0% found this document useful (0 votes)
22 views45 pages

Ict Computer

The document outlines the Information Communication Technology (ICT) course at Freetown Teachers College for the 2019/2020 academic year, detailing the course structure, learning outcomes, and policies. It covers fundamental computer concepts, applications in various sectors, and the role of computers in modern society. The course aims to equip students with essential ICT skills, including computer operations, software usage, and understanding security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views45 pages

Ict Computer

The document outlines the Information Communication Technology (ICT) course at Freetown Teachers College for the 2019/2020 academic year, detailing the course structure, learning outcomes, and policies. It covers fundamental computer concepts, applications in various sectors, and the role of computers in modern society. The course aims to equip students with essential ICT skills, including computer operations, software usage, and understanding security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

FREETOWN TEACHERS COLLEGE-FTC

JUI

2019/2020 ACADEMIC YEAR

COURSE NUMBER: COURSE TITLE: INFORMATION

COMMUNICATION TECHNOLOGY ICT)

SEMESTER: 2 YEAR: 1 and 2

CREDIT HOURS: 2

INSTRUCTOR’S NAME: ISAAC KOMBA M’BAYOH

CONTACT: +232 77 793 170/+232 79 016 192

EMAIL: [email protected]

OFFICE HOURS: 9:20AM-4:00PM


COURSE OVERVIEW AND DESCRIPTION

General Introduction:

Information Communications Technology -ICT is a very important module as it cuts across all

the sectors of Computer Science, giving an overall summary of all the aspects of Information

Technology. This is nowhere far from truth that the two other IT related modules (Word

Processing and Computer Studies) offered as examinable subjects at final year and at NCTVA

also have in them topics covered under ICT where most of the questions are drawn from areas

such as: Microsoft Office Word, Microsoft Office Excel, Windows and General IT.

Looking at the challenges of times (COVID-19) which resulted in the suspension of lectures,

implying that all courses including as ICT were put on hold. Preparing materials for ICT would

require much more than just explanatory lesson notes but rather one that is similar to an

instructional manual that guides the learner on how to comprehend and implement the

information from this materials using their PCs and Smartphones and as well make it easier to

memorise the content in byte size format to enable quick, easier and faster learning.

OUTCOME AND LEARNING GOALS

By the end of this material, learners will be able to:

Ø Understand the fundamentals of computers and Information Communications

Technology (ICT) together with the advantages and the usages of ICT in today’s world.

Ø Perform simple/system/user-defined computation using the excel spreadsheet

Ø to learn short and direct methods of performing several tasks on Windows, word and

excel.

Ø use quick on-point steps of identifying threats to computers and the essence of securing

computer systems.

Ø use sample questions to prepare for college-based questions and even provide further

knowledge in the field of IT and enhance better understanding of topics in ICT as it

applies to our daily lives.

Ø Help learners to not only learn how to create and configure email accounts, but to also get

the practical experience of sending and receiving emails and to get additional knowledge

on attaching files to mails and downloading attachments on emails.

Ø Introduce new and vital topics such mobile and multimedia and so much more.
POLICIES

ATTENDANCE POLICY: The student is expected to attend all classes. Exceptional cases will

be handled only on individual basis.

SOCIAL DISTANCING AND MARSK-UP POLICY: As it no news that we’re in

extraordinary times in the wake-up to the global pandemic of COVID-19, all students are

supposed to adhere to all government policies on social distancing and masking-up in the fight

against the corona virus disease.

MAKE-UP POLICY: Missed classes may require additional assignments, including written

material to be turned in and/or examinations. Make-up examinations differ from original exams

and are usually more difficult.

Academic Honesty Policy: Academic dishonesty will not be tolerated. This includes cheating,

plagiarism, and falsification of academic records.

That being said, you can help each other out on the homework (this does not mean that you can

copy each other's homework).


CONTENT

1. FUNDAMENTALS OF CMPUTER

2. COMPUTER - APPLICATIONS

3. ROLE OF COMPUTER IN TODAY’S WORLD

4. COMPUTER - PORTS

5. COMPUTER - NUMBER SYSTEM

6. COMPUTER - NETWORKING

7. COMPUTER - INTERNET AND INTRANET

8. COMPUTER RELATED JOBS

9. SECURITY

10. MOBILE

11. MULTIMEDIA

12. COMPUTER SHORTCUTKEYS

13. ABBREVIATIONS
1. FUNDAMENTALS OF COMPUTERS

A computer is basically a programmable machine capable to perform arithmetic and logical

operations automatically and sequentially. It is also known as a data processor, as it can store,

process, and retrieve data as per the wish of the user.

Computer

Data processing involves the following three activities −

• Input of data

• Manipulation/processing of data

• Giving output (i.e. management of output result)

In computer system, data is arranged orderly and systematically.

The term “computer” is derived from a Latin term “compute,” which means ‘to calculate.’

Initially, the computer system had been designed to calculate; it was intended to be a computing

device. However, over a period of time, this device technically advanced; at present, it can

perform a wide range of desirable works apart from data processing.

Major Functions of Computer System

Following are the core functions of a computer system −

• accepts the command and/or data as input given by the user.

• follows the instructions and stores the data given by the user.

• processes the data as per the instructions given by the user.

• gives the desirable results in the form of output.

Salient Features of Computer System

Following are the salient features of a Computer System −

• Automation − The operating system of a computer system is automatic, as no human

intervention is required; simply you need to give the command and then it will do the

work automatically.

• Speed − Depending upon the power of the computer, it can perform, it can take

Millions of instructions per second.

• Storage − A computer system can store enormous quantity of data in different format.
The storage capacity of a computer system is normally expressed in terms of Kilobytes

(KB), Megabytes (MB), Gigabytes (GB), or Terabytes (TB).

• Accuracy − The accuracy of a computer system is very high.

• Versatility − A computer system is capable of performing a wide range of tasks.

• Diligence − A computer neither get tired nor lose concentration.

• Reliability − As a computer system always gives accurate result; therefore, its reliability

is very high.

• Vast memory − A computer system can have a wide range of memory which can recall

the desired data at any point of time.

Evolution of Computer System

The present Computer System has evolved after centuries of efforts from different intellectuals

who contributed their works during different periods of time.

Abacus is (most likely) considered as the earlier counting device.

Let us now read about the innovators who contributed immensely in the development of a

computer system.

John Napier

Napier was a Scottish mathematician who invented logarithms.

Further, Napier also invented a computing device, which consisted of sticks with numbers

imprinted on them. Napier named sticks ‘bones,’ as they were made up of bones.

Blaise Pascal: Pascal was a French mathematician who invented a machine based on gear wheels,

which helped greatly in calculation.

Charles Babbage: Babbage was an English Polymath, Mathematician, Mechanical Engineer,

Philosopher, and Inventor. In 1822, he developed a machine capable to calculate the successive

difference of expression and prepared a table which helped him in his calculations.

Lady Ada Lovelace: Lovelace was an English mathematician, who researched on Babbage’s

work. She has given the concept that ‘computers can be programmed’. Her work helped a great

deal in the advancement of computer system.

John Atanstoff: With the assistance of Berry, John Atanstoff developed the Atanstoff Berry

Computer (more popular as ABC) in 1937. It marked the beginning of the development of

electronic digital computer.

John Mauchly and Eckart: In 1947, John Mauchly and Eckart developed the first large scale

Electronic Digital Computer. It was called the Electronic Numerical Integrator and Calculator
(ENIAC).

Maurice V. Wilkes: In 1949, Wilkes (at Cambridge University) designed Electronic Delay

Storage Automatic Calculator (EDSAC). It was the first computer that started its operating system

on the stored program concept.


2. COMPUTER - APPLICATIONS

In this chapter, we will discuss the application of computers in various fields.

Business

A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which has

made it an integrated part in all business organizations.

Computer is used in business organizations for −

• Payroll calculations

• Budgeting

• Sales analysis

• Financial forecasting

• Managing employee database

• Maintenance of stocks, etc.

• Banking

Today, banking is almost totally dependent on computers.

Banks provide the following facilities −

Online accounting facility, which includes checking current balance, making deposits and

overdrafts, checking interest charges, shares, and trustee records.

ATM machines which are completely automated are making it even easier for customers to deal

with banks.

Insurance

Insurance companies are keeping all records up-to-date with the help of computers. Insurance

companies, finance houses, and stock broking firms are widely using computers for their

concerns.

Insurance companies are maintaining a database of all clients with information showing −

• Procedure to continue with policies

• Starting date of the policies

• Next due installment of a policy

• Maturity date

• Interests due

• Survival benefits

• Bonus

Education

The computer helps in providing a lot of facilities in the education system.

The computer provides a tool in the education system known as CBE (Computer Based

Education).

CBE involves control, delivery, and evaluation of learning.


Computer education is rapidly increasing the graph of number of computer students.

There are a number of methods in which educational institutions can use a computer to educate

the students.

It is used to prepare a database about performance of a student and analysis is carried out on this

basis.

Marketing

In marketing, uses of the computer are following −

Advertising: With computers, advertising professionals create art and graphics, write and revise

copy, and print and disseminate ads with the goal of selling more products.

Home Shopping: Home shopping has been made possible through the use of computerized

catalogues that provide access to product information and permit direct entry of orders to be filled

by the customers.

Healthcare: Computers have become an important part in hospitals, labs, and dispensaries. They

are being used in hospitals to keep the record of patients and medicines. It is also used in

scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT scans, etc. are also

done by computerized machines.

Following are some major fields of health care in which computers are used.

• Diagnostic System − Computers are used to collect data and identify the cause of

illness.

• Lab-diagnostic System − All tests can be done and the reports are prepared by

computer.

• Patient Monitoring System − These are used to check the patient's signs for abnormality

such as in Cardiac Arrest, ECG, etc.

• Pharma Information System − Computer is used to check drug labels, expiry dates,

harmful side effects, etc.

• Surgery − Nowadays, computers are also used in performing surgery.

Engineering Design: Computers are widely used for Engineering purpose.

One of the major areas is CAD (Computer Aided Design) that provides creation and modification

of images. Some of the fields are −

• Structural Engineering − Requires stress and strain analysis for design of ships,

buildings, budgets, airplanes, etc.

• Industrial Engineering − Computers deal with design, implementation, and

improvement of integrated systems of people, materials, and equipment.

• Architectural Engineering − Computers help in planning towns, designing buildings,

determining a range of buildings on a site using both 2D and 3D drawings.


Military: Computers are largely used in defence. Modern tanks, missiles, weapons, etc. Military

also employs computerized control systems. Some military areas where a computer has been used

are −

• Missile Control

• Military Communication

• Military Operation and Planning

• Smart Weapons

Communication: Communication is a way to convey a message, an idea, a picture, or speech

that is received and understood clearly and correctly by the person for whom it is meant. Some

main areas in this category are −

E-mail

Chatting

Usenet

FTP

Telnet

Video-conferencing

Government: Computers play an important role in government services. Some major fields in

this category are −

• Budgets (Ministry of Finance)

• Sales tax department

• Income tax department (NRA)

• Computation of male/female ratio (Statistics)

• Computerization of voters lists (NEC/NCRA)

• Computerization of PAN card

• Weather forecasting
3. ROLE OF COMPUTER IN TODAY’S WORLD

In today’s world, for almost every activity whether personal (for example, operating personal

savings bank account) or business-related (for example, selling any product or services); in some

or the other way, we rely on the computer system.

Due to the growing dependency on computers, every small and big organizations and other

business companies have started offering computer-based service. Furthermore, the advancement

of communications, electronic service networks, and multimedia have opened a new door for

corporates by providing an effective way of business processing, payment transfer, and service

delivery.

Advantages of Computers in Business

Following are the major advantages of introducing computer system in business −

Independency

As computers help in making the business automated, the businesses are becoming more and

more independent. No more, there is the need to put man-power for every work, as with the help

of computer most of the works can be automated. Starting from ticket booking to a luxury car

manufacturing, everything is automated.

Cost Cutting

A number of business are based online in recent times; therefore, there is no need to open

business branch in every city, rather having one centralized inventory can make the business

easier. There is no need to employ many man-power.

Marketing

With the use of computer system with Internet facility, it is very simple to make a business global

in a given period of time. Website, email, social media websites, online advertisements, etc. are

the important tools of online marketing.

Marketing

Huge Transaction Capacity

A number of tasks are being done by computer including ticket booking to money transactions;

this increases the transaction capacity.

Huge Storage Capacity

Normally, most of the businesses need to store and maintain huge data and other records;

manually, it is very difficult to maintain, but the use of computer not only increases the storage

capacity, but also facilitates the processing and retrieval of data anytime.

Improvement of Productivity & Efficiency

As most of the tasks in almost every industry has become automated, it has now become much

easier to manufacture a huge bulk of products in very less time. Through computer technology,

services also became faster and easier.

High Accuracy
There is hardly any scope of errors in an automated system; however, if any error occurs, it is

largely a human error.

Ease of Data Sharing

Data sharing has now become very simple just the way it is simple to link one computer system to

another.

Competition

The applicability of computer technology has increased competition; now, the customers can

avail support 24x7.

Enhanced the Security System

Computer also helps keep the data of businesses secure. However, this security can face threats

too. For instance, if someone hacks the system or there is a virus attack, it can have the potential

to damage all the data that is secured.


4. COMPUTER - PORTS

A port is a physical docking point using which an external device can be connected to the

computer. It can also be programmatic docking point through which information flows from a

program to the computer or over the Internet.

Characteristics of Ports

A port has the following characteristics −

External devices are connected to a computer using cables and ports.

Ports are slots on the motherboard into which a cable of external device is plugged in.

Examples of external devices attached via ports are the mouse, keyboard, monitor, microphone,

speakers, etc.

Let us now discuss a few important types of ports −

Serial Port: Used for external modems and older computer mouse

Two versions: 9 pin, 25 pin model

Data travels at 115 kilobits per second

Parallel Port: Used for scanners and printers

Also called printer port

25 pin model

IEEE 1284-compliant Centronics port

PS/2 Port: Used for old computer keyboard and mouse. Also called mouse port Most of the old

computers provide two PS/2 port, each for the mouse and keyboard

IEEE 1284-compliant Centronics port

Universal Serial Bus (or USB) Port): It can connect all kinds of external USB devices such as

external hard disk, printer, scanner, mouse, keyboard, etc. It was introduced in 1997.

Most of the computers provide two USB ports as minimum. Data travels at 12 megabits per

seconds.

USB compliant devices can get power from a USB port.

VGA Port: Connects monitor to a computer's video card. It has 15 holes.

Similar to the serial port connector. However, serial port connector has pins, VGA port has holes.

Power Connector

Three-pronged plug.

Connects to the computer's power cable that plugs into a power bar or wall socket.

Firewire Port: Transfers large amount of data at very fast speed. Connects camcorders and video

equipment to the computer. Data travels at 400 to 800 megabits per seconds. Invented by Apple.

It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector, and 9-Pin

FireWire 800 connector.


Modem Port: Connects a PC's modem to the telephone network.

Ethernet Port: Connects to a network and high speed Internet. Connects the network cable to a

computer. This port resides on an Ethernet Card. Data travels at 10 megabits to 1000 megabits per

seconds depending upon the network bandwidth.

Game Port: Connect a joystick to a PC Now replaced by USB

Digital Video Interface, DVI port: Connects Flat panel LCD monitor to the computer's high-end

video graphic cards. Very popular among video card manufacturers.

Sockets: Sockets connect the microphone and speakers to the sound card of the computer.
5. COMPUTER - NUMBER SYSTEM

When we type some letters or words, the computer translates them in numbers as computers can

understand only numbers. A computer can understand the positional number system where there

are only a few symbols called digits and these symbols represent different values depending on

the position they occupy in the number.

The value of each digit in a number can be determined using −

The digit

The position of the digit in the number

The base of the number system (where the base is defined as the total number of digits available

in the number system)

Decimal Number System

The number system that we use in our day-to-day life is the decimal number system. Decimal

number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the

successive positions to the left of the decimal point represent units, tens, hundreds, thousands, and

so on.

Each position represents a specific power of the base (10). For example, the decimal number

1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,

and 1 in the thousands position. Its value can be written as

(1 x 1000) + (2 x 100)+ (3 x 10)+ (4 x l) (1 x 103)+ (2 x 102)+ (3 x 101)+ (4 x l00) 1000 + 200 +

30 + 4 1234

As a computer programmer or an IT professional, you should understand the following number

systems which are frequently used in computers.

S.No. Number System and Description

Binary Number System

Base 2. Digits used: 0, 1

Octal Number System

Base 8. Digits used: 0 to 7

Hexa Decimal Number System

Base 16. Digits used: 0 to 9, Letters used: A- F

Binary Number System

Characteristics of the binary number system are as follows:

Uses two digits, 0 and 1

Also called as base 2 number system

Each position in a binary number represents a 0 power of the base (2). Example 20

Last position in a binary number represents a x power of the base (2). Example 2x where x

represents the last position - 1.


Example

Binary Number: 101012

Calculating Decimal Equivalent −

Step Binary Number Decimal Number

Step 1 101012 ((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10

Step 2 101012 (16 + 0 + 4 + 0 + 1)10

Step 3 101012 2110

Note − 101012 is normally written as 10101.

Octal Number System

Characteristics of the octal number system are as follows −

Uses eight digits, 0,1,2,3,4,5,6,7

Also called as base 8 number system

Each position in an octal number represents a 0 power of the base (8). Example 80

Last position in an octal number represents a x power of the base (8). Example 8x where x

represents the last position - 1

Example

Octal Number: 125708

Calculating Decimal Equivalent −

Step Octal NumberDecimal Number

Step 1 125708 ((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80))10

Step 2 125708 (4096 + 1024 + 320 + 56 + 0)10

Step 3 125708 549610

Note − 125708 is normally written as 12570.

Hexadecimal Number System

Characteristics of hexadecimal number system are as follows −

Uses 10 digits and 6 letters, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F

Letters represent the numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15

Also called as base 16 number system

Each position in a hexadecimal number represents a 0 power of the base (16). Example, 160

Last position in a hexadecimal number represents a x power of the base (16). Example 16x where

x represents the last position - 1

Example

Hexadecimal Number: 19FDE16

Calculating Decimal Equivalent −

Step Binary Number Decimal Number

Step 1 19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10

Step 2 19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10

Step 4 19FDE16 10646210

Note − 19FDE16 is normally written as 19FD

Computer - Number Conversion

There are many methods or techniques which can be used to convert numbers from one base to

another. In this chapter, we'll demonstrate the following −

Decimal to Other Base System

Other Base System to Decimal

Other Base System to Non-Decimal

Shortcut method - Binary to Octal

Shortcut method - Octal to Binary

Shortcut method - Binary to Hexadecimal

Shortcut method - Hexadecimal to Binary

Decimal to Other Base System

Step 1 − Divide the decimal number to be converted by the value of the new base.

Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant digit) of the new

base number.

Step 3 − Divide the quotient of the previous divide by the new base.

Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the new base number.

Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in

Step 3.

The last remainder thus obtained will be the Most Significant Digit (MSD) of the new base

number.

Example

Decimal Number: 2910

Calculating Binary Equivalent −

Step Operation Result Remainder

Step 1 29 / 2 14 1

Step 2 14 / 2 7 0

Step 3 7 / 23 1

Step 4 3 / 21 1

Step 5 1 / 20 1

As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the

first remainder becomes the Least Significant Digit (LSD) and the last remainder becomes the

Most Significant Digit (MSD).

Decimal Number : 2910 = Binary Number : 111012.

Other Base System to Decimal System


Step 1 − Determine the column (positional) value of each digit (this depends on the position of

the digit and the base of the number system).

Step 2 − Multiply the obtained column values (in Step 1) by the digits in the corresponding

columns.

Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in decimal.

Example

Binary Number: 111012

Calculating Decimal Equivalent −

Step Binary Number Decimal Number

Step 1 111012 ((1 x 24) + (1 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10

Step 2 111012 (16 + 8 + 4 + 0 + 1)10

Step 3 111012 2910

Binary Number : 111012 = Decimal Number : 2910

Other Base System to Non-Decimal System

Step 1 − Convert the original number to a decimal number (base 10).

Step 2 − Convert the decimal number so obtained to the new base number.

Example

Octal Number : 258

Calculating Binary Equivalent −

Step 1 - Convert to Decimal

Step Octal NumberDecimal Number

Step 1 258 ((2 x 81) + (5 x 80))10

Step 2 258 (16 + 5)10

Step 3 258 2110

Octal Number : 258 = Decimal Number : 2110

Step 2 - Convert Decimal to Binary

Step Operation Result Remainder

Step 1 21 / 2 10 1

Step 2 10 / 2 5 0

Step 3 5 / 22 1

Step 4 2 / 21 0

Step 5 1 / 20 1

Decimal Number : 2110 = Binary Number : 101012

Octal Number : 258 = Binary Number : 101012

Shortcut Method ─ Binary to Octal

Step 1 − Divide the binary digits into groups of three (starting from the right).

Step 2 − Convert each group of three binary digits to one octal digit.
Example

Binary Number : 101012

Calculating Octal Equivalent −

Step Binary Number Octal Number

Step 1 101012 010 101

Step 2 101012 28 58

Step 3 101012 258

Binary Number : 101012 = Octal Number : 258

Shortcut Method ─ Octal to Binary

Step 1 − Convert each octal digit to a 3-digit binary number (the octal digits may be treated as

decimal for this conversion).

Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single binary number.

Example

Octal Number : 258

Calculating Binary Equivalent −

Step Octal NumberBinary Number

Step 1 258 210 510

Step 2 258 0102 1012

Step 3 258 0101012

Octal Number : 258 = Binary Number : 101012

Shortcut Method ─ Binary to Hexadecimal

Step 1 − Divide the binary digits into groups of four (starting from the right).

Step 2 − Convert each group of four binary digits to one hexadecimal symbol.

Example

Binary Number : 101012

Calculating hexadecimal Equivalent −

Step Binary Number Hexadecimal Number

Step 1 101012 0001 0101

Step 2 101012 110 510

Step 3 101012 1516

Binary Number : 101012 = Hexadecimal Number : 1516

Shortcut Method - Hexadecimal to Binary

Step 1 − Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits may

be treated as decimal for this conversion).

Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single binary number.

Example
Hexadecimal Number : 1516

Calculating Binary Equivalent −

Step Hexadecimal Number Binary Number

Step 1 1516 110 510

Step 2 1516 00012 01012

Step 3 1516 000101012

Hexadecimal Number : 1516 = Binary Number : 101012

Computer - Data and Information

Data can be defined as a representation of facts, concepts, or instructions in a formalized manner,

which should be suitable for communication, interpretation, or processing by human or electronic

machine.

Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or special

characters (+,-,/,*,<,>,= etc.)

What is Information?

Information is organized or classified data, which has some meaningful values for the receiver.

Information is the processed data on which decisions and actions are based.

For the decision to be meaningful, the processed data must qualify for the following

characteristics −

Timely − Information should be available when required.

Accuracy − Information should be accurate.

Completeness − Information should be complete.

Data Processing Cycle

Data processing is the re-structuring or re-ordering of data by people or machine to increase their

usefulness and add values for a particular purpose. Data processing consists of the following

basic steps - input, processing, and output. These three steps constitute the data processing cycle.

Input − In this step, the input data is prepared in some convenient form for processing. The form

will depend on the processing machine. For example, when electronic computers are used, the

input data can be recorded on any one of the several types of input medium, such as magnetic

disks, tapes, and so on.

Processing − In this step, the input data is changed to produce data in a more useful form. For

example, pay-checks can be calculated from the time cards, or a summary of sales for the month

can be calculated from the sales orders.

Output − At this stage, the result of the proceeding processing step is collected. The particular

form of the output data depends on the use of the data. For example, output data may be

pay-check

for employees.

6. COMPUTER - NETWORKING
A computer network is a system in which multiple computers are connected to each other to share

information and resources.

Characteristics of a Computer Network

• Share resources from one computer to another.

• Create files and store them in one computer, access those files from the other computer(s)

connected over the network.

• Connect a printer, scanner, or a fax machine to one computer within the network and let

other computers of the network use the machines available over the network.

Following is the list of hardware's required to set up a computer network.

• Network Cables

• Distributors

• Routers

• Internal Network Cards

• External Network Cards

Network Cables: Network cables are used to connect computers. The most commonly used cable

is Category 5 cable RJ-45.

Distributors

A computer can be connected to another one via a serial port but if we need to connect many

computers to produce a network, this serial connection will not work.

The solution is to use a central body to which other computers, printers, scanners, etc. can be

connected and then this body will manage or distribute network traffic.

Router

A router is a type of device which acts as the central point among computers and other devices

that are a part of the network. It is equipped with holes called ports. Computers and other devices

are connected to a router using network cables. Now-a-days router comes in wireless modes using

which computers can be connected without any physical cable.

Network Card

Network card is a necessary component of a computer without which a computer cannot be

connected over a network. It is also known as the network adapter or Network Interface Card

(NIC). Most branded computers have network card pre-installed. Network cards are of two types:

Internal and External Network Cards.

Internal Network Cards

Motherboard has a slot for internal network card where it is to be inserted. Internal network cards

are of two types in which the first type uses Peripheral Component Interconnect (PCI) connection,

while the second type uses Industry Standard Architecture (ISA). Network cables are required to

provide network access.

External Network Cards


External network cards are of two types: Wireless and USB based. Wireless network card needs

to be inserted into the motherboard, however no network cable is required to connect to the

network.

Universal Serial Bus (USB)

USB card is easy to use and connects via USB port. Computers automatically detect USB card

and can install the drivers required to support the USB network card automatically.

Networking: A computer networking is a process of connecting two more than two computers

with the purpose to share data, provide technical support, and to communicate (especially for the

business purpose.

Internet is the technology that is used to connect different computer systems (located in different

geographic location). Networking technology has revolutionized the world and created a new

arena for the overall development of every nation.\

Advantages of Networking

Let us now discuss the advantages of networking. The advantages are described below −

Facility of Technical Support: Because of having computer networking, a person sitting in the

United States of America provides technical support to a person sitting in a remote part of India.

Easy Sharing of Data: With the help of networking, it is very simple to share all formats of

digital data from one computer system to another (irrespective of their geographic location).

Easy Sharing of Hardware Resource: With the help of networking, it has now become very

simple to share the expensive resources including storage space, processor, fax, etc.

Easy Sharing Software: Through the networking system, it is easy to share and install the

software from one computer system to another computer system.

Easy to Decentralize Data Processing: Through the networking system, it is very simple to

decentralize the data processing system. It ultimately helps to control, secure, and manage the

important data.

Easy to Communicate: With the help of networking, the communication system has now

become highly efficient, frugal, and fast. The different modes of communication are text chatting,

video chatting, emails, etc.

Easy to Communicate

Types of Network

In this section, we will discuss the different types of network. The types are described below −

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

Local Area Network

Local Area Network or simply LAN: is the technique of interconnecting a few computers
located in a given premise. It is normally used for a single business office or a residential

apartment.

The major purpose of such interconnectivity is to establish a communication system in order to

make the work easier.

However, in such connectivity, some other devices can also be attached such as laser printers, fax

machine, etc.

Metropolitan Area Network: Metropolitan Area Network or simply MAN is a system of

network that normally covers a large metropolitan area (city part).

It provides high speed Internet services throughout the area covered within the network.

Wide Area Network: Wide Area Network or simply WAN is a system of network that covers a

large geographical area across the world.

The services of WAN are provided by public (government) agencies as well as private agencies.

The network also provides the facility to access databases located remotely.

The WAN system is highly beneficial for MNCs and other big corporate companies (offering

online services).

Computer Network Topologies

A Network Topology is the arrangement with which computer systems or network devices are

connected to each other. Topologies may define both physical and logical aspect of the network.

Both logical and physical topologies could be same or different in a same network.

Point-to-Point

Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers

connected back to back using a single piece of cable. Often, the receiving end of one host is

connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate devices.

But the end hosts are unaware of underlying network and see each other as if they are connected

directly.

Bus Topology

In case of Bus topology, all devices share single communication line or cable. Bus topology may

have problem while multiple hosts sending data at the same time. Therefore, Bus topology either

uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of

the simple forms of networking where a failure of a device does not affect the other devices. But

failure of the shared communication line can make all other devices stop functioning.

Star Topology

All hosts in Star topology are connected to a central device, known as hub device, using a

point-to-point connection. That is, there exists a point to point connection between hosts and hub.

The hub device can be any of the following:


Layer-1 device such as hub or repeater

Layer-2 device such as switch or bridge

Layer-3 device such as router or gateway

Star Topology

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all

other hosts fails. Every communication between hosts, takes place through only the hub. Star

topology is not expensive as to connect one more host, only one cable is required and

configuration is simple.

Ring Topology

In ring topology, each host machine connects to exactly two other machines, creating a circular

network structure. When one host tries to communicate or send message to a host which is not

adjacent to it, the data travels through all intermediate hosts. To connect one more host in the

existing structure, the administrator may need only one more extra cable.

Ring Topology

Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a

point of failure. There are methods which employ one more backup ring.

Mesh Topology

In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in

point-to-point connection with every other host or may also have hosts which are in point-to-point

connection to few hosts only.

Full Mesh Topology

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point

links. Mesh technology comes into two types:

Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for

every new host n(n-1)/2 connections are required. It provides the most reliable network structure

among all network topologies.

Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to

each other in some arbitrarily fashion. This topology exists where we need to provide reliability

to some hosts out of all.

Tree Topology

Also known as Hierarchical Topology: this is the most common form of network topology in use

presently. This topology imitates as extended Star topology and inherits properties of bus

topology.

This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer where

computers are attached. The middle layer is known as distribution layer, which works as mediator

between upper layer and lower layer. The highest layer is known as core layer, and is central point

of the network, i.e. root of the tree from which all nodes fork.

Tree Topology

All neighboring hosts have point-to-point connection between them. Similar to the Bus topology,

if the root goes down, then the entire network suffers even.though it is not the single point of

failure. Every connection serves as point of failure, failing of which divides the network into

unreachable segment.

Daisy Chain

This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are

connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are

connected then it represents Ring topology.

Daisy Chain Topology

Each link in daisy chain topology represents single point of failure. Every link failure splits the

network into two segments. Every intermediate host works as relay for its immediate hosts.

Hybrid Topology

A network structure whose design contains more than one topology is said to be hybrid topology.

Hybrid topology inherits merits and demerits of all the incorporating topologies.

Hybrid Topology

The above picture represents an arbitrarily hybrid topology. The combining topologies may

contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by

means of Dual-Ring topology and networks connected to them are mostly Star topology networks.

Internet is the best example of largest Hybrid topology

7. COMPUTER - INTERNET AND INTRANET


In this chapter, we will see what is Internet and Intranet, as well as discuss the similarities and

differences between the two.

Internet

It is a worldwide/global system of interconnected computer networks. It uses the standard Internet

Protocol (TCP/IP). Every computer in Internet is identified by a unique IP address. IP Address is

a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location.

A special computer DNS (Domain Name Server) is used to provide a name to the IP Address so

that the user can locate a computer by a name. For example, a DNS server will resolve a name

https://www.google.com to a particular IP address to uniquely identify the computer on which this

website is hosted.

Internet is accessible to every user all over the world.

Intranet

Intranet is the system in which multiple PCs are connected to each other. PCs in intranet are not

available to the world outside the intranet. Usually each organization has its own Intranet network

and members/employees of that organization can access the computers in their intranet.

Each computer in Intranet is also identified by an IP Address which is unique among the

computers in that Intranet.

Similarities between Internet and Intranet

Intranet uses the internet protocols such as TCP/IP and FTP.

Intranet sites are accessible via the web browser in a similar way as websites in the internet.

However, only members of Intranet network can access intranet hosted sites.

In Intranet, own instant messengers can be used as similar to yahoo messenger/gtalk over the

internet.

Differences between Internet and Intranet

Internet is general to PCs all over the world whereas Intranet is specific to few PCs.

Internet provides a wider and better access to websites to a large population, whereas Intranet is

restricted.

Internet is not as safe as Intranet. Intranet can be safely privatized as per the need.

8. Computer Related Jobs

The fast computerization of every work and gradual dependency on computer based work has

exponentially opened a new arena of Information technology for employment.


However, the IT field requires qualified and trained employees who can design and develop a

new information system.

Information technology has also helped in research and development and has further developed

new technologies. The IT employees emphasize on planning, designing, developing, managing

the work, and providing technical support to various users.

Types of Computer Related Jobs

In recent times, a number of jobs have come up that are done with the assistance of computer. We

will discuss the different job titles performing computer related jobs −

Programmer

A person who is qualified enough to write a creative code for the computer program is known as

Programmer. The codes written by programmer are the instructions given to the computer over

what to do, how to do, when to do, etc. Programmer

There are dozens of languages, which are written by the different programmers. E.g. Java, C,

C++, python, Ajax, etc.

System Analyst

The job of a system analyst is highly classified and also very crucial.

A system analyst fundamentally designs, develops, and implements new systems or adds some

additional features in the existing system to give instructions to perform additional tasks.

System analyst also specializes in fields such as engineering, science & technology, finance,

business, accounting, etc.

Database Administrator

A database administrator or simply DBA is a trained person who is accountable for the storage of

and management of the database system.

Network Administrator

Computer networking is another specialized field where a qualified person is required.

A network administrator specializes in installing, configuring, and supporting computer network

system. Likewise, he manages the local area network, wide area network, the Internet system or

the segment of a network system in the respective organization.

The job of a network administrator is a very crucial one as almost every network in an

organization requires at least one network administrator.


Web Designers

A web designer is an architect who designs an effective and communicative website.

He places the images, contents, and other such information on right places to make the website

interactive and user friendly.

Information Security Analysts

This is one of the most significant jobs under which an Information Security Analyst designs,

implements, and supports the security system of a computer or whole network.

Other fields include: Software engineers, data scientists, health information system experts etc.

9. SECURITY
Advancement of computer technology has radically changed the world; resultantly, most of the

works whether it is matter of nation’s security system or buying a shoe online everything

depends on computer.

Such increased dependency also raises the issue of security, as most of the data is now stored in

the computer system.

Computer Security

Your computer systems store various sorts of data and hence if it is not secured, then you might

be in for a big trouble.

Why Do We Need Computer Security?

Let us now see why do we need Computer security. It is required for the following major reasons

• To prevent damage of the hardware.

• To prevent theft or damage of the installed software.

• To prevent theft or damage of stored data and information.

• To prevent the disruption of service.

• Likewise, security system keeps the computer system safe by protecting the installed

software and the stored data (information).

Protection of Data and Information

Following are the important steps to protect data −

• Make backup of all your important files.

• Keep your system virus-free by using anti-virus software.

• Keep updating your computer system.

• Run disk defragmenter and disk cleanup on certain interval of time.

• Use a firewall.

• Use anti-spyware software.

Further, if you use internet, then you need to take greater precaution. Consider the following

points to understand the precautions that need to be taken −

• Do not click on any link that you don’t know (as it may be dangerous for your computer

- virus attack).

• Do not open unauthorized an unlawful website (it may damage your computer system).

• Do not download unsolicited data from unknown website.

• Do not open file attachments from unsolicited mails

What is Defragmentation?

Frequent saving and deleting of file (data) from the hard disk creates problems in performance
and also reduces the space; therefore, defragmentation again clean-up the drive and restore the

system to run smoothly.

Defragmentation

Disk Cleanup

While browsing websites (on internet), many of the files get stored in the hard disk automatically

(actually these stored files later help to reopen the website faster); besides some other cookies

also get stored in the hard disk. All these stored files create problem along with eating space.

So, disk cleanup process cleans all these files and releases the space occupied by these unwanted

files.

THREAT

Threat in a computer system is a possible danger that might put your data security on stake. The

damage is at times irreparable.

COMPUTER THREAT

Definition

As defined by the National Information Assurance Glossary −

“Any circumstance or event with the potential to adversely impact an IS through unauthorized

access, destruction, disclosure, modification of data, and/or denial of service.”

A computer threat can be "intentional" such as hacking or "accidental" such as malfunctioning of

or physical damage.

Types of Threat

Following are the most common types of computer threats −

Physical damage − It includes fire, water, pollution, etc.

Natural events − It includes climatic, earthquake, volcanic activity, etc.

Loss of services − It includes electrical power, air conditioning, telecommunication, etc.

Technical failures − It includes problems in equipment, software, capacity saturation, etc.

Deliberate type − It includes spying, illegal processing of data, etc.

Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of

media, retrieval of discarded materials, etc.

Sources of Threat

The possible sources of a computer threat may be −

Internal − It includes employees, partners, contractors (and vendors).

External − It includes cyber-criminals (professional hackers), spies, non-professional hackers,

activists, malware (virus/worm/etc.), etc.

Common Terms

Following are the common terms frequently used to define computer threat −

Virus Threats
A computer virus is a program designed to disrupt the normal functioning of the computer

without the permission of the user.

Spyware Threats

Spyware is a computer program that monitors user’s online activities or installs programs without

user’s consent for profit or theft of personal information.

Hackers

Hackers are programmers who put others on threats for their personal gain by breaking into

computer systems with the purpose to steal, change or destroy information.

Hackers

Phishing Threats

It is an illegal activity through which phishers attempt to steal sensitive financial or personal data

by means of fraudulent email or instant messages.

How to Secure Your Computer System from Threats?

Following are the significant tips through which you can protect your system from different types

of threat −

Install, use, and keep updated Anti-Virus in your system.

Install, use, and keep updated a Firewall Program.

Always take backups of your important Files and Folders.

Use Strong and Typical Passwords.

Take precaution especially when Downloading and Installing Programs.

Install, use, and keep updated a File Encryption Program.

Take precaution especially when Reading Email with Attachments.

Keep your Children aware of Internet threats and safe browsing.

VIRUS

A virus is a computer code or program, which is capable of affecting your computer data badly by

corrupting or destroying them.

Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it

across every folder and damage the data of your computer system.

A computer virus is actually a malicious software program or "malware" that, when infecting

your system, replicates itself by modifying other computer programs and inserting its own code.

Computer Virus

Infected computer programs may include data files, or even the "boot" sector of the hard drive.

Types of Virus

Following are the major types of computer virus −

Worms

This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is

self-contained and hence does not need to be part of another program to propagate itself.
Trojan Horse

A Trojan Horse is also a sort of destructive program that remains disguised in a normal software

program. It is not exactly a virus, as it cannot replicate itself. However, there is possibility that

virus program may remain concealed in the Trojan Horse.

Bombs

It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device

and hence it will go off only at a particular date and time.

How Does Virus Affect?

Let us discuss in what ways a virus can affect your computer system. The ways are mentioned

below

• By downloading files from the Internet.

• During the removable of media or drives.

• Through pen drive.

• Through e-mail attachments.

• Through unpatched software & services.

• Through unprotected or poor administrator passwords.

Impact of Virus

Let us now see the impact of virus on your computer system −

• Disrupts the normal functionality of respective computer system.

• Disrupts system network use.

• Modifies configuration setting of the system.

• Destructs data.

• Disrupts computer network resources.

• Destructs of confidential data.

Virus Detection

The most fundamental method of detection of virus is to check the functionality of your computer

system; a virus affected computer does not take command properly.

However, if there is antivirus software in your computer system, then it can easily check

programs and files on a system for virus signatures.

Virus Preventive Measures

Let us now see the different virus preventive measures. A computer system can be protected from

virus through the following −


• Installation of an effective antivirus software.

• Patching up the operating system.

• Patching up the client software.

• Putting highly secured Passwords.

• Use of Firewalls.

Most Effective Antivirus

Following are the most popular and effective antivirus from which you can choose one for your

personal computer −

• McAfee Antivirus Plus

• Symantec Norton Antivirus

• Avast Pro Antivirus

• Bitdefender Antivirus Plus

• Kaspersky Anti-Virus

• Avira Antivirus

• Webroot Secure Anywhere Antivirus

• Emsisoft Anti-Malware

• Quick Heal Antivirus

• ESET NOD32 Antiviru

10. MOBILE

Mobile computers are the systems, which are physically not remain connected to specific place

rather these are mobile in nature, as one can carry anywhere anytime.

The mobile computer technology carries battery back; therefore, it does not require consistent

electric power.

Mobile Computer: Mobile computers can be connected with Internet through wire or the

connection can be wireless as well through Wi-Fi or Bluetooth technology. Likewise, it is

portable, self-powered (because of inbuilt battery), and infused with wireless technology

computing device.

Types of Mobile Computing Device

Following are the popular mobile computing devices −

Laptop: A laptop is a portable version of desktop computer. It is equally competent to do any

computing work.

Notebook: It is a light weight portable personal computer.

Tablet: It is comparatively handier slate-shaped mobile computer.

Smart Phone: A smart phone is a fully equipped cell phone with most of the computing features.

Personal Digital Assistant (PDA): It is a computer device more popular as pocket computer. It is
largely used in calculation, accessing the Internet, sending and receiving E-mails, scanning bar

codes, use as a radio or stereo, playing computer games, video recording, typewriting and word

processing, use as an address book, making and writing on spreadsheets, Global Positioning

System (GPS), as a clock and calendar, etc.

Portable Data Terminal (PDT): It is a computer device, which is largely used to enter or

retrieve data through wireless transmission (i.e., WLAN or WWAN).

Mobile Data Terminal(MDT): It is a computer device, which is used in police cars, taxi-cabs,

military logistics, service trucks, commercial trucking fleets, courier vehicles, fishing fleets, etc.

Ultra-mobile Personal Computer (UMPC): It is small form of tablet PC.


11. MULTIMEDIA

In this chapter, we will discuss how the Computer Multimedia works. If a system presents, some

information through more than two media, it is known as multimedia. For example, TV presents

audio and video; book presents text, image, and graphs, computer, etc.

The information presented through multimedia has better quality and capability, as it can be

understood easily.

Computer Multimedia

The advanced computer system is a great example of modern multimedia.

Literal Meaning of Multimedia

In this section, we will understand the literal meaning of multimedia.

Multi − it means more than one

Medium − it is singular and it means intermediary or mean

Media − it is plural and it means conveying the information

Likewise, Multimedia is the field of Computer Science that integrates different forms of

information and represents in the form of audio, video, and animation along with the traditional

media, i.e., text, graphics/drawings, images, etc.

Multimedia Computer System

Multimedia computer system has high capacity to integrate different media including text, image,

graphics, audio, and video.

The multimedia computer system stores, represents, processes, manipulates, and makes available

to users.

Significant Features of Multimedia Computer System

Following are the major features multimedia computer system −

Its Central Processing Unit (CPU) is very fast, as it needs to process large amount of data.

It has huge storage capacity.

It has huge memory power that helps in running heavy data programs.

It has high capacity graphic card that helps in displaying graphics, animation, video, etc.

The sound system makes it easy to listen to audio.

With all these features (discussed above), a computer system is known as high end multimedia

computer system.

However, all the features listed above are not essentially required for every multimedia computer

system, but rather the features of a multimedia computer system are configured as per the need of

respective user.

Multimedia Components

Following are the major components of a multimedia computer system −

Text
It contains alphanumeric and some other special characters. Keyboard is usually used for input of

text; however, there are some internal (inbuilt) features to include such text.

Graphics

It is technology to generate, represent, process, manipulate, and display pictures. It is one of the

most important components of multimedia application. The development of graphics is supported

by a different software.

Animation

Computer animation is a modern technology, which helps in creating, developing, sequencing,

and displaying a set of images (technically known as ‘frames’). Animation gives visual effects

or motion very similar to that of a video file (see image given below).

Animation Audio: This technology records, synthesizes, and plays audio (sound). There are many

learning courses and different instructions that can be delivered through this medium

appropriately.

Video

This technology records, synthesizes, and displays images (known as frames) in such sequences

(at a fixed speed) that makes the creation appear as moving; this is how we see a completely

developed video. In order to watch a video without any interruption, video device must display 25

to 30 frames/second.

Multimedia Application

Let us now see the different fields where multimedia is applied. The fields are described in brief

below

Presentation

With the help of multimedia, presentation can be made effective.

E-books

Today, books are digitized and easily available on the Internet.

Digital Library

The need to be physically present at a library is no more necessary. Libraries can be accessed

from the Internet also. Digitization has helped libraries to come to this level of development.

E-learning

Today, most of the institutions (public as well as private both) are using such technology to

education people.

Movie making

Most of the special effects that we see in any movie, is only because of multimedia technology.

Video games

Video games are one of the most interesting creations of multimedia technology. Video games
fascinate not only the children but adults too.

Animated films

Along with video games, animated film is another great source of entertainment for children.

Multimedia conferencing

People can arrange personal as well as business meetings online with the help of multimedia

conferencing technology.

E-shopping

Multimedia technology has created a virtual arena for the e-commerce.

12. COMPUTER SHORTCUTKEYS


This chapter provides many of the useful shortcut keys that enables users to perform tasks at a

very high speed.

Function Short-cut keys

Commonly Used Short-cut Keys

F1 Universal help (for any sort of program).

Alt + F File menu options in current program.

Alt + E Edits options in current program.

Ctrl + A Selects all text.

Ctrl + X Cuts the selected item.

Ctrl + C Copies the selected item.

Ctrl + V Pastes copied item.

Home Takes the user to the beginning of the current line.

End Takes the user to the end of the current line.

Ctrl + Home Takes the user to the beginning of the document.

Ctrl + End Takes the user to the end of the document.

Shift + Home Highlights from the current place to the beginning of line.

Shift + End Highlights from the current place to the end of line.

Microsoft Windows Shortcut Keys

Ctrl + F4 Closes window in program.

Alt + F4 Closes current open program.

F2 Renames the selected icon.

F3 Start find from desktop.

F4 Opens the drive selection when browsing.

F5 Refreshes contents.

Alt + TabSwitches from one open application to another open application.

Alt + Shift + Tab Switches backwards between open applications.

Alt + Print Screen Creates screen shot for current program.

Ctrl + Alt + Del. Opens windows task manager/reboot.

Ctrl + Esc Brings up start menu.

Alt + EscSwitches between applications on taskbar.

Ctrl + Plus (+) Key Automatically adjusts widths of all columns in Windows Explorer.

Alt + Enter Opens properties window of selected icon or program.

Shift + F10 Simulates right-click on selected item.

Shift + Del Deletes selected programs/files permanently.

Holding Shift During Boot-up Enables boot safe mode or bypass system files.

Ctrl + N Starts a new note.


Ctrl + O Opens a recently used note.

Ctrl + S Saves changes to a note.

Ctrl + P Prints a note.

Alt + F4 Closes a note and its Journal window.

Ctrl + Z Helps Undo a change.

Ctrl + Y Helps Redo a change.

Ctrl + A Selects all items on a page.

Ctrl + X Cuts a selection.

Ctrl + C Copies a selection to the Clipboard.

Ctrl + V Pastes a selection from the Clipboard.

Esc Cancels a selection.

Ctrl + F Start a search tool.

Ctrl + Shift + C Display a shortcut menu for column headings in a note list.

Microsoft Word Shortcut Keys

Ctrl + N Creates a new document.

Ctrl + O Opens an existing document.

Ctrl + S Saves changes to a document.

F12 Saves the document as a new file.

Ctrl + P Prints a document.

Ctrl + Z Helps Undo a change.

Ctrl + Y Helps Redo a change.

Ctrl + A Selects the whole document.

Ctrl + X Helps cut a selection

Ctrl + C Copies a selection to the Clipboard.

Ctrl + V Pastes a selection from the Clipboard.

Ctrl + B Makes selected text bold.

Ctrl + I Italicizes selected text.

Ctrl + U Underlines selected texts.

Ctrl + L Aligns text left.

Ctrl + R Aligns text right.

Ctrl + E Aligns text center.

Ctrl + J Helps justify text.

Ctrl + 1 Sets single line spacing.

Ctrl + 2 Sets double line spacing.

Ctrl + 5 Sets line spacing to 1.5.

Ctrl + Shift + A Changes characters to all capitals.

Ctrl + D Inserts a Microsoft Paint drawing.


Ctrl + F Finds text

Ctrl + Home Moves to the beginning of the document.

Ctrl + End Moves to the end of the document.

13. ABBREVIATIONS
In this chapter, we will discuss the different abbreviations in Computer Science. The following

table lists down those abbreviations −

Abbreviation Full-name

A/D Analog-to-Digital

ABC Atanasoff Berry Computer

ACM Association for Computing Machinery

AI Artificial Intelligence

ALGOL Algorithic Language

ALU Arithmetic Logic Unit

AMD Advanced Micro Devices

APRANET Advanced Research Project Agency Network

ASCII American Standard Code for Information Interchange

BASIC Beginners All-purpose Symbolic Instruction Code

BCD Binary Coded Decimal

BIOS Basic Input Output System

BIPS Billions of Instructions Per Second

BPI Bytes Per Inch

CAD Computer Aided Design

CAE Computer Aided Engineering

CAN Campus Area Network

CASE Computer Aided Software Engineering

CD Compact Disk

CDC Control Data Corporation

CD-R CD-Recordable

CD-ROM Compact Disk Read Only Memory

CD-RW CD Read/Write

CL Command Language

CLI Command Line Interface

COBOL Common Business Oriented Language

CODASYL Conference On Data Systems

CPU Central Processing Unit

CRTCathode Ray Tube

D/A Digital-to-Analog

DAT Digital Audio Tape

DBMS Data Base Management System

DBS Demand Based Switching


DDL Data Definition Language

DDS Digital Data Storage

DEC Digital Equipment Corporation

DMA Direct Memory Access

DNA Digital Network Architecture

DPI Dots Per Inch

DRAM Dynamic RAM

DSN Distributed Systems Network

DTS Digital Theater System

DVD Digital Video/Versatile Disk

EBCDIC Extended Binary Coded Decimal Interchange Code

EDSAC Electronic Delay Storage Automatic Calculator

EDVAC Electronic Discrete Variable Automatic Calculator

EFM Eight-to-Fourteen Modulation

ENIAC Electronic Numerical Integrator And Calculator

EPGElectronic Programming Guide

EPIC Explicitly Parallel Instruction Computing

EPROM Erasable Programmable Read-Only Memory

FAT File Allocation Table

FDM Frequency Division Multiplexing

FEP Front End Processor

FLOPS Floating Point Operations Per Second

FM Frequency Modulation

FMS File Management System

FORTRAN FORmula TRANslation

FSK Frequency Shift Keying

FTP File Transfer Protocol

GB Giga Bytes

GFLOPS Giga FLOPS

GHz Giga Hertz

GNU Gnu Not Unix

GPRS General Packet Radio Service

GSM Global System for Mobile communication

GUI Graphical User Interface

HP Hewlett Packard

HSS Hierarchical Storage System

HTML HyperText Markup Language


HTTP HyperText Transport Protocol

IBMInternational Business Machine

IC Integrated Circuit

IDN Integrated Digital Networks

IP Internet Protocol

IrDA Infrared Data Association

ISDN Integrated Services Digital Network

ISP Internet Service Provider

JPEG Joint Photographic Experts Group

JRE Java Runtime Engine

JSP Java Server Pages

KB Kilo Bytes

KHz Kilo Hertz

LAN Local Area Network

LCD Liquid Crystal Display

LED Light Emitting Diode

LPM Line Per Minute

LSI Large Scael Integration

MAN Metropolitan Area Network

MAR Memory Address Register

MB Mega Bytes

MBR Memory Buffer Register

MHz Mega Hertz

MIDI Musical Instrument Digital Interface

MIPS Millions of Instructions Per Second

MNP Microcom Network Protocol

MPEG Moving Pictures Experts Group

MS-DOS MicroSoft Disk Operating System

MVT Multiprogramming with Variable Tasks

NIC Network Interface Card

NICNET National Informatics Center NETwork

NOS Network Operating System

OCR Optical Character Recognition

OMR Optical Mark Reader

OS Operating System

OSI Open System Interconnection

OSS Open Source Software


PANPersonal Area Network

PC Personal Computer

PDF Portable Document Format

PDLProgram Design Language

PDP Program Data Processor

PIP Peripheral Interchange Program

PROM Programmable Read-Only Memory

QoS Quality of Service

RAM Random Access Memory

ROM Read Only Memory

SDLC Software Development Life Cycle

SEQUEL Structured English QUEry Language

SGML Syntax for Generalized Markup Language

SIMM Single In-line Memory Module

SNA Systems Network Architecture

SNOBOL StriNg Oriented and symBOlic Language

SQLStructured Query Language

SRAM Static RAM

SSI Small Scale Integration

TB TeraBytes

TCP Transport Control Protocol

TDM Time Division Multiplexing

UDP User Datagram Protocol

ULSI Ultra Large Scale Integration

UPC Universal Product Code

URL Uniform Resource Locator

USB Universal Serial Bus

UTF Unicode Transformation Format

VAN Value Added Network

VCR Video Cassette Recorder

VDT Video Display Terminal

VGA Video Graphics Array

VOD Video-On-Demand

VoIP Voice over Internet Protocol

VSAT Very Small Aperture Terminal

WAN Wide Area Network

WAP Wireless Application Protocol


WiMAX Worldwide Interoperability for Microwave Access

WLAN Wireless Local Area Network

WLL Wireless Local Loop

WORM Write Once Read Many

WWW World Wide Web

XHTML eXtensible HyperText Markup Language

XML eXtensible Markup Language

X.400 Electronic Mail Protocol

X.500 Directory Server Protocol

You might also like