Computer Notes by PositiveVibesPunjabBaljinder Sir Printable Form
Computer Notes by PositiveVibesPunjabBaljinder Sir Printable Form
Q:The term computer is derived from Q: The word “Computer” comes from the
word “compute”, which means ______.
A) Latin language
B) Sanskrit language
(a) To assume
C) Greek language
D) German language (b) To input
(c) To combine
(d) To calculate
(e) To add
Definition of computer:-
Full Form Of Word Computer is:-
A computer is an electronics machine or devices that
automatically accepts data and process it and gives the
output result under the instruction.
Development of COMPUTERS Mechanical ERA
• The development of computers can be
broadly classified into twoeras: 1. Abacus
2. Pascaline
1. Mechanical era 3. Analytical Engine
4. Tabulating Machine
2. Electronic era 5. Mark - I
History of computer:-
Pascal‘s Adding machine: --
Q: Abacus was invented in _____?
A: England
B: America
C: Germany
D: China
History of computer:- History of computer:-
Pascal‘s Adding machine: --
First mechanical Adding Machine.
To perform operations, it employed counter wheels.
A popular mechanical calculator, capable of performing
There were two sets of six dials or counter wheels
addition, and subtraction.
to represent decimal numbers.
developed by the great French philosopher and
scientist Blaise Pascal in 1642. It was capable of performing addition and
machine (1642) which was operated by dialling wheels It worked on the principle of pressure of liquid.
and dials.
History of computer:-
Charles Babbage analytical engine (1833-34):--
Q: Pascaline Calculator was invented by a
French scientist and mathematician named
as
ENIAC
Electronic Numerical Integrator andCalculator.
• Invention : it was developed by John W. Mauchly and
J. Presper Eckert.
First electronic digital computer.
ENIAC was the first electronic computer used for
general purposes, such as solving numerical
problems.
ENIAC filled a 20 by 40 foot room, weighed 30 tons,
and used more than 18,000 vacuum tubes.
Q: What is the full form of the first Electronic Q: What was the first electronic computer in
Computer ENIAC? the world?
UNIVAC
Universal Automatic Computer.
• Invention : It was invented by Eckert and JW Mauchly
in 1951.
Generations Of Computer-:
A) Transistors
B) Vacuum Tubes and Valves
C) Integrated Circuits
D) None of above
Second Generation(1956-1963)
• Transistors was used in this Generation.
• Transistors are made from silicon, Silicon is a
semiconductor.
• Faster than first Generation Computers.
• High Level Language were used, like FORTRAN, COBOL
• Less heat generated.
• Batch Operating System were used.
• IBM 7000 SERIES, HONEYWELL 200 are examples of
these type of computers.
Third Generation(1964-1971)
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
Fourth Generation(1976-1999)
Microprocessor was used in Fourth Generation.
In this Generation Very Large Scale Integrated
Circuit( VLSI) are used.
Third generation computer used keyboard for first time,
while fourth generation computer used mouse for the
first time.
Operating System like Unix, Windows were used.
Smaller in Size.
Programming Language like C ,C++. were used.
IBM-370, HP-3000
Fifth Generation(2000- onwards)
Fifth generation computing devices, based on Artificial
Intelligence, are still in development, though there are
some applications, such as voice recognition, that are being
used today.
ULSI( ULTRA LARGE SCALE INTEGRATION ) technology
were used.
More User Friendly.
Portable.
Internet based applications were Used.
Super Computer & Robot are the example of this generation.
WHAT IS COMPUTERARCHITECTURE
• Computer Architecture is concerned with the way hardware
components are connected together to form a computer
system.
• Computer Architecture helps us to understand the
functionalities of a system.
• Which deals with the basic components of a computer like CPU and
CPU organisation.
A) Arithmetic operation
B) Logical operation
C) Storage
D) All the above
Computer is an electronic device which performs tasks given by user with 1. Input unit – Input unit is a unit that accepts any input device. The input
extremely fast speed and accuracy. Like any other device or machine, a device is used to input data (Raw Facts) into the computer system.
computer system has also a number of parts. A computer system can be
blocked into mainly three parts: Function of input unit:
1. It converts inputted data into binary codes.
1. Input Unit
2. It sends data to main memory of computer
2. Central Processing Unit
3. Output Unit
Various Components of Computer-
Q- The brain of any computer system is
2. Central Processing Unit (CPU) – CPU is called the brain of a computer. Its
primary function is execute programs. The program which is to be executed
is a stored in the main memory. A program is a sequence of instructions to
A) ALU
perform a specified task.
B) Memory
CPU can be sub classified into three parts- C) CPU
i .Control unit (CU)
ii. Arithmetic & Logic unit (ALU) D) Control unit
ALU ALU
1. It is a part of CPU which performs most of the data operations. 6. These operations are performed by a special purpose math
processor called floating point unit (FPU).
2. Fundamental arithmetic operations (+, -, x,/)
7. Modern microprocessors contain FPU on the microprocessor chip
itself.
3. Logical operations (OR, AND, NOT, etc)
c) It stores final results of processing before these results are device called memory, accepts binary data as input and processes
released to an output device. data according to those instructions and provides results as output.
3. The first microprocessor was the Intel 4004, introduced in 1971 by
Ted Hoff and federico faggin.
Microprocessor
Types of Processors
1. First Generation (4 - bit Microprocessors)
2. Second Generation (8 - bit Microprocessor)
3. Third Generation (16 - bit Microprocessor)
4. Fourth Generation (32 - bit Microprocessors)
5. Fifth Generation (64 - bit Microprocessors)
PORTS
Q- BIU STAND FOR:
• External devices are connected to a computer using cables
and ports. · Ports are slots on the motherboard into which a cable of
a. Bus interface unit external device is plugged in.
b. Bess interface unit
Types of Ports
c. A and B 1. Parallel port
2. Serial port
d. None of these
3. USB port
4. Firewire port
5. Ethernet port
SERIAL PORT Parallel Port
• Serial port allows serial data transfer. In serial data transfer one bit of 1. A parallel port is basically a parallel communication
a data is a transmitted at a time. interface through which information transforms
multiple bits at a time.
• Universal serial bus. • These Ports transfer large amount of data at a very high speed.
ETHERNET PORT
Q1-The main circuit board of the system unit is the
1. Intel
2. IBM
3. Microsoft
4. Apple
5. Google
MCQ?
(A) Memory
(B) Portable
(C) Open
(D) Paste
MCQ? MCQ?
MCQ?
Q- Main memory of computer is –
(A) Internal
(B)External
(C)(A) and (B)both
(D)Auxiliary
(E)None of these
MCQ?
Q- How many types of memory does a
computer have?
(A) 1
(B) 2
(C) 4
(D) 8
MCQ?
(A) RAM
(B) ROM
(C) Tab memory
(D) SRAM
MCQ?
(A) EPROM
(B)ROM
(C)Static RAM
(D)Dynamic RAM
MCQ?
MCQ?
Optical disk-
It is a storage device in which optical (light)
energy is used.
It is a computer storage disk that stores data
digitally and uses laser beams to read and write
data.
Example-such as compact discs (CDs) and DVDs.
MCQ?
(A) CD-ROM
(B) Magnetic tape
(C) Hard disk
(D) Floppy disk
MCQ?
(A) Gigabytes
(B) Megabytes
(C) Kilobytes
(D) Bytes
floppy disk
up copies of data.
Q- What is the shape of CDs? Q- The Compact Disk (CD) was invented by
a. Hard disk
b. Registers
c. Cache Memories
d.RAM
MCQ?
Q- Which of the following correctly lists
computer memory types from highest to
lowest speed?
MCQ? MCQ?
Q-1. The storage capacity of a dual layer blu- Q-2. Which of the following components is
ray disc is read- only?
a.20 GB a. DRAM
b.30 GB b. hard disk
c.40 GB c. RAM
d.50 GB d. ROM
Cache memory is an extremely fast memory type that acts as a It stores and retains data only until a computer is powered up.
buffer between RAM and the CPU. Small amount of fast memory
Cache memory is used to reduce the average time to access data
Sits between normally main memory and CPU
from the Main memory.
Cache memory is a small-sized type of volatile computer memory
that provides high-speed data access to a processor and stores
frequently used computer programs, applications and data.
The CPU initially looks in the Cache for the data it needs
If the data is there, it will retrieve it and process it
If the data is not there, then the CPU accesses the system memory and
then puts a copy of the new data in the cache before processing it
Next time if the CPU needs to access the same data again, it will just
retrieve the data from the Cache instead of going through the whole
loading process again
MCQs?
Q- What is the high speed memory between the main
memory and the CPU called?
a) Register Memory
b) Cache Memory
c) Storage Memory
d) Virtual Memory
MCQs? MCQs?
Q- Whenever the data is found in the cache memory it is Q- When the data at a location in cache is different from the
called as _________ data located in the main memory, the cache is called ___
a) HIT a) Unique
b) MISS b) Inconsistent
c) FOUND c) Variable
d) ERROR d) Fault
Word MCQs?
Q- The transfer between CPU and Cache is ______________
Word-
The memory stores binary information(1's and 0's) in groups a) Block transfer
of bits called words. A word in memory is an entity of bits that move b) Word transfer
in and out of storage as a unit. A memory word is a group of 1's and c) Set transfer
0's and may represent a number, an instruction code, one or more
d) Associative transfer
alphanumeric characters, or any other binary coded information.
MCQs? MCQs?
Q- Which of the following is more quickly accessed? Q- The performance of cache memory is frequently measured
in terms of a quantity called
a) RAM
a. Miss ratio
b) Cache memory
b. Hit ratio
c) DRAM
c. Latency ratio
d) SRAM
d. Read ratio
and is usually embedded in the processor chip as CPU cache. and transfer data and instructions that are being used immediately by
2. L2 cache, or secondary cache, is often more capacious than L1. ... the CPU.
3. Level 3 (L3) cache is specialized memory developed to improve the The registers used by the CPU are often termed as Processor registers.
performance of L1 and L2. A processor register may hold an instruction, a storage address, or any
data (such as bit sequence or individual characters).
A. Index register
Without a register like an accumulator, it would be necessary to write
B. Instruction register
the result of each calculation (addition, multiplication, shift, etc.) to
C. Memory address register main memory, perhaps only to be read right back again for use in the
D. Memory data register next operation. Access to main memory is slower than access to a
register like the accumulator because the technology used for the large
main memory is slower (but cheaper) than that used for a register
It contains the memory address of the next instruction to be fetched. As each instruction gets fetched, the program counter increases its
PC points to the address of the next instruction to be fetched from the stored value by 1.
main memory when the previous instruction has been successfully After each instruction is fetched, the program counter points to the
These are numbered as R0, R1, R2….Rn-1, and used to store temporary data during
any ongoing operation
REGISTER NUMBER OF BITS REGISTER NAME FUNCTION MCQs?
SYMBOL
DR 16 Data registers Holds memory Q- The length of a register is called _______
operand
AR 12 Address register Holds address for
memory
AC 16 accumulator Processor register a) word limit
IR 16 Instruction Holds instruction
register code b) word size
PC 12 Program counter Holds address or
instruction c) register limit
TR 16 Temporary Holds temporary
register data d) register size
INPR 8 Input register Holds input
character
OUTR 8 Output register Holds input
character
MCQs?
Q- Which of the following is not a visible register?
Explanation: MAR or the memory address register is not a visible register. This
register is user inaccessible. It contains the address of the memory block to be read or
written to.
MCQs?
A. Control register
B. Data register
C. Accumulator
D. Address register
INPUT & OUTPUT DEVICES
MCQ? INTRODUCTION
Keyboard
MANUAL INPUT DEVICES
Keyboard is the most common and widely
Examples of Manual Input Devices:
used for input devices.
The standard computer keyboards typically
Keyboard
Tracker ball contain 101 keys for inputting character sets
Mouse including alphabets, numbers, symbols, or
Joystick functions
Touch screen Modern keyboard models contain a set
Scanner number of total keys according to their given
Digital cameras
standard, described as 101, 104, 105, etc.
Graphics Tablet
Microphone Modern keyboards matching US conventions
typically have 104 keys while the
105 key layout is the norm in the rest of the
world.
KEYBOARD
• Most keyboards use the QWERTY layout, named for Christopher Latham Sholes was an American inventor
the first six keys in the top row of letters. who invented the QWERTY keyboard.
Types of Keys
The different keys on the keyboard are:
1. Alphabetic Keys
2. Numeric Keys
3. Function Keys
4. Control Keys/Modifier Keys
5. Navigation Keys
NUMBER KEYS
ALPHABETIC KEYS
The keys marked with numbers from 0 to 9 are
These are marked with the English alphabets called Number Keys.
CONTROL KEYS
UP
LEFT
Used to tell the computer that you have Used to erase anything typed from the right side
finished a word or line. It brings the cursor of the cursor.
MCQ?
Function Keys
Q- ________ keys are present on the top row of the
The Function keys are placed at the keyboard.
top row of the keyboard marked
with F1, F2.......F12 A. Function
functions. C. Numeric
D. Navigation
Tab Key The Keyboard - How a Keyboard Works
Digital Camera
A digital camera takes pictures and
Microphone
can usually record video too.
A microphone can be used to input sound.
Scanners MCQ?
A scanner is an input device that scans documents such
Q- A light sensitive device that converts drawing, printed
as photographs and pages of text. When a document is
text or other images into digital form is
scanned, it is converted into a digital format.
OUTPUT DEVICES
Magnetic Stripe Readers
Examples of Output Devices :
Magnetic strips are usually found at the
back of most credit & debit cards. Monitors
Printers
The Magnetic Strip Reader can read personal
Laser Printers
details about the card number such as account
Ink-Jet Printers
number and name.
Dot-Matrix Printers
Plotters
Speakers
MCQ? Output Types:
Monitor Monitor
A monitor (or screen) is the most common use for output A monitor usually known as the visual display Unit (VDU)
devices.
The display device in modern monitors is typically a thin
A computer monitor is an output device that displays
information in pictorial form. film transistor liquid crystal display (TFT-LCD)
The higher the number of pixels, the better quality of the Graphics Array)
output.
MCQ?
Dot-Matrix Printers- A dot matrix printer is an
impact printer that prints using a fixed number of pins or
Q- Laser printers belong to
wires
Dot-Matrix are the first type of printers that
A. line printer
had been used at homes and schools but now
B. page printer
as the technology goes on they are not used
C. band printer
much now a days.
D. dot matrix printer
Dot-matrix printer are noisy and low quality
MCQ?
A. Charles Babbage
B. Worten Eagle
C. Douglas Engelbart
D. Vannevar Bush
MCQ?
Classification of computers
Q-1.Which of the following is not a
There are basically two main ways type of computer on the basis of
to classify computers. These are: operation?
By Type
a) Remote
b) Hybrid
By Size/ Capacity
c) Analog
d) Digital
By Type- There are three main Digital computers
types of computers under this • These are computers that
class.
represent data /information
They include:
in a binary form.
1. Digital computers
2. Analog computers • That is they represent
3. Hybrid computers signals in just two states 0s
and 1s are used during
data communication.
Speedometer
Thermometer
Conventional watch
Hybrid computers
• In this type of Computers,
have the features of both
digital & analog Computers.
• These are very useful in
scientific research and to
perform specific jobs.
• Example- Robot, ECG,ATM.
a) remote
b) hybrid
c) analog
d) digital
Macro Computers
By Size/Capacity They are the largest of all the
The capacity of a computer computers in terms of price,
refers to the volume of data memory size, power and
or information it can process speed of processor.
or store and the speed at Characteristics:
which it works.
Very expensive
The three main computers
Generate a lot of heat
under this group are:
Large memory size
1. Macro Computers
Wider variety of peripheral
2. Mini Computers
support.
3. Micro Computers
Supports multiple users
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
MCQ?
Palm computer
Q- PDA stands for?
The small computer that
literally fits in yourpalm.
Compared to full size
a) personal digital applications
computer, palmtops are
practical for certain b) private digital applications
function.
Palmtops use pen rather c) personal digital assistants
than a keyboard forinput.
d) private digital assistants
palmtops also called PDAs
and hand held computers
MCQ? MCQ?
*OBJECTIVES:
TO UNDERSTAND WHAT IS COMPUTER LANGUAGE.
Language Translators
•The computer language is defined as code or syntax which The term programming language usually refers to
is used to write programs or any specific applications.
high-level languages such as BASIC, C, C++,
COBOL, FORTRAN, Pascal, Java, Oracle, ASP.NET,
•The computer language is used to communicate
VB.NET and C#.
with computers.
•A computer language is an artificial language Each language has a unique set of keywords (words
that it understands)
designed to work for different applications in
different environments.
•Human languages are known as natural languages.
Unfortunately, computers can not understand natural
languages, as a result we must communicate with
computers using computer languages.
•These languages are:
High Level Languages.
Low Level Languages/Machine Language
c. Machine language • Length of the program is also small compared with low level.
•The native language of the computer, •There are four models of execution of program
by processor in high-level languages:
•The set of symbolic instructions in binary that is used to
represent operations and data in a machine called machine
• INTERPRETER
code • COMPILER
• ASSEMBLER
•Machine Language: “0110101100101000” • TRANSLATOR
•machine language is a collection of binary digits or
bits that the computer reads and interprets.
.
MCQ?
Q- Which of the following is language processor?
a. Assembler
b. Interpreter
c. Compiler
d. All of the above
MCQ?
Q- A program that can execute high-level language programs.
a) Compiler
b) Interpreter
c) Sensor
d) Circuitry
MCQ?
Q- _______ converts an assembly language program into
machine language.
a. Assembler
b. Interpreter
c. Compiler
d. All of the above
Computer Software & its Types
System Software
• System Software is set of programs to control and manage
the operations of a computer hardware.
•System software is software designed to provide a platform for
other software's.
•It can communicate with peripheral devices such as printers etc.
•Example of System Software will be Operating System.
MCQ? MCQ?
Q- Which of the following is designed to control the operations Q- A person who designs the programs in a software package is
of a computer? called :
Examples
• Examples of System Software's are:
1. Operating Systems
2. Utility Programs
3. Device Drivers
Application software (app for short)
•Application software (app for short) is a program or group of programs
designed for end-users.
•It is software that performs specific tasks for an end-user.
•Applications software includes database programs, word processors,
browsers and spreadsheets.
•It is also known as application package
Examples MCQ?
Microsoft Word Q- ___________________ is designed to solve a specific
Photoshop etc
a) Application Software
b) System Software
c) Utility Software
d) User
a. Bugs a. Pascal
b. Mistakes b. Microsoft Office
c. Item overlooked c. Java
d. Crash d. C++
Microsoft Introduction
Word…
Microsoft Word (often called Word) is a graphical word processing program
that users can type with. It is made by the computer company Microsoft. The
purpose of the MS Word is to allow the users to type and save documents.
Title bar
Menu bar
…is the word processing component of
the Microsoft Office Suite.
Scroll bar
Q.MS word is software of Q. The valid format of MS Word is
Create new file (ctrl+N) This file has not yet been saved so its
name is Document1.
Normal
Undoing Mistakes
The area outlined in red is called the Sometimes, you want to reverse the last
quick access toolbar. action you performed. For this, you can
use the Undo button:
It contains the most commonly used
Similarly, you can use the Redo button
commands in Microsoft Word:
to repeat the last action:
1. Save
2. Undo
3. Redo
Searching a word and replacing it
by another word Type word you want to replace
It will find
Type new It will your word
word you It will replace replace all in
want to add selected word the same document
word from
document
Ribbon
Styles Editing
Home
The Insert Tab Groups contain the commands
most commonly associated with adding
something to the document.
Header/Footer
Font Paragraph
Styles Editing Links Text
Dialogue Dialogue
Dialogue Dialogue Symbols
Box Box
Box Box
Insert
PageLayout
The Page Layout Groups contain the It customizes page layout; its margins,
indentation size and spacing.
commands most commonly associated with
It also has coloring and effects options to
settings that would affect the entire page or make the document esthetically beautiful.
document.
Paragraph Arrange
Page Layout
What is the blank space outside
the printing area on a page?
(A) Clipart
(B) Margins
(C) Header
(D) Footer
Set Margins
(A) Margin is added to the outside of the page when printing
(B) Margin that is added to the binding side of page when printing
Preview
The References Groups contain the The Mailings Tab groups contain the
commands most commonly associated with commands most commonly associated with
writing a research paper, essay, term paperor documents and files created for mass mailing.
similarly formal documents.
Table Footnotes Citations & Create Start Mail Merge
of Contents Bibliography
Write & Insert Fields
Preview
Captions Index Table of Results
Authorities
Window Macros
Q. The document can be zoom maximum upto
(A) 150%
(B) 200%
(C) 400%
(D) 500%
(A) 0, 100
(B) 0, 1000
(C) 10, 500
(D) 10, 100
Full Screen
Cut + Paste
The works with the standard
Copy and Paste commands.
Using Cut + Paste is like moving text
from one location to a new one.
(A) View tab
(B) Paragraph dialog box The cut command is located:
(C) Office Clipboard in the Home Tab
or in a shortcut menu when you
(D) All of these right-click on a selected word
Formatting Text
In the Font dialog box, you can
make changes to the type, style,
To show the font dialog box
size, and color of font used in
the document.
press
Size
Font
You can change the
“handwriting” of your text.
(A) Ctrl+ P
Font style (B) Ctrl+ D
Put a word in bold or italicsfor
emphasis.
Effects
(C) Ctrl+ B
Will let you addunderlining,
shadows, or details like
(D) Ctrl+ Q
strikethrough.
Subscript and Superscript
Subscript Superscript
Superscript example: Per m3
Success!
Type the text Select the text Click the subscript
Visually
select the
size of table
Or click
“ insert table”
Tables and Pictures Q.Which file are contents readymade styles that can
be used for a word document?
(A) Presentation
(B) Letters
(C) Magic wands
(D) Templates
ChangeAll
AutoCorrect
Grammar suggestions
Custom dictionary
Ignoring instances
Q.Which of the following function key Q. Thesaurus tool in MS Word is used for?
activates the speller?
1.Grammar options
1. F2
2. F4 2.Spelling suggestions
3. F5 3.Synonyms and Antonyms words
4. f7
4.All of above
Questions
Q.Superscript, subscript, are known as
Q1. If you want to redo an action in a
document, then press?
Options
(A) Ctrl + R
a. font styles
(B) Ctrl + U
(C) Ctrl + X b. font effects
(D) Ctrl + Y c. text effects
d. none of these
MS EXCEL 1
MCQ??
Spreadsheet
A spreadsheet is a grid of rows and columns in which
you enter text, numbers, and the results of
Q1. A _____ is a grid with labeled
calculations.
columns and rows?
In Excel, a computerized spreadsheet is called a
worksheet.The file used to store worksheets is called
A. Dialog box
a workbook.
B. Worksheet
Cells are arranged in rows and columns with each C. Clipboard
row being identified by a number and each column by D.Toolbar
a letter to make it easier to find and use the
stored information.
Cell
Row
Column
The cell in the worksheet in which you can type Q- You can activate a cell by
data is called the active cell.
The Name Box, or cell reference area, displays a. Pressing the Tab key
the cell reference of the active cell.
b. Clicking the cell
The Formula Bar displays a formula when a c. Pressing an arrow key
worksheet cell contains a calculated value.
d. All of the above
A formula is an equation that calculates a new
value from values currently in a worksheet.
Selecting a Group of Cells
A group of selected
cells is called a
range. The range is
identified by its range
reference, for
example, A3:C5.
CELL REFERENCE ???
Entering Data in a Cell
Worksheet cells can contain text, numbers, or
formulas.
Q. The cell reference for cell range
of G2 to M12 is ? Text is any combination of letters and
numbers and symbols.
A. G2.M12 Numbers are values, dates, or times.
Formulas are equations that calculate a
B. G2;M12 value.
C. G2:M12
You enter data in the active cell.
D. G2-M12
Zooming a Worksheet
By default, everything on screen is displayed at Q- Which of the following is not a valid
100% in MS Excel. You can change the zoom data type in Excel?
percentage from 10% (tiny) to 400% (huge).
A. Number
B. Character
C. Label
D. Date/Time
D) First Column then Row Name SEND-TO SEND A COPYOF DOCUMENTTO OTHER PEOPLE.
PUBLISH-TO DISTRIBUTE DOCUMENT TO OTHER PEOPLE.
CLOSE-TO CLOSE A DOCUMENT (CTRL+W).
MS EXCEL 6
GROUPS
COMMANDS
CELL REFERENCING
AN ABSOLUTE MCQ??
CELL
REFERENCE AS
($A$1) ALWAYS Q. Which of the following is the absolute
REFERS TO A
CELL IN A cell reference?
SPECIFIC
IN CELL (C1) SUM FUNCTION ISUSED.
LOCATION. IF
THEN FUNCTION FROM CELL (C1) IS COPY TO CELL (D3).
THE POSITION 1.!A!2
WHEN THE POSITION OF THE CELL IS CHANGED FROM (C1)
OF THE CELL
TO (D3),THEN THE ABSOLUTE REFERENCE REMAINS THE
SAME(A1,B1).$ IS USED FOR CONSTANT ROW OR COLUMN. THAT CONTAINS 2.@A@2
THE FORMULA
CHANGES, THE 3.$A$2
ABSOLUTE
REFERENCE 4.*A*2
REMAINS THE
SAME.
14
with?
= TODAY RETURNS CURRENT DATEONLY.
MS EXCEL 1/19/2013 19
MCQ?? MCQ??
MS EXCEL 1
SORTING
Sorting lists is a common spreadsheet task that
allows you to easily re-order your data. The most
common type of sorting is alphabetical ordering,
which you can do in ascending or descending order.
What is filtering
• Filtered data displays only the rows that
meet criteria that you specify and hides
rows that you do not want displayed.
After you filter data, you can copy, find,
edit, format the subset of filtered data
without rearranging or moving it.
Click the drop-down arrow in the Column Sort
by field, then choose one of the options—in this
example, Category.
LEARN ABOUT CHARTS
• Charts are used to display series of numeric data
in a graphical format to make it easier to
understand large quantities of data and the
relationship between different series of data.
• To create a chart in Excel, you start by entering the
numeric data for the chart on a worksheet. Then
you can plot that data into a chart by selecting the
chart type that you want to use on the Office
Fluent Ribbon (Insert tab, Charts group).
Conditional Formatting
• Makes spreadsheets of complex data easier to
read by formatting cells based on the data
Conditional formatting in Excel contained.
Highlight text in cells
Highlight column to
apply formatting to
As the column
contains Type text to format in this box
text, click Text
Click here to choose formatting
that Contains….
Cursorover
Click here to go Clear Rules
to next example
Select Clear
Rules from
Entire Sheet
Q- Which file format can be added to
a PowerPoint show ?
A. .gif
B. .jpg
C. .wav
D. All of above
Q- Shortcut to insert new slide in the
current Presentation is ?
A. CTRL+O
B. CTRL+M
C. CTRL+F
D. CTRL+N
Q- Special effects used to introduce
slides in a presentation are known as ?
A. transitions
B. effects
C. custom animations
D. annotations
A. F3
B. F5
C. F7
D. F9
A. F5
B. F2
C. F7
D. F9
A. 100%
B. 200%
C. 300%
D. 400%
Q-1.Several computers linked to a server to
share programs and storage space.
A. Library
B. Network
C. Grouping
D. Integrated system
A. Desktop
B. Network server
C. Network client
D. Network switch
FILE SHARING – Networks offer a quick and
easy way to share files directly.
The different types of network are based on Q. A ____ typically connects personal computers within
following:
a very limited geographical area, usually within a single
Size of the network – Refers to the area building.
over which the network is spread.
NETWORK
MAN connects several LAN spread over a city.
WAN uses telephone lines, satellite link INTERNET is a common example of WAN.
and radiolink to connect.
Q. The Internet is
Q. Bluetooth is an example of
It is easy to add new and remove nodes. Ring topology is like a bus topology, but with
connected ends.
A node failure does not bring let down
the entire network. The node that receives the message from the
It is easier to diagnose network problems previous computer will retransmit to the next node.
through a central hub. The data flows in one direction, i.e., it is
unidirectional.
In Ring topology the network cable passes
from one node to another until all nodes are
connected in the form of a “loop or ring”.
The most common access method of the ring
topology is token passing.
Token passing: It is a network access method in
which token is passed from one node to another
node.
1. Unidirectional.
2. Bidirectional.
Mesh topology is a type of network topology in which
each computer is connected to every other computer in
the network.
It is the most fault tolerant network topology as it has
multiple connections.
In mesh topology each computer is connected to the
other computer by a point to point link
There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchical.
1. Protocol is a set of
a) Formats
b) Procedures
c) Formats & Procedures
d) None of the mentioned
Q. The term HTTP stands for? For example, when you enter a URL in your browser,
this actually sends an HTTP commands to the Web
A. Hyper terminal tracing program server directing it to fetch and transmit the requested
Web page.
B. Hypertext tracing protocol
C. Hypertext transfer protocol
D. Hypertext transfer program
SMTP
SMTP stands for Simple Mail Transfer Protocol.
SMTP is a set of communication guidelines that allow software to transmit an
electronic mail over the internet is called Simple Mail Transfer Protocol.
It is a program used for sending messages to other computer users based on e-mail
addresses.
It provides a mail exchange between users on the same or different computers, and
it also supports:
It can send a single message to one or more recipients.
Sending message can include text, voice, video or graphics.
It can also send the messages on networks outside the internet.
Q. SMTP connections secured by SSL are known as Q. POP stands for:
POP Protocol
What is POP3 ?
The POP protocol stands for Post Office Protocol. As we know that SMTP is used as a
message transfer agent. When the message is sent, then SMPT is used to deliver the
Post Office Protocol version 3 (POP3) is a standard mail
message from the client to the server and then to the recipient server. But the protocol used to receive emails from a remote server to a
message is sent from the recipient server to the actual server with the help of the local email client. POP3 allows you to download email
Message Access Agent. The Message Access Agent contains two types of protocols, messages on your local computer and read them even
i.e., POP3 and IMAP(The Internet Message Access Protocol (IMAP)) when you are offline. Note, that when you use POP3 to
connect to your email account, messages are downloaded
locally and removed from the email server
A. TCP/IP
B. DCHP
C. HTTP
D. HTTPS
MCQ?
MCQ?
Q- The number of layers in ISO OSI reference
model is __________
a) 4
b) 5
c) 6
d) 7
MCQ?
Q- Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
MCQ?
Q- Which layer is responsible for process to
process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
MCQ?
Q- Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer
WIRELESS TECHNOLOGY
As modulation made it
IR Wireless
possible to transmit voices
and music via wireless.
1. IR (infrared) radiation
EXAMPLES OF WIRELESS
Wi-Fi Network connect computers to each other, to the internet Many access points can be connected to each other via
and to the wired network.
Ethernet cables to create a single large network.
When you click on an icon for a device and you are linked to
it, automatically.
A. Gigabit
B. Gigahertz
C. Generation
D. Good to Go
LOGO
WIRELESS APPLICATIONS LOGO WIRELESS SERVICES
Doctors , Pilots
Q2. Who launched the first commercial Q3. What are main problems in 1G
1G network in the world? technology?
2G technology refers to the 2nd generation which is 2G requires strong digital signals
based on GSM. to help mobile phones work. If there
It was launched in Finland in the year 1991.
2G network use digital signals. is no network coverage in any specific
It’s data speed was upto 64kbps. area , digital signals would weak.
Features Includes:
These systems are unable to
It enables services such as text messages, handle complex data such as Videos.
picture messages and MMS (multi media message). 2G Wireless System
1G WIRELESS SYSTEMS 2G WIRELESS SYSTEMS 2.5G is a technology between the second (2G) and
third (3G) generation of mobile telephony.
2.5G is sometimes described as 2G Cellular
Technology combined with GPRS.
i.e. General Packet Radio Service
Features Includes:
Phone Calls
Send/Receive E-mail Messages
Web Browsing
Speed : 64-144 kbps
Camera Phones
Take a time of 6-9 mins. to download a 3 mins. Mp3
song
A. 5
B. 10
C. 15
D. 20
4G technology refer to or short name of fourth Generation The next generations of wireless technology that promises
which was started from late 2000s. higher data rates and expanded multimedia services.
Capable of providing 100Mbps – 1Gbps speed. Capable to provide speed 100Mbps-1Gbps.
One of the basic term used to describe 4G is MAGIC. 4G LTE-LTE, sometimes known as 4G LTE, is a type
MAGIC: of 4G technology
LTE stands for Long Term Evolution
Mobile Multimedia
Anytime Anywhere
Global Mobility Support Features Include:
Integrated Wireless Solution More Security
Customized Personal Services High Speed
Also known as Mobile Broadband Everywhere. High Capacity
Low Cost Per-bit etc.
The basic difference between 3G and 4G is in data transfer and signal 3G WIRELESS SYSTEM 4G WIRELESS SYSTEM
quality.
Technology 3G 4G
Data Transfer Rate 3.1 MB/sec 100 MB/sec
LOGO
5G TECHNOLOGY LOGO
BENEFITS OF 5G TECHNOLOGY
5G technology refer to short name of fifth Generation High Speed, High Capacity
which was started from late 2010s. 5G technology providing large broadcasting of data in
Gbps .
Complete wireless communication Multi - Media Newspapers, watch T.V programs with the
with almost no limitations. clarity
as to that of an HD Quality.
It is highly supportable to WWWW Faster data transmission that of the
(Wireless World Wide Web). previous generations.
Large Phone Memory, Dialing Speed,
clarity in Audio/Video.
Support interactive multimedia , voice,
streaming video, Internet and other
5G is More Effective and More Attractive.
LOGO
BENEFITS OF 5G TECHNOLOGY
5G NR-
5G NR (New Radio) is a new radio access technology
(RAT) for the 5G (fifth generation) mobile network
Ad hoc networking
Piconet
Piconet is a Bluetooth network that consists of one primary
(master) node and seven active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7
slaves) or stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can
be one-to-one or one-to-many
• All communication is between master and a slave. Salve-slave
communication is not possible.
Scatternet
Q-An interconnected collection of piconet is called ___?
Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other
a) scatternet piconet.
b) micronet • Such a station or node can receive messages from the master in
c) mininet the first piconet and deliver the message to its slaves in other
piconet where it is acting as master. This node is also called bridge
d) multinet
slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets
GPS triangulation
Trilateration
Q-What is the minimum number of satellites you need to One satellite is useless, because you have nothing to
get in your GPS receiver to get a relatively accurate compare it with.
location? Two will place you somewhere on a circle where two
spheres around the satellites intersect.
Ans- 4 satellites
Since this circle will intersect the earth at two points,
In order for a GPS receiver to compute accurate
you could be at either of those two points. Or you could
position and time, it needs to be in good view of
be anywhere else along that circle, such as in an airplane,
at least 4 satellites in the sky. This is called a GPS lock
spacecraft, or underground
or fix.
Add a third satellite, and you will be able to narrow
down your position to a single point,
area.
MCQ? MCQ?
Q-What is the number of GPS satellites used? Q-What is the approximate time taken by the GPS for one
complete orbit?
a) 54
b) 12
a) 11 minutes
c) 5
b) 45 minutes
d) 24
c) 5 hours
d) 12 hours
Control Segment (The control and monitoring stations) Master Control Station
The control segment tracks the satellites and
then provides them with corrected orbital and time Located at Colorado Springs, the Master Control
Station (MCS) is the central control node for
information.
the GPS satellite constellation
The control segment consists of five unmanned
monitor stations and one Master Control Station. •Hawaii,
The five unmanned stations monitor GPS •Ascension Island (South Atlantic),
satellite signals and then send that information to •Diego Garcia (Indian Ocean),
the Master Control Station where anomalies are •Kwajalein (North Pacific).
corrected and sent back to the GPS satellites
through ground antennas.
User Segment
(The GPS receivers owned by civilians and military)
ਧੰਨਵਾਦ ਜੀ
A geofence is a virtual perimeter for a real-world
A geo-fence could be dynamically generated—as
geographic area.
A perimeter is either a path that in a radius around a point location, or a geo-fence
encompasses/surrounds/outlines a shape (in two
can be a predefined set of boundaries (such as
dimensions).
The perimeter of a circle or an ellipse is called school zones or neighborhood boundaries).
its circumference.
The use of a geofence is called geofencing.
email account. when a device enters (or exits) the boundaries defined by
Q-1. What does GPS stand for? Q- 2. When was the first GPS satellite launched?
A. 1776
A. Going Places Sometimes B. 1978
B. Global Positioning Satellites C. 1994
C. Government Positioning Satellites D. 1963
D. Global Positioning System
Q-3. How many GPS satellites were there when Q-4. What is the minimum number of GPS
the system was originally set up? satellites you need to receive information from
in order to get a fix on your horizontal position?
A. 36
B. 10
C. 24 A. 3
D. 50 B. 2
C. 5
D. 1
E. 4.
A. GSTAR
B. NAVSTAR
C. GAVSTAR
D. NONE
Introduction
Malware is a malicious software that gets installed in
your device and performs unwanted tasks.
a) Infected website
b) Emails
c) Official Antivirus CDs
And from e-mail attachments. d) USBs
Your computer functions slower than You see uncommon error messages.
normal.
Applications won't start.
Your computer responds slowly and
freezes often. Your antivirus has disappeared, and
firewall is disabled
Your computer restarts itself often.
Anti virus software
How to Protect your System Against How to Protect your System Against
Virus? Virus?
To Protect your system against Viruses
To Protect your system against Viruses you have to follow these steps :
you have to follow these steps :
Install a good Anti-Virus software
on your computer.
Be careful while Downloading files or A Worm Can Replicate itself without human
programs from the internet. interaction.
They make the working of your device slower
Always scan your floppies, CDs, flash
drives before using them.
.
ਟ੍ਰੋਜਨ -ਇੱਕ ਖੋਖਲੀ ਲੱ ਕੜ ਦਾ ਘੋੜਾ, ਜਜਸ ਨੂੰ
Trojan Horse ਯਨਾਨੀਆਂ ਨੇ ਟ੍ਰੋਜਨ ਯੱਧ ਦੇ ਦੌਰਾਨ ਵਰਜਿਆ ਸੀ.
Trojan Horse Definition: It is a program that looks ਟ੍ਰੋਜ਼ਨ ਨੇ ਸੋਜਿਆ ਜਕ ਘੋੜਾ ਇੱਕ ਿੋਹਫਾ ਹੈ, ਉਸ ਨੇ ਇਸ
like a harmless application.
ਨੂੰ ਸਵੀਕਾਰ ਕਰਨ ਲਈ ਆਪਣੇ ਸ਼ਜਹਰ ਨੂੰ ਖੋਲਹ ਜਦੱਿਾ,
Trojan viruses do not copy themselves, but they can
ਜਜਸ ਨਾਲ ਯਨਾਨੀਆਂ ਨੂੰ ਟ੍ਰੋਜਨਾਂ ਉੱਿੇ ਹਮਲਾ ਕਰਨ ਦਾ
work as gateway.
ਮੌਕਾ ਜਮਲ ਜਿਆ
Entering a computer, it performs various tasks like
corrupting files and sending out personal
information.
Spyware
Spyware or snoopware is a term used to describe
a software program that is intentionally installed on a
computer.
Spyware is used to monitor what other users of the
same computer are doing.
It monitors the user’s activities on the internet and
transmits that information to the third party.
Spyware
Adware
Spyware is a term used to describe a program designed adware is a program installed without a user's
to gather information about a user's activity secretly. consent or knowledge during the install of
another program.
Spyware programs are often used to track users' habits Much like spyware, adware tracks
to target them with advertisements better. Spyware is individuals Internet activities and habits to help
companies advertise more efficiently.
usually installed on a user's machine without their
knowledge after clicking a link (intentionally or It automatically downloads to your device while
browsing any website.
unintentionally) that redirects the user to a malicious
website. It is used by companies for marketing purposes.
DATABASE MANAGEMENT
SYSTEM
Basic Definitions
forms like text, numbers, media, bytes, etc. it so that it can be easily accessed and managed.
can be stored in pieces of paper or electronic • A database management system stores data in
memory, etc. such a way that it becomes easier to retrieve,
manipulate, and produce information.
Users :- DBMS Architecture:-
Administrators
• A 3-tier architecture
Designers
separates its tiers from
End Users
each other
1. DataBase(Data)
2. Application(interface)
3. User(Presentation)
Entity-Relationship Model
Entity − An entity in an ER Model is a real-world entity
Entities and their attributes. defined by its set of values called domain. For example,
An entity can be a real-world object, either animate or Entities are represented by means of their
inanimate, that can be easily identifiable. For example, in a properties, called attributes. All attributes have
school database, students, teachers, classes, and courses values. For example, a student entity may have
offered can be considered as entities. All these entities
have some attributes or properties that give them their
name, class, and age as attributes.
identity. There exists a domain or range of values that can
An entity set is a collection of similar types of entities. An be assigned to attributes. For example, a student's
entity set may contain entities with attribute sharing name cannot be a numeric value. It has to be
similar values. For example, a Students set may contain all alphabetic. A student's age cannot be negative, etc.
the students of a school; likewise a Teachers set may
contain all the teachers of a school from all faculties. Entity
sets need not be disjoint.
Multivalued attributes are depicted by double Derived attributes are depicted by dashed ellipse.
ellipse.
Introduction
2. Distributed Database:
• Data Definition Language (DDL)
Create, Alter, Drop
• Data Manipulation Language (DML)
Insert, Select, Update, Delete
• Data Control Language (DCL)
Grant, Revoke
• Transaction Control Language (TCL)
Commit, Rollback.
•SQL can create new databases •Using the data definition properties of SQL, one can design
•SQL can create new tables in a database and modify database schema, whereas data manipulation
•SQL can create stored procedures in a database properties allows SQL to store and retrieve data from database.
•SQL can create views in a database
•SQL can set permissions on tables, procedures, and views Data Definition Language
•SQL comprises both data definition and data manipulation SQL uses the following set of commands to define database
languages schema −
CREATE
. DROP
ALTER
Introduction To SQL
EmployeeID
that qualifies for a Candidate key, EmployeeName
DeptID
then you have to select 2 or more SSN
DeptName
EmployeeName columns to make a row unique. DeptID
• Like if there is no EmployeeID or DOB
SSN
SSN columns, then you can
DeptID make EmployeeName + • Here in above tables DeptID of Department
DateOfBirth (DOB) as Composite table is Primary Key where as DeptID of
DOB Primary Key. But still there can be Employee is an Foreign key.
a narrow chance of duplicate rows.
• It means it has referred to another table. This
concept is also know as Referential Integrity.
Employee
• Unique key is same as •Normalization is the process of organizing the data in the
EmployeeID
primary with the difference database.
EmployeeName
being the existence of null. •Normalization is used to minimize the redundancy from a relation
SSN
• Unique key field allows one or set of relations. It is also used to eliminate the undesirable
EmailID
value as NULL value. characteristics like Insertion, Update and Deletion Anomalies.
DOB
•Normalization divides the larger table into the smaller table and
links them using relationship.
•The normal form is used to reduce redundancy from the database
table.
National Research Council, U S A "Computers at Risk”.1991 of life all over the world.
Any crime with the help of computer and Cybercrimes against persons.
telecommunication technology.
Cybercrimes against property.
Any crime where either the computer is used as
an object or subject. Cybercrimes against government.
Logic Bombs
Hacking of Government websites
Spamming
Cyber Crime in India The Information Technology Act, 2000 (IT Act), came
1500
The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
1000
filing of electronic records with the Government.
500
0
1 2 3 4 Information Technology Act 2000 consisted of
94 sections segregated into 13 chapters and 4 Schedules
To amend the Indian Penal Code, The Indian SECTION 294: Obscene Acts and Songs in Public Place
Evidence Act, 1872, The Banker's Book Evidence Act,
1891 and the Reserve Bank of India Act, 1934. SECTION 464: Making False Documents
124 sections and 14 chapters and 2 schedules. Brazil is considered world’s biggest airport for Hackers.
Schedule I and II have been replaced & Iran is also a dangerous country for the Netizens. He
Schedules III and IV are deleted. also have a Crime Police unit for crime in Cyber Space.
Q- The use of the Internet or other electronic means to Q- .......... refers to sending email to thousands and
harass an individual, a group of individuals, or an thousands of users-similar to a chain letter.
organization is termed:
(a)Email spamming
(a)Cyberspace
(b)Email bombing
(b)Cyber stalking
(c)Trojan attack
(c) Pornography
(d)None of these
(d)None of these
Thank You
E-Mail Address
E-mail
Each user of email is assigned a unique name for
Email is a service which allows us to send the his email account. This name is known as E-mail
message in electronic mode over the internet. It address. Different users can send and receive
offers an efficient, inexpensive and real time mean messages according to the e-mail address.
of distributing information among people ⚫Example
⚫[email protected]
E-Mail Address
E-mail Message Components
1. The username and the domain name are E-mail message comprises of different
separated by @ (at) symbol. components: E-mail Header, Greeting, Text, and
2. E-mail addresses are not case sensitive. Signature. These components are described in the
3. Spaces are not allowed in e-mail address following diagram:
E-mail Message Components E-mail Header
The first five lines of an E-mail message is called E-
mail header. The header part comprises of
following fields:
From
Date
To
Subject
CC
BCC
From Subject
The From field indicates the sender’s address i.e. The Subject field indicates the purpose of e-mail. It
who sent the e-mail.
Date should be precise and to the point.
The Date field indicates the date when the e-mail CC
was sent. In email sending, CC is the abbreviation for “carbon copy.” Back in
To the days before internet and email, in order to create a copy of the
The To field indicates the recipient’s address i.e. to letter you were writing, you had to place carbon paper between the
whom the e-mail is sent.
one you were writing on and the paper that was going to be your
copy.
BCC Greeting
BCC stands for “blind carbon copy message. Just Greeting is the opening of the actual message. Eg.
Hi Sir or Hi Guys etc.
like CC, BCC is a way of sending copies of an email Text
to other people. The difference between the two is It represents the actual content of the message.
Signature
that, while you can see a list of recipients when CC This is the final part of an e-mail message. It
is used, that's not the case with BCC includes Name of Sender, Address, and Contact
Number.
E-mail Protocols SMTP
SMTP SMTP
Key Points: Key Points:
•SMTP is text based protocol. •When you send e-mail, your e-mail client sends it
•It handles exchange of messages between e- to your e-mail server which further contacts the
mail servers over TCP/IP network. recipient mail server using SMTP client.
•Apart from transferring e-mail, SMPT also •These SMTP commands specify the sender’s and
provides notification regarding incoming mail. receiver’s e-mail address, along with the message
to be send.
SMTP MIME
Key Points: Multipurpose Internet Mail Extension (MIME) is a
•The exchange of commands between servers is standard which was proposed by Bell
Communications in 1991 in order to expand
carried out without intervention of any user. limited capabilities of email.
•In case, message cannot be delivered, an error MIME is a kind of add on or a supplementary
protocol which allows non-ASCII data to be sent
report is sent to the sender which makes SMTP a through SMTP. It allows the users to exchange
reliable protocol. different kinds of data files on the Internet: audio,
video, images, application programs as well.
Why do we need MIME? IMAP
Limitations of Simple Mail Transfer Protocol – IMAP stands for Internet Message Access
•SMTP has a very simple structure Protocol. It was first proposed in 1986. There exist
•It cannot be used for languages that do not support 7-bit
five versions of IMAP as follows:
ASCII format such as- French, German, Russian, Chinese
Original IMAP
and Japanese, etc. so it cannot be transmitted using SMTP. IMAP2
So, in order to make SMTP more broad we use MIME. IMAP3
IMAP2bis
•It cannot be used to send binary files or video or audio
IMAP4
data.
IMAP IMAP
Key Points: Key Points:
•IMAP allows the client program to manipulate •IMAP enables the users to search the e-mails
the e-mail message on the server without
downloading them on the local computer.
.
.
.
malicious script which when run on your claiming to be a legitimate enterprise. Its main purpose is to
steal sensitive information such as usernames, passwords,
computer may lead to destroy your important
and credit card details.
data.
Such emails contains link to websites that are infected with
. malware and direct the user to enter details at a fake
website whose look and feels are same to legitimate one.
.
Mobile Computing is a technology that allows
transmission of data, voice and video via a
Working of Mobile Phones and personal digital Gadgets computer or any other wireless enabled device
without having to be connected to a fixed physical
link. The main concept involves
•Mobile hardware
•Mobile software
Mobile Hardware These devices will have a receptor medium that is capable
Mobile hardware includes mobile devices or device of sensing and receiving signals. These devices are
components that receive or access the service of mobility. configured to operate in full- duplex, whereby they are
They would range from portable laptops, smartphones, capable of sending and receiving signals at the same time.
tablet Pc's, Personal Digital Assistants They don't have to wait until one device has finished
communicating for the other device to initiate
communications.
Above mentioned devices use an existing and established
network to operate on. In most cases, it would be a wireless
network.
• This kind of phone combines the features of a PDA with that Apple's iOS, Microsoft's Windows Phone.
Tablet PC and iPads They offer the same functionality as portable computers.
• This mobile device is larger than a mobile phone or
a PDA and integrates into a touch screen and is
operated using touch sensitive motions on the
screen.
• They are often controlled by a pen or by the touch of
a finger.
• They are usually in slate form and are light in
weight.
• Examples would include ipads, Galaxy Tabs,
Blackberry Playbooks etc.
E-readers Who invented cell phones?
E-book readers—also called e-readers—are similar to
tablet computers, except they are mainly designed for
reading e-books (digital, downloadable books).
Notable examples include the Amazon Kindle, which
is easier to read than a traditional computer display.
History of mobile phones and the first mobile • These early mobile phones are often referred to
phone
as 0G mobile phones, or Zero Generation mobile
• The very first mobile phones were not really mobile
phones.
phones at all.
• Most phones today rely on 3G or 4G mobile technology.
• They were two-way radios that allowed people like taxi
• Mobile telephony has a long history that started off with
drivers and the emergency services to communicate.
experiments of communications from and to moving
• Motorola, on 3 April 1973 were first vehicle rather then handheld devices.
company to mass produce the the first 1926: The first successful mobile telephony service was
offered to first class passengers the route between Berlin
handheld mobile phone.
and Hamburg.
1946: The first calls were made on a car radiotelephone in
Chicago.
1956: The first automated mobile phone system for private Martin Cooper changed the world when he made
vehicles launched in Sweden. The device to install in the car the first cell phone call 40 years ago.
used vacuum tube technology with rotary dial and weighed The former Motorola vice president and division
40Kg. manager made the call on the company's
1973: Dr Martin Cooper general manager at DynaTAC phone while standing in front of the
New York Hilton on Sixth Avenue. His first call: to
Motorola communications system division
the head of research at Bell Labs, a company
made the first public mobile phone call on a
that also was attempting to build the first cell
device that weighed 1.1Kg.
phone.
1987: The Technical specifications for the GSM How Do Cell Phones Work?
In the most basic form, a cell phone is essentially a two-
standard are approved.
way radio, consisting of a radio transmitter and a radio
1992: The world’s first ever SMS message was receiver. When you chat with your friend on your cell
sent in the UK. Neil Papworth, aged 22 at the phone, your phone converts your voice into an electrical
time was a developer for a telecom contractor signal, which is then transmitted via radio waves to the
tasked with developing a messaging service for nearest cell tower. The network of cell towers then
relays the radio wave to your friend’s cell phone, which
Vodafone. The text message read “Merry
converts it to an electrical signal and then back to sound
Christmas” and was sent to Richard Jarvis, a
again. In the basic form, a cell phone works just like a
director at Vodafone, who was enjoying his office walkie-talkie.
Christmas party.
Radio Antenna
Waves
Cell phones use radio waves to communicate. Radio waves transport
digitized voice or data in the form of oscillating electric and magnetic
• Cell phones contain at least one radio antenna in order
fields, called the electromagnetic field (EMF). The rate of oscillation is
to transmit or receive radio signals. An antenna
called frequency. Radio waves carry the information and travel in air at
the speed of light. converts an electric signal to the radio wave
Cell phones transmit radio waves in all directions. The waves can be (transmitter) and vice versa (receiver). Some cell
absorbed and reflected by surrounding objects before they reach the phones use one antenna as the transmitter and
nearest cell tower. For example, when the phone is placed next to your
receiver while others, such as the iPhone 5, have
head during a call, a significant portion (over half in many cases) of the
multiple transmitting or receiving antennas.
emitted energy is absorbed into your head and body. In this event, much
of the cell phone’s EMF energy is wasted and no longer available for • Many modern smart phones also contain more than
communication. one type of antenna. In addition to the cellular antenna,
they may also have Wi-Fi, Bluetooth and/or GPS