Professional Documents
Culture Documents
Make the
text and images computer
High contrast amplifies the colour contrast of some When yot velect twe easier to
etiigR they wil
wll anto
atonvlicaly At
High Cotrat
on the computer screen to reduce eye strain and makes
the items Choose a High Contrast
theme
Tum on or off High Cortrast
more distinct and easier to identify. When iming when let
keyboard shotct to ALT
}Dip
pay a tm Eae
waming neccage of
Make cond when
a when tunving
People who are having poor vision can see in a much better way if hwinga seting on i w om
a seting e
Asus
Basic and High Contrast
Themes (6)
Windows7 Basic
Windows Classic
High Contrast1
High Contast#2
Learning
Description, ription, Turn on t.
nghC e n t r a
**hgh contrest theme We r g hnbcovd thetcdato tum Esse d heses oetrgs en
Chece
m en or off High Corrasd when let AT eh 9*T. PRNT SCREEN k prersed
Degiy awarrg mesuage sen tumrg s teltirg en
Whn ueng tyboerd *heneits te fum E e f A c t e setngs on
M e 3 srd when tumrga ueting en vr d
Dlepday w e r i n g i r i g e weN t u m g a eting on
Namater resdh eloud any ten on the sereen, You will need speaken
M a e e a r n d tock hin one mlare creen Bnd mees evehAhing in that area lerger. You can meve
veund
Malr thirgs on the scren teser to see
Mske thirg6 on the soreen easer tg see
Adut the color and trangyareney o the window berdert
pricyda
Fne tune diuplay effects
Mebre the focus etengle thicher Mse tre focus rectargje tioker
aO laCancel Aepy
Figure 1.1.23: Normal View 1.1.24: High Contrast View
Figure
Wizard for obtaining the optimum settings for a user. Once these categories are through, Windows 7 will recommend
certain settings to the user. Ifthe user wishes to accept these recommendations, he can do so by clicking on the relevant
check boxes, thus allowing total flexibility in the customization. Windows 7 recommends the following Ease of Access
features you may want to enable.
Get recommendations to make your computer easier to
use
Ease- Getrecommen. | | Search Control Pane!
Deterity 2 of 5)
Get recommendations to make your computer easier to use Pens and pencils are difficult to use
Arnswes the following questions to get recommendations for settings that can make your computer easier to
A physical condition affects the use cf my arms, wrsts, hands, or
fingers.
se, hear, and use.
For each quesion, select all tatements thet apply to you. When you're done, you can decide which 1 do not use a keyboard
eings to tum on.
Your answess are used to detemine recommended settings only. f another program or Web site wants to
we this infomation to better suit your needs, you will be explicitly asked for permission by that program
Please read ourPrivay tatement online.
lam blind.
lhave another type of vision impaiment (even if glesses coect n
Ned Cancel
Ne Cancel
Figure 1.1.26: For Dexterity
Figure 1.1.25: For Eyesight
Get recommendations to make your computer easier to
9et recommendations to make your computer easier to
use
use
Speech(4 of5)
Hearing 3 of 5) Other people have difficulty understanding me in a conversation (but
uconversations can be difficult to hear (even with a hearing aid). not due to an accent).
Backgrournd noise makes the computer difficult to hear. have a speech impaiment.
l am hard of hearing.
lam deaf.
Figure 1.1.28: For Speech
Figure 1.1.27: For Hearing
lparnina
Recommended settings
Remove Watermark Wondershare
Thene settings can help you up yor
comptew
belon and selet tha agoens that you mant to
mentt yau
PDFelement
yaur need
to use
we RagularBa*
Figure 1.1.29: For Reasoning Lrgewn hefng
EXPLORE ALL SETTINGS Erre
Biack
Large
I inebng
This section of Ease of
Access Center allows all the Prevent windes trom beng
autcmaay arangad w*en
be customized. We will settings to Tun
meved te the
edge ef ha
makes Audio
Selecting this checkbox SD econ
Wndour natshcstban &sog bers y apen
Description run as
to soon as you
log on
to Windows. Audio
descriptions explain the events in
Audio Devices and Sound
a a"
ii) Make the computer easier to see: E Tum on Nanalos
This section helps in
optimizing the settings for visual display. Besides fum an
Aaáo
Drasigptan
options like choosing a High Contrast
containing
theme, Turn on Narrator, Change the s e of tet and
Turn on Audio icons
Description and Turn on Magnifier (discussed in n aa Mlapilhu
earlier sections), it
displays the following options as shown in Make bingi n tie uza
the Figure 1.1.32: Adut t C o
der tua saa ca nA
apdrey ot the
ue tune dupiay effects wndon berders
Adjust the color and transparency of the Mats tha lacui saianga oitar
thedialog
cursor
set the
thickness
of
c
the blinking cursor: This option allows you to customize the thickness of the blinking
dialog boxes and programs.
in the
Bemove background images: This option helps in making the screen easier to see by turning off al unimpor
Rer
rlapped content and background images.
erlapt
the computer without a mouse or keyboard: Asshown in the
Uset
i c e 1.1.33, this section helps in setting alternatives for input ufer witlhout a mouse or heryboard
Figure
commands with the help ofthe Microphone, which the computer will understand and respond to.
In this section, you can manage
Recognition experience iv. Make the mouse easier to use:
Configure your Speech often
Sar Spech Recognition
the settings of the mouse or other pointing devices. Very
of
O Seupmcp the mouse pointer is not easily visible on the white background
Take
Speech Tutonal the work area or certain the ribbon or on the edges of the
parts of
having
L n e e r a
Tain your computer to better understand you window. This all is more troublesome for those who are
Figure 1.1.34: Using Speech Recognition help in changing the size and colour of the mouse pointer to
and
available for the pointer, namely Regular, Large,
mouse
This
Extra Large and Black, White and Inverting respectively.
the mouse pointer.
gives us the total of nine options for setting
the movement of the
Turn on Mouse Keys: This option controls
mouse pointer by using the numeric keypad.
prevents the
the edge of the screen: This option
Lcarn aboutadditional asusthye technofogies onlins
noved to
resized and docked along
Wrom getting automatically
moved to the corner of Apphly
ne sides of the screen when they are
Learning
Computers withKIPS 129
be used
to adjustt settings Or the
Wondershare
board as sh
can
section
This Remove Watermark
easierto PDFelement
use:
pointer. We
Mouse
c a n also
Keys:
increase or
decrease the speed
mouethe
or while using.the
he ry*bm e mtane m d h e i
Mrewd hedeu
e me
Te p v
e
Dplay the Menr Key nen en the tae
erw
Figure 1.1.36: Making the Keyboard easier to use Figure 1.1.37: Setting up Mouse Keys
Turn on Sticky Keys: Instead of pressing three keys at once (such
Set up Sticky Keys
as when you must press the Ctrl, Alt, and Delete keys together to Tum on Sticky Keys
Press kryboard shortruts (uch as
log off to Windows), you can use one key by turning on Sticky CN-ALT-DA) one kry & atine
Keyboard shorteut-
Keys and adjusting the settings. In this way, you can press a Tun on
Sicky Keys when
HHTspressed fse tines
When using keryboard shorttus to tum Ezse df
modifier key and it may remain active until another Acces
key is Diplay a wermung message wham turang a sehag cnng
Opticons
Sticky Keys can also be turned on or off from the
Keyboard Lock modifies krys when pressed twiceinanw
settings. This feature is useful for those who face Tum off Sbcky Keys when two keys are pressed &once
difficulty in
pressing more than one key at a time (like Ctrl+ Feedback
on Sticky
Alt+Del). Turning Play a scund when modifier krys are presed
Feedback can also be activated if Other options and Make a sound when tuning a setting on or
all the
pressing the Caps Lock all
Capital
he cenpates wl igore brirf bryatrokrs
axcorng
Keys: Turning
computer recognize onFilter Keys
Dplay the fer Keys * on on the taskbs
Filter
the Set up pzing the
Clicked ON or OFF. The next section allows settings The first check box allows the Fiter Ne
in this
one to turn ONsection.
or OFF the Keyboardsshortcut (Press right SHIFT
to ceconds) for activating Filter Keys. You could also set the message or
Computer to
y a warning
ndicate that Filter Keys is being turned ON or OFF. Click on Apply anddisplay
then OK after sertig
soun.
Keys.
mu
keypresses is recognized as a valid keystrokes can also be set from here. If thetime interval between1the
The fist check box is Sound Sentry. IF this box is checked then visual notifications will be provided instead of sound
Thisis helpful for those who are hard of hearing.
The type of visual notification that is required can be set by choosing the Use text or visual aternatives for sounds
When ou seed these setings they wil atomasoly zat adtime you lng en
appropriate Radio button. One can choose to have a Flash active caption e val ces nded dmed
bar, a Flash active Window, a Flash Desktop or no visual indication. Tun on visusal nctfiatbcns tor sounds Sound Semy
Wondershare
automatic lly
In
here. being Remove Watermark
from
Windows
from
PDFelement
prevent
ASSESSMENT TIME
M u l t i p l e C h o i c e Q u e s t i o n s :
have.
***"***'***.
disability.
who
those
c. Hearing
to help b. Visual
Sentry
is
designed
p r o b l e m s
in their .. . *************'*...
1 Sound have
who
a. Learning
those b. Physical Movements
C. Vision
used by
Narratoris
The
Screen
the . .
*******'
.
'******
keys.
are
Lock
a. Hearing Num
and C. Toggle
Scroll Lock, b. Sticky
The Caps Lock,
3 option
i s . . . *****""'******************
Center
a. Numeric
E a s e of
Access
The
Shortcut
a. Windows key+V
key to open
b. Windows key+U
c.Windows key+
******** *******
is used to
The Filter key single key
press.
pressedas a
Recognize
multiple keys
press.
a.
as a single key
Recognize single
key pressed
b.
as multiple
key presses.
C. Recognize single
key pressed
"
**********************"**
High contrastisused..
b. To reduce eye strain c. To reduce noise
a. To reduce blurriness
Accessibility settings
can also be adjusted by.
From the Start Menu, the
7
a. Start> All Programs> Accessories>
Ease of Access Center.
b.Start> AlI Programs> Accessories > Ease of Access> Ease of Access Center,
a. Magnifier
b. Narrator
B.
B Fill in the Blanks: c. Sticky keys
1. To
optimize the Accessibility
2. The settings, first we need to
**************'* ..
start the
also
key will
***
***
the Window
Windows button while the 'U'
Holding
down
simultaneously pressing
*************** Center
d
sound
I...********************..... DOX IS checked then visual notifications wil be
. .
provided instead of
2 hard of hearing.
who are Text tuning
Lens
Windows logo key and plus sign
Dexterity Ease of Access
ColorInversion keysEase of Access
Shortcut
INTSImpaired Vision SoundSentry Control Panel Windows logo key+ Esc
True o r False:
State
Microsoft is not making disabled-friendly products.
Screen Magnifier is not helpful for the people who are suffering from vision problem.
The
helps in changing the colour values and also helps in maximizing the contrast
Color inversion
between the
various things present on the screen.
insertion point.
The Docked view is used to set the mouse pointer, the keyboard strokes, and the
time.
Text tuning
is used to place the text on the screen that is easier to read for a long
5
list box is used to make the voice louder.
The Set volume
Keyboard disables the physical keyboard.
The On-Screen
Announce System Messages' option instructs the Narrator to read out the
events such as Notifications.
Background
locate the cursor.
Cursor width and blink rate
can be adjusted so that it becomes easier for us to
9
portion of the screen and displays it on the top.
10. The Lens view magnifies only a
information about the shortcut keys which are used in Windows 7. This will
Ask the students to get more
Learning
Computerswith KIPS 133
N E T W O R K I N G
FUNDAMENTAR
same
every
at thdobe.
diferent locations. computer
frequent transferring
of data from
one
means
data transfer
sending
is a costly
data
electronically
from one computer
other.
to another to another. It involves increaslini.inekidng sh
Jves
Data shared by the
communication
to be
r e s o u r c e s of
o n e computer
which allows the
communicate through a cable. But the
the .
computers
complex can
example, in which are
Computers located within the
same
t e l e c o m m u n i c a t i o n system
for data communication. For
For
sed case of
far-away locations use a .
system or microwave relave.
Reservation System, communication facilities like telephone to
place
telecommunication system, we can
electronically mail a message
from one to
send te
er and reeve
immediately.
cOMPUTER NETWORK
A computer network may be defined as a group of two or more computer systems or Derint
connected togetherto exchange information and share resources amonga wide range of userc
TYPES OF NETWORKSs
Depending on theirsize,capabilities, and the geographical distance they cover, a computer netwn
follows: can be Cas
PERSONALAREA NETWORK (PAN)
This type of network connection covers a
very small area such as a home or an office cabin.
Besides the computers, laptops,
tablets, smartphones, printers, or wireless
also make up the nodes of this headphones
type of network. This type of network
connections or the
uses
Bluetooth, USB
increasingly popular Wi-Fi technology. It generally covers the range of
less than 10 meters.
This type of
network is
(MAN)
are used
by large geographically larger than LAN and Central
Ofice
government bodiesorganizations,
like the
having several branches covers
over
city. They a
network uses
microwave
Municipal Corporation, or city or by local a
whole world
effectively within the
echnology s o WAN
WANs are expensive network. Access
so network. A Media
Wde AreaNetwor
WANS
sed by
a r eu s e a
multinatic
organizations, WAN)
Control address (MAC
the
assigned by
agencies, etc. They use address) is
avernment
a/lines, g o v e r n m e n t a g e
manufacturer of the
microwaves, a n d s a t e l l i t e s . to a network.
ADVANTAGES
OF C O M P U T E R NETWORKS
nc of
Sharing ofHar
Hardware: Sharing of hardware devices like printers, scanners, or storage
:cuch as hard drives, help in reducing the cost ofthe computer system.
devicesse
Lef's Know More
As the information
Sharingof Software:
ofSoftwa Purchasing software for individual computers is more expensive received at the hub is
software that will be installed on one central computer called as server and simply copied and
t
than buying transmitted to all the
users to access it. nodes on the network,
many
allowing
known as
hubs a r e also
aring files: By using a network, users can easily share documents with each other. This "multiport repeaters.
Sharin
teamwork and increases productivity.
feature promotes
VPN:
of the entire network.
will not affect the operation Virtual Private Network.
Learning
Computerswith Kips13s
on tthe net
a l the
c o m p u t e r s
or storage
systems,
Remove Watermark orkWondershare
woule ads
PDFelement
software,
resources like hardware,
standstill. programs,
a virus i
infectionin one
by using Anti-virus
Viruses: Unless special
c a r e is
the network.
taken
Oputer ma
the computers on
networks. The security ofth
Security: There is
a danger of hacking,
especially in
firewalls
large
will have to be
installed to prevent network, the
the breach ofs
s
software like
to be monitored and special
Network Architecture is an
overall design of
a computer
zation and cort
in two different waysS:
Computer Networks are designed
Network Architecture
PEER-TO-PEER NETwORKS
network, each
Peer means equal and therefore in a peer-to-peer
in terms of the r e s o u r c e s
computer or node is equal to other computers
that it can access and share. All computers in this type
of network act
both as the supplier as well as the consumers of resources. It treats all
devices as having the equivalent capability as shown in the Figure 1.2.5.
Ina P2P Network, each computer shares its resources such as processing
PEER
power, disk storage or hardware such as printers, with other computers
Figure 1.2.5:
on the network.
Peer-to-Peer Networt
CLIENT-SERVER NETwORKS
databases, printers, or high power back-end part interacts with the shared
processors. reo
Table 1:Differences
between
Peer-to-Peer and Client-Server Networks
PEER-TO-PEER
All
computers are equal in CLIENT-SERVER
of resources. capabilities as well as in the othe
use A specific computer, more powerful
than the
of
services "C server
The server
provides resources,whereas the client a n
this
type
also
request resources from the server.
and can
store iits
store own data.
The data is stored in a centralized computer i.e,
omputer
is also
server
since everY
mputer
c o m p u t e e r
be noted when
no
perceptible simultaneously from the
multiple users simultaneously down
s
e f f e c tw i l l
O p e r a t et h e i rc o m p u t e r s
of the server.
Pnetworkis ess expensive. and easier to impleme expensive ana
Client-Server networks are usually more
SWITCHING TECHNIQUE
it travels
receiver. Information may be switched
as
Advantage more
devices are sharing the
channel.
Disadvantage:
storage is required to s t o r e t
Many users can share the same channel at the same time.
Communi cai
require dat
Disadvantage:
transmit ed imm
Protocols for packet switching
Packet-switdhing
are more efide
are complex and hence have additional cost in amaunt of de
implementation.
ifthe packet is acceptatle
lost, the sender has to retransmit the data.
NETWORK COMPONENTS
in addition to the computers that make up the terminals of
network, some other hardware a
devices are also
proper functioning of the required for the
network. These are:
swITCH
Figure 1.2.10: Port Switch
A Network
Switch is a device, which
data, processes it, and then connects different
forwards it only to computers and devices on a
on the network. the destination device. It uses computer network.A th
packet switching tecnnigueto transa
REPEATER
A
Repeater simply copies the
when the
network signal is information arriving at its input and
area
having strong weakened or distorted retransmits it from the requireda
outpu
retransmitted by theelectromagnetic fields. The
over a
long distance. This . s e stha
why, hubs
hubs aare known as dumb switches. Hubs are comparatively cheaper than the switches.
is why,
That
214.
Hub
Oato aaaeoornected
lorwarded
Datas e n tb y
o n e
node
a
device, which routes the information around the network. It is also
n e t w o r k
used to
and
routeris
destination
The header of every packet of the information arriving at a router is checked for the
hest route,
the message is forwarded
uSing
Network Router -Example Connections
330 Ft. Wireless
Wireless
wireless
Outdoor Gateway
Sensor
4LAN Cable
Network Router
BRIDGE which is i n t e n d e d
Only data
network is
for the other
A bridge is a device that connects
allowed to cross over the
blocked.
bridge. Else it is
same
communication protocols. A Bridge
Figure 1.2.17: A Bridge
It thus, acts
of a network from another.
bridge blocks off one segment transmits it,
information and
25 a filter. The bridge checks the arriving
1.2.18: Working of a Bridge
as shown in the Figure 1.2.18. Figure
only,ifrequired
In a ring topology, all the nodes in the network are connected in a circular manner.
Each node connects to exactly two other nodes, forming a single continuous
pathway for signals. When one node sends a message to the other node, which is
t adjacent to it, data travels through all the intermediate nodes until it reaches
its final destination. Ring topologies used in both LAN and WAN setups. The
are
main disadvantage of this
topology is that if one workstation goes down, the entire
network gets affected. Since data
being transferred over the network has to pass
through each workstation, this makes it
slower than a startopology.
MESH TOPoLOGY
Figure 1.2.21: Ring
In mesh network topology, each node Is
To
connected
every other t to
network. In this
topology, every node not only sends its own
data from other nodes. This
type oftopology can handle a
signals, but
commonly used in wireless networks. In case, if one large volumet
the of
always an alternative present so that the componentsfa
data transfer does not
expansion and modifications can be get afeca
done in this topology without afietm
nodes. The overall cost
of this network is
network topologies. extremely as high compare
Figure 1.2.22: Mess Topology
TREE TOPOLOGY
Tree
topology is one of the most common
group of network
star-figured workstations connected setup that consists of a
cable. In tree to a linear
topology, one star network is bus backbone
networks. In a tree connected to the other
network,
Sourc
the
Remove Watermark
of
PDFelement
rest
but theenance becomes difficult.
ire,
suffer
with eeither degraded performance or complete
it
will
w i l
ontinue
t of u n c
HYBRIDTOPOLOG oGY
it
adding the necessary hardware,
so
combined
oten by
togetherby
maintain as well
easy to implement,
makes. technology
sHybridtechn
as
s c a l eu p
Topology
Figure 1.2.24:Hybrid Internet
is
words
the
INTERNET other
In
as the
ternet.
of rules
networks around the world is known
set
by a
b a linterconnection ofcomputer Communication over the Internet
is go governed
Control
as
Networks a r e TCP/IP
AgO af
used protocols for data transfer over the
Internet a
YourPC
ACCESSINGTHE INTERNET Internet
X7.
smartphone.
Modulator-Demodulator. A
for
Modem stands
Modem: to
hardware device that allows a computer Transmission Controi Protocol/
telephone line,
transmission o v e r an analog
In the case of a c c e s s the The Internet
most popular way to Figure 1.2.25:
the
which was once and
data between analog much fasten
modem converts digital modems are
Internet, the c o m m u n i c a t i o n . Nowadays,
network
time for two-way
digital formats in real hardware.
the need for having
more
eliminating
often are built in the computer, provider (ISP) is an organis
service provider. An Internet service
stands for Internet or wi
An account with an ISP: ISP modem), or direct (hard wired)
Internet via dial-up (using
access the Service Provid
that provides services, to have an account with
an Internet
we must
for Internet access,
connection. Since we have to pay
Vodafone, etc.,
xample: BSNL, MTNL, Airtel, Internet. Google Chrome,
Mozilla Firefox, In
access the
allows us to
orOWSer: software, which
A browser is a
Learning
Computers with KIE
the u s e r to d a
Dial-up
connection
allows
Remove Watermark
one work Wondershare
connection is very
slow. The a time.One
PDFelement
type of to the
Internet.
the phone to
call or
connect
connection that uses th.
e
It is also
a type
of
telephor
DSL (Digital Subscriber
Line):
speed. A DSL filter
removes the
h-frequency ines, bun
high.f-
transferring data
simultaneous
at
use of the
a much higher
connection uses
transmission.
the cable TV
lines and gives fast
access to theace interfeterreennttee,, t
Cable Internet: This type
of
dband Internet.nte
known as. Broadband ins
Breronadebatn,eg n
are
Internet systems
and cable
thatof DSL lines. The DSL Internet simultaneously. A
connect to the
the phone to call and
allows you to use
(Generation)sstaanderendt onmon
Internet on mobile
4G
3G or4G Systems: To use the
and capacity. The 5G is the moste
These standards allow higher data transfer speed
network coverage and speed. It was started around 2014. Airtel launched 5G in Seat 20a-
Wi-Fi Hotspot: A
Wi-Fi
physical location from hotspot is a Desktop
restaurants, hotels,
airports. Some hotelsrailway stations, or
for this amenity, charge the clients
whereas most
other public hotspots of the
can be Tablet
reev accessed Smertphene Laptop
Figure 1 2 2c. 4
Remove Watermark Wondershare
Aprivateh
ally
hotspot is usually used in homes or offices and In PDFelement
access is only available to those with a password. home
ke smartphones, laptops, tablets, and even desktop
n for which we need to pay certain charges to thecomputers requiring Internet a
rdevices
nternet
ces,
connection,
network provider.
ASSESSMENT TIME
Multiple Choice Questions:
A.
two or more Local Area Networks are combined together we get a . ***********
* **** *
a. PAN
b. WAN c. MAN
forcommunication
of rules used between computers is known
A set as.. *****************
2
a. Protocols
b. Processes c. Laws
******** ... topology every computer is physically connected to all other computers in the newo
In
a. Star
b. Mesh c. Ring
* *
as
backbone, is called
**
topology.
a. Star
b. Bus c. Ring
Computers are
connected togetherto share.
d. All of these
b. Software C. Files
a. H a r d w a r e
c. International Protocol
a. Internet Protocol
b. Internet Problems
Internet is called
for transmission over the
from a computer suitable
which makes the digital signals
7. A device
********* e.
********
c. Modem
b. Model
a. T r a n s m i t t e r
..Connection.
of Internet
8. The earliest type
Broadband Internet
c. Dial-up
a. Cable Internet
b.
Internet.
to transfer message
through
uses
********** ******'***. . switching technique
9. The TCP/IP .
C. Packet
b. Circuit
a. Message ..topology
results in the.
************
of...
*********
breach *********"
is a way of . . . of resource
4. well as
Wi-Fi or . ******************************"** . . .
..as
*****************
as both.
each computeracts Internet is
available.
5. peer network, to the
peer to location
from
where Wi-Fi
access
6. A.. is a physical
"**********************
Learning
Computers with KPS
topology, every
node not only sends Remove
its own
signals but
Watermark Wondershare
In **********************************
als PDFelement
B.
nodes.
The process where the network system creates interconnections between
relays data fr
switching
9. simply copies the information arriving at its input and retra
A...*****
mits it frorm
10.
Security
"*********
are known as "dumb switches"
1. Find out
ACTIVITY ZONE
about the different For Better
Which type of
Internet Internet Service Concept Clarity
Providers that operate
department and find out connection is being used
2. Find the reasons for in your around your educau
instituto
out which
topology is
the choice of Internetschool lab? Meet the hedu Compule