Computer
Computer
A Computer is an electronic device that accepts raw data as input and processes it with a set of
instructions (a program) to produce the result as output.
- Maintain credibility
- Promotes E-Government
Office System:
1. MS-Word
2. MS-Excel
3. MS-Power Point:
Developed by MS-Corporation
0. Pack and Go: For easy transfer and delivery of presentation on another Computer
2. Slide Sorter: That displays all your slides at once in miniature form (thumbnails)
2. Slide Layout: Predefined formats for arranging contents on a slide
7. Images and Shapes: Tools for inserting and customizing visual elements
11. Note Pane: Area for adding speaker notes not visible to the audience
13. Ribbon: Toolbar with tabs and commands for various functions
14. File Menu: Options for saving, operating, and exporting presentation.
Presentation Software:
It is a Computer Program used to create and deliver visual presentations
It allows users to design slides containing text, images, charts, and multimedia elements
4. MS-One Note
5. MS-Outlook:
6. MS-Publisher:
It is a Graphic Design Apps that gives user creating materials for marketing or publication
7. MS-Access.
MS-Words:
It is popularly used in writing Documents, Letters, Thesis, Brochures, Newsletters, Reports, Journals, etc.
Important/Use/Function of MS-Word:
13. WY SI WYG: A Documents appears on the display screen exactly as it will look when printed
Other Components:
1. Documents: The primary file where text, images, and other elements are created and edited
2. Toolbar/Ribbon: A set of tools and commands for formatting and editing text
3. Text Formatting: Options for font type, size, bold, italic, underline, etc.
4. Paragraph Formatting: Tools for alignment, indentation, line spacing, and bullet points.
5. Styles: Predefined formatting options for heading, paragraphs, and other text elements
1. Alignment: It refers to the way text is arranged in the document between the margins.
2. Indent: The space between the margin of the page and the text.
3. Template: It is a starting point for a document that contains initial formatting options, settings, colors,
layout, and placeholders.
4. Word Wrap:
It refers to the function of a word processor that will automatically force text to a new line when the
right margin is reached while typing
It eliminates the need for pressing the Enter Key on the Keyboard at the end of every line.
5. HTML: Hyper-text mark-up language is a set of codes applied to text that controls how a page on the
world-wide-web appears.
6. Backward Compartibles:
It refers to the ability of newer versions of word to open, edit, and save documents created in older
versions of the software
This ensures that user can continue to work with their existing documents even after upgrading to a
newer version of word.
7. Watermark:
It is a semi-transparent text or image that appears in the background of each page in a document
They are often used for branding, confidentiality notices.
8. Bookmark: It is a useful feature that allows user to mark specific locations or sections in user’s
documents so user can quickly navigate to them later.
MS-Excel:
Allows users to organize, format and calculated with formulas using a spread sheet system.
Uses a collection of cells arranged into Rows and Columns to organize Data.
Spreadsheet:
It is a digital tool used to organize, analyze and store data in a Tabular format
It consists of rows and columns that form cells, where each cell can contain text, numbers, or formulas.
Used for budgeting, data analysis, financial calculations, and record keeping
Popular spreadsheet software includes MS-Excel, Google Sheets, Apple Numbers, etc.
Components of MS-Excel:
Worksheet Workbook
A single sheet or page within a work book The collection of all worksheet in a file
It consists of rows and column of cells An Excel file is called a workbook
Each worksheet has its own tab at the bottom of It may contain one or many worksheet (sheet 1,
the Excel windows sheet 2, etc.)
The file is typically saved with the .xls or .xlsx
extension
Row Column
Runs horizontally (left to right) Runs vertically (top to bottom)
Identified by numbers (1, 2, 3,) Identified by letter (A, B, C, AA, AB, etc.)
A row contains all cells in a line across the sheet A column contain all cells in a line from top to
Example: Row 3 means all cells from A3, B3, C3,) bottom
Example: Column B means all cells B1, B2, B3, etc.
Formulas Functions
An expression you create yourself A pre-build formulas that perform a specific,
It performs a calculation or combinations of values frequency used task
Start with “=” It saves you from writing complex formulas
Example: =A1+B1*2 manually
A function also start with “=”, followed by its name
and brackets
3. Data Validation: Restricting the types of data that can be entered in a cell
5. Record:
6. Filed:
7. Cell Reference: It is a way to refer to a specific cell or a range of cells within a worksheet.
8. Protect Sheet:
This is very useful tools when we want to prevent unwanted or unauthorized changes.
3. Logical Operators: Used to perform logical comparisons. AND, OR, NOT, etc.
Conclusion: These operators are essential for performing calculations, comparisons, and data
manipulation in Excel formulas and functions.
Directly click on the excel icon on the office short cut bar on the desktop or
Click on the MS-excel icon on the recently used program list over the all program menu.
Disadvantages of MS-Excel:
- It is hard to Consolidate
Used to create and edit documents like letters, reports, news-letter, journals, webpages etc.
Operating System:
It is system software that manages computer hardware, software resources and provides common
services for computer programs.
It provides commands that can be used for interaction between the user & computer.
It is system software which operates and manages the computer hardware resources and provides
platforms to run application software.
It manages all of the files and folders and allows to carries out various files/disk tasks.
It co-ordinate how programs work with the computer hardware and other software
Functions/Services of OS are:
1. Process Mgmt.:
2. Memory Mgmt.:
3. Storage Mgmt.:
- Reading and writing of data from the disk and to the disk
6. Networking Mgmt.:
7. Other:
- Input/Output Mgmt.
- Command Interpretation
Conclusion: The specific functions and capabilities of an OS may vary depending on the types of OS and
different OS are designated for various computing platforms.
Types of OS:
a. Single User OS: Only one user can access and operate a computer at a time.
b. Multi-User OS: It allows two or more users to access and operate the computer simultaneously
a. Single Tasking: It is an OS executes only one task or program at a time. Ex: DOS
b. Multitasking OS: When an OS allows the CPU to execute more than one task at a time then the system
is called it. Ex: Windows
A. Multiprocessing OS: That uses multiple CPU tom operate within a single system. Ex: UNIX
B. Real Time OS: Are useful in the situation where immediate response is required.
C. Batch Processing OD: That allows presenting the jobs to the computer in batches.
Disk OS:
It is an OS using CUI
It is command based OS in which all inputs are given through the key board.
Advantages:
- It is a light weight OS
- Easy and direct access to the bios calls & underlying Hardware
- Can run on a smaller system and can boot faster than other OS
Disadvantages:
DIR: Displays a list of files and directories in the current directory: “C:\>dir”
Q. What are the Commands used in LINUX with Syntax and their Purposes?
Windows:
It is a computer OS
Based on GUI
Allows visual interaction with the computer in a logical, fun and easy ways
Advantages/Usage:
- Windows app takes less disk and memory space while running
Versions of Windows:
Windows Components:
3. The Menu Bar: It is horizontal list of options for controlling all the activities of an app
5. The Main Windows Area: Contain the text of a document, area of a graphics processing app or a
picture or a drawing currently in process.
DOS Windows
It is a single tasking operating system It is a multiple tasking OS
It consumes quite low power It consumes high power
Its memory requirement is are quite low High
No support for networking Support
Complex in use. user need to remember User friendly and is quite similar to use
commands
Multimedia not support Support
Use commands GUI
Dos commands execution is faster than windows Slower
Support single windows at a time Supports multiple windows at a time
It is 16 bit OS It is 32/64 bit OS
It is not user friendly OS It is user friendly OS.
Unix/UNICS/Ultrix:
It is Launch in 1969.
The files system used in it is Hierarchical which allows efficient implementation and easy maintenance.
Linux:
Based on UNIX Standards which provides a Programming Interface & User Interface Compatibility
Launch in 1991.
There are prices versions for LINUX also but they are normally cheaper than Windows.
Linux Unix
Free of cost OS It is licensed and paid OS
Source code is available to the general public Source code is not available to the general people
Portable & can be executed on various hard drives Not portable
Free Expensive
Doesn’t required more specific hardware Installation required more sophisticated high end
components hardware
Inspection year: 1991 1969
Different version LINUX Mint, Red Hat , Solaries AIS, HP-UX, BSD, Irish, etc.
Can be installed on normal computer hardware Installing UNIX OS requires special kind of
computer hardware
It is just a kernel-core part of OS It is complete OS
Open source OS which is freely available It is only be used by it’s copywriters
Can be used by any one Develop for server computer
32 bit OS 64 bit OS
Primarily uses GUI with option CUI Primary uses CUI
Linux Windows
An open source OS Are not open source OS
Mainly Linux GUIs are not user friendly User friendly
Provide more security -
Widely used in hacking purposed based system Doesn’t provide much efficiency in hacking
Not use for gaming Use for gaming
It is complicated to install It gives users simple system to operate but it will
take a longer time to install
It has various distributions which are highly It has very few customization option available
customizable on user needs
Linux file system is case sensitive Windows files system is case insensitive
More efficient in operation Windows files system is case insensitive.
Unix Windows
It is an open source It is a licensed OS
It has very high security system It has low security system
It is a command based OS It is GUI based OS
The files system is arranged in hierarchy manner The files system arranged in a parallel manner
It is not user friendly It is user friendly
It is a multiprocessing OS It is not multiprocessing OS
Example: Example/Verson….
Database:
It is the collection of information in an organized ways so that desired piece of data can be obtained
when needed.
The database collects, organizes and stores data in tabular or reports or schemas.
Different data can be added, deleted, modified and updated through program in a database.
1. Centralized Database:
2. Distributed Database:
4. Operational Database: It is the collection of data concerned with the operation of the entity.
5. Commercial Database:
DBMS Software:
DBMS:
It enables the storage of data and makes them available for use to different programs, apps, or even
other database.
It is system that maintains data and processes them to generate a response at the time of query or
request.
Types of DBMS:
1. Object Oriented DBMS: In which information or data is represented in the form of objects.
2. Relational DBMS:
The data is organized in the 2 dimensional tables using Rows and Columns.
3. Document: Database which stores the data in the type of documents is called it.
4. Hierarchical DBMS:
It follows the hierarchical model and stores data in a tree like structures.
5. Network DBMS: Multiple member records or files are linked to multiple owner files & vice versa.
1. Hardware: Hardware refers to the physical, electronic devices such as computers and hard disks that
offer the interface between computers and real world system
2. Software: Software is a set of programs used to manage and control the database and includes the
database software, operating system, network software used to share the data with other users, and the
applications used to access the data
3. Data: Data are raw facts that need to be organized and processed to make it more meaningful.
4. Procedures:
It refers to the instructions used in a database mgmt. system and encompasses everything from
instructions to setup and install, login, and logout, manage the day to day operations, take backups of
data, and generates reports.
It is used to write commands to access, update, and delete data stored in database.
User can write commands using database access language before submitting them to the database for
execution.
Function/Objectives of DBMS:
- Elimination of errors while multiple no of users are using the same database at the same time.
DBMS RDMS
Stores data as files Stores data in tubular form
No relationship between data Related to each other
Doesn’t support distributed data base Support
Deals with small quantity of data Deals with large amount of data
Support single user Support multiple users
The data in it is subject to low security levels There exist multiple levels of data security
Ex: XML, Windows registry EX: MY SQL, Post GRE SQL, SQL server, oracle, MS-
access etc.
Benefits of DBMS:
Threats:
A computer threat is any activity that can cause damage to private or any data of user or organization or
any system in ways like stealing, manipulating etc.
This can be more summarized to unauthorized access to data of a system and causing damage to that.
1. Malware: Malicious software that infects your computer such as computer virus, worms, Trajan horse,
spyware and adware.
2. Virus: A computer virus is a type of malicious software or malware that spreads between computers
and causes damages to data and software.
3. Trojan: It has the ability to hide itself from antivirus detection, and steal important data.
4. Worms: They are software that is able to make copies of them-selves in order to spread and infect
other computer.
5. Spyware: Spyware is any software that installs itself on your computer and starts convert monitoring
your online behavior without your knowledge or permission.
6. Adware: Adware is software that displays unwanted pop-up adverts which can appear on your
computer or mobile devices.
7. Scare-ware: Programs designed to track a user a user into buying and downloading unnecessary and
potentially dangerous software.
8. Phishing: A fake website or email which is designed to almost like the actual website is a form of
phishing attack.
9. Spam: Spam is unwanted message sent for advertisement purpose or to spread malware.
Data/Information Security:
It is the process or mechanism that prevents unauthorized access to data & its use.
- Preparation of Policies
- Use of Firewall
Types of IT Security:
1. Network Security: It is used to prevent unauthorized or malicious users from getting inside users from
getting inside users network.
2. Internet Security: It involves the protection of information that is sent and received in browsers.
3. Endpoint Security: It provides protection at the device level. It will prevent user devices from
accessing malicious network that may be a threat.
4. Cloud Security: Apps, data and identities are moving to the cloud, meaning users are connecting
directly to the internet and not protected by the traditional security stack.
5. Apps Security: To protect apps from threats that can come through flows in the apps design, develop
and upgrade or maintenance.
2. Authentication:
3. Data Masking:
The format of the data remains the same, but the values are altered.
5. Data Encryption:
Information is encoded in such a way that only authorized user can read it.
6. Firewall:
7. Antivirus: Program to protect computers from malware like viruses, computer worms, spyware etc.
Data Recovery: Restoring data that has been lost, accidentally deleted, corrupted.
Challenges of IT Security:
MS Access:
It is an information mgmt. tools or relational data base that helps user to store information for
reference, reporting, and analysis.
Access can also overcome the limitation found when trying to manage large amount of information in
excel or other spreadsheet apps.
MS-Excel MS-Access
Building system is quite simple and easy Building system is quite difficult
More applicable for financial analysis and More applicable for the small business owners
statistical analysis
Easy to learn Quite hard to learn
It is more adaptable It is less adaptable
The storage capacity is less More
It is a spreadsheet to create graphic, tabular RDBMS to collect and sorting data
models
To learn and apply excel, user doesn’t need To learn and apply access for more features,
programming knowledge programming knowledge is required
Sharable smart report Multiple user can run query separately
Slow down/corrupt when big files sizes Rare loss of data.
7. Mobile Banking Risk: - Lost or Stolen Mobile Device, - Insecure Mobile Apps
Intranet Extranet
Internal communication Secure external collaboration
Document and resource sharing Controlled access for partner or customer
Collaboration and team work Shared resources and information
Knowledge mgmt. Online transaction and data exchange
Workflow automation B2B communication and document sharing
Information security Enhance supply chain mgmt.
Employee engagement Streamlined customer support
Data integration Improve partner relationship.
Analytics and feedback gathering
Types of Extranet/Example:
1. Supplier Extranet
2. Customer Extranet
3. Partner Extranet
4. Project Extranet
5. Employee Extranet
Types of Intranet:
1. Centralized Intranet:
3. Social/Intranet Portal:
4. Department/Intranet Sites:
5. Hybrid Intranet:
PAN: Network arranged within an individual person, typically within a range of 10m (30ft): types-wired
and wire less
Email:
Electronic mail, send and receive mail at any time containing text, files, graphics
CC and Blind CC
Steps 9: Delivery.
Step 9: Confirmation.
Advantages:
Disadvantages of E-mails:
- E-mail overload
- Username: Username identifies user a/c on the email server that handles the email.
- @: It means ‘at the rate’ which separate user a/c name and name of the e-mail server name.
The first pieces is the name of the e-mail server and located to the right of the “@”.
The second piece usually has a tree letter extension that indicates the top level domain.
Some top level domains are .com, .org, .gov, .mil, .edu, .np
Types of E-mail:
Personal Mail
Business/Professional Mail
Marketing/Professional Mail
Transactional Email
News Letter
Internal Communication
Automated Email
Mail Merge:
Advantages:
It is economic method
1. Letters
2. Envelopes
Types of Network:
Information:
Information makes its recipient able to knowledge or insight about a certain matters.
It is the message that is being conveyed between two or more parties through the processing of data.
Data becomes information when it is processed, organized, structured or presented in given context in a
meaningful and logical ways.
Types of Information:
Data Information
Data is a simple, raw and unorganized fact has no It is the processed organized, structured and
sences if not proceeds contextually presented version of data
It is derived from the latin word ‘datum’ which Derived from word informare
means something given
It is input for information It is output of data
Data soley carries no meaning It has meaning obtained from the interpretation of
data
Data has no dependency on information It is data dependent
Understanding is difficult Understanding is easy
The monthly salary earned by each staff in a bank The avg. monthly salary of the staff in the bank is
is data an information
May or may not be meaningful Always meaningful
Input to any system, may be treated as data Output after processing system is information
Types:
Data may not in order Be in order
Example: survey data Census report
Types of Data:
NRB IT policy:
NRB formulate the IT policy for own implementation & for all other licensed BFIs. NRB also formulate
the NRB IT Guidelines.
NRB IT Policy:
- Set a standard for IT procurement and shall be reviewed as per the technological change
Challenges:
Problems with coping with technology, system migration, adequate internal control system, restricted
system and data access to unauthorized sources, protecting electronic transactions, meeting legal
requirements, managing outsourcing services, and ,managing other IT related risks arise in the banking
sector making the need of NRB IT policy.
NRB IT Guidelines:
1. IT Governance:
- The strategic, policies, related to information technology shall be passed by the board of directors and
reviewed at least once a year.
- BFIs should use IT resources in an efficient, effective and economical manner so that all business
requirements are met.
- BFIs need to carry out a detail risk analysis before adopting new technology since it can potentially
introduce new risk exposure.
- BFIs should constantly monitor and measure IT functions and reports to a top level of mgmt.
- BOD should be adequately aware of the IT resources and ensure that it is sufficient to meet the
business requirements.
- BFIs should have process in place to identify and adequately address the legal risk arising from cyber
law and electronic transaction related laws and act of Nepal.
2. Information Security:
- To increase awareness regarding information technology security among the stakeholders of the banks
- Arrange to inform customer immediately after banking transaction through mobile messages.
- The hardware and software used in bank’s computer should be official and secure.
- Do not entrust customer’s ATM card and PIN number to the same employees.
- BFIs should implement adequate security measures to secure their web applications from traditional
and emerging cyber threats and attacks.
- The information security policy, guidelines, and education program should be updated according to
latest threats and changes in modus operandi of electronic attacks.
- Apply more than one verification system to sensitive operations such as fund transfer.
- BFIs should develop information security awareness program and periodically conduct to its
employees, vendors, customers, and other related stakeholders.
- BFIs ensure that customers are aware of information security and safeguarding credentials.
- BFIs will take responsibility for securing the use of banking information technology.
- BFIs should publish clear information about dispute or problem resolution procedures.
- BFIs should prepare a procedure for dealing with disputed transaction and complaints.
- BFIs shall provide adequate information to the customer about the cost, risk and benefits before
conducting electronic transaction.
- BFIs should resolve the dispute in the transaction in the shortest possible time.
- In case of customer complaints, BFIs shall take responsibility to handle complain.
5. Outsource Mgmt.:
- BFIs can take information technology and other technical assistance from external parties.
- The BOD or top mgmt. should take responsibility for all external aspects of mgmt.
- Giving external parties access to internal controls only to the extent necessary.
- BFIs should establish a process for monitoring and control of outsourcing activities.
- To assess the economic, social and political risks of the country’s national economy while taking aid
from outside the country.
6. IT Operation:
- Training employees from time to time to increase the working efficiency of IT.
- BFIs shall determine the appropriate data migration policy and methods to move the data in a safe and
confidential manner.
- When purchasing IT, it’s technical evaluation report & requirements should be passed by the mgmt.
- Before developing & purchasing software, conduct detailed tests & verify its legal provisions from
experts.
- The BOD & senior mgmt. shall pay attention to the purchase & development of IT.
- To implement this plan, appoint a senior manager as the head of the plan implementation.
- BCP includes senior officer of all departments while forming the BCP team.
9. IS Audit:
- In order to reduce the risk that may be caused by IT, perform IS audit annually according to the
requirements of the NRB.
- Providing access to all resources and tools as required to the IS Audit committee.
- The audit committee should ensure that the person conducting the IS audit and experienced.
- If there is lack of audit expertise among banks employees, external experts can also be hired.
- Banks should identify and document all electronic attacks and suspected electronic attacks in their
system and report to NRB monthly.
- Customers should be made aware of frauds along with fraud identification, avoidance and protection
measures.
Conclusion: These guidelines to regulate and guide IT related activities in banks with the objectives to
strengthening banks from lacking with emerging cyber frauds, managing IT prudently and mitigating risk
aroused from the implementation of IT