Information Technology Text Book
Information Technology Text Book
Every effort has been made to avoid errors or omissions in this publication. In spite of this, errors may creep in.
Any mistake, error or discrepancy noted may be brought to our notice, which shall be taken care of in the next
edition. It is notified that neither the publisher nor the author or seller will be responsible for any damage or loss of
action to any one, of any kind, in any manner, therefrom. It is suggested that to avoid any doubt the reader should
cross-check all the facts, law and contents of the publication with original Government publication or notifications.
For binding mistake, misprints or for missing pages, etc., the publisher’s liability is limited to replacement within
one month of purchase by similar edition. All additional expenses in this connection are to be borne by the
purchaser.
Branches
1, Mahalakshmi Street, T. Nagar, Chennai-600 017 • Ph : 044-24344684
Gopabandhu Lane, Behind Govt. Bus Stand, Badambadi,
Cuttack-753 012 (Odisha) • Ph : 0671-2311391
3-5-1108, Narayanaguda, Hyderabad-500 029 • Ph : 040-24750368
10/2B, Ramanath Mazumdar Street, Kolkata-700 009 • Ph : 033-22416024
Arunalaya, 1st Floor, Saraswati Road, Pan Bazar, Guwahati-781 001 • Ph : 0361-2731274
Koratti Parambil House, Convent Road, Kochi-682 035 • Ph : 0484-2367189
No. 24 & 25, 1st Floor, Hameed Shah Complex, Cubbonpet Main Road, Bengaluru-560 002
KPP M 20400 2
PRINTED IN INDIA
At Diamond Agencies Pvt. Ltd., B-125, Sec. 63, NOIDA and
published by Usha Sales Corporation 4863/2B, 24, Darya Ganj,
New Delhi-110002'
cknowledgement
[ The process of writing and publishing of “Information Technology” book rould
not have been successful without the sincere efforts and support of umber of people
associated with it. It is our great pleasure to take this pportunity to thank all those who
helped us directly or indirectly in preparation
i
l this book.
[ We dedicate this book to our family members for their kind blessings. We also xpress
our special thanks to our colleagues for their valuable co-operation and uidance.
We are extremely grateful to Mr. Raj Kumar and Mr. Tarun, M/s Kalyani
ublishers for providing us opportunity to bring forward the first edition of this
I
ook and for their encouragement as well as support to complete this book.
book to the
Almighty.
[JNEET KUMAR
[email protected]
Preface
This book has been strictly written for the students of B.Com of all Universities
in Telangana State, India. The topics of syllabus have been arranged in a proper
sequence to ensure smooth flow of the subject.
The primary aim of the authors has been to present the material in a comprehensive
manner so as to help the students to easily grasp the subject and reproduce it whenever and
wherever required. Complex topics are covered in illustrative manner at appropriate places;
teachers will find it easy to make students understand the concepts. Student need not to go
for another book to find the topics, as all the syllabus is covered in the same book with easy
language. Some of the questions serve as exercises for the material covered in the chapter.
Solved short answer questions and long answer questions have been provided at the end of
every unit.
It is an earnest desire of the authors that the readers should make the best use of it.
There are still many ways in which the presentation of this book can be further improved.
The valuable suggestions for further improvement of the book will be gratefully accepted. All
efforts have been made to avoid errors but despite of it some errors might have crept in
advertently. The readers are requested to write us in this regard.
2. ■ 2.1 - 2.14
Input & Output Devices
■
Windows 5.1 - 5.22
5.
MS-Word
6. ■ 6.1 - 6.51
The term Information Technology (IT) is widely used nowadays. It refers to the subjects
related to creating, managing, processing and exchanging information. It defines an
industry that uses computers, networking, software programming, and other equipment
and processes to store, process, retrieve, transmit, and protect information.
In this era of information technology, computers are used in almost all walks of life.
Computers are widely used in several fields, such as education, communication,
entertainment, banking, medicine, weather forecasting and scientific research. We can use
computers to perform a variety of tasks, such as drafting letters, performing calculations,
maintaining records about students, creating question papers, analyzing exam results and
even creating attractive pictures. In spite of the field of working, today eveiy person needs to
have basic knowledge of computers to excel in his/her respective field. IT proficiency allows
a person to be an active and effective participant in the emerging information or knowledge
society. To be successful in today's information or knowledge age, we must have knowledge
and understanding of computers and their uses.
The above figure shows that the computer can be divided into digital, analog and hybrid
computers, where digital computers can be further divided into purpose wise, size wise and function
wise computers.
> DIGITAL COMPUTERS
1.18 INTRODUCTION TO COMPUTERS
• They are the most commonly used computers in homes and offices.
• The real life example of a digital computer is a digital watch. Now days, computer used for
the purpose of business and education are also example of digital computers.
• In digital computers, data flows in the form of clock pulses as shown below:
Crystal Display) screens and pointing sensors. Today, Laptop computers are coming with
LED (Light Emitting Diodes) screens also.
(e) Desktop or Personal Computers (PC)
• Personal Computers are the most widely used computers in the world.
• These computers are normally placed on the top of the desk, so they are also known as the
Desktop computers.
• These computers are equipped with huge
volumes of main and secondary memories.
• They are mainly used for managing personal
data of a company or an individual, that’s why
they are called Personal computers.
• Number of softwares can be installed on these
computers to perform various kinds of data
processing operations.
• We can manage accounts, design graphics or Personal
fisiiai
Fig. 1.14 (Desktop or
Computer)
ISSsSlIIJSiiil
images, surf internet, write letters and listen to
music or watch movies on these computers.
• The size of desktop computers is greater than laptops.
(f) Mainframe Computers
• A mainframe computer is a veiy large size computer capable of handling and processing
very large amounts of data quickly.
• Mainframe computers have more main and secondary storage and contain multiple
processing units (CPUs).
• These computers are generally used in large
organizations like government agencies, banks,
flight scheduling, ticket reservations and insurance
companies where a large number of people need
frequent access to the same data which is usually
organized into one or more huge databases.
• In a mainframe, several computer terminals which
basically contain keyboard and monitor are plugged
into a single mainframe. These terminals act as an Fig. 1.15 (Mainframe
input/output device to the mainframe. Computer)
• Mainframe computers occupy a lot of space and
require proper air-conditioning.
• Mainframes are so called because the earliest ones were housed in large metal frames.
• A typical mainframe system can support hundreds of users at the same time.
• With the technological advances in personal computers, the need for mainframe computing
has significantly reduced over the years. The computing power of a typical desktop
computer today is greater than that of a mainframe system.
(g) Super Computers
• Super Computers are the most powerful computers typically used for scientific and
engineering applications that must handle very large databases or do a great amount of
INTRODUCTION TO COMPUTERS 1.21
• It is mainly designed for business or professional use rather than home use.
• A workstation has advanced graphics capabilities, large storage capacity, and a powerful
microprocessor.
• Workstations are commonly connected to a local area network and run multiuser operating
systems.
• In terms of computing power, workstations lie between personal computers and
minicomputers.
(c) Embedded Computers
• Embedded computers are fixed inside various electronic devices to automate and control
their working.
• Various modem electronic devices like Microwave, washing machine, televisions and many
other devices contain embedded computers. For example - A small computer fitted in a
digital washing machine controls the washing cycle of the machine.
• The user could not program these computers. The manufacturer of these computers
programs them.
• The central processing emits (CPUs) used in embedded computers are often sufficient only
for the computational requirements of the specific application and may be slower and
cheaper than CPUs found in a personal computer.
(d) Information Appliances
• Information appliances are easy-to-use portable computing devices which are designed to
perform a limited set of tasks like basic calculations, playing multimedia, browsing internet,
photography, editing text etc.
• Many information appliances will be connected to service providers that provide various
services for a monthly subscriber fee.
• They are generally referred as the mobile devices having limited functionality.
> ANALOG COMPUTERS
• Analog computers are the computers that work on continuous data.
• Analog computers are used to measure the physical quantities like pressure, temperature,
speed etc.
• These computers accept input data in the form of signals and convert them to numeric
values. For example: A thermometer does not perform any calculations but measures the
temperature of the body.
• Analog computers are mainly used for scientific and engineering purposes, because they deal
with quantities that vary constantly.
• Analog computers are faster than digital computers but they are not as accurate as digital
computers. That’s why they are less commonly used.
• The representation of flow of data in analog computer is shown as:
1.23 INTRODUCTION TO COMPUTI
• These computers are useful in those environments, where both digital & am signals are used
in processing.
• The uses of hybrid computers are increasing day by day as ther-e are numbei areas in the
real world where we need both analog and digital computers, example: In a hospital, there
may be number of devices like E.C.G. machine c which are used to measure the patient’s
heart beat, temperature and otl information. This is done by analog computers. The
information received fr these analog computers is then supplied to digital computers to
generate repoi Thus, this whole system uses hybrid computers.
1.8 COMPARISON OF COMPUTER SYSTEMS
1.8.1 DIGITAL Vs. ANALOG COMPUTER
Digital Computer Analog Computer
Digital computers work on discontinuous or
discrete data. Analog computers work on continuoi data.
Digital computers carry out operations on Analog computers carry out operations o
binary data at a very fast rate and generate variable electrical signals and general
output in user understandable language. output in the form of analog electric! signals.
Digital computers basically work by Analog computers work by measurin analog
counting and adding the binary digits i.e. it or electrical signals.
is based on counting operation.
Digital computer is more efficient in discrete Analog computer is more efficient i
calculations. continuous calculations.
Digital computer represents data in binary Analog computer represents data a physical
format (0 and 1). quantities like voltage temperature, current
etc.
More accurate and reliable. Analog computers are not as accurate a
digital computers.
In digital computers, data flows in the form In analog computers, data flows in thi form
of pulses. of sine waves.
JlfUUML
calculation at a time.
simultaneously. mm r
A digital computer can perform one An analog computer works in parallel This
means it can carry out multiple tasks
Digital computers are used in banking, Analog computers are used in scientific and
manufacturing, personal usage etc. engineering applications.
1.8.2 MINI Vs. MAINFRAME COMPUTER
Mini Computer Mainframe Computer
Minicomputer is a kind of computer that
works stand alone. It is used by small and Mainframe computer is a kind of computer
mid size businesses for normal business which is used by large organizations for
«me etc.
1 other It has a multiprocessing system. It can It is capable of hosting multiple operating
IUOUS
analog
:d from systems.
ns on support around 400 users simultaneously.
'eports.
lerate It has huge processing ability and is able to do
:trical • Slow processing speed. complex tasks.
uring • Memory is less than that of mainframe. . Mainframe computers have large amount of
Therefore used in small companies. memory and serve number of workstations
used in large companies.
it in 1.8.3 PC (PERSONAL COMPUTER) Vs. SUPER COMPUTER
PC (Personal Computer) Super Computer
i as
Slow processing speed. Super computer use mrmber of processors, so
tage,
speed of execution is higher than personal
te as
computer.
Storage capacity is minimum. Storage capacity is very high, generally in
Terabytes.
the
Limited peripheral devices (like: keyboard,
mouse) can be connected to personalSuper computer can have multiple computers
computer. connected to it so multiple peripheral devices
can be connected to super computer.
Used for word processing, small dataUsed for weather forecasting, research work
PUTERS INTRODUCTION TO COMPUTERS maintenance, small applications like: Bill 1.24
and image processing etc.
processing system etc.
1.8.4 MINI COMPUTER Vs. MICRO COMPUTER
Mini Computer Micro Computer
• Bigger than micro computer.
Relatively small in size. The microcomputer
system is designed to fit on a desktop.
• More expensive. Less expensive.
• Mini computer can have multiple Single processor.
processors.
Relatively low performance.
• High performance, capable of doing
highly | specific and complex tasks
illel.
tiple
1.9 BASIC COMPONENTS OF A COMPUTER SYSTEM
itific A system is defined as a set of interacting elements, responding to inputs so as to
produce outputs. A computer system consists of the following major elements or
components:
i) Software
ii) Hardware
iii) Firmware
of iv) Humanware
irge (i) Software
and All the intangible components of the computer system are known as software. Intangible
components mean those components or parts, which we can’t touch physically. In other
lan language, we can say that all those computer applications or programs, which run behind
the monitor’s screen, are known as softwares.
Example:
Windows, Notepad, WordPad, Internet Explorer, Windows Media Player etc.
1.25 INTRODUCTION TO COMPUTE!
(ii) Hardware
All the tangible components of the computer system are known as hardwar Tangible
components mean all the physical components of the computer systei which we can
touch and can freely move from one place to another.
Example:
CPU (Microprocessor), Monitor, Keyboard, Mouse, Speakers, Printer, Scanner etc.
(iii) Firmware
Firmware can be defined as a group of software and hardware. Because in comput
system, without hardware components, software have no meaning and withoi
software components, hardware have no meaning i.e. both of these componen
(software & hardware) are mutually dependent. Both of them must work together
order to make computer produce some useful output. This group is called Firmware.
Example:
All the software applications or programs are installed in the hard disk, which is
hardware component. This combination of software and hardware is firmware.
(iv) Hu man ware
User or an operator, who uses the computer machine, is known as Humanwar
Humanware can be a computer professional, a student, a novice user (beginner) < any
other person, who operates this machine for completing his or her task.
1.10 BLOCK DIAGRAM OF COMPUTER
A typical computer system irrespective of its size, class or type consists of hardwaj
and software, integrated and synchronized together to perform computational work <
data processing.
Computer Anatomy is concerned with the way the various functional units opera! and
how they are connected together to form the computer system.
A computer system consists of the following functional units:
(i) Input Unit.
(ii) Memory / Storage Unit.
(iii) CPU (Central Processing Unit)
Storage Unit
1.26 INTRODUCTION TO COMPUTERS
The block diagram of a computer system is shown in Fig. 1.18 depicts the working of
computer and its various functional units.
(i) Input Unit
As the computer process the data according to the instructions given to it and produces
the results. The input unit is used to feed the data as well as instructions to the computer.
The commonly used input devices are keyboard, mouse, scanner, joystick etc.
In brief, an input unit performs the following functions:
• It accepts or reads the list of data and instructions from the user.
• It converts these data and instructions in computer acceptable form.
• It supplies the converted data and instructions to the computer system for further
processing.
(ii) Memory/Storage Unit
The basic function of this unit is to store the data, instructions and final results in the
system so that it can deliver them on demand to the user or other computer units at a later
time. The data and instructions are transferred to other computer units or devices from
the main storage under the supervision of control unit. It also referred as the primary
storage.
• Primary Storage
Primary storage is a direct access storage device, consisting of a number of storage
locations. Each location in the storage has a unique number, called Storage Address. The
system assigns a unique location to each data element. Once the data is assigned to the
location, the system accesses it directly by means of the address of the particular storage
locations.
The various types of primary storages are:
(a) RAM (Random Access Memory) (b) ROM (Read Only Memory)
(c) Cache Memory (d) Virtual Memory
• Secondary Storage
The data and instructions in primary storage (RAM) are temporary in nature and they
are erased automatically as soon as the power is switched off. The secondary storage is
used to store the data permanently. The user can access the data from secondary storage
whenever required. Some commonly used secondary storage devices that are used to store
the data permanently are:
(a) Floppy Disk (c) Compact Disk
(b) Hard Disk (d) Magnetic Tape
(iii) Central Processing Unit (CPU)
CPU is considered as the “Brain of the computer”. It is also called as microprocessor.
It is the fastest and costly unit of the computer system. All major calculations and
comparisons are made inside the CPU. CPU converts all the supplied input into required
output as per the instructions supplied by the user. The performance and the speed of the
computer mainly depend upon the type of microprocessor installed in it.
Within CPU, there exists a temporary storage location known as Registers. These are
used for storage of smaller data (up to 64 bits). Registers are being used for faster data
supply to processor for processing. The number, size and capacity of register in a CPU can
INTRODUCTION TO COMPUTERS 1.27
controls all the activities of various functional units of the computer.
• It fetches (transfers) the required instructions from the main memory, interprets
them and then sends them to ALU for processing.
• It controls the execution of instructions in a sequential order.
• It works as a central nervous system for the computer. It controls the flow of data to
and from the main memory.
• It sends and receives control signals from various peripheral devices.
• It ensures that data reaches the correct place at the correct time.
In brief, control unit acts as monitor that tells the other components what to do, when to
do and how to do.
(b) ALU (Arithmetic & Logical Unit)
• The function of ALU is to perform the actual calculations in the computer. It
performs arithmetic (addition, subtraction, multiplication & division) and logical
(comparisons or decisions) calculations in the computer.
• Under the control of the control unit, the data and instructions stored in the
primary storage are transferred to ALU for processing. ALU performs the
calculations and sends intermediate and final results to the main memory i.e. no
processing is done in the primary storage unit.
• In some computer processors, the ALU is divided into two distinct parts, the AU
and the LU. The AU performs the arithmetic operations and the LU performs the
logical operations.
• ALU has internally two temporary registers into which the incoming data from
memory is loaded and then operated inside ALU.
(iv) Output Unit
During data processing, computer process the data according to the instructions
applied to it and produce the result or output. The output unit is used to provide the results
to the user. The commonly used output devices are monitor or VDU (Visual Display Unit),
printer, plotter, speakers etc.
In brief, an output unit performs the following functions:
• It accepts the results produced by the computer that are in binary form.
• It converts these binary coded results to human acceptable form.
• Finally, it supplies the converted results to the user.
• It offers ample features to analyze data using charts, graphs, year-to-year
comparisons and much more, with only the click of a button.
□□□□□
2.5
INPUT 85 OUTPUT
DEVICES
2.1 PERIPHERAL DEVICE
A peripheral device is a device attached to a host computer in order to expand its
capabilities. More specifically the term is used to describe those computer devices that are
optional in nature and are not required in principle.
Examples of some commonly used peripheral devices are Microphones, Cameras,
Scanners, CD-ROM, DVD-ROM, Pen Drive, Modem, Network Card etc. The following
section covers some of the basic peripheral devices used for input and output.
2.2 INPUT DEVICES
Input devices are those peripheral devices that are used to supply input to the computer.
An input device converts input (data and instructions) into suitable binary form that can be
accepted by the computer.
The data entered through the input devices can be text, graphical image/symbol, audio,
video etc. Depending on the form of the data the various input devices are available.
2.2.1 KEYBOARD
Typical input devices are listed below:
□ Keyboard □ Magnetic Ink Character Recognition (MICR)
□ Mouse Barcode Reader Scanner /
□ Trackball □ Image Scanner Digital
□ Joystick a Camera Microphone
□ Light Pen □ Graphic Tablet/Digitizer
□ Touch Screen □
□ Optical Mark Reader (OMR) □
• Keyboard is the most common input device used for entering text data directly into a
computer.
• A computer keyboard is similar to that of a typewriter, but it has additional keys as well.
• The most commonly available computer keyboard has 104 keys. Data is entered into a
computer by pressing a set of keys available with the keyboard.
• Keyboard is the oldest input device, which is still being used with the modern computers.
When user presses a key, the corresponding character appears on screen.
• Today, a multimedia keyboard contains various additional keys to perform functions like -
volume control, launching Internet explorer, changing song and video tracks, launching e-mail
software etc.
• Wireless keyboards are also available today, but at a higher price than wired keyboard. These
keyboards do not have any wire attached to them.
• Wireless keyboard interacts with the computer through Bluetooth or Infrared technology.
• Wireless keyboard operates on battery power rather than using electricity from the user's
computer.
Internal Microphone
F1 through F12
Scroll Lock
Key
Escape
Key
Delete, Home,
Page Up, Page
Down, End
Function
Key
Application Key
Windows Key
• When the requirements of the printed line are fulfilled, the printer carriage control I moves
the page to the next line position.
• The chain contains multiple copies of characters to increase the speed. More is | the number
of characters on the chain, lesser are the chances of full circle (' rotation of the chain, after
printing a character.
• The chain printers can print at a speed of 400 to 2500 lines per minute.
2.3.3.1.2.2 Drum Printer
• A drum printer is a type of line printer that prints by striking the paper against the inked
ribbon.
MEMORY
>
There are mainly three types of ROM:
(i) PROM (Programmable Read Only Memory)
(ii) EPROM (Erasable Programmable Read Only Memory)
(iii) EEPROM (Electrically Erasable Programmable Read Only Memory)
(i) PROM (Programmable Read Only Memory)
• It is also the read only memory like ROM. The only difference between ROM and
ig as PROM is that the instructions in ROM are designed by the manufacturer of the
3 be computer where as in PROM, the instruction are programmed by the user himself
own, according to his requirement.
• PROM is also known as one-time programmable non-volatile memory.
form
• In PROM, user can design the instructions only for once; he cannot change the
instructions later whenever required.
• The major disadvantage of PROM is that a shock of electricity can easily cause
fuses in ROM to burn out thereby corrupting the PROM.
(ii) EPROM (Erasable Programmable Read Only Memory)
shed
onds • Although, PROM is not a flexible memory, as the instructions in it cannot be
changed. EPROM is designed to overcome the drawback of PROM.
in a • In EPROM, the user can program the instructions himself according to his
ver requirement and later on, he can also erase the instructions by using Ultra-Violet
3.4 MEMO
______
(iii) EEPROM (Electrically Erasable Programmable Read Only Memory)
• It is also the read only memory and user can program /reprogram th instructions
according to his requirement, but here the instructions will b reprogrammed through
special electrical pulses.
• EEPROM such as Flash memory allow the entire ROM to be electrically erase
then written to without taking them out of the computer. 3
• In EEPROM, user can electrically erase a portion of the contents of the ROW This is
very important in situations where minor changes to the ROM content! are needed.
3.2.3 CACHE MEMORY
The processor accesses the main memory to read the instructions. The speed which the
processor executes the instructions is much faster than the speed at whidj- the instructions are
transferred from the main memory. In order to make it compatible a small very high-speed
memory is used between main memory (RAM) and processor. This
type of memory is called Cache Memory/Buffers. Some of the main
features of Cache memory are: Main Memory
(RAM)
• Cache memory is small, fast and expensive type of storage
that is placed between the CPU and the main memory.
• The CPU transfers the instructions from the cache memory
towards its processing area at the very high speed, thus it Cache
improves the processing speed. Hence, instead of every Memory
time reading from the main memory, now CPU first check
the cache memory for the required data and if CPU finds
the data there, it is called Cache Hit and if the required data
is not present in cache,
CPU then reads it from main memory. This state is called
Cache Miss.
• The advantage of cache memory is that the CPU does not Processor
have to use the motherboard’s system bus for data transfer. (CPU)
Whenever data must be passed through the system bus,
the data transfer speed slows to the motherboard’s
capability. The CPU can process data much faster by Fig. 3.3 (Cache Memory)
avoiding the bottleneck created by the system bus.
• Cache memory is random access memory (RAM) that a
computer microprocessor can access more quickly than it can access regular RAM. As
the microprocessor processes data, it looks first in the cache memory and if it finds the
data, it does not have to do the more time-consuming reading of data from larger
memory.
• Initially the cache memory is empty. When CPU access data from main memory it
places a copy of it in cache memory. This process continues for each access to main
memory. When cache memory becomes full, then the new data will be stored by
replacing some existing information using a FIFO (First In First Out) algorithm.
• Cache memory is not addressable by the user of the computer system. Its purpose is to
look ahead and to provide the CPU with currently needed information.
• Cache memory makes main memory appear to be faster and larger than it really
MEMORY 3.5
• It is very expensive as compared to the main memory and hence its size is normally very
small.
• Today, cache memory is embedded with the processor of the system and normally
processor provides up to 4MB of cache memory, but we can also upgrade the cache
memory of the system by introducing external cache memory.
3.2.4 VIRTUAL MEMORY
When the computer is to process a large amount of data, some times the size of main memory
or RAM becomes inadequate or not sufficient to store that data. To overcome this problem the
technique of virtual memory is used.
In this case, operating system approaches to the secondary storage (hard disk) and borrows
the required amount of memory from it and utilizes it as a main memory or RAM for processing
the data. This borrowed or shared memory is called virtual memory.
(Virtual Memory)
Fig. 3.4 (Virtual Memory)
When virtual memory is being used, the system allows the users to carry on working without
worrying about the availability of data storage or memory saturation. It is often addressed as
logical memory and allows users to access a larger volume of memory, allowing them to use more
applications simultaneously.
3.2.5 RAM Vs. ROM
RAM ROM
• Information stored and retrieved • Information is permanently stored.
anytime.
• Volatile storage. • Non-volatile storage.
• It is read / write memory. • It is read only memory.
• Information can be altered. • Information can not be altered.
• It is possible to randomly select and • It is not possible to randomly select and
store the information. store the information.
• Data is randomly stored and retrieved from these disks i.e. the drive can access any
portion of data directly.
• To store data on magnetic disks it should be formatted. Formatting is a process of
creating tracks and sectors on the surface of disk so that the data can be stored.
• Tracks are concentric circles and Sectors are the portions created by dividing the disks into
number of portions. These sectors are often grouped into clusters.
> Types of Magnetic Disk
On the basis of read/write mechanism, the magnetic disks are classified into two types:
(a) Floppy disk/Removable disk, (b) Hard disk/Fixed disk.
(a)Floppy Disk / Removable Disk
Floppy disk is one of the most popular data storage medium, used for permanent data
storage and data transfer before the invention of compact disks. The floppy disk was
introduced by IBM in 1972. Floppy disk basically consists of a round, flat piece of plastic,
coated with a magnetic material. The main features of a floppy disk are:
• The two principal sizes or dimensions of floppy disk are 3.5 inch and 5.25 inch.
• Floppy disks are portable i.e. we can easily carry this storage device from one place
to another for data storage.
• Floppy disks are slower to access than hard disks and
have less storage capacity.
• Data stores on a floppy disk in tracks, which is further
divided into small segments, called sectors.
• The storage capacity of a 3.5-inch floppy disk is 1.44
MB and 5.25 inch floppy disk is 1.2 MB.
• Floppy disks are reusable i.e. we can write the new
data on a floppy disk after erasing the previous one;.
• Floppy disks allowed sequential as well as random
access of data.
• Floppy disks were not very much durable. It could be
used for 3-4 times only. People used to carry same
data in multiple floppies so that in case of damage of
one floppy, the other one could be used.
• Floppy disk is sensitive to dust, temperature, moisture and other environmental
factors.
(b) Hard Disk/Fixed Disk
Hard disk is another type of magnetic disk on which we can store data and information
permanently. IBM (International Business Machine) invented hard disk in 1957.
Initially, they were called fixed disks and later they were named hard disks.
A hard disk contains a number of platters of aluminum coated with magnetic material.
Each of these platters is divided into tracks and sectors. All the platters are arranged on a
spindle. This spindle is attached to a motor that can rotate at a speed of 5600 rotations per
minute (rpm) or 7200 rpm. The main features of hard disk are:
• Hard disks hold more data than floppy disk. Its storage capacity comes in Gigabyte
(GB) and now also in Terabytes (TB). (1 TB=1024 GB)
• Hard disk stores the data permanently.
• To store data on hard disks, it should be formatted. Formatting is a process
Cover Mounting Holes
(Cover not shown)
3.8 MEMO!
creating
tracks and
sectors on the
surface of
Case
hard
Mounting disk so
Holes that
the data can 1
stored.
Ribbon Cable
(attaches
heads to Logic
Board)
• Hard disks are faster in use than floppy disks i.e. the different data operation like-
cut, copy, paste etc. are performed at a higher speed than floppy disk o any other
magnetic storage device.
• Hard disks are more reliable than floppy disks because they are generally fitter
inside the cabinet of the computer (internal hard disks), so they remaii protected
from external environmental factors like- dust, temperature etc.
• Hard disks are less portable than the floppies, although it is possible to bu;
removable hard disks. A removable hard disk is enclosed in a plastic box, so tha
they can be removed like floppy disk.
• Hard disks generally offer quicker access to data than floppy disks.
• Hard disks offer very low cost of data storage. Today, we can purchase a 500 GI
hard disk for around 1800 rupees.
• A hard drive needs to be periodically defragmented, where the computer re
organizes all of what is written on the drive surface for optimized performance.
MEMORY
anaon
OPERATING SYSTEM
server to manage data, users, groups, security, applications, and othej networking
functions.
• NOS are based on a client/server architecture in which a server enables multipit
clients to share data and resources.
• It allows remote users to connect to a network.
• It monitors the status and functionality of network elements.
• The most popular network operating systems are Microsoft Windows Serve: 2003,
Microsoft Windows Server 2008, UNIX, Linux and Novell NetWare.
Advantages:
• It is highly stable because of Centralized servers.
• It maintains security and integrity of user programs and data.
• New hardware and technology can be easily integrated into the system.
• Remote access to servers is possible from different locations and types of systems.
Disadvantages:
• It is expensive because of high cost of buying and running a server.
• Dependency on a central location for most operations.
• Regular maintenance and updates are required.
11. Real Time operating system
• A Real Time operating System is an operating system that has been developed for
real-time applications.
• It responds to input instantly.
• Real time operating systems are designed to handle events as they occur.
• Real-time operating systems are commonly found and used in Robotics.
• General-purpose operating systems, such as DOS and UNIX, are not real-time
because they can take a few seconds, or even minutes, to react. “Lynx” is an example
of a real time operating system.
Advantages:
• It is easy to design and develop.
• It offers maximum consumption of the system.
• It relatively requires less memory space.
• It is bugs-free in performing tasks.
Disadvantages:
• It perform limited task and hence cannot be used for general purpose.
• It is expensive as it requires a lot of system resources.
• It uses complex algorithm.
12. Distributed operating system
• The development of networked computers that can be linked and communicate with
each other, gave rise to distributed computing.
• A distributed operating system manages a group of independent computers and
makes them appear to be a single computer.
• Distributed computations are carried out on more than one computer.
• A distributed system may have more total computing power than a mainframe.
OPERATING SYSTEM 4.7
Advantages:
• Computation distribution over several processors offers high performance.
• It is reliable i.e. One machine’s failure need not bring down the system.
• Computers and software can be added incrementally.
• Aggregates computing power.
• It offers better utilization of resources.
• It facilitates human-to-human communication.
• Speedup the exchange of data with one another.
• Reduction of delays in data processing.
Disadvantages:
• It is very difficult to maintain.
• It is much more complex to setup.
• It is difficult to maintain security and integrity of user programs and data.
• It requires special software to be able to recover networking problems such as lost
messages and congestion etc which make system overloaded.
13. Online processing operating system
• In online processing operating system, the processing is performed under the direct
control of the CPU while at the same time the user remains in communication with
the computer.
• Time sharing is an example of online processing. As there is direct contact with the
CPU, so access and retrieval of record are quick and direct.
• The systems which employ online processing need high capacity memory, so that user
data, operating system elements and programs can be store and accessed quickly.
Moreover, as simultaneous access is there so proper security provisions are necessary
to prevent any unauthorized access.
14. Batch processing operating system
• In earlier computers, the users didn’t interact directly with the system, instead, a user
prepared a job, which consisted of program, data, and some control information about
the nature of the job and submit it to the computer operator.
• The operating system of such a computer had the function to transfer the control from
one job to another.
• Batch processing operating systems are ideal in situations where: o
There are large amounts of data to be processed.
o Similar data needs to be processed, o Similar processing is
involved when executing the data.
• Batch processing is also known as serial, sequential, off line, or stacked job processing. It is
the most appropriate method of processing for many types of applications such as
payroll or preparation of customer statements where it is not necessary to update
information (records) on daily basis.
Advantages
• It increases overall performance as a new job gets started on completion of previous
job without human intervention.
• It is efficient because these systems use very little computer processing time to
Disadvantages
• It is difficult to provide the desired priority scheduling.
• Lack of interaction between the user and hence job could enter an infinite loop
• It is difficult to debug program.
• Due to lack of protection scheme, one batch job can affect pending jobs.
4.3 DOS-AN OVERVIEW
DOS is a “Disk Operating System” used for operating the disks, developed by Microsoft
Corporation in 1981 with name as MS-DOS version 1.0. But in practice, DOS does more than
just operate the disks. It enables the user to organize data files, load and execute program
files, and control the input and output devices attached to the computer.
DOS is a program comprising set of executable instructions, loaded into the memory
(RAM) of user’s personal computer before execution of any application. It creates an interface
between system’s hardware and software.
DOS is a single user and single tasking operating system, which provides character user
interface/ text-based interface. That means the user interacts with this operating system by
using set of character/text-based commands. DOS provides a prompt screen for the user
(Command prompt/Dos prompt- like: C:\> or A:\>), where the user can type in commands from
the keyboard. The flashing underscore next to the command prompt is called the cursor. The
cursor shows where the command user type will appear. The system is entirely case
insensitive, i.e. user can type the command either in uppercase or lowercase letters. Through
the commands provided by DOS, we can perform tasks like file and directoiy management,
disk management, hardware configuration and memory management etc. MS-DOS
commands are written in simple English language and
• It provides DATE and TIME commands to modify the system’s date and time as per
user requirements.
• DOS allows users to retrieve a deleted file, using UNDELETE command.
• DOS allows users to perform a sequence of tasks automatically, when the system is
booted. This is done by using a DOS-based file called “autoexec.bat”.
• DOS supports a full screen text editor to easily create and edit text files. User can open
this text editor by using EDIT command of DOS.
• DOS enables users to view the memory status of computer system by using MEM
command. It displays the amount of used and free memory of the system.
• DOSKEY command of DOS, recalls the previously typed commands that can be edited.
This way, time required to retype commands is saved.
• The DIR command of DOS helps to show a list of all files, directories or subdirectories
present in the system or a particular directory.
• The TREE command of DOS helps to show a graphical representation of all files,
directories or sub-directories present in the system or a particular directory.
• DOS enables users to set different attributes/properties on files with ATTRIB
command.
• The system’s settings can be changed by making appropriate changes in CONFIG.SYS
file.
DOS enables users to retrieve data from a formatted disk by using UNFORMAT
command.
By using pipe symbol (|), user can execute more than one command simultaneously.
Thus it reduces the command’s typing time.
DOS provides DISKCOPY command to copy the complete contents of a disk into some
another disk.
DOS allows users to find a particular text/string from a specific file by using FIND
command.
A special utility of DOS called HIMEN.SYS automatically tests system memory on
startup.
Microsoft Defragmenter, a powerful utility of DOS can optimize hard disk’s storage
space by combining small unused areas between files to form a big unused area, which
can be further used for storage purpose.
4.3.2 Structure of DOS
DOS has tree like structure. All the directories are
created under root directory of drive, i.e. the root directoiy is
at the topmost level. The directories further contain sub
directories and files and the sub-directories can also further
contain directories and files in them.
The address from root directoiy to a particular file or
directory is called Path.
Example: C:\Course\BTech\pl.txt
The above example depicts a path to file “pl.txt”, which is
is(DOS
Fig. 4.3 present under root
Directory
directoiy of C: drive (\). The following figure shows the above directoiy
Structure) structure:
present under a sub-directory “BTech”, which is present
under a directory “Course”. The directory “Course”
4.10 OPERATING SYSTE
This means, every computer application store data values in the form of a file. Or computer
file can store only one kind of information. The file that store text or words et is called text file
or document file, whereas the database is stored in a database file.
File Naming Conventions in DOS:
DOS uses the concept of files to organize data on disk. To remember the physic; layout of
each file, DOS expects each file to be named. File naming conventions are th rules that must
be followed in order to create a file in DOS. Following rules should t followed while creating a
file in DOS:
• File name has two parts: Primary name and Secondary name, separated by period (.)
symbol. The primary name is mandatory while the secondary name : optional.
• Primary name can be of 1-8 characters in length and secondary name if specifier can have
3 characters at the most.
• The name of the file must start with a letter. That means first character cannr be a
number or symbol.
• It cannot contain “, /, \, :, + and = symbols.
• It cannot contain spaces.
4.4.2 Directory
A directory is, in general, an approach to organizing information, the most familis
example being a telephone directory.
In computer systems, the information is stored in the form of files. When a organization
uses computer to perform their day-to-day work, they create files and th number of files
increases with each single working day. Some mechanism is required t organize these files on
the disk. DOS offers a smart way to organize files i.e. Directory. directory is just a name given
to a logical area on the disk, which acts like a cabine having different drawers for different
types of files.
Like filename, the directory name can also have up to 8 alphanumeric characters
Directories can be created by the user or by an application. The directory is furthe divided into
three parts:
(a) Current directory
(b) Sub directory
(c) Root directory
(a) Current directory
The directory in which user is currently working.
(b) Sub directory
A directory exists within another directory, is called sub directory. This is also calld a
child directory.
(c) Root directory
It is represented by (\). It is the starting point from which all other directorie branch out.
In computer system, every drive has a root directory.
Example:
__________________________ C:\COURSES\BCA\BCAl > ________________________
Here, “C” is the drive, “ \ ” is the root directory, “COURSES” is the first director created
under root directory, “BCA” is the sub-directory of “COURSES” and “BCA1” i the current
working directory or sub-directory of “BCA”.
OPERATING SYSTEM 4.11
memory (RAM). The booting process starts from the moment, when we power on the computer
and continues till the moment, the computer is ready for use. In case of DOS, booting process
starts when we start the computer and continues till the DOS prompt is displayed. Each
operating system has a different booting process.
The booting process of DOS, mainly deals with loading the three main system files of DOS
into the memory. These files are IO.SYS, MSDOS.SYS and COMMAND.COM.
In the booting process of DOS, following steps are performed when we start a computer:
(i) Once the computer system is turned on, the BIOS (Basic Input/Output System)
perform a series of activities or functionality test on the programs stored in the ROM, called
Power on Self Test (POST) that checks to see whether the peripherals in the system are in
perfect order or not.
(ii) After the BIOS is done with the pre-boot activities or functionality test, it reads the
bootable sequence from CMOS (Common Metal Oxide Semiconductor) and looks for the
master boot record in the first physical sector of the bootable disk as per the boot device
sequence specified in the CMOS. For example, if the boot device sequence is-
(a) Floppy Disk, (b) Hard Disk, fc) CDROM.
Then the master boot record will be searched first in floppy disk drive. If not found, then
the hard disk drive will be searched for the master boot record. But, if the master boot record
is not even present in hard disk, then CDROM drive will be searched. If the system is not able
to read the master boot record from any of these sources, ROM displays a message “No Boot
device found” and the system is halted.
On finding the master boot record from a particular bootable disk drive, the operating
system loader, also called the Bootstrap loader is loaded from the boot sector of that bootable
drive into the memory. A bootstrap loader is a special program that is present in the boot
sector of the bootable drive.
DOS operating system comprises of the following files:
(a) IO.SYS (b) MSDOS.SYS (c) COMMAND.COM (d) CONFIG.SYS (e) AUTOEXEC.BAT
Note that the first three files are mandatory while the rest two are optional. Further, the
first three files should be present in the bootable drive of the disk and in the same sequence as
shown above for the operating system to function properly. If any of these three files are not
found, then the message, “Non-system disk or disk error - Replace and press any key when ready”
is displayed in the console, else the boot process continues.
(iii) The Bootstrap loader first loads the IO.SYS file. The IO.SYS file as the name
suggests, is responsible for Input-Output in the DOS environment. The next file that is loaded
is the MSDOS.SYS, which is the core file of the DOS operating system. The MSDOS.SYS file
is mainly responsible for memory management and processor management in the DOS
environment.
(iv)The MSDOS.SYS file now searches to find the name of the command interpreter in the
CONFIG. SYS file and when it finds one, it loads the same into the memory. If no command
interpreter is specified in the CONFIG.SYS file, the COMMAND.COM file is loaded as it is
the default command interpreter of DOS Operating system. We can load different command
interpreter by specifying the following in the CONFIG.SYS file:
Command = C:\TEST.COM
Here, TEST.COM is a command interpreter that would be used
at
interpreter in lie of the default command interpreter COMMAND.C^
(v) The last file to be loaded and executed is the AUTOEXEC.B.
sequence of DOS commands. Now, the prompt is displayed and letter of ° disk
4.12
o DEL: This command is used to delete files from the computer, o REN: This command is
used to rename files and directories from the original name to a new name.
o COPY: This command allows the user to copy one or more files to an alternate location.
o PROMPT: This command allows the user to change the MS-DOS prompt or command
prompt to display more or less information, o MD: This command creates a new directory
or subdirectory on the disk, under the current working directory.
o CD: This command is used to switch directories in MS-DOS i.e. it changes the control
from one directory to another directory, o RD: RD (Remove Directory) command removes
empty directories in MS-DOS. To delete directories with files or directories within them,
the user must use the DELTREE command.
o PATH: This command is used to provide access to files located in other directory or other
disk. User can access only those files that have extension .exe or .com or .bat. By
setting the path to these executable files, user can execute them from any location of
the system.
In MS-DOS, Wildcard characters are used to group number of files at one time. These
are the symbols used to replace or represent one or more characters. Wildcards can be
used with the DIR command, COPY command and the DEL command. Wildcards cannot
be used with the TYPE command. Two kinds of wildcard characters are used in DOS:
(i) The *** wildcard (ii) The *?’ wildcard
(i) The **’ wildcard
**’ is such a wildcard character that replaces a set of characters, it depends on the
position of the name where the **’ is used. For example, the user wants to list only those
files having the extension as .COM let the primary name be anything, the command DIR
*.COM can be used which might show the directory listing of all those files that have the
extension as COM, let the primary name be anything.
(ii) The'?’ wildcard
The *?’ is the second wildcard character that replaces one character at a time. For
example, the user wants to list all the files with the second character of the file name as
‘U’and rest of the characters can be anything, the command DIR ?U*.* can be used.
Example:
C:\>DEL *.DOC
(The above command will delete every file with the .DOC extension from the root
directory (\) of C: drive.)
C:\>DELD:\BCA\*.*
(This is the fastest way to clean out a directory. The above command will delete every
file in the directory D:\BCA.)
C:\>COPY AB9.TXT D:
(The above command will copy any file with a three-letter name, of which the first two
letters will be AB’ and with a .TXT extension to the D: drive.)
C:\>DIR *.EXE
(The above command will display the list of all files exist under root directory (\) of C:
drive with extension .EXE”.)
C:\>DIR A*.DOC
(The above command will display the list of all fries primary name beginning with A’
exists under root directory (\) of C: drive with extension .DOC.)
C:\>DIR *.?S?
(The above command will display the list of all files exist under root directory (\) of C:
drive with second character of the extension name as ‘S’.
C:\>DIR *.?S?
(The above command will display the list of all files exist under root directory (\) of C:
drive with second character of the extension name as ‘S’.)
4.16 OPERATING SYST
h
4.8 VIRUS & HACKERS
4.8.1 VIRUS
Virus (Vital Information Resource Under Seize) is a malicious program or piece of coon that
is loaded onto your computer without your knowledge and runs against yope wishes. A
computer virus might corrupt or delete data on a computer. Viruses can aim replicate
themselves. Even such a simple virus is dangerous because it will quickly us.J all available
memory and bring the system to a halt. An even more dangerous type virus is one capable of
transmitting itself across networks and bypassing securif systems. 31
Other source of virus entrance in the system is different types of networking cards that
are used for communicational purposes such as LAN card, modem etc. When we activate the
internet through these cards, some web pages that are coded for these infections are straightly
spread the virus in the computer hardware and the system become corrupted. Different types
of E-mails are also responsible for the activation of the virus in your systems.
(b) Working
When these viruses enter the system, they can directly move towards the hidden areas in
the system that is far from the vision of the users. In addition, when we open some kind of files
or different types of documentation related to these viruses, the virus could infect the system,
destroy its major components of working and completely slows down the progress of the
system. After this virus can replicate and copy itself into the system and installs its major
infected components in the memory of the computer. Moreover, due to this infection and
installation, whole data on the drives will lose and the operating system destroys.
> TYPES OF VIRUSES
Based on the working and the ability of doing infection, viruses are categorized into
several types such as:
(i) Resident Virus
A type of virus that infects the whole memory area of the RAM is called as resident virus.
(ii) Boot Virus
Boot virus is the type of virus that spread the virus in the bootable part of the hard drive.
(iii) Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or
folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH.
This batch file is always located in the root directory of the hard disk and carries out
certain operations when the computer is booted.
(iv) Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in
the files that it infects, rendering them partially or totally useless once they have been
infected. The only way to clean a file infected by an overwrite virus is to delete the file
completely, thus losing the original content.
(iv) Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a
program (file with the extension .EXE or .COM) which has been infected by a virus, you
are unknowingly running the virus program, while the original file and program have
been previously moved by the virus. Once infected, it becomes impossible to locate the
original files.
(v) File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM
extension). When one of these programs is run, directly or indirectly, the virus is
activated, producing the damaging effects it is programmed to cany out. The majority of
existing viruses belongs to this category, and can be classified depending on the actions
that they carry out.
4.18 OPERATING SYSTEM QPE
computer. This type of vims attack can be especially dangerous, by preventing access to
certain sections of the disk where important files are stored. Damagi caused can result in
information losses from individual files or even entire directories.
(vii) Worms
A worm is a program very similar to a virus. It has the ability to self-replicate, and can
lead to negative effects on your system and most importantly they are detected and
eliminated by antivirus.
(viii) Trojans or Trojan Horses
A Trojan horse is a malicious software program that hides inside other programs. It
enters a computer hidden inside a legal or valid program, such as a screen saver, Then 4.8
it puts code into the operating system that enables a hacker to access the infected
computer. Trojan horses do not usually spread by themselves. They are; spread by en1
viruses, worms, or downloaded software.
(ix) Spyware coi
Spyware can install on your computer without your knowledge. These programs car!
change your computer’s configuration or collect advertising data and personal un
information. Spyware can track internet search habits and can also redirect your web
browser to a different website than you intend to go to. un
> VIRUS DETECTION PREVENTION AND CURE
The vims programs should be completely removed from the computer so as to ensure the
proper functioning of the computer. Today, various companies have designed; various
antivirus programs which perform the following function;
(i) Vims Detection
(ii) Virus Prevention
(iii) Control the virus
(iv) Remove the vims
(i) Virus Detection
If a virus program is present in your computer the antivirus program when loaded checks
whether it is present or not. It further checks which part of the disk is infected by it.
These detectors alert the users with the presence of virus. A message! is displayed on the
screen telling the user that system is being infected by the vims or not.
(ii) Virus Prevention
Once the vims is detected it should be stopped to replicate itself. Moreover the vims,
which is already present should also be removed. Some steps to prevent your computer
from viruses: c;
• Maintain a strict security level for browsing the internet. ir
• Never download data from unfamiliar websites. t(
• Scan your computer thoroughly on a regular basis. >
• Do not open any suspicious or unfamiliar E-mail.
• Set strong passwords so that vims could not guess the password and break the! F
security settings of your computer.
• Update your antivirus program online on regular basis.
• Scan external storage devices like Pen drive thoroughly before to attach with I your e
computer. ii
(iii) Control the Virus
EM OPERATING SYSTEM 4.19
ntin loaded, the antivirus keeps a copy of boot sector information, FAT’s etc. and stops the
applications to execute when the virus tries to replicate itself. Thus, no further damage
mage is caused. Whenever a virus activates, antivirus stops it from spreading and generates a
ntir message whenever it is found. So, it is good to install an antivirus program as early as
possible.
(iv) Remove the Virus
nd The antivirus programs remove the virus from the system.
cte 4.8.2 HACKERS
In reference to a system’s security, hacking is usually defined as the act of illegally
entering a computer system, and making unauthorized changes to the files and data
s. It contain within.
aver Hacking is a technique used to destroy the security of a system. It is an unauthorized use
s of computer and network resources.
e y Hacker is a person with technical expertise, who uses computers to gain unauthorized
re access to data.
Hackers usually attack computer systems to-
can • obtain company’s confidential data.
onal • steal credit card numbers.
our • steal passwords of other systems.
• steal programs or files.
• read others e-mails.
Following are the main symptoms that show your system has been hacked:
s to • If the data files disappear or are modified unexpectedly on your system.
ned
• Strange files appear or grow in size unexpectedly.
• Hard disk space shrinks without any reason.
• Programs stop working unexpectedly.
• Strange messages or dialog boxes appear on the screen.
• The computer starts crashing frequently.
• Your interent connection slows dramatically for a long period.
If you are accessing the internet without properly securing your computer, hackers can
ded gain illegal access to your files-often without your knowledge. So, the most important step
k is to consider if you think your system’s security has been compromised is to disconnect all
age the connections to the internet.
rus > Types of Hackers
(i) Novices: Novice hackers are the hackers having very little technical knowledge. For
these people, hacking is fun. This type of hacking does not show more effect.
iru (ii) Students: These people think that hacking is fashion to youth. Usually, they enter
into unauthorized sites and leave some messages. They try to find out as much information
our as possible about the systems they hack.
(iii) Tourists: These people have strong mathematical abilities and good knowledge
about computers, which allow them to hack any system. When they do hack a system and
find nothing that is interesting, they tend to log off. This type of hacker may not respect the
systems as much as the student hackers. For tourists, systems are meant to be broken into,
not studied. This is the reason that their involvement with a system ends after they break
4.20 OPERATING SYSTEM O
profit. To get access to systems, thieves may opt to blackmail or bribery to get the
information needed to break into computer systems.
4.9 CRYPTOGRAPHY AND CRYPTOLOGY
Cryptography (or cryptology) is a technique of secret writing especially code and cipher
systems, method of storing and transmitting data in a particular form so that only those for
whom it is intended can read and process it. The term is most often; associated with
scrambling plaintext (ordinary text, sometimes referred to as cleartexf into ciphertext (a
process called encryption), then back again (known as decryption).
The main objectives of cryptography are: f
(a) Confidentiality: To ensure that the information is not read by anyone for whom ^ it
was unintended and is read only by authorized parties.
(b) Integrity: To ensure that the information wasn’t altered in storage or transit
between sender and intended receiver.
(c) Non-repudiation: To ensure that the sender of the information cannot deny at a
later stage his or her intentions in the creation or transmission of thej
information.
(d) Authentication: To ensure that the sender and receiver can confirm each others'
identity and the origin/destination of the information.
As the Internet and other forms of electronic communication become more prevalent,
electronic security is becoming increasingly important. Cryptography is used to protect
e-mail messages, credit card information, and corporate data.
There are two basic types of cryptographic systems:
1. Public Key Cryptography/Asymmetric Cryptography
2. Private Key Cryptography/Symmetric Cryptography
(1) Public-key Cryptography
Public-key cryptography, also known as asymmetric cryptography is a class of
cryptographic system that uses two keys - a public key and a private key. A public key is
known to everyone while private (or secret key) is known only to the recipient of the message.
The term “asymmetric” stems from the use of these two keys to perform these opposite
functions. The public and private keys are related in such a way that only the public key can
be used to encrypt messages and only the corresponding private key can) be used to decrypt
them. The public key encrypt plaintext or to verify a digital signature;! whereas the private
key decrypt ciphertext or to create a digital signature.
Public key exchange
a
Sender
Plainte
xt
Encrypt
Decryp
Recipient
ttJP
Sender Encrypt Decrypt Recipient
\
Same key is used to encrypt
and decrypt message
4.22 OPERATING SYSTEfl
Private-key encryption shown in Figure 4.5 involves the following steps:
1. The sender creates a ciphertext message by encrypting the plaintext message with a
symmetric encryption algorithm and a shared key.
2. The sender sends the ciphertext message to the recipient.
3. The recipient deciypts the ciphertext message back into plaintext with a sharei key.
Implementations of symmetric-key encryption can be highly efficient, so that user do not
experience any significant time delay as a result of the encryption and decryption
Symmetric-key encryption also provides a degree of authentication, since informatioi
encrypted with one symmetric key cannot be decrypted with any other symmetric kej Thus, as
long as the symmetric key is kept secret by the two parties using it to encryp communications,
each party can be sure that it is communicating with the other as Ion as the decrypted
messages continue to make sense.
Symmetric-key encryption is effective only if the symmetric key is kept secret by th two
parties involved. If anyone else discovers the key, it affects both confidentiality am
authentication. A person with an unauthorized symmetric key not only can decryp messages
sent with that key, but can encrypt new messages and send them as if the; came from one of
the two parties who were originally using the key.
□□□□□
5.1 WINDOWS - AN INTRODUCTION
Earlier operating systems like MS-DOS provides a text based or character based interface to
the user. User is shown a command prompt, like C :\> in MS-DOS. At this command prompt,
user is required to type the command and press Enter key. After the Enter key is pressed
operating system comes to know that user has finished its input and the OS starts processing
on the input. Every statement typed at the prompt should be a valid command understood by
the operating system. Some commands require specific parameters to be given with them
through which the operating system understands more about how the command is to be
carried out.
This approach of user interface has some drawbacks with it. The drawbacks can be
summarized:
• If the command typed at the prompt is misspelled, operating system does not recognize
the command and thus no work is carried out. The whole command with the
parameters, if required, has to be typed again.
• If the command is wrong, misspelled, short of required parameters, then the operating
system responds with a cryptic error message. These error messages are short in
length and it is sometimes difficult to understand the error and solve the problem.
• In a text based interface, if the user has given a command, at the command prompt and
has pressed enter key, there is no way he can change the command after that . Further,
there is no easier way to go back and correct errors.
As the text based interface is facing some problems, as discussed above, there is need to
change the interface. It is a well-known fact that picture says more than thousand words, so
this ability can be used to implement a good user interface. Many modem operating systems
provide this type of interface which is commonly known as Graphical user interface (GUI). In
graphical user interface there is no need of a prompt to be shown to the user, every command
that is to be run, is depicted with a diagram known as icon. To trap the abilities of this type of
interface various devices have been developed which help in giving commands to the operating
system. These devices include pointing devices like mouse, which shows an arrow like cursor
using which you can select or execute the required command.
Windows is a family of operating systems developed by Microsoft Corporation for personal
computers. The name Windows comes from the basic function of the operating system, it lets
the user look into computer, just like looking through a window. WINDOWS provides a
graphical user interface (GUI) based package designed to make computer intuitive and easy to
use. Windows comes in various versions like Windows 95, Windows 98, Windows 2000,
Windows XP, Windows Vista, Windows 7 & Windows 8.
Earlier versions of Windows like Windows 2.0, Windows 3.0, Windows 3.1, and Windows
3.11 were not operating systems in themselves; they were just an extension of DOS (Text
based operating system developed by Microsoft). These versions just provide a graphical shell
5.2 WINDOW
Why Windows is popular?
Some reasons why Windows is becoming popular day by day around the world:
• It is an easy-to-use, consistent GUI for virtually all programs.
• It is capable of multitasking i.e. running several programs simultaneously.
• With Windows you can communicate and exchange data between prograi without
transferring or copying files.
• Because file and disk management activities are heavily used in day to day c of
computers, Windows help you by not letting you to close and open prograi or use
DOS commands to do standard file and disk-maintenance tasks.
• Windows can run application that offer high-quality output.
• Many utility programs are included with Windows, such as word process
(WordPad) and a drawing program (Paint Brush).
• Another good point about Windows is that it has a consistent user interface,
program’s user interface is how you tell the program what you want to do. In t
earlier years of MS-DOS, users had to learn a different method to interact wi
every program. Now Windows programs have a consistent (same) interface, tl
means if a user is comfortable with one Windows application, then he/she c learn
the new application easily.
5.1.1 Features of Windows Operating System
Windows operating system comprises the following features which makes it us
friendly and the most commonly used operating system:
• Windows operating system is a GUI (Graphical User Interface) system. All t
applications can be accessed efficiently with very high speed by simply clicki at
their respective graphical symbols (Icons).
• It is capable of multitasking, i.e. it can execute more than one ta simultaneously.
• Various operations like: creating, deleting, copying files and folders can be do:
easily by just clicking on the graphical icons.
• It runs each program or application in its own separate window. So, if at a: point
the numbers of screens are open, and then user can easily switch betwei
windows.
• The feature of ‘Control Panel’ in windows helps the user to manipulate tl various
hardware and software components of the computer system. You a easily add any
kind of new software and hardware devices to your system.
• Windows operating system also supports multimedia application program which
help us to play songs, movies and animations etc.
• The screensaver feature protects your computer’s screen from burning when it
not being used over for a long period.
• It has a special disk compression programs that help the user to store the da in
hard disk in a compressed format, which result in saving a lot of disk space.
• Windows supports powerful Plug-n-Play feature. This means, user can direct
attach the peripheral device to the computer and windows automatically detec
and installs required device drivers for the device.
• Windows enables user to have file names up to 255 characters long, which w;
limited to 8 characters in MS-DOS.
• Windows automatically checks and repairs hard disk of computer through i
scandisk utility, when it is started after an improper shutdown.
WINDOWS 5.3
• Live tiles: Some apps use live tiles, which let you see information without even clicking
on the app. For example, the Weather app displays the current weather on its tile, and
you can click on it to see more details.
5.4 WINDOWS
• Start menu has been replaced: The Start menu was an important feature in earlier
versions of Windows, but it has been replaced with the Start screen. You can use the
Start screen to open programs or search your computer.
• Improved security: Windows 8 has a built-in antivirus program called Windows
Defender, which can also protect you from other types of malware such as spyware. The
built-in Windows Store also helps to keep you and your computer safe by showing you
what information each app will have access to. For example, some apps have access to
your location, so if you're uncomfortable sharing your location you can decide not to
download those apps.
• Improved Search: One of the best things about Windows-8 is the improved search
tool, which is able to find what you need quickly and easily. This enhanced search
feature resembles the “auto-complete” function that is a familiar tool in Microsoft
Word. The moment a user starts to type a word in the search field, Windows-8 will list
items that match the typed characters.
5.3 STARTING WINDOWS 8
When you turn on your computer, Windows starts automatically, but you may have to
navigate the sign-on screen along the way. To prevent other people from using your computer
without your authorization, Windows requires you to set up a username and password. You
supply this information the very first time you start your computer, when Windows takes you
through a series of configuration steps. Each time you start your computer, Windows presents
the sign-on screen, and you must enter your username and password to continue.
To Sign into Windows 8:
• Turn on your computer. After a few seconds, the Windows Lock screen appears.
• Click anywhere on the lock screen to unlock the computer.
OR
• Press Enter.
• The Windows sign-in screen appears.
Charms Bar
1^0 Devices: This shows any hardware devices that are connected to your
computer, such as printers or monitors.
E3 Settings: This lets you access general settings for your computer, as well as
settings for the app you're currently viewing. For example, if you're in Internet
Explorer, you can go to the Settings charm to access your Internet Options.
birthday
.
Birthday Party planning
mMi BirthdayBackground
— ------------- ~:
birthday Wishes
birthday cards
If the app is not free, tap Buy, instead, and then tap Confirm.
• Windows 8 installs the app.
5.6 ICONS
The small pictures on the desktop are called icons. One type of icon is an object icon.
Examples of object icons are Computer, Recycle Bin, and Internet Explorer. These icons allow
us to open files and programs on your computer.
5.12 WINDOWS
Shortcut icons allow us to open an application quickly. These icons appear on your1
desktop and with little arrow in the left corner. Desktop shortcuts or Shortcut icons are links
to files and programs. You can add or delete shortcuts without affecting the programs on
your computer.
Microsoft Word
Fig. 5.16 (Shortcut
Icon) To
open a program using an icon:
• Place mouse over the icon.
• Text appears identifying its name or contents. «
Then, double-click the icon.
5.7 CONTROL PANEL
Control Panel is a part of the Microsoft Windows, which allows users to view and
manipulate basic system settings and controls, such as adding hardware, adding and
removing software, controlling user accounts, and changing accessibility options.
Control Panel is full of specialized tools that are used to change the way Windows looks
and behaves. Some of these tools help you to adjust settings that make your computer more
fun to use. For example, Use Mouse to replace standard mouse pointers with animated icons
that move on your screen, or Use Sounds and Audio Devices to replace standard system
sounds with sounds you choose.
To open the Control Panel:
• From the Desktop view, hover the mouse in the lower-right corner to access the
Charms bar, then select Settings.
WINDOWS 5.13
> Uses of Control Panel
• Setting display properties such as wallpaper, screensaver and color settings.
• Setting keyboard properties character repeat rate.
• Setting mouse properties like speed of movement and double click.
• Setting multimedia properties like selecting the type of speakers.
• Adding new hardware to computer.
• Adding or Removing programs / softwares in windows.
• Specifying the regional settings like time zone.
• Managing different user settings.
5.8 SHUT DOWN WINDOWS
When you complete your work, you should shut down Windows. However, you do not
want to just shut off your computer’s power. Instead, you should follow the proper steps to
avoid damaging files on your system.
Shutting off the computer’s power without properly exiting Windows can cause two
problems. First, you may lose unsaved changes in open documents. Second, you could
damage one or more Windows system files, which could make your system unstable.
To Shut down Windows:
• Shut down all your running programs.
• Position, the mouse pointer in the upper-right or the lower-right corner of the
9HHHI
5.14
• Click the Power button (fSl). WINDOWS
• Click Shut down. Windows shuts down and turns off your computer.
5.9 RESTART WINDOWS
You can restart Windows, which means that it shuts down and starts up again
immediately. This is useful if your computer is running slowly. Sometimes a restart solves
the problem.
To Restart Windows:
• Shut down all your running programs.
• Position the mouse pointer in the upper-right or the lower-right corner of the
screen to display the Charms menu and
then click Settings.
eptemher 9
2:57
I “I “m2
• The Settings pane
appears.
WINDOWS ; 5.15
_____
file htm or html: HTML file (web page) ppt: PowerPoint presentation file mdb:
Access database file
Windows stores files on your hard drive using special storage areas called folders, k
folder is a location on your hard drive that contains one or more related files. You can also
store folders within folders, and these nested folders are known as subfolders.
In Windows 8, to work with the files and folders on your computer, you'll use the File
Explorer app. In File Explorer, you can navigate to different folders, open files, delete files,
and more.
To view a File:
• Click the File Explorer icon on the taskbar, or double-click any
folder on your desktop. A File Explorer window will open.
NPOWS WINDOW 5.17
ations. Double-click the folder you want to view. Windows displays the contents of the
ou can folder, including subfolders.
rogram If the files you want to view are stored in a subfolder, double-click the subfolder.
ated on Windows displays the contents of the subfolder, rename
To a File:
ype of
Locate the file.
cle Bin,
Right-click the file icon.
>n your
Choose Rename.
The filename is highlighted in blue, ready to be retyped.
Type a new name and press Enter.
ed in a The file is renamed, delete a File:
erating To Select the file which you want to delete.
Right-click the on the file-icon.
ven a Choose Delete.
e. The A Confirm File Delete dialog box appears asking user
whether he/she surely wants to send the file to the
Recycle Bin.
Choose Yes.
The file is moved to the Recycle Bin. If you change your
mind, you can move the file back to its original location. If
you're sure you want to permanently delete the file, you will need to empty the
Recycle Bin. copy a File:
Open the folder containing the file you want to copy.
To
ers. A
Select the file.
u can Click the Home tab and Click Copy.
OR
se the Right-click the file icon and Choose Copy from the pop-up menu. Windows
files, places a copy of the file in a special memory location called the Clipboard.
Open the location you want to use to store the copied file.
Click the Home tab and then Click Paste.
OR
your
Right-click the folder icon in which you want to paste the copied file and Choose
Paste from the pop-up menu, rename a Folder:
Select the folder.
Right-click on the folder icon.
To Choose Rename.
The folder name is highlighted in blue, ready to be retyped.
Type a new name and press Enter, delete a Folder:
Select the folder.
Right-click on the folder icon.
Choose Delete.
To A Confirm Folder Delete dialog box appears asking user whether he/she
5.18 WINDO)
5.12 DRIVE
A drive, or disk drive, is hardware on which user can store files and folders. Di drives
are assigned a letter.
• Hard drive (the drive inside your computer) is known as the (C:) drive.
• Floppy disk drive is known as the (A:) drive.
• If your computer has a CD ROM drive, it is usually called (D:) drive.
Note: Every drive in your computer has a root directory or folder, which i: represented by
a symbol ‘V (Back Slash).
5.13 MY COMPUTER^
My Computer or Computer is a section of Microsoft Windows operating system tb was
introduced with the release of Microsoft Windows 95 and included with all versio; of
Windows after that.
Although the name of “My Computer” has changed to “Computer” in Windows 8, b the
default icon still acts the same as My Computer.
WINDOWS
5.13.1 Uses of My Computer
• My Computer allow the users to explore the contents of their computer drives,
whether it is hard drive, floppy drive, CDROM drive or even Pen drive.
• It is a tool that you can use to manage files and folders. With this tool, you can
create, rename and move folders and copy, print, move, delete and rename files.
• It also allows you to gain access to other system tools.
5.14 RECYCLE BIN
Sometimes files and folders can litter your computer. Recycle Bin, the desktop icon that
resembles a wastebasket, is a place where you put a file or folder if you want to delete it.
Open the Recycle Bin anytime and see what's inside by double-clicking the Recycle Bin
icon located on the desktop or using Windows Explorer.
Inside, you will see a listing of deleted items.
To Open the Recycle Bin window:
• Double-click the Recycle Bin icon on the desktop.
• Recycle Bin window will open. Fig. 5.24 (Recycle Bin Icon)
5.20 WINDO
Element
Quick Access Toolbar Title Bar
MS-WORD 6.3
Microsoft Office The Microsoft Office Backstage View: appears in all Office 2010
Backstage View programs and isolates common file commands on a single screen so you
can see all your options at once. It replaces the traditional File menu in
older versions of Office and the Office Button in Office 2007.
The Quick Access Toolbar is a customizable toolbar that contains a set
Quick Access Toolbar of commonly used commands, such as Save, Undo, and Repeat. Title Bar
contains the name of the open file, the program name and the sizing
Title Bar buttons.
Ribbon is a combination of menu bar and tool bar. The Ribbon is designed
Ribbon to help you quickly find the commands that you need to complete a
task. Commands are organized in logical groups, which
MS-WORD 6.4
are collected together under different tabs. Each tab relates to a
type of activity, such as writing or laying out a page.
Microsoft Office Help Opens the Help window for Office program.
Button
Workspace Displays the file you are working on (Word document, Excel
workbook, Access database, or PowerPoint slide.) This is the place
where you perform all of the functions associated with your office
program.
Status Bar Provides information about the program, open file, or current task
as well as the view shortcuts and zoom controls.
Zoom Controls Magnify or shrink the contents displayed in the workspace.
6.3 WORD PROCESSING
Word processing enables the users to create and edit documents. To perform word
processing, we need a computer, a special program called a word processor and a printer. A
word processor enables us to create a document, store it electronically on a disk, display it on
a screen, modify it by entering commands and characters from the keyboard, and print it on
a printer. The most popular examples of word processors are MS-Word, WordPad and
Notepad.
The great advantage or benefits of word processing over using a typewriter are that we
can make changes without retyping the entire document. If we make a typing mistake, we
simply back up the cursor and correct our mistake. If we want to delete a paragraph, we
simply remove it, without leaving a trace. It is equally easy to insert a word, sentence, or
paragraph in the middle of a document. Word processors also make it easy to move sections
of text from one place to another within a document, or between documents. When we have
made all the changes we want, we can send the file to a printer to get a hardcopy.
6.3.1 Features of Word Processing
Word processing supports the following basic features that enable user to manipulate
and format documents in more sophisticated ways:
(a) WYSIWYG (what you see is what you get): With WYSIWYG, a document appears on
the display screen exactly as it will look when printed
(b) Insert text: Allows user to insert text anywhere in the document.
(c) Delete text: Allows user to erase characters, words, lines, or pages as easily as we
can cross them out on paper.
(d) Cut and paste: Allows user to remove (cut) a section of text from one place in a
document and insert (paste) it somewhere else.
(e) Copy: Allows user to duplicate a section of text.
(f) Page size and margins: Allows user to define various page sizes and margins,
and the word processor will automatically readjust the text so that it fits.
(g) Search and replace: Allows user to direct the word processor to search for a
particular word or phrase. We can also direct the word processor to replace one
group of characters with another everywhere that the first group appears.
(h) Word wrap: The word processor automatically moves to the next line when we
have filled one line with text, and it will readjust text if we change the margins.
(i) Print: Allows user to send a document to a printer to get hardcopy.
(j) Font specifications: Allows user to change fonts within a document.
(k) Graphics: Allows user to embed illustrations and graphs into a document.
(l) Headers, footers, and page numbering: Allows user to specify customized
6.4 _____________________________________________________ MS-WORD
(m) Spell checker: A utility that allows us to check the spelling of words. It will
highlight any words that it does not recognize.
6.3.2 Applications of Word Processing
Word Processing has a variety of uses and applications within the business world, home,
and education.
• Businesses organizations have a tendency to have their own format and style for any
documents produced. In business, word processing is used for producing business
letters, applications, memos, reference documents etc.
• In the home, word processing tends to be educational, planning or business related,
dealing with assignments or work being completed at home, like- writing short
stories, letter writing, resume creation and so on.
• In education, word processing is used in a variety of different ways in the production
of assignments, notes, exams, and for practicing its uses.
6.4 MICROSOFT WORD
Microsoft Word is the powerful word processing application software in the Microsoft
Office Suite. It allows you to create a variety of professional-looking documents such as
letters, brochures, and more. It enables you to store a document electronically on a disk,
display it on a screen, modify it by entering commands and characters from the keyboard,
and print it on a printer.
It was initially launched in 1983 under the name Multi-Tool Word and has since been
revised numerous times. Microsoft Word is available on both Windows and Macintosh
operating systems. Microsoft Word is often called simply Word or MS Word.
Microsoft released Word 2010 (included in Office 2010) on June 15, 2010 and this time
Microsoft has definitely done a massive makeover. Microsoft has redesigned the way you
interact with the program and has redefined the underlying document format.
Word 2010 lets you easily create professional-looking documents using various themes,
visual designs, formatting tools, and sharing features. It allows you to create various types of
documents such as letters, papers, flyers, and faxes.
6.4.1 Features of Word 2010
Word 2010 helps people create professional-looking documents by presenting a
comprehensive set of writing tools in a new user interface. It supports the following
important features that enable user to manipulate and format documents in more stylish
ways:
• New User Interface: The Microsoft Office Backstage View is a new component of
Word 2010. It appears in all Office 2010 programs and isolates common file
commands on a single screen so you can see all your options at once. It replaces the
traditional File menu in older versions of Office and the Office Button in Office 2007.
• Create Professional-Looking Documents Effortlessly: Word 2010 provides
editing and reviewing tools that help you create professional documents more easily
than ever before.
• Communicate more effectively with high-impact graphics: New charting and
diagramming features that include 3-D shapes, transparency, drop shadows, and
other effects help you create professional-looking graphics that result in more
effective documents.
• Built-in Table Styles: Tables are a great way to present information. In Word
MS-WORD 6.5
individual result. The improved Navigation Pane provides you a visual outline of your
document so you can browse, sort and find what you need.
• Co-authoring in real-time: Word 2010 redefines the way people can work together
on a document. With co-authoring, you can edit papers and share ideas with others at
the same time. SharePoint Foundation Services or a Windows Live account is
required.
• Share documents: Word 2010 lets 3rou post your documents online and then access,
view, and edit them from almost any computer or your Windows phone.
• Image Editing: New picture-editing tools in Word 2010 enable you to add special
picture effects without additional photo-editing software. You can easily adjust
pictures with color saturation and temperature controls. You also get improved tools
for easier and more precise cropping and image correction.
• Recover lost draft: After working on that document for awhile, did you accidentally
close it without saving? Worry not. Word 2010 lets you recover draft versions of
recently edited files as easily as opening any file, even if you never saved the
document.
• Word translation: Word 2010 helps you work and communicate across different
languages. It translates a word, phrase, or document more easily than before. You can
set separate language settings for ScreenTips, Help content, and displays.
6.5 STARTING MICROSOFT WORD 2010
To start Microsoft Word 2010 from the Start Menu:
• Click on the Start button, point to All Programs then click on Microsoft Office and
click on Microsoft Word 2010.
• This will launch Microsoft Word 2010 application and the first screen that you will see
a new blank page document.
Following is the basic window which you get when you start word application:
6.6 MS-WORI
Let us understand the various important elements of this window:
• File Tab: The File tab replaces the Office button from Word 2007. You can clic it to
check Backstage view, which is the place to come when you need to open c save files,
create new documents, print a document, and do other file-relate operations.
• Quick Access Toolbar: The Quick Access Toolbar you will find just above th File tab
and its purpose is to provide a convenient place for the Word mos frequently used
commands. You can customize this toolbar based on you comfort.
• Ribbon: Ribbon contains commands organized in three components:
(i) Tabs: Tabs appear across the top of the Ribbon and contain groups ( related
commands. Home, Insert and Page Layout are the examples ( ribbon tabs.
(ii) Groups: Groups organize related command. Each group name appear below the
group on the Ribbon. For example: Group of commands relate to fonts (Font
group) or group of commands related to alignmer (Paragraph group) etc.
(iii) Commands: Commands appear within each group as mentioned abov< For
example: Bold, Italic and Underline are the commands appear unde Font group of
Home tab.
• Title bar: Title bar lies at the top of the window. It shows the program an document
titles.
• Rulers: Word has two rulers - a horizontal ruler and a vertical ruler. Th horizontal ruler
appears just beneath the Ribbon and is used to set margins an tab stops. The vertical
ruler appears on the left edge of the Word window and i used to measure the vertical
position of the elements on the page.
• Help: The Help Icon can be used to get word related help anytime you like. Thi provides
tutorial on various subjects related to word.
• Zoom Control: Zoom control lets you zoom in for a closer look at your text. Th zoom
control consists of a slider that you can slide left or right to zoom in or ou + and - buttons
you can click to increase or decrease the zoom factor.
• View Buttons: The group of five buttons located to the left of the Zoom contro near the
bottom of the screen, lets you switch among Word's various documer views.
(i) Print Layout view: This displays pages exactly as they will appear whe printed.
(ii) Full Screen Reading view: This gives a full screen look of the document.
(iii) Web Layout view: This shows how a document appears when viewed by Web
browser, such as Internet Explorer.
(iv) Outline view: Outline view divides a document into sections defined b headings
and text. A heading represents a main idea. Text contains one c more paragraphs
that are attached to a particular heading.
(v) Draft view: This displays the document without top or bottom pag margins,
where page breaks appear as dotted lines. For example, header and footers are
not shown.
• Document Area: Document area is the area where you type. The flashin vertical bar is
called the insertion point and it represents the location where te> will appear when you
type.
MS-WORD __________________ ___________________ ___________________ 6.7
• Status Bar: This displays document information as well as the insertion point
location. From left to right, this bar contains the total number of pages and words in
the document, language etc.
• Dialog Box Launcher: This appears as very small arrow in the lower-right comer of
many groups on the Ribbon. Clicking this button opens a dialog box or task pane that
provides more options about the group.
6.6 BACKSTAGE VIEW
One major change in Office 2010 is the Microsoft Office Backstage View, which replaces the
traditional File menu in older versions of Office and the Office Button in Office 2007.
The backstage view helps in creating new documents, saving and opening documents,
printing and sharing documents, and so on. However, instead of just a menu it is a full- page
view, which makes it easier to work with.
The backstage view screen works under three panes:
(i) The left pane of the Backstage View lists common commands for creating, saving,
or printing your file.
(ii) The middle pane typically displays additional options you can choose for the
command selected in the left pane.
(iii) The right pane displays additional details about your file.
Si y *9 - <9 i - Document! - Microsoft Word CD ® 231
.... " 1
Li Save
Information about Document! j - , * - VL . "'***“ EM § 1
*
f'" " . -
- g£r Open
M Close ...... |
Protect
Permissions
Anyone can open, cep% and change any part of
this
document.
L
Properties "
J
Info 4 fSidt saved
1 : Document ^ Size
yi
Pages 1
Recent Words S SI
;
i Prepare for Sharing Total Editing Time 2 Minute
New Before sharing this file, be aware Title Add a title |
that it contains: Tags Add a tag
Print Check f or m Document properties and Comments Add
Issues author’s name
Related; Dates
Save & Send
Last Modified fsfeve?
Help Versions Created To day, 535
ifyl There are no previous versions of this file. Last Printed Mever
ill Options
Manage
IS Ex* 1 Versions'9' Related; People
Author PICS
«"! ' m 71 TH
Fig. 6.3 (Backstage View Screen)
To use the Backstage View, follow these basic steps:
1. Click the File tab, located in the upper-left comer of the Word Ribbon to display
the Backstage View. You can also open the Backstage View by pressing Alt+F.
2. Select a command in the left pane to view your options in the middle pane.
3. Select an option in the middle pane.
The various commands available on the File tab include:
Note: Sometimes when you select a command in the left pane (such as the Save
command), you won’t see any further options in the middle or right panes. Likewise,
sometimes when you select an option in the middle pane, you won’t see any additional
information displayed in the right pane.
Note: To exit the Backstage View, click the File tab again or press Esc button on the
keyboard.
equivalent to the Save As command.
• Save As: Save the current file under a new name and/or in a different file format.
• Open: Loads an existing file.
• Close: Closes an open file but keeps the Office 2010 program (Word) running.
• Info: Displays the information about the current file.
• Recent: Displays a list of files that you recently loaded.
• New: Creates a new file.
• Print: Prints the current file.
MS-WORD 6.9
• Save & Send: This option will save an opened document and will display options to
send the document using email etc.
• Help: ^ 'ou can use this option to get required help about Word 2010.
• Options: Allows you to set various options related to Word 2010.
• Exit: Closes any open files (documents) and exits the program (Word).
6.7 RIBBON SYSTEM
In Word 2010, menu bar and toolbar have been replaced by the tabbed Ribbon system.
Ribbon is a combination of menu bar and tool bar. The Ribbon is designed to help you quickly
find the commands that you need to complete a task. Commands are organized in logical
groups, which are collected together under tabs.
rue HI -tome Insert Page Layout References Mailings Review' E Wev» ©I
(ft j
Editing
e; Calibri (Body) - 11 r •— - - V-- tF =F B I U -afee X. X < » « * ■ hi fa
Paste .... Quick Change i
- xjr : A* A'
A.- A* A’ ': ffl- zl sr Styles - Styles- j
Clipboard Font 1 Paragraph . * | Styles fit ;
Groups under Tab 4-—1
\A
B
Bold.
EL Italics.
u- Underline (the arrow will give you line options).
I
Am Strikethrough. j
x, Subscript.
X Superscript. |
■i Left align.
Center align.
W-
■I Right align.
Justify.
Line spacing.
INI
i
&
Change
Styles -
0 More style options.
Editing
Find T Find text in the document.
f3C Replace text in document.
Replace
^ Select - Item selection options (Select All, Select Objects, and
Select Text with Similar Formatting).
Table
Illustrations
Insert a picture from a file.
-
Links
Hyperlink Insert a hyperlink to a website.
W’ f] & Orientation ’ ^
*=» “=* l3 Size - m*
Themes .—. Margins _______
» |0]T . 11 Columns v i>?'» 2 Watermark - Indent Spacing ^ Page Color - it O' C ; 0 pt :
rheums Arrange
i!j Page Borders ; gS O' * JJ lOpt *
Page Background ; Paragraph r; j.
Fig. 6.9 (Page Layout Tab in the Ribbon)
Icon Description
Themes
== Columns T
Split the page into columns.
^ Breaks r Set page & section breaks.
Page Background
Set watermark.
J] Watermark T
v*] Page Color - Set page background color.
£2 Page Borders Set page borders.
Paragraph
Change left and right indentation.
Indent
w o- :
t* o- :
Spacing Change the spacing before and after the paragraph.
IS 0 pt :
:s o pt :
1
Position
Jj| Bring to Bring selected object to front of all other objects.
H up-
Frani
Send selected object to back of all other objects.
Send to Back w
Text
Wrapping •1 Set how the text will wrap around the object.
Icon
Table of Contents
Create a table of contents.
Table of
lontents
[_£j* Add Text Add text that will show in the table of contents.
Update the table of contents to show the correct page
Update Table numbers.
Footnotes
Add a footnote.
AB1
Insert
Footnote
Add an endnote.
.ji] Insert Endnote
Navigate to the next footnote (the arrow allows you other
footnote and endnote navigation).
J Show Notes p Scroll the document to show the location of footnotes and
endnotes.
13 More footnote and endnote options.
Citations & Bibliography
Add a citation.
£ insert
Citation -
Captions
j Add a caption to an image.
aaj^j
insert
Caption
jjJ Insert Table of Figures Insert a table of all figures in the document.
Update the table of figures to include all entries.
c Match
m ] Match the source fields to the Word defined fields.
i-
Fields
JIUpdate Labels [
£} recipient data.
Navigate through the recipient list in the preview.
Preview Results
Search for a specific recipient for previewing.
Specify how to handle errors.
Finish
Preview
Results
^j!| Find
Recipient |
Auto Check for Errors
Complete the mail
merge.
Finish
&
Merge Review
> - Tab
■BT '—~ -------------------------------------------------------------------------------------------------------------------------------------------------------------------f§|—B ---------I -------------- 77R55
X i i , Home Insert Page Layout References Mailings Review View &
5 a Translate Language 1 Show Markup- ^ § Track _ Accept .... Changes - H Compare Block Restrict
Reviewing Pane - .
VV Authors Editing
language
Tracking Changes Compare Protect
Fig. 6.12 (Review Tab in the Ribbon)
Icon Description
Proofling
Check the document for spelling and grammar errors.
Spelli
ng 8
Gram
mar
Si Research Open research task pane (dictionary, encyclopedia, and
translation service.)
Thesaurus Suggest words similar to the highlighted word.
1
ABC Word count.
iHI 1
MS-WORD 6.17
Comments
□ Create a new comment.
New
Comme
nt
•22 1 Delete comment(s).
tl
Navigate to the previous comment.
Navigate to the next comment.
I Tracking
Track all changes made to the document (the arrow gives
you tracking options and user name change).
J*
Track
Changes -
Choose how to show revisions in the document.
Qa
Balloons
r
:
‘ §b Final Showing Markup »J
Choose how to view the proposed changes to the document.
■,Sl Reviewing Pane -1 Show revisions in a separate window (the arrow gives you
pane options).
Changes
Accept the current change and move to the next proposed
change (the arrow gives you acceptance options).
Accept
5^ Reject the current change and move to the next proposed
Reject m§:;
change (the arrow gives you rejection options).
Zoom
100%
IB 0lie Page Zoom the document to fit one page in the window.
jj Two Pages Zoom the document to fit two pages in the window.
5 Arrange All Tile all open windows side-by-side on the screen.
3 Split
I Split the current window in 2 parts to view 2 sections of the
document at the same time.
Macro
e
View the list of macros (the arrow gives you the option to
view, record, or pause macros).
Macros
MS-WORD 6.19
6.8 CREATING A NEW DOCUMENT
Word files are called Documents. When you start a new project in Word, you'll need to
create a new document, which can either be blank or from a template.
Each time you create a new document, you have the option of choosing different types of
templates that are already formatted and designed for specific purposes, such as a calendar,
newsletter, sales report, or corporate slide show presentation, as shown in Figure 6.14(a).
To create a new document, follow these steps:
1. Click the File tab.
The Backstage View appears.
2. Click New.
A list of templates appears (see Figure 6.14(a)).
3. Double-click the template you want to use.
Word 2010 creates a new document based on your chosen template.
llgl; ?bs| ~ $3 j,~ Document! - Microsoft Ward e=i ED 22
Avatfiaifeie
Jlk
H
Fig. 6.14 (a) (Creating a New Document - Using Templates)
OR
Fig. 6.14 (b) (Creating a New Document - Using New Button)
OR
5. Press Ctrl + N key combination from the keyboard.
6.9 INSERING TEXT
Once you have created a new word document, you can type or insert the text that you
want to appear in your document. The insertion point (also called a cursor) is the blinking
line that indicates where text will be inserted when you begin typing.
To move the insertion point:
• Use your mouse to move your insertion point anywhere within the file. Move your
mouse until the I-beam is where you want your insertion point and click.
• Use your keyboard's arrow keys to move your insertion point up, down, left, or right.
These movements will move your insertion point one space or line at a time. This
method is especially useful if you only need to move a few spaces or line back in a
file to make a correction.
• Hold the Ctrl key (Control key) and press up or down arrow keys to jump up or
down a paragraph at a time.
• Press Pg Up/Pg Down to jump up/down the document one page at a time.
6.9.1 Inserting File
If you want to insert text from another file or A 3 111 ’ H Signature
document into the document that you are working on, then Line »
Text
you have to perform the following steps: Box'* Word Art - OH Date
& Time Object...
1. First of all, open the file or document in which A, K jJ Text from
H Dfep Cap Object! ” 1
you want to insert the text. fHe;..
2. Now, move the insertion point at that position Fig. 6.15 (Inserting Text from File)
where you want to insert the text.
3. On the Insert tab, in the Text group, click the arrow next to Object, and then
click Text from File.
References Mailings
New
Print
Help
Once you are done with typing in your new word document, it is time to save your
document to avoid losing work you have done on a Word document.
Saving a file stores all your data permanently on a hard disk or other storage device.
Following are the steps to save a word document:
1. Click the File tab and select Save As option.
File tab Save As
6.24 ____________________________________________ MS-WO
6.12.1 Saving New Changes
2. A Save As dialog box appears, as shown in Figure 6.20.
which you want to give to your document and click on Save button.
There may be a situation when you open an existing document and edit it partially or
completely, or even you would like to save the changes in between editing of the document.
If you want to save this document with the same name then you can use either of the
following simple options:
(a) Press Ctrl + S keys to save the changes.
(b) Click on the floppy icon available at the top left comer and just above the File tab.
(c) Use the Save option available just above the Save As option under File tab.
If your document is new and it was never saved so far, then with any of the three
options, word would display you a dialogue box to let you select a folder, and enter
document name as explained earlier. ________________ __________ ________________ i
Note:
♦ Choose Save As to rename a document. Be careful not to overwrite your original
file.
♦ _ Save periodically when you are working in an application. Losing information is
____ never fun. You can quickly save by using the quick- key combination Ctrl + S.
6.12.2 Saving a document for older versions
In Word 2010, by default the document file will be saved with extension .docx. If you
need to share your document files with people using older versions of Microsoft Word, then
you need to save your files in a different file format known as 97-2003, such as Word 97-2003
document This special 97-2003 file format saves Office 2010 files so that previous versions of
Microsoft Office 97/2000/XP/2003 can open and edit your files.
When you save your files in the 97-2003 format, Word 2010 saves your files with a
three-letter file extension, like .doc.
When you save your files in the Word 2010 format, it saves your files with a fo letter file
extension, such as .docx.
MS-WORD 6.25
2 .
Click Save & Send.
The middle pane displays different options.
3. Click Change File Type under the File Types category.
A list of different formats appears, as shown in Figure 6.21.
4.
«- a • Document! - Microsoft Word - © S3
Borne Insert Layout References Mailings Review View
... e
y Change File Type
!§t Save Document File Types
As ^ Open Send Using
ament
H Document
x
M a°se
E-mail Up Save Uses the Word Dec umem format >■
a
Info
Recent
to Web 'fVcrd 97- 2003 Document
Uses lire- Wood 9/-S7S3-
gjj-’j OpanDocument
Bbcarimiformat ••
Text
New Sa'.etoSharePomt
i
rj; Publish as Blog Post File
Parting point hi new documents
Types
Other File Types
tel cb.n3efMt.pe
Pfam Text
:
c»'t jms onh- the text »n your document
Help 1 Create PDF/XPS Document
“j Options
• Left-click the font color you wish to use. The font color will change in the document.
To Use the Bold, Italic, and Underline Commands:
• Select the text you wish to modify.
• Click the Bold, Italic, or Underline command in the Font group on the
To Home tab.
Center- aligned
Center test: All selected items (text , numbers and inline objects) the
aligned in the center, leaving space on both sides.
This text is centered. Each line of text is centered between the margins.
Centered of text is very useful for aligning text in document titles,
advertisements, or flyers.
Right-aligned
Right-align text: All selected items (text, numbers and inline objects) are aligned to
the right hand margin with a ragged left edge. This text is right- aligned. Notice how
each line is a different length.
Right-aligned text can be useful in some situations, such as cdumns or numbers, but
it can also be very distracting to use for text.
Justified
Justified text: All selected items (test, numbers and inline
objects) are aligned to both the left and right margins. Justifying
text gives the selected items a straight edge margin on both the
right and left sides.
The text is justified. Although justified text looks neat and tidy,
the extra spaces between words can get distracting in long
paragraphs. Books, however always used justified margins, _____
6.30 MS-WC
Fig 6.29 (Find and Replace Dialog Box)
• Type a word, phrase or format in the Find what: box.
• Click Find Next to start the search.
• Word will jump to the first instance of that word and will highlight the word.
• Continue Clicking the Find Next button to find all other instances of that word.
Using Replace:
• Type the word, phrase or format in the Replace With: box that will replace what is
in the Find what: box.
• Click Replace.
• Click Replace All to replace every occurrence of the selected text with the
replacement text.
• Click Find Next to bypass it and find the next.
• Click Cancel to quit.
Note: You can perform a more detailed search by clicking the More button on the Find
and Replace dialog box. __________________________________________________________
6.16 TEMPLATES
A template is a pre-designed document that you can use to create new documents with
the same formatting. With a template, many of the big document design decisions such as
margin size, font style and size, and spacing are predetermined.
6.16.1 Create a New Document with a Template
To Insert a Template:
1. Click the File tab to go to Backstage view.
2. Select New. The New Document pane appears.
3. Click Sample templates to choose a built-in template, or select an OfIice.com
~ j|
‘a<je
,L^ 1 2. 1
Picture Clip Shapes
reak Table SmartA Art
5x5 Table
nnnnnnn
□□□□□□
nnnnnn
□□□□□□
rannnnn
□□□□BnDDDD
□□□□□□□□□□
□□□□□□□□□□
~3 insert Table...
Elf f Draw Table-
I € mwe rt Text 1© fable,..
MS-WORD 6.33
• Drag the intended table columns and rows from the table grid.
For example, 5X5 tables. The table will Insert .
automatically insert into the document.
To Insert a Table (method 2) Sal si &*
la foie | Picture Clip: Shapes Sms
• Click the Insert tab of the Ribbon.
• In the Table group, click the
Table icon. •Insert Table
□□□□□□□□□□
• From the drop-down list displayed, □□□□□□□□□□
click the Insert Table command. □□□□□□□□□□
□□□□□□□□□□
□□□□□□□□□□
□□□□□□□□□□
□□□□□□□□□□
□□□□□□□□□□
H Insert Table,,.
m Draw Table
Table size
Number of columns: $
Number of rows: 2
Cancel
the table.
• Click OK. □□□□□□□□□□ □□□□□□□□□□ □□□□□□□□□□
• Click on Draw Table from the list of options. Word changes to Print Layout view
(if you are not already in that view) and changes the mouse pointer so it looks like a
pencil.
• Use the mouse pointer to define the outside borders of your table, much as you
would draw in a drawing program.
• Use the pencil to draw the columns and rows into the table.
• Press Esc when you are done.
6.17.2 To Convert Existing Text to a Table
• Select the text you wish to convert.
• Select the Insert tab.
• Click the Table command.
• Select Convert Text to Table from the menu.
Home Insert I Page layout Ref erences
□□□□□□□□□□
□□□□□□□□□□
m Insert Table...
window
Separate text at O
Olabs ©Other: Q
MS-WORD 6.35
Paragraphs 0 Commas
6.36 MS-WORD
• Click OK. The text appears in a table.
6.17.3 To Add a Row Above an Existing Row
• Place the insertion point in a row below the location you wish to add a row.
if Salesperson insertion point H in fiRST
Current Salespeople & Monthly Art Sate (Print, TV, We b) «*w w w* " «5da iww
row ABOVE It i
j taM. $10,252 $25,560
| B®ttt W. $5,550 $13.4/0 $27,800
Imp-
! Alecs.
$8,547
$13,570
$17,555
$6,7®9
$8,907
$10,239
niece
nee
neck
nicer
Ignore
Ignore AH
Add to Dictionary
AutoCorrect ►
Language ►
V Spelling...
SX Lookup...
& 04
fit! copy I
Paste |
g| gage Margins *
. Current k) Plain -
P it Page Numbers...
jU’ Format l d i! hides
Fig. 6.51 (Header and Footer: Start at option) To edit header and footer:
6.42 MS-WORD
Click the Insert tab, and click either Header button or Footer button whatever you want
to edit. Assume you are going to edit Header, so when you click Header button it will
display a list of options including Edit Header option.
MS-WORD 6.43
• Just click on it and word will display editable header
for you as shown in Figure 6.53.
Editable Header Close Head sr and Footer
S *1
Home fcitrt Ptgt layout
,
\JJ- ' % j !§» *-3$**“ 2 |
( ,;4 f&StOr* '™!‘ ■ ^ tf* : 1
§ . .. ^ • i | M 9*8* " r, fe* m' * ^ & fivMm „ ;
1 & r»&tt ’• f ana i «>**>» 1
mmm ? Paaiar i
asa.
f<k.V 5 * .
I
Word Train
mg Document!
||i bn th® imarx tab, the galterhss, incised® item* B
look of your document. can u&e g* H cover and other
tn-fd to with S'--* ■ » iU^rlm to imasn tskgtm.,, footes
document bwl(&ng hi fm diagrams they ateo coordinate
ymt $fmm pk-imm# o- *
with your cur
* ..................................... -. ..................................
5*L*y -ft?*; S* LSA ..«*»<» . .SSB ■ - *• ■■ -.. ........................................ >
Note: Press Tab or Shift Tab to change levels (or click the Decrease Indent =r_ and
Increase Indent =£" buttons). _______________________
6.21 FORMAT PAINTER
The format painter in Microsoft word is a handy feature for formatting text. It allows you
to copy formatting that is applied to one piece of text and apply it to others.
For example, if you have formatting a paragraph heading with a certain font face size,
and style and you want to format another heading the same way, you do not need to
manually add each attribute to the new headline. Instead, use the Format Painter by
following these steps:
• Place the cursor within the text that contains the formatting you want to copy.
• Click on Home Tab -> Clipboard -> Format Painter. Notice that your pointer
now has a paintbrush beside it.
MS-WORD 6.43
•
The format painter brush will then follow your cursor around, letting you know that
it’s active. To apply the formatting, select the second line of text. When you release
the mouse, the formatting is applied and the format painter tool is turned off again.
Note:
/
Double click on the format painter button to apply the same formatting to multiple
pieces of text in the document.
/ To turn off the format painter, press escape key or click the format painter button
again.
6.22 MACRO
In Microsoft Word, you can automate frequently used tasks by creating and running I
macros. A macro is a series of commands and instructions that you group together as a
single command to accomplish a task automatically. By creating a macro based on a
repetitive task, you have the ability to perform the task in one button click or a keyboard
shortcut.
Typical uses for macros are:
1. To speed up your workflow.
2. To reduce the chance of making mistakes when performing the steps.
3. To simplify your tasks.
4. To speed up routine editing and formatting.
5. To combine multiple commands — for example, to insert a table with a specific size
and borders, and with a specific number of rows and columns.
6. To automate a complex series of tasks.
6.22.1 Record a Macro:
1. In the View tab, choose Macros -^Record Macro.
The Record Macro dialog box appears.
instructions on how to perform this type of merge, refer to Creating Mail Merge
Labels.
■ Directory: allows you to gather varied but related information into a list such
as a collection of lists regarding department directory, can includes list names,
phone numbers, etc.
Step 3: Choosing the Recipients
• From the Mailings tab, in the Start Mail Merge group, click on Select Recipients
icon and from the menu appear, select the desired options to select recipients:
• You can browse through the documents for the other entries by clicking the
Previous or Next button.
Step 6: Completing the Mail Merge
The last step to complete the merge is to accept the preview of how the merge will look
and direct Word to perform the merge. You can print the merged documents or, prior to
printing, you can edit individual documents.
6.24 CHANGE CASE
Have you ever realized after typing a long paragraph that you accidentally left the Caps
Lock on and all your letters are in Upper Case?
Fortunately, you will not have to re-type the text to correct this mistake. Microsoft
Word offers a quick solution to change the case of your text i.e. the use of Change Case option.
Changing the case of text in a Microsoft Word 2010 document is a breeze.
To change the case of a text:
• Select the text you want to change.
• Click Home Tab -> Font -> Change Case.
Calibri (Body) - ill -1: - )—
\m\m a
B I U - at*
X,
Hr A jl A‘ \ O
A*-
^ ’
Font A
Sentence case.
lowercase
UPPERCASE
JOGGLE CASE
Fig. 6.60 (Change Case)
Five options are available:
• Sentence case - A sentence case is the case where first character of every sentence
is capitalized.
• Lowercase - A lowercase is the case where every word of a sentence is in lowercase.
• UPPERCASE - An uppercase is the case where every word of a sentence is in
uppercase.
• Capitalize Each Word: A capitalize case is the case where every first character of
every selected word is in capital.
• Toggle Case - Toggle operation will change the case of every character in reverse
way. A capital character will become lower case and lower case character will
become upper case.
6.25 UNDO AND REDO
> UNDO-Ctrl+ Z
The Undo command lets you “undo” or delete the last ■ change made to your document.
If you make a change or mistake that you do not want or did not mean to do, you can
MS-WORD 6.47
To undo an action, do one or more of the following:
• Click Undo on the Quick Access Toolbar.
Undo Typing (Ctrl + Z)
• Set the Bookmark name. After you name it click the Add button.
6.27 SYMBOLS AND DATES
9
Microsoft word allows you to insert special characters or symbols in your document that
are not on your keyboard such as copyright symbols, trademark symbols etc. The types of
symbols and characters that you can insert depend on the font that you choose. To insert a
symbol:
• Click where you want to insert the symbol.
• On the Insert tab, in the Symbols group, click Symbol.
£> Sjmbo' *
e £ ¥ ©
<
%
TM ± * >
* X CD M- a
y
3 n Q i—t
©
O Mere Symbols...
Fig. 6.63 (Adding
Symbols)
• Do one of the following:
o Click the symbol that you want in the drop-down list.
o If the symbol that you want to insert is not in the list, click More Symbols. In the
Font box, click the font that you want, click the symbol that you want to insert, and
then click Insert, o Click Close.
. To insert a special character:
Click where you want to insert the special character.
On the Insert tab, in the Symbols group, click Symbol, and then click More
Symbols.
Click the Special Characters tab.
MS-WORD 6.49
• Click the character that you want to insert, and then click Insert.
• Click Close.
• On the Insert tab, in the Text group, click Date and Time.
8 Quick Parts - Signature Line v fl Equation y
<41 WordArt ’ ||| Date & Time O Spnbolv
Move down and click Print in the menu. This will bring up the Print dialog box.
jwl ’ 1 ' , UfNflTjS [Compatibility Mo.de.) - .Microsoft... o i
Save
Printer
Printer Properties
Settings
P rint All Pages
Print the entire document
Pages:
Print
Depending on your printer options, you can choose other printing features suet as
whether you want to print all pages or only certain pages. You can alsc change the
orientation of the print from portrait to landscape and tell youi computer and
printer whether you’re printing on a certain size of paper. You! also see, on the right,
a preview of your printed document will look like.
When you are satisfied with your settings, then click Print. The document wil now
start printing on your printer.
6.29 SHORT CUT KEYS
MS-WORD 6.51
Name box
Citiferi * 11 ““ S; ai‘
^ |«tasert- !— : j H £ T Aar ML
ill . n i a • A* k K BE 3B . General * gj. Wm
Delete * * j jp Format*
E*A- ip He 1- % *.0M Sorts, Fmd& Filter*
\*Jr\ Giptmti r* font r, Mfljnwent . tfalllMf ■ « CeBs Select - Editing
Note: You can also make changes to and delete text from the formula bar. Just
select the cell and place your insertion point in the formula bar.
• Press the Delete key to delete the entire contents of a cell.
7.10 MOVING AROUND THE WORKSHEET
Excel provides a number of ways to move around a sheet using the mouse and the
keyboard.
To Move through a Worksheet Using the Mouse:
• You can easily move the insertion point by clicking in your text anywhere on the
screen. Sometime if sheet is big then you can not see a place where you want to
move. In such situation you would have to use the scroll bars.
• You can also scroll your worksheet by rolling your mouse wheel, which is . ''
equivalent to clicking the up-arrow or down-arrow buttons in the scroll bar.
To Move through a Worksheet Using the Keyboard:
• Press the Tab key to move to the right of the selected cell.
• Press the Shift key and then the Tab key to move to the left of the selected cell.
• Use the Page Up and Page Down keys to navigate the worksheet.
• Use the arrow keys.
7.11 SAVING A WORKBOOK
Once you are done with typing in your new excel sheet, it is time to save your
sheet/workbook to avoid losing work you have done on an Excel sheet.
o File
Select
tab Save
SaveifAsthe file has already been named.
But suppose that you want to start another new worksheet while you are working on
another worksheet, or you closed already opened worksheet and want to start a new
worksheet.
To Create a new Worksheet:
• Right Click the Sheet Name and select Insert option.
12
RigM Click mslum name
13
14 Click on insert option to add new
m
16: I1
K«>
w Sheet 1 . short <« ?g.: \ ; *H
......?.
feMffii
7.10 ■ MS-EXC
4p CC<J&
% grated
Sheets
Tab&idr
t
Fig. 7.12 (Create a new worksheet)
• Now you will see the Insert dialog box with select Worksheet option
as selected from the General tab. Click Ok button.
1i
*
i*/ u - _-
Clpboftf# » ^ Font ra [ jp
Fig. 7.16 (Formatting Text in a Worksheet: Bold or Italic)
Note: You can select entire columns and rows, or specific cells. To select the entire
column, just left-click the column heading and the entire column will appear as
selected. To select specific cells, just left-click a cell and drag your mouse to select the
other cells. Then, release the mouse button. _______________________________________
To
Format Text as Underlined:
Select the cell or cells you want to format.
Click the drop-down arrow next to the Underline command.
Select the Single Underline or Double Underline option.
A- A'; i
--I 1
Underline
E [\goubje Underline fj
Fig. 7.17 (Formatting Text in a Worksheet: Single Underline or Double Underline)
To Change the Font Style
• Select the cell or cells you want to format.
• Left-click the drop-down arrow next to the Font Style box on the Home tab.
• Select a font style from the list.
'* Agency fB E
1 S Albertus MT t
2 & Albertus MT Lt
if .......... % ALfiEBIAtf
* & Antique Olive Compact
j ..... .... : & Antique Olive Roman
Fig. 7.18 (Formatting Text in a Worksheet: Change Font Style)
Note: As you move over the font list, the Live Preview feature previews the font for you in
the spreadsheet. _______________________________________________________________ _
To Change the Font Size:
• Select the cell or cells you want to format.
• Left-click the drop-down arrow next to the Font Size box on the Home tab.
• Select a font size from the list.
iXCEL 7.13
To Change the Text Color:
' Select the cell or cells you want to format.
' Left-click the drop-down arrow next to the Text Color command. A color palette will
appear.
» Select a color from the palette.
In many worksheets that you create, users will enter data to get the desired calculations
and results. Ensuring valid data entiy is an important task. You may want to restrict data
entry to a certain range of dates, limit choices by using a list, or make sure that only positive
whole numbers are entered. Providing immediate help to instruct users and clear messages
when invalid data is entered is also essential to make the data entry experience go smoothly.
To Restrict Data Entries:
1.
2.
: eye V.
: ■ .. ........... :
• In the Formula box, enter a formula that calculates a logical value (TRUE for valid
or FALSE for invalid entries).
1. To specify how you want to handle blank (null) values, select or clear the
Ignore blank check box.
2. Optionally, display an input message when the cell is clicked. To do that,
• Click the Input Message tab.
• Make sure the Show input message when cell is selected check box
is selected.
• Fill in the title and text for the message.
3. Specify how you want Microsoft Office Excel to respond when invalid data is
entered. To do that,
• Click the Error Alert tab, and make sure that the Show error alert
after invalid data is entered check box is selected.
• Select one of the following options for the Style box:
(i) To display an information message that does not prevent entry of
invalid data, select Information.
(ii) To display a warning message that does not prevent entry of invalid
data, select Warning.
(iii) To prevent entry of invalid data, select Stop.
• Fill in the title and text for the message (up to 225 characters).
4. Test the data validation to make sure that it's working correctly. Try entering
both valid and invalid data in the cells to make sure that your settings are
working as you intended and your messages are appearing when you expect.
7.16 FORMULAS
A formula is an equation that performs operations or calculations on worksheet data.
You can use an Excel 2010 formula to perform mathematical operations, such as
addition and multiplication, or they can compare worksheet values, join text, averaging a
student's test results, etc.
Formulas can refer to other cells on the same worksheet, cells on other sheets in the
same workbook, or cells on sheets in other workbooks. In addition, if you change the data in
your spreadsheet, Excel will automatically recalculate the answer without you having to
re-enter the formula.
A basic formula format will start with an equals sign (=) followed by one or more
operands, separated by one or more operators. Operands can be values, text, cell
references, ranges, defined names, or function names. Operators are symbols used to
represent the various arithmetic and comparison
operations you can perform on the operands.
To Enter a Formula:
• Place the cursor in the cell where the formula
will appear (E5 in this case).
• Enter an = sign. All Excel formulas start with
the 'equal' sign.
• Enter the expression that will produce the
result you want. This can consist of operands,
values, variables, and symbols which represent
• When the formula is complete,
press Enter. The result of the
formula will be calculated and
displayed in the cell (E5).
jy =A5-KT5
E5 -
: A ■C P
8
i
2
3
MS-EXCEL 7.17
4
5 4 7 11
mistakes:
Error Meaning
##### The contents of the cell cannot be displayed correctly as the cell
column is too narrow.
#REF! Indicates that a cell references is invalid. Often displayed when you
delete cells which involved a formula.)
#NAME? Excel does not recognise text contained within a formula.
Fig. 7.26 (Formula: Result of a Formula)
• You can see the formula in the Formula bar at the top of the screen by placing the
cell pointer on the cell (E5).
Note: If there is an error in a formula, an error message is displayed which will begin
with a # sign. __________________
To know the Excel 2010 Formula Error Messages:
When writing formulas it is easy to make a mistake. Here are some common
7.16.1 Filling Formulas To Other Cells
Sometimes, you will write a formula that gets used a lot in different places of a
worksheet. For example, a spreadsheet may contain several columns of numbers. Each
column will contain a formula that adds all the numbers in it. You could write the formula
several times, once in each column. Or you could copy-and-paste it into each column. The
fill formula method allows you to copy a formula and fill it into many different consecutive
cells at the same time.
The mouse pointer changes to a black crosshair when passed over the fill handle, or the
square box in the lower right corner of the cell.
Copy the formula in cell B5 and fill it into cells C5, D5 and E5.
Fig. 7.28 (Copy and Fill the formula)
• The cell references in a formula are automatically updated when the formula is
copied to other cells in the spreadsheet.
7.16.2 Copy and Paste Formulas
The process to copy and paste a formula is identical to that process used to copy and
paste text.
To Copy and Paste a Formula:
• Select the cell that contains the formula to be copied.
Click the
Copy button. Marching “ants”
appear around the copied
cell(s).
MBIWIOT^-T
Arial * 10 - 8 I H ’ IEH
B4 f* =SUM(B2-B3)
A B- . C | D' i
1 Sales 34567
2
Expenses
1234
f r'33'^33]
• Engineering
• Cube
Here are some commonly used functions:
AVERAGE: Used to determine the average value of the selected cells contents.
COLUMNS: Used to return the number of columns within a reference.
COUNT: Used to count how many numbers are in the list.
MAX: Used to return the maximum number from a list.
MIN: Used to return the minimum number from a list.
ROUND: Used to round off numbers to a specified number of decimal points.
SUM: Used to add the contents of selected cells.
Each function has a specific order, called syntax, which must be strictly followed for
the function to work correctly.
Syntax Order:
1. All functions begin with the = sign.
2. After the = sign define the function name (e.g., Sum).
3. One or more arguments-numbers, text or cell references-enclosed by parentheses.
If there is more than one argument, separate each by a comma.
An example of a function with one argument that adds a range of cells, B3 through BIO:
=SUM(B3:B10)
/I\
equal sign function name argument
Fig. 7.30 (Function with one argument)
An example of a function with more than one argument that calculates the average of
numbers in a range of cells, B3 through BIO, and C3 through CIO:
=AVG(B3:B10, C3:C10)
/\1
equal sign function name argument
Fig. 7.31 (Function with more than one argument)
To display all the available functions in Excel 2010:
• Open a blank Excel workbook.
• Click on the Formulas tab and within the Function Library group click on the
Insert Function icon.
Search for a function:
Type a brief descrip tion of what you want to do and then click Go So
Or select a category :: Text
Most Recently Used Ail
Select a function:
Financial
Date St.Time
CHAR Math &Trig
CLEAN Statistical
CODE Lookup St Reference
CONCATENATE -«ase
DOLLAR
EXACT
mm .....~ ■ ....
Logical
BAHTTEXT(reu«lbet| Informafion Engineering
Converts a number to
7.20 MS-EXCEl
• From the Insert Function dialog box displayed, under Or select a catego section,
select a particular category function, the related functions will displaye
7.18 RANGE OR CELL RANGE
A range is a group or block of cells in a worksheet that have been selected o highlighted.
When cells have been selected they are surrounded by an outline or border
Normally there is only one cell in the worksheet with a black outline. This is th Active
cell. Whatever command is executed by Excel affects the active cell.
Using the mouse, keyboard or Name Box, more than one cell can be selected ti create a
range, and commands executed by Excel will affect the entire range.
Ranges can be made up of adjacent or non-adjacent cells. Adjacent cells are ai
together. There are no gaps in the range. Non-adjacent cell ranges consist of two or
more separate blocks of cells. These blocks can be separated by rows or columns. For non
adjacent ranges, a block of cells can be of any size - from one to several hundred or eve a
thousand or more.
A range consisting of adjacent cells can be created by dragging with the mouse.
Ranges consisting of non-adjacent cells can be created by using the mouse an,
keyboard.
To Create a Range consisting of non-adjacent cells by using the mouse and
keyboard:
• Click on the first cell you want to select with the mouse pointer to make it th' active
cell.
• Release the mouse button.
• Press and hold down the Ctrl key on the keyboard.
• Click on the rest of the cells you want to select them without releasing the Ctrl key.
• Once all the desired cells are selected, release the Ctrl key.
• Do Not click anywhere else with the mouse pointer once you release the Ctrl key or
you will clear the highlight from the selected cells.
• If you release the Ctrl key too soon and wish to highlight more cells, simply press
and hold down the Ctrl key again and then click on the additional cell(s).
Ranges are identified by the cell references or addresses of the cells in the upper left
and lower right comers of the range. These two references are separated by a colon (:) which
tells Excel to include all the cells between these start and end points.
Example: A range of adjacent cells as seen in the Figure 7.33 would be B1:B9.
MS-EXCEL 7.21
A5
A B
1 Am it
2 Rahul
3 Rajan
4 Dharam
5 Par as
6 Punit
7 Priyanka
S Raman
Sort &
Fitter
Zi Sort A to Z j
il Sort Z to A
Custom Sort...
v= Fitter
yk Clear
Reapply
E3L A
i Am it
B
7.22 MS-EXCEL
Note: You can sort in reverse alphabetical order by choosing Sort Z to A in the list.
To Sort from Smallest to Largest:
• Select a cell in the column you want to sort (a column with numbers).
Fig. 7.38 (Sorting: Select a Ceil from the Column)
A4 ▼
Click the Sort 8s Filter command in the Editing group on the Home tab.
Fig. 7.39 (Sorting: Sort & Filter in Editing Group under Home Tab)
jifi
r
! Find &:
Sele A4 •*
ct-
i Sort A & I Find &
~2 'Filter H Select- 8
zl Sort Smallest
V to Largest
1■ |1 Sort
Sort -44Smallest
Largest to a:
Smallest to Largest Sort
Custom: Sort...
2 0
Largest to Smallest Custom:
Y= Filter
3 Sort... 3
4j|am 4
$*■ '' spjjrtK
5 5
6 22
7 101
a & • 5 2 fck O
Column Line Pie Ear Area Scatter Other
r »' ' ' » -■ r Charts'
' ________________ Charts • ■' ' ________ b:
Fig. 7.49 (Chart: Chart Subtypes)
• Click the required chart subtype to create the chart. In this example, suppose you
choose a 2-D Clustered Column chart type under Column chart option.
7.26 MS-EXCEL
• When you have selected a subtype, a chart will be created as an object in the
worksheet.
......-«««
It 4 Ef IP
lid. "“Uaj
i Change Save As Switch Select
Chart Type Template ; Row/Coiumn Data
Type Data
Fig. 7.53 (Chart: Change Chart Type)
Book! - Microsoft Ek€6f Chart Tools
■ Sift® I !.iiL:; i h In h. J
ni a
7.28 MS-EXCEL
Chart Layouts
More
D E F ■' 1 ........... Changs the overall Iayout of th e 1
£h3rt
‘.f
1
A B
c D E
7.23 MACROS
A macro is a recording of each command and action you perform to complete a task.
Then, whenever you need to carry out that task in a spreadsheet, you just run the macro
instead.
Macros are advanced features that can speed up editing or formatting you may
perform often in an Excel worksheet. They record sequences of menu selections that you
choose so that a series of actions can be completed in one step.
To Record a Macro in Excel 2010:
• Click the View tab on the Ribbon.
• Click Macros.
• Click Record Macro.
• Enter Macro name (without spaces).
• Enter a Shortcut key.
• Enter a Description about the macro (optional).
• Click OK.
□□□□□
A presentation is a good way to convey pieces of information, usually in the form of an
outline, to a large audience. Generally, computerized presentations are appealing to users
because these are easy to create, edit and generally small enough to fit onto a CD or a USB
Drive.
Presentations consist of a number of individual pages called "slides". Slides may contain
text, graphics, movies, and other objects, which may be arranged freely. So, a presentation is a
combination of slides, handouts, notes, and outlines all in one file. You can add text, graphics,
photos, clip art, sound and video to your slides.
A presentation is any kind of interaction between a speaker and audience, but it usually
involves one or more of the following visual aids: LCD projectors, computer- based slides,
handouts, and speaker notes.
The presentation can be printed or even displayed live on a computer. For larger
audiences the computer display is often projected using a video projector.
8.2 MICROSOFT POWERPOINT
Microsoft PowerPoint, usually just called PowerPoint, is a closed source commercial
presentation program developed by Microsoft. It is part of the Microsoft office suite, and runs on
Microsoft windows operating system.
In the Microsoft office suite, PowerPoint is the presentation graphics software used to
design dynamic and easy to use presentation. Today, PowerPoint presentations in many
forms, styles and custom layouts are used by working professionals, academics, students,
medical practitioners and others to display data and information in a visual manner.
Microsoft PowerPoint is a professional presentation program that allows the user to create
"presentation slides" that can be displayed on the computer screen or through a projector that
is plugged in to the computer.
As a part of the Microsoft Office Suite, PowerPoint has become the world's most widely
used presentation program used for making visual aids for presentations. The primary users
of this software are sales and business staff, teachers, and trainers. This software is relatively
easy to use and is designed to provide a novice user with a professional presentation tool at a
minimal cost.
There are three main functions within PowerPoint presentation software: creation, editing,
and presentation. The functionality provided in this tool interacts seamlessly with all other
Microsoft Office applications. This gives the user the ability to copy and paste text and images
from other documents and quickly incorporates them into a presentation.
Microsoft release PowerPoint 2010 (included in Office 2010) on June 15, 2010. It has been
redesigned with a much more features, user-friendly and intuitive layout than its
predecessors. PowerPoint 2010 provides a variety of professionally designed templates,
themes, and style galleries to help you create great-looking presentations.
8.2 ^^ MS-POWERPOINT
resolution, less information fits on your screen, but the size of your text and images are
larger. If you use a high resolution, more information fits on your screen, but the size of the
text and images are smaller.
8.2.1 Features of PowerPoint 2010
Microsoft PowerPoint 2010 enables you to quickly create high-impact, dynamic
presentations. Some of the important features of PowerPoint 2010 are:
• Intuitive User interface: PowerPoint 2010 has a new, intuitive user interface called
the Ribbon that helps you create better presentations much more quickly than you
could in earlier versions of PowerPoint.
• Create Dynamic presentations: PowerPoint 2010 quickly create dynamic and
great-looking presentations using the redesigned user interface and new graphics
capabilities.
• Video Capabilities: One of the attractive features of Microsoft PowerPoint is that it
allows you to use video in your presentations. With this software, you can embed a
video clip into one of your slides and use it during the slide show. When you embed
the video, you can also perform a number of editing functions which will allow you to
alter the video to your needs for the presentation. For example, you can trim the
videos, bookmark specific scenes, and add fades and more.
• Live Preview: PowerPoint 2010 takes advantage of the live preview feature to review
your formatting choices before you apply them.
• Apply a consistent look and feel in one click: PowerPoint 2010 themes help you
change the look and feel of your entire presentation with just one click. Changing the
theme of your presentation not only changes the background color but the color of a
diagram, table, chart, or font, and even the style of any bullet points within a
presentation.
• Sharing: Another feature of Microsoft PowerPoint 2010 is the ability to share
presentations with other individuals in different locations. For example, you can
create a video of your slideshow and then send the video to other individuals.
• Special Effects: When creating a presentation, one of your jobs as a presenter is to
keep the attention of your audience. If you create a plain presentation without any
flair, your subjects may not pay attention for long. With Microsoft PowerPoint 2010,
you can use a number of special effects to enhance the quality of your presentation.
For instance, you can use animations and transition effects when changing slides.
• Dramatically modify shapes, text, and graphics with new tools and effects:
You can now manipulate and work with your text, tables, charts, and other
presentation elements in much richer ways than ever before.
• Reduce your document sizes and improve damaged file recovery at the
same time: The new, compressed Microsoft PowerPoint XML Format offers a
dramatic reduction in file size, while offering an improvement in data recovery for
damaged files.
• Help protect the private information in your documents: Detect and remove
unwanted comments, hidden text, or personally identifiable information using the
Document Inspector, preparing your presentation to be shared with others.
• Support other File formats: PowerPoint 2010 enable support for other file formats,
such as PDF (Portable Document Format) and XPS (XML Paper specification).
* • Themes and Quick Styles: PowerPoint 2010 comes with new themes,
layouts and Quick Styles that offer you a wide range of options when you are
MS-P0WERP01NT ____________________________________________ JL3
8.3 STARTING MICROSOFT POWERPOINT 2010 |
To start PowerPoint 2010 from the Start Menu:
• Click on the Start button, point to All Programs then Microsoft Office and click on
Microsoft PowerPoint 2010.
• The first screen that you will see a new blank presentation begins automatically with
one slide.
Permissions
Anyone can open, copy, and
change any part of this
Protect presentation. Properties
Presentation
Rec
ent Prepare for
Sharing Before
sharing this file, be aware
Print Check for that it contains:
M
Issues ”•Fig. 8.2 (Backstage View and
Document properties Screen)
author's name
To use the Backstage View, follow these basic steps:
i£ Content that people with
1. Click the File tab, located in are
disabilities the upper-left
unable to corner
Created
of the Word Ribbon to
read You can also open the Backstage View by
last Printed
U Options
Versions Related People
§9 There are no previous Author
versions of this file.
Manage
MS-POWERPOINT Versions -
last Modified By H>3t savsd y
Info
New
If you already have an opened presentation then it will display a window showing detail
about the opened presentation as shown below:
When you first start PowerPoint, the program loads a blank presentation that you can
modify later on.
To Create a New Presentation:
1. Click the File tab.
The Backstage View appears.
2. Click New.
PowerPoint displays different templates you can choose.
3. Click Blank Presentation and then click Create.
PowerPoint displays a blank slide with a title and subtitle box, as shown in
Figure 8.5.
our
• Content Box
This is found in most of the slides that have a placeholder for adding content. This is
indicated by "Click to add text". As you can see, this box allows you to add text as well
as non-text content. To add text to such a box, click anywhere on the box, except on one
of the content icons in the center and start typing.
Click to add title
« Click to add text
ill
m
i
To simply move the box, click on the border and drag your mouse.
Note: If you want to move the box in a straight line, hold down the Shift key before
clicking and dragging the mouse. ___________________________________________________ /
To Delete a Text Box:
To delete a text box, click on the border of the box. Once the border is highlighted, press
the [Delete] key on your keyboard.
/ Note: If you can't see the border of the box, first click on the text. This will make the border
visible. ]
8.8 ADDING GRAPHICS
Graphics such as drawings, pictures, clip art or graphs are frequently used in PowerPoint
presentation.
8.8.1AddingPictureTo
Add a Picture:
• Click the Insert Tab.
• Click the Picture Button.
• Insert Picture Dialog box appears:
• Search for tl •
Click the clip • To
move the g
8.8.3 Adding a Shap<
To Add Shapes: Click
the Insei Click the
Desktop
Shap Click the shap
Click the Slide Drag
the cur Shape.
My Documents
My Computer
My Netvvork
Pisces
File name:
Files of Svpe: iA||plctur<:
• Search for the clip art using the Search Clip Art dialog box.
• Click the clip art.
To Add Shapes:
I|i m phis ii.fi
• Click the Insert Tab. ' Clip- 1 Phots Shapes-SmartArt Chart : Hyperlink Action
• Click the Shapes Button. Art Album ^
SK'JSt
v 1
Basic Shapes
E3 O A tL£7"dO O Q © ® i >
® Cb G> o n r O f G> O 0 o
□ □ ©^ n o c i >
Block Arrows
: ’ : : :■ v V . c . - 2f _j % ,u^ O Lr^ '■£]
■:&
Equation Shapes . • T ■
Flowchart
=30 . '
o o sam@© I § i^SD Q.SCD©
8.14 MS-POWERPOINT
To Add SmartArt:
• Click the Insert Tab.
• Click the SmartArt Button.
• Choose a SmartArt Graphic dialog box appears.
O li j N §
Symbol Video i Audio
C Art Audio..,
Record Audio...
o m
Symbol Video
Audio
C ip Aft Audio...
R $&rd Audio,.,
• Locate and select the desired video file, then click Insert.
Fig. 8.30 (Insert Video from a file: Locate and select the Video)
• The video will be added to the slide.
8.12 PRESENTATION VIEWS
There are many views in PowerPoint that can help you to
create a professional presentation. The views in Microsoft
PowerPoint 2010 that you can use to edit, print, and deliver
your presentation are as follows:
1. Normal view
MS-POWERPOINT 8.19
8.20 MS-POWERPOINT
* Sample Text 2
* Only text box content
8.24 MS-POWERPOINT
Fig. 8.37 (Transition Effects: Apply To All)
8.13.1 Modifying a Transition
To Set Slide Transition Speed:
• Apply a slide transition effect to a slide.
• Click the Transition Speed drop-down menu in the Transition to
This Slide
group on the Animations tab.
• Select a menu option to apply the transition speed to the
selected slide.
; Automatically After
ri:
Animate; No Animation !-$M! 1_
No Animation
Custom A
rade
Ani
Entrance ► Wt 1. Blinds
& Emphasis ► % 2. Box
Exit ► 3, Checkerboard
□□□□□
INTERNET & BROWSING
■ 9.1 INTERNET
Computer network is a group of computers
linked together, so that they can share I
information and resources. Internet is a global
“network of networks". It can also be I
described as information highway. It is the
world’s largest network of computers. The I
networks are related to academics, research,
government and include users of all types I of
profiles i.e., corporate, individuals, professionals,
children, schools, institutes etc. It I may be
remembered that computer is not located at a
single site, not controlled by any I central
authority. The networking in the internet are not
directly connected but interconnected. The ability
to graphically access internet resources
throughout the web is the primary reason for the
phenomenal growth of the internet.
The internet can be known as a kind of global
meeting place where people from all parts of the
world can come together. It is a service available
on the computer, through which everything
under the sun is now at the fingertips of anyone
who has access to the internet.
To get ‘online’, meaning to connect to the
Internet, you need to have:
• A Computer: A computer is also called a
“Data Processor” because it can store,
process, and retrieve data whenever
desired. Computer equipment is a sizeable
investment and thus you should select a
computer carefully. Before buying a
computer, understand your needs and then
choose one accordingly.
• Internet Sermce Provider: This is the
software that you will require to get online.
You can now choose from a dial-up service
or 24-hour broadband services. This is the
service that will help you to connect to the
Internet and start your surfing experiences.
9.2 INTERNET SERVICES
Internet is helpful to each and every one in some or many
ways. Whether it is a business house or a small company, an
institution or a hospital, a doctor or an engineer, a student or a
house wife, it serves the need of every one. Internet applications
are interactive services that are used to perform tasks over the
internet. Some of the major services provided on internet are:
• Communication: Internet is used for sending and receiving
message. E-mail is an online correspondence system. With
e-mail you can send and receive instant electronic
messages, which work like writing letters. Your messages
are delivered instantly to people anywhere in the world,
unlike traditional mail that takes a lot of time. Some of
the popular web sites providing this service are:
www.yahoomail.com,www.gmail.com etc.
• Access Information: The internet is a virtual treasure of
information. Any kind of information on any topic under
the sun is available on the internet. The ‘search engines’
on the internet can help you to find data on any subject
that you need.
I
0
Internet
Explorer product. IE is one of the first
graphical-based Web browsers. This was
introduced
Netscape inNavigator
1995 along was
with Windows
the 95
first
0
Netscape
commercially successful Web browser
Navigator introduced in 1994
Mozilla Firefox is a free and open-source
Mozilla
FireFox i®web browser developed by the Mozilla
Corporation. It was released in 2004 and has
grown to be the second most popular
browser
Safari isonathe Internet
web browser developed by
Safari // Apple Inc. and included with the OS X and
&• iOS operating systems. It was first released
in January 2003. Safari has very good
support
Opera isfora latest
web technologies like XHTML
browser developed by
Opera
Google
0Opera Software in 1995. Opera is smaller
and faster than most other web browsers.
Google Chrome is a freeware web browser
Chrome wr, • developed
minimal
by Google in 2008. It combines a
design with sophisticated
technology to make the Web faster safer
□□□□□
MULTIMEDIA-AN INTRODUCTION
Graphics Sound
Animation Video
Photos Text
Interactive
Multimedia
In Fig. 10.8,
to the left
you see an
mage and
to the right
the top of
one of the
ountains
when
zoomed in.
As you can
see, the
mage
consists of
hundreds of
rows and
olumns of
small
elements
(pixels) that Fig. 10.8 (Bitmap image at different levels of magnification)
all have
their own
colon________________________________________________________________
Note: When
working
with bitmap
mages, you
edit pixels
rather than
objects or
shapes. ________ _____________________________________________
Example: A
bicycle tire
n a bitmap
mage is
made up of
a blend of
pixels in
that
ocation.
Advantages of
Bitmap/Raster
Graphics:
• Bitmap
s
graphic
s are
very
easy to
create.
Take a
picture
you have got a bitmap image.
• They are very cost effective. You can take a picture or scan in a
drawing, and easily show it on the Internet or send in an
email.
• A bitmap image uses solid color pixels, which can be
identified and recolored easily.
• Raster files are easy to use and can be edited by using
common photo-editing programs like- Photoshop.
)isadvantages of Bitmap/Raster Graphics:
• The most common and obvious disadvantage of bitmap image
format is that they are not upward scalable. You can make a
bitmap smaller without too much loss, but you cannot make it
larger without loosing quality.
• Raster files can be very large if there is a large amount of
detail and pixels in an image which can make storing and
sharing them more difficult.
• Another disadvantage of bitmap images is that they require
higher resolutions and anti-aliasing for a smooth appearance.
0.4.1 Vector Vs. Bitmap Graphics ___________
Vector Graphics Bitmap Graphics
Vector graphics are based onBitmap graphics are based on
drawing elements or objects an array of dots, called pixels
such as lines, rectangles, to create an image.
circles
Vectoretc to create
graphics an image
are also calledBitmap graphics are also called
Draw-type graphics. Raster graphics.
Images stored as vectors look Bit-mapped or raster images
better on devices (monitors always appear the same
and printers) with higher regardless of a device's
resolution resol tion
Vector graphics files are smallBitmap graphics files are larger
in size. than vector graphics.
MULTIMEDIA
Easy to store and share. Difficult to store and share.
10.8
into a quence of single frames, and the video and audio data are
compressed before being 'itten to a tape or digitally stored to disc.
One of the advantages of digitized video is that it can be easily
edited. Analog video, ich as a videotape, is linear; there is a
beginning, middle, and end. If you want to edit you need to
continually rewind, pause, and fast forward the tape to display the
isired frames.
Digitized video on the other hand, allows random access to any
part of the video, and liting can be as easy as the cut and paste
process in a word processing program. In Idition, adding special
effects such as fly-in titles and transitions is relatively simple.
Digital video is stored as a standard computer file. Thus it can be
copied with no loss quality, and also can be transmitted over
standard computer networks. However a lange in parameters like
frame size as well as a change of the digital format can :crease the
quality of the video.
Digital video has a significantly lower cost than 35 mm film. The
tape stock itself is ry inexpensive. Digital video also allows footage
to be viewed on location without the :pensive chemical processing
required by film. Digital television (including higher lality HDTV)
started to spread in most developed countries in early 2000s.
Digital video
10.14 MULTIMEDIA
• Phishing
Phishing attack is another growing threat for the online
computers. Phishing is a type of online cheating techniques
that is designed to steal your confidential information,
passwords, credit card information and important login and
password
10.16 MULTIMEDIA
naom