Office Automation Tools Notes
Office Automation Tools Notes
1. Introduction to Computer
The computer comprises of technologically advanced hardware put together to work at great speed.
To accomplish its various tasks, the computer is made of different parts, each serving a particular
purpose in conjunction with other parts. In other words, a 'computer' is an ensemble of different
machines that you will be using to accomplish your job. A computer is primarily made of the
Central Processing Unit (usually referred to as the computer), the monitor, the keyboard and the
mouse. Other pieces of hardware, commonly referred to as peripherals, can enhance or improve
your experience with the computer.
ADVANTAGES OF COMPUTERS
Compared to traditional systems, computers offer many noteworthy advantages.
This is one reason that traditional systems are being replaced rapidly by computer-based
systems. The main advantages offered by computers are as follows:
High Accuracy
Superior Speed of Operation
Large Storage Capacity
User-friendly Features
Portability
Platform independence
Economical in the long term
TYPES OF COMPUTERS
Computers are classified in a variety of ways depending upon the principles of working,
construction, size and applications. Various types of computers are discussed in this section.
ANALOG COMPUTERS
The computers that process analog signals are known as Analog Computers. The analog signal is
a continuous signal. For example, sine wave is an analog signal. The analog quantities are based
on decimal number systems. Examples of Analog computers are the slide rule, ABACUS etc.
The operational amplifiers are widely used in the construction of analog computers when the
analog electrical signal is to be processed. For example, a differentiator is the op amp circuit that
differentiates input signal. If the input signal V sin is given to analog computer, the output
would be V cos . Accordingly, the analog computer that generates the second order differential
equation can be drawn .
DIGITAL COMPUTERS
Computers that process digital signals are known as Digital Computers. The Digital signal is a
discrete signal with two states 0 and 1. In practice, the digital computers are used
and not analog. Examples of digital computers are personal computers, supercomputers,
mainframe computers etc.
Supercomputers Are the most powerful computers in terms of speed of
execution and large storage capacity. NASA uses supercomputers to track and control space
explorations.
Mainframe Computers Are next to supercomputers in terms of capacity. The mainframe
computers are multi terminal computers, which can be shared simultaneously by multiple users.
Unlike personal computers, mainframe computers offer time-sharing. For example, insurance
companies use mainframe computers to process information about millions of its policyholders.
Minicomputers These computers are also known as midrange computers. These are desk-sized
machines and are used in medium scale applications. For example, production departments use
minicomputers to monitor various manufacturing processes and assembly-line operations.
Desktop Computer This is the most commonly used personal computer. computers are available
in two models- horizontal model and tower model.
Laptops are also called notebook computers. These are the portable computers. They have a size
of 8.5 x 11 inch and weigh about three-to-four kilos.
Palmtops Palmtops are also called handheld computers. These are computing devices, which are
small enough to fit into your palm. The size of a palmtop is like an appointment book. The
palmtops are generally kept for personal use such as taking notes, developing a list of friends,
keeping track of dates, agendas etc. The Palmtop can also be connected to a PC for downloading
data. It also provides value-added features such as voice input, Internet, cell phone, camera, movie
player and GPS.
Personal Digital Assistant (PDA) – is the palm type computer. It combines pen input, writing
recognition, personal organisational tools and communication capabilities in a small package.
Mouse: Mouse is used for operating the system. Nowadays, optical mouse is more popular as
compared to simple mouse.
Keyboard: Keyboard is used to input data in to the system so that thesystem gives output to the
user. Therefore, the keyboard is an integral part of the input system. A computer is essentially
incomplete without a keyboard.
Monitor: Monitor, which again is a very essential part of the computer system, displays the actions
that the computer performs on our command.
Motherboard: Motherboard again a necessary element of the computer system contains different
elements as memory, processor, modem, slots for graphic card and LAN card.
Modem: Modem is used to connecting to the Internet. Two types of modems are widely used. One
is known as software modems and the other is known as hardware modems.
Speakers: Speakers are also included in basic elements of a computer. It is not indispensable,
because a computer can perform its function without speakers. However, we use them to for
multiple purposes.
To understand the basic rudiments of the functioning of the computer refer to the basic block
diagram of a computer as shown in Fig. below This flow of information holds true for all types of
computers such as Personal Computers, Laptops, Palmtops etc. In other words, the fundamental
principle of working is the same.
As shown in Fig There are four main building blocks in a computer's functioning input,
processor, output and memory. The data is entered through input devices like the
keyboard, disks or mouse. These input devices help convert data and programs into the
language that the computer can process. The data received from the keyboard is processed by the
CPU, i.e. the Central Processing Unit. The CPU controls and manipulates the data that produce
information. The CPU is usually housed within the protective cartridge. The processed data is
either stored in the memory or sent to the output device, as per the command given by the user.
The memory unit holds data and program instructions for processing data. Output devices translate
the processed information from the computer into a form that we can understand.
Von Neumann architecture is based on the stored-program computer concept, where instruction
data and program data are stored in the same memory. This design is still used in most computers
produced today.
MOTHERBOARD
The motherboard is the main component inside the case. It is a large rectangular board with
integrated circuitry that connects the various parts of the computer as the CPU, RAM, Disk drives
(CD, DVD, Hard disk or any others) as well as any other peripherals connected via the ports or the
expansion slots.
POWER SUPPLY
A power supply unit (PSU) converts alternating current (AC) electric power to low voltage DC
power for the internal components of the computer. Some power supplies have a switch to change
between 230 V and 115 V. Other models have automatic sensors that switch input voltage
automatically or are able to accept any voltage within these limits. Power supply units used in
computers are generally switch mode power supplies (SMPS). The SMPS provides regulated direct
current power at several voltages as required by the motherboard and accessories such as disk
drives and cooling fans.
Computer Ports
A computer is a device that transforms data into meaningful information. It processes the input
according to the set of instructions provided to it by the user and gives the desired output. As we
know that we can connect multiple external devices with the computer system. Now, these devices
are connected with the computer using Ports. The ports are the physical docking points present in
the computer through which the external devices are connected using cables. Or in other words, a
port is an interface between the motherboard and an external device of the computer.
There are different types of ports available out of which these are important ports
Serial port
Parallel port
USB port
PS/2 port
VGA port
Ethernet Port
1. Serial port(COM Port):
A serial port is also called a communication port and they are used for connection of external
devices like a modem, mouse, or keyboard (basically in older PCs). Serial cables are cheaper to
make in comparison to parallel cables and they are easier to shield from interference. There are
two versions of it, which are 9 pin model and 25 pin model. It transmits data at 115 KB/sec.
SOUND CARD
This device enables the computer to output sound to audio devices, as well as accept input from a
microphone. Most modern computers have sound cards built-in to the motherboard, though it is
common for a user to install a separate sound card as an upgrade. Most sound cards, either built-
in or added, have surround sound capabilities.
OTHER PERIPHERALS
In addition, hardware devices can include external components of a computer system. The
following are either standard or very common.
WHEEL MOUSE
Includes various input and output devices, usually external to the computer system
INPUT
Text input devices
_ Keyboard: A device to input text and characters by pressing buttons (referred to as keys)
Pointing devices
_ Mouse: A pointing device that detects two-dimensional motion relative to its supporting
surface
_ Optical Mouse: Uses light to determine motion
_ Trackball: A pointing device consisting of an exposed protruding ball housed in a socket
that detects rotation about the two axes
Touch screen: Senses the user pressing directly on the display
Gaming devices
Joystick: A control device that consists of a handheld stick that pivots around one end, to
detect angles in two or three dimensions
Gamepad: A handheld game controller that relies on the digits/ fingers (especially
thumbs) to provide input
Game controller: A specific type of controller specialized for certain gaming purposes
Image, video input devices
Image scanner: A device that provides input by analysing images, printed text,
handwriting or an object
Webcam: A low resolution video camera used to provide visual input that can be easily
transferred over the Internet
Audio input devices
Microphone: An acoustic sensor that provides input by converting sound into electrical
Signals
Data can be in the form of numbers, characters, symbols, or even pictures. A collection of these
data which conveys some meaningful idea is information. It may provide answers to questions like
who, which, when, why, what, and how.Information is usually the processed outcome of data.
More specifically speaking, it is derived from data. Information is a concept and can be used in
many domains.
6.Storehouse (Memory)
Secondary storage devices are the key for the data storage. They store the data for which the user
wants to retrieve these data for future use. The examples for various secondary devices are
Floppy disk, Optical disks (CS and DVD), Zip drives, Thumb drives etc. The data of smaller size
can be easily fetched and they can be copied to the primary memory (RAM).
Example: Data Warehousing made by IBM.
7.Cheaper (Reduction of cost)
Computers are short term investment in order to achieve a long term gain. Though the
investment is high they reduce the cost of each and every transaction. They reduce man power
and leads to an elegant and efficient way for computing various tasks.
8.Needs a User interface
The only draw back of computer is it cannot make the decision of its own. It needs a guidance to
enhance the process. After all computers is a machine.
Hybrid computers are computers that exhibit features of analog computers and digital
computers. The digital component normally serves as the controller and provides logical
operations, while the analog component normally serves as a solver of differential equations.
In general, analog computers are extraordinarily fast, since they can solve most complex
equations at the rate at which a signal traverses the circuit, which is generally an appreciable
fraction of the speed of light. On the other hand, the precision of analog computers is not good;
they are limited to three, or at most, four digits of precision.
ALU- ALU is responsible for all the calculations,logical comparison and execution of the
instruction,during the processing operation. The data and instruction stored in main memory
before processing are passed as and when need to the ALU,where actual processing takes place.
CU- CONTROL UNIT managed all the computer system. It is a very important part of CPU
control unit understands the instruction and execute them.
Registers—Local memory of cpu madeup of flipflops. Fastest memory
In its strictest sense, ROM refers only to mask ROM (the oldest type of solid state ROM), which
is fabricated with the desired data permanently stored in it, and thus can never be modified.
However, more modern types such as EPROM and flash EEPROM can be erased and
reprogrammed
multiple times.
Web Browser
Ans. Web browser is a program that you use to access the Internet. It reads and knows how to
display and download files that are put on servers for people to read.
Internet Explorer and Firefox are two major web browsers. A web browser or Internet browser
is a software application for retrieving, presenting, and traversing information resources on the
World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI)
and may be a web page, image, video, or other piece of content. Although browsers are primarily
intended to access the World Wide Web, they can also be used to access information provided by
Web servers in private networks or files in file systems. Some browsers can also be used to save
information resources to file systems.
Web browser is a software program that interprets the coding language of the World Wide Web
in graphic form, displaying the translation rather than the coding. This allows anyone to “browse
the Web” by simple point and click navigation, bypassing the need to know commands used in
software languages.
What are search engine? Write name of some popular search engines.
Ans. A web search engine is designed to search for information on the World Wide Web and
FTP servers. The search results are generally presented in a list of results and are often called
hits. The information may consist of web pages, images, information and other types of files.
Some search engines also mine data available in databases or open directories. Unlike Web
directories, which are maintained by human editors, search engines operate algorithmically or are
a mixture of algorithmic and human input.
Program that searches documents for specified keywords and returns a list of the documents
where the keywords were found. Although search engine is really a general class of programs,
the term is often used to specifically describe systems like Google, Alta Vista and Excite that
enable users to search for documents on the World Wide Web and USENET newsgroups.
Some of the most common search engines are:
Altavista Webcrawler
Excite Yahoo
Google Opentext
Infoseek Cycos
2. Switch
Switch is a point to point communication device. It operates at the data link layer of OSI model.
It uses switching table to find out the correct destination.
Basically, it is a kind of bridge that provides better connections. It is a kind of device that set up
and stop the connections according to the requirements needed at that time. It comes up with
many features such as flooding, filtering and frame transmission.
3. Router :
Routers are the multiport devices and more sophisticated as compared to repeaters and bridges. It
contains a routing table that enables it to make decision about the route i.e. to determine which of
several possible paths between the source and destination is the best for a particular transmission.
It works on the network layer 3 and used in LANs, MANs and WANs. It stores IP address and
maintains address on its own.
Sr.
No Hub Switch Router
Hub is a physical
Switch is a data link layer device Router is a network layer
1. layer device i.e.
i.e. layer 2. device i.e. layer 3.
layer 1.
A route is more
sophisticated and
Hub is not an intelligent device as it can
A Switch is an intelligent device
intelligent device read IP address and direct
as it passes on the message to the
4. that may include the packets to another
selective device by inspecting the
amplifier on network with specified IP
address.
repeater. address. Moreover routers
can built address tables that
helps in routing decisions.
Sr.
No Hub Switch Router
At least single
At least single network is Router needs at least two
5. network is required
required to connect. networks to connect.
to connect.
1. Firewall :
Firewall is software program that prevents unauthorized access to or from a private network. All
data packets in it are entering or dropping network passes through the firewall and after checking
whether the firewall allows it or not. All traffic must pass through the firewall and only
authorized traffic must pass. It is a system located between two networks where it implements an
access control policy between those networks. It works on network layer of the OSI model and
uses encryption to encrypt the data before transmission.
2. Proxy Server :
Proxy Server is a server that acts as a gateway or intermediary between any device and the rest of
the internet. A proxy accepts and forwards connection requests, then returns data for those
requests. It uses the anonymous network id instead of actual IP address of client (means it hides
the IP address of client), so that the actual IP address of client couldn’t be reveal.
Firewall can monitor and filter all the Proxy server connects an external client
1 incoming and outgoing traffic on a given with a server to communicate with each
local network. other.
It filters data by monitoring IP packets that It filters the client-side requests that are
3
are traversed. made to connect to the network.
4 It involves network and transport layer data. It work on application layer data.
It exist as an interface between a public and It can exist with public networks on both
5
private network. sides.
The overhead generated in firewall is more The overhead generated in proxy server is
7
as compared to a proxy server. less as compared to a firewall.
A star topology having four systems connected to a single point of connection i.e. hub.
Advantages of Star Topology
If N devices are connected to each other in a star topology, then the number of cables required to
connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports
required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Drawbacks of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole system will crash
down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where all
computers are connected to a central hub. This topology is also used in wireless networks where
all devices are connected to a wireless access point.
For more, refer to the Advantages and Disadvantages of Star Topology.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because
if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted
Aloha, etc.
Bus Topology
A bus topology with shared backbone cable. The nodes are connected to the channel via drop
lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number of cables required to
connect them is 1, known as backbone cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small networks.
Bus topology is familiar technology as installation and troubleshooting techniques are well known.
CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this, various
protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected to a
single coaxial cable or twisted pair cable. This topology is also used in cable television networks.
For more, refer to the Advantages and Disadvantages of Bus Topology.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having
2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology,
the Token Ring Passing protocol is used by the workstations to transmit the data.
An intranet is a private network that is contained within an enterprise. It may consist of many
interlinked local area networks and also use leased lines in the wide area network. Typically, an
intranet includes connections through one or more gateway computers to the outside Internet.
The main purpose of an intranet is to share company information and computing resources
among employees. An intranet can also be used to facilitate working in groups and for
teleconferences.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private
version of the Internet. With tunneling, companies can send private messages through the public
network, using the public network with special encryption/decryption and other security
safeguards to connect one part of their intranet to another.
D) Extranet: An extranet is a computer network that allows controlled access from the outside,
for specific business or educational purposes. An extranet can be viewed as an extension of a
company's intranet that is extended to users outside the company, usually partners, vendors, and
suppliers. It has also been described as a "state of mind" in which the Internet is perceived as a
way to do business with a selected set of other companies (business-to-business, B2B), in
isolation from all other Internet users. In contrast, business-to-consumer (B2C) models involve
known servers of one or more companies, communicating with previously unknown consumer
users. An intranet is like a DMZ in that it provides access to needed services for channel
partners, without granting access to an organization's entire network.
An extranet provides various levels of accessibility to outsiders. You can access an extranet only
if you have a valid username and password, and your identity determines which parts of the
extranet you can view.
Difference between HTTP and HTTPS
1. HyperText Transfer Protocol (HTTP): HyperText Transfer Protocol (HTTP) is a protocol
using which hypertext is transferred over the Web. Due to its simplicity, http has been the most
widely used protocol for data transfer over the Web but the data (i.e. hypertext) exchanged using
http isn’t as secure as we would like it to be. In fact, hyper-text exchanged using http goes as
plain text i.e. anyone between the browser and server can read it relatively easily if one intercepts
this exchange of data.
2. Hypertext Transfer Protocol Secure (HTTPS): Hypertext Transfer Protocol Secure
(HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure
communication. In HTTPS, the communication protocol is encrypted using Transport Layer
Security.
Difference between HTTP and HTTPs :
S.No. HTTP HTTPS
HTTP is considered to be
HTTPs is considered as secure.
4. unsecure.
In HTTP, Encryption is
Encryption is present in HTTPS.
6. absent.
HTTP does not use data While HTTPS will have the data before sending it
10. hashtags to secure data. and return it to its original state on the receiver side.
In HTTP Users ar worried In HTTPS Users are confident about the security of
15. about their data. their data.
URL
Also known as a internet address or web address, a URL ( Uniform Resource Locator) is a form
of URI and standardized naming convention for addressing documents accessible over the Internet
and Intranet. An example of a URL is https://www.computerhope.com, which is the URL for the
Computer Hope website.
What do you mean by data transmission? Explain all layers of OSI Model.
Ans. Data transmission, digital transmission or digital communications is the physical transfer
of data (a digital bit stream) over a point-to-point or point-to-multipoint communication channel.
Examples of such channels are copper wires, optical fibers.
The Open Systems Interconnection model (OSI model) is a product of the Open Systems
Interconnection effort at the International Organization for Standardization. It is a way of
subdividing
a communications system into smaller parts called layers. A layer is a collection of
conceptually similar functions that provide services to the layer above it and receives services
from the layer below it. On each layer an instance provides services to the instances at the layer
above and requests service from the layer below.
Layer 1: Physical Layer
The Physical Layer defines the electrical and physical specifications for devices. In particular, it
defines the relationship between a device and a transmission medium, such as a copper or optical
cable.
The major functions and services performed by the Physical Layer are:
Establishment and termination of a connection to a communications medium.
Participation in the process whereby the communication resources are effectively shared
among multiple users. For example, contention resolution and flow control.
IP4 addresses are 32-bit binary strings which are normally seen by humans (e.g., network
administrators, in dotted decimal as in the example:
223.58.1.10
The decimal numbers here have no meaning in isolation; this is simply a convenient way of
encoding the numbers so that administrators and others find it easier to recognize them. What
happens is that the 32-bit address is broken up into four 8-bit sequences each of which is converted
to decimal. So the above address is in binary:
IP Address Formats
Originally IP addresses were divided into five classes as shown below. Classes A, B and C are the
most important: the initial bits determine which class an address belongs to, and the classes differ
in how much of the address is taken up with the network address and how much with the host
address.
Offsets
0 8 16 24
Class A
0 Network Host
Addresses 1.0.0.0 to 127.255.255.255
Class B
10 Network Host
Addresses 128.0.0.0 to 191.255.255.255
Class C
110 Network Host
Addresses 192.0.0.0 to 223.255.255.255
Class D
1110 Multicast address
Addresses 224.0.0.0 to 239.255.255.255
Class E
11110 Reserved for future use
Addresses 240.0.0.0 to 255.255.255.255
Exclusions
Some address ranges are excluded from the above classes. All addresses of the
form 127.xx.yy.xx are used for diagnostics. The following address ranges are designated as
"private": meaning thay can only be used on networks which are not connected to the global
Internet:
10.0.0.0 - 10.255.255.255
172.16.0.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
Examples
a. 4.23.145.90
b. 227.34.78.7
c. 246.7.3.8
d. 129.6.8.4
e. 198.76.9.23
MAC ADDRESS
MAC Addresses are unique 48-bit hardware Address of a computer that are embedded into
a network card (known as a Network Interface Card) during manufacturing. The MAC
Address is also known as the Physical Addressof a network device.
Difference between MAC Address and IP Address
Both MAC Address and IP Address are used to uniquely define a device on the internet. NIC
Card’s Manufacturer provides the MAC Address, on the other hand, Internet Service Provider
provides IP Address.
The main difference between MAC and IP address is that MAC Address is used to ensure the
physical address of the computer. It uniquely identifies the devices on a network. While IP
addresses are used to uniquely identifies the connection of the network with that device takes
part in a network.
MAC Address stands for Media IP Address stands for Internet Protocol
1.
Access Control Address. Address.
A device attached with MAC Address A device attached with IP Address can
3.
can retrieve by ARP protocol. retrieve by RARP protocol.
MAC Address is used to ensure the IP Address is the logical address of the
5.
physical address of a computer. computer.
S.NO MAC Address IP Address
MAC Address of computer cannot be IP Address modifies with the time and
8.
changed with time and environment. environment.
No classes are used for MAC IPv4 uses A, B, C, D, and E classes for IP
11.
addressing. addressing.
MAC address help to solve IP address IP addresses never able to solve MAC
13.
issue. address issues.
MAC addresses can be used for The IP address can be used for broadcasting
14.
broadcasting. or multicasting.
Some computer processes are very lengthy and time-consuming. To speed the same process, a job
with a similar type of needs are batched together and run as a group.
The user of a batch operating system never directly interacts with the computer. In this type of OS,
every user prepares his or her job on an offline device like a punch card and submit it to the
computer operator.
Multi-Tasking/Time-sharing Operating systems
Time-sharing operating system enables people located at a different terminal(shell) to use a single
computer system at the same time. The processor time (CPU) which is shared among multiple
users is termed as time sharing.
Booting is a process of switching on a computer. Two types of booting are cold booting and warm
booting. Six steps of the booting process are BIOS and Setup Program, The Power-On-Self-Test
(POST), The Operating System Loads, System Configuration, System Utility Loads, and Users
Authentication.
Types of Booting
Booting is a process of switching on the computer and starting the operating system. When a
computer is switched on, The boot process loads the operating system into main memory (RAM)
installed inside it. Types of computer booting are Cold Booting and Warm Booting.
Cold Boot: when the user switches on a computer after it has been power off completely,
Warm Boot: when the user restarts the computer.
When the booting process takes place, it copies kernel and important instructions of an operating
system from hard disk to main memory (RAM). The kernel is the most important part of the
operating system that manages memory and devices, maintains computer clock, starts applications.
It assigns compute resources like devices, programs, data, and information also. The kernel also
remains in memory permanently when the computer starts.
Booting is a process of switching on the computer and starting the operating system. Six steps of
the booting process are BIOS and Setup Program, The Power-On-Self-Test (POST),
The Operating System Loads, System Configuration, System Utility Loads and Users
Authentication.
After all this process, the user interface starts, enabling user interaction with the computer and its
programs also.
OS UTILITY PROGRAMS
A utility program, also called a utility, is a type of system software that performs a specific task,
usually related to managing a computer, its devices, or its programs. Most operating systems
include several utility programs. You also can buy stand-alone utilities that offer improvements
over those included with the operating system.
Popular utility programs offer these functions: viewing files, compressing files, diagnosing
problems, scanning disks, defragmenting disks, uninstalling software, backing up files and disks,
checking for viruses, and displaying screen savers. The following paragraphs briefly discuss each
of these utilities.
File Viewer
A file viewer is a utility that allows you to display and copy the contents of a file. An operating
system’s file manager often includes a file viewer. For example, Windows Explorer has two
viewers: one called Quick View to display the contents of text files and another called Imaging
Preview for graphics files. The title bar of the file viewer window displays the name of the file
being viewed.
File Compression
A file compression utility shrinks the size of a file. A compressed file takes up less storage space.
Compressing files frees up room on the storage media and improves system performance.
Attaching a compressed file to an e-mail message reduces the time needed for file transmission.
Uploading and downloading compressed files to and from the Internet reduces the file transmission
time.
Compressed files, sometimes called zipped files, usually have a .zip extension. When you
receive or download a compressed file, you must uncompress it. To uncompress, or unzip, a file,
you restore it to its original form. Two popular stand-alone file compression utilities are PKZIP™
and WinZip® .
Diagnostic Utility
A diagnostic utility compiles technical information about your computer’s hardware and certain
system software programs and then prepares a report outlining any identified problems. For
example, Windows includes the diagnostic utility, Dr. Watson, which diagnoses problems as well
as suggests courses of action.
Disk Scanner
A disk scanner is a utility that (1) detects and corrects both physical and logical problems on a
hard disk or floppy disk and (2) searches for and removes unwanted files. A physical problem is
one with the media such as a scratch on the surface of the disk. A logical problem is one with the
data, such as a corrupted file allocation table (FAT). Windows includes two disk scanner utilities:
ScanDisk and Disk Cleanup. ScanDisk detects and corrects problems. Disk Cleanup searches for
and removes unnecessary files such as temporary files .
A disk defragment utility reorganizes the files and unused space on a computer’s hard disk so the
operating system can access data more quickly and programs can run faster. When an operating
system stores data on a disk, it places the data in the first available sector on the disk. Although it
attempts to place data in sectors that are contiguous (next to each other), this is not always possible.
When the contents of a file are scattered across two or more noncontiguous sectors, the file is
fragmented. Fragmentation slows down disk access and thus the performance of the entire
computer. Defragmenting the disk, or reorganizing it so the files are stored in contiguous sectors,
solves this problem. Windows includes a disk defragmenter, called Disk Defragmenter.
Uninstall Utility
An uninstall utility removes an application, as well as any associated entries in the system files.
When you install an application, the operating system records the information it uses to run the
software in the system files. The system file entries will remain if you attempt to remove the
application from your computer by deleting the files and folders associated with the program
without running the uninstaller. Most operating systems include an uninstaller. You also can
purchase a stand-alone program, such as McAfee’s UnInstaller.
Backup Utility
A backup utility allows you to copy, or backup, selected files or your entire hard disk onto another
disk or tape. During the backup process, the backup utility monitors progress and alerts you if it
needs additional disks or tapes. Many backup programs will compress files during this process, so
the backup files require less storage space than the original files.
For this reason, you usually cannot use backup files in their backed up form. In the event you need
to use one of these files, a restore program reverses the process and returns backed up files to their
original form. Backup utilities include restore programs.
You should back up files and disks regularly in the event your originals are lost, damaged, or
destroyed. Windows includes a backup utility. Some users opt to back up their files to an Internet
hard drive. An Internet hard drive, sometimes called online storage, is a service on the Web that
provides storage to computer users. A separate paper discusses backup strategies in more depth.
Antivirus Program
An antivirus program is a utility that prevents, detects, and removes viruses from a computer’s
memory or storage devices. A virus is a program that copies itself into other programs and spreads
through multiple computers. Some malicious programmers intentionally write virus programs that
destroy or corrupt data on a computer. A separate paper discusses antivirus programs and viruses
in more depth.
Screen Saver
A screen saver is a utility that causes a monitor’s screen to display a moving image or blank screen
if no keyboard or mouse activity occurs for a specified time period . When you press a key on the
keyboard or move the mouse, the screen returns to the previously displayed image.
Screen savers originally were developed to prevent a problem called ghosting, in which images
could be permanently etched on a monitor’s screen. Ghosting is not a problem with today’s
monitors. Still, screen savers are popular for security, business, or entertainment purposes. To
secure a computer, you can configure your screen saver so a user must enter a password to stop
the screen saver and redisplay the previous image. Some screen savers use push technology, which
enables you to receive updated and new information each time the screen saver displays. Push
technology occurs when Web-based content downloads automatically to your computer at a
regular interval or whenever the Web site updates.
An operating system often includes several screen savers. You also can purchase screen savers or
download them from the Web.
Word
Microsoft Word is a word processing software. You can use it to type letters, reports, and other
documents. This class introduces users to Microsoft Word 2016.
NOTE: Experienced users may benefit from this tutorial, as 2016 is different from previous
versions.
Backstage
2
New: You can create a new, blank document or select
library. Word provides resume, calendar, and flyer templates to help you get
started.
Open: Click this option to open a previously saved file and continue editing it.
Save: Save your file frequently. You can also click the in the upper left
corner. Or, press CTRL + S on your keyboard at the same time.
Save As: The first time you save your file you will see the Save As menu. See
below for more information.
Save as Adobe PDF: Lets you save the document as an Adobe PDF file.
Print: Print your document using this screen. We will go into more details about
this later in the class.
Share: This is new to Office 2016. This allows you to email your file, upload it to
a blog site or present your document online. You will need additional accounts to
use these features, such as a Microsoft Account (to present) or a WordPress
account (to blog). For this introduction we will not cover these features in-depth,
but be aware that these capabilities exist.
Export: Allows you to export (or save) your document as a different document
type.
Account: Allows you to change the colors of your Office Background and sign in
with a different Microsoft Account if needed.
Options: Gives you access to the advanced features in Word. This feature also
allows you to rearrange the ribbon or other settings in this application.
NOTE: Either before you start or shortly after, you should save your document. Saving a
document frequently prevents a loss of file if your computer unexpectedly shuts down.
At this point, you can start entering text. You may need several sessions in Word to complete
final versions of lengthy or complex documents.
3
When you type text into a Word document, each character appears to the left of the blinking
insertion point (the cursor) in the document window. The text you enter into a document can
include letters, spaces, numbers, and symbols. As you type, the insertion point moves across
the screen from right to left.
NOW YOU TRY: Try typing: The quick brown fox jumps over the lazy dog.
Lesson 2: Save As
The Save As menu appears the first time you save your file. You can also use the Save As
menu to save different copies of the same file by giving each copy a slightly different file name.
This can be done at any time.
Open the Save As screen. Remember, you have to be in the backstage area.
By default, you have two places that you can save your file: (1) directly on your computer, or (2)
in a OneDrive Account.
4
OneDrive
Unless you want to use an OneDrive account, you will save most of your files onto a computer.
From the Save As screen:
The Browse button opens the Save As dialog box menu (see below).
You can also use the Save As dialog box to save different copies of the same file by giving each
copy a slightly different file name.
5
1. File Name box Word will automatically insert a default filename when you first save a
document. This default is always the first phrase in the document, but you have the
ability to modify it. Word can handle filenames of up to 255 characters. These filenames
can include uppercase and lowercase letters, numbers, and even spaces. However,
they cannot contain the following symbols: < > : * | \
2. File Path At the top of the box, you can see the file path of the document. The File Path
shows which folders the document is saved under.
3. File Location The default location where the document will be saved is My Documents.
To store the document in a different location (including flash drives), you can click on the
folder or drive on the left side of the Save As dialog box.
4. Similar Files When you are saving a document, files of similar types will be displayed.
For example, if you are saving a Word 2016 Document, you will see other Word 2016
(.docx) documents listed.
5. New Folder You might consider creating a new folder before saving your file. This step
will help you organize and find them later.
6. File Type When you save a file, you can also change its format type. For example, you
can save your file as a PDF (protected document format) or as a Word Document. Click
the drop down box to save your preferred type. The file type is denoted by the file
NOTE: You can also save files as older Word Documents (such as Word 2003).
the
pop-up to the right.
6
Lesson 3: Opening Existing Documents
Documents previously stored on your computer or OneDrive can be opened for revision.
Choose Open from the backstage.
If the file you that you want to open is on OneDrive, then select OneDrive to download and edit
files stored in your OneDrive account (see page 5 for more information).
Notice that recently saved documents are listed on the right side. You can open these by
clicking on the folder or file name.
7
Open Dialog Box
If you see your file in the current location, select it and click Open (4).
A file saved in a specific folder is opened by double-clicking the folder to view the files in the
folder (2).
For a file saved on a flash drive, select the flash drive on the left (1) to view folders and files on
it.
If you do not remember where you saved the file, you can type the file name in the Search Box
(3) and click the magnifying glass symbol to search for it.
NOTE: Search will only look through one drive at a time. To search your flash drive, you need
to click the icon located on the left side
8
The Print Preview in Word 2016 is automatically displayed with the print menu. To return to the
Word window without printing, click the arrow at the top-left corner.
Lesson 5: Printing
After you create a new document, you can print it. You do not have to save the document
beforehand.
You can use this menu to adjust your current print settings. For example, you can specify how
many copies you need or the portion of
the document you would like to print
(e.g. single page or paragraph). 1
Before we go any furth
other Printing Options including
selecting a range (set of pages you want
to print) and choosing a printer.
WARNING: If your printer is wifi enabled, make sure it is your printer you are printing to!
9
Lesson 6: Parts of the Word Window
At the top left is a list of your most used commands. The default buttons are Save, Undo, and
Redo. However, you can change your default buttons to other commands.
Undo: Lets you undo your most recent action (this command is your best friend).
Redo: Undo an undo. In other words, if you undid your most recent action, you can
click redo if you decide to go back and keep it.
Customize Quick Access Toolbar: You can add more commands to the tool bar by
selecting this option.
Search/Help
10
The Title Bar
Next to the Quick Access toolbar is the Title Bar. The Title Bar displays the title of the
document on which you are currently working. Word names the first new document you open
Document1 until you save it and give it a new name.
The Ribbon
In Microsoft Word 2016, you use the ribbon to issue commands. The ribbon is located near the
top of the screen and below the Quick Access toolbar.
At the top of the ribbon are several tabs; clicking a tab displays several related command
groups.
Home: This tab contains the most commonly used commands in word. Some of these include
commands to change how the text looks and is displayed on the page. The Cut, Copy, and
Paste commands are also here.
Insert: This tab contains commands that allows you to insert various objects such as pictures,
tables, and shapes into the document.
Design: In this tab you can change the way the document looks and add visual features.
Page Layout: Here you can change the position of the text on the page and the document
formatting.
References: You can manage your sources and citations. You can also add a table of contents
and footnotes here.
Mailings: This tab lets you set up and use the Mail Merge feature of Microsoft Word.
Review: This tab allows you to use spell and grammar check, insert comments, track changes
that you have made to the document, and use a thesaurus.
View: In this tab you can change how the Word window looks.
11
NOTE: Changing how the Word window look will not affect how the document looks when
printed, just how it looks when you view it on the computer.
You will notice the faint lines that divide the ribbon.
Command Group
This is a Command Group. A command group is where similar commands are stored together
in the ribbon. For example, in the picture above, all of the commands that allow you to edit the
font are stored in the Font command group. There are several command groups located in each
tab.
To locate a command, you will need to click on a tab and open that ribbon.
NOW YOU TRY: Open the Insert tab, for example, to open the Insert ribbon. What
command group contains the command to insert:
o a table? o wordart?
o header? o a picture?
Dialog Box Menus
Some of the command groups have commands that are not shown. These additional options
are indicated by a dialog box launcher button Paragraph Dialog Box
launcher. The Paragraph command group is found under the Home ribbon.
12
The Text Area
Just below the ruler is a large area for your work. The blinking vertical line in the upper-left
corner of the text area is the cursor. It marks the insertion point. As you type, your text displays
at the cursor location.
The Ruler
The ruler is found below the ribbon. Using the ruler, you can efficiently adjust your page margins
and paragraph indents.
The vertical and horizontal scroll bars enable you to move up, down, and across your
window simply by dragging the white square located on the scroll bar. On the right is
an example of the vertical scroll bar.
The vertical scroll bar is located along the right side of the screen. To move up and
down your document, click and drag the vertical scroll bar up and down.
The horizontal scroll bar is located just above the status bar. To move back and forth
across your document, click and drag the horizontal scroll bar back and forth.
NOTE: You won't see a horizontal scroll bar if the width of your document fits on your
screen.
The Status Bar appears at the bottom-left corner of Word. The status bar
displays the current page and the word count (the number of words) of
your document. You can customize what displays on the Status Bar.
NOW YOU TRY: Add the Line Number option to the status bar.
13
Lesson 7: Understanding Document Views
In Word 2016, you can display
your document with one of the
following five views: Draft, Web
Layout, Print Layout, Full Screen
Reading, or Online Layout. These
settings are found in the View tab.
1. Draft View: Draft view eliminates excess space. You will not be able to see margins or
the page layout.
2. Web Layout: View your document as it would appear in a web browser such as Internet
Explorer.
3. Print Layout: Shows everything from margins to page layout. It is the most common
document view, as it shows how the document will look when printed
4. Read Mode: You can view how your document looks as a two-page spread. This is a
great way to test how your document may look on tablet devices. You cannot edit while
in this mode.
5. Outline View: Displays the document in outline form. You can display headings without
the text. If you move a heading, the accompanying text moves with it.
NOTE: You cannot edit while in Read Mode. However, you can make some setting
adjustments such as changing the background to Sepia. You still have full access to the
Backstage. To get out of Read Mode, hit the Esc key on the keyboard.
14
Lesson 8: Highlighting
How to Highlight
1. Position the cursor in front of the first letter of your text. Click the mouse button once so that
the blinking insertion point is present.
2. Hold down the Shift key on the keyboard.
3. As you hold the Shift key, press the right arrow key. This will highlight one letter at a time.
4. Press the down arrow key until the first paragraph is highlighted.
5. Click anywhere outside the highlighted area to remove the highlighting.
Tip: If you need to highlight the entire document, press the Ctrl and A keys at the same time.
A font is the style, or typeface, of the text. Some of the most common fonts are Calibri, Times
New Roman, and Arial. The default font of Word 2016 is Calibri.
Font sizes are measured in points. Point size is the vertical measurement of a character. One
inch equals 72 points. The most common point sizes are 10 and 12 point. This handout is
written in 11 pt. Arial.
Point Size
Font
15
The ribbon has shortcuts to make it easier to change the size, shape, and style of your font.
From here, you can Bold ( ), Italicize ( ), or Underline ( ) your text. You can also change
the point size and the font style. First highlight the text, then select the command.
NOTE: If you decide to type in 16 point and Times New Roman font at the beginning of
your document, this decision will remain as you
change these settings).
You can change the default line spacing at any time. For example, you can change the setting
when you open a new document, in the middle of drafting a document, or after you have
finished. Some users prefer to type their document first and format it (or change the style) after
Twinsburg Library
You can change line spacing for an entire document by specifying the spacing before you begin
typing. Or, you can change the line spacing by highlighting a specific paragraph (as you just
did).
16
Lesson 11: Cut, Paste, and Copy
To Cut: means to remove the text from your document and store on your Clipboard
To Paste: means to deposit the text that you have either cut or copied, to another
location in your document, or to a different document.
Use format painter to apply formatting settings to another set of text on your
document.
Tip: This is great for keeping any headings or titles consistent in your document.
Clipboard
o Click the paste icon ( ). This should paste a second copy of your name on your
document. Every time you click the paste icon, another copy of your name appears.
Spell Checker: A feature of Microsoft Office that checks for spelling errors throughout
the document.
17
What do the lines mean?
When you see wavy blue lines, this means that grammar check has found a possible
grammatical error.
misspelled word.
A.) You can right-click over the red or green lines. Word will
display a menu of how to correct any possible mistakes
(see right).
OR
B.) You can select Spelling & Grammar under the Review
ribbon.
You will see a pane open on the right side of your screen that
displays possible mistakes in the document.
Click Change
Click Ignore All if you want to ignore all instances of the word in the
current document.
Click Change All to replace all instances of the misspelled word with
the suggested word.
18
AutoCorrect: A default feature that automatically corrects
common typos and grammar errors without your
involvement. You can decide to keep this feature active or
turn it off.
1. Click File.
2. Click Options.
3. Click Proofing.
4. Click AutoCorrect Options.
19
Basic Shortcut Keys for Navigating Through Documents
The following are keyboard shortcuts (keys are bolded):
20
Mail Merge
Step by Step
Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to
create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and
over. Here is an example of how to use it to create a letter thanking people who donated to a particular fund.
x The first thing you do is create an Excel spreadsheet, creating a header for each field such as First Name, Last
Name, Address, City, State, and Postal Code
(NOTE: It’s important to not refer to the postal code as a zip code, but more about that later).
x The field headers (ie first name, last name) are labeled separately so that you can filter them alphabetically if you
need to.
x You can also add additional headers, such as a donation amount. Be sure to label it something you’ll remember.
If you are using dollar amounts, change the type of number it is under ‘Number’ at the very top to ‘Text’ for every
dollar entry and manually type the dollar sign otherwise the dollar sign ($) will not show up in your letter.
2.) Prepare your letter in Microsoft Word. When creating a letter, it’s a good idea to insert a placeholder where the
information from the mail merge will be placed, ie [Address], [Amount].
3.) Under “Mailings” in Microsoft Word click on ‘Start Mail Merge’ and click on ‘Step by Step Mail Merge Wizard.’
x A window will appear to the right of your document that says ‘Select
Document type.’ In this instance leave it on ‘Letters.’
x At the bottom click on Next: Starting Document.
x The next step will read ‘Select Starting Document.’ If you currently have the
letter you created leave the selection ‘Use the Current Document’ selected.
x Next, click ‘Select Recipients’ at the bottom. You will see ‘Use an Existing List’
the ability to browse for your list.
x Click on the ‘browse’ button and find your list on your computer that you typed
up in Excel.
x Once you find your document click open and a box will show up that says ‘Select table.’ If you only had one tab on your
spreadsheet click okay.
x You will then see the data you had typed. You can also choose to leave off certain names if you want to. Click okay.
x The table will close and then the dialog box on the right will say ‘Currently Your
Recipients Are Selected From:’ and will give the title of your excel spreadsheet
document.
x At the bottom of the dialog box click ‘write your letter.’
x From there you can start adding your fields from your spreadsheet. Highlight the
placeholder marked [Address] and then click on Address block. The spreadsheet
will pull in your data from your spreadsheet.
x If you did not write ‘postal code’ and wrote ‘zip code’ instead you can click on ‘match fields’ and find the field that matches
‘postal code’ instead. Be sure to cycle through your address list to make sure your addresses are correct. Click okay.
x Highlight the greeting line placeholder and replace it with the ‘Greeting Line’ under Write Your Letter. You can also filter it to
where it only lists their first name.
x For the other fields such as ‘amount’ you can highlight amount and go to ‘More items.’ Then, go down to ‘amount’ and select
it.
x Next go to ‘preview your letters.’ From there the database information will have populated your
letter. You should be able to cycle through the information you typed to make sure that your
addresses and amounts are correct.
x If you’re satisfied, click on ‘Complete the merge’ and then
click on ‘print.’
x It will give you the option to click on ‘print current record’ or you can print all of the letters from
your database.
x It’s important to thoroughly look over all your letters to make sure there aren’t any typos or problems with formatting,
especially on the letter itself.
You can use the mail merge to create letters, mailing labels, emails, name badges, or etc. This can also work on saving it to a
PDF if you’ve got a PDF converter, such as Primo PDF.