FOC (Unit I)
FOC (Unit I)
Unit I
Computer: Definition, Characteristics of Computers, Basic Applications of Computer, Generations of
computers. Components of Computer System: Central Processing Unit (CPU), input/output Devices, computer
Memory: primary and secondary memory, magnetic and optical storage devices, Concepts of Hardware and
Software.
Unit II
Data processing: concepts of data processing, Definition of Information and data, Basic data types, Storage of
data/Information as files, Representation of data/Information.
Unit III
Operating system-MS-Windows
Operating system-Definition & functions, basics of Windows. Basic components of windows, icons,
types of icons, taskbar, activating windows, using desktop, title bar, running applications, exploring
computer, managing files and folders, copying and moving files and folders.
Control panel – display properties, adding and removing software and hardware, setting date and
time, screensaver and appearance.
Unit IV
Word Processing-MS Word
Word Processing Basic: An Introduction to Word Processing and MS-Word, Working with documents,
using tables, pictures, and charts, using mail merge and sending a letter to a group of people, creating
form letters and labels, collaborating with workgroups, modifying a report, macros.
Unit V
Presentation software-MS Power Point
Creating and enhancing a presentation, creating and publishing a web presentation, modifying a
presentation, working with visual elements, delivering a presentation and designing a template.
Text Book:
UNIT I
1.1 DEFINITION OF COMPUTER
Computer is an electronic data processing device which
=
Accepts and stores data input,
Processes the data input, and
Generates the output in a required format.
1.2.2 Accuracy
In addition to being very fast, computers are very accurate.
The calculations are 100% error free.
Computers perform all jobs with 100% accuracy provided that correct input has beengiven.
1.2.4 Diligence
Unlike human beings, a computer is free from monotony, tiredness and lack of
concentration.
It can work continuously without any error and boredom.
It can do repeated work with same speed and accuracy.
1.2.5 Versatility
A computer is a very versatile machine.
This machine can be used to solve the problems related to various fields.
At one instance, it may be solving a complex scientific problem and the very next moment
it may be playing a card game.
1.2.6 Reliability
A computer is a reliable machine.
Modern electronic components have long lives.
Computers are designed to make maintenance easy.
1.2.7 Automation
Computer is an automatic machine.
Automation means ability to perform the given task automatically.
Once a program is given to computer i.e. stored in computer memory, the program and
instruction can control the program execution without human interaction.
S.
Operation Description
No
1 Take Input The process of entering data and instructions into the computer system.
2 Saving data and instructions so that they are available for processing as
Store Data
and when required.
3 Performing arithmetic, and logical operations on data in order to
Processing Data
convert them into useful information.
4 Output The process of producing useful information or results for the user,
Information such as a printed report or visual display.
5 Control the Directs the manner and sequence in which all of the above operations
workflow are performed
The Input devices are used to give the inputs to the computer from user Following are few of the
important input devices which are used in a computer:
1. Keyboard
2. Mouse
3. Joy Stick
4. Light pen
5. Track Ball
6. Scanner
7. Graphic Tablet
8. Microphone
9. Magnetic Ink Card Reader(MICR)
10. Optical Character Reader(OCR)
11. Bar Code Reader
12. Optical Mark Reader(OMR)
1. Keyboard
Keyboard is the most common and very popular input device which helps in inputting data to
the computer. The layout of the keyboard is like that of traditional typewriter, although there are some
additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108
keys are also available for Windows and Internet.
2. Mouse
Mouse is most popular pointing device. It is a very famous cursor-control device having a small
palm size box with a round ball at its base which senses the movement of mouse and sends
corresponding signals to CPU when the mouse buttons are pressed.
Generally it has two buttons called left and right button and a wheel is present between the buttons.
Mouse can be used to control the position of cursor on screen, but it cannot be used to enter text into
the computer.
Advantages:
Easy to use
Not very expensive
3. Joystick
Joystick is also a pointing device which is used to move cursor position on a monitor screen. It is a
stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in a
socket. The joystick can be moved in all four directions.
The function of joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing(CAD) and playing computer games.
4. Light Pen
Light pen is a pointing device which is similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. When the tip of a light pen is moved over the monitor screen and
pen button is pressed, its photocell sensing element detects the screen location and sends the
corresponding signal to the CPU.
5. Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a
mouse. This is a ball which is half inserted and by moving fingers on ball, pointer can be moved. Since
the whole device is not moved, a track ball requires less space than a mouse. A track ball comes in
various shapes like a ball, a button and a square.
6. Scanner
Scanner is an input device which works more like a photocopy machine. It is used when some
information is available on a paper and it is to be transferred to the hard disc of the computer for
further manipulation. Scanner captures images from the source which are then converted into the
digital form that can be stored on the disc. These images can be edited before they are printed.
7. Microphone
Microphone is an input device to input sound that is then stored in digital form. The microphone is
used for various applications like adding sound to a multimedia presentation or for mixing music.
In this method, human readable characters are printed on documents using a special magnetic ink.
MICR input device is generally used in banks because of a large number of cheques to be processed
every day. The bank's code number and cheque number are printed on the cheques with a special type
of ink that contains particles of magnetic material that are machine readable. This reading process is
called Magnetic Ink Character Recognition (MICR).
The main advantages of MICR are that it is fast (saving time) and ensures accuracy of data entry.
OCR is an input device used to read a printed text. OCR scans text optically character by
character, converts them into a machine readable code and stores the text on the system memory.
Bar Code Reader is a device used for reading bar coded data (data in form of light and dark lines).
Bar coded data is generally used in labelling goods, numbering the books etc. It may be a hand held
scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code image,
converts it into an alphanumeric value which is then fed to the computer to which bar code reader is
connected.
OMR is a special type of optical scanner used to recognize the type of mark made by pen or
pencil. It is used where one out of a few alternatives is to be selected and marked.
It is specially used for
Checking the answer sheets of examinations having multiple choice questions in which
large number of candidates appeared.
Market survey, population survey etc., where responses can be restricted to one or more
out of a few possibilities.
Order forms containing a small choice of items.
CPU
Arithmetic Logic
Memory Unit Control Unit
Unit
This unit can store instructions, data and intermediate results. This unit supplies information to
the other units of the computer when needed. It is also known as internal storage unit or main
memory or primary storage or Random Access Memory (RAM). Its size affects speed, power and
capability.
Types of memory
1. Primary memory
2. secondary memory
This unit controls the operations of all parts of computer but does not carry out any actual data
processing operations.
Functions of this unit are:
It is responsible for controlling the transfer of data and instructions among other units of a
computer.
It manages and coordinates all the units of the computer.
It obtains the instructions from the memory, interprets them, and directs the operation of the
computer.
It communicates with Input/Output devices for transfer of data or results from storage.
It does not process or store data.
1. Arithmetic section
2. Logic Section
Arithmetic Section:
Function of arithmetic section is to perform arithmetic operations like addition, subtraction,
multiplication and division. All complex operations are done by making repetitive use of above
operations.
Logic Section:
Function of logic section is to perform logic operations such as comparing, selecting, matching
and merging of data.
Following are few of the important output devices which are used in a computer
1. Monitors
2. Graphic Plotter
3. Printer
Monitors:
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The
sharpness of the image depends upon the number of pixels.
Printers :
Printer is an output device, which is used to print information on paper. There are two types of
printers
Impact Printers
Non-Impact Printers
Printer
Impact Printers:
The impact printers print the characters by striking them on the ribbon which is then pressed on
the paper.
Characteristics of Impact Printers are the following :
Character printers
Line printers
Character Printers:
Character printers are the printers which print one character at a time.
Line printers are the printers which print one line at a time. These are of further two types
Drum Printer
Chain Printer
Non-impact Printers:
Non-impact printers print the characters without using ribbon. These printers print a complete
page at a time so they are also called as Page Printers.
Laser Printers:
These are non-impact page printers. They use laser lights to produce the dots needed to form
the characters to be printed on a page. It has very high speed and good graphics quality. It supports
many fonts and different character size.
It is very expensive. It cannot be used to produce multiple copies of document in a single
printing
Inkjet Printers:
Inkjet printers are non-impact character printers based on a relatively new technology. They
print characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output
with presentable features.
They make less noise because no hammering is done and these have many styles of printing
modes available. Colour printing is also possible. Some models of Inkjet printers can produce multiple
copies of printing also.
S.
No Generation & Description
.
1 First Generation period: 1940-1956. Vacuum tube based.
The first computers used vacuum tubes for circuitry and magnetic drums for memory, taking
up entire rooms. In this generation mainly Batch processing operating system were used. In this
generation Punched cards, Paper tape, Magnetic tape was used as Input device and Output was
displayed on printouts. There were Machine code and electric wired board languages used.
Vacuum Tube
Magnetic drum
2. EDVAC
3. UNIVAC
4. IBM-701
5. IBM-650
Second Generation(1956-1963):
This generation using the transistor were cheaper, more reliable and faster than the first
generation machines made of vacuum tubes.In this generation, magnetic cores were used as primary
memory and magnetic tape and magnetic disks as secondary storage devices.
Second-generation computers moved from cryptic binary machine language to symbolic, or
assembly, languages, which allowed programmers to specify instructions in words and also high level
programming language like FORTRAN, COBOL were used.
The first computers of this generation were developed for the atomic energy industry.
Transistors
Use of transistors
Reliable as compared to First generation computers
Smaller size as compared to First generation computers
Generate less heat as compared to First generation computers
Consumed less electricity as compared to First generation computers
Faster than first generation computers
Still very costly
A.C. needed
Support machine Language and Assembly languages
Batch processing and Multiprogramming operating system were used
The third generation of computer is marked by the use of Integrated Circuits (IC's) in place of
transistors.A single I.C has many transistors, resistors and capacitors along with the associated
circuitry.The I.C was invented by Jack Kilby.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers
through keyboards and monitors and interfaced with an operating system, which allowed the device to
run many different applications at one time with a central program that monitored the memory.
In this generation Remote processing, Time-sharing, Real-time, Multi-programming Operating
System were used. High level language (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC,
ALGOL-68 etc.) were used during this generation.
The fourth generation of computers is marked by the use of Very Large Scale Integrated
(VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements and their
associated circuits on a single chip. Fourth Generation computers became more powerful, compact,
reliable, and affordable. As a result, it gave rise to personal computer (PC) revolution.
The Intel 4004 chip, developed in 1971, located all the components of the computer. In 1981 IBM
introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. As these
small computers became more powerful, they could be linked together to form networks, which eventually
led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the
mouse and handheld devices.
In this generation Time sharing, Real time, Networks, Distributed Operating System were
used.All the Higher level languages like C and C++, DBASE etc. were used in this generation.
Digital Age:
Digital computer converts data into digits (binary digit 0 and 1) all operations are carried out on
these digits at extremely fast rates. Digital computer much faster than analogue computer and far more
accurate. This type of computer is used for scientific applications and business.
1. Purpose wise
2. Size and performance
i. Special purpose
ii. General purpose
1. Embedded Computers:
The instructions are embedded withincircuitry of applications ances . Such as
televisions, washing machine and wrist watch.
These computers are typically pre-programmed for a specific task.
2. Micro Computer:
Raja College of Arts and Science 18
Department of Computer Science and BCA Fundamentals of Computer
IBM PC’S
APPLE MAC
IBM PS/2
Three major categories of micro computer’s are
1. PDA
2. Desktop Computers
3. Workstation
It is very enormously in their computational power, speed, memory, and physical size.
Smallest computer held in one hand and are called personal digital assistants (PDA).
They are used as note book, scheduling system and address book. If equipped with cellular
phone they can connect to worldwide computer network to exchange information regardless of
location.
Desktop Computers:
Laptop Computers:
It has hardware and software as pcs .They are micro compact and have fact ,light weight LCD
instead of video monitor .
It is also called note books carried out in briefcase.
Work Stations:
Mini Computers:
Also called midrange servers.More powerful than microcomputer in terms of processing power
and capabilities.
It is multi user systems where many users simultaneously work on the systems.
It has greater processing speeds and very large storage capacities and memory as compared to
mini computers.
More than one processor multi-processor system –multiuser system.
Capable of handling more input and output devices.
Examples:
PDP ,VAX,7500,MAGNUM .
Mainframe Computers:
ICL 39 ,CDC 6600 , VAX 8842 , IBM 3090 / 600 ,IBM 4381
Super computers:
More powerful computer. Consists of several processors. It Can perform billions of instructions
per second. Computing capability equal to that of 49000 micro computers
These computers cost several lacks. Used in weather Forecasting unclear science research
aerodynamic modeling, seismology metrology ,etc.
Example :
CRAY,X-MP-14 ,CDC-205,ETA GF -10,FUJITSV VP-400 ,NECSX-2 ,PARAM, PACE2
Analog Computers
Raja College of Arts and Science 20
Department of Computer Science and BCA Fundamentals of Computer
Advantage:
A calculation take place in parallel and hence these are faster.
Used in engineering and scientific applications
Example of analog computer electronic weighting machine.
Accuracy is poor compared to digital counterparts.
Hybrid Computers :
Utilize the best qualities of both the digital and analog computer
Some calculation take place in analog manner and rest of them take place in digital manner.
Used in hospital where analog part is responsible for measurement of patient’s heart beat blood
pressure, temperature and the operation is carried out in digital fashion monitor patient’s
vitalsigns .Used in weather forecasting.
ROM (``Read Only Memory''): contains programs and/or data ``burned in'' at the time of
manufacture.Commonly used to contain programs to ``boot up'' the computer when it is
switched on.
PROM (``Programmable Read Only Memory''):ROM which is ``blank'' and into which
programs and/or data can be written, but only once.
EPROM (``Erasable Programmable Read Only Memory''): PROM which can be erased, usually
by exposure to UV light through a transparent window above the chip.
1.8.2 Secondary Storage
Secondary storage is relatively permanent but ``further away'' from the CPU.
Secondary storage for computers is non-volatile (i.e. does not require electrical power to
retain its contents.
The basic types of secondary storage are:
Magnetic tape
Magnetic disk (``hard'' and ``floppy'')
Optical disk (CD-ROM, WORM, MO).
Magnetic Tape
This is oldest, and originally the only, form of secondary storage.It is still used, mostly for
backup or archival storage, and for batch processing.
Data is stored on tracks on the tape - most tapes have9 tracks.
There are several varieties of magnetic tape:
14" reels of 1/2" wide tape (2400' long)
Cartridges of 1/4" tape
Cassettes (very similar to audio cassettes)
Digital Audio Tape (DAT).
Bytes of data (i.e. 8 bits) are stored across the width of the tape.
The 9th bit is a parity bit. It helps to detect storage errors. Two types of parity can be used.
With even parity, the parity bit is set so that the group of 9 bits has an even number of `1' bits.
With odd parity, the parity bit is set so that the group of 9 bits has an odd number of `1' bits.
Data is stored at different densities (e.g. 1600 and 6250 bpi, where ``bpi'' means ``bytes per
inch'').
It is very inexpensive
It can store large amounts of data
It is relatively robust
And the following disadvantages: 1. It only allows access to data sequentially and is therefore
very slow compared to other secondary storage technologies; 2. May need manual
intervention to mount/dismount.
Magnetic Disks
This is the most common form of secondary storage used today. Magnetic disks come in two
forms:
hard disks
floppy disks
Hard disks are (usually but not always) permanently mounted inside the computer. All
magnetic disks have a magnetisable iron oxide coating and read/write heads that can move over
the surface of the disk, which is spinning underneath it.
The disk head works in a similar way to the head in an audio tape recorder. The read/write
head in a floppy disk drive actually contacts the magnetic disk, but that in a hard disk ``flies'' a few
thousandths of an inch above it.
Optical Disks
Optical disks are becoming more common. They come in several varieties:
CD-ROM (Compact Disk Read Only Memory)
CD-R (Compact Disk Recordable)
CD-RW (compact Disk Re-Writable)
DVD (Digital Versatile/Video Disk)
DVD-R (Digital Versatile Disk Recordable)
DVD-RW (Digital Versatile Disk Re-Writable)
MO (magneto-optical).
CD-ROM
WORM
These are the optical version of magnetic hard disks - that is, data can be written to them and
erased from them.
Similar in storage capacity and access time to the other types of optical disks.
Data is written by heating a spot on the disk with a laser beam, in the presence of a magnetic
field, the direction of which determines whether a `0' or `1' is written.
Data is read by shining a lower power laser beam onto the disk spot (without the magnetic
field) and detecting the polarization of the light that is reflected.
1.9 SOFTWARE
A collection (or) A set of programs that govern the operations of a computer system and make
the hardware run .
Software can be classified broadly into two categories.
System software.
Application software.
Operating System :
It is a program which acts as an interface between user and the hardware call computer
resource.
Goal:
To make computer system convenient to use.
To use computer hardware in a efficient manner .
It is an important compound of a computer systems which controls all other compounds of
the computer system.
Language Processors:
Programmer writes their programme in one of the high level language.
The computer does not understand the high level language .
The programme4s are use to convert high level language program in to machine language.
1. Assembler:
Convert the program return in assembly language in to machine language,
2. Interpreter :
Convert a high level language program in to machine language by converting and
executing it line by line.
3. Compiler :
Converts high level language program in to machine language.Convert the entire HLL
program in one go and reports all the error of a program along with the line number.
Processing words
Inventory control
Handling calculations
Medical accounting
Financial accounting
Result preparation
Railway reservation
Package
Utilities
Customized software
Package:
General software are designed and used by users for their needs and requirements such
application software are known as packages.
It packages are
Word processing software .
Spread sheet
Database management system
Desktop publishing software
Graphics, multimedia and presentation software.
The software that handles page layout by combining the function of a traditional type settler
and a layout artist is known as desktop publishing software .
Example : Photoshop
Benefits :
Create professionals looking visual aids for as guidance.
Create lecture demonstrations programs
Utilities :
Programs assist the computer by performing housekeeping functions like backing up disk or
scanning cleaning viruses or arranging information etc..
Important Utilities :
1) TEXT EDITOR :
Used for creating ,editing textiles.
Using this program any text can be typed and save on a disk file.
Special command for text editing (i.e) insert , delete, find replace characters
lines ,paragraphs .
2) PACKUP UTILITIES :
Backup means duplication disk information
Any backup data may be used
3) COMPRESSION UTILITIES :
Used for compression of files
Using compression take less storage area
Example : Winzip
4) DISK FRAGMENTATION :
When using large programe , computer spliks the file and store it in pieces
5) ANTIVIRUSES SOFTWARE :
Ensure viruses free work environment .
Used for scanning our disk for viruses and remove it
Example : K7, Avast.
UNIT II
2.Definition of Communication:
The transmission of data from one computer to another, or from one device to another. A
communications device, therefore, is any machine that assists data transmission.
Example: modems, cables, and ports are all communications devices. Communications software refers
to programs that make it possible to transmit data.
2. Half-duplex: Communication can take place in one direction at a time. Suppose node A and B
are connected then half-duplex communication means that at a time data can flow from A to B
or from B to A but not simultaneously. eg. Two persons talking to each other such that when
speaks the other listens and vice versa.
1. Point to Point: In this communication only two nodes are connected to each other. When a
node sends a packet then it can be received only by the node on the other side and none else.
1. Attenuation: When a signal transmits in a network then the quality of signal degrades as the
signal travels longer distances in the wire. This is called attenuation. To improve quality of
signal amplifiers are used at regular distances.
Bandwidth
Bandwidth simply means how many bits can be transmitted per second in the communication
channel. In technical terms it indicates the width of frequency spectrum.
2. Optical Fiber
1. Coaxial Cable:
Coaxial cable consists of an inner conductor and an outer conductor which are
separated by an insulator. The inner conductor is usually copper. The outer conductor is
covered by a plastic jacket.
It is named coaxial because the two conductors are coaxial. Typical diameter of coaxial
cable lies between 0.4 inch and 1 inch.
The most application of coaxial cable is cable T.V. The coaxial cable has high
bandwidth, attenuation is less.
2. Twisted Pair:
A Twisted pair consists of two insulated copper wires, typically 1mm thick. The wires
are twisted together in a helical form the purpose of twisting is to reduce cross talk interference
between several pairs.
Twisted Pair is much cheaper than coaxial cable but it is susceptible to noise and electromagnetic
interference and attenuation is large.
3. Optical Fiber:
In optical fiber light is used to send data. In general terms presence of light is taken as bit 1
and its absence as bit 0. Optical fiber consists of inner core of either glass or plastic.
Core is surrounded by cladding of the same material but of different refractive index. This
cladding is surrounded by a plastic jacket which prevents optical fiber from electromagnetic
interference and harshly environments.
It uses the principle of total internal reflection to transfer data over optical fibers. Optical
fiber is much better in bandwidth as compared to copper wire, since there is hardly any
attenuation or electromagnetic interference in optical wires.
Hence there is fewer requirements to improve quality of signal, in long distance
transmission. Disadvantage of optical fiber is that end points are fairly expensive. (eg.
switches)
2. Depending on radius
Thin optical fiber
Thick optical fiber
1. Radio
2. Terrestrial
3. Satellite Communication
1. Radio:
Raja College of Arts and Science 34
Department of Computer Science and BCA Fundamentals of Computer
Radio is a general term that is used for any kind of frequency. But higher frequencies are
usually termed as microwave and the lower frequency band comes under radio frequency.
There are many application of radio. For eg. Cordless keyboard, wireless LAN, wireless
Ethernet but it is limited in range to only a few hundred meters.
Depending on frequency radio offers different bandwidths.
2. Terrestrial microwave:
In terrestrial microwave two antennas are used for communication. A focused beam emerges
from an antenna and is received by the other antenna, provided that antennas should be
facing each other with no obstacle in between.
For this reason antennas are situated on high towers. Due to curvature of earth terrestrial
microwave can be used for long distance communication with high bandwidth.
Telecom department is also using this for long distance communication.
An advantage of wireless communication is that it is not required to lay down wires in the
city hence no permissions are required.
3. Satellite communication:
Satellite acts as a switch in sky. On earth VSAT(Very Small Aperture Terminal) are used
to transmit and receive data from satellite.
Generally one station on earth transmits signal to satellite and it is received by many
stations on earth. Satellite communication is generally used in those places where it is very
difficult to obtain line of sight i.e. in highly irregular terrestrial regions.
In terms of noise wireless media is not as good as the wired media.
There are frequency band in wireless communication and two stations should not be
allowed to transmit simultaneously in a frequency band.
The most promising advantage of satellite is broadcasting. If satellites are used for point to
point communication then they are expensive as compared to wired media.
The word “Topology” was taken from the Greek word "Topos" meaning "Place," Topology, in
relation to networking, describes the configuration of the network; including the location of the
workstations and wiring connections.
There are five primary types of network topologies which refer to the physical and logical layout
of the Network cabling. They are:
1. Star Topology
2. Bus Topology
3. Ring Topology
4. Tree Topology
All devices connected with a Star setup communicate through a central Hub by cable segments.
Signals are transmitted and received through the Hub.
It is the simplest and the oldest and all the telephone switches are based on this.
In a star topology, there can be multiple connections in parallel.
Advantages:
It is much easier to modify or add new computers to a star network without disturbing the rest
of the network.
The centre of a star network is a good place to diagnose network faults. Intelligent hub (hub
with microprocessors that implement features in addition to repeating network signals) also
provide for centralized monitoring and management of the network.
Network administration and error detection is easier because problem is isolated to central node
Networks runs even if one host fails
Expansion becomes easier and scalability of the network increases
More suited for larger networks
You can use several cable types in the same network with a hub that can accommodate multiple
cable types
Raja College of Arts and Science 36
Department of Computer Science and BCA Fundamentals of Computer
Disadvantages
Broadcasting and multicasting is not easy because some extra functionality needs to be
provided to the central hub
If the central node fails, the whole network goes down; thus making the switch some kind of a
bottleneck
Installation costs are high because each node needs to be connected to the central switch
The purpose of the terminators at either end of the network is to stop the signal being reflected
back.
Advantages
Least expensive since less amount of cabling is required and no network switches are required
Good for smaller networks not requiring higher speeds
Disadvantages:
Trouble shooting and error detection becomes a problem because, logically, all nodes are equal
Less secure because sniffing is easier
Limited in size and speed
Advantages:
Broadcasting and multicasting is simple since you just need to send out one message
Less expensive since less cable footage is required
It is guaranteed that each host will be able to transmit within a finite time interval
Very orderly network where every device has access to the token and the opportunity to
transmit
Performs better than a star network under heavy network load
Disadvantages
Failure of one node brings the whole network down
Error detection (trouble shoot) and network administration becomes difficult
Moves, adds and changes of devices can affect the network
Raja College of Arts and Science 38
Department of Computer Science and BCA Fundamentals of Computer
Generally, a BUS architecture is preferred over the other topologies - of course, this is a very
subjective opinion and the final design depends on the requirements of the network more than
anything else.
Lately, most networks are shifting towards the STAR topology. Ideally we would like to design
networks, which physically resemble the STAR topology, but behave like BUS or RING topology.
There are certain special cases where tree topology is more effective:
Scalable as leaf nodes can accommodate more nodes in the hierarchical chain.
A point to point wiring to the central hub as each intermediate node of a tree topology represents a
node in the bus topology
Other hierarchical networks are not affected if one of them gets damaged
Easier maintenance and fault finding
2.5 Protocol:
A set of rules and regulations are called protocol.
If computers wish to communicate with one another, they have to know in advance exactly how
information is to be exchanged and precisely what the format will be.
Therefore, standard methods of transmitting and processing various kinds of information are used
and these methods are called "protocols".
Protocols are established by international agreement and ensure that computers everywhere can
talk to one another. There are a variety of protocols for different kinds of information and
functions. They are as follows
1. Aloha Protocol
2. UDP Protocol
3. Mail Protocols and SMTP
4. Hypertext Transfer Protocol(HTTP)
5. File Transfer Protocol (FTP)
6. TCP / IP Protocol
The Aloha protocol was designed as part of a project at the University of Hawaii. It provided
data transmission between computers on several of the Hawaiian Islands using radio transmissions.
Pure Aloha
A datagram comprises one single "unit" of binary data; the first eight (8) bytes of a datagram
contain the header information and the remaining bytes contain the data itself.
The UDP header consists of four(4) fields of two bytes each.
Length Checksum
Datagram size
The datagram size is a simple count of the number of bytes contained in the header and data
sections. Because the header length is a fixed size, this field essentially refers to the length of the variable-
sized data portion (sometimes called the payload).
Checksum:
UDP checksums work as a safety feature. The checksum value represents an encoding of the
datagram data that is calculated first by the sender and later by the receiver. Should an individual datagram
be tampered with (due to a hacker) or get corrupted during transmission (due to line noise, for example),
the calculations of the sender and receiver will not match, and the UDP protocol will detect this error.
Email is the most widely used application service which is used by users. It differs from other
uses of the networks as network protocols send packets directly to destinations using timeout and
retransmission for individual segments if no ack returns.Email applications involve two aspects -
User-agent( pine, elm etc.)
Transfer agent( sendmail daemon etc.)
When an email is sent it is the mail transfer agent (MTA) of the source that contacts the MTA of
the destination. The protocol used by the MTA 's on the source and destination side is called SMTP.
Simple Mail Transfer Protocol(SMTP) TCP/IP protocol suite specifies a standard for the
exchange of mail between machines. It deals with how the underlying mail delivery system passes
messages across a link from one machine to another.
The mail is enclosed in what is called an envelope. . The mail consists of two parts namely the
Header and the Data. The Header has the To and From fields. In SMTP data portion can contain only
printable ASCII characters.
Given a reliable end-to-end transport protocol like TCP, File Transfer might seem trivial. But,
the details like authorization, representation among heterogeneous machines make the protocol
complex.
A TCP entity accepts user data streams from local processes, breaks them up into pieces not
exceeding 64KB and sends each piece as a separate IP datagram.
Header length:
This field tells how many 32-bit words are contained in the TCP header.
Window Size:
Flow control in TCP is handled using a variable-size sliding window. The Window Size field
tells how many bytes may be sent starting at the byte acknowledged.
Checksum:
This is provided for extreme reliability. It checksums the header, the data, and the conceptual
pseudoheader. Including the pseudoheader in TCP checksum computation helps detect undelivered
packets
Urgent Pointer:
Indicates a byte offset from the current sequence number at which urgent data are to be found.
Urgent data continues till the end of the segment. This is not used in practice. The same effect can be
had by using two TCP connections, one for transferring urgent data.
UNIT -III
3. Operating system
3.1 Definition of Operating System:
An Operating System is a program which acts as an interface between user and the hardware call computer
resource.
Goal:
To make computer system convenient to use.
To use computer hardware in an efficient manner.
Coordinates all the activities among computer hardware devices
It is an important compound of a computer systems which controls all other compounds of the
computer system.
Single process
Single process operating systems are capable of working on only one task at a time
Multi process
Multi process operating systems can work on several processes But Executed Only One task at a time
by breaking the tasks into threads.
Thread: Smallest part of programs that can be scheduled(divided) and Ready For execution.
The management of two or more tasks, or programs, running on the computer system at the
same time is called multitasking, or multiprogramming. The first program is executed until an
interruption occurs, such as a request for input. While the input request is handled, the execution of a
second program begins. Because switching among these programs occurs so rapidly, they appear to be
executing at the same time. However, because there is only one processor, only one program is
actually in execution mode at any one time
Co-operative Multitasking
Pre-emptive multitasking.
Co-operative Multitasking:
Applications can control the system resource until they are finished. If a task caused faults or
other problems, it would cause the system to become unstable and force a reboot(restart).
Pre-emptive Multitasking:
Applications are allowed to run for a specified period of time depending priority basis. If a
particular task is causing problems or faults, that application can be stopped(can Not Restarted)
without the system becoming unstable. Used inWindows 9.x, Windows XP, Vista and Windows 7 and
all network operatingsystems.
Multi user:
This is similar to multitasking and is the ability for multiple users toaccess at the same time.
The OS switches back and forth between users.
Example :
Multiprocessor:
Having multiple processors installed in a system such that tasks are divided between them.
Now all latest operating systems uses symmetricmultiprocessing.
Multithreading:
Thread is a smallest part of a program that can be scheduled forexecution.
CPU Utilization:
Keep CPU utilization as high as possible. (What is utilization, by the way?).
Throughput:
Number of processes completed per unit time.
Turnaround Time:
Mean time from submission to completion of process.
Waiting Time:
Amount of time spent ready to run but not running.
Response Time:
Time between submission of requests and first response to the request.
Scheduler Efficiency:
The scheduler doesn't perform any useful work, so any time it takes is pure overhead.
So, need to make the scheduler very efficient.
Warm Boot
A warm boot means restarting a computer that is already on.Itnormally happens after installing
a new software or hardware or after an application crashes or stops working.
Cold Boot
A cold boot means starting a computer that is already off. It happens when we turn on.
Operating systems are there from the very first computer generation.Operating systems keep
evolving over the period of time. Following are few of the important types of operating system which
are most commonly used.
Real-time systems are used when there are rigid time requirements on the operation of a
processor or the flow of data and real-time systems can be used as a control device in a dedicated
application. Real-time operating system has well-defined, fixed time constraints otherwise system will
fail. For example Scientific experiments, medical imaging systems, industrial control systems, weapon
systems, robots, and home-appliance controllers, Air traffic control system etc.
Way 2:
ClicStart---- Button Choose-----Run Type cmd
2. cd..
Goes back one directory
3. cd
Typing cd alone will print the working directory.
Change Drive
The (:) is used to change Drive from one Drive to Another Drive.
Ex:
D:
Examples:
1. copy *.* a:
Copy all files in the current directory to thea disk drive.
2. copy file1.txt file2.txt
Copy the contents of file1.txt to file2.txt
3. copy myfile1.txt+myfile2.txt
Copy the contents in myfile2.txt and combines it with the contents in myfile1.txt.
Copy con Command
The COPY command can be used to create text files by copying from device CON: to a file.
The procedure is outlined in the text of the example below.
C:\>COPY CON: TEXTFILE
This is the text to go into the text file being created. Each line is typed to the screen and it
isbeing saved into a buffer for later transfer to the file TEXTFILE. Each line may be corrected as it is
typed, but cannot be changed after it is terminated by the carriage return. Also, if you happen totype
beyond column 80 on the screen, you cannot correct anything on the line above. Each linemust be
terminated by a carriage return (the enter key). You signal you are finished by typing aControl-Z, the
symbol for end-of-file, followed by Return. ^Z
1 File(s) copied
DEL command is used to delete files from the computer. Deleting files from MS-DOS does not
send files to the recycle bin.
Examples:
1. del test.tmp
Deletes the test.tmp in the directory that you currently are in, if the file exists.
2. del c:\windows\test.tmp
Delete the c:\windows\test.tmp in the windows directory if it exists.
Examples:
1. DIR
Lists all files and directories in the directory that you are currently in.
2. dir /w
If information on the date / time and other information on the files are not needed, then this
command can be used to list just the files and directories going horizontally, taking as little as space
needed
.
4. dir /on
List the files in alphabetical order by the names of the files.
5. dir /o-n
List the files in reverse alphabetical order by the names of the files.
UNIT IV
Unix was originally developed in 1969 by a group of AT&T employees at Bell Labs, including
Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna
The UNIX operating system is a set of programs that act as a link between the computer and the
user. The UNIX operating system is capable of handling activities from multiple users at the same time
that is called multiuser system.
A user can also run multiple programs at the same time; hence UNIX is called multitasking.UNIX
systems also have a graphical user interface (GUI) similar to MicrosoftWindows, which provides an easy
to use environment.In 1969 Ken Thompson wrote the first version of UNIX, called UNICS.
UNICSstood for Uniplexed Operating and Computing System. Although the operating systemhas
changed, the name stuck and was eventually shortened to UNIX.
One of the biggest reasons for using UNIX is networking capability. With other
operatingsystems, additional software must be purchased for networking. With UNIX,
networkingcapability is simply part of the operating system.
UNIX is ideal for such things as worldwide e-mail and connecting to the Internet. UNIX was
founded on what could be called a "small is good" philosophy. The idea is thateach program is
designed to do one job well. Because UNIX was developed differentpeople with different needs it has
grown to an operating system that is both flexible andeasy to adapt for specific needs. UNIX was
written in a machine independent language.
So UNIX and UNIX-like operatingsystems can run on a variety of hardware. These systems are
available from manydifferent sources, some of them at no cost. Because of this diversity and the ability
toutilize the same "user-interface" on many different systems, UNIX is said to be an opensystem.
The kernel of UNIX is the core of the operating system: it allocates time and memory
to programs and handles the file store and communications in response to systemcalls.
As an illustration of the way that the shell and the kernel work together, suppose auser types rm
myfile (which has the effect of removing the file myfile). The shellsearches the file store for the file
containing the program rm, and then requests thekernel, through system calls, to execute the program
rm on myfile.
When the processrm myfile has finished running, the shell then returns the UNIX prompt % to
theuser, indicating that it is waiting for further commands.
The shell acts as an interface between the user and the kernel. When a user logs in,the login
program checks the username and password, and then starts anotherprogram called the shell. The shell
is a command line interpreter (CLI).
It interpretsthe commands the user types in and arranges for them to be carried out.
Thecommands are themselves programs: when they terminate, the shell gives the useranother prompt
(% on our systems).
The adept user can customize his/her own shell, and users can use different shells on
the same machine. Staff and students in the school have the tcsh shell by default.The tcsh shell has
certain features to help the user inputting commands.
Filename Completion - By typing part of the name of a command, filename ordirectory and pressing
the [Tab] key, the tcsh shell will complete the rest of the nameautomatically. If the shell finds more
than one name beginning with those letters youhave typed, it will beep, prompting you to type a few
more letters before pressing thetab key again.
History - The shell keeps a list of the commands you have typed in. If you need torepeat a command,
use the cursor keys to scroll up and down the list or type historyfor a list of previous commands.
4.2.3 Program
A unified file system to represent data, programs, and any input or outputports used to transfer
data as files, nested in directories, in a hierarchical treestructure.
A process is the flow of execution of a set of program instructions and owns, as a
system entity, the necessary resources
In the diagram above, we see that the home directory of the undergraduate student"ee51vn"
contains two sub-directories (docs and pics) and a file called report.doc.The full path to the file
report.doc is "/home/its/ug1/ee51vn/report.doc"
This means that inherent to UNIX is the idea thatthere are different users of the system, and
that different users may have different sorts ofprivileges and types of access to different parts of the
system.
It allows for the idea thatsome users may want to protect some of their data from being
accessed by other users onthe system. Likewise, there must be some way to identify one user from
another ina multi-user system. UNIX uses a system of login names to identify users and passwordsto
authenticate that a user is, in fact, who she claims to be.
When you create a new directory, it is not completely empty at its creation time.
Everydirectory has at least two children, . and.. . The directory labeled . refers to the directoryitself,
and .. refers to its immediate parent directory.
Now, it is important to understand the idea of your current directory. At any time, you
will be positioned within some directory on the system. The directory where you
are sitting is known as your current directory.
When you first log into a UNIX machine, your current directory is set for you to yourhome directory.
This is the directory on the system that will hold your personal files. Inthis directory, you can create,
delete, and modify files, as well as controlling how othersaccess your files.
Now that we have an understanding of how our files are laid out, it would be helpfulto know
how to move around the file system. Similar to MSDOS, the cd command isused to change from one
directory to another. Its use is simple; its one argument is thedirectory that you want to move to.
% pwd
/home/iris2/class9
% cd bin
% pwd
/home/iris2/class9/bin
Within the UNIX filesystem, there are some standard places to put different types offiles. This
makes it easy to find things, regardless of which UNIX system you are using.Some standard
conventions are used: bin is used for binaries or executable files, lib isused as the library, src is used
for source code, etc is used for miscellaneous system files.
Directories that are children of the directory /usr are used for things that users wouldencounter,
as opposed to system files. The following table lists some commonly founddirectories and their usual
contents.
/ Root of the filesystem
/bin Basic Unix commands
/dev Special device files
/etc System configuration files
/home Use home directories
/tmp Temporary files
/usr The bulk of the operating systemfiles
/usr/local Local additions and modificationsto UNIX
/var Log files and frequently changedfiles
Now type in your text. Press the <Return> key to start a new line.When you have finished typing in
your text, enter Ctrl-d (Press and hold down the Ctrlkey and type a "d").This stops the cat command
and returns you to the system prompt.
Create a file use vi Editor
You can use vi editor to create ordinary files on any Unix system. You simply need to give
following command:
$ vi filename
Above command would open a file with the given filename. You would need to press key i to come
into edit mode. Once you are in edit mode you can start writing your content in the file as below:
You can use the wc command to get a count of the total number of lines, words, and characters
contained in a file. Following is the simple example to see the information about above created file:
$ wc filename
2 19 103 filename
$
Here is the detail of all the four columns:
First Column: represents total number of lines in the file.
Second Column: represents total number of words in the file.
Third Column: represents total number of bytes in the file. This is actual size of the file.
$ cp source_file destination_file
Ex:
$ cp notes flow1.txt
$ cp -i notes part2.txt
This makes a copy of the file notes in the file part2.txt. If this file exists, themessagepart2.txt: File
existsis displayed. The file is not copied.
You can use special "wildcard" characters whenever you want to copy several files thathave similar
filenames.Instead of entering the cp command followed by several filenames you can use a single
Examples of using cp with special characters:
To copy files that match on several characters:
cp *.txt chapt1
This copies all the files in the current working directory with the extension ".txt" to thesub-
directorychapt1.
You can display line numbers by using -b option along with cat command as follows:
$ cat filename -b
$ catfilename
1 This is unix file....I created it for the first
This is unix file....I created it for the first
time.....
time.....
2 I'm
4.8.5 going
Deleting Files: to save this content in this file.
I'm going to save this content in this file.
$ To delete an existing file use the rm command. Its basic syntax is:
$
$ rmfilename
$ cat class -b
1 This is unix(eng) file....I created it for the best
time Forever.....
Following
2 I'mis the example
going towhich
savewouldthis
completely remove existing
content in this file filename
file.
$
You can remove multiple files at a tile as follows:
To change the name of a file use the mv command. Its basic syntax is:
Following is the example which would rename existing file filename to newfile:
$ mv old_file new_file
The mv command would move existing file completely into new file..
Ex:
$ mv flow(Old File Name) jai(New File Name)
The access permissions for all three types of user can be given as a string of nine characters
User group others
rwx rwx rwx
These permissions have different meanings for files and directories.
Examples of access permissions
ls -l file1
-rw------- 2 student 3287 Apr 8 12:10 file1
owner of the file has read and write permission.
The chmod (CHange MODe) command alters the accesspermissions to files. If we wanted to
remove the right of anyone else to read UNIX refer the command
chmod or unix.referwould do the trick.
The modifiers for chmod are fairly complex. In general, they can be summarized bysaying that
you specify whose permissions you are modifying (u for the user, g for thegroup, and o for others),
what you are doing to the permission (+ to add, - to remove, or =to set), and what permissions you plan
to modify (r for read, w for write, and x forexecute). See man chmod for the details.
If we then decided that we want to allow peoplewithin our group to modify this bibliography
(refer is the standard UNIX bibliographyprogram), we would use the following command:
chmod g+w unix.refer
The following shows this transaction and its output.
% chmod or unix.refer
% chmod g+w unix.refer
We can now see that the changes we wanted have been made to the file permissions.
% ls l unix.refer
rwrw 1 dickson 1311 Jan 30 18:03 unix.refer
4.10 Security:
Security refers to providing a protection system to computer system resources such as CPU,
memory, disk, software programs and most importantly data/information stored in the computer
system.
If a computer program is run by unauthorized user then he/she may cause severe damage to
computer or data stored in it. So a computer system must be protected against unauthorized access,
malicious access to system memory, viruses, worms etc
4.10.1 Authentication
Authentication refers to identifying the each user of the system and associating the executing
programs with those users. It is the responsibility of the Operating System to create a protection
system which ensures that a user who is running a particular program is authentic. Operating Systems
generally identifies/authenticates users using following three ways:
Username / Password - User need to enter a registered username and password with Operating
system to login into the system.
User card/key - User need to punch card in card slot, or enter key generated by key generator in
option provided by operating system to login into the system.
User attribute - fingerprint/ eye pattern/ signature - User need to pass his/her attribute via designated
input device used by operating system to login into the system.
To log in:
1. Type your userid at the login prompt, then press ENTER. Your userid is case-sensitive, so be
sure you type it exactly as your system administrator instructed.
2. Type your password at the password prompt, then press ENTER. Your password is also case-
sensitive.
3. If you provided correct userid and password then you would be allowed to enter into the
system. Read the information and messages that come up on the screen something as below.
login : bsc
password: it
Last login: Sun Jun 14 09:32:32 2009 from 62.61.164.73
Change Password:
All UNIX systems require passwords to help ensure that your files and data remain your own
and that the system itself is secure from hackers and crackers. Here are the steps to change your
password:
$ passwd
Changing password for bsc
(current) Unix password:**
New UNIX password:*******
Retype new UNIX password:*******
passwd: all authentication tokens updated successfully
$
Raja College of Arts and Science 72
Department of Computer Science and BCA Fundamentals of Computer
UNIT V
5. Introduction to Windows
Windows GUI
Older text-based interfaces like DOS (disk operating system) requiredtyping in cryptic
commands. In an effort to make computers more userfriendly,the graphical user interface was
developed.The graphical user interface (GUI) allows users to have direct control of visibleobjects
(such as icons) and actions that replace complex command syntax.The GUIwas developed by
researchers at Xerox PARC (Palo Alto Research Center), and thenpopularized by the Apple MacIntosh
computer.
Microsoft soon introduced its GUIbasedWindows operating system for IBM-style PCs. The
next generation of GUItechnology will incorporate features such as virtual reality, head-mounted
displays,sound and speech, pen and gesture recognition, animation, multimedia, artificial intelligence,
and cellular/wireless communication capabilities.
The next step in the evolution of GUIs is social interfaces. A social interface is auser interface
that guides the user through computer applications by using cartoonlikecharacters, graphics, animation,
and voice commands. The cartoonlike characters canbe cast as puppets, narrators, guides, inhabitants,
avatars (computer-generated humanlikefigures), or hosts.
GUI Interface
A graphical approach to run a software or perform an action
Related definitions:
Desktop (on-screen work area)
Button (to activate an action – START Button)
Icon (representing a program, software, etc.)
Pointer (I-beam, block arrow, pointing hand)
Click!
Menu (collection of commands)
Dialog Box (Printer box)
Command (We run a command to perform an action)
Window (an area of the screen that displays a program,application, etc.)
A major feature of windows is the ability to be manipulated easily and intuitively (i.e., with
little or no instruction) even by inexperienced users. The ways in which they can be manipulated
usually include
1. opening (such as by clicking on an icon and starting an application program) and closing,
2. moving to any area of the screen by dragging (i.e., moving by placing the pointer over the
window and moving the mouse with a button held down),
3. repositioning so that they appear to be behind or in front of other windows or objects on the
screen,
4. adjusting size (i.e., horizontal and/or vertical dimensions)
5. scrolling to any section of the window contents (by using scroll bars along the bottom and right
edges, the mouse wheel or keyboard commands).
The size of most windows can be adjusted over a wide range including full screen, a fraction of the
screen and more than the full screen. In the latter case, the desired section of the window can be
viewed by moving the window to expose it. Windows can also be minimized, which results in their
being replaced by an icon and/or their name, usually in a strip along the bottom of the screen, without
actually closing the underlying application program.
This flexibility is made possible by the various parts which can constitute a window. They
include frames, vertical and horizontal scrollbars, drag strips (usually along the top for dragging the
entire window and along the other edges and lower corners for changing window size), buttons (for
closing, maximizing and minimizing) and tabs (for moving among pages in a window).
Multiple Windows
Another major feature of windows is the ability for multiple windows to be open simultaneously. This
is particularly valuable in a multitasking environment, i.e., an operating system in which multiple
programs can run seemingly simultaneously and without interfering with each other. Each window can
display a different application, or it can display different files that have been opened or created with a
single application (e.g., text, image or spreadsheet files).
When most GUI programs are launched, they open in a single window. There are a
number of exceptions, among them The GIMP (an open source image manipulation program
comparable to Adobe PhotoShop), which opens in multiple windows, each for a different set of tools
or options.
Fig:Multiple Windows(Multitasking)
Icon
Icons are little pictures that represent different programs or saved items. Double-clickingon the
icon accesses the information icons represent.
There are different ways to display information for files or folders. Occasionally you may want
to sort files in aspecific order, or to see more information for the files or folders.
Select the view options using one of thefollowing methods:
Click the arrow of the button on the Command bar, or
right-click in a blank area of the Contents pane and then View, oron the Command bar, click
the Views button to cycle through the different views
Large Icons
Displays files and folders as large icons with file or foldernames below the icon, and is helpful
when you want topreview picture files.
Medium Icons
Displays files and folders as medium-sized icons withthe names below the icons, and is helpful
when youwant an overview of folders or files in a certain location.
Small Icons
Lists files and folders as smaller icons with the namesdisplayed to the right. The main
difference between thisview and the List view is how the contents are sorted. Inthis view, the contents
are sorted alphabetically inmultiple columns from left to right. In the List view, the contents are sorted
alphabetically in multiple columnsstarting with the first column.
Windows menu
Help menu
Windows explorer
Windows Explorer is the file management tool that comes with Windows XP. It gives you
theability to rename, copy, move or delete the folders and files on your computer’s drives.Folders and
files are displayed hierarchically within Windows Explorer. Folders can containsubfolders as well as
files.
Opening Windows ExplorerTo start Windows Explorer, find the My Computer icon on your desktop
or the Start menu.
Right-click to display the pop-up menu, and choose Explore.
The window that opens will look similar to the example below. The title bar at the top of the
window shows “My Computer”. All the drives and other storage devices associated with this
computer are shown on in the right hand pane.
Note that when you are working on the UCT network, you must NOT store your files on the C:
drive. One of the network drives (usually the F: drive) will be identified by your studentnumber, and
has been allocated for your personal use. Because it is a network drive, it isaccessible to you from any
PC on the network.
To navigate through the directory structure and locate files that you want to open, copy, move
or delete, you would do as follows:
1. Double-click on the required drive or removable device (floppy disk or flash drive) todisplay
its contents.
2. Within the selected drive or device, double-click on any folder to view the subfoldersand files
that it contains.
The title bar at the top of the window will then display the name of the currently selectedfolder.
On the left side of the window is a list of all the drives and folders on your computer.
On the right side of the window is a list of all the folders and files located inside the driveor
folder that is currently selected in the left pane.
In the left pane:
A plus sign “+” next to a folder indicates that it contains subfolders that are not currentlyvisible
Clicking on the plus sign (or double-clicking on the folder name) will reveal thesubfolders.
A minus sign “-“ next to a folder indicates that all its subfolders are currently visible. Clickon
the minus sign (or double-click on the folder name) to collapse the subfolders and hidethem
from view.
Indentation levels in the left pane reflect the folder directory structure.You can drag the vertical
line between the left and right panes to make them wider ornarrower.
If there are too many entries to be displayed in a pane, then you can use the vertical scroll barto
view the hidden entries.
Selecting folders or files
In the left pane, click on a drive or folder that you want to select. Its contents will be
displayedin the right pane. Similarly, you would click on a file in the right pane to select it.
Click on the first file (or folder) in the group that you want to select. It will become
highlighted.
Hold down the [SHIFT] key and click on the last file (or folder) in the group that you wantto
select. All the items between the first and the last file (or folder) selected will also
behighlighted.
Release the [SHIFT] key.
Type the name that you want to give the new folder, and press [ENTER]. Your newfolder has
been created!
Whenever you start a new task using an application such as Word or Excel, you’ll need tosave
your work in a file. The process for saving a new file is basically the same for allWindows
applications; the examples used here are based on Word.
At the top of the screen, click on the File menu, and then select theSave As option from the
drop-down menu. (If your window shows atask bar with buttons, then you can click instead on
the icon of a stiffy disk.)Note that in Office 2007, the File menu has been replaced by the
Office Button.A dialogue box will open.
In the Save In field, use the drop-down arrow to select the drive and folder where youwant
your file to be stored.
In the File Name field, type the name that you want to give your new file.
Toolbar icon:
1. In the right pane, select the folders or files you want to copy.
2. Click the Copy To icon on the toolbar.
3. The Copy Items dialogue box will open.
WINDOWS 95:
Windows 95, released in 1995, was the first of a series of products in the Windowsoperating
system that provided a streamlined GUI by using icons to provide instantaccess to common tasks.
Windows 95 is a 32-bit operating system that features multitasking,multithreading, networking, and
Internet integration capabilities, includingthe ability to integrate fax, e-mail, and scheduling programs.
Windows 95 also offers
Plug-and-play capabilities.Plug-and-play is a feature that can automate the installationof new
hardware by enabling the operating system to recognize new hardwareand install the necessary
software (called device drivers) automatically.
Subsequent products in the Microsoft Windows operating system are:
WINDOWS 98
Windows 98 was not a major upgrade to Windows 95, but did offer minor refinements,bug
fixes, and enhancements to Windows 95.Windows 98 introduced the back and forward
navigation buttons(->,<-) and the address bar in Windows Explorer, among other things.
One of the biggest changes was the introduction of the Windows Driver Model for computer
components and accessories – one driver to support all future versions of Windows.USB
support was much improved in Windows 98 and led to its widespread adoption, including USB
hubs and USB mice.
WINDOWS ME
WINDOWS NT
Windows NT is an operating system for high-end desktops, workstations, andservers. It
provides the same GUI as Windows 95 and 98, and has more powerfulmultitasking,
multiprocessing, and memory-management capabilities. Windows NTsupports software written
for DOS and Windows, and it provides extensive computingpower for new applications with
large memory and file requirements. It is alsodesigned for easy and reliable connection with
networks and other computing machinery,and is proving popular in networked systems in
business organizations.
WINDOWS 2000
Windows 2000is a renamed version of Windows NT 5.0. This operating system hasadded
security features, will run on multiple-processor computers, and offers addedInternet and
intranet functionality.
WINDOWS XP
Windows XPis the first upgrade to Windows 2000 and has three versions: a 32-bitconsumer
version, a 32-bit business version, and a 64-bit business version. WindowsXP is the first
version of Windows to support Microsoft’s .NET platform
Following Windows XP, Microsoft will release its first fully .NET-enabled Windowsoperating
system, code-named Blackcomb. Blackcomb will feature natural interfaces,including speech
Raja College of Arts and Science 85
Department of Computer Science and BCA Fundamentals of Computer
Emerging computing environments: client server, grid, ubiquitous and cloud computing