Computer - Awareness Namma KPSC
Computer - Awareness Namma KPSC
&
NAMMAKPSC
ACADEMY
COMPUTER
AWARENESS
FOR KPSC EXAMS
BY
PRASHANTH KUMAR HR
www.nammakpsc.com
COMPUTER AWARENESS
FUNDAMENTALS
An electronic device that accepts data and processes it into useful information is called
a Computer
Every computer is a combination of hardware and software
WORKING OF A COMPUTER
The working of a computer can be broadly categorized into following four functions or
steps
(i) Receive input – Accept data/information from user through various input devices like
the keyboard, mouse, scanner, etc
(ii) Process information–Perform
arithmetic or logical operations on
data/ information
(iii) Store information—Store the
information in storage devices like
hard disk, CD, pen drive etc
(iv) Produce output–Communicate
information to the user through any of
the available output devices like monitor, printer, etc
COMPONENTS OF A COMPUTER
Input Devices: These are the devices that are used to accept data and instructions
from the user. Keyboard, mouse, scanner etc., are the examples of input devices
Central Processing Unit (CPU) : This is known as the ‘Brain of the Computer’ as it
controls the complete working of the computer
Memory: The data and instructions are stored in this component of the computer. Hard
disk, DVD, pen drive etc., are the examples of memory storage devices
Output Devices: These are the devices that are used to display the desired result or
information. Monitor, printer etc., are the examples of output devices
TYPES OF COMPUTER
There are majorly 4 types of computers
1. Super Computer – The computers which are used to process a huge amount of data
at once are called Supercomputers. They are mostly used in scientific and engineering
operations where the processing is complex. They are expensive and complicated to
work. For example – The computers used by NASA to launch space shuttles.
2. Mainframe Computer – Computers designed to be used in large firms and
organisations where a lot of people have to work on the same database are called
mainframe computers. They are almost equally as expensive as Supercomputers and
are the fastest working computers at present. They are mostly used in Banks.
COMPUTER AWARENESS
3. Workstation – Usually a single user system is called a work station. The RAM for
such systems is more, and the processors are quite fast. They are mostly used by an
individual and can be used for multiple purposes.
4. Microcomputer – Designed for personal use only. This type of computers can easily
be moved from one place to the other. They have a personal storage area, input &
output unit and a Central Processing Unit. Examples for microcomputer are desktop,
laptop, mobile phone, tablets, etc.
HISTORY OF COMPUTER
1. Ancient Computing Devices (Pre-17th Century):
Abacus (c. 2400 BCE): An early
counting device that used beads on
rods.
Antikythera Mechanism (c. 100
BCE): An ancient Greek analog
computer used for astronomical
calculations.
2. The Mechanical Era (17th - 19th
Century):
Blaise Pascal's Pascaline (1642): A
mechanical calculator for basic
arithmetic functions.
Gottfried Wilhelm Leibniz's Step
Reckoner (1673): Another early
mechanical calculator.
Charles Babbage's Analytical
Engine (1837): A design for a
mechanical, general-purpose
computer that was never fully built.
3. Early Electromechanical and
Electronic Computers (Late 19th - Early
20th Century):
Herman Hollerith's Tabulating
Machine (1886): Used punched cards
to process data, especially for the U.S. Census.
Alan Turing's Turing Machine (1936): A theoretical model of computation, laying
the foundation for modern computing theory.
Colossus (1943): The world's first programmable digital electronic computer, used
during World War II to break German codes.
4. The Electronic Computer Era (1940s - 1950s):
ENIAC (1946): The first general-purpose electronic digital computer, developed in
the United States.
COMPUTER AWARENESS
Mainframe Computers
Second largest in terms of the capacity and size of computers
Huge and very expensive computers but can support hundreds of users at a time
Used in large organizations like railways where centralized data for the entire railway
reservation system is maintained
Supercomputers
Supercomputers are the most powerful computers in the world
Many processors work simultaneously, so they have very high processing speed
Can process huge volume data and information with ultrafast calculations
Used in specialized applications like weather forecast, space research, molecular
modeling etc.
LOCATIONS ON DESKTOP
1. Desktop Icons:
These are shortcuts to files, folders, applications, or specific locations on your
computer.
On Windows, common icons include This PC, Recycle Bin, and any shortcuts
you've created.
On macOS, you might see icons for your hard drive, external drives, or connected
devices.
2. Recycle Bin (Windows) or Trash (macOS):
This is where deleted files are temporarily stored before being permanently
removed.
On Windows, the Recycle Bin icon is usually located on the desktop.
On macOS, the Trash icon is typically found in the Dock.
3. User Files and Folders:
Your desktop may contain folders such as Documents, Downloads, Pictures, or
any folders you've created.
These folders often store your personal files and documents.
4. Connected Drives: Icons for external hard drives, USB flash drives, or other
connected storage devices might appear on the desktop when connected.
5. Shortcut Icons: Icons for frequently used applications or programs may be placed on
the desktop for quick access.
6. System Icons: Icons representing system settings or features, like the Network icon
or Sound icon, might be present.
7. Wallpaper: The desktop background or wallpaper is the visual backdrop behind all the
icons and windows.
8. Taskbar (Windows) or Dock (macOS): While not on the desktop itself, the taskbar in
Windows or the dock in macOS is a location for quick access to frequently used
applications.
9. Widgets or Gadgets: Some operating systems support desktop widgets or gadgets
that display information like the time, weather, or system performance.
COMPUTER AWARENESS
INPUT DEVICES
An input device is used to get data or instructions from the user. This data is then passed
on to CPU for processing so as to produce the desired result
KEYBOARD
The keyboard is very much like a standard typewriter with a few additional keys
Generally, we find a QWERTY keyboard with 104 keys on it. The additional keys may be
included in modern multimedia keyboards
Types of Keyboard
1. Ergonomics: Some keyboards are designed with ergonomic features: Split keyboards,
curved keyboards, and mechanical
keyboards are examples. Ergonomic
keyboards aim to reduce strain and
discomfort during extended use.
2. Mechanical Keyboards: Feature individual
mechanical switches under each key. Known
for tactile feedback, durability, and customizable key switches.
3. Gaming Keyboards: Designed for gamers with additional features such as
customizable backlighting and programmable keys
Alphanumeric Keys Letter Keys (A-Z): Used for typing letters and characters
Number Keys (0-9): Used for typing numbers
Function Keys (F1-F12) Perform specific functions depending on the software or
operating system.
Modifier Keys Shift, Ctrl (Control), Alt (Alternate): Modify the functions of
other keys when pressed in combination.
Caps Lock: Used to toggle between uppercase and
lowercase letters.
Tab, Enter, Backspace, Delete: Perform navigation and
editing functions
Cursor Movement Keys Arrow Keys (Up, Down, Left, Right): Navigate within
documents or interfaces.
Home, End, Page Up, Page Down: Move the cursor within a
document or webpage.
Numeric Keypad Mimics the layout of a calculator for numeric input + Useful
for data entry and calculations
Special Keys Spacebar: Inserts a space between words.
Esc (Escape): Often used to cancel an operation or close a
dialog box
Windows (or Command) Opens the Start menu (Windows) or the Apple menu (Mac)
Key
Multimedia Keys Volume Control: Adjusts audio volume.
COMPUTER AWARENESS
7. Memory Hierarchy:
Modern computer architectures often involve multiple levels of memory hierarchy,
including L1, L2, and sometimes L3 caches. Each level is larger but slower than
the previous one.
This hierarchy is designed to balance the need for speed with the cost and
complexity of implementing high-speed memory.
8. Memory Management: The operating system is responsible for managing memory
resources. It allocates memory to different processes and ensures that the CPU has
access to the instructions and data it needs
OUTPUT DEVICES
Monitor
Like a television screen - display data and information
The standard size is 24 lines by 80 characters
The output displayed on the monitor is called soft copy
Monitor is also called as
Visual Display Unit
There are two types of monitors
o CRT Monitor : CRT (Cathode Ray Tube) + older
type of monitor + bigger and bulkier monitors +
consumed lot of electricity
o TFT-LCD monitors: Thin Film Transistor - Liquid
Crystal Display + lighter and occupy less space +
commonly referred to as flat screen displays and consume much less electricity
than CRT monitors + LED (Light Emitting Diode) monitors are being used
Printer
Device that produces the output on paper - hard copy + may be in the form of text or
graphics
Types
Dot Matrix Printer : Uses a print head to print characters on paper + print head strikes
on an ink soaked cloth ribbon that is laid against a paper
Ink-jet Printer: Work by spraying ionized ink on a sheet of paper + Magnetized plates
in the ink’s path direct the ink onto the paper in the desired shapes + capable of
producing a better print than the dot matrix printers + provides a resolution of 300
dots per inch, although some newer models offer higher resolutions + Line printers -
produced line by line + considerably slower + require a special type of ink that is apt
to smudge on inexpensive
Laser Printer : Works on the principle of a photocopier + utilizes a laser beam to
produce an image on a drum. The light of the laser alters the electrical charge on the
drum wherever it hits + drum is then rolled through a reservoir of toner, which is picked
up by the charged portions of the drum. Finally, the toner is transferred to the paper
COMPUTER AWARENESS
through a combination of heat and pressure + Since the entire page is transmitted to
a drum before the toner is applied, laser printers are sometimes called page printers
+ very adept at printing graphics +need significant amounts of + speed - 4 to 20 pages
of text per minute (ppm) (A typical rate of 6 ppm is equivalent to about 40 characters
per second (cps))
Thermal printer: produce images by pushing electrically heated pins against special
heat-sensitive paper + inexpensive and are used in most calculators and many fax
machines + low-quality print + paper tends to curl and fade after a few weeks or
months.
Plotter
Device that is used to draw charts, graphs, maps etc., with two or more automated pens
+ Multi-colour plotters use different-coloured pens to produce a multi-coloured output +
Plotters are considerably more expensive than printers + frequently used for Computer
Aided Engineering (CAE) applications such as Computer Aided Design (CAD) and
Computer Aided Manufacturing (CAM)
Types
Drum plotter - paper wrapped around a moving drum and the pens move on the paper
to print the output
Flatbed
plotter - flat
surface on
which the
paper is
placed and
the pens
move to
draw the
output
Electrostatic plotter - negatively charged paper on which the drawing is made using a
positively charged toner
Speaker
Types: Stereo speakers, surround sound speakers, headphones
Function: Outputs audio, allowing users to hear sounds and music.
Projector:
Types: LCD projectors, DLP (Digital Light Processing) projectors
Function: Projects computer-generated images or videos onto a screen or surface.
COMPUTER AWARENESS
COMPUTER MEMORY
Computer memory is a data storage device where data is
to be processed and instructions required for processing
are stored
How Does Computer Memory Work?
When you open a program, it is loaded from secondary
memory into primary memory. Because there are
various types of memory and storage, an example
would be moving a program from a solid-state drive
COMPUTER AWARENESS
(SSD) to RAM. Because primary storage is accessed more quickly, the opened
software can connect with the computer’s processor more quickly. The primary
memory is readily accessible from temporary memory slots or other storage sites.
Memory is volatile, which means that data is only kept temporarily in memory. Data
saved in volatile memory is automatically destroyed when a computing device is
turned off. When you save a file, it is sent to secondary memory for storage.
There are various kinds of memory accessible. It’s operation will depend upon the
type of primary memory used. but normally, semiconductor-based memory is more
related with memory. Semiconductor memory made up of IC (integrated circuits) with
silicon-based metal-oxide-semiconductor (MOS) transistors.
Types of Computer Memory
In general, computer memory is of three
types:
Primary memory
Secondary memory
Cache memory
1. Primary Memory
It is also known as the main memory of
the computer system. It is used to store
data and programs or
instructions during computer operations.
It uses semiconductor technology and
hence is commonly called semiconductor
memory. Primary memory is of two types:
RAM (Random Access Memory): It
is a volatile memory. Volatile memory
stores information based on the power
supply. If the power supply fails/
interrupted/stopped, all the data and information on this memory will be lost. RAM is
used for booting up or start the computer. It temporarily stores programs/data which
has to be executed by the processor. RAM is of two types:
S RAM (Static RAM): S RAM uses transistors and the circuits of this memory
are capable of retaining their state as long as the power is applied. This memory
consists of the number of flip flops with each flip flop storing 1 bit. It has less
access time and hence, it is faster.
D RAM (Dynamic RAM): D RAM uses capacitors and transistors and stores
the data as a charge on the capacitors. They contain thousands of memory
cells. It needs refreshing of charge on capacitor after a few milliseconds. This
memory is slower than S RAM.
ROM (Read Only Memory): It is a non-volatile memory (Non-volatile memory stores
information even when there is a power supply failed/ interrupted/stopped). ROM is
used to store information that is used to operate the system. As its name refers to
COMPUTER AWARENESS
read-only memory, we can only read the programs and data that is stored on it. It
contains some electronic fuses that can be programmed for a piece of specific
information. The information stored in the ROM in binary format. It is also known as
permanent memory. ROM is of four types:
MROM(Masked ROM): Hard-wired devices with a pre-programmed collection
of data or instructions were the first ROMs. Masked ROMs are a type of low-
cost ROM that works in this way.
PROM (Programmable Read Only Memory): This read-only memory is
modifiable once by the user. The user purchases a blank PROM and uses
a PROM program to put the required contents into the PROM. Its content can’t
be erased once written.
EPROM (Erasable Programmable Read Only Memory): EPROM is an
extension to PROM where you can erase the content of ROM by exposing it to
Ultraviolet rays for nearly 40 minutes.
EEPROM (Electrically Erasable Programmable Read Only Memory): Here
the written contents can be erased electrically. You can delete and
reprogramme EEPROM up to 10,000 times. Erasing and programming take
very little time, i.e., nearly 4 -10 ms(milliseconds). Any area in an EEPROM
can be wiped and programmed selectively.
2. Secondary Memory
It is also known as auxiliary memory and backup memory. It is a non-volatile memory and
used to store a large amount of data or information. The data or information stored in
secondary memory is permanent, and it is slower than primary memory. A CPU cannot
access secondary memory directly. The data/information from the auxiliary memory is first
transferred to the main memory, and then the CPU can access it.
Types of Secondary Memory
1. Magnetic Tapes: Magnetic tape is a long, narrow strip of plastic film with a thin,
magnetic coating on it that is used for magnetic recording. Bits are recorded on tape as
magnetic patches called RECORDS that run along many tracks. Typically, 7 or 9 bits are
recorded concurrently. Each track has one read/write head, which allows data to be
recorded and read as a sequence of characters. It can be stopped, started moving forward
or backward, or rewound.
2. Magnetic Disks: A magnetic disk is a circular metal or a plastic plate and these plates
are coated with magnetic material. The disc is used on both sides. Bits are stored in
magnetized surfaces in locations called tracks that run in concentric rings. Sectors are
typically used to break tracks into pieces.
Hard discs are discs that are permanently attached and cannot be removed by a single
user.
3. Optical Disks: It’s a laser-based storage medium that can be written to and read. It is
reasonably priced and has a long lifespan. The optical disc can be taken out of the
computer by occasional users
Types of Optical Disks
CD – ROM
COMPUTER AWARENESS
The primary or internal storage unit is made up of several small storage locations
called cells
Each of these cells can store a fixed number of bits called word length. Each cell has
a unique number assigned to it called the address of the cell and it is used to identify
the cells. Hence we can say that memory is like a large cabinet containing as many
drawers as there are addresses on memory
Each drawer contains a word and the address is written on outside of the drawer. You
know that data in computer is stored in the form of 0s and 1s. Each of these digits is
known as a bit.
A collection of 8 bits constitutes a byte
Each cell of memory contains one character or 1 byte of data. So the capacity is
defined in terms of bytes or words. However higher units of memory are Kilobytes,
Megabytes, Gigabytes etc. 1 Kilobyte is equal to 1024 bytes. Thus 64 Kilobyte (KB)
memory is capable of storing 64 × 1024 = 32,768 bytes
Floppy Disk
Similar to magnetic disk
3.5 inch in diameter + capacity of a 3.5 inch floppy is 1.44 mega
bytes
Cheaper than any other storage devices and is portable
Low cost device particularly suitable for personal computer
system
Made obsolete because the storage space was very small in floppy disks in
comparison to other storage devices
Hard Disk
Commonly used secondary storage device
Generally it is fixed inside the CPU
cabinet but still external hard disks are
also available
Store huge amount of data and also and
provides relatively quick access to data
stored on it
Set of numerous disks stacked one
above the other with a cylindrical spindle
in-between
Data is recorded electromagnetically in
the form of concentric circles called tracks. The tracks are further divided into blocks
In the hard disk drive, there is a Read/Write head mounted on the arm placed next to
the stacked disks. This head moves horizontally and vertically to read or write data on
the disks
Optical Disk
Device to store large volume of data that has led to the development of optical disk
storage medium. Optical disks can be divided into the following categories
Compact Disk - Read Only Memory (CD-ROM): CD-ROMs are made of reflective
metals. A CD-ROM is written during the process of manufacturing by high power laser
beam. Here the storage density is very high, storage cost is very low and access time
COMPUTER AWARENESS
is relatively fast. Each disk is approximately 4 ½ inches in diameter and can hold over
600 MB of data. As the CD-ROM can be read only, we cannot write or make changes
into the data contained in it
Compact Disk - Recordable (CD-R) : These CDs can be used to write data on to them
provided your computer has a CD writer.
The CD writer uses a special laser light
to write data on to a blank CD. Once the
CD-R has been burnt, i.e. data has been
written on it, it cannot be modified. The
information can be added to it but the
parts that have been burnt cannot be
edited
Compact Disk – Read/Write (CD- R/W):
This type of CD can be used for both
reading and writing. Also these can be
written and erased again and again
Digital Versatile Disk (DVD) : A DVD is
an optical storage disk with much larger
storage capacity than that of CDs. A
single sided DVD can store upto 4.7 GB
of data. Due to its high storage capacity,
DVDs are generally used to store movies and other audio video files.
FLASH MEMORIES
Device that retains data in spite of the electricity supply being switched off
Non- volatile memory
Devices using flash memories erase data at the block level. A block of flash memory
chip must be erased before data is written on it
Widely used for storage in consumer devices like mobile phones, USB flash drives,
tablet computers, digital cameras and other solid state drives
Features - least expensive form of semiconductor memory + consumes very less
power + help speed up performance + increase the scalability of the devices + data
can be erased, modified and rewritten many times + does not require batteries for
solid state storage + very fast access time + higher resistance to kinetic shock as
compared to hard disk drive. It is extremely durable and can withstand extreme
pressure and temperature
A pen drive is a small portable secondary storage device (somewhat shaped like a
pen) that connects to a computer through a USB port
MEMORY ACCESSING MODES
Refers to the manner in which a given memory location is accessed
COMPUTER AWARENESS
BINARY LOGIC
Binary code is a system by which numbers, letters and other information are
represented using only two symbols, or binary digits
The binary definition to a computer is a 1s and 0s code arranged in ways that the
computer can read, understand, and act upon
It is the only language computer hardware can understand
As currently used in computers and devices around the world, binary code was
invented when the German polymath, Gottfried Wilhelm Leibnitz (1646-1716),
introduced a system of using only the binary digits 0 and 1 to perform arithmetic
operations
COMPUTER AWARENESS
4. With the bits, record them in order from right to left as that will be the number in base
8.
For example, to convert 19 into Octal follow the steps:
19/8=2 and remainder = 3 first remainder is called LSB (least significant bit)
2/8=0 and remainder = 2 last remainder is called MSB (Most significant bit)
Now decimal number 19 is equivalent to octal number 23
(19)10= (23)8
4. Binary to decimal
To find the decimal representation of a binary number simply take the sum of products of
binary digits and the powers of 2 which they represent.
For example, Conversion of (1000)2 into decimal is as follows: (1000)2 = 1 × 23 + 0 × 22
+ 0 × 21 + 0 ×20 = 1 × 8 + 0 × 4 + 0 × 2 + 0 × 1 (1000)2 = 8 + 0 + 0 + 0 = 8
5. Octal to decimal
To find the decimal representation of an octal number simply take the sum of products of
octal digits and the powers of 8 which they represent
For example, Conversion of (1000)8 into decimal is as follows:
(1000)8 = 1 × 83 + 0 × 82 + 0 × 81 + 0 ×80 = 1 × 512 + 0 ×64 + 0 × 8 + 0 × 1
(1000)8 = 512 + 0 + 0 + 0 = 512
Step 1: Write the decimal equivalent of each digit of the number in hexadecimal form
Step 2: Multiply the digits from right to left with exponents of 16 0, 161, 162, ... in order
starting from the right most digit.
Step 3: Then add all the products. The resultant sum is the number in the decimal
system.
The hexadecimal digit is expanded to multiply each digit with the power of 16. The power
starts at 0 from the right moving forward towards the right with the increase in power. For
the conversion to complete, the multiplied numbers are added.
Decimal Number = dn-1 × 16r-1+....+ d2 × 162 + d1 × 161 + d0 × 160.
Where,
n = the number of digits.
r = placement of the digit (from the right side starting from r = 0)
Two’s complement of binary number can be obtained by adding 1 to the LSB (Least
Significant Bit) of 1’s complement of binary number. 2’s complement= 1’s complement +1
Example: Binary number: 11001 1’s complement of number: 00110 (i.e. convert all 1’s to
0’s and all 0’s to 1’s) 2’s complement of number= 00110+1=00111
In common language whatever is on keyboard (except shift, caps lock key) are character
data. As you know computer operates on binary values so these character are also
represented in binary values.
Most common character coding used in India are ASCII, ISCII and UNICODE
ASCII
ASCII stands for American Standard Code for Information Interchange
Computers can only understand numbers, so an ASCII code is the numerical
representation of a character such as ‘A’ has numerical value as 65
Some other characters and its equivalent ASCII values are following:
z = 122.
UNICODE
Developed in 1987
Provides a unique number for every character of all languages
Developed to represent characters from a wide range of languages and can thus
represent characters from English, French, Greek, Korean etc., all at the same time
The first 256 places of Unicode are same as ASCII and it expands the character set
for new and unique characters that may arise in future.
COMPUTER SOFTWARE
Computer software refers to a collection of programs, data, and instructions that control
and enable the functioning of a computer system
Computer software is normally classified into two broad categories: (i) System Software
(ii) Application Software
SYSTEM SOFTWARE
General programs written for a computer - pre-
written programs and documentation
Supplied by the manufacturer along with the
computer - Permanently held in the machine
Objectives of this software are to:
(i) enhance the efficiency of hardware utilization - realized by that
component of system software which is commonly known as operating system
(ii) make computers simple to use.
COMPUTER AWARENESS
OPERATING SYSTEM
Essential software to operate the computer system
Function: Effective computer resources management + scheduling multiple jobs for
execution + manages the flow of data and instructions
The set of commands for operating system is often called Job Control Language (JCL)
Operating system which is used with a micro-computer is called CP/M (control
program for microprocessor)
Most popularity - WINDOWS
First operating system : Batch processing operating system + developed for the
second generation computers + executes jobs serially one after another from a batch
of jobs submitted for execution
Multi programming operating system : handles multiple jobs simultaneously by
overlapping the input/ output and processing cycles of various jobs.
Popular types at present : ‘multi-processing operating systems’ and ‘real time
operating systems’
Multi-processing operating system uses multiple CPUs to process multiple jobs
Real time operating system : interactive operating system with strict time limitation +
quick Receiving and processing data + control, direct or effect the outcome of ongoing
activity + examples - The reservation system used by railway, airlines, and hotel
UTILITY SOFTWARE
System software which is
used quite often in the
development of a program
Sort merge programs are
used to sort records in a
particular manner or
sequence + provided by the
manufacturers . The
programmer can also
develop his/her own utility
software and keep it in the
secondary memory of the
computer
Device Drivers: Software that
enables communication
between the operating system
and hardware devices like
printers, graphics cards, and
network adapters
Firmware: Software embedded
in hardware devices to control
COMPUTER AWARENESS
their operation. For example, the firmware in a router controls its networking functions.
APPLICATION SOFTWARE
Application software is written to perform a specific task or process, such as accounting,
payroll, mailing list, result preparation and so on. The majority of application software is
written in high-level languages.
COMPUTER LANGUAGE
COMPUTER AWARENESS
Programming language
Set of rules that provides a way of instructing the computer to perform certain
operations.
Said to be lower or higher, depending on whether they are closer to the language the
computer itself uses (lower, which means 0s and 1s) or to the language that people
use (higher, which means more English like)
Classified as: 1) Machine language 2) Assembly language 3) High level language
MACHINE LANGUAGES
Programs that have only binary digits
Difficult to write or understand machine language
In one system, the letter A is represented as 1000001
Commas, semicolons and other special characters are also represented as bunches
of 0s and 1s
ASSEMBLY LANGUAGES
In the 1950s, to reduce programming complexity and provide some standardization,
assembly languages were developed
Also known as symbolic languages
Use abbreviations or memonic code - codes that are more easily memorized to
replace the 0s and 1s of machine languages
Do not replace machine languages
For an assembly language program to be executed, it must be converted to machine
code
The assembly language KErogram is referred to as a ‘source program’ whereas, the
machine language program is an ‘object program’
Assembly language code is very similar in the form to machine language code. This
one-to-one correspondence was still laborious
Advantages: Standardized and easier to use + operate very efficiently + easier to
debug
Disadvantages: Very long and difficult to debug + complex + machine dependent
. Languages are often referred to as generations, the idea being that machine languages
were the first generation and assembly languages were the second generation
NOTE: Compiled languages are better than interpreted languages as they can be
executed faster and more efficiently once the object code has been obtained. On the
other hand, interpreted languages do not need to create object code and so are usually
easier to develop and test.
OPERATING SYSTEMS
NOTE: Intro has been discussed earlier
FUNCTIONS OF OPERATING SYSTEM
Process Management
A program that is in an execution state is
called a process. For example, a word
processing program like MS-Word being run
by a user on a personal computer is a
process
A system task, such as sending output to a
printer, can also be a process
Helps in the allocation of resources to each
process
Allocation of the CPU time - limited time, which may be a fraction of a second +
process scheduling
Responsible for creation, deletion, and scheduling of various processes that are being
executed at any point of time
Memory Management
Keeps track of every memory location, that is either assigned to some process or is
free
Checks how much memory should be assigned to each process.
Input/Output Management
Provides a generic, consistent, convenient and reliable way to access I/O devices
Responds to the user keystrokes, mouse clicks and other input formats
File and Disk Management
Responsible for allocating space for files on secondary storage media
Keeps track of the memory location allocated to each piece of the file on the storage
disk. The operating system is thus responsible for the organisation of the file system
Guarantees that the read and write operations performed on the secondary storage
device are secure and reliable
Operating systems like DOS, Windows, Macintosh and Unix follow the hierarchical
structure to store files and folders, e.g. in case of windows, a file is placed in the
desired folder or a subfolder
User Interface
A User Interface (UI) - part of an operating system, program or device + used by user
to input and receive data
COMPUTER AWARENESS
Text User Interface (TUI) or Command Line Interface (CLI) allows users to interact
with an operating system by typing commands in a terminal or console window
Graphical User Interface (GUI) - easy to use interface + uses graphics, along with a
keyboard and a mouse, to provide an easy-to-use interface to a program + Examples
of GUI operating systems are Windows, Linux, and Solaris
TYPES OF OPERATING SYSTEM
MICROSOFT WINDOWS
Windows is an operating system designed by Microsoft
Most popular OS for home PCs
Recent ones include Windows 10 (released in 2015), Windows 8 (2012), Windows 7
(2009), Windows Vista (2007)
Features of Microsoft Windows
GUI based operating system, i.e., interaction with the computer is done by clicking
with mouse on the icons
Eliminate the need to memorize commands for the command line (MS-DOS)
Supports multiprogramming and multitasking
LINUX
Open-source (program code which is freely available and its source code is available
to developers or users for modification) operating system
Provides two GUIs: KDE and Gnome
Companies - Red Hat, SuSE, Ubuntu, Xandros etc
Allows Multi-user system that supports multiple users at once or different times
Customizable in a way that Windows is not
Components
(i) Kernel - Core part of Linux. It is responsible for major activities of operating system
(ii) System library - It has special functions using which application programs access
Kernel’s features
(iii) System utility - It is responsible to do specialized, individual level tasks
UNIX
Developed in the 1960s
Stable, multi-user, multi-tasking system for servers, desktops, and laptops
Most popular versions of UNIX are Sun Solaris and MacOS X
Features of UNIX Operating System
(a) UNIX is a flexible operating system. It can be installed on many different types of
machines like main-frame computers, supercomputers, and microcomputers
(b) UNIX has better built-in security and permissions features than Windows
SMARTPHONE OPERATING SYSTEMS
Smartphones are using operating systems too. This development has brought many
advanced functions on mobile which were already available on our computer
Mobile phones or smartphones are not just a device to make phone calls or send some
texts, but they are close to handheld computers that enable us to send email, play games,
watch news, do video calls and much more
COMPUTER AWARENESS
iOS
Apple iOS is a multi-touch, multi-tasking operating system that runs on Apple iPhone,
iPad, and iPod.
Gives the response on the user’s touch
Allows them to tap on the screen to open a program, enlarge an image, or swipe a
finger on the screen to change the pages
Apple iOS can only be used by products made by Apple
Comes with the Safari web browser for internet access
ANDROID
Android is an open source mobile operating system owned by Google
It provides unlimited access to anyone who wants to develop apps for the phone and
puts less restriction on its licensing, so users benefit from the free content
WINDOWS PHONE
Microsoft released its Windows platform for mobile phones in late 2010
The Windows phone home screen resembles a Window’s Desktop start menu.
Windows phone is recognizable from its tile-based interface
The content like photos, music, etc. from various applications are automatically
grouped together by the aggregator feature called hubs
Transmission Modes
Simplex: In this type of transmission, data can be sent only in one direction i.e., it’s a
uni-directional mode. The receiver only receives the data, but can not communicate
back to the sender
COMPUTER AWARENESS
Half Duplex: In half duplex system, we can send data in both directions but sender
can either receive the data or send the data at a particular time. So when the sender
is sending the data, it cannot receive the data and vice versa
Full Duplex: In this mode, we can send data in both directions as it is bidirectional
mode. We can send and receive data at the same time.
COMMUNICATION TERMINOLOGY
E-M SPECTRUM
Range of all possible frequencies of electromagnetic radiation
Extends from the low frequencies used for modem radio communication to gamma
radiation at the short wavelength (high frequency) end, covering wavelengths from
thousands of kilometers down to a fraction of the size of an atom
Not all the frequencies are suitable to purposes of human communications.
BANDWIDTH
Range of frequencies that make up a signal
A. Narrowband
Accommodate 64Kbps, which is also known as the DS-0 (Digital Signal level 0)
channel
If we combine these 64Kbps channels together, we can achieve wideband
transmission rates
B. Wideband - Wideband is a transmission medium or channel that has a wider bandwidth
than the voice channel i. e., more than 64Kbps. This term is usually contrasted with
narrowband
C. Broadband
The most modern bandwidth used has broadband capacities
Defined in different ways, depending on what part of the industry you are talking about.
Technically speaking, it has been defined as being anything over 2Mbps
Refers to any type of transmission technique that carries several data channels over
a common wire. For example, in home networking, broadband constitutes any form of
high-speed Internet access using this transmission technique
COMPUTER AWARENESS
TRANSMISSION MEDIA
Transmission media refer to the physical pathways through which data signals are
transmitted from one device to another in a data communication network. These media
can be classified into two main types: guided media (also known as bounded or wired
media) and unguided media (also known as unbounded or wireless media).
1. Guided Media:
Twisted Pair Cable:
Consists of pairs of insulated copper wires twisted together.
Commonly used in telephone lines and Ethernet networks.
Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).
Coaxial Cable:
Consists of a central conductor surrounded by insulation, a metallic shield, and
an outer insulating layer.
Commonly used in cable television (CATV) and broadband Internet
connections.
Optical Fiber:
Uses light signals to transmit data.
Consists of a core (glass or plastic fiber that carries light), cladding (surrounds
the core and reflects light inward), and a protective outer layer.
Offers high bandwidth, low attenuation, and resistance to electromagnetic
interference.
Commonly used in long-distance communication, such as in
telecommunications networks
2. Unguided Media:
Microwave Transmission: In microwave transmission the waves travel in straight
lines. It gives a much higher signal noise ratio, but the transmitting and receiving
antennas must be accurately aligned with each other
Radio Waves: Radio waves can be broadcasted in all directions from the source i.e.,
Omni-directional so that the transmitter and receiver do not have to be carefully
aligned physically
Infrared Waves: Infrared waves are widely used for short-range communication. The
remote controls used on television, VCRs and stereos use infrared communication
Communication Satellite: In satellite communication, signal transferring between the
sender and receiver is done with the help of satellite. In this process, the signal which
is basically a beam of modulated microwaves is sent towards the satellite. Then the
satellite amplifies the signal and sends it back to the receiver’s antenna present on
the earth’s surface. So, all the signal transferring is happening in space. Thus this type
of communication is known as space communication
Bluetooth: Bluetooth is a WPAN technology. Accordingly its radio characteristics
include low power, short range, and medium transmission speed. It effectively
exchanges data over short range. Today the Bluetooth market focuses on professional
COMPUTER AWARENESS
and field workers, who need to travel offsite but still require access to corporate
communication and information
Wi-Fi: Wi-Fi is a Local Area Network (LAN) - you will know more about LAN, later in
this lesson. Wi-Fi depends on a high energy intake to offer a 100 meter range and
much higher transmission rate. This speed makes Wi-Fi much more faster Bluetooth
and similar to a high speed modem. For large file transfer and quick Internet access,
Wi-Fi outperforms Bluetooth.
Characteristics and Considerations:
Bandwidth: The capacity of a transmission medium to carry data.
Attenuation: The loss of signal strength as it travels through the medium.
Interference: The impact of external signals on the transmitted data.
Transmission Speed: The rate at which data can be transmitted through the
medium.
Cost and Installation: The cost and complexity of installing and maintaining the
medium.
COMUTER NETWORKS
Computer networks are interconnected systems that
enable communication and data exchange between
computers and other devices. Networks allow devices to
share resources, collaborate, and access information,
often facilitating communication over long distances.
Here's an overview of computer networks:
TYPES OF COMPUTER NETWORKS
1. Local Area Network (LAN):
Scope: Limited geographical area, such as a single building or a campus.
Characteristics:
High data transfer rates.
Typically owned, set up, and maintained by a single organization.
Commonly used for connecting computers, printers, and servers within an
office or a building.
2. Wide Area Network (WAN):
Scope: Spans a larger geographical area, such as a city, country, or even
globally.
Characteristics:
Lower data transfer rates compared to LANs.
Connects LANs over long distances.
Relies on public and private network infrastructure.
3. Metropolitan Area Network (MAN):
Scope: Covers a larger geographical area than a LAN but is smaller than a WAN,
typically within a city.
COMPUTER AWARENESS
Characteristics:
Provides connectivity to multiple LANs within a metropolitan area.
Can be used for high-speed data transfer between corporate offices.
4. Personal Area Network (PAN):
Scope: Connects devices within the personal space of an individual, typically
within a range of a few meters.
Characteristics:
Examples include Bluetooth and infrared connections.
Used for connecting devices like smartphones, tablets, and laptops.
5. Campus Area Network (CAN):
Scope: Larger than a LAN but smaller than a MAN, typically covering a university
campus or a business park.
Characteristics:
Connects multiple buildings within a defined geographic area.
6. Home Area Network (HAN):
Scope: Connects devices within a single household.
Characteristics:
Commonly used for connecting devices like computers, smart TVs, and
smart home devices.
7. Client-Server Network:
Architecture: Involves a central server that provides resources and services to
client devices.
Characteristics:
Clients request services, and servers fulfill those requests.
Commonly used in business environments for centralized data storage and
management.
8. Peer-to-Peer Network:
Architecture: Devices are connected directly to each other without a central
server.
Characteristics:
Each device can act as both a client and a server.
Commonly used for file sharing and decentralized applications.
9. Internet:
Scope: A global network of networks, connecting millions of devices worldwide.
Characteristics:
Uses the TCP/IP protocol suite.
Provides access to various services, including the World Wide Web, email,
and file transfer.
10. Intranet:
Scope: A private network within an organization that uses the same technologies
as the Internet.
Characteristics:
Accessible only to authorized users within the organization.
COMPUTER AWARENESS
Disadvantages:
COMPUTER AWARENESS
Dependence on the central hub; if it fails, the entire network may be affected.
Requires more cabling compared to bus topology.
4. Mesh Topology:
Description: Every device is connected to every other device in the network.
Advantages:
High redundancy; failure in one link does not necessarily disrupt the entire
network.
Supports high traffic volume.
Disadvantages:
Complex and expensive to implement.
Maintenance and troubleshooting can be challenging.
5. Tree Topology:
Description: Combination of star and bus topologies, forming a hierarchy.
Advantages:
Scalable and can cover large geographical areas.
Provides a balance between redundancy and cost.
Disadvantages:
Failure in the central hub can affect the entire branch.
Complex to design and manage.
6. Hybrid Topology:
Description: Combines two or more different topologies.
Advantages:
Offers flexibility and customization.
Can provide a balance between cost and performance.
Disadvantages:
Complex to design and implement.
Requires careful planning and management.
7. Point-to-Point Topology:
Description: Each device is directly connected to another without the need for a
central hub.
Advantages:
Simple and easy to implement.
Suitable for small-scale connections.
Disadvantages:
Limited scalability.
Not suitable for large networks.
8. Full Mesh Topology:
Description: Every device is directly connected to every other device in the
network.
Advantages:
High redundancy and fault tolerance.
Supports high traffic loads.
Disadvantages:
COMPUTER AWARENESS
Static addresses are manually assigned and do not change unless modified by an
administrator
Other highlights
SUBNETTING: Involves dividing an IP network into sub-networks to improve
performance and security. It helps to efficiently allocate IP addresses and manage
network traffic
IP Address Classes: IPv4 addresses were traditionally divided into classes (A, B, C,
D, and E), but classful addressing has largely been replaced by Classless Inter-
Domain Routing (CIDR).
Address Resolution Protocol (ARP): ARP is used to map an IP address to a
physical MAC (Media Access Control) address on a local network
IPv4 to IPv6 Transition: Due to the exhaustion of IPv4 addresses, there has been a
gradual transition to IPv6, which provides a much larger address space.
NETWORKING DEVICES
Networking devices play a crucial role in facilitating communication and data transfer
within computer networks. These devices perform various functions to ensure the smooth
operation and efficiency of the network
1. Router:
Function: Connects different
networks and directs data between
them. Routers operate at the
network layer (Layer 3) of the OSI
model.
Features:
Determines the best path
for data packets to reach
their destination.
Supports NAT (Network
Address Translation) for
translating private IP addresses to a public IP address.
2. Switch:
Function: Connects multiple devices within the same local network. Switches
operate at the data link layer (Layer 2) of the OSI model.
Features:
Learns the MAC addresses of connected devices and uses them to
forward data only to the appropriate destination.
Provides full-duplex communication, allowing data to be transmitted and
received simultaneously.
3. Hub:
Function: Connects multiple devices in a network, but unlike switches, hubs
operate at the physical layer (Layer 1) and do not filter or manage data traffic.
Features:
COMPUTER AWARENESS
5. Bridge:
Function: Connects and filters traffic between two or more network segments at
the data link layer.
Features:
Helps reduce collision domains in a network.
Segments a network into smaller parts for better performance.
6. Gateway:
Function: Connects different types of networks, translating data between different
communication protocols.
Features: Allows communication between networks with different architectures,
such as connecting a LAN to the Internet.
7. Firewall:
Function: Implements security policies to control incoming and outgoing network
traffic, providing protection against unauthorized access and cyber threats.
Features:
Filters traffic based on predefined rules.
Acts as a barrier between a trusted internal network and an untrusted
external network.
8. Modem:
Function: Converts digital data from a computer into analog signals for
transmission over analog communication lines (such as telephone lines) and vice
versa.
Features: Commonly used for broadband Internet connections (DSL, cable).
9. Repeater:
Function: Extends the range of a network by amplifying and retransmitting signals.
Features: Helps overcome signal attenuation (weakening) over long distances.
10. Load Balancer:
Function: Distributes incoming network traffic across multiple servers to ensure
optimal resource utilization and prevent server overload.
Features: Enhances the performance, scalability, and availability of web
applications.
11. Proxy Server:
COMPUTER AWARENESS
INTERNET
COMPUTER AWARENESS
However, the bubble burst in the early 2000s, leading to the collapse of many
internet companies.
6. Broadband and Mobile Internet (2000s):
Broadband internet became widely available, offering high-speed connectivity to
homes and businesses.
The proliferation of mobile devices and the launch of 3G and 4G networks enabled
internet access on smartphones and tablets.
7. Social Media and Web 2.0 (mid-2000s):
The mid-2000s witnessed the rise of social media platforms like Facebook, Twitter,
and YouTube, transforming the internet into a platform for user-generated content
and social interaction.
The term "Web 2.0" was coined to describe this shift towards user participation
and collaboration
8. The Internet of Things (IoT) and Beyond (2010s - Present):
The 2010s saw the emergence of the Internet of Things (IoT), connecting everyday
objects and devices to the internet.
The expansion of cloud computing, big data, and artificial intelligence has further
transformed the internet into a powerful platform for data storage, analysis, and
automation.
9. Future Developments:
The internet continues to evolve, with developments such as 5G connectivity,
increased cybersecurity measures, and the exploration of new technologies like
blockchain and quantum computing
INTERNET TERMINOLOGIES
Webpage
The document that can be viewed in the web browser is known as the web page
Website
The collection of web pages interlinked with each other through hyperlinks is known
as website
The first page of a website is known as the home page
World Wide Web (WWW)
System of Internet servers that support documents formatted using HTML
May contain links to other documents (hyperlinks), text, graphics, audio or video files.
So, a user can search for the desired data or information by navigating from one web
page to another
Web Browser
Free software application that is used to view web pages, graphics and almost any
other online content
Specifically designed to convert HTML and XML into readable document
Helps us to navigate through the World Wide Web
COMPUTER AWARENESS
Some of the common web browsers are Internet Explorer, Firefox, Google Chrome,
Netscape Navigator and Safari
Web Server
Server on the World Wide Web that responds to the request made by the web browsers
URL
Every web page or file has a unique address assigned to it. This special format of the
address is known as Uniform Resource Locator or URL
Specifies the unique address assigned to each web resource (viz., web page, video,
image, song etc.)
The general format of URL
type:// address/path
In the above format
type – specifies the type of server or protocol
address – specifies the name / address of the server on the Internet
path – specifies the location of file on the server
For example, consider the following URL www.airindia.in/travel-info.html
In the above example http identifies both protocol and server followed by a colon (: ) and
two forward slashes (//). www.airindia.in is the name of the server and travel-info.htm is
the name of the HTML file on the server. This type of character based naming system is
known as Domain Name System(DNS)
Here, it should be mentioned that names of the servers commonly begin with ‘www’ for
World Wide Web. Types of domain names are given in the table below:
In addition to the above table, sometimes, a two letter abbreviation indicating the country
name is also used. For example, in the domain name www.yahoo.co.in, ‘in’ indicates the
country India
IP Address
Every computer on the network also has a unique address. This is called the IP
address where IP stands for Internet Protocol.
Any computer’s IP address is a fourpart or eight- part electronic serial number with
each part separated by dots (.) or colons(:). For example ‘212.30.0.220’ is an IP
address
HTML
COMPUTER AWARENESS
Internet connection protocols are sets of rules and conventions that govern how data is
transmitted, received, and managed over the
internet. These protocols ensure that devices
and systems can communicate with each other
effectively.
1. Transmission Control Protocol (TCP):
TCP is a connection-oriented protocol
that ensures reliable data transmission
between devices on the internet.
It establishes a connection, breaks data into packets, numbers them for order, and
handles retransmission of lost or corrupted packets.
TCP guarantees that data is received in the correct order, without errors or
duplication.
2. Internet Protocol (IP):
IP is responsible for addressing and routing packets of data so that they can travel
across networks and arrive at the correct destination.
There are two main versions: IPv4 and IPv6. IPv6 was introduced to address the
depletion of available IPv4 addresses.
3. Hypertext Transfer Protocol (HTTP) and HTTPS:
HTTP is used for transmitting web pages and related data on the World Wide Web.
It is the foundation of data communication on the web.
HTTPS is the secure version of HTTP. It encrypts data transmitted between the
user's browser and the web server, ensuring privacy and security.
4. File Transfer Protocol (FTP):
FTP is used for transferring files between a client and a server on the internet.
It provides basic authentication but does not encrypt data, making it less secure
for transferring sensitive information.
5. Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP)/Internet
Message Access Protocol (IMAP):
SMTP is used for sending email messages.
POP and IMAP are used for receiving email messages. IMAP allows messages to
be stored on the server, while POP typically downloads them to the recipient's
device.
6. Internet Control Message Protocol (ICMP):
ICMP is used for diagnostics and error reporting in IP networks. It's the protocol
behind the "ping" command, which tests network connectivity.
7. Domain Name System (DNS):
DNS translates human-readable domain names (e.g., www.example.com) into IP
addresses (e.g., 192.0.2.1) so that computers can locate resources on the internet.
8. Dynamic Host Configuration Protocol (DHCP):
DHCP assigns IP addresses dynamically to devices on a network, simplifying the
process of configuring network settings for connected devices.
9. Border Gateway Protocol (BGP):
COMPUTER AWARENESS
BGP is used by routers to make decisions about the best path for routing data
between autonomous systems (ASes) on the internet. It is critical for internet
routing.
10. File Sharing Protocols: - Protocols like BitTorrent and eDonkey are used for peer-
to-peer file sharing, allowing users to exchange files directly with each other.
11. Voice over Internet Protocol (VoIP): - VoIP protocols like SIP (Session Initiation
Protocol) and RTP (Real-time Transport Protocol) enable voice and multimedia
communication over the internet.
INTERNET SERVICES
1. World Wide Web (WWW): The web is a collection of interconnected documents and
other resources linked by hyperlinks and URLs. Users access web content through
web browsers like Chrome, Firefox, or Safari.
2. Email Services: These services enable the exchange of electronic messages
between users. Popular email services include Gmail, Yahoo Mail, and Outlook.
3. Search Engines: Search engines like Google, Bing, and Yahoo help users find
information on the internet by indexing and ranking web pages based on relevance.
4. Social Media Platforms: Platforms like Facebook, Twitter, Instagram, and LinkedIn
allow users to connect, share content, and communicate with others online.
5. Online Storage and File Sharing: Services like Google Drive, Dropbox, and
OneDrive provide cloud storage for files, allowing users to access their data from any
device and share files with others.
6. Video Streaming Services: Platforms like Netflix, YouTube, Hulu, and Amazon Prime
Video deliver video content over the internet, allowing users to watch movies, TV
shows, and other videos.
7. Online Shopping: E-commerce platforms such as Amazon, eBay, and Alibaba enable
users to buy and sell goods and services online.
8. Cloud Computing Services: Services like Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud provide computing resources over the internet, including
storage, processing power, and applications.
9. VoIP (Voice over Internet Protocol): Services like Skype, Zoom, and WhatsApp
allow users to make voice and video calls over the internet, bypassing traditional
telephone networks.
10. Online Gaming: Platforms like Steam, Xbox Live, and PlayStation Network provide
online gaming services, allowing players to connect and play games over the internet.
11. News and Information Services: Websites and apps from news organizations
deliver real-time news updates and information on various topics.
12. Online Banking and Financial Services: Banks and financial institutions offer online
services, allowing users to manage their accounts, transfer funds, and perform
financial transactions over the internet.
13. Web Hosting Services: Companies like Bluehost, HostGator, and GoDaddy provide
web hosting services, enabling individuals and businesses to host their websites on
the internet.
COMPUTER AWARENESS
14. VPN (Virtual Private Network) Services: VPNs secure internet connections by
encrypting data, providing privacy and anonymity for users
15. Video Conferencing : technology that allows communication between two or more
people at different locations by simultaneous two-way audio and video or even text
transmissions. It can be Point To Point, Multipoint Video Conferencing. Streaming is
also a type of Video conferencing
COOKIES
Name cookie is taken from ‘magic cookies’ in UNIX
These are tokens that are attached to the program or user and change according to
the responses by the program or the user
Message given to the web browser by a web server. The message received by the
browser is stored in a text file and is sent back to the server each time the browser
requests a page from the server. In this manner, cookies help the web server to keep
track of the user’s activity on a specific website
They are not capable to spread viruses
BASICS OF EMAILING
Emailing is a common and widely used method of electronic communication
Email Account Setup
Select an email service provider (ESP). Common providers include:
Gmail (by Google)
Outlook (by Microsoft)
Yahoo Mail
Apple Mail (for iCloud)
ProtonMail (for encrypted email)
Create an Account:
Visit the website of your chosen email service provider.
Look for a "Sign Up" or "Create Account" option.
Provide the required information, which typically includes:
o Full name
o Desired email address
o Password
Follow any additional steps or security measures.
COMPUTER AWARENESS
COMPUTER FILES
Computer files are digital containers or repositories that store data, information, or
instructions in a structured format
FILE TYPES
Text Files: Contain plain text and can be created and edited with a simple text
editor. Examples include .txt files.
Document Files: Created by word processing software, such as Microsoft Word
(.docx) or Adobe PDF (.pdf).
Spreadsheet Files: Created by spreadsheet software, such as Microsoft Excel
(.xlsx) or Google Sheets.
Image Files: Store visual information. Common formats include JPEG (.jpg), PNG
(.png), and GIF (.gif).
Audio Files: Contain sound data. Examples include MP3 (.mp3) and WAV (.wav)
files.
Video Files: Store video data. Examples include MP4 (.mp4) and AVI (.avi) files.
Executable Files: Contain instructions that a computer's operating system can
execute. Common executable file types include .exe (Windows) and .app (macOS).
FILE SYSTEMS
A file system is a method or structure that an operating system uses to organize and store
files on a storage medium, such as a hard drive or SSD. The file system provides a way
for users and applications to create, store, retrieve, and manage files and directories on
the storage device
Tilde (~): In Unix-based systems, the tilde represents the user's home directory. For
example, ~/Documents refers to the "Documents" folder in the user's home directory.
FILE TRANSFER
File transfer refers to the process of moving files from one location to another, either within
the same system or between different systems. There are various methods and protocols
for file transfer, each suited to different use cases and scenarios
1. Copy and Paste (Manual):
Description: The simplest form of file transfer involves manually copying files from
one location and pasting them to another.
Use Case: Suitable for small-scale file transfers within the same system.
2. File Explorer or Finder (GUI-Based):
Description: Using the graphical user interface (GUI) of the operating system's
file manager (File Explorer in Windows, Finder in macOS) to drag and drop files
between folders or drives.
Use Case: Convenient for moving files within the same system.
3. Command Line (Terminal):
Description: Using command-line tools like cp (copy), mv (move), or scp (secure
copy) in a terminal or command prompt.
Use Case: Efficient for both local and remote file transfers, especially when
dealing with large amounts of data.
4. FTP (File Transfer Protocol):
Description: A standard network protocol used to transfer files from one host to
another over a TCP-based network, such as the internet.
Use Case: Commonly used for transferring files between a local system and a
remote server.
5. SFTP (SSH File Transfer Protocol):
Description: A secure version of FTP that uses SSH (Secure Shell) for encryption
and authentication.
Use Case: Secure file transfer over a network, commonly used for remote server
access.
6. SCP (Secure Copy):
Description: A command-line tool that uses SSH for secure file transfer between
systems.
Use Case: Similar to SFTP, often used for secure copying of files between local
and remote systems.
7. HTTP/HTTPS (HyperText Transfer Protocol):
Description: Web protocols commonly used for transferring files over the internet.
HTTP is unsecured, while HTTPS is secured using SSL/TLS.
Use Case: Downloading/uploading files from/to web servers.
8. Cloud Storage Services:
Description: Uploading files to and downloading them from cloud storage services
like Google Drive, Dropbox, OneDrive, or iCloud.
COMPUTER AWARENESS
Use Case: Convenient for sharing files across devices and collaborating with
others.
9. Peer-to-Peer (P2P) File Sharing:
Description: Direct file transfer between two or more computers without the need
for a centralized server.
Use Case: Commonly used for sharing large files, especially in scenarios like
torrenting.
10. Email Attachments:
Description: Sending files as attachments via email.
Use Case: Suitable for small to moderately sized files
COMPUTER STANDARDS
Specifications or guidelines that define how hardware and software components should
work together to ensure compatibility, interoperability, and consistency. These standards
are crucial in the technology industry as they facilitate communication, collaboration, and
the development of universally compatible products
1. Communication Protocols:
TCP/IP (Transmission Control Protocol/Internet Protocol): The foundation of
internet communication.
USB (Universal Serial Bus): Standard for connecting peripherals and devices to
computers.
Bluetooth: Wireless technology standard for short-range communication between
devices.
Wi-Fi (IEEE 802.11): Standards for wireless local area networking.
2. File Formats:
JPEG, PNG, GIF: Image file formats.
MP3, AAC: Audio file formats.
PDF (Portable Document Format): Document format developed by Adobe.
HTML (Hypertext Markup Language): Standard for creating webpages.
3. Operating System Standards:
POSIX (Portable Operating System Interface): A set of standards to maintain
compatibility between operating systems, particularly Unix-like systems.
EFI/UEFI (Extensible Firmware Interface/Unified Extensible Firmware
Interface): Standards for firmware interfaces.
4. Data Interchange and Representation:
JSON (JavaScript Object Notation): Lightweight data interchange format.
XML (eXtensible Markup Language): Standard for encoding documents in a
format that is both human-readable and machine-readable.
5. Networking Standards:
IEEE 802 Standards: Various standards for networking technologies, including
Ethernet (802.3) and Wi-Fi (802.11).
COMPUTER AWARENESS
Basic computer troubleshooting involves identifying and resolving common issues that
can affect a computer's performance and functionality. Here are some steps and tips for
troubleshooting basic computer problems:
1. Check Power and Connections:
Ensure that the computer is properly plugged in and receiving power.
Verify that all cables and connections, including power cords, monitor cables, and
peripheral connections (keyboard, mouse, USB devices), are secure.
2. Restart the Computer: Many issues can be resolved by simply restarting the
computer. Click "Start" (Windows) or go to the Apple menu (Mac) and select "Restart" or
"Shut Down" and then turn the computer back on.
3. Check for Error Messages: Pay attention to any error messages or alerts that appear
on the screen. These messages often provide clues about the nature of the problem.
4. Update Software: Ensure that your operating system (Windows, macOS, Linux) and
software applications are up to date. Updates can fix known bugs and security
vulnerabilities.
5. Scan for Malware and Viruses: Run a reputable antivirus and anti-malware scan to
check for and remove any malicious software that might be causing problems.
6. Free Up Disk Space: If your computer is running slowly, check the available disk space
on your hard drive or SSD. Delete unnecessary files and applications to free up space.
7. Check for Overheating: Overheating can cause computer problems. Ensure that the
computer's cooling system (fans and vents) is clean and functioning properly.
8. Check Hardware Connections: If specific hardware isn't working (e.g., a printer or
external hard drive), make sure it's correctly connected to the computer and powered on.
9. Test Peripherals: If you suspect a problem with a peripheral device (e.g., a keyboard
or mouse), try using a different one to see if the issue persists.
10. Safe Mode Boot: - Boot the computer in Safe Mode (Windows) or Safe Boot (Mac)
to check if the problem is related to third-party software or drivers.
11. Check for Driver Updates: - Outdated or incompatible device drivers can cause
issues. Update drivers for hardware components like graphics cards, sound cards, and
network adapters.
12. Restore from Backup: - If you've recently encountered problems after making
changes or installing new software, consider restoring your system to a previous backup
point (Windows) or using Time Machine (Mac).
13. Monitor System Resources: - Use the Task Manager (Windows) or Activity Monitor
(Mac) to check for resource-intensive processes that might be causing slowdowns or
crashes.
14. Run Hardware Diagnostics: - Many computers have built-in diagnostics tools that
can help identify hardware problems. Check your computer's documentation for
instructions on how to run these tests.
15. Seek Professional Help: - If you're unable to resolve the issue or suspect a hardware
problem, consider seeking help from a qualified technician or the computer
manufacturer's support.
COMPUTER AWARENESS
16. Backup Important Data: - Before attempting major troubleshooting or repair actions,
ensure that you have a backup of your important data to prevent data loss.
COMPUTER VIRUS
A computer virus is a type of malicious software (malware) that is designed to infect and
compromise computer systems and their data. Computer viruses can cause a wide range
of harmful effects, including data loss, system instability, and unauthorized access to
sensitive information
How do they work : Computer viruses spread by attaching themselves to legitimate
programs or files. When a user runs or opens an infected program or file, the virus
activates and starts to replicate itself, infecting other files and potentially spreading to
other computers through various means.
What is their aim : The primary purpose of computer viruses is to cause harm or disrupt
normal computer operations. This harm can take various forms, including data corruption,
data theft, system crashes, and unauthorized access to a computer or network. Viruses
may carry a "payload," which is the malicious action they perform once activated. The
payload can vary widely and may include actions like displaying messages, deleting or
corrupting files, or stealing sensitive data.
Propagation Methods: Viruses can spread through various means, including infected
email attachments, compromised websites, infected software downloads, and infected
removable storage devices (e.g., USB drives).
Types of Viruses: There are various types of computer viruses, including:
(a) File Infector Viruses:
These viruses attach themselves to executable files (e.g., .exe or .dll) and
activate when the infected file is run.
Examples include the CIH virus (also known as the Chernobyl virus) and the
Sasser virus.
(b) Macro Viruses:
These viruses target the macro language in applications like Microsoft Word and
Excel.
They are often spread through infected documents or email attachments.
The Melissa virus is an example of a macro virus.
(c) Boot Sector Viruses:
These viruses infect the master boot record (MBR) of a computer's hard drive
or removable storage devices.
They can prevent a computer from starting up properly.
The Stone virus is an example of a boot sector virus.
(d) Multipartite Viruses:
These viruses combine characteristics of multiple virus types, making them
more challenging to detect and remove.
They can infect both files and the boot sector.
Examples include the Tequila virus and Invader virus.
COMPUTER AWARENESS
COMPUTER SECURITY
Computer security, also known as cybersecurity, is the practice of protecting computer
systems, networks, and data from theft, damage, unauthorized access, and various
cyber threats. It involves implementing measures to ensure the confidentiality, integrity,
and availability of information
1. Authentication:
Definition: The process of verifying the identity of users, systems, or devices.
Measures: Passwords, biometric authentication (fingerprint, retina scans), two-
factor authentication (2FA), and multi-factor authentication (MFA).
2. Authorization:
Definition: Granting or denying access to specific resources or functionalities
based on the authenticated identity.
Measures: Access control lists (ACLs), permissions, role-based access control
(RBAC).
3. Encryption:
Definition: The process of converting data into a secure code to prevent
unauthorized access.
Measures: SSL/TLS for secure communication over the Internet, file encryption,
full-disk encryption.
4. Firewalls:
Definition: Security barriers that monitor and control incoming and outgoing
network traffic.
Measures: Hardware firewalls, software firewalls, packet filtering, stateful
inspection
Storage capacity can vary depending on the context. For example, when measuring
storage devices like hard drives and SSDs, manufacturers often use decimal-based
definitions, where 1 kilobyte (KB) is 1,000 bytes and 1 gigabyte (GB) is 1,000,000,000
bytes
Graph DBMS: Designed for managing data with complex relationships, often used in
social networks and recommendation systems. Examples include Neo4j and Amazon
Neptune.
In-Memory DBMS: Stores data in main memory for ultra-fast data access. Examples
include Redis and SAP HANA.
The choice of DBMS depends on the specific requirements of an application, including
the volume and type of data, performance needs, scalability, and complexity.
Organizations often select DBMSs based on their compatibility with existing systems and
the skills of their development and IT teams
OSI MODEL
The OSI (Open Systems Interconnection) model is a conceptual framework used to
standardize and understand how different networking protocols and technologies interact
in a networked communication system. It was developed by
the International Organization for
Standardization (ISO) in the late
1970s and early 1980s. The OSI
model consists of seven layers, each
responsible for specific functions in
the network communication process
1. Physical Layer (Layer 1): This is
the lowest layer and deals with
the physical connection between
devices. It specifies the
hardware, cabling, and signaling
used to transmit raw binary data
(0s and 1s) over a physical
medium. It includes
considerations like voltage levels,
cable types, and connectors.
2. Data Link Layer (Layer 2): The
data link layer is responsible for
framing, addressing, and error
detection in data transmission. It
ensures that data is sent and received accurately
between devices on the same local network segment. Ethernet and Wi-Fi operate at
this layer.
3. Network Layer (Layer 3): The network layer is responsible for routing data packets
between different networks. It determines the best path for data to travel from the
source to the destination, using logical addressing and routing protocols. The Internet
Protocol (IP) operates at this layer.
COMPUTER AWARENESS
4. Transport Layer (Layer 4): The transport layer ensures end-to-end communication
between devices. It is responsible for error detection and correction, flow control, and
data segmentation if necessary. The Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) are transport layer protocols.
5. Session Layer (Layer 5): The session layer establishes, maintains, and terminates
communication sessions between
two devices. It manages the
dialogue between applications,
allowing them to exchange data. It
also handles session recovery if a
connection is interrupted.
6. Presentation Layer (Layer 6):
The presentation layer deals with
data translation, encryption, and
compression. It ensures that data
sent by one device can be
understood by another by
translating between different data
formats and character sets. It also
handles encryption and
decryption when needed.
7. Application Layer (Layer 7):
The application layer is the
topmost layer and interacts
directly with software applications
and the end-user. It provides
application services for various network-aware applications, such as web browsers,
email clients, and file transfer utilities. Protocols like HTTP, FTP, and SMTP operate
at this layer.
The OSI model is a useful framework for understanding networking concepts and
troubleshooting network issues. It provides a clear and structured way to visualize how
data travels through different layers of a network stack. However, it's important to note
that the OSI model is a theoretical model, and in practice, real-world networking protocols
and technologies often combine functionalities from multiple OSI layers. The more
practical TCP/IP model, which consists of four layers (Link, Internet, Transport, and
Application), is commonly used in modern networking discussions and implementations.
COMPUTER AWARENESS
4. Store: The results of the execution are stored in memory or registers. This step
ensures that the computer can access the data or outcomes of the operation as
needed.
5. Repeat: The cycle repeats continuously, fetching and executing instructions one
after another, allowing the computer to perform complex tasks.
COMPUTER-RELATED ABBREVIATIONS
S. Comput Full Form 25 BASIC Beginner’s All-purpose
No er Symbolic Instruction Code
. Abbrevi 26 BCC Blind Carbon Copy
ation 27 BCD Binary Coded Decimal
1 AAC Advanced Audio Coding 28 BCR Bar Code Reader
2 ABR Average Bit Rate 29 BDSL Broadband DSL
3 ADSL Asymmetric Digital 30 BEDO Burst Extended Data Out
Subscriber Line (RAM)
4 AGP Advanced Graphics Port 31 BGP Border Gateway Protocol
5 AI Artificial Intelligence 32 BHTML Broadcast Hyper Text
6 AIM AOL Instant Messenger Markup Language
7 ALGOL Algorithmic Language 33 BIOS Basic Input Output System
8 ALU Arithmetic Logic Unit 34 BIPS Billion Instruction Per
9 AOL America Online Second
10 AMD Advanced Micro Devices 35 BIU Bus Interface Unit
11 API Application Program 36 BMP Bitmap
Interface 37 BRD Blu-Ray Disc
12 APT Automatically Programmed 38 CC Carbon Copy
Tooling 39 CD Compact Disk
13 ARP Address Resolution 40 CD-R Compact Disk – Recordable
Protocol
41 CDROM Compact Disk Read Only
14 ARPAN Advanced Research Memory
ET Projects Agency Network
42 CDRW Compact Disk Rewritable
15 ARQ Automatic Repeat Request
43 CD-WO Compact Disk – Write Once
16 AS Autonomous System
44 CD-XA Compact Disk – Extended
17 ASCII American Standard Code Architecture
for Information Interchange
45 CGI-BIN Common Gateway Interface
18 ASP Active Server Pages – Binary (programming for
19 ASPI Advanced SCSI Web forms)
Programming Interface 46 CIS CompuServe Information
20 ATA Advanced Technology Service
Attachment 47 CISC Complex Instructions Set
21 ATDT Attention Dial Tone Computers
22 AUI Attachment Unit Interface 48 CMD Command
23 AUTOE Autoexec Automatic 49 CMYK Cyan-Magenta-Yellow-
XEC Execution file Black (color model)
24 AVI Audio Video Interleave 50 CNM Circulatory Network Mode
COMPUTER AWARENESS
MS WORD
STARTING WORD PROGRAM
You can start your Word program different ways
One way is through Start button: 1. Click on the Start button. 2. In the menu that
appears select Programs → Microsoft Word. In few seconds you will see Word screen
on the monitor
You can also start your MS Word program by simply clicking on Microsoft Word icon,
which lies on the Microsoft Office Shortcut Bar (MOSB)
COMPUTER AWARENESS
MENUS IN MS WORD
1. File Menu:
New: Create a new, blank document or choose from a variety of
templates.
Open: Open an existing document. You can browse files on your
computer or access documents from cloud storage.
Save: Save the current document. If it's a new document, this will
prompt you to choose a location and name for the file.
Save As: Save a copy of the document with a new name or in a
different location.
Print: Configure printing settings and print the document.
Share: Collaborate with others by sending a link to the document or
inviting others to edit.
Export: Save the document in a different format, such as PDF or
other file types.
Close: Close the current document.
Account: View and manage information related to your Microsoft
account.
Options: Access Word settings to customize the application's
behavior.
Feedback: Provide feedback to Microsoft about Word.
Exit: Close the Word application.
2. Home Menu:
COMPUTER AWARENESS
a) Clipboard:
Cut: Remove the selected content and store it on the clipboard.
Copy: Duplicate the selected content to the clipboard.
Paste: Insert the content from the clipboard.
Use Format Painter to quickly apply the same formatting, such as color, font style and size, or
border style, to multiple pieces of text or graphics. With format painter, you can copy all of the
formatting from one object and apply it to another one—think of it as copying and pasting for
formatting.
b) Font:
Font Type: Choose the typeface or font style for the selected text.
Font Size: Adjust the size of the selected text and also Increase Font Size / Decrease
Font Size by one point at a time
Bold, Italic and underline to the selected text.
Strikethrough: Add a strikethrough effect to the selected text.
Subscript: Format the selected text as subscript (text below the baseline).
Superscript: Format the selected text as superscript (text above the baseline).
Text Effects: Apply special effects to the selected text, such as shadow or reflection.
Text Highlight Color: Apply a highlight color to the selected text.
Font Color: Change the color of the selected text.
Clear Formatting: Remove all formatting from the selected text, returning it to the
default style
c) Paragraph:
Alignment:
Aligns the text to the left margin, right margin. Center alignment makes the text
between the left and right margins
Justify: Aligns the text to both the left and right margins, adding extra spacing
between words as needed.
Line Spacing: Allows you to set single, 1.5, double, or custom line spacing.
Paragraph Spacing: Specifies the amount of space to leave before and after a
paragraph
Increase Indent / Decrease Indent:
Increase Indent: Moves the paragraph to the right.
Decrease Indent: Moves the paragraph to the left.
Sort Ascending / Sort Descending: Arranges selected paragraphs in alphabetical or
numerical order
Show/Hide ¶: Toggles the visibility of non-printing characters, such as paragraph
marks and formatting symbols.
Borders: Opens a dialog box for adding borders and shading to selected paragraphs.
d) Styles: Apply predefined styles to text, such as Heading 1, Heading 2, Normal, etc.
e) Editing:
Find: Search for specific text in the document.
Replace: Replace one set of characters with another.
Select: Various selection options for text
COMPUTER AWARENESS
3. Insert Menu
a) Pages:
Blank Page: Insert a blank page at the cursor's location.
Cover Page: Choose from a gallery of cover page templates.
Page Break: Start a new page at the cursor's location.
b) Tables:
Table: Create a table by specifying the number of rows and columns.
Excel Spreadsheet: Embed an Excel spreadsheet into the document.
c) Illustrations:
Pictures: Insert an image from your computer.
Online Pictures: Search for and insert images from online sources.
Shapes: Draw various shapes, such as lines, rectangles, and arrows.
SmartArt: Create and insert SmartArt graphics for visual representation of
information.
Chart: Insert a chart to represent data graphically.
d) Links:
Hyperlink: Insert a hyperlink to a website, email address, or another location.
Bookmark: Create a bookmark within the document.
e) Comments: Add a comment to a specific part of the document.
f) Text:
Text Box: Insert a text box for placing text in a specific location.
Quick Parts: Insert reusable pieces of content, such as fields or document
properties.
g) Symbols: Insert special characters and symbols.
h) Header & Footer:
Header: Add a header to the top of the page.
Footer: Add a footer to the bottom of the page.
i) Page Number: Add page numbers to the document.
j) Text Group:
Date & Time: Insert the current date and time.
Object: Embed an object (e.g., a file or spreadsheet) into the document.
k) Links: Create a hyperlink to another document or web page.
l) Text: Insert a text box for placing text in a specific location
4. Design Menu
a) Choose a Theme:
In the "Document Formatting" group, you'll see a gallery of available themes
Hover over a theme to see a live preview in your document
Click on the desired theme to apply it
COMPUTER AWARENESS
b) Colors:
Theme Colors: Choose from a set of colors that are part of the selected theme
More Colors: Access additional color options
c) Font Formatting: Change the font styles used in your document
d) Others: Watermark, Page color, Page borders
5. Page Layout Menu:
a) Margins: Adjust the margins of your document, controlling the space between the text
and the edge of the page.
b) Orientation: Choose between "Portrait" (vertical) and "Landscape" (horizontal) page
orientations.
c) Size: Set the paper size for your document (e.g., letter, legal, A4).
d) Columns: Divide your document into multiple columns. You can specify the number
of columns and the spacing between them.
e) Breaks: Insert various types of breaks, such as page breaks or section breaks.
f) Line Numbers: Add line numbers to your document.
g) Hyphenation: Control automatic hyphenation of words at the end of lines.
6. References Menu: Used for adding citations, creating a table of contents, and
managing footnotes and endnotes.
7. Mailings Menu: Contains tools for creating mail merges (Mail Merge is the
combination of mail and letters with pre-addressed envelopes or address labels
for mass mailings from a standard letter), envelopes, labels, and other document
automation tasks.
8. Review Menu: Tools for proofreading, tracking changes, adding comments, and
protecting documents.
9. View Menu: Options for adjusting the view of your document, such as zoom, page
layout, and document pane options.
10. Add-ins Menu: Access additional features and tools provided by installed add-ins.
COMPUTER AWARENESS
7. White Space: The white space within the document area is where you input and
arrange your content. You can insert paragraphs, tables, images, and other elements
into this space.
PRINTING DOCUMENT
1. Open the Document: Open the Microsoft
Word document that you want to print.
2. Check Page Layout: Before printing, it's a
good idea to check the page layout to ensure it
meets your printing preferences. You can do
this by going to the "Layout" or "Page Layout"
tab, where you can set options such as
orientation, margins, and size.
3. Preview the Document (Optional): You can
preview how your document will look before
printing. Click on the "File" tab, select "Print,"
and then choose "Print Preview." This allows
you to see the pages and make sure everything looks as expected.
4. Access the Print Dialog: Click on the "File" tab in the top-left corner.
5. Select Print: In the left-hand menu, click on "Print."
6. Choose Printer and Settings: On the Print screen, select the printer you want to use
from the drop-down menu. Set the desired print settings, such as the number of
copies, page range, and other options.
7. Print: Once you've configured the settings, click the "Print" button.
Additionally, you might encounter some variations in the steps based on the version of
Microsoft Word you are using. For instance, in Word 2016 and later versions, you can
access the print settings directly by pressing Ctrl + P (or Command + P on Mac).
68. Ctrl + Shift + E: Track Changes 87. Ctrl + Alt + Shift + N: Apply
69. Ctrl + Shift + N: Normal style Normal style
(remove formatting) 88. Ctrl + Alt + Shift + L: Apply List
Headers and Footers: Bullet style
70. Alt + Shift + P: Insert Page 89. Ctrl + Alt + Shift + C: Copy
Number formatting
71. Alt + Shift + D: Insert Date 90. Ctrl + Alt + Shift + V: Paste
72. Alt + Shift + T: Insert Time formatting
73. Alt + Shift + R: Insert Reference 91. Ctrl + Alt + Shift + H: Replace
(cross-reference) formatting
Miscellaneous: 92. Ctrl + Alt + Shift + K: Format as
74. Ctrl + Alt + V: Paste Special small caps
75. Ctrl + F6: Switch between open 93. Alt + Ctrl + 0 (zero): Add or
Word documents remove space before the
76. Ctrl + Shift + G: Open the Word paragraph
Count dialog 94. Ctrl + Alt + Shift + -: Display or
77. Ctrl + F12: Open document hide character formatting
78. Ctrl + Shift + F12: Print Preview 95. Ctrl + Alt + Shift + W: Underline
79. Alt + Shift + K: Start AutoFormat words only
80. Alt + Shift + C: Close Print 96. Alt + Ctrl + Shift + L: Set
Preview language
81. Alt + F8: Macros 97. Alt + Ctrl + Shift + C: Copy
82. Alt + F9: Toggle field codes formatting from the selected text
83. Ctrl + Shift + F9: Unlink a field 98. Alt + Ctrl + Shift + V: Paste
84. Ctrl + F9: Insert an empty field formatting to the selected text
85. Ctrl + F10: Maximize or restore 99. Ctrl + Alt + Shift + H: Apply
the document window Hidden formatting
86. Ctrl + Alt + Shift + S: Apply a style 100. Ctrl + Alt + Shift + N: Apply
No Spacing style
MS POWERPOINT
MS PowerPoint is a program that is used to make presentations, which helps us to
understand the concept
FEATURE TERMS AND DESCRIPTIONS
COMPUTER AWARENESS
• Template on Microsoft.com: Microsoft Office Templates and Theme Gallery which are
arranged according to type (Click on the File tab, select the New option, and then click on
PowerPoint presentations and slides from the Available Templates and Themes.)
DESIGN THEME/TEMPLATE
A Theme gives your slides a
consistent appearance
throughout your
presentation.
Themes/ template contain
color schemes with custom
formatting, styled fonts, and
layouts. When you apply a
design template
to your presentation, the
slide master and color
scheme of the template replaces the original blank slide.
ADD TEXT
The template for the design Theme you
select will determine the font type and text
alignment. PowerPoint places all
information (text and graphics) contained
on a slide in separate Placeholders.
Placeholders are designated by dotted
lines; they appear on a slide as guides, but
they will not appear on the finished
presentation. In order to edit text, click once inside of the
Text Placeholder and the insertion point will appear; then
begin to type your text
ADD NEW SLIDE
A slide layout defines the placement of text, pictures,
tables, and graphs. If you change the layout of a slide, the
text and graphics remain intact. You can resize text and
graphic boxes to conform to the new layout
On the Home ribbon, located in the Slides group, click on
the New Slide drop-down arrow. The Office Theme panel
will appear with multiple slide layouts. Select your desired
slide layout.
EDITING TECHNIQUES
Modes for Editing
The Normal, Slide Sorter, Reading, and Slide Show Views allow you to type, edit, and
view your presentation. To switch between views, click the View Options buttons at the
lower right-hand side of the PowerPoint window.
COMPUTER AWARENESS
RIBBONS IN
POWERPOINT
HOME
1. Clipboard Group:
Cut (Ctrl + X): Remove the selected content and store it on the Clipboard.
Copy (Ctrl + C): Duplicate the selected content and store it on the Clipboard.
Paste (Ctrl + V): Insert the content stored on the Clipboard.
Format Painter: Copy formatting from one place and apply it to another.
2. Slides Group:
New Slide (Ctrl + M): Add a new slide to your presentation.
Slides: View and navigate through the slides in your presentation.
Outline View: Switch to outline view to edit text content.
3. Font Group:
Bold (Ctrl + B): Make the selected text bold.
Italic (Ctrl + I): Italicize the selected text.
Underline (Ctrl + U): Underline the selected text.
Font Color: Change the color of the selected text.
COMPUTER AWARENESS
1. Slides Group:
New Slide (Ctrl + M): Add a new slide to your presentation.
Duplicate Slide: Create a copy of the selected slide.
Sections: Organize your slides into sections.
2. Tables Group:
Table: Insert a table into your slide.
Excel Spreadsheet: Embed an Excel spreadsheet into your slide.
3. Illustrations Group:
Pictures: Insert images from your computer.
Online Pictures: Search for and insert online images.
Shapes: Add various shapes to your slide.
SmartArt: Create and insert SmartArt graphics.
Chart: Insert a chart to represent data graphically.
4. Links Group:
Hyperlink (Ctrl + K): Add hyperlinks to text or objects.
Action: Set actions for objects, like hyperlinks or animations.
5. Text Group:
Text Box: Insert a text box for additional text.
Header & Footer: Add headers and footers to slides.
6. Media Group:
Audio: Insert audio files into your presentation.
Online Audio: Search for and insert online audio.
Video: Embed videos into your slides.
Online Video: Search for and insert online videos.
7. Symbols: Insert special symbols into your text.
8. Comment (Ctrl + Alt + M): Add comments to collaborate with others.
9. Text Group (Advanced):
COMPUTER AWARENESS
Themes Group:
Browse for Themes: View and choose from a gallery of predefined themes.
Scroll to Browse Themes: Scroll through available themes
Customize Group:
Slide Size: Change the size of your slides (Standard, Widescreen, or Custom).
Format Background: Customize the background of your slides.
Hide Background Graphics: Temporarily hide background graphics.
Slide Orientation: Switch between Portrait and Landscape orientations.
TRANSITION
ANIMATION
1. Animation Group:
Animation Gallery: View a gallery of available animations.
Animation Painter: Copy animations from one object to another.
2. Advanced Animation Group:
Animation Pane: Open the Animation Pane for detailed control over animation
sequences.
Animation Options:
Access advanced animation
settings.
3. Timing Group:
Start: Set when the
animation should start (On
Click, With Previous, After
Previous).
Duration: Set the duration
of the animation effect.
Delay: Add a delay before
the animation starts.
4. Preview Group:
Preview: Preview the
animation effect for the selected object.
Preview Panes: Choose to preview the animations in Normal, Slide Show, or
Reading View.
5. Advanced Animation Group:
Animation Pane: Open the Animation Pane for detailed control over animation
sequences.
Animation Options: Access advanced animation settings.
6. Timing Group:
Start: Set when the animation should start (On Click, With Previous, After
Previous).
Duration: Set the duration of the animation effect.
Delay: Add a delay before the animation starts.
SLIDESHOW
1. Start From
Beginning Group:
From Beginning (F5): Start the slideshow from the first slide.
From Current Slide (Shift + F5): Start the slideshow from the current slide.
2. Set Up Group:
COMPUTER AWARENESS
Set Up Slide Show: Access settings for configuring the slideshow, such as loop
options, narration, and more.
3. Monitors Group:
Use Presenter View: Enable or disable Presenter View, which provides additional
controls for the presenter on one screen while the audience sees the slideshow on
another.
4. Setup Slide Show Group:
Set Up Slide Show: Configure various options for presenting the slideshow, including
starting from the current slide, using timings, etc.
5. Monitors Group:
Use Presenter View: Enable or disable Presenter View for multiple monitor
setups.
Set Up Slide Show: Access settings for configuring the slideshow, such as
loop options, narration, and more.
Use Presenter View: Enable or disable Presenter View, which provides
additional controls for the presenter on one screen while the audience sees the
slideshow on another.
RECORD
1. Record Slide
Show Group:
Record Slide Show: Start recording your presentation from the beginning or from
the current slide.
2. Content:
Take screenshots
3. Auto Play Media :
Screen Recoding: Record as you work
Video: Insert Videos
Audio: Record audio or insert from your Pc
4. Save: You can save what you have Presented or make it a video
Review
The “Review” tab is specially made for feedback on your presentation. You can
leave comments, compare versions of the presentation, and proofread and translate
the slides.
VIEW
COMPUTER AWARENESS
The “View” tab in PowerPoint allows you to access the various view options in your
PowerPoint presentation.
In the “Presentation Views” group, you can access the “Outline”, “Slide
Sorter”, “Notes”, “Reading” and “Slide Master” view.
Format Tab (Contextual Tab)
The format tab only appears when you select an object on the slide. The “Shape
Format” tab appears when you select a shape or a text and allows you to format shapes
in PowerPoint, whereas the “Picture Format” tab appears when you select a picture.
The commands in the tools tab vary and are specific to editing the selected object.
POWERPOINT SHORTCUTS
General Shortcuts: 10. Ctrl + V (Windows) / Command
1. Ctrl + N (Windows) / Command + V (Mac): Paste.
+ N (Mac): New presentation. 11. Ctrl + D (Windows) / Command
2. Ctrl + O (Windows) / Command + D (Mac): Duplicate slide.
+ O (Mac): Open presentation. 12. Ctrl + K (Windows) / Command
3. Ctrl + S (Windows) / Command + K (Mac): Insert hyperlink.
+ S (Mac): Save presentation. Slide Show Shortcuts:
4. F12 (Windows) / Command + 13. F5 (Windows) / Command +
Shift + S (Mac): Save As. Return (Mac): Start from the first
5. Ctrl + P (Windows) / Command slide.
+ P (Mac): Print presentation. 14. Shift + F5 (Windows) /
Slide Navigation: Command + Option + Return
6. Ctrl + Z (Windows) / Command (Mac): Start from the current slide.
+ Z (Mac): Undo. 15. N (Windows/Mac): Advance to
7. Ctrl + Y (Windows) / Command the next slide.
+ Y (Mac): Redo. 16. P (Windows/Mac): Go back to the
8. Ctrl + C (Windows) / Command previous slide.
+ C (Mac): Copy. 17. B (Windows/Mac): Turn the
9. Ctrl + X (Windows) / Command screen black during a
+ X (Mac): Cut. presentation.
COMPUTER AWARENESS
MS EXCEL
It is a spreadsheet program developed by Microsoft. Excel organizes data in columns and
rows and allows you to do mathematical functions. It runs on Windows, macOS, Android
and iOS.
The first version was released in 1985 and has gone through several changes over the
years. However, the main functionality mostly remains the same.
Excel is typically used for:
Analysis
Data entry
Data management
Accounting
Budgeting
Data analysis
Visuals and graphs
Programming
Financial modeling
And much, much more!
It can be used with both work and in everyday life, such as to create a family budget
It has a huge community support
It is continuously supported by Microsoft
Templates and frameworks can be reused by yourself and others, lowering creation
costs
OVERVIEW
This chapter is about giving you an overview of Excel. Excel's structure is made of two
pieces, the Ribbon and the Sheet.
Have a look at the picture below. The Ribbon is marked with a red rectangle and
the Sheet is marked with a yellow rectangle:
The App launcher icon has nine dots and is called the Office 365 navigation bar. It
allows you to access the different parts of the Office 365 suite, such as Word,
PowerPoint and Outlook. App launcher can be used to switch seamlessly between the
Office 365 applications.
COMPUTER AWARENESS
Tabs
The tab is a menu with sub divisions sorted into groups. The tabs allow users to quickly
navigate between options of menus which display different groups of functionality.
Groups
The groups are sets of related commands. The groups are separated by the thin
vertical line break.
Commands
The commands are the buttons that you use to do actions.
THE SHEET
The Sheet is a set of rows and columns. It forms the same pattern as we have in math
exercise books, the rectangle boxes formed by the pattern are called cells.
Values can be typed to cells.
Values can be both numbers and letters:
Each cell has its unique reference, which is its coordinates, this is where the columns and
rows intersect.
Let's break this up and explain by an example
Have a look at the picture below. Hello world was typed in cell C4. The reference can be
found by clicking on the relevant cell and seeing the reference in the Name Box to the
left, which tells you that the cell's reference is C4.
COMPUTER AWARENESS
Another way to find the reference is to first find the column, in this case C, then map that
towards the row, in this case 4, which gives us the reference of C4.
Note: The reference of the cell is its coordinates. For example, C4 has the coordinates
of column C and row 4. You find the cell in the intersection of the two. The letter is always
the column and the number is always the row.
Multiple Sheets
You start with one Sheet by default when you create a new workbook. You can have many
sheets in a workbook. New sheets can be added and removed. Sheets can be named to
making it easier to work with data sets.
SYNTAX
A formula in Excel is used to do mathematical calculations. Formulas always start with
the equal sign = typed in the cell, followed by your calculation.
Note: You claim the cell by selecting it and typing the equal sign (=)
Creating formulas, step by step
Select a cell
Type the equal sign (=)
Select a cell or type value
Enter an arithmetic operator
Select another cell or type value
Press enter
For example =1+1 is the formula to calculate 1+1=2
COMPUTER AWARENESS
Note: Type values by selecting a cell, claim it by entering the equal sign (=) and then type
your value. For example =309.
Here is how
to do it, step by step.
1. Select the cell C1
2. Type the equal sign (=)
3. Left click on A1, the cell that has the (309) value
4. Type the minus sign (-)
5. Left click on B2, the cell that has the (35) value
6. Hit enter
COMPUTER AWARENESS
Tip: The formula can be typed directly without clicking the cells. The typed formula would
SELECTIONS
The Name Box
The Name Box shows you the reference of which cell or range you have selected. It can
also be used to select cells or ranges by typing their values.
Selecting a Cell
Cells are selected by clicking them with the left mouse button or by navigating to them
with the keyboard arrows.
It is easiest to use the mouse to select cells.
To select cell A1, click on it:
COMPUTER AWARENESS
Selecting a Column
Columns are selected by left clicking it. This will select all cells in the sheet related to the
column.
To select column A, click on the letter A in the column bar:
COMPUTER AWARENESS
Selecting a Row
Rows are selected by left clicking it. This will select all the cells in the sheet related to that
row.
To select row 1, click on its number in the row bar:
Selection of Ranges
Selection of cell ranges has many use areas and it is one of the most important concepts
of Excel.
There are two ways to select a range of cells
1. Name Box
2. Drag to mark a range.
The easiest way is drag and mark. Let's keep it simple and start there.
How to drag and mark a range, step-by-step:
1. Select a cell
2. Left click it and hold the mouse button down
3. Move your mouse pointer over the range that you want selected. The range that is
marked will turn grey.
4. Let go of the mouse button when you have marked the range
EXCEL FILL
Filling makes your life easier and is used to fill ranges with values, so that you do not
have to type manual entries.
Filling can be used for:
Copying
Sequences
Dates
Functions (*)
How To Fill
Filling is done by selecting a cell, clicking the fill icon and selecting the range using drag
and mark while holding the left mouse button down.
The fill icon is found in the bottom right corner of the cell and has the icon of a small
square. Once you hover over it your mouse pointer will change its icon to a thin cross.
Click the fill icon and hold down the left mouse button, drag and mark the range that you
want to cover.
In this example, cell A1 was selected and the range A1:A10 was marked.
COMPUTER AWARENESS
Fill Copies
Filling can be used for copying. It can be used for both numbers and words.
Let's have a look at numbers first.
In this example we have typed the value A1(1):
Filling the range A1:A10 creates ten copies of 1:
EXCEL FILL
Filling
Filling makes your life easier and is used to fill ranges with values, so that you do not
have to type manual entries.
Filling can be used for:
Copying
Sequences
Dates
Functions (*)
For now, do not think of functions. We will cover that in a later chapter.
How To Fill
Filling is done by selecting a cell, clicking the fill icon and selecting the range using drag
and mark while holding the left mouse button down.
The fill icon is found in the bottom right corner of the cell and has the icon of a small
square. Once you hover over it your mouse pointer will change its icon to a thin cross.
COMPUTER AWARENESS
Click the fill icon and hold down the left mouse button, drag and mark the range that you
want to cover.
In this example, cell A1 was selected and the range A1:A10 was marked.
Now that we have learned how to fill. Let's look into how to copy with the fill function.
Fill Copies
COMPUTER AWARENESS
Filling can be used for copying. It can be used for both numbers and words.
Let's have a look at numbers first.
In this example we have typed the value A1(1):
FILL SEQUENCES
Filling can be used to create sequences. A sequence is an order or a pattern. We can
use the filling function to continue the order that has been set.
Sequences can for example be used on numbers and dates.
Let's start with learning how to count from 1 to 10.
This is different from the last example because this time we do not want to copy, but
to count from 1 to 10.
Start with typing A1(1):
First we will show an example which does not work, then we will do a working one
Lets type the value (1) into the cell A2, which is what we have in A1. Now we have the
same values in both A1 and A2.
COMPUTER AWARENESS
Let's use the fill function from A1:A10 to see what happens. Remember to mark both
values before you fill the range.
What
happened is that we got the same values as we did with copying. This is because the fill
function assumes that we want to create copies as we had two of the same values in both
the cells A1(1) and A2(1).
Change the value of A2(1) to A2(2). We now have two different values in the
cells A1(1) and A2(2). Now, fill A1:A10 again. Remember to mark both the values
(holding down shift) before you fill the range:
COMPUTER AWARENESS
The fill function understands the pattern typed in the cells and continues it for us.
That is why it created copies when we had entered the value (1) in both cells, as it saw
no pattern. When we entered (1) and (2) in the cells it was able to understand the pattern
and that the next cell A3 should be (3).
EXCEL RELATIVE REFERENCES
References are used in formulas to do calculations, and the fill function can be used to
continue formulas sidewards, downwards and upwards.
Excel has two types of references:
1. Relative references
2. Absolute references
Relative reference
References are relative by default, and are without dollar sign ($).
The relative reference makes the cells reference free. It gives the fill function freedom to
continue the order without restrictions.
Let's have a look at a relative reference example, helping the Pokemon trainers to count
their Pokeballs (B2:B7) and Great balls (C2:C7).
COMPUTER AWARENESS
The references being relative allows the fill function to continue the formula for rows
downwards.
Have a look at the formulas in D2:D7. Notice that it calculates the next row as you fill.
ABSOLUTE REFERENCES
Absolute reference is when a reference has the dollar sign ($).
It locks a reference in the formula.
Add $ to the formula to use absolute references.
The dollar sign has three different states:
Absolute for column and row. The reference is absolutely locked.
Example =$A$1
Absolute for the column. The reference is locked to that column. The row remains
relative.
Example =$A1
Absolute for the row. The reference is locked to that row. The column remains
relative.
Example =A$1
Let's have a look at an example helping the Pokemon trainers to calculate prices for
Pokeballs
Type or copy the following data:
COMPUTER AWARENESS
The price's reference is B11, we do not want the fill function to change this, so we lock it.
The reference is absolutely locked by using the formula $B$11.
How to do it, step by step:
1. Type C2(=)
2. Select B11
3. Type ($) before the B and 11 ($B$11)
4. Type (*)
5. Select B2
6. Hit enter
7. Auto fill C2:C7
COMPUTER AWARENESS
EXCEL FUNCTIONS
COMPUTER AWARENESS
Database Functions:
19. DSUM: Adds the numbers in a column of a list or database that meet multiple
criteria.
Example: =DSUM(Database, "Sales", Criteria_Range)
20. DCOUNT: Counts the cells that contain numbers in a database.
Example: =DCOUNT(Database, "Sales", Criteria_Range)
Array Functions:
21. SUMPRODUCT: Multiplies corresponding components in the given arrays and
returns the sum of those products.
Example: =SUMPRODUCT(A1:A10, B1:B10)
22. TRANSPOSE: Transposes the rows and columns of an array.
Example: =TRANSPOSE(A1:C3)
Engineering Functions:
23. DEGREES and RADIANS: Converts angles from radians to degrees or vice versa.
Example: =DEGREES(A1)
24. CONVERT: Converts a number from one measurement system to another.
Example: =CONVERT(A1, "m", "ft")
Information Functions:
25. ISNUMBER: Tests if a value is a number.
Example: =ISNUMBER(A1)
26. ISTEXT: Tests if a value is text.
Example: =ISTEXT(B1)
86400 Explained
Excel uses a 24-hour system.
Each day has 24 hours.
One hour is 60 minutes.
One minute is 60 seconds.
24(hours) * 60(minutes) * 60 (seconds) = 86400
Example
COMPUTER AWARENESS
00:01 * 86400 = 60
The example returns 60 because one minute (00:01) is 60 seconds.
EXCEL FILTER
In Microsoft Excel, the "Filter" feature allows you to quickly and easily narrow down the
data displayed in a range or table based on
specific criteria.
1. Select Your Data:
Click on any cell within the range
you want to filter.
2. Activate the Filter:
Go to the "Home" tab in the Excel
ribbon.
Click on the "Filter" button. This
button usually looks like a funnel or
a triangle icon and is located in the
"Editing" group.
3. Filter Columns:
Once you have activated the filter, drop-down arrows will appear in the header of
each column.
Click on the arrow in the column header you want to filter.
4. Filter Options:
In the filter menu, you'll see various options depending on the data type in the
selected column.
For text columns, you can choose specific text values.
For numeric columns, you can set number ranges.
For date columns, you can choose date ranges or specific dates.
5. Filtering Multiple Columns:
You can apply filters to multiple columns simultaneously.
Click the drop-down arrow in one column and set your criteria.
Repeat the process for other columns.
6. Clear Filters:
To remove filters and display all data again, go back to the "Filter" button on the
"Home" tab and click it.
7. Custom Filters:
Excel also allows you to create custom filters for more complex criteria.
Click on the "Filter" button, and then choose "Filter by Color," "Filter by Cell Value,"
or "Filter by Icon" based on your needs.
8. Filtering in Tables:
If you're working with Excel tables, you can filter directly within the table.
Click on the filter icon in the header of a column, and a filter menu will appear.
9. Advanced Filtering:
COMPUTER AWARENESS
For more complex criteria, you can use the "Advanced Filter" feature.
Go to the "Data" tab, and in the "Sort & Filter" group, click on "Advanced."
Specify the criteria and the range, and Excel will create a new list based on your
criteria.
10. Sorting with Filters:
You can also sort your data within the filtered range.
Click on the drop-down arrow in the column you want to sort by and choose the
sorting option.
EXCEL SORT
Sorting data in Microsoft Excel is a common and essential task that helps you organize
information in a meaningful way.
Sorting a Range:
1. Select the Range:
Click on any cell
within the range you
want to sort.
2. Go to the "Data" Tab:
Navigate to the
"Data" tab in the
Excel ribbon.
3. Sort Ascending (A-Z, 1-9):
In the "Sort & Filter"
group, click on the
"Sort Ascending"
button (A-Z or
Smallest to Largest
icon).
This will arrange the selected range in ascending order based on the
values in the selected column.
4. Sort Descending (Z-A, 9-1):
Alternatively, click on the "Sort Descending" button (Z-A or Largest to
Smallest icon) to sort in descending order.
Sorting by Multiple Columns:
5. Sort by Multiple Columns:
If you have data with multiple columns, you may need to sort by more than
one column.
Select the range.
Click on the "Sort" button in the "Sort & Filter" group.
In the "Sort" dialog box, specify the sort order and column for the first level
of sorting.
Click "Add Level" to add additional levels for sorting.
Click "OK" to apply the sorting.
Sorting a Table:
COMPUTER AWARENESS
6. Sort a Table:
If your data is in an Excel Table, click on any cell within the table.
Go to the "Table Design" tab that appears when the table is selected.
In the "Sort" group, choose the column you want to sort by and the sort
order.
Custom Sorting:
7. Custom Sorting:
If you need to sort by a custom order or based on criteria other than values,
you can use the "Sort" dialog box.
Select the range.
Click on the "Sort" button in the "Sort & Filter" group.
In the "Sort" dialog box, choose "Custom List" and select a custom order if
needed.
Set the sort order and column for the primary level of sorting.
Click "OK" to apply the sorting.
Sorting Options:
8. Sort Options:
In the "Sort" dialog box, you can choose additional options, such as sorting
left to right (for rows) or top to bottom (for columns).
9. Sort Warning:
Excel may display a warning if your selection includes merged cells. Ensure
that your data is organized without merged cells to avoid issues with sorting.
10. Undo Sort:
If you make a mistake or want to revert to the original order, use the "Undo" button
(Ctrl + Z).
EXCEL TOP/BOTTOM RULES
In Microsoft Excel, the Top/Bottom Rules
are conditional formatting rules that allow
you to highlight or format cells based on
their position within a range. You can use
these rules to identify the top or bottom
values within a specified range. Here's how
you can apply Top/Bottom Rules:
Highlighting Top or Bottom Values:
1. Select the Range:
Highlight the range of cells
that you want to apply the
Top/Bottom Rules to.
2. Go to the "Home" Tab:
Navigate to the "Home" tab in the Excel ribbon.
3. Choose Conditional Formatting:
In the "Styles" group, click on "Conditional Formatting."
4. Select Top/Bottom Rules:
COMPUTER AWARENESS
Color Scales in Microsoft Excel are a type of conditional formatting that visually
represents the relative values of cells within a selected range. Color scales use a gradient
of colors to highlight the high, low, and midpoint values, allowing you to quickly interpret
and analyze data
Applying Color Scales:
1. Select the Range:
Highlight the range of cells that you want to apply the Color Scales to.
2. Go to the "Home" Tab:
Navigate to the "Home"
tab in the Excel ribbon.
3. Choose Conditional
Formatting:
In the "Styles" group, click
on "Conditional
Formatting."
4. Select Color Scales:
Hover over "Color Scales"
in the menu.
5. Choose a Color Scale:
From the submenu, select
the color scale that suits
your needs. Options
include:
Green-Yellow-Red Color Scale: Gradation from green to yellow to
red.
Red-Yellow-Green Color Scale: Gradation from red to yellow to
green.
Blue-White-Red Color Scale: Gradation from blue to white to red.
Various other two-color and three-color scales.
6. Set Formatting Options (Optional):
After selecting a color scale, Excel will automatically apply default
formatting. However, you can customize the formatting options by choosing
"More Rules" from the submenu.
7. Click OK:
Once you've selected a color scale and, if needed, adjusted the formatting
options, click "OK" to apply the Color Scales.
Example:
Let's say you have a range of values, and you want to highlight them using a Green-
Yellow-Red Color Scale:
1. Select the range of cells.
2. Go to the "Home" tab > "Conditional Formatting."
3. Hover over "Color Scales" and choose "Green-Yellow-Red Color Scale."
COMPUTER AWARENESS
Now, the selected range of values will be formatted with a color gradient, where higher
values are represented in red, medium values in yellow, and lower values in green.
Managing Color Scales:
Clearing Color Scales:
To remove applied color scales, select the range, go to "Home" >
"Conditional Formatting," and choose "Clear Rules."
Editing Color Scales:
To edit or modify the applied color scales, choose "Manage Rules" from the
"Conditional Formatting" menu.
Color Scales provide a quick and effective way to visually interpret data trends and
patterns, especially when dealing with large datasets.
EXCEL FORMATTING
Excel formatting refers to the process of customizing the appearance of your data, cells,
and worksheets to make them more visually appealing and easier to understand. Here
are various formatting options in Microsoft Excel:
Cell Formatting:
1. Font Formatting:
Change font type, size, color, and style using the "Home" tab.
2. Number Formatting:
Control the display of numbers (e.g., currency, percentage, date) using the
"Number" group in the "Home" tab.
3. Alignment:
Adjust text alignment (left, center, right) and orientation in the "Alignment"
group.
4. Cell Borders:
Add or remove borders around cells using the "Border" options in the "Font"
group.
5. Fill Color:
Change the background color of cells using the "Fill Color" option in the
"Font" group.
6. Text Wrap:
Wrap text within a cell to display it on multiple lines using the "Wrap Text"
option in the "Alignment" group.
7. Merge and Center:
Combine multiple cells into one and center the content using the "Merge &
Center" button.
Row and Column Formatting:
8. Row Height and Column Width:
Adjust the height of rows and width of columns by right-clicking and
selecting "Row Height" or "Column Width."
9. Hide/Unhide Rows and Columns:
Right-click on a row or column header and choose "Hide" or "Unhide."
Conditional Formatting:
COMPUTER AWARENESS
EXCEL SHORTCUTS
Navigation Shortcuts: 7. Shift + Space: Select the entire
1. Ctrl + Arrow Keys: Navigate to row.
the edge of data regions. 8. Ctrl + A: Select the entire
2. Ctrl + Home: Move to the worksheet.
beginning of the worksheet. Editing Shortcuts:
3. Ctrl + End: Move to the last cell 9. F2: Edit the active cell.
with data on the worksheet. 10. Ctrl + X, Ctrl + C, Ctrl + V: Cut,
4. Ctrl + Page Up / Page Down: copy, and paste.
Move between worksheet tabs. 11. Ctrl + Z, Ctrl + Y: Undo and redo.
Selection Shortcuts: 12. Ctrl + D: Fill down (copy content
5. Shift + Arrow Keys: Extend the from the cell above).
selection of cells. 13. Ctrl + R: Fill right (copy content
6. Ctrl + Space: Select the entire from the cell to the left).
column. Formatting Shortcuts:
COMPUTER AWARENESS
14. Ctrl + B, Ctrl + I, Ctrl + U: Bold, 33. Ctrl + Shift + "+": Insert a new
italicize, and underline text. row or column.
15. Ctrl + 1: Open the Format Cells Hide/Unhide:
dialog box. 34. Ctrl + 8: Display or hide the
16. Ctrl + Shift + $: Apply currency outline symbols.
format. Find and Replace:
17. Ctrl + Shift + #: Apply date format. 35. Ctrl + F: Open the Find dialog
Function Shortcuts: box.
18. Alt + Equals (=): Insert the SUM 36. Ctrl + H: Open the Replace dialog
function. box.
19. F4: Repeat the last action. Excel Table Shortcuts:
20. Ctrl + ` (backtick): Toggle 37. Ctrl + T: Create a table from the
between displaying cell values selected data.
and formulas. 38. Ctrl + L: Insert a table with
PivotTable Shortcuts: headers.
21. Alt + Down Arrow: Open the Chart Shortcuts:
drop-down menu in a PivotTable. 39. F11: Create a chart from selected
22. Alt + Shift + Left/Right Arrow: data.
Group or ungroup items in a Conditional Formatting:
PivotTable. 40. Alt + H, L, H: Highlight cells rules.
Other Shortcuts: Page Layout Shortcuts:
23. Ctrl + Tab: Switch between open 41. Alt + P, S, P: Set print area.
workbooks. Spell Check:
24. Alt + E, S, V: Paste Special. 42. F7: Start spell check.
25. Alt + Enter: Start a new line within Freeze Panes:
a cell. 43. Alt + W, F, F: Freeze panes.
26. Ctrl + Shift + L: Toggle filters on Workbook and Worksheet
and off. Management:
27. Ctrl + Shift + "+": Insert a new 44. Ctrl + N: Create a new workbook.
worksheet. 45. Ctrl + O: Open an existing
Formula Shortcuts: workbook.
28. Ctrl + Shift + L: Toggle the Excel 46. Ctrl + S: Save the current
table filters on and off. workbook.
29. Ctrl + Shift + "$": Apply currency 47. Ctrl + P: Print the current
format. workbook.
30. Ctrl + Shift + "%": Apply 48. Ctrl + F12: Open the "Save As"
percentage format. dialog box.
Quick Analysis: 49. Ctrl + W: Close the current
31. Ctrl + Q: Open the Quick Analysis workbook.
tool. 50. Ctrl + F4: Close the Excel
Row and Column Shortcuts: application.
32. Ctrl + - (minus): Delete the 51. Ctrl + G: Open the "Go To" dialog
selected column or row. box.
COMPUTER AWARENESS
52. Ctrl + F6: Switch between open 70. Alt + Shift + - (minus): Ungroup
workbooks. rows or columns.
Format Painter: Excel Shortcuts for Mac:
53. Ctrl + Shift + C: Copy formatting. 71. Command (⌘) + Arrow Keys:
54. Ctrl + Shift + V: Paste formatting. Navigate.
Data Validation: 72. Command (⌘) + T: Insert a table.
55. Alt + D, L: Open the Data 73. Command (⌘) + Shift + K: Insert
Validation dialog box. a new worksheet.
AutoSum: Sheet Navigation:
56. Alt + Equals (=): Insert the SUM 74. Ctrl + Page Up/Page Down:
function. Navigate between sheets.
Hyperlinks: Inserting Objects:
57. Ctrl + K: Insert a hyperlink. 75. Alt + N, N: Insert a new
Clearing Content: worksheet.
58. Delete: Clear the content of 76. Alt + N, V, Enter: Insert a new
selected cells. worksheet and move to the next.
59. Ctrl + Alt + - (minus): Delete the Selecting Entire Regions:
selected column or row without a 77. Ctrl + Shift + Right/Left Arrow:
prompt. Select data to the right or left.
Power Query: 78. Ctrl + Shift + Down/Up Arrow:
60. Alt + A, P, R: Open the Power Select data above or below.
Query editor. Copying Formulas:
Excel Help: 79. Ctrl + D: Copy formulas down.
61. F1: Open Excel Help. 80. Ctrl + R: Copy formulas to the
right.
Data Shortcuts: Workbook Navigation:
62. Alt + A, C, C: Clear filters. 81. Ctrl + Tab: Switch between open
Named Ranges: workbooks.
63. Ctrl + F3: Open the Name Excel Formula Shortcuts:
Manager. 82. Ctrl + Shift + " (double
Custom Views: quotation mark): Enter a formula
64. Alt + W, C: Create a custom view. as text.
Data Analysis: 83. Ctrl + [: Select all cells directly
65. Alt + D, S, T: Create a pivot table. referenced by formulas in the
Autofill: selection.
66. Ctrl + E: Flash fill. Excel Filter Shortcuts:
Workbook Views: 84. Alt + Down Arrow: Open the filter
67. Alt + W, G: Switch to Page Layout drop-down menu.
view. 85. Alt + A, S, C: Clear filter from the
68. Alt + W, N: Switch to Normal view. selected column.
Grouping and Outlining: Excel Sort Shortcuts:
69. Alt + Shift + + (plus): Group rows 86. Alt + H, S, A: Sort in ascending
or columns. order.
COMPUTER AWARENESS
NUDI SOFTWARE
Nudi is a computer program and font-encoding standard used for managing and
displaying the Kannada script
The Karnataka government owns and makes the Nudi software available for free and
was started in 2001
It was developed by the Kannada Ganaka Parishat, a non-profit organisation
Most of the fonts included with Nudi can be used for dynamic font embedding
purposes; however, since the fonts and software are available freely, they can be used
in other situations as well, for example database management
It is a font-encoding based standard (i.e., it uses ASCII values to store glyphs)
Nudi editor provides saving in Unicode and Nudi engine provides inputting data in
Unicode provided the system provides support to Unicode and system has an
opentype font
Nudi supports most of the windows based database systems like Access, Oracle,
SQL, DB2 etc., It also supports MySQL
Lohit Kannada is the Unicode used
Up to version 5.0, it was developed based on the Monolingual font-encoding standard
prescribed by the Government of Karnataka. From Nudi 6.0, it has been based on
Unicode. Nudi 6.1 was developed using AutoHotKey scripting.
USING SCIM AS THE INPUT METHOD
The SCIM Input method is used to input different languages, most often Asian
languages like Chinese, Japanese or Korean, but it can be used to input many other
languages as well
SCIM needs to be triggered to be used with any application. The default trigger is
CTRL and SPACE keys on the keyboard
A small tab will pop up at the bottom right corner of the screen. Click on the tab to
choose Kannada
COMPUTER AWARENESS
Kn-itrans method can be chosen if you need to use the transliteration key map (Baraha
Style)
Kn-kgp can be used to input method using the Kannada Ganaka parishat key-map
(Nudi style)
Only Arkavattu works a little different here ( Eg to type surya, we need to press sUrfy,
instead of the usual sUyF)
FONTS USED IN NUDI SOFTWARE
Nudi Akshar: This is the default font in Nudi software, and is used for typing regular
text in Kannada.
Nudi Typewriter: This font is designed to resemble the typewriter font, and is
commonly used for official documents and forms.
Nudi Utkal: This font is designed to resemble the Odia script, and is used for typing
Kannada text in a different style.
Nudi Kedage: This font is designed to resemble the calligraphic style of handwriting,
and is used for decorative purposes or in artistic contexts.
Nudi Shruti: This font is designed for use in print media and is optimized for legibility
and readability.
Nudi Vijay: This font is designed for use in titles and headings, and is optimized for a
bold, impactful look
Font Styles in Kannada Typography:
1. Nudi Classic Font: The Nudi Classic font style is widely used and preferred for its
traditional appeal. It adheres closely to the classic Kannada calligraphy, providing an
elegant and timeless look to your text. The Nudi Classic font is often used in formal
documents, academic publications, and literature to maintain a sense of authenticity
2. Nudi Akshar Font: Modern and contemporary font style designed to enhance the
legibility and clarity of Kannada text. Its clean and crisp appearance makes it suitable for
various digital and print media, including websites, presentations, and educational
materials
3. Nudi Kids Font: As the name suggests, Nudi Kids is a fun and playful font style crafted
specifically for young readers and beginners. Its vibrant and child-friendly design appeals
to young learners, making it ideal for educational materials, children's books, and
interactive content
4. Nudi Namma Font: versatile font style that strikes a balance between traditional and
modern aesthetics. It offers a unique blend of readability and artistic flair, making it
suitable for diverse applications such as advertising, branding, and creative projects
5. Nudi Prema Font: calligraphic-style font that exudes elegance and sophistication. It
adds a touch of artistic finesse to your Kannada text, making it a favored choice for
invitations, greeting cards, and artistic expressions
6. Nudi Sampada Font: Bold and impactful font style, designed to draw attention to your
message. Its assertive appearance makes it suitable for headlines, banners, and eye-
catching elements in designs
COMPUTER AWARENESS
7. Nudi Sandhya Font: Graceful and cursive font style that flows smoothly, mimicking the
beauty of handwritten Kannada. It adds a touch of personalization and warmth to your
text, ideal for personal letters, cards, and creative projects
NOTE : To type Dheergaswara in NUDI, you must have Capslock on
TEXT OPTIONS IN NUDI
Formatting Text in Nudi: Font Styles , Font Size, Bold and Italics, Underline and
Strikethrough, Alignment , Line Spacing, Bullet Points and Numbered Lists
Nudi provides a spell-check and grammar feature to help you identify and correct
spelling and grammatical errors. Running a spell-check ensures your content is error-
free and maintains a professional standard
Nudi allows you to undo or redo changes, providing flexibility during the editing and
formatting process. This feature ensures you can experiment freely without losing your
previous work
After editing and formatting your text in Nudi, save your work to preserve your
changes. Nudi allows you to export your document in various formats, ensuring
compatibility and accessibility
When you encounter a word in your Kannada text, and you wish to find synonyms or
related words, just right-click on the word, and select the "Thesaurus" option. Nudi
will display a list of synonyms and similar words for you to choose from
NUDI KANNADA TYPING