FOC Notes
FOC Notes
UNIT-I
INTRODUCTION TO COMPUTERS
Computer
“A computer is a programmable electronic device that accepts raw data as input and processes it
with a set of instructions (a program) to produce the result as output. It renders output just after
performing mathematical and logical operations and can save the output for future use”.
Page 1
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Characteristics of Computer
Speed
A computer works with much higher speed and accuracy compared to humans while performing
mathematical calculations. Computers can process millions (1,000,000) of instructions per second.
The time taken by computers for their operations is microseconds and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.
Diligence
A computer can perform millions of tasks or calculations with the same consistency and accuracy.
It doesn‟t feel any fatigue or lack of concentration. Its memory also makes it superior to that of
human beings.
Versatility
Versatility refers to the capability of a computer to perform different kinds of works with same
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set
Page 2
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Automation
Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.
Memory
A computer has built-in memory called primary memory where it stores data. Secondary storage
are removable devices such as CDs, pen drives, etc., which are also used to store data.
Answer:
block diagram gives you a quick overview of the working process of a computer from inputting
Page 3
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Input Unit
• Output Unit
Input Unit
The Input Unit consists of input devices such as a mouse, keyboard, scanner, joystick, etc. These
devices are used to input information or instruction into the computer system. Like other
Page 4
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
electronic machines, a computer takes inputs as raw data (binary data) and performs necessary
processing giving out processed data. Therefore, the input unit is the medium of communication
that takes data from us to the computer in an organized manner for processing.
• The input unit converts the inputted data or instructions into binary form for further processing.
• Input Unit transmits the data to the main memory of the computer.
CPU or Central Processing Unit is known as the brain of the computer system. It is an electronic
hardware device that processes all the operations (e.g., arithmetic and logical operations) of the
computer. In other words, all the major calculations, operations or comparisons are performed
inside the CPU. It is also responsible for handling the operations of several other units.
In the above diagram, the Control Unit (CU) and Arithmetic & Logic Unit (ALU) are jointly
Let's discuss all the parts displayed in the above diagram one by one:
Control Unit
As the name suggests, the control unit of a CPU controls all the activities and operations of the
computer. It is also responsible for controlling input/output, memory, and other devices
Page 5
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
The control unit acts like the supervisor which determines the sequence in which computer
programs and instructions are executed. It retrieves instructions from memory, decodes the
instructions, interprets the instructions and understands the sequence of tasks to be performed
accordingly. It further transmits the instructions to the other parts of the computer system to
execute them. In short, the control unit determines the sequence of operations to execute the given
instructions.
The data inputted through input devices is stored in the primary storage unit. The Arithmetic Logic
The arithmetic unit controls simple operations such as addition, subtraction, division, and
multiplication.
On the other side, the logical unit controls the logical operations such as AND, OR, Equal, greater
than, and less than, etc. Apart from it, the logic unit also responsible for performing several other
The information or data is transmitted to ALU from the storage unit only when it is required. After
completing the operations, the result is either returned to the storage unit for further processing or
getting stored.
Page 6
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Memory Unit
Memory Unit is an essential part of the computer system which is used to store data and
instructions before and after processing. The memory unit transmits the information to other units
Primary Memory
The primary memory cannot store a vast amount of data. The data stored in the primary memory
is temporary. The data will be lost if they are disconnected from the power supply. The primary
memory usually stores the input data and immediate calculation results. The primary memory is
also known as the Main Memory or temporary memory. Random Access Memory (RAM) is an
Secondary Memory
The use of primary memory is not possible to store data permanently for future access. Therefore,
there are some other options to store the data permanently for future use, which is known as
secondary memory or auxiliary storage or permanent storage. The data stored in the secondary
memory is safe even when there is a power failure or no power supply. Hard Disk is usually
Note: Primary memory is the only memory that is directly accessible to the CPU. Secondary
memory is not directly accessible to the CPU. The data accessed from the secondary unit is first
loaded into RAM and then further transferred to the Processing Unit. The use of different
Page 7
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• The CPU controls all components, software and data processing of the computer system.
• The CPU takes data from input devices, executes the data, and sends output to the output
devices.
• The CPU processes all the operations, including all the arithmetical and logical operations.
Output Unit
The output unit consists of devices that are used to display the results or output of processing. The
output data is first stored in the memory and then displayed in human-readable form throughoutput
devices. Some of the widely used output devices are Monitor, Printer, and Projector.
• The output unit accepts the data or information in binary form from the main memory of the
computer system.
• The output unit converts the binary data into a human-readable form for better understanding.
Answer:
Input Devices
Page 8
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Input device enables the user to send data, information, or control signals to a computer. The
Central Processing Unit (CPU) of a computer receives the input and processes it to produce the
output.
• Keyboard
• Mouse
• Scanner
• Joystick
• Light Pen
• Digitizer
• Microphone
• Digital Camera
• Paddle
• Steering Wheel
• Light Gun
• Touch Pad
• Remote
• Touch screen
Page 9
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• VR
• Webcam
• Biometric Devices
1) Keyboard
The keyboard is a basic input device that is used to enter data into a computer or any other
electronic device by pressing keys. It has different sets of keys for letters, numbers, characters, and
functions. Keyboards are connected to a computer through USB or a Bluetooth device for wireless
communication.
Types of keyboards: There can be different types of keyboards based on the region and language
2) Mouse
The mouse is a hand-held input device which is used to move cursor or pointer across the screen.
It is designed to be used on a flat surface and generally has left and right button and a scroll wheel
between them. Laptop computers come with a touchpad that works as a mouse. It lets you control
the movement of cursor or pointer by moving your finger over the touchpad. Some mouse comes
The mouse was invented by Douglas C. Engelbart in 1963. Early mouse had a roller ball integrated
as a movement sensor underneath the device. Modern mouse devices come with optical technology
that controls cursor movements by a visible or invisible light beam. A mouse is connected to a
computer through different ports depending on the type of computer and type of
Page 10
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
a mouse.
3) Scanner
The scanner uses the pictures and pages of text as input. It scans the picture or a document. The
scanned picture or document then converted into a digital format or file and is displayed on the
screen as an output. It uses optical character recognition techniques to convert images into digital
4) Joystick
A joystick is also a pointing input device like a mouse. It is made up of a stick with a spherical
base. The base is fitted in a socket that allows free movement of the stick. The movement of stick
The first joystick was invented by C. B. Mirick at the U.S. Naval Research Laboratory. A joystick
can be of different types such as displacement joysticks, finger-operated joysticks, hand operated,
isometric joystick, and more. In joystick, the cursor keeps moving in the direction of the joystick
unless it is upright, whereas, in mouse, the cursor moves only when the mouse moves.
Light Pen
A light pen is a computer input device that looks like a pen. The tip of the light pen contains a
light-sensitive detector that enables the user to point to or select objects on the display screen. Its
light sensitive tip detects the object location and sends the corresponding signals to the CPU. It is
not compatible with LCD screens, so it is not in use today. It also helps you draw on the screen if
Page 11
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
needed. The first light pen was invented around 1955 as a part of the Whirlwind project at the
Digitizer
Digitizer is a computer input device that has a flat surface and usually comes with a stylus. It
enables the user to draw images and graphics using the stylus as we draw on paper with a pencil.
The images or graphics drawn on the digitizer appear on the computer monitor or display screen.
The software converts the touch inputs into lines and can also convert handwritten text to
typewritten words.
It can be used to capture handwritten signatures and data or images from taped papers.
Furthermore, it is also used to receive information in the form of drawings and send output to a
CAD (Computer-aided design) application and software like AutoCAD. Thus, it allows you to
Microphone
The microphone is a computer input device that is used to input the sound. It receives the sound
vibrations and converts them into audio signals or sends to a recording medium. The audio signals
are converted into digital data and stored in the computer. The microphone also enables the user
to telecommunicate with others. It is also used to add sound to presentations and with webcams
MICR computer input device is designed to read the text printed with magnetic ink. MICR is a
Page 12
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
character recognition technology that makes use of special magnetized ink which is sensitive to
magnetic fields. It is widely used in banks to process the cheques and other organizations where
security is a major concern. It can process three hundred cheques in a minute with hundred- percent
accuracy. The details on the bottom of the cheque (MICR No.) are written with magnetic ink. A
laser printer with MICR toner can be used to print the magnetic ink.
The device reads the details and sends to a computer for processing. A document printed in
magnetic ink is required to pass through a machine which magnetizes the ink, and the magnetic
OCR computer input device is designed to convert the scanned images of handwritten, typed or
printed text into digital text. It is widely used in offices and libraries to convert documents and
It processes and copies the physical form of a document using a scanner. After copying the
documents, the OCR software converts the documents into a two-color (black and white),version
called bitmap. Then it is analyzed for light and dark areas, where the dark areas are selected as
characters, and the light area is identified as background. It is widely used to convert hard copy
legal or historic documents into PDFs. The converted documents can be edited if required like we
Digital camera:
It is a digital device as it captures images and records videos digitally and then stores them on a
Page 13
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
memory card. It is provided with an image sensor chip to capture images, as opposed to film used
by traditional cameras. Besides this, a camera that is connected to your computer can also be
It has photosensors to record light that enters the camera through the lens. When the light strikes
the photosensors, each of the sensors returns the electrical current, which is used to create the
images.
Biometric Devices:
Biometrics refers to a process in which a person is identified through his or her biological features
such as fingerprints, eye cornea, face structure, etc. It is done by using biometric devices, which
can be of different types based on their scanning features and abilities, such as:
i) Face Scanner:
Face Scanner
It is designed to identify a person by scanning his or her face. It takes the face measurements of a
person. For example, the distance between eyes, nose, and mouth, etc., accordingly, it confirms
the identity of a person. Besides this, it is smart enough to differentiate between a person's picture
The hand of a person can also be used to verify his or her identity as every person has a unique
pattern of veins in the palm, just like fingerprints. This device takes advantage of this feature; it
Page 14
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
identifies a person by scanning the palm of his hand. It uses infrared light to scan veins' patterns
and blood flowing in them. Palm is even more unique than fingerprints.
It scans the fingerprints to identify people or for biometric authentication. This device is
developed, keeping in mind the fact that no two persons in the world can have the same
attendance of employees. This type of scanners captures the pattern of valleys and ridges found on
a finger and store it in the memory or database. When you press your finger on the given space, it
Answer:
Output Devices
The output device displays the result of the processing of raw data that is entered in the computer
through an input device. There are a number of output devices that display output in different ways
• Monitor
• CRT Monitor
• LCD Monitor
Page 15
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• LED Monitor
• Plasma Monitor
• Printer
• Impact Printers
• Character Printers
• Line printers
• Drum printers
• Chain printers
• Non-impact printers
• Laser printers
• Inkjet printers
• Projector
1) Monitor
The monitor is the display unit or screen of the computer. It is the main output device that
2) Printer
A printer produces hard copies of the processed data. It enables the user, to print images, text or
Page 16
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Based on the printing mechanism, the printers are of two types: Impact Printers and Non-impact
Printers.
3) Projector
Projector
A projector is an output device that enables the user to project the output onto a large surface such
as a big screen or wall. It can be connected to a computer and similar devices to project their
output onto a screen. It uses light and lenses to produce magnified texts, images, and videos. So,
Modern projects (digital projectors) come with multiple input sources such as HDMI ports for
newer equipment and VGA ports that support older devices. Some projectors are designed to
support Wi-Fi and Bluetooth as well. They can be fixed onto the ceiling, placed on a stand, and
more and are frequently used for classroom teaching, giving presentations, home cinemas, etc
Liquid Crystal Display (LCD) digital projector: This type of digital projectors are very popular as
they are lightweight and provide crisp output. An LCD projector uses transmissive technology to
produce output. It allows the light source, which is a standard lamp, to pass through the three
colored liquid crystal light panels. Some colors pass through the panels and some are blocked by
Page 17
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Digital Light Processing (DLP) digital projector: It has a set of tiny mirrors, a separate mirror for
each pixel of the image and thus provide high-quality images. These projectors are mostly used
Answer:
Computer Storage Device Definition: A hardware device which can be used to store digital data
and applications which may be in the form of images, video, audio, etc. is called a storage device.
It is a key component of a computer and the hard drive is one of its examples.
There are four types of devices in which computer data can be stored. Discussed below are the
same in detail.
The most commonly used storage devices in today‟s time are magnetic storage devices. Theseare
affordable and easily accessible. A large amount of data can be stored in these through magnetised
mediums.
A magnetic field is created when the device is attached to the computer and with the help of the
two magnetic polarities, the device is able to read the binary language and store the information.
Page 18
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Floppy Disk – Also known as a floppy diskette, it is a removable storage device which is
in the shape of a square and comprises magnetic elements. When placed in the disk reader
of the computer device, it spins around and can store information. Lately, these floppy
disks have been replaced with CDs, DVDs and USB drives
• Hard Drive – This primary storage device is directly attached to the motherboard‟s disk
application to the device. Software programs, images, videos, etc. can all be saved in a hard
drive and hard drives with storage space in terabytes are also easily available now
• Zip Disk – Introduced by Iomega, is a removable storage device which was initially
released with a storage space of 100 MB which was later increased to 250 and then finally
750 MB
• Magnetic Strip – A magnetic strip is attached in the device comprising digital data. The
most suitable example for this is a debit card which has a strip placed on one of its sides
Such devices used lasers and lights to detect and store data. They are cheaper in comparison to
USB drives and can store more data. Discussed below are a few commonly used optical storage
devices.
• CD-ROM – This stands for Compact Disc – Read-Only Memory and is an external device
which can store and read data in the form of audio or software data
Page 19
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Blu-Ray Disc – Introduced in 2006, Blu-ray disk was backup up by major IT and computer
layer disc
• DVD – Digital Versatile Disc is another type of optical storage device. It can be readable,
recordable, and rewritable. Recordings can be done in such devices and then can be
• CD-R – It is a readable Compact Disc which uses photosensitive organic dye to record
data and store it. They are a low-cost replacement for storing software and applications
Answer:
Computers are divided into different types based on different criteria. Based on the size, a
• Micro Computer
• Mini Computer
• Mainframe Computer
• Super Computer
• Workstations
1. Micro Computer:
It is a single-user computer which has less speed and storage capacity than the other types. It
Page 20
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
uses a microprocessor as a CPU. The first microcomputer was built with 8-bit microprocessor
chips. The common examples of microcomputers include laptops, desktop computers, personal
digital assistant (PDA), tablets, and smartphones. Microcomputers are generally designed and
developed for general usage like browsing, searching for information, internet, MS Office, social
media, etc.
2. Mini Computer:
Mini-computers are also known as "Midrange Computers." They are not designed for a single.
They are multi-user computers designed to support multiple users simultaneously. So, they are
generally used by small businesses and firms. Individual departments of a company use these
computers for specific purposes. For example, the admission department of a University can use
3. Mainframe Computer:
It is also a multi-user computer capable of supporting thousands of users simultaneously. They are
used by large firms and government organizations to run their business operations as they canstore
and process large amounts of data. For example, Banks, universities, and insurance companies use
mainframe computers to store the data of their customers, students, and policyholders,
respectively.
4. Super Computer:
Super-computers are the fastest and most expensive computers among all types of computers. They
have huge storage capacities and computing speeds and thus can perform millions of
Page 21
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
instructions per second. The super-computers are task-specific and thus used for specialized
research and more. For example, NASA uses supercomputers for launching space satellites and
5. Work stations:
and speed, it comes between a personal computer and minicomputer. Work stations are generally
used for specialized applications such as desktop publishing, software development, and
engineering designs.
Answer:
The Number System is the system of representing numbers. The various types of Number Systems
used in Maths and other applications are binary, decimal, octal, hexadecimal, etc.
Definition :
A Number System is defined as a system of writing to express numbers that can be easily
understood by the person it was intended for. It is the mathematical notation for representing
numbers of a given set by using various other digits along with other symbols in a predefined
structured manner. It hence proves to provide a unique representation for every number and
Page 22
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
represents the arithmetic and algebraic structure of the figures, thereby allowing us to operate
• The digit
There are various types of number systems in mathematics and computer science. The four most
Answer:
i) Trackball Mouse:
It is a stationary input device that has ball mechanism to move the pointer or cursor on the
Page 23
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
screen. The ball is half inserted in the device and can be easily rolled with finger, thumb or the
palm to move the pointer on the screen. The device has sensor to detect the rotation of ball. It
remains stationary; you don't need to move it on the operating surface. So, it is an ideal device if
you have limited desk space as you don't need to move it like a mouse.
It has a system of a ball and several rollers to track its movement. It is a corded type of mouse. A
mechanical mouse can be used for high performance. The drawback is that they tend to get dust
An optical mouse uses optical electronics to track its movement. It is more reliable than a
mechanical mouse and also requires less maintenance. However, its performance is affected by
the surface on which it is operated. Plain non-glossy mouse mat should be used for best results.
The rough surface may cause problems for the optical recognition system, and the glossy surface
may reflect the light wrongly and thus may cause tracking issues.
As the name suggests, this type of mouse lacks cable and uses wireless technology such as IrDA
(infrared) or radio (Bluetooth or Wi-Fi) to control the movement of the cursor. It is used to improve
the experience of using a mouse. It uses batteries for its power supply.
Page 24
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
The impact printer uses a hammer or print head to print the character or images onto the paper.
The hammer or print head strikes or presses an ink ribbon against the paper to print characters and
images.
• Character Printers
• Line printers
A) Character Printers
Character printer prints a single character at a time or with a single stroke of the print head or
hammer. It does not print one line at a time. Dot Matrix printer and Daisy Wheel printer are
character printers. Today, these printers are not in much use due to their low speed and because
only the text can be printed. The character printers are of two types, which are as follows:
Dot Matrix Printer is an impact printer. The characters and images printed by it are the patterns
of dots. These patterns are produced by striking the ink soaked ribbon against the paper with a
print head. The print head contains pins that produce a pattern of dots on the paper to form the
individual characters. The print head of a 24 pin dot matrix contains more pins than a 9 pin dot
matrix printer, so it produces more dots which results in better printing of characters. To produce
color output, the black ribbon can be changed with color stripes. The speed of Dot Matrix printers
Page 25
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Daisy Wheel Printer was invented by David S. Lee at Diablo Data Systems.It consists of a wheel
or disk that has spokes or extensions and looks like a daisy, so it is named Daisy Wheel printer. At
the end of extensions, molded metal characters are mounted. To print a character the printer rotates
the wheel, and when the desired character is on the print location the hammer hits disk and the
extension hits the ink ribbon against the paper to create the impression. It cannot be used to print
graphics and is often noisy and slow, i.e., the speed is very low around 25-50 characters per second.
B) Line Printers:
Line printer, which is also as a bar printer, prints one line at a time. It is a high-speed impact printer
as it can print 500 to 3000 lines per minute. Drum printer and chain printer are examples of line
printers.
i) Drum Printer:
Drum printer is a line printer that is made of a rotating drum to print characters. The drum has
circular bands of characters on its surface. It has a separate hammer for each band of characters.
When you print, the drum rotates, and when the desired character comes under the hammer, the
hammer strikes the ink ribbon against the paper to print characters. The drum rotates at a very high
speed and characters are printed by activating the appropriate hammers. Although all the characters
are not printed at a time, they are printed at a very high speed. Furthermore, it can print only a
predefined style as it has a specific set of characters. These printers are known to be very noisy
Page 26
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Page 27
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Chain Printer
Chain printer is a line printer that uses a rotating chain to print characters. The characters are
embossed on the surface of the chain. The chain rotates horizontally around a set of hammers, for
each print location one hammer is provided, i.e., the total number of hammers is equal to the total
The chain rotates at a very high speed and when the desired character comes at the print location,
the corresponding hammer strikes the page against the ribbon and character on the chain.They can
type 500 to 3000 lines per minute. They are also noisy due to the hammering action.
Non-Impact Printer:
Non-impact printers don't print characters or images by striking a print head or hammer on the ink
ribbon placed against the paper. They print characters and images without direct physical contact
between the paper and the printing machinery. These printers can print a complete page at a time,
so they are also known as page printers. The common types of non-impact printers are Laser printer
i) Laser Printer:
Laser Printer
A laser printer is a non-impact printer that uses a laser beam to print the characters. The laser beam
hits the drum, which is a photoreceptor and draws the image on the drum by altering
Page 28
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
electrical charges on the drum. The drum then rolls in toner, and the charged image on the drum
picks the toner. The toner is then printed on the paper using heat and pressure. Once the document
is printed, the drum loses the electric charge,and the remaining toner is collected. The laser printers
use powdered toner for printing instead of liquid ink and produce quality print objects with a
Inkjet Printer
The inkjet printer is a non-impact printer that prints images and characters by spraying fine, ionized
drops of ink. The print head has tiny nozzles to spray the ink. The printer head moves back and
forth and sprays ionized drops of ink on the paper, which is fed through the printer. These drops
pass through an electric field that guides the ink onto the paper to print correct images and
characters.
An inkjet printer has cartridges that contain ink. Modern inkjet printers are color printers that have
four cartridges containing different colors: Cyan, Magenta, Yellow, and Black. It is capable of
printing high-quality images with different colors. It can produce print objects with a resolution of
Page 29
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
UNIT-II
Answer:
An operating system, or "OS," is software that communicates with the hardware and allows
other programs to run. It is comprised of system software, or the fundamental files your
computer needs to boot up and function. Every desktop computer, tablet, and smartphone
includes an operating system that provides basic functionality for the device.
Common desktop operating systems include Windows, OS X, and Linux. While each OS is
different, most provide a graphical user interface, or GUI, that includes a desktop and the
ability to manage files and folders. They also allow you to install and run programs written for
the operating system. Windows and Linux can be installed on standard PC hardware, while OS
X is designed to run on Apple systems. Therefore, the hardware you choose affects what
Answer:
An Operating System provides services to both the users and to the programs.
Page 30
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Program execution
• I/O operations
• Communication
• Error Detection
• Resource Allocation
• Protection
Program execution
Operating systems handle many kinds of activities from user programs to system programs
like printer spooler, name servers, file server, etc. Each of these activities is encapsulated as a
process.
A process includes the complete execution context (code to execute, data to manipulate,
registers, OS resources in use). Following are the major activities of an operating system with
Page 31
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
I/O Operation
An I/O subsystem comprises of I/O devices and their corresponding driver software. Drivers
An Operating System manages the communication between user and device drivers.
• I/O operation means read or write operation with any file or any specific I/O device.
• Operating system provides the access to the required I/O device when required.
A file represents a collection of related information. Computers can store files on the disk
(secondary storage), for long-term storage purpose. Examples of storage media include
magnetic tape, magnetic disk and optical disk drives like CD, DVD. Each of these media has
its own properties like speed, capacity, data transfer rate and data access methods.
A file system is normally organized into directories for easy navigation and usage. These
directories may contain files and other directions. Following are the major activities of an
Page 32
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• The operating system gives the permission to the program for operation on file.
Communication
In case of distributed systems which are a collection of processors that do not share memory,
peripheral devices, or a clock, the operating system manages communications between all the
processes. Multiple processes communicate with one another through communication lines in
the network.
The OS handles routing and connection strategies, and the problems of contention and security.
Following are the major activities of an operating system with respect to communication −
• Both the processes can be on one computer or on different computers, but are connected
Message Passing.
Page 33
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Error handling
Errors can occur anytime and anywhere. An error may occur in CPU, in I/O devices or in the
memory hardware. Following are the major activities of an operating system with respect to
error handling −
Resource Management
cycles and files storage are to be allocated to each user or job. Following are the major activities
Protection
Considering a computer system having multiple users and concurrent execution of multiple
processes, the various processes must be protected from each other's activities.
users to the resources defined by a computer system. Following are the major activities of an
Page 34
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• The OS ensures that external I/O devices are protected from invalid access attempts.
Operating systems are there from the very first computer generation and they keep evolving
with time. In this chapter, we will discuss some of the important types of operating systems
The users of a batch operating system do not interact with the computer directly. Each user
prepares his job on an off-line device like punch cards and submits it to the computer operator.
To speed up processing, jobs with similar needs are batched together and run as a group. The
programmers leave their programs with the operator and the operator then sorts the programs
• CPU is often idle, because the speed of the mechanical I/O devices is slower than the
CPU.
Page 35
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Time-sharing is a technique which enables many people, located at various terminals, to use
The main difference between Multiprogrammed Batch Systems and Time-Sharing Systems is
that in case of Multiprogrammed batch systems, the objective is to maximize processor use,
Multiple jobs are executed by the CPU by switching between them, but the switches occur so
frequently. Thus, the user can receive an immediate response. For example, in a transaction
processing, the processor executes each user program in a short burst or quantum of
computation. That is, if n users are present, then each user can get a time quantum. When the
user submits the command, the response time is in few seconds at most.
The operating system uses CPU scheduling and multiprogramming to provide each user with
a small portion of a time. Computer systems that were designed primarily as batch systems
Page 36
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Problem of reliability.
Distributed systems use multiple central processors to serve multiple real-time applications
and multiple users. Data processing jobs are distributed among the processors accordingly.
The processors communicate with one another through various communication lines (such as
high-speed buses or telephone lines). These are referred as loosely coupled systems or
distributed systems. Processors in a distributed system may vary in size and function. These
• With resource sharing facility, a user at one site may be able to use the resources
available at another.
• Speedup the exchange of data with one another via electronic mail.
• If one site fails in a distributed system, the remaining sites can potentially continue
operating.
Page 37
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
A Network Operating System runs on a server and provides the server the capability to manage
data, users, groups, security, applications, and other networking functions. The primary
purpose of the network operating system is to allow shared file and printer access among
multiple computers in a network, typically a local area network (LAN), a private network or
to other networks.
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
• Upgrades to new technologies and hardware can be easily integrated into the system.
• Remote access to servers is possible from different locations and types of systems.
Page 38
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
A real-time system is defined as a data processing system in which the time interval required
to process and respond to inputs is so small that it controls the environment. The time taken by
the system to respond to an input and display of required updated information is termed as the
response time. So in this method, the response time is very less as compared to online
processing.
Real-time systems are used when there are rigid time requirements on the operation of a
processor or the flow of data and real-time systems can be used as a control device in a
dedicated application. A real-time operating system must have well-defined, fixed time
constraints, otherwise the system will fail. For example, Scientific experiments, medical
imaging systems, industrial control systems, weapon systems, robots, air traffic control
systems, etc.
Hard real-time systems guarantee that critical tasks complete on time. In hard real-time
systems, secondary storage is limited or missing and the data is stored in ROM. In these
Page 39
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Soft real-time systems are less restrictive. A critical real-time task gets priority over other tasks
and retains the priority until it completes. Soft real-time systems have limited utility than hard
real-time systems. For example, multimedia, virtual reality, Advanced Scientific Projects likes
Answer:
and store files, run the software, play games, watch videos, and provides a way to connect to
the internet. It was released for both home computing and professional works.
It was released for both home computing and professional functions of Windows on 10
November 1983. Later, it was released on many versions of Windows as well as the current
In 1993, the first business-oriented version of Windows was released, which is knownas
Windows NT 3.1. Then it introduced the next versions, Windows 3.5, 4/0, and Windows
2000. When the XP Windows was released by Microsoft in 2001, the company designed its
various versions for a personal and business environment. It was designed based on standard
x86 hardware, like Intel and AMD processor. Accordingly, it can run on different brands of
hardware, such as HP, Dell, and Sony computers, including home-built PCs.
Page 40
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Editions of Windows
Microsoft has produced several editions of Windows, starting with Windows XP. These
versions have the same core operating system, but some versions included advance features
with an additional cost. There are two most common editions of Windows:
o Windows Home
o Windows Professional
Windows Home
Windows Home is basic edition of Windows. It offers all the fundamental functions of
Windows, such as browsing the web, connecting to the Internet, playing video games, using
office software, watching videos. Furthermore, it is less expensive and comes pre-installed
Answer:
Android is an open source and Linux-based Operating System for mobile devices such as
smartphones and tablet computers. Android was developed by the Open Handset Alliance, led
Android offers a unified approach to application development for mobile devices which means
developers need only develop for Android, and their applications should be able to run on
Page 41
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
The first beta version of the Android Software Development Kit (SDK) was released by Google
in 2007 where as the first commercial version, Android 1.0, was released in September 2008.
On June 27, 2012, at the Google I/O conference, Google announced the next Android version,
4.1 Jelly Bean. Jelly Bean is an incremental update, with the primary aim of improving the
The source code for Android is available under free and open source software licenses. Google
publishes most of the code under the Apache License version 2.0 and the rest, Linux kernel
Features of Android
Page 42
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Answer:
IOS stands for iphone operating system. It is a proprietary mobile operating system of apple
for its handheld. It supports Objective-C, C, C++, Swift programming language. It is based
on the Macintosh OS X. iPhone, ipod and iPad all comes with IOS.
• Multitasking
• Social Media
• iCloud
• In-App purchase
• Game Center
• Notification Center
• Accelerometer
• Gyroscope
• Powerful APIs
• GPS
• Accessibility
Page 43
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Bluetooth
• Orientations
• Camera integration
• Location services
• Maps
History
iPhone was first release in June, 2007 and on September 5, 2007, Apple released the iPod Touch
which had most of the non phone abilities of the iPhone. In june 2010 apple rebranded iPhone Os
as iOS. iPad first generation was released in April 2010 and iPad Mini was released in November
2012.
Page 44
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Register as a developer.
Page 45
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
7. Define Networking
Answer:
Networking refers to the total process of creating and using computer networks, with respect to
hardware, protocols and software, including wired and wireless technology. It involves the
application of theories from different technological fields, like IT, computer science and
computer/electrical engineering.
Answer:
Goals of Computer Networks: The following are some important goals of computer networks:
1. Resource Sharing –
apart. Ex. A group of office workers can share a common printer, fax, modem, scanner,
etc.
Page 46
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
2. High Reliability –
If there are alternate sources of supply, all files could be replicated on two or more
machines. If one of them is not available, due to hardware failure, the other copies could
be used.
3. Inter-process Communication –
through the network. In order to permit this, the network must provide almost error-free
communications.
4. Flexible access –
Files can be accessed from any computer in the network. The project can be begun on one
Other goals include Distribution of processing functions, Centralized management, and allocation
communication, etc.
Answer:
Page 47
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
1. Resource Sharing:
The goal is to make all programs, equipments(like printers etc), and especially data, available to
anyone on the network without regard to the physical location of the resource and the user.
2. Server-Client model:
One can imagine a company's information system as consisting of one or more databases and some
employees who need to access it remotely. In this model, the data is stored on powerful computers
called Servers. Often these are centrally housed and maintained by a system administrator. In
contrast, the employees have simple machines, called Clients, on their desks, using which they
3. Communication Medium:
A computer network can provide a powerful communication medium among employees. Virtually
every company that has two or more computers now has e-mail (electronic mail), which
4. eCommerce:
A goal that is starting to become more important in businesses is doing business with consumers
over the Internet. Airlines, bookstores and music vendors have discovered that many customers
like the convenience of shopping from home. This sector is expected to grow quickly in the
Page 48
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
future.
Mobile computers, such as notebook computers and Mobile phones, is one of the fastest-growing
Some of the most important uses of the Internet for home users are as follows:
• Person-to-person communication
• Interactive entertainment
• Electronic commerce
Page 49
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Answer:
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four
types:
o Local Area Network is a group of computers connected to each other in a small area such
Page 50
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
as building, office.
o LAN is used for connecting two or more personal computers through a communication
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
Page 51
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Page 52
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
o Personal Area Network is used for connecting the computer devices of personal use is
o Thomas Zimmerman was the first research scientist to bring the idea of the Personal
Area Network.
o Personal computer devices that are used to develop the personal area network are the
Page 53
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.
o Offline Network: An offline network can be created inside the home, so it is also known
as a home network. A home network is designed to integrate the devices such asprinters,
Page 54
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
o Small Home Office: It is used to connect a variety of devices to the internet and to a
o Government agencies use MAN to connect to the citizens and private industries.
o In MAN, various LANs are connected to each other through a telephone exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3,
ADSL, etc.
Page 55
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
o A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o A Wide Area Network is widely used in the field of Business, government, and
education.
Page 56
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
o Last mile: A telecom company is used to provide the internet services to the customers
o Private network: A bank provides a private network that connects the 44 offices. This
network is made by using the telephone leased line provided by the telecom company.
Page 57
Advantages Of Wide Area Network:
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
o Geographical area: A Wide Area Network provides a large geographical area. Suppose
Page 58
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
if the branch of our office is in a different city then we can connect with them through
WAN. The internet provides a leased line through which we can connect with another
branch.
o Get updated files: Software companies work on the live server. Therefore, the
o Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, Whatsapp, Skype allows you to communicate with friends.
o Sharing of software and resources: In WAN network, we can share the software and
o High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases the
o Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security
Page 59
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
problem.
o Needs Firewall & antivirus software: The data is transferred on the internet which can
be changed or hacked by the hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the
Internetwork
network segments are connected using devices, and they are configured by a local
Types Of Internetwork:
as Transmission Control protocol and internet protocol. It is used for information sharing.
Page 60
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
The access to the extranet is restricted to only those users who have login credentials. An extranet
is the lowest level of internetworking. It can be categorized as MAN, WAN or other computer
networks. An extranet cannot have a single LAN, atleast it must have one connection to the
external network.
which is only accessible by the organization's employee or members. The main aim of the
intranet is to share the information and resources among the organization employees. An intranet
Intranet advantages:
o Collaboration: Collaboration is one of the most important advantage of the intranet. The
information is distributed among the employees of the organization and can only be
o Cost effective: People can see the data and documents by using the browser and distributes
the duplicate copies over the intranet. This leads to a reduction in the cost.
Page 61
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
UNIT-III
Answer:
A spreadsheet is a file that exists of cells in rows and columns and can help arrange, calculate
and sort data. Data in a spreadsheet can be numeric values, as well as text,
The rows in a spreadsheet have numeric names (1, 2, 3 etc) and the columns have alphabetic
names (a, b, c etc), thus the names of cells subsequently exist of a letter and a number that
The most common reason to use spreadsheets is to store and organize data, like revenue,
payroll and accounting information. Spreadsheets allow the user to make calculations with this
Answer:
MS Excel allows us to keep the header and footer in our spreadsheet document.
Page 62
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
MS Excel allows us to find the needed data (text and numbers) in the workbook and also
3. Password Protection
It allows the user to protect their workbooks by using a password from unauthorized access to
their information.
4. Data Filtering
Filtering is a quick and easy way to find and work with a subset of data in a range. A filtered
range displays only the rows that meet the criteria you specify for a column. MS Excel provides
5. Data Sorting
Data sorting is the process of arranging data in some logical order. MS Excel allows us to sort
6. Built-in formulae
MS Excel has got many built-in formulae for sum, average, minimum, etc. We can use those
Page 63
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
MS Excel allows us to create different charts such as bar graph, pie- charts, line graphs, etc.
MS Excel automatically edits the result if any changes are made in any of the cells.
9. Formula Auditing
Using formula auditing we can graphically display or trace the relationships between cells and
formulas with blue arrows. We can trace the precedents (the cells that provide data to a specific
cell) or the dependents (the cells that depend on the value in a specific cell).
Answer:
Excel provides you different types of charts that suit your purpose. Based on the type of data,
you can create a chart. You can also change the chart type later.
• Column Chart
• Line Chart
• Pie Chart
• Doughnut Chart
• Bar Chart
• Area Chart
Page 64
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• XY (Scatter) Chart
• Bubble Chart
• Stock Chart
• Surface Chart
• Radar Chart
• Combo Chart
Each of these chart types have sub-types. In this chapter, you will have an overview of the
different chart types and get to know the sub-types for each chart type.
Column Chart
A Column Chart typically displays the categories along the horizontal (category) axis and
values along the vertical (value) axis. To create a column chart, arrange the data in columns or
• Clustered Column.
• Stacked Column.
• 3-D Column.
Page 65
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Line Chart
Line charts can show continuous data over time on an evenly scaled Axis. Therefore, they are
ideal for showing trends in data at equal intervals, such as months, quarters or years.
In a Line chart −
To create a Line chart, arrange the data in columns or rows on the worksheet.
• Line
• Stacked Line
• 3-D Line
Pie Chart
Pie charts show the size of items in one data series, proportional to the sum of the items. The
data points in a pie chart are shown as a percentage of the whole pie. To create a Pie Chart,
Page 66
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Pie
• 3-D Pie
• Pie of Pie
• Bar of Pie
Doughnut Chart
A Doughnut chart shows the relationship of parts to a whole. It is similar to a Pie Chart with
the only difference that a Doughnut Chart can contain more than one data series, whereas, a
A Doughnut Chart contains rings and each ring representing one data series. To create a
Bar Chart
Bar Charts illustrate comparisons among individual items. In a Bar Chart, the categories are
organized along the vertical axis and the values are organized along the horizontal axis. To
create a Bar Chart, arrange the data in columns or rows on the Worksheet.
• Clustered Bar
• Stacked Bar
Page 67
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Area Chart
Area Charts can be used to plot the change over time and draw attention to the total value
across a trend. By showing the sum of the plotted values, an area chart also shows the
relationship of parts to a whole. To create an Area Chart, arrange the data in columns or rows
on the worksheet.
• Area
• Stacked Area
• 3-D Area
XY (Scatter) Chart
XY (Scatter) charts are typically used for showing and comparing numeric values, like
Page 68
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
It combines x and y values into single data points and displays them in irregular intervals, or
clusters. To create a Scatter chart, arrange the data in columns and rows on the worksheet.
Place the x values in one row or column, and then enter the corresponding y values in the
• You want to adjust the independent axis scales of a scatter chart to reveal more
• You want to show similarities between large sets of data instead of differences between
data points.
o The more data that you include in a scatter chart, the better the comparisons you
can make.
• Scatter
Page 69
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Bubble Chart
A Bubble chart is like a Scatter chart with an additional third column to specify the size of
the bubbles it shows to represent the data points in the data series.
• Bubble
Stock Chart
As the name implies, Stock charts can show fluctuations in stock prices. However, a Stock
chart can also be used to show fluctuations in other data, such as daily rainfall or annual
temperatures.
To create a Stock chart, arrange the data in columns or rows in a specific order on the
worksheet. For example, to create a simple high-low-close Stock chart, arrange your data with
• High-Low-Close
Page 70
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Open-High-Low-Close
• Volume-High-Low-Close
• Volume-Open-High-Low-Close
Surface Chart
A Surface chart is useful when you want to find the optimum combinations between two sets
of data. As in a topographic map, colors and patterns indicate areas that are in the same range
of values.
• Ensure that both the categories and the data series are numeric values.
• 3-D Surface
• Contour
• Wireframe Contour
Radar Chart
Radar charts compare the aggregate values of several data series. To create a Radar chart,
Page 71
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Radar
• Filled Radar
Combo Chart
Combo charts combine two or more chart types to make the data easy to understand, especially
when the data is widely varied. It is shown with a secondary axis and is even easier to read.
To create a Combo chart, arrange the data in columns and rows on the worksheet.
• Custom Combination
4. What is MS presentation?
Answer:
MS PowerPoint is a program that is included in the Microsoft Office suite. It is used to make
Page 72
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
The image given below shows the main page of MS PowerPoint, where a person lands when
Answer:
Animations control how objects move onto, off of, and around your slides. Transitions control
how your presentation moves from one slide to the next. This lesson teaches you howto create
animations and transitions. It also teaches how to spell-check your document, how
to use the Outline and Slides tabs, how to use Sorter view, and how to print.
Page 73
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Add Animations
You can animate the objects on your PowerPoint slides. PowerPoint provides four types of
animations: Entrance, Emphasis, Exit, and Motion Paths. An Entrance animation determines the
manner in which an object appears on a slide; for example, an object can move onto a slide. An
Emphasis animation does something to draw attention to an object; for example, the object can
become larger. An Exit animation determines the manner in which an object leaves a slide; for
example, an object can move off a slide. A Motion Paths animation determines how an object moves
around a slide; for example, an object can move from left toright.
After you add an animation, you can use the Custom Animation pane to modify it by choosing
an effect. Choosing an effect enables you to define what starts the animation, its properties
(such the direction from which an object moves onto the slide), and control the speed of the
animation. In addition, you can have an animation start when you click the mouse, start along
with the previous animation, or start at a specified time after the previous animation.
If the Auto Preview box is checked on the Custom Animation pane, PowerPoint provides you
with preview of your animation after you create it and each time you modify it. You can also
use the Play button on the Custom Animation pane to preview an animation.
To choose an effect:
Page 74
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
appears.
To modify an effect:
1. Click the down arrow next to the Start field on the Custom Animations pane and then select
2. Click the down arrow next to the Property field on the Custom Animations pane and the
select the property you want. The Property field might be labeled Direction, Size, or some
other property.
3. Click the down arrow next to the Speed field on the Custom Animations pane and then
To preview the animation, click the Play button on the Custom Animations pane.
EXERCISE 1
Page 75
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
appears.
7. Click Fly In. PowerPoint applies the effect. If the Auto preview box is checked,
Page 76
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
1. Click the down arrow next to the Start field and then select After Previous.
2. Click the down arrow next to the Direction field and then select From Bottom.
3. Click the down arrow next to the Speed field and then select Medium.
4. Click Fly In. PowerPoint applies the effect. If the Auto preview box is checked,
Page 77
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
1. Click the down arrow next to the Start field and then select After Previous. The Apply for
Financial Aid field appears in the center of the Custom Animation pane.
2. Click the down arrow next to the Apply for Financial Aid field and then click Timing.
Page 78
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
4. Click OK.
5. Click the down arrow next to the Direction field and then select From Bottom.
6. Click the down arrow next to the Speed field and then select Medium. If the Auto preview
box is checked, PowerPoint automatically provides you with a preview of the animation.
You can click the Play button on the Custom Animation pane at
Page 79
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Add Transitions
Transitions determine how your presentations move from one slide to the next. For example,
a slide can move up onto the screen and replace the previous slide. PowerPoint provides several
transition methods. You can add sound to a transition and you can control its speed. You can
A transition can occur when the presenter clicks the mouse or after the amount of time you
specify.
1. On the Slides tab, hold down the Ctrl key and then click the slides to which you want to
3. Click the More button in the Transition to this Slide group. A menu of transitions appears.
4. Click the transition you want to apply. PowerPoint applies the transition. As you roll your
pointer over each transition, PowerPoint provides you with a live preview of the transition.
Page 80
2. Click the More button in the Transition to this Slide group. A menu of transitions
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
appears.
Page 81
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
3. Click the transition you want to apply. As you roll your pointer over each transition,
4. Click the Apply to All button in the Transition to This Slide group.
2. Click the down arrow next to the Transition Sound field and then click the sound you want.
As you roll your pointer over each sound, PowerPoint plays the sound.
2. Click the down arrow next to the Transition Speed field and then click the speed you want.
If you want the transition to occur after the presenter clicks the mouse, check the On Mouse
Click check box. If you want a transition to occur after a specified period of time, check the
Automatically After check box and then specify the amount of time you want to elapse before
the transition occurs. The On Mouse Click check box and the Automatically After check box
are both located on the Animations tab in the Transition to This Slide group.
EXERCISE 2
Add Transitions
Page 82
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
2. Click the More button in the Transition to this Slide group. A menu of transitions
appears.
3. Click the Push Up transition. As you roll your pointer over each transition, PowerPoint
Page 83
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
1. Click the down arrow next to the Transition Sound field and then click Click.
2. Click the down arrow next to the Transition Speed field and then click Slow.
Answer:
PowerPoint presentations are useful for both personal and professional usage. Given below are
• Education – With e-learning and smart classes being chosen as a common mode of
education today, PowerPoint presentations can help in making education more interactive
important. Using graphs and charts, numbers can be shown more evidently and clearly
Page 84
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Depicting Growth – Since both graphics and text can be added in a presentation,
depicting the growth of a company, business, student‟s marks, etc. is easier using PPT.
Page 85
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
UNIT-IV
INTRODUCTION TO INTERNET
1. Define Internet.
Answer:
The Internet is a global network of billions of computers and other electronic devices. With
the Internet, it's possible to access almost any information, communicate with anyone else in
You can do all of this by connecting a computer to the Internet, which is alsocalled
going online. When someone says a computer is online, it's just another way of saying it's
Page 86
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Answer:
An Internet Service Provider (ISP) is the industry term for the company that is able to provide
you with access to the Internet, typically from a computer. If you hear someone talking about
the Internet and they mention their “provider,” they‟re usually talking about their ISP.
Your ISP makes the Internet a possibility. In other words, you can have a shiny computer with
a built-in modem and could have a router for networking, but without a subscription with an
For the typical homeowner or apartment dweller, the ISP is usually a “cable company” that,
in addition, or offering a TV subscription, also offers an Internet subscription. You don‟t get
both for the price of one, however. You can get just cable TV or just high-speed Internet, or
both.
An ISP is your gateway to the Internet and everything else you can do online. The second your
connection is activated and set up, you‟ll be able to send emails, go shopping, do research, and
more. The ISP is the link or conduit between your computer and all the other “servers” on the
Internet. You may feel like you‟re talking to your mom directly through email, but in reality,
it‟s more “indirectly.” Your email goes from your computer to the ISP computers/servers,
where it‟s sent along to its destination through other servers on the network.
Page 87
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Answer:
Information security, also known as infosec is the process of securing data and information
secure from any kind of violations in the form of theft, abuse or loss. Information security aims
to protect data at different stages- whether it is while storing it, transferring it or usingit. For
practical reasons, it is also referred to as data security as it involves protecting all kinds of
Information security has evolved as one of the main requirements of businesses worldwide
today. Since data is our main asset in the digital economy, it becomes of paramount importance
to protect that data. Companies of all scales, from big corporate giants to self- funded startups
have all started to invest in information security, creating a huge demand for experts in the
domain.
Answer:
the information system of another individual or organization. Usually, the attacker seeks some
Page 88
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
viruses, and worms. Malware breaches a network through a vulnerability, typically when a
user clicks a dangerous link or email attachment that then installs risky software. Once inside
• Covertly obtains information by transmitting data from the hard drive (spyware)
Phishing
Phishing is the practice of sending fraudulent communications that appear to come from a
reputable source, usually through email. The goal is to steal sensitive data like credit card and
common cyberthreat.
Man-in-the-middle attack
Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers
insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can
1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor‟s device and
the network. Without knowing, the visitor passes all information through the attacker.
Page 89
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
2. Once malware has breached a device, an attacker can install software to process all of the
victim‟s information.
Denial-of-service attack
A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources
and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can
also use multiple compromised devices to launch this attack. This is known asa distributed-
SQL injection
A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code
into a server that uses SQL and forces the server to reveal information it normally would not.
An attacker could carry out a SQL injection simply by submitting malicious code into a
Zero-day exploit
A zero-day exploit hits after a network vulnerability is announced but before a patch or solution
is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-
DNS Tunneling
DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It
sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to
Page 90
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling VPN
services. They can be used to disguise outbound traffic as DNS, concealing data that is
typically shared through an internet connection. For malicious use, DNS requests are
can also be used for command and control callbacks from the attacker‟s infrastructure to a
compromised system.
Though often used interchangeably, the terms information security and cybersecurity are
actually two different domains. Cybersecurity is a broader domain which deals with all kinds
of digital security activities which involves securing all kinds of IT assets from any kind
misuse, theft and disclosure. Information security is a specific sub-domain under the umbrella
domain of cybersecurity. Similar to information security, there are other sub- domains within
Answer:
Information security is based on three main aspects of data security, frequently referred to as
ensures that any kind of information is not disclosed to unauthorised sources or is not
Page 91
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
accessed by any unwarranted party. Information security systems put processes in place
to identify and block any kind of unauthorised access attempts. These processes range from
data theft and misuse. Confidentiality is highly valued in all kinds of business setups
because of competitor aggression, cyber crimes and more. Information security addresses
2. Integrity: This is another key aspect of information security. Integrity refers to the process
of ensuring that data is maintained in its intended state and not modified by any accident
or compromised in any other way. Edits, if any are made to the data should be done in such
a way that if anything is modified accidentally, could be recovered back. Integrity systems
in information security consist of tools that can verify data integrity andprovide adequate
defence against any kind of breach. These systems also help you backup data frequently
so that you can restore the most authentic version. Data integrityis an extremely important
Businesses always prefer high availability since it enables seamless operations with
optimised data usage. High or effective availability also results in ready information
availability of any data depends on the hardware and software of the device. Hence,
information security professionals take special care to keep both the hardware and software
requirements in place.
Page 92
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Answer:
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity and integrity
1. Key Generation Algorithms : Digital signature are electronic signatures, which assures
that the message was sent by a particular sender. While performing digital transactions
authenticity and integrity should be assured, otherwise the data can be altered or someone
2. Signing Algorithms: To create a digital signature, signing algorithms like email programs
create a one-way hash of the electronic data which is to be signed. The signing algorithm
then encrypts the hash value using the private key (signature key). This encrypted hash
along with other information like the hashing algorithm is the digital signature. This digital
signature is appended with the data and sent to the verifier. The reason for encrypting the
hash instead of the entire message or document is that a hash function converts any
arbitrary input into a much shorter fixed length value. This saves time as now instead of
signing a long message a shorter hash value has to be signed and moreover hashing is much
3. Signature Verification Algorithms : Verifier receives Digital Signature along with the
data. It then uses Verification algorithm to process on the digital signature and the public
Page 93
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
key (verification key) and generates some value. It also applies the same hash function on
the received data and generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then the digital signature is
1. Message digest is computed by applying hash function on the message and then message
digest is encrypted using private key of sender to form the digital signature. (digital
signature = encryption (private key of sender, message digest) and message digest =
transmitted)
3. Receiver decrypts the digital signature using the public key of sender.(This assures
authenticity,as only sender has his private key so only sender can encrypt using his private
5. The receiver can compute the message digest from the message (actual message is sent
6. The message digest computed by receiver and the message digest (got by decryption on
Page 94
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Message digest is computed using one-way hash function, i.e. a hash function in which
computation of hash value of a message is easy but computation of the message from hash
Answer:
Information Security threats can be many like Software attacks, theft of intellectual property,
Threat can be anything that can take advantage of a vulnerability to breach security and
Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many users believe
that malware, virus, worms, bots are all same things. But they are not same, only similarity is
malicious software that can be an intrusive program code or a anything that is designed to
Page 95
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Methods
1. Malware Actions
1. Virus – They have the ability to replicate themselves by hooking them to the program on
the host computer like songs, videos etc and then they travel all over the Internet. The
Creeper Virus was first detected on ARPANET. Examples include File Virus, Macro Virus,
2. Worms – Worms are also self replicating in nature but they don‟t hook themselves to the
program on host computer. Biggest difference between virus and worms is that worms are
network aware. They can easily travel from one computer to another if network is available
and on the target machine they will not do much harm, they will for example consume hard
3. Trojan – The Concept of Trojan is completely different from the viruses and worms. The
name Trojan derived from the „Trojan Horse‟ tale in Greek mythology, which explains
how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a big
wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
trusted the gift blindly. In the night, the soldiers emerged and attacked the city from the
inside.
Their purpose is to conceal themselves inside the software that seem legitimate and when that
Page 96
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
software is executed they will do their task of either stealing information or any other purpose
They often provide backdoor gateway for malicious programs or malevolent users to enter
your system and steal your valuable data without your knowledge and permission. Examples
4. Bots –: can be seen as advanced form of worms. They are automated processes that are
designed to interact over the internet without the need of human interaction. They can be
good or bad. Malicious bot can infect one host and after infecting will create connection to
the central server which will provide commands to all infected hosts attached to that
1. Adware – Adware is not exactly malicious but they do breach privacy of the users. They
display ads on computer‟s desktop or inside individual programs. They come attached with
free to use software, thus main source of revenue for such developers. They monitor your
interests and display relevant ads. An attacker can embed malicious code inside the
software and adware can monitor your system activities and can even compromise your
machine.
computer and reveal collected information to interested party. Spyware are generally
dropped by Trojans, viruses or worms. Once dropped they installs themselves and sits
Page 97
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
One of the most common example of spyware is KEYLOGGER. The basic job of keylogger
is to record user keystrokes with timestamp. Thus capturing interesting information like
3. Ransomware – It is type of malware that will either encrypt your files or will lock your
computer making it inaccessible either partially or wholly. Then a screen will be displayed
4. Scareware – It masquerades as a tool to help fix your system but when the software is
executed it will infect your system or completely destroy it. The software will display a
message to frighten you and force to take some action like pay them to fix your system.
5. Rootkits – are designed to gain root access or we can say administrative privileges in the
user system. Once gained the root access, the exploiter can do anything from stealing
6. Zombies – They work similar to Spyware. Infection mechanism is same but they don‟t
spy and steal information rather they wait for the command from hackers.
• Identity theft means to act someone else to obtain person‟s personal information or to
access vital information they have like accessing the computer or social media account of
Page 98
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Theft of equipment and information is increasing these days due to the mobile nature
• Sabotage means destroying company‟s website to cause loss of confidence on part of its
customer.
payment in exchange. For example ransomware may lock victims file making them
inaccessible thus forcing victim to make payment in exchange. Only after payment
These are the old generation attacks that continue these days also with advancement every
year. Apart from these there are many other threats. Below is the brief description of these new
generation threats.
Page 99