0% found this document useful (0 votes)
21 views122 pages

Computer fundamentalsII

The document outlines a comprehensive syllabus for a Computer Applications course, covering topics such as computer fundamentals, operating systems, networking, web resources, and e-commerce. It details the evolution of computers, types of computers, hardware and software components, and various input/output devices. Additionally, it discusses security concepts and the significance of web commerce in the digital age.

Uploaded by

jiya93554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views122 pages

Computer fundamentalsII

The document outlines a comprehensive syllabus for a Computer Applications course, covering topics such as computer fundamentals, operating systems, networking, web resources, and e-commerce. It details the evolution of computers, types of computers, hardware and software components, and various input/output devices. Additionally, it discusses security concepts and the significance of web commerce in the digital age.

Uploaded by

jiya93554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 122

FCA 300

Computer Applications
Syllabus
Unit I:
Introduction to Computers
 Introduction to Computers (definition, characteristics & uses), Evolution of

computers, System unit (memory, ALU & control unit), Input / Output
devices, Storage devices( Memory- primary & secondary).
 Introduction to Software, its type (system, application &j utility);

Programming languages (machine, assembly & high-level), Language


processors (assembler, compiler & interpreter).
 Introduction to Data Processing: Elements of Data Processing, Data

Processing Activities.
Unit II:
Windows
 Concept of Operating System, Introduction to Windows, features (Desktop &

its components, the window, the application window(various bars), the


document window, the dialog window, the icons, Getting Help).
 Windows explorer; Control panel, Setting wallpaper, screen saver,

background.
 Creating a folder, Compressing/ Zipping files (WinZip), Virus & Antivirus.
Unit III:
Networking
 Computer and Networks, Need for networking, Components of

network, modem, types of networks (LAN, WAN, hybrid networks),


Structuring of Networks (Server Based, Client Based& Peer-to-
Peer)
 Introduction to Internet, Uses of internet, Website, Web browsers,

WWW, E-mail, Sending Email, Attaching files with E-mail.

Unit IV:
Web Resources & Security
 Chatting & Conferencing; Using Search engines, using Boolean

operators in Searching, Introduction to Meta search Engines,


making use of web resources; Blogs: Introduction, Types of blogs,
blogging consequences, social networking sites.
 Basic Security Concepts: Threats to Users( Identity Theft, Loss of

Privacy), Virus & Worms, Cookies, Spam, Firewall.


Unit V:
Web Commerce
 E - Commerce An introductions, Concepts, Advantages and

disadvantages, Technology in E- Commerce, Internet & E-business,


Applications, Electronic Payment Systems: Introduction, Types of
Electronic Payment Systems.
Unit I
Definition:
 It is an electronic device which is capable of receiving information

(data) in a particular form and of performing a sequence of


operations in accordance with a predetermined but variable set of
procedural instructions (program) to produce a result in the form of
information or signals
 It is a device which operates upon information or data.

Characteristics:
 Speed

 Accuracy

 Diligence

 Versatility

 Power of remembering

 No IQ

 No feelings
TYPES OF COMPUTERS
Types of Computers based on Principles of Operation
 Analog Computers :Analog Computer is a computing device that works
on continuous range of values. The results given by the analog
computers will only be approximate since they deal with quantities that
vary continuously. It generally deals with physical variables such as
voltage, pressure, temperature, speed, etc.
 Digital Computers :On the other hand a digital computer operates on

digital data such as numbers. It uses binary number system in which


there are only two digits 0 and 1. Each one is called a bit.
Based on the purpose, Digital computers can be further classified as,
 General Purpose Computers

 Special Purpose Computers

 Special purpose computer is one that is built for a specific application.

General purpose computers are used for any type of applications. They
can store different programs and do the jobs as per the instructions
specified on those programs. Most of the computers that we see today,
are general purpose computers.
 Hybrid Computers: A hybrid computer combines the desirable
features of analog and digital computers. It is mostly used for
automatic operations of complicated physical processes and
machines. Now-a-days analog-to-digital and digital-to-analog
converters are used for transforming the data into suitable form for
either type of computation.
 For example, in hospital’s ICU, analog devices might measure the
patients temperature, blood pressure and other vital signs. These
measurements which are in analog might then be converted into
numbers and supplied to digital components in the system. These
components are used to monitor the patient’s vital sign and send
signals if any abnormal readings are detected. Hybrid computers
are mainly used for specialized tasks.
Types of Computers based on Configuration
 There are four different types of computers when we classify them

based on their performance and capacity. The four types are


 Super Computers :They are the best in terms of processing capacity

and also the most expensive ones. These computers can process
billions of instructions per second. Normally, they will be used for
applications which require intensive numerical computations such as
stock analysis, weather forecasting etc. Other uses of supercomputers
are scientific simulations, (animated) graphics, fluid dynamic
calculations, nuclear energy research, electronic design, and analysis of
geological data (e.g. in petrochemical prospecting). Perhaps the best
known super computer manufacturer is Cray Research. Some of the
"traditional" companies which produce super computers are Cray, IBM
and Hewlett-Packard.
 Mainframe Computers :Mainframe computers can also process data at
very high speeds vi.e., hundreds of million instructions per second and
they are also quite expensive. Normally, they are used in banking,
airlines and railways etc for their applications.
 Mini Computers :They are lower to mainframe computers in terms of
speed and storage capacity. They are also less expensive than
mainframe computers. Some of the features of mainframes will not be
available in mini computers. Hence, their performance also will be less
than that of mainframes.
 Micro Computers :The invention of microprocessor (single chip CPU)
gave birth to the much cheaper micro computers. They are further
classified into
 Desktop Computers
 Laptop Computers
 Handheld Computers( PDAs)
Evolution of Computers

 Earliest device that qualifies as computer is the “Abacus”.


 Another manual calculation device was John Napier's bone or
cardboard multiplication calculator
 The first adding machine was invented by Blaise Pascal in 1971.
 Charles Babbage a professor at Cambridge University is the father
of computers.
First Generations 1951- 1958
 Characterized by vacuum tubes(fragile glass devise) which burned
out very rapidly.
 The first generation of computers used machine language or 0s and
1s.
 They were very huge, and bulky
 Unreliable
 AC required
 Non portable
 Frequent hardware failure.
 Emitted lots of heat and Consumed lot of electricity
 IBM 650, Univac I, ENIAC, EDVAC, EDSAC etc.
Second Generation 1959-1964
 The second generation of computers used transistors(smaller ,
reliable) for the internal operations.
 Superior than vacuum tubes.
 Smaller , faster, cheaper.
 Lesser hardware failure
 Better portability
 Reliable
 These machines used assembly language.
 CDC, GE, IBM
Third Generation 1965-1974
 These computers used integrated circuits on silicon chips.
 They were characterized with high-level programming languages
which required logic such as BASIC, Pascal, C, COBOL, and Fortran
 Small in size
 Reliable
 Lesser heat generation
 Low maintenance
 Easily portable
 Production cost was less.
 Silicon Chips (Integrated circuits)= IC
 Keyboard Entry
 IBM, NCR, Honeywell
Fourth Generation 1975-1989
 These computers use microprocessor chips.
 Object-Oriented Programming (OOP) Languages such as Visual
Basic, and JAVA are characteristic of this computer generation.
 Silicon Chips (Large scale integrated circuits)=LSI
 IC’s, LSI’s
 No AC required
 Easily portable
 General purpose
 Easy and cheap production
 Power consumption was very less
 Apple, Xerox, Texas Instrument, Hewlett-Packard
Fifth Generation 1990-present
 Natural Language & AI
 This language is designed to give people a more human connection
with computers.
 Uses multi-media has also defined this generation.
 There is a great deal of “bundled software” with this generation.
 Silicon Chips ( Very Large Integrated Circuits) VLSI
 LSI’s, VLSI’s
 Unlimited
 CdRom, Optical Disk
 NEC, Packard Bell, Compaq, Other Clones
Block Diagram of Computer:
Hardware & Software

 Hardware is a comprehensive term for all of the physical parts of a


computer, as distinguished from the data it contains or operates on, and
the software that provides instructions for the hardware to accomplish
tasks.
 Computer hardware refers to the physical parts of a computer and
related devices. Internal hardware devices include motherboards, hard
drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners.
 The internal hardware parts of a computer are often referred to as
components, while external hardware devices are usually called
peripherals. Together, they all fall under the category of computer
hardware. Software, on the other hand, consists of the programs and
applications that run on computers. Because software runs on computer
hardware, software programs often have system requirements that list
the minimum hardware required for the software to run.
Keyboard

 In computing, a keyboard is a typewriter-style keyboard, which


uses an arrangement of buttons or keys, to act as mechanical levers
or electronic switches.
 A keyboard typically has characters engraved or printed on the keys
and each press of a key typically corresponds to a single written
symbol. However, to produce some symbols requires pressing and
holding several keys simultaneously or in sequence. While most
keyboard keys produce letters, numbers or signs (characters), other
keys or simultaneous key presses can produce actions or computer
commands.
 In normal usage, the keyboard is used to type text and numbers into
a word processor, text editor or other program. In a modern
computer, the interpretation of key presses is generally left to the
software.
Mouse

 In computing, a mouse is a pointing device that functions by


detecting two-dimensional motion relative to its supporting surface.
Physically, a mouse consists of an object held under one of the
user's hands, with one or more buttons. It sometimes features other
elements, such as "wheels", or extra buttons or features that can
add more control or dimensional input. The mouse's motion typically
translates into the motion of a cursor on a display, which allows for
fine control of a graphical user interface.
 Cordless or wireless mice transmit data via infrared radiation or
radio (including Bluetooth).
 Mechanical mice
 Optical and laser mice (uses laser light. )
Monitor
 A monitor or display (also called screen or visual display unit) is
an electronic visual display for computers. The monitor comprises
the display device, circuitry, and an enclosure. The display device in
modern monitors is typically a thin film transistor liquid crystal
display (TFT-LCD) thin panel, while older monitors use a cathode
ray tube .
 CRT:The first computer monitors used cathode ray tubes (CRT).
Until the early 1980s, they were known as video display terminals
and were physically attached to the computer and keyboard. The
monitors were monochrome, flickered and the image quality was
poor. In 1981, IBM introduced the Color Graphics Adapter, which
could display four colors with a resolution of 320 by 200 pixels. In
1984 IBM introduced the Enhanced Graphics Adapter which was
capable of producing 16 colors and had a resolution of 640 by 350.
 CRT remained the standard for computer monitors through the
1990s. CRT technology remained dominant in the PC monitor
market into the new millennium partly because it was cheaper to
produce and offered viewing angles close to 180 degrees
 There are multiple technologies that have been used to implement
Liquid Crystal Displays (LCDs). Throughout the 1990s the primary
use of LCD technology as computer monitors was in laptops where
the lower power consumption, lighter weight, and smaller physical
size of LCDs justified the higher price versus a CRT.
 It uses the light modulating properties of liquid crystals (LCs).
 TFT is a variant of liquid crystal display (LCD) which is now the
dominant technology used for computer monitors
 Organic light-emitting diode (OLED) monitors provide higher
contrast and better viewing angles than LCDs, and are predicted to
replace them
Printers

 In computing, a printer is a peripheral which produces a text or graphics


of documents stored in electronic form, usually on physical print media
such as paper or transparencies. Many printers are primarily used as
local peripherals, and are attached by a printer cable or, in most new
printers, a USB cable to a computer which serves as a document
source. Some printers, commonly known as network printers, have built-
in network interfaces, typically wireless or Ethernet based, and can
serve as a hard copy device for any user on the network.
Types of Printer:

 Impact printers rely on a forcible impact to transfer ink to the


media, similar to the action of a typewriter. The impact printer uses
a print head that hits the surface of the ink ribbon, which presses the
ink onto the paper.

 Non Impact Printers : A type of printer that does not operate by


striking a head against a ribbon. Examples of nonimpact printers
include laser and ink-jet printers. The term nonimpact is important
primarily in that it distinguishes quiet printers from noisy (impact)
printers.
Types of printer

 Character matrix printers are a category of computer printers


(typically impact printers) that place characters from a fixed character
set anywhere onto a fixed grid of possible locations on the page.
Examples of these are daisy wheel printers, golf ball printers, chain
printers, and band printers. A character printer prints one character at
a time.
 The line printer is a form of high speed impact printer in which one
line of type is printed at a time. They are mostly associated with the
early days of computing, but the technology is still in use. Print
speeds of 600 to 1200 lines-per-minute (approximately 10 to 20
pages per minute) were common.
 A page printer is a type of computer printer that prints on cut sheet
paper. A modern page printer may use any of various technologies,
such as laser, LED or inkjet. Most modern computer printers are page
printers.
Hard Disk

 A hard disk drive (HDD; also hard drive or hard disk) is a device
comprising one or more rigid rotating discs, often referred to as
platters, coated with magnetic material and with a magnetic head
able to vary its distance from the axis of rotation in close proximity to
each magnetic surface, with motors, mechanisms and circuitry
which enable the heads to write data magnetically to the surfaces
and read it from them; all enclosed in a protective housing. The
heads normally float on a very thin film of air that forms very close to
the rapidly rotating platters and rotates with them, close enough for
data to be transferred magnetically but without the wear that would
be caused by contact.
Performance characteristics
 Access time

 Seek time

 Rotational latency

 Data transfer rate


Floppy Disk

 A floppy disk is a disk storage medium composed of a disk of thin


and flexible magnetic storage medium, sealed in a rectangular
plastic carrier lined with fabric that removes dust particles. They are
read and written by a floppy disk drive (FDD).
 Floppy disks, initially as 8-inch (200 mm) media and later in 5.25-
inch (133 mm) and 3.5-inch (89 mm) sizes, were a ubiquitous form
of data storage and exchange from the mid-1970s well into the first
decade of the 21st century.
CD-ROM
 CD-ROM discs are identical in appearance to audio CDs, and data
are stored and retrieved in a very similar manner (only differing from
audio CDs in the standards used to store the data). Discs are made
from a 1.2 mm thick disc of polycarbonate plastic, with a thin layer of
aluminum to make a reflective surface. The most common size of
CD-ROM disc is 120 mm in diameter.
 A laser is shone onto the reflective surface of the disc to read the
pattern of pits and lands ("pits", with the gaps between them
referred to as "lands").
Zip Drive
 The Zip drive is a medium-capacity removable disk storage system
that was introduced by Iomega in late 1994. Originally, Zip disks
launched with capacities of 100 MB, but later versions increased
this to first 250 MB and then 750 MB.
 it was never popular enough to replace the 3.5-inch floppy disk nor
could ever match the storage size available on rewritable CDs and
later rewritable DVDs.
Storage Devices
Ranking criteria for storage unit:
Access time
 Time required for locating and retrieving stored data from the

storage unit in response to the program instruction.


 Fast access time is preferred.

Storage capacity
 Amount of data that can be stored in the storage unit.

 Capacity should be large

Cost per bit of storage


 This cost should be low

Memory
 Place/location having an address to store data.
Primary memory:
 Internal storage area.
 Primary memory can be accessed randomly (any location takes nearly the
same amount of time)
 It is referred as random access memory (RAM)
 Data can be accessed in any order.
 But not sufficient to store large volume of data
 Retrieval time is consistent and short.
 It is volatile (data is lost)

Static RAM

 Requires constant power flow.


 More expensive
 More quicker
 Needs to be refreshed periodically
 Non volatile (data can be hold for some time) as long as power is applied

Dynamic RAM

 Needs periodic refreshment


 Only current data is stored
Read only memory (ROM)
 Data cannot be modified
 Mainly used to distribute firmware.
 Non volatile (no loss of data)

Types of ROM

PROM
 Programmable read only memory/one time programmable

EPROM
 Erasable programmable read only memory
 Can be erased by exposure to UV light

EEPROM
 Electrically erasable programmable read only memory
 Can be erased electronically

Flash memory
 Modern type of EEPROM
 Can be rewritten faster and frequently than EEPROM
Secondary Memory:

 External memory
 Also called auxiliary memory/backup storage
 Not directly accessible to the CPU.
 Requires the use of computer’s I/O channels.
 Stores data that is not in active use
 It is slower than primary memory (RAM, ROM)
 Has high storage capacity and non volatile

Magnetic Tape:

 Like VCR tape.


 Sequential access device
 Speed is slow.
 Used for backup of major projects.
 Environmental problems
 portability
Magnetic disks
 They are divided into areas called tracks (circular ring on one side of the
disk) ,sectors ( a wedge shaped piece of the disk.) and cylinders (set of tracks)
 Use magnetism to store data on magnetic surface.
 High storage capacity
 Reliable
 Direct access
 Rpm’s
 Gives direct access to data
 Drive spins quickly under a read/write head which can be moving or fixed).

Types of magnetic disks

Floppy disk

Hard disks
 Contain one or more metal platters which are sealed inside a case

 Hard disk can be removed also.


Optical Disk:

 Use Laser light


 Not so delicate
 Unaffected by magnetic fields
 Hold much more data
 They are costlier.
 Not so easy to copy as we copy floppy disk. Requires special h/w and s/w.
 Made up of polycarbonate plastic. Data is stored inside the polycarbonate
on a layer.

Types of optical disks:

 Read only
 CD-ROM
 CD-R
 CD-RW
 DVD (digital versatile disc)
Others:
USB drive

 New version of flash memory


 Small in size
 Mobile to use.

Removable hard drives

 Its an external hard drive.

Cache memory

 Also called high speed buffer


 Special high speed memory used to increase speed of processing (as CPU
speed is high as compared to memory speed)
 It makes current programs and data available to the CPU at a rapid time.
 It is hidden (not accessible to the user)
 Very expensive.
Computer software

 Software is a collection of computer programs and related data that


provide the instructions for telling a computer what to do and how to do
it.
 In other words, software is a conceptual entity which is a set of
computer programs, procedures, and associated documentation
concerned with the operation of a data processing system.
 It refers to one or more computer programs and data held in the storage
of the computer for some purposes.
 It is a set of programs, procedures, algorithms and its documentation.
System software

 System software provides the basic functions for computer usage and helps
run the computer hardware and system.
 It is responsible for managing a variety of independent hardware

components, so that they can work together harmoniously.


 Its purpose is to unburden the application software programmer from the

often complex details of the particular computer being used, including such
accessories as communications devices, printers, device readers, displays
and keyboards.
It includes a combination of the following:
 Device drivers

 Operating systems

 Servers

 Utilities

 Window systems
Application software

 It is developed to aid in any task that benefits from computation.


 It encompasses software of many kinds, including the internet browser
being used to display this page.

This category includes:


 Business software
 Computer-aided design
 Databases
 Decision making software
 Educational software
 Image editing
 Mathematical software
 Medical software
 Spreadsheets
 Video editing software
 Video games
 Word processing
Utility software

 It is a kind of system software designed to help analyze, configure, optimize and


maintain the computer. A single piece of utility software is usually called a utility or
tool.
 Utility software should be contrasted with application software, which allows users
to do things like creating text documents, playing games, listening to music or
surfing the web. Rather than providing these kinds of user-oriented or output-
oriented functionality, utility software usually focuses on how the computer
infrastructure (including the computer hardware, operating system, application
software and data storage) operates. Due to this focus, utilities are often rather
technical and targeted at people with an advanced level of computer knowledge.

Utility software categories

 Disk storage utilities


 Disk defragmenters.
 Disk checkers.
 Disk cleaners.
 Disk space analyzers.
 Disk partitions.
 Disk compression utilities.
 File managers
Programming Languages

What is language?
 System of communication.

What are Natural Languages?

What are computer languages?

Categories of Computer languages:


 Machine Language

 Assembly language

 High Level language


MACHINE LANGUAGE
 Understood directly by the computer
 no need of translation program
 fundamental language and written as strings of binary 1’s and 0’s
 require deep knowledge of internal structure of the system.
 User needs to keep track of address.

Two parts:
 1) OPCODE (operation code)
 2) OPERAND (where to find or store the data/instructions)

Disadvantages:
 Machine dependent
 Difficult to program
 Error prone
 Difficult to modify

Advantages :
 Fast execution
 No translation needed
ASSEMBLY LANGUAGE
 require deep knowledge of the internal structure of the system
 Use of letter symbols-mnemonics (memory aid) for numeric operation codes of
machine language.
 The computer can be taught to recognize certain combinations of letters or
numbers. The computer does its own translating.
 A section keeps a list of addresses for numbers.
 Source program :program written in assembly language
 Object program :program after conversion.
 One to one correspondence

Advantages :
 Easier to understand and use
 Easy to locate and correct errors
 Easier to modify
 No worry about addresses
 Efficiency of machine language.

Limitations:
 Machine dependent
 Knowledge of hardware
 Machine level coding
HIGH LEVEL LANGUAGE
 Instead of being machine dependent they are problem oriented.
 Use easy English like words.

Features:
 Independent of the given computer system
 Macro instructions
 Familiar words and symbols
 Depends only on the compiler.
 Not experimental.

Advantages :
 Machine independent
 Easy to learn and use
 Fewer errors
 Lower program preparation cost
 Better documentation
 Easy to maintain.

Limitations:
 Lower efficiency (time and memory)
 Lack of flexibility
Translators
COMPILER
 Translates whole program into object program

 Not involved in execution

 Object code is permanently saved

 One to many translations

 Step:

 First they are copied into the main memory of the system.

 While translating it analyses each line

 Gives errors (diagnostics/syntax)

INTERPRETER
 Step by step compilation

 No code saved for future, translation is followed by immediate execution.

 Used with micro computers

 Easy to write

 Less memory
Assembler
Data Processing
Data Processing
 Computer data processing is any process that a computer
program does to enter data and summaries, analyze or otherwise
convert data into usable information.
 The process may be automated and run on a computer.
 Data processing may or may not be distinguished from data
conversion, when the process is merely to convert data to another
format, and does not involve any data manipulation.
 It involves recording, analyzing, sorting, summarizing, calculating,
disseminating and storing data.
 Because data is most useful when well-presented and actually
informative, data-processing systems are often referred to as
information systems.
 Data Processing System is a system which processes data which
has been captured and encoded in a format recognizable by the
data processing system or has been created and stored by another
unit of an information processing system.
Elements of data processing

 Data processing may involve various processes, including:


 Data summarization
 Data aggregation
 Data validation (data validation is the process of ensuring that a program
operates on clean, correct and useful data. It uses routines, often called
"validation rules" or "check routines", that check for correctness,
meaningfulness, and security of data that are input to the system. )
 Data tabulation (Cross tabulation is the process of creating a contingency
table from the multivariate frequency distribution of statistical variables. )
 Statistical analysis (Statistics is the study of the collection, organization, and
interpretation of data. It deals with all aspects of this, including the planning
of data collection in terms of the design of surveys and experiments. )
Operating Systems
Application Window

 In a graphical user interface, the chief window of an application


program, with a title bar, a menu bar, and a work area.
Document Window

 They are the graphical boxes that pop-up on the screen when the user
clicks on a program icon on the desktop.
 A document window can also be accessed when clicking on a file name
listed within a directory, such as My Documents.
 Once the document window is opened, the file then can be reviewed,
edited or saved as a different type of document.
Dialog Window

 In a graphical user interface of computers, a dialog box (or dialogue


box) is a type of window used to enable reciprocal communication
or "dialog" between a computer and its user.
 It may communicate information to the user, prompt the user for a
response, or both.
Icons

 They are a visual representation of something on computer.


 For example, a blue "e" on your screen most likely represents the
Internet Explorer program.
 An icon that looks like a sheet of paper is probably a text document.
 By clicking and dragging icons, we can move the actual files they
represent to various locations on our computer's hard drive.
 By double-clicking an application icon, we can open the program.
Icons are one of the fundamental features of the graphical user
interface (GUI).
WallPaper
• Wallpaper (also known as desktop picture or desktop background)
is an
image used as a background of a graphical user interface on a
computer screen or mobile communications device.

How to change desktop background :

 Open Desktop background by clicking the Start Button, clicking


Control Panel, clicking Appearance & Personalization, clicking
Personalization & then clicking desktop background.
 Click the picture or color you want for your desktop background or
directly right-click on the picture or color & click on Set as desktop
background.
SCREENSAVER

 Screensaver (invented by Robert A. Heinlein) is a type of computer program


initially designed to prevent phosphor burn-in or CRT & plasma computer
monitors by blanking the screen or filling it with moving images or patterns
when the computer is not in use.
 Contemporary screensaver are used primarily for entertainment & security.

 Open the Control Panel.


 In the Control Panel double-click the Display icon.

 In display click the screensaver tab.

 Within the screensaver tab you can view the currently set screensaver

as well as change the screensaver.


 Click the Settings button to make any additional changes to the

properties of the screensaver. If you don’t wish to have a screensaver, select


(none).
 Finally, once you’ve changed your password if you wish to see how it looks

click the preview button.


DEFINITION OF DESKTOP

 The desktop is the primary user interface of a computer. When you boot up
your computer, the desktop is displayed once the startup process is
complete.
 It includes the desktop background (or wallpaper) and icons of files and
folders you may have saved to the desktop.
 In Windows, the desktop includes a task bar, which is located at the bottom
of the screen by default. In Mac OS X, the desktop includes a menu bar at
the top of the screen and the Dock at the bottom.

FEATURES OF DESKTOP
 1.They enable you to see on the display screen exactly how the document

will appear when printed.


 2.Desktop has no feelings.

 3. Static or dynamic in size, in just minutes with a few simple clicks.

 4.Whenever we can change the background of desktop by a clicking.


COMPONENTS OF DESKTOP
• Recycle bin is the folder in which all your deleted file are being
temporarily saved (until it gets full or you remove things by yourself).
So the small picture of trash can represent the folder of the recycle
bin.
• My Documents is the name of a special folder on the computer's hard
drive that the system commonly uses to store a user's documents,
music, pictures, downloads, and other files.
• A Taskbar is at the bottom of the screen, and from left to right it
contains by default the start menu, quick launch bar, taskbar buttons
and notification area.
• MY COMPUTER an icon that is normally in the upper left-hand corner
of the screen on a computer running Windows, containing an overview
of the PC. My Computer is the source of all resources in the computer
including drives, control panels and data.
• Wallpaper is the background pattern or picture against which desktop
menus, icons, and other elements are displayed and moved around.
• Microsoft Internet Explorer is the most widely used World Wide Web
browser. It is bundled with the Microsoft Windows operating system
and can also be downloaded from Microsoft's Web site.
Control Panel
 Control panel is a part of Microsoft windows graphical user interface which
allows users to view and manipulate basic system setting and controls, such
as adding hardware, adding and removing software, controlling user
accounts. The control panel is an independent program, not a folder as it
appears, which is accessed from the start menu, and is stored in the system
32 directory as control.exe under Windows XP.
 The Control Panel is a part of the Microsoft Windows graphical user interface which
allows users to view and manipulate basic system settings and controls via applets,
such as adding hardware, adding and removing software, controlling user accounts,
and changing accessibility options.
 In recent versions of Windows, the Control Panel has two views, Classic
View and Category View, and it is possible to switch between these through an option
that appears on the left side of the window.
 Many of the individual Control Panel applets can be accessed in other ways. For
instance, Display Properties can be accessed by right-clicking on an empty area of
the desktop and choosing Properties.
 The classic view consists of shortcuts to the various control panel applets, usually
without any description (other than the name). The categories are seen if the user
use "Details" view.
 The category view consists of categories, which when clicked on display the control
panel applets related to the category.
Windows explorer
 Windows explorer is an application that is part of modern versions of
the Microsoft windows operating system that runs on top of the
Windows operating system and provides a graphical user interface for
accessing the file system, though is not integral to the running of a
Windows computer.
 Windows Explorer is a file manager application that displays the file
and folder on computer
 It is included with releases of the Microsoft windows operating
system from windows 95 onwards.
 Windows explorer provides a graphical user interface for accessing
the file systems.
 It is also the component of the operating system that presents many
user interface items on the monitor such as the taskbar and desktop.
Windows Explorer
Virus

 Carry out a denial of service attack


 Crash the machine
 Randomly destroy data
 Install a Trojan horse program
 Perform password cracking
 An annoying message appearing on the computer screen.
 Reduced memory or disk space.
 Modification of data.
 Files overwritten or damaged.
 Hard drive erased.
Virus Effects
Carry out a denial of service attack
Crash the machine
Randomly destroy data
Install a Trojan horse program
Perform password cracking
An annoying message appearing on the computer screen.
Reduced memory or disk space.
Modification of data.
Files overwritten or damaged.
Hard drive erased.
Types
 VIRUS HOAX :- although there a thousands of virus discovered
every year , there a still some who exist in imagination of public &
press.
 FILE VIRUS :- most of the viruses lies in this category. A virus attach
itself to a file, usually a program file.
 BOOT SECTOR VIRUS :- this virus affects floppy and hard disk.
These first system load first, then the operating system.
 MACRO VIRUS:- this is a new category of viruses which use a new
application own programming feature to distribute themselves . They
do not infect programs , they infect documents.
Anti-virus software and other preventive measures
 Install anti-virus software that can detect and eliminate known viruses
after the computer downloads or runs the executable.

 There are two common methods that an anti-virus software


application uses to detect viruses. The first, and by far the most
common method of virus detection is using a list of virus signature
definitions. This works by examining the content of the computer's
memory (its RAM, and boot sectors) and the files stored on fixed or
removable drives (hard drives, floppy drives), and comparing those
files against a database of known virus "signatures". The
disadvantage of this detection method is that users are only protected
from viruses that pre-date their last virus definition update.

 The second method is to use a heuristic algorithm to find viruses


based on common behaviors. This method has the ability to detect
viruses that anti-virus security firms have yet to create a signature for.
Exmaples of Anti Virus S/W

 The Shield Deluxe 2009 Antivirus & Antispyware


 Webroot Antivirus with Antispyware 6.0

 BitDefender Antivirus 2009

 CA Anti-Virus Plus 2009

 McAfee VirusScan Plus 2009

 Norton Antivirus 2009

 ESET NOD 32 3.0


FUNCTIONS OF ANTIVIRUS…
 PROTECTION :- antivirus protection can provide real-time
protection , meaning it can prevent unwanted processes from
accessing your computer while you surf the internet.
 CLEANUP:- antivirus helps us to scan the system and remove
viruses and unwanted programs , and provide you tools to get rid of
them.
 ALERT:- antivirus alert us when something is trying to access our
computer, or something in computer trying to access something on
internet.
 UPDATES:- antivirus programe can update themselves, keeping your
computer protection up to date without you manually have to update it.
 FUTHER PROTECTION :- if an antivirus software finds an infected file
that cannot be detected, it can quarantine the file so that so that it
cannot infect other files or programes in our computer.
 One common mistake that people make when the topic of a
computer virus arises is to refer to a worm or Trojan horse as a
virus. While the words Trojan, worm and virus are often used
interchangeably, they are not exactly the same thing. Viruses,
worms and Trojan Horses are all malicious programs that can cause
damage to your computer, but there are differences among the
three, and knowing those differences can help you better protect
your computer from their often damaging effects.
Virus/ Worms/ Trojan Horses
 A computer virus attaches itself to a program or file enabling it to spread
from one computer to another, leaving infections as it travels. Like a human
virus, a computer virus can range in severity: some may cause only mildly
annoying effects while others can damage your hardware, software or files.

 A worm is similar to a virus by design and is considered to be a sub-class of


a virus. Worms spread from computer to computer, but unlike a virus, it has
the capability to travel without any human action. A worm takes advantage
of file or information transport features on your system, which is what allows
it to travel unaided.

 The Trojan Horse, at first glance will appear to be useful software but will
actually do damage once installed or run on your computer. Those on the
receiving end of a Trojan Horse are usually tricked into opening them
because they appear to be receiving legitimate software or files from a
legitimate source. When a Trojan is activated on your computer, the results
can vary. Some Trojans are designed to be more annoying than malicious
(like changing your desktop, adding silly active desktop icons) or they can
cause serious damage by deleting files and destroying information on your
system. Trojans are also known to create a backdoor on your computer that
gives malicious users access to your system, possibly allowing confidential
or personal information to be compromised. Unlike viruses and worms,
Trojans do not reproduce by infecting other files nor do they self-replicate.
File compression
 It is commonly used when sending a file from one computer to another over a
connection that has limited bandwidth.

 The compression basically makes the file smaller and, therefore, the sending
of the file is faster. Of course, when compressing a file and sending it to
another computer that computer has to have a program that will decompress
the file so it can be returned to "normal" and used.

 The next step to compressing a single file is the combining of multiple files
into a single compressed archive. By performing this combination process the
archive both serves to make the transmission faster for all the files and
manages to keep them together for convenience.

 Finally, the next step after combining multiple files into a single archive is to
maintain the organization of those files once inside the archive. If, for
example, multiple files need to be in multiple directories (folders) in order to
correctly work on the receiving computer then one characteristic of such an
archive would be to keep that directory structure intact within the archive and
having the decompression program maintain the directory structure when
decompressing the archive.
WinZip
 It is an archiving and compressing application for Microsoft
windows, developed by WinZip computing.
 Probably the single most popular archive format. Many programs
support this archive type (both free and commercial).
Data transmission, digital transmission, or
digital communications:
 It is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-
multipoint communication channel. The data is represented as an electromagnetic signal,
such as an electrical voltage, radio wave, microwave, or infrared signal.

 While analog communications is the transfer of continuously varying information signal,


digital communications is the transfer of discrete messages.

Modem:

 A modem is a device or program that enables a computer to transmit data over, for example,
telephone or cable lines. Computer information is stored digitally, whereas information
transmitted over telephone lines is transmitted in the form of analog waves. A modem
converts between these two forms.

 A modem (modulator-demodulator) is a device that modulates an analog carrier signal to


encode digital information, and also demodulates such a carrier signal to decode the
transmitted information.

 Fortunately, there is one standard interface for connecting external modems to computers
called RS-232. Consequently, any external modem can be attached to any computer that
has an RS-232 port, which almost all personal computers have. There are also modems that
come as an expansion board that you can insert into a vacant expansion slot. These are
sometimes called onboard or internal modems.
Basic hardware components
Apart from the physical communications media, networks comprise additional
basic hardware building blocks interconnecting their terminals, such as

 Network interface cards - (network adapter, or NIC is a piece of computer


hardware designed to allow computers to physically access a networking medium )

 Repeater - it is an electronic device that receives a signal, cleans it of


unnecessary noise, regenerates it, and retransmits it at a higher power level, or to
the other side of an obstruction, so that the signal can cover longer distances
without degradation. )

 Hubs - (A repeater with multiple ports is known as a hub. )

 Bridges - it connects multiple network segments at the data link layer (layer 2) of
the OSI model. )

 Switches - it is a device that forwards and filters OSI layer 2 datagrams (chunks
of data communication) between ports (connected cables) based on the MAC
addresses in the packets. A switch is distinct from a hub in that it only forwards the
frames to the ports involved in the communication rather than all ports connected. )
 Routers - it is an internetworking device that forwards packets
between networks by processing information found in the datagram
or packet (Internet protocol information from Layer 3 of the OSI
Model). ).

 Firewalls - is an important aspect of a network with respect to


security. It typically rejects access requests from unsafe sources
while allowing actions from recognized ones.

Communication Channels:

Twisted pair

 It is a type of wiring in which two conductors (the forward and return


conductors of a single circuit) are twisted together for the purposes
of canceling out electromagnetic interference (EMI) from external
sources; for instance, electromagnetic radiation from unshielded
twisted pair (UTP) cables, and crosstalk between neighboring pairs.
Coaxial cable

 Coax, is an electrical cable with an inner conductor surrounded by a


flexible, tubular insulating layer, surrounded by a tubular conducting
shield. The term coaxial comes from the inner conductor and the
outer shield sharing the same geometric axis.

 Coaxial cable conducts electrical power using an inner conductor


(usually a flexible solid or stranded copper wire) surrounded by an
insulating layer and all enclosed by a shield layer, typically a woven
metallic braid; the cable is often protected by an outer insulating
jacket.

Optical fiber cable

 It is a cable containing one or more optical fibers. The optical fiber


elements are typically individually coated with plastic layers and
contained in a protective tube suitable for the environment where
the cable will be deployed.
Images:
HTTP

 Short for Hyper Text Transfer Protocol, the underlying protocol used by the
World Wide Web.

 HTTP defines how messages are formatted and transmitted, and what
actions Web servers and browsers should take in response to various
commands.

 For example, when you enter a URL in your browser, this actually sends an
HTTP command to the Web server directing it to fetch and transmit the
requested Web page.

Web Browser

 A web browser is a software application for retrieving, presenting, and


traversing information resources on the World Wide Web.

 A web browser can also be defined as an application software or program


designed to enable users to access, retrieve and view documents and other
resources on the Internet.
Internet

 The Internet is a global system of interconnected governmental, academic,


corporate, public, and private computer networks.

 In other words, the Internet is a worldwide interconnection of computers


and networks which are either owned privately or publicly.

 It is based on the networking technologies of the Internet Protocol Suite.

 It is the successor of the Advanced Research Projects Agency Network


(ARPANET) developed by DARPA of the United States Department of
Defense.

 The Internet is also the communications backbone underlying the World


Wide Web (WWW).
Computer Network
 A computer network, often simply referred to as a network, is a collection of computers and
devices interconnected by communications channels that facilitate communications and
allows sharing of resources and information among interconnected devices.
 Computer network is a collection of two or more computers linked together for the
purposes of sharing information, resources, among other things.

Structure of a Network:

Server based:
 It uses a server (which controls the user access to the network resources).
 It may include many servers & many nodes.
 These servers can be called file server/ n/w server/ application server/ server.

Client server based:


 Individual computer share the processing and storage workload with a central server.
 They can be LAN/WAN.
 E.g. DBMS

Peer to peer :
 Also called workgroup.
 All nodes have equal relationships to all others & all have similar types of software that
support sharing of resources.
Network Types
 A local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school,
computer laboratory, office building, or closely positioned group of
buildings. Each computer or device on the network is a node. The
defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller
geographic range, and no need for leased telecommunication lines.

 A wide area network (WAN) is a computer network that covers a


large geographic area such as a city, country, or spans even
intercontinental distances, using a communications channel that
combines many types of media such as telephone lines, cables, and
air waves. A WAN often uses transmission facilities provided by
common carriers, such as telephone companies.
Need of Networking:
 Easy Communication and Speed
 Sharing Hardware
 Ability to Share Files, Data and Information
 Software Cost and Management
 Security
 Communication
 Flexible Access
 Workgroup Computing: Workgroup software like Microsoft BackOffice enables many
users to contribute to a document concurrently. This allows for interactive teamwork.
Disadvantages:-
 If Sever develops a fault then users may not be able to run the application programs.
 A fault in the network can cause user to lose the data.
 If the network stops operating then it may not be possible to access to various
computers.
 It is difficult to make the system secure from hackers, novices or industrial espionage.
 Decisions on resource planning tend to become centralized.
 Networks that have grown with little thought can be inefficient in the long term.
 As traffic increases on a network the performance degrades unless it is designed
properly.
 The larger the network becomes difficult to manage.
Search Engines
 A web search engine is designed to search for information on the
World Wide Web and FTP servers. The search results are generally
presented in a list of results and are often called hits. The
information may consist of web pages, images, information and
other types of files. Some search engines also mine data available
in databases or open directories. Unlike web directories, which are
maintained by human editors, search engines operate
algorithmically or are a mixture of algorithmic and human input.
Meta Search Engine
 A metasearch engine is a search tool that sends user requests to
several other search engines and/or databases and aggregates the
results into a single list or displays them according to their source.
 Metasearch engines enable users to enter search criteria once and
access several search engines simultaneously.
 Metasearch engines operate on the premise that the Web is too
large for any one search engine to index it all and that more
comprehensive search results can be obtained by combining the
results from several search engines.
 This also may save the user from having to use multiple search
engines separately.
Boolean Operators in Searching:
 The Internet is a vast computer database. As such, its contents
must be searched according to the rules of computer database
searching. Much database searching is based on the principles of
Boolean logic. Boolean logic refers to the logical relationship among
search terms, and is named for the British-born Irish mathematician
George Boole.
 On Internet search engines, the options for constructing logical
relationships among search terms often modify the traditional
practice of Boolean searching.
 Boolean logic consists of three logical operators:
 OR (retrieve records in which AT LEAST ONE of the
search terms is present. )
 AND (retrieve records in which BOTH of the search
terms are present )
 NOT (retrieve records in which ONLY ONE of the
terms is present, the one we have selected by our
search )
Social Networking Service

 A social networking service is an online service, platform, or site


that focuses on building and reflecting of social networks or social
relations among people, who, for example, share interests and/or
activities. A social network service essentially consists of a
representation of each user (often a profile), his/her social links, and
a variety of additional services. Most social network services are
web based and provide means for users to interact over the
Internet, such as e-mail and instant messaging. Online community
services are sometimes considered as a social network service,
though in a broader sense, social network service usually means an
individual-centered service whereas online community services are
group-centered. Social networking sites allow users to share ideas,
activities, events, and interests within their individual networks.[
FIREWALL
 A firewall is a device or set of devices designed to permit or deny
network transmissions based upon a set of rules and is frequently
used to protect networks from unauthorized access while permitting
legitimate communications to pass.
 Many personal computer operating systems include software-based
firewalls to protect against threats from the public Internet. Many
routers that pass data between networks contain firewall
components
Cookies
 A cookie, also known as an HTTP cookie, web cookie, or
browser cookie, is used for an origin website to send state
information to a user's browser and for the browser to return the
state information to the origin site.
 The state information can be used for authentication, identification
of a user session, user's preferences, shopping cart contents, or
anything else that can be accomplished through storing text data.
 Cookies are not software. They cannot be programmed, cannot
carry viruses, and cannot install malware on the host computer .
 However, they can be used by spyware to track user's browsing
activities – a major privacy concern that prompted European and US
law makers to take action. Cookies can also be stolen by hackers to
gain access to a victim's web account.
Email SPAM
 Email spam, also known as junk email or unsolicited bulk email
(UBE), is a subset of spam that involves nearly identical messages
sent to numerous recipients by email. Definitions of spam usually
include the aspects that email is unsolicited and sent in bulk.[
 Spam has several definitions varying by source.
 Unsolicited bulk email (UBE)—unsolicited email, sent in large
quantities.
 Unsolicited commercial email (UCE)—this more restrictive definition
is used by regulators whose mandate is to regulate commerce
Types
Spamvertised sites
 Many spam emails contain URLs to a website or websites.

According to a Commtouch report in the first quarter of 2010, there


are "...183 billion spam messages" sent every day. The most
popular spam topic is "pharmacy ads" which make up 81% of email
spam messages.
Phishing
 Spam is also a medium for fraudsters to scam users into entering

personal information on fake Web sites using emails forged to look


like they are from banks or other organizations, such as PayPal.
This is known as Phishing. Targeted Phishing, where known
information about the recipient is used to created forged emails, is
known as spear-phishing.
Blogs
 A blog is a type of website or part of a website. Blogs are usually
maintained by an individual with regular entries of commentary,
descriptions of events, or other material such as graphics or video.
Entries are commonly displayed in reverse-chronological order. Blog
can also be used as a verb, meaning to maintain or add content to a
blog.
 A typical blog combines text, images, and links to other blogs, Web
pages, and other media related to its topic .
 Most blogs are interactive, allowing visitors to leave comments and
even message each other via widgets on the blogs and it is this
interactivity that distinguishes them from other static websites
Types

 Personal blogs
The personal blog, an ongoing diary or commentary by an individual, is
the traditional, most common blog. Blogs often become more than a way
to just communicate; they become a way to reflect on life, or works of art.
Blogging can have a sentimental quality. Some sites, such as Twitter,
allow bloggers to share thoughts and feelings instantaneously with
friends and family, and are much faster than emailing or writing.

 Corporate and organizational blogs


Blogs used internally to enhance the communication and culture in a
corporation or externally for marketing, branding or public relations
purposes are called corporate blogs. Similar blogs for clubs and societies
are called club blogs, group blogs, or by similar names; typical use is to
inform members and other interested parties of club and member
activities.
 By device
Blogs can also be defined by which type of device is used to compose
it. A blog written by a mobile device like a mobile phone or PDA could
be called a moblog.One early blog was Wearable Wireless Webcam,
an online shared diary of a person's personal life combining text, video,
and pictures transmitted live from a wearable computer and Eye Tap
device to a web site. This practice of semi-automated blogging with live
video together with text was referred to as surveillance. Such journals
have been used as evidence in legal matters.
 By genre

Some blogs focus on a particular subject, such as political blogs, travel


blogs (also known as travelogs), house blogs, fashion blogs, project
blogs, education blogs, niche blogs, classical music blogs, quizzing
blogs and legal blogs (often referred to as a blawgs) or dreamlogs. Two
common types of genre blogs are art blogs and music blogs. A blog
featuring discussions especially about home and family is not uncommonly
called a mom blog. While not a legitimate type of blog, one used for the sole
purpose of spamming is known as a Splog.
Legal and social consequences

 Defamation
 Employment
 Political dangers
 Personal safety
 Behavior
E-Commerce
 Electronic commerce, commonly known as e-commerce,
eCommerce or e-comm, refers to the buying and selling of
products or services over electronic systems such as the Internet
and other computer networks.
 However, the term may refer to more than just buying and selling
products online. It also includes the entire online process of
developing, marketing, selling, delivering, servicing and paying for
products and services.
 The amount of trade conducted electronically has grown
extraordinarily with widespread Internet usage.
Electronic commerce

It is the buying and selling of product or service over electronic systems such as the
Internet and other computer networks.
Electronic commerce draws on such technologies as electronic funds transfer, supply
chain management, Internet marketing, online transaction processing, electronic data
interchange (EDI), inventory management systems, and automated data collection
systems.
Modern electronic commerce typically uses the World Wide Web at least at one point in
the transaction's life-cycle, although it may encompass a wider range of technologies
such as e-mail, mobile devices and telephones as well.
Electronic commerce is generally considered to be the sales aspect of e-business. It
also consists of the exchange of data to facilitate the financing and payment aspects of
business transactions.
E-commerce is business in the online environment. Here all transactions, deals take
place over the internet.
Advantages:
 Overcome Geographical Limitations
 Gain New Customers With Search Engine Visibility
 Lower Costs
 Locate the Product Quicker
 Eliminate Travel Time and Cost
 Provide Comparison Shopping
 Enable Deals, Bargains, Coupons, and Group Buying
 Provide Abundant Information
 Remain Open All the Time
Disadvantages of Ecommerce
 Any one, good or bad, can easily start a business. And there are

many bad sites which eat up customers’ money.


 There is no guarantee of product quality.

 Mechanical failures can cause unpredictable effects on the total

processes.
 As there is minimum chance of direct customer to company

interactions, customer loyalty is always on a check.


 There are many hackers who look for opportunities, and thus an

ecommerce site, service, payment gateways, all are always prone to


attack.
e-commerce payment system
 It facilitates the acceptance of electronic payment for online
transactions.
 e-commerce payment systems have become increasingly popular

due to the widespread use of the internet-based shopping and


banking.
 Methods of electronic payment.

 Electronic cash, software wallets, smart cards, and credit/debit

cards.
Some Examples Of EPS:- Online reservation
 Online bill payment

 Online order placing (nirulas)

 Online ticket booking ( Movie)


Two storage methods of E-payment system:
 On-line Individual does not have possession personally of electronic

cash Trusted third party, e.g. online bank, holds customers’ cash
accounts
 Off-line Customer holds cash on smart card or software wallet Fraud

and double spending require tamper-proof encryption


 E-Cash A system that allows a person to pay for goods or services
by transmitting a number from one computer to another. Like the
serial numbers on real currency notes, the E-cash numbers are
unique. This is issued by a bank and represents a specified sum of
real money. It is anonymous and reusable.
 E-Wallet The E-wallet is another payment scheme that operates like
a carrier of e-cash and other information. The aim is to give
shoppers a single, simple, and secure way of carrying currency
electronically. Trust is the basis of the e-wallet as a form of
electronic payment.
 Procedure for using an e-wallet: Decide on an online site where you
would like to shop. Download a wallet from the merchant’s website.
Fill out personal information such as your credit card number, name,
address and phone number, and where merchandise should be
shipped. When you are ready to buy, click on the wallet button, the
buying process is fully executed.
 Smart Cards A smart card , is any pocket-sized card with
embedded integrated circuits which can process data This implies
that it can receive input which is processed and delivered as an
output
 Credit cards It is a Plastic Card having a Magnetic Number and
code on it. It has Some fixed amount to spend. Customer has to
repay the spend amount after sometime.
Concepts:B2B,B2C

 Electronic commerce that takes place between businesses is


referred to as business-to-business or B2B. B2B can be open to all
interested parties (e.g. commodity exchange)
 Electronic commerce that takes place between businesses and
consumers, on the other hand, is referred to as business-to-
consumer or B2C. This is the type of electronic commerce
conducted by companies such as Amazon. COM.
 Online shopping is a form of electronic commerce where the buyer
is directly online to the seller's computer usually via the internet.
There is no intermediary service involved. The sale or purchase
transaction is completed electronically and interactively in real-time
such as in Amazon.com for new books. However in some cases, an
intermediary may be present in a sale or purchase transaction such
as the transactions on eBay. COM.
Operating system (OS)
 It is software, consisting of programs and data, that runs on computers,
manages computer hardware resources, and provides common services for
execution of various application software. The operating system is the most
important type of system software in a computer system. Without an
operating system, a user cannot run an application program on their
computer, unless the application program is self booting.
MS-DOS:
 The literal definition is "Microsoft Disk Operating System".
 DOS is a command-line method of executing basically the same functions
available in Windows.
 The main difference is the lack of wizards, the need to be precise, and the
fact that DOS came first.
 DOS has much more power than your standard Windows, and if you know
the right commands, you can get information much more quickly.
 It is single user OS that runs one program at a time.
Path:
 Path is used to specify the location where MS-DOS looks when using a
command. For example, when using the command "format", if the path is not
specified to where the command is you will receive bad command or file
name.
DOS & Windows
Disk drive
 it is a device implementing a storage mechanism with fixed or removable media.
 Notable types are the hard disk drive (HDD) containing a non-removable disk, the
floppy disk drive (FDD) and its removable floppy disk, and various optical disc drives
and associated optical disc media.

Volume Label
 In the context of computer operating systems, volume is the term used to describe a
single accessible storage area with a single file system, typically (though not
necessarily) resident on a single partition of a hard disk.

Booting
 It is to ring a computer into operational state, so that it can start accepting instructions
from the user.
 A bootable disk is any floppy/CD/ HD that contains the files required to boot a DOS
system.
 A boot disk is also known as system disk contains system files.
 These files are required for the working of DOS operation.
 A system file “command. COM” comprises of MSDOS.SYS, IO.SYS and command.
COM itself.
 Command. COM is a command processor which helps in getting the drive name i.e.
the system prompt sign, from where we can operate on any of the commands.
 MSDOS.SYS & IO.SYS are hidden files.
Bootstrapping
 (from an old expression "to pull oneself up by one's bootstraps") is a
technique by which a simple computer program activates a more
complicated system of programs.
 In the start up process of a computer system, a small program (such as
BIOS, earlier called the bootstrap loader) initializes and tests that a basic
requirement of hardware, peripherals and external memory devices are
connected. It then loads a program from one of them and passes control to
it, thus allowing the loading of larger programs (such as an operating
system).

Internal & External Commands:


 In MS-DOS there are two ways commands are executed. An Internal
command (memory resident), which is a command embedded into the
command. COM file, and an external command (disk resident), which is not
embedded into command. COM and therefore requires a separate file to be
used.
 The internal commands reside in COMMAND.COM, which loads into
memory when the computer system is started; these commands do not
reside on disk. The external commands are files that do reside on disk and
have an extension of .COM, .EXE, or .BAT.
 Both command types are executed from the MS-DOS prompt.
File Names:
 First name can be 8 characters long.
 Extension can be 3 character long

Wild Card
 . Indicates a sequence of characters.
 ? Indicates a single character.
 E.g.: *.*, A*.*, ?.*, a?.* etc
 Directory
 Like split drawers in filing cabinet.
 The grouping of files is done in a directory.

Subdirectory
 Like file folders within each drawer.
 Files stored in sub directory are isolated by other files.

Root directory
 It is represented by \
 Parent directory
 It is the immediate previous directory of a sub directory.
 To reach a parent from a sub dir (..)
Dos Prompt
 The very initial character that is viewed when you start functioning

on the computer.
Suppress line numbers:

 To prevent Word from numbering those lines,

Hyphenate:

 If a word is too long to fit on the end of a line, Microsoft Word moves
the word to the beginning of the next line instead of hyphenating it.
However, you can use the hyphenation feature to insert hyphens to
eliminate gaps in justified text or to maintain even line lengths in
narrow columns.
Widow/orphan control
 The widow/orphan control in Microsoft Word is a feature that will

prevent single lines of paragraphs from appearing on a separate


page from the rest of the paragraph (a widow is the first line of a
paragraph left by itself and an orphan is the last line left by itself).
The widow/orphan control will automatically keep two lines together
on a page, shifting them as necessary when you add or take text
away from the document.
Keep lines together
 Word automatically inserts a page break when you reach the end of

a page so you can continue onto the next page. However, one
problem that often arises is that lines of a paragraph, table rows and
so on are split between two pages.
 You can prevent Word 2007 from splitting up the lines of a

paragraph between two pages.


Keep with next
 Stop things splitting over a page in places where you don’t want

them to split.

You might also like