AaptPrep Computer Basics
AaptPrep Computer Basics
Note:
❖ Data: Data can be defined as a representation of facts, con-
cepts or instructions in a formalized manner
which should be suitable for communication, interpretation, or
processing by human or electronic
machine.
❖ Information:- Information is organized or classified data
which has some meaningful values for the
receiver. Information is the processed data on which decisions
and actions are based.
❖ Data Processing Cycle: Data processing is the re-structur-
ing or re-ordering of data by people or
machine to increase their usefulness and add values for partic-
ular purpose. Data processing consists of
basic steps input, processing and output.
These three steps constitute the data processing cycle.
❖ Input -Input data is prepared in some convenient form for
processing. The form will depend on the
processing machine. For example, when electronic computers
are used, the input data could be recorded
on any one of several types of input medium, such as magnetic
disks, tapes and so on.
❖ Processing - In this step input data is changed to produce
data in a more useful form. For example,
Types of Network
View.
❖ To apply new design to slides, click either at
Apply Design Template option of Common
Tasks options of Formatting toolbar, or at
Format menu’s Apply Design Template
option or ever from the shortcut menu.
❖ A color scheme is a combination of various
colors used for text and other presentation
elements.
❖ A color scheme can be changed by clicking at
Slide Color Scheme option of Format
menu.
❖ Background color can be changed by clicking
at Format----Background command or
even through slide’s shortcut menu.
❖ You can change text font and style by using
Format---Font command.
❖ Header and Footer information can be viewed
and changed by clicking at View---Header
and Footer option.
❖ The slide ---shorter view in useful for viewing
the slides in miniature forms and for
rearranging them.
❖ Movies (Vedio) & Sound can be inserted by
using Insert—Movies & Sounds command.
❖ While creating slide shows you can add
transitions to slides by using Slide Show ---
Slide Transition command.
❖ To add animation, you can use Slide Show-
----Custom Animation commands.
Internet
➢ The Internet is a global system of interconnected computer
networks that use the standard Internet
protocol suite (TCP/IP) to link several billion devices worldwide.
It also known as “network of
networks” that consists of millions of private, public, academ-
ic, business, and government networks.
Various Applications of Internet are:
• Exchange messages using e-mail (Electronic
mail).
• Transfer files as well as software.
• Browse through information on any topic on
web.
• Communicate in real time (chat) with others
connected to the Internet.
• Search databases of government,
individuals and organizations.
• Read news available from leading news
groups.
• Send or receive animation and picture files
from distant places.
• Set up a site with information about your
company’s products and services.
➢ The World Wide Web commonly known as the Web or www
developed founded by Tim Berners –
Lee in 1989, is a system of interlinked hypertext documents
that are accessed via the Internet. These
multimedia pages are ever-changing.
and down a web page by placing the cursor on the slider con-
trol and holding down the mouse button.
❖ A website is a set of related web pages served from a single
web domain.
❖ The Uniform Resource Locator, abbreviated as URL is the
Address for web sites. Most of them begin with
http (Hyper Text Transfer Protocol), followed by a colon and
two slashes.. In most web browsers, the URL
of a web page is displayed on top inside an address bar. An ex-
ample of a typical URL would be
"http://www.gradestack.com".
14
❖ A Home page, index page, or main page is a page on a
website. A home page usually refers to:
❖ A Hyperlink is a reference to data that the reader can di-
rectly follow either by clicking or by hovering or
that is followed automatically.
❖ Downloading means to receive data to a local system from
a remote system, or to initiate such a data
transfer.
❖ Uploading refers to the sending of data from a local system
to a remote system such as a server or another
client with the intent that the remote system should store a
copy of the data being transferred.
❖ An email attachment is a computer file sent along with an
email message. One or more files can be
attached to any email message, and be sent along with it to
the recipient. The first email was sent by Ray
Tomlinson to himself in 1971.
✓ Caps Lock
✓ Num Lock
✓ Scroll Lock
✓ Insert
Modifier Keys - In computing, a modifier key is a special key
(or combination) on a computer keyboard that
temporarily modifies the normal action of another key when
pressed together. For e.g.-
✓ Shift
✓ Alt
✓ Ctrl
✓ Fn
Function keys – A function key is a key on a computer or
terminal keyboard which can be programmed so as
to cause an operating system command interpreter or applica-
tion program to perform certain actions, a form
of soft key. For e.g. - F1 through F12 keys are known as
function keys. Each keys perform different functions.
Computer Viruses:
A virus is a parasitic program that infects another legitimate
program, which is sometimes called the host. To
infect the host program, the virus modifies the host so that it
contains a copy of the virus.
Boot sector viruses: A boot sector virus infects the boot
record of a hard disk. The virus allows the actual
boot sector data to be read as through a normal start-up were
occurring.
Cluster viruses: If any program is run from the infected disk,
the program causes the virus also to run . This
technique creates the illusion that the virus has infected every
program on the disk.
Worms: A worm is a program whose purpose is to duplicate
itself.
Bombs: This type of virus hides on the user’s disk and waits
for a specific event to occur before running.
15
Trojan Horses: A Trojan Horses is a malicious program that
appears to be friendly. Because Trojan Horses do
not make duplicates of themselves on the victim’s disk. They
are not technically viruses.
Stealth Viruses: These viruses take up residence in the com-
puter’s memory, making them hard to detect.
Micro Viruses: A macro virus is designed to infect a specific
type of document file, such as Microsoft Word or
Microsoft Excel files. These types of documents can include
macros, which are small programs that execute
commands.
Commonly Used Computer Terms
❖ Abort: To stop a program or function before it
has finished.
❖ Algorithm: A set of instructions that provides a
solution to a given problem.
❖ Animation: A simulation of movement created
by displaying a series of pictures, or frames. For
example, cartoons on television.
❖ ANSI: American National Standards Institute, a
powerful industry association of USA, promoting
Programming language standards.
❖ Antivirus: Program A utility that searches a
computer network.
❖ End-User: The end user is the individual who
uses the product after it has been fully
developed and marketed.
❖ EPROM: Erasable Programmable Read Only
Memory. A type of ROM that can be programmed
or reprogrammed usually by exposing a normally
covered sector to UV-Light.
❖ Extended Memory: Memory in addition to
conventional memory used to run and manage
applications; together with expanded memory, it
helps PCs to address increased amounts of data
in memory.