ICT Notes
ICT Notes
Definition:
Computer is a digital electronic device that take input (data), processes it and converts it into output
(information) which is useful to people.
Types of computers
There are three main types of computer:
Analog computer
Analog computer represents data as a continuous spectrum of values, and gives output in form of voltage
signals like pressure, temperature, voltage, speed and weight. Some examples of analog computers are;
Thermometer Flight Simulators
Speedometer Tide Predictors
Analogue Clock Slide Rule
Seismometer Curvimeter etc
Voltmeter
Digital computer
Digital computer use number to represent information. Two digits 0 and 1 combine to make data. Most of
the modern computers are digital. Mark-I was first general purpose digital computer built in 1940s by
Aiken. Examples of digital computers are IBM PC, Apple Mac etc.
Hybrid Computers
Hybrid Computers are the computers which processes both digital and analog data. It can be a digital
computer, that accepts analog signals and process them in digital form. Some of the applications of hybrid
computers are Devices used in petrol pumps, machines used in hospitals to measure B.P
Desktop Computer/Microprocessor:
Desktop Computer is personal computer designed for regular use at a single location on or near a desk or
table. Desktop computers are available in horizontally-oriented casing and tower casing. This is
a computer with a central processing unit (CPU) as a microprocessor, designed for individual use. It may
also refer to a server or laptop as well e.g. Microsoft PC, Laptop computers.
Workstations
Workstations are the powerful desktop computers designed for engineers and architects. Workstations are
used by small engineering companies, architects, graphic designers, and any organization, department, or
individual that requires a faster microprocessor, a large amount of random access memory (RAM), and
special features such as high-speed graphics adapters.
Notebook Computers
Notebook Computers are small, portable computers, weighs between 3 and 8 pounds and is about 8 ½ by
11 inches. A notebook can effectively be turned into a desktop computer with a docking station, a
hardware frame that supplies connections for peripheral input/output devices such as a printer or larger
monitor. A laptop is a small, portable computer -- small enough that it can sit on your lap.
Tablet Computer
Tablet Computer, commonly known as tablet, is a portable, thin, flat mobile computer with a touch screen
display, which is usually in color, and has a rechargeable battery. Tablets have sensors, digital cameras, and
a microphone. Tablets are typically larger than smart phones or personal digital assistants with screens 7
inches (18 cm) or larger, measured diagonally.
Handheld Devices
Handheld Devices are computing equipment that can be used in the hand, such as PDA, smart phone or
tablet computer.
Palmtop: A small computer that literally fits in your palm. Palmtops are practical for certain
functions such as phone books and calendars. Palmtops that use a pen rather than a keyboard for
input are often called hand-held computers or PDAs.
PDA: - (Personal digital assistant) is a term for a small, mobile, handheld device that provides
computing and information storage and retrieval capabilities for personal or business use, often for
keeping schedules, calendars and address book information handy.
Smart Phones typically combine the features of a mobile phone, such receiving voice calls and
creating text messages such as an event calendar, media player, video games, GPS
navigation, digital camera and digital video camera. They are often called the hybrid of cell phone
and PDA. It can be used for Web surfing, or e-mail access e.g. Black Berry
Computers used by Organizations
Network Server
Network Server is a centralized computer that provides data and network resources to all computers
(clients) connected in the network. Multiple servers in cluster are called server farms.
Super Computers
Super Computers are the most powerful, largest and fastest computers, used to handle large and complex
calculations, processing trillions of operations per second. They are used in research organizations,
weather forecasting e.g. Cray-1 and Cray-2
Mainframe computers
Mainframe computers are large and expensive computers used primarily by large organizations for bulk
data processing, such as census, enterprise resource planning, and transaction processing. They
are computer capable of supporting hundreds, or even thousands, of users simultaneously, with the help
of terminals (dumb or intelligent). They are often used in air Lines, banks, universities etc. IBM S/390 is an
example of mainframe.
Mini-Computers
Mini-Computers (mid-range computers) are the computers of a size intermediate between a
microcomputer and a mainframe. They are capable of supporting hundreds of users simultaneously, with
the help of terminals e.g. Hewlett-Packard HP 3000 series, HP 2100 series, HP1000 series.
Micro-Controllers/Embedded Computers
Micro-Controllers also called embedded computer, is a compact microcomputer designed to perform the
operation of embedded systems in motor vehicles, robots, office machines, complex medical devices,
mobile radio transceivers, vending machines, home appliances, and various other devices.
Speed
A computer works with much higher speed and accuracy compared to humans while performing
mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The
time taken by computers for their operations is microseconds and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or
inaccuracy.
Diligence/Consistency
A computer can perform millions of tasks or calculations with the same consistency and accuracy. It
doesn’t feel any fatigue or lack of concentration. It can work for hours without making any mistakes.
Versatility
Versatility refers to the capability of a computer to perform different kinds of works with same accuracy
and efficiency.
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input
any number of times, we will get the same result.
Automation
Computer performs all the tasks automatically i.e. it performs tasks without manual effort.
Memory
A computer has built-in memory called primary memory where it can store data. Secondary storage are
removable devices such as CDs, pen drives, etc., which are also used to store data.
Logical
A computer system has certain characteristics, such as the capability of thinking, reasoning, and learning. It
helps computer to perform tasks logically and due to such characteristics they have developed into
Artificial Intelligence.
Home
Computers are used at homes for several purposes like online bill payment, watching movies or shows at
home, home tutoring, social media access, playing games, internet access, etc. Computers help the student
community to avail online educational support.
Medical Field
Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live
monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate
operations, and conduct surgeries remotely.
Entertainment
Computers help to watch movies online, play games online, listening to music, etc. MIDI instruments
greatly help people in the entertainment industry in recording music with artificial instruments.
Industry
Computers are used to perform several tasks in industries like managing inventory,
online marketing, designing purpose, creating virtual sample products, interior
designing, video conferencing, etc.
Education
Computers are used in education sector through online classes, online examinations,
referring e-books, online tutoring, etc. They help in increased use of audio-visual aids
in the education field.
Government
Banking
In the banking sector, computers are used to store details of customers and conduct
transactions, such as withdrawal and deposit of money through ATMs or through
online banking. Banks have reduced manual errors and expenses to a great extent
through extensive use of computers.
Business
Nowadays, computers are totally integrated into business. The main objective of
business is transaction processing, which involves transactions with suppliers,
employees or customers. Computers can make these transactions easy and accurate.
People can analyze investments, sales, expenses, markets and other aspects of
business using computers.
Training
Arts
Computers are extensively used in dance, photography, arts and culture. The
movement of dance can be shown live via animation. Photos can be digitized using
computers.
Computers with high performance are used to stimulate dynamic process in Science
and Engineering. Supercomputers have numerous applications in area of Research
and Development (R&D). Topographic images can be created through computers.
Scientists use computers to plot and analyze data to have a better understanding of
earthquakes.
Data is defined as a collection of individual facts and figures. Data can come in the form of text,
observations, figures, images, numbers, graphs, or symbols. Data is a raw form of knowledge and, on its
own, doesn’t carry any significance or purpose.
Quantitative data is provided in numerical form, like the weight, volume, or cost of an item.
Qualitative data is descriptive, but non-numerical, like the name, sex, or eye color of a person.
Data Information
Data is raw facts and figures Processed form of data is called Information
Raw data alone is insufficient for decision Information is sufficient for decision making
making
An example of data is a student’s test score The average score of a class is the information
derived from the given data.
First Generation
The period 1940 to 1956, roughly considered as the First Generation of Computer.
The first generation computers were developed by using vacuum tube or thermionic valve machine.
The input of this system was based on punched cards and paper tape; however, the output was
displayed on printouts.
The first generation computers worked on binary-coded concept (i.e., language of 0-
1). Examples: ENIAC, EDVAC, etc.
Second Generation
The period 1956 to 1963 is considered as the period of Second Generation of Computers.
The second generation computers were developed by using transistor technology.
In comparison to the first generation, the size of second generation was smaller.
In comparison to computers of the first generation, the computing time taken by the computers of
the second generation was lesser.
Third Generation
The period 1963 to 1971 is roughly considered as the period of Third Generation of computers.
The third generation computers were developed by using the Integrated Circuit (IC) technology.
In comparison to the computers of the second generation, the size of the computers of the third
generation was smaller.
In comparison to the computers of the second generation, the computing time taken by the
computers of the third generation was lesser.
The third generation computer consumed less power and also generated less heat.
The maintenance cost of the computers in the third generation was also low.
The computer system of the computers of the third generation was easier for commercial use.
Fourth Generation
The period 1972 to 2010 is roughly considered as the fourth generation of computers.
The fourth generation computers were developed by using microprocessor technology.
By coming to fourth generation, computer became very small in size, it became portable.
The machine of fourth generation started generating very low amount of heat.
It is much faster and accuracy became more reliable.
The production cost reduced to very low in comparison to the previous generation.
It became available for the common people as well.
Fifth Generation
The period 2010 to till date and beyond, roughly considered as the period of fifth generation of
computers.
By the time, the computer generation was being categorized on the basis of hardware only, but the
fifth generation technology also included software.
The computers of the fifth generation had high capability and large memory capacity.
Working with computers of this generation was fast and multiple tasks could be performed
simultaneously.
Some of the popular advanced technologies of the fifth generation include Artificial intelligence,
Quantum computation, Nanotechnology, Parallel processing, etc.
Q. 7. WRITE A DETAILED NOTE ON BOOLEAN LOGIC
Boolean logic is a form of algebra in which all values are reduced to either TRUE (1) or FALSE (0).
Boolean operators
Common Boolean operations include AND Operation, OR Operation and NOT Operation. A Boolean
operator can be completely described using a truth table.
Logic Gates
Boolean functions are implemented with the help of digital computer circuits called gates. A Logic gate is
an electronic device that produces a result based on two or more input values.
AND Gate
OR Gate
NOT Gate
All computers more or less based on the same basic design, the Von Neumann Architecture. According to
this Architecture Computer system has following basic units that help the computer to perform operations;
Input Unit
Output Unit
ALU (Arithmetic/Logic Unit)
Control Unit
Memory (Storage Unit)
INPUT UNIT
Input unit provides data and instructions to the computer system. Commonly used input devices
are keyboard, mouse, magnetic tape etc. Input unit performs following tasks:
OUTPUT UNIT
It connects the internal system of a computer to the external environment. It provides the results of any
computation, or instructions to the outside world. Some output devices are printers, monitor etc.
STORAGE UNIT
This unit holds the data and instructions. It also stores the intermediate results before these are sent to the
output devices. It also stores the data for later use. The storage unit of a computer system can be divided
into two categories:
Primary Storage: This memory is used to store the data which is being currently executed. It is used
for temporary storage of data. The data is lost, when the computer is switched off. RAM is used as
primary storage memory.
Secondary Storage: The secondary memory is slower and cheaper than primary memory. It is used
for permanent storage of data. Commonly used secondary memory devices are hard disk, CD etc.
WORKING OF CPU
The central processing unit (CPU) or processor, is the unit which performs most of the processing inside a
computer. It processes all instructions received by software running on the PC and by other hardware
components, and acts as a powerful calculator. It is also known as the brain of computer. It performs
following tasks:
COMPONENETS OF CPU
Control Unit: It controls all other units of the computer. It controls the flow of data and instructions to and
from the storage unit to ALU. It also controls the flow of information through the processor and
coordinates the activities of other units.
Arithmetic Logical Unit: All the calculations are performed in ALU of the computer system. The ALU can
perform basic operations such as addition, subtraction, division, multiplication etc. Whenever calculations
are required, the control unit transfers the data from storage unit to ALU. When the operations are done,
the result is transferred back to the storage unit.
Registers: Registers are fast storage locations that hold data or instructions temporarily. Type of registers
includes:
• Data registers: Holds data coming from or to be sent to RAM
• Instruction registers: Used for storing and decoding instructions
• Accumulator Registers: Stores the result of latest calculation
• Address Registers: Keeps the track of where data is stored in memory
• Program counter: has the address of next instruction to be executed
"Memory" refers to the location in which the program's instructions and data are stored so that they can
be processed later. There are two memory types, primary and secondary, which are accessed depending
on their use by the computer.
There are some differences between primary and secondary storage, the following table shows the
differences.
In general, memory can be divided into primary and secondary memory; moreover, there are numerous
types of memory when discussing just primary memory.
CACHE MEMORY
This temporary storage area, known as a cache, is more readily available to the processor than the
computer's main memory source. It is also called CPU memory because it is typically integrated directly
into the CPU chip or placed on a separate chip with a bus interconnect with the CPU.
Cache memory improves the speed of the CPU, but it is expensive. Type of Cache Memory is divided into
different level that are L1,L2,L3.
Level 1 (L1) cache or Primary Cache: L1 is the primary type cache memory. The Size of the L1 cache very
small comparison to others that is between 2KB to 64KB, it depends on computer processor. It is a
embedded register in the computer microprocessor (CPU).The Instructions that are required by the CPU
that are firstly searched in L1 Cache. Example of registers are accumulator, address register, Program
counter etc.
Level 2 (L2) cache or Secondary Cache: L2 is secondary type cache memory. The Size of the L2 cache is
more capacious than L1 that is between 256KB to 512KB.L2 cache is Located on computer microprocessor.
After searching the Instructions in L1 Cache, if not found then it searched into L2 cache by computer
microprocessor.
Level 3 (L3) cache or Main Memory: The L3 cache is larger in size but also slower in speed than L1 and L2,
it’s size is between 1MB to 8MB.In Multi core processors, each core may have separate L1 and L2, but all
core share a common L3 cache. L3 cache double speed than the RAM.
RAM
RAM stands for Random Access Memory. The term is based on the fact that any storage location can be
accessed directly by the processor. This is a temporary and volatile memory. The main types of RAM are as
under;
DRAM is a type of semiconductor memory that is typically used by the data or program code
needed by a computer processor to function.
SRAM retains data bits in its memory for as long as power is supplied to it. Unlike DRAM, which
stores bits in cells consisting of a capacitor and a transistor, SRAM does not have to be periodically
refreshed.
READ-ONLY MEMORY (ROM)
ROM is a type of computer storage containing nonvolatile, permanent data that, normally, can only be
read and not written to. ROM contains the programming that enables a computer to start up or regenerate
each time it is turned on.
PROM is ROM that can be modified once by a user. It enables a user to tailor a microcode program
using a special machine called a PROM programmer.
EPROM is programmable read-only memory PROM that can be erased and re-used. Erasure is
caused by shining an intense ultraviolet light through a window designed into the memory chip.
EEPROM is a user-modifiable ROM that can be erased and reprogrammed repeatedly through the
application of higher than normal electrical voltage. Unlike EPROM chips, EEPROMs do not need to
be removed from the computer to be modified. However, an EEPROM chip must be erased and
reprogrammed in its entirety, not selectively.
VIRTUAL MEMORY
A memory management technique where secondary memory can be used as if it were a part of the main
memory. Virtual memory uses hardware and software to enable a computer to compensate for physical
memory shortages by temporarily transferring data from RAM to disk storage.
Floppy disk
It is a type of storage device which is used in the personal computer on a personal basis. Floppy disk
is generally used with plastic and is made secure by using protective cases.
Hard disk
It’s a hard disc drive (HDD) that uses magnetic storage to store and retrieve data. It’s a non-volatile
device that stores data that could be changed or deleted an infinite number of times.
Magnetic disk
It’s a card that stores data by changing or re-organizing the magnetism of microscopic metal
magnetic nanoparticles on the card’s band. A swipe card is another name for it.
SSD
It refers to Solid State Drive, a type of mass storage technology similar to hard disc drives. It is much
more resilient than hard drives as it does not require visual discs.
SD card
A Contactless Smart Card is what it’s called. It is commonly used for storing greater information on
electronic devices such as phones, cameras, and so on.
Memory card
It’s commonly found in digital cameras, printers, gaming consoles, and other electronic devices. It
may be used to carry lots of data and comes in a variety of sizes. A memory card reader is required
to use a storage device on a computer.
Data Bus
Data bus the most common bus which is used to carry data. It is an electric path that connects CPU,
memory, I/O devices and storage. The bus contains parallel group of lines, greater the number of lines,
greater the speed of data transfer. For example a bus with 16 lines carries 16 bits (2 bytes) and 32 lines (32
bits or 4 bytes) of data.
Address Bus
Address bus is a computer bus that is used to carry address information. It is a set of wires like data bus
that only connect CPU and memory. Number of lines in address bus determines the maximum number of
memory addresses. For example maximum number of memory locations for address bus with 8 lines is
2^8=256 and 32 lines can access 4GB of memory
Control Bus
Control bus is used to carry control information from control unit to other units. It directs the transfer of
data to the ALU from memory. It also controls the functioning of I/O and storage devices
Multi programming
When multiple programs execute at a time on a single device, it is multiprogramming. It increases CPU
utilization by organizing jobs in such a way that the CPU always has one to execute. The idea is to keep
multiple jobs in main memory.
Multitasking
Multi-tasking is a logical extension of multiprogramming. Multitasking is the ability of an OS to execute
more than one task simultaneously on a CPU machine. These multiple tasks share common resources (like
CPU and memory). In multi-tasking systems, the CPU executes multiple jobs by switching among them, and
the switches occur so quickly that the users feel like interact with each executing task at the same time.
Multiprocessing:
Multitasking is the ability of an OS to execute more than one tasks using more than one processing units on
a single machine. These additional CPUs help increase the computing speed of the system.
Multi-core Processing
A multi-core processor is a processor chip that has more than one processor on a single chip contained in a
single package. Multicore processors are commonly used in many of the current computers, smartphones,
and tablet devices and make our devices run faster than they would with a single-core processor chip.
Q.16. DEFINE OPERATING SYSTEM. ALSO EXPLAIN THE MAIN FUNCTIONS OF OPERATING
SYSTEM?
An operating system (OS) is a program that acts as an interface between the user and the computer
hardware and controls the execution of all kinds of programs.
An operating system manages the processor’s work by allocating various jobs to it and ensuring that each
process receives enough time from the processor to function properly.
2) Memory management
OS manages the allocation and deallocation of the memory to various processes and ensures that the other
process does not consume the memory allocated to one process.
3) Device management
There are various input and output devices. An OS controls the working of these input-output devices. It
receives the requests from these devices, performs a specific task, and communicates back to the requesting
process.
A file system is a collection of directories, subdirectories, and files organized in a logical order. The OS is
responsible for maintaining the file system through indexing of filenames and their disk location.
5) User interface
User interface are the means by which the user can interact with the computer system, in particular with the
use of input devices and software. Two types of interfaces are;
Graphical User Interface (GUI): GUI is a type of user interface that allows users to interact with
computer through graphical icons and visual indicators by using mouse e.g. MS Windows
Command Line Interface (CLI): CLI is a means of interacting with a computer program where
the user (or client) issues commands to the program in the form of text (command lines) e.g. DOS
7) Security
The operating system uses password protection to protect user data and similar other techniques,
it also prevents unauthorized access to programs and user data.
Q. 17. EXPLAIN DIFFERENT TYPE OF OPERATING SYSTEM?
Batch Operating System
Some computer processes are very lengthy and time-consuming. To speed the same process, a job with a
similar type of needs are batched together and run as a group.
Each task is given some time to execute so that all the tasks work smoothly. Each user gets the time of CPU
as they use a single system. These systems are also known as Multitasking Systems
Real time OS
A real time operating system time interval to process and respond to inputs is very small. Examples:
Military Software Systems, Space Software Systems are the Real time OS example. There two categories of
Real-time systems “Soft Real-time systems” and Hard Real Time System”.
Distributed systems use many processors located in different machines to provide very fast computation to
its users. Air Traffic control system, Internet technology and Web browsers are the applications of
Distributed Operating systems.
Network Operating System runs on a server. It provides the capability to serve to manage data, user,
groups, security, application, and other networking functions. Examples of Network Operating System are:
Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X etc.
Mobile OS
Mobile operating systems are those OS which is especially that are designed to power smartphones,
tablets, and wearables devices. Some most famous mobile operating systems are Android and iOS, but
others include BlackBerry, Web, and watchOS.
An input device is a piece of hardware used to provide data to a computer. It allows the input of raw data
to the computer for processing.
KEYBOARD
The most common input device, used to enter text, characters and other commands into the computer.
Most of the standard keyboards are QWERTY. The QWERTY design is based on a layout created for
typewriters. The major groups of keys on the keyboard are:
MOUSE
Mouse is a computer input device used to move a cursor around the screen. An event occurs when you
press a button on the mouse:
• Left-Click: used to select or open any file or program
• Right Click: provides quick access to many common functions via a pop up menu
• Drag: used to drag and drop files and folders from one location to another
Types of Mouse
• Optical mouse
• Mechanical mouse
• Wireless mouse
TRACK BALL
A pointing device consisting of spherical ball, on the top. It is stationary and doesn't require more space.
The user rolls the ball with the thumb, fingers, or the palm of the hand and their nails to move a pointer.
Track ball is used in military applications, video games etc.
TOUCH PAD
A touchpad, track pad or mouse pad is a pointing device with a specialized surface that can translate the
motion and position of a user's fingers to interact with computer. Touchpads are a common feature of
laptop computers.
LIGHT PEN
A light pen is used to draw text and diagrams or select the object with the user interface system in the CRT
monitor.
STYLUS
Stylus is a pen-shaped input device used to write or draw on the screen of a graphic tablet or device.
Initially it was just used for graphic tablets and PDAs, but now, it has become popular on mobile devices as
a replacement for the user’s fingers.
GAME CONTROLLER
A game controller is a device used with games or entertainment systems to provide input to a video game,
typically to control an object or character in the game. There are several type of gaming devices such as
gamepads, joysticks, gaming wheels and force feed etc.
SCANNER
Scanner is an input device that reads an image and converts it into a digital file. A scanner is connected to a
computer through USB. There are different types of scanners:
Flatbed scanner – uses a flat surface to scan documents
Sheetfed scanner – like a laser printer where paper is fed into the scanner
Handheld scanner – the scanner is dragged over the page to be scanned
Card scanner – for scanning business card
TOUCHSCREEN
Touchscreen is an input device that allows users to interact with a computer using their fingers. It is used
widely in laptop monitors, smartphones, tablets, cash registers and information kiosks.
MICROPHONE
Microphone is an input device that allows users to input audio into their computers.
DIGITAL CAMERA
Digital Camera is an input device that takes pictures digitally. Images are stored as data on memory cards.
It has an LCD screen that allows users to preview and review images.
BARCODE READER
Barcode Reader also known as barcode scanner or point of sale (POS) scanner, is an input device capable of
reading barcodes.
Output Devices are the devices which are used to get information or result from the computer e.g.
monitor, printer, speaker etc.
1) Printers
A printer is any device that prints text or illustrations on paper. There are two main types of printers
IMPACT PRINTERS: Printer which make impact or strike the paper while printing i.e. Dot Matrix printer,
daisy wheel printer and line printers, and band printers
Dot-matrix printer: A type of printer that produces characters by striking pins against an ink
ribbon to print closely spaced dots in the appropriate shape. They are expensive, noisy, slow,
and produce low-quality output. The speed of dot-matrix printers is measured in characters per
second (cps). The slowest printer can print 50-70 cps and fastest can print up to 500cps.
Line Printers: It works like a dot-matrix printer but uses a special wide print head that can print
an entire line of text at one time. Line printers produce low-resolution print, but are incredibly
fast; the fastest printer can print 3,000 lines of text per minute.
Band Printer: A band printer features a rotating band embossed with alphanumeric characters.
To print a character, the machine rotates the band to the desired character, and then a small
hammer taps the band pressing the characters against the ribbon. They are fast and robust. A
good quality band printer can generate 2000 lines of text per minute.
NON-IMPACT PRINTERS: printers which don’t make impact or strike the paper while printing i.e. laser
printer, ink-jet printers, thermal printers
Laser printer
Laser printer Forms images using an electrostatic process. It produces high-quality text and
graphics by repeatedly passing a laser beam back and forth over a "drum". They can print
between 3 and 30 pages per minute
Inkjet printer
Inkjet is one of the most popular printers, which make images by forcing droplets through
nozzles. Top speed of an ink-jet printer is 20 pages per minute
Plotters
A Plotter is a special kind printer. It is like a printer because it produces images on paper, but they are
typically used to print large format, such as construction drawings created by an architect. Following are
the types of plotters
• Table or Flatbed Plotters: pen is used to write of paper wrapped on a drum
• Roller Plotter (Drum Plotters): two arms at right angle draw at stationary piece of paper
• Electrostatic Plotters: draws on negatively charged paper with positively charger toner
2) Monitor
Monitor is an output device which is used to display information to the user on screen. The two basic types
of monitors are:
3) Speakers
Speakers are popular output devices used with computer systems. They receive audio input from the
computer's sound card and produce audio output in the form of sound waves. Most computer speakers
are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or
amplitude, of the sound. Speakers usually come in pairs, which allow them to produce stereo sound from
two separate audio channels.
Q. 20. WHAT ARE THE FACTORS THAT AFFECT THE DISPLAY OF MONITOR’S SCREENS?
There are a few factors which needed to be considered when comparing and purchasing monitors:
• Screen size: measured as a diagonal line across the screen
• Resolution: number of pixels displayed on the screen
• Pixels: (or picture element) dots that make up the image on your screen
• Dot pitch: is the distance between the centers of a pair of like-colored pixels
• Refresh rate(Hertz): the speed with which a monitor redraws the image of the screen, and is
measured in hertz
A set of programs and instructions used to operate computers is called software. It is the part of computer
which we cannot touch. There are two main types of software.
Application Software
System Software
SYSTEM SOFTWARE
System Software is a set of programs that coordinates the functions of the hardware and various other
programs i.e. Operating system, utilities, device drivers etc. System software may include;
Operating System: a software that acts as an intermediary between user and computer e.g.
Windows OS (XP, 7.0, 8.0, 10.0 etc.) , macOS, Android and iOS are examples of system software.
Operating systems are loaded into RAM when the device starts up, and have access to the hard
drive.
Utility Software: a program that performs specific task related to the management of computer
functions such as copying files between storage devices, repair of damaged data files, translating
files so programs can read them, guard against viruses and harmful programs, Compress files so
they take up less space. File Compression, Zip file, antivirus, screen savers, disk fragmentation are
the examples of utilities
Disk Drivers: programs that enable I/O devices to communicate with the computer such as
keyboard, mice, printer. Some device drivers are included in the operating systems, many are
bundled with peripherals, and others are sold as separate products.
Compilers and translator programs: enable programmers to create other software. These are the
system software which convert high level language program into machine language.
APPLICATION SOFTWARE
A set of programs that help users solve particular computing problems is called application software i.e.
Microsoft office, Adobe, Video games etc.
Q. 23. DEFINE AND EXPLAIN THE IMPORTANCE OF COMPUTER NETWORKS. ALSO EXPLAIN
THE TYPES OF COMPUTER NETWORKS.
DEFINITION
Computer network refers to the set of interconnected computers that can exchange data and share
resources with each other. The main benefits of networks include:
File sharing - you can easily share data between different users, or access it remotely.
Resource sharing - peripheral devices like printers, scanners and copiers, or sharing software
between multiple users, saves money
Sharing a single internet connection - it is cost-efficient and can help protect your systems.
Increasing storage capacity
Saving of cost and time
TYPES OF NETWORKS
A local area network or LAN is a network that connects computers within a limited area. This might be in a
school, an office, or even a home. They are physically connected using cables, infrared links or wireless
media. A LAN may consist of two or three PCs connected together to share resources, or can include
hundreds of computers.
CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network which is usually used
in places like a school, colleges or universities. This network covers a limited geographical area that is, it
spreads across several buildings within the campus.
Network Topology is the arrangement with which computer systems or network devices are connected to
each other. Topologies may define both physical and logical aspect of the network. Both logical and
physical topologies could be same or different in a same network.
Bus Topology
In the bus network topology, every node is connected in series along a single cable. This central cable is the
backbone of the network and is known as Bus (thus the name). Every workstation communicates with the
other device through this Bus.
Star Topology
In the star network topology, a central device connects to all other nodes through a central hub. Compared
to the bus topology, a star network generally requires more cable, but a failure in any star network cable
will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the
entire network also fails.
Ring network
In ring topology, each host machine connects to exactly two other machines, creating a circular network
structure. When one host tries to communicate or send message, the data travels through all intermediate
hosts. Failure of any host results in failure of the whole ring.
Mesh Topologies
In a mesh network topology, each of the network node, computer and other devices, are interconnected
with one another. This type of topology is very expensive as there are many redundant connections, thus it
is not mostly used in computer networks. It is commonly used in wireless networks. Flooding or routing
technique is used in mesh topology. Mesh can be partial of full.
Tree Topology
The tree network topology consists of one root node, and all other nodes are connected in a hierarchy. The
topology itself is connected in a star configuration. Many larger Ethernet switch networks, including data
center networks, are configured as trees.
Hybrid network
The hybrid network topology is any combination of two or more topologies. Hybrid topologies typically
provide exceptional flexibility, as they can accommodate a number of setups.
Q. 25. DEFINE COMPUTER PROGRAM. ALSO EXPLAIN DIFFERENT TYPES OF PROGRAMMING LANGUAGES.
Computer program is a clear, step-by-step, finite set of instructions. The functions of a computer system
are controlled by computer programs. To write a program for a computer, we must use a computer
language. A Programming language is a set instruction used to write a computer program. There are three
main categories of programming languages:
Low-level Language
o Machine languages.
o Assembly languages.
High-level languages
Machine language
In the earliest days of computers, the only programming languages available were machine languages. Each
computer had its own machine language, which was made of streams of 0s and 1s. Machine languages is the only
language which could be understood by the computer
Assembly Language
The next evolution in programming came with the idea of replacing binary code for instruction and addresses with
symbols or mnemonics. Because they used symbols, these languages were first known as symbolic languages. The
set of these mnemonic languages were later referred to as assembly languages.
High-Level Language
A High-level language program consists of English-like statements that are governed by a strict syntax. It has two
primary components such as built-in language primitives and grammatical rules a translator. Examples: C, C++, Java,
FORTRAN, Visual Basic, Delphi etc.
A LANGUAGE translator is the system software that is used to translate source code into object code
(machine code). Maybe a translator is a language translator. Generally, there are three types of translators
in the computer system.
Compiler
A compiler is a program that accepts programs written in a high-level language and translates them into
equivalent assembly language or machine language programs. The program written by the programmer in
a high-level language is called the source program.
Interpreter
An interpreter is a program that translates one program statement at a time into machine code in contrast to the
compiler which converts the whole program at once.
Assembler
An assembler is a program that accepts assembly language programs and translates them to equivalent
machine language programs.
Set of step-by-step instructions that perform a specific task or operation is called an algorithm. It is written
in natural language.
Pseudocode
Set of instructions that are close to programming language instructions is called pseudocode.
Flowchart
A flowchart is a visual representation of the sequence of steps and decisions needed to perform a process.
Hub:
A hub is a connection point for different type of devices on a network. This is not a particularly fast
connection because it broadcasts the packets it receives to all nodes attached to its ports. Hub is also
considered to be a dumb device.
Bridges:
A bridge is a device that connects two LANs or two segments of the same LAN. A bridge looks at the
information in each packet header and forwards data that is travelling from one LAN to another.
Switches:
Switch is like a Hub but built in with advanced features. Like Hub, switch don’t broadcast the received
message to entire network, rather before sending it checks to which system or port should the message be
sent.
Routers:
A router is a complicated device that stores the routing information for network. A router looks at each
packet’s header to determine where the packet should go and them determines the best route for the
packet to take towards its destination.
Gateway:
A Gateway is a node on a network that servers as an entrance to another network. In small business,
gateway is a device that routes data from local PC to external network such as internet. We can add
gateway IP manually or automatically by using DHCP.
Firewalls:
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic
based on an organization's previously established security policies.
Transmission mode means transferring of data between two devices. It is also called communication mode.
These modes direct the direction of flow of information. There are three types of transmission mode;
• Simplex Mode
• Half duplex Mode
• Full duplex Mode
Simplex Mode
In this type of transmission mode data can be sent only through one direction i.e. communication is
unidirectional. We cannot send a message back to the sender. Examples of simplex Mode is loudspeaker,
television broadcasting, television and remote, keyboard and monitor etc.
In full duplex system we can send data in both directions as it is bidirectional. Data can be sent in both
directions simultaneously. Example of Full Duplex is a Telephone.
Computer security refers to measures and controls that ensure the system is safe from any unwanted
access. The main goals of computer security are;
Confidentiality
Integrity
Availability
Malware are the types of software programs which may be harmful to your system. Malware attacks on
integrity and confidentiality. Following are different malware software:
Viruses:
A computer virus is a type of malicious software, or malware that spreads between computers and causes
damage to data and software. Computer viruses cause major operational issues, and result in data loss and
leakage. A virus attaches itself to other software programs or file in order to enter into the system
Trojan horse:
A program that appears to be harmless but then does something other than expected. Once a Trojan is
inside your system, it can perform destructive actions before you even know it’s there.
Key Loggers:
Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
Spyware:
Small programs that install themselves secretly on computers to monitor user Web surfing activity
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate
users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the
network or server to authenticate requests that have invalid return addresses.
Worms:
A computer worm is a type of malware whose primary function is to self-replicate and infect other
computers while remaining active on infected systems. A computer worm duplicates itself to spread to
uninfected computers.
Spoofing Attacks:
The kind of attacks in which the attacker/hacker misrepresents oneself by using fake e-mail addresses,
taking you away from intended destination. Following are different type of spoofing attacks:
URL Spoofing
DNS Spoofing
IP Spoofing
MAC Spoofing
Email/Caller ID Spoofing
Phishing:
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
i.e. Greeting Cards, Lottery Wins etc.
Firewalls:
A network security system that monitors and controls the incoming and outgoing network traffic based on
predetermined security rules. Firewalls can be implemented in both hardware and software, or a
combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets.
Antivirus:
Antivirus software is a type of utility used for scanning and removing viruses from your computer. While
many types of antivirus programs exist, their primary purpose is to protect computers from viruses and
remove any viruses that are found. Antivirus require continuous updating
Password protection allows you to protect your data set by assigning it a password. Another user cannot
read, change, or delete your data set without knowing the password.
Biometric Protection:
Biometric authentication refers to a cybersecurity process that verifies a user’s identity using their unique
biological traits such as fingerprints, voices, retinas, and facial features.
Q. 31. WRITE A DETAILED NOTE ON ARTIFICIAL INTELLIGENCE (AI). AlSO EXPLAIN THE
MAIN APPLICATIONS OF AI IN DAILY LIFE?
Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks
commonly associated with intelligent beings (Humans). The main branches of artificial intelligence include:
• Expert System
• Robotics
• Neural Networks
• Expert System
• Vision System
Expert Systems:
Hardware and software that stores knowledge and makes inferences, similar to a human expert. Like
human experts, computerized expert systems use heuristics, or rules of thumb, to arrive at conclusions or
make suggestions
Robotics:
Robotics is a branch of engineering that involves the conception, design, manufacture and operation of
robots. The objective of the robotics field is to create intelligent machines that can assist humans in a
variety of ways. Robotics can take on a number of forms. Robots can be used in situations that are
hazardous or inaccessible to human. The ROVER was a remote controlled robot used by NASA to explore
surface of Mars.
Vision Systems:
Hardware and software that permit computers to capture, store, and manipulate visual images and
pictures i.e. identifying people based on facial features
Neural Network:
Computer systems that can simulate the functioning of a human brain are called as neural networks. They
have an ability to solve complex problems for which all the information is not present
Allows the computer to understand and react to statements and Commands made in a “natural” language,
such as English, Urdu, Punjabi Voice recognition involves converting sound waves to words
Learning System
Combination of software and hardware that allows the computer to change how it functions or reacts to
situations based on feedback it receives. Learning systems software requires feedback on the results of
actions or decisions. Feedback is used to alter what the system will do in the future
Voice recognition
• Social Media sites such as Facebook, Twitter, and Snapchat contain billions of user profiles,
which need to be stored and managed in a very efficient way.
• Travel industries are using AI-powered Chatbots which can make human-like interaction with
customers for better and fast response.
• We are currently using some AI based applications in our daily life with some entertainment
services such as Netflix or Amazon.
• Agriculture is applying AI as agriculture robotics, solid and crop monitoring, predictive analysis.
• AI is helping shoppers to discover associated products with recommended size, color, or even
brand.
A collection of information that is organized so that it can easily be accessed, managed, and updated is
called as Database. Database Management Systems (DBMS) are software systems used to store, retrieve,
and run queries on data. A DBMS serves as an interface between an end-user and a database, allowing
users to create, read, update, and delete data in the database.
Classifications/Types of DBMS
Database management systems can be classified based on a variety of criteria such as the data model, the
database distribution, or user numbers. The types of DBMS based on data model are as follows −
Relational database.
Object oriented database.
Hierarchical database.
Network database.
Relational Database
A relational database management system (RDBMS) is a system where data is organized in two-
dimensional tables using rows and columns. This is one of the most popular data models which is used in
industries. It is based on SQL. Every table in a database has a key field which uniquely identifies each
record. This type of system is the most widely used DBMS. For example − Oracle Database, MySQL,
Microsoft SQL Server etc.
In this table name and city are called as attributes and their values. Std ID is a primary key attribute which
uniquely identifies each record in the student table.
It is a system where information or data is represented in the form of objects which is used in object-
oriented programming.
It requires less code and is easy to maintain. For example − Object DB software.
It is a system where the data elements have a one to many relationship (1: N). Here data is organized like a
tree which is similar to a folder structure in your computer system.
The hierarchy starts from the root node, connecting all the child nodes to the parent node.
Network database
A Network database management system is a system where the data elements maintain one to one
relationship (1: 1) or many to many relationship (N: N). It also has a hierarchical structure, but the data is
organized like a graph and it is allowed to have more than one parent for one child record.
Examples of DBMS
There is a wide range of database software solutions, including both enterprise and open source solutions,
available for database management. Here are some of the most popular database management systems:
MySQL: MySQL is a relational database management system that is commonly used with open-
source content management systems and large platforms like Facebook, Twitter, and Youtube.
SQL Server: Developed by Microsoft, SQL Server is a relational database management system built
on top of structured query language (SQL), a standardized programming language that allows
database administrators to manage databases and query data.
DB2: DB2 database is developed by IBM Corporation. DB2 is also used to store data for large
companies. It is a RDBMS and its extended version also supports object –oriented features. The
main problem with DB2 is its cost.
Uses of Database
At Home: Maintaining address-books, managing household budgets and maintaining a home book-
library etc.
Business of Offices: Inventory tracking system, Human resources/ payroll, Discipline specific databases
Government and public organization: Police, Vehicle Registry, Banks, Tax records/ National IDs
World Wide Web: Google, Amazon, YouTube, Websites having search facility
Advantages of a DBMS
Q. 33. DEFINE INTERNET. HOW DOES IT WORK? ALSO EXPLAIN THE USES AND MAIN
ADVANTAGES AND OF USINGINTERNET.
The Internet is a global network of billions of computers and other electronic devices. With the Internet,
it's possible to access almost any information, communicate with anyone else in the world, and do much
more. Internet is also called the network of networks, it uses the Internet protocol suite (TCP/IP) to link
devices worldwide.
The World Wide Web—usually called the Web for short—is a collection of different websites you can
access through the Internet. A website is made up of related text, images, and other resources.
How does the Internet work?
It's important to realize that the Internet is a global network of physical cables, which can include copper
telephone wires, TV cables, and fiber optic cables. Even wireless connections like Wi-Fi and 3G/4G rely on
these physical cables to access the Internet.
When you visit a website, your computer sends a request over these wires to a server. A server is where
websites are stored, and it works a lot like your computer's hard drive. Once the request arrives, the server
retrieves the website and sends the correct data back to your computer. What's amazing is that this all
happens in just a few seconds!
Email is one of the oldest and most universal ways to communicate and share information on the
Internet, and billions of people use it.
Social media/Network allows people to connect in a variety of ways and build communities online.
Examples of such websites include Facebook, Twitter, LinkedIn and Google+ etc
E-Commerce and E-Business: Electronic Business or e-business is a term which can be used for any
kind of business that includes sharing information across the internet
E-Banking: E-banking is an arrangement between a bank or a financial institution and its customers
that enables encrypted transactions over the internet
Internet telephony: Internet telephony is a type of communications technology that allows voice
calls and other telephony services like fax, SMS and other voice-messaging applications to be
transmitted using the Internet as a connection medium. Skype for business, IMO, Face Time etc can
be the examples of inter
Video Conferencing - provides real-time two-way audio/video communication between two or
more locations. Video Conferencing requires specialized equipment on both ends for a successful
connection.
The Internet is one of the greatest creations and provides people with instant access to an endless supply
of knowledge and entertainment. Below is a complete list of all of the advantages of the Internet.
Viruses/Malwares
Staying connected with family and friends worldwide via email, text, FaceTime, etc.
quick access to information and research
banking and bill pay at our fingertips
online learning, job skills, content discovery (YouTube)
involvement in civic engagement (fundraising, social awareness, provides a voice)
great marketing tools
opportunities for remote employment
Along with the good comes the bad. With all of its benefits, the nature of social media presents a range of
potential issues.
Online vs Reality. “Friends” on social media may not actually be friends, and may even be
strangers.
Increased usage. The more time spent on social media can lead to cyberbullying, social anxiety,
depression, and exposure to content that is not age appropriate.
Social Media is addicting
Fear of Missing Out. The idea that you might miss out on something if you’re not online can affect
your mental health.
Q. 35. DEFINE AND EXPLAIN ECOMMERCE AND BUSINESS. ALSO SHARE THE ADVANTAGES
AND DISADVANTAGES OF USING ECOMMERCE?
Electronic Business or e-business is a term which can be used for any kind of business or commercial
transaction across the internet. The term "e-business" was coined by IBM's marketing and Internet team
in 1996.
Although the terms e-commerce and e-business are often used interchangeably, there are differences.
E-commerce is the buying and selling of goods and services on the Internet or other computer
network. Business transactions that involve the exchange of money are covered by the term e-
commerce.
E-business includes all aspects of running a business that sells goods and services, including
marketing, earning and retaining customers, procurement, developing business partners and
customer education. E-business became an extension of e-commerce to encompass all aspects of
businesses that function online.
Note: E-business involves e-commerce, but e-commerce does not cover all aspects of e-business.
GOALS OF E-BUSINESS
Advantages of E-Business
Costs and Setup: E-businesses has become easier to start a business: all you need is a computer
and internet.
Speed and Efficiency: Online ordering systems can process payments and orders in real-time,
usually faster, more accurately and cheaper than human workers e.g. products, such as music, files,
e-books.
Flexible Business Hours: E-business/commerce services are available 24 hours a day, seven days a
week
Eliminates Geographic Boundaries: An online business can reach customers in the four corners of
the Earth
Reduces Transaction Cost: Running an online business reduces the cost per transaction because it
takes less manpower to complete an online transaction
Everyone is Equal: When you are interacting with your clients or vendors using e-business, it is
difficult for them to tell how big your business is.
Customer Service: E-Business can save you money on your customer service as well.
Marketing: An e-business presence can help put your company in touch with this growing retail
sector.
Less security: The biggest obstacle in the growth of E-business is the issue of security. Internet is
not a secured medium of communication. There may be credit card theft
Technological dependence: is threat of sudden technical difficulties that can disturb business flow
at any time
Minimal consumer interaction: e-business blocks sensory consumer interactions
No physical interaction with items purchased: unable to examine products
Not for Everyone: Some people might not have any internet access
Less Privacy: personal information is compromised
Microsoft Word is word processing software that allows users to create and edit text documents. Users can start
with blank documents or work from pre-configured templates. Some of the features of MS word 2007 interface are
Title bar
The title bar shows the name of the document on screen. When a new document is started, Word 2007 gives it a
generic name like 'Document1’
Groups
The groups are collections of features designed to perform functions. Commonly used features are displayed on the
Ribbon, to view additional features within each group, click on the arrow at the bottom right of each group.
• Home: Clipboard, Fonts, Paragraph, Styles, and Editing.
• Insert: Pages, Tables, Illustrations, Links, Header & Footer, Text, and Symbols
• Page Layout: Themes, Page Setup, Page Background, Paragraph,
• Arrange References: Table of Contents, Footnote, Citation & Bibliography, Captions, Index, and Table of
Authorities
• Mailings: Create, Start Mail Merge, Write & Insert Fields, Preview Results, Finish
• Review: Proofing, Comments, Tracking, Changes, Compare, Protect
• View: Document Views, Show/Hide, Zoom, Window, Macros
Status Bar
The status bar is the area at the bottom of the Word window that indicates information about the current
document. It displays information about what page you are on, as well as your line number on the page and
character number on the line
Scroll Bar
Your scroll bar is at the right-hand side of your screen. Click on the up/down arrow to go up/down the page. Hold
down the left mouse button to scroll up and down the screen more quickly.
Selecting text
Put the cursor at the beginning or end of the words you want to select. Put your finger on the left mouse button.
Hold down the left mouse button. Move the mouse across the words. Lift up your finger. The word will be
highlighted in blue. When this is done, you can move words or change the size, the color, and the style of the words
on the computer. Undo and Redo
Commands that allow you to correct mistakes by moving backward or forward in time, you can click the Undo Button
on the Quick Access Toolbar. You can also use following shortcut keys to revert changes made in the document.
Shortcut keys are Undo - Ctrl+Z and Redo - Ctrl+Y
Rulers
On the Ribbon, select the View tab > in the Show/Hide group > click Ruler
The rulers show the page by inches
Orientation
Orientation are the different ways to layout your document. There are two different orientations of a word
document, portrait and landscape. On the Ribbon, select the Page Layout tab > in the Page Setup group > click
Orientation > Portrait or Landscape
Margins
A margin is the space between the text and the edge of the printed paper at the top, bottom, left, and right of the
page. To change the margin by using exact numbers
On the Ribbon, select the Page Layout tab > in the Page Setup group > click Margins
Select one of the predesigned margins or select Custom Margins and change the settings in the new window
Page Size
Page size option is used to choose the paper size for the current section or the whole document. To change the page
size, move on the Ribbon, select the Page Layout tab > in the Page Setup group > click Page Size
Document Views
Print Layout: This is a view of the document as it would appear when printed.
Full Screen Reading: This is a full view length view of a document.
Web Layout: This is a view of the document as it would appear in a web browser.
Outline: This is an outline form of the document in the form of bullets.
Draft: This view does not display pictures or layouts, just text
Exit Word
Exit is a command on the File menu used for quitting the Microsoft Word application when you are through working
in your document. The methods use:
Microsoft Office Button->Close/Exit word
The Close button on the title bar
Shortcut keys ALT+F4
Open a file
We can open a saved file from the computer hard disk by following ways
Microsoft Office Button -> Open -> Choose from the list
Pressing CTRL +O from the keyboard
Formatting Text:
Change Font Typeface and Size
Click the arrow next to the font name and choose a font and size.
Font Styles and Effects
Font styles are predefined formatting options that are used to emphasize text: Bold, Italic, and Underline.
o Bold: by pressing CTRL + B or through font group
o Italic: by pressing CTRL +I or through font group
o Underline: by pressing CTRL + U or through font group
Change Text Color
Select the text and click the Colors button included on the Font Group, Select the color and click
Highlight Text
Select the text, click the Highlight Button on the Font Group of the Ribbon.
Copy Formatting (Format Painter)
To copy the formatting, do the following: Select the text with the formatting you want to copy, copy the
format of the text selected by clicking the Format Painter button on the Clipboard Group of the Home Tab.
Apply the copied format by selecting the text and clicking on it.
Paragraph Alignment
Formatting paragraphs allows you to change the look of the overall document. You can access many of the tools of
paragraph formatting by clicking the Page Layout Tab of the Ribbon or the Paragraph Group on the Home Tab of the
Ribbon.
o Align Left (CTRL+L): the text is aligned with your left margin
o Center(CTRL+E) : The text is centered within your margins
o Align Right (CTRL+R) : Aligns text with the right margin
o Justify (CTRL+J): Aligns text to both the left and right margins.
Indent Paragraphs
Indenting paragraphs allows you set text within a paragraph at different margins. There are several options for
indenting:
Change Spacing Between Paragraphs and Lines
This feature is used to change the space between the lines of a paragraph. We can also customize the amount of
space before and after the paragraph.
Columns
Columns can help to separate sections of your document and make them look more inviting to read. Columns are a
good way to separate sections of your document on one page.
Drop Cap
A drop cap is a large capital letter at the beginning of a text block that has the depth of two or more lines of regular
text.
Tables
You can add a table to your Word document, using either a grid in a drop-down menu or a dialog box. The grid
method is the fastest way to create a simple table, although it is limited to eight rows and ten columns.
What is a cell?
A spreadsheet is in the form of a table comprising rows and columns. The rectangular box at the
intersection point between rows and columns forms a cell. Given below is an image of a cell:
Charts in Excel
Charts help you visualize your data in a way that creates maximum impact on your audience. Following are
the steps to create a chart in excel;
Easy To Store Data: Since there is no limit to the amount of information that can be saved in a
spreadsheet, MS Excel is widely used to save data or to analyse data.
Easy to Filter: Filtering information in Excel is easy and convenient.
Easy To Recover Data: If the information is written on a piece of paper, finding it may take longer,
however, this is not the case with excel spreadsheets. Finding and recovering data is easy.
Application of Mathematical Formulas: Doing calculations has become easier and less time-taking
with the formulas option in MS excel
More Secure: These spreadsheets can be password secured in a laptop or personal computer and
the probability of losing them is way lesser in comparison to data written in registers or piece of
paper.