Professional Documents
Culture Documents
Computer Important Nicky PDF
Computer Important Nicky PDF
File Management System (FMS) : A software package that allows users to define data items, place
these items into specified records combine these records into designated files and then manipulate
and retrieve stored data. An FMS can access records from only one file at a time.
File Organization : The technique used to represent and store the records on a file is called the File
Organisation.
The file organization techniques are three types :
Sequential File Organization : The most basic way to organize the collection of records
that from a file is to use sequential organization.
Random File Organization : A random access file enables you to read or write informa
tion anywhere in the database.
Indexed Sequential File Organization : Indexed sequential Access Method (ISAM), a
method for managing how a computer accesses records and files stored on a hard disk.
While storing data sequentially, ISAM provides direct access to records through an index.
This combination results in quick data access regardless of whether records are being
accessed sequentially or randomly.
Back-up Copy : It is the reference of original file (or) duplicate version of original file.
Buffer : A storage area where data are temporarily stored.
Block : A group of records
De-Block : An individual record.
DBMS : (Database Management System) : The software used for the management, mainte-
nance and retrieval of data stored in a database.
DBMS is sub-divided into three types
DDL (Data Definition Language)
DML (Data Manipulation Language)
DCL (Data Control Language)
Types of DBMS : There are three types of DBMS.
Hierarchical DBMS : A DBMS is said to be hierarchical if the relationships among data in
the database are established in such away that one data item is present as the subordinate
of another one.
Network DBMS : In Network DMBS, the relationships among data in the database are of
type many-to-many.
Relational DBMS : The software that manages data in more than one file at a time. In
RDBMS, the database relationships are treated in the form of a table. the table represents
the data with rows and columns rather than as lists of records.
Data Automation : Making data entry and validation as automatic as possible is known as
"Data Automation".
Data Recovery : A program which attempts to recover deleted or damaged data is known as
"Data Recovery".
Data Compression : A program which force data into less space on the storage medium.
Data Integrity
Data Validation.
E - COMMERCE
E - Commerce (Electronic Commerce) : E-Commerce is the buying and selling of goods and ser-
vices on the internet. The visitor to the site can sell or buy any product or service online. The transac-
tions are enable through credit cards, Debit cards etc.
E-Business (Electronic Business) : E-Business is the administration of conducting business via
the Internet. This would include the buying and selling of goods and services, along with providing
technical or customer support through the Internet. E-Business is used in conjunction with E-Com-
merce, but includes services in addition to the sale of goods.
E-Administration : The use of ICTs (Information and Communication technologies) to modernize the
state, the creation of data repositories for MIS (Management Information Systems), computerisation
of records.
E-Services : the emphasis here is to bring the state closer to the citizens. Examples include provi-
sion of online services. E-Services and E-Administration together constitute what is generally termed
e-governance.
E-Governance : The use of IT to improve the ability of government to address the needs of society.
It includes the publishing of policy and programme related information to transact with citizens. It
extends beyond provision of on-line services and use of IT for strategic planning and reaching devel-
opment goals of the government.
E-Democracy : The use of IT to facilitate the ability of all sections of society to participate in the
governance of the state. The remit is much broader here with a stated emphasis on transparency',
accountability and participation. Examples are online disclosure policies, online grievance redress
forums and e-referendums.
Electronic Funds Transfer (EFT) : A cashless approach used to pay for goods and services.
Electronic signals between computers are used to adjust the accounts of the parties involved in a
transaction. Electronic Funds transfer (EFT) is also known as "Electronic Banking (E-Banking)". E-
Banking is the use of electronic means to transfer funds directly from one account to another, rather
than by cheque or cash.
Internet Banking or Online Banking : internet Banking allows customers to conduct financial trans-
actions on a secure website operated by their retail or virtual bank, credit union or building soeicty.
E-Marketing : E-Marketing is also known as Internet Marketing, Digital Marketing, Web Marketing,
Online Marketing, Search Marketing, I-Marketing (Internet Marketing) is the Marketing of products or
services over the Internet.
Types of E-Marketplace:
1. Horizontal Marketing : A horizontal Market is a market which meets a given need of a wide
variety of industries, ratrher than a specific one.
2. Vertical Marketing : A vertical Marketing used to define a comany's approach towards targeting
that focuses on specific industries.
E-Procurement (Supplier exchange) : E-Procurement is more than just a system for making pur-
chases online. A properly implemented system can connect companies and their business processes
directly with suppliers while managing all interactions between them. Examples are bids, manage-
ment correspondence, questions and answers, previous pricing and multiple emails sent to multiple
participants.
Types of E-Commerce :
1. Business to Customer (B2C) : The basic concept of this model is to sell the product online to
the customers. It provides direct selling through online. B2C is the indirect trade between the
company and consumers. Directly interact with the customers is the main difference with other
business model.
2. Business to Business (B2B) : It is similar to manufacturer issuing goods to the retailer or whole-
saler. This model defines that Buyer and seller are two different entities. It consists of longest form of
E-Commerce. It is one of the cost effective way to sell out product through out the world.
3. Customer to Customer (C2C) : It helps the online dealing of goods or services among people.
though there is no major parties needed but the parties will not fulfill the transactions without the
program which is supplied by the online market dealer such as eBay.
4. Peer to Peer (P2P) : It is a discipline that deal itself, which assists people to instantly shares
related computer files and computer sources without having to interact with central webserver.
5. M-Commerce : This model deals with conducting the transactions with the help of mobile. The
mobile consumers can interact each other and can lead the business. M-Commerce (Mobile Com-
merce) involves the change of ownership or rights to utilize goods and related services.
DATA COMMUNICATION
Data Communication : Data Communication refers to the transmission of the digital signals over a
communication channel between the transmitter and receiver computers.
(or)
Data Communication refers to the sharing of information between two interconnected systems in
a network.
The Five Elements of Data Communications :
1. Computer
2. Source (Sender)
3. destination (Receiver)
4. communication Device
5. transmission Medium
COMMUNICATION DEVICES :
1. Wire Pairs : Wire pairs are used in local telephone communication and for short distance digital
data communication. They are usually made up of copper and the pair of wires is twisted to
gether.
2. Coaxial Cables : Coaxial cable is groups of specially wrapped and insulted wires that are able to
transfer data at higher rate. They consist of a central copper wire surrounded by an insulation
over which copper mesh is placed. Coaxial cables are used for long distance telephone lines and
LAN for their noise immunity and faster data transfer.
3. Microwave : Microwave system uses very high frequency radio signals to transist data through
space. the transimitter and receiver of a microwave system should in line-or-sight because the
radio signal cannot bend.
With microwave very long distance transmission is not possible to overcome this problem of line
of sight and power amplification of weak signal, repeaters are used at regular intervals between
the transmitting and receiving end.
4. Communication Satellite : A Communication satellite is a microwave relay station placed in
outer space. In satellite communication, microwave signal is transmitted from a transmitter on
earth to the satellite at space. The satellite amplifies the weak signal and transmits it back to the
receiver.
The main advantage of satellite communication is that it is a single microwave relay station visible
from any point of a very large area.
Data Transmission Modes : There are three ways for transmitting data from one system to another
system.
1. Simplex : In simplex, the communication can take place in one direction (source to Destination)
The flow of information is Uni-directional. The receiver receives the signal from the transmitting
device. Ex: Pazer.
2. Half - Duplex : In half-duplex, communication channel is used in both directions but only in one
direction at a time. Thus, a half-duplex line can alternately send and receive data.
Ex: Walky-Talky
3. Full - Duplex : In full - duplex, the communication channel is used in both directions at the same
time.
Ex : Telephone call conversation.
Flow Control : Flow control is needed when the sender transmits faster than the receiver or interme-
diate network equipment can process the transmissions.
Routing : When systems are not directly connected, intermediary systems along the route to the
intended receivers need to forward messages on behalf of the sender. On the Internet, the networks
are connected using routers.
Types of Data Transmission :
Digital and Analog transmission : Data is transmitted from one point to another point by means
of electrical signals that may be in digital and analog form. In analog signal, the transmission
power varies over a continuous range with respect to sound, light and radio waves. A digital signal
may assume only discrete set of values within a given range. Analog signal is measured in volts
and its frequency in Hertz (HZ).
Serial and Parallel Transmission : Serial data transmission implies transfer data transfer
bit-by-bit on the single (serial) communication line. In serial transmission, data is sent in a serial
form i.e., bit by bit on a single line. The cost of communication hardware is consider able reduced
since only a single wire or channel is require for the serial bit transmission. Serial data transmis
sion is slow as compared to parallel transmission.
Parallel data transmission is less common but faster than serial data transmission. Most data are
organized into 8 bit bytes.In some computers, data are further organized into multiple bits called
half words, full words.
Asynchronous and Synchronous Transmission : In asynchronous transmission data is trans
mitted character by character. It is cheaper to implement, as you donot have to save the data
before sending.
In synchronous mode, the saved data is transmitted block by block. Each block can contain many
characters. Synchronous transmission is well suited for remote communication between a com
puter and related devices like printers and card readers.
Protocol : A set of rules and regulations for transmitting the data from one system to another system
in a network is known as "Protocol". The procedure of data transformation in the form of software is
known as "Protocol".
Ex : of Protocols :
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Internet Protocol (IP)
Post Office Protocol (POP3)
Hyper Text Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Internet Control Message Protocol (ICMP)
Internet Message Access Protocol (IMAP)
Functions of Protocol : Protocol performs the following functions for the efficient and error free
transmission of data.
Data Sequencing : A long message to be transmitted is broken into smaller packets of fixed size
for error free data transmission
Flow Control : All machines are not equally efficient in terms of speed. The flow control regulates
the process of sending data between fast sender and slow receiver.
Data Routing : It is the process of finding the most efficient route between source and destination
before sending the data.
Error Control : Error detecting and recovering is the one of the main function of protocol. It
ensures that data are transmitted without any error.
Bandwidth : The capacity at which a given communication channel, such as ordinary copper
telephone line, can transfer information. Increasing bandwidth increases the speed at which data
transfer takes place.
NETWORKING
Network : An interconnection of computer system and/or peripherals with carriers and data commu-
nications devices for the purpose of exchanging data and information. the users share hardware or
software over the network.
Network Types: Networks can be categorized in several different ways. Common examples of area
network types are :
LAN : Local Area Network
WLAN : Wireless Local Area Network.
CAN : Campus Area Network (or) Controller Area Network (or) Cluster Area Network.
PAN : Personal Area Network
DAN : Desk Area Network
SAN : Storage Area Network (or) System Area Network (or) Small Area Network
(or) Server Area Network
MAN : Metropolitan Area Network
GAN : Global area Network
WAN : Wide Area Network
Categories of Networks: Based on the architecture networks can be broadly classified as :
1. Peer-to-peer architecture
2. Client/server architecture
1. Peer-to-peer architecture : P2P is a type of network in which each computer has equal capa
bilities and responsibilities.
2. Client/Server architecture : A network architecture in which each computer on the network is
either a client or a server. Servers are powerful computers dedicated to managing disk drives,
network traffic. Clients are PCs on which users run applications.
Protocol : A set of rules and regulations for transmitting the data from one system to another system
in a network.
Client : The system request for the data for further processing.
Server : A system that shares resources with one or more workstations on a network.
Client-Server Computing : A memory computing computer applications in which required functions
are grouped at service requestors and service providers. Client request services and servers provide
them, this method particularly is suited for applications implemented on distributed computers.
Node : Each device connected to a network is known as "Node". An end point, of a branch in a
network or a common junction of two or more network branches.
Network Topology : the structure of interconnecting of nodes of a computer network is known as
"Network Topology". A Network topology represents its layout or structure from the point of view of
data flow. Network topologies are categorized into the following basic types:
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Tree Topology
5. Mesh Topology
1. Bus Topology : All devices are connected to a central cable, called the bus or backbone. All
information transmitted a cross the bus can be received by any system in the network.
2. Ring Topology : all devices are connected to one another in the shape of a closed loop. So that
every device has exactly two neighbors for communication purposes. All messages travel through
a ring in the same direction (either "clockwise" or "Anticlockwise"). A failure in any cable or device
breaks the loop and can take down the entire network.
3. Star Topology : All devices are connected to a central hub. Nodes communicate a cross the
network by passing data through the web.
4. Tree Topology : A hybrid topology. One "root" node connects to other nodes, which in turn con
nect to other nodes, forming a tree structure. Information from the root node may have to pass
through other nodes to reach the end nodes.
5. Mesh Topology : Mesh topology involve the concept of routes. Nodes are connected with many
redundant interconnections between network nodes. Messages sent on a Mesh Topology can
take any of several possible paths from source to destination.
Networking Cables : Cable is the measuring through which information usually moves from one
network device to another.
Some types of the network cables are :
1. Coaxial Cable
2. Fiber Optic Cable
3. Shielded Twisted Pair (STP) Cable.
4. Unshielded Twisted Pair (UTP) Cable.
1. Coaxial Cable : Coaxial lines confine the electromagnetic wave to the area inside the cable be
tween the center conductor and the shield. The most common use for coaxial cables is for televi
sion.
2. Fiber Optic Cable : An optical Fiber cable containing one or more optical fibers. The optical
elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed.
3. Shielded Twisted Pair (STP) Cable : Shielded Twisted Pair cables are an attempt to prevent
electromagnetic interference. Because the shielding is made of metal. This type of cabling offers the
best protection from interference from external sources, and also eliminates alien crosstalk.
4. Unshielded Twisted Pair (UTP) : Unshielded Twisted Pair Cable is the most common cable
used in computer networking Unshielded Twisted Pair cable is used in data networks for short and
medium length connections because of its relatively lower costs compared to optical fiber and coaxial
cable. UTP is used in video applications, security cameras.
MODEM (MODULATOR - DE MODULATOR) : Devices used to convert digital signals to its analog
form (modulation) at the sending end and back to digital signals from analog form (demodulation) at
the receiving end.
10
Bandwidth : Bandwidth refers to the data rate supported by a network connection or interface. Band-
width is the primary measure of computer network speed. Example of low bandwidth connection is
dial-up connection. Example of high bandwidth connection is Broadband.
ISO/OSI (International Standard Organization for open Systems Interconnection) : ISO/OSI
standard clearly defines the functions of communication softwares in a generalized and structured
manner which helps to carryout the network product development activities. ISO/OSI model indicates
about how the data transmit from one system to another system in a network. ISO/OSI model con-
sists of 7 layers.
Source Destination
APPLICATION APPLICATION
PRESENTATION PRESENTATION
SESSION SESSION
TRANSPORT TRANSPORT
NETWORK NETWORK
DATALINK DATALINK
PHYSICAL PHYSICAL
Physical Medium
Fig : ISO/OSI Model
1. Physical Layer : Physical layer transmits the data between the systems by 'Bit-by-Bit" level. It
uses "Category-5" wires for data transmission. It connects the two systems through physical medium
such as coaxial cables, Fiber optics, vaccum etc.
2. Datalink Layer : Datalink layer transmits the data between the systems by "frames (or) Seg-
ment" levels. It communicates the data between adjacent nodes or systems or work stations. This
layer uses HUB and PPP (Process to Process Protocol) for data transmission.
3. Network Layer : Network Layer transmits the data between the systems by "packet" level. This
layer was IP (Internet Protocol), ICMP (Internet Control Message Protocol) and TCP (Transmission
Control Protocol).
4. Transport Layer : Transport Layer indicates about the type of communication. It uses TCP (Trans-
mission Control Protocol) and UDP (User Datagram Protocol).
Data Transmission is divided into two types :
Connection - Oriented Transmission :
It is reliable transmission
It gives the acknowledgements (Delivery Reports)
It uses TCP for data transmission
Example : Sending messages, e-mails.
Connection - Less Transmission :
It is non-reliable Transmission
It doesn't give the acknowledgements.
11
12
INTERNET
13
4. Digital Subscriber Line (DSL) : DSL Provides a connection to the Internet through the tele-
phone network. DSL can operate using a single phone link without preventing normal use of the tele-
phone line for phone calls.
5. T-Line : Here Internet access data is carried over fiber optic lines or copper lines. They are quick
but highly regulated and generally intended for business use.
6. Broadband : It provides a high data rate access to the Internet and also provides a continuous
connection. Broadband is the fastest internet connection.
7. Wi-Fi (Wireless Fidelity) : It is the standard method to connect a high speed local area network
via wireless transmission/receiver. Wi-Fi is convenient for mobile internet users and can bring ser-
vices to areas where wiring would be costly.
Web Browser : A web browser is a software that helps the user to navigate the WWW. It is a client
software that allows the user to display and interact with a hypertext document.
Examples : Mosaic, Netscape Navigator, Internet Explorer (IE), Opera, Safari, Mozilla Firefox, Google
Chrome etc.
MOSAIC : Mosaic is the first web browser and was developped by the "National Center for
Supercomputing Applications (NCSA)" in 1993.
Netscape Navigator : Netscape Navigator was released in 1994 and is one of the fastest web
browsers currently available in the market. It is available for UNIX, Windows and Machinatosh plat-
forms and has built in e-mail and Newsgroup facilities.
Microsoft Internet Explorer : IE is based on NCSA's MOSAIC and is distributed under a licens-
ing agreement with spyglass Inc. This is a shareware software and it is available in various versions
for various windows products. IE is the default webbrowser for windows operating systems.
Web Server : A web server is a computer program that accepts HTTP requests from web clients and
provides them with HTTP responses. Web server is a place where pages reside. It is also use to
refers to the computer that runs the server programs.
Examples : "Internet Information Server (IIS)" from "Microsoft".
"Fast Track" from "Netscape".
"Intranetware" from "Novell".
Search Engine : Search Engines are websites that allows the users to search on keywords or
combination of keywords to provide the information to the user.
Examples : Google, yahoo, Altavista, All myfaves etc.
Cyberspace : This term is used to refer to the computer networks connected to each other and their
communication. It is often used to refer to the Internet.
Internet chat: Internet chat is a real time synchronous conferencing that is used for group communi-
cation as well as one-to-one communication over the Internet. Internet chat software is an interactive
software that allows the user to type comments in one window and receives replies in another win-
dow.
Web Page : Web pages are created in the HTML format and provide the web users with navigational
abilities through hyperlinks to other webpages on the web. Webpages are resources of information.
Webpage is also referred as "Hyper Text Document". A webpage can contain text, ,pictures, audio and
visual etc.
Home page : Home page is the default page of any website. It is the main page of a website.
14
Protocal Identifier and resource name are seperated by a colon and two forward slashes.
Any link from one document to another document is always implemented by using a URL. A URL
contains information about the location of the document. A URL may point to another HTML document
or an image.
URL is a web addressing scheme that spellsout the exact location of an Internet resources. When the
15
user clicks on a link, the browser reads the link to the document. The information about the link is
provided to the browser by URL.
Components of URL :
FTP : To get or send a file to another system on the Internet.
TELNET : To view files in a directory in a system on another network.
HTTP : To get or send information to another system on the Internet.
e-mail : To communicate with a particular person on the Internet.
Newsgroup : To communicate with a group of people in a similar topic.
WWW : To read multimedia documents on the Internet.
Gopher : Search for everything about a specific topic on the Internet.
Internet Protocols : A set of rules and conventions that specify how devices on network exchange
information.
Some of the protocols are:
1. Internet protocol (IP)
2. Transmission Control Protocol (TCP)
3. User Datagram Protocol (UDP)
4. Address Resolution Protocol (ARP)
5. Internet Control Message Protocol (ICMP)
6. File Transfer Protocol (FTP)
7. Hyper text Transfer Protocol (HTTP)
8. Simple Network Management Protocol (SNMP)
9. Network File System (NFS)
10. external Data Representation (XDR)
11. Remote procedure Call (RPC)
12. Domain name System (DNS)
13. Simple Mail Transfer Protocol (SMTP)
14. Point-to-point-protocol (PPP)
15. Internetwork Packet Exchange (IPX)
16. sequenced Packet Exchange (SPX)
Hypertext Tranfer Protocol (HTTP) : HTTP is a protocol used on the web to transfer hypertext
documents (web pages). HTTP is a protocol which helps web client to establish communication with
the webserver. HTTP sends the data in the form of "message". HTTP is a request and response
protocol between client and server. HTTP is useful for transfering the data in any format such as text,
graphgics, images etc.
File Transfer Protocol (FTP) : File Transfer Protocol (FTP) translates the individual files from one
system to another system on the Internet. FTP sends the data in the form of "packets".
Standard Generalized Markup Language : SGML is a language for defining the markup languages.
16
SGML defines a document structure using a special grammer called "Document type Definition (DTD).
Hyper Text Markup Language (HTML) : HTML is a scripting language.
HTML is use to create the hypertext documents (web pages).
HTML is the encoding scheme use to create hypertext document.
HTML language is use for describing the text based information on the webpage.
Hyper Text : A piece of text that works as a link.
Markup Language : A language of writing layout information with in documents.
HTML extension is ".html" or ".htm".
HTML is divided into two types.
1. SHTML (Static Hyper Text Markup Language)
2. DHTML (Dynamic Hyper Text Markup Language)
Hypertext Preprocessor (PHP) : Hypertext Preprocessor (PHP), the coding language to create
interactive webpages and so forth.
CSS (Cascading Style Sheets) : While HTML dictates the content of page, CSS regulates the for-
mat, including headers, footers, navigation bars etc. While all of these elements can be created in
HTML, such a method would have to be repeated on every webpage. CSS on the other hand, is
applied to all pages of a websites.
Download : To transfer information from host computer to a personal computer often through mo-
dem.
Upload : To transfer information from personal computer to host computer often through modem.
Upgrade : It refers to the replacement of a new product with the same product.
Companies and Their Founders :
Microsoft Bill gates
Google Sergey Brain and Larrypase (1997)
Yahoo Journeying and David(1994)
Facebook Mark Jukerberg
Apple Steeve Jobbs
Oracle Tim Nerveski
Wikipedia Jimmy Wales
Twitter Bizz Stone
17
18
COMPUTER SECURITY
Security : Security controls access to data in files and permits only authorized use of terminals
and other equipments. Control is usually through various levels of passwords assigned on the
basis of need to know.
Typical approaches to improving Computer security can include the following :
Physically limit access to computers to only those who will not compromise security.
Hardware Mechanisms that impose rules on computer programs, thus avoiding depending on
computer programs for computer security.
Operating system Mechanisms that impose rules on programs to avoid trusting Computer Pro-
grams.
Programming strategies to make computer programs dependable and resist subversion.
Security Tools :
Firewall : A firewall is a set of related programs, located at a network gateway server, that protects the
resources of a private network from users of other networks. Firewall can either be hardware devices
or software programs. They provide protection from Online intrusions. A firewall is designed to pre-
vent unauthorized Internet users from accessing your computer. All messages entering your Com-
puter from the Internet pass through the firewall which examines each message. The firewall blocks
any messge that was not specifically requested by your system.
Encryption : It can be used to protect the message from unauthorized users. It can be done in
several ways by switching the characters around, replacing characters with others, and even remov-
ing characters from the message.
Cryptographic Techniques : It can be used to defend data in transit between systems reducing the
probability that data exchanged between systems can be intercepted or modified. Secure
cryptoprocessors can be used to leverage physical security techniques into detecting the security of
the system. Strong authentication techniques can be used to ensure that communication end-points
are who they say they are.
Intrution - Detection - System : It can be scan a network for people that are on the network but who
should not be there oraredoing things that they shouldnotbedoing. For example trying a lot of pass-
words to gain access to the network.
Pinging : The Ping application can beusedby potential crackers to find if an IP address is reachable.
If a cracker finds a computer they can try a port scan to detect and attack services on that computer.
Anti-Virus Software : Anti-virus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software (Malware). The term "Antivirus"
isused because it is designed exclusively to combat computer viruses.
Antivirus software typically usestwo different approaches to accomplish this:
Examining (Scanning) files to look for known viruses matching definitious in a virus dictionary.
Identifying suspecious behaviour from any computer program which might indicateinfection : S
VIRUS (Vital Information Resource Under Siege) : VIRUS full form is "Vital Information Resource
Under Siege". A computer virus is a computer program that spreads by inserting copies of itself into
other executablecode or documents. Virus program that runs on your computer without your knowl-
edge and can cause damage to your files. A common way to receive a virus is through an attachment
via e-mail.
19
Worm : Worm is a self-replicating program. It replicates itself to new computers using the flaws and
then begins scanning and replicating again. The difference between a virus and worm is that a worm
does not create copies of itself on one system. It propagates through computer networks.
Trojan Horse : It is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and do its chosen form of dam-
age. Trojan Horses cannot replicate automatically. A Trojan horse can be used to setup a back door in
a computer system so that the intruder can return later and gain access.
Malware (Malicious Software) : It is a software designed specifically to damage or disrupt a system
such as a virus or Trojan horse.
Spyware : Spyware is a software that performs actions such as advertising, collecting personal data,
orchanging the configuration of your computer, usually without obtaining your consent. Spyware that
displays advertisements and tracks your personal information is known as "Adware".
Spam : E-mail spam also known as "Junk e-mail" or "Unsolicited Bulk e-mail (UBE), is a subset of
spam that involves nearly identical messages sent to numerous receipients by e-mail.
Phishing : Phishing is a fraudulent activity of acquiring the sensitive information by the use of a fake
identity during electronic communication.
Spoofing : It occurs when the sender of an e-mail message pretends to be someone else, they
falsely manipulate the "From" field in an e-mail. This is usually done to make you release sensitive
information.
Key loggers : Key logger is a software program designed to record (log) everykeystroke on the
machine on which it runs. Key logger is also known as "Key Stroke logger" or "System Monitor".
Packet Sniffer : A packet sniffer is an application that captures TCP/IP data packets, which can
maliciously be used to capture passwords and other data while it is in transit either within the com-
puter or over the network.
Root Kit : A root kit is a computer program that enable administrator - level access to a computer or
computer network. A cracker installs a root kit on a computer after first obtaining user-level access,
either by exploiting a known vulnerability or cracking a password. Once the root kit is installed, it allows
the hacker to mask intrusion and gain root or privileged access to the computer.
Cyber crime: It contains all criminal offences which are committed with the aid of communication
devices in a network. Example are :
Unauthorized access, malicious code, and denial-of-service attacks.
Theft of service and certain financial frauds.
Spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.
Hacking, phishing, identify theft, child pronography, online gambling securities fraud.
Hacking : Hacking is the activity of programmatically gaining access to a computer application that is
otherwise in accessible. The act of gaining an unauthorised access to a computer is known as "Hack-
ing".
Hacker : A Hacker is someone involved in computer security specializing in the discovery of exploits
in systems orin obtaining or preventing unauthorized access to systms through skills, tactics and
detailed knowledge.
Polymorphic Virus : A polymorphic virus modifies its program code each time it attaches itself to
another program or file.
20
21
22
23
ABBREVIATIONS
AC = Accumulator (or) Alternating Current
ACK = Acknowledge Character
A/D = Analog to Digital
ADO = Active X Data Objects.
ADCCP = Advanced Data Communication Control Procedure
ADP = Automatic Data Processing.
ADSL = Asymmetric Digital Subscriber Line.
ADT = Abstract Data type
AGP = Accelerated Graphic Port.
AI = Artificial Intelligence
AJAX = Asynchronous Java Script and XML
ALGOL = Algorithmic Language
ALU = Arithmetic and Logical Unit
AM = Amplitude Modulation (or) Accounting Machine (or)
Access Mechanism.
AMD = Advanced Micro Devices.
ANSI = American National Standards Institute.
AP = Attached Processor
APDOS = Apple Disc Operating System
API = Application Programming Interface.
APL = A programming Language
ARM = Advanced RiSC Machines.
ARPANET = Advanced Research Projects Agency Network.
ASCII = American Standard code for Information Interchange
ASK = Amplitude Shift keying.
ASP = Application Service Provider
ASR = Automatic Send and Receive.
AT = Access Time
ATDM = Asynchronous Time Division Multiplexing.
ATM = Automated Teller Machine (or) Asynchronous Transfer
Mode
AU = Arthmetic Unit
AVI = Audio Video Inter leaved.
B2B = Business - to - Business
24
25
26
27
F = F
FAQ = Frequently Asked Questions
FDD = Floppy Disk Drive
FDMA = Frequency - Division Multiple Access.
FIFO = First In - First Out.
FLOPS = Floating - Point Operations Per Second.
FM = Frequency Modulation.
FORTRAN = Formula Translation.
FTP = File Transfer Protocol
FXP = File Exchange Protocol
28
29
30
QA = Quality Assurance
31
32
33
34
35
MS - OFFICE
Microsoft Office is a non-free commercial office saite of different programs that allows you to
create documents, spread sheets, presentations, posters, send electronic mail. MS-Office services
for the Microsft Windows and Mac OS X operating systems, introduced by Microsoft in August 1,
1989.
The first version of MS-Office contained Microsoft Word, Microsoft Excel, and Microsoft Powerpoint.
Over the years, MS-Office applications have grown substantially closer with shared features such as
a common spell checker, OLE data integration and Microsoft Visual Basic for Applications Scripting
language.
The current versions are "MS-Office 2010" for Windows, (2013) released on June 15, 2010. It is
also known as "Version 14.0".
The current versions are "MS-Office 2011" for MAC OS X, released on October 26, 2010.
Components of MS-Office :
Word : Microsoft Word is a word Processor and was previously considered the main program in
office. It is available for the Windows and Mac platforms. The first version of Word, released in the
autumn of 1983, was for the MS-DOS operating. Word is used to create text documents like papers,
outlines, and bibliographics.
Excel : Microsoft Excel is a spreadsheet program that originally competed with the dominant Lotus 1-
2-3, but eventually out sold it. It is available for the Windows and Mac platforms. Microsoft released the
first version of Excel for the Windows in November 1987. Excel is used to create spreadsheets,
charts, tables, and graphs.
Power Point : Microsoft Power Point is a pouplar presentation Program for Windows and Mac. It is
used to create slideshows, composed of text, graphics, video and audio with pretty backgrounds.
Access : Microsoft Office Access Previously known as Microsoft Access, is a relational database
management system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software development tools. MS-Access stores data in its own format
based on the Access Jet Database Engine. It can also import or link directly to data stored in other
applications and databases. MS-Access is used to create databases, manage large quantities of
information, and create reports.
Outlook: Microsoft-Outlook is a personal information manager and e-mail communication software.
It includes an e-mail client, calendar task manager and address book.
Publisher : Microsoft Publisher is used to create visual print materials such as posters, brochures
and newsletters.
Front Page (HTML Editor-Web design) : It is used to create websites.
36
MS - OFFICE WORD
Word Processor is a software package that enables you to create, edit, print and save docu-
ments for future retrieval and reference. One of the main advantage of a word processor over a
conventional typewriter is that a word processor enables you to make changes to a document without
retyping the entire document. Editing a document involves correcting the spelling mistakes, if any,
deleting or moving words sentences or paragraphs.
Examples of Word Processing Packages are Softword, Word Star, Word perfect, Microsoft Word,
Text Maker, Wordpad, Google docs etc.
Features of Word Processor :
Text is typing into the computer, which allows alterations to be made easily
Text or paragraphs can be copied/moved throughout the document.
Words and sentences can be inserted or deleted.
Spelling can be checked and modified through the spell check facility.
Multiple files/documents can be merged.
Margins and page Length can be adjusted as desired.
Multiple copies of letters can be generated with different address through the mail-merge facility.
Important Components of MS-Word :
1. Title Bar : The Title Bar displays the name of the currently addresses active document. It is also
displays the minimize, maximize and close buttons.
2. Menu Bar : The Menu Bar displays at the top of the screen. The main menu further displays a sub
menu. At any time, only highlighted options can be executed, faded options are not applicable.
3. Tool Bar : Too Bar helps to perform a task faster and with great ease. The most commonly tool
bars are formatting tool bar and the standard tool bar. At any point of time, any tool bar can be
made ON or OFF through the tool bar option of view menu.
Standard Toolbar : The standard Toolbar has buttons for commonly performed tasks like save,
cut, copy, paste, print, sorting and adding a column of numbers etc.
Formatting Toolbar : The Formatting Toolbar has buttons for various formatting operations like
bold, italic, underline, left alignment, centre alignment, right alignment and changing text size or
style etc.
4. Ruler Bar : The Ruler Bar allows you to format the vertical alignment of text in a document.
5. Scroll Bar : The scroll Bar helps you scroll the content or body of document by click in on the
buttons with the arrow marked on them to move up and down and left and right of a page.
There are two Scroll Bars :
Horizontal Scroll Bar.
Vertical Scroll Bar.
6. Status Bar : The Status Bar displays information about the currently active document like page
number, column number, line number of the cursor position.
7. Workspace : The Workspace is the actual working area of the document. It is the area in the
document window were you enter/type the text of your document.
37
38
Frame
Table (Ctrl+F12)
Horizontal Ruler
Picture
Object
FORMAT : TABLE :
Default Formatting Insert
Character Delete
Paragraph Select
Bullets and Numbering Merge Cells
Page Split Cells
Change Case Protect Cells
Columns Merge Table
Sections Split Table
Styles and Formatting (F11) Auto Format
Auto Correct Autofit
Anchor Heading rows repeat
Wrap Convert
Alignment Sort
Arrange Formula (F2)
Flip Number Format
Group Table Boundaries
Object Table Properties
Picture
TOOLS : WINDOW :
Spelling and Grammer (F7) New Window
Language Close Window (Ctrl+W)
Word Count
Outline Numbering
Line Numbering
Footnotes/End notes
Gallery
Media Player
39
40
MS - OFFICE EXCEL
Spread Sheet : Spread Sheet consists a standard grid, which may be scrolled and zoomed. Text,
numeric or date values or formulas may be entered into the selected cell through the formula bar at
the top of the screen.
Features of Spread Sheet : 1. Cell Formatting
2. Multiple Worksheets
3. Searching & Sorting
4. Import/Export
5. Functions
6. Charts
Examples of Spread sheet are MS-Excel, Kspread, Lotus 1-2-3 etc.
MS-Excel : MS-Excel is a windows spreadsheet application. It is quite useful in entering, editing,
analysis and storing of data.
Features of MS-Excel :
1. Auto Format : To choose many preset table formatting options.
2. Auto Sum : To add the contents of a cluster of adjacent cells.
3. Auto Fill : To fill cells with repetitive or sequential data.
4. List Auto Fill : It automacally extends cell formatting when a new item is added to the end of a list.
5. Wizard : It guides to work effectively while you work by displaying various helpful tips and tech
niques based on what you are doing.
6. Charts : This feature helps in presenting a graphical representation of your data in the form of Pie,
Bar, Line charts.
7. Auto Shapes Toolbar : This feature helps to draw a number of geometrical shapes, arrows,
flowchart elements, stars and more.
8. Pivot Table : It flips and sums data in seconds and allows you to perform data analysis and
generating reports like periodic financial statements, statistical reports etc.
Components of the Excel Window :
Active Cell : Present working cell in a MS-Excel document. It has a dark border around it to indicate
your present position in the worksheet. Click the mouse on a cell to make it active.
Cell : The intersection of a row and a column is called as "Cell".
Name box: The name box displays the reference of the selected cell.
Formula bar : Formula bar is used to enter and edit worksheet data. The contents of the active cell
always appear in the formula bar. The Formula bar is located under the toolbar at the top of the Excel
worksheet.
Worksheet Tabs : An Excel workbook consists of multiple worksheets. Use the Worksheet tabs at
the bottom of the screen to navigate between worksheet within a workbook.
Fill handle : The lower right corner of the active cell has a small box called "Fill handle". The Fill
Handle helps you copy data and create services of information. Your Mouse changes to a cross-hair
41
when you are on the Fill Handle. For example, if you type sunday in the active cell and then drag the Fill
Handle over five cells, Excel automatically inserts monday, tuesday etc.
Page break : To set page break within the worksheet, select the row you want to appear just below
the page break by clicking the row's label.
Merged Cells : Combine two or more cells together and formatting one big cell is known as "Merging
of Cells"
Cell References : Each cell of the worksheet has a unique reference. For example, K7, refers to the
cell containing column number "K" and row number "7".
Wrapper Text : It gives you the ability to put a lot of information into one cell without "Spilling over" into
an adjacent cell.
Charts : Charts help you display data in more meaning full way. We can use the chart wizard to
create a chart and we can use the chart Type command to change an existing chart. The available
chart types are column charts, Bar Charts, Line Charts, Pie charts, XY charts, Stock charts, area
charts, grant charts, histograms etc.
Key Board Shortcuts in Excel :
Ctrl + 0 = Hide column
Ctrl + 1 = Format Menu
Ctrl + 2 = Bold
Ctrl + 3 = Italics
Ctrl + 4 = Underline
Ctrl +5 = Strike through
Ctrl + 9 = Hide Row
Ctrl + ; (Semicolon)= To enter the date
Ctrl + : (Colon) = To enter the time.
Ctrl + Pageup or Page Down = To move between worksheets
Ctrl + Shift + " (Quotation Mark) = Copy the value from the cell above the current cell.
Ctrl + '(Apostrophe)= Copy the formula from the cell above the current cell.
Ctrl + Shift + $ = Currency Format
Ctrl + Shift + ~ = General Number Format
Ctrl + Shift + ! = Comma Number Format
Ctrl + Shift + % = Percentage Number format
Ctrl + Shift + ) = Unhide Column
Ctrl + Shift + ( = Unhide Row
Alt + Enter = Auto Sum
Shift + F3 = To access the paste Function dialog box
Ctrl + Shift + & (or) Ctrl + Shift + _ = To apply or remove borders to all cells
Ctrl + Shift + [ = To trace errors
By default MS-Excel consists of three (3) sheets. A worksheet is a set of cells aligned in rows and
42
columns.
A MS-Word An Excel work sheet consists of 16,384 columns (A, B, C, .... XFD) and 10,48,576 rows.
The first cell in Excel worksheet is labeled as "A1".
To save and protect the workbook by
Write Reservation Password
Protection Password
Read-Only Recommended.
Legend : The box on the chart that contains the name of each individual record is called "Legend".
Formulas : In Excel worksheet, all formulas start with the "=" sign. To build a formula, first select the
cell in which you want the results to appear. After the = sign, type the cells you want to add or subtract
along with the mathematical operation you wish to perform.
For example, = C3+C4+C5, = B4-C4.
The easiest way to copy a formula is with the Fill Handle in the lower right corner of the cell.
Functions : A function is a predefined formula that operates on one or more values and returns one or
more values. All functions consist of a function name followed by a set of arguments in brackets. The
arguments specify the values or cells to be used by the function. The maximum number of arguments
allowed in a function is 30.
For example, SUM, MIN, MAX, AVERAGE, HYPERLINK, LOOKUP, COLUMN, HLOOKUP, ADDRESS,
AREAS, CHOOSE, ROMAN, RAND etc.
Examples of Commonly Used Formulas :
This table is used with the sample formula below :
43
44
MS-OFFICE POWERPOINT
WEEW
45
Computers