You are on page 1of 52

A CASE STUDY REPORT

ON

CASE ANALYSIS LAB

Submitted in partial fulfilment for the award of the degree

Master of Business Administration

Chhattisgarh Swami Vivekanand Technical University, Bhilai

Submitted by,

GLORIA HARRIS

MBA – Semester 1

(Session 2017-19)

Approved By, Guided By,


Dr. Manoj Verghese Miss Ayesha Khan
Head of the Department Assistant Professor

Department of Management Studies


Rungta College of Engineering & Technology
Kohka, Kurud Road, Bhilai (C.G.)
DECLARATION
I the undersigned solemnly declare that the report of the thesis work entitled Case Analysis Lab is

based on my own work carried out during the course of my study under the supervision of Miss.

Ayesha Khan.

I assert that the statements made and conclusions drawn are an outcome of my research

work. I further declare that to the best of my knowledge and belief the report does not contain any

part of any work which has been submitted for the award of MBA degree or any other

degree/diploma/certificate in this University or any other University of India or abroad.

_________________
(Signature)
GLORIA HARRIS
Enrolment No:
CERTIFICATE
This is to certify that the work incorporated in the thesis Case Analysis Lab is a work carried out by
GLORIA HARRIS bearing Enrolment no. under my/our guidance and supervision for the part
fulfillment for the award of MBA Degree of Chhattisgarh Swami Vivekanand Technical University,
Bhilai (C.G), India.

To the best of my knowledge and belief the thesis

i. Embodies the work of the candidate him/herself

ii. Has duly been completed

iii. Is up to the desired standard both in respect of contents and language for external viva.

Signature

Dr. Manoj Verghese

Head of the Department


ACKNOWLEDGEMENT
Complete task is never a man effort. It is often the result of valuable contribution of a number of
individuals in accomplishing the assigned work.

I would like to express my gratitude towards Dr. Manoj Verghese (Head of the Department) and Miss.
Ayesha Khan (Assistant Professor) of Rungta College of Engineering and Technology, Bhilai (C.G)
for their kind cooperation and encouragement which helped me in the completion of this project.

I am highly indebted to Dr. Manoj Verghese and Miss Ayesha Khan for their guidance and constant
supervision as well as for providing necessary information regarding the project and also for their
support in completing the project.
TABLE OF CONTENTS

Sr. No. Contents Page No.


1 Discusss in detail about Generations of Computer and 1-13
Computer Languages.
2 Explain about Operating System and its types. Discuss 14-35
about DOS OS.

3 What is MS-OFFICE? Discuss about MS-WORD, 36-38


POWER POINT& MS-EXCEL along with important
command.

4 How to create HTML document. Also discuss basic 39-43

formatting in HTML.

5 Write about application of computer in business 44-47


1.) Discusss in detail about Generations of Computer and Computer

Languages.

Ans. Generation in computer terminology is a change in technology a computer is/was

being used. Initially, the generation term was used to distinguish between varying

hardware technologies. Nowadays, generation includes both hardware and software,

which together make up an entire computer system.

There are five computer generations known till date. Each generation has been discussed

in detail along with their time period and characteristics. In the following table,

approximate dates against each generation has been mentioned, which are normally

accepted.

Following are the main five generations of computers.

S.No Generation & Description

First Generation
1
The period of first generation: 1940-1956. Vacuum tube based.

Second Generation
2 The period of second generation: 1956-1963. Transistor based.

Third Generation
3
The period of third generation: 1964-1971. Integrated Circuit based.

Fourth Generation
4
The period of fourth generation: 1971-1980. VLSI microprocessor based.

1
Fifth Generation
5
The period of fifth generation: 1980-onwards. ULSI microprocessor based.

First Generation – Vacuum Tubes

These early computers used vacuum tubes as circuitry and magnetic drums for memory.

As a result they were enormous, literally taking up entire rooms and costing a fortune to

run. These were inefficient materials which generated a lot of heat, sucked huge

electricity and subsequently generated a lot of heat which caused ongoing breakdowns.

These first generation computers relied on „machine language‟ (which is the most basic

programming language that can be understood by computers). These computers were

limited to solving one problem at a time. Input was based on punched cards and paper

tape. Output came out on print-outs. The two notable machines of this era were the

UNIVAC and ENIAC machines – the UNIVAC is the first every commercial computer

which was purchased in 1951 by a business – the US Census Bureau.

The main features of first generation are:

 Vacuum tube technology

 Unreliable

 Supported machine language only

 Very costly

 Generated lot of heat

 Slow input and output devices

 Huge size

 Need of A.C.

2
 Non-portable

 Consumed lot of electricity.

Some computers of this generation were −

 ENIAC

 EDVAC

 UNIVAC

 IBM-701

 IBM-650

Second Generation – Transistors

The replacement of vacuum tubes by transistors saw the advent of the second generation

of computing. Although first invented in 1947, transistors weren‟t used significantly in

computers until the end of the 1950s. They were a big improvement over the vacuum

tube, despite still subjecting computers to damaging levels of heat. However they were

hugely superior to the vacuum tubes, making computers smaller, faster, cheaper and less

heavy on electricity use. They still relied on punched card for input/printouts.

The language evolved from cryptic binary language to symbolic („assembly‟) languages.

This meant programmers could create instructions in words. About the same time high

level programming languages were being developed (early versions of COBOL and

FORTRAN). Transistor-driven machines were the first computers to store instructions

into their memories – moving from magnetic drum to magnetic core „technology‟. The

early versions of these machines were developed for the atomic energy industry.

3
The main features of second generation are −

 Use of transistors

 Reliable in comparison to first generation computers

 Smaller size as compared to first generation computers

 Generated less heat as compared to first generation computers

 Consumed less electricity as compared to first generation computers

 Faster than first generation computers

 Still very costly

 AC required

 Supported machine and assembly languages

Some computers of this generation were −

 IBM 1620

 IBM 7094

 CDC 1604

 CDC 3600

 UNIVAC 1108

4
Third Generation – Integrated Circuits

By this phase, transistors were now being miniaturised and put on silicon chips (called

semiconductors). This led to a massive increase in speed and efficiency of these

machines. These were the first computers where users interacted using keyboards and

monitors which interfaced with an operating system, a significant leap up from the punch

cards and printouts. This enabled these machines to run several applications at once using

a central program which functioned to monitor memory.

As a result of these advances which again made machines cheaper and smaller, a new

mass market of users emerged during the „60s.

The main features of third generation are −

 IC used

 More reliable in comparison to previous two generations

 Smaller size

 Generated less heat

 Faster

 Lesser maintenance

 Costly

 AC required

 Consumed lesser electricity

 Supported high-level language

5
Some computers of this generation were −

 IBM-360 series

 Honeywell-6000 series

 PDP (Personal Data Processor)

 IBM-370/168

 TDC-316

Fourth Generation – Microprocessors

This revolution can be summed in one word: Intel. The chip-maker developed the Intel

4004 chip in 1971, which positioned all computer components (CPU, memory,

input/output controls) onto a single chip. What filled a room in the 1940s now fit in the

palm of the hand. The Intel chip housed thousands of integrated circuits. The year 1981

saw the first ever computer (IBM) specifically designed for home use and 1984 saw the

MacIntosh introduced by Apple. Microprocessors even moved beyond the realm of

computers and into an increasing number of everyday products.

The increased power of these small computers meant they could be linked, creating

networks. Which ultimately led to the development, birth and rapid evolution of the

Internet. Other major advances during this period have been the Graphical user interface

(GUI), the mouse and more recently the astounding advances in lap-top capability and

hand-held devices.

6
The main features of fourth generation are −

 VLSI technology used (VERY LARGE SCALE INTEGRETED CIRCUITS)

 Very cheap

 Portable and reliable

 Use of PCs

 Very small size

 Pipeline processing

 No AC required

 Concept of internet was introduced

 Great developments in the fields of networks

 Computers became easily available

Some computers of this generation were −

 DEC 10

 STAR 1000

 PDP 11

 CRAY-1(Super Computer)

 CRAY-X-MP(Super Computer)

7
Fifth Generation – Artificial Intelligence

The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology

became ULSI (Ultra Large Scale Integration) technology, resulting in the production of

microprocessor chips having ten million electronic components.

This generation is based on parallel processing hardware and AI (Artificial Intelligence)

software. AI is an emerging branch in computer science, which interprets the means and

method of making computers think like human beings. All the high-level languages like

C and C++, Java, .Net etc., are used in this generation.

Computer devices with artificial intelligence are still in development, but some of these

technologies are beginning to emerge and be used such as voice recognition.

AI is a reality made possible by using parallel processing and superconductors. Leaning

to the future, computers will be radically transformed again by quantum computation,

molecular and nano technology.

The essence of fifth generation will be using these technologies to ultimately create

machines which can process and respond to natural language, and have capability to learn

and organise themselves.

AI includes −

 Robotics

 Neural Networks

 Game Playing

 Development of expert systems to make decisions in real-life situations

 Natural language understanding and generation

8
The main features of fifth generation are −

 ULSI technology

 Development of true artificial intelligence

 Development of Natural language processing

 Advancement in Parallel Processing

 Advancement in Superconductor technology

 More user-friendly interfaces with multimedia features

 Availability of very powerful and compact computers at cheaper rates

Some computer types of this generation are −

 Desktop

 Laptop

 NoteBook

 UltraBook

 ChromeBook

9
COMPUTER LANGUAGES

Introduction:

A language is the main medium of communicating between the Computer systems and

the most common are the programming languages. As we know a Computer only

understands binary numbers that is 0 and 1 to perform various operations but the

languages are developed for different types of work on a Computer. A language consists

of all the instructions to make a request to the system for processing a task. From the first

generation and now fourth generation of the Computers there were several programming

languages used to communicate with the Computer. Here we will go in the detail of the

Computer language and its types.

Computer Language Description:

A Computer language includes various languages that are used to communicate with a

Computer machine. Some of the languages like programming language which is a set of

codes or instructions used for communicating the machine. Machine code is also

considered as a computer language that can be used for programming. And also HTML

which is a computer language or a markup language but not a programming language.

Similarly there are different types of languages developed for different types of work to

be performed by communicating with the machine. But all the languages that are now

available are categorized into two basic types of languages including Low-level language

and High level language.

10
Low Level Language:

Low level languages are the machine codes in which the instructions are given in

machine language in the form of 0 and 1 to a Computer system. It is mainly designed to

operate and handle all the hardware and instructions set architecture of a Computer. The

main function of the Low level language is to operate, manage and manipulate the

hardware and system components. There are various programs and applications written in

low level languages that are directly executable without any interpretation or translation.

The most famous and the base of all programming languages “C” and “C++” are mostly

used Low level languages till today. Low level language is also divided into two parts are

Machine language and Assembly language.

Machine Language: Machine Language is one of the low-level programming languages

which is the first generation language developed for communicating with a Computer. It

is written in machine code which represents 0 and 1 binary digits inside the Computer

string which makes it easy to understand and perform the operations. As we know a

Computer system can recognize electric signals so here 0 stands for turning off electric

pulse and 1 stands for turning on electric pulse. It is very easy to understand by the

Computer and also increases the processing speed.

The main advantage of using Machine language is that there is no need of a translator or

interpreter to translate the code, as the Computer directly can understand. But there are

some disadvantages also like you have to remember the operation codes, memory address

11
every time you write a program and also hard to find errors in a written program. It is a

machine dependent and can be used by a single type of Computer.

Assembly Language: Assembly Language is the second generation programming

language that has almost similar structure and set of commands as Machine language.

Instead of using numbers like in Machine languages here we use words or names in

English forms and also symbols. The programs that have been written using words,

names and symbols in assembly language are converted to machine language using an

Assembler. Because a Computer only understands machine code languages that‟s why we

need an Assembler that can convert the Assembly level language to Machine language so

the Computer gets the instruction and responds quickly.

The main disadvantage of this language is that it is written only for a single type of CPU

and does not run on any other CPU. But its speed makes it the most used low level

language till today which is used by many programmers.

12
High Level Language:

The high level languages are the most used and also more considered programming

languages that helps a programmer to read, write and maintain. It is also the third

generation language that is used and also running till now by many programmers. They

are less independent to a particular type of Computer and also require a translator that can

convert the high level language to machine language. The translator may be an interpreter

and Compiler that helps to convert into binary code for a Computer to understand. There

is various high level programming languages like C, FORTRAN or Pascal that are less

independent and also enables the programmer to write a program.

The Compiler plays an important role on the Computer as it can convert to machine

language and also checks for errors if any before executing. There are several high level

languages that were used earlier and also now like COBOL, FORTRAN, BASIC, C,

C++, PASCAL, LISP, Ada, Algol, Prolog and Java. It is user-friendly as the programs

are written in English using words, symbols, characters, numbers that needs to be

converted to machine code for processing.

13
2.) Explain about Operating System and its types. Discuss about DOS OS.

OPERATING SYSTEM

An operating system (OS) is system software that manages computer

hardware and software resources and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may

also include accounting software for cost allocation of processor time,mass

storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating

system acts as an intermediary between programs and the computer hardware, although

the application code is usually executed directly by the hardware and frequently

makes system calls to an OS function or is interrupted by it. Operating systems are found

on many devices that contain a computer – from cellular phones and video game

consoles to web servers and supercomputers. The dominant desktop operating system

is Microsoft Windows with a market share of around 82.74%. mac OS by Apple Inc. is in

second place (13.23%), and the varieties of Linux are collectively in third place (1.57%).

In the mobile (smart phone and tablet combined) sector, use in 2017 is up to 70%

of Google's Android and according to third quarter 2016 data, Android on smart phones

is dominant with 87.5 percent and a growth rate 10.3 percent per year, followed

by Apple's iOS with 12.1 percent and a per year decrease in market share of 5.2 percent,

while other operating systems amount to just 0.3 percent. Linux distributions are

dominant in the server and supercomputing sectors. Other specialized classes of operating

systems, such as embedded and real-time systems, exist for many applications.

14
TYPES OF OPERATING SYSTEM

Single- and multi-tasking

A single-tasking system can only run one program at a time, while a multi-

tasking operating system allows more than one program to be running in concurrency.

This is achieved by time-sharing, dividing the available processor time between multiple

processes that are each interrupted repeatedly in time slices by a task-scheduling

subsystem of the operating system. Multi-tasking may be characterized in preemptive and

co-operative types. In preemptive multitasking, the operating system slices the CPU time

and dedicates a slot to each of the programs. Unix-like operating systems,

e.g., Solaris, Linux, as well as AmigaOS support preemptive multitasking. Cooperative

multitasking is achieved by relying on each process to provide time to the other processes

in a defined manner. 16-bit versions of Microsoft Windows used cooperative multi-

tasking. 32-bitversions of both Windows NT and Win9x, used preemptive multi-tasking.

Single- and multi-user

Single-user operating systems have no facilities to distinguish users, but may allow

multiple programs to run in tandem. A multi-user operating system extends the basic

concept of multi-tasking with facilities that identify processes and resources, such as disk

space, belonging to multiple users, and the system permits multiple users to interact with

the system at the same time. Time-sharing operating systems schedule tasks for efficient

use of the system and may also include accounting software for cost allocation of

processor time, mass storage, printing, and other resources to multiple users.

15
Distributed

A distributed operating system manages a group of distinct computers and makes them

appear to be a single computer. The development of networked computers that could be

linked and communicate with each other gave rise to distributed computing. Distributed

computations are carried out on more than one machine. When computers in a group

work in cooperation, they form a distributed system.

Templated

In an OS, distributed and cloud computing context, templating refers to creating a

single virtual machine image as a guest operating system, then saving it as a tool for

multiple running virtual machines. The technique is used both in virtualization and cloud

computing management, and is common in large server warehouses.

Embedded

Embedded operating systems are designed to be used in embedded computer systems.

They are designed to operate on small machines like PDAs with less autonomy. They are

able to operate with a limited number of resources. They are very compact and extremely

efficient by design. Windows CE and Minix 3 are some examples of embedded operating

systems.

16
Real Time operating System

A real-time system is defined as a data processing system in which the time interval

required to process and respond to inputs is so small that it controls the environment.

The time taken by the system to respond to an input and display of required updated

information is termed as the response time. So in this method, the response time is very

less as compared to online processing.

Real-time systems are used when there are rigid time requirements on the operation of a

processor or the flow of data and real-time systems can be used as a control device in a

dedicated application. A real-time operating system must have well-defined, fixed time

constraints, otherwise the system will fail. For example, Scientific experiments, medical

imaging systems, industrial control systems, weapon systems, robots, air traffic control

systems, etc.

There are two types of real-time operating systems.

Hard real-time systems

Hard real-time systems guarantee that critical tasks complete on time. In hard real-time

systems, secondary storage is limited or missing and the data is stored in ROM. In these

systems, virtual memory is almost never found.

17
Soft real-time systems

Soft real-time systems are less restrictive. A critical real-time task gets priority over

other tasks and retains the priority until it completes. Soft real-time systems have limited

utility than hard real-time systems. For example, multimedia, virtual reality, Advanced

Scientific Projects like undersea exploration and planetary rovers, etc.

Library

A library operating system is one in which the services that a typical operating system

provides, such as networking, are provided in the form of libraries and composed with the

application and configuration code to construct a unikernel: a specialized, single address

space, machine image that can be deployed to cloud or embedded environments.

18
Disk Operating System (DOS)

INTRODUCTION

When the computer starts, it starts the operating system that takes the control of the

machine. An Operating System is a set of programs that help in controlling and managing

the Hardware and the Software resources of a computer system. A good operating system

should have the following features;

1. Help in the loading of programs and data from external sources into the internal

memory before they are executed.

2. Help programs to perform input/output operations, such as;

· Print or display the result of a program on the printer or the screen.

· Store the output data or programs written on the computer in storage device.

· Communicate the message from the system to the user through the VDU.

· Accept input from the user through the keyboard or mouse.

DOS is a family of disk operating systems primarily consisting of MS-DOS and a

rebranded version under the name IBM PC DOSwhich were introduced in 1981, as well

as some later compatible systems from other manufacturers: DR-DOS (1988), ROM-

DOS(1989), PTS-DOS (1993), and FreeDOS (1998).MS-DOS dominated the x86-

based IBM PC compatible market between 1981 and 1995.

Dozens of other operating systems also use the acronym "DOS", including the

mainframe DOS/360from 1966. Others are Apple DOS, Apple ProDOS,Atari

DOS, Commodore DOS, TRSDOS, andAmigaDOS.

19
OBJECTIVES

At the end of this lesson, you would be able to;

· explain the concept operating system

· discuss the functions of operating system

· understand the procedures of loading operating system into the memory

· use file management features of operating system

· create separate locations for logically related files

· copy files from one computer to another

· use Windows for File Management

DISK OPERATING SYSTEM

As the name suggests, the operating System is used for operating the system or the

computer. It is a set of computer programs and also known as DOS (Disk Operating

System). The main functions of DOS are to manage disk files, allocate system resources

according to the requirement. DOS provides features essential to control hardware

devices such as Keyboard, Screen, Disk Devices, Printers, Modems and programs.

Basically, DOS is the medium through which the user and external devices attached to

the system communicate with the system. DOS translate the command issued by the user

in the format that is understandable by the computer and instruct computer to work

accordingly. It also translates the result and any error message in the format for the user

to understand.

20
(a) Loading of DOS

The BOOT Record into the computer memory loads DOS. BOOT Record in turn is

triggered by ROM program already there in the computer.

The system start-up routine of ROM runs a reliability test called Power On Self Test

(POST) which initializes the chips and the standard equipment attached to the PC, and

check whether peripherals connected to the computer are working or not. Then it tests

the RAM memory. Once this process is over, the ROM bootstrap loader attempts to read

the Boot record and if successful, passes the control on to it. The instructions/programs

in the boot record then load the rest of the program. After the ROM boot strap

loader turns the control over to boot record, the boot tries to load the DOS into the

memory by reading the two hidden files IBMBIO.COM and IBMDOS.COM. If these

two are found, they are loaded along with the DOS command interpreter

COMMAND.COM. COMMAND.COM contains routines that interpret what is typed in

through the keyboard in the DOS command mode. By comparing the input with the list

of command, it acts by executing the required routines/commands or by searching for

the required routine utility and loads it into the memory.

21
COMPUTER FILES IN DOS

A file may contain a program or any other kind of information. Generally, a file must

be given a name that can be used to identify it. DOS permits the user to assign a name

consisting of two parts to a file – primary and secondary names. Primary name can be

of a maximum of eight characters consisting of Characters, Alphabets, Number and

Hyphen), and the Secondary name should consist of three characters, which is optional.

The primary name and the secondary (or extension) name, if any, are to be separated by

a dot (.).

Primary name can be linked to proper name, whereas extensions are like surnames of

people. Using an extension with the file name is preferable, though optional. However,

once the extension is specified, using the complete name (primary name and extension,

with the period separating them can only refer the file). Using extensions can be an

excellent way of naming a file so that it can be identified easily.

Examples:

Filename Primary Name Separator Secondary Name

Employee Employee

Employee.Exe Employee . Exe

Employee.Dbf Employee . Dbf

22
DOS has a way of showing which disk drive is currently active. The floppy disk drives

are assigned alphabets A and B, whereas the hard disk drive is assigned the alphabet C.

If your PC has a single floppy drive, the drive would be A and if it has two, they would

be termed as A and B. If your PC includes a hard disk, besides a FDD (Floppy Disk

Drive), the drive names would be A and C. If the prompt is A, then it implies that the

first floppy disk drive is active. Where as the DOS prompt would be C, if the hard disk

is active. Data as well as instructions reside in a file stored in a disk.

DIRECTORY STRUCTURE IN DOS

The files in the computer come from various sources. Some files come with DOS, while

other come with publications such as a word processor. These files contain codes and

other information that is necessary to make the computer application operational.

Before long, there will be hundreds or even thousands of files in the computer, which

can make it difficult to locate specific files.

The names of all the files created in a disk are stored in its directory. Directory is just

like a file folder, which contain all the logically related files. DOS files are organized in

a hierarchical or an inverted tree-like structure. The general analogy is with a file

cabinet containing a number of drawers, which in turn may contain folders. The content

of these folders is the needed information.

The file cabinet here is the ROOT DIRECTORY, the drawer is INDIVIDUAL

DIRECTORY, the folders are SUBDIRECTORYand the information in these folders

may in turn be classified as FILES.

23
Otherwise, the large number of files that get created for various purposes in a disk can

make the directory huge and difficult to view and manage. Therefore, DOS enables the

user to organize the files in a disk into directories and sub-directories in a hierarchical

structure. Directories can contain other directories. A directory within another directory

is called a sub-directory.

Of course, there may be sub-directories of sub-directories, but a file name is the furthest

you may descend down the (inverted) tree of directories and files. Thus, a file name

corresponds to a tree leaf, a sub-directory to a branch, the directory to the trunk, and

the root directory to the root of the tree, hence the name ROOT DIRECTORY.

Sample of Directory Structure

ROOT

Command.com (Personal) Autoexec.bat (Accounts) Pk.bat

LEAVE INSURANCE GPF PENSION LOAN

The directory/sub-directory is represented in bold letters.

24
DIRECTORY COMMAND

The content of each of the sub-directory cannot be viewed unless it is made active, or a

sub-directory is specified as part of the DIR command. Doing either of these requires

an understanding of the concepts of navigating around the disk.

The directory, the user is in at any point of time, is called the

WORKING/PRESENT/CURRENT directory. DOS indicates which directory you are in

by displaying the directory‟s name in the command prompt. For example, the following

command prompt indicate that you are in the DOS directory: C:\DOS>. Knowing which

directory is current helps you find files, and to move from one directory to another

more easily. Typically, the ROOT DIRECTORY (\) is the initial working directory.

The entire specification of directory from root is called a PATH. By itself, the DIR

command is applicable to the working/present directory. The names of the sub-

directories at adjacent levels are separated by backslash (\), while specifying the path to

be followed while traveling to a sub-directory.

USING PATH TO SPECIFY THE LOCATION OF FILES

A path is the route that leads from the root directory of a drive to the file you want to

use.

For example, to access the NOS.LET file in the LETTER subdirectory of NOS directory,

DOS must go from the ROOT (\) directory through the NOS directory to the LETTER

directory, as shown in the following figure:

25
C:\

NOS

ACCOUNT

SALARY

LETTER

NOS.LET

PROJECT

To specify the same path at the command prompt, you would type it as shown in the

following illustration:

C:\NOS\LETTER\NOS.LET

This is the path or route to the file NOS.LET. The first letter and the colon (C:) represent

the drive the file is on. The first back slash (\) represents the root directory. The second

backslash separates the NOS directory from the LETTER sub-directory. The third

backslash separates the LETTER sub-directories from the file name, NOS.LET.

Note: MS-DOS recognizes path up to 67 characters long (including the

Drive letter, colon, and backslash).

26
DIR COMMAND

The DIR command gives the list of is there on the disk that is mounted on the active

drive.

Syntax : C:\> DIR A:\> DIR

Example

A:\> DIR

Volume in drive A has no label

Directory of A:\

COMMAND COM 23612 10-20-88 11.30a

DISKCOPY COM 4235 10-20-88 12.00p

FORMAT COM 15780 03-12-89 12.00p

3 file(s) 325013 bytes free

A:\>

As can be seen, on typing DIR followed by key at DOS prompt, five columns of data

followed by the number of files and bytes that are free in the disk are displayed. The

first column contains the primary name of each file resident on the disk. However, most

files are named with an extension, which appear in the second column. Whereas, the

third column contains the size of the file in bytes, and the fourth and fifth columns show

the date and time on which the files was created or last modified. The last line displays

the number of file(s) and remaining disk space free in bytes. It is important to note that

the DIR command only displays the names of the files and not their contents.

27
CHANGING A DIRECTORY

All the names displayed using DIR command that have

besides them are directories. You can see the list of files in another directory by

changing to that directory and then using the DIR command again.The Change

Directory (CHDIR) or CD command enables the user to travel around the directories in

a disk. Type the CD command at the command prompt.

Syntax:

A:\> CHDIR {path} or a:\> CD {path}

Examples : (Refer to the figure)

# 1. A:\>CD \NOS

This command makes the NOS sub-directory under the root directory (\) active.

# 2. A:\>CD \NOS\LETTERS

The backslash indicates the root, and LETTERS, which is a sub-directory under the NOS

directory, becomes the working directory.

# 3. A:\> CD \

The root directory becomes the working directory; i.e. you will change back to the

root or main directory. The slash typed in this command is a backslash (\). No matter

which directory you are in, this command always returns you to the root directory of a

drive. The root directory does not have a name, it is simply referred to by a backslash

(\).

28
MAKING OR CREATING DIRECTORY

As the number of files increases in a disk, a need is felt to organize them in a

meaningful way by creating sub-directories to store a group of logically related/similar

files.

To create a directory, DOS provides the MKDIR (Make Directory) or MD command.

Syntax:

A:\>MKDIR [drive:] {pathname} or A:\>MD [drive:] {pathname}

Square brackets indicate that [drive:] entry is optional.

The MD or MKDIR command creates a new empty directory whose name is the last

item specified in the pathname, in the specified drive. If active, the drive need not be

specified. If the directory is to be created as a sub-directory of the working directory on

the active drive, typing MD {directory name} at the DOS prompt or command prompt is

sufficient.

Examples:

# 1. A:\> MD \ACCT\SALARY

makes a SALARY directory in the: drive, under ACCT directory.

# 2. A:\> MD C:\> SALARY

Makes a salary directory in the C: drive, under root directory.

29
DELETING A DIRECTORY

You may want to delete or remove a directory to simplify your directory structure.

DOS provides RD (Remove Directory) to delete a directory.

Example:

# 1. A:\> RD \ACCT\SALARY

removes the SALARY sub-directory in ACCT directory.

NOTE: You cannot delete a directory if you are in it. Before you can delete a directory,

you must type cd.. at the command prompt. At the same point of time, the directory to

be deleted should be empty.

COPYING FILES

To copy a file, DOS provides `COPY‟ command. When you use `copy‟ command, you

must use the following two parameters; the location and the name of the file you want

to copy, or the source; and the location and the file name to which you want to copy

the file or the target (destination). You separate the source and the destination or target

with a space. The syntax of the `COPY‟ command is

COPY {source} {destination} or,

COPY [drive:] [path] [filename] [drive:] [path] [filename]

i.e. the first set of drive, path and filename refers to the source file, and the second

set of drive, path and filename

refers to the destination file.

30
(a) Copying Single File

To copy the DEBUG.EXE file from the DOS directory to the NOS

directory

1. Return to the root directory by typing the following command prompt: CD\

2. Change to the DOS directory by typing the following commands at the DOS prompt:

CD DOS

3. To copy the file DEBUG.EXE file from the DOS directory to the

NOS, directory type the following at the command prompt:

Copy c:\dos\debug.exe c:\nos

and the following message appears: 1 file (s) copied

Examples:

# 1. A:\> copy a:\letter\office.doc \letter\office.bak

makes a copy of the office.doc file in the current or working directory with a new

name office.bak

# 2. A:\> copy office.doc a:\letters\nos.mem

copy the file office.doc from the root directory to the sub-directory LETTER under root

directory with a new name nos.mem.

If the target drive is not specified, the copied file will reside in the disk mounted on the

active drive.

31
USE OF WILDCARD CHARACTERS

If you want to carry out a task for a group of files whose names have something in

common, you can use wildcard characters to specify groups of files. DOS recognize

two wildcard characters: asterisk (*) represents one or more characters that a group of

files has in common; and the question mark (?) represents a single character that a

group of files has in common. You can use wildcards to replace all or part of a file‟s

name or its extension. The following table shows examples of wildcards:

Wildcard What it Represents Example

*.TXT All files with a .TXT extension JULY.TXT

LETTER.TXT

REPORT.* All files named REPORT with any REPORT.TXT

extension REPORT.LET

REPORT.WRI

M*.* All files beginning with letter M MEMO.TXT

regardless of their extension MARCH.XLI

???.* All files having 3 letter names, SUN.BMP

with any or no extension WIN.LET

You can include the wildcard in the command.

Use of wildcard characters in COPY command

# 1. A:\>COPY \letters\*.COB B:

32
It means, copy all files with extension *.COB from the directory LETTERS under the

ROOT directory to the working or ROOT directory of the `B‟ drive.

# 2. A:\> COPY B:\COMPANY\OPEL.*

The command is to copy all files with primary name OPEL (irrespective extension) in

the directory COMPANY under ROOT of the drive `B‟ into the current working

directory of the disk mounted in `A‟ drive. Incase of one drive, the system will ask for

the source and

target drive.

The command,

#3.A:\>COPY C:\*.*

copies all files of the ROOT directory of the „C‟ drive into the working directory of the

„A‟ drive.

# 4. A:\> COPY LETTE?.* B:

copies all files with primary name consisting of 6 characters in total and LETTE as the

first five characters (irrespective of extension name) into drive `B‟.

# 5. A:\> COPY B:\?.DOC

copies all files having a primary name of one character with an extension .DOC from

ROOT directory of „B‟ to the ROOT directory of `A‟ drive.

33
RENAMING FILES

To rename a file, DOS provides REN command. The REN command stands for

“Rename”. When you use the REN command, you must include two parameters. The

first is the file you want to rename, and the second is the new name for the file. You

separate the two names with a space. The REN command follows this pattern:

REN oldname newname

Example: REN NOS.DOC NOS.MEM

Rename the old filename NOS.DOC to a new filename NOS.MEM.

DELETING FILES

This section explains how to delete or remove a file that is no longer required in the

disk. DOS provides DEL command, which means to delete.

Syntax : DEL {drive:} {path} {filename}

Example:

# 1. DEL \DOS\EDIT.HLP

delete the EDIT.HLP from the DOS directory under ROOT directory.

PRINTING A FILE

The `PRINT‟ command of DOS works more or less like `TYPE‟ com

mand, but at the same time, it enables the content of a text file

to be printed on a paper.

Syntax:

34
A:\> PRINT [drive:] {path} {filename}

Example:

A:\> PRINT \AIAET\LETTER\AIAET.LET

35
3.) What is MS-OFFICE? Discuss about MS-WORD, POWER POINT& MS-

EXCEL along with important command.

Microsoft Office is an office suite of applications, servers, and services developed

by Microsoft. It was first announced by Bill Gates on 1 August 1988, at COMDEX in Las

Vegas. Initially a marketing term for a bundled set of applications, the first version of

Office contained Microsoft Word,Microsoft Excel, and Microsoft PowerPoint. Over the

years, Office applications have grown substantially closer with shared features such as a

common spell checker, OLE data integration and Visual Basic for Applications scripting

language. Microsoft also positions Office as a development platform for line-of-business

software under the Office Business Applications brand. On 10 July

2012, Softpedia reported that Office is used by over a billion people worldwide.

Office is produced in several versions targeted towards different end-users and

computing environments. The original, and most widely used version, is

the desktop version, available for PCs running the Windows and mac OS operating

systems. The most current desktop version is Office 2016 for Windows and mac OS,

released on 22 September 2015 and 9 July 2015, respectively.

More recently, Microsoft developed Office Mobile, which are free-to-use versions of

Office applications for mobile devices. Microsoft also produces and runs Office Online,

a web-based version of core Office apps, which is included as part of a Microsoft

account.

36
 Microsoft Word: a word processor included in Microsoft Office and some editions

of the now-discontinued Microsoft Works. The first version of Word, released in the

autumn of 1983, was for the MS-DOS operating system and had the distinction of

introducing the mouse to a broad population. Word 1.0 could be purchased with a

bundled mouse, though none was required. Following the precedents

of LisaWrite and MacWrite, Word for Macintosh attempted to add

closer WYSIWYGfeatures into its package. Word for Mac was released in 1985.

Word for Mac was the first graphical version of Microsoft Word. Initially, it

implemented the proprietary doc format as its primary format. Word 2007, however,

deprecated this format in favor of Office Open XML, which was later standardized

by Ecma International as an open format. Support forPortable Document

Format (PDF) and OpenDocument (ODF) was first introduced in Word for Windows

with Service Pack2 for Word 2007.[6]

 Microsoft Excel: a spreadsheet that originally competed with the dominant Lotus 1-

2-3, and eventually outsold it. Microsoft released the first version of Excel for the

Mac OS in 1985, and the first Windows version (numbered 2.05 to line up with the

Mac) in November 1987.

 Microsoft PowerPoint: a presentation program used to create slideshows composed

of text, graphics, and other objects, which can be displayed on-screen and shown by

the presenter or printed out on transparencies or slides.

 Microsoft Access: a database management system for Windows that combines

the relational Microsoft Jet Database Engine with a graphical user interface and

software development tools. Microsoft Access stores data in its own format based on

37
the Access Jet Database Engine. It can also import or link directly to data stored in

other applications and databases.[7]

 Microsoft Outlook (not to be confused with Outlook

Express, Outlook.com or Outlook on the web): a personal information manager that

replaces Windows Messaging, Microsoft Mail, and Schedule+ starting in Office 97, it

includes an e-mail client, calendar, task manager and address book. On the Mac OS,

Microsoft offered several versions of Outlook in the late 1990s, but only for use

with Microsoft Exchange Server. In Office 2001, it introduced an alternative

application with a slightly different feature set called Microsoft Entourage. It

reintroduced Outlook in Office 2011, replacing Entourage.[8]

 Microsoft OneNote: a notetaking program that gathers handwritten or typed notes,

drawings, screen clippings and audio commentaries. Notes can be shared with other

OneNote users over the Internet or a network. OneNote was initially introduced as a

standalone app that was not included in any of Microsoft Office 2003 editions.

However, OneNote eventually became a core component of Microsoft Office; with

the release of Microsoft Office 2013, OneNote was included in all Microsoft Office

offerings. OneNote is also available as a web app on Office Online,

a freemium Windows desktop app, a mobile app for Windows Phone, iOS, Android,

and Symbian, and a Metro-style app for Windows 8 or later.

 Microsoft Publisher: a desktop publishing app for Windows mostly used for

designing brochures, labels, calendars, greeting cards, business cards, newsletters,

web site, and postcards

38
4.) How to create HTML document. Also discuss basic formatting in HTML.

An HTML document contains two distinct parts, the head and the body.

The head contains information about the document that is not displayed on the screen.

The body then contains everything else that is displayed.

The basic structure then of any HTML page is:

<html>

<head>

** [header info used by some web servers, not displayed] **

</head>

<body>

** [all the HTML for display] **

: :

: :

: :

</body>

</html>

Enclose all HTML work within an <html>....</html> tag. Note that your web pages will

display fine on most computers without any of these tags. However by using them, your

web pages will be fully compliant with International HTML standards and ensure

compatibility with future web browsers.

It's good habit, like brushing your teeth.

Here are the steps for creating your first HTML file. Are you ready?

39
1. Go to the text editor window.

2. Enter the following text (you do not have to press RETURN at the end of each

line; the WWW browser will word wrap all text):

3. <html>

4. <head>

5. <title>Volcanoes!</title>

6. </head>

7.

8. <body>

9. In this lesson you will use the Internet to research

10. information on volcanoes and then write a report on

11. your results.

12. </body>

13. </html>

NOTE: Look where the <title>...</title> tag is located. It is in

the <head>...</head> portion and thus will not be visible on the

screen. What does it do? The <title> tag is used to uniquely identify

each document and is also displayed in the title bar of the browser

window.

40
Basic formatting in HTML

Text processing systems, in HTML you have to type formats such as italics and bold.

This applies also to making paragraphs and lists. HTML ignores blank lines, you have to

use the tags instead. Every paragraph should be enclosed between <P> and the

corresponding </P> tag. Example

You write this: And so will it look:

<P>This is the text of the paragraph One</P> This is the text of the paragraph One

<P>There is a blank line between the first and the There is a blank line between the

second paragraph</P> first and the second paragraph

Many linebreaks
<P>Many linebreaks<BR>within<BR>a
within
paragraph</P>
a paragraph

<P ALIGN=CENTER>Centered paragraph</P> Centered paragraph

<H1>Big header</H1> Big header

<H2>Smaller</H2> Smaller

<H3 ALIGN=CENTER>Even smaller</H3> Even smaller and centered

How to make lists?

Bullet lists are enclosed between <UL> and </UL>, while number lists

need <OL> and </OL>. In both cases, each list entry is enclosed by <LI> and </LI>.

Example

You write this: And so will it look:

41
 First entry
<UL><LI>First entry</LI>

<LI>Second entry</LI></UL>
 Second entry

In general, all HTML tags come in pairs, an opening tag and the corresponding closing

tag prefixed with a slash (/).

How to use bold and italics?

You can use simple HTML commands such as <B> and <I> to set your text bold and

italics. Simply preceed the passage with a <B> or <I> and close it afterwards with a

corresponding </B> or</I>, respectively. Example:

You write this: And so will it look:

this is a <B>bold</B> claim this is a bold claim

it is called <I>HTML</I> it is called HTML

How to link to other documents?

Use the anchor tag. Example

You write this: And so will it look:

This is an absolute link to <A This is an absolute link

HREF=http://www.google.com>google</A> to google

This is a relative link to the <A This is a relative link to

HREF=../index.shtml>welcome page</A> the welcome page

42
How to add an image?

Use the img tag. As with links, you can us either absolute or relative URLs. Example

You write this: And so will it look:

This is

This is the <IMG

SRC=http://www.google.com/logos/Logo_40wht.gif> image the

image

43
5.Write about application of computer in business?

Business application is any software or set of computer programs used by business users

to perform various business functions. These business applications are used to increase

productivity, to measure productivity and to perform other business functions accurately.

By and large, business software is likely to be developed to meet the needs of a specific

business, and therefore is not easily transferable to a different business environment,

unless its nature and operation is identical. Due to the unique requirements of each

business, off-the-shelf software is unlikely to completely address a company's needs.

However, where an on-the-shelf solution is necessary, due to time or monetary

considerations, some level of customization is likely to be required. Exceptions do exist,

depending on the business in question, and thorough research is always required before

committing to bespoke or off-the-shelf solutions.

Some business applications are interactive, i.e., they have a graphical user interface or

user interface and users can query/modify/input data and view results instantaneously.

They can also run reports instantaneously. Some business applications run in batch mode:

they are set up to run based on a predetermined event/time and a business user does not

need to initiate them or monitor them.

Many kinds of users are found within the business environment, and can be categorized

by using a small, medium and large matrix:

 The small business market generally consists of home accounting software,

and office suites such as OpenOffice.org or Microsoft Office.

 The medium size, or small and medium-sized enterprise (SME), has a broader range

of software applications, ranging from accounting, groupware, customer relationship

44
management, human resource management systems, outsourcing relationship

management, loan origination software, shopping cart software, field service

software, and other productivity enhancing applications.

 The last segment covers enterprise level software applications, such as those in the

fields of enterprise resource planning, enterprise content

management (ECM), business process management (BPM) and product lifecycle

management. These applications are extensive in scope, and often come with

modules that either add native functions, or incorporate the functionality of third-

party computer programs.

APPLICATION SUPPORT

Business applications are built based on the requirements from the business users. Also,

these business applications are built to use certain kind of Business transactions or data

items. These business applications run flawlessly until there are no new business

requirements or there is no change in underlying Business transactions. Also, the business

applications run flawlessly if there are no issues with computer hardware, computer

networks (Intenet/intranet), computer disks, power supplies, and various software

components (middleware, database, computer programs, etc.).

Business applications can fail when an unexpected error occurs. This error could occur

due to a data error (an unexpected data input or a wrong data input), an environment error

(an in frastructure related error), a programming error, a human error or a work flow

error. When a business application fails one needs to fix the business application error as

45
soon as possible so that the business users can resume their work. This work of resolving

business application errors is known as business application support.

Reporting errors

The Business User calls the business application support team phone number or sends an

e-mail to the business application support team. The business application support team

gets all the details of the error from the business user on the phone or from the e-mail.

These details are then entered in a tracking software. The tracking software creates a

request number and this request number is given to the business user. This request

number is used to track the progress on the support issue. The request is assigned to a

support team member.

Notification of errors

For critical business application errors (such as an application not available or an

application not working correctly), an e-mail is sent to the entire organization or impacted

teams so that they are aware of the issue. They are also provided with an estimated time

for application availability.

Investigation or analysis of application errors

The business application support team member collects all the necessary information

about the business software error. This information is then recorded in the support

request. All of the data used by the business user is also used in the investigation. The

application program is reviewed for any possible programming errors.

Error resolution

If any similar business application errors occurred in the past then the issue resolution

steps are retrieved from the support knowledge base and the error is resolved using those

46
steps. If it is a new support error, then new issue resolution steps are created and the error

is resolved. The new support error resolution steps are recorded in the knowledge base

for future use. For major business application errors (critical infrastructure or application

failures), a phone conference call is initiated and all required support persons/teams join

the call and they all work together to resolve the error.

Code correction

If the business application error occurred due to programming errors, then a request is

created for the application development team to correct programming errors. If the

business user needs new features or functions in the business application, then the

required analysis/design/programming/testing/release is planned and a new version of the

business software is deployed.

Business process correction

If the business application error occurred due to a work flow issue or human errors during

data input, then the business users are notified. Business users then review their work

flow and revise it if necessary. They also modify the user guide or user instructions to

avoid such an error in the future.

Infrastructure issue correction

If the business application error occurred due to infrastructure issues, then the specific

infrastructure team is notified. The infrastructure team then implements permanent fixes

for the issue and monitors the infrastructure to avoid the re-occurrence of the same error.

47

You might also like