Notes 1 2 3 BBAIII
Notes 1 2 3 BBAIII
❖ Introduction to Computer
❖ Computer System Hardware
❖ Computer Memory
❖ Input Output Devices
❖ Interaction Between User and computer
❖ Introduction to Free and Open Source Software
❖ Computer Virus /Anti-Virus
1.1 INTRODUCTION
A computer is an electronic machine that accepts data from the user, processes the data
by performing calculations and operations on it, and generates the desired output as results.
Computer components are divided into two major categories namely hardware and
software. Hardware is the machine itself and its connected devices such as monitor,
keyboard, mouse etc. Software are the set of programs that make use of hardware for
performing various functions.
1.2 OBJECTIVES
The characteristics of computers that have made them so powerful and universally useful
are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them
briefly.
1
Speed
Accuracy
In addition to being fast, computers are also accurate. Errors that may occur can almost
always be attributed to human error (inaccurate data, poorly designed system or faulty
instructions/programs written by the programmer)
Diligence
Unlike human beings, computers are highly consistent. They do not suffer from human
traits of boredom and tiredness resulting in lack of concentration. Computers, therefore,
are better than human beings in performing voluminous and repetitive jobs.
Versatility
Computers are versatile machines and are capable of performing any task as long as it
can be broken down into a series of logical steps. The presence of computers can be seen
in almost every sphere – Railway/Air reservation, Banks, Hotels, Weather forecasting
and many more.
Storage Capacity
Today’s computers can store large volumes of data. A piece of information once
recorded (or stored) in the computer, can never be forgotten and can be retrieved almost
instantaneously.
Fig.1.1: Computer
System
A computer system (fig.1.1) consists of mainly four basic units; namely input unit,
storage unit, central processing unit and output unit. Central Processing unit further
includes Arithmetic logic unit and control unit.
A computer performs five major operations or functions irrespective of its size and make.
These are
Computer Organization
a. Storage Unit: The storage unit is used for storing data and instructions before
and after processing.
b. Output Unit: The output unit is used for storing the result as output produced by
the computer after processing.
c. Processing: The task of performing operations like arithmetic and logical
operations is called processing. The Central Processing Unit (CPU) takes data and
Computer’s memory can be classified into two types; primary memory and secondary
memory
3
Basic computer organization/Computer Architecture/Design
Computer Architecture/Design
A typical computer system has an Input Unit, a Central Processing Unit, Memory Unit and
Output Unit. This is also known as Von Neumann Architecture of the computer. Over the years
the technology has changed but basic design/architecture is not changed. The important
Input Unit:
The input unit links the external environment with the computer system. Data and instructions
inputted to the computer system through this unit. The data can be inputted to the computer by
various means, it can be entered through a keyboard, through a card reader, through a mouse etc.
All the data supplied to the computer is transformed into the binary codes. Unit called input
interface accomplishes this transformation. Input interface is designed
to match the unique physical or electrical characteristics of input devices with the requirements
of the computer system for example Keyboard, Mouse, Joy stick, Light Pen, Punched Cards,
Optical Mark Reader, Magnetic Tape, Optical Character Reader etc.
Output Unit:
It links the computer with the external environment. The job of an output unit is just opposite of
an input unit. It supplies information and results of computation to the outside world. As
computers work with binary code, the results produced are also in the binary form. Hence,
before supplying the results to the outside world, it must be converted to human readable form.
Unit called output interface accomplishes this task. Output interface is
designed to match the unique physical or electrical characteristics of output devices (e.g.
Monitor, Printer, Plotter) with the requirement of the external environment.
4
Central Processing Unit:
The control unit and ALU of the computer are together known as the Central Processing Unit
(CPU). As in a human body, the brain takes all major decisions and controls all body parts,
similarly, in a computer system, all major computations are made by the CPU and is also
responsible for activating and controlling the operations of other units. The CPU performs the
following functions:
1. Control Unit:
The control unit is able to maintain order and direct the operation of the entire system. By
selecting, interpreting, and decoding, it executes the program instructions. This unit acts as a
central nervous system for the computer. It manages and coordinates the entire computer system.
It directs the flow of data through the CPU, and to and from other devices. Control unit controls
the input and output devices and the passing of data to the Arithmetic/Logical Unit for
computation. The control unit stores the CPU's microcode, which contains the instructions for all
the tasks the CPU can perform.
The Arithmetic Logic Unit (ALU) of a computer system is the place where the actual execution
of the instructions takes place during the processing operation. The data and instructions, stored
in the primary storage (RAM or Cache) prior to processing, are transferred as and when needed
to the ALU. ALU uses various CPU registers to store intermediate results of computations. The
Final result of computations is transferred back to the primary storage. After the completion of
processing, the final results that are stored in the primary storage unit are released to an output
device or to a secondary storage device.
The ALU is designed to perform all the basic Arithmetic Operations – add, subtract, multiply,
divide, Relational Operations such as comparisons using < , <=, > , >=, == etc and Logical
Operations such as AND, OR, NOT.
The storage unit of the computer holds data and instructions that are entered through the input
unit, before they are processed. It preserves the intermediate and final results before these are
sent to the output devices. It also saves the data for the later use. The various storage devices of a
computer system are divided into two categories.
5
1. Primary Storage: Stores and provides very fast. This memory is generally used to hold the
program being currently executed in the computer, the data being received from the input unit,
the intermediate and final results of the program. The primary memory is temporary in nature.
The data is lost, when the computer is switched off. In order to store the data permanently, the
data has to be transferred to the secondary memory.
The cost of the primary storage is more compared to the secondary storage. Therefore most
computers have limited primary storage capacity.
2. Secondary Storage: Secondary storage is used like an archive. It stores several programs,
documents, data bases etc. The programs that you run on the computer are first transferred to the
primary memory before it is actually run. Whenever the results are saved, again they get stored
in the secondary memory. The secondary memory is slower and cheaper than the primary
memory. Some of the commonly used secondary memory devices are Hard disk, CD, etc.,
6
Memory Organisation
Size in "bytes"
Bits = 1 Byte
Kilobyte (KB) = 1,024
RAM or Random Access Memory is the unit in a computer system. It is the place in a
computer where the operating system, application programs and the data in current use
are kept temporarily so that they can be accessed by the computer’s processor. It is said
7
to be ‘volatile’ since its contents are accessible only as long as the computer is on. The
contents of RAM are no more available once the computer is turned off.
ROM or Read Only Memory is a special type of memory which can only be read and
contents of which are not lost even when the computer is switched off. It typically
contains manufacturer’s instructions. Among other things, ROM also stores an initial
program called the ‘bootstrap loader’ whose function is to start the operation of computer
system once the power is turned on.
b. Secondary Memory
Secondary storage devices are of two types; magnetic and optical. Magnetic devices
include hard disks and optical storage devices are CDs, DVDs, Pen drive, Zip drive etc.
• Hard Disk
Hard disks are made up of rigid material and are usually a stack of metal disks sealed in a
box. The hard disk and the hard disk drive exist together as a unit and is a permanent part
of the computer where data and programs are saved. These disks have storage capacities
ranging from 1GB to 80 GB and more. Hard disks are rewritable.
Compact Disk
Compact Disk (CD) is portable disk having data storage capacity between 650-700 MB.
It can hold large amount of information such as music, full-motion videos, and text etc.
CDs can be either read only or read write type.
Digital Video Disk (DVD) is similar to a CD but has larger storage capacity and
enormous clarity. Depending upon the disk type it can store several Gigabytes of data.
DVDs are primarily used to store music or movies and can be played back on your
television or the computer too. These are not rewritable.
8
1.4.3 Input / Output Devices:
These devices are used to enter information and instructions into a computer for storage
or processing and to deliver the processed data to a user. Input/output devices are
required for users to communicate with the computer. In simple terms, input devices
bring information INTO the computer and output devices bring information OUT of a
computer system. These input/output devices are also known as peripherals since they
surround the CPU and memory of a computer system.
a) Input Devices
An input device is any device that provides input to a computer. There are many input
devices, but the two most common ones are a keyboard and mouse. Every key you press
on the keyboard and every movement or click you make with the mouse sends a specific
input signal to the computer.
• Keyboard: The keyboard is very much like a standard typewriter keyboard with
a few additional keys. The basic QWERTY layout of characters is maintained to make it
easy to use the system. The additional keys are included to perform certain special
functions. These are known as function keys that vary in number from keyboard to
keyboard. (see fig. 1.4)
Alphanumeric Keypad/
Special-function Keys Function Keys
Cursor Movement
Keys
Numeric Keypad
• Mouse: A device that controls the movement of the cursor or pointer on a display
screen. A mouse is a small object you can roll along a hard and flat surface (Fig. 1.5). Its
name is derived from its shape, which looks a bit like a mouse. As you move the mouse,
the pointer on the display screen moves in the same direction.
9
• Touchpad: A touch pad is a device for pointing (controlling input positioning)
on a computer display screen. It is an alternative to the mouse. Originally incorporated in
laptop computers, touch pads are also being made for use with desktop computers. A
touch pad works by sensing the user’s finger movement and downward pressure.
• Touch Screen: It allows the user to operate/make selections by simply touching
the display screen. A display screen that is sensitive to the touch of a finger or stylus.
Widely used on ATM machines, retail point-of-sale terminals, car navigation systems,
medical monitors and industrial control panels.
• Light Pen: Light pen is an input device that utilizes a light-sensitive detector to
select objects on a display screen. (Fig. 1.6)
b. Output Devices:
Output device receives information from the CPU and presents it to the user in the
desired from. The processed data, stored in the memory of the computer is sent to the
output unit, which then converts it into a form that can be understood by the user. The
10
output is usually produced in one of the two ways – on the display device, or on paper
(hard copy).
Monitors come in two major types — LCD or CRT, but others exist, too, like OLED.
CRT monitors look much like old-fashioned televisions and are very deep in size. LCD
monitors are much thinner, use less energy, and provide a greater graphics quality.
OLED is an improvement on LCD that provides even better color and and viewing
angles but also requires more power.
Today, all monitors are created using flat panel display technology, usually backlit with
LEDs. The image to the right shows an ASUS LCD monitor.
Impact printers use the typewriting printing mechanism wherein a hammer strikes the
paper through a ribbon in order to produce output. Dot-matrix and Character printers fall
11
Non-impact printers do not touch the paper while printing. They use chemical, heat or
electrical signals to etch the symbols on paper. Inkjet, Deskjet, Laser, Thermal printers
fall under this category of printers.
•
• Plotter: Plotters are used to print graphical output on paper. It interprets
computer commands and makes line drawings on paper using multicoloured automated
pens. It is capable of producing graphs, drawings, charts, maps etc. (Fig. 1.9)
• Facsimile (FAX): Facsimile machine, a device that can send or receive pictures
and text over a telephone line.
Computer software is the set of programs that makes the hardware perform a set of tasks
in particular order. Hardware and software are complimentary to each other. Both have to
work together to produce meaningful results. Computer software is classified into two
broad categories; system software and application software.
Software that can perform a specific task for the user, such as word processing,
accounting, budgeting or payroll, fall under the category of application software. Word
12
processors, spreadsheets, database management systems are all examples of general
purpose application software.
SOFTWARE ACQUISITION:
Different kinds of software are made available for use to users in different ways. The
user may have to purchase the software, can download for free from the Internet, or can get it
bundled along with the hardware.
Retail Software is off-the-shelf software sold in retail stores. It comes with printed
manuals and installation instructions. For example, Microsoft Ms Office
OEM Software stands for “Original Equipment Manufacturer” software. It refers to
software which is sold, and bundled with hardware. Microsoft sells its operating system as OEM
software to hardware dealers. OEM software is sold at reduced price, without the manuals,
packaging and installation instructions. For example, Dell computers are sold with the
“Windows 7” OS pre-loaded on them.
Demo Software is designed to demonstrate what a purchased version of the software is
capable of doing and provides a restricted set of features. To use the software, the user must buy
a fully- functional version.
Shareware is a program that the user is allowed to try for free, for a specified period of
time, as defined in the license. It is downloadable from the Internet. When the trial period ends,
the software must be purchased or uninstalled.
Freeware is software that is free for personal use. It is downloadable from the Internet.
The commercial use of this software may require a paid license. The author of the freeware
software is the owner of the software, though others may use it for free.
13
Open source software is software whose source code is available and can be customized
and altered within the specified guidelines laid down by the creator. open-source software has
restrictions on their use and modification, redistribution limitations, and copyrights.
Linux, Apache, Firefox, Open Office are some examples of open-source software.
14
A virus is the most common type of malware which can execute itself and spread by
infecting other programs or files. The first known computer virus was developed in 1971 by
Robert Thomas, an engineer at BBN Technologies. Known as the "Creeper" virus, The "Brain"
virus, which initially appeared in 1986, is considered to be the first MS-DOS personal computer
virus. Brain was a boot sector virus; he "Jerusalem" virus, also known as the "Friday the 13 th"
virus, was discovered in 1987 and spread throughout Israel via floppy disks and email
attachments. Cabir" virus is the first verified example of a mobile phone virus for the now
defunct Nokia Symbian operating system..
There are some indicators that will tell you that your computer is infected:
A worm can self-replicate without a host program and typically spreads without any
human interaction or directives from the malware authors.
A Trojan horse is designed to appear as a legitimate program in order to gain access to
a system. Once activated following installation, Trojans can execute their malicious functions.
Spyware is made to collect information and data on the device user and observe their
activity without their knowledge.
Ransomware is designed to infect a user's system and encrypt the data. Cybercriminals
then demand a ransom payment from the victim in exchange for decrypting the system's data.
Keyloggers, also called system monitors, are used to see nearly everything a user does
on their computer. This includes emails, opened web-pages, programs and keystrokes.
Antivirus software is a class of program designed to prevent, detect and remove malware
infections on individual computing devices, networks and IT systems.
Antivirus software, originally designed to detect and remove viruses from computers, can
also protect against a wide variety of threats, including other types of malicious software,
such as keyloggers, browser hijackers, Trojan
horses, worms, rootkits, spyware, adware, botnets and ransomware.
15
What Does AntiVirus Software Do?
Several different companies build antivirus software and what each offer can vary but all
perform some essential functions:
Scan specific files or directories for any malware or known malicious patterns
Allow you to schedule scans to automatically run for you
Allow you to initiate a scan of a particular file or your entire computer, or of a CD or
flash drive at any time.
Remove any malicious code detected –sometimes you will be notified of an infection and
asked if you want to clean the file, other programs will automatically do this behind the scenes.
16
UNIT 2
2.1 Introduction
Archi
An operating system is the program that, after being initially loaded into the computer by
a boot program, manages all the other programs in a computer. The other programs are
called applications or application programs. The application programs make use of the
operating system by making requests for services through a defined application program
interface (API). In addition, users can interact directly with the operating system through
a user interface such as a command language or a graphical user interface (GUI).
17
In a multitasking operating system where multiple programs can be running at the
same time, the operating system determines which applications should run in what order
and how much time should be allowed for each application before giving another
application a turn.
It manages the sharing of internal memory among multiple applications.
It handles input and output to and from attached hardware devices, such as hard
disks, printers, and dial-up ports.
It sends messages to each application or interactive user (or to a system operator)
about the status of operation and any errors that may have occurred.
It can offload the management of what are called batch jobs (for example, printing)
so that the initiating application is freed from this work.
On computers that can provide parallel processing, an operating system can manage
how to divide the program so that it runs on more than one processor at a time.
Batch Processing is intended when a user wants to set one or more of the same attributes
on multiple objects. Instead of having to navigate to each object's details page to set the
same attribute, or to set the attribute for multiple rows within a table, Batch Processing
makes it easier for the user by allowing them to select the desired objects from the object
list, and set one or more attributes in a single step. There are two types of Batch
Processing:
18
Multiprogramming is a mode of operation that provides for the interleaved execution of
two or more processes by a single processor concurrently.
1.3 Types of OS
Some computer systems, especially some of the early ones, only did one thing at a time.
They had a list of instructions to carry out - and these would be carried out, one after the
other. This is called a serial system.
Sometimes, if there was a lot of work to be done, then collections of these instructions
would be given to the computer to work on overnight. Because the computer was
working on batches of instructions the type of operating system was called a Batch
Operating System.
Batch operating systems are good at churning through large numbers of repetitive jobs on
large computers. Jobs like: working out the pay of each employee in large firm; or
processing all the questionnaire forms in a large survey.
A network operating system provides printer sharing, common file system and database
sharing, application sharing, and the ability to manage a network name directory,
security, and other housekeeping aspects of a network.
A true distributed operating system is one that runs on a collection of machines that do
not have shared memory, yet looks to its users like a single computer. Users are not
aware of the existence of multiple, separate hardware such as processors.
Through the years, IT professionals have approached each new release of Microsoft
Windows with mixed emotions.
That process has already begun, with the launch in late 2014 of a Windows 10 Technical
Preview aimed at IT pros and consumers. Those who have opted into the Windows 10
preview program are receiving major new features, bug fixes, and security updates
through the tried-and-true Windows Update channel, with new updates arriving, on
average, monthly.
20
In the beginning, there was the Windows 95 Start button, which actually included the
word Start. Clicking that button led to the Start menu, which was chock-full of shortcuts
to programs, utilities, and settings. Both of these crucial parts of the user experience
evolved significantly in appearance and functionality over the years, but a time traveler
from 1995 would have no trouble recognizing the Start menu in Windows 7.
This Start menu design (which will undoubtedly change before the final Windows 10
release) contains some familiar elements, including links to common locations, a list of
frequently used apps and programs, and power controls. The items on the right are live
tiles, which work like their equivalents from the Windows 8.1 Start screen.
Several navigation elements that were added to Windows 8 have been removed for
Windows 10. The Charms menu is gone, replaced on the right side of the screen by an
Action Center that shows notifications and includes shortcuts to common tasks.
Likewise, the Windows 8 navigation controls based on aiming a mouse pointer at corners
are replaced by a new Task View, which also supports multiple virtual desktops.
21
2.7 User accounts and synchronization
Anyone migrating to Windows 10 from Windows 7 should pay special attention to a new
user account type, introduced in Windows 8. Signing in with a Microsoft account instead
of a local account provides tightly integrated support for cloud-based services, along with
easy synchronization of settings and apps between devices. The list of settings that can
be synchronized includes the layout of the Start screen as well as apps; previously
purchased apps can be automatically downloaded and installed from the Store when you
sign in with a Microsoft account on a new device. This feature makes it possible to roam
easily between devices, with personal settings, apps, and browser tabs, history, and
favorites available from each device on which you sign in using a synced Microsoft
account. In an enterprise setting, Windows 10 will include provisioning features that
allow IT pros to manage this process.
Windows 10 includes support for virtually all desktop applications that are compatible
with Windows 7. It also supports the latest generation of Windows apps (sometimes
referred to as modern apps), which debuted in Windows 8 and have evolved significantly
since that time. These apps are distributed through the Windows Store. (In enterprise
deployments, IT pros can leverage the Windows Store to deliver line-of-business apps to
users.)
In Windows 8 and 8.1, modern apps run in one of two modes: full-screen, or snapped to
the side of the display. In Windows 10, these apps can run in a window.
As is the case with most modern apps, the Excel Preview (and its Office-mates Word and
PowerPoint, which are also available as preview releases) is designed to deliver an
excellent experience on touchscreen devices with small screens. These modern apps
don’t have the full feature set of their Windows desktop counterparts, but they’re
surprisingly useful nonetheless.
The Windows Store is in the process of being completely redesigned for Windows 10. In
builds up to and including the March Update, the original Store and the new Store
(labeled as “Beta”) coexist side by side. Figure 1-6 shows a typical listing in the new
Store, which has a cleaner design and offers a broader variety of products than just apps.
22
One of the signature features of Windows 10 will be a new default browser, code-named
“Project Spartan.”
The new browser was not in early builds of the Windows 10 Technical Preview, making
its first appearance (with an incomplete feature set) in April 2015. However, Microsoft
has demonstrated its features publicly and has described its long-term goals. the “Project
Spartan” browser has an uncluttered, touch-friendly interface with a few hidden features
that include the ability to annotate webpages and integrate with Cortana, the Windows 10
personal assistant.
This screen lets you choose which user you want to log in to from the lower-left corner.
After choosing the right user, and entering a password if necessary, you will see the
Windows Desktop.
23
The Windows Desktop is simply your operating system main screen. Here you have
access to an array of tools like the Start Menu, Taskbar, and other icons. Windows 10
also introduces a search box in the Taskbar, which facilitates browsing both your
computer and the Web.
Once you get to the Windows Desktop screen, here are some basic features you will see.
24
One of the most important parts of your Desktop is the Taskbar. By default, it sits at the
bottom of your screen giving you access to the Start Menu, several application icons, and
the Notification Area.
2.10 Windows
In Windows 10, if an application is active or opened, you will see a green line below its
icon. Clicking the icon will bring the application window up.
Every open window features three buttons in the upper-right corner. These are used to
minimize, maximize, or close the window −
To move a window, just click on its Title Bar on the upper side of the window and drag
it.
To resize a window, move your mouse to any corner until you see a double-sided arrow.
Then click and drag until you reach the desired size.
Icons
Most Windows versions will feature different icons on the background. An icon is
simply a graphic representation of an application or a file. To open or access an icon, just
double click on it.
25
Although the amount and type of icons will vary, depending on the computer, you can
add more icons by following these steps −
Step 3 − Browse for the application or file you want to create a shortcut to.
Icons can also be moved around by clicking on them and dragging them to another place
in the screen.
Desktop Background
Another component of your Desktop is the Background. This is simply an image that
appears at the back of your screen. Most computers come with a pre-selected
background, but you can change it to any image you want.
26
Step 2 − From the Personalization window, choose from a series of pre-selected pictures
or browse for your own.
Start Menu
If you are looking for a specific application, you can also open the Start Menu and click
“All Applications”. This will open an alphabetical list of all the applications installed on
your computer.
27
File Explorer
If you are looking for a specific document, another alternative is to use the File Explorer
by clicking on the Folder icon on the Taskbar.
In the File Explorer window, you can browse all your folders and documents.
Virtual Desktops
One of the new features of Windows 10 is the addition of Virtual Desktops. This allows
you to have multiple desktop screens where you can keep open windows organized.
Step 2 − Click the “New desktop” option on the lower-right corner. You can access or
delete the new Desktop by clicking Task View again.
28
he Start Menu is the main point of access to your applications. There are two main ways
to open it −
Step 1 − Use your mouse to click Windows icon in the lower-left corner of the taskbar.
The left pane resembles the traditional Start Menu from Windows 7 and earlier, while the
right pane features live tiles that were used in Windows 8.
29
Left Pane
Click the username at the top of the menu to change account settings or log in with
another user.
A small arrow next to an application will open a sub-menu with a list of recent
documents opened with that application.
Change the settings of your computer like your Internet connection or changing your
background.
30
Search Box
The “Search box” on the Taskbar will allow you to search within your documents and
files or on the Web for anything you write. The initial results will appear within the Start
Menu itself.
The results will be grouped according to the closest match (or matches) labeled “Best
match” at the top of the list.
The remaining results will be grouped according to what they are or their location −
Web results
Documents or folders
Apps
System settings
This icon will let you send Feedback to Microsoft on what you like or dislike
about Windows.
Clicking “My stuff” or “Web” at the bottom will expand the Start Menu and limit your
results to the location you choose, as well as streamlining the search.
Right Pane
The right pane features a varied array of tiles, similar to the ones that were seen on the
Start Screen of Windows 8.
These tiles can be moved and dragged to different places by holding the mouse button.
Activating Cortana
If Cortana isn’t active, you can turn it on by typing “Cortana” in the Taskbar search to
access the Cortana settings, or just clicking the “Gear” icon on the left-side of the menu.
After activating Cortana, it will start gathering information about you to personalize the
experience.
32
You can also customize how Cortana responds to you.
Personalizing Cortana
To further customize Cortana and personalize your interactions with it, you can also
access the Cortana Notebook.
33
memory
Paint is a drawing tool you can use to create simple or elaborate drawings. These
drawings can be either black-and-white or colour. Drawings can be printed, used as
desktop background or pasted it into another document.
Menu Bar
Line Rectangle
Ellipse
34
Foreground colour
Background colour
Set the image width and height using inches, centimetres or pixels. You can also choose
to produce a clour or black and white image.
To select the foreground colour click the left mouse button on the desired colour from the
colour bar. For the background colour click the right mouse button.
Click on the Line tool then select the line width from the box below. Move the cursor,
which will have changed to crosshairs, onto the image area. Hold down the left button
and drag the cursor to the required place then release the button. To draw true horizontal,
vertical or 450 lines hold down the Shift key at the same time. To draw the line in the
foreground colour use the left mouse button; to draw the line in the background colour
use the right mouse button.
Click on the Curve tool and select line width. Draw a straight line as previously
described. Click where you want one arc of the curve to be, and then drag the pointer to
adjust the curve. Repeat this step for a second arc.
You can only create two curves for each line. To draw the line in the foreground colour
use the left mouse button; to draw the line in the background colour use the
To draw a shape
option box below select outline (foreground colour), outline and fill (foreground and
background colour respectively) or just fill colour (foreground colour).
Starting at the top left hand corner click on the image area where you wish to start
drawing the shape and drag the shape to the required size. If you want an exact square
hold down the Shift key as you draw a Rectangle/Rounded Rectangle shape. For a perfect
circle hold down the Shift key as you use the Ellipse tool.
Drawing a polygon is slightly different. Select the Polygon tool and the outline
and fill option box as described above. Click at the starting point of the polygon, and
holding down the left button draw the first side of the shape. Thereafter you need to click
at the end of each line that makes up the polygon, the programme will fill in the lines as
you draw, finishing at the start point.
The Pencil and Brush tools allow for freehand drawing. The Pencil tool
doesn’t have any options; it just draws a thin line in either the
foreground colour (left mouse button) or background colour (right
mouse button).
Fill With Colour A shape can be filled with colour by using the Fill With Colour tool.
Click on the Fill With Colour tool, place it over the shape (object or
area) to be filled and left or right click depending upon whether the fore or background
colour is required. If the shape you want to fill has any breaks in its border, the fill colour
spreads to the rest of the drawing area.
Eraser
The Eraser tool, available in four sizes, rubs out whatever it passes over while the left
mouse button is held down. The background colour will therefore show through.
Text
Text can be added to the image by first selecting the Text tool and then drawing a box on
the image area. When the box is complete the Text Toolbar will appear.
The text colour will be that of the foreground colour, to change the colour of the text,
click a colour in the colour box.
2.12 NOTEPAD
When Notepad opens, in either operating system, you get to see this no-frills screen.
Nothing more is needed, since Notepad has a limited set of options. At the top of the
window, you should see menus for File, Edit, Format, View, and Help.
Let's take a look at what you can do. Everything should be reassuringly familiar, but keep
in mind that Notepad is just a text editor. If you try to paste graphics into it, it does not
work.
The choices you have in the File menu are New, Open, Save, Save As, Page
Setup and Print. As you can see, many of these commands have keyboard shortcuts as
well. You should already be familiar with these commands since they are the same in
nearly every Windows application.
Creating and saving text documents in Notepad is simple: open Notepad, start typing and
edit the text and format it as you see fit. Once you are finished, use the Save As command
to save your work. The default folder is the OneDrive folder in Windows 10 and 8.1, and
the My Documents folder in Windows 7. You can change this quite easily: use the Save
Ascommand and browse to your preferred folder and click Open. Notepad will remember
your choice. Keep in mind that your files are saved with a .txt extension and in plain text.
2. Save text files using different encodings
You can also use Save As to change the encoding of your file to match a particular
character set. Here, a bit of text from our Romanian site digitalcitizen.ro has been cut and
pasted into Notepad.
If you were to try to save this as is, you would get a message that if you save it as plain
text, all the formatting would be lost.
You have to choose the appropriate encoding from the drop-down list. This might take a
little experimentation to get right, depending on the types of characters in the file, but
starting with Unicode is a good bet.
If you are not familiar with encoding, the first section of this tutorial should help explain
it: Make Windows correctly display characters from languages other than English (set
non-Unicode programs).
3. Save files as HTML files
You can also use Notepad to create HTML files. Make sure that Word Wrap is turned on
(we will discuss this in just a minute) and type your HTML code the way you would type
plain text. When it comes time to save your work, choose Save As, and select All
Files from the list of choices. Then save your file with the .htm or .html extension.
UNIT 3
Data Processing
File and Records
Sequential, Direcct/Random Index
Use of computer in Business
Use of Computer in personal, administrative and accounting
Collection, manipulation, and processing collected data for the required use is known as
data processing. It is a technique normally performed by a computer; the process includes
retrieving, transforming, or classification of information.
However, the processing of data largely depends on the following −
The volume of data that need to be processed
The complexity of data processing operations
Capacity and inbuilt technology of respective computer system
Technical skills
Time constraints
In manual data processing, data is processed manually without using any machine
or tool to get the required results. In manual data processing, all the calculations
and logical operations are performed manually on the data. Similarly, data is
transferred manually from one place to another. This method of data processing is
very slow, and errors may occur in the output. Mostly, is processed manually in
many small business firms as well as government offices & institutions. In an
educational institute, for example, marks sheets, fee receipts, and other financial
calculations (or transactions) are performed by hand. This method is avoided as far
as possible because of the very high probability of error, labor intensive and very
time-consuming. This type of data processing forms the very primitive stage when
technology was not available, or it was not affordable. With the advancement of
technology, the dependency on manual methods has drastically decreased.
Electronic data processing or EDP is the modern technique to process data. The
data is processed through a computer; Data and set of instructions are given to the
computer as input, and the computer automatically processes the data according to
the given set of instructions. The computer is also known as electronic data
processing machine.
This method of processing data is very fast and accurate. For example, in a
computerized education environment results of students are prepared through a
computer; in banks, accounts of customers are maintained (or processed) through
computers, etc.
Batch Processing
2. Online Processing
This is a method that utilizes Internet connections and equipment directly attached
to a computer. This allows for the data stored in one place and being used at an
altogether different place. Cloud computing can be considered as an example
which uses this type of processing. It is used mainly for information recording and
research.
3. Real-Time Processing
This technique can respond almost immediately to various signals to acquire and
process information. These involve high maintenance and upfront cost attributed
to very advanced technology and computing power. Time saved is maximum in
this case as the output is seen in real time. For example in banking transactions
4. Distributed Processing
3.3 File – A file is named collection of related information that is recorded on secondary
storage such as magnetic disks, magnetic tables and optical disks.
The easiest method for file Organization is Sequential method. In this method the the file
are stored one after another in a sequential manner. There are two ways to implement this
method:
1. Pile File Method – This method is quite simple, in which we store the records in a
sequence i.e one after other in the order in which they are inserted into the tables.
Insertion of new record –
Let the R1, R3 and so on upto R5 and R4 be four records in the sequence. Here,
records are nothing but a row in any table. Suppose a new record R2 has to be
inserted in the sequence, then it is simply placed at the end of the file.
2. Sorted File Method –In this method, As the name itself suggest whenever a new
record has to be inserted, it is always inserted in a sorted (ascending or descending)
manner. Sorting of records may be based on any primary key or any other key.
When using the direct access method, the record occurrences in a file do not have to be
arranged in any particular sequence on storage media. However, the computer must keep
track of the storage location of each record using a variety of direct organization methods
so that data is retrieved when needed. New transactions data do not have to be sorted, and
processing that requires immediate responses or updating is easily handled.
In the direct access method, an alogrithm is used to compute the address of a record. The
primary key value is the input to the algorithm and the block address of the record is the
output. To implement the approach, a portion of the storage space is reserved for the file.
This space should be large enough to hold the file plus some allowance for growth. Then
the algorithm that generates the appropriate address for a given primary key is devised.
The algorithm is commonly called hashing algorithm. The process of converting primary
key values into addresses is called key-to-address transformation. More than one logical
record usually fits into a block, so we may think of the reserved storage area as being
broken into record slots sequentially numbered from 1 to n. These sequential numbers are
called relative pointers or relative addresses, because they indicate the position of the
record relative to the beginning of the file. The objective of the hashing algorithm is to
generate relative addresses that disperse the records throughout the reserved storage
space in a random but uniform manner.
Computer Application in Business
Business software (or a business application) is any software or set of computer programs
used by business users to perform various business functions. These business applications
are used to increase productivity, to measure productivity and to perform other business
functions accurately.
By and large, business software is likely to be developed to meet the needs of a specific
business, and therefore is not easily transferable to a different business environment,
unless its nature and operation is identical. Due to the unique requirements of each
business, off-the-shelf software is unlikely to completely address a company's needs.
However, where an on-the-shelf solution is necessary, due to time or monetary
considerations, some level of customization is likely to be required. Exceptions do exist,
depending on the business in question, and thorough research is always required before
committing to bespoke or off-the-shelf solutions.
Some business applications are interactive, i.e., they have a graphical user interface or
user interface and users can query/modify/input data and view results instantaneously.
They can also run reports instantaneously. Some business applications run in batch mode:
they are set up to run based on a predetermined event/time and a business user does not
need to initiate them or monitor them.
Some business applications are built in-house and some are bought from vendors (off the
shelf software products). These business applications are installed on either desktops or
big servers. Prior to the introduction of COBOL (a universal compiler) in 1965,
businesses developed their own unique machine language. RCA's language consisted of a
12-position instruction. For example, to read a record into memory, the first two digits
would be the instruction (action) code. The next four positions of the instruction (an 'A'
address) would be the exact leftmost memory location where you want the readable
character to be placed. Four positions (a 'B' address) of the instruction would note the
very rightmost memory location where you want the last character of the record to be
located. A two digit 'B' address also allows a modification of any instruction. Instruction
codes and memory designations excluded the use of 8's or 9's. The first RCA business
application was implemented in 1962 on a 4k RCA 301. The RCA 301, mid frame 501,
and large frame 601 began their marketing in early 1960.
Many kinds of users are found within the business environment, and can be categorized
by using a small, medium and large matrix:
The small business market generally consists of home accounting software, and
office suites such as LibreOffice, Microsoft Office or GSuite.
The medium size, or small and medium-sized enterprise (SME), has a broader
range of software applications, ranging from accounting, groupware, customer
relationship management, human resource management systems, outsourcing
relationship management, loan origination software, shopping cart software, field
service software, and other productivity enhancing applications.
3.4.1
Retaining
Hiring
Onboarding
Administration
Managing payroll
HR planning
Recruiting/Learning management
Performance management
Employee self-service
Scheduling
Absence management
Analytics
Employee reassign module
Grievance handling by following precedents
The payroll module automates the pay process by gathering data on employee time and
attendance, calculating various deductions and taxes, and generating periodic pay
cheques and employee tax reports. Data is generally fed from the human resources and
timekeeping modules to calculate automatic deposit and manual cheque writing
capabilities. This module can encompass all employee-related transactions as well as
integrate with existing financial management systems.
Accounting software describes a type of application software that records and processes
accounting transactions within functional modules such as accounts payable, accounts
receivable, journal, general ledger, payroll, and trial balance. It functions as an
accounting information system. It may be developed in-house by the organization using
it, may be purchased from a third party, or may be a combination of a third-party
application software package with local modifications. Accounting software may be on-
line based, accessed anywhere at any time with any device which is Internet enabled, or
may be desktop based. It varies greatly in its complexity and cost.
The market has been undergoing considerable consolidation since the mid-1990s, with
many suppliers ceasing to trade or being bought by larger groups.
Modules
Core modules
Accounts receivable—where the company enters money received
Accounts payable—where the company enters its bills and pays money it owes
General ledger—the company's "books"
Billing—where the company produces invoices to clients/customers
Stock/inventory—where the company keeps control of its inventory
Purchase order—where the company orders inventory
Sales order—where the company records customer orders for the supply of
inventory
Bookkeeping—where the company records collection and payment
Financial Close Management — where accounting teams verify and adjust
account balances at the end of a designated time period
Non-core modules
Debt collection—where the company tracks attempts to collect overdue bills
(sometimes part of accounts receivable)
Electronic payment processing
Expense—where employee business-related expenses are entered
Inquiries—where the company looks up information on screen without any edits
or additions
Payroll—where the company tracks salary, wages, and related taxes
Reports—where the company prints out data
Timesheet—where professionals (such as attorneys and consultants) record time
worked so that it can be billed to clients
Purchase requisition—where requests for purchase orders are made, approved and
tracked
Reconciliation—compares records from parties at both sides of transactions for
consistency
Drill down
Journals
Departmental accounting
Support for value added taxation
Calculation of statutory holdback
Late payment reminders
Bank feed integration
Document attachment system
Document/Journal approval system
Note that vendors may use differing names for these modules.
Project Cost Management (PCM) is a method that uses technology to measure cost and
productivity through the full life-cycle of enterprise level projects.[citation needed]
PCM encompasses several specific functions of project management including
estimating, job controls, field data collection, scheduling, accounting and design. PCM's
main goal is to complete a project within an approved budget.
Beginning with estimating, a vital tool in PCM, actual historical data is used to accurately
plan all aspects of the project. As the project continues, job control uses data from the
estimate with the information reported from the field to measure the cost and production
in the project. From project initiation to completion, project cost management has an
objective to simplify and cheapen the project experience.
This technological approach has been a big challenger to the mainstream estimating
software and project management industries.
Procurement software is business software that helps to automate the purchasing function
of organizations. Activities including raising and approving purchase orders, selecting
and ordering the product or service, receiving and matching the invoice and order, and
paying the bill is handled electronically, enabling the procurement department to see
everything that is ordered, ensure that nothing can be ordered without correct approvals,
and lets them get the best value by combining several orders for the same type of good or
even getting suppliers to bid for the business. Buying organisation's choice can be driven
by the particular strengths offered by each individual system and the number of vendors
available through them. A multinational or otherwise large organization will use a shared
procurement system to take advantage of economies of scale to drive down the cost of
purchases. While traditionally most e-procurement software systems have been designed
for larger organizations, there are now also systems available for the SMB market, such
as the Free-Procurement Project and an open source alternative by ProcuMan. Whilst
some services are available to purchase through automated systems, the key strength of
these systems lies in the procurement of commodities that are much easier to standardise.
Banking software is enterprise software that is used by the banking industry to provide
and manage the financial products they provide. Within retail banks, banking software
typically refers to core banking software and all its interfaces that allows them to connect
to other modular software and to the interbank networks. Within investment banking,
banking software typically refer to the trading software used to access capital markets.
Categories
3.8.1 Banks
Commercial or retail banks use what is known as core banking software which record and
manage the transactions made by the banks' customers to their accounts. For example, it
allows a customer to go to any branch of the bank and do its banking from there. In
essence, it frees the customer from their home branch and enables them to do banking
anywhere. Further, the bank's databases can be connected to other channels such as
ATMs, Internet Banking, payment networks and SMS based banking.
Account Management :
In banking, activities start with banks automating customer accounts, which allows
personnel to create, update and maintain customer records. Banking hardware and
software have enhanced the accuracy of accounts that tellers and other banking personnel
process. Banking software performs customer transactions through a centralized data
record system. Account management is the genesis and backbone of all banking
information systems.
Electronic Transactions
Web-based banking
Web-based banking systems use a dedicated server through a bank network system. An
area of the banking system is partitioned for Internet applications. Web-based banking
systems by law must include secure servers and authenticated certificates regarding
transactions from the Federal Deposit Insurance Company and the Federal Reserve
Board. Customers who choose to bank online can access their account through a web
interface, which integrates with the main computer. A customer's credentials -- user ID
and password -- pass through several checkpoints before entering the main system to
perform a web-based transaction.