100% found this document useful (1 vote)
255 views

Cs101 Introduction To Computing Short Notesmidterm and Final Term by TheITeducation - Com D

Uploaded by

KHADIJA MAHMOOD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
255 views

Cs101 Introduction To Computing Short Notesmidterm and Final Term by TheITeducation - Com D

Uploaded by

KHADIJA MAHMOOD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 53
Disclaimer: These short notes are prepared from Original VU Handouts of CS101 Subject as Fair Use Policy. If the VU has any objection may email us to remove these from our website. Introduction to Computing - CS101 LIntroduction to Computer Science ‘Computer science isthe study of computers and computing as wellas ther applications. Computer Sciences the discipline tat seeks to build a scenfc Hardware: computer haawareis the collection of physical pars of comp ws ncludes the computer case mont eon nd mois hard ate, AS) aa a Software: NS computer stare, abo clefts tase oe fue Ohi ts cosumentatons that tals 8 crannies Programing: . programming the pracese of dex ng 2 executable computer program. Networks: A computer networ Regt of rs connected forthe purpose of sharing resources. The most ‘common resource aged tay 5 connection to te Internet, Other shared resources can include a printer or file IntePhet itself canbe considered 8 computer network Graphics: rer gaghits the discipline of generating images with the ald of computers. Dighal photoghagh, lt, video games, cell ne and computer display, and many specisl2ed applications. Robots: ‘Arobot isa machine—especially one programmable by a computer capable of carrying outa complex sefos of actions automaticaly Database: ‘Any colection of daa, or information, thats specially organized for rapdsearch and retrieval bya ‘computer A database management system (DBMS) extracts information from the database in esponse to.ueries. Security: Sect ate tote contr that are putin place to prov cofiseniity rtepy, and malty for AgorthmiSlations: & An agi st ot tract designed o pro souk 9S Information Processing: Information processing refers tote manipulation of cgzed nrg Mb goats and other digital electronic equipment kaon nee) 1 Computer Science App! sat ce ee mains sucha > Telecom > cans > Wosptals Setar Dereon > Senvce nus av @ > Fe ning ‘Search Engine Usage Techniques ow can you effectively search over the internet using popular search engine. Data Storage Data storage refers to the use of recording media to retain data using remputers or thar devices Data Manipulation: Data manipulation isthe changing of data to make it easier to read or be more organized. For ‘example, how basc arithmetic operations (-,*,) are performed in computer and how some advance ‘operators are performed. Operating Syster ~ ‘An operating system sa sofware which patos ll ho base 5k te management. memory management, process management, handling input and ouput, and a) Wangan We wil aso study how diferent computers communicate over te internet. Algorithms: ‘We define algorithm as: “St of Stes in a sequence to Searching within the range > Boolean Operators > Search with a Speci site Searching Related Websites > Searching a cached version 3.Search Operators Stocks Operator ‘Map Operator ‘Movie Operator ‘Compare Food Image Search > me Advanced Search Operators > intitle > Alinttle > inurl and aint > proximity Search \ 1h oul Ad Gos 0 enor suchevees str tapi 2) Security Agencies: agencies might se your queries and can enquire you or can reachat your NS te term searching again and agan. 3) Sometimes, whan ke free music, we canbe trapped to provide a virus which might be harmful for our Avoi ag tneayoNdngs can avoid un-necessary ad rom the search engines, & volemail Medical issues and drugs & Yourname Your location © Your favorite things Roots of Computing Abacus: ‘The machine is quite simple, consisting of beads strung on rods that are inturn mounted ina rectangular frame. aa vamgtoon CO few inventors bogan to experi of gears. Among these were Baise Pascal (1623-1662) of France, Gotiied WiNglo Mg boQ{3646-1716) of Germany, and Charles Babbage (1792 2871) of Englana. these macines 59 trough gear postioring, wth ata being entered mechanically by establishing ions Punch Cards Herman Hollerth (1889-1923), irho applied the concent of representinginformation as holes in paper catas 10 speed u 0M PrOceSS inte AHMU U.S. census. Mec! ronks-diven machines Rapid Advancement i. Transistor i, Integrated circuits 4. Sizereduetion |v. Processing Power doubling in 2 years Desktop computer VL BM taunched PCin 1981 vii, ‘Sat Phones BITS Basics Information is coded as pattern of or 1 Short form of Binary Digits 4 One bitcan contain only one value 0 ort units Tablet shows the bits and their equivalent <> Tait a bits are stored and manipulated inside a computer, itis convenient to bt represents the value false and the bit 1 represents the vale true. Operations that, LAND Boolean Operation Ie produces the output as 1 when both ofthe inputs are 1 2. OR Boolean Operation It produces output of 1 when any ofthe inputs are 1, otherwise 0 3.XOR Boolean Operation OR (Exclusive os another Boolean operation which produces the output of when both inputs are ferent yrodacesO when Luh nuts ave sve 4. Not Operation Not operation takes one input, produces 1 when inputs O and produces Hexadecimal Notation ‘Merely transcribing the patter 101101010011 is tedious and error prone To simply. representation of such bt patterns, therefore, we usualy use a shorthancnotatog imal notation. storing a Bit CS 1. Main Memory OS Forte purpose of orn tsa compute contains ae sh 5 op ‘each capable of storing a single bt. Ths bit reservair chne’s main memory. ‘memory aaaress To identity individual cells a Computer's mat heels assigned a unique “name,” called its adress, access memory (RAM). =k D> Dynamic ram ~storBbgits apy electric Charge, refreshes many times asecond 4.SDRAM voi ues to decrease the time needed to retrieve thecontents from ts memory Optical'system Another cass of mas storage system apples optical technology. An example the compact est (CO) Digital Versatile Disks [DVDs) and Blu-ray Disks (80s) are also popular exanples of optical systems 41. Compact Dik: 12 centimeter in dlameter, Consists of elective wateral 2. DVD (Digital Versatile Disks) cs capacity is 600 to 700 MB; however, DVD has space In GBs 3s 13. BDs (Blue ay Disks) 80s use a blue-violet spectrum of igh instead of rea), which sale to {cus ts laser beam with very fine precision. Ds provide five-time capacty than DVDS. Representing Images Collection of dots ~ Pixel short fr Picture Element. 2.Pixel to Bitmap Inblack and white images, each pixels represented as one it~ eg. for blackandforWpite 3. Handling shades 8 bits are used instead of 1 bt to store the shades of graymess oe oo ima Representing Soun — ePeesentations in Excess Notation ber ofits to represent eath value “+ we down all bi patterns ofthe same length ‘+ Fist bit pattern having 1 in the most significant bits used to represent Zero Floating Point Notation tn contrast tothe storage of integers, the storage ofa value with a fractenal pat requles that we store not onl the oattern of Os and 1s reoeseating its binary reoresentaton but aso the poston ofthe rade point. Data Compression: Geneve Techniques Data compression schemes flint two categories, Some are lossless, others are lossy. Lossless schemes are those that donot lose Information in ze compression process. David Huffman is credited with discovering an algorithm thats commonly used for developing ‘requency-dependent codes, and itis commen practice to refer to codes ceveloped in this manner as Huffmen codes. Data Compression: Compressing Images Data Compression: compressing Audio and videos . ‘The mest commonly used standard for encoding and comore yB video were developed by the Motion Peture Experts Group (MPEG) under the leader jnYur, these standards ‘themselves ae called MPEG. ‘The best-known system for compressing audi TBrygs evelozed within the MPEG standards Data Manipulation: CPU Basi © ACPU consists of three parts aetna seroma cp oh Qtgpaerston enn ch stn nse 1a storage cel (similar to main memory cls) called registers, that are used for of information within the CPU. Some ofthe registers within the restr unit are neral-purpse relsters whereas others are speclal-purpasrelsters considered ee. = om 8 ‘Figure 41: CPU and main memory connected via bus Data Manipulati stored Program ‘The idea of storing 2 computers program ints mala memory call Data Manipulation:Logic Bitwise ‘operation that combine two strings of bits to produ ‘operation tondvdual cok For example, the result of ANDing the pattern 1002001 ests Data Manipulation: Rotation and ‘Te operations inthe clas of rotator Bit Bherations provide a mears for moving bts within a register and are often used in sob robiems, ‘One technique so placgthe ‘he rght end inthe hole at the lft end. The results 3 trust, 30 Data rasan Memory Access and Handshaking cn Since a control toa cormputer's bus, it can cary on its own communication with main mem losecondsin which the CPU isnot using the bus. This ability ofa controller to Is known as direct memory 2¢cess (DMA), ipdtation: Communication media and communication rates ‘Communication between computing devices is handled over two types ofpaths: > Parallel communication > Serial communication Operating Systems: History “Todays overain systems are lave, comotex software cacaees hat ave eown fr humble beginnings. Te computers ofthe 1540 and 1950s wre not very elo efficent, Machines octupled entre rome, Program execution required infant preparatioof equipment ates of mounting magnede topes, lacing puncnes cards nerd readers, setting suthes, and 50 0. In bate processing systems, the jobs resiing in mass storage wat for execution ina job queue A ‘queue isa storage organization in which objets (inthis ase obs) are orcered in ist, fyskgut {abbreviated FIFO and pronounced “Ffoe") fashion. To accommodate these neds, new operating systems were developed tha allows caMbeing ‘executed to cary on a daiogue wth the user through remote terminals fete Interactive processing. Operating Systems: Basic Concepts (1) Coordination with User Realtime Processing . 9 Interactive system and Real-time Processing Tine Sharing Operating Systems: Basic Concept#( With the development of mutiuser, time sharRgopepatng systems, a tysical computer instalation was contd os rental coo oy foros wots rvuluesking apatites by essigning@Mey Meaty Lo ire process 6 wel Wy shang the time of ach singe processor. 48 systems must wrestle withsuch problems as load balancing dyramicalyaiocatajpBksPothe vrious processors so tata processors are sed cfcety 35 wel a ag sk nto 2 numberof subtaskscempatble withthe number of processors val ‘Operating “ep Classification machine's software into two broad categories: application software and cation software consist ofthe programs for performing tasks particular tothe ‘within the Mss of sytem softwere ore two categories: One isthe operating aster self andthe ther consist of software units collectively known as utility software. Operating Systems: Components (1) ‘The portion ofan operating system that handles this communication i fen called the wser interface. keyooard and monitor screen. More modern systems perform this task bymeans ofa graphical user Interface (GUt—pronounced “GOO-ee" in which objects to be manipulated, sucha es and rogram, are represented picorally onthe display a5 cons. ‘Operating systems: Components (It) In contrast to an operating system's user interface, the internal pat of ar operating system is called he kernel, An operating system's kernel contains those software components that perform the very basic functions required bythe computer installation, ean of cirsctaris within aeectriae ie callad 3 aleactary path Bathe 318 often exprecogsy ting ‘the directories along the path separate by slashes. Operating Systems: Process of Booting \We have seen that an operating system provides the software infrastructurfe her sofware units, but we have not considered how the operating system gets started. Tig acapmplished through «8 procedure known as bootstrapping (ofien shortened to booting igo ‘by @ computer ‘each time iis tured on 8 ‘To esoWe this dilemma, asml portion ofa creat nae NS 1 the CPU expects to tnd ts inl program is constructed from special nonvolatile, memory is known a5 readonly ‘memory (ROM because its contents can be read but nde Operating Systems: Process and tration ‘+ Coordinating Machine's activites 4+ Program vs Process ‘The activity of executing pr contro ofthe operating system is known asa process. na Associated witha i status ofthe activity called the process state. Operating Systems: Process and ils Administration To keep track of allthe processes, the scheduler maintains 2 block af infomation in main memory ealed the process table. -Aprocess is ready if isina state in which its progress can continue; its waiting fits progress is ‘the pressing ofa key at the keyboard, or the arrival ofa message from another process. The dispatcher Is the component of the kernel that oversees the execution ofthe schedved processes. Each time the dispatcher awards atime slice toa process, iintiates a timer cul that wl ingicate the ‘end ofthe sce by generating signa called an interrupt. ‘Operating Systems: semaphores -Aproperty implemented flag, 2s just described is called a semaphore, in eference tothe railroad ‘signals used to control acces to sections of track. fac, semaphores areused in software systems in much the same way as they aren caiway systems. ‘Operating Systems: Deadlock ‘Another problem that can aise during resource allocation i deal, the cont more processes are blocked from progressing because each swatting fr 3 resou another. cstecto ‘The operating system would moke the non sharable rezource appear sharable ‘more than one printer. This technique of holding data for output at, called spooling. Operating Systems: Security Attacks no “The operating estan can thon ute thi information duMlgaeMgain procedure (39 ‘wansactions a which the usr establishes intl cof? Mesgomputer’s operating system) to conteal access to the sytem, Accounts are established asthe superuser or the administrator. ing the ilusion of convenient time is Operating Systems: Seci from inside ‘To protect against such actions, cP two privege levels; we ypc ‘When in priveged ale to execute all the instructions ints machine language, How: ever, when in nar Ibrogramming systems are éesigned to operate in one of, ed mode,” the other we willl “nan-pivileged mode.” fe Ist of acceptable instructions sited. The instructions that are are called privileged instructions jorking’and the Internet: Network Cision A computer networks ften classified as being either a personal area net- work PANY, 2 local area network (LAN), a metropolitan area network (MANI, 0: a wide area network (WAN), 'APAN is normally used for short-range communications—typcally ess than afew meters—such as between a wireless headset ad a smartphone or between a wireless mouse and is PC. Networking and the Internet: vrotocois Fora network to tunctionretaby, 1s mportant to estabush rules by when actNtes are ‘conducted, Such rues ae calle protocols, Networking and the internet: Methods of Process Communication Inter process communication (IC) i used for exchanging ata. The Processes may be running en ‘single or multiple computers connected by a network. Networking and the internet: Distributed Systems Distributod networking, used in distributed computing, is the network systom over which ‘computer programming, software, and its data are spread out across more than one computer. bt communicate complex messages through their nodes (computes), and are dependent upon each oer XN Networking and the Internet: Internet Architecture [As we have already mentioned, the Internets a cllcton of connected Rs era, these "% networks are constructed and maintained by organizations called Internet See Providers SPs) Networking and the internet: internet Addressing . Internet needs an internetwideacdressing system that asi jentiying adress to each computer in the ss: ter. nthe aes dresses Networking and the Internet: Internet. Apy ions. ‘Aside variety of: instant messaging (Wb ‘online chatting, Twiter-based “twaet", andthe Facebook "wall are but few N net: Internet Applications: Email, ° applications + Messaging = wrowser based enating 4 Twitter based tweets 4 Facebook wall One of the oldest is Electronic mail Email Protocol Sipe Mail Transfer Protocol (SMTP) Other Protocols, | SMTP for tent messages & MMe Post office Protocol version 3 (POPS) Networking and the Internet: Internet Multim: Streaming ‘Streaming isan enabling technology or provicing multimedia date delivery between clients in Various multimedia applications onthe Internet. Networking and the internet: World Wide Web ~ ‘The world wide web. or web for short, are the pages you see when youre ata device and you're online. Bu the Internet isthe network of connected computers thatthe web works on, ‘as well as what emails and fles travel across. — Networ HTML aA {A traditional hypertext document is similar to text ile beeause its ext isthe HTML-encoded ‘version (calle the souree version) ofan extremely imple webpage is show in Figure 68a. Note thatthe tags are delineate by the symbols = and >. The HTML souree dacument consists of (80 ‘ctions-—a head (surrounded by the “head> and tags) anda ody surrounded by the and tags). The dstnetion between the head and boy of a web-page is i and the Interne reat of the document, which inthe case of seebpage is the mates to be presented on the Computer sereen when the page fs displayed eS » AW Fiore 6: sil etn and the Internet: Client sega aoe ema that he acon take plac on fe er (he cents) computer, Sar ‘Sido means tat he acon lakes place ona webserver as Networking and the Interne roach to Internet Software (I) Theteur ayer aretnomas pre the rnp ye hentia, and tein a a (o7 Figure 74: The Interne software layers Networking and the Internet: TCP /IP Protocol Suite ‘The TCPAP protocol suit isa collection of protocol standards used by the Intemet to implement (he fouirievel coumunicatin Ievarly- Actually, the Teauannoios Control Protocol (TCP) and the Internet Protocol (IP) are the nares of only two ofthe protocols in this vast collection — act thatthe entre collection is refered to as the TCPIP protocol site is rather misleading More precisely. TCP defines aversion of the transport layer. TCP(trarsmision contol protocol) Networking and the Internet: Security (Forms of Attacks) Malware. Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. . Phishing. Man-in-ine-middle attack. Deniat-of-service attack. SQL injection Zero-day exploit a Networking and the Internet: Protection and Cures _ Rename routers and networks. Use strong passwords. Keep everything updated. Tum on encryption. Use multiple firewalls 5. Turn off the WPS (WIFI protected setup) setting Use a VPN (virtual private network). _ Networking and the Internet: Eneryption Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level Algorithm: Formal Definition of Algorithm Formal Definition An algorithm isan ordered set of unambiguous, executable steps thar defines a terminating process. Algorithm: Representation (Primitives) ‘The representation ofan algorithm regres some form of language: Inthe ease of umn, this might bea traditional natural language (English, Spanish, Russian, Japanese) or perhaps the language of pictures, as demonstrated ‘Computer science approaches these problems by establishing wellsefined set of building blocks fom which algorithm representations can be constructed. Such a building block is called primitive. ‘A ollection of primitives along with acolleton of rules stating how the primitives ean be ‘combined to represent more complex idess constitutes a programming language, Algorithm: Algorithm Discovery Strategies problem-solving approach isto look fora related problem that is ether easier to solve or has Iheon salva hens and then ty to apply it slutin tothe event problem ‘This thniqe is of particular value i the context of program development Iterative Structures (Loop Control) ‘of an instruetion or sequence of instructions is an mportant algorithmic ors that Shippinecharee DDB ogo, Totalcost Hor Using mnemonics. {Here we have used LD, ADDI, ST, and HLT to representload, 244, store, and hat. Moreover, we have used the descriptive names Price, ShippingCharge, and TotalCost to refer tothe ‘memory cells at locations 6c, 60, and 6, respecivaly. Such descriptive names are often called program eval or tenors Programming Languages: Early Generations-II ‘Ones euch 2 mnemonic yetom war oetsblihed, programe called atromblere were developed to convert mnemonic expressions into machine language instructions. "Amnemonie system for representing programs collectively called an assembly language. Although ‘assembly languages have many advantages aver ter machine language counterparts, hey stil fall short of providing the ultimate programming environment [Another disadvantage ofan assembly language i that a programmer, although not requgef egde instructions in numeric form, isl forced to thinkin terms ofthe small incremental . a Langage) ich was devtoped by he US Naw er bes Transatorince te colecton of highevel primitives Sade 6,3 program, alee 3 coment: sours eo sort segues Ned quested by sre hive inthe Thus these nln poms comes a ‘thirdgeneration arftyaze Program guages: Machine Independence wt thr generation anguages, the gal of machine independence was largely fg. Stig ovatemens na thic-generstonnguge dé nt ele tothe atte of any partcagache, they could be complied easy for one machine sf ante, Programming Languages: Imperative Paradigms ‘The generation approach to classifying programming languages is based ena ner scale, the ‘development of programming languages has not progressed in this manner but has developed along ifferent paths as alternative approaches to the programming process (eed programming paradigms) ‘The imperative paradigm, also known asthe procedural paradigm, represents the traditional approach ‘othe programming proces. the paradigm on which Python and our pseudocode are based as well asthe machine language. As the name suggests, the imperative paradigm defines the programming process to be the development ofa sequence of commands that, when falowed, manipulate data to produce the desired resut. Thus, the imperative paradigm tellus to approach the programming process by finding an algorithm to soWve te problem at hand and then expressing that algorithm as sequence of commands Programming Languages: Declarative Paradigms Incots tothe inperatve pari the erative para, which ss desert the protem tobe saved ter than on agri to be teowed. eS Saratve programming system applies a pre-established generat purpose problem 0 ro sole problems presented tot ‘The esulthas been increased attention tothe dedarative paradigm nce of logle Programming Languages: Functi aia fadigm vate rogsonning yal the uetoal py is odin 0 rogram vewed san entity that accepts inputs and procces ate Nene refer to sch eres a uf functions, which the reason this approach i tional paras, ct Oriented Paradigm Another programming paracigm (ff yninent one in today’s software development is the with the programming process called object-oriented programming (00°). slfowin ‘objects, each of whghis pA forming the actions that are immediately elated to itself as well as requesting action othahgbjets Each of theee encompass 2 collection of function (called methods in the objectoviented vvernaclg) ipypo ofthe objets properties i called aclass.Oncea class has been congfderBit 2 ied anytime an object with those characteristics needed. Programming Languages: Variable and Data Types High eve programming languages allo locations in maln memory to bereferenced by descriptive names rather than by numeric addrezees. Such a ame is known a¢ avarice, In ecognition ofthe fact ‘that by changing the value store at the location, the value assoriated wity the rame changes asthe program executes. Programming Languages: Data Structure In adeltion to data type, variable na program are often associated with data ctructure, which ic the conceptual shape or arrangement of data ‘One common data structure i the array, which a block of elements of the same type such asa one dimensional st, 2 two-dimensional table with rows and columns, or tables with higher dimensions. Programming Languages: Assignment “SS tee ecco etree vocaea pean Programming Languages: Control . RN < programming constructs rogram. OF athe At {conditon) statementa te Programminy eS Ther another me 1 Pere known as loop. The loop cone! structure erates setof instructions besed on condo. Proj Languages: Programming Concurrent such simul processing. Je0us execution of multiple activations is clled parallel processing or concurrent True parallel processing requies multiple CPU cores, one to execute each activation. When only one ‘CeUs avaliable, te illusion of paral! processing i obtained by allowingihe activations to share the time ofthe single processor ina manner similar to that implemented by muliprogramming systems. Programming Languages: Arithmetic Operators (language has the following arithmetic operators: ++ Adattion Subtraction “tn (ose Programming Languages: Relational xe Examples . . language has the fllowing relational operators eat =a = [iss than or oat io 5 Gresierthan STG han oF ua [Ee [Eat Nat Equal | GHERELIORSLIOPEIA are used to compare values of two variables Hein example we used the ‘operator inf statement Programmi mg Langiiages: Logical Operators Examples Type stor — [Ua According to mums of the Logical Opratrs, the colton sated losing situation ae expeted ‘caput given Rea) apa Ty i connor aS ano | stoner become Ton Outpt sO ory whsn conditions ov Bonde OR ___| cf Operator acme False NOT —[tigivesivated Omar Software Engineering: Requirement Phase Requirements Analysis: The software if cele begins with sis the goal of whichis tospecty what services the proposed system wil ae ondtions tin constraint, secuty, ands on) on those services, and to deine snes 5 wl interat with the system, Software Engineering: wraias ‘whereas requirements analysis provides a involves ceating a plan forthe congructjon josed system, Techniques fr developing these 1 over many years andincude standarczed notational systems and numerous 274 tiagramming methodolsies implementation Phase Software Et etring Implementation mags the gual writing of programs, creation of datafles, and development of deabaces. i entation stage that we see the ditincion between the tasks of 9 soRware analyst{sometiitgyAfered to a system analyst) anda programmer. eering: Testing Phase Programs hy not the only artifacts that are tested during the software development process Indeed, ‘the result ofeach intermediate step inthe entre development process should be “tested for accuracy. Testing is now recognized as only one segment in the overall strugeefor quality assurance, whch san ‘objective that permeates the entice sofware life cycle requirements analysis and confirmation,” “design and validation,” and “implementation and testing” Software Engineering: Software Engineering Methodologies (I) Early aporoaches to software engineering insisted on performing requirements analysis, design, Implementation, and testing ina stritly sequential manner. The belt was tattoo much was at rsk ‘uring the development of large software sytem to allow for variations “Another model that represent the shift away from strict adherence tothe waterfall models Iterative model, which i similar to, and in fact sometioes equated with, tre increment although the two are distinc. ‘Whereas the incremental model caries the nation a extending each preliminary int alge version, the trative model encompasses the concept of refi Software Engineering: Software Engi Y Methodologies (II) i SS Incremental and iterative mode's sometimes make us ware development toware ‘ratotvine in which incomalete versions ofthe oronostvst8t, called gratotvaes. are built and product evaluated ‘esa carson nearest ani tnthsat/nobyits i known a open Software Enginee! Snes 2 goal when desiring be to maximise independ song modules, ‘ter words to ming eae teen modes known as intrmodule coupling). one is control cous occur when a module passes control of execution to another, a ina function cal Another form of coupling i data coupling rich refers othe sharing of data between rmodyes Sof Engineering: Cohesion ‘The term cohesion refers to this internal binding o, nother words the degree of relatedness ofa module's internal pants, ‘Thus, in alton o seeking low intermodule coupling, software designers strive for high ntramodule ‘cohesion. A weak form of ehesion is known a lagcal cohesion, module ae focused on the performance ofa single att. Software Engineering: Information Hiding (One ofthe comerstones of good modular deign ie captured in the concopt of information hing, which refers tothe restriction of information toa specific portion ofa software system. Here the term information shoul be interpreted in broad sense including any knowledge about the structure and contents ofa program unit, As such, it includes data the typeof data structures used, encoding systems Software Engineering: Components ‘The modular approach to software development promises hope in his regard. In part oriented programming paradigm is proving especialy useful because objets form, contained unts that have ceri define interfaces with thee envionment, One correctly dass. ‘Thus, an abject s actualy a special case ofthe more general concept af acomPagght which, by Canada's Ant Spam Legislation (ASL) antispam iw in Europe 2 Spam he of 2003 n Australia ‘Major requirements > Askfor permission before ading emals x Seca ae ~O behonest CS Impact: Children Protecti; lectronic Theft ‘There are ots of reasons why people start usingBarerfl Botros. Pears o stop late night phone checking. Perhaps to help stop arguments who's tigaPut the iPad down and get on with homework Maybe to reduce the total amount time be on screens in general “The flowing sks are hun EK @ Xe nfl Advice Contact Risks ¥ Oniine Harassment Cyberbullying egal nteractions Problematic content sharing Online Marketing ¥ tnapproprate or unsuitable products Y egal and age-restricted products Word Processing: MS Word Start menu launch ms word. Click mc word Ss Ms word opn € ; Mini Too “The Mii Toor appeurs automatically whenever you slet ext and conta common text {mating oman a shown inthe Fite 138. To Use the Min Tolbr: Set the text You ‘wut to frat ond click he Jnr command on the Min Toolbar. Click anyobere cus te Mit Tooter cae i Figure 138: Mind Toolbar \\ , wd” Word Proce Word (Home Ribbon) ome noon <@ ferent portant groups suchas: Lpo0ara, rent, waragrapn, sivis an ec Bre MS Word (Clipboard Group) ‘The Home risbon is made up of the most used commancs in Word. The fist group an the Home ribbon Is the Clpboard. Copy, Cu, Paste and Format Past are the commands wihin the Clipboard group as shown inthe Figure 142, The Cipboard commands are on the Home rien of Word and all other Office 2007 applications that use the ribbon. The dalog expander aow of the Cipboard group will open up the Clipboard pane, showing all items that can be pasted 191, Word Processing: MS Word (Font Group) “Te recon group of commands o the Home ribbon i the Fon group. Theft group coma re format eating ltt lads fot tpefces. i size, fot els ho, abe endrting,e:) ‘tos ae wae Remeber tl you ca povew ho the font wl by bghlghng etek od hovering ove the new fot typfoe a soem nthe igus 146. The expand arn the Fon group will ‘pen ups Fort log window, Word Processin; ford (Paragraph Group-!) ‘The third group one HOM DBF the Paragraph group. The paragrarh group allows you to change Paragraph Alignment We, igMgcentered o usted), aust Line Spacing within a paragraph, and aajus spacing er Baragrapn. Word 6 Paragraph Group You can create your ow bullet brary. Perform the it a shown Word Processing: MS Word (Style Group) Astye ts 3 set of formating characterises, such as font name, ste, color paragraph allgnment and Spacing. Some styles even include borders and shading. Fr example, instead of taking three separate steps to frat your heading a8 16-pont, bold, Cambria, you an achieve the same result none step by _anpiving the builtin Heading 1 style 196, Word Processing: MS Word (Insert Punetonaites) Inset Tab canbe tne if you want to alo graphics oink your document with snether document. The inal part the incr tab in word ribbon has boon shown inthe Figure 1S MELON RBC eODma 8 Gh 8 Prado ee Os Sapa Ot Smet Ap Oe et fate fae Figure 158: Inert ab Inthe insert ab, the following groups ae available which willbe covered inthe net mods: Pages Group Tables Group Uhstrations Group Media Links Comments leader & Footer Tat Symbols & KASS ERK ay > Word Processing: MS Word (Editing Group) Under the Find command, there isthe GoTo command. The Go To command can be used 10 Immediately go toa page, a section or any marked location within your decument. The Select command can be used fo diferent purpose. ‘+ To seectall ofthe text in the document, click Select All ‘+ Toselct shapes that are hidden stacked, or behind text, click Select Objects, and then draw box over the shapes. © To slect text with similar formatting, click Select Text with Similar Formatting 196 Word Processing: MS Word (lasrtFunctionalities) Insert Tab canbe used you wat toa to graphics or link your docu with ater document The ini pat ofthe met ib word bbs bos sown inde Fgure IS8. Ca a) ERBORHL & Gh Sr he tot ot a pt a = en Frewe 15 mS Pages Group Tebles Group Comments 1 2 3 4 6 7. Header & Foo! 8 Tet Qesmvor 201. Word Processing: MS Word (Comments and Header & footer) Header and Footer are ast where you can ad Tet ot Graphics. Any formating applied in these areas willbe shown troughou the docurcet.A header a the top arp footer pt in the baton ‘margin For Example observer the op ofthis page al all he page: in de document you wil ee same header and footer frat a2 Header Footer Pape oe re mer” Heade Footer Word Processing: MS Word (Text Group (Part- and Symbols Group) Drop Cap A drop cap 3 specially formatted letter that appears athe beginning of 2 paragraph |ust ke you seein newspapers or in books. Microsoft wordoffersdropcapsin two styes. Most commonly used drop cap begins the paragraph wth lage letter that spill down nto the tet. ‘Thus, the kop cap shifts the st few lines ofthe paragraph. Exercise: How to Use ron Cap 4. Type the paragraph as you normaly would. 2. Open the insert tab on the Ribbon and click the Drop Cop buton.(Figure 2. hunt drop ep se you want ue 4 he op cop you want Word Processing: MS Word (Design Ribbi igure 182: Design Ribbon sty set Sree Rek J Spererernees Style sets change the font and paragraph SNS (Jos Colors - Drop-Down Disp oe bes you change the color component ofthe active th Fonts - Drop-Down, Disa is ae fonts and les you change the font component of th ee Paragraph Sp 7 Quickly change the ine and paragraph spacing in your a ‘the commands: No Paragraph Space, Compact, Tight, Oe, pele Dlg Cag Prep Seng -ompont ive theme. The drop-down contains the commands: Ofice, Apex, Aspect, uty, Flow, Foundry, Median, Mero, Module, Opulent, Ore, Ogi, Paper, Sole, TRghnic, Trek, Urban and Vere. AS fault Use the curtent lok forall new documents racks warermars ine documents can be aeractve, But tey aren't Jest aDoUr looks: A watermark can be away of letting the reader know thatthe documents conidental Word Processing: MS Word (Compere and Protect Groups in Review Ribbon) ‘Compare command ets you compare two versions ofthe same decument and splays the “Compare Documents dat box. The Combine command lets yeu combine reisions fom ‘multiple authors and csplays the "Combine Documents dlalog box. This drop-down fs dsbled when the documents protected. The protect group is shown in the Figure 197 ‘Black Authors - Drop-Down. Prevent others om making changes to the selected text. Restit Eating - Toggles the cisply of the Restrict cing task pane, Presentations: MS-PowerPoint (Introduction) Microsoft offers nother powerful tol known as MS PowerPoint. This is used to develop presentations. Microsoft PowerPoint isan easy program to use ard a powerful toobiaggving a presentation. Whether your presentation need 2 visual kick tool for eollabor access ‘or the ability to share information beyond the intial meeting, PowerPoint sa Figure 202; MS: Powerpoint Presentations: ary « ele Group on C inserts anew blank Title and Content side. Title and Content, Duplicate Selected Ses slides : MS-PowerPoint (Animation Ribbon Transto{apussBin the last module were the animations aed in between ses. Whereas, 6 agate text an image, shape raph or chart with the side, this ste type of & e lect, Presentations: MS-PowerPoint (Design Ribbon) ‘Te design ribbon s the ribbon that helps you to design your sides as per your requirement. ‘equied theme of your presentation. You can tr ifferent themes to see the difference Spreadsheets: MS Excel (Introduction) Sereatieets tol ta seo oranda, such sche S res rove becnased oem. many yearn snes token tech of expe ses en Electronic Spreadsheet; Microsoft Excel isan example of spreadsheet application program thikcan ye used for storing, formatting a Cell Formatting ‘The cel formatting is show in the Figure 2010, 9 caagh the ow eight by clicking “Auto row height’, Tis will adjust the height of ing Yow according tothe font size ofthe dita youhave inser. Charts ¢ Inthe worksheet ina graphic format. Excel Line, Pe, Bar, Area Seater and more. To view he wi0000, tne cans nate ce Spreadsheets: Ms Exel eabion ‘orm eae suction that can be ved nace petorm Toolhers > Sind The toolbar coin tons fr common certo: fem the File nd Et mens ‘ry slr to MS Word: New, Open, Browae in Bridge, Save, Sve Al Prin Ce Cat, Copy, Past. ‘Uns, and Ra, ~ wh pag Development (Inserting Images) Aiding img is ery cay sing Dreamweaver (Goto sar tab and pres Inge baton a shown in the igre 256. igre 257: Brose Image

You might also like