Some application programs are special-purpose
programs, which perform a specific task for a single profession. For example, safety managers
use a program that prints records of occupation-related injuries and illnesses in a format required
by a government health bureau. If we aren’t a safety manager, we would not find this application
program interesting or useful. Other application programs are called general-purpose programs.
People use these programs for a variety of tasks. Commonly used general-purpose programs
include the following:
Word processing: More than 85 per cent of the personal computers are equipped with a
word processing program, which transforms the computer into a tool for creating, editing,
proofing, printing and storing text. Many of today’s books originated in text typed into
computers-including this one also.
Desktop publishing: In the past, newsletters and magazines were created through an
expensive, tedious process called layout, in which someone does the job of cut and pasting
photographs, borders and text to create a pleasing design. With the help of the desktop
publishing software in the computer, we can produce attractive results with a little special
training.
Electronic spreadsheet: Businesses previously worked out budgets and made forecasts
using accountant’s paper and a calculator. Electronic spreadsheet programs enable us to
type the headings and numbers into a computerized version of accountant’s paper, but
with a twist. We can hide formulae within the on-screen 'paper.' These formulae perform
computations on the data. The payoff is that one can change any number and immediately
see the effect of the change. People use electronic spreadsheets for many purposes, not
just business-related ones. For example, a forest ranger uses an electronic spreadsheet to
analyse data concerning endangered animal populations.
INFORMATION TECHNOLOGY 5
Computer Fundamentals
Database: A database program creates an electronic version of a card file-and the program
gives us the tools, needed to organize this file (for example, by alphabetizing it) and to
retrieve information. An eighth-grade English teacher, for instance, could create a database
of interesting uses of language - and retrieve examples for use in class discussions.
Telecommunications software: These software transforms a computer into a terminal,
which can connect to a multiuser computer system by means of the telephone. Commercial
multiuser systems enable us to join discussion groups, exchange mail with other users,
make plane and hotel reservations and obtain free software for our computer.
Graphics software: Are we going to give a public presentation in our future? If so, we
need to learn 'how to use presentation of Graphics programs to create attractive charts and
graphs that you can share with the audience.'
1.3.3 Data
Computers transform data into information. Data is the raw material; information is
processed data. Data is the input to the processing; information is the output. A useful
model to describe the relationship between data and information is called the systems model. It
shows that data goes into a process and information is then output. Fig. 1.3.1 describes this model.
23
6 INFORMATION TECHNOLOGY
Computer Concepts
Characteristics Description
Relevant Information applies to the current situation.
Timely Information is up-to-date and available when it is needed.
Accurate Data given to the computer and the output are correct in every detail.
Concise Information is condensed into a usable length.
Complete All important items are included.
Table 1.3.1: Characteristics of useful information
1.3.4 People
One may be surprised to learn that people are part of the computing process. Some computers, such
as the computer chip that controls an automobile engine, function without human intervention. But
even these computers were designed by people and occasionally require maintenance by people.
Most computers require people, who are called users (or sometimes end users). Some users progress
beyond the basics of computer literacy. They learn the advanced features of application programs.
With this knowledge, these users can customize an application program for a specific task. These
knowledgeable people are called power users.
Computer professionals have taken intermediate and advanced courses about computers. These
people apply their professional training to improve the performance, case of use and efficiency
of computer systems. One kind of computer professional is the programmer, who creates new
computer programs. Excellent career opportunities exist for students interested in becoming
computer professionals.
1.3.5 Procedures
Procedures are the steps that one must follow to accomplish a specific computer-related task. Part
of a user’s computer literacy is, knowing common procedures. We already know several computer
procedures. For example, we have probably used an Automated Teller Machine (ATM). Inside,
the ATM is a computer. In response to the on-screen messages, called prompts, we insert our card,
enter our Personal Identification Number (PIN) and tell the machine how much money we want.
INFORMATION TECHNOLOGY 7
Computer Fundamentals
programs and all our written work from the third grade through graduate school with room
for more.
Computers can move information very quickly from one place to another. Using all experimental
connection that may soon play a role in the Information Superhighway, one computer can send
the entire text of the Encyclopaedia Britannica to another linked computer in less than one
second.
A computer-literate person knows that the computer is a tool for creating useful information that
can be printed, communicated to others and stored for future use.
8 INFORMATION TECHNOLOGY
Computer Concepts
1.5.2 Mainframes
For input/output-intensive operations, mainframe computers
are much more suitable than supercomputers. Many modern
mainframes have multiprocessing capabilities; however, these are
generally limited to eight or fewer processors. The processors in
mainframes are slower than those in supercomputers, with speed
measured in megaflops (millions of floating-point arithmetic
operations per second) rather than gigaflops.
A mainframe computer system is usually composed of several
computers in addition to the mainframe or host processor,
as shown in Fig. 1.5.1. The host processor is responsible for
controlling the other processors, all the peripheral devices and
Fig. 1.5.1: Mainframes the mathematics operations. A front-end processor is responsible
for handling communications to and from all the remote
terminals connected to the computer system. Sometimes a backend processor is used to handle
data retrieval operations. Although the host computer could perform all these operations, it can be
used more efficiently if relieved of time-consuming chores that do not require processing speed.
Fig. 1.5.2 depicts this relationship.
Fig. 1.5.2: Relationship between front-end processor, back-end processor and host
Mainframe computer systems are powerful enough to support several hundred users simultaneously
at remote terminals. Terminals can be located near the computer or miles away. Computers can
support hundreds of users by keeping numerous programs in primary memory and rapidly
switching back and forth between programs. Because computers are so much faster than people,
the users never notice that the computer is handling other tasks. This capability to process multiple
programs concurrently for multiple users is known as multiprogramming.
The introduction of the microcomputer and the increased capabilities of minicomputers have resulted
in a decline of sales of mainframe computers. Recently, to booster sales of mainframes, IBM started
producing mainframes based on arrays of microprocessor chips and designed to be servers for giant
databases used on networks of microcomputers.
1.5.3 Minicomputers
The major difference between mainframes and minicomputers is in scale. Minicomputers can perform
the same types of tasks as mainframes, but minicomputers are a little slower. Like mainframes,
minicomputers can accommodate remote users, but not as many. Minicomputers’ input, output and
INFORMATION TECHNOLOGY 9
Computer Fundamentals
storage devices look like those on mainframes; but minicomputers have slightly less storage and the
printers are slightly slower. The distinctions between these categories of computers are blurring as
time passes. Minicomputers are frequently referred to as mid-range computers.
1.5.4 Workstations and Microcomputers
When we are working on a multi-user computer, such as a mainframe or a minicomputer, we can
control the input and see the output on the display, but we control nothing else. A single-user
computer gives us control over all the phases of computer processing: input, processing, output
and storage. We can select the programs we want to use and we don’t have to compete with other
users to gain access to the system. A single-user system is designed to meet the computing needs of
an individual. Single-user computers fall into two categories: workstations and microcomputers.
(a) Workstations: This is a powerful desktop computer designed to meet the computing needs
of engineers, architects and other professionals who need detailed graphics displays. For
example, workstations are commonly used for Computer-Aided Design (CAD), in which
industrial designers create pictures of technical parts or assemblies. To process these complex
and detailed diagrams, the computer needs much processing power and storage. Workstations
are also frequently used as servers for local area networks.
The workstation has sometimes been called a 'supermicro.' The workstation looks very much
like a desktop microcomputer, but the chips inside make the difference. Most workstations
use Reduced Instruction Set Computer (RISC) microprocessors. Computer designers have
discovered that by eliminating infrequently used pre-programmed instructions, the speed
of the processor can be increased. Many new processor chips, including the DEC Alpha and
the PowerPC, are RISC chips. RISC processors are particularly useful in special-purpose
applications, such as graphics, in which speed is critical. The DEC Alpha chip was the first
microprocessor designed to work with a 64-bit bus.
(b) Microcomputers: The boundary between workstations and personal computers is becoming
less distinct. Today’s best personal computers are more powerful and offer more precise
displays than the workstations of the recent past. The new Pentium Pro microcomputers
have multiprocessing capabilities. In addition, the distinction between workstations and
minicomputers is becoming blurred because of the most powerful workstations. These
workstations can be equipped so that more than one person can use the workstation at once,
in effect making the workstation a minicomputer.
Most microcomputers enable the user to switch between tasks. This capability is known as
multitasking - a single user variation on multiprogramming. Multitasking can be a great timesaver.
Suppose that we are using a word processor to write a test paper and we need to do some
computations on the computer and use the results in the paper. Without multitasking, we would
have to close the test paper file and the word processing application, open the calculator application,
make the computations, write down the results, close the calculator application and reopen the word
processing application and the test paper file. With multitasking, we simply open the calculator
application, make the calculations and switch back to the test paper file. This capability to task-swap
between the paper and the calculator saves time.
People frequently refer to a personal computer as a microcomputer, a computer that uses a
microprocessor for its processing circuitry. The term microcomputer originated in the late 1970s,
when the only computers that used microprocessors were PCs. But today all kinds of computers use
microprocessors. By this definition, most of today’s computers, including some supercomputers,
are microcomputers. But people usually mean PC when they use the term microcomputer.
10 INFORMATION TECHNOLOGY
Computer Concepts
1.5.5 Portable Computers
The first portable computers were dubbed 'luggables'
and for good reason. They weighed as much as 28
pounds. Soon, reductions in size created the laptop
computer. As many people discovered to their dismay,
however, 10 pounds can seem like 20 if one must carry a
laptop through a large airport or for any Iong distance.
A picture of Laptop is shown in Fig. 1.5.3.
Portable computing came of age with the creation of
notebook computers, portable computers that are small
enough to fit into an average-sized briefcase. At first,
these computers were underpowered and didn’t offer Fig. 1.5.3: Laptop
adequate storage. Today, new models offer as much
processing power and storage as microcomputers and even some workstations. Notebooks have
become very popular. Some people use notebooks instead of desktop computers.
A docking station gives us the best of both worlds; we can use the notebook as a portable and then
plug it into the docking station to access peripherals, such as printers, as well as full-sized keyboards
and monitors. Subnotebooks sacrifice some storage and
processing capability to bring the total weight down to three
or four pounds.
Palmtop computers, sometimes called picocomputers, offer
reduced size with reduced capabilities. Although some
palmtops are general-purpose, many are special-purpose
personal information managers or PIMs. Special-purpose
palmtops that keep phone directories and calendars and
provide calculator capabilities are known as Personal
Digital Assistants (PDAs), as shown in Fig. 1.5.4. We can
use a PDA to schedule appointments, retrieve frequently
used phone numbers and jot down notes. Most PDAs are
designed to accept written input by a pen; the PDA decodes Fig. 1.5.4: PDA
what we write.
Smart cards look like ordinary credit cards but incorporate a microprocessor and memory chips.
Smart cards were developed and pioneered in France about twenty years ago and are being used
extensively throughout the world. Smart cards are used to pay highway tolls, pay bills and purchase
merchandise. In France, the telecarte has virtually replaced paid telephone booths. The telecarte,
which costs $7.50, is inserted into the phone and the charge for the call is automatically deducted from
the value stored on the card. Smart cards that hold personal medical history for use in an emergency
are currently being tested. A smart card has a microprocessor and a memory chip. In the future, one
may use a smart card to record transactions such as purchases and work hours.
INFORMATION TECHNOLOGY 11
Computer Fundamentals
12 INFORMATION TECHNOLOGY
Computer Concepts
time. But these caught the public’s imagination. In newspapers and magazines, journalists wrote
of 'electronic brains' that would change the world.
First-generation computers were given instructions in machine language, which is composed
entirely of the numbers 0 and 1. Machine language was designed in this manner because
electronic computers use the binary number system. Since machine language is very difficult
to work with, only a few specialists understood 'how to program these early computers.'
All data and instructions came into the first-generation computers from punched cards.
Secondary storage consisted of magnetic drums. It wasn’t until 1957 that magnetic tape was
introduced as a faster and more convenient secondary storage medium. A single tape could
hold the contents of approximately 1, 100 punched cards (about 21 pages of information).
The Second Generation (1959 to 1963): First-generation computers were notoriously unreliable,
largely because the vacuum tubes kept burning out. Unlike vacuum tubes, transistors are
small, require very little power and run cool. And these are much more reliable. Because
second-generation computers were created with transistors instead of vacuum tubes, these
computers were faster, smaller and more reliable than first- generation computers. In the
second generation, memory was composed of small magnetic cores strung on wire within the
computer. For secondary storage, magnetic disks were developed, although magnetic tape was
still commonly used.
Second-generation computers were easier to program than first-generation computers. The
reason was the development of high-level languages, which are much easier for people to
understand and work with, as compared to assembly languages. Also, unlike assembly
language, a high-level language is not machine specific; this makes it possible to use the same
program on computers produced by different manufacturers. Second-generation computers
could communicate with each other over telephone lines, transmitting data from one location
to another. Communication was fairly slow, but a new method of exchanging data and ideas
was now available.
These second-generation computers had some problems. The input and output devices were so
slow that the computer itself frequently remained idle, waiting for cards to be read or reports to
be printed. Two different but equally important solutions solved this problem. Although both
projects began during the second generation and used second-generation technology, neither
was completed until well into the third generation.
The Third Generation (1963 to 1975): As with the first generation of computers, a device that
ended the second generation was invented before the second generation began. Integrated
Circuits (ICs) incorporate many transistors and electronic circuits on a single wafer or chip
of silicon. Integrated circuits are sometimes called chips because of the way they are made.
Integrated circuits are also called semiconductors because they are formed by combining layers
of materials that have varying capacities to conduct electricity. By etching patterns into these
layered materials, the creators can include many transistors and other electronic components
on one very small chip.
Integrated circuit technology is responsible for the computer industry’s technical progress. By the
second generation, scientists knew that more powerful computers could be created by building
more complex circuits. But because the circuits had to be wired by hand, these computers were
too complex and expensive to build. Integrated circuit technology removed this barrier. The
result was a computer that costed no more than first- generation computers but offered more
memory and faster processing.
The Fourth Generation (1975 to Today): The significance of the microprocessor cannot be
overstated–it has changed the world. The techniques, called Very Large Scale Integration
(VLSI) used to build microprocessors enable chip companies to mass-produce computer
chips that contain hundreds of thousands or even millions, of transistors. Fourth-generation
INFORMATION TECHNOLOGY 13
Computer Fundamentals
technology is still going strong. Efforts to pack even more transistors on one chip have led to
such developments as Intel’s Pentium Pro microprocessor. It contains 5.5 million transistors -a
far cry from the 2,250 transistors found in the first Intel chip. Many experts believe that further
miniaturization efforts will create billions of transistors on one chip. Although high-level
languages are still used extensively, very high-level languages appeared during the fourth
generation. A very high-level language is really a way of writing instructions for a complex
application program that has a large command set. Most new languages are based on a concept
known as Object-Oriented Programming (OOP), which encourages programmers to reuse
code by maintaining libraries of code segments. Another fourth-generation development is the
spread of high-speed computer networking, which enables computers to communicate and share
data. Within organizations, Local Area Networks (LANs) connect several dozen or even several
hundred computers within a limited geographic area (one building or several buildings near
each other). Wide Area Networks (WANs) provide global connections for today’s computers.
The Fifth Generation : If there is a fifth generation, it’s slow in coming; after all, the last one
begin in 1975. The dates are arbitrary and we may soon learn that the fifth generation began
in 1990! Major changes are occurring in software as well as hardware. According to the begin
experts, the trademark of the next generation will be Artificial Intelligence (AI). Computers
that use AI will have some attributes associated with human intelligence, such as the capabilities
to decode and respond to natural language (a human language such as English), to reason and
draw inferences and to recognize patterns in sensory input.
The human drive to learn required innovations in equipments. Past inventions made future
innovations possible innovations, from graphics capabilities to parallel processing, have filtered
down from the supercomputers to the mainframes. We can foresee the future of small computers
by watching the developments in the larger machines. Various renovations along with important
points (at a glance) are given in the Table 1.6.1, which is as follows:
14 INFORMATION TECHNOLOGY
Computer Concepts
1.7 CENTRAL PROCESSING UNIT (CPU)
In order to work, a computer needs some sort of 'brain' or 'calculator'. At the core of every computer,
there is a device roughly the size of a large postage stamp. This device is known as the Central
Processing Unit (CPU). This is the 'brain' of the computer; it reads and executes program instructions,
performs calculations and makes decisions. The CPU is reponsible for storing and retrieving
information on disks and other media. It also handles information from one part of the computer to
another like a central switching station that directs the flow of traffic throughout the computer system.
0 generation
i8088
1 generation i8086
2 generation i80286
i80386SX
3 generation i80386DX 80486SLC
i80386SX
4 generation i80486DX i80486DX4
AMD
Intel
8 generation Sledgehammer
Itanium
PC’s are designed around different CPU generations. Intel is not the only company manufacturing
CPU’s, but by far the leading one. Fig 1.7.1 shows the different CPU generations. There are
predominantly Intel chips, but in the 5th generation we see alternatives. There are CPU’s of many
brand names (IBM, Texas, Cyrix, AMD) and often they make models which overlap between two
generations. This can make it difficult to keep track of CPU’s. Here is an attempt to identify the
various CPU’s according to generation, as given in Fig. 1.7.1.
The following Table 1.7.1 helps to understand the differences between the different processors
that Intel has introduced over the years.
INFORMATION TECHNOLOGY 15
Computer Fundamentals
16 INFORMATION TECHNOLOGY
Computer Concepts
INFORMATION TECHNOLOGY 17
Computer Fundamentals
Specialised electronic circuitry in the control unit is designed to decode program instructions held
in the main memory. Each instruction is read from the memory into the instruction register. The
process of reading an instruction, is often referred to as the fetch-execute process.
1.8.2 Arithmetic Logic Unit
The arithmetic logic unit executes arithmetic and logical
operations. Arithmetic operations include addition,
subtration, multiplication and division. Logical operations
Accumulator
compare numbers, letters and special characters.
Comparison operations test for three conditions:
equal-to condition in which two values are the same,
less-than condition in which one value is smaller than
General-Purpose
the other, and
Registers
greater-than condition in which one value is larger
than the other.
These operations (=, <, >) are used to describe the
comparison operations used by the arithmetic logic unit.
Fig. 1.8.3: ALU
On the other hand, ALU also performs logic functions such
as AND or and NOT. As shown in Fig. 1.8.3, the accumulator is used to accumulate results. It is
the place where the answers from many operations are stored temporarily before being put out to
the computer’s memory. The other general-purpose registers hold data on which operations are
to be performed by the arithmetic logic unit.
1.8.3 Memory Unit
The Memory Unit is the part of the computer that holds data and instructions for processing.
Although it is closely associated with the CPU, but in actual fact, it is seperate. Memory associated
with the CPU is also called primary storage, primary memory, main storage, internal storage and
main memory. When we load software from a floppy disk, hard disk or CD-ROM, it is stored in
the Main Memory.
It’s amazing 'how many different types of electronic memory encounter in daily life.' Many of
them have become an integral part of the vocabulary: RAM, ROM, Cache, Dynamic RAM, Static
RAM, Flash memory, Memory sticks, Volatile memory, Virtual memory, Video memory, BIOS.
We already know that computer has memory. What we may not know, is that most of the electronic
items, we use every day, have some form of memory also. Here are just a few examples of the
many items that use memory : Computers, Cell phones, Personal Digital Assistants (PDAs), Game
consoles, Car radios, VCRs, TVs.
Each of these devices uses different types of memory in different ways.
There are two basic types of computer memory inside the computer, RAM and ROM.
(a) Random Access Memory (RAM): This is really the main store and is the place where the
programs and software we load gets stored. When the Central Processing Unit runs a program,
it fetches the program instructions from the RAM and carries them out. If the Central Processing
Unit needs to store the results of calculations, it can store them in RAM. A sample picture of
the RAM is given is Fig. 1.8.4.
RAM can have instructions READ from it by the CPU and also it can have numbers or other
computer data WRITTEN to it by the CPU. When we switch a computer off, whatever is stored
in the RAM gets erased.
18 INFORMATION TECHNOLOGY
Computer Concepts
RAM is the best known form of computer memory. RAM is considered 'random access' because
anyone can access any memory cell directly if we know the row and column that intersect at
that cell. The opposite of RAM is Serial Access Memory (SAM). SAM stores data as a series of
memory cells that can only be accessed sequentially (like a cassette tape). If the data is not in
the current location, each memory cell is checked until the needed data is found. SAM works
very well for memory buffers, where the data is normally stored in the order in which it will
be used (a good example is the texture buffer memory on a video card). RAM data, on the
other hand, can be accessed in any order.
(b) Read Only Memory (ROM): The CPU can only fetch or read instructions from Read Only
Memory (or ROM). ROM comes with instructions permanently stored inside and these
instructions cannot be over-written by the computer’s CPU. ROM is used for storing special
sets of instructions which the computer needs when it starts up.
When we switch the computer off, the contents of the ROM do not get erased but remain
stored permanently. Therefore it is non-volatile. Read-only memory (ROM), also known as
firmware, is an integrated
circuit programmed
with specific data when RAM
it is manufactured. ROM
chips are used not only in Central
computers, but in most other Processing
electronic items as well. Unit
Fig. 1.8.5 shows the
relationship between the ROM
Central Processing Unit and
the Main Memory (RAM
and ROM). Fig. 1.8.5: Relationship between CPU and Main Memory
INFORMATION TECHNOLOGY 19
Computer Fundamentals
(c) Cache Memory: Caching is a technology based on the memory subsystem of the computer. The
main purpose of a cache is to accelerate the computer while keeping the price of the computer
low. Caching allows to do the computer tasks more rapidly.
Cache technology is the use of a faster but smaller memory type to accelerate a slower but larger
memory type. When using a cache, we must check the cache to see if an item is in there. If it
is there, it’s called a cache hit. If not, it is called a cache miss and the computer must wait for a
round trip from the larger, slower memory area. A cache has some maximum size that is much
smaller than the larger storage area. It is possible to have multiple layers of cache.
There are a lot of subsystems in a computer; one can put cache between many of them to improve
performance. Here’s an example. We have the microprocessor (the fastest thing in the computer).
Then there’s the L1 cache that caches the L2 cache that caches the main memory which can be
used (and is often used) as a cache for even slower peripherals like hard disks and CD-ROMs.
The hard disks are also used to cache an even slower medium — Internet connection. A list of
different types of cache is given as follows:
L1 cache - Memory accesses at full microprocessor speed (10 nanoseconds, 4 kilobytes
to 16 kilobytes in size)
L2 cache - Memory access of type SRAM (around 20 to 30 nanoseconds, 128 kilobytes to
512 kilobytes in size)
Main memory - Memory access of type RAM (around 60 nanoseconds, 32 megabytes to
128 megabytes in size)
Hard disk - Mechanical, slow (around 12 milliseconds, 1 gigabyte to 10 gigabytes in size)
(d) Flash Memory: Electronic memory comes in a variety of forms to serve a variety of purposes.
Flash memory is used for easy and fast information storage in such devices as digital cameras and
home video game consoles. It is used more as a hard drive than as RAM. In fact, Flash memory
is considered a solid state storage device. Solid state means that there are no moving parts —
everything is electronic instead of mechanical. Here are a few examples of Flash memory:
Computer’s BIOS chip
CompactFlash (most often found in digital cameras)
SmartMedia (most often found in digital cameras)
Memory Stick (most often found in digital cameras)
PCMCIA Type I and Type II memory cards (used as solid-state disks in laptops)
Memory cards for video game consoles
20 INFORMATION TECHNOLOGY
Computer Concepts
CPU
Register
Cache
Level 1
Level 2
Temporary
Storage
RAM Areas
Permanent
ROM/ Removable Network/ Hard Storage
BIOS Drives Internet Drive Areas
Storage
Input Sources
Scanner/
Keyboard Mouse Removable Camera/ Remote Other
Media Mic/ Source Sources
Video
INFORMATION TECHNOLOGY 21
2
C Computer Fundamentals
H
A
INPUT/OUTPUT AND
P
T
AUXILIARY STORAGE
E
R
DEVICES
LEARNING OBJECTIVES
To know about various input devices like keyboard, mouse, trackball etc.
To discuss about various output devices like moniter, printer etc.
To understand the classification of moniter, printer etc.
To discuss various Auxiliary Storage Devices
To know about Magnetic Tape, Winchester Disk, Floppy Disk etc.
To understand other storage devices like CD-ROM, CD-R Drive etc.
22 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
PCs. There are actually three different PC standards: the original PC keyboard, with 84 keys; the AT
keyboard, also with 84 keys; and the enhanced keyboard, with 101 keys. The three differ somewhat
in placement of function keys, the Control key, the Return key and the Shift keys.
In addition to these keys, IBM keyboards contain the following Keys: Page Up, Page Down, Home,
End, Insert, Pause, Num Lock, Scroll Lock, Break, Caps- Lock, Print Screen. Many companies have
developed ergonomic keyboards, which reduce the strain while typing with the aim to prevent
stress related injuries. Microsoft’s natural keyboard is one example.
2.1.2 Mouse
Mouse is a device that controls the movement of the cursor or pointer on a display screen, as shown
in Fig. 2.1.2. A mouse is a small object that can roll along
a hard flat surface. Its name is derived from its shape,
which looks a bit like a mouse, its connecting wire that
one can imagine to be the mouse’s tail and the fact that
one must make it scurry along a surface. As we move
the mouse, the pointer on the display screen moves in
the same direction. Mouse contains at least one button
and sometimes as many as three, which have different
functions depending on what program is running. Now-
a-days, mouse is connected with computer through USB
port.
Invented by Douglas Engelbart of Stanford Research Fig. 2 .1.2: Mouse
Center in 1963 and pioneered by Xerox in the 1970s, the mouse is one of the great breakthroughs in
computer ergonomics because it frees the user to a large extent from using the keyboard. In particular,
the mouse is important for graphical user interfaces because one can simply point to options and
objects and click a mouse button. Such applications are often called point-and-click programs. T17
mouse is also useful for graphics programs that allows to draw
pictures by using the mouse like a pen, pencil or paintbrush.
Types of Mouse: There are three basic types of Mouse:
Mechanical: It has a rubber or metal ball on its underside
that can roll in all directions. Mechanical sensors within the
mouse detect the direction the ball is rolling and move the
screen pointer accordingly.
Optomechanical: It is same as a mechanical mouse, but uses
optical sensors to detect motion of the ball.
Optical: It does a laser to detect the mouse’s movement. One
must move the mouse along a special mat with a grid so that
the optical mechanism has a frame of reference. Optical mice Fig. 2.1.3: Trackball
have no mechanical moving parts. They respond more quickly and precisely than mechanical
and optomechanical mice, but they are also more expensive.
INFORMATION TECHNOLOGY 23
Computer Fundamentals
2.1.4 Trackball
This is another pointing device. Essentially, a trackball is a mouse lying on its back. To move
the pointer, we rotate the ball with our thumb, our fingers or the palm of our hand. There are
usually one to three buttons next to the ball, which we use just like mouse buttons. The advantage
of trackballs over mice is that the trackball is stationary so
it does not require much space to use it. In addition, we can
place a trackball on any type of surface, including our lap.
For both these reasons, trackballs are popular pointing devices
for portable computers.
2.1.5 Joystick
With a joystick, the pointer continues moving in the direction
the joystick is pointing. To stop the pointer, we must return
the joystick to its upright position. Most joysticks include two
buttons called triggers. It has a lever that moves in all directions
and controls the movement of a pointer or some other display
symbols. A joystick is similar to a mouse, except that with a
mouse the cursor stops moving as soon as we stop moving the
mouse. Joysticks are used mostly for computer games, but they
are also used occasionally for CAD/ CAM systems and other
Fig. 2.1.4: Joystick
applications.
2 .1.6 Digitizing Tablet
This is an input device that enables to enter drawings and sketches into a computer. A digitizing
tablet consists of an electronic tablet and a cursor or pen. A cursor
(also called a puck) is similar to a mouse, except that it has a
window with cross hairs for pinpoint placement and it can have
as many as 16 buttons.
A pen (also called a stylus), which looks like a simple ballpoint
pen but uses an electronic head instead of ink. The tablet contains
electronics that enable it to detect movement of the cursor or pen
and translate the movements into digital signals that it sends to
the computer.
Fig. 2.1.5: Digitizing Tablet For digitizing tablets, each point on the tablet represents a point
on the display screen in a fixed manner. This differs from mice, in
which all movement is relative to the current cursor position. The static nature of digitizing tablets
makes them particularly effective for tracing drawings.
Most modern digitizing tablets also support a mouse
emulation mode, in which the pen or cursor acts like a
mouse. Digitizing tablets are also called digitizers, graphics
tablets, touch tablets or simply tablets.
2.1.7 Scanners
Scanner is an input device that can read text or illustrations
printed on paper and translate the information into a form
that the computer can use. A scanner works by digitizing
an image - dividing it into a grid of boxes and representing
Fig. 2.1.6: Scanner each box with either a zero or a one, depending on whether
24 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
the box is filled in. (For color and gray scaling, the same principle applies, but each box is then
represented by up to 24 bits.) The resulting matrix of bits, called a bit map, can then be stored in a
file, displayed on a screen and manipulated by programs.
Optical scanners do not distinguish text from illustrations; they represent all images as bit maps.
Therefore, we cannot directly edit text that has been scanned. To edit text read by an optical scanner,
we need an Optical Character Recognition (OCR) system to translate the image into ASCII
characters. Most optical scanners sold today come with OCR packages.
Scanners differ from one another in the following respects:
Scanning Technology: Most scanners use
Charge-Coupled Device (CCD) arrays, which
consist of tightly packed rows of light receptors
that can detect variations in light intensity
and frequency. The quality of the CCD array
is probably the single most important factor
affecting the quality of the scanner. Industry-
strength drum scanners use a different technology
that relies on a Photo Multiplier Tube (PMT), but
this type of scanner is much more expensive than
the more common CCD -based scanners.
Resolution : The denser the bit map, the higher
the resolution. Typically, scanners support
resolutions from 72 to 600 Dots Per Inch (DPI). Fig. 2.1.7: CCD Based Scanner
Bit depth : The number of bits used to represent each pixel. The greater the bit depth, the more
colors or grayscales can be represented. For example, a 24-bit color scanner can represent 2 to
the 24th power (16.7 million) colors. However, a large color range is useless if the CCD arrays
are capable of detecting only a small number of distinct colors.
Size and shape : Some scanners are small hand-held devices that can be moved across the paper.
These hand-held scanners are often called half-page scanners because they can only scan 2 to 5
inches at a time. Hand-held scanners are adequate for small pictures and photos, but they are
difficult to use if we need to scan an entire page of text or graphics. Larger scanners include
machines into which we can feed sheets of paper. These are called sheet-fed scanners. These are
excellent for loose sheets of paper, but they are unable to handle bound documents. A second
type of large scanner, called a flatbed scanner, is like a photocopy machine. It consists of a board
on which we lay books, magazines and other documents that we want to scan.
2.1.8 Digital Camera
Images can be input into a computer using a digital camera.
These images can then be manipulated in many ways using the
various imaging tools available. The digital camera takes a still
photograph, stores it and then sends it as digital input into the
computer. The images are then stored as digital files.
2.1.9 Magnetic Ink Character Recognition (MICR) Fig. 2.1.8: Digital Camera
This allows the computer to recognize characters printed using magnetic ink. MICR is a
direct-entry method used in banks. This technology is used to automatically read those
frustrating-looking numbers on the bottom of the cheque. A special-purpose machine known
INFORMATION TECHNOLOGY 25
Computer Fundamentals
as a reader/sorter reads characters made of ink containing magnetized particles. A related
technology is the magnetic strip, used on the back of credit cards and bank debit cards, that
allows readers such as Automated Teller Machines (ATMs) to read account information and
facilitate monetary transactions. Another example of magnetic strip technology is in ID cards,
which can be used for a variety of functions from attendance monitoring to restricting access
to specific locations.
2.1.10 Optical Character Recognition (OCR)
It refers to the branch of computer science that involves reading text from paper and translating
the images into a form that the computer can manipulate (for example, into ASCII codes). An OCR
system enables to take a book or a magazine article and feed it directly into an electronic computer file.
All OCR systems include an optical scanner for reading text and a sophisticated software for
analyzing images. Most OCR systems use a combination of hardware (specialized circuit boards) and
software to recognize characters, although some inexpensive systems do it entirely through software.
Advanced OCR systems can read text in a large variety of
fonts, but they still have difficulty with handwritten text.
The potential of OCR systems is enormous because
they enable users to harness the power of computers to
access printed documents. OCR is already being used
widely in the legal profession, where searches that once
required hours or days can now be accomplished in a
few seconds.
2.1.11 Optical Mark Recognition (OMR)
OMR also called mark sensing, is a technology where an
OMR device senses the presence or absence of a mark, such
as a pencil mark. OMR is used in tests such as aptitude tests
for different competition/entrance examinations.
2.1.12 Bar Code Reader Fig. 2.1.9: Bar Code Reader
Most of the persons are probably familiar with the bar
code readers in supermarkets, bookshops etc. Bar-code readers are
photoelectric scanners that read the bar codes or vertical zebra striped
marks, printed on product containers. Supermarkets use a bar code
system called the Universal Product Code (UPC).
The bar code identifies the product to the supermarket’s computer,
which has a description and the latest price of the product. The
computer automatically tells the Point of Sales (POS) terminal what
the price is.
2.1.13 Speech Input Devices
Speech or voice input devices convert a person’s speech into digital
form. These input devices, when combined with appropriate software,
form voice recognition systems. These systems enable users to operate
microcomputers using voice commands. Fig. 2.1.10: Speech Input
Device
26 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
Some of these systems must be ‘trained’ to the particular user’s voice. This is done by his/her spoken
words to patterns previously stored in the computer. More advanced systems that can recognize
the same word spoken by many different people have been developed. However, until recently the
list of words has been limited. A newly developed voice recognition system like IBM VoiceType
identifies more than 30,000 words and adapts to individual voices. There are even systems that
translate from one language to another, such as from English to Japanese. There are two types of
voice recognition systems:
Continuous speech : These systems are used to control a microcomputer’s operations and to
issue commands to special application programs. For example, rather than using the keyword
to save a spreadsheet file, the user could simply say 'Save the file'. Two popular systems are
Apple Computer’s PlainTalk and IBM’s continuous speech series.
Discrete-Word : A common activity in business is preparing memos and other written documents.
Discrete-word recognition systems allow users to dictate directly into a microcomputer using a
microphone. The microcomputer stores the memo in a word processing file where it can be revised
later or directly printed out. IBM Voice Type Simply Speaking is an example.
2.1.14 Touch Screen
Touch screen is a type of display screen that has a touch
sensitive transparent panel covering the screen. Instead of
using a pointing device such as a mouse or light pen, we can
use our finger to point directly to objects on the screen.
Although touch screens provide a natural interface for computer
novices, they are unsatisfactory for most because the finger is such
a relatively large object. It is impossible to point accurately to small
areas of the screen. In addition, most users find touch-screens tiring
to the arms after long use.
2.1.15 Touch Pad
It is a small, touch-sensitive pad used as a pointing device on
some portable computers. By moving a finger or other object
along the pad, one can move the pointer on the screen. Fig. 2.1.11: Touch Screen
2.1.16 Light Pen
Light Pen is an input device that utilizes a light-sensitive detector to select
objects on a display screen. A light Pen is similar to a mouse, except that
with a light pen we can move the pointer and select objects on a display
screen by directly pointing to the objects by light pen.
2.1.17 Biometrics
When referring to computers and security, biometrics is the identification
of a person by the measurement of their biological features. For example,
a user identifying themselves to a computer or building by their finger
print or voice is considered biometrics identification. When compared to
a password, this type of system is much more difficult to fake since it is
unique to the person. Below is a listing of some known biometric devices. Fig. 2.1.12: Biometrics
INFORMATION TECHNOLOGY 27
Computer Fundamentals
Other common methods of a biometrics scan are a person's face, hand, iris and retina.
Types of biometric devices
• Face scanner - Biometric face scanners identify a person by taking measurements of a person
face. For example, the distance between the persons chin, eyes, nose and mouth. These types of
scanners can be very secure assuming they are smart enough to distinguish between a picture
of a person and a real person.
• Hand scanner - Like your finger print, the palm of your hand is also unique to you. A biometric
hand scanner will identify the person by the palm of their hand.
• Finger scanner - A biometric finger scanner identifies the person by their finger print. These
can be a secure method of identifying a person, however, cheap and less sophisticated finger
print scanners can be duped a number of ways. For example, in the show Myth Busters they
were able to fake a finger print using a Gummy Bear candy treat.
• Retina or iris scanner - A biometric retina or iris scanner identifies a person by scanning the
iris or retina of their eyes. These scanners are more secure biometric authentication schemes
when compared to the other devices because there is no
known way to duplicate the retina or iris.
• Voice scanner - Finally, a voice analysis scanner will
mathematically break down a person's voice to identify
them. These scanners can help improve security but with
some less sophisticated scanners can be bypassed using
a tape recording.
2.1.18 Graphics tablet
Alternatively referred to as a drawing tablet and pen tablet, a
graphics tablet is a highly accurate hardware input device that Fig. 2.1.13: Graphics tablet
enables an artist to draw or sketch easier than they would be able to do with a standard computer
mouse.
2.1.19 Light gun
A light gun is a pointing input device that detects light using
a photodiode in the gun barrel. When
the player of the game pulls the trigger
on the gun, the screen is blanked out for
a fraction of a second, which allows the
photodiode to determine where the gun
is pointed. Light guns were most widely Fig. 2.1.14: Light gun
used with early console gaming systems such as the NES Zapper light gun, as
shown in the picture to the left. Using this gun the player could play games
where they were required to point the gun at the screen and shoot targets, such
as ducks in the popular Duck Hunt game.
2.1.2 0 Stylus
A pen-shaped instrument used with graphics tablets or touch screen input
Fig. 2.1.15: Stylus devices to write or draw on the computer screen, similar to a sheet of paper.
28 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
Unlike a pen the Stylus has a simple plastic tip and is often smaller to help fit in a compartment the
device is used with. In the picture to the left, is an example of a Stylus, the Palm Z22 Stylus.
Today, the Stylus is not commonly found or used with devices designed as they've been mostly been
replaced with touch screens that allow the user to navigate using their finger. A good example of a
device using this well is the Apple iPhone.
INFORMATION TECHNOLOGY 29
Computer Fundamentals
Digital Monitor :A digital monitor accepts digital signals
rather than analog signals. All monitors (except flat-panel
displays) use CRT technology, which is essentially analog. The
term digital, therefore, refers only to the type of input received
from the video adapter. A digital monitor then translates
the digital signals into analog signals that control the actual
display.
Although digital monitors are fast and produce clear
images, they cannot display variable colors continuously.
Consequently, only low-quality video standards, such as
Monochrome Display Adapter (MDA), Color, Graphics
Adapter (CGA) and Enhanced Graphics Adapter (EGA),
specify digital signals. Video Graphics Array (VGA) and
Super VGA (SVGA), on the other hand, require an analog
monitor. Some monitors are capable of accepting either analog
or digital signals. Fig. 2.2.2: Digital Monitor
Analog Monitor : This is the traditional type of color display
screen that has been used for years in televisions. In reality, all monitors based on CRT technology
(that is, all monitors except flat-panel displays) are analog. Some monitors, however, are called
digital monitors because they accept digital signals from the video adapter. EGA monitors, for
example, must be digital because the EGA standard specifies digital signals. Digital monitors
must nevertheless translate the signals into an analog form before displaying images.
Some monitors have fixed frequency, which means that they accept input at only one frequency.
Another type of monitor, called a multiscanning monitor, automatically adjusts to the frequency of
the signals being sent to it. This means that it can accept input from different types of video adapters.
(b) Characteristics of a Monitor : A monitor has following major characteristics:
Size :The most important aspect of a monitor is its screen size. Like televisions, screen sizes are
measured in diagonal inches, the distance from one corner to the opposite corner diagonally. A
typical size for small VGA monitors is 14 inches. Monitors that are 16 or more inches diagonally
are often called full-page monitors. In addition to their size, monitors can be either portrait (height
greater than width) or landscape (width greater than height). Larger landscape monitors can
display two full pages, side by side. The screen size is sometimes misleading because there is
always an area around the edge of the screen that can’t be used. Therefore, monitor manufacturers
must now also state the viewable area, that is, the area of screen that is actually used.
Resolution : The resolution of a monitor indicates how densely the pixels are packed. Pixel is
short for Picture Element. A pixel is a single point in a graphic image. Graphics monitors display
pictures by dividing the display screen into thousands (or millions) of pixels, arranged in rows
and columns. The pixels are so close together that they appear connected. The number of bits
used to represent each pixel determines how many colors or shades of gray can be displayed. For
example, an 8-bit color monitor uses 8 bits for each pixel, making it possible to display 2 to the 8th
power (256) different colors or shades of gray.
The quality of a display monitor largely depends on its resolution, how many pixels it can display
and how many bits are used to represent each pixel. VGA monitors display 640 by 480 or about
300,000 pixels. In contrast, SVGA monitors display 1,024 by 768 or nearly 800,000 pixels. True color
monitors use 24 bits per pixel, allowing them to display more than 16 million different colors.
30 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
In general, the more number of pixels (often expressed in dots per inch), the sharper the image.
Most modern monitors can display 1024 by 768 pixels, the SVGA standard. Some high-end models
can display 1280 by 1024 or even 1600 by 1200.
Bandwidth: It is the amount of data that can be transmitted in a fixed amount of time. For digital
devices, the bandwidth is usually expressed in bits or Bytes Per Second (BPS). For analog devices,
the bandwidth is expressed in cycles per second or Hertz (Hz).
Refresh Rate : Display monitors must be refreshed many times per second. The refresh rate
determines how many times per second the screen is to be refreshed (redrawn). The refresh rate
for a monitor is measured in hertz (Hz) and is also called the vertical frequency or vertical refresh
rate. The old standard for monitor refresh rates was 60Hz, but a new standard developed by VESA
sets the refresh rate at 75Hz for VGA and SVGA monitors. The faster the refresh rate, the less the
monitor flickers.
Dot-pitch : A measurement that indicates the vertical distance between each pixel on a display
screen. Measured in millimeters, the dot pitch is one of the principal characteristics that determine
the quality of display monitors. The lower the number, the crisper the image. The dot pitch of color
monitors for personal computers ranges from about 0. 15 mm to 0.30 mm. Another term for dot
pitch is phosphor pitch.
Convergence : Convergence refers to 'how sharply an individual color pixel on a monitor appears'. If
the dots are badly misconverged, the pixel will appear blurry. All monitors have some convergence
errors, but they differ in degree.
2.2.2 Printer
Printer is a device that prints text or illustrations on paper and in many cases on transparencies and
other media. There are many different types of printers. In terms of the technology utilized, printers
fall into the following categories:
(a) Categories of Printers: Printers may be classified as follows:
(i) Daisy-wheel Printer: Daisy-wheel
printers are a type of printer that produces
letter-quality type. A daisywheel printer
works on the same principle as a ball-head
typewriter. The daisy wheel is a disk made
of plastic or metal on which characters
stand out in relief along the outer edge. To
print a character, the printer rotates the disk
until the desired letter is facing the paper.
Then a hammer strikes the disk, forcing the
character to hit an ink ribbon, leaving an
impression of the character on the paper.
One can change the daisy wheel to print Fig. 2.2.3: Daisy-Wheel Printer
different fonts.
Daisy-wheel printers cannot print graphics and in general they are noisy and slow, printing from
10 to about 75 characters per second. As the price of laser and ink-jet printers has declined and the
quality of dot-matrix printers has improved, daisy-wheel printers have become almost obsolete.
INFORMATION TECHNOLOGY 31
Computer Fundamentals
(ii) Dot-matrix Printer: Dot-matrix printers create characters by striking pins against an ink
ribbon. Each pin makes a dot and combinations of dots form characters and illustrations.
These printers are inexpensive and relatively fast, but they do not produce high-quality
output. Dot-matrix printers vary in two important characteristics :
Speed : Measured in characters per second (cps), the speed can vary from about 50 to over 500
cps. Most dot-matrix printers offer different speeds depending on the quality of print desired.
Print quality : Determined by the number of pins (the
mechanisms that print the dots), it can vary from 9 to
24. The best dot-matrix printers (24 pins) can produce
near letter-quality type, although we can still see a
difference if we look closely.
In addition to these characteristics, one should also consider
the noise factor. Compared to laser and ink-jet printers,
dot-matrix printers make lot of noise. Although the prices
of laser and ink-jet printers are dropping rapidly, dotmatrix
printers are still cheaper to operate. In addition, since they
are impact printers, the dot-matrix printers can print to
multi-page forms (that is, carbon copies), something laser Fig. 2.2.4: Dot-matrix Printer
and ink-jet printers cannot do.
(iii) Ink-jet Printer: Ink-iet printers work by spraying ionized ink
at a sheet of paper. This is also shown in Fig. 2.2.5. Magnetized
plates in the ink’s path direct the ink onto the paper in the
desired shapes. Ink-jet printers are capable of producing high
quality print approaching to that produced by laser printers.
A typical ink-jet printer provides a resolution of 300 dots per
inch, although some newer models offer higher resolutions.
In general, the price of ink-jet printers is lower than that of laser
printers. However, they are also considerably slower. Another
drawback of ink-jet printers is that they require a special type of ink
that is apt to smudge on inexpensive copier paper.
Because ink-jet printers require smaller mechanical parts than laser
printers, they are especially popular as portable printers. In addition, color Fig. 2.2.5: Ink-Jet Printer
ink-jet printers provide an inexpensive way to print full-color documents.
(iv) Laser Printer: Laser printer utilizes a laser beam to
produce an image on a drum, as shown Fig. 2.2.6.
The light of the laser alters the electrical charge on
the drum wherever it hits. The drum is then rolled
through a reservoir of toner, which is picked up by
the charged portions of the drum. Finally, the toner
is transferred to the paper through a combination
of heat and pressure. This is also the way copy
machines work.
Because an entire page is transmitted to a drum before the
toner is applied, laser printers are sometimes called page
printers. There are two other types of page printers that fall
under the category of laser printers even though they do not
Fig. 2.2.6: Laser Printer
32 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
use lasers at all. One uses an array of LEDs to expose the drum and the other uses LCDs. Once the
drum is charged, however, they both operate like a real laser printer.
One of the chief characteristics of laser printers is their resolution – how many dots per inch (dpi)
they lay down. The available resolutions range from 300 dpi at the low end to 1,200 dpi at the high
end. By comparison, offset printing usually prints at 1,200 or 2,400 dpi. Some laser printers achieve
higher resolutions with special techniques known generally as resolution enhancement.
In addition to the standard monochrome laser printer, which uses a single toner, there also exist
color laser printers that use four toners to print in full color. Color laser printers tend to be about
five to ten times as expensive as their monochrome siblings.
(v) WD & LED Printers: These are similar to a laser printer but uses liquid crystals or
light-emitting diodes rather than a laser to produce an image on the drum.
(vi) Line Printer: Line printers are high-speed printers capable of printing an entire line at one
time. A fast line printer can print as many as 3,000 lines per minute. The disadvantages of
line printers are that there can print only one font, they cannot print graphics, the print
quality is low and they are very noisy.
(vii) Thermal Printer: Thermal printers are printers that produce images by pushing electrically
heated pins against special heat-sensitive paper. Thermal printers are inexpensive and
are used in most calculators and many fax machines. They produce low-quality print
and the paper tends to curl and fade after a few weeks or months.
(b) Characteristics of Printers
Printers are also classified according to the following characteristics:
Quality of type - The output produced by printers is said to be either letter quality (as good as
a typewriter), near letter quality or draft quality. Only daisy-wheel, ink-jet and laser printers
produce letter-quality type. Some dot-matrix printers claim letter-quality print, but if we look
closely, we can see the difference.
Speed - Measured in characters per second (cps) or pages per minute (ppm) the speed of printers
varies widely. Daisy-wheel printers tend to be the slowest, printing about 30 cps. Line printers are
fastest (up to 3,000 line per minute). Dot-matrix printers can print up to 500 cps and laser printer
range from about 4 to 20 text pages per minute.
Impact or Non-impact - Impact printers include all printers that work by striking an ink ribbon.
Daisy-wheel, dot-matrix and line printers are impact printers. Non-impact printers include laser
printers and ink-jet printers. The important difference between impact and non-impact printers is
that impact printers are much noisier but are useful for making multiple copies like carbon copies.
Graphics - Some printers (daisy-wheel and line printers) can print only text Other printers can
print both text and graphics.
Fonts - Some printers, notably dot-matrix printers, are limited to one or few fonts. In contrast,
laser and ink-jet printers are capable of printing an almost unlimited variety of fonts. Daisy-wheel
printers can also print different fonts, but you need to change the daisy wheel, making it difficult
to mix fonts in the same document.
INFORMATION TECHNOLOGY 33
Computer Fundamentals
2.2.3 Plotter
Plotter is a device that draws pictures on paper based on commands
from a computer. Plotters differ from printers as they draw lines
using a pen. As a result, they can produce continuous lines, whereas
printers can only simulate lines by printing a closely spaced series
of dots. Multicolor plotters use different-colored pens to draw
different colors. In general, plotters are considerably more expensive
than printers. They are used in engineering applications where precision
is mandatory.
2.2.4 Sound Cards & Speakers
Fig. 2.2.7: Plotter Sound card is an expansion board that enables a computer to manipulate
and output sounds. Sound cards are necessary for nearly all CD-ROMs
and have become commonplace on modern personal computers. Sound
cards enable the computer to output sound through speakers connected
to the board, to record sound input from a microphone connected to
the computer and manipulate sound stored on a disk. Nearly all sound
cards support MIDI, a standard for representing music electronically. In
addition, most sound cards are Sound Blaster-compatible, which means
that they can process commands written for a Sound Blaster card, the
Fig. 2.2.8: Speakers defacto standard for PC sound. Sound cards use two basic methods to
translate digital data into analog sounds:
Frequency Modulation (FM) Synthesis mimics different musical instruments according to built-in
formulae, and
Wavetable Synthesis relies on recordings of actual instruments to produce sound. Wavetable
synthesis produces more accurate sound, but is also more expensive.
2.2.5 3D-Audio
3D audio is a technique for giving more depth to traditional stereo sound. Typically, 3D sound or 3D
audio, is produced by placing a device in a room with stereo speakers. The device dynamically analyzes
the sound coming from the speakers and sends feedback to the sound system so that it can readjust the
sound to give the impression that the speakers are further apart. 3D audio devices are particularly popular
for improving computer audio where the speakers tend to be small and close together. There are a
number of 3D audio devices that attach to a computer’s sound card.
2.2.6 GPS
Short for Global Positioning System, GPS is a network of satellites that
helps users determines a location on Earth. The thought of GPS was
conceived after the launch of Sputnik in 1957. In 1964, the TRANSIT
system became operational on U.S. Polaris submarines and allowed
for accurate positioning updates. Later this became available for
commercial use in 1967. In the picture, is an example of the GARMIN
nuvi 350, a GPS used to find locations while driving.
Today, with the right equipment or software, anyone can establish
a connection to these satellites to establish his or her location within
50 to 100 feet. Fig. 2.2.9: GPS
34 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
2.2.7 Projector
An output device that can take the display of a computer screen and
project a large version of it onto a flat surface. Projectors are often used
in meetings and presentations to help make sure everyone in the room
can view the presentation. In the picture, is a ViewSonic projector and an
example of what a projector may look like.
Fig.2.2.10: Projector
2.3 AUXILIARY STORAGE DEVICES
Auxiliary storage also known as auxiliary memory or secondary storage, is the memory that
supplements the main storage. This is a long-term, non-volatile memory. The term non-volatile
means that stores and retains the programs and data even after the computer is switched off.
Unlike RAM which loses the contents when the computer is turned off and ROM, to which it is not
possible to add anything new, auxiliary storage devices allow the computer to record information
semi- permanently, so it can be read later by the same computer or by another computer. Auxiliary
storage devices are also useful in transferring data or programs from one computer to another.
They also function as back-up devices which allow to back-up the valuable information. So even if
by some accident the computer crashes and the stored data is unrecoverable, we can restore it from
the back-ups. The most common types of auxiliary storage devices are magnetic tapes, magnetic
disks, floppy disks, hard disks etc.
There are two types of auxiliary storage devices. This classification is based on the type of data
access: sequential and random. Based on the type of access, they are called sequential-access
media or random-media. In the case of sequential-access media, the data stored in the media can
only be read in sequence and to get to a particular point on the media, we have to go through all
the preceding points. Magnetic tapes are examples of sequential-access media. In contrast, disks
are random-access also called direct-access media because a disk drive can access any point at
random without passing through intervening points. Other examples of direct access media are
floppy diskettes, optical disks, zip disks etc.
INFORMATION TECHNOLOGY 35
Computer Fundamentals
Type Capacity Description
Half Inch 60MB - 400MB Half-inch tapes come both as 9 track reels and as
cartridges. These tapes are relatively cheap, but
require expensive tape drives
Quarter Inch 40MB - 5GB Quarter Inch Cartridges (QIC tapes) are relatively
inexpensive and support fast data transfer rates,
QIC mini cartridges are even less expensive, but
their data capacities are smaller and their transfer
rates are lower.
8-mm Helical scan 1 GB - 5 GB 8 min helical-scan cartridges use the same technology
as VCR tapes and have the great capacity. But they
require expensive tape drives and have relatively
slow data transfer rates.
4-mm DAT 2GB - 24GB DAT (Digital Audio Tape) cartridges have the
greatest capacity but they require expensive tape
drives and have relatively slow data transfer Rates.
Table 2.4.1: Tapes
2.4.1 Helical-scan Cartridge
It’s a type of magnetic tape that uses the same technology as VCR tapes. The term helical scan
usually refers to 8-mm tapes, although 4-mm tapes (called DAT tapes) use the same technology.
The 8-mm helical-scan tapes have data capacities from 2.5GB to 5 GB.
2.4.2. DAT Cartridge
This is a type of magnetic tape that uses an ingenious scheme called helical
scan to record data, as shown in Fig. 2.4.1. A DAT cartridge is slightly
larger than a credit card and contains a magnetic tape that can hold from
2 to 24 gigabytes of data. It can support data transfer rates of about 2
MBPS (Million Bytes Per Second). Like other types of tapes, DATs are
sequential-access media. The most common format for DAT cartridges
is DDS (Digital Data Storage) which is the industry standard for digital
audio tape (DAT) formats. The latest format, DDS-3, specifies tapes that
can hold 24 GB (the equivalent of over 40 CD ROMs) and support data Fig 2.4.1: DAT Cartridge
transfer rates of 2 MBPS.
INFORMATION TECHNOLOGY 37
Computer Fundamentals
2.9 SUPERDISK
This is a new disk storage technology developed by the Imation
Corporation that supports very high-density diskettes, as shown
in Fig. 2.9.1. SuperDisk diskettes are etched with a servo pattern
at the factory. This pattern is then read by the SuperDisk drive to
precisely align the read/write head. The result is that a SuperDisk
diskette can have 2,490 tracks, as opposed to the 135 tracks that
conventional 3.5-inch 1.44MB diskettes use. This higher density
translates into 120MB capacity per diskette. Fig. 2.9.1: SuperDisk
Unlike the other removable disk storage solutions, such as the Zip drive, SuperDisk is backward
compatible with older diskettes. This means that we can use the same SuperDisk drive to read and
write to older 1.44MB diskettes as well as the new 120 MB SuperDisk diskettes. Imation’s current
SuperDisk drive is called the LS-120.
38 INFORMATION TECHNOLOGY
Input/Output and Auxiliary Storage Devices
CD-ROMs and audio CDs. This allows the users to 'master' a CD-ROM or audio CD for publishing.
Until recently, CD-R drives were quite expensive, but prices have dropped dramatically.
A feature of many CD-R drives called multisession recording, enables to keep adding data to a
CD-ROM over time. This is extremely important if we want to use the CD-R drive to create backup
CD-ROMs. To create CD-ROMs and audio CDs, we’ll need not only a CD-R drive, but also a CD-R
software package. Often, it is the software package, not the drive itself that determines how easy or
difficult it is to create CD-ROMs. CD-R drives can also read CD-ROMs and play audio CDs.
2.10.3 CD-RW Disks
CD-RW disk is short for CD-ReWritable disk and this is a new type of CD disk that enables to write
onto it in multiple sessions. One of the problems with CD-R disks is that we can only write to them
once. With CD-RW drives and disks, we can treat, the optical disk just like a floppy or hard disk,
writing data onto it multiple times. The first CD-RW drives became available in mid-1997. These
can read CD-ROMs and can write onto today’s CD-R disks, but these cannot write on CD-ROMs.
2.12 DVD
DVD also known as Digital Versatile Disc or Digital Video Disc is a popular optical disc storage
media format. Its main uses are video and data storage. Most DVDs are of the same dimensions as
compact discs (CDs) but store more than six times as much data. Variations of the term DVD often
describe the way data is stored on the discs: DVD-ROM has data that can only be read and not
written, DVD-R and DVD+R can record data only once and then function as a DVD-ROM. DVD-RW,
DVD+RW and DVD-RAM can both record and erase data multiple times. The wavelength used by
standard DVD lasers is 650 nm and thus the light has a red color.
DVD-Video and DVD-Audio discs respectively refer to properly formatted and structured video
and audio content. Other types of DVDs, including those with video content, may be referred to as
DVD-Data discs. As next generation high-definition optical formats also use a disc identical in some
aspects yet more advanced than a DVD, such as Blu-ray Disc, the original DVD is occasionally given
the retronym SD DVD (for standard definition).
INFORMATION TECHNOLOGY 39
Computer Fundamentals
it has become increasingly common for computers to ship without floppy disk drives. USB ports,
on the other hand, appear on almost every current[update] mainstream
PC and laptop. These types of drives use the USB mass storage standard,
supported natively by modern operating systems such as Windows, Mac
OS X, Linux and other Unix-like systems. USB drives with USB 2.0 support
can also operate faster than an optical disc drive, while storing a larger
amount of data in a much smaller space.
A flash drive consists of a small printed circuit board protected inside
a plastic, metal or rubberised case, robust enough for carrying with no
additional protection—in a pocket or on a key chain, for example. The USB
connector is protected by a removable cap or by retracting into the body
of the drive, although it is not liable to be damaged if exposed. Most flash
drives use a standard type-A USB connection allowing plugging into a Fig. 2.13.2: USB Flash
port on a personal computer. Drive
40 INFORMATION TECHNOLOGY
UNIT - 2
OPERATING SYSTEMS
1
C
H
Operating Systems INTRODUCTION TO
A
P OPERATING SYSTEMS
T
E
R
LEARNING OBJECTIVES
To know about Operating Systems and their main functions,
To have an idea about measuring system performance,
To understand process management,
To learn about multiprogramming and its requirements,
To have an overview of multitasking and multithreading,
To discuss multiprocessing and its advantages and limitations,
To know about time-sharing systems and its advantages,
To discuss various concepts in File Management,
To understand various features in Operating System Structure and other related concepts, and
To know about some popular operating systems.
42 INFORMATION TECHNOLOGY
Introduction to Operating Systems
The logical architecture of a computer system is shown in Fig. 1.1.1. As shown in the figure, the
hardware resources are surrounded by the operating system layer, which in turn is surrounded
by a layer of other system software (such as compilers, editors, command interpreter, utilities,
etc.) and a set of application programs (such as commercial data processing applications,
scientific and engineering applications, entertainment and educational applications, etc.).
Finally, the end users view the computer system in terms of the user interfaces provided by the
application programs.
Users
Computer Hardware
INFORMATION TECHNOLOGY 43
Operating Systems
from one operating system to another, but there are some common types of functions that we can
identify. The main functions provided by most of the operating systems are given as follows:
Process Management: A process is a program in execution. The operating system manages many
kinds of activities ranging from user programs to system programs like printer spooler, name
servers, file server etc. Each of these activities is encapsulated in a process. A process includes
the complete execution context (code, data, PC, registers, OS resources in use etc.).
It is important to note that a process is not a program. A process is only an instant of a program
in execution. There are many processes, can be running the same program. The five major
activities of an operating system with respect to process management are:
Creation and deletion of user and system processes;
Suspension and resumption of processes;
A mechanism for process synchronization;
A mechanism for process communication; and
A mechanism for deadlock handling.
Memory Management: To execute a program, it must be loaded, together with the data, it
accesses in the main memory (at least partially). To improve CPU utilization and to provide
better response time to its users, a computer system normally keeps several programs in main
memory. The memory management module of an operating system takes care of the allocation
de-allocation of memory space to the various programs in need of this resource. Primary-Memory
or Main-Memory is a large array of words or bytes. Each word or byte has its own address. Main-
memory provides storage that can be accessed directly by the CPU. That is to say for a program
to be executed, it must in the main memory. The major activities of an operating system with
reference to memory-management are:
To keep track of 'which part of memory are currently being used and by whom';
To decide 'which process is loaded into memory when memory space becomes available;
and to allocate and de-allocate memory space, as needed.
File Management. A file is a collection of related information defined by its creator. Computer
can store files on the disk (secondary storage), which provide long term storage. Some examples
of storage media are magnetic tape, magnetic disk and optical disk. Each of these media has
its own properties like speed, capacity, data transfer rate and access methods. A file system
normally organized into directories to ease their use. These directories may contain files and other
directions. The five major activities of an operating system with reference to file management
are given as under:
The creation and deletion of files;
The creation and deletion of directions;
The support of primitives for manipulating files and directions;
The mapping of files onto secondary storage; and
The back up of files on stable storage media.
Device Management: A computer system normally consists of several I/O devices such as
terminal, printer, disk, and tape. The device management module of an operating system takes
care of controlling all the computer’s I/O devices. It keeps track of I/O requests from processes,
issues commands to the I/O devices, and ensures correct data transmission to/from an I/O
44 INFORMATION TECHNOLOGY
Introduction to Operating Systems
device. It also provides an interface between the devices and the rest of the system that is simple
and easy to use. Often, this interface is device independent, that is, the interface is same for all
types of I/O devices.
Security: Computer systems often store large amounts of information, some of which is
highly sensitive and valuable to their users. Users can trust the system and rely on it only if the
various resources and information of a computer system are protected against destruction and
unauthorized access. The security module of an operating system ensures this. This module also
ensures that when several disjoint processes are being executed simultaneously, one process
does not interfere with the others, or with the operating system itself.
Command Interpretation: A command interpreter is an interface of the operating system with
the user. The user gives commands with are executed by operating system (usually by turning
them into system calls). The main function of a command interpreter is to get and execute the
next user specified command. Command-Interpreter is usually not part of the kernel, since
multiple command interpreters (shell, in UNIX terminology) may be support by an operating
system, and they do not really need to run in kernel mode. There are two main advantages to
separat the command interpreter from the kernel:
If we want to change the way the command interpreter looks, that means., we want to change
the interface of command interpreter, we are able to do that if the command interpreter is
separate from the kernel. We cannot change the code of the kernel so we cannot modify
the interface.
If the command interpreter is a part of the kernel; it is possible for a malicious process to
gain access to certain part of the kernel that it showed, to avoid this ugly scenario. It is
advantageous to have the command interpreter separate from kernel.
In addition to the above listed major functions, an operating system also performs few other functions
such as ‘keeping an account of which user (or processes) use how much’ and ‘what kinds of computer
resources, maintenance of log of system usage by all users’, and ‘maintenance of internal time clock’.
INFORMATION TECHNOLOGY 45
Operating Systems
another measure used in case of interactive systems is response time, which is the interval from
the time of submission of a job to the system for processing to the time the first response for the
job is produced by the system.
In any computer system, it is desirable to maximize throughput and to minimize turnaround
time and response time.
1.4 PROCESS MANAGEMENT
A process is a sequential program in execution. The components of a process are the following:
The object program to be executed (called the program text in UNIX);
The data on which the program will execute (obtained from a file or interactively from the
process’s user);
Resources required by the program (for example, files containing requisite information); and
The status of the process’s execution.
During the lifespan of a process, its execution status may be in one of four states (associated with
each state is usually a queue on which the process resides):
Executing: the process is currently running and has control of a CPU;
Waiting: the process is currently able to run, but must wait until a CPU becomes available;
Blocked: the process is currently waiting on I/O, either for input to arrive or output to be sent;
Suspended: the process is currently able to run, but for some reason the OS has not placed the
process on the ready queue; and
Ready: the process is in memory, will execute given CPU time.
1.4.1 Process Management in Early Systems
In early computer systems, a job was typically executed in the following manner:
A programmer would first write the program on paper.
It was then punched on cards or paper tape along with its data.
The deck of cards or the paper tape containing the program and data was then submitted at the
reception counter of the computer centre.
An operator would then take the card deck or paper tape and manually load it into the system
from card reader or paper tape reader. The operator was also responsible for loading any other
software resource (such as a language compiler) or setting hardware devices required for the
execution of the job. Before loading of the job, the operator had to use the front panel switches of
the computer system to clear the main memory to remove any data remaining from the previous
job.
The operator would then set the appropriate switches in the front panel to run the job.
The result of execution of the job was then printed on the printer, which was brought by the
operator to the reception counter, so that the programmer could collect it later.
The same process had to be repeated for each and every job to be executed by the computer. This
method of job execution was known as the manual loading mechanism because the jobs had to be
manually loaded one after another by the computer operator in the computer system. Notice
that in this method, job-to-job transition was not automatic. The manual transition from one job
to another caused lot of computer time to be wasted since the computer remained idle while the
operator loaded and unloaded jobs and prepared the system for a new job. In order to reduce
this idle time of the computer, a method of automatic job-to-job transition was devised. In this
46 INFORMATION TECHNOLOGY
Introduction to Operating Systems
method, known as batch processing, when one job is finished, the system control is automatically
transferred back to the operating system which automatically performs the housekeeping jobs
(such as clearing the memory to remove any data remaining from the previous job) needed to
load and run the next job. In case of batch processing systems, jobs were typically executed in
the following manner:
Programmers would prepare their programs and data on card decks or paper tapes and
submitted them at the reception counter of the computer centre.
The operator could periodically collect all the submitted programs and would batch them
together and then load them all into the input device of the system at one time.
The operator would then give a command to the system to start executing the jobs.
The jobs were then automatically loaded from the input device and executed by the system one-
by one without any operator intervention. That is, the system would read the first job from the
input device, execute it, print out its result on the printer, and then repeat these steps for each
subsequent job till all the jobs in the submitted batch of jobs were over.
When all the jobs in the submitted batch were processed, the operator would separate the printed
output for each job and keep them at the reception counter so that the programmers could collect
them later.
1.5 MULTIPROGRAMMING
In multiprogramming systems, the running task keeps running until it performs an operation that
requires waiting for an external event (e.g. reading from a tape) or until the computer’s scheduler
forcibly swaps the running task out of the CPU. Multiprogramming systems are designed to
maximize CPU usage. In fact, depending on the CPU utilization during the course of processing,
jobs are broadly classified into the following two types:
CPU-bound jobs: These jobs mostly perform numerical calculations, with little I/O operations.
They are so called because they heavily utilize the CPU during the course of their processing.
Programs used for scientific and engineering computations usually fall in this category of jobs.
I/O-bound jobs: These jobs normally input vast amount of data, perform very little computation,
and output large amount of information. This is because during the course of their processing,
their CPU utilization is very low and most of the time, they perform I/O operations. Programs
used for commercial data processing applications usually, fall in this category of jobs.
1.5.1 Requirements of Multiprogramming Systems
Multiprogramming systems have better throughput than uniprogramming systems because the
CPU idle time is drastically reduced. However, multiprogramming systems are fairly sophisticated
because they require the following additional hardware and software features:
Large memory: For multiprogramming to work satisfactorily, large main memory is required
to accommodate a good number of user programs along with the operating system.
Memory protection: Computers designed for multiprogramming must provide some type
of memory protection mechanism to prevent a job in one memory partition from changing
information or instruction of a job in another memory partition. For example, in Fig. 1.5.2, we
would not want job A to inadvertently destroy something in the completely independent job
B or job C. In a multiprogramming system, this is achieved by the memory protection feature;
a combination of hardware and software, which prevents one job from addressing beyond the
limits to its own allocated memory area.
Job status preservation: In multiprogramming, when a running job gets blocked for I/O
INFORMATION TECHNOLOGY 47
Operating Systems
processing, the CPU is taken away from this job and is given to another job that is ready for
execution. At a later time the former job will be allocated the CPU to continue its execution. It is
note werthy that it requires preserving of the job’s complete status information when the CPU is
taken away from it and restoring this information back before the CPU is given back to it again.
To enable this, the operating system maintains a Process Control Block (PCB) for each loaded
process. A typical process control block is shown in Fig. 1.5.1. With this arrangement, before
taking away the CPU from a running process, its status is preserved in its PCB, and before the
process resumes execution when the CPU is given back to it at a later time, its status is restored
back from its PCB. Thus the process can continue do its execution without any problem.
process identifier
process state
program counter
values of various CPU
registers
accounting and sched-
uling information
I/O status information
Fig. 1.5.1: A typical Process Control Block (PCB)
Proper job mix: A proper mix of I/O-bound and CPU-bound jobs are required to effectively
overlap the operations of the CPU and I/O devices. If all the loaded jobs need I/O at the same
time, the CPU will again be idle. Hence, the main memory should contain some CPU-bound
and some I/O-bound jobs so that at least one job is always ready to utilize the CPU.
CPU scheduling: In a multiprogramming system, often there will be situations in which two
or more jobs will be in the ready state waiting for CPU to be allocated for execution. When
more than one process is in the ready state and the CPU becomes free, the operating system
must decide which of the ready jobs should be allocated the CPU for execution. The part of the
operating system concerned with this decision is called the CPU scheduler, and the algorithm it
uses is called the CPU scheduling algorithm.
1.6 MULTITASKING
Multitasking is a method with multiple tasks processes sharing common processing resources such
as a CPU. In the case of a computer with a single CPU, only one task is said to be running at any point
in time, meaning that the CPU is actively executing instructions for that task. Multitasking solves
the problem by scheduling which task may be the one running at any given time, and when another
waiting task gets a turn. The act of reassigning a CPU from one task to another one is called a context
switch. When context switches occur frequently enough the illusion of parallelism is achieved. Even
on computers with more than one CPU (called multiprocessor machines), multitasking allows many
more tasks to be run than there are CPUs.
Many persons do not distinguish between multiprogramming and multitasking because both the
terms refer to the same concept. However, some persons prefer to use the term multiprogramming
for multi-user systems (systems that are simultaneously used by many users such as mainframe and
server class systems), and multitasking for single-user systems (systems that are used by only one
user at a time such as a personal computer or a notebook computer). Note that even in a single-user
system, it is not necessary that the system works only on one job at a time. In fact, a user of a single-user
system often has multiple tasks concurrently processed by the system. For example, while editing a
48 INFORMATION TECHNOLOGY
Introduction to Operating Systems
file in the foreground, a sorting job can be given in the background. Similarly, while compilation of
a program is in progress in the background, the user may be reading his/her electronic mails in the
foreground. In this manner, a user may concurrently work on many tasks. In such a situation, the
status of each of the tasks is normally viewed on the computer’s screen by partitioning the screen
into a number of windows. The progress of different tasks can be viewed on different windows in
a multitasking system.
Hence, for those who like to differentiate between multiprogramming and multitasking,
multiprogramming is the concurrent execution of multiple jobs (of same or different users) in a multi user
system, while multitasking is the concurrent execution of multiple jobs (often referred to as tasks of same user)
in a single-user system.
1.7 MULTITHREADING
Threads are a popular way to improve application performance. In traditional operating systems,
the basic unit of CPU utilization is a process. Each process has its own program counter, its own
register states, its own stack, and its own address space (memory area allocated to it). On the other
hand, in operating systems, with threads facility, the basic unit of CPU utilization is a thread. In
these operating systems, a process consists of an address space and one or more threads of control
as shown in Fig 1.7.1 (a). Each thread of a process has its own program counter, its own register
states, and its own stack. But all the threads of a process share the same address space. Hence, they
also share the same global variables. In addition, all threads of a process also share the same set of
operating system resources, such as open files, signals, accounting information, and so on. Due to
the sharing of address space, there is no protection between the threads of a process. However, this
is not a problem. Protection between processes is needed because different processes may belong to
different users. But a process (and hence, all its threads) is always owned by a single user. Therefore,
protection between multiple threads of a process is not necessary. If protection is required between
two threads of a process, it is preferable to put them in different processes, instead of putting them
in a single process.
(a) (b)
Figure 1.7.1: (a) Single-threaded and (b) multithreaded processes
A single-threaded process corresponds to a process of a traditional operating system. Threads share
a CPU in the same way as processes do. At a particular instance of time, a thread can be in anyone
of several states namely, running, blocked, ready, or terminated. Due to these similarities, threads
are often viewed as miniprocesses. In fact, in operating systems with threads facility, a process
having a single thread corresponds to a process of a traditional operating system as shown in Fig.
INFORMATION TECHNOLOGY 49
Operating Systems
1.7.1 (b). Threads are often referred to as lightweight processes and traditional processes are referred
to as heavyweight processes.
1.8 MULTIPROCESSING
Multiprocessing is the use of two or more Central Processing Units (CPUs) within a single computer
system. The term also refers to the ability of a system to support more than one processor and/or
the ability to allocate tasks between them. There are many variations on this basic theme, and the
definition of multiprocessing can vary with context, mostly as a function of how CPUs are defined
(multiple cores on one die, multiple dies in one package, multiple packages in one system unit,
etc.). Multiprocessing sometimes refers to the execution of multiple concurrent software processes
in a system as opposed to a single process at any one instant. However, the terms multitasking or
multiprogramming are more appropriate to describe this concept, which is implemented mostly in
software, whereas multiprocessing is more appropriate to describe the use of multiple hardware
CPUs. A system can be both multiprocessing and multiprogramming, only one of the two, or neither
of the two.
In a multiprocessing system, all CPUs may be equal, or some may be reserved for special purposes.
A combination of hardware and operating-system software design considerations determine the
symmetry (or lack thereof) in a given system. For example, hardware or software considerations may
require that only one CPU respond to all hardware interrupts, whereas all other work in the system
may be distributed equally among CPUs; or execution of kernel-mode code may be restricted to
only one processor (either a specific processor, or only one processor at a time), whereas user-mode
code may be executed in any combination of processors. Multiprocessing systems are often easier
to design if such restrictions are imposed, but they tend to be less efficient than systems in which all
CPUs are utilized. Systems that treat all CPUs equally are called Symmetric Multiprocessing (SMP)
systems. In systems where all CPUs are not equal, system resources may be divided in a number
of ways, including Asymmetric Multiprocessing (ASMP), Non-Uniform Memory Access (NUMA)
multiprocessing, and clustered multiprocessing.
Multiprocessing systems are basically of two types namely, tightly-coupled systems and loosely-
coupled systems:
Tightly and Loosely Coupled Multiprocessing Systems: Tightly-coupled multiprocessor
systems contain multiple CPUs that are connected at the bus level. These CPUs may have access
to a central shared memory (SMP or UMA), or may participate in a memory hierarchy with both
local and shared memory (NUMA). The IBM p690 Regatta is an example of a high end SMP
system. Intel Xeon processors dominated the multiprocessor market for business PCs and were
the only x86 option until the release of AMD’s Opteron range of processors in 2004. Both ranges
of processors had their own onboard cache but provided access to shared memory; the Xeon
processors via a common pipe and the Opteron processors via independent pathways to the
system RAM. Chip multiprocessors, also known as multi-core computing, involves more than
one processor placed on a single chip and can be thought of the most extreme form of tightly-
coupled multiprocessing. Mainframe systems with multiple processors are often tightly-coupled.
Loosely Coupled Multiprocessing Systems: Loosely-coupled multiprocessor systems (often
referred to as clusters) are based on multiple standalone single or dual processor commodity
computers interconnected via a high speed communication system (Gigabit Ethernet is common).
A Linux Beowulf cluster is an example of a loosely-coupled system.
Tightly-coupled systems perform better and are physically smaller than loosely-coupled systems, but
50 INFORMATION TECHNOLOGY
Introduction to Operating Systems
have historically required greater initial investments and may depreciate rapidly; nodes in a loosely-
coupled system are usually inexpensive commodity computers and can be recycled as independent
machines upon retirement from the cluster. Power consumption is also a consideration. Tightly-
coupled systems tend to be much more energy efficient than clusters. This is because considerable
economies can be realized by designing components to work together from the beginning in tightly-
coupled systems, whereas loosely-coupled systems use components that were not necessarily
intended specifically for use in such systems.
1.8.1 Difference between Multiprogramming and Multiprocessing
Multiprogramming is the interleaved execution of two or more processes by a single-CPU computer
system. On the other hand, multiprocessing is the simultaneous execution of two or more processes
by a computer system having more than one CPU. To be more specific, multiprogramming involves
executing a portion of one program, then a segment of another, etc., in brief consecutive time periods.
Multiprocessing, however, makes it possible for the system to simultaneously work on several
program segments of one or more programs.
1.8.2 Advantages and Limitations of Multiprocessing
Multiprocessing systems normally have the following advantages:
Better Performance: Due to multiplicity of processors, multiprocessor systems have better
performance than single-processor systems. That is, the multiple processors of such a system can
be utilized properly for providing shorter response times and higher throughput than a single-
processor system. For example, if there are two different programs to be run, two processors are
evidently more powerful than one because the programs can be simultaneously run on different
processors.
Better Reliability: Due to multiplicity of processors, multiprocessor systems also have better
reliability than single-processor systems. In a properly designed multiprocessor system, if
one of the processors breaks down, the other processor(s) automatically takes over the system
workload until repairs are made. Thus a complete breakdown of such systems can be avoided.
For example, if a system has 4 processors and one fails, then the remaining 3 processors can
be utilized to process the jobs submitted to the system. Thus, the entire system runs only 25%
slower, rather than failing altogether. This ability of a system to continue providing service
proportional to the level of non-failed hardware is called graceful degradation feature.
Multiprocessing systems, however, require a very sophisticated operating system to schedule,
balance, and coordinate the input, output, and processing activities of multiple processors. The
design of such an operating system is a complex and time taking job. Moreover, multiprocessing
systems are expensive to procure and maintain. In addition to the high charge paid initially, the
regular operation and maintenance of these systems is also a costly affair.
1.9 TIME-SHARING
Time-sharing is the sharing of a computing resource among many users by means of
multiprogramming and multi-tasking. This concept was introduced in the 1960s, and emerged as
the prominent model of computing in the 1970s, represents a major technological shift in the history
of computing. By allowing a large number of users to interact concurrently with a single computer,
time-sharing dramatically lowered the cost of providing computing capability, made it possible for
individuals and organizations to use a computer without owning one, and promoted the interactive
use of computers and the development of new interactive applications. Time-sharing is a mechanism
to provide simultaneous interactive use of a computer system by many users in such a way that each
INFORMATION TECHNOLOGY 51
Operating Systems
user is given the impression that he/she has his/her own computer. It uses multiprogramming with
a special CPU scheduling algorithm to achieve this.
1.9.1 Requirements of Time-sharing Systems
Time-sharing systems typically require the following additional hardware and software features:
A number of terminals simultaneously connected to the system so that multiple users can
simultaneously use the system in an interactive mode;
A relatively large memory to support multiprogramming;
Memory protection mechanism to prevent one job’s instructions and data from other jobs in a
multiprogramming environment;
Job status preservation mechanism to preserve a job’s complete status information when the
CPU is taken away from it and restoring this information back before the CPU is given back to
it again;
A special CPU scheduling algorithm that allocates a very short period of CPU time one-by-one
to each user process in a circular fashion; and
An alarm clock mechanism to send an interrupt signal to the CPU after every time slices.
1.9.2 Advantages of Time-sharing Systems
Although time-sharing systems are complex to design but they provide several advantages to their
users. The main advantages of time-sharing systems are given as follows:
Reduces CPU idle time: While a particular user is engaged in thinking or typing his/her input,
a time-sharing system can provide to service many other users. In this manner, time-sharing
systems help in reducing the CPU idle time to a great extent, increasing the system throughput.
Provides advantages of quick response time: The special CPU scheduling algorithm used
in timesharing systems ensures quick response time to all users. This feature allows users to
interact with the system more rapidly while working on their problem. For example, a time-
sharing system can be effectively used for interactive programming and debugging to improve
programmers efficiency. Multiple programmers can simultaneously proceed step-by-step,
writing, testing and debugging portions of their programs or trying out various approaches
to a problem solution. The greatest benefit of such a system is that errors can be encountered,
corrected, and work can continue immediately for all the simultaneous users of the system. This
is in contrast to a batch system in which errors are corrected offline and the job is resubmitted for
another run. The time delay between job submission and return of the output in a batch system
is often measured in hours.
Offers good computing facility to small users: Small users can gain direct access to much more
sophisticated hardware and software than they could otherwise justify or afford. In time-sharing
systems, they merely pay a fee for resources used and are relieved of the hardware, software,
and personnel problems associated with acquiring and maintaining their own installation.
52 INFORMATION TECHNOLOGY
Introduction to Operating Systems
the date and time of its creation, date and time of last access, date and time of last update, its current
size, its protection features etc. the list of attributes mentioned for a file varies considerably from one
system to another. The file management module of an operating system takes care of file-related
activities such as structuring, accessing, naming, sharing, and protection of files.
1.10.1 File Access Methods
To use the information stored in a file, it must be accessed and read into computer memory. Two
commonly supported file access methods at operating system level are sequential and random
access. These are briefly discussed given below:
Sequential Access: Sequential access means that a group of elements (e.g. data in a memory
array or a disk file or on a tape) is accessed in a predetermined, ordered sequence. Sequential
access is sometimes the only way of accessing the data, for example if it is on a tape. It may also
be the access method of choice, for example, if we simply want to process a sequence of data
elements in order.
Random Access: Random access files consist of records that can be accessed in any sequence.
This means the data is stored exactly as it appears in memory, thus saving processing time
(because no translation is necessary) both when the file is written and when it is read. Random
files are a better solution to database problems than sequential files, although there are a few
disadvantages. For one thing, random files are not especially transportable. Unlike sequential
files, we cannot peek inside them with an editor, or type them in a meaningful way to the screen.
All operating systems do not support both sequential and random access files. Some of them only
support sequential access files, whereas some of them only support random access files, while there
are some operating systems, which support both. Those, which support files of both types, normally
require that a file be declared as sequential or random, when it is created; such a file can be accessed
only in a manner consistent with its declaration. Most of the modern operating systems support
only random access files.
1.10.2 File Operations
An operating system provides a set of operations to deal with files and their contents. A typical set
of file operation provided by an operating system may be given as follows:
Create: This is used to create a new file.
Delete: This is used to delete an existing file that is no longer needed.
Open: This operation is used to open an existing file when a user wants to start using it.
Close: When a user has finished using a file, the file must be closed using this operation.
Read: This is used to read data stored in a file.
Write: This is used to write new data in a file.
Seek: This operation is used with random access files to first position the read/write pointer to
a specific place in the file, so that data can be read from, or written to, that position.
Get Attributes: This is used to access the attributes of a file.
Set Attributes: This is used to change the user-settable attributes such as protection mode, of a
file.
Rename: This is used to change the name of an existing file.
Copy: This is used to create a copy of a file, or to copy a file to an I/O device such as a printer or
a display.
INFORMATION TECHNOLOGY 53
Operating Systems
1.11 OPERATING SYSTEM STRUCTURE
In this section, we will have a look at 'how various components are put together to form an operating
system'. These are discussed as follows:
1.11.1 Layered Structure
A layered design of an operating system architecture attempts to achieve robustness by structuring
the architecture into layers with different privileges. The most privileged layer would contain code
dealing with interrupt handling and context switching, the layers above that would follow with
device drivers, memory management, file systems, user interface, and finally the least privileged
layer would contain the applications. MULTICS is a prominent example of a layered operating
system, designed with eight layers formed into protection rings, whose boundaries could only be
crossed using specialized instructions. Contemporary operating systems, however, do not use the
layered design, as it is deemed too restrictive and requires specific hardware support.
Most modern operating systems organize their components into a number of layers (levels), each built
on top of lower layers. The bottom layer (layer 0) is the hardware, and the highest layer (layer) is the
user interface. The number of in-between layers and their contents vary from one operating system
to another. The main advantage of the layered approach is modularity. The layers are selected such
that each layer uses the functions and services provided by its immediate lower layer. This approach
greatly simplifies the design and implementation of the system because each layer is implemented
using only those operations provided by its immediate lower level layer.
1.11.2 Kernel
Kernel is the central component of most computer operating systems; it is a bridge between
applications and the actual data processing done at the hardware level. The kernel’s responsibilities
include managing the system’s resources (the communication between hardware and software
components). Usually as a basic component of an operating system, a kernel can provide the lowest-
level abstraction layer for the resources (especially processors and I/O devices) that application
software must control to perform its function. It typically makes these facilities available to
application processes through inter-process communication mechanisms and system calls.
Operating system tasks are done differently by different kernels, depending on their design and
implementation. While monolithic kernels execute all the operating system code in the same address
space to increase the performance of the system, microkernels run most of the operating system
services in user space as servers, aiming to improve maintainability and modularity of the operating
system. A range of possibilities exists between these two extremes.
1.11.3 Monolithic Kernel versus Microkernel
The two commonly used models for kernel design in operating systems are the monolithic kernel
and the microkernel. In a monolithic kernel, all OS services run along with the main kernel thread,
thus also residing in the same memory area. This approach provides rich and powerful hardware
access. Some developers, such as UNIX developer Ken Thompson, maintain that it is “easier to
implement a monolithic kernel” than microkernels. The main disadvantages of monolithic kernels
are the dependencies between system components, a bug in a device driver might crash the entire
system, and the fact that large kernels can become very difficult to maintain.
The microkernel approach consists of defining a simple abstraction over the hardware, with a set
of primitives or system calls to implement minimal OS services such as memory management,
54 INFORMATION TECHNOLOGY
Introduction to Operating Systems
multitasking, and inter-process communication. Other services, including those normally provided
by the kernel, such as networking, are implemented in user-space programs, referred to as servers.
Microkernels are easier to maintain than monolithic kernels, but the large number of system calls
and context switches might slow down the system because they typically generate more overhead
than plain function calls.
A microkernel allows the implementation of the remaining part of the operating system as a normal
application program written in a high-level language, and the use of different operating systems
on top of the same unchanged kernel. It is also possible to dynamically switch among operating
systems and to have more than one active simultaneously.
As the computer kernel grows, a number of problems become evident. One of the most obvious is that
the memory footprint increases. This is mitigated to some degree by perfecting the virtual memory
system, but not all computer architectures have virtual memory support. To reduce the kernel’s
footprint, extensive editing has to be performed to carefully remove unneeded code, which can be
very difficult with non-obvious interdependencies between parts of a kernel with millions of lines of
code. By the early 1990s, due to the various shortcomings of monolithic kernels versus microkernels,
monolithic kernels were considered obsolete by virtually all operating system researchers. As a
result, the design of Linux as a monolithic kernel rather than a microkernel was the topic of a famous
debate between famous scientists, Linus Torvalds and Andrew Tanenbaum. There is merit on both
sides of the argument presented in the Tanenbaum and Torvalds debate.
1.11.4 Resident and Non-resident Operating System Modules
With all the functionalities of an operating system implemented, it becomes a large software.
Obviously, all the functionalities of an operating system are not needed all the time. As the main
memory capacity of a system is limited, it is customary to always keep in the system's memory only
a very small part of the operating system and to keep its remaining part on an on-line storage device
such as hard disk. Those modules of an operating system that are always kept in the system's main
memory are called resident modules and those that are kept on hard disk are called non-resident
modules. The non-resident modules are loaded into the memory on demand, that is, as and when
they are needed for execution.
The system kernel should not be confused with the resident models of the operating system. The two
are not necessarily the same. In fact, for most operating systems they are different. The following
two criteria normally determine whether a particular operating system module should be resident:
Its frequency of use, and
INFORMATION TECHNOLOGY 55
Operating Systems
that can usually or generally meet a deadline is a soft real-time OS, but if it can meet a deadline
deterministically it is a hard real-time OS. A real-time OS has an advanced algorithm for scheduling.
Scheduler flexibility enables a wider, computer-system orchestration of process priorities, but a real-
time OS is more frequently dedicated to a narrow set of applications. Key factors in a real-time OS
are minimal interrupt latency and minimal thread switching latency, but a real-time OS is valued
more for how quickly or how predictably it can respond than for the amount of work it can perform
in a given period of time. A few examples of such applications are:
An aircraft must process accelerometer data within a certain period (say every 20 milliseconds)
that depends on the specifications of the aircraft. Failure to do so could cause the aircraft to go
away from its right course or may even cause it to crash.
Failure to respond in time to an error condition in a nuclear reactor thermal power plant could
result in a melt down.
Failure to respond in to time to an error conditions in the assembly lime of a automated factory
could result in several product units that will have to be ultimately discarded.
A request for booking a ticket in computerized railway reservation system must be processed
within the passengers; perception of a reasonable time.
1.12.2 Distributed Operating Systems
A Distributed operating system is the logical aggregation of operating system software over a
collection of independent, networked, communicating, and spatially disseminated computational
nodes. Individual system nodes each hold a discrete software subset of the global aggregate operating
system. Each node-level software subset is a composition of two distinct provisioners of services. The
first is a ubiquitous minimal kernel, or microkernel, situated directly above each node’s hardware.
The microkernel provides only the necessary mechanisms for a node’s functionality. Second is a
higher-level collection of system management components, providing all necessary policies for a
node’s individual and collaborative activities. This collection of management components exists
immediately above the microkernel, and below any user applications or APIs that might reside at
higher levels.
These two entities, the microkernel and the management components collection, work together.
They support the global system’s goal of seamlessly integrating all network-connected resources and
processing functionality into an efficient, available, and unified system. This seamless integration
of individual nodes into a global system is referred to as transparency, or Single system image;
describing the illusion provided to users of the global system’s appearance as a singular and local
computational entity. The operating systems commonly used for distributed computing systems
can be broadly classified into two types of network operating systems and distributed operating
systems. The three most important features commonly used to differentiate between these two types
of operating systems are system image, autonomy, and fault tolerance capability. These features
are explained below:
System Image: The most important feature used to differentiate between the two types of
operating system is the image of the distributed computing system from the point of view of its
users. In case of a network operating system, the users view the distributed computing system
as a collection of distinct machines connected by a communication subsystem. That is the users
are aware of the fact that multiple computers are being used. On the other hand, a distributed
operating system hides the existence of multiple computers and provides a single system image
to its users. That is, it makes a collection of networked machines appear to its users as a virtual
56 INFORMATION TECHNOLOGY
Introduction to Operating Systems
uniprocessor by providing similar type of user interface as provided by centralized operating
system.
Autonomy: In a network operating each computer of the distributed computing system has it
own local operating system (the operating systems of different computers may be the same or
different), and there is essentially no coordination at all among the computers except for the
rule that when two processes of different computers communicate with each other, they must
use a mutually agreed on communication protocol. Each computer functions independently
of other computers in the sense that each one makes independent decision about the creation
and termination of their own processes and management of local resources. It is noteworthy
that due to the possibility of difference in local operating systems, the system call from different
computers of the same distributed computing system may be different in this case.
On the other hand, with a distributed operating system, there is a single system- wide operating
system and each computer of the distributed computing system runs a part of this global
operating system. The distributed operating system tightly interweaves all the computers of the
distributed computing system in the sense that they work in close cooperation with each other
for the efficient and effective utilization of the various resources of the system. That is processes
and several resources are managed globally (some resources are managed locally). Moreover
there is a single set of globally valid system calls available on all computers of the distributed
computing system.
Fault tolerance capability: A network operating system provides little or no fault tolerance
capability in the sense that of 10% of the machines of the entire distributed computing system
are down at any moment, at least 10% of the users are unable to continue with their work. On
the other hand, with a distributed operating system, most of the users are normally unaffected
by the failed machines and can continue to perform their work normally, with only a 10% loss in
performance of the entire distributed computing system. Therefore, the fault tolerance capability
of distributed operating system is usually very high a compared to that of a network operating
system.
In short, both network operating systems and distributed operating system deal w i t h m u l t i p l e
computers interconnected together by a communication network. In case of a network operating
system the user view the system as a collection a distinct computers, but in case of distributed
operating system the user views the system as a ‘virtual uniprocessor’.
INFORMATION TECHNOLOGY 57
UNIT - 3
OFFICE AUTOMATION
SECTION-A
MS-WORD 2010
1
C Introduction to MS-WORD 2010
H
A INTRODUCTION TO
MS-WORD 2010
P
T
E
R
LEARNING OBJECTIVES
To introduce basic features of a Word 2010 processing software.
To manage documents such as opening, creating, saving, editing and printing of word
documents. (File Tab)
To work with format painter, font and its styles, to edit text and paragraphs, to create lists and
work with bullets and numberings. (Home Tab)
1.1 INTRODUCTION
We can work with Word 2010's rich functionality just about anywhere: using an internet browser,
a mobile phone or our desktop computer. Using Microsoft Office Mobile 2010, we can use our
Windows Phone 7 to work with our files from anywhere. Word Mobile 2010 is part of Office Mobile
and is already on our Windows Phone 7 in the Office hub, so we don’t need to download or install
anything else to get started.
Shadow
Reflection
Glow
INFORMATION TECHNOLOGY 61
Office automation-MS-WORD 2010
2. Navigation Pane
Using the Navigation Pane, we can search for text as well as graphics, tables, equations and other
non-textual elements. Results of the search appear in three views of the Navigation Pane and we can
click a search result there to go to the corresponding match in the document.The much improved
Navigation Pane and Find tools save time and simplify our work. The new enhancements make
it easier than ever to browse, search and even reorganize document content right from a single,
easy-to-use pane.
a. How to open a Navigation Pane?
On the View tab on the Ribbon, select the Navigation Pane check box or an other way is to
press CTRL+F on the keyboard, which opens the search area of the Navigation Pane.
b. What can be done using Navigation Pane?
One can click a heading or page in the Navigation Pane and can go right to that spot in the
document. One can also add, delete and reorganize content and search for text and objects.
c. What are the different views provided by the Navigation Pane?
The Navigation Pane provides three views of our document as shown in the Fig(s) 1.2.2, 1.2.3
and 1.2.4 respectively:
(i) Headings View : This view provides a hierarchy of headings in our document.
A user can quickly navigate to a particular heading in the document by clicking
the heading/sub-heading in the Navigation Pane. The bar with the up-arrow
at the top provides a way to jump to the top of the document. The up arrow
positions us at the previous heading and the down arrow positions us at the
next heading.
(ii) Thumbnail Page View: This view provides thumbnail images of the pages
in our document. This can be initiated by clicking on the middle button that
displays thumbnail images of each page in the document. The thumbnail view
provides a way to quickly jump to any page. Unlike the Headings view, we
can’t move content around by clicking and dragging a thumbnail.The up and
down arrows move a user to the previous page and the next page respectively.
(iii) Search Results View: This view provides the result
of the current search. If we are searching for occurrences
of a word or phrase, this is the view to use. Start typing
Fig. 1.2.2:
in the search box and Word 2010 immediately starts
Headings View
searching the document for the words we input. The
words or phrases are highlighted in yellow in
the document and the number of occurrences is
displayed at the top of the pane. If there are few
enough occurrences, a snippet of text containing
the words is displayed in the pane. Clicking on a
particular snippet will take us to its location in the
document and the words remain highlighted.
62 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
3. Integration of Screenshot feature
The screenshot tool in Microsoft Word 2010 allows us to capture an image of a particular screen
and then insert it into our document. However, this feature is not available if we are working on a
document in compatibility mode, as it is new to Word 2010.
The option of screenshot can be reached out by clicking Insert->> Illustrations->>Screenshot as
shown in the Fig. 1.2.5. When we click screenshot, we automatically get few screenshot samples from
the background (that is at the back of the word document). We can either select from the available
screenshots or click on “Screen clipping” to take the screenshot ourselves.
If we select “Screen Clipping”, our word document will get minimized and a resizable window
will appear over our background.
Fig. 1.2.6: Remove Background option Fig. 1.2.7: Background Removal option
The area with purple color as highlighted in the Fig. 1.2.7 will be erased and the one with the original
color will stay. Simply drag the area to use “Mark to Include” and “Mark to remove” options to
mark the area to be removed from images.
INFORMATION TECHNOLOGY 63
Office automation-MS-WORD 2010
5. Backstage View
Backstage View is the nerve center of Word 2010, wherein we can perform actions that affect the
whole document (for example saving and printing) or the Word program itself. In the Microsoft
Office Backstage view, we do everything to a file that we do not do in the file. The latest innovation
in the Microsoft Office Fluent user interface and a companion feature to the Ribbon, the Backstage
view is where we manage our files — creating, saving, inspecting for hidden metadata or personal
information and setting options.
6. Artistic Effects
There are lots of different Artistic Effects with just one mouse click that can be applied to the
pictures we insert into our Word document. The beauty of Artistic Effects is that we can apply them
quickly and we don’t have to perform complicated steps to get stunning results. If we have time to
experiment, though, we might like to exert more control over the effects by using the Artistic Effect
Options.We can apply artistic effects to a picture or a picture fill to make the picture look more like
a sketch, drawing or painting. A picture fill is a shape or other object with a picture applied to “fill
it”. We can apply only one artistic effect at a time to a picture, so applying a different artistic effect
will remove the previously applied artistic effect.
7. Open Type Features
We can use the new OpenType features in Microsoft Word 2010 with a font that supports these
features to make our document look professionally printed. The OpenType features include
ligatures, number spacing options, number form options and stylistic sets.
8. More Themes
A theme in Office affects the whole document and offers a way to co-ordinate different elements of
the page stylishly. Live previews (just hover over the thumbnail image of the theme) let us see what
the theme will look like when applied, before we actually apply it.
9. Protected View
Word 2010 will open documents in protected view if they come from an untrusted source, such as:
the internet;
an email attachment;
our temporary internet files folder;
a location defined in network policy as unsafe.
The document is opened in read only mode in a “sandbox” for safety. In Protected View, files are
opened with editing functions disabled. Files from a potentially unsafe location, such as the Internet
or an e-mail attachment or that contain active content, such as macros, data connections or ActiveX
controls, are validated and can open in Protected View. Files from trusted sources can be enabled by
clicking Enable Editing or data about the file can be explored in the Microsoft Office Backstage view.
10. New numbering formats
Word 2010 includes new fixed-digit numbering formats, such as 001, 002, 003... and 0001, 0002, 0003....
Check box content control: Now we can add quickly add a check box to forms or lists.
Alternative text on tables: We can add a title to a table and a summary, so that readers have
access to additional information.
64 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
11. New Smart Art graphic picture layouts
In Word 2010, we can use the new SmartArt graphics picture layouts to tell our story with
photographs or other images. Just insert our pictures in the SmartArt shapes of our picture layout
diagram. Each shape also has a caption where we can add descriptive text. Even better, if we already
have pictures in our document, we can quickly convert them to a SmartArt graphic, just like we
can with text.
Using this layout to create a SmartArt graphic is simple, do the following:
Insert the SmartArt graphic picture layout.
Add selected photographs.
Write descriptive text.
Word includes several different picture layouts to choose from.
12. Better picture compression and cropping
We can use the new and improved picture-editing tools to trim images and get just the look that
we want. Now we have better control of the image quality and compression trade-offs so that we
can make the right choice for the medium (print, screen or e-mail) that our document is used for.
13. Work on the same document at the same time
In Word 2010, we can work together right within Word. We do not have to send with e-mail
attachments or save draft documents with names. Instead, we just open our document and start to
work. We can see who else is working with us and where they are editing.
When we open a shared document, Word automatically caches it so that we can make changes to
it offline and then Word automatically syncs our changes when we come back online. When we
must work away from the office, we no longer have to worry about saving local copies or manually
merging our changes into the server document when we return to our office.
INFORMATION TECHNOLOGY 65
Office automation-MS-WORD 2010
On click of MS Word 2010, the following Fig. 1.3.2 gets opened.
Close
Button
Ruler
Vertical
Scrollbar
Insertion
Point
Horizontal
Status Bar View Buttons Zoom Slider
Scrollbar
66 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
we open additional new documents, Word names them sequentially. When we save our document,
we assign the document a new name as desired by the user.
1.3.3 The Ruler
We can use the horizontal and vertical rulers to align text, graphics, tables and other elements in our
document. If the ruler is not visible, we shall either follow these steps:
INFORMATION TECHNOLOGY 67
Office automation-MS-WORD 2010
down. To move back and forth across our document, we can click and drag the horizontal scroll bar
back and forth. We will not see a horizontal scroll bar if the width of our document fits on our screen.
1.4 FILE Tab: To click on to the File tab, we shall either click on to the option File or press Alt + F.
The File tab has the following options:
1. Save
2. Save As
3. Open
4. Close
5. Info
6. New
7. Print
8. Save & Send
9. Help
10. Options
11. Exit
1.4.1 To create a New Document Fig. 1.4.1: To Create a New Document
(i) Click File ->>New.
(ii) If we want to start with the equivalent of a blank piece of paper, double-click Blank document
as shown in the Fig. 1.4.1.
Or
Press Ctrl + N.
1.4.2 To enter text in the document
Type the first few lines of the text as shown in Fig. 1.4.2 by placing the cursor on the desired position.
68 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
1.4.3 To Save a Document
When we interrupt our work or quit, we must save our
document else it will get lost. When we save our document,
the document is saved as a file on our computer, where we can
open it later to modify it and print it.
(i) Click Save(Ctrl + S) on the Quick Access Toolbar.
(ii) If this document was already saved as a file, any changes
we made are immediately saved in the document and we
can continue working.
(iii) If this is a new document that we have not yet saved, we Fig. 1.4.3: ‘Save As’ Dialog Box
shall type a name for it as shown in the Fig. 1.4.3.
(iv) Click Save.
Or
Press CTRL + S to save the document.
1.4.4 To Close a Document
To close a Word document, we can either click the File->>
Close or Press Ctrl + W.
1.4.5 To Rename a Document
To rename a word document, do the following:
Fig. 1.4.4: ‘Rename’ Dialog Box
(i) Click the File option and the option Open.
(ii) Choose the document and right-click it with the mouse and select Rename from the shortcut
menu as shown in Fig. 1.4.4.
(iii) Type the new name for the file and press the ENTER key.
1.4.6 Open an Existing Document
To open an existing word document, do any of the following:
(i) The fastest way to open a file from the Open dialog box is
to double-click the file we want to open, or
(ii) Click the File tab and select the option Open, or
(iii) Press Ctrl + O on the keyboard, or
(iv) If we have recently used the document, we shall click the File
tab and click the option Recent in the window as depicted
in the Fig. 1.4.5.
1.4.7 To print an existing Word Document Fig. 1.4.5: Opening Existing
Document
Do any of the following to print a Word Document:
(i) Press Ctrl + P, or
(ii) Click File- > Print.
The following Print Dialog box gets opened which shows the dialog box on the click of the option
Printer Properties. On the Print tab, the properties for our default printer automatically appear
in the first section and the preview of that document automatically appears in the second section.
INFORMATION TECHNOLOGY 69
Office automation-MS-WORD 2010
Click the File tab and then click Print. To go back to our document and make changes before we
print it, we shall click the File tab.
When the properties for our printer and document appear the way that we want them to, click
Print. Some of the brief description on the options shown in the Fig. 1.4.6 under the option Print
is as under:
70 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
- Start enforcement: Click Yes, Start Enforcing Protection to select password protection
or user authentication. In addition, we can click Restrict permission to add or remove
editors who will have restricted permissions.
D. Restrict Permission by People: A user can apply permissions via a template that is used by
his/her organization or we can add permissions by clicking Restrict Access.
INFORMATION TECHNOLOGY 71
Office automation-MS-WORD 2010
E. Add a Digital Signature: Digital signatures authenticate digital
information such as documents, e-mail messages and macros by using
computer cryptography. Digital signatures are created by typing a
signature or by using an image of a signature to establish authenticity,
integrity and non-repudiation.
II. Prepare for Sharing
Check for Issues: There are various options to check for issues in the document
shown in the Fig. 1.4.12.
A. Inspect Document: The Document Inspector can be used to find and
remove hidden data and personal information in Word documents that
were created in Microsoft Word 2010 and earlier versions. It is a good
idea to use the Document Inspector before we share an electronic copy
of our Word document, such as in an e-mail attachment. On click of
Inspect Document, we can view different types of hidden data and
personal information in a Word document. This information might not Fig. 1.4.11:
be immediately visible when we view the document in Word, but it might Restrict Format
be possible for other people to view or retrieve the information. Hidden Dialog Box
information can include the data that Word adds to a document to enable
us to collaborate on writing and editing it with other
people. It can also include information that we
deliberately designate as hidden.
Comments, revision marks from tracked
changes, versions and ink annotations: If
we collaborat with other people to create
our document, our document might contain
items such as revision marks from tracked
changes, comments, ink annotations or
versions. This information can enable other
people to see the names of people who
worked on our document, comments from Fig. 1.4.12: Prepare for Sharing
reviewers and changes that were made to our Option
document.
Hidden text: Word documents can contain text that is formatted as hidden text
which can be inspected using Document Inspector.
72 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
document management server, the document might contain additional document
properties or information related to this server location.
Custom XML data: Documents can contain custom XML data that is not visible in
the document itself. The Document Inspector can find and remove this XML data.
To inspect any word document for the aforementioned hidden data, we should follow these steps:
(i) Open the Word document that we want to inspect for hidden data and personal information.
(ii) Click the File->>Save As and then type a name in the File name box to save a copy of the original
document.
(iii) In the copy of our original document, click the File->>Info.
(iv) Under Prepare for Sharing, click Check for Issues and then click Inspect Document. The
Document Inspector dialog box shown in the Fig. 1.4.13 gets opened.
(v) In the Document Inspector dialog box, select the check boxes to choose the types of hidden
content that we want to inspect and then click Inspect.
Fig. 1.4.13: Document Inspector Dialog Box Fig. 1.4.14: Document Inspector Review
(vi) Re view the results of the inspection in the Document Inspector dialog box as shown in Fig.
1.4.14.
(vii)Click Remove All next to the inspection results for the types of hidden content that we want
to remove from our document as shown in Fig. 1.4.14. If we remove hidden content from our
document, we might not be able to restore it by clicking Undo.
B. Check Accessibility: Because many organizations, such as government and standards
groups, continue to revise their requirements so everyone in their audiences can access
information, Microsoft Office 2010 introduces the Accessibility Checker in Microsoft Word
2010 that helps us identify and resolve accessibility issues in our files.
Accessibility Checker alerts us to certain accessibility issues in our file so that we can fix
potential problems that might keep someone with a disability from accessing our content.
Fixing some issues might require that we change, reformat or otherwise update our content.
In addition to alerting us to potential problems, Accessibility Checker also lets us know
about application features that we can use to make our content more accessible. We can also
save and distribute our file without addressing the issues Accessibility Checker identifies.
The Accessibility Checker checks our document against a set of possible issues that users
INFORMATION TECHNOLOGY 73
Office automation-MS-WORD 2010
who have disabilities might experience in our file. Each issue is classified
as an Error, a Warning or a Tip as shown in the Fig. 1.4.15.
Error: An accessibility error is given for content that makes a file very
difficult or impossible for people with disabilities to understand.
Warning: An accessibility warning is given for content that in most,
but not all, cases makes a file difficult for people with disabilities to
understand.
Tip: An accessibility tip is given for content that people with disabilities
can understand, but that might be better organized or presented in a
way that would maximize their experience.
Whenever the Accessibility Checker finds an issue, the task pane shows
information about why the content might be inaccessible. Selecting the issue
then shows instructions on how to repair or revise it.
Use Accessibility Checker
(i) Click the File tab.
(ii) Click Info.
(iii) Under Prepare for Sharing, an alert will appear if Accessibility Checker Fig. 1.4.15:
has detected any potential accessibility issues. Accessibility Checker
(iv) If we want to view and repair the issues in our file, click Check for Issues Task Pane
and then click Check Accessibility.
(v) We are returned to our file where the Accessibility Checker task pane
is open, showing the inspection results.
C. Check Compatibility: If we are using Microsoft Office 2010, we can share files with people
using an earlier version of Microsoft Office by saving the file in the appropriate file format. For
example, we can save our Word 2010 document (.docx) as a 97-2003 document (.doc). When
we open a document in Microsoft Word 2010 that was created in an earlier version of Word,
Compatibility Mode is turned on and Compatibility Mode in the title bar of the document
window can be seen. Compatibility Mode makes sure that no new or enhanced features in
Word 2010 are available while we work with a document, so that people who are using previous
versions of Word will have full editing capabilities. Compatibility Mode also preserves the
layout of the document.
Document modes and compatibility
When we open a document in Word 2010, it is in one of three modes:
Word 2010
Word 2007 Compatibility Mode
Word 97-2003 Compatibility Mode
To determine which mode the document is in, check the document’s title bar. If (Compatibility
Mode) appears after the file name, the document is in either Word 2007 Compatibility Mode or
Word 97-2003 Compatibility Mode. To determine which Compatibility Mode, do the following:
(i) Click the File tab.
(ii) Click Info.
74 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
(iii) In the Prepare for Sharing section, click Check for Issues
and then click Check Compatibility.
(iv) Click Select versions to show as shown in the Fig. 1.4.16.
(v) A check mark appears next to the name of the mode that
the document is in.
(vi) If the title bar does not display (Compatibility Mode),
we are in Word 2010 mode and all features are available.
Opening Older Word Documents In Compatibility Mode
If a document created in a previous version of Word is to
be opened, we can do it in compatibility mode. We can
easily convert it to Word 2010 and thereby enable the new
functions. To do this, do the following: Fig. 1.4.16: Select Versions option
(i) Click File ->> Info ->> Compatibility Mode and press the Convert button.
(ii) On clicking Convert, a dialogue box is displayed explaining that the document will be converted
to the newer file format. The document will actually be replaced by the newer version, meaning
that there will be only one copy of it in Word 2010 format shown in the Fig. 1.4.17.
There is a cool feature in Microsoft Office Word 2010 which allows us to recover unsaved
document which is actually available in .asd format which were accidentally closed due to any
reason.
Manage Versions
Word keeps track of files we have recently opened and displays them on the right side of the File
INFORMATION TECHNOLOGY 75
Office automation-MS-WORD 2010
tab (Recent page). To open a file we’ve recently opened, click the File
tab, click Recent (if necessary) and inspect the list of files that appear
on the menu. If the file we want is in the list, click it to open it.
1.4.11 Save & Send Fig. 1.4.19: Delete All
Unsaved Documents
I. Save & Send
A. Send using Email
Send the document in email
If our Microsoft Office 2010 suite includes Outlook 2010, we can send our file as an email
attachment or as the body of the message.
Send a file as an attachment
(i) Click File.
(ii) Click Save & Send.
(iii) Select Send Using E-mail and then choose one of the following options as shown in the Fig.
1.4.20:
Send as Attachment: Opens an e-mail message with a copy of the file in its original file
format attached.
Send as PDF: Opens an e-mail message with a copy of the file in .pdf format attached.
Send as XPS: Opens an e-mail message with a copy of the file in .xps format attached.
(iv) Enter the recipient(s), edit the subject line and message body as necessary and then click Send.
76 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
(ii) In the Quick Access Toolbar, click Send to Mail Recipient to open an email message. Our
file appears in the body of the message.
(iii) Enter the recipient(s), edit the subject line and message body as necessary and then click
Send.
B. Save to Web/Save to SharePoint
In Microsoft Word 2010, we can create a document in Microsoft Word and can also post it on
a website so that other people can read it, maybe print it out. It is even possible to just fix any
mistake in that document quickly, right there on the website. We can start using Word Web App
by saving our document to our SkyDrive or our SharePoint library. On the File tab, click Save &
Send and then click Save to Web or Save to SharePoint.
When we save a document in a library on our organization’s SharePoint site, we and our colleagues
have a central location for accessing the document. To share the document, we can send a link
rather than sending an attachment. That way, we maintain just a single copy of the document. If
people need to make revisions, they do so in the same copy, with no need to reconcile multiple
versions and copies of the document. SharePoint can also keep track of versions of a document,
in case we need to retrieve a previous version. We can also choose to receive an e-mail notification
when changes to a document are made.
(i) Click the File tab and then click Save & Send.
(ii) Click Save to Web/Save to SharePoint.
(iii) Click Browse for a location.
(iv) In the File name box, type the web address of the document library and then press ENTER.
(v) Type a name for the file and then click Save.
C. Publish at Blog Post
Most of us prefer to use Office Word to write documents due to its ease of use and the many
features it has. Among these features, we can now use Word 2010 and some previous version,
for publishing blog posts to our personal blog with just few steps as described:
(i) Launch Office 2010, select File tab and then click New.
INFORMATION TECHNOLOGY 77
Office automation-MS-WORD 2010
(iv) A window pops up click Register Now as shown in the Fig. 1.4.22.
1 2 3 4 5
Fig. 1.5.1(A): Home Tab
INFORMATION TECHNOLOGY 79
Office automation-MS-WORD 2010
To move to the Home Tab, either we shall click on to Home option using mouse or press Alt +
H which further displays all the shortcut keys for the options available under the Home tab.The
shortcut keys for many options that may be used by clicking ‘Alt + the options shown’ in the Fig.
1.5.1(B) for a particular tab. In those cases, where we have to press one key immediately followed
by another key, the keys to press are separated by a comma (,) and initiated with Alt. For example:
To select the options ‘Grow Font or Shrink Font’, click “Alt F,G” or “Alt F,K” respectively.
1.5.1 Clipboard Group
The Microsoft Office Clipboard allows us to copy multiple text and
graphical items from Office documents or other programs and paste them
into another Office document. For example, we can copy text from an
e-mail message, data from a workbook or datasheet and a graphic from a
presentation and then paste them all into a document. By using the Office
Clipboard, we can arrange the copied items the way that we want in the
document.
How the Office Clipboard works?
Fig. 1.5.2: Office
The Office Clipboard works with the standard Copy and Paste commands Clipboard
shown in the Fig. 1.5.2. Just copy an item to the Office Clipboard to add it to
our collection and then paste it from the Office Clipboard into any Office document at any time.
The collected items stay on the Office Clipboard until we exit all Office programs or we delete
the items from the Clipboard task pane.
After all the Office programs are exited, only the last item that is copied stays on the Office
Clipboard. When we exit all Office programs and restarts our computer, the Office Clipboard is
cleared of all items.
(i) Click the Dialogbox launcher in the lower-right corner of the Clipboard group on the Home
tab, right next to the word Clipboard. The Clipboard pane then appears in the writing area of
the Word window shown in the Fig. 1.5.3. The scrolling list contains the last several items we
copied, not only from Word but perhaps from other programs, as well.
(ii) Position the insertion pointer in the document where we want to paste the text. Otherwise, text
from the Clipboard gets pasted wherever the pointer happens to be.
(iii) In the Clipboard pane, simply click the mouse on the chunk of text that we want to paste into
our document. The text is copied from the Clipboard and inserted into our document at the
insertion pointer’s location, just as though we typed it ourselves. Alternatively, we can click the
Paste All button to paste every item from the Clipboard into our document.
(iv) To remove a single item from Word’s Clipboard, point the mouse at that item and click the
downward-pointing triangle to the right of the item. A shortcut menu opens. Select Delete from
the menu. That lone item is deleted from the Clipboard.
(v) To strike all items on the Clipboard, click the Clear All button at the top of the Clipboard task
pane. We can’t undo any clearing or deleting that’s done in the Clipboard task pane.
I. Format Painter
Format Painter is a multi-step process. We can select the text whose format we want to use and
then click the Format Painter button, that copies the format to the clipboard and our mouse cursor
changes into a vertical line with a paint brush symbol. We may swipe our mouse across the text we
want to apply the format to and when we release the mouse the copied format is applied.
80 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
The steps to be followed in using Format Painter are defined as under:
(i) Select the text or graphic that has the formatting that we want to copy. If we want to copy text
formatting, select a portion of a paragraph. If we want to copy text and paragraph formatting,
select an entire paragraph, including the paragraph mark.
(ii) Do either of the following:
On the Home tab, in the Clipboard group, click Format Painter. The pointer changes to a
paintbrush icon.
Or
Press Ctrl + Shift + C.
(iii) Select the text whose format we want to change to the format from step (i).
(iv) Use the keyboard arrow keys to move to the beginning or end of the text we want to change,
then use the arrow keys in conjunction with the Shift key to make the actual selection.
(v) Press Ctrl + Shift + V.
(vi) To stop formatting, press ESC.
II. Cut, Copy and Paste
The cut, copy and paste commands allow us to copy or remove an item from one place and put
it into another. To cut or copy, select the item(s) and execute a cut or copy command. To paste,
position the cursor where we want the text to be inserted and execute a paste command: the item
we cut or copied most recently will be pasted.
How to Delete Text in Word
We can use any of the following methods to delete text:
(i) Select the text to be deleted and press Delete or Backspace. We can also right click the text and
choose the option Delete or Cut.
(ii) To delete an entire word to the left of the cursor, position the cursor to the left of the text we
want to delete and press Ctrl+Delete.
(iii) To delete an entire word to the right of the cursor, position the cursor to the
right of the text we want to delete and press Ctrl+ Backspace.
III. Paste Preview
When a styled piece of text is copied, Paste Preview in Word 2010 gives us a
variety of options as shown in the Fig. 1.5.4:
Keep Source Formatting – This option retains the formatting used on the source
document we copied. This means that text will be displayed using the same
fonts and other attributes like the line height of text will be retained too. Images
are inserted with the same vertical and horizontal spacing.
Merge Formatting – The pasted elements will adopt the formatting currently
in use in the destination Word 2010 document.
Keep Text Only – This option will discard certain things that were present in
the source, such as images and formatting. Only plain text will be pasted so
headings, for example, will be lose their size and bolding.
1.5.2 Font
This group has two set of options: Font and Character Spacing as shown in Fig. 1.5.4: Paste
Fig. 1.5.5. Options
INFORMATION TECHNOLOGY 81
Office automation-MS-WORD 2010
Grow/ Change
Font Font Size Shrink Font Case
Clear
Formatting
Bold
Italic Font
Underline Strikethrough Subscript/ Text Text
Superscript Effects Highlight
color
82 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
Subscript: This lowers the selected text below the baseline and changes the selected text to
a smaller font size, if a smaller size is available. If we want to lower the selected text without
changing the font size, we shall click the Character Spacing tab and then click Lowered in the
Position box.
Shadow: This adds a shadow beneath and to the right of the selected text.
Outline: This displays the inner and outer borders of each character.
Emboss: This makes the selected text appear to be raised off the page in relief.
Engrave: This makes the selected text appear to be imprinted or pressed into the page.
Small caps: This formats selected lowercase text as capital letters and reduces their size. Small
caps formatting do not affect numbers, punctuation, non-alphabetic characters or uppercase
letters.
All caps: This formats lowercase letters as capitals. All caps formatting donot affect numbers,
punctuation, non-alphabetic characters or uppercase letters.
Hidden: This prevents selected text from being displayed.
C. Preview: The Preview box displays the specified font and any text effects.
D. Default: This is used to store the current values on the Font,
Character Spacing and Text Effects tabs as default settings
for the current document and all new documents based on
the current template.
II. Advanced
A. Character Spacing(shown in the Fig. 1.5.7)
Scale: This stretches or compresses text vertically and
horizontally as a percentage of its current size. Type or select
a percentage between 1 and 600.
Spacing: This increases or decreases the space between
characters. Type or select an amount in the By box.
Position: This raises or lowers the selected text in relation to
the baseline. Type or select an amount in the By box. Fig. 1.5.7: Advanced Dialog Box
Kerning for fonts: This automatically adjusts the
amount of space between certain combinations of
characters so that an entire word looks more evenly
spaced. This command works for TrueType and
AdobePostScript fonts only.
B. OpenType Features
When font designers create fonts, they often add
designs for special features. Selected Open Type fonts
include some or all of the features below and we can
check with the font provider for details. With those
fonts, these features are available for us to apply to our Fig. 1.5.8: OpenType features Option
text for to make it more polished and easier to read.
For example, the fonts in the Microsoft Clear Type Collection – Calibri, Cambria, Candara,
Consolas, Constantia and Corbel – contain various Open Type including small caps, ligatures,
number forms and number spacing. Gabriola, a newer font originally released with Windows 7,
INFORMATION TECHNOLOGY 83
Office automation-MS-WORD 2010
includes even richer OpenType feature support, including extensive use of stylistic sets.
To apply OpenType features, do the following:
(i) On the Home tab, click the Font Dialog Box Launcher.
(ii) Click the Advanced tab.
(iii) Under OpenType Features, select the desired options.
We can also disable these Open Type features entirely by opening Word Options, selecting the
Advanced tab and checking Disable Open Type Font Formatting Features under the Layout
Options that are right at the bottom as shown in the Fig. 1.5.8.
Ligature Options
A ligature is a combination of charactersthat is written as a glyph, which is written as though it is
a single character. Most often, ligatures are made up of pairs of letters. The OpenType standard
specifies different categories of ligatures, but the font designer decides which to support and in
which group to put any given combination of characters. The descriptions below are guidelines
about each type of ligature that might be used.
Number Spacing Options
Default- The default number spacing is specified by the font designer of each font.
Proportional- Numbers are spaced more like letters, with varying widths. For example, an 8 is
wider than a 1. This spacing is easier to read in text. Candara, Constantia and Corbel are three of
the Microsoft fonts that use proportional spacing by default.
Tabular- Each number has the same width. This means that in a table column, for example, all
three-digit numbers will align. Tabular spacing is also useful for math. Cambria, Calibri and
Consolas are three of the Microsoft OpenType fonts with tabular spacing by default.
Number form options
Default- The default number form is specified by the font designer of each font.
Lining- Lining numbers all have the same height and they don’t extend below the baseline of the
text. Lining numbers are easier to read in tables, boxes or forms. Cambria, Calibria and Consolas
are three of the Microsoft OpenType fonts that are set to Lining numbers by default.
Old-style- In Old-style numbering, the lines of the characters flow above or below the line of
the text (which makes the numbers easier to read). For example, some numbers, such as 3 and 5,
extend below the baseline or are centered higher on the line. Candara, Constantia and Corbel are
three of the Microsoft OpenType fonts that are set to Old-style numbering by default.
Stylistic set options
We can change the look of our text by applying a different stylistic set to our text. A font designer
may include up to 20 stylistic sets in a given font and each stylistic set may include any subset of
the characters of the font.When we click the number of a set in the Stylistic sets list, the Preview
box shows us how the text will look.
C. Preview: The Preview box displays the specified font and any text effects as shown in
Fig. 1.5.7.
Default Button: Click to store the current values on the Font, Character Spacing and Text Effects
84 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
tabs as default settings for the current document and all new documents based on the current
template.
1.5.3 Paragraph
The Paragraph tab looks like this as shown in Fig. 1.5.9.
INFORMATION TECHNOLOGY 85
Office automation-MS-WORD 2010
Type a bulleted or numbered list
(i) Type * (asterisk) to start a bulleted list or ‘1.’ to start a numbered list and then press SPACEBAR
or the TAB key.
(ii) Type any text that we want.
(iii) Press ENTER to add the next list item. Word automatically inserts the next bullet or number.
(iv) To finish the list, press ENTER twice or press BACKSPACE to delete the last bullet or number
in the list.
86 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
1. Subjects
1.1 Science
1.1.1 Social Science
1.1.2 Environmental Science
1.1.3 Geographical Science
We can pick a multilevel list style from the gallery or we can create a new multilevel list style.
A. Choose a multilevel list style from the gallery
(i) Click where we want to begin our list.
(ii) On the Home tab, in the Paragraph group, click the arrow next to Multilevel List.
(iii) Click a multilevel list style in the gallery of styles as shown in Fig. 1.5.12.
(iv) Type the list. Press the TAB key to change levels.
B. Create a new multilevel list style to add to the gallery
We can create and define a new multilevel list style and can use our new list style each time we
begin a new multilevel list in a document. The new list style is added automatically to the gallery
of list styles.
(i) On the Home tab, in the Paragraph group, click the arrow next to Multilevel List as shown in
Fig. 1.5.12.
(ii) Click option Define New Multilevel List. Beginning with level 1, enter the number format, font
and position choices. Continue to define each level that we want to use in our multilevel list.
(iii) Click OK. The multilevel list style that we defined is automatically set as the current multilevel
list style.
III. Sort
This feature alphabetizes the selected text or numerical data.
Sort a list alphabetically
We can quickly and easily sort the text of a one-level bulleted or
numbered list so that the text is in alphabetical order or the numbers
are in sequence.
(i) Select the text/numerical data in a bulleted or numbered list.
(ii) On the Home tab, in the Paragraph group, click the option for Fig. 1.5.13: Sort Text dialog
sorting. Box
(iii) In the Sort Text dialog box shown in the Fig. 1.5.13, under Sort by, click Paragraphs, select the
Type as Text or Numbers depending upon the type of data in the list and check either Ascending
or Descending radio button.
IV. Text Alignment
To align the text in the Word document, following are the shortcut keys:
Align Text Left (Ctrl+L) : Aligns text to the left.
Center (Ctrl +E) : Center text.
Align Text Right (Ctrl+R) : Aligns text to the right.
Justify (Ctrl +J) : Aligns text to both left and right margins, adding
the extra space between words as necessary.
INFORMATION TECHNOLOGY 87
Office automation-MS-WORD 2010
V. Line and Paragraph Spacing
Indentation determines the distance of the paragraph from either
the left or the right margin. Within the margins, we can increase or
decrease the indentation of a paragraph or group of paragraphs.
We can also create a negative indent (also known as an outdent),
which pulls the paragraph out toward the left margin, a hanging
indent, in which the first line of the paragraph is not indented,
but subsequent lines are. Indenting paragraphs allows us to set
text within a paragraph at different margins. There are several
options for indenting:
First Line: Controls the left boundary for the first line of a
paragraph.
Hanging: Controls the left boundary of every line in a
paragraph except the first one.
Left: Controls the left boundary for every line in a paragraph.
Right: Controls the right boundary for every line in a Fig. 1.5.14 (A): Indents and
paragraph. Spacing Tab
A. To indent paragraphs, select the paragraph and do any of the
following:
(i) Click on to the options Decrease Indent or Increase Indent available in the Paragraph tab.
(ii) Click the drop down arrow of Line and Paragraph Spacing option and click Line Spacing
Options to control the indent.
(iii) Select the text to be indented and right click and choose the option Paragraph. The dialog box
shown in the Fig. 1.5.14 (A)gets opened.
(iv) Click the Indents and Spacing tab as shown in Fig. 1.5.14 (A) and select the desired indents.
B. To place at least two lines of a paragraph at the top or
bottom of a page
A professional-looking document never ends a page with
just one line of a new paragraph or begins a page with
only the last line of a paragraph from the previous page.
The last line of a paragraph by itself at the top of a page is
known as a widow. The first line of a paragraph by itself
at the bottom of a page is known as an orphan.
(i) Select the paragraphs in which we want to prevent
widows and orphans.
(ii) On the Page Layout tab, either click the Paragraph
Dialog Box Launcher or right-click the text and
select the option Line and Page Breaks. Select the
Widow/Orphan control check box in the window
displayed in the Fig. 1.5.14 (B). This option is turned
Fig. 1.5.14 (B): Line and Page Breaks
on by default.
C. To prevent page breaks in the middle of a paragraph
(i) Select the paragraph that we want to prevent from breaking onto two pages.
88 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
(ii) On the Page Layout tab, click the Paragraph Dialog Box Launcher and then click the Line and
Page Breaks tab.
(iii) Select the Keep lines together check box as shown in the Fig. 1.5.14 (B).
D. Prevent page breaks between paragraphs
(i) Select the paragraphs that we want to keep together on a single page.
(ii) On the Page Layout tab, click the Paragraph Dialog Box Launcher and then click the Line and
Page Breaks tab.
(iii) Select the Keep with next check box as shown in the Fig. 1.5.14 (B).
E. Specify a page break before a paragraph
(i) Click the paragraph that we want to follow the page break.
(ii) On the Page Layout tab, click the Paragraph Dialog Box Launcher and then click the Line and
Page Breaks tab.
(iii) Select the Page break before check box as shown in the
Fig. 1.5.14 (B).
VI. Borders and Shading
We can add borders and shading to paragraphs and entire
pages. To create a border around a paragraph or paragraphs:
(i) Select the area of text where we want the border or
shading.
(ii) Click the Borders button on the Paragraph group on the
Home tab as highlighted in the Fig. 1.5.9.
(iii) Choose the option Border and Shading as highlighted in
the Fig. 1.5.15 and choose the appropriate option. Fig. 1.5.15: Border and
Shading provides us the option to color the background behind Shading
the selected text or paragraphs. On click of drop down arrow of
Shading option, different Theme Colors and some more color options would be available.
VII. Show/Hide
This feature displays paragraph mark and other hidden formatting symbols but doesn’t turn
off all formatting marks. The Show/Hide button will not hide all formatting marks if we select
certain marks, such as paragraph marks or spaces, to be displayed at all times.
(i) Click the File->> Options- >> Display.
(ii) Under the section Always show these formatting marks on the screen, clear the check boxes
for any formatting marks that we do not want to show in our documents at all times.
1.5.4 Styles
Styles are an efficient way to define the appearance of various text elements inour document
(e.g., headings, captions, body text). They help us keep our document consistent by applying the
same style to various elements in a document. With styles, we can apply character or paragraph
formatting or both in one simple operation.
Templates allow us to apply preformatted styles to an entire document. The Style Gallery offers
several common style options, such as different headings, quotes or captions.
INFORMATION TECHNOLOGY 89
Office automation-MS-WORD 2010
Each document we create is based on a template. When we create a new document, the styles
that belong to the selected template are copied into that document. Each template contains a set
of standard styles, most of which are available with all Word templates. A style is automatically
created every time we apply unique formatting to text and Word automatically saves any styles
that are being used by the active document.
Character and Paragraph Styles
Word Templates
Quick Styles
I. Character styles
Include any of the options available from the Font group, such as bold, italic and underline.
Characters styles store only character formatting and apply it to selected text or to the entire word
containing the insertion point.
II. Paragraph styles
Store both character and paragraph formatting, as well as tab settings, paragraph positioning, borders
and shading and apply them to selected paragraphs or the paragraph containing the insertion point.
III. Word Templates
A template is a preset document layout with a collection of styles which are saved to a file and
can be applied to other documents. By storing styles in a template, the styles are available for use
when we access that template. We can save time and effort by creating new documents based on
templates designed for a frequently used type of document.
Word provides templates for many common types of documents. One can use these templates
just as they are, can modify them or can create our own templates. Word automatically bases new
documents on the Normal template unless we specify another template. Some useful templates
include the following:
• Agenda • Calendar
• Letter • Newsletter
• Memo • Resume
• Report • Thesis
IV. Quick Styles
Styles in one template may differ from those in another. On the Home tab, we can use the options
in the Style group to preview and change the appearance of the active document by applying
the style definitions of another template. When we modify the styles in the Style group, we are
not replacing the template; we are only replacing the style definitions. The formatting of the ac-
tive document will update to the most recent style we select. Once we have applied styles to our
document text, we can use the Style group options to preview and change the overall appearance
of a document.
Styles can greatly approve the appearance and readability of our document. By using styles, we
can make sure formatting is applying uniformly throughout our document.
Word 2010 makes it easy to apply styles to selected parts of any document. On the Home tab, we
will see a section dedicated to styles shown in the Fig. 1.5.16.
90 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
(i) Select text that is styled with the style attributes that we want to change. For example, to change
the attributes of the Heading 1 style, select text that has the Heading 1 style applied.
(ii) Format the selected text with the new attributes that we want. For example, wemight decide
that we want to change the point size for the Heading 1 style from 16 points to 14 points.
(iii) On the Home tab, in the Styles group, right-click the style that we want to change.
(iv) Click Update to MatchSelection.
1.5.5 Editing
Microsoft Word 2010 provides various options to find and replace text, formatting, paragraph
breaks, page breaks and other items. We can extend our search by using wildcards and codes to
find words or phrases that contain specific letters or combinations of
letters. We can also use the Go To command to find a specific place in
our document.
I. Find Text
We can quickly search for every occurrence of a specific word or phrase.
(i) On the Home tab, in the Editing group, click Find shown in the
Fig. 1.5.17.
Or
Fig. 1.5.17: Editing Group
Press CTRL+F. The Navigation pane opens.
INFORMATION TECHNOLOGY 91
Office automation-MS-WORD 2010
(ii) In the Search Document box, we shall type the text we want to find as shown in the Fig. 1.5.18(A).
(iii) We shall click a result to see it in our document or browse through all the results by clicking the
Next Search Result and Previous Search Result arrows.
Fig. 1.5.18 (A): Find Text in the Navigation Pane Fig. 1.5.18 (B): Magnifying glass of
Navigation Pane
II. Find other document elements
To search for a table, a graphic, a comment, a footnote or an endnote or an equation, do the
following:
(i) On the Home tab, in the Editing group, click Find press CTRL+F. The Navigation Pane opens.
(ii) Click the arrow next to the magnifying glass as shown in the Fig. 1.5.18(B) and then click
the option that we want.
(iii) We shall click result to see it in our document or browse through all the result by clicking the
Next Search Result and Previous Search Result arrows.
III. More search options
To find the old Find dialog box and all of its options, do one of the following:
(i) On the Home tab, in the Editing group, click the arrow next to Find and then click Advanced
Find.
(ii) In the Navigation Pane, click the arrow next to the magnifying glass and then click Advanced
Find.
IV. Find and Replace text
(i) On the Home tab, in the Editing group, click Replace.
(ii) In the Find what box, type the text that we want to search for and replace shown in the
Fig. 1.5.19.
(iii) In the Replace with box, type the replacement text.
(iv) Click Find Next and then do one of the following:
• To replace the highlighted text, click Replace.
• To replace all instances of the text in the document, click Replace All.
• To skip this instance of the text and proceed to the next instance, click Find Next.
92 INFORMATION TECHNOLOGY
Introduction to MS-WORD 2010
INFORMATION TECHNOLOGY 93
Office automation-MS-WORD 2010
VII.To Go to a specific page, table or other item
We can search for and replace special characters and document elements such as tabs and manual
page breaks. For example, we can find all double paragraph breaks and replace them with single
paragraph breaks.
(i) On the Home tab, in the Editing group, click the arrow next to Find and then click Go To.
(ii) In the Go to what box, click the type of item.
(iii) Do one of the following:
To go to a specific item, type the appropriate identifying information for the item in the
Enter item type box and then click Go To.
To go to the next or previous item of the specified type, leave the Enter box empty and then
click Next or Previous.
SOURCES
1. http://www.word-2010.com/whats-new-in-word-2010
2. http://www.dummies.com/how-to/content/how-to-use-the-word-2010-clipboard.html
3. Microsoft Word 2010 Compatibility Modehttp://www.word-2010.com/microsoft-word-2010-
compatibility-mode
94 INFORMATION TECHNOLOGY
2
C The Insert Tab
H
A
P THE INSERT TAB
T
E
R
LEARNING OBJECTIVES
To introduce graphics in word documents.
To create links, hyperlinks in the document.
To introduce header, footer, date and time etc. in the document.
To introduce blank pages, page breaks and cover page etc.
To create lists and work with bullets and numberings.
To work with special symbols and mathematical equations.
INFORMATION TECHNOLOGY 95
Office automation-MS-Word 2010
I. Cover Page
Word 2010 makes it easy for us to customize the look of our documents. The predefined styles help us
create professional looking documents. And with Live Preview, we can try out different formatting
options without actually changing our document.
But one of the handiest features in Word 2010 is the Cover Page option. Word 2010 includes a number
of preformatted cover pages that we can insert with a few clicks of our mouse. We can also save our
own cover pages in the Cover Page gallery as shown in Fig. 2.1.2.
A. Inserting a Cover Page
To insert a cover page, follow these steps:
(i) Click the Insert tab.
(ii) In the Pages Section, click Cover Page.
(iii) In the Cover Page gallery, select a design that we like.
The cover page will be inserted at the beginning of our document. The
Drawing Tools will open to allow us to customize the look of the cover
page. If we insert another cover page in the document, the new cover page
will replace the first cover page we had inserted.
B. Saving a Cover Page to the Cover Page Gallery
If we would like to save our cover page for later use, we shall follow these
steps: Fig. 2.1.2: Cover Page
(i) Select the entire cover page in the Word window.
(ii) Click the Insert tab.
(iii) In the Pages Section, click Cover Page.
(iv) Click Save Selection to Cover Page Gallery as shown in the
Fig. 2.1.3.
C. Removing a Cover Page from our Document
We can also remove a cover page if we want to insert a different one or
if we decide we don’t want a cover page at all:
(i) Click the Insert tab.
(ii) In the Pages Section, click Cover Page.
(iii) Click Remove the Current Cover Page.
II. Blank Page
A. Inserting a blank page Fig. 2.1.3: Saving Selection to
a Cover Page Gallery
(i) Click where we want to insert a new page in a document. The
inserted page will appear just before the cursor position.
(ii) Click the Pages ->> Insert.
(iii) Click the Blank Page Button as shown in Fig. 2.1.4.
B. Deleting a page
We can delete a blank page in a Word document, including a blank page that
occurs at the end of the document, by deleting page breaks. To delete a blank
page, select the page break at the end of the page and then press DELETE key. Fig. 2.1.4: Blank Page
96 INFORMATION TECHNOLOGY
The Insert Tab
III. Page Break
Word 2010 automatically inserts a page break when we reach the end of the document. If we want
the page to break in a different place, we can insert a manual page break or we can set up rules for
Word to follow so that the automatic page breaks are placed where we want them. This is especially
helpful if we are working in a long document. Using Page Break, we can start the next page at the
current position.
A. Inserting a manual Page Break
(i) Click where we want to start a new page.
(ii) On the Insert tab, in the Pages group, click Page Break as shown in Fig. 2.1.1.
B. Deleting a Page Break
We cannot delete the page breaks that Word inserts automatically but can delete any page breaks
that we insert manually.
(i) Click View ->>Draft.
(ii) Select the page break by clicking in the margin next to the dotted line.
(iii) Press DELETE.
2.1.2 Tables
This group has the following options as shown in Fig. 2.1.5.
Insert table
Draw table
Convert text to table
Excel spreadsheet
Quick tables
I. Insert Table : Tables can be inserted in any of the
following ways:
(i) Choose from a gallery of preformatted tables templates.
(ii) Use the Insert Table dialog box to specify the number
of rows and columns that we want.
A. Using Table Templates
We can use table templates to insert a table that is based on
a gallery of preformatted tables. Table templates contain
sample data to help us visualize what the table will look Fig. 2.1.5: Tables options
like when we add our data.
(i) Click where we want to insert a table.
(ii) On the Insert tab, in the Tables group, click Table, point to Quick Tables and then click the
template that we want as shown in Fig. 2.1.5.
(iii) Replace the data in the template with the data that we want.
B. Use the Insert Table Dialog Box
We can use the Insert Table command to choose the table dimensions and format before we insert
the table into a document.
INFORMATION TECHNOLOGY 97
Office automation-MS-Word 2010
(i) Click where we want to insert a table.
(ii) On the Insert tab, in the Tables group, click Table and then click
Insert Table.
(iii) Under Table size, enter the number of columns and rows.
(iv) Under AutoFit behavior, choose the following options to adjust
the table size as shown in Fig. 2.1.6 and discussed in Table 2.1.1.
98 INFORMATION TECHNOLOGY
The Insert Tab
(iv) In the Convert Text to Table dialog box, under Separate text at, click the option for the separator
character that is in our text.
(v) In the Number of columns box, check the number of columns. If we don’t see the number of
columns that we expect, we may be missing a separator character in one or more lines of text.
(vi) Select any other options that we want.
IV. Convert a Table to Text
(i) Select the rows or table that we want to convert to paragraphs.
(ii) Under Table Tools, on the Layout tab, in the Data group, click Convert to Text as shown in
Fig. 2.1.8.
INFORMATION TECHNOLOGY 99
Office automation-MS-Word 2010
VI. Quick Tables
We can use table templates to insert a table that is based on a gallery
of preformatted tables. Table templates contain sample data to help
us visualize what the table will look like when we add our data.
(i) Click where we want to insert a table.
(ii) On the Insert tab, in the Tables group, click Table, point to Quick
Tables and then click the template that we want, as shown in Fig.
2.1.10.
VII. Working with Tables
After the table is created, Microsoft Office Word 2010 offers us many
ways to format that table. If we decide to use Table Styles, we can
format our table all at once and even see a preview of what our table Fig. 2.1.10: Quick Tables
will look like formatted in a particular style before we actually apply options
the style. We can create a custom look for tables by splitting or merging
cells, adding or deleting columns or rows or adding borders. If we’re working with a long table, we
can repeat the table headings on each page on which the table appears. To prevent awkward page
breaks that disrupt the flow of our table, we can also specify just how and where the table should
break across pages.
A. Using Table tools Tabs
After we create a table, two tabs appear on the Table tools context menu: Design and Layout. The
Design and Layout tabs are shown in the Fig. 2.1.11(A) and Fig. 2.1.11(B) respectively. The Design
and Layout Tab options are discussed in Table 2.1.2 and Table 2.1.3 respectively.
Name Purpose
Header Row Applies different formatting to first row of the table.
Total Row Applies different formatting to last row of the table..
Banded Rows Alternates row shading.
First Column Applies different formatting to first column of the table.
Last Column Applies different formatting to last column of the table.
Draw Table Draws table outline and the line segments to create new cells within table.
Name Purpose
Select Drop-down control, lets us select table cells, rows or even enƟre tables.
View Gridlines Shows or hides table gridlines.
Properties Displays Table Properties Dialog Box.
Delete Delete rows, columns, cells or entire tables.
Insert Above Insert rows above selection.
Insert Below Insert rows below selection.
Insert Left Insert columns to the left of the selection.
Insert Right Insert columns to the right of the selection.
Merge Cells Merges selected adjacent cells to create one large cell.
Split Cells Splits merged cell into separate cells.
Split Table Splits table into two tables.
AutoFit Adjusts table layout to fit page.
Height Sets row height.
Width Sets column width.
Distribute Rows Adjusts height of selected rows to distribute rows evenly.
Distribute Columns Adjusts width of selected columns to distribute columns evenly.
Align Top Left Sets Top vertical alignment and Center horizontal alignment.
Align Top Center Sets Top vertical alignment and Center horizontal alignment.
Align Top Right Sets Top vertical alignment and Right horizontal alignment.
Align Center Left Sets Center vertical alignment and Left horizontal alignment.
Align Center Sets Center vertical and horizontal alignment.
Align Center Right Sets Center vertical alignment and Right horizontal alignment.
Align Bottom Left Sets Bottom vertical alignment and Left horizontal alignment.
Align Bottom Center Sets Bottom vertical alignment to Center horizontal alignment.
Align Bottom Right Sets Bottom vertical alignment and Right horizontal alignment.
Text Direction Changes direction of text in cell.
Cell Margins Sets margins for individual cells.
Sort Sorts selected cells.
Repeat Header Row Repeats header rows when table spans multiple pages.
Convert to Text Converts table to Text.
Formula Enters calculated formula.
Table 2.1.3: The Design Tab Options
B. Editing Tables
After a table is created, there may be some requirements to make a few changes in it. Some procedures
may be followed to perform basic table-editing tasks such as adding and deleting rows and columns
and changing column widths or row heights etc.
(a) Moving and Selecting in Tables
The following Table 2.1.4 displays the shortcut keys to move and select tables in Word 2010.
To Move To This cell Keyboard shortcut To Move To This cell Keyboard shortcut
Next cell in row Tab Last cell in row Alt + End
Previous cell in row Shift + Tab Last cell in column Alt + PgDn
First cell in row Alt + Home Previous row Up Arrow
First cell in column Alt + PgUp Next row Down Arrow
Table 2.1.4: Shortcut Keys to move and select the tables
(b) Inserting Cells
We can insert cells within a Word table. To do so, follow these steps:
(i) Click in a cell that is located just to the right of or above where we want to insert a cell.
(ii) Under Table Tools, on the Layout tab, click the Rows & Columns Dialog Box Launcher that
appears on its lower-right corner or right click in the cell and select Insert - >> Insert Cells.
(iii) The Insert Cells Dialog box gets appeared as shown in the Fig. 2.1.12(C). Click one of the
following options as shown in Table 2.1.5.
Fig. 2.1.12 (B): Insert Options in Layout Tab Fig. 2.1.12 (C): Insert cells
box
Fig. 2.1.13 (A): Delete Option in Layout Tab Fig. 2.1.13 (B): Delete Cell Dialog Box
(ii) In the Rows & Columns group, click Delete and then click any of the options Delete Cells,
Delete Rows, Delete Columns or Delete Table as desired and shown in Fig. 2.1.13 (A).
Or
Right - click to the cell/row/column or table we want to delete and click Delete Cells. The
Delete Cells Dialog Box as shown in the Fig. 2.1.13 (B) gets opened. Click the desired option as
described under Table 2.1.6:
Click this To Do This
Shift Cells Left Deletes the selected cell and shifts to the left
Shift Cells Up Deletes the selected cell and shifts the next cell up
Delete entire row Deletes the entire row of the table where we clicked in.
Delete entire column Deletes the entire column of the table where we clicked in.
Table 2.1.6: Description of option in Delete Cell Dialog Box
C. Merging Cells
We can combine two or more cells in the same row or column into a single cell. For example, we can
merge several cells horizontally to create a table heading that spans several columns.
I. Picture
Pictures and ClipArt can be inserted or copied into a document from many different sources,
including downloaded from a ClipArt Web site provider, copied from a Web page or inserted from
a folder where we save pictures. We can also change how a picture or ClipArt is positioned with
text within a document by using the Position and Wrap Text commands.
A. Inserting a picture
(a) From a file
(i) Click in the document where we
want to insert the picture.
(ii) On the Insert tab, in the Illustrations
group, click Picture as shown in Fig.
2.1.19 from where the user can locate
the desired picture.
(iii) Either select the picture that we want
to insert and click Insert or double-
click the picture that we want to insert.
(b) From a Webpage
(i) Open the document.
(ii) From the Web page, drag the
picture that we want into the Word
document. We should make sure that Fig. 2.1.19: Insert Picture Dialog Box
the picture that we choose is not a link
to another Web page. If we choose a picture that is linked, it will be inserted in our document
as a link instead of an image.
B. Replacing a Picture
(i) Click the picture that we want to replace.
(ii) Do any one of the following:
Under Picture Tools, on the Format tab, in the Adjust group, click Change Picture as
shown in Fig. 2.1.20.
Right-click the Picture to be replaced and click Change Picture as shown in Fig. 2.1.20.
(iii) Locate a new picture and then double-click it.
REFERENCES
http://office.microsoft.com/en-us/word-help/quick-start-add-a-chart-to-your-document-HA010379388.
aspx
http://office.microsoft.com/en-us/word-help/create-a-smartart-graphic-HA010354861.aspx
LEARNING OBJECTIVES
To introduce the concept of Table of contents, footnotes & endnotes and captions etc. in word
documents (References Tab).
What is Template?
Create and download a template from office.com
Edit and modify the template
Introduction Version Control in word 2010
Configure Auto save settings
Manage auto Save Versions
Restore and Compare Versions
Recover Unsaved files
To know different types of document views, zooming concepts (View Tab).
To create, execute and delete Macros in word documents (View Tab).
To save a word document as PDF file (PDF Tab).
Word 2010 offers great tools for citing sources, creating a bibliography and managing the sources.
The first step to create a reference list and citations in a document is to choose the appropriate style
that we will be using for formatting the citations and references.
3.1 REFERENCES
It has the following options as shown in Fig. 3.1.1:
1. Table of Contents
2. Footnotes
3. Citations & Bibliography
4. Captions
5. Index
6. Table of Authorities
Add Text
Update Table
When we select text and mark it as an index entry, Microsoft Office Word adds a special XE (Index
Entry) field that includes the marked main entry and any cross-reference information that we choose
to include. After we mark all the index entries, we choose an index design and build the finished
index. Word collects the index entries, sorts them alphabetically, references their page numbers,
finds and removes duplicate entries from the same page and displays the index in the document.
A. Mark index entries and create an index
To create an index, we mark the entries, select a design and then build the index.
Step 1: Mark index entries
To mark index entries, do one of the following:
Mark words or phrases
Mark entries for text that spans a range of pages.
Mark words or phrases
(i) To use existing text as an index entry, select the text. To enter our own text as an index entry,
click where we want to insert the index entry.
(ii) On the References tab, in the Index group, click Mark Entry as shown in the Fig. 3.1.19.
(iii) To create the main index entry that uses our own text, type or edit the text in the Main Index
Entry box as shown in Fig. 3.1.19.
(iv) If desired, we can customize the entry by creating a subentry a third-level entry or a cross-
reference to another entry:
To create a subentry, type the text in the Subentry box.
To include a third-level entry, type the subentry text followed
by a colon (:) and then type the text of the third-level entry.
To create a cross-reference to another entry, click Cross-reference
under Options and then type the text for the other entry in the
box.
(v) To format the page numbers that will appear in the index, select the
Bold check box or the Italic check box below Page number format.
To format the text for the index, select the text in the Main entry or
Subentry box right-click and then click Font. Select the formatting Fig. 3.1.19: Mark Index
options that we want to use. Entry Dialog Box
(i) If we don’t see the XE fields, click Show/Hide in the Paragraph group on the Home tab.
(ii) Find the XE field for the entry that we want to change.
(iii) To edit or format an index entry, change the text inside the quotation marks.
3.3 VIEW
We can view Word 2010 documents in a variety of ways using the View tab(Alt+W). The View tab
has four groups for view option and one for Macros as shown in Fig. 3.3.1:
1. Document Views
2. Show
3. Zoom
4. Window
5. Macros Fig. 3.3.1: View Group
3.3.1 Document Views Group
In Word 2010, we can display our document in one of five views as shown in Fig. 3.3.2:
Print Layout
Web Layout
Outline
Draft Fig. 3.3.2: Document View
Group
I. Print Layout (Alt+W, P)
The default document view, Print Layout shows the document in a form similar to how it will look
in print, including headers and footers. This option is best for preparing work we plan to print.
We can save files created by many 2010 Microsoft Office system programs in Portable Document
Format (PDF), which is a common format for sharing documents.
To view a PDF file, we must have a PDF reader installed on our computer. After we save a file as
PDF, we cannot use our 2010 Office release program to make changes directly to the PDF file. We
must make changes to the original 2010 Office release file in the 2010 Office release program in
which we created it and save the file as PDF again.
I. Saving as PDF
(i) Click the File tab.
(ii) Click Save As.
(iii) In the File Name box, type or select a name for the document.
(iv) In the Save as type list, click PDF. The Save As dialog box is displayed in the Fig. 3.4.2.
If we want to open the file immediately after saving it, select the Open file after publishing
check box. This check box is available only if we have a PDF reader installed on our
computer.
If the document requires high print quality, click Standard (publishing online and
printing).
If the print quality is less important than file size, click Minimum size (publishing online).
(v) Click Options to set the page range to be printed, to choose whether markup should be printed
and to select the output options. Click OK when finished.
LEARNING OBJECTIVES
To create document themes, colors, fonts, do the page settings (margins, orientation, background
etc.) and preview and save their effects and to preview and print them. (Page Layout Tab)
To create a set of document, envelopes and labels etc. to be sent to many recipients through the
concept of Mail Merge. (Mailings Tab)
To create, save and open a PDF document. (Add – Ins and PDF Tabs)
To preview the saved documents and print them. (Print Command)
4.1 PAGE LAYOUT
The Page layout tab is shown in Fig. 4.1.1 with the following options:
1. Themes
2. Page Setup
3. Page Background
4. Paragraph
5. Arrange
Colors
Fonts
Effects
The Document Theme defines the colors, fonts and graphic effects for a
document. When applying a Theme we can choose to apply only one or
any number of these elements. All we have to do is select the palette, font or
styling from one of the galleries in the Themes group. A theme organizes
Fig. 4.1.2: Built – In
an appropriate balance of colour. Themes have a palette of twelve colours.
Themes Group
Fig. 4.1.21: Page Color Menu Fig. 4.1.22: Page Border Menu
I. Position/Wrap Text
A. Wrap text around a picture or drawing object
(i) If the picture or object is on a drawing canvas, select the
canvas. If the picture or object is not on a drawing canvas,
select the picture or object. Fig. 4.1.24 (A): Fig. 4.1.24 (B):
Position Menu Wrab Text
(ii) On the Format tab, in the Arrange group, click Position
as shown in Fig. 4.1.24 (A).
(iii) Click the wrapping position that we want to apply.
B. Wrap text around a table
(i) Click the table.
(ii) Under Table Tools, on the Layout tab, in the Table group,
click Properties.
(iii) Under Text Wrapping, click Around as shown in the Fig.
4.1.25.
To set the horizontal and vertical position of the table, the
distance from surrounding text and other options, under Text
Wrapping, click Positioning and then choose the options that
we want as shown in Fig. 4.1.25. Fig. 4.1.25: Table Properties and its
The below mentioned Table 4.1.1 describes in detail the various Positioning
options under Wrap Text tab.
Labels
I. Envelopes
A. Create and print a single envelope Fig. 4.2.2: Create Group
If we want to include our return address on the envelope, we can set this up before we start working
on the envelope. When we have set up our envelope the way we want, we can print it, as well as
save it so that we can reuse it.
Set up a return address
(i) Click the option File and then click Options.
(ii) Click Advanced.
(iii) Scroll down and under the theme General, type the return address in the Mailing address box.
Word stores the address so that we can use it whenever we want to insert our return address in
an envelope, label or other document.
(iv) Click OK.
Verify printing options
Before we run a batch of envelopes through our printer, we can verify that the printer options are
set up correctly.
(i) On the Mailings tab, in the Create group, click Envelopes as shown in Fig. 4.2.3(A).
(ii) Click Options and then click the Envelope Options tab as shown in Fig. 4.2.3(B).
Fig. 4.2.3 (A): Envelopes Window Fig. 4.2.3 (B): Envelopes Options
(iii) In the Envelope size box, click the choice that matches the size of our envelope. If none of the
choices matches our envelope size, scroll to the bottom of the list, click Custom size and then
type the dimensions of our envelope in the Width and Height boxes.
(iv) Click the Printing Options tab, select the choices and click OK. This will close the Fig. 4.2.3 (B).
(v) Click Print to print the envelope in the Fig. 4.2.3 (A).
(vi) If the envelope does not print correctly, we shall go back to the Printing Options tab of the
Envelope Options dialog box (Fig. 4.2.3 (B)) and make adjustments to the printing options. Print
the envelope again. Repeat this process until we discover a configuration of printing options
that yields the results that we want.
B. Create and print or save an envelope
(i) On the Mailings tab, in the Create group, click Envelopes as shown in Fig. 4.2.3 (A).
(ii) In the Delivery address box, type the mailing address. If we want to use an address in the
electronic address book installed on our computer, click the icon Insert Address .
(iii) If we want to format the text, select the text, right click the selected text and then click Font on
the shortcut menu.
(iv) In the Return address box of the Fig. 4.2.3 (B), type the return address or use the preconfigured
one.
(v) If we want to use an address in the electronic address book installed on our computer, click
Insert Address.
(vi) If we want to keep the return address for future use, but we don’t want to include it on the
current envelope, select the Omit check box shown in the Fig. 4.2.3 (A).
(vii)If we have access to electronic postage, for example if we purchased it from a service on the
World Wide Web, we can add it to our envelope. We shall follow these steps:
Select the Add electronic postage check box. If we do not have an electronic postage
program installed, Microsoft Word prompts us to install one and offers to connect to the
Microsoft Office Online Web site. There we can get more information and links to other
sites that offer electronic postage.
To set options for the electronic postage programs that are installed on our computer, click
E-postage Properties. Do one of the following:
Fig. 4.2.4 (A): Labels Window Fig. 4.2.4 (B): Label Options
(ii) In the Address box, type the text that we want. If we want to create a label for an address
that is stored in the electronic address book that is installed on our computer, click Insert
Address .
(iii) To change the formatting, select the text, right-click the selected text and then click Font or
Paragraph on the shortcut menu.
(iv) To select the label type and other options, click Options. The Fig. 4.2.4 (B) gets opened.
(v) In the Label Options dialog box, make the choices and then click OK. The Fig. 4.2.4 (B) gets
closed.
(vi) In Fig. 4.2.4 (A), under Print tab, click Single label. Then in the Row and Column boxes, enter
the numbers that match the numbers of rows and columns on the label sheet for the label that
we want to print.
(vii) Click Print.
II. Write & Insert Fields group has the following options as shown in Fig. 4.2.5:
Highlight Merge Fields
Address Block
Greeting Line
Insert Merge Field
Rules
Match Fields
Update Labels
LEARNING OBJECTIVES
To understand the basics of spreadsheet application
To create a worksheet file
To enter and edit data in the worksheet file
Ribbon
Row Number
Sheet Tab
Cell reference
A cell reference is the name of some cell in a spreadsheet. Most cell references indicate another cell
in the same spreadsheet, but a cell reference can also refer to a cell in a different sheet within the
same spreadsheet, or (depending on the implementation) to a cell in another spreadsheet entirely,
or to a value from a remote application.
A typical cell reference consists of one or two case-insensitive letters to identify the column followed
by a row number. Either part can be relative (it changes when the formula in it is moved or copied),
or absolute (indicated with $ sign in front of the part concerned of the cell reference).
A cell on the same“sheet”is usually addressed as:- = A1
A cell on a different sheet of the same spreadsheet is usually addressed as:-
=SHEET2!A1(that is; the first cell in sheet 2 of same spreadsheet)
Some spreadsheet implementations allow a cell reference to another spreadsheet (not the current
open and active file) on the same computer or on a local network. It may also refer to a cell in another
LEARNING OBJECTIVES
To understand cell references and ranges
2.2 RANGES
A range is a rectangular group of cells. The smallest range is a single cell and the largest range includes
all the cells in the worksheet. A range can include cells from same sheet or cells from adjacent sheets.
Ranges are defined by the addresses of two opposite or diagonally paired corner cells separated by
a colon (:) or two dots (..).
2.2.1 Naming Ranges
The user can apply a name to refer to a cell or a range of cells, rather than using cell addresses as
references. Names provide multiple benefits:
Names are more descriptive and easier to remember than cell addresses.
2.3 FORMULAE
When using a formula in the spreadsheet, (a cell containing a formula that references other cells), the
result will automatically change as other cell values referenced in the formula change. This feature
is very valuable when editing or adding information to the worksheet. The user does not have to
remember to update other cells that rely on that cell’s information.
A formula always begins with an equal sign (=) followed by some combination of numbers, text,
cell references, and operators. If a formula is entered incorrectly, an ERROR IN FORMULA message
will appear.
2.3.1 Formula Operators
Operators are used in formulas to execute operations on the values taken by formulas. The four
categories of operators are:
Arithmetic operators (+,-,*,/,%,^) are used in conjunction with numbers to create mathematical
formulas. “-“ operator can also be used for negation of a number, e.g. “=-5+2” will give result -3.
“%” operator is Percentage operator, e.g. “=6%” will give result 0.06.
Text concatenation operator (&) is used for joining text within quotation marks or text contained
in referenced cells. E.g. If cell A10 contains the text “Excel”, then =”MS “&A10 will give result “MS
Excel”.
3. Select the cell, and on the Formulas Tab, in the Formula Auditing group, click Trace Precedents
twice.
4. To remove all tracer arrows, on the Formulas Tab, in the Formula Auditing group, click Remove
Arrows.
LEARNING OBJECTIVES
To learn formatting and restructuring of worksheets
To learn creating and using charts
To work with sparklines
To understand the concept of macros
Fig. 3.9.5: Sparkline with and without the Date Axis Type
In the example shown here, there are two column sparklines that use data from the same range. The
sparkline with the “Trend” label uses the General Axis Type and the sparkline with the “Trend
(Date Axis Type)” label uses the Date Axis Type. In each sparkline, the first two data points are
separated by two months and the second and third are separated by seven months. By applying the
Date Axis Type, the space between the three columns changes proportionally to reflect the irregular
time periods.
Note: To use relative references, on the Developer Tab, in the Code group, select Use Relative
References.
3.10.2 Running a Macro
1. On the Developer Tab, in the Code group, click Macros. The Macro dialog box appears.
3.11 HYPERLINK
A hyperlink is a link from an Excel file that opens a Web page or another file when it is clicked.
3.11.1 Create a Hyperlink to a new file
1. On a worksheet, click the cell where the user wants to create a hyperlink.
Tip: We can also select an object, such as a picture or an element in a chart, that we want to use
to represent the hyperlink.
2. On the Insert Tab, in the Links group, click Hyperlink.
Tip: We can also right-click the cell or graphic and then click Hyperlink or we can press CTRL+K.
The Insert Hyperlink dialog box appears.
Fig. 3.12.1: Selecting the original data type in Text Import Wizard
6. Mark other delimiters until a parsed data, arranged in neat columns appears in the Data preview
window. Then click Next.
8. Click Finish and the data gets imported into the worksheet.
SOURCES
1. Microsoft® Excel 2010 In Depth, Bill Jelen, Que Publishing,2010
2. Microsoft Office Excel 2010 QuickSteps [Paperback], John Cronan,McGraw-Hill Osborne Media;
2 edition April 19, 2010
3. Master VISUALLY Excel 2010 [Paperback], Elaine Marmel,Visual; 1 edition July 20, 2010
4. web.utk.edu
5. www.exinfm.com
6. www.chicopee.mec.edu
7. www.lacher.com
8. www.jaxworks.com
9. http://spreadsheets.about.com/od/excelcharts/ss/2010-06-19-excel-2010-sparklines-
overview-2_4.htm
LEARNING OBJECTIVES
To gain understanding of Working with Tables
To understand Sorting, Filtering, Subtotal
To understand Consolidation of Data
To understand What if Analysis
To understand use of Goal Seek, Scenarios, Solver
To understand use of Statistical Analysis
INTRODUCTION
Imagine making a long list of names and addresses or Telephone numbers or dates or anything
for that matter and putting it in order. Putting a list in order accomplishes several goals, including
making our list easier to read and use, making it appear more orderly and giving the content a
perceived priority. Now that priority can of course change, as the same list can be put in order
or sorted by any field within the list.
We enter data into an Excel Worksheet so that we can analyse it, manipulate it or turn it into
a report. So any serious user of excel should be comfortable working with lists (now Tables in
Excel 2010) organizing data, labeling it, editing it etc.
We can utilize the potential of Excel by putting data in tables.
Each row represents different transaction.
Each column represents a different variable i.e. field.
Each column is headed by name of that variable or header.
In the Tables,we might have some preferred order for maintaining and viewing the records.
Depending on the need, we may want the table arranged alphabetically or date wise as in case
of Date of birth or some custom sort.
Tip:
Excel has got IntelliSense,we need to follow some rules to keep the data in Table format which
makes powerful data commands possible.
Use only a single row of headings above the data. If we need to have a two-row heading,
set it up as a single cell with two lines in the row.
Never leave one heading cell blank. We might do this if we add a temporary column. If we
forget to add a heading before we sort, this will affect the IntelliSense and Excel will sort
the headings down into the data.
4.1 SORTING
Excel allows us to sort on various criteria. We can sort data by:-
text (A to Z or Z to A),
numbers (smallest to largest or largest to smallest),
dates and times (oldest to newest and newest to oldest),
custom list (such as Large, Medium and Small),
cell color,
font color or
cell icon.
Excel further gives us the option of
One Click sorting or quick sorting -we can quickly sort your data by using the A-Z and
Z-A Sort buttons on the Ribbon’s Data tab.
Sort Dialog Box – We can also sort on various criteria through Sort Dialog Box on the
Data tab.
Case Study 4.1: In a Bank audit we are given a locker list with the header details Locker No.,
Name, Due Month, Arrear, Annual Rent, date_Access. As shown in Fig 4.1.1. We want to analyse
the locker data on various criteria.
Fig. 4.1.9: Sort Dialog box with due month sorted in order Financial year
10. We can add a level by clicking on Add Level in all we can sort upto 64 levels. Apart from
values we can sort on Cell color, Font Color & Cell Icon as shown in Fig. 4.1.10.
4.2 FILTER
We often want to extract figures more than a certain limit from our list, we again want to know
sales made by john in a list of sales. Fortunately, Excel includes an easy-to-use Filter to show just
what we want to see and hide the rest. Filtering doesn’t change our data in any way. As soon as
we remove the filter, all our data reappears, exactly the same as it was before.
Filtering is a way that we can use Excel to quickly extract certain data from our spreadsheet.
Unlike sorting, filtering doesn’t just reorder the list. It actually hides the rows or columns
containing data that do not meet the filter criteria we define. Excel has an AutoFilter feature
that makes it very easy to extract data from our spreadsheet. After filtering data, we can copy,
find, edit, format, chart and print the subset of filtered data without rearranging or moving it.
In Excel 2010, if we’re using an Excel Table, it has built-in filtering features. If the data is not in
an Excel Table, we can bring it up from Filter under Sort & Filter in Data Tab.
We can also filter by more than one column. Filters are additive, which means that each additional
filter is based on the current filter and further reduces the subset of data.
Case Study 4.2: As an auditor in a Bank we are given a Locker list. We want to create a Vacant
locker list, so that we can match the keys physically available with the branch manager with
vacant Lockers in the branch.
Strategy:
We can find records matching a certain criteria by using Filter under Data Tab as shown in
Fig.4.2.1, since we want to create a list of all lockers with name Vacant we can use Filter feature
in Excel.
Fig. 4.3.2: Use Less than option under Number filters to get cases where spread< 1%
Gist: We have created a list of cases where spread of ROI charged on loan and ROI paid on FDR
is less than 1%.
Commands learnt: Data > Filter- Advanced
4.4 SUBTOTALS
Many times we need to showmore complex information arranged in Tables, especially if it’s split
into separate groups, each with its own SUBTOTALS. For Example we could have data which
could make more sense if we have Quarterly or Yearly or Region wise subtotals. The Subtotal
tool lets us create groups and subtotals all in one click a feature that can save us lots of time.
Excel’s Subtotal feature helps you draw specific information from one or more subsections of a
database or list of data.
In addition to finding the subtotal for selected rows of data, you can also use the Subtotal feature
to find, among other things, the average value for the selected range of data, the largest and
smallest values or the total number of rows of data included in the range.
Case Study 4.4: We have Datewise & lorrywise list of freight paid to various Lorries as shown in
Fig. 4.4.1 we want to check for cases where total freight paid to any lorry is more than Rs. 75000
so that we could check for TDS compliance under Income Tax.
Fig.4.5.3: Use Sum under function and add the reference & other options
7. In the Function box, click the operation we want to use to consolidate the data. Since we
want to Annual results we will use SUM (there are however 11 operations possible)
Sum, Count, Average
max, Min, Product
Count Nums, STDdev
StdevP, Var, VarP
8. In the Reference box, enter a source area we want to consolidate. If the worksheet that
contains the data that we want to consolidate is in another workbook, click Browse to locate
that workbook and then click OK to close the Browse dialog box.
In our case since we have defined Name range and sheets are in the same workbook. So press
F3 on keyboard to open name ranges in Paste Name dialog and select Quarter_1, rather than
selecting sheets manually, which could be hectic if we are dealing with huge spreadsheet.
9. Click Add.
10. Repeat steps 8 and 9 for each source area to consolidate i.e. Quarter_2, Quarter_3 and Quarter_4
respectively.
Fig. 4.6.1: Quarterly Operating Results for 4 Quarters with different layout
Strategy:
We can help him consolidate the same using excel as follows:
Consolidate Data by Category:
1. The steps 1-10 are the same as in case Study1.5
2. While consolidating- Under Use labels in, select the check boxes that indicate where the
labels are located in the source area: either the top row, the left column or both.
3. To update the consolidation table automatically when the source data changes, select the
Create links to source data check box.
4. Labels in a source area that do not match any labels in the other source areas result in
separate rows or columns when we consolidate data.
5. In this case also result is as shown in Fig. 4.6.2.
Fig. 4.9.1: Invoice list of HO in Columns A-C and Branch in Columns D-F
Strategy:
We can use Consolidate function in Excel as follows
CONSOLIDATING MULTIPLE LISTS IN SINGLE WORKSHEET
1. Go to a blank section of the worksheet, such as cell G1 and select Data>Consolidate.
2. In the Consolidate dialog, choose range A1:C15 as the reference, Click Add.
3. Repeat step 2 for range D1:F15
4. In Use Labels in select Top Row and Left Column, as shown in Figure 4.9.2. Click OK.
Fig. 4.9.2: Select Two lists as ranges & Enable Top Row & Left Column
5. The resultant range we get a customerwise aggregation of invoice totals as shown in Fig.
4.9.3.
Fig. 4.10.2: Goal Seek under What-if Analysis under Data Tools
2. Activate Goal Seek Dialog Box.
3. The “Set cell” must always contain a formula or a function, in this case set it to cell B8.
4. Under “To Value” enter 21000 which is the target EMI.
Fig. 4.11.2: Scenario manager under What-if Analysis under Data Tools
2. The Scenario Manager dialog box appears.
3. To create a scenario, click the Add button.
4. An Add Scenario dialog box appears.
5. Type the name of the scenario (Best Case, in this example) in the Scenario Name text box,
specify the Changing Cells (if they weren’t previously selected) and click OK as shown in
Fig.4.11.3.
Fig. 4.11.5: All the scenarios are displayed we can see any scenario using show
12. To have Excel plug the changing values from any scenario into the table, click the scenario
name in the Scenarios list box and then click Show.
13. Click the Close button when we’re finished with the Scenario Manager. After adding the
various scenarios for a table in ourworksheet; don’t forget to save the workbook.
14. That way, we’ll have access to the various scenarios each time we open the workbook in
Excel by opening the Scenario Manager, selecting the scenario name and clicking the Show
button.
15. We can also create a summary by clicking Summary on Scenario Manager Dialog Box.
16. A scenario summary dialog box would appear, by specifying the result cells, a summary
report can be created as shown in Fig. 4.11.6.
4.7 SOLVER
In many situations we want the best way to do something. Excel Solver can solve problems for
us. That simple!
Solver is an Excel add-in that can solve problems by enabling a Target cell to achieve some goal.
This goal may be to minimise, maximise or achieve some target value.It solves the problem by
adjusting a number of input cells according to a set of criteria or constraints which are defined
by the user.
Solver is a planning and analysis tool that enables users to find optimal solutions for Excel models
that maximize profit or minimize cost or risk, by automatically adjusting multiple input cells. It
is used in a wide range of industries, with a common thread of finding the best way to allocate
scarce resources.
Solver in Excel 2010, was developed by Frontline Systems Inc. and licensed to Microsoft. Frontline
offers more powerful Solvers, for use inside and outside Excel, directly to end users via its Website
http://www.solver.com.
For a given problem, excel solver can run various permutations and combinations and find out
best possible solution for us. It is like goal seek, but better.
For Goal Seek with more than one changing cell use solver. Wherever complex trial and error
analysis is required solver should be used. Solver can alter a formula not just to produce a set
value but also to maximize or minimize the results. Solver helps us answer optimization problems
elegantly.
An optimization model has three parts:
Target cell - represents the objective or goal. Multiple Target can also be there.
Changing cells-which can be changed/ adjusted to optimize Target.
Constraints- Logical conditions within which solution is desired.
Solver is available in Excel as an Add-in.
To install Solver, click the File tab, click Options and then click Add-Ins.
Fig.4.7.3: Solver
The Solver Parameters dialog box will appear as shown in Fig. 4.7.4.
Fig. 4.12.4: Solver dialog Box with constraints & other options
13. After we click Solve, Solver calculates an optimal solution (if one exists) for the product
mix model. An optimal solution to the product mix model would be a set of changing cell
values (Litres produced of each Flavour) that maximizes profit over the set of all feasible
solutions.
14. The result we get is as shown in Fig 4.12.5
Fig. 4.12.5: Solution given by solver optimising the production of product mix
Fig. 4.13.4: Descriptive Statistics for USD & Euro daily Rates
Here, n equals the number of observations in the sample and x is the ith observation in the sample.
Thus Mean Rate of USD is 51.80. Thus, we can think of a data set’s mean as a “balancing point” for
the data. This information can obtained by use of AVERAGE Function in excel to calculate mean.
Median: The median of a group of observations is usually and somewhat casually, thought of as
the middle observation when they are in sorted order half the observations lie below the median
while half lie above it. When a sample includes an even number of observations, we can simply
average the two middle observations. The median is right on the 50th percentile of any Sample.
This information can also be obtained by using the MEDIAN function.
Mode: If we’re thinking of average as a measure of what’s most popular, we’re usually thinking
in terms of a mode—the most frequently occurring value. Mode tells us which one of several
categories occurs most frequently. Thus for USD no value occurred more than once the mode is
#NA and for Euro Mode is 67.65 because Value 67.65 occurred more than once. This information
can be obtained by using the MODE function also.
When to use Mean, Median or Mode: If the data is Symmetric i.e. does not have an excessive
skew mean is better Otherwise median is a better measure wherever there is excessive skew.
Like If we are to look at property prices in New Delhi, Median would be a better measure since
some properties could be very highly priced thereby distorting the mean.
Skewness: Skewness quantifies the lack of symmetry in a probability distribution. A skewed
distribution has values whose frequencies bunch up in one tail and stretch out in the other tail.
A skew of greater than +1 indicates high positive skew.
A Skew of less than -1 indicates a high negative skew
A skew between -1 and +1 indicate relatively symmetric data.
In the above case Euro indicate a slight positive skew.Whereas USD shows almost symmetric
distribution.
Kurtosis: A distribution might be symmetric but still depart from the normal pattern by being
taller or flatter than the true normal curve. This quality is called a curve’s kurtosis. Positive
kurtosis means a data is more peaked than Normal random variable.
Sample variance and sample standard deviationA standard deviation describes how values in a
data set vary around the mean. Another way to say this same thing is that a standard deviation
describes how far away from the mean the average value is. In fact, we can almost think of a
standard deviation as being equal to the average distance from the mean, not exactly the technical
definition but pretty close concept.
Sample variance is the average squared deviation of the data from its mean. Intuitively, it seems
like we should divide by n to compute a true average squared deviation, but for technical reasons
we need to divide by n–1. Dividing the sum of the squared deviations by n–1 ensures that the
sample variance is an unbiased measure of the true variance of the population from which the
sampled data is drawn. Wecalculate the variance before we calculate the standard deviation.
Standard deviation S is just the square root of S2. It’s a deviation because it expresses a distance
from the mean: a departure from the mean Value The variance is a different matter. It’s the square
of the standard deviation and it’s fundamental to statistical analysis,
Range: The maximum value in a set minus the minimum value. It’s usually helpful to know
the range of the values in a frequency distribution, if only to guard against errors in data entry.
Many valuable insights can be derived from descriptive statistics. Descriptive statistics can be
used to compare two data sets. For example in the data i.e. daily rates of USD & EURO above
we can conclude the following:
Euro rates are more variable as compared to USD (if we look at Standard deviation, Variance
& range).
Euro rates are more positively skewed as compared to USD which are more symmetric
(Skewness).
Fig. 4.16.1: Worsheets with customer Information & customer telephone list
Strategy:
We can use Vlookup to get the Telephone number of customer in Col D of sheet Cust info.
1. The formula would be =VLOOKUP(A2,’Telephone List’!$A$1$:$B17,2,FALSE)
2. In this case Arguments are
Lookup value is A2 i.e. customer no.
Range is $A$1$:$B17 in worksheet ‘Telephone List’
Column No is 2 i.e. 2nd column of range.
Range lookup- now here lies the trick. If we omit it, Vlookup will try to find approximate
match which we don’t desire. In this case we are interested in exact match so we will be
using “False” so that VLookup returns an exact match
Fig. 4.16.2: To get the telephone number of customer we will use a Vlookup Formula
Gist: We have joined two lists using Vlookup
Commands Learnt: Vlookup Function
4.12 SUMMARY
Excel is an invaluable tool for Consolidation and data analysis by grouping together related data
and rearranging it in the worksheet, it becomes easier to analyze and interpret the data in Excel.
In this chapter, we learned how to apply the different tools available in Excel to organize and
analyze the data. We learned to apply tools like sorting, filters, subtotals and outlining to view
and summarize data as per specific needs. Sorting allows you to rearrange the data while filters
allow for selective viewing of the data. Subtotals and outlines provide options to group the data
in order to view the aggregates. We also learned to consolidate and summarize data given in
different worksheets/workbooks into one single data range.
Finally, we learned to use data analysis tools provided in Microsoft Excel like Goal Seek, Scenarios
and Solver to look at the current state of data, make changes and see how those changes affect
the rest of your data. Goal Seek can work with only one variable while Solver can work with
multiple variables simultaneously. We also learnt to search for data using Logical Functions
NestedIF and the star function of Excel,Vlookup.
In addition, we learned how to install Excel add-ins and use them for performing various kinds
of statistical analysis on the data.
REFERENCES
1. Greg Harvey, ‘Excel 2010 For Dummies’, Wiley Publishing, Inc., Indianapolis, Indiana,2010
2. Conrad Carlberg, ‘Statistical Analysis: Microsoft Excel 2010’,Que Publishing,2011
3. www.chandoo.org
4. www.solver.com
LEARNING OBJECTIVES
Understanding data validation features of Excel
Understanding creation of Drop-Down list
Understanding display of Invalid data
Understanding Protection of Cell, Worksheet
Understanding Protection of a shared workbook
5.1 INTRODUCTION
Data validation is an Excel feature that we can use to define restrictions on what data can or should
be entered in a cell. The data can be protected by simply locking it down, preventing anyone
fromchanging it.
When we’re the only one populating an Excel worksheet with data, it’s not too likelythat the wrong
data will be entered. But things are not the same if many people are populating an excel worksheet.
Fortunately, Excel has data Validation and Workbook protection features to help reduce errors
prevent accidental or intentional modification of data. Using them, we can:
Prevent people from changing a worksheets structure (inserting or deleting cells, columns,
or rows).
Prevent people from changing a worksheet’s formatting (including the number format or
other formatting details like column width and cell color).
Prevent people from editing certain cells.
Prevent people from entering data in a cell unless it meets certain criteria.
Provide additional information about a cell in a pop-up tip box.
Prevent people from editingor even seeingthe spreadsheet’s formulas.
Prevent people from moving to cells they don’t need to edit or inspect.
The reasons for putting in protection could be many ranging from, we don’t want other people to
tamper with data or to prevent errors especially when the workbooks are shared with data validation,
we can lockout certain types of errors and guide the people using our workbook to make surethey
fill in the right information.
Among other things, we can use data validation to do the following:
Restrict data to predefined items in a list e.g. Only Specified Departments
Restrict numbers outside a specified range e.g. between 100 and 600
5.12 SUMMARY
Workbooks are meant to be shared but it is important that anybody using our workbook accidentally
or intentionally messes with our workbook.
REFERENCES
1. Greg Harvey, ‘Excel 2010 For Dummies’, Wiley Publishing, Inc., Indianapolis, Indiana, 2010.
2. Laurie Ulrich Fuller et al, ‘Picture Yourself Learning Microsoft Excel 2010’Cengage Learning
2011.
3. www.chandoo.org
LEARNING OBJECTIVES
To gain understanding of PivotTables
To understand Creating, Sorting, Grouping in PivotTables
To understand Drill-Down in PivotTables
To understand Calculations in PivotTables
To understand PivotCharts
INTRODUCTION
In a number of situations we need to analyse data on multi-dimensional perspective. We might
need to slice & dice data. Like out of a sales report of sales made in different periods, in different
departments, of different products, by different salesmen, of different amounts; we need overview of
sales period wise, salesmen wise, product wise, with different subgroups; for that matter we might
have a hundred data points to track. All this is possible using a star feature of Excel called PivotTables.
The PivotTables tool is one of the most powerful yet intimidating features in Excel. Pivot tables
allow us to turn our data inside out, upside down, sideways and backwards, quickly summarize
and analyze large amounts of data in lists and tables—independent of the original data layout in our
spreadsheet—by dragging and dropping columns to different rows, columns or summary positions.
Excel PivotTables are very useful and powerful feature of MS Excel. They can be used to summarize,
analyze, explore and present our data. Source data could be:
An Excel worksheet database/list or any range that has labeled columns.
A collection of ranges to be consolidated. The ranges must contain both labeled rows and
columns.
A database file created in an external application.
The data in a PivotTable cannot be changed as it is a summarized view of other data. Any change if
needed has to be done in source data.
We often use a PivotTable report when we want to analyze related totals, especially when we have
a long list of figures to sum and we want to compare several facts about each figure.
Here are some example uses of PivotTables:
Summarizing data like finding the average sales for each region for each product from a
product sales data table.
Listing unique values in any column of a table.
6.9 SUMMARY
Through the use of PivotTables we can examine the data for similarities, differences,highs and lows.
Compare one region to another, view key results for several years of data or zero in on oneproduct’s
sales results. By making a few quick changes to the pivot table, we can see our data from a completely
different angle.
We have in this chapter learnt to Create and Modify PivotTables. Sorting and filtering Pivot Tables
helps us in seeing the small picture out of the broader view of the data. The data can be grouped
based on values, Dates, headings etc.
To get a visual picture of data we have learnt to use PivotChart Reports.
REFERENCES
[1] Greg Harvey, ‘Excel 2010 For Dummies’, Wiley Publishing, Inc., Indianapolis, Indiana,2010.
[2] Debra Dalgleish,’Beginning Pivot Tablesin Excel 2007’,Apress,2011.
[3] www.chandoo.org
[4] www.contextures.com
LEARNING OBJECTIVES
Introduction
Importing data from a text file
Exporting data to a text file
Saving all or part of a workbook to a static web page
Create a Web query
7.1 INTRODUCTION
As Bank auditors, we find that many Banking applications generate text files in txt or csv format,
these files we would need for our data analysis, but Text files do not provide us with data analysis
capabilities. Whereas if the same could be converted to Excel File, we could get lot of data analysis
capabilities.
Excel provides us with these capabilities to import and export data
Tab Delimited
SUMMARY
In this chapter we have learnt It is easy to take content/data from another non-Office application
and bring it into an Excel, we learned how to convert Text file in Tab delimited or csv or Fixed
width files to Excel file. We have also learnt to import external data as refreshable/ changing
dynamic data
Finally, we learned to use to create a static web page and web query from Excel data
REFERENCES
[1] Laurie Ulrich Fuller et al, ‘Picture Yourself Learning Microsoft Excel 2010’ Cengage Learning
2011
[2] h t t p : / / o f f i c e . m i c r o s o f t . c o m / e n - u s / e x c e l - h e l p / r e d i r / A M 0 1 0 3 3 8 5 4 2 . a s p x ?
CTT=5&origin=HA010338210
LEARNING OBJECTIVES
To gain understanding of Working with big Database
Dynamic update of additional source data into PivotTable
To understand Grouping feature in PivotTable
Managing File sizes while working with multiple PivotTable
To understand Slicers and Timelines in PivotTable
To analysis data in PivotTable from different angle
Perform calculations in PivotTable
Sort Data in Pivot
Produce Top/Bottom Reports
To understand How to handle millions of rows in PivotTable
8.1 INTRODUCTION
We understood the Table and Database concept in earlier chapters. Now to get maximum output
from our database, we need to analyze and manipulate data to turn it into a great report. To do
this, the most powerful and user friendly feature in excel is PivotTable. Microsoft has introduced
lots of new features in 2010 version of PivotTable which are very helpful to create our reports in
different angles and even to create very beautiful dynamic dashboards and charts.
We can utilize the potential of PivotTable in these ways.
Making report with any permutations and combinations
Group data in Years, Quarters, Months and even in Weeks
New feature of Slicers to make filtering very interactive
Connecting slicer to multiple PivotTables and make dynamic dashboard
Performing calculations or formulas in PivotTable itself
Format and sorting pivot reports differently
Tip: Excel is very intelligent. If we follow some rules to keep our data in Excel understandable format,
then it will make our handling and reporting of data easy.
Use only a single row of headings above the data. If we need to have a two-row heading, set it
up as a single cell with two lines in the row.
Fig 8.3.5
Click Ok.
Now your PivotTable will automatically pick new data added into your source sheet. To automatically
update PivotTable once new data added in source sheet, just refresh PivotTable.
Note: If we select a base field that isn’t in the row or column area, all the results will show an #N/A
error. Also, if there’s an error in any month’s results, it will carry down through the remaining months.
The final result with running totals will be like this screen shot as show in Fig 8.7.3
Fig 8.7.4
In the next PivotTable, Month has been moved to the Row area, and the Value field of sale Amount
still shows a running total, based on Month.
This layout takes more room, and it is more difficult to compare the customers and months.
Fig 8.7.5
Fig 8.7.6
Fig 8.8.7 The Bonus field appears in the Values area of the PivotTable
Fig 8.8.10
Temporarily Remove a Calculated Field
To temporarily remove a calculated field from a PivotTable, follow these steps:
In the PivotTable, right-click a cell in the calculated field. In this example, we’ll right-click the
Bonus field.
In the popup menu, click the “Remove” command that shows the name of the calculated field
as shown in Fig 8.8.11
Fig 8.10.9
Ten percent of the grand total is 4,393, and we can use a Top 10 filter to find the top or bottom cities
combine to total at least that amount.
To see only the top/Bottom selling that contributes to 10% of the total sales amount, follow these steps:
In the PivotTable, click the drop down arrow in the City field heading.
In the pop-up menu, click Value Filters, then click Top 10.
In the Top 10 Filter dialog box, change the settings to Bottom 10 Percent Sales.
Fig 8.10.10
The results change, to show only the bottom 4 cities dates, because their combined sales are lesser
than 10% of the original grand total amount.
Fig 8.10.11
Fig 8.11.2
The ribbon now has a PowerPivot tab as shown in Fig 8.11.3.
Fig 8.11.7
8.13 REFERENCES
1. www.support.office.com
2. www.contexures.com
3. www.chandoo.org
4. www.excel.tips.net
9.1 INTRODUCTION
We understood the Multi-Dimensional Analysis of Data in earlier chapter, now let’s learn how to
analyze, manipulate and turn database into an interactive and dynamic dashboard.
A dashboard is an efficient and concise way to communicate the crucial information and performance
overview generated with various tools and databases, with senior level executives and top
management, on a single screen.
Stephen Few author of Information Dashboard Design, explains –
“A dashboard is a visual display of the most important information needed to achieve one or more objectives;
consolidated and arranged on a single screen so the information can be monitored at a glance.”
Just as the automobile’s dashboard provides all the critical information needed to operate the
vehicle at a glance, a BI dashboard serves a similar purpose whether you’re using it to make strategic
decisions for a huge corporation, run the daily operations of a team, or perform tasks that involve
no one but yourself. The means is a single-screen display; the purpose is to efficiently keep in touch
with the information needed to do something.
Fig 9.11.2 1st Chart is Product wise Sale & 2nd Chart Salesperson wise Sale
In 3rd Chart, we are taking ageing of Revenue with a grouping of 30 to know in each pricing band
how many items were sold. For this once we bring Revenue filed in Row Area, Right click any cell
and Select Group and in Group by give 30 as shown in Fig 9.11.3
9.15 SUMMARY
As we have learnt in this chapter, the purpose of a dashboard is to effectively display the necessary
and sufficient data with added visual impact as required by the potential audience. The layout of
the dashboard and its components vary across the different viewers based on their preferences.
Excel 2010 is a great tool for creating interactive and dynamic dashboard and then analyzing multi-
dimensional data in different ways with click of button. In this chapter, we learned some great
features like type of dashboards, benefits, getting your data ready, different features of excel which
help to make our dashboard work like grouping, table, Charts, Slicers, etc. Converting data in to
Table made our Pivot table dynamically linked to source data while appending. Slicers and timelines
(Excel 2013 feature) are great features to make our dashboard dynamic.
9.16 REFERENCES
www.support.office.com
www.tutorialspoint.com
www.chandoo.org
LEARNING OBJECTIVES
Starting out with PowerPoint 2010.
Editing and Formatting Video.
Designer Quality SmartArt Graphics.
Professionally designed templates and Themes.
Managing and showing presentation.
Style galleries that help us create great looking presentations.
Linking a File or Slide to same or different presentation.
Working with animation effects to single or multiple objects.
Sharing and editing the presentation by multiple authors.
Broadcasting the slide show using web.
Delivering and distribution of slide show.
1.1 INTRODUCTION TO MS-POWERPOINT
MSPowerPoint 2010 can be used to prepare professional-looking presentations made up of a series
of slides that can contain charts, diagrams, pictures, SmartArt diagrams, bulleted lists, eye-catching
text, multimedia, video, and sound clips, and more. PowerPoint 2010 gives the ability to add and edit
video in presentation, edit pictures on slides, enhance animations, choose from among improved
transitions, add great narration, compare and merge presentations, and much more. The collaborative
features in PowerPoint 2010 enable us to easily work on presentations with a team, communicate
in real time with co-workers, and access files anywhere—using browser window or smartphone.
The PowerPoint 2010 window gives us a simple, intuitive interface that provides all the tools need
for building effective, professional presentations. The PowerPoint Ribbon offers tabs that include
tools specific to each of nine different tasks: File, Home, Insert, Design,Transitions, Animations,
Slide Show, Review, and View. The PowerPoint work window displays slide view by default, which
shows current slide in the largest area of the window, along with a segment for notes and a panel
that will show all the slides we create in the presentation.
PowerPoint 2010 presentations have the special extension .pptx added to the end of their filenames.
For example, ITTraining.pptx is valid PowerPoint filename. Versions of PowerPoint 2010 prior to
2007 saved presentations with the extension.ppt instead of .pptx. The x at the end of the new file
extension denotes that the new file format is based on an open XML standard data format that makes
it easier to exchange files among different programs.
There are significant new features in MS PowerPoint 2010 that help a user to make his presentation
more effective.One of the important features of MS PowerPoint 2010 is to broadcast the slide show
1.5.2 Borders
We can add a simple border by drawing a rectangular and make a few settings such as reset the line
style, thickness and color of the line.
The steps to use borders are shown in Fig 1.5.2
1. On the Insert tab, in the Illustrations group, click the arrow under Shapes.
2. Under Recently Used Shapes, click a rectangle shape.
Page
Handout
Slide Pane
Gridlines or Guidelines
Notes Pane Fig. 1.17.2: Normal View
Slide Sorter view : The Slide Sorter view provides a thumbnail view of the slides in a presentation.
This view helps to sort and organize the sequence of the slides in a presentation, and also prepare
the presentation for printing. We can add sections in Slide Sorter view as well, and sort slides into
different categories or sections. The Fig. 1.17.3 shows slide shorter view.
SOURCES :
www.office.microsoft.com