0% found this document useful (0 votes)
12 views202 pages

Web Design and Develepment Module I and II Unit23

The document covers various aspects of computer hardware and peripherals, including removable and non-removable storage devices, input and output devices, and the organization of computer systems. It also discusses key characteristics of computers such as speed, accuracy, storage capacity, and security, along with safety guidelines for computer usage. Additionally, it highlights the importance of fire safety and proper workspace organization to ensure a secure and efficient working environment.

Uploaded by

hab193569
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views202 pages

Web Design and Develepment Module I and II Unit23

The document covers various aspects of computer hardware and peripherals, including removable and non-removable storage devices, input and output devices, and the organization of computer systems. It also discusses key characteristics of computers such as speed, accuracy, storage capacity, and security, along with safety guidelines for computer usage. Additionally, it highlights the importance of fire safety and proper workspace organization to ensure a secure and efficient working environment.

Uploaded by

hab193569
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 202

UNIT 2

HARDWARE AND
NETWORK
PERIPHERALS
Removable Storage
CD and DVD drives that
could come built-in on
computer can be attached
externally.

CD-ROM drive built-in to


computer.
Removable Storage
1. DVD
2. Blu-ray drives
3. floppy drives.
4. Flash drives 64MB to
32GB or more and
become very popular
forms of removable
storage.
Non-removable Storage
Non-removable storage can be a
hard drive that is connected
externally.

An external hard drive is


connected by USB.
External hard drives
very popular for
backups, shared drives
among many
computers, and
expanding the amount
of hard drive space.
External hard
drives come in
many shapes and
sizes like flash
drives do.
Input Devices
Input devices are absolutely crucial to
computers.
The most common input devices are:-
 Mice
 Keyboards
 Microphones
 Webcams
 Fingerprint readers
 A scanner
Output
The absolute most
common external output
device is:-
monitor
printers
speakers
READING
ASSIGNMENT
2.1.1. Generation Of
computers
2.1.1. Generation Of computers
2.1.1. Generation Of computers
2.1.2. Characteristics of a Computer
System
1. Speed:-
Perform tasks at incredibly high
speeds.
can execute millions/billions of
instructions per second.
Perform complex calculations
process large amounts of data
Complete tasks in a fraction of
time.
2. Accuracy
 Highly accurate when it comes to
executing instructions and
performing calculations.
 Operated based on precise
binary logic ensuring that
calculations and operations are
carried out without errors.
 Accuracy is dependent on the
correctness of the input
provided.GIGO
3. Storage Capacity
 Computer systems have vast
storage capacity:-
 store and retrieve data
 Primary storage
 RAM-temporary storage.
 Secondary storage:-
 hard drives- long-term data
storage.
4. Versatility: Computers are highly
versatile machines.
computers can process
text  audio
images  Video
and other forms of data.

Versatility allows computers to be used


in a wide range of industries and
applications, from scientific research to
business operations and entertainment.
Versatility- Capacity to perform different
types of work completely.
5. Automation
• Advantages of computers is
their ability to automate
repetitive tasks.
• automation increases
efficiency, accuracy, and
productivity, freeing up human
resources to focus on more
complex and creative tasks.
6. Security:-
Measures and protocols implemented to protect the
computer system and its data from unauthorized access,
breaches, or malicious activities.
Security mechanisms include:
 authentication firewalls
 encryption antivirus
software.
Authentication- Process of verifying the identity of a
user, process, or device, often as a prerequisite to allowing access to
resources in an information system.
Encryption-process of protecting information or data by using mathematical
models to scramble it in such a way that only the parties who have the key
to unscramble it can access it.
7. Reliability:-
The measure of how consistently and
accurately the computer system
performs its intended functions.
Reliable systems minimize errors,
crashes, and data loss, ensuring
consistent and predictable operation
Reliability-consistently good in quality
or performance.
Able to be trusted.
8. Scalability:-
The ability of the computer system to
accommodate changes in workload or
resource demands.
Scalability allows the system to handle
increased processing requirements,
storage needs, or user demands without
significant performance degradation.
The ability of a computer application or product,
hardware or software, to continue to function
well when it, or its context, is changed in size or
volume in order to meet a user need.
9. Compatibility:-
The ability of the computer
system to work efficiently with
different hardware, software, or
data formats.
Compatibility-Ensures
integration and interoperability
with various devices,
applications, and standards.
10. Upgradeability:-
The ability to enhance or expand
the capabilities of the computer
system by adding or replacing
hardware components or
upgrading software.

Upgradeability allows for


improved performance, storage
capacity, or functionality.
2.1.3. Classification of computers
Application of computers
 Education.  Government
 Communication Institutions.
industry.  Health Care
 Transport industry.  Process control.
 Library services. Industries/Banks/Insura
 Multimedia nce industries
applications.  Supermarkets.
 Defense/Police  Research.
(Law enforcement  Engineering Design
agencies).
2.2. Organization of computer
systems
ensures efficient data flow,
storage, and communication,
enabling the computer to
function effectively and
provide the desired
functionality to users.
2.2.1. Organization of
computer systems
Computer systems are organized
into various components that
work together to perform tasks
and process information. The
organization of computer systems
typically includes the following
components:
2.2.1. Organization of computer systems

Computer systems are organized


into various components that work
together to perform tasks
and process information. The
organization of computer systems
typically includes the following
components:
1. Central Processing Unit
Is "brain" of the computer and
performs most of the
processing.
Consists of the arithmetic logic
unit (ALU) for performing
calculations and the control unit
(CU) for managing instructions
and data flow
2. Memory
Used to store data and instructions that the CPU
needs to access quickly.
Different types of memory, including:-

• Random Access Memory (RAM):-volatile


memory that provides temporary storage for
data and instructions while the computer is
running.

• Read-Only Memory (ROM):is non-volatile


memory that stores permanent instructions,
such as the computer's boot-up
instructions.
3. Storage Devices:
Are used for long-term data
storage. Common types of
storage devices include:-
 hard disk drives (HDDs)
 solid-state drives (SSDs)
 Optical drives (CD/DVD)
4. Input Devices:
To input data and instructions
into the computer.
 Keyboards
 Mice
 Touchscreens
 Scanners
 microphones.
5. Output Devices
Display or present
processed data to the
user:-
 Monitors
 Printers
 speakers
 projectors.
6. Motherboard:-
Is the main circuit board
that connects and
allows communication
between all the
components of the
computer system.
7. Expansion Cards
Are additional circuit boards
that can be added to the
motherboard to enhance the
computer's capabilities.
 Graphics cards
 Sound cards
 Network interface cards.
8. Bus System
Is a communication
pathway that allows data
and instructions to be
transferred between the
different components of
the computer system.
9. Operating System
 Is a software program that
manages the computer's
resources, controls hardware
operations, and provides a user
interface.
 enables the execution of
applications and coordinates the
interaction between software and
hardware components.
10. Software
refers to the programs and
applications that run on
the computer system,
including operating
systems, productivity
software, games, and
utility programs.
These components
work together to
process data, execute
instructions, and
perform various tasks.
2.2.2. Computer Ports &
Cables
Essential for connecting various
devices and peripherals to a
computer system.
Facilitate data transfer, power
supply, and communication
between devices.
commonly used ports and
cables:-
1. USB (Universal Serial Bus)
Ports:
used for connecting devices such
as:-
 Keyboards  External hard drives
 Mice  Smartphones
 Printers  Other peripherals.

USB ports come in different versions,


including USB 2.0, USB 3.0, USB 3.1, and
USB-C, each offering different data transfer
speeds and power delivery capabilities.
2. HDMI (High-Definition
Multimedia Interface) Port:
Are used to connect computers to
external displays, such as:-
 Monitors
 TVs
 projectors
They transmit high-quality audio
and video signals, allowing for
seamless multimedia playback.
3. Display Port
Is another video interface
used for connecting
computers to monitors and
other display devices.
Supports high-resolution
video and audio, and can also
carry data signals.
4. Ethernet Port/ RJ-45 ports
Used for wired network
connections.

Enable computers to
connect to LAN and
access the internet
through Ethernet cables.
5. Audio Ports:
Are found on computers and
laptops, allow for the
connection of headphones
speakers, microphones, and
other audio devices.
Can be 3.5mm audio jacks or
specialized ports for specific
audio needs.
6. VGA (Video Graphics
Array) Port
Used for connecting
computers to displays.
Monitors and projectors
still use VGA
connections
7. DVI (Digital Visual
Interface) Port:-

Used for digital video


connections
Commonly found on older
monitors and graphics cards
8. Thunderbolt Port
 High-speed ports that can
transmit both data and
video signals.
 found on Apple computers
and allow for the
connection of various
peripherals, such as
external hard drives and
9. Power Port
 Used to connect the
computer to a power
source.
 Vary depending on the
computer model, using AC
power adapters and others
using DC power
connectors.
10. Cable Types:
Used to connect devices to the
computer ports.
 common cable types include:
USB cables
 HDMI cables
Ethernet cables (e.g., Cat5e,
Cat6), audio cables (e.g., 3.5mm
audio cables), DisplayPort
cables, and VGA cables.
2.3. Safe Work Conditions
and Procedures
Practical session:-
Organization of
computers
2.3.1. General Safety
Guideline
Safe work conditions and
procedures for computer-
related work are essential to
ensure the wellbeing and
safety of employees who
spend a significant amount of
time working with computers.
Keyconsiderations
for creating a safe
work environment
for computer-
related tasks.
1. Keep the workspace clean and
organized
2. Use surge protectors and
uninterruptible power supplies
(UPS)
3. Regularly back up important data
4. Use reputable antivirus software
5. Be cautious when opening email
attachments or clicking on links
6. Create strong and unique
passwords
7. Be mindful of ergonomics
8. Take regular breaks
9. Adjust display settings
10. Secure your computer and
accounts
11. Be cautious of social engineering
attacks
12. Report any suspicious activity or
security incidents
By following these general
safety guidelines, you can
promote a secure and
productive computer usage
environment while minimizing
potential risks and ensuring
your own safety and the safety
of your data.
1. Keep the workspace clean and
organized: Maintain a clutter-free
workspace to prevent tripping
hazards and allow for easy
access to equipment. Keep the
area around the computer free
from liquids and food to avoid
spills and damage to the
equipment
2. Use surge protectors and
uninterruptible power supplies
(UPS):-
Protect computer and other
electronic devices from power
surges and outages by using surge
protectors and UPS devices. These
help prevent damage to the
equipment and data loss.
2.3.1. General Safety
Guideline
3. Regularly back up important data:
Implement a regular backup system
to ensure that important files and
data are securely stored. This
protects against data loss in the
event of hardware failure, malware
attacks, or other unforeseen
circumstances.
2.3.1. General Safety
Guideline
4. Use reputable antivirus software:
Install and regularly update antivirus
software to protect your computer
from malware, viruses, and other
security threats. Keep the software
definitions up to date and perform
regular scans
2.3.1. General Safety
Guideline
5. Be cautious when opening email
attachments or clicking on links:
Exercise caution when opening email
attachments or clicking on links,
especially from unknown or
suspicious sources. These can
potentially contain malware or
phishing attempts. Verify the
sender's identity before downloading
or opening any file
2.3.1. General Safety
Guideline
6. Create strong and unique
passwords: Use strong, complex
passwords for all your accounts and
avoid using the same password for
multiple accounts. Consider using a
password manager to securely store
and manage your passwords.
2.3.1. General Safety
Guideline
7. Be mindful of ergonomics:
Maintain proper posture and
ergonomics while working at the
computer. Sit with your back straight,
feet flat on the floor, and wrists in a
neutral position. Adjust your chair,
desk, and monitor height to ensure a
comfortable and ergonomic setup.
2.3.1. General Safety
Guideline
8. Take regular breaks: Take regular
breaks from computer work to
prevent eye strain, fatigue, and
musculoskeletal issues. Follow the
20-20-20 rule: Every 20 minutes, look
away from the screen and focus on
something 20 feet away for at least
20 seconds.
2.3.1. General Safety
Guideline
9. Adjust display settings: Adjust
the brightness, contrast, and font
size on your computer screen to
ensure optimal visibility and
reduce eye strain.
Use screensavers or power
saving settings to prevent screen
burn-in.
2.3.1. General Safety
Guideline
10. Secure your computer and
accounts: Use strong passwords or
biometric authentication to lock your
computer when not in use. Enable
automatic updates for your operating
system and software to ensure you
have the latest security patches.
2.3.1. General Safety
Guideline
11. Be cautious of social engineering
attacks: Be vigilant against social
engineering attacks, such as
phishing attempts or phone scams.
Be skeptical of unsolicited requests
for personal or financial information
and verify the authenticity of
requests before providing any
sensitive data.
2.3.1. General Safety
Guideline
12. Report any suspicious activity or
security incidents: If you notice any
unusual activity, security breaches,
or suspicious behavior on your
computer or network, report it to
your IT department or system
administrator immediately.
2.3.1. General Safety
Guideline
By following these general safety
guidelines, you can promote a secure
and productive computer usage
environment while minimizing
potential risks and ensuring your
own safety and the safety of your
data.
2.3.2. Fire Safety Guideline
Fire safety is crucial when it comes
to computer use to prevent
accidents, protect equipment,
and ensure the safety of
individuals in the vicinity. Here
are some fire safety guidelines
for computer users:
2.3.2. Fire Safety Guideline
1. Electrical safety
2. Proper ventilation
3. No smoking policy
4. Adequate fire protection and suppression
5. Knowledge of evacuation procedures
6. Fire extinguisher awareness
7. Reporting hazards
8. Backup and off-site storage of data
2.3.2. Fire Safety Guideline
1. Electrical safety
• Use surge protectors and avoid overloading
electrical outlets.
• Regularly inspect power cords and plugs
for any signs of damage or wear. Replace
damaged cords immediately.
• Do not run cables or cords under carpets or
rugs, as this can cause overheating.
• Avoid using extension cords for computer
equipment whenever possible.
2.3.2. Fire Safety Guideline
2. Proper ventilation:
• Ensure that computer equipment,
including desktop computers and
servers, are placed in well-ventilated
areas and not obstructed by objects
that could restrict airflow.
• Avoid placing items on top of or
around computer equipment that
could block ventilation and cause
overheating.
2.3.2. Fire Safety Guideline
3. No smoking policy:
• Prohibit smoking in areas
where computers and
electronic equipment are
present to prevent the risk of
fire caused by discarded
cigarette butts or ashes
2.3.2. Fire Safety Guideline
4. Adequate fire protection and
suppression:-
• Install smoke detectors in the
vicinity of computer equipment and
ensure they are regularly tested and
maintained.
• If feasible, install fire suppression
systems, such as automatic
sprinklers, in areas with computer
servers or other critical equipment.
2.3.2. Fire Safety Guideline
5. Knowledge of evacuation
procedures:-
• Familiarize yourself with the fire
evacuation procedures of your
workplace or building.
Know the location of fire exits,
assembly points, and fire
extinguishers.
• Ensure that pathways to fire exits
are clear and unobstructed.
2.3.2. Fire Safety Guideline
6. Fire extinguisher awareness:
• Know the locations of fire extinguishers
in your workspace and understand how
to use them correctly.
• If you notice a small fire that can be
safely extinguished, use the appropriate
fire extinguisher and follow the PASS
method: Pull the pin, Aim at the base of
the fire, Squeeze the handle, and Sweep
from side to side
2.3.2. Fire Safety Guideline
7. Reporting hazards:
• Promptly report any fire hazards,
malfunctioning electrical equipment, or
potential fire risks to your supervisor,
manager, or the appropriate authority in your
organization.
• If you observe signs of electrical issues,
such as sparks, smoke, or unusual smells,
disconnect the equipment and immediately
notify the responsible personnel.
2.3.2. Fire Safety Guideline
8. Backup and off-site storage
of data:-
• Regularly backup important
data and ensure the backups
are stored off-site or in a
secure location. This protects
against data loss in the event
of a fire or other emergencies.
Fire safety is a shared
responsibility. It is
important to follow
organizational fire safety
protocols, participate in fire
drills, and stay vigilant to
prevent and respond
effectively to fire hazards.
Questions as a quiz
1. What are some general
safety guidelines when
working with computers?
2. Explain the importance
of fire safety in a computer
environment
2.3.3.Equipment Protection
ESD (Electrostatic Discharge)
is a sudden flow of electricity
between two objects caused
by a static charge imbalance.
It can damage sensitive
electronic components.
To protect equipment from
2.3.3.Equipment Protection
ESD-protection is a set of measures
taken to prevent damage to computer
equipment from static electricity. It is
important because static electricity can
cause immediate or latent damage to
sensitive electronic components.
Electrostatic discharge, a sudden flow of
electricity between two electrically
charged objects ·
ESD Protection
1. Grounding: Ensure that all equipment,
including workstations and personnel, are
properly grounded to prevent static buildup.
2. ESD wrist straps: Use antistatic wrist
straps when handling sensitive electronic
components to dissipate static charges.
3. ESD mats and flooring: Install ESD mats
on work surfaces and use ESD flooring in
areas where static-sensitive equipment is
handled.
4. ESD bags and containers: Store and
transport sensitive equipment/components in
ESD bags or containers to shield them from
2.3.3.2.Types of Power
Fluctuations:
Power fluctuations can be categorized into
the following types:
1. Voltage Sag: A short-term drop in voltage,
typically caused by sudden increases in
power demand or faults in the power
distribution system.
2. Voltage Surge: A brief increase in voltage,
often caused by lightning strikes, switching
operations, or faults in the power grid.
Self.
2.3.3.2.Types of Power
Fluctuations:
3. Voltage Spike: A rapid increase in voltage that
lasts for a short duration, usually caused by
switching off high-powered electrical devices or
sudden load changes.
4. Voltage Interruption: A complete loss of power
supply for a brief period due to faults, outages, or
tripped circuit breakers.
5. Voltage Transient: Sudden, brief fluctuations in
voltage caused by electrical disturbances, such as
lightning, electromagnetic interference (EMI), or
switching operations.
2.3.3.3.Power Protection
Devices
To safeguard equipment
against power
fluctuations and
electrical disturbances,
various power protection
devices can be used:
Power Protection Devices:
1. Surge Protectors: These devices absorb excess voltage
spikes and redirect them away from connected equipment.
They are commonly used for protecting computers,
peripherals, and other sensitive electronics.
2. Uninterruptible Power Supplies (UPS): UPS systems
Voltage
provide backup power during outages and protect against
regulators
voltage sags, surges, and interruptions. They typically
include surge protection, battery backup, and voltage
regulation features.
3. Voltage Regulators: Voltage regulators stabilize incoming
voltage to ensure a steady supply to connected equipment,
compensating for voltage sags and surges.
4. Isolation Transformers: These transformers isolate
equipment from the main power supply, protecting against
voltage spikes and transient noise.
2.3.3.3.Power Protection Devices:
5. Line Conditioners: Line conditioners
regulate voltage, filter out noise, and provide
surge protection to ensure clean and stable
power supply to sensitive equipment.
6. Automatic Voltage Regulators (AVR): AVR
devices monitor voltage levels and
automatically adjust them to maintain a
stable output voltage within a specified
range.
7. Power Filters: Power filters remove noise
and interference from the power supply to
protect sensitive equipment from electrical
2.3.3.3.Power Protection
Devices:
Implementing appropriate ESD
protection measures and
using power protection
devices can help safeguard
equipment, prevent damage
from power fluctuations, and
ensure the longevity of
electronic devices.
Quiz
1.What is ESD protection, and
why is it important for
computer equipment?
2.List and explain the different
types of power fluctuations
that can affect computer
systems
2.4. Environment
Protection
Proper disposal procedures in
a computer perspective refer
to the appropriate and
environmentally responsible
methods of getting rid of
computer equipment and
electronic waste.
2.4. Environment
Protection
1. Recycling Programs: Many
countries and organizations have
recycling programs specifically
designed for electronic waste (e-
waste). Research and identify
local recycling facilities or
programs that accept computer
equipment
2.4. Environment
Protection
2. Authorized E-Waste Recyclers:
Ensure that you engage with
authorized e-waste recyclers who
follow proper disposal practices.
These recyclers are equipped to
handle and process electronic
waste in an environmentally
friendly manner.
2.4. Environment
Protection
3. Data Security: Before
disposing of any computer
equipment, ensure that all data is
securely erased to protect
sensitive information. Use data
wiping tools or software that
comply with industry standards
for data sanitization.
2.4. Environment
Protection
4. Donation or Resale: Consider
donating or reselling computer
equipment that is still functional
and in good condition.
Many organizations or individuals
may benefit from used
computers, extending their
lifespan and reducing waste.
2.4. Environment
Protection
5. Manufacturer Take-Back
Programs: Check if the computer
equipment manufacturer offers
take-back programs or recycling
initiatives. Some manufacturers
have programs in place to
responsibly collect and recycle
their products.
2.4. Environment
Protection
6. Disassembly and Component
Separation: If you have the
necessary knowledge and expertise,
you can disassemble computer
equipment and separate different
components for recycling. This
approach allows for the proper
recycling of individual components
and materials like metals, plastics,
and circuit boards.
2.4. Environment
Protection
7. Hazardous Materials: Computers and
other electronic devices may contain
hazardous materials such as lead,
mercury, and flame-retardant chemicals.
It is essential to handle and dispose of
these materials according to local
regulations to prevent environmental
contamination. Contact local authorities
or recycling centers for guidance on
handling hazardous materials.
2.4. Environment
Protection
8. Compliance with Regulations:
Familiarize yourself with local,
regional, and national regulations
regarding the disposal of
electronic waste. Follow the
guidelines and requirements for
proper disposal to ensure
compliance with environmental
laws.
2.4. Environment
Protection
Improper disposal of computer
equipment can have detrimental
effects on the environment and
human health. By following
proper disposal procedures and
recycling practices, you
contribute to a more sustainable
and responsible approach to
managing electronic waste.
UNIT 3
OPERATING
SYSTEM AND
APPLICATION
SOFTWARE
This unit is designed to
provide you the necessary
information and practice
regarding the following
content coverage:
3.1.Operating Systems and
Installation
3.2.Application Software
Installation
3.3.Installing Devices Driver
An operating system
(OS) is software that
manages computer
hardware and software
resources and provides
services for computer
programs.
OS acts as an intermediary
between the user and the
computer hardware,
enabling the execution of
applications and
coordinating various
system components.
3.1.2. Types of operating
systems:
1. Windows: Developed by
Microsoft and widely used
in personal computers.
2.macOS: Developed by
Apple and used in Mac
computers.
3. Linux: An open-source
operating system available in
various distributions, known for
its flexibility and customization
options.
4. UNIX: A multi-user and
multitasking operating system
used in servers and enterprise
environments
3.1.3. Operating
system
installation:
OS- installation
involves preparing the
installation media
(such as a DVD or USB
General
outline of the
steps involved
in installing an
OS
1. Prepare for installation:
 Ensure compatible hardware
setup for the OS you are
installing.
 Back up any important data
from the existing operating
system if you are performing a
clean installation.
2. Prepare the operating
system:
Download the OS
installation files from the
official website or obtain a
physical installation disc
or USB drive.
3. Create installation media
(if necessary):
Create a bootable USB
drive or burn the files to a
DVD or CD using
appropriate software.
4. Configure the BIOS/UEFI settings:
 Restart computer and access the
BIOS or UEFI settings by pressing
the designated key (usually
displayed during the boot
process).
 Configure the boot order to
prioritize the installation media
(USB or DVD drive) to boot from.
5. Start the installation
process:
 Insert the installation media
into the computer and
restart it.
 Follow the on-screen
prompts to start the
installation process.
6. Select language and
region settings:
 Choose your
preferred language
and region settings for
the operating system.
7. Accept the license
terms:
•Read and accept the
license agreement for
the operating system
8.Choose the installation type:
For a clean installation, select
the option to install the
operating system on a new or
formatted partition.
For an upgrade installation,
choose the option to upgrade
the existing operating system
9. Select the
installation location:-
Choose the disk or
partition where you
want to install the
operating system.
10. Customize installation
settings (if available): •
Some operating systems
may provide additional
customization options,
such as selecting specific
features or components to
install.
11. Wait for the installation
to complete:
• The installation process
may take some time,
during which the operating
system files will be copied
and configured on your
computer.
12. Set up user accounts
and preferences:
• Follow the prompts to
create a user account and
set up additional
preferences, such as
computer name, password,
network settings, etc.
13. Complete the
installation:
• Once the installation is
finished, the computer
may restart.
• Remove the installation
media (USB or DVD)
when prompted
14. Install device drivers and
updates:
• After the OS installation is
complete, install necessary
device drivers for hardware
components, such as graphics
cards, sound cards, etc.
• Apply any available
operating system updates
and security patches.
15. Restore data and
settings (if applicable):
• If you performed a clean
installation, restore your
backed-up data and settings
to the newly installed
operating system.
16. Restart the computer:
• Restart the computer to ensure that all
changes and settings are applied
correctly.
These steps provide a general
overview of the installation process,
but it's important to refer to the
specific documentation or
instructions provided by the
operating system manufacturer for
detailed guidance
3.2. Application Software
Installation
3.2.1. Types of Application
software: Application software
refers to programs designed for
specific tasks or purposes, such
as word processing, spreadsheet
management, graphic design,
and multimedia editing.
Common Types Of Application Software:
1. Word Processing Software
2. Spreadsheet Software
3. Presentation Software
4. Database Software
5. Graphics and Design Software
6. Web Browsers
7. Communication Software
8. Multimedia Software
9. Utility Software
10. Educational Software
3.2.2. Types of Software licensing
Software licensing determines the
terms and conditions under which
software can be used. Common
licensing types include proprietary
licenses (commercial software),
open-source licenses (freely
available source code), and freeware
licenses (free to use without
restrictions).
3.2.3. Accessing minimum and
maximum hardware and
operating system requirements:
Before installing application
software, it is important to check
the minimum and maximum
hardware requirements specified
by the software vendor.
These requirements include processor
speed, RAM, storage space, and
operating system version compatibility
Minimum requirements to install
Windows 10 versions 21H2, 22H2,
and higher:
• Processor: 1GHz or System on a
Chip (SoC).
• Memory: 1GB for 32-bit or 2GB for
64-bit.
• Storage: 32GB for 64-bit or 32-bit.
• Graphics card: DirectX 9 or later
with Windows Display Driver Model
/WDDM 1.0 driver.
• Display: 800x600.
3.2.4. Install, configure, and
launch office applications:-
The installation process for
office applications typically
involves running the
installation file, following on-
screen prompts, and entering
license information if
required.
3.2.4. Install, configure, and
launch office applications:-
After installation, configuring
the application involves setting
preferences, customizing
settings, and connecting to
external services if
necessary.
3.2.4. Install, configure, and
launch office applications:-
Launching office applications
can be done by clicking on
their respective icons or
through the Start menu or
application launcher.
3.2.5. Update and Remove
Software:-
Regular software updates are
essential to ensure security,
stability, and access to new
features.
Updates can be obtained through
official software update
mechanisms or
by downloading and installing
updates from the software
vendor's website.
Software removal can be
done through the operating
system's built-in
uninstallation process or
using dedicated uninstaller
programs.
3.3. Installing Device
Drivers
is the process of
installing software that
enables communication
between the operating
system and hardware
devices.
It involves downloading or using
the installation CD provided with
the device, running the installer,
and following on-screen
instructions.
This ensures that the computer
can effectively utilize the
connected hardware device and
ensure proper functionality.
3.3.1. Drivers and their use:-
Device drivers are software
programs that enable
communication between hardware
devices and OS.
Allow the OS to understand and
utilize the specific features and
capabilities of different hardware
components.
3.3.2. Driver installation
methods:
There are different methods for
installing device drivers,
depending on the operating
system and the device being
installed. Here are a few
common methods:
Method 1: Using Windows Update
(Automatic)
Method 2: Using Device Manager
(Manual)
Method 3: Using
Manufacturer's
Website
(Recommended)
3.3.2. Driver installation methods:
1. Automatic installation through
OS updates: Many OSs, such as
Windows, have built-in
mechanisms to automatically
detect and install drivers for
compatible hardware devices.
These drivers are often obtained
through regular system updates
3.3.2. Driver installation methods:
2. Manual installation using driver
installation files: Device manufacturer's
website: Most hardware manufacturers
provide driver downloads on their
websites. You can visit the
manufacturer's support or downloads
section, Find the appropriate driver for
your device and operating system, and
download the driver installation file
(usually in the form of an executable or
archive file).
Device manager: In Windows, you can
access the Device Manager by right-
clicking on the Start button and selecting
"Device Manager." From there, Find the
device you want to install a driver for,
right-click on it, and select "Update
driver." You can choose to search for
drivers automatically or browse your
computer for driver software. If you have
the driver installation file, you can select
the "Browse my computer for drivers"
option and provide the path to the driver
file.
Installing Drivers in Windows 10:
A Step-by-Step Guide.
Keeping your drivers updated is
crucial for optimal performance and
security on your Windows 10
machine. Whether you're building a
new PC, experiencing issues, or
simply want to ensure everything's
up-to-date, and here’s a
comprehensive guide with images:
Method 1: Using Windows Update
(Automatic)
A. Open Settings: Click on the
Start menu and select the gear
icon.
B. Navigate to Update & Security:
Choose "Update & security" from
the left-hand pane.
C. Check for updates: Click on
"Check for updates" and wait for
1. Install drivers: If any driver updates
are available, they'll be listed under
"Optional updates." Select and install
them by clicking "Download and
install now."
Image 1: Navigating to Update &
Security Image
2: Checking for updates and
installing drivers Opens in a new
window
Method 2: Using Device Manager (Manual)
1. Open Device Manager: Right-click the Start menu
and select "Device Manager."
2. 2. Expand device categories: Click the arrow next
to each category (e.g., Display adapters, Network
adapters) to reveal your devices.
3. 3. Identify outdated drivers: Right-click on a
device and select "Properties." Go to the "Driver"
tab and check the "Driver Date" or "Driver
Version."
4. . Update drivers: Right-click the device again and
choose "Update driver."
5. Search automatically: Select "Search
automatically for updated driver software."
Windows will search for and install available
updates.
Method 3: Using Manufacturer's Website
(Recommended)
1. Identify your hardware: Check your device's
documentation or use a system information tool to
identify the manufacturer and model number of your
hardware (e.g., graphics card, network adapter).
2. Visit the manufacturer's website: Navigate to the
website of your hardware manufacturer (e.g., NVIDIA,
Intel, and Realtek).
3. Find drivers: Search for your specific device model
and download the latest drivers compatible with your
Windows 10 version.
4. Install drivers: Run the downloaded installer and
follow the on-screen instructions. Image 5: Searching
for drivers on a manufacturer's website
Additional
Tips
System restores point: Create a system
restore point before updating drivers in case
of any issues.
Driver compatibility: Ensure you download
drivers specifically designed for your
Windows 10 version and hardware model.
Third-party driver tools: Use them with caution,
as they can sometimes install incompatible or
unnecessary drivers. These steps and
choosing the most suitable method, you can
effectively install and update drivers on your
Windows 10 system, ensuring smooth
operation and optimal performance
3.3.3. Checking installed
drivers and updates: It's
important to regularly check
for installed drivers and
updates to ensure optimal
device performance and
compatibility. Here's how you
can check for installed drivers
and updates:-
Device Manager: Gear icon with
text "Right-click Start > Device
Manager."
Windows Update: Globe icon with
text "Settings > Update & Security
> Check for updates."
Manufacturer Website:
Globe/computer icon with text
"Visit manufacturer website for
specific updates."
By regularly checking for
installed drivers and
updates, you can ensure
that your hardware devices
are functioning optimally
with the latest driver
versions and compatibility
improvements
Unit Summary
The "Install operating system and
application software" unit cover
the installation and management
of operating systems, application
software, and device drivers. It
includes an introduction to
operating systems, different types
of operating systems, and the
process of operating system
It also covers application software
installation, software licensing types,
hardware and operating system
requirements, office application setup,
software updates, and removal.
Additionally, it provides an
understanding of device drivers, driver
installation methods, and checking for
driver updates. This unit equips users
with the necessary knowledge and skills
to set up and maintain their computer
systems effectively.
UNIT 4
OS
ENVIRONMENT
UNIT 4
OS
ENVIRONMENT
4.1. Navigate and use the
Operating System
environment
Navigating and using the OS
env’t involves familiarizing
yourself with the user
interface, accessing system
features, and performing
various tasks.
Navigating and using the OS
env’t includes interacting
with the desktop, managing
files and folders, accessing
system information,
uninstalling applications,
creating and managing user
accounts, and utilizing
essential keyboard shortcuts.
4.1. Navigate and use the OS
env’t….
To navigate the OS env’t, you
need to understand and
customize the desktop env’t,
which comprises components
such as the desktop wallpaper,
icons, and taskbar /dock, start
menu /application launcher,
window manager,
4.1. Navigate and use the
Operating System
environment….
Managing files and folders involves
creating, copying, pasting, moving,
and deleting files and folders.
Additionally, you can search for
specific files and folders to find
them quickly. Accessing basic
system information allows you to
understand your computer's
4.1. Navigate and use the OS
env’t….This information
includes details about
hardware components,
software environment, and
system settings. You can
access system information
through system tools or
settings menus.
A desktop env’t is the
graphical user interface (GUI)
that allows users to interact
with the os. It provides a
visual representation of the
os, including icons, menus,
windows, and various
graphical elements.The
components of a desktop
env’t typically include:
 Desktop Wallpaper: The
background image or pattern
displayed on the desktop.
 Icons: Small graphical
representations of files,
folders, applications, or
system functions. Icons
provide shortcuts to access
and launch various items
Taskbar/Dock: A horizontal or vertical bar
located on the edge of the screen that displays
icons or buttons representing running
applications, system tray/notification area, and a
quick launch area for frequently used
applications.
• Start Menu/Application Launcher: A menu
or button that allows users to access installed
applications, system settings, and search for
files and programs.
• Window Manager: Manages the
appearance, placement, and behavior of
windows on the desktop. It enables users to
resize, move, minimize, maximize, and close
Panels/Widgets: Additional bars
or areas on the desktop can
display various information.
Such as a clock, system status,
weather or quick access to
specific functions.
• File Manager: A tool for
navigating, managing, and
organizing files and folders on
the computer.
Customization options for the
desktop environment may vary
depending on the os and specific
desktop env’nt being used. Users
can often personalize the desktop
env’nt by changing wallpaper, icon
themes, window decorations, and
adjusting settings for panels,
menus, and other visual elements.
4.3. Manage Files and Folders:
Managing files and folders is an
essential aspect of organizing and
maintaining a structured digital
environment. It involves creating,
renaming, moving, copying, and
deleting files and folders based on
specific requirements.
Effective file and folder management
ensures easy access, efficient
storage, and streamlined workflow.
By organizing files and folders in a
logical and systematic manner,
users can quickly find and retrieve
information, reduce clutter, and
improve overall productivity.
Additionally, employing consistent
naming conventions, utilizing
descriptive folder structures, and
implementing file backup strategies
contribute to maintaining data
integrity and safeguarding important
information.
4.3.1. Create, Copy, Paste,
Move, and Delete Files and
Folders:-
Managing files and folders is
an essential part of using an
operating system. Here are
some common file and folder
management tasks:-
Creating Files or Folders:
• Windows: Right-click in
the desired location, select
"New," and choose either
"Folder" or the specific file
type you want to create
(e.g., "Text Document")
Copying Files or
Folders:
• Windows: Select the
file(s) or folder(s), right-
click, and choose
"Copy." Then navigate
to the destination
location, right-click, and
Moving Files or Folders:
• Windows: Select the
file(s) or folder(s), right-
click, choose "Cut,"
navigate to the
destination location,
right-click, and choose
"Paste."
Deleting Files or Folders:
• Windows: Select the
file(s) or folder(s), press
the "Delete" key, and
confirm the deletion in the
prompt.
4.3.2. Search Files and
Folders: Searching for files
and folders can be helpful
when you have a large
number of items on your
computer. Here's how to
search for files and folders:
Windows: • File Explorer:-
Open File Explorer (Windows
key + E) and use the search box
in the top-right corner to enter
your search query. The search
results will appear as you type. •
Start Menu: Click on the Start
button or press the Windows key,
then start typing your search
query. The search results will
appear in the Start menu.
Windows: • Using System
Information: Press the Windows
key + R to open the Run dialog,
type "msinfo32" (without quotes),
and press Enter. The System
Information window will display
various details about your system,
including hardware components,
software environment, and system
settings.
Using System Settings: Open
the Settings app by clicking on
the Start button and selecting
the gear icon. Go to "System"
and then "About." Here, you
can find information about
your device, such as the
processor, RAM, and Windows
specifications.
4.4.
Uninstalling
and
Removing
Uninstalling or
removing applications is
necessary when you
want to remove
unnecessary programs
from your computer.
Here are instructions for
different os:-
Control Panel:
1. Search for "Control Panel" in the
Start menu.
2. Go to "Programs and Features".
3. Select the app you want to
uninstall and click "Uninstall".
4.5. Create and Manage User
Accounts
Creating and managing user
accounts is important for
maintaining separate profiles and
access privileges on a computer.
Here's how to create and manage
user accounts on different
operating systems:-
Settings:
 Open Settings and go to
"Accounts" > "Family &
other users".
 Click "Add someone else to
this PC".
 Choose a local account or
Microsoft account.
 Set a name and password.
Manage User Accounts: -
Change account types: -
Choose the desired account
type from the drop-down
menu:
•Standard account: Limited
privileges for basic tasks.
•Administrator account: Full
control over the system.
•Guest account: Temporary
access with limited
permissions.
4.6. Essential Keyboard
Shortcuts
Keyboard shortcuts are
combinations of keys that
provide quick access to
various functions and
features within an os. Here
are some essential keyboard
shortcuts commonly used in
Windows:
System controls
4.7. Use Windows system tools
and applications
4.7.1. System utility tools:
System utility tools are
designed to help you
manage and maintain your
computer. Some common
system utility tools in
Windows include:-
4.7.1. System utility tools:
• Task Manager: Allows to monitor and
manage running processes, end
unresponsive applications, and view
system performance.
• Disk Cleanup: Helps to free up disk
space by removing unnecessary files
and temporary data.
• Disk Defragmenter: Optimizes the
arrangement of files on your hard drive
to improve performance.
4.7.1. System utility tools:
• Device Manager: Displays and
manages the hardware devices
installed on your computer.
 System Configuration: Allows you
to manage startup programs,
services, and boot settings.
• Control Panel: Provides access to
various system settings and
configuration options.
4.7.2. Accessibility tools:
Are designed to enhance
the usability and
accessibility of the os for
users with disabilities.
Windows provides several
built-in accessibility tools,
including:-
 Magnifier: Enlarges a portion of the
screen to make it easier to see.
 Narrator: Reads aloud on-screen text
and provides audio descriptions of
events.
 On-Screen Keyboard: Displays a
virtual keyboard on the screen for
users who cannot use a physical
keyboard.
 High Contrast: Adjusts the
color scheme of the display
to improve visibility for
users with visual
impairments.
 Speech Recognition: Allows
users to control their
computer using voice
commands
4.7.3. Basic built-in applications:
Windows comes with a set of basic
built-in applications that cover
common tasks. These include:
Notepad: A simple text editor for
creating and editing plain text files.
•Paint: A basic image editing tool for
creating and modifying images.
• Calculator: A calculator
application for performing
basic arithmetic calculations.
• Windows Media Player: A
multimedia player for playing
audio and video files.
• Microsoft Edge: The default
web browser in Windows,
used for browsing the
internet.
These built-in applications
provide essential functionality,
but you can also install
additional applications from the
Microsoft Store or other sources
to expand your software options.
Note that the availability and
features of these tools and
applications may vary depending
on the version of Windows you
Module I and II
End of
unit-2 and Unit-3
Module II Access
and Analyze
Online
Information

You might also like