Fundamental of Information Technology
Fundamental of Information Technology
COMPUTER BASICS
EVOLUTION OF COMPUTERS
The modern computer took its shape with the advent of time. It was around 16th
century when the evolution of computer started. The initial computer faced many
changes, obviously for the betterment. It continuously improved itself in terms of
speed, accuracy, size, and cost to get the shape of the modern day computer. This
long period can be conveniently divided into the following phases called computer
generations:
Programming language was shifted from high level to assembly language and made
programming comparatively an easy task for programmers. Languages used for
programming in this era were FORTRAN (1956), ALGOL (1958) and COBOL
(1959).
Examples: PDP-8, IBM1400 series, IBM 1620, IBM 7090, CDC 3600.
A single IC, has many transistors, registers and capacitors built on a single thin slice
of silicon. The cost size were reduced and memory space and working efficiency
was increased in this generation. Programming was now done in Higher level
language such as BASIC (Beginners All purpose Symbolic Instruction Code).
Mini computers find their shape in this era.
The speed is highest, size is the smallest and area of use has remarkably increased
in the fifth generation computers. Though not hundred per cent artificial intelligence
has been achieved till date but keeping in view the current developments, it can be
said that this dream will also become a reality very soon.
The first generation computers used the technology of vacuum tubes, which has been
replaced by transistors in the second generation and integrated circuits in the third.
The fourth generation envisaged the use of microprocessors and now is the era of
artificial intelligence.
CLASSIFICATION OF COMPUTER
Computers are divided into different types based on different criteria. Based
on the size, a computer can be divided into five types:
1. Micro Computer
2. Mini Computer
3. Mainframe Computer
4. Super Computer
5. Workstations
1. Micro Computer
It is a single-user computer which has less speed and storage capacity than the other
types. It uses a microprocessor as a CPU. The first microcomputer was built with 8-
bit microprocessor chips. The common examples of microcomputers include
laptops, desktop computers, personal digital assistant (PDA), tablets, and
smartphones. Microcomputers are generally designed and developed for general
usage like browsing, searching for information, internet, MS Office, social media,
etc.
2. Mini Computer:
Mini-computers are also known as "Midrange Computers." They are not designed
for a single. They are multi-user computers designed to support multiple users
simultaneously. So, they are generally used by small businesses and firms.
Individual departments of a company use these computers for specific purposes. For
example, the admission department of a University can use a Mini-computer for
monitoring the admission process.
3. Mainframe Computer:
It is also a multi-user computer capable of supporting thousands of users
simultaneously. They are used by large firms and government organizations to run
their business operations as they can store and process large amounts of data. For
example, Banks, universities, and insurance companies use mainframe computers to
store the data of their customers, students, and policyholders, respectively.
4. Super Computer:
Super-computers are the fastest and most expensive computers among all types of
computers. They have huge storage capacities and computing speeds and thus can
perform millions of instructions per second. The super-computers are task-specific
and thus used for specialized applications such as large-scale numerical problems in
scientific and engineering disciplines including applications in electronics,
petroleum engineering, weather forecasting, medicine, space research and more. For
example, NASA uses supercomputers for launching space satellites and monitoring
and controlling them for space exploration.
5. Work stations:
It is a single-user computer. Although it is like a personal computer, it has a more
powerful microprocessor and a higher-quality monitor than a microcomputer. In
terms of storage capacity and speed, it comes between a personal computer and
minicomputer. Work stations are generally used for specialized applications such as
desktop publishing, software development, and engineering designs.
APPLICATION OF COMPUTER
Computers play a role in every field of life. They are used in homes, business,
educational institutions, research organizations, medical field, government offices,
entertainment, etc.
Home
Computers are used at homes for several purposes like online bill payment,
watching movies or shows at home, home tutoring, social media access, playing
games, internet access, etc. They provide communication through electronic mail.
They help to avail work from home facility for corporate employees. Computers
help the student community to avail online educational support.
Medical Field
Computers are used in hospitals to maintain a database of patients’ history,
diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic
surgical devices to perform delicate operations, and conduct surgeries remotely.
Virtual reality technologies are also used for training purposes. It also helps to
monitor the fetus inside the mother’s womb.
Entertainment
Computers help to watch movies online, play games online; act as a virtual
entertainer in playing games, listening to music, etc. MIDI instruments greatly help
people in the entertainment industry in recording music with artificial instruments.
Videos can be fed from computers to full screen televisions. Photo editors are
available with fabulous features.
Industry
Computers are used to perform several tasks in industries like managing inventory,
designing purpose, creating virtual sample products, interior designing, video
conferencing, etc. Online marketing has seen a great revolution in its ability to sell
various products to inaccessible corners like interior or rural areas. Stock markets
have seen phenomenal participation from different levels of people through the use
of computers.
Education
Computers are used in education sector through online classes, online examinations,
referring e-books, online tutoring, etc. They help in increased use of audio-visual
aids in the education field.
Government
In government sectors, computers are used in data processing, maintaining a
database of citizens and supporting a paperless environment. The country’s defense
organizations have greatly benefitted from computers in their use for missile
development, satellites, rocket launches, etc.
Banking
In the banking sector, computers are used to store details of customers and conduct
transactions, such as withdrawal and deposit of money through ATMs. Banks have
reduced manual errors and expenses to a great extent through extensive use of
computers.
Business
Nowadays, computers are totally integrated into business. The main objective of
business is transaction processing, which involves transactions with suppliers,
employees or customers. Computers can make these transactions easy and accurate.
People can analyze investments, sales, expenses, markets and other aspects of
business using computers.
Training
Many organizations use computer-based training to train their employees, to save
money and improve performance. Video conferencing through computers allows
saving of time and travelling costs by being able to connect people in various
locations.
Arts
Computers are extensively used in dance, photography, arts and culture. The fluid
movement of dance can be shown live via animation. Photos can be digitized using
computers.
Science and Engineering
Computers with high performance are used to stimulate dynamic process in Science
and Engineering. Supercomputers have numerous applications in area of Research
and Development (R&D). Topographic images can be created through computers.
Scientists use computers to plot and analyze data to have a better understand.
Computer memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored. The memory is
divided into large number of small parts called cells. Each location or cell has a
unique address, which varies from zero to memory size minus one. For example, if
the computer has 64k words, then this memory unit has 64 * 1024 = 65536 memory
locations. The address of these locations varies from 0 to 65535.
Memory is primarily of three types −
Cache Memory
Primary Memory/Main Memory
Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold
those parts of data and program which are most frequently used by the CPU. The
parts of data and programs are transferred from the disk to cache memory by the
operating system, from where the CPU can access them.
Advantages
The advantages of cache memory are as follows −
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
The disadvantages of cache memory are as follows −
Cache memory has limited capacity.
It is very expensive.
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower
than the main memory. These are used for storing data/information permanently.
CPU directly does not access these memories, instead they are accessed via input-
output routines. The contents of secondary memories are first transferred to the
main memory, and then the CPU can access it. For example, disk, CD-ROM, DVD,
etc.
Magnetic devices
Magnetic devices such as hard disk drives use magnetic fields to magnetized tiny
individual sections of a metal spinning disk. Each tiny section represents one bit. A
magnetized section represents a binary '1' and a demagnetized section represents a
binary '0'. These sections are so tiny that disks can contain terabytes (TB) of data.
As the disk is spinning, a read/write head moves across its surface. To write data,
the head magnetizes or demagnetizes a section of the disk that is spinning under it.
To read data, the head makes a note of whether the section is magnetized or not.
Magnetic devices are fairly cheap, high in capacity and durable. However, they are
susceptible to damage if dropped. They are also vulnerable to magnetic fields. A
strong magnet might possibly erase the data the device holds.
Optical devices
Optical devices use a laser to scan the surface of a spinning disc made from metal
and plastic. The disc surface is divided into tracks, with each track containing many
flat areas and hollows. The flat areas are known as lands and the hollows as pits.
When the laser shines on the disc surface, lands reflect the light back, whereas pits
scatter the laser beam. A sensor looks for the reflected light. Reflected light (lands)
represents a binary '1', and no reflection (pits) represents a binary '0'.
Optical media also come in different types:
ROM media have data pre-written on them. The data cannot be overwritten.
Music, films, software and games are often distributed this way.
R media are blank. An optical device writes data to them by shining a laser onto
the disc. The laser burns pits to represent '0's. The media can only be written to
once, but read many times. Copies of data are often made using these media.
RW works in a similar way to R, except that the disc can be written to more than
once.
Solid state devices
Solid state devices use non-volatile random access memory (RAM) to store data
indefinitely. They tend to have much faster access times than other types of device
and, because they have no moving parts, are more durable.
Since this type of memory is expensive, solid state devices tend to be smaller in
capacity than other types. For example, a solid-state drive that holds 256 GB might
be of a similar cost to a hard disk with several terabytes capacity.
Solid state devices require little power, making them ideal for portable devices
where battery life is a big consideration. They are also portable due to their small
size and durability.
Compact disc (CD) a molded plastic disc containing digital data that is
scanned by a laser beam for the reproduction of recorded sound and other
information. Since its commercial introduction in 1982, the audio CD has
almost completely replaced the phonograph disc (or record) for high-fidelity
recorded music Convened by Philips electronics NV and Sony
Corporation in 1980, the compact disc has expanded beyond audio recordings
into other storage-and-distribution uses, notably for computer (CD-ROM) and
entertainment systems(DVD).
Compact disk is the part of Secondary storage device.
RANDOM ACCESS MEMORY (RAM)
RAM (Random Access Memory) is the internal memory of the CPU for storing
data, program, and program result. It is a read/write memory which stores data until
the machine is working. As soon as the machine is switched off, data is erased.
Access time in RAM is independent of the address, that is, each storage location
inside the memory is as easy to reach as other locations and takes the same amount
of time. Data in the RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if
there is a power failure. Hence, a backup Uninterruptible Power System (UPS) is
often used with computers. RAM is small, both in terms of its physical size and in
the amount of data it can hold.
RAM is of two types −
Static RAM (SRAM)
Dynamic RAM (DRAM)
Static RAM (SRAM)
The word static indicates that the memory retains its contents as long as power is
being supplied. However, data is lost when the power gets down due to volatile
nature. SRAM chips use a matrix of 6-transistors and no capacitors. Transistors do
not require power to prevent leakage, so SRAM need not be refreshed on a regular
basis.
There is extra space in the matrix, hence SRAM uses more chips than DRAM for
the same amount of storage space, making the manufacturing costs higher. SRAM
is thus used as cache memory and has very fast access. The accessing time is much
faster approx. 10 millisecond.
ROM stands for Read Only Memory. The memory from which we can only read
but cannot write on it. This type of memory is non-volatile. The information is
stored permanently in such memories during manufacture. A ROM stores such
instructions that are required to start a computer. This operation is referred to
as bootstrap. ROM chips are not only used in the computer but also in other
electronic items like washing machine and microwave oven.
Let us now discuss the various types of ROMs and their characteristics.
MROM (Masked ROM)
The very first ROMs were hard-wired devices that contained a pre-programmed set
of data or instructions. These kind of ROMs are known as masked ROMs, which
are inexpensive.
PROM (Programmable Read Only Memory)
PROM is read-only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM program. Inside
the PROM chip, there are small fuses which are burnt open during programming. It
can be programmed only once and is not erasable.
THE MOTHERBOARD
The motherboard serves as a single platform to connect all of the parts of a computer
together. It connects the CPU, memory, hard drives, optical drives, video card,
sound card, and other ports and expansion cards directly or via cables. It can be
considered as the backbone of a computer.
Features of Motherboard
MEMORY HEIRARCHY
INFORMATION TECHNOLOGY
Information technology (IT) refers to everything that businesses use computers for.
Information technology is building communications networks for a company,
safeguarding data and information, creating and administering databases, helping
employees troubleshoot problems with their computers or mobile devices, or doing
a range of other work to ensure the efficiency and security of business information
systems. Demand for professionals in this field is high and growing, and people
entering the field have a range of career paths to choose from.
Information technology (IT) is the use of any computers, storage, networking and
other physical devices, infrastructure and processes to create, process, store,
secure and exchange all forms of electronic data. Typically, IT is used in the context
of business operations, as opposed to technology used for personal or entertainment
purposes. The commercial use of IT encompasses both computer technology and
telecommunications.
The Harvard Business Review coined the term information technology to make a
distinction between purpose-built machines designed to perform a limited scope of
functions, and general-purpose computing machines that could be programmed for
various tasks. As the IT industry evolved from the mid-20th century, computing
capability increased, while device cost and energy consumption decreased, a cycle
that continues today when new technologies emerge.
Uses Of Information Technology
We can see the uses and role of of information technology in our society in many
fields:
Business
Since the arrival of computers, the entire face of the business world has been
changed. To run the different departments of business swiftly, use of Information
Technology is important and it is possible with computers and softwares. The use of
information technology can be seen in departments such as finance, human
resources, manufacturing, and security. Role of IT can’t be ignored.
Education
Technology enables teachers to be up to date with new techniques and help their
students to be updated with latest technologies such as use of tablets, mobile phones,
computers, etc. in education. Information technology not only helps students to learn
new things but also helps students of college dropouts.
Finance
Information Technology opens the doors for traders and common people to do online
purchases. Banks keep records of all the transactions and accounts through
computers. Unlike before, now the transactions and other deals have become faster
and easier.
Healthcare
With Information Technology, the field of medicine and health has been seeing
tremendous improvements. For doctors, sending and receiving information,
checking patients, and discussing with other experts have become very convenient.
Also, it reduces the time taken in paperwork.
Security
Online transactions and keeping records of all the online transactions are now more
safe than earlier times. Only proper management and a person responsible for the
system can access the data online. It prohibits any random person from checking the
details. All these have been made possible by keeping the system passwords proof.
Only permissible authority can access your information.
Communication
With improvements in information technology, globalization has increased. The
world is brought closer, and the world’s economy is quickly becoming a single
interdependent system. Information can be shared quickly and easily from all over
the glob, and barriers of linguistic and geographic boundaries can be torn down as
people share ideas and information with each other.
Employment
With Information Technology, new jobs have been introduced. It creates new jobs
for programmers, hardware and software developers, systems analyzers, web
designers and many others. Information Technology has opened an entirely new
fields and thousands of jobs for IT professionals.
7. Use of the internet on mobile phones, tablets, laptops, iPods, and other
gadgets has been offering us unlimited access to entertainment mediums.
People can watch movies or new songs on OTT platforms.
8. With the Information technology, communication between people has
become cheaper, easier and faster than ever before. Texting, video calling,
sending e-mails are so easy nowadays. There are so many apps available
online to provide these services.
Ans - The Internet is the most commonly used term in today’s world and plays a
very important role in the everyday life of people. But there are many questions,
answers to which people need to know. In this article, we shall help you find answers
to these questions; discuss the evolution of the Internet, its usage, benefits, history
and how the Internet works.
WWW- is the collection of web pages. That can be easily be published on the
Internet, and read by millions of users on the internet.
Next step was commercializing the usage and making the transistors and
transmitters fit in smaller devices for convenient Internet usage for the general
public. This was introduced in the 1970s
Moving forward, satellites and wireless communication was the main target.
Defense Advanced Research Projects Agency (formerly ARPA), supported
satellite-based radio packets for mobile usage of networks
The next was the development of Transmission Control Protocol (TCP). This
enabled different machines and networks across the world to assemble data
packets. It was in the 1980s that the TCP/IP approach was adapted by
researchers and technologists, following the footsteps of the U.S. Department of
Defence.
With the introduction of personal computers, the demand for commercial
Internet usage increased. This was the time when Ethernet and other Local Area
Networks cam in the foreground
In 1993, the web browser was introduced, which followed the point-and-click
approach and is now a widely used operation for Internet users
The late 1990s was the time when thousands of Internet Service Providers has
taken up the market and most of them were from the U.S.
And then the 21st century brought in an amalgamation of technology and
wireless Internet accessibility for its users. Wherein, wireless broadband
services came in as a boon for Internet users
Amid all these developments which were made, a lot of successes and failures came
in but today, the Internet is one such commodity which has made lives easier and
brought in a wider pace for development across the globe.
In India Internet was started from 15th of August, 1995.
It is important to understand that there are important Internet protocols other than
HTTP. The other protocols work in much the same way as HTTP in that there is a
piece of client software making requests to a server machine running the appropriate
server software. Here are some of the most common and useful protocols.
FTP (File Transfer Protocol): This existed before HTTP and as the name implies
is a protocol for exchanging files over the Internet. There are two types of FTP: non
anonymous and anonymous. With non nonymous FTP, you are required to have an
account name and password on the server in order to access files on the server. When
using non anonymous FTP client software you must provide three things: 1) the
name of the server, 2) the account name, and 3) your password.
When you use non anonymous FTP you are connecting to a server and have access
to certain files on the server for which your account has permission. shows the
screen when you FTP to the server gsbkip.uchicago.edu using the account kmartin
(that is, when you enter As the figure indicates, you can click on file folder icons
and "drill down" through the file structure in a hierarchical fashion just as though
the server were your own machine. Note the contrasts between HTTP and FTP. First,
when you FTP to a server and click on folder or file icons, you remain connected to
that server machine. This is in contrast to HTTP, where a click on a hypertext link
may take you to a different server altogether. The second difference between HTTP
and FTP is that with HTTP you can see the actual content of the files you request
displayed using HTML, whereas with FTP you can see only the folders and
directories where your requested file is housed. With FTP you must first download
a file from the server onto your computer and then open that file, assuming you have
the required software to read it. Note also that when using FTP, the only service we
require from the server is to serve up files. We are not using the server CPU for
computing. Using FTP.
FTP is an important protocol for Internet business. It is an excellent way for a
company to exchange files quickly and securely with customers or partner
companies. Perhaps the most common example is in distributing software. Many
software companies offer their customers the option of using FTP to download
software after making a purchase rather than sending a CD-ROM via the postal
service. Another typical example is provided by a company like Hewlett Packard.
You can go to the HP Web site and download via FTP the most current version of
their printer drivers (software used by an application such as a word processor to
communicate with a specific type of printer). Netscape has always used FTP as a
means to distribute its browser. Of course, FTP use is not restricted to software
companies. Companies might also use FTP to exchange purchase orders. It is also
quite common in the Web development process to create and design Web pages on
a client machine and then FTP the resulting work to the server machine of the Web-
hosting company. If you download software over the Internet using FTP,
it is important to understand the following distinctions:
Public domain software3this is software that is free, carries no copyright, and
there are no restrictions on redistribution of the software. In this context, free
refers to price, not free in the sense of the GNU GPL as developed by Richard
Stallman and described on page 65. Public domain software may well be an
executable binary file with no source code provided.
Freeware3this is software that is free, but is copyrighted. There may be
restrictions on the redistribution of freeware. Again, in this context, free refers to
price, not free in the sense of the GNU GPL as developed by Richard Stallman
and described on page 65. Freeware software may well be an executable binary
file with no source code provided. Also, the policy on use and redistribution may
be considerably more restrictive than in the GNU GPL.
Shareware3this is copyrighted software that is distributed on a "try-before-you-
buy" basis. You download the software using FTP. The software will often have
an expiration date. You use the software until the expiration date. If you like the
software, you purchase it after the trial period ends. Often there is no trial period
and the users are on their honor to purchase this software if they decide to keep
it. This is a surprisingly effective business model. John McAfee used this
shareware model to build a very successful software company based upon his
anti-virus software. Shareware software often requires a purchase of the software
in order to get technical support. The technical support appeals to large
corporations, which motivates them to pay for the software.
Telnet: In a sense, Telnet is the converse of FTP. With FTP you are using a
dumb server3the server is only providing files and all the computing is done on
the client machine. With Telnet, the client machine is nothing more than a dumb
terminal. You connect to the server machine running Telnet server software and
all the computing is done on the server machine. The Telnet URL has the form
telnet://name_of_server
In order to use the Telnet protocol you need Telnet client software. You cannot
Telnet using a browser without this additional client software. When you Telnet
to a server machine, you are given a command line (not GUI) interface to the
server machine. This is akin to being at the 2 o'clock position in Figure 2–1, the
old time-sharing mode of the late 1960s and early 1970s. Telnet is still widely
used, especially in Unix environments. It is a great way to access the CPU of
another machine and test software. Telnet is often used by systems
administrators to connect remotely to computers they are managing.
News: Internet newsgroups are a very common way of exchanging information.
There are newsgroups on everything from archery to zen. An example news
URL is
news://uchinews.uchicago.edu/rec.backcountry
In this URL, news is the service required, uchinews.uchicago.edu is the news
server, and rec.backcountry (a newsgroup devoted to backpacking) is the target
newsgroup desired. In order to access a newsgroup you need client software,
such as Microsoft Outlook, and the server needs to be running the appropriate
server software.
Newsgroups are asynchronous. That is, you post a message, someone responds
at a later date, and you go back to the newsgroup and read the response to your
message. Chat rooms and instant messaging are becoming increasingly popular
because they are
Synchronous.
Mailto: Electronic mail, better known as email, is perhaps the most popular
Internet protocol. As with all Internet software tools, you need client software
and server software to use email. Indeed, when configuring your client email
software to use programs like Eudora or Microsoft Outlook, you have to provide
the name of the server where you send and receive mail. You can also send email
using your browser and the mailto protocol. There is a mail URL for the browser
that has the format
mailto:[email protected]
where mailto is the service required, john doe is the name of the person (or
whatever name the person chooses to go by) to whom you're sending email, and
company.comis the mail address. The mailto tool is similar to Telnet and news,
in that you can execute the URL in a browser, but additional client software is
needed in order to actually use the tool.
File or Path: Unlike the other URLs, this URL is used on the client machine
only. It has a very useful function, which is to let a developer test a Web page
before putting it on a server. Using this URL allows the developer to view a
Web page through a browser where both the browser and Web page are on the
client machine. For example, assume you have a file test.htmlthat you wish to
view in a browser. Assume this file is in the directory tampon the C drive of a
Windows machine. Then the URL
C:\temp\test.html
will allow the user to view test.htmlin the browser. The client machine does not
need to be connected to the Internet in order to use the file URL.
Q. Write about Domain Name System?
Ans -The Domain Name System (DNS) is the phonebook of the Internet. Humans
access information online through domain names, like nytimes.com or espn.com.
Web browsers interact through Internet Protocol (IP) addresses. DNS translates
domain names to IP addresses so browsers can load Internet resources.
Each device connected to the Internet has a unique IP address which other machines
use to find the device. DNS servers eliminate the need for humans to memorize IP
addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP
addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).
Q. Write about IP Address?
Ans - An IP address is a unique address that identifies a device on the internet or a
local network. IP stands for "Internet Protocol," which is the set of rules governing
the format of data sent via the internet or local network.
In essence, IP addresses are the identifier that allows information to be sent between
devices on a network: they contain location information and make devices accessible
for communication. The internet needs a way to differentiate between different
computers, routers, and websites. IP addresses provide a way of doing so and form
an essential part of how the internet works.
How do IP addresses work
If you want to understand why a particular device is not connecting in the way you
would expect or you want to troubleshoot why your network may not be working, it
helps understand how IP addresses work.
Internet Protocol works the same way as any other language, by communicating
using set guidelines to pass information. All devices find, send, and exchange
information with other connected devices using this protocol. By speaking the same
language, any computer in any location can talk to one another.
The use of IP addresses typically happens behind the scenes. The process works like
this:
1. Your device indirectly connects to the internet by connecting at first to a network
connected to the internet, which then grants your device access to the internet.
2. When you are at home, that network will probably be your Internet Service Provider
(ISP). At work, it will be your company network.
3. Your IP address is assigned to your device by your ISP.
4. Your internet activity goes through the ISP, and they route it back to you, using your
IP address. Since they are giving you access to the internet, it is their role to assign
an IP address to your device.
5. However, your IP address can change. For example, turning your modem or router
on or off can change it. Or you can contact your ISP, and they can change it for you.
6. When you are out and about – for example, traveling – and you take your device
with you, your home IP address does not come with you. This is because you will
be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access
the internet and will be using a different (and temporary) IP address, assigned to you
by the ISP of the hotel, airport or coffee shop.
As the process implies, there are different types of IP addresses, which we explore
below.
Types of IP addresses
There are different categories of IP addresses, and within each category, different
types.
Consumer IP addresses
Every individual or business with an internet service plan will have two types of IP
addresses: their private IP addresses and their public IP address. The terms public
and private relate to the network location — that is, a private IP address is used
inside a network, while a public one is used outside a network.
Private IP addresses
Every device that connects to your internet network has a private IP address. This
includes computers, smartphones, and tablets but also any Bluetooth-enabled
devices like speakers, printers, or smart TVs. With the growing internet of things,
the number of private IP addresses you have at home is probably growing. Your
router needs a way to identify these items separately, and many items need a way to
recognize each other. Therefore, your router generates private IP addresses that are
unique identifiers for each device that differentiate them on the network.
Public IP addresses
A public IP address is the primary address associated with your whole network.
While each connected device has its own IP address, they are also included within
the main IP address for your network. As described above, your public IP address is
provided to your router by your ISP. Typically, ISPs have a large pool of IP
addresses that they distribute to their customers. Your public IP address is the
address that all the devices outside your internet network will use to recognize your
network.
Public IP addresses
Public IP addresses come in two forms – dynamic and static.
Dynamic IP addresses
Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of
IP addresses and assign them automatically to their customers. Periodically, they re-
assign them and put the older IP addresses back into the pool to be used for other
customers. The rationale for this approach is to generate cost savings for the ISP.
Automating the regular movement of IP addresses means they don’t have to carry
out specific actions to re-establish a customer's IP address if they move home, for
example. There are security benefits, too, because a changing IP address makes it
harder for criminals to hack into your network interface.
Static IP addresses
In contrast to dynamic IP addresses, static addresses remain consistent. Once the
network assigns an IP address, it remains the same. Most individuals and businesses
do not need a static IP address, but for businesses that plan to host their own server,
it is crucial to have one. This is because a static IP address ensures that websites and
email addresses tied to it will have a consistent IP address — vital if you want other
devices to be able to find them consistently on the web.
This leads to the next point – which is the two types of website IP addresses.
Dial-up internet service is provided through several ISP. The majority of internet
service providers give you a set of telephone numbers either national or local that
allows you to dial into a network that feeds into the internet. This allows you to
receive and send email, search the World Wide Web, participate in chat rooms and
plenty of other features the web has to offer.
In order to get a dial-up internet service a person must definitely have a computer
and even more important a modem. There are different types of modems, and most
of them are inexpensive to purchase. You can have an internal modem installed in a
free slot of your computer, or you can have an external modem that’s hooked up to
the computer through cables. A telephone line is linked to the modem.
DSL Internet –DSL stands for Digital Subscriber Line. Users get a high speed
bandwidth connection from a phone wall jack on an existing telephone network.
DSL works within the frequencies that the telephone doesn’t so you can use the
Internet while making phone calls.
Satellite Internet -Satellite Internet access is Internet access provided
through communication satellites. Modern consumer grade satellite Internet
service is typically provided to individual users through geostationary
satellites that can offer relatively high data speeds, with newer satellites
using Ku band to achieve downstream data speeds up to 506 Mbit/s.[3] In
addition, new satellite internet constellations are being developed in low-earth
orbit to enable low-latency internet access from space.
Application of Internet
Here are the internet applications listed below
1. Smart Home
Smart Home has become the evolutionary ladder in residential and developing as
common as smartphones. It is a special feature of Google and now deployed in many
areas to make life convenient and user-friendly. The smart home is designed to save
time, money and energy.
2. Electronic Devices
Electronic devices like wearables are installed with different sensors and software,
which gather data and information of the user where data is processed to give
required info about the user. The devices mainly used to monitor fitness,
entertainment, and health. They mostly work on ultra-low power and available in
small sizes.
3. Automated Digital Technology
The automated digital technology has concentrated on the optimization of vehicles
and their internal functions. the automated car is designed with special features that
give a comfort zone to passengers with onboard sensors and internet establishment.
Popular companies like Tesla, Apple, BMW, Google is yet to aboard their revolution
in the automobile industry by installing excellent features.
4. Industrial Internet
The industrial internet is investing in industrial engineering with Artificial
intelligence and data analytics to build brilliant machines. The important moto is to
build smart machines that are accurate and compatible with a human. It holds vast
potential with good quality and reliability. The applications are deployed for tracing
the goods to be delivered, real-time data regarding retails and supplies that increase
the efficiency of the business’s supply chain and productivity.
6. Smartphones
Smartphones are also used for retailers and customers to stay connected for their
business transactions, even out of the store. They have using Beacon technology to
help business people to provide smart service to the client. They can track the
products and enhance the store dashboard and deliver premium order before the
scheduled date, even in congested traffic areas.
7. Smart Grids
The idea applied in smart grids is to gather data in an automated way to analyze the
attribute of electricity. Consumers to improve the efficiency and economics of
usage. Smart grids can easily detect the power outage and shortage quickly and fix
them shortly.
8. Major Application
Another major application of the internet is in healthcare as it is smart medical
systems installed to diagnose and cure the disease at an earlier stage. Many machine
learning algorithms are used in image processing and classification to detect the
fetus’s abnormalities before birth. The main aim applied in the medical field is to
provide a healthier life for all by wearing connected devices. The gathered medical
data of patients made the treatment easier, and a monitoring device is installed to
track the sugar and blood pressure.
Advantages of the internet
The internet is a suitable environment to work with people all over the world
through instant communication that can provide products and services easier and
faster.
An internet connection made the employees work from the option to create a
virtual office at home.
The internet connection connects your laptop or pc to internet aided devices
to access cloud computing and cloud storage.
The internet can build a supercomputer to perform and manage complex task.
Conclusion
As discussed, the internet provides enormous application in all fields to reduce
the complexity and on-time delivery with high quality of customer relationship
management. Social media is on-trend to spread the news faster, which gets the
people closer to solve the issue irrespective of time and place.
Disadvantages
1) There is a lot of wrong information on the internet. Anyone can post anything,
and much of it is garbage.
2) There are predators that hang out on the internet waiting to get unsuspecting
people in dangerous situations.
3) Some people are getting addicted to the internet and thus causing problems
with their interactions of friends and loved ones.
4) Pornography that can get in the hands of young children too easily.
5) Easy to waste a lot of time on the internet. You can start surfing, and then
realize far more time has passed than you realized. Internet and television
together of added to the more sedentary lifestyles of people which further
exacerbates the obesity problem.
6) Internet has a lot of "cheater" sites. People can buy essays and pass them off
as their own far more easily than they used to be able to do.
7) There are a lot of unscrupulous businesses that have sprung up on the internet
to take advantage of people.
8) Hackers can create viruses that can get into your personal computer and ruin
valuable data.
WEB BROWSER
A web browser is a type of software that is used to view articles, images, movies,
music, and other information on the World Wide Web or local servers, and to access
other Internet features. Web page html are written in a computer language called,
and web browsers are those HTML. Displays pages on the user's computer. Some
of the main web browsers used on personal computers are Internet Explorer, Mozilla
Firefox, Safari, Opera, Flock and Google Chrome, while the smartphone versions of
web browsers are HTML. Helps to display the pages on the user's mobile.
Each computer supports an operating system, some have Windows,
some have Linux or Unix. Each individual and company sets up an operating system
as per their requirements. The programming of each operating system is different
and the functions are also different. be the same for In such a situation, HTML
(Hyper Text Mark Up Language) came in the common programming language for
information exchange. Its programming and functions were designed to be
understood by web browsers.
Every web browser understands the HTML programming language. Many browsers
in the early days only supported HTML support, but now-a-days browsers support
other programming languages like HTML, such as XHTML, etc.
In 1991, Tim Berner-Lee laid the foundation for the web browser by combining
many technologies.
This web browser was named the World Wide Web, which is also called W.W.W in
short. The page is located as a URL (Uniform Resource Locator) and this URL is
known as the web address. This web address begins with the English alphabet
'HTTP'. Many browsers support URL types other than HTTP and their protocols like
gopher, ftp etc.
1992 – Lynx was a texted-based browser that couldn’t display any graphic
content.
1993 – Mosaic was the first browser to allow images embedded in text
making it “the world’s first most popular browser”.
1994 – A noticeable improvement to Mosaic came Netscape Navigator.
1995 – Internet Explorer made its debut as Microsoft’s first web browser.
1996 – Opera started as a research project in 1994 that finally went public
two years later. This was also arguably the beginning of the browser wars,
mainly between IE 3 and Navigator 3 as Internet Explorer inched ahead
with new capabilities.
2003 – Apple’s Safari browser was released specifically for Macintosh
computers instead of Navigator.
2004 – Mozilla launched Firefox as Netscape Navigator faded out.
2007 – Mobile Safari was introduced as Apple’s mobile web browser and
continues to dominate the iOS market.
2008 – Google Chrome appeared to soon take over the browser market.
2011 – Opera Mini was released to focus on the fast-growing mobile
browser market.
2015 – Microsoft Edge was born to combat Google.
Chrome, Netscape, Opera, and Safari. They are the some Web Browsers
Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the
most commonly used browser in the universe. This was introduced in 1995
along with Windows 95 launch and it has passed Netscape popularity in
1998.
Google Chrome
This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows. Today, chrome is
known to be one of the most popular web browser with its global share of
more than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and
has grown to be the second most popular browser on the Internet.
Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X.
It was first released as a public beta in January 2003. Safari has very good
support for latest technologies like XHTML, CSS2 etc.
Opera
Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, multiple windows, zoom
functions, and more. Java and non Java-enabled versions available. Ideal
for newcomers to the Internet, school children, handicap and as a front-end
for CD-Rom and kiosks.
Konqueror
Konqueror is an Open Source web browser with HTML 4.01 compliance,
supporting Java applets, JavaScript, CSS 1, CSS 2.1, as well as Netscape
plugins. This works as a file manager as well as it supports basic file
management on local UNIX filesystems, from simple cut/copy and paste
operations to advanced remote and local network file browsing.
You can download a latest version of this browser by clicking here
→ Download Konqueror
Lynx
Lynx is a fully-featured World Wide Web browser for users on Unix, VMS,
and other platforms running cursor-addressable, character-cell terminals or
emulators.
INTERNET USING INTERNET EXPLORER
Internet Explorer
PRIVACY
Mail from the U.S. Postal Service comes with a guarantee of privacy. If a
third party opens mail intended for someone else without the addressee's
permission, that person has committed a crime punishable by law. No such
privacy exists in e-mail. Courts have held that employees sending e-mail on
company computers, with company accounts and software, and using
company time have no expectations of privacy. Companies feel free to
examine an employee's e-mail. In addition, e-mail has been summoned on
court cases to prove work environment status.
Employees should never write anything in an e-mail that they would not say
face-to-face to the concerned parties. E-mail is not like private letters that
are received in the mail, torn up, and thrown away. E-mail is backed up,
placed on other servers, and will be retrievable for a long time. Also, the
person to whom e-mail is sent may decide to forward it to others without the
sender's permission.
SECURITY
E-mail is now available in many venues. Checking e-mail on office or home
computers is no longer the only option. E-mail can be transmitted to personal
digital assistants, pagers, and cell phones. These media frequently use
wireless networks. Wireless signals have more security issues than wired
systems. Just as a cell phone call can be intercepted and heard by others,
so can the related e-mail be compromised. When dealing with issues that
should be secure, how the e-mail will be received should be considered.
Most companies would not want third parties to be able to easily glance at a
cell phone display and see proprietary company information.
ACCESS
E-mail is of value only if it is sent to a valid e-mail address where it will be
reviewed by the person one is attempting to contact. Addresses may be
changed and if an address is not current, the e-mail will not be delivered,
resulting in a communication delay. One cannot communicate effectively if
one is missing e-mail addresses or has bad addresses, the other parties do
not use e-mail, or the other parties are not checking their e-mail.
ORGANIZATION
In order to keep up with a barrage of e-mail arriving daily, it is a good idea to
organize one's e-mail. E-mail is received in chronological order, but most e-
mail software will let users sort the chronological list by name of sender or
subject. This way users can find that message they remember getting but
cannot see in their mailbox at first glance. Another option is to move
messages one is finished with to specific folders. Users can even designate
that certain incoming messages be sent directly to a folder or mailbox rather
than their inbox. Users do have to remember to check their e-mail in that
special folder or mailbox, though.
Handling e-mail in a prompt and effective manner is increasingly important
as the volume of e-mail continues to build. Accuracy in responses, as well
as attention to important message details such as grammar and spelling, will
indicate professionalism in corporate communication.
ETIQUETTE
When communicating with e-mail, etiquette is an important convention that
should not be overlooked. E-mail lends itself naturally to brief messages. A
message can be so brief, however, that it is terse and may seem both rude
and abrupt to the receiver. Tone, therefore, is an important issue of etiquette.
This is especially true in communicating with international audiences who
may expect a more extensive exchange of courtesies in the e-mail message.
Correct use of e-mail etiquette includes such courtesies as asking a
message sender for permission before forwarding the sender's message to
others, using an appropriate and clearly understood subject line, and
sending messages only to people who have an interest in receiving them.
Some message senders use emoticons or symbols to indicate nonverbal
communication cues, for instance, :-) (which indicates happiness). Reviews
are mixed on whether emoticons are acceptable in the business use of e-
mail.
JUNK MAIL AND FRAUD ATTEMPTS
Along with receiving a large volume of e-mail is the issue of junk mail
including spam, viruses, and phishing. Spam is unsolicited e-mail that is
delivered usually in mass mailings to the electronic mailbox. The sheer
volume of spam can cause systems to crash. In 2003 the CAN-SPAM Act
was passed in an attempt to better regulate spam. Spam filters have been
taking a bite out of spam by excluding suspicious e-mail messages and
sending them to a quarantine area. The e-mail reader should go to the
quarantine area periodically to see if important messages have been sent
there by accident. Because the spam filter looks for a wide variety of subject
lines, care must be taken to include an explicit and appropriate subject line.
Using something such as "hi" or "it's me" might send messages straight to
the receiver's quarantine box.
Viruses can be attached to e-mail messages, usually through attachments.
A good plan is to scan attachments with a current virus scanner before
opening any that might be suspicious. As more computer users use strong
antivirus programs, this issue may become less important in the future.
Phishing occurs when a message is received that purports to be from an
entity e-mail readers would know, such as their banks, popular shopping
sites, or auction services. If the message is not examined closely, the screen
image and presentation may seem authentic. The message is phishing for
information by trying to get users to reveal valuable personal information
such as account numbers and passwords that the phisher can use for
schemes involving fraud and identity theft.
LEGAL ISSUES
Increasingly, e-mail is becoming involved when legal issues arise. When a
company is the subject of a lawsuit, a subpoena for e-mail and IM is often
served. Having a responsible program to track and save e-mail and IM is
critical to a company's success. Some companies have even made the
decision to outsource the management of electronic resources including e-
mail and IM to ensure that an acceptable program exists in case of legal
issues. Companies should have policies concerning electronic
communication so that employees will know what kind of messages are
acceptable and what are not. Regular training for employees will result in
increasing quality of messages.
TRENDS
Trends in e-mail include better filters and restrictions on spam in the
workplace, control and accountability for both e-mail and newer technology
such as IM, an escalation in the demand to supply e-mail records when legal
issues arise, and more ways to use e-mail in the future. The ability to manage
e-mail effectively will be increasingly.
Spam
E-mail, being real mail, rapidly came to be abused by organizations sending
out millions of unsolicited e-mail messages selling everything from drugs to
insurance to pornography. Such unwanted mail became known as spam.
Spam is one of the negative phenomena associated with e-mail.
Spam came under relatively mild regulation with the passage of the
Controlling the Assault of Non-Solicited Pornography and Marketing Act,
also officially called the CAN-SPAM Act of 2003 (Public Law 108-197). It
became effective in December of 2003 and took effect on January 1, 2004.
The act requires that senders of unsolicited commercial e-mail label their
messages, but Congress did not require a standard labeling language. Such
messages are required to carry instructions on how to opt-out of receiving
such mail; the sender must also provide its actual physical address.
Misleading headers and titles are prohibited. Congress authorized the
Federal Trade Commissioned to establish a "do-not-mail" registry but did not
require the FTC do so. CAN-SPAM also has preemptive features: it prohibits
states from outlawing commercial e-mail or to require their own labeling.
Since 2003 other bills have been proposed but have not been enacted.
With CAN-SPAM in effect, it is at least theoretically possible to curb
unsolicited mail by the tedious effort of answering every piece of spam and
filling in an "opt-out" form. Software for controlling unsolicited e-mail is also
available; the simplest forms of such control require entering addresses from
which mail may be accepted; all other mail is rejected; this technique is very
effective but, obviously, turns e-mail into a private communications service.
E-mail servers also offer effective filtering services. Nonetheless, a rather
negative conclusion must be drawn: with the positive aspects of e-mail go
many negative aspects which threaten to erode the effectiveness of this new
medium.
SEARCH ENGINE
A search engine is a software system that is designed to carry out web
searches. They search the World Wide Web in a systematic way for
particular information specified in a textual web search query.
The search results are generally presented in a line of results, often
referred to as search engine results pages (SERPs) The information
may be a mix of links to web pages, images, videos, info graphics,
articles, research papers, and other types of files. Some search engines
also mine data available in databases or open directories. Unlike web
directories, which are maintained only by human editors, search engines
also maintain real-time information by running an algorithm on a web
crawler. Internet content that is not capable of being searched by a web
search engine is generally described as the deep web.
The first internet search engines predate the debut of the Web in December
1990: WHOIS user search dates back to 1982, and the Knowbot Information
Service multi-network user search was first implemented in 1989. The first
well documented search engine that searched content files,
namely FTP files, was Archie, which debuted on 10 September 1990.
Prior to September 1993, the World Wide Web was entirely indexed by
hand. There was a list of webservers edited by Tim Berners-Lee and hosted
on the CERN webserver. One snapshot of the list in 1992 remains, but as
more and more web servers went online the central list could no longer keep
up. On the NCSA site, new servers were announced under the title "What's
New!"
The first tool used for searching content (as opposed to users) on
the Internet was Archie. The name stands for "archive" without the "v". It was
created by Alan Emtage computer science student at McGill
University in Montreal, Quebec, Canada. The program downloaded the
directory listings of all the files located on public anonymous FTP (File
Transfer Protocol) sites, creating a searchable database of file names;
however, Archie Search Engine did not index the contents of these sites
since the amount of data was so limited it could be readily searched
manually.
The rise of Gopher (created in 1991 by Mark McCahill at the University of
Minnesota) led to two new search programs, Veronica and Jughead. Like
Archie, they searched the file names and titles stored in Gopher index
systems. Veronica (Very Easy Rodent-Oriented Net-wide Index
to Computerized Archives) provided a keyword search of most Gopher
menu titles in the entire Gopher listings. Jughead
(Jonzy's Universal Gopher Excavation And Display) was a tool for obtaining
menu information from specific Gopher servers. While the name of the
search engine "Archie Search Engine" was not a reference to the Archie
comic book series, "Veronica" and "Jughead" are characters in the series,
thus referencing their predecessor.
In the summer of 1993, no search engine existed for the web, through
numerous specialized catalogues were maintained by hand. Oscar
Nierstrasz at the University of Geneva wrote a series of Perl scripts that
periodically mirrored these pages and rewrote them into a standard format.
This formed the basis for W3Catalog, the web's first primitive search engine,
released on September 2, 1993.[15]
In June 1993, Matthew Gray, then at MIT, produced what was probably the
first web robot, the Perl-based World Wide Web Wanderer, and used it to
generate an index called "Wandex". The purpose of the Wanderer was to
measure the size of the World Wide Web, which it did until late 1995. The
web's second search engine Aliweb appeared in November 1993. Aliweb did
not use a web robot, but instead depended on being notified by website
administrators of the existence at each site of an index file in a particular
format.
JumpStation (created in December 1993[16] by Jonathon Fletcher) used
a web robot to find web pages and to build its index, and used a web form as
the interface to its query program. It was thus the first WWW resource-
discovery tool to combine the three essential features of a web search
engine (crawling, indexing, and searching) as described below. Because of
the limited resources available on the platform it ran on, its indexing and
hence searching were limited to the titles and headings found in the web
pages the crawler encountered.
One of the first "all text" crawler-based search engines was WebCrawler,
which came out in 1994. Unlike its predecessors, it allowed users to search
for any word in any webpage, which has become the standard for all major
search engines since. It was also the search engine that was widely known
by the public. Also in 1994, Lycos (which started at Carnegie Mellon
University) was launched and became a major commercial endeavor.
The first popular search engine on the Web was Yahoo! Search.[17] The first
product from Yahoo!, founded by Jerry Yang and David Filo in January
1994, was a Web directory called Yahoo! Directory. In 1995, a search
function was added, allowing users to search Yahoo! Directory![18][19] It
became one of the most popular ways for people to find web pages of
interest, but its search function operated on its web directory, rather than its
full-text copies of web pages.
Soon after, a number of search engines appeared and vied for popularity.
These included Magellan, Excite, Infoseek, Inktomi, Northern Light,
and AltaVista. Information seekers could also browse the directory instead
of doing a keyword-based search.
In 1996, Robin Li developed the RankDex site-scoring algorithm for search
engines results page ranking[20][21][22] and received a US patent for the
technology.[23] It was the first search engine that used hyperlinks to measure
the quality of websites it was indexing,[24] predating the very similar algorithm
patent filed by Google two years later in 1998.[25] Larry Page referenced Li's
work in some of his U.S. patents for PageRank.[26] Li later used his Rankdex
technology for the Baidu search engine, which was founded by Robin Li in
China and launched in 2000.
In 1996, Netscape was looking to give a single search engine an exclusive
deal as the featured search engine on Netscape's web browser. There was
so much interest that instead Netscape struck deals with five of the major
search engines: for $5 million a year, each search engine would be in
rotation on the Netscape search engine page. The five engines were Yahoo!,
Magellan, Lycos, Infoseek, and Excite.
Google adopted the idea of selling search terms in 1998, from a small search
engine company named goto.com. This move had a significant effect on the
SE business, which went from struggling to one of the most profitable
businesses in the Internet.
Search engines were also known as some of the brightest stars in the
Internet investing frenzy that occurred in the late 1990s. Several companies
entered the market spectacularly, receiving record gains during their initial
public offerings. Some have taken down their public search engine, and are
marketing enterprise-only editions, such as Northern Light. Many search
engine companies were caught up in the dot-com bubble, a speculation-
driven market boom that peaked in 1990 and ended in 2000.
1. Google
Google Search Engine is the best search engine in the world and it is also
one of most popular products from Google. Google was founded by Larry
page and Sergey Brin in 4 September 1998, in California, U.S. Almost
70 percent of the Search Engine market has been acquired by Google. The
tech giant is always evolving and looking to improve the search engine
algorithm to provide best results to the end-user. Although Google appears
to be the biggest search engine, as of 2015 YouTube is now more popular
than Google (on desktop computers).
2.Bing
2. Yahoo
Yahoo & Bing compete more with each other than with Google. Yahoo was
founded in January 1994, by Jerry yang and David Filo. A recent report
on netmarketshare.com tells us that Yahoo have a market share of 7.68
percent. Although a leader as a free email provider, this is declining
significantly though with their recent acknowledgement that User.
INSTANT MESSAGING
Instant messaging (IM) technology is a type of online chat allowing real-
time text transmission over the Internet or another computer network.
Messages are typically transmitted between two or more parties, when each
user inputs text and triggers a transmission to the recipient(s), who are all
connected on a common network. It differs from email in that conversations
over instant messaging happen in real-time (hence "instant"). Most modern
IM applications (sometimes called "social messengers", "messaging apps"
or "chat apps") use push technology and also add other features such
as emojis (or graphicalsmileys), file transfer, chatbots, Voice over IP,
or video chat capabilities.
Instant messaging systems tend to facilitate connections between specified
known users (often using a contact list also known as a "buddy list" or "friend
list"), and can be standalone applications or integrated into e.g. a
wider social media platform, or a website where it can for instance be used
for conversational commerce. IM can also consist of conversations in "chat
rooms". Depending on the IM protocol, the technical architecture can
be peer-to-peer (direct point-to-point transmission) or client–server (an IM
service center retransmits messages from the sender to the communication
device). It is usually distinguished from text messaging which is typically
simpler and normally uses cellular phone networks.
Instant messaging was pioneered in the early Internet era; the IRC protocol
was the earliest to achieve wide adoption.[1] Later in the 1990s, ICQ was
among the first closed and commercialized instant messengers, and several
rival services appeared afterwards as it became a popular use of the
Internet.[2] Instant messaging remains very popular today; IM apps are the
most widely used smartphone apps: in 2018 there were over 1.3 billion
monthly users of WhatsApp and Facebook Messenger, and 980
million monthly active users of WeChat.
E-commerce applications
E-commerce is conducted using a variety of applications, such as Email, online
catalogs and shopping carts, Electronic Data Interchange (EDI), the file transfer
protocol, web services and mobile devices. This includes B2B activities and
outreach, such as using email for unsolicited ads, usually viewed as spam, to
consumers and other business prospects, as well as sending out e-newsletters to
subscribers and SMS texts to mobile devices. More companies now try to entice
consumers directly online, using tools such as digital coupons, social media
marketing and targeted advertisements.
The rise of e-commerce has forced IT personnel to move beyond infrastructure
design and maintenance to consider numerous customer-facing aspects, such as
consumer data privacy and security. When developing IT systems and applications
to accommodate e-commerce activities, data governance-related regulatory
compliance mandates, personally identifiable information privacy rules and
information protection protocols must be considered.
E-commerce platforms and vendors
An e-commerce platform is a tool that is used to manage an e-commerce business.
E-commerce platform options exist for clients ranging in size from small businesses
to large enterprises. These e-commerce platforms include online marketplaces such
as Amazon and eBay, that simply require signing up for user accounts, and little to
no IT implementation. Another e-commerce platform model is SaaS, where store
owners can subscribe to "rent" space in a cloud-hosted service that does not require
in-house development or on-premises infrastructure. Other e-commerce platforms
may come in the form of open source platforms that require a hosting environment
(cloud or on premises), complete manual implementation and maintenance.
A few examples of e-commerce marketplace platforms include:
Amazon
eBay
Walmart Marketplace
Chewy
Wayfair
Newegg
Alibaba
Etsy
Overstock
Rakuten
Benefits of EDI
EDI transactions are essential to B2B processes and continue to be the
preferred means to exchange documents and transactions between
businesses both small and large.
There are five key business benefits that EDI technology delivers through
automation and B2B integration:
EDI technology saves time and money through automation of a process
previously manually executed with paper documents.
EDI solutions improve efficiency and productivity because more
business documents are shared and processed in less time with greater
accuracy.
EDI data transfer reduces errors (PDF, 669 KB) through rigid
standardization, which helps to ensure information and data are correctly
formatted before they enter business processes or applications.
EDI integration improves traceability and reporting because electronic
documents can be integrated with a range of IT systems to support data
collection, visibility and analysis.
EDI automation supports positive customer experiences by enabling
efficient transaction execution and prompt, reliable product and service
delivery.
SMART CARD
A smart card, chip card, or integrated circuit card (ICC or IC card) is a
physical electronic authorization device, used to control access to a
resource. It is typically a plastic credit card-sized card with an
embedded integrated circuit (IC) chip.[1] Many smart cards include a pattern
of metal contacts to electrically connect to the internal chip. Others
are contactless, and some are both. Smart cards can provide personal
identification, authentication, data storage, and application processing.
Applications include identification, financial, mobile phones (SIM), public
transit, computer security, schools, and healthcare. Smart cards may provide
strong security authentication for single sign-on (SSO) within organizations.
Numerous nations have deployed smart cards throughout their populations.
The universal integrated circuit card, or SIM card, is also a type of smart
card. As of 2015, 10.5 billion smart card IC chips are manufactured annually,
including 5.44 billion SIM card IC chips.
The basis for the smart card is the silicon integrated circuit (IC) chip.[4] It was
invented by Robert Noyce at Fairchild Semiconductor in 1959, and was
made possible by Mohamed M. Atalla's silicon surface passivation process
(1957) and Jean Hoerni's planar process (1959). The invention of the silicon
integrated circuit led to the idea of incorporating it onto a plastic card in the
late 1960s.[4] Smart cards have since used MOS integrated circuit chips,
along with MOS memory technologies such as flash
memory and EEPROM (electrically erasable programmable read-only
memory).
Some smart card applications include:
The unique data stored can be used to manage the rights and privileges of
each user on different networks.
Smart cards allow secure subscriber authentication, roaming across
networks and secure mobile value-added services. Wireless providers enjoy
the benefit of reduced treachery with the help of security offered by smart
cards.
2) Physical access
There are identity cards for both employees and students in all types of
businesses and universities. The purpose is to grant access to certain
equipment, data, and departments as per one’s needs. These cards contain
identity details of all users which can be checked and scanned.
These cards can be securely used for physical access allowing access only
to authorized users. For highly secured organizations, these smart card
applications act as a tamper-proof device for storing information such as the
user’s fingerprint, image, etc.
3) Domestic purposes
The most commonly used smart cards for domestic purposes are DTH cards.
These cards provide authorized access to information receiving from
satellites. The information received by these cards gets encrypted and
decrypted within it.
4) Government Applications
The advent of smart cards in health care sectors has allowed hospitals to
securely store patients’ medical reports safely and reliably.
It helps authorities to access information quickly, can update if required,
immediate insurance processing, and refunds. Another advantage of this is,
compliance with government authorities for organ donation programs, etc.
8) ID Verification and access control
Smart cards are used for identity verification purposes. It allows mutual
authentication and public-key encryption software to identify the cardholder.
These smart card applications also store personal information including
fingerprint or user’s picture.
9) Schools
Computers have begun using smart cards instead of user names and
passwords. Using these cards, users can be authenticated and authorized
to specific data based on preset privileges.
11) Securing digital content and Physical Assets
The smart card helps to ensure greater security of services and equipment
by giving access to authorized users only.
Types of Smart Cards
Classification based on mechanism
Based on the working mechanism of the cards, they are being classified into
three:
Contact Smart Cards
Contactless Smart Cards
Hybrid Cards
1. Memory cards
These types of cards are used for temporal purposes only. It can only read,
write or store data. A memory capacity of these cards is comparatively low
and cards are often discarded after use. The data once stored cannot be
edited or changed in this type of card.
2. Microprocessors
Microprocessors work like mini computers and have volatile memory. These
are portable and can be fitted in our pockets.
These have vast memory so that you can write, read, rewrite, edit and
manipulate data as required.
Examples of Smart Cards
Smart cards are used as-
Used as payment cards like credit/ debit cards. These are issued by
commercial companies or banks.
Hospitals use these cards to store patient details.
EBT (Electronic benefits transfer) cards are used for the distribution of
government benefits.
Smart cards are used by educational institutions, government authorities
etc for access control.
Mobile Communications
Mobile telephone service (MTS) connects mobile radio telephones with other
networks like public switched telephone networks (PSTN), other mobile
telephones and communication systems like Internet.
Basic Mobile Communications System
Mobile phones and other mobile devices, called mobile stations are
connected to base stations. Communication between the mobile stations
and the base stations are done by wireless radio signals, which may be both
data signals and voice signals. Each base station has a coverage area
around it, such that mobile stations within this area can connect provided
they have access permissions. Base stations contain transmitters and
receivers to convert radio signals to electrical signals and vice versa. Base
stations transmit the message in form of electrical signals to the mobile
switching center (MSC). MSCs are connected to other MSCs and public
networks like PSTNs. Features of Mobile Communication
The following are the features of mobile communication:
o High capacity load balancing: Each wired or wireless infrastructure
must incorporate high capacity load balancing.
High capacity load balancing means, when one access point is
overloaded, the system will actively shift users from one access point to
another depending on the capacity which is available.
Role based access control: Role based access control (RBAC) allows
you to assign roles based on what, who, where, when and how a user or
device is trying to access your network.
Once the end user or role of the devices is defined, access control policies
or rules can be enforced.
o Indoor as well as outdoor coverage options: It is important that your
o Antivirus protection.
o Application filtering
o Protect your network and end users against known and unknown
threads including:
o Zero- day.
o Encrypted malware.
o Ransom ware.
o Malicious botnets.
o Difficult to implement
o Expensive equipment are required
MS- OFFICE
- Microsoft Office is a software which was developed by Microsoft in 1988.
This Office suite comprises various applications which form the core of
computer usage in today’s world.
From the examination point of view, questions from MS Office and its
applications are frequently asked in all the major Government
Exams conducted in the country.
In this article, we shall discuss at length Microsoft Office, its applications,
important notes to prepare for the upcoming examinations and some sample
questions and answers for the reference of candidates.
MS Office Applications & its Functions
Currently, MS Office 2016 version is being used across the world and all its
applications are widely used for personal and professional purposes.
Discussed below are the applications of Microsoft Office along with each of
their functions.
1. MS Word
First released on October 25, 1983
Extension for Doc files is “.doc”
It is useful in creating text documents
Templates can be created for Professional use with the help of MS
Word
Work Art, colours, images, animations can be added along with the text
To read in detail about Microsoft Word, its features, uses and to get some
sample questions based on this program of Office suite, visit the linked
article.
MS Excel
Majorly used for making spreadsheets
Large data can easily be managed and saved in tabular format using MS
Excel
Calculations can be done based on the large amount of data entered into
Also, visit the Microsoft Excel page to get more information regarding this
spreadsheet software and its components.
This table lists the most frequently used shortcuts in Excel.
To do this Press
Close a workbook Ctrl+W
Open a workbook Ctrl+O
Go to the Home tab Alt+H
Save a workbook Ctrl+S
Copy Ctrl+C
Paste Ctrl+V
To do this Press
Undo Ctrl+Z
Remove cell contents Delete
Choose a fill color Alt+H, H
Cut Ctrl+X
Go to Insert tab Alt+N
Bold Ctrl+B
Center align cell contents Alt+H, A, C
Go to Page Layout tab Alt+P
Go to Data tab Alt+A
Go to View tab Alt+W
Open context menu Shift+F10, or
Context key
Add borders Alt+H, B
Delete column Alt+H, D, C
Go to Formula tab Alt+M
Hide the selected rows Ctrl+9
Hide the selected columns Ctrl+0
The ribbon groups related options on tabs. For example, on the Home tab,
the Number group includes the Number Format option. Press the Alt key
to display the ribbon shortcuts, called Key Tips, as letters in small images
next to the tabs and options as shown in the image below.
You can combine the Key Tips letters with the Alt key to make shortcuts
called Access Keys for the ribbon options. For example, press Alt+H to
open the Home tab, and Alt+Q to move to the Tell me or Search field.
Press Alt again to see KeyTips for the options for the selected tab.
In Office 2013 and Office 2010, most of the old Alt key menu shortcuts still
work, too. However, you need to know the full shortcut. For example, press
Alt, and then press one of the old menu keys E (Edit), V (View), I (Insert),
and so on. A notification pops up saying you're using an access key from an
earlier version of Microsoft Office. If you know the entire key sequence, go
ahead and use it. If you don't know the sequence, press Esc and use Key
Tips instead.
To do this Press
Move to the Tell me or Search field on the Alt+Q,
Ribbon and type a search term for then enter
assistance or Help content. the search
term.
Open the File page and use Backstage view. Alt+F
Open the Home tab and format text and Alt+H
numbers and use the Find tool.
Open the Insert tab and insert PivotTables, Alt+N
charts, add-ins, Sparklines, pictures, shapes,
headers, or text boxes.
Open the Page Layout tab and work with Alt+P
themes, page setup, scale, and alignment.
Open the Formulas tab and insert, trace, Alt+M
and customize functions and calculations.
Open the Data tab and connect to, sort, Alt+A
filter, analyze, and work with data.
To do this Press
Open the Review tab and check spelling, Alt+R
add notes and threaded comments, and
protect sheets and workbooks.
Open the View tab and preview page breaks Alt+W
and layouts, show and hide gridlines and
headings, set zoom magnification, manage
windows and panes, and view macros.
To do this Press
Move to the previous cell in a Shift+Tab
worksheet or the previous option
in a dialog.
Move one cell up in a worksheet. Up arrow key
Move one cell down in a Down arrow key
worksheet.
Move one cell left in a Left arrow key
worksheet.
Move one cell right in a Right arrow key
worksheet.
Move to the edge of the current Ctrl+Arrow key
data region in a worksheet.
Enter the End mode, move to the End, Arrow key
next nonblank cell in the same
column or row as the active cell,
and turn off End mode. If the
cells are blank, move to the last
cell in the row or column.
Move to the last cell on a Ctrl+End
worksheet, to the lowest used
To do this Press
row of the rightmost used
column.
Extend the selection of cells to Ctrl+Shift+End
the last used cell on the
worksheet (lower-right corner).
Move to the cell in the upper-left Home+Scroll Lock
corner of the window when
Scroll Lock is turned on.
Move to the beginning of a Ctrl+Home
worksheet.
Move one screen down in a Page Down
worksheet.
Move to the next sheet in a Ctrl+Page Down
workbook.
Move one screen to the right in a Alt+Page Down
worksheet.
Move one screen up in a Page Up
worksheet.
Move one screen to the left in a Alt+Page Up
worksheet.
Move to the previous sheet in a Ctrl+Page Up
workbook.
Move one cell to the right in a Tab key
worksheet. Or, in a protected
worksheet, move between
unlocked cells.
Open the list of validation Alt+Down arrow key
choices on a cell that has data
validation option applied to it.
Cycle through floating shapes, Ctrl+Alt+5, then the
such as text boxes or images. Tab key repeatedly
To do this Press
Exit the floating shape navigation Esc
and return to the normal
navigation.
Scroll horizontally. Ctrl+Shift, then scroll
your mouse wheel up
to go left, down to go
right
Zoom in. CTRL+ALT+=
Zoom out. CTRL+ALT+-
To do this Press
Open the Format Cells dialog. Ctrl+1
Format fonts in the Format Ctrl+Shift+F or
Cells dialog. Ctrl+Shift+P
Edit the active cell and put the F2
insertion point at the end of its
contents. Or, if editing is turned
off for the cell, move the
insertion point into the formula
bar. If editing a formula, toggle
Point mode off or on so you
can use arrow keys to create a
reference.
Insert a note Shift+F2
Open and edit a cell note Shift+F2
Insert a threaded comment Ctrl+Shift+F2
Open and reply to a threaded Ctrl+Shift+F2
comment
To do this Press
Open the Insert dialog to insert Ctrl+Shift+Plus sign (+)
blank cells.
Open the Delete dialog to Ctrl+Minus sign (-)
delete selected cells.
Enter the current time. Ctrl+Shift+colon (:)
Enter the current date. Ctrl+semi-colon (;)
Switch between displaying cell Ctrl+grave accent (`)
values or formulas in the
worksheet.
Copy a formula from the cell Ctrl+apostrophe (')
above the active cell into the
cell or the Formula Bar.
Move the selected cells. Ctrl+X
Copy the selected cells. Ctrl+C
Paste content at the insertion Ctrl+V
point, replacing any selection.
Open the Paste Special dialog. Ctrl+Alt+V
Italicize text or remove italic Ctrl+I or Ctrl+3
formatting.
Bold text or remove bold Ctrl+B or Ctrl+2
formatting.
Underline text or remove Ctrl+U or Ctrl+4
underline.
Apply or remove strikethrough Ctrl+5
formatting.
Switch between hiding objects, Ctrl+6
displaying objects, and
displaying placeholders for
objects.
Apply an outline border to the Ctrl+Shift+ampersand
selected cells. (&)
To do this Press
Remove the outline border Ctrl+Shift+underline (_)
from the selected cells.
Display or hide the outline Ctrl+8
symbols.
Use the Fill Down command to Ctrl+D
copy the contents and format
of the topmost cell of a
selected range into the cells
below.
Apply the General number Ctrl+Shift+tilde sign (~)
format.
Apply the Currency format with Ctrl+Shift+dollar sign
two decimal places (negative ($)
numbers in parentheses).
Apply the Percentage format Ctrl+Shift+percent sign
with no decimal places. (%)
Apply the Scientific number Ctrl+Shift+caret sign
format with two decimal places. (^)
Apply the Date format with the Ctrl+Shift+number sign
day, month, and year. (#)
Apply the Time format with the Ctrl+Shift+at sign (@)
hour and minute, and AM or
PM.
Apply the Number format with Ctrl+Shift+exclamation
two decimal places, thousands point (!)
separator, and minus sign (-)
for negative values.
Open the Insert hyperlink Ctrl+K
dialog.
Check spelling in the active F7
worksheet or selected range.
To do this Press
Display the Quick Analysis Ctrl+Q
options for selected cells that
contain data.
Display the Create Table dialog. Ctrl+L or Ctrl+T
Open the Workbook Statistics
dialog.
3. MS PowerPoint
It was released on April 20, 1987
Used to create audiovisual presentations
tables etc.
The extension for PowerPoint presentations is “.ppt”
To do this Press
Create new presentation. Ctrl+N
Add a new slide. Ctrl+M
Make selected text bold. Ctrl+B
Change the font size for selected text. Alt+H, F, S
Open the Zoom dialog. Alt+W, Q
To do this Press
Cut selected text, object, or slide. Ctrl+X
Copy selected text, object, or slide. Ctrl+C
Paste cut or copied text, object, or slide. Ctrl+V
Undo the last action. Ctrl+Z
Save the presentation. Ctrl+S
Insert a picture. Alt+N, P
Insert a shape. Alt+N, S, H
Open text in Immersive Reader Ctrl+Shift+I
Select a theme. Alt+G, H
Select a slide layout. Alt+H, L
Go to the next slide. Page down
Go to the previous slide. Page up
Go to the Home tab. Alt+H
Go to the Insert tab. Alt+N
Start the slide show. F5
End the slide show. Esc
Close PowerPoint. Ctrl+Q
The ribbon groups related options on tabs. For example, on the Home tab,
the Paragraph group includes the Bullets option. Press the Alt key to
display the ribbon shortcuts, called Key Tips, as letters in small images next
to the tabs and options as shown in the image below.
You can combine the Key Tips letters with the Alt key to make shortcuts
called Access Keys for the ribbon options. For example, press Alt+H to open
the Home tab, and Alt+Q to move to the Tell me or Search field. Press Alt
again to see KeyTips for the options for the selected tab.
In Office 2010, most of the old Alt key menu shortcuts still work, too.
However, you need to know the full shortcut. For example, press Alt, and
then press one of the old menu keys E (Edit), V (View), I (Insert), and so on. A
notification pops up saying you're using an access key from an earlier version
of Microsoft Office. If you know the entire key sequence, go ahead and use
it. If you don't know the sequence, press Esc and use Key Tips instead.
To do this Press
Move to the Tell me or Search field on the Alt+Q, then
Ribbon and type a search term for enter the
assistance or Help content. search
term.
Open the File menu. Alt+F
Open the Home tab and format slides, Alt+H
fonts, paragraphs, or drawings.
Open the Insert tab and insert slides, tables, Alt+N
images, illustrations, forms, links, text,
symbols, or media.
Open the Design tab and apply themes and Alt+G
customize slides.
Open the Transitions tab and add Alt+K
transitions between slides.
Open the Animations tab and add Alt+A
animations to slides.
Open the Slide Show tab and set up and Alt+S
play the slide show.
To do this Press
Open the Review tab and check spelling Alt+R
and accessibility and add comments.
Open the View tab and preview Alt+W
presentation layouts, show and hide
gridlines and guides, set zoom
magnification, manage windows, and view
macros.
Open the Help tab and browse the Alt+Y
PowerPoint, contact support, and leave
feedback.
Note: Add-ins and other programs may add new tabs to the ribbon and
may provide access keys for those tabs.
.
To do this Press
Cycle clockwise through panes in F6
the Normal view.
Cycle counterclockwise through panes in Shift+F6
the Normal view.
Switch between the Thumbnail pane Ctrl+Shift+Tab
and the Outline View pane.
Work in the Outline view
To do this Press
Promote a paragraph. Alt+Shift+Left arrow key
Demote a paragraph. Alt+Shift+Right arrow
key
Move selected paragraphs up. Alt+Shift+Up arrow key
Move selected paragraphs Alt+Shift+Down arrow
down. key
Show level 1 headings. Alt+Shift+1
Expand text below a heading. Alt+Shift+Plus sign (+)
Collapse text below a heading. Alt+Shift+Minus sign (-)
Tip: To multi-select objects with the keyboard use the Selection Pane.
Delete and copy text and objects
To do this Press
Delete one character to the left. Backspace
Delete one word to the left. Ctrl+Backspace
Delete one character to the Delete
right.
Delete one word to the right Ctrl+Delete
(with the cursor between the
words).
Cut selected object or text. Ctrl+X
Copy selected object or text. Ctrl+C
Paste cut or copied object or Ctrl+V
text.
Duplicate an object. Ctrl+D
Ctrl+drag the mouse
Office 2010 and Office
2007: Not available
Undo the last action. Ctrl+Z
Redo the last action. Ctrl+Y
Copy formatting only. Ctrl+Shift+C
Paste formatting only. Ctrl+Shift+V
Copy animation painter. Alt+Shift+C
Office 2010 and Office
2007: Not available
Paste animation painter. Alt+Shift+V
Office 2010 and Office
2007: Not available
Open the Paste Special dialog. Ctrl+Alt+V
Move around in text
To do this Press
Move one character to the left. Left arrow
key
Move one character to the right. Right arrow
key
Move one line up. Up arrow
key
Move one line down. Down arrow
key
Move one word to the left. Ctrl+Left
arrow key
Move one word to the right. Ctrl+Right
arrow key
Move to the end of a line. End
Move to the beginning of a line. Home
Move up one paragraph. Ctrl+Up
arrow key
Move down one paragraph. Ctrl+Down
arrow key
Move to the end of a text box. Ctrl+End
Move to the beginning of a text box. Ctrl+Home
Move to the next title or body text Ctrl+Enter
placeholder. If it is the last placeholder on
a slide, this action inserts a new slide with
the same slide layout as the original slide.
Find and replace text
To do this Press
Open the Find dialog. Ctrl+F
Open the Replace dialog. Ctrl+H
Repeat the last Find action. Shift+F4
Format text
Before using these keyboard shortcuts, select the text you want to format.
Change or resize a font
To do this Press
Open the Font dialog to Ctrl+Shift+F
change the font.
Increase the font size. Ctrl+Shift+Right angle
bracket (>)
Decrease the font size. Ctrl+Shift+Left angle
bracket (<)
Align paragraphs
To do this Press
Center the paragraph. Ctrl+E
Justify the paragraph. Ctrl+J
Left align the paragraph. Ctrl+L
Right align the paragraph. Ctrl+R
To do this Press
Insert a text box. Alt+N, X
Insert an embedded Alt+N, J
document or spreadsheet as
an object.
Insert WordArt. Alt+N, W
Move the focus to the first Ctrl+Alt+5
floating shape, such as an
image or a text box.
Group selected shapes, Ctrl+G
pictures, or WordArt objects.
Ungroup selected group. Ctrl+Shift+G
To do this Press
Copy the attributes of the Ctrl+Shift+C
selected shape.
Paste the attributes to the Ctrl+Shift+V
selected object.
Edit a linked or embedded Shift+F10 (to open the
object. context menu), then O,
Enter, E
Before using these keyboard shortcuts, use the Insert Comment command
(Alt+N, L) to open the Comments pane.
To do this Press
Insert a new comment. Ctrl+N
Reply to a selected comment. Ctrl+R
To do this Press
Open the Selection pane. Alt+H, S, L, P
In Office 2007,
Alt+J, D, A, P
Cycle the focus through the F6
different panes.
Display the context menu. Shift+F10
Move the focus to a single item or Up or Down arrow
group. key
Move the focus from an item in a Left arrow key
group to its parent group.
Move the focus from a group to the Right arrow key
first item in that group.
Expand a focused group and all its Asterisk sign (*) (on
child groups. numeric keypad
only)
Expand a focused group. Plus sign (+) (on
numeric keypad
only)
Collapse a focused group. Minus sign (-) (on
numeric keypad
only)
Move the focus to an item and Shift+Up or Down
select it. arrow key
Select a focused item. Spacebar or Enter
Cancel selection of a focused item. Shift+Spacebar or
Shift+Enter
Move a selected item forward. Ctrl+Shift+F
Move a selected item backward. Ctrl+Shift+B
Show or hide a focused item. Ctrl+Shift+S
To do this Press
Rename a focused item. F2
Switch the keyboard focus within Tab key or
the Selection pane between tree Shift+Tab
view and the Show All and Hide
All buttons.
Collapse all groups (with the focus Alt+Shift+1
must be in the tree view of the
Selection pane).
Expand all groups. Alt+Shift+9
To do this Press
Move to a task pane from another F6
pane in the program window. (You
may need to press F6 more than
once.)
When a task pane option has focus, Tab or Shift+Tab
move to the next or previous option
in the task pane.
Display the full set of commands on Ctrl+Spacebar
the task pane menu. You can, for
In Office
example, Close, Move, or Size the
2010Ctrl+Down
task pane from this menu.
arrow key
Move to the next command on the Up and Down
task pane menu. arrow keys
Select the highlighted option on the Enter
task pane menu.
To do this Press
Move or resize the task pane after Arrow keys
the corresponding command has
been selected.
Open the Clipboard. Alt+H, F, O
Close the task pane. Ctrl+Spacebar, C
To do this Press
Open the Print dialog. Ctrl+P
Print all slides in your presentation as full page Alt+P, P
slides using your default printer settings (when
the Print dialog is open).
Display the Notes pane in the Normal view. Alt+W, P,
N
Show or hide the grid. Shift+F9
Show or hide guides. Alt+F9
4. MS Access
It was released on November 13, 1992
It is Database Management Software (DBMS)
Table, queries, forms and reports can be created on MS Access
Import and export of data into other formats can be done
The file extension is “.accdb”
5. MS Outlook
It was released on January 16, 1997
It is a personal information management system
It can be used both as a single-user application or multi-user software
Its functions also include task managing, calendaring, contact managing,
journal logging and web browsing
It is the email client of the Office Suite
The file extension for an Outlook file is “.pst”
6. MS OneNote
It was released on November 19, 2003
It is a note-taking application
When introduced, it was a part of the Office suite only. Later, the
developers made it free, standalone and easily available at play store for
android devices
The notes may include images, text, tables, etc.
Apart from the applications mentioned above, various other applications are
included in the MS Office suite but these are most commonly used
Ms office was developed in 1988.
Microsoft Office Versions
Version name Release Date/ Year
Microsoft Office for Windows October 1990
Microsoft Office 3.0 August 30, 1992
Microsoft Office 4.x 1994
Microsoft Office 1995 August 24, 1995
Microsoft Office 1997 1997
Microsoft Office 2000 June 7, 1997
Microsoft Office XP May 31, 2001
Microsoft Office 2003 October 21, 2003
Microsoft Office 2007 January 30, 2007
Microsoft Office 2010 June 15, 2010
Microsoft Office 2013 January 30, 2012
Microsoft Office 2016 September 22, 2015